SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
p-ISSN: 2395-0072Volume: 07 Issue: 03 | Mar 2020 www.irjet.net
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3961
DATA PRIVACY, TRUST ISSUES AND SOLUTIONS IN ELECTRONIC
COMMERCE
MEGHNA NIKAM1 & JAGRUTI ROKADE2
1Student: Semester-II, M.Sc.(I.T)
2Saket College of Arts Science & Commerce Kalyan, Thane, Maharashtra, India
-------------------------------------------------------------------------***-----------------------------------------------------------------------
Abstract – Privacy and Security has become an discussion topic among users. E-Commerce is a part of Information Science. If the
Privacy and Security threats are not rejected, users will never trust, visit or shop at E-Commerce site. Electronic Commerce has
increased dramatically in recent years, because of the revolution in Information Technology. The services provided by e-commerce
companies are affected by several factors like privacy, security, trust, risks. Maintenance of users privacy online is the main concerns
ofE- commerce. Here will discuss about the overview of privacy, trust, risk, issues and their possible solutions.
Key Words- E-commerce; Data privacy issues, E- commerce; security, E-commerce; risk, E-commerce; trust, Digital E-
commerce Online Shopping, Security threats.
INTRODUCTION :
E-Commerce is an activity of buying and selling of products electronically. E-commerce Security is a part of Information Security
framework and is applied to the components that affect e-commerce. The components that affect e-commerce includesComputer
Security, Data security and other wider elements of Information Security framework. E-commerce business has became very
popular now-a-days and into existence with many privacy issues solutions. E- commerce Privacy is a major issue in electronic
commerce, as privacy enforcement and its monitoring is not easy to handle. Some people consider privacy as a fundamental
rights and people take it as a tradable commodity.
The benefits of e-commerce includes availability, easy to access, various selection of products and services, and international
reachability are attracting peoples online to join e-commerce business. The growth and trust upon E-Commerce business
depends totally on the security and privacy for the development of E- Commerce. The most important factor of E-commerce is
to build trust among users. A complete and secure system is required to maintain the privacy in e- commerce.
In this paper we propose a model that would consider customers privacy and security concerns and how they affect perceived
risk. Here, we will study the relationship between theelementsandcustomerstrust and behavior in online business methods.
WEB SECURITY:
Web security is one of the major principal and continuing concerns that restricts customers and organizations of e-commerce.
The aim of this principal is to explore the security in e-commerce B2C and C2C websites form both customers and organizations.
With the rapid development of e-commerce security issues are arising from people’s point of view. Web applications
increasingly communicatewiththirdparty services. This introduce new security challengesdue to the complexity of applications to
coordinate with its state components and web client over Internet.
RESEARCH HYPOTHESIS:
The security and privacy concerns will raisethelevel of fear of customers’ regarding proper outcomes of online transactions. The
level of fear, uncertainty, and anxiety are some of risk aspects, which in return affect the level of customers’ trust. Therefore, we
found that it isimportant toexplain each aspect,indistinctandtry to find relationships among them.
Security:
Security threats are defined as any action that would lead to loss in network elements, or data as a result of data breach (i.e.
modification, disclosure, or destruction), denial of service attacks, and scam. Therefore, security is protecting systems against
such threats. The main three goals of information security are confidentiality, integrity, and availability (CIA).
Confidentiality is defined as limiting un-authorized access to confidential data. In other words, confidentiality means using
encryption algorithms to safeguard transmitted data over the network and stored data in servers. Authentication methods (i.e.
passwords) could be used to prevent unauthorized access to data. Integrity goal can be stated as ensuring correct transaction.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
p-ISSN: 2395-0072Volume: 07 Issue: 03 | Mar 2020 www.irjet.net
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3962
Moreover, integrity is used to guarantee data accuracy and completeness . The system availability is concerned about
handling, transferring, and storing data for those who need it .
Privacy:
The concept of privacy has different definitions, which makes it challenging when trying to present components of such concept.
Privacy is defined as the “right to be left alone”, furthermore, being able to control the disclosure and access to personal
information. Another definition of privacy is the right of individual to control what information should be disclosed and what
should not. There are several definitions for privacy, privacy definitions fall into three categories: 1) Notice: Customers’ right to
control access to their personal data. 2) Control: The level of control that customers have over their personal data. 3) Access:
Limiting access to customers’ personal data to only authorized people
Trust and behavioral intention:
Trust could be seen from different perspectives (i.e. psychology, computer, marketing, science, communications, information
systems, and political discipline). Due to many definitions of trust, the relationship between trust and perceived risk is not
clear. Some researchers consider the risk as an outcome of trust. Additionally, we will consider the same relation between trust
and behavioral intention proposed and tested in. The study suggested that level of trust that customers’ have would positively
affect customers’ behavioral intentions.
E-Commerce Transaction Phase
Information
phase
Negotiation
phase
Payment
phase
Delivery
phase
Security Measures
Confidentiality Secure Encryption Secure
Access Control Contract Delivery
Integrity Identification Integrity
Checks Digital Checks
Signatures
Chart 1: E-Commerce Transaction Phase
Due to the increase in warnings by the media from security and privacy breaches like identity theft and financial fraud, and the
elevated awareness of online customers about the threats of performing transactions online, e - commerce has not been able to
achieve its full potential. Many customers refuse to perform online transactions and relate that to the lack of trust or fear for
their personal information.
DIGITAL E-COMMERCE CYCLE:
Security is very important in online shopping sites.Now days, a huge amount is being purchased on the internet, because it‘s easier
and more convenient. Almost anything can be bought such as music, toys clothing, cars, food and even porn. Even though some
of these purchases are illegal we will be focusing on all the item‘s you can buy legally on the internet. Some of the popular
websites are eBay, iTunes, Amazon, HMV, Mercantile, dell, Best Buy and much more
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
p-ISSN: 2395-0072Volume: 07 Issue: 03 | Mar 2020 www.irjet.net
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3963
Fig -1: Digital E-commerce cycle SECURITY ISSUES:
E-commerce security is the protection of e- commerce assets from unauthorized access, use, alteration, or destruction. While
security features do not guarantee a secure system, they are necessary to build a secure system.
Security features have four categories:
 Authentication: Verifies who you say you are. It enforces that you are the only one allowed to logon to your
Internet banking account
 Authorization: Allows only you to manipulate your resources in specific ways. This prevents you from increasing
the balance of your account or deleting a bill.
 Encryption: Deals with information hiding. It ensures you cannot spy on others during Internet banking
transactions.
 Integrity: prevention against unauthorized data modification.
SECURE ONLINE SHOPPING GUIDELINES:
 Shop at Secure Web Sites
 Research the Web Site before You Order
 Read the Web Site's Privacy and Security Policies
 Be Aware of Cookies and Behavioural Marketing
CONCLUSIONS:
E-commerce is widely considered the buying and selling of products over the internet, but any transaction that is completed
solely through electronic measures can be considered e -commerce. Day by day E-commerce and M commerce playing very good
role in online retail marketing and peoples using this technology day by day increasing all over the world. E- commerce security
is the protection of e-commerce assets from unauthorized access, use, alteration, or destruction. Dimensions of e-commerce
security; Integrity: prevention against unauthorized data modification, No repudiation: prevention against any one party from
reneging on an agreement after the fact. Authenticity: authentication of data source. Confidentiality: protection against
unauthorized data disclosure. Privacy: provision of data control and disclosure. Availability: prevention against data delays or
removal.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
p-ISSN: 2395-0072Volume: 07 Issue: 03 | Mar 2020 www.irjet.net
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3964
Security, privacy, perceived risk, and trust issues are critical in ecommerce. Understanding the relationship between these
concepts is even crucial. In this paper, we have discussed some insights for security, privacy, perceived risk and trust concepts
in ecommerce. In addition, we proposed a security-privacy-perceived risk-trust preliminary theoretical model for customers in
e-commerce. The model presents the relationship between privacy, security and perceived risk, and perceived risk and level of
trust. The proposed model in this paper provides a basis for further research on clarifying and understanding the relationship
between trust, and other concepts in e-commerce.
ACKNOWLEDGEMENT:
I would like to express my special thanks of gratitude to our guide Asst. prof “Rajeshree munde” as well as to Dr. S. K. Raju
Principal Saket College of Arts science & Commerce for his valueable guidance. We precise our sincere thanks to “Praseena
Biju”, HOD ” Information Technology”, andalsoother employeecolleaguesofthe department for his or her kind co-operation.
Secondly I would also like to thank our parents and friends who helped us a lot in finalizing this project within the limited time
frame. We also precise our sincere thanks to the library staff members of the college.
REFERENCES:
[1] https://www.forbes.com/sites/marymeehan/201 9/11/26/data-privacy-will-be-the-most- important-issue-in-the-next-
decade/#2f97b40c1882
[2] https://www.omicsonline.org/open-access/data- privacy-issues-and-possible-solutions-in- ecommerce-2168-9601-
1000294-104325.html
[3] https://www.researchgate.net/publication/32845 7534_Data_Privacy_Issues_and_Possible_Solutions_ in_E-commerce
[4] https://www.researchgate.net/publication/31148 9590_Privacy_security_risk_and_trust_concerns_in_ e-commerce
[5] https://www.academia.edu/
[6] https://www.tutorialspoint.com/e_commerce/e_c ommerce_security.htm

Contenu connexe

Tendances

6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
E commerce law and ethics
E commerce law and ethicsE commerce law and ethics
E commerce law and ethicsXophia Montawal
 
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemDesign and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemAM Publications,India
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commercesadaf tst
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and ThreatsBPalmer13
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004Mike Spaulding
 
Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerceVipin Subhash
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05BookStoreLib
 
Digital marketing presentation - security risks for websites
Digital marketing presentation - security risks for websitesDigital marketing presentation - security risks for websites
Digital marketing presentation - security risks for websitesAlexandra MacLeod
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protectiontumetr1
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 

Tendances (20)

6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
E commerce law and ethics
E commerce law and ethicsE commerce law and ethics
E commerce law and ethics
 
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemDesign and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA Cryptosystem
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
E commerce Security for end Users
E commerce Security for end UsersE commerce Security for end Users
E commerce Security for end Users
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
E commerce
E commerceE commerce
E commerce
 
Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerce
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05
 
Requirement of PCI DSS in India.
Requirement of PCI DSS in India.Requirement of PCI DSS in India.
Requirement of PCI DSS in India.
 
Digital marketing presentation - security risks for websites
Digital marketing presentation - security risks for websitesDigital marketing presentation - security risks for websites
Digital marketing presentation - security risks for websites
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
E-commerce Security
E-commerce SecurityE-commerce Security
E-commerce Security
 
Ccs16
Ccs16Ccs16
Ccs16
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
50120130406020
5012013040602050120130406020
50120130406020
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 

Similaire à IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce

Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Information security
Information securityInformation security
Information securityOnkar Sule
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trustOptimediaSpain
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerceAlexander Decker
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerceAlexander Decker
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerceAlexander Decker
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?Lucy Zeniffer
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdforage technologies
 
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docxRunning head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docxjeanettehully
 
A security requirement quality
A security requirement qualityA security requirement quality
A security requirement qualityijseajournal
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 

Similaire à IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce (20)

Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
Information security
Information securityInformation security
Information security
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trust
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdf
 
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docxRunning head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
Running head EFFECTS OF ARTIFICIAL INTELLIGENCE ON PRIVACY AND SE.docx
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
A security requirement quality
A security requirement qualityA security requirement quality
A security requirement quality
 
Ps16
Ps16Ps16
Ps16
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 

Dernier (20)

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 

IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072Volume: 07 Issue: 03 | Mar 2020 www.irjet.net © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3961 DATA PRIVACY, TRUST ISSUES AND SOLUTIONS IN ELECTRONIC COMMERCE MEGHNA NIKAM1 & JAGRUTI ROKADE2 1Student: Semester-II, M.Sc.(I.T) 2Saket College of Arts Science & Commerce Kalyan, Thane, Maharashtra, India -------------------------------------------------------------------------***----------------------------------------------------------------------- Abstract – Privacy and Security has become an discussion topic among users. E-Commerce is a part of Information Science. If the Privacy and Security threats are not rejected, users will never trust, visit or shop at E-Commerce site. Electronic Commerce has increased dramatically in recent years, because of the revolution in Information Technology. The services provided by e-commerce companies are affected by several factors like privacy, security, trust, risks. Maintenance of users privacy online is the main concerns ofE- commerce. Here will discuss about the overview of privacy, trust, risk, issues and their possible solutions. Key Words- E-commerce; Data privacy issues, E- commerce; security, E-commerce; risk, E-commerce; trust, Digital E- commerce Online Shopping, Security threats. INTRODUCTION : E-Commerce is an activity of buying and selling of products electronically. E-commerce Security is a part of Information Security framework and is applied to the components that affect e-commerce. The components that affect e-commerce includesComputer Security, Data security and other wider elements of Information Security framework. E-commerce business has became very popular now-a-days and into existence with many privacy issues solutions. E- commerce Privacy is a major issue in electronic commerce, as privacy enforcement and its monitoring is not easy to handle. Some people consider privacy as a fundamental rights and people take it as a tradable commodity. The benefits of e-commerce includes availability, easy to access, various selection of products and services, and international reachability are attracting peoples online to join e-commerce business. The growth and trust upon E-Commerce business depends totally on the security and privacy for the development of E- Commerce. The most important factor of E-commerce is to build trust among users. A complete and secure system is required to maintain the privacy in e- commerce. In this paper we propose a model that would consider customers privacy and security concerns and how they affect perceived risk. Here, we will study the relationship between theelementsandcustomerstrust and behavior in online business methods. WEB SECURITY: Web security is one of the major principal and continuing concerns that restricts customers and organizations of e-commerce. The aim of this principal is to explore the security in e-commerce B2C and C2C websites form both customers and organizations. With the rapid development of e-commerce security issues are arising from people’s point of view. Web applications increasingly communicatewiththirdparty services. This introduce new security challengesdue to the complexity of applications to coordinate with its state components and web client over Internet. RESEARCH HYPOTHESIS: The security and privacy concerns will raisethelevel of fear of customers’ regarding proper outcomes of online transactions. The level of fear, uncertainty, and anxiety are some of risk aspects, which in return affect the level of customers’ trust. Therefore, we found that it isimportant toexplain each aspect,indistinctandtry to find relationships among them. Security: Security threats are defined as any action that would lead to loss in network elements, or data as a result of data breach (i.e. modification, disclosure, or destruction), denial of service attacks, and scam. Therefore, security is protecting systems against such threats. The main three goals of information security are confidentiality, integrity, and availability (CIA). Confidentiality is defined as limiting un-authorized access to confidential data. In other words, confidentiality means using encryption algorithms to safeguard transmitted data over the network and stored data in servers. Authentication methods (i.e. passwords) could be used to prevent unauthorized access to data. Integrity goal can be stated as ensuring correct transaction.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072Volume: 07 Issue: 03 | Mar 2020 www.irjet.net © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3962 Moreover, integrity is used to guarantee data accuracy and completeness . The system availability is concerned about handling, transferring, and storing data for those who need it . Privacy: The concept of privacy has different definitions, which makes it challenging when trying to present components of such concept. Privacy is defined as the “right to be left alone”, furthermore, being able to control the disclosure and access to personal information. Another definition of privacy is the right of individual to control what information should be disclosed and what should not. There are several definitions for privacy, privacy definitions fall into three categories: 1) Notice: Customers’ right to control access to their personal data. 2) Control: The level of control that customers have over their personal data. 3) Access: Limiting access to customers’ personal data to only authorized people Trust and behavioral intention: Trust could be seen from different perspectives (i.e. psychology, computer, marketing, science, communications, information systems, and political discipline). Due to many definitions of trust, the relationship between trust and perceived risk is not clear. Some researchers consider the risk as an outcome of trust. Additionally, we will consider the same relation between trust and behavioral intention proposed and tested in. The study suggested that level of trust that customers’ have would positively affect customers’ behavioral intentions. E-Commerce Transaction Phase Information phase Negotiation phase Payment phase Delivery phase Security Measures Confidentiality Secure Encryption Secure Access Control Contract Delivery Integrity Identification Integrity Checks Digital Checks Signatures Chart 1: E-Commerce Transaction Phase Due to the increase in warnings by the media from security and privacy breaches like identity theft and financial fraud, and the elevated awareness of online customers about the threats of performing transactions online, e - commerce has not been able to achieve its full potential. Many customers refuse to perform online transactions and relate that to the lack of trust or fear for their personal information. DIGITAL E-COMMERCE CYCLE: Security is very important in online shopping sites.Now days, a huge amount is being purchased on the internet, because it‘s easier and more convenient. Almost anything can be bought such as music, toys clothing, cars, food and even porn. Even though some of these purchases are illegal we will be focusing on all the item‘s you can buy legally on the internet. Some of the popular websites are eBay, iTunes, Amazon, HMV, Mercantile, dell, Best Buy and much more
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072Volume: 07 Issue: 03 | Mar 2020 www.irjet.net © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3963 Fig -1: Digital E-commerce cycle SECURITY ISSUES: E-commerce security is the protection of e- commerce assets from unauthorized access, use, alteration, or destruction. While security features do not guarantee a secure system, they are necessary to build a secure system. Security features have four categories:  Authentication: Verifies who you say you are. It enforces that you are the only one allowed to logon to your Internet banking account  Authorization: Allows only you to manipulate your resources in specific ways. This prevents you from increasing the balance of your account or deleting a bill.  Encryption: Deals with information hiding. It ensures you cannot spy on others during Internet banking transactions.  Integrity: prevention against unauthorized data modification. SECURE ONLINE SHOPPING GUIDELINES:  Shop at Secure Web Sites  Research the Web Site before You Order  Read the Web Site's Privacy and Security Policies  Be Aware of Cookies and Behavioural Marketing CONCLUSIONS: E-commerce is widely considered the buying and selling of products over the internet, but any transaction that is completed solely through electronic measures can be considered e -commerce. Day by day E-commerce and M commerce playing very good role in online retail marketing and peoples using this technology day by day increasing all over the world. E- commerce security is the protection of e-commerce assets from unauthorized access, use, alteration, or destruction. Dimensions of e-commerce security; Integrity: prevention against unauthorized data modification, No repudiation: prevention against any one party from reneging on an agreement after the fact. Authenticity: authentication of data source. Confidentiality: protection against unauthorized data disclosure. Privacy: provision of data control and disclosure. Availability: prevention against data delays or removal.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072Volume: 07 Issue: 03 | Mar 2020 www.irjet.net © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3964 Security, privacy, perceived risk, and trust issues are critical in ecommerce. Understanding the relationship between these concepts is even crucial. In this paper, we have discussed some insights for security, privacy, perceived risk and trust concepts in ecommerce. In addition, we proposed a security-privacy-perceived risk-trust preliminary theoretical model for customers in e-commerce. The model presents the relationship between privacy, security and perceived risk, and perceived risk and level of trust. The proposed model in this paper provides a basis for further research on clarifying and understanding the relationship between trust, and other concepts in e-commerce. ACKNOWLEDGEMENT: I would like to express my special thanks of gratitude to our guide Asst. prof “Rajeshree munde” as well as to Dr. S. K. Raju Principal Saket College of Arts science & Commerce for his valueable guidance. We precise our sincere thanks to “Praseena Biju”, HOD ” Information Technology”, andalsoother employeecolleaguesofthe department for his or her kind co-operation. Secondly I would also like to thank our parents and friends who helped us a lot in finalizing this project within the limited time frame. We also precise our sincere thanks to the library staff members of the college. REFERENCES: [1] https://www.forbes.com/sites/marymeehan/201 9/11/26/data-privacy-will-be-the-most- important-issue-in-the-next- decade/#2f97b40c1882 [2] https://www.omicsonline.org/open-access/data- privacy-issues-and-possible-solutions-in- ecommerce-2168-9601- 1000294-104325.html [3] https://www.researchgate.net/publication/32845 7534_Data_Privacy_Issues_and_Possible_Solutions_ in_E-commerce [4] https://www.researchgate.net/publication/31148 9590_Privacy_security_risk_and_trust_concerns_in_ e-commerce [5] https://www.academia.edu/ [6] https://www.tutorialspoint.com/e_commerce/e_c ommerce_security.htm