Abstract
E-commerce is the branch of digital life that contains all economic and trade businesses conducted via the internet and commercial procedures connected to these businesses. It is considered the major and fastest-growing area in the world. It is the greatest way of purchasing goods and services done net. The old buying was changed by e-commerce only through this Covid pandemic. However, the enormous challenge of e-commerce is insider and outsider cyber-attacks, which threats the confidentiality, integrity, and availability of e-commerce. The researchers have proposed several security models and frameworks for the e-commerce field; however, there is a lack of an integrated model to secure the purchasing and selling of websites. Thus, this study presents a survey of cyberattacks that may damage e-commerce and proposes an integrated security model for e-commerce using a design science approach. The proposed model comprises three main parts: Client, e-commerce, and security. The results show that the proposed model can ensure purchasing and selling on the website and instantiate their solution models using a modeling approach.
Highlights
E-commerce security may be described as implementing the collection of protocols or regulations that carry out all e-commerce transactions safely
We discuss the existing security models that deal with the various forms of assaults and e-commerce risks and propose a new model that counters the security risk and increases the trustworthiness of the ecommerce systems
This paper aims to propose a security model for e-commerce websites using the design science method
Summary
E-commerce security may be described as implementing the collection of protocols or regulations that carry out all e-commerce transactions safely. These safety criteria should be put in a position to protect the security of different ecommerce firms against a range of undeniable hazards. The client part is used to prepare the client information before sending it to the e-commerce part It has five activities: Sending an order, receiving it, deleting the ordering, payment, and revising it. The security part is used to secure both parts (client and e-commerce) during sending, processing, and receiving. It consists of seven activities: Authentication, authorization, encryption, firewall, IDS, hashing, and recording. This study adapted the design science method for this purpose
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of ADVANCED AND APPLIED SCIENCES
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.