Tuesday, May 5, 2020
Security and Usability of E-Commerce Websites
Question: Describe about the Security and Usability of E-Commerce Websites? Answer: Abstract Nowadays the availability of internet has revolutionized the global world immensely. In todays modern society people uses modern facilities and e-commerce to buy their everyday household products. Everything from clothes, groceries, foods, cosmetics are available in the online market, and it will be served to the desired customer just in a click of a button. However, the success of an e-commerce business is based on satisfying and catering the needs of its customers. The major success story of this e-commerce websites lies in building a trustable and honest relationship with its most precious and lovable stakeholders that is the customers and consumer base. The e-Commerce websites are making daily experiments provide and satisfy the definite needs of their customers and bringing up various changes and modifications in their e-commerce platform to attract more customers daily. In the recent timeline, the e-commerce policymakers are emphasizing in giving a more strategic outlook to the ir e-commerce platform and websites. This strategy includes the implication of usability and security factors. One of the key accomplishments of an e-commerce website is in improving and improvising the usability of e-commerce platform by considering users preferences. User preferences can be explained as a combinational feeling and attitudes of users for the interface and functional design of the ecommerce platform. This influences users decision and behaviour. Considering the users preferences within an e-commerce platform enhances users satisfaction and increases users loyalty to the platform. The other aspect of installing the faith and trust within the customer is by installing a sense of security and incognito feeling to avoid the fear of online theft and cheat. Besides, the e-Commerce websites are also provided the assurance of safety, security and protections by amending various changes in the IT online market. This factor is also increasing the number of enthusiastic custom ers in the global arena of online e-Commerce arena. The growing number of customers and other related factors like commerce growth and prosperity seeks proper management of this e-commerce websites. They need to handle the matter more sensitively and seriously and need to fill up every loophole within their system. Besides, the business of this e-commerce websites stands and relies heavily on customer satisfaction and feedbacks. The e-commerce websites need to improvise and make their security measurements and usability intense. This will not only help their business development but also install cyber ethics and values within the global market of consumerism. Introduction Creating a safe and secure software program is a multifaceted and time-consuming procedure that seeks to harbour repeated challenging factors, such as functionality, scalability, clarity, productivity, etc. Software engineering analysis has lately focused on modernizing and improving the modelling capabilities considering the non-functional supplies such as steadiness, performance fault lenience, and safety. In this paper, we have focused on various security issues and usability of e-commerce websites. Methods and techniques to integrate security problems in software blueprint have already been constructed (Hartanoet al. 2014). However, there is one vital facet of the design of complex and composite secure systems, which has always been ignored by various well-known e-commerce organizations. Recent studies in the field of Human Computer Interactions in Security representthat security processes that do not work in field practice and application are not effectual. Most of the research in e-commerce security program and usability emphasizes on supplying better and improved user interfaces (UIs), but it is evident that usability troubles with secure systems are more than just UIs and requires relevance of various related factors and design methodology (Kamoun and Halaweh, 2012). However, secure systems do not subsist in emptiness; they survive for giving people and human race with different facilities and utilities. This process cannot function without the participation of people (the customers and consumers). In security, the focal point tends to focus on those unwanted people who want to mistreat the system (hackers and attackers). This is to the harm the ordinary and regular users, who play as a significant fraction in shielding it. Any secure system is a socio-technical system, and the necessities, scrutiny, and design process must consider this. Most countermeasures need the participation of public at some stage (Schumacher et al. 2013). Users can have significantly varying levels of understanding, experience, comprehension and expertise. Designing a system that suitably assists these contradictory levels of ability and aptitude, it requiresbasic training procedure if the countermeasures are to so reliable. Therefore, the design and the improvement of a secure software system need the addition of yet another vital requirement: usability. This supplementary requirement launches an additional layer of complexity in the development process. The main aim and objective of this project work are to discuss the potential security concern and usability in an e-commerce website (Konradtet al. 2012). In addition, at the same time, this paper focuses on various factors that could enhance and install improvement to these important factors. Literature review The popularity of an e-Commerce website is based on its usability and security factors. Maintaining a top-notch security provides customer loyalty and trust. Most of the famous e-commerce sites use latest technologies to deliver clients with top-notch safety and assurance. These techniques include the incorporation of SSL (Secure socket layer) to provide a secure HTTP (HTTPS) by encrypting the data transferred (Bansal, Sethi and Kataria, 2015). Moreover, the user needs to be fully aware of the fact that their data is protected before conducting an online purchase from any ecommerce website (Hartono et al. 2013). Various other methodologies like Digital signatures, Digital certificates, Cryptography, Anti-virus implementation, IDS integrated firewall implementation, use of Cisco router, proper log reporting, default ports changing, proper monitoring and analysis, updating software patches, host monitoring and implementing authentication protocols are conducted to provide security to t he customers (Fulton et al. 2013). Nowadays every e-commerce websites are concentrating more on providing proper usability to its clients. The interfaces within the web pages are made very simple and user-friendly so that everyone can use it without any difficulty (Distanteet al. 2014). The main purpose of this usability factor is to provide better experiences to customers to satisfy and cater their needs. Various e-Commerce websites are conducting studies on criteria, element, traits, matrices, attribute and characteristics of a user (Grigeraet al. 2013). Based on these factors the e-Commerce is building their web page platforms in the recent timeline. Various e-commerce companies and websites are accelerating fast and coming up with new security strategies for its customers. Recently, eBay introduced a security key device for its clients and users. This key fob randomly generates a six-digit unique security code that frequently changes within a time span of 30 seconds (Taveau, Nahari and Ebay Inc. 2014). This is a mode of the authentication procedure, which cannot be breached by any hackers. Another leading name in the global e-commerce market amazon.co.uk is also focused on enhancing its security in the global e-commerce sector (Balduzziet al. 2012). They are currently following a Safe Harbor Framework to protect the privacy and the security of its customers. This SH Framework supports strong encryption methodology to provide standard security features to its customers (Connolly, 2013). Moreover, amazon.co.uk has adopted the Secure Socket Layer (SSL) technology that is provided by VeriSign to provide its customers with eternal se curity back up. The SSL service providers encrypt the data and deliver the message (information) to the host when a customer enters his/her credit card details (Soghoian and Stamm, 2012). This encryption procedure is followed by various other online securities amazon.co.uk have secured its online transaction system (Ismail, 2015). Moreover, the other online security services followed by amazon.co.uk are digital certificates in web server, SSL encryption, public key cryptography and access control list (ACL). Apart from eBay and amazon.co.uk other e-Companies like Argos, Next.co.uk, and Tesco are emphasizing more on increasing the customer security of its websites. Currently, Argos is providing its customers with Secured code for Visa and Master Card for providing online payment security to the customers (Siwach, 2014). Argos Company has undergone a partnership program with the various Master card and Visa card providers and coordinately produced various credit cards with unique and concrete code numbers. This code numbers acts like an online PIN number for use on Argos.co.uk website. This process provides the customers with great security and privacy (Dwivediet al. 2013). Adding to this, the SSL protocol and encryption of customer data is also performed in the online e-Commerce website of Argos. Even other online UK based e-Commerce companies like Next.co.uk and Tesco follow a robust protocol for providing safety and security to its customers. This safety and security measurement include s SSL servers, digital signature, encryption, cryptography, anti-virus implementation, firewall application and proper monitoring system (Zhang et al. 2012). All these above mentioned companies like eBay, amazon.co.uk, Argos, Next.co.uk, and Tesco follows a standard guideline in maintaining a usability design for its e-Commerce websites respectively. Firstly, they all keep their navigation simple, understandable and functional for the users. The menu sections of this websites are simplified to seven to eight headers (Oyomnoet al. 2013). They incorporate trendy and fun words to indicate a particular part considering the ease of use. Secondly, they all stick to known symbols in their navigation option to make the shopping experience of the customer more intuitive and user-friendly (Hasan, Morris and Probets, 2013). Thirdly, they keenly follow a small check out procedure. They made their log out process simple by only installing a go back or forward option. However, a simple checkout error is mandatory to indicate a proper and hassle-free checking out procedure. They followed this principle and made their checkout error messages simple, to t he point and understanding for the common users (Sivaji et al. 2011). Adding to this, they always focus on limiting down the loading process of the website, as it sometimes frustrates a customer and user. Most of the customers are not from a patient breed of class and to provide every customer depending on their mood and demand the website should be adored with fewer animations to increase the loading time. The last but the most important factor that all these online e-Commerce sites follow is that they made a automated search feature on their websites (Alrobaiet al. 2013). This would help the customers to search the exact product that they are looking for the website and would present it in front of their screen. Some of the e-Commerce websites due to their poor management and security policy have become victims of the security breach. Among these companies, Target.com has dealt with 70 million violations in the recent timeline. Some of the other online e-Commerce websites that has conferred immense loss and sacrificed the customer security are AOL.com, Play.com, CDuniverse.com, and SalesGate.com. In a recent project, a credit card thief with the false name Maxus stole more than 370,000 credit card numbers from the online music store by the name of CDuniverse.com. On the other hand, Play.com which is a leading online retailer in the United Kingdom has revealed that some unknown hackers have breached their data and more than 1,0000 customers those ethical hackers have leaked email addresses and other data (Tihanyiet al. 2015). Moreover, the clients who are anday to day user of this e-Commerce website has confirmed about receiving some spam and phishing emails from various unknown sources. Simi lar incidents had happened to the user of the AOL.com Mail user, and they claimed about some spam and phishing messages. Later, in the year 2014, the director of AOL Company has confirmed about the security breach of their company and asked their customers to change their password as a preventive measure. Some 520,000 users who have a mail account in AOL.com have complained about a possible hack of their email (Davis, 2015). The reason for this security breach inside this website is believed to have happened due to various legit reasons. Firstly, these e-commerce sites are very poorly maintained and are loaded with malware and Trojan. The second reason that contributes to the hacking idea is an insecure system configuration for using an un-patched technology. However, SalesGate.com, AOL showed a probable breaching due to poor network security. This lack of network security can happen due to various reasons (Turban et al. 2015). These websites namely Target.com, AOL.com, CDuniverse.com, Play.com, and SalesGate.com lack the SSL layer potential, and the network points like POS terminal, and third party vendor links loT-based devices, etc. were not adequately shielded and protected. These e-Commerce companies have lacked in utilizing the proper tools to monitor the data packages and DNS transactions. All this mismanagement and callousness among the website developers and website technicians of these companie s has resulted in breaching data and information (Zafar, Ko and Osei, 2012). However, the primary target of a corporation should be providing satisfaction to the customers. It is found that only satisfied customers have the tendency to return and shop from the same company. Therefore, e-Commerce service providers should also concentrate on satisfying their customers. It is easy to reach ordinary people through online services and promote marketing; however, it is found that there are very few e-commerce service providers who are thriving in the market without facing loss. The main reason behind the popularity of few e-commerce service providers (such as e-bay, amazon.com, etc.) is the customer satisfaction. Most of the successful e-commerce service providers introduced cart system to help the client to choose their own budget and shop accordingly (Fang et al. 2014). It is observed that most of the customers prefer credit card transaction to pay for their shopping; therefore the e-commerce service providers are concentrating on introducinga security proof onli ne credit card transaction system as well as alternative payment systems (like virtual money transaction etc.) to boost the customer satisfaction. The e-commerce service providers are also providing added policies such as providing an extra discount for using only credit cards to attract more people (Zhang, Zeng and He, 2012). Also, they are also giving quick search methods so that the customers can enter their requirements and find results within seconds with a large variety, which will be helpful to attract more customers. The customers love surfing for products, however sometimes could not buy them due to several reasons. For this reasons, e-commerce service providers are adding an extra wish list interface feature, which will be helpful to save the chosen product in the cart so that the customers can buy those products whenever they want. On the other hand, an addition of special features can also make an e-commerce business attractive but the customers need something more than simple features. This extra' thing is security. Customers who are paying through online always need to make sure that their transaction is completely secure, and their account details are out of the reach of hackers (Luo, Ba and Zhang, 2012). Therefore, the e-commerce service providers are building up their website with SSL data encryption framework to ensure the website security. It is observed that when the websites of e-commerce service providers show SSL certificate seals on the homepage, it automatically provides the cust omers and installs an instant trust factor (Lee and Kozar, 2012). Moreover, this up stage is giving customers the confidence to rely on those websites as they are ensuring the customers with the confidence of their personal data and information are safety before purchasing any item in that e-commerce website. Furthermore, the e-commerce service providers need to strengthen their security to a larger extent to influence more customers to purchase through them with more safety protocol. It is observed that anyone with technology, capability and opportunity can have the potentiality to cause a security breach (Huang and Benyoucef, 2013). Therefore, the e-commerce service providers need to consider the prevention steps against unauthorized modifications of data from that particular site and take care of the authentication of the data source. Besides, they also need to take care of the confidentiality and privacy of the customers. It is found there are many viruses, which can easily break the security systems provided by the e-commerce service providers, such as Trojans, Worms, Viruses, malicious ActiveX, etc (Ajakaiye and Krause, 2011). However, discussing the pros and cons of various e-commerce websites by critically evaluating the security and usability factor we have missed out the viewpoints of a customer satisfaction. The usability and security of an e-commerce site install faith and trust in the mind of its consumers and clients. The user interface of the websites acts as a channel through which customers get in touch with the e-service provider. There are various factors to install satisfaction among the customers and users following the B2C protocol (Hartanoet al. 2014). Several factors that establish faith trust and customer satisfaction are achieved by providing the customer with proper design interface. This convenient interface includes information design, navigation design, and visual design. Adding to this, quality of service and product also increases the satisfaction level of the customers and consumers. This includes the idea of providing the customers with proper information about a product describ ing every characteristic feature of it like colour, weight, height, etc. All these factors contribute to a better understanding between the two stakeholders (e-Company and the consumer).Adding to this, the security factor also installs faith and trust on the mind of the customers which is critical in increasing the customer base of the e-Commerce company online (Fischer, Halibozek and Walters, 2012). However, certain factors hamper the integrity of an e-commerce website that implicates several security issues like identity theft, credit card fraud, virus and DoS attacks, etc. Research Methodologies The present chapter of the research paper describes the different kinds of research process and research approach with the analyst accepted and rejected in the operations of the research paper. The present research paper based on different kinds of website usability and different kinds of security issues which majority of the buyers faces in the process of purchase and sales. The present research paper is based on the analyzing an E commerce website, about its features, application and different mode of transactions which this particular company adopts in the operations of the business (Abrishami and Peivandi, 2012). The selected website is Amazon.com. Amazon is one of the most popular and common American E commerce website, which mainly operates its business in different kinds of online transactions. In the present research paper, the investigator has used different kinds of research methodologies in order to complete the investigation procedure with appropriate information (Ushakov and Arkhipov, 2014). The most challenging jobs for the investigator is to complete the investigation procedure on time and to select the appropriate research methodology in order to complete the investigation procedure (Brambilla, Tokuda and Tolksdorf, 2012). Research approach, research designs and research philosophies are the three main research parameters, which the investigator adopts in the proceedings of the investigation procedure. The three kinds of research philosophies are positivism, realism and interpretism. Based on the requirements of the investigation procedure the analyst decides whether to choose the research philosophies. The three kinds of research philosophies have different kinds of utilities. In the present research paper, the investigator has used the concept of the positivism research philosophies (Anner, 2012). Positivism research philosophy allows the investigator to support the investigation procedure with real facts and materials with scientific approaches, which already exists in the universe. Inductive research approach and deductive research approach are the two kinds of research approach (Safko, 2012). The most important jobs of the investigator is choose whether to use inductive method of research approach and inductive method of research approach. In the present research approach, the analyst has used the concept of deductive research approach in order to organization the investigatio n procedure based on different issues E Commerce websites (Bredeson, 2012). With the help of the deductive method of research approach, the investigator will be able to develop the investigation procedure with relevant hypothesis. The investigator in the present research paper will be able to develop a proper research hypothesis with the application of deductive research approach (Shang, Zhang and Chen, 2012). There are three kinds of research designs, which the investigator adopts in the proceeding of the investigation procedure (Vincent and Agbola, 2012). Explanatory research design, exploratory research design and descriptive research design are the three research designs, which the analyst adopts in the research operations. In the present research paper on issues of different commercial websites, the analyst has used exploratory research work (Vincent and Agbola, 2012). Moreover, with the application of the explanatory research design the investigator in the present research pap er on E commerce website stability and securities will be able to focus on real facts and findings (Collins, 2012). Explanatory research design contributes in attempting to build a connection between two different variables that the research topic consists so that the research problem can be solved. This part of the study will cover the data finding procedure of the research paper. Primary data finding procedure and the secondary method of data finding procedure are the two accepted data finding procedure, which all the analyst uses in the research work. In the present research paper on issues of e commerce website the researcher used two source of data collecting procedure. The investigator has decided to use a mixed source of data analysis procedure. The two source of data analysis procedure in the investigation process are the primary source of analysis procedure and the secondary source of data analysis procedure (Eiselt and Sandblom, 2012). The primary source of data collection will provide useful data in collecting first hand data and on the other hand, the secondary data will be very much useful in collecting data from second hand source (Popping, 2012). The investigator divides the primary source of data collection into two parts. One is the quantitative part and on the other hand, is the qualitative part. However based on the requirements of the research work on issues of commercial websites the investigator mainly focused on the application of the quantitative data collection procedure. The researcher interrogated 12 people in the qualitative part of the data analysis procedure (Brambilla, Tokuda and Tolksdorf, 2012). The questionnaire, which was prepared by the investigator, consists of 10 questions based on the requirements on the investigation procedure on E commerce website with its stability and securities. Image of Snap Deal Image of Spyder Image of Ebay Image of Tesco Image of Amazon Data sampling method is also an important part of the analyzing procedure. The investigator used both probability method and non-probability method of sampling. Nearly, 12 people were interrogated in the quantitative part of the data analysis procedure (Greene, 2011). Researcher has undertaken different research methodologies for qualitative data collection (Vincent and Agbola, 2012). By maintaining the ethical constipation of the investigator procedure mainly the Data Protection Act and maintaining the confidentiality of the investigation, the investigator has organized the present research study. There are several research methodologies, but at the end, the investigator has decided to use positivism research philosophy in order to support the operations of the research work with real facts and findings (Hannes and Lockwood, 2012). The investigator has rejected other two research philosophies by accepting positivism research philosophy. On the other hand, the investigator has decided to use the deductive method of research approach by eliminating the inductive method of research approach (Vincent and Agbola, 2012). Finally, the investigator has decided to use the explanatory research work in the operations of the research work, eliminating explanatory design and descriptive research designs (Liu, 2012). Chapter 3: Findings and Critical Discussions This part of the study, mainly focus on the data analyzing procedure. The investigator has decided to focus mainly on quantitative data analysis procedure. The investigator keeping in mind the requirements of the investigation procedure prepared 10 questions. All the questions were prepared by analyzing different gaps in the literature review. The objective of the investigator is to analyze different kinds of gaps, which are found in the literature review. Quantitative Questionnaire Q1) Gender division of population. Options Total number of respondents Population Response in Percentage Male 6 10 60% Female 4 10 40% Table 1: Gender of the population Figure 1: Gender of the population Findings and Analysis From the above tabular information, the investigator has concluded about the gender of the population. The majority of the people present in the population were male and on the other hand, the reaming respondents were female. All of the respondents in the entire population were very much cooperative in the entire survey. The researcher in this part of the data analysis procedure was benefited in different ways, as all the respondents were very much cooperative with the researcher in the entire investigation procedure. Q2) Classification of age group Options Total number of respondents Population Response in Percentage Within15-25years 4 10 40% Within 25-40years 2 10 20% Within 40-50 years 2 10 20% Within 50-70 years 2 10 20% Table 2: Different age group of the population Figure 2: Different age group of the population Findings and Analysis From the above tabular information, the investigator has concluded about the age group of different people present in the present research survey. The investigator has classified the entire age group into four divisions. The first division of age group is between 15-25 years, the second division of age group belongs to 25-40 years, the third age group is divided between 40-50 years and the final division of the age group belongs to 50-70 years. It is clear from the above tabular information that majority of the people belongs to the 15-24 years. All the people in the entire research operation cooperated with the investigator in different ways. Q3) Do you agree with the fact that in E Commerce websites faces different kinds of security issues Options Total number of respondents Population Response in Percentage Strongly Agree 4 10 40% Agree 2 10 20% Neutral 2 10 20% Disagree 2 10 20% Strongly Disagree 0 10 0% Table 3: Opinion of the fact that E Commerce websites faces different kinds of security issues Table 3: Opinion of the fact that E Commerce websites faces different kinds of security issues Findings and Analysis From the above research question, the investigator has a mixed review. The majority of the people in the entire research operations have strongly agreed with the fact that majority of the E commerce site faces security issues. Nearly 20% of the people agreed with the fact E commerce websites need to focus on different kinds of security issues and on the other hand, the reaming 20% of the people were neutral and disagree with the point that E commence sites faces different issues in the business transactions. Globally there are certain issues, which are faced by different E commerce companies in the operations of the online transactions. Majority of the of the E commerce sites faces different kinds of issues on online payment transactions. Q4) Do you think websites like EBay, Snap deal, Amazon developed a strong security system on different kinds of online transaction. Options Number of respondents Total respondents Percentage Strongly Agree 5 10 50% Agree 2 10 20% Neutral 2 10 20% Disagree 1 10 10% Strongly Disagree 0 10 0% Table 4: Reviews of Amazon towards development a strong security system on different kinds of online transaction Figure 4: Reviews of Amazon towards development a strong security system on different kinds of online transaction Findings and Analysis From the above tabular information, the investigator has concluded about the development of security on the online business transactions of Amazon. The investigator has concluded that 50% of the entire population agreed with the fact that Amazon has taken different kinds of steps in the development process of online securities in the operations of the online transactions. Majority of the people globally do not want to use the online system as a mode of payment due to lack of security. Most of the people prefers the concept of cash on delivery instead the concept of online money transaction. In order to solve this particular problem, Amazon has developed the entire structure of the online security system. Amazon introduced the concept of HTTP(S) instead of HTTP in order to secure different modes of online transactions. Nearly, 20% of the people in the population agreed with the fact that Amazon has done well in order to solve some specific security issues in the operations of online business. The reaming 10% of the people were neutral and disagree with this particular research questions. According to this group of people, Amazon needs to increase and develop more security on the online business transactions in order to make the majority of the people more secure from different kinds of online and internet frauds. Q5) How frequent do you use E commerce websites for purchasing and online shopping? Options Number of respondents Total respondents Percentage Frequently 5 10 50% Often 2 10 20% Very often 1 10 10% Rarely 1 10 10% Never 1 10 10% Table 5: Frequency of using E commerce websites for marketing and online shopping Figure 5: Frequency of using E commerce websites for marketing and online shopping Findings and Analysis This is one of the most common and important questions developed by the investigator in the data analysis procedure. In modern generations, the application of internet provided one of the major breakthroughs and changed the entire concept of marketing. The objective of the present research paper is to identify the disadvantages of online marketing faced by the users globally. Security is one of the major concern which majority of the E commerce websites faces in the operations of the business. With the effect of online marketing, nearly 50% of the entire population prefers the concept of online marketing. This group of people wants to be benefited with the additional advantages that the E commerce websites offers to the people. Wide varieties of product and discounted price are the primary reason behind the online shopping. The reaming people in the population were often and rarely use the concept of online shopping. With the help of the technological advance most of the people globally prefers the concept and application of online shopping. Q6) what challenges do you face while buying products on online with the help of E commerce Sites? Options Number of respondents Total respondents Percentage Increased Website Traffic 2 10 20% Last Minute Promotions 2 10 20% Payment System 3 10 30% Security Issues 3 10 30% Holiday Shipping Demands 0 10 0% Table 6: Challenges faced by the customers while buying products on online with the help of E commerce Sites Figure 6: Challenges faced by the customers while buying products on online with the help of E commerce Sites Findings and Analysis It is one of the most common and important questions which the investigator has developed in the operations of the analysis. These are the some major issues, which the buyers face in the process of online marketing. Most of the people in the population agreed with the fact the payment system and different kinds security issues are the primary problem in the concept of online shopping. With the technological advancement, most of the E Commerce companies have developed a strong online business. However, there are some problems in the operations. The primary disadvantage is lack of security. On the other hand, 30% of the people in the population concluded that security issues is also an important problem in the in the overall process. Nearly 20% of the people suggested that the concept of last minute promotion is one of the most common issues, which the majority of the buyers face in the process of online shopping. Holiday shipping demand is another important challenge, which the buyers faces while purchasing. However, this problem is negligible as compared with other issues. Q7) How often do you face problems in e-commerce websites? Options Number of respondents Total respondents Percentage Frequently 5 10 50% Often 2 10 20% Very often 1 10 10% Rarely 1 10 10% Never 1 10 10% Table 7: Frequency of application of different kinds of E commerce sites Figure 7: Frequency of facing problems of different kinds of E commerce sites Findings and Analysis From the above tabular information, the investigator has concluded about the frequency of the E commerce website visit. The application of internet in marketing has changed the entire concept of shopping. There are certain advantages in the concept of online shopping. Majority of the users prefers the concept of online shopping in order to be benefited with different additional benefits. It is to be noted that there are some issues, which act as a barriers in the concept of online shopping. Security and the sustainability is the primary issues which the majority of the users faces in the operations of the online transactions. Half of the entire population uses the allocation of E commerce in a very frequent basis. The objective of this group of people is to get benefited with different kinds of additional options and additional benefits in the process of online shopping. On the other hand, 20% of the population uses the concept of online shopping very often. The reaming people of the popular do not use the concept of online shopping, usually prefers the concept of traditional shopping. Hence, it is very much clear, from the above findings and the research that the entire concept and trend of shopping has been changed entirely due to the application of various kinds of modern technology in marketing the entire trend of shopping has been changed. However, there are various kinds of disadvantages and security issues, which are highlighted in the present research paper. Q8) Do you believe your e-commerce website is secured enough. Options Number of respondents Total respondents Percentage Strongly Believe 5 10 50% Believe 2 10 20% Neutral 2 10 20% Doubtful 1 10 10% Strongly Doubtful 0 10 0% Table 8: Security of the E commerce Websites Figure 8: Security of the E commerce Websites Findings and Analysis From the above research question, the investigator concluded about various kinds of security issues which majority of the business firm faces in the operations of the investigation procedure. Half of the population strongly believes in the point that E commerce websites are secure enough in order to carry on different kinds of business transaction. Some group of people strong believes in the point that the E commerce site needs to develop more security in the process of E commerce. Nearly 20% of the people believe in the fact that the security needs to be increase in order to develop a proper E commerce system. The reaming 20% of the people doubt in the security system of E commerce. From the above question, it can be concluded that most of the people globally, believes in the concept of online marketing. The major challenge and barriers faced by the majority of the E commerce site is based on the security issues. Q9) what elements do you consider while visiting any e-commerce website? Options Number of respondents Total respondents Percentage Security 6 10 60% Feasibility 2 10 20% Sustainability 2 10 20% All of the above 0 10 0% Table 9: Different kinds of factors, which affect the operations of E Commerce Websites Figure 9: Different kinds of factors, which affect the operations of E Commerce Websites Findings and Analysis From the present research question, the investigator concluded about the factors, which hampers the purchasing decisions of the customers. From the above tabular information majority of the people concluded that security is the only issues in online marketing. On the other hand, reaming 20% of the people concluded about that feasibility and sustainability are the other two problems, which hamper the purchasing decision of the customers. Mode of payment is the payment is the primary issue, which majority of the customers fears in the concept of online shopping. Feasibility is another important factor, which affects the operation of online marketing. The last important factor, which is considered in the overall E commerce website, is the concept of the sustainability. Hence, it can be concluded that, the security issues is one of the major factor in the application of the online shopping. There are different steps which majority of the organization develops in the process of online marketing. Q10) Rate the security system of the modern e-commerce websites? Options Number of respondents Total respondents Percentage Very Poor 2 10 20% Poor 1 10 10% Average 5 10 50% Good 1 10 10% Excellent 0 10 0% Table 10: Security system in the application of different kinds of E Commerce sites Figure10: Security system in the application of different kinds of E Commerce sites Findings and Analysis From the above tabular information, the investigator has a mixed review on the security system of E commerce. In recent time, it is one of the most common and important issues which both the buyers and the sellers faces in the business operations. Majority of the people in the survey agreed with the fact, the security system of E commerce is average. Nearly 50% of the total people in the survey agreed with the fact that the security system of the entire E commerce site is average. On the other hand, some people in the population concluded that the security system of the E commerce site is poor followed by 20% of the people concluded that the security system of E commerce is very poor. In recent time, with the technological advancement, all the companies based on the nature of the trade tries to develop a proper security system. For example, the application of technology HTTP(S) made a huge contribution towards the development process of a proper communication system in the online bus iness transaction. However, the concept and application of online shopping has changed the entire trend of shopping. Majority of the people based on the requirements prefers the concept of online shopping as compared with the traditional mode of shopping in order to be benefited in different ways. However, there are certain challenges and certain issues and certain challenges faced by majority of the E commerce sites. Chapter Summary This chapter mainly highlights different kinds of findings, which the investigator has concluded about the operations of the research work. In this chapter, the investigator summarizes 10 questions, which was prepared by keeping in mind the requirements of the research paper. The investigator in the present research paper mainly reflects on different kinds of issues, which are in the E commerce site in the operations of purchase and sales. The present research paper mainly focuses on different issues, which the majority of the E commerce sites face in the business operations. At present, website usability and security is one of the major concerns for every E commerce website. The investigator in the present research paper mainly focuses on different kinds of issues on E commerce sites. In order to conduct an effective research the investigator has gone through different kinds of commercial websites which operates its business in E commerce. However, the investigator has focused on di fferent kinds of issues faced by some popular and unpopular E commerce sites. Conclusion The concluding part of the research paper summaries about different kinds usability and security issues faced by different commercial websites in the operations of the business. The concept of online marketing has certain advantages as well as disadvantages. The objective of the present study is to highlight some of the major disadvantages in the operations of the E commerce site. The present study is divided into several parts. The first part of the study is the introduction part; the second part of the study is the literature review part, the third part of the study mainly describes about the methodologies. The forth chapter is the most crucial part in the entire research paper. The fifth chapter summarizes the concluding part as well as the recommending part of the research paper. Keeping in mind the requirements of the research paper, the investigator has organized the entire investigation procedure. The investigator in the present study mainly focused on various kinds of disadvantages and issues, which are faced by the uses on the time of online business transaction. The application and the concept of E commerce have brought one of the major breakthroughs in the operations of the business. This part of the study will highlight the advantages and disadvantages which on E commerce. The primary advantage it allows the customers to save time and it allows the customers to save time and on the other hand, it provides all the customers to select the products from wide varieties. On the other hand, there are certain disadvantages in the concept of E commerce. The researcher in the present study highlights some of the major issues and challenges which majority of the E Commerce sites faced in the business operations. Security and website instability are the major two global problems, which some group of users faced while shopping online. The researcher in the study mainly spotlight on the different kinds of securities issues and challenges faced by the users while shopping online. In order to support the research work with effective data and information the investigator has searched different E commerce websites. For example, Amazon.com, Ebay.com and Snapdeal.com are the other three commercial websites, which the researcher searched in the operations of the research work. In order to solve this particular problem different initiative have been taken by different companies in order to make the technological advancement in a much better manner. In order to develop a proper security system in the website the application of HTTP(S), introduced by the majority of the companies in order to make it more secure from different kinds of frauds. Reflection I have learnt many things in my program at GSM London throughout the years. Our university is one of the most common and important university across the country. Different students join the organization from different cultural backgrounds. The way of communication and the way of approach differs from each other. While organizing the present study, I have gone through different kinds of activities. Professors and official staffs helped me a lot while organizing every research paper. I have learned many extracurricular activities from my seniors. What was most important about the investigation procedure is the application of the fieldwork. In order to organize a proper data collection process, the application of the fieldwork was very much important. I have learned some unique activities from my professors, which will not only ensure me in completing the research work but will allow me to apply these skills in my studies. It is more important for me to utilize this particular opportuni ty. It was one of the excellent opportunities for me to gather more knowledge and apply proper skills in the operations of the research work. This research work helped me a lot to develop proper communication skills with my seniors and professors. This communication helped me a lot to find a proper solution for my research gaps. GSM program has also helped me to evaluate my strengths and weakness in an effective manner. On the other hand, I have learned many different things from my peer groups. Our University is one of the most popular and famous university across the country. Different students join the university from different cultural backgrounds. The ways of communication and the way of working differs from each other. I have learned different additional things from my peer groups, such as way of studies and application of knowledge and skills in a different way and approaches. The most important and unique thing which I have learned is the application of proper knowledge and skills in a practical workplace. Learning and evolution of different kinds of modern theories is an important part of studies and on the other hand, application of these theories is equally important. By consulting and developing proper communication skills with my peers, I have learned different modes of applications of knowledge and skills in the practical workplace. I have also learned that several modes of communicati on is also important that helped me in the learning process. It was one of the most difficult and challenging job to complete the investigation process on time. With the help of my seniors as well as with the help of my teachers I was able to complete the investigation process on time with effective data and findings. The contribution of my professors, seniors and peers were remarkable in the process of organizing this particular investigation procedure and helped me to develop my knowledge and skills apart from my studies. It was very much important for me to develop a proper practical knowledge and skill while organizing this research work as well as the overall work. References Baggini, J. (2012).Ethics. London: Quercus. Abrishami, M. and Peivandi, A. (2012). The Impact Of Globalization on The Transformation From Traditional to Modern Business Practices and Operations in India.IJSR, 3(4), pp.79-83. Adamkiewicz-Drwillo, H.G., (2012). Estimating the impact of globalization on international competitiveness: A multidimensional approach.China-USA Business Review,11(12), pp.1543-1556. Ajakaiye, T.D. and Krause, K.S.K., 2011. Online Based Authentication and Secure Payment Methods for M-Commerce Applications. Alrobai, A.A., Alroobaea, R.S., Al-Badi, A.H. and Mayhew, P.J., 2013. Investigating the Usability of E-Catalogues Systems: Modified Heuristics vs. User Testing.User Testing (July 4, 2013). Anner, M. (2012). Globalization and Labor Rights: Assessing the Impact.International Studies Review, 14(2), pp.343-345. Balderston, K. (2011). Investing with Impact: Unlocking Value for Business and Society.Innovations: Technology, Governance, Globalization, 6(3), pp.35-39. Balderston, K. (2011). Investing with Impact: Unlocking Value for Business and Society.Innovations: Technology, Governance, Globalization, 6(3), pp.35-39. Balduzzi, M., Zaddach, J., Balzarotti, D., Kirda, E. and Loureiro, S., 2012, March. A security analysis of amazon's elastic compute cloud service. InProceedings of the 27th Annual ACM Symposium on Applied Computing(pp. 1427-1434). ACM. Bansal, D., Sethi, P. and Kataria, S., 2015. Secure Socket Layer and its Security Analysis.Networking and Communication Engineering,7(6), pp.255-259. Barnaghi, P., Wang, W., Henson, C. and Taylor, K., 2012. Semantics for the Internet of Things: early progress and back to the future.International Journal on Semantic Web and Information Systems (IJSWIS),8(1), pp.1-21 Brambilla, M., Tokuda, T. and Tolksdorf, R. (2012).Web engineering. Berlin: Springer. Bredeson, D. (2012).Applied business ethics. Mason, Ohio: South-Western/Cengage Learning. Collins, D. (2012).Business ethics. Hoboken, N.J.: John Wiley Sons. Connolly, C., 2013. EU/US Safe HarborEffectiveness of the framework in relation to national security surveillance.Papier fr das Hearing im LIBE-Ausschuss. Corti, L. (2012). Recent developments in archiving social research.International Journal of Social Research Methodology, 15(4), pp.281-290. David, E. (2012).Agent-mediated electronic commerce. Berlin: Springer. Davis, D., 2015. Legal Drivers in Cyber Security.Engineering Technology Reference,1(1). Distante, D., Garrido, A., Camelier-Carvajal, J., Giandini, R. and Rossi, G., 2014. Business processes refactoring to improve usability in E-commerce applications.Electronic Commerce Research,14(4), pp.497-529. Dwivedi, A., Dwivedi, A., Kumar, S., Pandey, S.K. and Dabra, P., 2013.A Cryptographic Algorithm Analysis for Security Threats of Semantic E-Commerce Web (SECW) for Electronic Payment Transaction System.InAdvances in Computing and Information Technology(pp. 367-379). Springer Berlin Heidelberg. Eiselt, H. and Sandblom, C. (2012).Operations research. Heidelberg: Springer. Fang, Y., Qureshi, I., Sun, H., McCole, P., Ramsey, E. and Lim, K.H., 2014. Trust, satisfaction, and online repurchase intention: the moderating role of perceived effectiveness of e-commerce institutional mechanisms.Mis Quarterly,38(2), pp.407-427. Fischer, R.J., Halibozek, E.P. and Walters, D., 2012.Introduction to security.Butterworth-Heinemann. Fulton, N., Butler, J.M., Curtis, M.A., Parrott, D., Whitehead, M.J. and Wu, H., Reuters Limited, 2013.Method for certifying and verifying digital web content using public cryptography.U.S. Patent 8,352,379. Greene, S. (2011). Catalyzing Investment for Domestic Impact: The Impact Investing Initiative of the U.S. Small Business Administration.Innovations: Technology, Governance, Globalization, 6(3), pp.27-34. Grigera, J., Garrido, A., Panach, J.I., Distante, D. and Rossi, G., 2015. Assessing refactorings for usability in e-commerce applications.Empirical Software Engineering, pp.1-48. Hannes, K. and Lockwood, C. (2012).Synthesizing qualitative research. Chichester: John Wiley Sons. Hartono, E., Holsapple, C.W., Kim, K.Y., Na, K.S. and Simpson, J.T., 2014. Measuring perceived security in B2C electronic commerce website usage: A respecification and validation.Decision Support Systems,62, pp.11-21. Hartono, E., Holsapple, C.W., Kim, K.Y., Na, K.S. and Simpson, J.T., 2014. Measuring perceived security in B2C electronic commerce website usage: A respecification and validation.Decision Support Systems,62, pp.11-21. Hartono, E., Kim, K.Y., Na, K.S., Simpson, J.T. and Berkowitz, D., 2013. Perceived Site Security as a Second Order Construct and Its Relationship to e-Commerce Site Usage.InAdvances in Information Systems and Technologies(pp. 1075-1085).Springer Berlin Heidelberg. Hasan, L., Morris, A. and Probets, S., 2013. E-commerce websites for developing countries-A usability evaluation framework.Online Information Review,37(2), pp.231-251. Homann, K., Koslowski, P. and LuÃÅ'Ãâ tge, C. (2007).Globalisation and business ethics. Aldershot, England: Ashgate. Huang, Z. and Benyoucef, M., 2013. From e-commerce to social commerce: A close look at design features.Electronic Commerce Research and Applications,12(4), pp.246-259. Huemer, C. and Lops, P. (2012).E-Commerce and web technologies. Berlin: Springer. International Journal of Social Research Methodology: Theory Practice. (2012).International Journal of Social Research Methodology, 15(6), p.ebi-ebi. Ismail, M.B.S., 2015. Encryption: Provide Security for Big Data Application in Cloud Computing Environment.Advances in Computational Research,7(1), p.253. Kamoun, F. and Halaweh, M., 2012. User interface design and e-commerce security perception: an empirical study.International Journal of E-Business Research (IJEBR),8(2), pp.15-32. Khachidze, V. (2012).Contemporary research on E-business technology and strategy. Berlin: Springer. Konradt, U., Held, G., Christophersen, T. and Nerdinger, F.W., 2012.The role of usability in E-Commerce services.International Journal of E-Business Research (IJEBR),8(4), pp.57-76. Kotler, P. and Armstrong, G. (2012).Principles of marketing. Boston: Pearson Prentice Hall. Kurtz, D. and Boone, L. (2012).Principles of contemporary marketing. Australia: Southwestern Cengage Learning. Kwon, O. (2012). A new ensemble method for gold mining problems: Predicting technology transfer.Electronic Commerce Research and Applications, 11(2), pp.117-128. Lee, Y. and Kozar, K.A., 2012. Understanding of website usability: Specifying and measuring constructs and their relationships.Decision Support Systems,52(2), pp.450-463. Liu, Z. (2012). The Research on Collaborative Commerce of Enterprise Application Integration.Physics Procedia, 24, pp.1221-1225. Luo, J., Ba, S. and Zhang, H., 2012. The Effectiveness of Online Shopping Characteristics and Well-Designed Websites on Satisfaction.Mis Quarterly,36(4), pp.1131-1144. Marburger, D. (2012).Innovative pricing strategies to increase profits. [New York, N.Y.] (222 East 46th Street, New York, NY 10017): Business Expert Press. Maxwell, J. (2012).A realist approach for qualitative research. Thousand Oaks: SAGE Publications. Oyomno, W., Jppinen, P., Kerttula, E. and Heikkinen, K., 2013.Usability study of ME2. 0.Personal and ubiquitous computing,17(2), pp.305-319. Popping, R. (2012). Qualitative Decisions in Quantitative Text Analysis Research.Sociological Methodology, 42(1), pp.88-90. Safko, L. (2012).The social media bible. Hoboken, N.J.: Wiley. SarathiBhattacharjee, P. and Ara Begum, S. (2012). The Application of E-commerce in Business Application: Their Problems and Prospects.International Journal of Computer Applications, 49(10), pp.36-40. Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F. and Sommerlad, P., 2013.Security Patterns: Integrating security and systems engineering. John Wiley Sons. Shang, X., Zhang, R. and Chen, Y. (2012). Internet of Things (IoT) Service Architecture and its Application in E-Commerce.Journal of Electronic Commerce in Organizations, 10(3), pp.44-55. Singh, N. (2012).Localization strategies for global e-business. Cambridge: Cambridge University Press. Sivaji, A., Downe, A.G., Mazlan, M.F., Soo, S.T. and Abdullah, A., 2011, June.Importance of incorporating fundamental usability with social trust elements for e-commerce website. InBusiness, Engineering and Industrial Applications (ICBEIA), 2011 International Conference on(pp. 221-226). IEEE. Siwach, S., 2014. E-COMMERCE: A CONCEPTUAL STUDY.International Journal of Information Technology Computer Sciences Perspectives,3(1), p.867. Soghoian, C. and Stamm, S., 2012. Certified lies: Detecting and defeating government interception attacks against ssl (short paper). InFinancial Cryptography and Data Security(pp. 250-259). Springer Berlin Heidelberg. Taveau, S.L.J. and Nahari, H., Ebay Inc., 2014.System and method for transaction security enhancement.U.S. Patent 8,914,876. Thorson, E. and Duffy, M. (2012).Advertising age. Mason, OH: South-Western Cengage Learning. Tihanyi, N., Kovcs, A., Vargha, G. and Lnrt, ., 2015. Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords. InTechnology and Practice of Passwords(pp. 89-101). Springer International Publishing. Trask, C., Mathiassen, S., Wahlstrm, J., Heiden, M. and Rezagholi, M. (2012). Data collection costs in industrial environments for three occupational posture exposure assessment methods.BMC Med Res Methodol, 12(1), p.89. Turban, E., King, D., Lee, J.K., Liang, T.P. and Turban, D.C., 2015.E-Commerce Security and Fraud Issues and Protections.InElectronic Commerce(pp. 459-520).Springer International Publishing. Ushakov, D. and Arkhipov, A. (2014). Urban Business Systems' Globalization: Factors, Forms and Economic Impact.Research Journal of Business Management, 8(3), pp.189-202. Vincent, O. and Agbola, O. (2012). A Conceptual Trust Model for Managing E-Commerce Environment.J. Comp. Sci Applic., 19(1). Zafar, H., Ko, M. and Osei-Bryson, K.M., 2012. Financial impact of information security breaches on breached firms and their non-breached competitors.Information Resources Management Journal (IRMJ),25(1), pp.21-37. Zhang, D., Zeng, X. and He, W., 2012. Research on Customer Satisfaction of E-Commerce Website with Uncertain Linguistic Variables.Journal of Convergence Information Technology,7(1). Zhang, Y., Deng, X., Wei, D. and Deng, Y., 2012.Assessment of E-Commerce security using AHP and evidential reasoning.Expert Systems with Applications,39(3), pp.3611-3623. Appendix: Questionnaire Question 1 Gender division of population. Male Female Question 2: Classification of age group Within 25-40years Within 40-50 years Within 50-70 years Question 3: Do you agree with the fact that in E Commerce websites faces different kinds of security issues Strongly Agree Agree Neutral Disagree Strongly Disagree Question 4 Do you think websites like EBay, Snap deal, Amazon developed a strong security system on different kinds of online transaction. Strongly Agree Agree Neutral Disagree Strongly Disagree Question 5: How frequent do you use E commerce websites for purchasing and online shopping? Frequently Often Veryoften Rarely Never Question 6: What challenges do you face while buying products on online with the help of E commerce Sites? Increased Website Traffic Last Minute Promotions Payment System Security Issues Holiday Shipping Demands Question 7: How often do you face problems in e-commerce websites? Frequently Often Veryoften Rarely Never Question 8: Do you believe your e-commerce website is secured enough? Strongly Believe Believe Neutral Doubtful Strongly Doubtful Question 9: What elements do you consider while visiting any e-commerce website? Security Feasibility Sustainability All of the above Question 10: Rate the security system of the modern e-commerce websites? Very Poor Poor Average Good Excellent
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.