E-commerce: protecting purchaser privacy to enforce trust

被引:0
作者
Giannakis Antoniou
Lynn Batten
机构
[1] The Philips College,Department of Computing & Information Systems
[2] Deakin University,School of Information Technology
来源
Electronic Commerce Research | 2011年 / 11卷
关键词
Trust; E-commerce; C2B; Privacy;
D O I
暂无
中图分类号
学科分类号
摘要
It has been well documented that lack of trust between commercial entities and purchasers can restrict the potential of e-commerce. This may be because the purchaser is required to provide personal information to the commercial entity, which may then be abused, or because the purchaser may be suspicious that after payment has been processed, the goods purchased will not arrive. The challenge for the researcher is to determine the e-commerce model which maximizes the trust a purchaser has when shopping online.
引用
收藏
页码:421 / 456
页数:35
相关论文
共 76 条
[1]  
Amit B.(2003)Authentication in e-commerce Communications of the ACM 46 159-166
[2]  
Steve M.(2006)The application of model checking for securing e-commerce transactions Communications of the ACM 49 97-101
[3]  
Anderson B. B.(2008)Enabling privacy-preserving e-payment processing Lecture notes in computer science 4947 596-328
[4]  
Hansen J. V.(2009)Privacy-preserving e-payments using one-time payment details Computer Standards & Interfaces 31 321-106
[5]  
Lowry P. B.(2005)Privacy in e-commerce: stated preferences vs. actual behavior Communications of the ACM 48 101-520
[6]  
Summers S. L.(2008)The EU data protection directive: an engine of a global regime Computer Law & Security Report 24 508-141
[7]  
Ashrafi M. Z.(2007)The effect of Internet general privacy concern on customer behavior Electronic Commerce Research 7 117-182
[8]  
Ng S. K.(2007)Examining customers’ trust in online vendors and their dropout decisions: an empirical study Electronic Commerce Research and Applications 6 171-S120
[9]  
Ashrafi M. Z.(2008)PyFlag—an advanced network forensic framework Digital Investigation 5 S112-91
[10]  
Ng S. K.(2001)Keeping data private Network Computing 12 83-208