The Analysis of Security Issues and Threat Prevention Model in E-Commerce

Authors(3) :-Dr. Sharad Gangele, Deepika Pathak, Dr. Dhanraj Verma

Large online retailers are trying to establish secure transaction technologies to reduce the rate of fraudulent transactions. The rapid development of communication technologies and standardizations have created possible growth in e-commerce. Reduction in the operation cost, enhancement in the transactions speed and easy availability to customers became the reasons for the popularity of e-commerce. This paper examines the issues related to the security and threat prevention of the assets and transactions in the e-commerce components and activities. In ecommerce transactions, large amount of public money is involved, so role of information security and privacy is important in this type of business. E-commerce security is analyzed as an engineering management task and a life cycle approach is introduced. Finally, an exploratory survey of various e-commerce security framework and models are analyzed and security collaboration and model is presented.

Authors and Affiliations

Dr. Sharad Gangele
Department of Computer Science & Application, RKDF University, Bhopal, MP, India
Deepika Pathak
Department of Computer Science & Application, RKDF University, Bhopal, MP, India
Dr. Dhanraj Verma
Department of Computer Science & Engineering, Dr. APJ Abdul Kalam, Indore, MP, India

E-Commerce, Security Framework, Threat Prevention, Vulnerability.

  1. P. Sen, R. A. Ahmed, and M. R. Islam, "A study on e-commerce security issues and solutions," 2015.
  2. C. Lin, Y.-A. Huang, and J. Burn, "Realising b2b e-commerce benefits: the link with it maturity, evaluation practices, and b2bec adoption readiness," European Journal of Information Systems, vol. 16, no. 6, pp. 806-819, Dec 2007.
  3. I. Adaji and J. Vassileva, Perceived Effectiveness, Credibility and Continuance Intention in E-commerce: A Study of Amazon. Cham: Springer International Publishing, 2017, pp. 293-306.
  4. K. Le-Nguyen and Y. Guo, "Choosing e-commerce strategies: a case study of partnership," Journal of Information Technology Teaching Cases, vol. 6, no. 1, pp. 1-14, May 2016.
  5. M. Iguchi, M. Terada, Y. Nakamura, and K. Fujimura, A Voucher-Integrated Trading Model for C2B and C2C ECommerce System Development. Boston, MA: Springer US, 2003, pp. 415-429.
  6. H. Xu, D. Liu, H. Wang, and A. Stavrou, "An empirical investigation of ecommerce-reputation-escalation-as-a-service," ACM Trans. Web, vol. 11, no. 2, pp. 13:1-13:35, May 2017.
  7. E. ehirli and lhami M. Orak, "E-commerce according to hobby," Procedia - Social and Behavioral Sciences, vol. 143, no. Supplement C, pp. 1144 - 1147, 2014, 3rd Cyprus International Conference on Educational Research, CY-ICER 2014, 30 January-1 February 2014, Lefkosa, North Cyprus.
  8. E. Ofuonye, P. Beatty, I. Reay, S. Dick, and J. Miller, "How do we build trust into e-commerce web sites?" IEEE Software, vol. 25, no. 5, pp. 7-9, Sept 2008.
  9. M. Hecker, T. S. Dillon, and E. Chang, "Privacy ontology support for e-commerce," IEEE Internet Computing, vol. 12, no. 2, pp. 54-61, March 2008.
  10. K. J. Lin, "E-commerce technology: Back to a prominent future," IEEE Internet Computing, vol. 12, no. 1, pp. 60-65, Jan 2008.
  11. O. V. Sobko, "Fraud in non-cash transactions: Methods, tendencies and threats," World Applied Sciences Journal, vol. 29, no. 6, pp. 774-778, 2014.
  12. P. J. Rana and J. Baria, "A survey on fraud detection techniques in ecommerce," International Journal of Computer Applications, vol. 113, no. 14, 2015.
  13. R. Carvalho, M. Goldsmith, S. Creese, and B. F. Police, "Applying semantic technologies to fight online banking fraud."
  14. C. Bizer, T. Heath, and T. Berners-Lee, "Linked data-the story so far," Semantic Services, Interoperability and Web Applications: Emerging Concepts, pp. 205-227, 2009.
  15. L. Rietveld, R. Verborgh, W. Beek, M. Vander Sande, and S. Schlobach, "Linked data-as-a-service: the semantic web redeployed," in European Semantic Web Conference. Springer, 2015, pp. 471-487.
  16. M. Hepp, "Goodrelations: An ontology for describing products and services offers on the web," in Knowledge Engineering: Practice and Patterns. Springer, 2008, pp. 329-346.
  17. Y. Zou, Q. Zhang, and X. Zhao, "Improving the usability of e-commerce applications using business processes," IEEE Transactions on Software Engineering, vol. 33, no. 12, pp. 837-855, Dec 2007.
  18. C. C. Albrecht, D. L. Dean, and J. V. Hansen, "An ontological approach to evaluating standards in e-commerce platforms," IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 37, no. 5, pp. 846-859, Sept 2007.
  19. K. L. Roche, "How to succeed in e-commerce," IEEE Review, vol. 52, no. 3, pp. 49-49, March 2006.
  20. P. Giorgini, F. Massacci, and J. Mylopoulos, Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003, pp. 263-276.

Publication Details

Published in : Volume 3 | Issue 8 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 291-296
Manuscript Number : IJSRST173872
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Dr. Sharad Gangele, Deepika Pathak, Dr. Dhanraj Verma, " The Analysis of Security Issues and Threat Prevention Model in E-Commerce ", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 3, Issue 8, pp.291-296, November-December-2017.
Journal URL :

Article Preview