[1] Smith J, Carter E. Security Challenges in E-commerce Transactions: Safeguarding the Digital Marketplace. EasyChair; 2024 Jan 3.
[2] Chaudhry RS, Chandhok A. Online Reviews-An effective way to reduce perceived consumer risks of online shopping. In2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS) 2024 Feb 24 (pp. 1-6). IEEE.
[3] Liu X, Ahmad SF, Anser MK, Ke J, Irshad M, Ul-Haq J, Abbas S. Cyber security threats: A never-ending challenge for e-commerce. Frontiers in psychology. 2022 Oct 19;13:927398.
[4] Kalkha H, Khiat A, Bahnasse A, Ouajji H. The rising trends of smart e-commerce logistics. IEEE Access. 2023 Mar 6;11:33839-57.
[5] Jamra RK, Anggorojati B, Sensuse DI, Suryono RR. Systematic Review of Issues and Solutions for Security in E-commerce. In2020 International Conference on Electrical Engineering and Informatics (ICELTICs) 2020 Oct 27 (pp. 1-5). IEEE.
[6] Mohamad MB, Kanaan AG, Aseh K, Alawi NA, Amayreh KT, Al Moaiad Y, Al-hodiany ZM, Pathmanathan PR, El-Ebiary YA. Enterprise Problems and Proposed Solutions Using the Concept of E-Commerce. In2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE) 2021 Jun 15 (pp. 186-192). IEEE.
[7] Taher G. E-commerce: advantages and limitations. International Journal of Academic Research in Accounting Finance and Management Sciences. 2021 Feb;11(1):153-65.
[8] He Y, Hu W. [Retracted] E‐Commerce Data Access Control and Encrypted Storage Based on Internet of Things. Mathematical Problems in Engineering. 2022;2022(1):4547002.
[9] Penelova M. Access control models. Cybernetics and Information Technologies. 2021 Dec 1;21(4):77-104.
[10] Omotunde H, Ahmed M. A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond. Mesopotamian Journal of CyberSecurity. 2023 Aug 7;2023:115-33.
[11] Ravi NC, Muppalaneni NB, Sridevi R, Kamakshi Prasad V, Govardhan A, Padma J. Advanced Access Control Mechanism For Cloud Based E-Wallet. InProceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI-2018) 2020 (pp. 392-399). Springer International Publishing.
[12] LONE SA, MIR A. User Authentication Mechanism for Access Control Management: A Comprehensive Study. International Journal of communication and computer Technologies. 2022;10(2):54-63.
[13] Lian J. Application of Computer Network Security Technology in Electronic Commerce. In2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT) 2021 Oct 15 (pp. 691-694). IEEE.
[14] Liu X, Ahmad SF, Anser MK, Ke J, Irshad M, Ul-Haq J, Abbas S. Cyber security threats: A never-ending challenge for e-commerce. Frontiers in psychology. 2022 Oct 19;13:927398.
[15] Praveenadevi D, Sathyasundari S, Dakshinamurthy T, Syamala M, Gundapaneni M, Pattnaik M. Cybersecurity Strategies for E-Commerce: Best Practices and Case Studies. InStrategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning 2024 (pp. 137-158). IGI Global.
[16] Marta AF, Florescu MS, Coroban L. Risks and Vulnerabilities in Online Commerce. Revista de Management Comparat International. 2023 May 1;24(2):210-27.
[17] Duong PH, Mai DV, Nga VT, Toan TD. A Survey of attacking methods, techniques, and tools on E-commerce systems and recent solutions.
[18] Lyngdoh SW, Chhering M. Cybersecurity Threats and Legal Responsibilities in E-Business: An Indian Perspective. InBusiness Transformation in the Era of Digital Disruption 2025 (pp. 259-292). IGI Global.
[19] Mishra A, Alzoubi YI, Gill AQ, Anwar MJ. Cybersecurity enterprises policies: A comparative study. Sensors. 2022 Jan 11;22(2):538.
[20] Kayumbe A, Michael L. Cyber threats: Can small businesses in tanzania outsmart cybercriminals. International Research Journal of Advanced Engineering and Science. 2021;6(1):141-4.
[21] Jiang B. Computer security vulnerabilities and preventive measures. InApplication of Intelligent Systems in Multi-modal Information Analytics: Proceedings of the 2020 International Conference on Multi-model Information Analytics (MMIA2020), Volume 1 2021 (pp. 752-759). Springer International Publishing.
[22] Yasmeen G, Afaq SA. The critical analysis of E-Commerce web application vulnerabilities. InAdvances in Cyberology and the Advent of the Next-Gen Information Revolution 2023 (pp. 22-37). IGI Global.
[23] Girimurugan B, Dilip D, Bhuvaneswari G, Vegunta D, Swetha Y. Executive Strategies for Implementing Advanced E-Commerce Security Technologies. InStrategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning 2024 (pp. 205-228). IGI Global.