Abstract
XXI century companies must adapt their business models to run on the internet. At present the transactions made on the WWW are countless ideas of commercial applications on it seem endless. This paper describes the concepts related to the terminology used in e-commerce, cryptosystems that are used to protect information, new attacks on cryptosystems and the main strategies to give users confidence and trust on transactions for buying and selling, which are the problems to be solved by information technology. This study concludes with recommendations related to creating new philosophies to online businesses, involving government policies and security, in order to pass the physical trading of e-Business with complete confidence by the end customer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Carr, N.: Automation for the people? Glass Cage Autom. US 276 (2014)
Ferreiro, T., Mario, T.: El Comercio Electrónico en Internet. Distribución Consumo (1997)
Kane, G., Palmer, D., Philips, N., Kiron, D.: Is your business ready for a digital future? ProQuest (2015)
Alpert, S., Karat, J., Karat, C.-M., Brodie, C., Vergo, J.: User attitudes regarding a user-adaptiv ecommerce web site. User Model. User-Adapt. Interact. 13(4), 373–396 (2003)
Gong, S., Wang, Y.: Research on security strategy of electronic commerce industry websites. In: International Conference on Advances in Mechanical Enginnering and Industrial Informatics (2015)
Payam, B., Sheth, A., Singh, V., Hauswirth, M.: Physical-cyber- social computing: looking back, looking forward. Internet Comput. 19, 7–11 (2015)
Laru, J., Naykki, P., Jarvela, S.: Four stages of research on the educational use of ubiquitous computing. Learn. Technol. 81, 69–82 (2015)
Redacción. (09 de Febrero de 2016). Comunicaciones hoy. Obtenido de Comunicaciones hoy: http://profesionaleshoy.es/tics/2016/02/09/los-bancos-se-enfrentan-a-tres-nuevos-ciberataques-carbanak-2–0-metel-y-gcman/19216
Laudon, K., Laudon, J.: Sistemas de información gerencial. Organización y tecnología de la empresa conectada en red. Printice hall, México (2002)
Guillén, E.P., Navarro Gasca, J.J.: Sistema de distribución de claves mediante criptografía cuántica para evadir ataques del tipo “Man in the middle”. Ciencia e Ingeniería Neogranadina 16, 64–73 (2006)
Reitsma, R.: Which Market Leads In En l´ınea Retail Sales: UK or US? Forrester, Cambridge (2012)
Instituto Latinoamericano de Comercio Electrónico. (3 de Diciembre de 2015). El eCommerce en América Latina se enfrenta a dos mitos. Buenos Aires, Buenos Aires, Argentina
Rodríguez, M., Peterson, R., Ajjan, H.: Crm/Social Media technology: impact on customer orientation process and organizational sales permormance. In: Finding the New and Polishing the Old, pp. 636–638 (2014)
Martínez, S.: Plan de negocios para la creación de MediaSuite: comercio electrónico, social media y mobile marketing. Universidad de San Andres, Buenos Aires (2015)
Sila, I.: The state of empirical research on the adoption and difussion of business-to-business comercio electrónico. IndeScience (2015)
Guang, W., Pinsonnealult, A., Tomiuk, D., Wang, S., Liu, Y.: The impacts of social trust on open and closed B2B comercio electro´nico: a Europe-based study. Inf. Manag. 52, 151–159 (2015)
Sobihah, M., Mohamad, M., Azman, N., Wan Ismail, Z.: Comercio electrónico service quality on customer satisfaction, belief and loyalty: a proposal. Mediterr. J. Soc. Sci. 6, 260 (2015)
Aguiar, R., Benhabiles, N., Pfeiffer, T., Rodriguez, P., Viswanathan, H., Wang, J., Zang, H.: Big data, loT,…buzz words for academia or reality for industry. In: MobiCom, pp. 550–551. ACM, New York (2015)
Judge, S., Floyd, K., Jeffs, T.: Using mobile media devices and apps to promote young children’s learning. In: Young Children and Families in the Information Age (2014)
Lala, H.: Blog, news, and ecommerce: does genre matter for taggers? North Am. Symp. Knowl. Organ. 4, 88–99 (2013)
Rahm, L., Fejes, A.: Ubiquitous computing, digital failure and citizenship learning in Swedish popular education. Citezensh. Teach. Learn. 10, 127–141 (2015)
Castro, V.: Innovation Importance Across Dimensions for Business-to-Business and Business-to-Consumer Firms: A Case Study- Based Analysis. Wharton University, Pensylvania (2015)
Rahmani, A., Thanigaivelan, N., Tuan Nguyen, G., Granados, J.: Smart e-health gateway: bringing intelligence to internet-of-things based ubiquitous healthcare systems. In: Consumer Communications and Networking Conference, pp. 826–834. IEEE, Las vegas (2015)
Doryab, A., Frost, M., Faurholt-Jepsen, M., Kessing, L.V., Bardram, J.E.: Impact factor analysis: combining prediction with parameter ranking to reveal the impact of behavior on health outcome. Pers. Ubiquit. Comput. 19(2), 355–365 (2014). https://doi.org/10.1007/s00779-014-0826-8
Barbosa, C.A., Tibaquira, Y.A., Montiel, C.G.: Implementación del criptosistema de curva elíptica en un prototipo de aplicación móvil para Comercio electrónico. Revista Tekhne 8, 5–12 (2011)
Vaananen, K., Olsson, T., Hakkila, J.: Towards Deeper understanding of user experience with ubiquitous computing systems: systematic literature review and design framework. In: Human-Computer Interaction, pp. 384–401 (2015)
Silva, F., Analide, C., Novais, P.: Traffic expression through ubiquitous and pervasive sensorizatin - smart cities and assesment of driving behaviour. In: International Conference on Pervasive and Embedded Computing and Comunication Systems. ESEO, Angers (2015)
Palau, C.M.: El comercio electro´nico como estrategia de negocio. Economía Ind. 326, 11–20 (1999)
Elliot, C.: Quantum cryptography. IEEE Secur. Priv. 2, 57–61 (2004)
Leonard, L., Jones, K.: Consumer to consumer ecommerce: acceptance and intended behavior. CIIMA 14, 1 (2015)
Pradyut, V,H., Debleena, G., Atin, G.: A comparative study on factors shaping buying behaviour on B2B and B2C comercio electrónico platforms in India. J. Mark. Consum. Res. 5, 1–10 (2015)
Rianto, L., Nugroho, L., Santosa, I.: Analysis of Comercio electrónico user behaviour of indonesian students: a preliminary study of adaptive comercio electrónico. In: Computational intelligence and Efficienty in Enginnering Systems, pp. 365–375 (2015)
Turban, E., King, D., Lee, J., Liang, T.-P., Turban, D.: Marketing and advertising in comercio electrónico. Bus. Econ., 403–456 (2015)
Liu, C., Mackie, B.: Developing secutiry for comercio electrónico applications: a teaching case. Commun. IIMA (2004)
Meng, Y.-Q.: Study on the information security based on comercio electrónico. In: International Conference on Advances in Mechanical Enginnering and Industrial Informatics (2015)
Wang, G., Musau, F., Guo, S., Andullahi, M.: Neighbor similarity trust against sybil attack in P2P comercio electrónico. Para. Distrib. Syst., 1045–9219 (2015)
Lu, S., Smolka, S.: Model checking the secure electronic trans- action (SET) protocol. In: Modeling, Analysis and Simulation of Computer and Telecomunication Systems, pp. 358–364. IEEE, College Park (1999)
Kanhekar, H., Mane, S.: Digital wallet. Wireless and Microwave Technology 4, 62–68 (2015)
Pasandideh, M., Motahhari-Nejad, H.: Approach to Comercio electrónico in communications era. J. Soc. Issues Humanit. (2014)
Torres, M.B.: Formas contractuales en el comercio electrónico. Información Comercial Española ICE Revista de economía, 173–186 (2004)
Montoya, F.: Testimonio de medio siglo: de la Per lustración al Cifrado cuántico. In: RECSI 2012 (2012)
Orue López, A.B.: Contribución al estudio del criptoanálisis y diseño de los cripto sistemas cuánticos, Madrid (2013)
González, S., Martínez, C.: Las matemáticas de la seguridad. Arbor Ciencia Pensamiento y Cultura 183, 419–425 (2007)
Salsona, M.: EEUU ante el reto de los ciberataques. IEEE 37 (2013)
Alpert, S., Karat, J., Karat, C.-M., Brodie, C., Vergo, J.: User attitudes regarding a user-adaptive ecommerce web site. User Model. User-Adapt. Interact. 13, 373–396 (2003)
Bonneau, J., Herley, C., Oorschot, P., Stajano, F.: Passwrods and the evolution of imperfect authentication. Commun. ACM 58, 78–87 (2015)
Islam, S.: An algorithm for electronic money transaction secutiry (three layer secutiry): a new approach. Int. J. Secur. Appl. 9, 203–214 (2015)
Sánchez, J., Correa, R., Buenano, H., Arias, S.Y., Gómez, H.: Técnicas de cifrado: una descripción teórica y futuras propuestas. In: 2016 Tercera Conferencia Internacional sobre eDemocracia y Administración Electrónica (ICEDEG) (2016). https://doi.org/10.1109/icedeg.2016.7461697
Guerrero, J.S., Albán, R.V., Guachimboza, M., Quinde, C.P., Ríos, M.N., Ruiz, L.A.J.: Cryptography applied to the internet of things. In: Teaching and Learning in a Digital World, Advances in Intelligent Systems and Computing, vol. 715 (2017). https://doi.org/10.1007/978-3-319-73210-7_47
Buenano, H., Guachimbosa V.V.H., Ruiz, J., Mera, J.S., Guerrero, J.S.: A reliable security alternative: quantum cryptography. In: 2019 Sixth International Conference on eDemocracy & eGovernment (ICEDEG) (2019). https://doi.org/10.1109/icedeg.2019.8734385
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Sánchez Guerrero, J., Carrillo Ríos, S., García Herrera, D., Mocha-Bonilla, J. (2021). Cryptographic Systems and Threats in e-Commerce. In: Auer, M.E., Tsiatsos, T. (eds) Internet of Things, Infrastructures and Mobile Applications. IMCL 2019. Advances in Intelligent Systems and Computing, vol 1192. Springer, Cham. https://doi.org/10.1007/978-3-030-49932-7_47
Download citation
DOI: https://doi.org/10.1007/978-3-030-49932-7_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-49931-0
Online ISBN: 978-3-030-49932-7
eBook Packages: EngineeringEngineering (R0)