Skip to main content

Cryptographic Systems and Threats in e-Commerce

  • Conference paper
  • First Online:
Internet of Things, Infrastructures and Mobile Applications (IMCL 2019)

Abstract

XXI century companies must adapt their business models to run on the internet. At present the transactions made on the WWW are countless ideas of commercial applications on it seem endless. This paper describes the concepts related to the terminology used in e-commerce, cryptosystems that are used to protect information, new attacks on cryptosystems and the main strategies to give users confidence and trust on transactions for buying and selling, which are the problems to be solved by information technology. This study concludes with recommendations related to creating new philosophies to online businesses, involving government policies and security, in order to pass the physical trading of e-Business with complete confidence by the end customer.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Carr, N.: Automation for the people? Glass Cage Autom. US 276 (2014)

    Google Scholar 

  2. Ferreiro, T., Mario, T.: El Comercio Electrónico en Internet. Distribución Consumo (1997)

    Google Scholar 

  3. Kane, G., Palmer, D., Philips, N., Kiron, D.: Is your business ready for a digital future? ProQuest (2015)

    Google Scholar 

  4. Alpert, S., Karat, J., Karat, C.-M., Brodie, C., Vergo, J.: User attitudes regarding a user-adaptiv ecommerce web site. User Model. User-Adapt. Interact. 13(4), 373–396 (2003)

    Article  Google Scholar 

  5. Gong, S., Wang, Y.: Research on security strategy of electronic commerce industry websites. In: International Conference on Advances in Mechanical Enginnering and Industrial Informatics (2015)

    Google Scholar 

  6. Payam, B., Sheth, A., Singh, V., Hauswirth, M.: Physical-cyber- social computing: looking back, looking forward. Internet Comput. 19, 7–11 (2015)

    Google Scholar 

  7. Laru, J., Naykki, P., Jarvela, S.: Four stages of research on the educational use of ubiquitous computing. Learn. Technol. 81, 69–82 (2015)

    Google Scholar 

  8. Redacción. (09 de Febrero de 2016). Comunicaciones hoy. Obtenido de Comunicaciones hoy: http://profesionaleshoy.es/tics/2016/02/09/los-bancos-se-enfrentan-a-tres-nuevos-ciberataques-carbanak-2–0-metel-y-gcman/19216

  9. Laudon, K., Laudon, J.: Sistemas de información gerencial. Organización y tecnología de la empresa conectada en red. Printice hall, México (2002)

    Google Scholar 

  10. Guillén, E.P., Navarro Gasca, J.J.: Sistema de distribución de claves mediante criptografía cuántica para evadir ataques del tipo “Man in the middle”. Ciencia e Ingeniería Neogranadina 16, 64–73 (2006)

    Article  Google Scholar 

  11. Reitsma, R.: Which Market Leads In En l´ınea Retail Sales: UK or US? Forrester, Cambridge (2012)

    Google Scholar 

  12. Instituto Latinoamericano de Comercio Electrónico. (3 de Diciembre de 2015). El eCommerce en América Latina se enfrenta a dos mitos. Buenos Aires, Buenos Aires, Argentina

    Google Scholar 

  13. Rodríguez, M., Peterson, R., Ajjan, H.: Crm/Social Media technology: impact on customer orientation process and organizational sales permormance. In: Finding the New and Polishing the Old, pp. 636–638 (2014)

    Google Scholar 

  14. Martínez, S.: Plan de negocios para la creación de MediaSuite: comercio electrónico, social media y mobile marketing. Universidad de San Andres, Buenos Aires (2015)

    Google Scholar 

  15. Sila, I.: The state of empirical research on the adoption and difussion of business-to-business comercio electrónico. IndeScience (2015)

    Google Scholar 

  16. Guang, W., Pinsonnealult, A., Tomiuk, D., Wang, S., Liu, Y.: The impacts of social trust on open and closed B2B comercio electro´nico: a Europe-based study. Inf. Manag. 52, 151–159 (2015)

    Article  Google Scholar 

  17. Sobihah, M., Mohamad, M., Azman, N., Wan Ismail, Z.: Comercio electrónico service quality on customer satisfaction, belief and loyalty: a proposal. Mediterr. J. Soc. Sci. 6, 260 (2015)

    Google Scholar 

  18. Aguiar, R., Benhabiles, N., Pfeiffer, T., Rodriguez, P., Viswanathan, H., Wang, J., Zang, H.: Big data, loT,…buzz words for academia or reality for industry. In: MobiCom, pp. 550–551. ACM, New York (2015)

    Google Scholar 

  19. Judge, S., Floyd, K., Jeffs, T.: Using mobile media devices and apps to promote young children’s learning. In: Young Children and Families in the Information Age (2014)

    Google Scholar 

  20. Lala, H.: Blog, news, and ecommerce: does genre matter for taggers? North Am. Symp. Knowl. Organ. 4, 88–99 (2013)

    Google Scholar 

  21. Rahm, L., Fejes, A.: Ubiquitous computing, digital failure and citizenship learning in Swedish popular education. Citezensh. Teach. Learn. 10, 127–141 (2015)

    Article  Google Scholar 

  22. Castro, V.: Innovation Importance Across Dimensions for Business-to-Business and Business-to-Consumer Firms: A Case Study- Based Analysis. Wharton University, Pensylvania (2015)

    Google Scholar 

  23. Rahmani, A., Thanigaivelan, N., Tuan Nguyen, G., Granados, J.: Smart e-health gateway: bringing intelligence to internet-of-things based ubiquitous healthcare systems. In: Consumer Communications and Networking Conference, pp. 826–834. IEEE, Las vegas (2015)

    Google Scholar 

  24. Doryab, A., Frost, M., Faurholt-Jepsen, M., Kessing, L.V., Bardram, J.E.: Impact factor analysis: combining prediction with parameter ranking to reveal the impact of behavior on health outcome. Pers. Ubiquit. Comput. 19(2), 355–365 (2014). https://doi.org/10.1007/s00779-014-0826-8

    Article  Google Scholar 

  25. Barbosa, C.A., Tibaquira, Y.A., Montiel, C.G.: Implementación del criptosistema de curva elíptica en un prototipo de aplicación móvil para Comercio electrónico. Revista Tekhne 8, 5–12 (2011)

    Google Scholar 

  26. Vaananen, K., Olsson, T., Hakkila, J.: Towards Deeper understanding of user experience with ubiquitous computing systems: systematic literature review and design framework. In: Human-Computer Interaction, pp. 384–401 (2015)

    Google Scholar 

  27. Silva, F., Analide, C., Novais, P.: Traffic expression through ubiquitous and pervasive sensorizatin - smart cities and assesment of driving behaviour. In: International Conference on Pervasive and Embedded Computing and Comunication Systems. ESEO, Angers (2015)

    Google Scholar 

  28. Palau, C.M.: El comercio electro´nico como estrategia de negocio. Economía Ind. 326, 11–20 (1999)

    Google Scholar 

  29. Elliot, C.: Quantum cryptography. IEEE Secur. Priv. 2, 57–61 (2004)

    Article  Google Scholar 

  30. Leonard, L., Jones, K.: Consumer to consumer ecommerce: acceptance and intended behavior. CIIMA 14, 1 (2015)

    Google Scholar 

  31. Pradyut, V,H., Debleena, G., Atin, G.: A comparative study on factors shaping buying behaviour on B2B and B2C comercio electrónico platforms in India. J. Mark. Consum. Res. 5, 1–10 (2015)

    Google Scholar 

  32. Rianto, L., Nugroho, L., Santosa, I.: Analysis of Comercio electrónico user behaviour of indonesian students: a preliminary study of adaptive comercio electrónico. In: Computational intelligence and Efficienty in Enginnering Systems, pp. 365–375 (2015)

    Google Scholar 

  33. Turban, E., King, D., Lee, J., Liang, T.-P., Turban, D.: Marketing and advertising in comercio electrónico. Bus. Econ., 403–456 (2015)

    Google Scholar 

  34. Liu, C., Mackie, B.: Developing secutiry for comercio electrónico applications: a teaching case. Commun. IIMA (2004)

    Google Scholar 

  35. Meng, Y.-Q.: Study on the information security based on comercio electrónico. In: International Conference on Advances in Mechanical Enginnering and Industrial Informatics (2015)

    Google Scholar 

  36. Wang, G., Musau, F., Guo, S., Andullahi, M.: Neighbor similarity trust against sybil attack in P2P comercio electrónico. Para. Distrib. Syst., 1045–9219 (2015)

    Google Scholar 

  37. Lu, S., Smolka, S.: Model checking the secure electronic trans- action (SET) protocol. In: Modeling, Analysis and Simulation of Computer and Telecomunication Systems, pp. 358–364. IEEE, College Park (1999)

    Google Scholar 

  38. Kanhekar, H., Mane, S.: Digital wallet. Wireless and Microwave Technology 4, 62–68 (2015)

    Article  Google Scholar 

  39. Pasandideh, M., Motahhari-Nejad, H.: Approach to Comercio electrónico in communications era. J. Soc. Issues Humanit. (2014)

    Google Scholar 

  40. Torres, M.B.: Formas contractuales en el comercio electrónico. Información Comercial Española ICE Revista de economía, 173–186 (2004)

    Google Scholar 

  41. Montoya, F.: Testimonio de medio siglo: de la Per lustración al Cifrado cuántico. In: RECSI 2012 (2012)

    Google Scholar 

  42. Orue López, A.B.: Contribución al estudio del criptoanálisis y diseño de los cripto sistemas cuánticos, Madrid (2013)

    Google Scholar 

  43. González, S., Martínez, C.: Las matemáticas de la seguridad. Arbor Ciencia Pensamiento y Cultura 183, 419–425 (2007)

    Google Scholar 

  44. Salsona, M.: EEUU ante el reto de los ciberataques. IEEE 37 (2013)

    Google Scholar 

  45. Alpert, S., Karat, J., Karat, C.-M., Brodie, C., Vergo, J.: User attitudes regarding a user-adaptive ecommerce web site. User Model. User-Adapt. Interact. 13, 373–396 (2003)

    Article  Google Scholar 

  46. Bonneau, J., Herley, C., Oorschot, P., Stajano, F.: Passwrods and the evolution of imperfect authentication. Commun. ACM 58, 78–87 (2015)

    Article  Google Scholar 

  47. Islam, S.: An algorithm for electronic money transaction secutiry (three layer secutiry): a new approach. Int. J. Secur. Appl. 9, 203–214 (2015)

    Google Scholar 

  48. Sánchez, J., Correa, R., Buenano, H., Arias, S.Y., Gómez, H.: Técnicas de cifrado: una descripción teórica y futuras propuestas. In: 2016 Tercera Conferencia Internacional sobre eDemocracia y Administración Electrónica (ICEDEG) (2016). https://doi.org/10.1109/icedeg.2016.7461697

  49. Guerrero, J.S., Albán, R.V., Guachimboza, M., Quinde, C.P., Ríos, M.N., Ruiz, L.A.J.: Cryptography applied to the internet of things. In: Teaching and Learning in a Digital World, Advances in Intelligent Systems and Computing, vol. 715 (2017). https://doi.org/10.1007/978-3-319-73210-7_47

  50. Buenano, H., Guachimbosa V.V.H., Ruiz, J., Mera, J.S., Guerrero, J.S.: A reliable security alternative: quantum cryptography. In: 2019 Sixth International Conference on eDemocracy & eGovernment (ICEDEG) (2019). https://doi.org/10.1109/icedeg.2019.8734385

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Javier Sánchez Guerrero .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sánchez Guerrero, J., Carrillo Ríos, S., García Herrera, D., Mocha-Bonilla, J. (2021). Cryptographic Systems and Threats in e-Commerce. In: Auer, M.E., Tsiatsos, T. (eds) Internet of Things, Infrastructures and Mobile Applications. IMCL 2019. Advances in Intelligent Systems and Computing, vol 1192. Springer, Cham. https://doi.org/10.1007/978-3-030-49932-7_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-49932-7_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-49931-0

  • Online ISBN: 978-3-030-49932-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics