Skip to main content

Protecting Sensitive Information in Electronic Commerce

  • Chapter
Doing Business on the Internet

Part of the book series: Computer Supported Cooperative Work ((CSCW))

  • 133 Accesses

Abstract

One of the crucial requirements for electronic commerce (e-commerce) systems is to provide adequate data security, which has been defined in terms of five functionalities (Adam, Dogramaci, Gangopadhyay and Yesha, 1998; Adam, Gangopadhyay and Holowczak, 1998; Kalakota and Whinston, 1996): authentication, authorisation, confidentiality, integrity, and non-repudiation. Authentication refers to the ability to prove the identity of a user and is based on verifying information provided by the user against what is known by the system about the user. Methods of authentication include private information such as passwords, physical devices such as smart cards, and biometric characteristics such as fmgerprints. Authorisation involves controlling access to information once authentication is established. Authorisation is accomplished with access control mechanisms for network entities and resources. Confidentiality involves maintaining privacy of information about users. Integrity involves the protection of data from modification, either while in transit or in storage (Bhimani, 1996). e-commerce systems must have the capability of ensuring that data transmissions over networks arrive at their destinations in exactly the same form as they were sent. Changes in data that integrity services must protect against include not only modifications to the data, but additions, deletions and reordering parts of the data (Ford and Baum, 1997). Non-repudiation involves proving the identity of the sender of a message. This prevents a sender from denying the fact that a message (such as a purchase order) was actually sent and taking responsibility for such a message.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag London

About this chapter

Cite this chapter

Gangopadhyay, A., Adya, M. (1999). Protecting Sensitive Information in Electronic Commerce. In: Sudweeks, F., Romm, C.T. (eds) Doing Business on the Internet. Computer Supported Cooperative Work. Springer, London. https://doi.org/10.1007/978-1-4471-0561-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-0561-9_7

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-85233-030-9

  • Online ISBN: 978-1-4471-0561-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics