Data Privacy in E-Commerce

Authors

  • Prashant Bhat  Department of Computer Science and IT, Garden City University, Bengaluru, Karnataka, India
  • Mullapudi Hari Prasad  Department of Computer Science and IT, Garden City University, Bengaluru, Karnataka, India
  • Deepshikha Sinha  Department of Computer Science and IT, Garden City University, Bengaluru, Karnataka, India
  • Madhulika Mailin Sagorkar  Department of Computer Science and IT, Garden City University, Bengaluru, Karnataka, India
  • Sephora Fernandes  Department of Computer Science and IT, Garden City University, Bengaluru, Karnataka, India

Keywords:

Electronic Commerce, Data Privacy, Internet transactions, Customers Trust.

Abstract

The internet has been flourishing since its invention. The retailers as well as the whole sellers are now shifting their premise from brick to mortar. This paper showcases how the e-commerce websites are flourishing and how they are conducting the day-to-day transactions as well as reaching out to vast customer database with the help of the ERP systems. The main concern that has been faced by these sites is how well they can protect the data provided by the customers, ensuring that the information provided by them stays confidential as well as doesn’t get transferred and taken advantage of. The paper deals with how to have data privacy in E-Commerce sites as well as how to face and prevent them from happening.

References

  1. Chen, L., & Holsapple, C. W. (2013). E-Business Adoption Research: State of the Art, VOL 14.
  2. J. C., A. J., & D. D. (2008, February). The Impact of consumer perceptions of information privacy and security risks on the adoption of residual RFID technologies. Communications of the Association for Information Systems, 22, 1-32.
  3. K. J., M. M., & S. S. (2003, May). Privacy in E-commerce: Development of Reporting Standards, Disclosure, and Assurance Services in an Unregulated Market. Journal of Accounting Research, 41(2), 285-309.
  4. K.-A. C., B.-R. L., & T.-Y. K. (2002). Open Authentication Model Supporting Electronic Commerce in Distributed Computing. Electronic Commerce Research, 2, 135-149.
  5. M. B., R. C., & H. K. (1998, March 13). A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. 30th Annual Symposum on the Theory of Computing, pp. 1-26.
  6. M. G., & D. D. (2016, June). E-Commerce- Study of Privacy, Trust and Security from Consumer's Perspective. International Journal of Computer Science and Mobile Computing, 5(6), 224-226,231.
  7. N. G., & Z. M. (2009, March). Personal Information Privacy Protection in E-commerce. WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS, 6(3), 407-416.
  8. S. Y., K. H., & R. Q. (2012, March). Cryptography Based E-Commerce Security. International Journal of Computer Science Issues, 9(2), 132-137.
  9. Thaw, Y. Y., Mahmood, A. K., & Dominic, P. D. (2009). A Study on the Factors That Influence the customers' Trust on E-commerce Adoption. International Journal of Computer Science and Information Security, 4(1,2), 153,154,157.
  10. Vikram, A. (n.d.). E-commerce: opportunities and challenges. E-commerce: opportunities and challenges.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Prashant Bhat, Mullapudi Hari Prasad, Deepshikha Sinha, Madhulika Mailin Sagorkar, Sephora Fernandes, " Data Privacy in E-Commerce, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.1148-1153, March-April-2018.