E-COMMERCE AND SECURITY

E-commerce became an important tool ıtsed by the companies in order to communicate customers directly and satisfy theır personalized needs and requirements. Although e-commerce and its importance are increasing rap'ıdly, it is well behind its potential. The main reason for its slow development is the security. The ultimate success of e-commerce will depend, to a great extent, on the interest and confidence of consumers. The issue of security is not an easy problem and there are no definitive solutions to it. There will always be a fıerce computation betıveen people trying to protect their assets and people trying to defeat these protections. This will be a never-ending story. In this paper, direct nıarketing, Online marketing and e-commerce are defıned; security issues are addressed; the existing security technologies in e-commerce are reviewed and finally, the paper is concluded with a general discussion about the achievability of security in e-commerce.

___

  • [1] Kotler, P., & Armstrong, G. (2001). Principles of Marketing. 9th Edition. New Jersey: Prentice Hall.
  • [2] Jobber, D. (1995). Principles and Practice of Marketing, Berkshire: McGraw-Hill Book Company.
  • [3] Brooksbank, D., Thomas, B., Packham, G., & Morse, L. (2002). E-Commerce and Small and Medium-Sized Enterprises in South East Wales; A Clear Case for Intervention?”. Working Paper, ISBA National Small Firms Policy & Research Conference, Brighton.
  • [4] Oppliger, R. (1999). Shaping the research agenda for security in E-commerce. 10lh International Workshop on Database and Expert Systems Applications, Italy.
  • [5] Mavridis, I., Pangalos, G., Koukouvinos, T., & Muftic, S. A secure payment system for Electronic Commerce. (infolab.gen.auth.gr/Phd/mavridis/DEXA99.pdf).
  • [6] Stallings, W. (2003). Network Security Essentials: Applications and Standards. 2nd Ed. New Jersey: Prentice Hali.
  • [7] Hofacker, C.F. (2001). Internet Marketing, Third Edition, New Jersey: John Wiley & Sons.
  • [8] Win, B.D., Bergh, J.V.D., Matthijs, F., Decker B.D., & Joosen, W. (2000). A Security Architecture for e-commerce applications. (http://www. cs.kuleiiven.ac.be/~bartd/ PAPERS/bdw-sec2000.ps.gz).
  • [9] Marchany, R.C., & Tront, J.G. (2002). E-Commerce Security Issues. Proc. of the 358 9 10 11’ Hawaii International Conference on System Sciences, p. 193. (http://csdl.comouter.org/comp/nroceedings/hics/2002/143/ 5/07/14350193.odf)
  • [10] Sahuguet, A. (1998). Piracy: The dark side of Electronic Commerce. CIS-700/2 University of Pennsylvania.
  • [11] Ghosh, A.K. Securing Electronic Commerce: Exposing the Weak Links. Reliable Software Technologies Corporation. (httD://www.rstcorp.com/~anup/IBconf.DS~l.
  • [12] Kailer, R. (2003). Accountability in Electronic Commerce Protocols. Proceedings of the IEEE Symposium on Security and privacy, pp.200-205.
  • [13] Ettredge, M., & Richardson, V.J. (2002). Assessing the Risk in E-Commerce. Proc. of the 35"' Hawaii. International Conference on System Sciences, p.194. (http://csdl.computer.org/comp/proceedings.4iics/2002/143/ 5/07/14350194.pdf)
  • [14] Hassler, V. (2001). Security Fundamentals for E-Commerce. Norwood: Artech House Computer Security Series.
  • [15] Liew, C.C., Ng, W.K., Lim, E.P, Tan, B.S., & Ong, K.L. (1999). Non-repudiation in Agent-Based Electronic Commerce System. IEEE I0'h International Workshop on Database and Expert Systems Applications, pp.864-869. (http://csdl.computer.org/comp/proceedings/dexa/ 1999/0281/00/02810864.pdf)
  • [16] Peeples, D.K. (2002). Instilling Consumer Confıdence in E- Commerce. S.A.M. Advanced Management Journal, 67(4), pp.26-32.
  • [17] Bishop, M. (2003). Computer Security: Art and Science, Boston: Addison Wesley.
  • [18] Pfleeger, C.P., & Pfleeger, S.L. (2003). Security in Computing. 3rd Ed. New Jersey: Prentice-Hall.
  • [19] Matsuura, J.H. (2002). Security, Rights, and Liabilities in e-commerce. Norwood: Artech House.
  • [20] McCrohan, Kevin F. (2003), Facing the Threats to Electronic Commerce. The Journal of Business & Industrial Marketing. 18(2/3), pp.133-146.
  • [21] Kaufman, C., Perlman, R., & Speciner, M. (2002). Network Security: Private Communication in a Public World. 2"d Ed. New Jersey: Prentice-Hall.
  • [22] ITO. (2002). Dünyada ve Türkiye 'de Elektronik Ticaret ve Vergilendirilmesi. İstanbul: İstanbul Ticaret Odası Yayınları, 6.