perceptions and elevate their trust levels (Srinivasan, 
S., 2004). Unfortunately, when customer is unaware 
of such controls it is unlikely that they will affect his 
security perception. In this case he will have limited 
amount of information to assess security and 
trustworthiness of online merchant and in case he 
decide to make online transaction with particular 
merchant, he might depend on other concerns - 
appearance, brand name, or just word of mouth - 
which are not necessarily related to the actual 
security practices of the merchants.  
These findings lead us to conclude that 
customers concerns about the security of internet 
applications are legitimate because they still suffer 
from these technical vulnerabilities which create a 
barrier to the full engagement in e-Business 
transactions, this should/must increase the 
motivation on technology vendors to develop their 
security skills and practices in order to reduce 
security holes in e-Business applications. 
These findings confirm Turner (2003)’s study 
which suggests that because customers don’t 
understand technical security controls their 
perceptions of the website security are formed based 
on factors such as reputation and recommendation. 
However, Turner’s study didn’t highlight the novelty 
of our findings. These are the need for 
communicating security to customers and building 
their awareness of such security controls which 
arguably could improve their security assessments in 
two significant ways. First, customers' concerns 
might be alleviated when they are made aware of 
these security controls, and furthermore their 
existence might increase their perception that 
merchant is secure and trustworthy. Second, we 
argue that this knowledge empowers customers' to 
have real controls which can be used alongside with 
their anecdotal recommendations and common sense 
perceptions to assess online merchant security. 
REFERENCES 
Katsikas, S., Lopez, J. and Pernul, G.,2005. Trust, Privacy 
and Security in E-business, Requirements and 
Solutions.  Proc. of the 10th Panhellenic Conference 
on Informatics (PCI’2005), Volos, Greece, pp. 548-
558. 
Alqatawna, J., Siddiqi, J., Akhgar, B., and Hjouj Btoush, 
M., 2008. Towards Holistic Approaches to Secure e-
Business: A Critical Review, CSREA EEE, 245-251. 
Alqatawna, J., Siddiqi, J., Akhgar, B., and Hjouj Btoush, 
M., 2008. A Holistic Framework for Secure e-
Business, CSREA EEE, 257-263. 
Paine, C., Reips, U., Stieger, S., Joinson, A., and 
Buchanan, T., 2007. Internet users' perceptions of 
privacy concerns and privacy actions. Int. J. Hum.-
Comput. Stud, 65(6): 526-536. 
Khasawneh, A., Al Azzam, I., and Bsoul, M., 2009. A 
study on e-commerce security in Jordan. International 
journal of electronic finance, 3 (2), 166-176.  
Alsmadi, S., 2002. Consumer attitudes towards online 
shopping in Jordan: Opportunities and challenges. In: 
the First Forum for Marketing in Arab Countries. 
Myers, M., 1997. Qualitative Research in Information 
Systems, MIS Quarterly 21(2). 
Ritchie, J., Spencer, L., and O'Connor, W., 2003. Carrying 
out qualitative analysis. In : Qualitative research 
practice. Edited by Ritchie, J., & Lewis, J., SAGE, 
London.  
Audestad, J. A. 2005. Four reasons why 100% security 
cannot be achieved, Telektronikk, vol. 101, pp. 38. 
Odlyzko, A., 2003. Economics, psychology, and sociology 
of security.  Lecture Notes in Computer Science, pp. 
182-189. 
Suh, B., and Han, I., 2003. The impact of customer trust 
and perception of security control on the acceptance of 
electronic commerce. International Journal of 
Electronic Commerce, vol. 7, pp. 135-161.  
Flavián C., and Guinalıú, M., 2006. Consumer trust, 
perceived security and privacy policy.  Industrial 
Management and Data Systems, vol. 106, pp. 601-620. 
Salisbury, W. D., Pearson, R. A., Pearson A. W. and 
Miller, D. W., 2001. Perceived security and World 
Wide Web purchase intention. Industrial Management 
and Data Systems, vol. 101, pp. 165-176. 
Lee, P. M., 2002. Behavioral model of online purchasers 
in e-commerce environment.  Electronic Commerce 
Research, vol. 2, pp. 75-85. 
SANS Institute, "SANS Top 20 vulnerabilities," [Online] 
http://www.sans.org/top20, accessed 26/8/2009. 
Ahmad, D., 2007. The contemporary software security 
landscape.  IEEE Security & Privacy, vol. 5, pp. 75-
77.  
Howard, M., 2008. Becoming a Security Expert. Security 
& Privacy, IEEE, vol. 6; 6, pp. 71-73, 2008. 
 McGraw, G., 2004. Software security. Security & 
Privacy, IEEE, 
vol. 2; 2, pp. 80-83. 
Schneier, B., 2004. Secrets and Lies: Digital Security in a 
Networked World. Wiley New York. 
Srinivasan, S., 2004. Role of trust in e-business success. 
Information Management and Computer Security, vol. 
12, pp. 66-72.  
Turner, C., 2000. How do consumers form their judgments 
of the security of e-commerce web sites, 
ACM/CHI2003 Workshop on Human-Computer 
Interaction and Security Systems. 
 
WEBIST 2010 - 6th International Conference on Web Information Systems and Technologies
324