Beruflich Dokumente
Kultur Dokumente
ACKNOWLEDGEMENT
First and Ioremost, I am very much grateIul to Dr. S.B.N. Prakash, who has been
my project guide, Ior considering me capable oI pursuing this project. I am also grateIul to
him Ior giving me proper guidance time to time without which it would not have been
possible Ior me to give shape to this project.
I would also like to express my gratitude towards the Library staIIs oI the National
Law School oI India University Ior their kind assistance.
And last, but not the least, I am thankIul to my classmates cum Iriends Irom the
bottom core oI my heart, Ior their immense encouragement and help whenever so required.
SHAISTA NEELU
CONTENTS
. Introduction
2. E-Commerce and Trust
3. Luhmann`s theory oI Trust
a) Importance oI Trust
b) Familiarity and Trust
4. Role oI Trust in Customer online shopping
5. The role oI Privacy and Security
a) Privacy
b) Security
c) Privacy and Security statements and Third party veriIication
6. Online payment and Security oI E-Commerce
7. Common online electric payment system
a) Internet Bank Card payment system
b) E-Cash Internet payment system
c) E-Purse Internet payment system
d) E-Cheque Internet payment system
8. Present approaches Ior Security in E-Commerce:
a) Cryptographic techniques
b) Paradigm oI leaving and interacting
c) Language based techniques Ior Security
d) Compiler based Security mechanisms
e) Key management Ior sector and Iile based storage systems
I) Privacy and data sanitization
9. Conclusion
INTRODUCTION:
In the emerging global economy, E-commerce has increasingly become a strong catalyst Ior
economic development. Based on the observation oI the E-commerce management practices
in India it is Ielt that there is a need to increase trust by providing additional layer oI security
in order to make E-commerce more acceptable. A major Iactor inIluencing the successIul
proliIeration oI E-commerce, identiIied by major corporations, the Federal Administration
and the Better Business Bureau, is people`s trust in Internet vendors (i.e. in companies that
sell their goods through the World Wide Web interIace). In the words oI the Better Business
Bureau, there is a necessity oI 'promoting trust and conIidence on the Internet. In Iact, the
Better Business Bureau claims that a major reason people do not buy online is their concern
regarding online payments security, reliability oI companies, and the lack oI a privacy policy.
Trust, in general, is an important Iactor in many social and economic interactions involving
uncertainty and dependency. Trust has also been shown to be an important aspect oI Web-
surIers` decision to download soItware Irom the Web. Trust-building requires extensive
ongoing two-way interactions to build trust, a prerequisite typically missing Irom interactions
on the Web.
Dr. A.S. Khandelwal, 'Enhancing Trust Beliefs in E-Commerce through Whitelist Website Security
paradigm, Indian Journal oI Computer Science and Engineering, p
There are several deIinitions oI electronic commerce (e-commerce) that exist in the trade
press and in the academic literature. For some, e-commerce includes all consumer-oriented
storeIronts, business-to-business applications as well as behind-the-scenes business Iunctions
like electronic payment systems and order management. DiIIerent categorizations oI
electronic commerce exist, including business-to-consumer, business-to-business, and
government-to-constituents. Business-to-consumer (B2C) e-commerce is deIined as business
transactions conducted between corporations and individual consumers. This is oIten
represented as corporations` Web sites used to sell goods and services directly to consumers.
Business-to-business (B2B). E-commerce is deIined as transactions conducted electronically
between organizations. Government-to-constituents (G2C) e-commerce deIines the electronic
relationship between the governments and various constituents including businesses,
individuals, employees and other government agencies.
2
France Belanger, Janine S. Hiller and Wanda J. Smith, Trustworthiness in Electronic Commerce. The Role of
Privacy, Security and Site Attributes`, Journal oI Strategic inIormation Systems, 2002, p 2
David GeIen, E-Commerce. The Role of Familiarity and Trust`, February 200, p
liIe. Trust is, thereIore, by its very nature, complex, multidimensional and context-
dependent. The early psychology and sociology studies on trust deIined it as a set oI
belieIs that other people would IulIill their expected Iavorable commitments. Trust is
the expectation that other individuals or companies will behave ethically, dependably
and will IulIill their expected commitments under conditions oI vulnerability and
interdependence. Trust has a substantial eIIect on business relationships in general. It
reduces the need Ior extensive negotiations, detail-resolution, comprehensive
legislation and enIorced regulation and tight organizational control. Trust encourages
long-term orientation, increases the acceptance oI interdependence, and creates
commitment. Trust also reduces perceived risk. Trust determines the nature oI the
social and business order as well as the quality oI business relationships. Accordingly,
trust in business 'is the salient Iactor in determining the eIIectiveness oI many
relations.
4
- F,mili,rity ,nd Trust: Another way people subjectively reduce uncertainty and
simpliIy their relationships with others is Iamiliarity. Familiarity is an understanding,
oIten based on previous interactions, experiences, and learning oI what, why, where and
when others do what they do. As such, Iamiliarity and trust are distinctly diIIerent.
Familiarity deals with an understanding oI the current actions oI other people or oI
objects, while trust deals with belieIs about the Iuture actions oI other people. Though
Iamiliarity and trust are distinctly diIIerent, they are related. Without Iamiliarity with
the context, trust cannot be adequately anchored to speciIic Iavorable behaviors and
thus cannot be as strongly conIerred. Familiarity is, thereIore, 'the precondition Ior
trust. Another reason that Iamiliarity can build trust is that Iamiliarity not only
provides a Iramework Ior Iuture expectations, but also lets people create concrete ideas
oI what to expect based on previous interactions. Since in many cases prior experience
is the basis oI trust, Iamiliarity can both create trust, when the experience was Iavorable,
or ruin trust, when not. Since behavior in accordance with Iavorable expectations builds
trust, the more Iamiliar people are with such a vendor, the more their Iavorable
expectations are likely to have been conIirmed, and, accordingly, the more they should
be inclined to trust the vendor.
5
bid
bid
Tzy-Wen Tang, The Role of Trust in Customer Online Shopping Behaviour. Perspective of Technology
Acceptance Model`, p 3
password protections. In a 200 study, Harris reported that when consumers notice
privacy seals they consider them important, and are more willing to provide personal
inIormation to the site because oI the third party veriIication. Recently, a survey
conducted Ior Privacy and American Business Iound that 9 oI consumers would
Ieel more comIortable using sites participating in a third party veriIication program.
7
between the banks and businesses and authorization, identity veriIication by e-cash to
complete it, electronic cash can be kept, admission, and transIer to smaller transactions.
E-cash and e-payment systems also have the advantage oI cash, mainly as Iollows:
Anonymity;
Not shadowing;
Savings on transaction costs;
Savings on transmission costs;
Poor risk;
Pay Ilexibility;
Prevent Iorgery and repeatability.
c E-purse Internet P,yment System:
Users use e-purse shopping, the Iirst in a personal bank account and users into a certain
amount; then the corresponding electronic wallet service system Iree soItware to download
and install an electronic purse; then download the corresponding website to apply online and
access the cardholder 'electronic saIety certiIicate. Users shopping, the only direct hits
'electronic wallet icon and Iollowing the importation oI their coast. corresponding
inIormation such as passwords by e-purse will pay to complete the Iollow-up work. E-purse
is sporadic small payment transactions. always used in conjunction with bank cards to help
users complete the entire shopping process.
d E-Cheque Internet P,yment System:
Electronic cheque transIer payments Irom paper cheque to the merits oI using digital
transmission to transIer money Irom one account to another account. These electronic cheque
payments in businesses and banks linked to the online password transmission. Most common
use encryption keys handwritten signature or personal identiIication numbers instead oI
signatures. Thus ensuring the saIety oI this Iorm oI payment. Electronic cheque system at
present is an exclusive network system, the international Iinancial institutions, through their
own private networks, equipment, soItware and a complete set oI user identiIication, the
standard messaging, data validation and other standardized data transmission agreement
completed, thus ensuring saIety.
8
Yang Jing, Online Payment and Security of E-Commerce`, Proceedings oI the 2009 International
Symposium on Web InIormation Systems and Applications (WISA'09), pp. 2,3
continually changing uses oI storage and the exposure oI storage media to adverse
conditions make meeting that challenge increasingly diIIicult. Example uses include
employment oI large shared storage systems Ior cost reduction and, Ior convenience,
wide use oI transiently-connected storage devices oIIering signiIicant capacities and
maniIested in many Iorms, oIten embedded in mobile devices. Protecting intellectual
property, personal records, health records, and military secrets when media or devices
are lost, stolen, or captured is critical to inIormation owners. To remain or become
viable, activities that rely on storage technology require a comprehensive systems
approach to storage security. Key Management Ior Sector and File based Storage
Systems techniques such as Cryptographic Algorithms Ior Storage, Cryptanalysis oI
Systems and Protocols, Unintended Data Recovery provides solutions in this scenario.
f Priv,cy ,nd d,t, s,nitiz,tion: Privacy and Data Sanitization method Ialls within the
scope oI collaborative security. Any useIul collaboration takes place at some point in
sharing data. UnIortunately, data sharing is one oI the greatest hurdles getting in the
way oI otherwise beneIicial collaborations. Data regarding one's security stance is
particularly sensitive, oIten indicating one's own security weaknesses. This data could
include computer or network logs oI security incidents, architecture documents, or
sensitive organizational inIormation. Even when the data may not compromise the
data owner's security stance, sharing may violate a customer's privacy. Data
sanitization techniques such as anonymization and other mechanisms such as privacy-
preserving data mining and statistical data mining try to address this tension between
the need to share inIormation and protect sensitive inIormation and user privacy.
9
CONCLUSION:
The growth oI business to consumer electronic commerce seems to be non-stoppable. Yet,
online consumer spending only accounts Ior about .7 oI overall retail revenues. For the
Iuture growth oI B2C electronic commerce, barriers such as security and privacy concerns
must be torn down. The approach today should be the balance between the three elements oI
trustworthiness, privacy and security in B2C e-commerce. Since today`s E-Commerce has
become inseparable component in the liIe oI people, so trust play very important role Ior
trading in diIIerent types oI E-Commerce, B2B, B2C and vice versa by customer and trader
with peace oI mind. Trust plays crucial role in Iorming business connections, inter-
organizational connections that help to identiIy situational, constructional, Iormalization and
procedural Iactors leading to perceived beneIits, risks and organization system in E-
Commerce. Business is done with many communication technologies today, walk-in-retail,
mail-order phone, mail-order Iax, etc. The Web and the Internet are just one another
communication medium with its own beneIits and disadvantages. The cost Ior a business to
have a worldwide presence is the lowest in history with the World Wide Web. Budgets oI the
980`s would have listed at least $00,000 per month in expenses to have a business handling
international customers 24 hours a day, 7 days a week. Today those same budgets are closer
to $5,000 per month and some even much lower. Yet the quality oI service that the customer
oI these businesses is expecting continues to climb. The most obvious approach is to use
technological solutions to directly address the risks involved in on-line shopping. This entails
improved payment services, such as Secure Electronic Transactions (SET) or technological
approaches to privacy like the PlatIorm Ior Privacy PreIerences Project (P3P). As mentioned
beIore, these solutions will only be eIIective iI the technological solutions are at least in their
basics understood by e-shoppers. A Iurther reduction oI risks will be achieved when legal and
regulatory Irameworks addressing the transaction itselI, e-shoppers` privacy and statutory
rights have been established.
The risks that can be directly mitigated by interIace design are e-shoppers` own errors
and Iaulty transmission. Through good interaction design, the e-shopper can be assured that
she does not accidentally commit herselI to an order and that all data is received correctly.
Examples include status indicators, system Ieedback, displaying data already entered,
and continuously displaying the products to be ordered during the process.
BIBLIOGRAPHY
1. Dr. A.S. Kh,ndelw,l, ~Enhancing 1rust Beliefs in E-Commerce through Whitelist
Website Security paradigm, Indi,n 1ourn,l of Computer Science ,nd
Engineering.
2. Fr,nce Bel,nger, 1,nine S. Hiller ,nd W,nd, 1. Smith, 1rustworthiness in
Electronic Commerce: 1he Role of Privacy, Security and Site Attributes", 1ourn,l
of Str,tegic inform,tion Systems, 2002
3. D,vid Gefen, E-Commerce: 1he Role of Familiarity and 1rust", Fe-ru,ry 2010
4. Tzy-Wen T,ng, 1he Role of 1rust in Customer Online Shopping Behaviour:
Perspective of 1echnology Acceptance Model"
5. Y,ng 1ing, Online Payment and Security of E-Commerce", Proceedings of the
2009 Intern,tion,l Symposium on We- Inform,tion Systems ,nd Applic,tions
(WISA'09