Critical Literature Review of Cyber Security for E commerce Online Business
Data security and information security is the most significant part of the processing business for long-term prospects. Depending on the basis of the Data Protection Act of a country, it can be relied upon by implementing data security applications within the business, especially in E-commerce platforms.
According to the market analysis, it has been observed that due to the growing number of online transactions, there has been unauthorized access to the profile of the customers worldwide through some viruses as well as spamming attacks (Ji, 2018). This has created major issues within the business platforms as well as become a threat to the E-commerce business owners in the market.
Based on this above analysis, the objectives of this research would be:-
- To identify the significant type of cyber attacks being faced by the E-commerce leaders in the market.
- To examine the access points from where cyber attacks occurs in the E-commerce business platform.
- To provide strategic and operational applications suitable for minimizing the possibility of cyber threats in business
The research is carried out by considering two hypotheses:
- Hypothesis 1:
- Null Hypothesis (H0): There is no relationship between E-commerce and Secured Electronic Transaction (SET) when tested through Cloud-based automation test.
- Alternate Hypothesis (H1): There is a relationship between E-commerce and Secured Electronic Transaction (SET) when tested through Cloud-based automation test.
- Hypothesis 2:
- Null Hypothesis (H0): There is no relationship between Hyper Text-Transfer Protocol and Secured Electronic Transaction (SET) when tested through Cloud-based automation test Alternate Hypothesis (H1): There is no relationship between Hyper Text-Transfer Protocol and Secured Electronic Transaction (SET) when tested through Cloud-based automation test.
Cyber Security issues and challenges are important aspects of E-commerce leaders in the market. According to Tracy (2019), having malicious access to a variety of codes transferring process, there is a scope of replication of data into the system. On the other hand, Sharma, Gupta & Khanna, (2019), argued that using the medium of Data Encryption also gives possibility of getting hacked in an E-commerce business. This can be recognized on the basis of the fact that most of the viruses enters into a system through malicious code itself that remains in the form of cipher and intends to enter within the encrypted data so that it derive data. For example, Hacking and Cyber Vandalism is one such activity that involves such tricks.
The key factors responsible for E-commerce are the process of online transactions as well as adding into Cart and providing open scope of entrance to the system. Prisha et al. (2017), opined that entrance of cyber attackers reduces the power of the system as well as stops in between. An Operationalized Cyber security theory, includes strategic way of solving threats and attacks within the cyber world of business for finding solutions covering the cyber, attacks (Ionita et al., 2019).
Using the operational implications by E-commerce leaders in the market can enhance the operations well in the organization. Emerging tools of anti-malware detection can be suitable strategic implication that can reduce the possibility of attack.
The key access security issues occurring for E-commerce Giants in the market in using cloud computation program:
According to the article, Khan (2019), E-commerce fears from monetary losses resulting in terrible exposure as well as break-ins. In other words, in case of E-commerce platforms, it cannot be accepted with any secondary options or scope of having this work done under authoritative processes for chance management. In this regard, it can be acknowledged that users may store data or files that are encrypted and those are vulnerable to machines and employees while accessing it into machines. These are mainly the issues with as follows:-
- Unwanted entrance: Ronchi (2018), stated that this is one such area from where data can be traced by an unwanted and malignant intention for the purpose of utilizing it in attacking confidential files. However, passive unauthorized access; it cannot be used by hackers as well. This can be conducted through the process of listening through correspondence channels as well. This kind of listening part can be beneficial for listening about the information details.
- Service Denial: This is another area of getting hacked within system through sending of spam emails to any users. Huang, Siegel & Madnick (2018), commented that a large number of surprising mails can be a scope of entering into the customer profile. For example, using the help of Distributed Denial of Service Attacks, it involves a variety of hacking instruments in the overall process so that it can be easily put into the system through software agents. In other words, it keeps on sending simultaneously an intended target request to its software agents. Hence, this can be done through multiplying into variety of other viruses from one particular virus.
- Replicating of virus into the system:
Mancino (2016), opined that replication of the virus in a system takes place through an Internet connection as well as Trojan Horses that are in disguise as well as legitimate software that can be used up by the hackers. However, theft and fraud is another path of stealing information. This kind of activity can be done by breaking into insecure storage devices as well as ready to harvest some of the archival data that exists in the customers’ credit card numbers during online purchases.
Justification of Secured Electronic Transaction and E-commerce:
There is an authentic relationship between SET and E-commerce. Mancino (2016), it can be acknowledged that this relationship exists for the purpose of knowing about the detailed process of online transaction. In other words, it can be done through digital certification as well as signed documents issued by the computerized signature. In this respect, it can be identified that, as per the deeper understanding of this fact cyber security has been considered to be an omnipresent issues everywhere. This is because; a large number of associations are involved in this long chain of cyber world network. Despite of this authenticated online transaction, it cannot be completely controlled. Hence, it determines the fact that SET having a strong relationship with an E-commerce giant.
Based on the above context, it can be well acknowledged that cybersecurity issues can also appear through the relationship between Hypertext Transfer Protocol is basically a secure message-oriented interchange that is conventional in design as well as signed authentically during the online transaction process. Abdullah et al. (2019), commented that messages in an encrypted version can be traced again within the online way of payment or dealing with any information. It means it happens in a similar way like SET that during the time of any data transaction, it appears to be quite authentic in appearance; however, it gets hacked through simply during the time of digital signature or during the time of message-oriented interchanges.
Based on the understanding of the concept, it can be acknowledged that cyber Security issues can occur based due to the number of phishing works as well as due to the absence of anti-security options. However, using this strategic vision of the literature, it can be less effective, as it might not cover large volume of research for acknowledging large volume of data as well as ethical norms as well. It can also be due to the time constraints as well.
Therefore, based on the overview of the research, it can be well organized on this very fact that Cyber Security issues can be noted this can be controlled based on strategic implementation and execution of theories and applications.
Web Access to files and generation of malicious files
Key Entry factors intro system
Cyber Security Issues in E-commerce platforms
Created By learner
The research will be based on the qualitative method of by taking a survey questionnaires asked to the number of key Board to supervise and guide its associated business E-commerce (Moore et al. 2016). In that case, it will cover near about a large volume of data from the suitable website sources as well as other secondary research.
This involves relationship analysis based on the hypothesis for analyzing the data by collecting data and information from a online survey through questionnaires. According to Khan (2019), it can be identified from the data analysis and discussion that cybercrime affects in a wider area of business transactions online. In fact, it has also tried to identify the fact that near about 54% of the organization has been a victim from the attack of cyber crime thoroughly in a society. Apart from this, it has also been recognized from the discussion that cyber security crime trends are mostly growing in the Asian countries especially in India. This has not been taken kind of serious initiatives from the end of the government as well.
Moreover, it has been acknowledged from the overall analysis that online businesses in India are growing on the right way. However, merchants are not investing on its security strongly to combat with such crimes in the metropolitan cities. In that case, regulatory framework as well strategic way of planning and devising a new way out need to be done so that it can be well tracked right at the moment of hacking.
Based on this overall process of research, it can be acknowledged that cyber security issues can have major threats to the business of E-commerce along with the implications of theory in it. In other words, as per relationship study on the variables above, it has been quite recognized from this fact that Cyber security cannot be minimized completely from business platforms. Therefore, using this brief research, it can be effective in doing further study of the issue as well.
Abdullah, L., Ramli, R., Bakodah, H. O., & Othman, M. (2019). Developing a causal relationship among factors of e-commerce: a decision making approach. Journal of King Saud University-Computer and Information Sciences.
Huang, K., Siegel, M., & Madnick, S. (2018). Systematically understanding the cyber attack business: A survey. ACM Computing Surveys (CSUR), 51(4), 1-36.
Ionita, D., van der Velden, C., Ikkink, H. J. K., Neven, E., Daneva, M., & Kuipers, M. (2019, June). Towards risk-driven security requirements management in agile software development. International Conference on Advanced Information Systems Engineering (pp. 133-144). Springer, Cham.
Khan, S. W. (2019). Cyber security issues and challenges in E-commerce. Available at SSRN 3323741.
Mancino, M. P. (2016). Cybersecurity Otherwise: Seeking Communicative Insights. Pennsylvania Communication Annual, 72(2).
Moore, D. L., Bavdaž, M., Giessen, D., Smith, P. A., & Jones, J. (2016). Development and testing of business survey questionnaires: use of qualitative methods in national statistical institutes.
Prisha, P., Neo, H. F., Ong, T. S., & Teo, C. C. (2017). E-Commerce security and identity integrity: the future of virtual shopping. Advanced Science Letters, 23 (8), 7849-7852.
Ronchi, A. (2018). 21STCENTURY CYBER WARFARE.
Sharma, P., Gupta, D., & Khanna, A. (2019). e?Commerce Security: Threats, Issues, and Methods. Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies, 61-77.
Tracy, S. J. (2019). Qualitative research methods: Collecting evidence, crafting analysis, communicating impact. John Wiley & Sons.
Ji, Q. (2018, December). Study on Information Security Issues of E-Commerce. In IOP Conference Series: Materials Science and Engineering (Vol. 452, No. 3, p. 032050). IOP Publishing.