Secure Internet-based Electronic Commerce: The View from Outside the US
نویسنده
چکیده
Because of a number of well-publicised computer break-ins there has been a steadily increasing demand for encryption and related security measures to be included in software products. Unfortunately these measures often consist either of “voodoo security” techniques where security is treated as a marketing checkbox only, or are rendered ineffective by the US governments refusal to allow non-Americans access to the same security measures which it allows its own citizens, making the current electronic commerce infrastructure a target-rich environment for attackers. Organisations employing such (in)security systems may make themselves liable for damages or losses incurred when they are compromised. This paper covers the issues of using weak, US government-approved security as well as problems with flawed security measures, examines some of the measures necessary to provide an adequate level of security, and then suggests several possible solutions.
منابع مشابه
Research Report Open Issues in Secure Electronic Commerce Limited Distribution Notice Open Issues in Secure Electronic Commerce
This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and speciic requests. After outside...
متن کاملInternet Banking Law: An Iranian Perspective Problems and Prospects of Introducing Islamic Microfinance in Azerbaijan Republic
Bank supervision and monetary policy are strategic concepts in the economy of countries. Development of electronic communications, especially in online and international spheres, has largely threatened financial services in view of security and illegal access to banking networks. Anonymity and identity theft has endangered electronic commerce by crimes like phishing, fraud and different types...
متن کاملEnd User Acceptance of Security Technology for Electronic Commerce
This paper examines the current advantages and limitations of the developing Global Information Infrastructure (GII) for commerce from the point of view of today’s players. It is based on the interim results of an Expert Survey being carried out as part of the ACTS project SEMPER (Secure Electronic Marketplace for Europe). The findings can be broadly categorised as ‘network’ and ‘non-network’ i...
متن کاملAn analysis of fraud on the Internet
This paper examines the issue of fraud on the Internet and discusses three areas with significant potential for misleading and fraudulent practices, namely: securities sales and trading; electronic commerce; and the rapid growth of Internet companies. The first section of the paper discusses securities fraud on the Internet. Activities that violate US securities laws are being conducted through...
متن کاملA Technique for Behavior Testing of SET Payment Based on Petri Nets
By secure electronic transaction (SET) protocol, business and customers can construct different electronic commerce models on the Internet. In this paper, we propose a method based on Petri net models and techniques of software engineering to detect unusual electronic commerce transactions. Users can construct all electronic commerce transactions of business and customers by SET. Because of fea...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998