Critical Literature Review of Cyber Security for E commerce Online Business

1. Introduction

Research Background

Data security and information security is the most significant part of the processing business for long-term prospects. Depending on the basis of the Data Protection Act of a country, it can be relied upon by implementing data security applications within the business, especially in E-commerce platforms.

Research Problem

According to the market analysis, it has been observed that due to the growing number of online transactions, there has been unauthorized access to the profile of the customers worldwide through some viruses as well as spamming attacks (Ji, 2018). This has created major issues within the business platforms as well as become a threat to the E-commerce business owners in the market.

Research Objectives

Based on this above analysis, the objectives of this research would be:-

  • To identify the significant type of cyber attacks being faced by the E-commerce leaders in the market.
  • To examine the access points from where cyber attacks occurs in the E-commerce business platform.
  • To provide strategic and operational applications suitable for minimizing the possibility of cyber threats in business

Research Hypothesis

The research is carried out by considering two hypotheses:

  • Hypothesis 1:
  • Null Hypothesis (H0): There is no relationship between E-commerce and Secured Electronic Transaction (SET) when tested through Cloud-based automation test.
  • Alternate Hypothesis (H1): There is a relationship between E-commerce and Secured Electronic Transaction (SET) when tested through Cloud-based automation test.
  • Hypothesis 2:
  • Null Hypothesis (H0): There is no relationship between Hyper Text-Transfer Protocol and Secured Electronic Transaction (SET) when tested through Cloud-based automation test Alternate Hypothesis (H1): There is no relationship between Hyper Text-Transfer Protocol and Secured Electronic Transaction (SET) when tested through Cloud-based automation test.

2. Literature Review

Significance of analyzing the cybersecurity issues and challenges in E-commerce

Cyber Security issues and challenges are important aspects of E-commerce leaders in the market. According to Tracy (2019), having malicious access to a variety of codes transferring process, there is a scope of replication of data into the system. On the other hand, Sharma, Gupta & Khanna, (2019), argued that using the medium of Data Encryption also gives possibility of getting hacked in an E-commerce business. This can be recognized on the basis of the fact that most of the viruses enters into a system through malicious code itself that remains in the form of cipher and intends to enter within the encrypted data so that it derive data. For example, Hacking and Cyber Vandalism is one such activity that involves such tricks.

Key factors responsible for an E-commerce business to have threatened by cybersecurity issues in the market

The key factors responsible for E-commerce are the process of online transactions as well as adding into Cart and providing open scope of entrance to the system. Prisha et al. (2017), opined that entrance of cyber attackers reduces the power of the system as well as stops in between. An Operationalized Cyber security theory, includes strategic way of solving threats and attacks within the cyber world of business for finding solutions covering the cyber, attacks (Ionita et al., 2019).

Using the operational implications by E-commerce leaders in the market can enhance the operations well in the organization. Emerging tools of anti-malware detection can be suitable strategic implication that can reduce the possibility of attack.

The key access security issues occurring for E-commerce Giants in the market in using cloud computation program:

            According to the article, Khan (2019), E-commerce fears from monetary losses resulting in terrible exposure as well as break-ins. In other words, in case of E-commerce platforms, it cannot be accepted with any secondary options or scope of having this work done under authoritative processes for chance management. In this regard, it can be acknowledged that users may store data or files that are encrypted and those are vulnerable to machines and employees while accessing it into machines. These are mainly the issues with as follows:-

  • Unwanted entrance: Ronchi (2018), stated that this is one such area from where data can be traced by an unwanted and malignant intention for the purpose of utilizing it in attacking confidential files. However, passive unauthorized access; it cannot be used by hackers as well. This can be conducted through the process of listening through correspondence channels as well. This kind of listening part can be beneficial for listening about the information details.
  • Service Denial: This is another area of getting hacked within system through sending of spam emails to any users. Huang, Siegel & Madnick (2018), commented that a large number of surprising mails can be a scope of entering into the customer profile. For example, using the help of Distributed Denial of Service Attacks, it involves a variety of hacking instruments in the overall process so that it can be easily put into the system through software agents. In other words, it keeps on sending simultaneously an intended target request to its software agents. Hence, this can be done through multiplying into variety of other viruses from one particular virus.
  • Replicating of virus into the system:

Mancino (2016), opined that replication of the virus in a system takes place through an Internet connection as well as Trojan Horses that are in disguise as well as legitimate software that can be used up by the hackers. However, theft and fraud is another path of stealing information. This kind of activity can be done by breaking into insecure storage devices as well as ready to harvest some of the archival data that exists in the customers’ credit card numbers during online purchases.

Justification of Secured Electronic Transaction and E-commerce:

There is an authentic relationship between SET and E-commerce. Mancino (2016), it can be acknowledged that this relationship exists for the purpose of knowing about the detailed process of online transaction.  In other words, it can be done through digital certification as well as signed documents issued by the computerized signature. In this respect, it can be identified that, as per the deeper understanding of this fact cyber security has been considered to be an omnipresent issues everywhere. This is because; a large number of associations are involved in this long chain of cyber world network. Despite of this authenticated online transaction, it cannot be completely controlled. Hence, it determines the fact that SET having a strong relationship with an E-commerce giant.

Justification of making the relationship between HTTP and E-commerce:

            Based on the above context, it can be well acknowledged that cybersecurity issues can also appear through the relationship between Hypertext Transfer Protocol is basically a secure message-oriented interchange that is conventional in design as well as signed authentically during the online transaction process. Abdullah et al. (2019), commented that messages in an encrypted version can be traced again within the online way of payment or dealing with any information. It means it happens in a similar way like SET that during the time of any data transaction, it appears to be quite authentic in appearance; however, it gets hacked through simply during the time of digital signature or during the time of message-oriented interchanges.

Literature Gap

Based on the understanding of the concept, it can be acknowledged that cyber Security issues can occur based due to the number of phishing works as well as due to the absence of anti-security options. However, using this strategic vision of the literature, it can be less effective, as it might not cover large volume of research for acknowledging large volume of data as well as ethical norms as well. It can also be due to the time constraints as well.

Summary

Therefore, based on the overview of the research, it can be well organized on this very fact that Cyber Security issues can be noted this can be controlled based on strategic implementation and execution of theories and applications.

Conceptual Framework

 

Web Access to files and generation of malicious files

Key Entry factors intro system

Cyber Security Issues in E-commerce platforms

 

       
   
 

 

 

Figure 1: Conceptual Framework

Created By learner

3. Research Methodology

Planning a research Design

The research will be based on the qualitative method of by taking a survey questionnaires asked to the number of key Board to supervise and guide its associated business E-commerce (Moore et al. 2016).  In that case, it will cover near about a large volume of data from the suitable website sources as well as other secondary research.

4. Tools for analyzing the data

This involves relationship analysis based on the hypothesis for analyzing the data by collecting data and information from a online survey through questionnaires. According to Khan (2019), it can be identified from the data analysis and discussion that cybercrime affects in a wider area of business transactions online. In fact, it has also tried to identify the fact that near about 54% of the organization has been a victim from the attack of cyber crime thoroughly in a society. Apart from this, it has also been recognized from the discussion that cyber security crime trends are mostly growing in the Asian countries especially in India. This has not been taken kind of serious initiatives from the end of the government as well.

Moreover, it has been acknowledged from the overall analysis that online businesses in India are growing on the right way. However, merchants are not investing on its security strongly to combat with such crimes in the metropolitan cities. In that case, regulatory framework as well strategic way of planning and devising a new way out need to be done so that it can be well tracked right at the moment of hacking.

5. Conclusion

Based on this overall process of research, it can be acknowledged that cyber security issues can have major threats to the business of E-commerce along with the implications of theory in it. In other words, as per relationship study on the variables above, it has been quite recognized from this fact that Cyber security cannot be minimized completely from business platforms. Therefore, using this brief research, it can be effective in doing further study of the issue as well.

 

 

 

References

Abdullah, L., Ramli, R., Bakodah, H. O., & Othman, M. (2019). Developing a causal relationship among factors of e-commerce: a decision making approach. Journal of King Saud University-Computer and Information Sciences.

Huang, K., Siegel, M., & Madnick, S. (2018). Systematically understanding the cyber attack business: A survey. ACM Computing Surveys (CSUR), 51(4), 1-36.

Ionita, D., van der Velden, C., Ikkink, H. J. K., Neven, E., Daneva, M., & Kuipers, M. (2019, June). Towards risk-driven security requirements management in agile software development. International Conference on Advanced Information Systems Engineering (pp. 133-144). Springer, Cham.

Khan, S. W. (2019). Cyber security issues and challenges in E-commerce. Available at SSRN 3323741.

Mancino, M. P. (2016). Cybersecurity Otherwise: Seeking Communicative Insights. Pennsylvania Communication Annual, 72(2).

Moore, D. L., Bavdaž, M., Giessen, D., Smith, P. A., & Jones, J. (2016). Development and testing of business survey questionnaires: use of qualitative methods in national statistical institutes.

Prisha, P., Neo, H. F., Ong, T. S., & Teo, C. C. (2017). E-Commerce security and identity integrity: the future of virtual shopping.  Advanced Science Letters,  23 (8), 7849-7852.

Ronchi, A. (2018). 21STCENTURY CYBER WARFARE.

Sharma, P., Gupta, D., & Khanna, A. (2019). e?Commerce Security: Threats, Issues, and Methods. Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies, 61-77.

Tracy, S. J. (2019). Qualitative research methods: Collecting evidence, crafting analysis, communicating impact. John Wiley & Sons.

Ji, Q. (2018, December). Study on Information Security Issues of E-Commerce. In IOP Conference Series: Materials Science and Engineering (Vol. 452, No. 3, p. 032050). IOP Publishing.

 

No Need To Pay Extra
  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00
    Per Page
  • Consultation with Expert

    $35.00
    Per Hour
  • Live Session 1-on-1

    $40.00
    Per 30 min.
  • Quality Check

    $25.00
  • Total

    Free

New Special Offer

Get 25% Off

review

Call Back