Abstract

This research was conducted by purpose of more identification and familiarization with e-commerce law and information security. Methodology: There are no boundaries in e-commerce and there is no difference for people to buy their goods from the neighbor shop or from a shop in another continent. E-commerce increases speed and volume inn merchandise transactions and reduces buyers’ and producers’ costs tangibly, time saving, more attraction, removing brokers, and finally more benefits. However, the e-commerce has its problem and defect like any other issues. One of the biggest obstacles in e-commerce way is information security. Results: Encryptions used in information security to change information to codes that no one can use it except the permitted user even if others access to it. The encrypted information can change to the initial form by permitted user (by decryption process). Encryptions used to protect both electronic and non-electronic transmitted or stored information, encryption provides good facilities for information security such as improved methods of authentication, message compression, digital signatures, non-repudiation capabilities, and encrypted network communications. Conclusion: If encryption is not implemented correctly, it can cause security problems.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.