Research Article
BibTex RIS Cite

E-COMMERCE AND SECURITY

Year 2005, Volume: 6 Issue: 23, 129 - 136, 10.01.2005

Abstract

E-commerce became an important tool ıtsed by the companies in order to communicate customers directly and satisfy theır personalized needs and requirements. Although e-commerce and its importance are increasing rap'ıdly, it is well behind its potential. The main reason for its slow development is the security. The ultimate success of e-commerce will depend, to a great extent, on the interest and confidence of consumers. The issue of security is not an easy problem and there are no definitive solutions to it. There will always be a fıerce computation betıveen people trying to protect their assets and people trying to defeat these protections. This will be a never-ending story. In this paper, direct nıarketing, Online marketing and e-commerce are defıned; security issues are addressed; the existing security technologies in e-commerce are reviewed and finally, the paper is concluded with a general discussion about the achievability of security in e-commerce.

References

  • [1] Kotler, P., & Armstrong, G. (2001). Principles of Marketing. 9th Edition. New Jersey: Prentice Hall.
  • [2] Jobber, D. (1995). Principles and Practice of Marketing, Berkshire: McGraw-Hill Book Company.
  • [3] Brooksbank, D., Thomas, B., Packham, G., & Morse, L. (2002). E-Commerce and Small and Medium-Sized Enterprises in South East Wales; A Clear Case for Intervention?”. Working Paper, ISBA National Small Firms Policy & Research Conference, Brighton.
  • [4] Oppliger, R. (1999). Shaping the research agenda for security in E-commerce. 10lh International Workshop on Database and Expert Systems Applications, Italy.
  • [5] Mavridis, I., Pangalos, G., Koukouvinos, T., & Muftic, S. A secure payment system for Electronic Commerce. (infolab.gen.auth.gr/Phd/mavridis/DEXA99.pdf).
  • [6] Stallings, W. (2003). Network Security Essentials: Applications and Standards. 2nd Ed. New Jersey: Prentice Hali.
  • [7] Hofacker, C.F. (2001). Internet Marketing, Third Edition, New Jersey: John Wiley & Sons.
  • [8] Win, B.D., Bergh, J.V.D., Matthijs, F., Decker B.D., & Joosen, W. (2000). A Security Architecture for e-commerce applications. (http://www. cs.kuleiiven.ac.be/~bartd/ PAPERS/bdw-sec2000.ps.gz).
  • [9] Marchany, R.C., & Tront, J.G. (2002). E-Commerce Security Issues. Proc. of the 358 9 10 11’ Hawaii International Conference on System Sciences, p. 193. (http://csdl.comouter.org/comp/nroceedings/hics/2002/143/ 5/07/14350193.odf)
  • [10] Sahuguet, A. (1998). Piracy: The dark side of Electronic Commerce. CIS-700/2 University of Pennsylvania.
  • [11] Ghosh, A.K. Securing Electronic Commerce: Exposing the Weak Links. Reliable Software Technologies Corporation. (httD://www.rstcorp.com/~anup/IBconf.DS~l.
  • [12] Kailer, R. (2003). Accountability in Electronic Commerce Protocols. Proceedings of the IEEE Symposium on Security and privacy, pp.200-205.
  • [13] Ettredge, M., & Richardson, V.J. (2002). Assessing the Risk in E-Commerce. Proc. of the 35"' Hawaii. International Conference on System Sciences, p.194. (http://csdl.computer.org/comp/proceedings.4iics/2002/143/ 5/07/14350194.pdf)
  • [14] Hassler, V. (2001). Security Fundamentals for E-Commerce. Norwood: Artech House Computer Security Series.
  • [15] Liew, C.C., Ng, W.K., Lim, E.P, Tan, B.S., & Ong, K.L. (1999). Non-repudiation in Agent-Based Electronic Commerce System. IEEE I0'h International Workshop on Database and Expert Systems Applications, pp.864-869. (http://csdl.computer.org/comp/proceedings/dexa/ 1999/0281/00/02810864.pdf)
  • [16] Peeples, D.K. (2002). Instilling Consumer Confıdence in E- Commerce. S.A.M. Advanced Management Journal, 67(4), pp.26-32.
  • [17] Bishop, M. (2003). Computer Security: Art and Science, Boston: Addison Wesley.
  • [18] Pfleeger, C.P., & Pfleeger, S.L. (2003). Security in Computing. 3rd Ed. New Jersey: Prentice-Hall.
  • [19] Matsuura, J.H. (2002). Security, Rights, and Liabilities in e-commerce. Norwood: Artech House.
  • [20] McCrohan, Kevin F. (2003), Facing the Threats to Electronic Commerce. The Journal of Business & Industrial Marketing. 18(2/3), pp.133-146.
  • [21] Kaufman, C., Perlman, R., & Speciner, M. (2002). Network Security: Private Communication in a Public World. 2"d Ed. New Jersey: Prentice-Hall.
  • [22] ITO. (2002). Dünyada ve Türkiye 'de Elektronik Ticaret ve Vergilendirilmesi. İstanbul: İstanbul Ticaret Odası Yayınları, 6.
Year 2005, Volume: 6 Issue: 23, 129 - 136, 10.01.2005

Abstract

References

  • [1] Kotler, P., & Armstrong, G. (2001). Principles of Marketing. 9th Edition. New Jersey: Prentice Hall.
  • [2] Jobber, D. (1995). Principles and Practice of Marketing, Berkshire: McGraw-Hill Book Company.
  • [3] Brooksbank, D., Thomas, B., Packham, G., & Morse, L. (2002). E-Commerce and Small and Medium-Sized Enterprises in South East Wales; A Clear Case for Intervention?”. Working Paper, ISBA National Small Firms Policy & Research Conference, Brighton.
  • [4] Oppliger, R. (1999). Shaping the research agenda for security in E-commerce. 10lh International Workshop on Database and Expert Systems Applications, Italy.
  • [5] Mavridis, I., Pangalos, G., Koukouvinos, T., & Muftic, S. A secure payment system for Electronic Commerce. (infolab.gen.auth.gr/Phd/mavridis/DEXA99.pdf).
  • [6] Stallings, W. (2003). Network Security Essentials: Applications and Standards. 2nd Ed. New Jersey: Prentice Hali.
  • [7] Hofacker, C.F. (2001). Internet Marketing, Third Edition, New Jersey: John Wiley & Sons.
  • [8] Win, B.D., Bergh, J.V.D., Matthijs, F., Decker B.D., & Joosen, W. (2000). A Security Architecture for e-commerce applications. (http://www. cs.kuleiiven.ac.be/~bartd/ PAPERS/bdw-sec2000.ps.gz).
  • [9] Marchany, R.C., & Tront, J.G. (2002). E-Commerce Security Issues. Proc. of the 358 9 10 11’ Hawaii International Conference on System Sciences, p. 193. (http://csdl.comouter.org/comp/nroceedings/hics/2002/143/ 5/07/14350193.odf)
  • [10] Sahuguet, A. (1998). Piracy: The dark side of Electronic Commerce. CIS-700/2 University of Pennsylvania.
  • [11] Ghosh, A.K. Securing Electronic Commerce: Exposing the Weak Links. Reliable Software Technologies Corporation. (httD://www.rstcorp.com/~anup/IBconf.DS~l.
  • [12] Kailer, R. (2003). Accountability in Electronic Commerce Protocols. Proceedings of the IEEE Symposium on Security and privacy, pp.200-205.
  • [13] Ettredge, M., & Richardson, V.J. (2002). Assessing the Risk in E-Commerce. Proc. of the 35"' Hawaii. International Conference on System Sciences, p.194. (http://csdl.computer.org/comp/proceedings.4iics/2002/143/ 5/07/14350194.pdf)
  • [14] Hassler, V. (2001). Security Fundamentals for E-Commerce. Norwood: Artech House Computer Security Series.
  • [15] Liew, C.C., Ng, W.K., Lim, E.P, Tan, B.S., & Ong, K.L. (1999). Non-repudiation in Agent-Based Electronic Commerce System. IEEE I0'h International Workshop on Database and Expert Systems Applications, pp.864-869. (http://csdl.computer.org/comp/proceedings/dexa/ 1999/0281/00/02810864.pdf)
  • [16] Peeples, D.K. (2002). Instilling Consumer Confıdence in E- Commerce. S.A.M. Advanced Management Journal, 67(4), pp.26-32.
  • [17] Bishop, M. (2003). Computer Security: Art and Science, Boston: Addison Wesley.
  • [18] Pfleeger, C.P., & Pfleeger, S.L. (2003). Security in Computing. 3rd Ed. New Jersey: Prentice-Hall.
  • [19] Matsuura, J.H. (2002). Security, Rights, and Liabilities in e-commerce. Norwood: Artech House.
  • [20] McCrohan, Kevin F. (2003), Facing the Threats to Electronic Commerce. The Journal of Business & Industrial Marketing. 18(2/3), pp.133-146.
  • [21] Kaufman, C., Perlman, R., & Speciner, M. (2002). Network Security: Private Communication in a Public World. 2"d Ed. New Jersey: Prentice-Hall.
  • [22] ITO. (2002). Dünyada ve Türkiye 'de Elektronik Ticaret ve Vergilendirilmesi. İstanbul: İstanbul Ticaret Odası Yayınları, 6.
There are 22 citations in total.

Details

Primary Language English
Journal Section Eski Sayılar
Authors

Levent Ertaul This is me

Ayşe Akyol This is me

Publication Date January 10, 2005
Published in Issue Year 2005 Volume: 6 Issue: 23

Cite

APA Ertaul, L., & Akyol, A. (2005). E-COMMERCE AND SECURITY. Öneri Dergisi, 6(23), 129-136.

15795

This web is licensed under a Creative Commons Attribution 4.0 International License.

Öneri

Marmara UniversityInstitute of Social Sciences

Göztepe Kampüsü Enstitüler Binası Kat:5 34722  Kadıköy/İstanbul

e-ISSN: 2147-5377