Privacy mechanisms supporting the building of trust in e-commerce
Ottawa, Ontario K1P 5P7 CanadaDOI: 10.1109/ICDE.2005.263 Conference: Data Engineering Workshops, 2005. 21st International Conference on
Consumer trust is crucial for the survival of Webbased businesses, since the lack of faith on Web merchants or stores can prevent the accomplishment of transactions. Techniques guaranteeing privacy in the management of customers data in Web stores can help building trust by giving users a feeling of control on the vendors handling of their personal information. This article analyzes the privacy concerns of Internet users and evaluates and proposes methods to handle privacy issues in Web stores that can help the development of trust in e-commerce.
Full-text previewDOI: · Available from: lw23.com
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.
[Show abstract] [Hide abstract]
- "Single-factor authentication system is still predominant, whereby customers are only required to provide user name and single password for accessing their account . Even though, to some extent, protection can be offered to customers through comprehensive international legislation and surveillance , establishing trust requires innovation and continuous service improvement . Involving another security layer is one of the recommendations for security enhancement , yet since the convenience plays important role in making shopping and online money transactions acceptable online , this angle cannot be neglected either. "
ABSTRACT: With widespread Internet usage, e-commerce became common way of conducting business. Money transactions and payments online are an ever increasing trend. Unfortunately, problems in terms of security arise as well. Most of the potential consumers choose to abstain from online money transfer due to the privacy concerns. In order to strengthen the trust and gain their acceptance, security improvements are required. At the same time, however, solution needs to be convenient, entailing ease of use and higher mobility. For this purpose, involvement of mobile phone network is suggested to support online payment procedure. Mobile phone's SIM card is convenient for safely storing security parameters essential for secured money transaction. SIM card-equipped phone becomes secure entity compulsory for getting access to client side PC application for money transfer. Ease of use, portability and mobility are guaranteed while parameters such as cryptography keys or credit card numbers are securely updated trough the mobile phone network.Multimedia Computing and Systems (ICMCS), 2011 International Conference on; 04/2011
[Show abstract] [Hide abstract]
- "For instance, Kaiser Permanente (KP), a US health provider, accidentally disclosed personally identified health information (e.g., appointment details, answers to patient's questions, and medical advice) for over 800 patients through its web healthcare portal . Violations of privacy may have significant consequences within an organization not only in terms of money (KP paid a $200,000 fine ), but also in terms of the trust that people feel towards the organization . "
ABSTRACT: Privacy and data protection are pivotal issues in nowadays society. They concern the right to prevent the dissemination of sensitive or confidential information of individuals. Many studies have been proposed on this topic from various perspectives, namely sociological, economic, legal, and technological. We have recognized the legal perspective as being the basis of all other perspectives. Actually, data protection regulations set the legal principles and requirements that must be met by organizations when processing personal data. The objective of this work is to provide a reference base for the development of methodologies tailored to design privacy-aware systems to be compliant with data protection regulations.Information and Software Technology 02/2009; 51(2-51):337-350. DOI:10.1016/j.infsof.2008.04.004 · 1.05 Impact Factor
- "In the case of non-compliance with applicable laws, an organization may be administratively sanctioned; also, a person who has suffered damage because of a deviation from these norms may claim compensation. Legal incidents do not have only legal and financial consequences for an organization, but also affect the trust that people feel towards the organization . Very often, organizations impose the full burden of devising a regulation-compliant product on software designers and system administrators that do not have any legal education . "
Conference Paper: Why Eliciting and Managing Legal Requirements Is Hard[Show abstract] [Hide abstract]
ABSTRACT: The increasing complexity of IT systems and the growing demand for regulation compliance are main issues for the design of IT systems. Addressing these issues requires the developing of effective methods to support the analysis of regulations and the elicitation of any organizational and system requirements from them. This work investigates the problem of designing regulation-compliant systems and, in particular, the challenges in eliciting and managing legal requirements.Requirements Engineering and Law, 2008. RELAW '08.; 10/2008