2022
DOI: 10.11591/ijece.v12i1.pp560-571
|View full text |Cite
|
Sign up to set email alerts
|

Design and implement a new secure prototype structure of e-commerce system

Abstract: <p><br />The huge development of internet technologies and the widespread of modern and advanced devices lead to an increase in the size and diversity of e-commerce system development. These developments lead to an increase in the number of people that navigate these sites asking for their services and products. Which leads to increased competition in this field. Moreover, the expansion in the size of currency traded makes transaction protection an essential issue in this field. Providing security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…The study highlights that consumers from different European countries have varying sensitivity levels against cybersecurity for e-commerce applications. Hussien et al [25] have developed a prototype to serve as an agent software among customers and electronic marketplace, where security is implemented in this agent software on the client-side to improve the performance of marketplace systems. Chen et al [26] have proposed a forensic model which will help to recognize suspicious system behavior.…”
Section: Related Workmentioning
confidence: 99%
“…The study highlights that consumers from different European countries have varying sensitivity levels against cybersecurity for e-commerce applications. Hussien et al [25] have developed a prototype to serve as an agent software among customers and electronic marketplace, where security is implemented in this agent software on the client-side to improve the performance of marketplace systems. Chen et al [26] have proposed a forensic model which will help to recognize suspicious system behavior.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, the volume of data carried over the internet via these systems is continuously increasing. Some of this information is deemed critical and might be vulnerable to various types of assaults (especially payment information) [2]. As a result, ensuring the security of this information becomes a need.…”
Section: Overviewmentioning
confidence: 99%
“…Similarly, access and utilization of the data and network are also growing. This increases the risk of cybercrime in the form of an attack for retrieving confidential data and also decreases the trust of customers and firms in each other ( Hussien et al, 2022 ). In e-commerce, the customer must share their private information with the organization, making it capable of knowing and recording much information about the customers ( Vasupula et al, 2022 ).…”
Section: Literature Reviewmentioning
confidence: 99%