Abstract = 39 times | PDF = 65 times
Motivations to engage in retail shopping comprise both utilitarian and hedonic dimensions. Business to consumer e-commerce conducted via the mechanism of web-shopping offers an expanded opportunity for companies to create a cognitively and esthetical good shopping environment in ways not readily imitable in the no electronic shopping world. In this report the details key implementation aspects of a typical online purchasing system, hypothetically labeled SYSTEM X, and describe how it works - particularly regarding security issues. The report concludes with recommendations for users of similar online buying systems.
Keywordse-commerce, online shopping, security in online shopping, retail shopping.
 D. L. Hoffman, T. P. Novak, and M. A. Peralta, "Information privacy in the marketspace: Implications for the commercial uses of anonymity on the Web," The Information Society, vol. 15, pp. 129-139, 1999.
 E. Hartono, C. W. Holsapple, K.-Y. Kim, K.-S. Na, and J. T. Simpson, "Measuring perceived security in B2C electronic commerce website usage: A respecification and validation," Decision Support Systems, vol. 62, pp. 11-21, 2014.
 N. M. Al-Slamy, "E-Commerce security," IJCSNS, vol. 8, p. 340, 2008.
 P. McCole, E. Ramsey, and J. Williams, "Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns," Journal of Business Research, vol. 63, pp. 1018-1024, 2010.
 A. S. Lim, "Inter-consortia battles in mobile payments standardisation," Electronic Commerce Research and Applications, vol. 7, pp. 202-213, 2008.
 A. Mukherjee and P. Nath, "A model of trust in online relationship banking," International journal of bank marketing, vol. 21, pp. 5-15, 2003.
 M. J. Cotteleer, C. A. Cotteleer, and A. Prochnow, "Cutting checks: challenges and choices in B2B e-payments," Communications of the ACM, vol. 50, pp. 56-61, 2007.