SECURITY IN E-BUSINESS - Understanding Customers Perceptions and Concerns

Ja'far Alqatawna, Jawed Siddiqi, Mohammed Hjouj Btoush

2010

Abstract

It has become apparent to many security researchers that traditional security approaches are not sufficient to provide adequate security for today's pervasive electronic business environment. We and others argue that security is a socio-technical problem in which its social components are not sufficiently addressed or understood. Our contribution aims to overcome this problem situation, by developing a better understanding of online customers’ security perceptions in Jordan. An interpretive approach is employed and general inductive coding process is used to analyse the collected data. On the basis of these study's findings we argue that many customers’ related aspects need to be considered in order to elevate e-Business security. These aspects include perceptions and concerns as well knowledge of and interaction with other stakeholders.

References

  1. Katsikas, S., Lopez, J. and Pernul, G.,2005. Trust, Privacy and Security in E-business, Requirements and Solutions. Proc. of the 10th Panhellenic Conference on Informatics (PCI'2005), Volos, Greece, pp. 548- 558.
  2. Alqatawna, J., Siddiqi, J., Akhgar, B., and Hjouj Btoush, M., 2008. Towards Holistic Approaches to Secure eBusiness: A Critical Review, CSREA EEE, 245-251.
  3. Alqatawna, J., Siddiqi, J., Akhgar, B., and Hjouj Btoush, M., 2008. A Holistic Framework for Secure eBusiness, CSREA EEE, 257-263.
  4. Paine, C., Reips, U., Stieger, S., Joinson, A., and Buchanan, T., 2007. Internet users' perceptions of privacy concerns and privacy actions. Int. J. Hum.- Comput. Stud, 65(6): 526-536.
  5. Khasawneh, A., Al Azzam, I., and Bsoul, M., 2009. A study on e-commerce security in Jordan. International journal of electronic finance, 3 (2), 166-176.
  6. Alsmadi, S., 2002. Consumer attitudes towards online shopping in Jordan: Opportunities and challenges. In: the First Forum for Marketing in Arab Countries.
  7. Myers, M., 1997. Qualitative Research in Information Systems, MIS Quarterly 21(2).
  8. Ritchie, J., Spencer, L., and O'Connor, W., 2003. Carrying out qualitative analysis. In : Qualitative research practice. Edited by Ritchie, J., & Lewis, J., SAGE, London.
  9. Audestad, J. A. 2005. Four reasons why 100% security cannot be achieved, Telektronikk, vol. 101, pp. 38.
  10. Odlyzko, A., 2003. Economics, psychology, and sociology of security. Lecture Notes in Computer Science, pp. 182-189.
  11. Suh, B., and Han, I., 2003. The impact of customer trust and perception of security control on the acceptance of electronic commerce. International Journal of Electronic Commerce, vol. 7, pp. 135-161.
  12. Flavián C., and Guinaliú, M., 2006. Consumer trust, perceived security and privacy policy. Industrial Management and Data Systems, vol. 106, pp. 601-620.
  13. Salisbury, W. D., Pearson, R. A., Pearson A. W. and Miller, D. W., 2001. Perceived security and World Wide Web purchase intention. Industrial Management and Data Systems, vol. 101, pp. 165-176.
  14. Lee, P. M., 2002. Behavioral model of online purchasers in e-commerce environment. Electronic Commerce Research, vol. 2, pp. 75-85.
  15. SANS Institute, "SANS Top 20 vulnerabilities," [Online] http://www.sans.org/top20, accessed 26/8/2009.
  16. Ahmad, D., 2007. The contemporary software security landscape. IEEE Security & Privacy, vol. 5, pp. 75- 77.
  17. Howard, M., 2008. Becoming a Security Expert. Security & Privacy, IEEE, vol. 6; 6, pp. 71-73, 2008.
  18. McGraw, G., 2004. Software security. Security & Privacy, IEEE, vol. 2; 2, pp. 80-83.
  19. Schneier, B., 2004. Secrets and Lies: Digital Security in a Networked World. Wiley New York.
  20. Srinivasan, S., 2004. Role of trust in e-business success. Information Management and Computer Security, vol. 12, pp. 66-72.
  21. Turner, C., 2000. How do consumers form their judgments of the security of e-commerce web sites, ACM/CHI2003 Workshop on Human-Computer Interaction and Security Systems.
Download


Paper Citation


in Harvard Style

Alqatawna J., Siddiqi J. and Hjouj Btoush M. (2010). SECURITY IN E-BUSINESS - Understanding Customers Perceptions and Concerns . In Proceedings of the 6th International Conference on Web Information Systems and Technology - Volume 2: WEBIST, ISBN 978-989-674-025-2, pages 319-324. DOI: 10.5220/0002803503190324


in Bibtex Style

@conference{webist10,
author={Ja'far Alqatawna and Jawed Siddiqi and Mohammed Hjouj Btoush},
title={SECURITY IN E-BUSINESS - Understanding Customers Perceptions and Concerns},
booktitle={Proceedings of the 6th International Conference on Web Information Systems and Technology - Volume 2: WEBIST,},
year={2010},
pages={319-324},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002803503190324},
isbn={978-989-674-025-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 6th International Conference on Web Information Systems and Technology - Volume 2: WEBIST,
TI - SECURITY IN E-BUSINESS - Understanding Customers Perceptions and Concerns
SN - 978-989-674-025-2
AU - Alqatawna J.
AU - Siddiqi J.
AU - Hjouj Btoush M.
PY - 2010
SP - 319
EP - 324
DO - 10.5220/0002803503190324