Abstract

E-commerce is the branch of digital life that contains all economic and trade businesses conducted via the internet and commercial procedures connected to these businesses. It is considered the major and fastest-growing area in the world. It is the greatest way of purchasing goods and services done net. The old buying was changed by e-commerce only through this Covid pandemic. However, the enormous challenge of e-commerce is insider and outsider cyber-attacks, which threats the confidentiality, integrity, and availability of e-commerce. The researchers have proposed several security models and frameworks for the e-commerce field; however, there is a lack of an integrated model to secure the purchasing and selling of websites. Thus, this study presents a survey of cyberattacks that may damage e-commerce and proposes an integrated security model for e-commerce using a design science approach. The proposed model comprises three main parts: Client, e-commerce, and security. The results show that the proposed model can ensure purchasing and selling on the website and instantiate their solution models using a modeling approach.

Highlights

  • E-commerce security may be described as implementing the collection of protocols or regulations that carry out all e-commerce transactions safely

  • We discuss the existing security models that deal with the various forms of assaults and e-commerce risks and propose a new model that counters the security risk and increases the trustworthiness of the ecommerce systems

  • This paper aims to propose a security model for e-commerce websites using the design science method

Read more

Summary

Introduction

E-commerce security may be described as implementing the collection of protocols or regulations that carry out all e-commerce transactions safely. These safety criteria should be put in a position to protect the security of different ecommerce firms against a range of undeniable hazards. The client part is used to prepare the client information before sending it to the e-commerce part It has five activities: Sending an order, receiving it, deleting the ordering, payment, and revising it. The security part is used to secure both parts (client and e-commerce) during sending, processing, and receiving. It consists of seven activities: Authentication, authorization, encryption, firewall, IDS, hashing, and recording. This study adapted the design science method for this purpose

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.