E-commerce process reengineering for customer privacy protection

被引:0
作者
Ma F. [1 ]
Sheng G. [2 ]
Ma Y. [3 ]
机构
[1] College of Management, Qufu Normal University, Shandong, Rizhao
[2] College of Information Engineering, Yancheng Teachers University, Jiangsu, Yancheng
[3] College of Information Science and Engineering, Qufu Normal University, Shandong, Rizhao
关键词
Access authorisation; E-commerce; Privacy protection;
D O I
10.1504/IJICS.2021.116940
中图分类号
学科分类号
摘要
Privacy leakage is a major hidden danger for the healthy and orderly development of e-commerce. In this paper, we analyse the current situation of the information leakage. The main reason lies in that the customer information is stored and displayed in plaintext during the e-commerce process. We present a customer privacy protection platform on the basis of the analysis, where such technical measures as information segmentation, data encryption and access authorisation are taken. With the customer privacy protection platform, the customer information is not stored and displayed in plaintext any more, which is replaced with two-dimensional code or barcode. The traceability helps to prevent the leakage and abuse of the consumer information as much as possible. Thus, the traditional operation process of e-commerce is then reengineered and the customer information is only used on demand. Copyright 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:373 / 385
页数:12
相关论文
共 12 条
  • [1] Atat R., Liu L., Chen H., Et al., Enabling cyber-physical communication in 5G cellular networks: Challenges, spatial spectrum sensing, and cyber-security, IET Cyber Physical Systems Theory & Applications, 2, 1, pp. 49-54, (2017)
  • [2] He P., Personal information security crisis and legal protection countermeasures under e-commerce environment, Hebei Law Science, 8, pp. 34-41, (2014)
  • [3] Li L., Li J., Proportionality principle: Ethical principle of privacy protection in electronic commerce, Studies in Ethics, 5, pp. 85-88, (2014)
  • [4] Liao R.F., Wen H., Wu J., Et al., Security enhancement for mobile edge computing through physical layer authentication, IEEE Access, 7, 1, pp. 116390-116401, (2019)
  • [5] Mi T., Research on privacy data protection in China's electronic commerce, Academic Exchange, 7, pp. 38-41, (2013)
  • [6] Net H., Put an End to Privacy Leaks and the Courier Bill Will No Longer Show the Name of the Phone, (2017)
  • [7] Nie L., The innovative and standardized development of e-commerce in China, China Business and Market, 6, pp. 52-57, (2016)
  • [8] Wang X., Zhang N., Information security and information protection in the era of mobile electronic commerce, Lanzhou Academic Journal, 12, pp. 175-180, (2014)
  • [9] Wu J., Guo S., Huang H., Et al., Information and communications technologies for sustainable development goals: State-of-the-art, needs and perspectives, IEEE Communications Surveys & Tutorials, 20, 3, pp. 2389-2406, (2018)
  • [10] Yang X., Research on Credit and Trust Mechanism in Electronic Business Environment, (2016)