Privacy Threats in E-Shopping (Position Paper)
نویسندگان
چکیده
E-shopping has grown considerably in the last years, providing customers with convenience, merchants with increased sales, and financial entities with an additional source of income. However, it may also be the source of serious threats to privacy. In this paper, we review the e-shopping process, discussing attacks or threats that have been analyzed in the literature for each of its stages. By showing that there exist threats to privacy in each of them, we argue our following position: “It is not enough to protect a single independent stage, as is usually done in privacy respectful proposals in this context. Rather, a complete solution is necessary spanning the overall process, dealing also with the required interconnections between stages.” Our overview also reflects the diverse types of information that e-shopping manages, and the benefits (e.g., such as loyalty programs and fraud prevention) that system providers extract from them. This also endorses the need for solutions that, while privacy preserving, do not limit or remove these benefits, if we want prevent all the participating entities from rejecting it.
منابع مشابه
An Economic Model of the Consumers' Online Shopping Utility and Factors Affecting on Online Shopping
This paper integrates extant literature on retailing and consumer choice to develop an economic model of consumer choice in which a consumer self-selects on-line shopping. Three important factors impacting consumer choice of on-line shopping: (1) the online shopping utility (2) the consumers’ perceived product and service risks (Perceived Privacy Protection, Perceived Security Protection etc.) ...
متن کاملSupply-side hurdles in Internet B2C e-commerce: an empirical investigation
Given Hong Kong’s special circumstances of small physical size, advanced infrastructure, and low shopping cost, a survey is designed under which supply-side problems in Internet business-to-consumer (B2C) e-commerce are indirectly revealed by responses on the demand side. Difficulties arising from the reluctance to answer questionnaires on the part of e-firms wary about trade and innovation sec...
متن کاملThe Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy
The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a ...
متن کاملE-shopping and in-store shopping status in Tehran: Can e-shopping reduce traffic in the future?
Nowadays Information and Communication Technology effects on all aspects of human activities, such as teleworking, electronic commerce, electronic banking, electronic learning, etc. the most of these services can prevent unnecessary travels in cities especially in rush hour. The aim of this study is to explore the frequency of electronic shopping and in-store shopping in Tehran, according to ge...
متن کاملPrivacy Preserving Architectures for Collaborative Intrusion Detection
Collaboration among multiple organizations is imperative for contemporary intrusion detection. As modern threats become well sophisticated it is difficult for organizations to defend with threat context local to their networks alone. Availability of global threat intelligence is must for organizations to defend against modern advanced persistent threats (APTs). In order to benefit from such glo...
متن کامل