Submitted by :- ANJALI R. SONULE
Roll no :- 56
Submitted to :-Dr. Jagdish Sachdeva sir
Subject :- Business Research Methods
Topic :- Cyber Security Practices In E-commerce
Article (1) :- E-Commerce Supply Chains with Considerations of Cyber-Security
Published in :- 2023 International Conference on Computer Science and Emerging Technologies (CSET)
Cited by :- “Comprehensive Analysis of Cybersecurity: Examining Existing Literature and Identifying Potential Areas for Future Research.
Summary :- As the global e-commerce landscape continues to expand rapidly, the efficiency and security of supply chains have become critical areas of concern. With the increasing reliance on digital platforms and the interconnected nature of supply chains, the vulnerability to cyber threats has escalated significantly. This research paper delves into the multifaceted domain of e-commerce supply chains with a primary focus on cyber-security considerations. The objective of this study is to assess the existing cyber-security measures and vulnerabilities within e-commerce supply chains while proposing effective strategies to mitigate potential risks. Through an extensive literature review, the paper highlights various cyber-security challenges faced by e-commerce enterprises, including data breaches, ransomware attacks, and supply chain disruptions caused by cyber-attacks on logistics partners. By analyzing real-world case studies and industry reports, the research provides valuable insights into the consequences of cyber-security lapses and their impact on supply chain resilience and consumer trust. The research also explores the technological advancements and best practices that can fortify e-commerce supply chains against cyber threats. It examines the role of encryption, multi-factor authentication, secure payment gateways, and cloud-based security solutions in safeguarding sensitive data and maintaining the integrity of supply chain operations. Additionally, the study investigates the importance of employee training and awareness programs to cultivate a cyber-security-oriented organizational culture. Furthermore, this paper considers the legal and regulatory aspects of cyber-security in the context of e-commerce supply chains. By examining international laws, industry standards, and compliance requirements, it highlights the responsibilities and obligations of e-commerce businesses to protect customer data and secure the flow of goods throughout the supply chain. The efficiency and security of supply chains in the expanding global e-commerce landscape have become critical areas of concern due to the escalating vulnerability to cyber threats. This research paper aims to assess existing cyber-security measures and vulnerabilities within e-commerce supply chains and propose effective strategies to mitigate potential risks. By promoting a proactive cyber-security approach, e-commerce enterprises can not only safeguard their operations and customer data but also build a robust reputation in the marketplace, ultimately fostering sustainable growth in the dynamic digital economy.
References:
1.J. A. Smith and M. B. Johnson, “E-Commerce Supply Chain Management: A Cyber-Sccurity Perspective”, Journal of Cybersecurity in E-Commerce, vol. 15, no. 3, pp. 102-119, 2020.
2.L. Chen and R. E. Williams, “Mitigating Cyber-Sccurity Risks in E-Commerce Supply Chains: A Systematic Approach”, International Journal of Information Security, vol. 32, no. 4, pp. 567-581, 2019.
Article ( 2 ):- Cybersecurity Threats in E-Commerce: Trends and Mitigation Strategies
Cited by :- Gupta, R. (2024). Cybersecurity Threats in E-Commerce: Trends and Mitigation Strategies. Journal of Advanced Management Studies, 1(3),
1-10.
DOI: hƩps://doi.org/10.36676.jams.v1.i3.13
Summary :- Addressing cybersecurity threats in e-commerce requires a comprehensive and proactive approach encompassing advanced technologies, robust organizational practices, and strict regulatory compliance. The analysis of recent incidents and successful mitigation strategies reveals that effective defenses are built on continuous monitoring, employee training, and adaptive security measures”. By learning from high-profile breaches and implementing proven strategies, e-commerce businesses can better protect sensitive data, maintain consumer trust, and mitigate potential risks. As cyber threats continue to evolve, ongoing vigilance and innovation in cybersecurity practices will be essential for safeguarding the digital economy and ensuring the resilience of e-commerce platforms.
References :-
Badotra, S., & Sundas, A. (2021). A systematic review on security of E-commerce systems. International Journal of Applied Science and Engineering.
Beyari, H. (2021). RECENT E-COMMERCE TRENDS AND LEARNINGS FOR ECOMMERCE SYSTEM DEVELOPMENT FROM A QUALITY PERSPECTIVE.
International Journal for Quality Research, 15(3), 797–810. https://doi.org/10.24874/IJQR15.03-07D’Adamo, I., González-Sánchez, R., Medina-Salgado, M. S., & Settembre-Blundo, D. (2021). E-Commerce Calls for Cyber-Security and Sustainability: How European Citizens Look for a Trusted Online Environment. Sustainability, 13(12), 6752. https://doi.org/10.3390/su13126752
Article (3) :- Cyber security in E-commerce
Published in:- International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 187 ISSN 2229-5518
Summary :- Cyber crimes have started to create a fear in the minds of many people linked to the networks mostly worried to ecommerce technology as its success lies in the internet. The various mechanisms used for securing internet based transactions or communication can be grouped into ´ Authorization, Authentication and Integrity ´ Privacy ´ Availability by controlling access In order to safe guard the present success of e-commerce The IT Act 2000 has to be reviewed in order to save India from Cyber criminals and privacy invaders. Cyber criminals should not take the advantages of browser ignorance, legislative delay, enforcement lapse, judicial inefficiency.
REFERENCES :-
1.http://cse.stanford.edu/class/cs201/projects/computer-crime/theft.html
2. http://en.wikipedia.org/wiki/E-mail_bomb
3.http://legal.practitioner.com/computer-crime/computercrime_3_2_7.htmL.
Article (4) :- Cyber Security Issues and Challenges in E-Commerce
Published by :-Shazia W. Khan
Associate Professor, Retail Management & Marketing Department, Institute for Technology & Management, Navi Mumbai
Summary :- Online business is generally viewed as the purchasing and offering of items over the web, however any exchange that is finished exclusively through electronic measures can be thought about internet business. Step by step E-business and M-trade assuming great part in online retail advertising and people groups utilizing this innovation step by step expanding everywhere throughout the world. Online business security is the insurance of internet business resources from unapproved get to, utilize, adjustment, or obliteration. Measurements of online business security; Integrity: aversion against unapproved information alteration, No disavowal: counteractive action against any one gathering from reneging on an understanding afterward. Genuineness: validation of information source. Secrecy: assurance against unapproved information exposure. Security: arrangement of information control and divulgence. Not exclusively should web based business destinations and customers judge security vulnerabilities and survey potential specialized arrangements, they should likewise evaluate, assess, and resolve the dangers included. An arranged application can’t offer full proportions of network, security, and usability, all in the meantime; there is by all accounts a natural exchange off here, and some forfeit is unavoidable. Likewise, the principal security worry from an internet business dealer’s viewpoint ought to be to keep the web servers’ documents of ongoing requests not toward the front web servers but rather behind the firewall.
Besides, touchy servers ought to be kept very specific, by killing and evacuating every single inessential administration and applications (e.g., ftp, email). Until internet business merchants accomplish the fundamental fragile adjust of protection, trust and security, compelling and quantitative online business exchanges will remain an issue. Along these lines the components of encryption, assurance, check and validation without a doubt impact impression of security. The commercial centre can be reliable just when buyers feel trust in executing in that condition.
References :-
A. Bhattacherjee (2002). Individual trust in online firms: scale development and initial test.
Journal of Management Information Systems, 19 (1) (2002), pp. 211–242
Adam Jolly (2003). The Secure Online Business: Great Britain and the United States. Kogan Page Limited 2003, pp: 93-118.
Article (5):- Cyber security threats: A never-ending challenge for e-commerce
CONCEPTUAL ANALYSIS article Front. Psychol. , 19 October 2022 Sec. Organizational Psychology Volume 13 – 2022 |
Summary:- The name of e-commerce is attractive and the need of the modern-day business market, but it is facing the challenge of cyber security threats. Although firms continuously invest a lot to address the issue, it is not easy. Personal and organizational data are often the target of cyber-attacks. Without a doubt, technology offers new ways of doing business and provides many additional benefits, but cyber security concerns will always be there. Investing and enhancing the security of e-commerce is substantially essential for getting a competitive advantage and for the success of e-commerce business (Hepfer, 2021). No one can afford the price of customers’ trust; they lose because of the exposition of their data. Strong monitoring protocols must be followed before any mishap on both organizational and customer ends. For example, strong passwords and being cautious about clicking and downloading something. Taking advance precautions and investing in a secure version of the technology in e-commerce is the need of the day.We conclude that no matter how much the employees and consumers are trained and skilled to do e-commerce, how much the e-commerce firm implements and focuses on the implementation of cyber security protocols and policies; and how much-advanced technology is used for conducting the e-commerce business activities; the challenge of cyber security threats will always be there like a sword to hurt the business and no one knows then.
References :-
Abdel Hakeem, S. A., Hussein, H. H., and Kim, H. (2022). Security requirements and challenges of 6G technologies and applications. Sensors 22:1969. doi: 10.3390/s22051969 PubMed Abstract | CrossRef Full Text | Google Scholar Abdelhamid, M., Kisekka, V., and Samonas, S. (2019). Mitigating e-services avoidance: the role of government cybersecurity preparedness. Inform. Comput. Secur. 27, 26–46. doi: 10.1108/ICS-02-2018-0024
Article (6) :- Growing Aspects of Cyber Security in E-Commerce
Cited by:- 1. “The Cybercrime and Trust on Repurchase Intention in E-Commerce: Online Experience As Moderator”
Published in:- 2021 International Conference on Communication information and Computing Technology (ICCICT)
Summary:- The world is witnessing a transition from in-store shopping to online shopping. E-commerce (Electronic commerce) giants such as Amazon, Alibaba, eBay etc. are leading the way towards this change. Much technological advancement are being made to ease the life of mankind with online shopping being the most notable. E-commerce is known to be a powerful instrument for transformation of business that gives companies the opportunity to upgrade their supply chain operations, improve their network, as well as provide better services to both customers and suppliers. Applying the techniques of online shopping that yield such advantages may not be possible without the presence of a well-organized approach to E-commerce security. E-commerce organizations such as Amazon and Alibaba have also been using such techniques to ensure data protection. The most common of them all is the One Time Password (OTP), which is sent to a user when they make payments online for identity verification. On the other hand, Alibaba uses a unique Key Management System (KSM) which is a fully managed service that helps customers create, delete, and manage encryption keys to protect data. This system provides availability, reliability and elasticity alongside security and compliance. The paper also explore the importance of different security algorithms in Ecommerce domain.
References :- 1.Haya Alshehri and Farid Meziane, “The Influence of Advanced and Secure E-Commerce Environments on Customers Behavior: The Case of Saudis in the UK”, 12th International Conference for Internet Technology and Secured Transactions, 2017.
2. Cong Cao, Jun Yan and Mengxiang Li, “The Effects of Consumer Perceived Different Service of Trusted Third Party on Trust Intention: An Empirical Study in Australia”, 14th IEEE International Conference on e-Business Engineering, 2017.
Article (7) :- Importance of Coping with Cyber Security Challenges in E Commerce Business
Published in:-2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)
Cited by:- 1. “Designing an Integration of Anti Spoofing as Security Strategies for E-Commerce Email Marketing to Shield Brand Integri…
Summary:- E-commerce is a platform where customers and firms meet on the internet to buy and sell things. It is transforming the way people transact from the comfort of home at a mouse click. More and more people preferring online shopping, is indeed a boon for ecommerce sites. However, cybercrime is also on an exponential rise, imposing a major threat. Credit card frauds, innovative phishing attacks, bad bots are a few challenges and there is a plethora of others resulting in not only loss in revenue but reputational damage to the e-commerce organization. Confidence in digital security has been essentially eroded due to major data leaks. Cyber Security is like air, vital for existence. The foundation pillars of cyber security are confidentiality which ensures that the customer’s critical information like bank card details is safe, integrity which implies maintaining the accuracy and reliability of data throughout the ecommerce site surfing and transaction activity, and availability of requested data 24*7 on the website. Ecommerce industry needs to keep cyber security challenges at the center of all management decisions to ensure continuity, resilience and agility of the ongoing processes. The major area of concern is data privacy-security of customers’ data. The paper discusses and analyses various types of cyber-attacks on leading ecommerce sites, and vulnerabilities frequently affecting the e-commerce web applications and suggests mitigation measures based on current industry standards. This should lead to better and more comprehensive management decision support in the e-commerce industry.
References:- 1. Mary Jane Samonte, Luke Martin D.L. Achacoso, Alden Christian C. Amper, Raphael M. Abaleta, “Designing an Integration of Anti Spoofing as Security Strategies for E-Commerce Email Marketing to Shield Brand Integrity”, 2024 4th International Conference on Computer Systems (ICCS), pp.172-180, 2024
2. Roumiana Ilieva, Gloria Landsberg-Stoilova, “Technical Challenges of Cybersecurity in E-Commerce”, 2023 VI International Conference on High Technology for Sustainable Development (HiTech), pp.1-4, 2023.
Article (8) :- SMEs and Cybersecurity Threats in E-Commerce
Citations :- Jurjen Jansen, Sander Veenstra, Renske Zuurveen & Wouter Stol. (2016) Guarding against online threats: why entrepreneurs take protective measures. Behaviour & Information Technology 35:5, pages 368-379.
Summary:- This paper provides an overview of the electronic attacks or the “digital challenges” which prospective customers of E-Commerce are likely to encounter while carrying out transactions over the web. The paper provides a comprehensive coverage of highly specialized electronic attacks that are on the increase in the electronic environment where SMEs (Small and Medium Enterprises) dealing in E-Commerce carry out their transactions. It is a descriptive account of various threats like client/server security threats as well as cyber identity thefts which have become quite infamous over the years and is invasive and fastest growing crime all around the world especially the U.S. The paper draws on a variety of secondary sources both published and unpublished. Recently the infamous client server attacks like Denial of Service (DoS) especially Distributed Denial of Service attacks made people aware of the importance of providing available data and service securely to users. Cyber security threats like website defacement, phishing, pharming, login attacks etc. have created a distrustful environment while making it very hard for small and medium-sized online service providers(SMEs) to compete with both established online and physically present service providers. It presents a review of literature developed from secondary sources. Cyber security threats are of immense concern to online users indulging in E-Commerce, online service providers, governments, and law enforcement agencies. This paper provides a useful overview of a scenario of cyber security threats in E-Commerce in the SME sector; and, from this summary of the present situation, makes an attempt to enlighten the users about various threats which they can encounter while carrying out their electronic transactions. An analysis of the security threats such as this can also assist an organization in formulating an effective security plan.
References:- 1.Alsaid , A. and Mitchell , J. C. 2005 . Dynamic content attacks on digital signatures . Information Management and Computer Security , 13 ( 4 ) : 328 – 329 .
2. Anti Phishing Working Group (2008). Phishing activity trends report Q1/2008 http://www.antiphishing.org/reports/apwg_report_Q1_2008.pdf(open in a new window) (Accessed: 3 September 2008 ).
Article (9) :- E- commerce supply chains with considerations of cyber‐security: Should governments play a role?
Published by:- Suyuan Luo & Tsan‐Ming Choi Volume 31, Issue 5 https://doi.org/10.1111/poms.13666
Summary:- E‐commerce supply chains and their members face risks from cyber‐attacks. Consumers who purchase goods online also risk having their private information stolen. Thus, businesses are investing to improve cyber‐security at a nontrivial cost. In this paper, we conduct a Stackelberg game‐theoretical analysis. In the basic model, we first derive the equilibrium pricing and cyber‐security level decisions in the e‐commerce supply chain. Based on real‐world practices, we then explore whether governments should impose cyber‐security penalty schemes. Our findings show that when the government is characterized by having sufficiently high emphasis on consumer surplus, implementing the penalty scheme is beneficial to social welfare. Then, we extend the analysis to examine how adopting systems security enhancing technologies (such as blockchain) will affect the government’s choice of imposing penalty. We uncover that when it is beneficial to have government’s penalty scheme, the technology benefit‐to‐cost ratio is a critical factor that governs whether the optimal penalty will be lower or higher with the adoption of systems security enhancing technologies. To generate more insights, we conduct further analyses for various extended modeling cases (e.g., with alliance, competition, and the defense‐level dependent penalty scheme) and find that our main results remain robust. One important insight we have uncovered in this study is that imposing government penalty schemes on cyber‐security issues may do more harm than good; while once it is beneficial to implement, the government should charge the heaviest possible fine. This finding may explain why in the real world, governments basically always adopt a polarized strategy, that is, either do not impose penalty or impose a super heavy penalty, on cyber‐security issues.
References:- 1. Abhishek V., Jerath K., Zhang Z. J. (2016). Agency selling or reselling? Channel structures in electronic retailing. Management Science, 62(8), 2259–2280. https://doi.org/10.1287/mnsc.2015.2230
2. Arya A., Mittendorf B. (2015). Supply chain consequences of subsidies for corporate social responsibility. Production and Operations Management, 24(8), 1346–1357. https://doi.org/10.1111/poms.12326
Article (10):- Growing Aspects of Cyber Security in E-Commerce
Published in: 2021 International Conference on Communication information and Computing Technology (ICCICT)
Citations:- 1. “The Cybercrime and Trust on Repurchase Intention in E-Commerce: Online Experience As Moderator”
Summary:- The world is witnessing a transition from in-store shopping to online shopping. E-commerce (Electronic commerce) giants such as Amazon, Alibaba, eBay etc. are leading the way towards this change. Much technological advancement are being made to ease the life of mankind with online shopping being the most notable. E-commerce is known to be a powerful instrument for transformation of business that gives companies the opportunity to upgrade their supply chain operations, improve their network, as well as provide better services to both customers and suppliers. Applying the techniques of online shopping that yield such advantages may not be possible without the presence of a well-organized approach to E-commerce security. E-commerce organizations such as Amazon and Alibaba have also been using such techniques to ensure data protection. The most common of them all is the One Time Password (OTP), which is sent to a user when they make payments online for identity verification. On the other hand, Alibaba uses a unique Key Management System (KSM) which is a fully managed service that helps customers create, delete, and manage encryption keys to protect data. This system provides availability, reliability and elasticity alongside security and compliance. The paper also explore the importance of different security algorithms in Ecommerce domain.
References:- 1. Aiman Siraj, Vinod Kumar Shukla, Suchi Dubey, Shaista Anwar, “Framework of a Mobile Bank Using Artificial Intelligence Techniques”, 2022 8th International Conference on Information Technology Trends (ITT), pp.27-33, 2022
2. Ridho Bramulya Ikhsan, Hartiwi Prabowo, Dara Sandrina Savor, Anderes Gui, Erick Fernando, Yudi Fernando, “The Cybercrime and Trust on Repurchase Intention in E-Commerce: Online Experience As Moderator”, 2023 6th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), pp.351-356, 2023.