A Comparative Study of Security in E-commerce: Review
Keywords:
client threats, channel threats, server threats, SSL/TLS, SET, 3d SecureAbstract
The goal of e-commerce system is to provide secure connections between customers and the company with other parties acquiring personal information. But in the various stages of e-commerce an individual or company is a victim of unwanted attacks or threats. Here, the investigation is done on the security concerns among different e-commerce websites. Matters such as privacy, security and threats, impersonation, forged identity etc. is also looked upon. The different threats are brought forward with maximum efforts done onto how it can be reduced.
References
Niranjanamurthy M and Dharmendar chchar. “ The Study of e-commerce sewcurity Issues and Solutions “ International Journal of Advanced Research in Computer and advanced engineering. Volume -2, Issue -7 . Pages (5-7), July 2013.
L.Byron.”Study on Electronic Commerce and Security”, International Journal of Advanced Research in Computer and advanced engineering. Volume -1, Issue -5 . Pages (5-7), July 2012.
Dr.Nada.M.A.Al.Slamy.”E-Commerce Security”,International Journal of Computer Science and network Security”, Volume-8, No-5. May 2008.
Website-www.academia.edu/9273437/A_Comparative_Study_of_Secure_Electronic_Transaction_Mechanisms_for_E-Commerce.
Mark S Ackerman and Donald T Davis Jr. “ Privacy and Security Issues in E-Commerce “. Review Chapter of the new Economy Handbook, in press.
Jarnail Singh.”Review of E-Commerce Security Challenges”,International Journal of Innovative Research in computer and Communication Engineering. Volume-2, Issue-2. February 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
