Skip to main content

A Trusted Approach to E-Commerce

  • Conference paper
Secure Data Management (SDM 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5159))

Included in the following conference series:

  • 686 Accesses

Abstract

It has been well documented that lack of trust between commercial entities and purchasers can restrict the potential of e-commerce. This may be because the purchaser is required to provide sensitive information to the commercial entity or because the purchaser may be suspicious that after payment has been processed, the goods purchased will not arrive. The challenge for the researcher is to determine the e-commerce model which maximizes the trust relationship. In this paper, we introduce a measure of the trust based on the information distributed to the parties in the transaction and isolate the instances which maximize trust for the purchaser. This leads us to propose four new models for e-commerce which would improve consumer trust and therefore likely lead to an increase in on-line commerce. We demonstrate that no new technologies are needed in order to implement these new models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Fedaghi, S.: How sensitive is your personal information? In: Proceedings of the 2007 ACM symposium on Applied computing, pp. 165–169 (2007)

    Google Scholar 

  2. Anderson, B.B., Hansen, J.V., Lowry, P.B., Summers, S.L.: The application of model checking for securing e-commerce transactions. Communications of the ACM 49, 97–101 (2006)

    Article  Google Scholar 

  3. Barnard, L., Wesson, J.: A trust model for e-commerce in South Africa. In: Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, pp. 23–32 (2004)

    Google Scholar 

  4. Bhargav-Spantzel, A., Woo, J., Bertino, E.: Receipt management- Transaction history based trust establishment. In: Proceedings of the 2007 ACM workshop on Digital identity management, pp. 82–91 (2007)

    Google Scholar 

  5. Burns, S.: Unique characteristics of e-commerce technologies and their effects upon payment systems. GSEC (GIAC Security Essentials Certification)–Version 1 (2002)

    Google Scholar 

  6. Camenisch, J., Shelat, A., Sommer, D., Fischer-Hubner, S., Hansen, M., Krasemann, H., Lacoste, G., Leenes, R., Tseng, J.: Privacy and identity management for everyone. In: DIM 2005, pp. 20–27. ACM, Virginia (2005)

    Chapter  Google Scholar 

  7. Chau, P.Y.K., Hu, P.J.H., Lee, B.L.P., Au, A.K.K.: Examining customers’ trust in online vendors and their dropout decisions: An empirical study. Electronic Commerce Research and Applications 6, 171–182 (2007)

    Article  Google Scholar 

  8. Claessens, J., Preneel, B., Vandewalle, J.: Anonymity controlled electronic payment systems. In: Proceedings of the 20th Symposium on Information Theory in the Benelux, pp. 109–116 (1999)

    Google Scholar 

  9. Doherty, S.: Keeping data private. Network Computing 12, 83–91 (2001)

    Google Scholar 

  10. Doney, P.M., Cannon, J.P.: An examination of the nature of trust in buyer–seller relationships. Journal of Marketing 61, 35–51 (1997)

    Article  Google Scholar 

  11. Fomenko, V.: Generating virtual reality shops for e-commerce. Dissertation, Vrije Universiteit Brussel (2006)

    Google Scholar 

  12. Jarvenpaa, S.L., Tractinsky, N., Vitale, M.: Consumer trust in an Internet store. Information Technology and Management 1, 45–71 (2000)

    Article  Google Scholar 

  13. Katsikas, S.K., Lopez, J., Pernul, G.: Trust, privacy and security in e-business: Requirements and solutions. In: Bozanis, P., Houstis, E.N. (eds.) PCI 2005. LNCS, vol. 3746, pp. 548–558. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Kumaraguru, P., Cranor, L.: Privacy in India: Attitudes and Awareness. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 243–258. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  15. Moores, T.: Do consumers understand the role of privacy seals in e-commerce? Communications of the ACM 48, 86–91 (2005)

    Article  Google Scholar 

  16. Seigneur, J.M., Jensen, C.D.: Trust enhanced ubiquitous payment without too much privacy loss. In: Proceedings of the 2004 ACM symposium on Applied computing, pp. 1593–1599 (2004)

    Google Scholar 

  17. Sillence, E., Briggs, P., Harris, P., Fishwick, L.: A framework for understanding trust factors in web-based health advice. International Journal of Human-Computer Studies 64, 697–713 (2006)

    Article  Google Scholar 

  18. Smith, L.M., Smith, J.L.: Cyber Crimes Aimed at Publicly Traded Companies: Is Stock Price Affected?: American Accounting Association Southwest Region, Oklahoma City (2006)

    Google Scholar 

  19. Tan, H., Guo, J.: Some methods to depress the risks of the online transactions. In: Proceedings of the 7th international conference on Electronic commerce, pp. 217–220 (2005)

    Google Scholar 

  20. Teo, T.S.H., Liu, J.: Consumer trust in e-commerce in the United States, Singapore and China. Omega 35, 22–38 (2007)

    Article  Google Scholar 

  21. Tsiounis, Y.: A Security Framework for Card-Based Systems. In: Proceedings of the 5th International Conference on Financial Cryptography, pp. 210–231 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Willem Jonker Milan Petković

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Antoniou, G., Batten, L., Parampalli, U. (2008). A Trusted Approach to E-Commerce. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2008. Lecture Notes in Computer Science, vol 5159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85259-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85259-9_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85258-2

  • Online ISBN: 978-3-540-85259-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics