Conference Proceeding

Mathematics in Space and Applied Sciences (ICMSAS-2023)
ICMSAS-2023

Subject Area: Mathematics
Pages: 331
Published On: 03-Mar-2023
Online Since: 04-Mar-2023

 Read More >>

Author(s): Veshalee Singh

Email(s): Email ID Not Available

Address: Dr Veshalee Singh
Assoc. Professor, Dept. of commerce, Govt. College, Hamirpur, H.P.
*Corresponding Author

Published In:   Conference Proceeding, Mathematics in Space and Applied Sciences (ICMSAS-2023)

Year of Publication:  March, 2023

Online since:  March 04, 2023

DOI:




Security Issues And Threats In E-Commerce: A Study

 

Dr Veshalee Singh

Assoc. Professor, Dept. of commerce, Govt. College, Hamirpur, H.P.

*Corresponding Author E-mail:

 

ABSTRACT:

E-Commerce means conducting business through internet or through electronic media. It is basically buying and selling goods and services online through internet on computers, tablets, smart phones and other smart devices. It includes online business network, electronic fund transfer system, supply chain management system, electronic data interchange, automated inventory management system, etc. hence, it has become complicated but extremely advanced business tool. It allows the customers to buy products through smart devices saving their time, money and effort and also beneficial to businessmen by curbing various costs like for showrooms, personnel, advertising, middlemen, transportation, warehouses and many more. But there are many security threats also those cause huge financial and emotional loss both to the customers and businessmen which costs havoc for the trust between business and customer. These frauds by the hackers and others are through a myriad of malicious techniques like financial frauds, phishing, spamming, Trojans, malware, bots, denial of service, credit card frauds, fake returns, etc. this paper will explore various types of security online threats.

 There are ways to prevent these from impacting the e-commerce parties like stronger passwords, frequently changing passwords, address verification system, payment gateways, anti-malware software and HTTPS and SSL certificates, etc. This paper reconnoiters various threats to e-commerce and solutions and countermeasures for secure buying and selling of products which might be useful to the online buyers and also to the business.

 

KEYWORDS: E-commerce, E-commerce security issued, Secure online business guidelines.

 

INTRODUCTION:

The world today is rapidly transforming into high-tech machinery. Swift technological changes are so widespread that it has little room left for conventional ease. So is in business. The Industry has gone through many technological changes resulting in a great deal of evolution. The mass adoption of internet in business has created a paradigm change in the way businesses are conducted today. A virtual marketplace is created for goods and services for the ease of consumers as well as for the producers and sellers. New technology has made it quite easier for the consumers to buy a product from home through computers, smart phones, tablets and other smart devices. They just have to download an app like Amazon, Alibaba, Flipkart, etc. there has been a proliferation of numerous Apps of numerous companies for this purpose. Free shipping has made it more attractive. This is called E-Commerce, which means buying and selling of goods and services through internet through smart devices. Now a days almost everything can be bought through internet and the product will reach a home at zero shipping or postal cost. For this purpose electronic payment gateways like debit card, credit card, UPI system, etc. are used and even cash on delivery is available for the benefit of the consumers. The business online is very competitive and the consumer has a huge variety of products to choose from a wide price band. E-commerce operates in several market segments like business to business, business to consumer, consumer to consumer and consumer to business. E-commerce helps especially small business to reach widespread customers throughout the country and even abroad. It saves various costs like for showrooms, personnel, advertising, middlemen, transportation, warehouses and many other direct and indirect costs only by providing more efficient distribution channels and a payment gateway.

 

DEFINITION:

Electronic Commerce is the symbiotic integration of communications, data management and security capabilities to allow business applications within different organisations to automatically exchange information related to the sale of goods and services” (Daniel Minoli and Emma Minoli, the term E-Commerce was coined and first employed by Dr Robert Jacobson, Principal Consultant to the California State Assembly’s Utilities and Commerce Committee, in the title and text of California’s Electronic Commerce Act, carried by the late committee Chairperson Gwen Moore (D-LA) and enacted in 1984 (Wikipedia).      

 

E-COMMERCE TYPES:

There are 6 basic types of e-commerce:

1.     Business-to-Business (B2B)

2.     Business-to-Consumer (B2C)

3.     Consumer-to-Consumer (C2C)

4.     Consumer-to-Business (C2B).

5.     Business-to-Administration (B2A)

6.     Consumer-to-Administration (C2A)

 

1.    Business-to-Business (B2B) e-commerce encompasses all electronic transactions of goods or services conducted ​​between companies. Producers and traditional commerce wholesalers typically operate with this type of electronic commerce.

2.    Business-to-Consumer (B2C): The Business-to-Consumer type of e-commerce is distinguished by the establishment of electronic business relationships between businesses and final consumers. It corresponds to the retail section of e-commerce, where traditional retail trade normally operates.

3.    Consumer-to-Consumer (C2C): Consumer-to-Consumer (C2C) type e-commerce encompasses all electronic transactions of goods or services conducted ​​between consumers. Generally, these transactions are conducted through a third party, which provides the online platform where the transactions are actually carried out.

4.    Consumer-to-Business (C2B): In C2B there is a complete reversal of the traditional sense of exchanging goods. This type of e-commerce is very common in crowdsourcing based projects. A large number of individuals make their services or products available for purchase for companies seeking precisely these types of services or products.

5.    Business-to-Administration (B2A): This part of e-commerce encompasses all transactions conducted online between companies and public administration. This is an area that involves a large amount and a variety of services, particularly in areas such as fiscal, social security, employment, legal documents and registers, etc. These types of services have increased considerably in recent years with investments made in e-government.

6.    Consumer-to-Administration (C2A): The Consumer-to-Administration model encompasses all electronic transactions conducted between individuals and public administration. Examples of applications include: Education – disseminating information, distance learning, etc. Social Security – through the distribution of information, making payments, etc. Taxes – filing tax returns, payments, etc. Health – appointments, information about illnesses, payment of health services, etc.

 

Advantages of e-commerce:

The main advantage of e-commerce is its ability to reach a global market, without necessarily implying a large financial investment. The limits of this type of commerce are not defined geographically, which allows consumers to make a global choice, obtain the necessary information and compare offers from all potential suppliers, regardless of their locations.

 

By allowing direct interaction with the final consumer, e-commerce shortens the product distribution chain, sometimes even eliminating it completely. This way, a direct channel between the producer or service provider and the final user is created, enabling them to offer products and services that suit the individual preferences of the target market. E-commerce allows suppliers to be closer to their customers, resulting in increased productivity and competitiveness for companies; as a result, the consumer is benefited with an improvement in quality service, resulting in greater proximity, as well as a more efficient pre and post-sales support. With these new forms of electronic commerce, consumers now have virtual stores that are open 24 hours a day.

 

Cost reduction is another very important advantage normally associated with electronic commerce. The more trivial a particular business process is, the greater the likelihood of its success, resulting in a significant reduction of transaction costs and, of course, of the prices charged to customers.

 

Disadvantages of e-commerce:

The main disadvantages associated with e-commerce may be Strong dependence on information and communication technologies (ICT); Lack of legislation that adequately regulates the new e-commerce activities, both nationally and internationally; Market culture is averse to electronic commerce (customers cannot touch or try the products); The users’ loss of privacy, the loss of regions’ and countries’ cultural and economic identity and Insecurity in the conduct of online business transactions.

 

Architectural Framework of E-Commerce:

Architectural framework of e-commerce means the synthesizing of various existing resources like DBMS, data repository, computer languages, software agent-based transactions, monitors or communication protocols to facilitate the integration of data and software for better applications. The architectural framework for e-commerce consists of six layers of functionality or services as follows:

1. Application services.

2. Brokerage services, data or transaction management.

3. Interface and support layers.

4. Secure messaging, security and electronic document interchange.

5. Middleware and structured document interchange, and

6. Network infrastructure and the basic communication services.

 

Classification of E-Commerce Applications:

The classification of e-commerce applications is given below:

1.   Electronic Market: Electronic Market: is a place where online shoppers and buyers meet. E-market handles business transaction including bank-to-bank money transfer also. In e-market, the business center is not a physical building. But it is a network-based location where business activities occur. In e-market, the participants like buyers, sellers and transaction handler are not only one different locations but even they do not know each other.

 

2 Inter Organizational Information System (IOS): An IOS is a unified system with several business partners. A typical IOS will include a company and its supplier and customers. Through IOS buyers and sellers arrange routine business transactions. Information is exchanged over communication network using specific formats. So, there is no need for telephone calls, papers, documents or correspondence. Types of IOS are given below:

- EDI (Electronic Data Interchange): It provides secure B2B connection over value added network (Van’s)

- Extranet: which provides secure B2B connection over internet.

- EFT (Electronic Fund Transfer): Electronic Fund Transfer from one account to another.

- Electronic Forms: Online (web-pages) forms on internet.

- Shared Data Base: information stored in repositories (collection of data) shared by trading partners

- Supply Chain Management: Co-operation between company and its suppliers and customers regarding demand forecasting, inventory management and order fulfillment.

 

Electronic payment:

Electronic payments are either debit or credit payments that are processed entirely electronically, with the value passing from one bank account to another bank account. Credit payments, often referred to as Electronic Credit Transfers (ECT) or Electronic Funds Transfers (EFT), are where a customer instructs their bank to make a payment, electronically, to another bank account. Debit payments, known as direct debits, are where a customer instructs their bank to allow the payment to be charged to their bank account.

 

 

 

Advantages of Electronic payment:

Electronic payment systems are software systems that enable online credit card processing. Via an electronic payment system, users can browse an online catalog and purchase items online through automated online transactions. Launching an e- commerce website ultimately improves the way of doing business, increases level of sales, expands business to local and foreign markets and improves relationships with existing customers.

 

1 Sales: Your online presence creates a stronger company profile and yields access to new local and foreign markets. The increased availability of your products to a larger customer base via an electronic payment system extends your current mail-order services, and reaches other potential customers and local businesses through increased exposure. An online catalog, with online ordering and payment functions, to sell your products provides the added benefit that you can display information about each item for sale and indicate whether it is available from stock. Displaying related products on the pages viewed is also a subtle sales promotion that might induce the customer to purchase more products.

2 Customer Support: Electronic payment systems enable faster order processing and delivery, which caters for higher efficiency in both business to business (B2B) and business to consumer (B2C) models. Improved customer support services, shorter lead times, and a twenty- four-hour service around the globe ensure a satisfactory shopping experience for your customers. Via the electronic payment system it is easy to implement a personalized service for your customers by enabling subscription services and provide timely information about special offers and promotions. Newsletters are an effective marketing strategy that entices your customers to return to your website and purchase more products.

 

3 Improved Marketing: An e-commerce website will assist your business in gaining competitive advantage and heightening public interest. An online presence will not only improve and facilitate your current marketing strategy but it will also yield new opportunities in the business to business environment through increased exposure and increased efficiency.

 

4 Running Costs: An electronic payment system introduces potential cost savings through an improved business model and effective supply chain management, since much of the transaction process will be automated. Whereas, in a manual system your clients need to first contact your company to obtain a quote and check for product availability, through an electronic payment system, they can check your price offers, delivery times and place their orders in a couple of minutes. Lower running costs and shorter lead times enable the company to cater for bulk orders received from local businesses.

 

Disadvantages of Electronic payment:

1 Online Security: When we check out at a merchant and use our credit cards we must present photo ID. However when making online payments there is no real authentication process to verify that the person entering the information online is not a criminal. Without this verification process time becomes of the essence when it comes critical to dispute a fraudulent charge made using your credit/debit card because research is needed to prove your case.

 

2 Missed Errors: Can you imagine being in business since 1970, each time you needed to replenish inventory you contacted your supplier with whom you have a personal relationship to place your order. The supplier delivers your goods in a timely fashion. Upon delivery an invoice is provided and you either pay COD (cash on delivery) or mail in your payment. Now 21st Century technology is presented; you submit your order online which requires payment before delivery. Once the goods arrive you realize you mistakenly order the wrong material. Now you have you merchandise that cannot be used and you are out your money. More time is now needed to return the “unnecessary material” to wait for the replacement order to arrive. For many people the old way was more efficient.

 

3 Fees: Management courses have taught us that there is an opportunity cost for every choice we make. Surprisingly, OPS are no different. Since the core business of many organizations is not IT based and more specifically not specialized in Online Payment Systems an outside vendor is required to provide the online payment services. An Online Payment Systems vendor like PayPal requires the merchant to pay a convenience fee ranging between 2.2%-3.9%. Would it be beneficial to use their services as opposed to alternative payment methods? For corporate organizations this fee may prove to be inconsequential. However, for the small business owner these fees could equate to astronomical figures eating away at the bottom line.

Typical E-Payment Types in E-Commerce:

The modes of payment have surely changed in so many different ways. But it is important to take note that this change is on a positive note and not a negative one. In relation on how we get to make payments, the introduction of payment systems into the market has clearly made things a lot better. These systems are designed to make money transfer from one account to the other quick and easy as it can be done in a matter of seconds. The systems will come in two distinct features but for now we want to take a quick look at some of the different types of electronic payment systems. These are the kind of systems that will accept payments through electronic means.

 

1 Electronic cards: Electronic cards are designed to reflect your bank account. By having one, it means that you definitely do not need to visit your bank physically in order to access your account. Mostly cut out of hard plastic material to make them durable, the cards will have a magnet trip that allows the machines to be able to gain access to your bank account electronically. They will come in three major types: The debit card, the credit card and the prepaid card. All that the vender has to do is to swap your card across the payment system where a message will be sent to your bank and immediately reply with a confirmation message. All this is done in a matter of seconds.

2 Internet: This is a unique payment system that allows transactions to occur online. There are normally different sites through which you can be able to do this but the two most commonly practiced methods of online payments are direct transfers from one bank account to another or the use of cards.

3 Use of mobile phones: Mobile phones are turning out to be more than just a communication gadget. They are even referred to as smart phones due to the many additional features that they have. Although it will give you limited transactions to carry out, the best kinds of payment system available for mobile phones are mobile banks. There are a number of mobile subscriber firms that have developed the app that allows the mobile users to have an account that they can gain access to through their mobile phone number.

4 Online accounts: This kind of payment system is slowly on the rise. We can attribute this to the increase of online shopping. Having an online account with either PayPal money bookers and or any provider allows you to be able to transfer funds more quickly as there are no restrictions and limitations on what you can do with your electronic money. One can be able to access their online accounts through their phones and or computers. These accounts are so simple to use.

 

ELECTRONIC COMMERCE SECURITY:

E-Commerce security is the guideline that ensures safe transactions through the internet. It consists of protocols that safeguard people who engage in online selling and buying goods and services. Such basics include:

 

ü Privacy

ü Integrity

ü Authentication

ü Non-repudiation

 

1. Privacy: Privacy includes preventing any activity that will lead to the sharing of customers’ data with unauthorized third parties. Apart from the online seller that a customer has chosen, no one else should access their personal information and account details. A breach of confidentiality occurs when sellers let others have access to such information. An online business should put in place at least a necessary minimum of anti-virus, firewall, encryption, and other data protection. It will go a long way in protecting credit card and bank details of clients.

2. Integrity: Integrity is another crucial concept of E-Commerce Security. It means ensuring that any information that customers have shared online remains unaltered. The principle states that the online business is utilizing the customers’ information as given, without changing anything. Altering any part of the data causes the buyer to lose confidence in the security and integrity of the online enterprise.

3. Authentication: The principle of authentication in E-Commerce security requires that both the seller and the buyer should be real. They should be who they say they are. The business should prove that it is real, deals with genuine items or services, and delivers what it promises. The clients should also give their proof of identity to make the seller feel secure about the online transactions. It is possible to ensure authentication and identification. If you are unable to do so, hiring an expert will help a lot. Among the standard solutions include client login information and credit card PINs.

4. Non-repudiation: Repudiation means denial. Therefore, non-repudiation is a legal principle that instructs players not to deny their actions in a transaction. The business and the buyer should follow through on the transaction part that they initiated. E-Commerce can feel less safe since it occurs in cyberspace with no live video. Non-repudiation gives E-Commerce security another layer. It confirms that the communication that occurred between the two players indeed reached the recipients. Therefore, a party in that particular transaction cannot deny a signature, email, or purchase.

 

Common E-commerce Security Issues:

1.     Lack of trust in the privacy and E- Commerce security:

Businesses that run E-Commerce operations experience several security risks, such as:

i.      Counterfeit sites– hackers can easily create fake versions of legitimate websites without incurring any costs. Therefore, the affected company may suffer severe damage to its reputations and valuations.

ii.    Malicious alterations to websites– some fraudsters change the content of a website. Their goal is usually to either divert traffic to a competing website or destroy the affected company’s reputation.

iii.  Theft of clients’ data– The E-Commerce industry is full of cases where criminals have stolen the information about inventory data, personal information of customers, such as addresses and credit card details.

iv.   Damages to networks of computers– attackers may damage a company’s online store using worm or viruses attacks.

v.     Denial of service– some hackers prevent legit users from using the online store, causing a reduction in its functioning.

vi.   Fraudulent access to sensitive data– attackers can get intellectual property and steal, destroy, or change it to suit their malicious goals.

 

2. Malware, viruses, and online frauds:

These issues cause losses in finances, market shares, and reputations. Additionally, the clients may open criminal charges against the company. Hackers can use worms, viruses, Trojan horses, and other malicious programs to infect computers and computers in many different ways. Worms and viruses invade the systems, multiply, and spread. Some hackers may hide Trojan horses in fake software, and start infections once the users download the software. These fraudulent programs may:

i.      Hijack the systems of computers

ii.    Erase all data

iii.  Block data access

iv.   Forward malicious links to clients and other computers in the network.

 

3. Uncertainty and complexity in online transactions:

Online buyers face uncertainty and complexity during critical transaction activities. Such activities include payment, dispute resolution, and delivery. During those points, they are likely to fall into the hands of fraudsters. Businesses have improved their transparency levels, such as clearly stating the point of contact when a problem occurs. However, such measures often fail to disclose fully the collection and usage of personal data.

 

4. Financial frauds:

Besides stealing bank cards and account details, cybercriminals have got really creative. Ever since the first online businesses entered the world, villains now target apps and websites. There are two common frauds that are used to target the e-commerce industry: credit card frauds and fake returns.

Credit card fraud happens when a criminal uses stolen credit card data to purchase goods or services on an e-commerce store. When payment authorisation based solely on passwords and security questions does not verify a person’s identification. If someone else obtains our credentials, this might result in a fraud prosecution. This allows the third party to effortlessly take money.

Fake returns are unauthorized transactions made to false requests for returns. Businesses reimburse unlawfully obtained merchandise or damaged goods in refund fraud, which is a typical financial scam.

 

5. Phishing:

Phishing is a cybercrime that aims at stealing user’s confidential data — login and passwords. This is achieved via mass email campaigns run on behalf of popular brands, as well as personal messages inside of the various services like social networks. Messages often contain a direct link on a fake website that looks exactly like the real one, or on a website that redirects the user somewhere else. When the user lands on a fake page, cybercriminals try to make the user enter his login and password that he uses to access a specific website, which allows villains to get access to bank accounts.

6. Spam:

Emails are recognized for being a powerful medium for increasing sales, but they are also one of the most often utilized channels for spamming. Nonetheless, leaving infected URLs in comments on your blog or contact forms is an open invitation for internet spammers to damage you. They frequently send them through your social media inbox and wait for you to click on them. Furthermore, spamming not only compromises the security of your website, but it also slows it down.

 

7. Bots:

Bots are automated software applications programmed to perform specific tasks. Web crawlers, probably the most known type of bots, are those that define websites’ rankings by systematically browsing all the exiting pages on the internet.

However, there are bots specifically created to crawl websites for their pricing and inventory information. Cybercriminals use this technique to change the pricing of your online store, or to garner the best-selling inventory in shopping carts, resulting in a decline in sales and revenue.

 

8. DDoS Attacks:

DDoS (distributed denial of service) assaults have evolved from a small annoyance that may have caused modest harm to a huge security risk that is easily damaging and shutting down the business continuity of the world’s largest and most powerful corporations. A DDoS assault aims to prevent a company from operating until the attack is effectively prevented or the attacker ceases. This attacks can harm your website or app by generating a large number of requests which eventually can crash the whole system and make it unavailable for the end-user. This eventually disrupts your site and affects sales.

 

9. Brute Force Attacks:

The brute force attack is one of the most common password-cracking techniques. This approach presupposes that a hacker tries to use as many character combinations as possible in order to figure out the correct password.

 

10. SQL Injections:

SQL injection is a cyber-attack aimed to entry your website’s database by targeting your query submission forms. Hackers inject malicious code into your database to read, delete, change, collect or add data.

 

11. Cross-Site Scripting (XSS):

Cross-site scripting is an attack that comes in the form of a piece of browser code script (HTML). When the attacked user opens the browser and the website, the malicious script starts running and receives access to the various types of user’s sensitive data that must be protected.

 

12. Trojan horses:

Malware, a program usually downloaded by customers as legitimate software, is called a trojan horse. To this category belong programs that can gather data about credit or debit cards, transfer this information to the hacker, as well as crash users’ computers or use PC resources for hacker’s goals without permission of the user. These programs get any sensitive data with ease and may also infect your website.

 

13. Man in the middle:

A cybercriminal may eavesdrop on the communication between a store consultant and a customer. If the client is connected to a vulnerable Wi-Fi or network, hackers can take advantage of that to steal sensitive data.

 

E-commerce website  security measures:

1.     Use Multi-Layer Security:

It is helpful to employ various security layers to fortify your security. A Content Delivery Network (CDN) that is widespread can block DDoS threats and infectious incoming traffic. They use machine learning to keep malicious traffic at bay. One can go ahead and squeeze in an extra security layer, such as Multi-Factor Authentication. A two-factor authentication is a good example. After the user enters the login information, they instantly receive an SMS or email for further actions. By implementing this step, it blocks fraudsters as they will require more than just usernames and passwords to access the legit users’ accounts. However, hacking can still occur even if an MFA is in place.

2.      Get Secure Server Layer (SSL) Certificates:

One of the primary benefits of SSL Certificates is to encrypt sensitive data shared across the internet. It ensures that the information reaches only the intended person. It is a very crucial step because all data sent will pass through multiple computers before the destination server receives it. If SSL certificate encryption is absent, any electronic device between the sender and the server can access sensitive details. Hackers can thus take advantage of your exposed passwords, usernames, credit card numbers, and other information. Therefore, the SSL certificate will come to aid by making the data unreadable to unintended users. There are two types of browser addresses — HTTP and HTTPS. Both abbreviations stand for communication protocol. The protocol is a set of rules that defines data exchange between browser and server, what kind of information should exist there and what to do with that data. HTTPS is a protected version of HTTP. It’s an SSL protocol, which gets activated after SSL-certificate is set and encrypts personal data before the information is transferred to the e-commerce website or app owner. This kind of protection is really useful when you have transactions to be done on your website. Whenever customers enter their credit card information it can be stolen by hackers and used by them later on. Thus, using an SSL certificate will make payments on your website secure and clients won’t be afraid of scams.

3.      Use solid-rock Firewalls:

Effective e-commerce software and plugins should be used to bar untrusted networks and regulate the inflow and outflow of website traffic. They should provide selective permeability, only permitting trusted traffic to go through to stop Spam, XSS, CSRF, malware, SQLi, and many other attacks on the website. It should ensure that the only traffic that accesses your E-Commerce store consists of the real users.

4.      Anti-Malware Software:

The electronic devices, computer systems, and web system need a program or software that detects and block malicious software, otherwise known as malware. Such protective software is called Anti-malware software. An effective anti-malware should render all the hidden malware on the website which can scan the web system for all malicious software round the clock.

 

5.   Comply with PCI-DSS Requirements:

The Payment Card Industry Data Security Standard (PCI-DSS) should be maintained to protect all credit card data. All businesses that handle credit card transactions need to follow these requirements:



REFERENCES:

1.     Randy C. Marchany, Tom Wilson. A Keystroke Recorder Attack on a Client/Server Infrastructure. Proceedings of the Network Security '96 Conference, SANS Institute

2.     Peter Keen. Ensuring E-Trust. ComputerWorld, 3/13/00 issue

3.     Jane Bryant Quinn. The Spies in Your Pocket". Newsweek, 8/16/99

4.     Northcutt, Cheswick, Kent, Cooper, Marchany et al. Consensus Roadmap for Defeating Distributed Denial of Service Attacks. www.sans.org/ddos_roadmap.html

5.     "Distributed System Intruder Tools - Trinoo and Tribe Flood Network", Computer Incident Advisory Capability, Lawrence Livermore National Laboratory, CIAC 00.040, 12/21/99

6.     Patrick Thibodeau. Privacy Concerns Rankle Industry – In Blow to sites, FTC pushes for regulation. Computerworld, 5/29/00, Vol 34.no 22.

7.     “Lucrative mail theft on the rise”, RoanokeTimes reprint of LA Times article, 6/1/00

8.     Ravi Kalakota, Andrew B. Whinston. Electronic Commerce: A Manager’s Guide, Addison-Wesley, ISBN: 0-201-88067-9

9.     William Safire. The Phantom of the Internet. New York Times Service, article appeared in 6/4/00 issue of the Roanoke Times.

10. The SANS Institute, www.sans.org/topten.htm

11. The Internet Audit Project, http://www.securityfocus.com/templates/forum_mes sage.html?forum=2&head-32&id=32

12. www.detached.net

13. www.usatoday.com/life/cyber/tech/cth186.htm

14. www.sans.org/dosstep/index.htm

15. Pradnya B. Rane, Dr. B.B. Meshram. "Transaction Security for Ecommerce Application" IJECSE -ISSN- 2277-1956. 2012

16. Yang Jing "On-line Payment and Security of E-commerce". ISBN 978-952-5726-00-8 , 2009 International Symposium on Web Information Systems and Applications (WISA‘09)

17. Niranjanamurthy M, Kavyashree N, Mr S. Jagannath ―M- Commerce: Security Challenges issues and recommended secure payment method - IJMIE Volume 2, Issue 8 ISSN: 2249-0558 -2012

18. Niranjanamurthy M, Kavyashree N, Mr S. Jagannath ‖ E-commerce and M-commerce: issues and recommended screening‖-IJMT Volume 2, Issue 8 ISSN: 2249-1058 -2012

19. Niranjanamurthy M, Kavyashree N, Mr S. Jagannath DR. Dharmendra Chahar. "Analysis of E-Commerce and M-Commerce: Advantages, Limitations and Security issues". IJARCCE-ISSN (Online) : 2278-1021. Vol. 2, Issue 6, June 2013



Related Images:



Author/Editor Information

Dr. Sanjay Kango

Department of Mathematics, Neta Ji Subhash Chander Bose Memorial, Government Post Graduate College, Hamirpur Himachal Pradesh-177 005, INDIA