Browse > Article
http://dx.doi.org/10.9723/jksiis.2011.16.5.163

A Priority Analysis on E-Commerce Security Factors - Focused on Researchers and Practitioners  

Kim, Hyun-Woo (경일대학교 경영학부)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.16, no.5, 2011 , pp. 163-171 More about this Journal
Abstract
In e-commerce environment, security should be considered as an essential factor for success. In this paper, we analyze security requirements for e-commerce system, and it is focused on the practical usage, not theoretical contribution, in the field of e-commerce security. To identify the security requirements being specific to e-commerce environment, the researches related to e-commerce security are surveyed and a phase of Delphi method and Analytic Hierarchy Process(AHP) are used to determine the relative importance of e-commerce security factors. Since researchers and practitioners can have significantly different views because of each different work environment, we divide the professionals into two respondents' group. This survey result can be useful security guidelines in the development of e-commerce service system from the initial system development step to the completion.
Keywords
E-Commerce; Security Factor; Priority; Analytic Hierarchy Process(AHP);
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. F. Awad, and M. S. Krishnan, "The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization", MIS Quarterly, Vol. 30, No. 1, pp.13-28, 2006.   DOI
2 전형구, 장화식, "전자상거래 정보보안 기술에 대한 연구", 인터넷비즈니스 연구, 제10권, 제1호, pp.43-55, 2009.
3 이선구, 임춘성, 서형식, "웹 사이트 발전단계에 따른 평가모형 구축과 활용에 관한 연구", 대한산업공학회 춘계학술대회논문집, pp.334-341, 2002.
4 G. J. Udo, "Privacy and Security Concerns as Major Barriers for E-commerce: A Survey Study", Information Management & Computer Security, Vol. 9, No. 4, pp.165-174, 2001.   DOI   ScienceOn
5 최성욱, 김기태, "안전하고 신뢰성 있는 전자상거래를 위한 키보드 입력 보안 시스템의 설계 및 구현", 정보처리학회논문지, 제13-C권, 제1호, pp.55-62, 2006.
6 R. C. Marchany, and J. G. Tront, "E-Commerce Security Issues", 35th Hawaii International Conference on System Science, 2002.
7 M. A. Patton, and A. Josang, "Technologies for Trust in Electronic Commerce. Electronic Commerce Research", Vol. 4, pp.9-21, 2004.   DOI
8 I. Arce, "The Weakest Link Revisited. IEEE Security & Privacy Magazine", Vol. 1, No. 2, pp.72-76, 2003.   DOI   ScienceOn
9 A. Wright, "Controlling Risks of E-commerce Content", Computers & Security, Vol. 20, No. 2, pp.147-154, 2001.   DOI   ScienceOn
10 이만영, 김지홍, 류재철, 송유진, 염흥열, 이임영, 전자상거래 보안 기술, 생능출판사, 1999.
11 김세헌, 정보보호 관리 및 정책, 생능출판사, 2002
12 T. L. Saaty, Decision-Making for Leaders: The Analytical Hierarchy Process for Decisions in a Complex World, RWS Publications, 1995.
13 서수석, 이종호, "AHP를 이용한 전자상거래 웹사이트 평가모델 개발", 전자상거래학회지, 제5권,제1호, pp.125-141, 2004.
14 M. Warren, and W. Hutchinson, "A Security Risk Management Approach for E-Commerce", Information Management & Computer Security, Vol. 4, No. 5, pp.238-242, 2003.
15 이동주, 김명수, "전자상거래 이용자들의 정보 프 라이버시 우려와 반응 행동에 대한 실증 연구", e- 비즈니스연구, 제12권, 제2호, pp.365-383, 2011.