Conference Paper

Privacy mechanisms supporting the building of trust in e-commerce

Ottawa, Ontario K1P 5P7 Canada
DOI: 10.1109/ICDE.2005.263 Conference: Data Engineering Workshops, 2005. 21st International Conference on
Source: DBLP

ABSTRACT Consumer trust is crucial for the survival of Webbased businesses, since the lack of faith on Web merchants or stores can prevent the accomplishment of transactions. Techniques guaranteeing privacy in the management of customers’ data in Web stores can help building trust by giving users a feeling of control on the vendor’s handling of their personal information. This article analyzes the privacy concerns of Internet users and evaluates and proposes methods to handle privacy issues in Web stores that can help the development of trust in e-commerce.

  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The increasing complexity of IT systems and the growing demand for regulation compliance are main issues for the design of IT systems. Addressing these issues requires the developing of effective methods to support the analysis of regulations and the elicitation of any organizational and system requirements from them. This work investigates the problem of designing regulation-compliant systems and, in particular, the challenges in eliciting and managing legal requirements.
    Requirements Engineering and Law, 2008. RELAW '08.; 10/2008
  • [Show abstract] [Hide abstract]
    ABSTRACT: With widespread Internet usage, e-commerce became common way of conducting business. Money transactions and payments online are an ever increasing trend. Unfortunately, problems in terms of security arise as well. Most of the potential consumers choose to abstain from online money transfer due to the privacy concerns. In order to strengthen the trust and gain their acceptance, security improvements are required. At the same time, however, solution needs to be convenient, entailing ease of use and higher mobility. For this purpose, involvement of mobile phone network is suggested to support online payment procedure. Mobile phone's SIM card is convenient for safely storing security parameters essential for secured money transaction. SIM card-equipped phone becomes secure entity compulsory for getting access to client side PC application for money transfer. Ease of use, portability and mobility are guaranteed while parameters such as cryptography keys or credit card numbers are securely updated trough the mobile phone network.
    Multimedia Computing and Systems (ICMCS), 2011 International Conference on; 04/2011
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Determining who has access to personal data is an ongoing problem facing information system entities. The establishment of trust and its representation for known and unknown entities within the system further complicates access control rights allocation. One unique solution is through the application of graph representation to aid in the identification and management of privacy, trust and security requirements. Graphs provide a much better mental map than would textual information. In this paper we use graphs to represent informational relations concerning trust levels between entities for privacy and security requirements.


Available from