Quarterly Journal of Information and Communication Technology ​

Investigating Security Dimensions in Electronic Businesses

Document Type : Original Research Article

Author

Department of Computer Engineering, Islamic Azad University, Science and Research Branch, Tehran, Iran

Abstract
The rapid expansion of the Internet and the cost-effective growth of key technologies enable it to revolutionize information technology and create unprecedented opportunities for the development of large-scale distributed applications. At the same time, there is a growing concern about the security of web-based businesses, which are rapidly proliferating on the Internet. Implementing electronic business systems and entering the field of electronic commerce are technical and social solutions to facilitate communication and easy access to information. But the increase of business dependence on information systems has resulted in damages, threats and technical and non-technical measures to violate the principles of business information security, which is the main challenge and problem of organizations and the subject of this article. To achieve dynamic e-businesses, we must implement security in it under fundamental frameworks so that we can use it as a sustainable example of business. A correct understanding of security risks and risks, especially the risks that exist in the executive frameworks of electronic businesses, help a lot in the design and architecture of a safe and efficient infrastructure. In this article, we are going to examine the security aspects of electronic businesses.

Keywords


[1] Smith J, Carter E. Security Challenges in E-commerce Transactions: Safeguarding the Digital Marketplace. EasyChair; 2024 Jan 3.
[2] Chaudhry RS, Chandhok A. Online Reviews-An effective way to reduce perceived consumer risks of online shopping. In2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS) 2024 Feb 24 (pp. 1-6). IEEE.
[3] Liu X, Ahmad SF, Anser MK, Ke J, Irshad M, Ul-Haq J, Abbas S. Cyber security threats: A never-ending challenge for e-commerce. Frontiers in psychology. 2022 Oct 19;13:927398.
[4] Kalkha H, Khiat A, Bahnasse A, Ouajji H. The rising trends of smart e-commerce logistics. IEEE Access. 2023 Mar 6;11:33839-57.
[5] Jamra RK, Anggorojati B, Sensuse DI, Suryono RR. Systematic Review of Issues and Solutions for Security in E-commerce. In2020 International Conference on Electrical Engineering and Informatics (ICELTICs) 2020 Oct 27 (pp. 1-5). IEEE.
[6] Mohamad MB, Kanaan AG, Aseh K, Alawi NA, Amayreh KT, Al Moaiad Y, Al-hodiany ZM, Pathmanathan PR, El-Ebiary YA. Enterprise Problems and Proposed Solutions Using the Concept of E-Commerce. In2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE) 2021 Jun 15 (pp. 186-192). IEEE.
[7] Taher G. E-commerce: advantages and limitations. International Journal of Academic Research in Accounting Finance and Management Sciences. 2021 Feb;11(1):153-65.
[8] He Y, Hu W. [Retracted] E‐Commerce Data Access Control and Encrypted Storage Based on Internet of Things. Mathematical Problems in Engineering. 2022;2022(1):4547002.
[9] Penelova M. Access control models. Cybernetics and Information Technologies. 2021 Dec 1;21(4):77-104.
[10] Omotunde H, Ahmed M. A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond. Mesopotamian Journal of CyberSecurity. 2023 Aug 7;2023:115-33.
[11] Ravi NC, Muppalaneni NB, Sridevi R, Kamakshi Prasad V, Govardhan A, Padma J. Advanced Access Control Mechanism For Cloud Based E-Wallet. InProceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI-2018) 2020 (pp. 392-399). Springer International Publishing.
[12] LONE SA, MIR A. User Authentication Mechanism for Access Control Management: A Comprehensive Study. International Journal of communication and computer Technologies. 2022;10(2):54-63.
[13] Lian J. Application of Computer Network Security Technology in Electronic Commerce. In2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT) 2021 Oct 15 (pp. 691-694). IEEE.
[14] Liu X, Ahmad SF, Anser MK, Ke J, Irshad M, Ul-Haq J, Abbas S. Cyber security threats: A never-ending challenge for e-commerce. Frontiers in psychology. 2022 Oct 19;13:927398.
[15] Praveenadevi D, Sathyasundari S, Dakshinamurthy T, Syamala M, Gundapaneni M, Pattnaik M. Cybersecurity Strategies for E-Commerce: Best Practices and Case Studies. InStrategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning 2024 (pp. 137-158). IGI Global.
[16] Marta AF, Florescu MS, Coroban L. Risks and Vulnerabilities in Online Commerce. Revista de Management Comparat International. 2023 May 1;24(2):210-27.
[17] Duong PH, Mai DV, Nga VT, Toan TD. A Survey of attacking methods, techniques, and tools on E-commerce systems and recent solutions.
[18] Lyngdoh SW, Chhering M. Cybersecurity Threats and Legal Responsibilities in E-Business: An Indian Perspective. InBusiness Transformation in the Era of Digital Disruption 2025 (pp. 259-292). IGI Global.
[19] Mishra A, Alzoubi YI, Gill AQ, Anwar MJ. Cybersecurity enterprises policies: A comparative study. Sensors. 2022 Jan 11;22(2):538.
[20] Kayumbe A, Michael L. Cyber threats: Can small businesses in tanzania outsmart cybercriminals. International Research Journal of Advanced Engineering and Science. 2021;6(1):141-4.
[21] Jiang B. Computer security vulnerabilities and preventive measures. InApplication of Intelligent Systems in Multi-modal Information Analytics: Proceedings of the 2020 International Conference on Multi-model Information Analytics (MMIA2020), Volume 1 2021 (pp. 752-759). Springer International Publishing.
[22] Yasmeen G, Afaq SA. The critical analysis of E-Commerce web application vulnerabilities. InAdvances in Cyberology and the Advent of the Next-Gen Information Revolution 2023 (pp. 22-37). IGI Global.
[23] Girimurugan B, Dilip D, Bhuvaneswari G, Vegunta D, Swetha Y. Executive Strategies for Implementing Advanced E-Commerce Security Technologies. InStrategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning 2024 (pp. 205-228). IGI Global.