Nobody downloaded yet

Transaction Security in E-commerce - Research Paper Example

Comments (1) Cite this document
This paper will discuss some of the important aspects that are associated with “transaction security in e-commerce”. According to this scenario, this paper will address some of the important security issues that can emerge during online transactions (e-commerce transactions). …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Transaction Security in E-commerce
Read TextPreview

Extract of sample "Transaction Security in E-commerce"

Download file to see previous pages This research will begin with the statement that E-commerce refers to the business deals between organizations and individuals carried out through the digital technologies. Normally, it is acknowledged as the Internet-based electronic commerce. According to this scenario, e-commerce offers numerous benefits for businesses to carry out business activities on the Internet. E-commerce has been offering to the worldwide economy very much, all through the past decade, as more companies and corporate owners and entrepreneurs have started building their own web based Business Empire. In view of the fact that the Internet carries on to grow, and more and more people began to utilize the Internet for a wide variety of reasons, thus, businesses in all the industries are starting to compete extensively for clients on the World-Wide-Web. In addition, it forms a situation where hundreds and thousands of web based transactions happen on a daily basis, with millions of dollars being spent in online transactions. According to this scenario, the majority of people do not understand that the job of protecting similar business transactions is completely up to the web hosting supplier, who is actually responsible for making use of the suitable applications, implementing safety and security measures, and technological advancements to ensure security of customers’ financial particulars of their customers. At the present, the majority of business organizations are largely making use of the Internet for communicating and establishing profitable relationships with their customers to entertain them with their products and value added services. With the advancement in information and communication technologies, electronic commerce has emerged to provide the customers with the services to perform the transactions from any location over the internet. In the same way, electronic banking provides its customers with 24-hour access to cash through an automated teller machine (ATM) or a direct deposit of paychecks into the checking or savings accounts (Biswas, Taleb and Shinwary; Turban, Leidner and McLean; Pourshahid and Tran). This paper will discuss some of the important aspects that are associated with “transaction security in e-commerce”. According to this scenario, this paper will address some of the important security issues that can emerge during online transactions (e-commerce transactions). This paper will outline some of the main security vulnerabilities regarding those security areas and aspects. Security Specification in Web Service These days, the most authorized and wide-ranging web service security principles and standard for the (Web Services Security) are based on WS-Security guidelines that were published by IBM in cooperation with Microsoft and Verisign. Basically, the security of web based services and business transaction is based on these principles and it as well puts together the frequently established security models, methods and technical supports. According to this scenario, the basic purpose of implementing web services security is to ensure the confidentiality and reliability of the data processing through application programs as well as to recommend the expansion and message header of the SOAP. In addition, the Web Services Security unites a wide variety of security configurations, models and methods. It is one of the service oriented standard conditions. Some system is capable to make sure to be equally compatible with others throughout the platform and the technique autonomous of language (Farshchi, Gharib and Ziyaee; Whitman and Mattord). Client-side Security Issues Client-side security has always been one of the major issues from users’ point of view. Generally, client-side security necessitates utilization of customary computer security technologies, like that suitable user authorization and authentication, anti-virus and access control ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Transaction Security in E-commerce Research Paper”, n.d.)
Retrieved from
(Transaction Security in E-Commerce Research Paper)
“Transaction Security in E-Commerce Research Paper”, n.d.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
gerry64 added comment 11 months ago
Student rated this paper as
This document saved me today. I liked the structure. It was very useful for my information technology course.

CHECK THESE SAMPLES OF Transaction Security in E-commerce

E-commerce Data Privacy and Security

... E-commerce Data Privacy and Security Abstract As ‘Electronic commerce’ develops the business practices of the business around the world in terms of profitability, success, and gaining competitive advantages, there are many negative aspects that are linked with it. However there are different domains that may portray a negative impact of using e-commerce based services. In this report, we have prioritized issues related to privacy of e commerce and social networking based websites. As far as website developer is concerned, there are five point that are taken in to consideration in the context of a e-commerce based website privacy policy i.e. What information will be collected?, method of colleting this information, utilizing... ...
25 Pages(6000 words)Essay

E-commerce Data Privacy and Security

...the information to someone else. The other is the monitoring of electronic mail and Web usage by the government or law enforcement officials, employers, or email service providers.”In the context of online privacy “One aspect of the Internet (“online”) privacy debate focuses on whether industry self-regulation or legislation is the best route to assure consumer privacy protection.In particular, consumers appear concerned about the extent to which website operators collect “personally identifiable information” Five Factors for Defining a Policy Furthermore, one more study concluded five factors that must be met before defining a privacy policy for a particular e-commerce based site. (States 2010) states...
4 Pages(2500 words)Literature review

E-commerce: VOIP Security

...?E-commerce: VOIP Security Introduction VoIP refers to the abbreviation of voice Over Internet Protocol. This terminology refers to the communicationtechnology used for transimitting sound signals via the internet. The voice in this case becomes converted into binary form in order to be relayed digitally through the internet. Due to the security implication of transmitting data via the internet, the data (binary) can be encoded on transmission and decoded on retrieval. The use of cryptography in this case tries to prevent eavesdropping by unwelcome parties.Even with the use of cryptography to protect calls; hijacking of calls also proves to be a major threat. This can be done by diverting the direction of the call. A person... . b) Work...
18 Pages(4500 words)Essay

Significant Importance of E-Commerce Security

...key cipher two keys are generated which are matched mathematically, one of the keys is used to encrypt the data and the other is to decrypt it. (Oswald, 2005; Al-Slamy, 2008) In today’s e-commerce environment the customer may get personal certificates to confirm their identity to the website. Certificates allocate unique identities and information to the customers which is used to access issuer’s website. A certificate generally has information like holder’s name, key information, policy information, issuer’s name, validity period etc. (Al-Slamy, 2008) Other technologies for E-commerce Security: Many methods and technologies have been devised to deal...
7 Pages(1750 words)Research Paper

Privacy and Security in E-Commerce

... Privacy and Security in e-CommerceSecurity of credit card information and personal information of customers has become a great concern to participants of e-commerce business. Increased number of customers begins to fear for the threat of losing money when making purchases and payments online. E-commerce operations take place in an environment that is faced by both ethical and legal threats. Hackers and crackers have become a hindrance in executing transactions safely online (Becker, 2008). Open environment is one that allows customers to transact business with the...
4 Pages(1000 words)Assignment

E-commerce Security

...card numbers, and session identities among other customer information to avoid information manipulation. The security measures taken by the company include a 3-tier modular architecture, validation routines, open source cryptographic standards usage as well as practices of secure coding (Nick, 2010). Competitive advantage the technology gives the GAP Company The competitive advantage that GAP Company gets from technology include; access to massive market, marketing sales online, easy processing of transactions, and ease of handling and shipping services and products. These will ensure the company makes good sales and treats their customers well. Barriers in global...
5 Pages(1250 words)Assignment

E-commerce security and fraud protection

...? E-Commerce Security and Fraud Protection E-commerce presents a strategic platform that offers organizations and consumers an easy-to-use and convenient way of transacting in business. However, the security concerns regarding the system have caused a majority of business organizations and individual consumers to remain wary of it. To deter hacking and fraud from jeopardizing security in e-commerce and hence hinder progress in e-commerce, this paper outlines some of the current security measures that have been adopted to safeguard consumers. Thus, the paper articulates access control approaches, securing of e-commerce channels, security in payment protocols and communications security. Introduction E-commerce refers to the buying... and...
7 Pages(1750 words)Term Paper

The security technology of e-commerce

...The security technology of e-commerce CONTENTS 0 Executive Summary2.0 Introduction 3.0 Research hypothesis Statement 4.0 Explanation of the Technology 4.1 Background 4.2 Firewall 4.3 Intrusion detection System (IDS) 4.4 Anti-Virus Software 4.5 Secure socket layers (SSL) 4.6 Secure Electronic Transaction (SET) protocol 4.7 Suppliers and users of Security Technology 5.0 Application and uses of Security technology in Business 5.1 Strength and Week areas of SSL 6.0 Future Trends 7.0 Conclusion 8.0 References 1.0 EXECURIVE...
8 Pages(2000 words)Essay

The Security payment in E- commerce

...Topic: The Security of Payments in E-commerce E-commerce has granted a new medium of opportunities for the merchants and a convenient mode of shopping for the customers around the world. However, there are many security threats prevailing in the e-commerce environment which pose threats to the authenticity and reliability of the whole concept. Credit card fraud is the most common internet crime these days. There has been much research on this subject and many solutions have been devised to make online business transactions more secure. Some of the solutions will be...
8 Pages(2000 words)Essay

E-Commerce and IT Security

...Mobile phones, IT-Security and E-commerce Introduction Cell phones were primarily introduced in order to respond to specific needs – mainly for helping professionals to communicate when there is no phone available and a critical business issue needs to be discussed. However, communication is part of the daily life and not just a business need. In this context, the transformation of cell phones to an indispensable tool of communication can be characterized as expected; cell phones today have become a necessity but the margins of their role have been expanded more than initially estimated. In fact, in their initial forms, cell phones had specific and limited operational potentials; today...
10 Pages(2500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Transaction Security in E-commerce for FREE!

Contact Us