Communications of the ACM
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Cover story: keeping data private
Network Computing
Consumer trust in an Internet store
Information Technology and Management
A Taxonomy of Spam and a Protection Method for Enterprise Networks
ICOIN '02 Revised Papers from the International Conference on Information Networking, Wireless Communications Technologies and Network Applications-Part II
Electronic Payments: Where Do We Go from Here?
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Developing and Validating Trust Measures for e-Commerce: An Integrative Typology
Information Systems Research
Privacy-enhancing technologies: approaches and development
Computer Standards & Interfaces
ACM SIGecom Exchanges
Communications of the ACM - Mobile computing opportunities and challenges
Information Technology and Management
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
A trust model for e-commerce in South Africa
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Do consumers understand the role of privacy seals in e-commerce?
Communications of the ACM - The disappearing computer
Privacy in e-commerce: stated preferences vs. actual behavior
Communications of the ACM - Transforming China
Trust and Reputation for Service-Oriented Environments: Technologies For Building Business Intelligence And Consumer Confidence
A web trust-inducing model for e-commerce and empirical research
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Some methods to depress the risks of the online transactions
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Privacy and identity management for everyone
Proceedings of the 2005 workshop on Digital identity management
The application of model checking for securing e-commerce transactions
Communications of the ACM - Hacking and innovation
An effective defense against email spam laundering
Proceedings of the 13th ACM conference on Computer and communications security
The effect of Internet general privacy concern on customer behavior
Electronic Commerce Research
Examining customers' trust in online vendors and their dropout decisions: An empirical study
Electronic Commerce Research and Applications
An open source forensic tool to visualize digital evidence
Computer Standards & Interfaces
Receipt management- transaction history based trust establishment
Proceedings of the 2007 ACM workshop on Digital identity management
Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components
Electronic Commerce Research and Applications
The Effect of Consumer Privacy Empowerment on Trust and Privacy Concerns in E-Commerce
Electronic Markets - 'eValues'
New E-Payment Scenarios in an Extended Version of the Traditional Model
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
A Trusted Approach to E-Commerce
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Privacy-preserving e-payments using one-time payment details
Computer Standards & Interfaces
Designing Information Systems Which Manage or Avoid Privacy Incidents
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
Dynamic virtual credit card numbers
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Enabling privacy-preserving e-payment processing
DASFAA'08 Proceedings of the 13th international conference on Database systems for advanced applications
Trust, privacy and security in e-business: requirements and solutions
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
A counting-based method for massive spam mail classification
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
An improved e-commerce protocol for fair exchange
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Privacy in india: attitudes and awareness
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
PyFlag - An advanced network forensic framework
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Adoption and use of e-commerce in SMEs
Electronic Commerce Research
Critical review of the e-loyalty literature: a purchase-centred framework
Electronic Commerce Research
Electronic Commerce Research
Factors affecting the adoption of B2B e-commerce technologies
Electronic Commerce Research
A framework for unified digital evidence management in security convergence
Electronic Commerce Research
Hi-index | 0.00 |
It has been well documented that lack of trust between commercial entities and purchasers can restrict the potential of e-commerce. This may be because the purchaser is required to provide personal information to the commercial entity, which may then be abused, or because the purchaser may be suspicious that after payment has been processed, the goods purchased will not arrive. The challenge for the researcher is to determine the e-commerce model which maximizes the trust a purchaser has when shopping online.In this paper, we focus on the personal information which must be revealed by the purchaser when purchasing online and we present the first comprehensive analysis of personal information distributed in an e-commerce setting from the point of view of the purchaser and his perception of trust in an online transaction. We introduce a measure of trust based on the information distributed to the parties in the transaction and isolate the instances which maximize trust for the purchaser relative to the personal information revealed. This leads us to the establishment of a theoretical framework on which to compare e-commerce protocols and to the development of four new models, all of which, as we demonstrate, are better in concrete ways than the traditional e-commerce model based on secure e-payment protocols. While the overall cost of implementation to the parties remains the same as in the traditional protocols, there is a slight overall decrease in cost to the seller but a slight increase in cost to the deliverer. However, the small additional costs to the deliverer are mitigated by the opportunity for new capabilities and business. Implementation of our work is likely to improve consumer trust and therefore lead to an increase in on-line commerce, especially in countries where privacy recognition is not strong.