An Approach To Risk Management For E-Commerce: Ais Electronic Library (Aisel)
An Approach To Risk Management For E-Commerce: Ais Electronic Library (Aisel)
Summer 6-27-2016
Cheng-Yuan Ku
National Chiao Tung University, cooper.c.y.ku@gmail.com
Yung-Ting Chuang
National Chung Cheng University, ytchuang@mis.ccu.edu.tw
Recommended Citation
Sharma, Sadhna; Ku, Cheng-Yuan; and Chuang, Yung-Ting, "AN APPROACH TO RISK MANAGEMENT FOR E-COMMERCE"
(2016). PACIS 2016 Proceedings. 34.
http://aisel.aisnet.org/pacis2016/34
This material is brought to you by the Pacific Asia Conference on Information Systems (PACIS) at AIS Electronic Library (AISeL). It has been
accepted for inclusion in PACIS 2016 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please
contact elibrary@aisnet.org.
AN APPROACH TO RISK MANAGEMENT FOR E-COMMERCE
Abstract
Today’s trend of online shopping proves the vital role e-commerce plays in our daily life. Online
transactions require reliable networks, and reliable networks depend on secure information
technology. These networks have many advantages, but they have disadvantages as well—notably, the
need for risk management. The growing importance of e-commerce, with its associated need to ensure
trust in online transactions, has led the authors to study and propose risk management in e-commerce
from a holistic perspective, thus enabling the implementation of real-time auditing of e-commerce
transactions using the digital agents’ technology. In this paper, the authors discuss e-commerce’s
risks and present a methodology that can be used to manage those risks. It concludes that e-commerce
risks are a high priority for online businesses, and that many of the requisite controls are extensions of
controls for managing risk in other information systems.
Keywords: Risk management, network computers, e-commerce, information system risk
1 INTRODUCTION
Electronic commerce or e-commerce is the buying and selling of goods and services. It’s very popular
to buy anything and pay online, transmitting funds or data over an electronic network, primarily the
internet. These business transactions occurs business-to-business, business-to-consumer, consumer-to-
consumer or consumer-to-business. The terms e-commerce and e-business are often used
interchangeably. Nowadays people are not going to the shops to buy things but rather checking the
details and pictures of the product on a device, then ordering and paying online; after a few days, the
seller will deliver that thing to your door. Electronic commerce is a process that enables sale or
purchase of goods and services over computer networks with methods designed for this purpose
(WTO, 2013). Although orders can be made electronically, the delivery of goods, services or
payments is not limited to the online world. E-commerce transactions can occur between businesses,
households, individuals, governments and public or private establishments (OECD, 2011). E-
commerce has some advantages, most notably the ability to save time and offer buyers and sellers a
wider range of price and quality, but we can’t avoid e-commerce’s disadvantages. Security is the main
concern in online shopping. Because of security, buyers are scared to buy items online, and this affects
e-businesses. The success or failure of an e-commerce business depends on these security and privacy
issues (Tripathy and Mishra, 2013), and users' trust is essential for development in e-commerce (Rand
and Meshram, 2012). E-commerce generally is made by using some combination of telephone, fax,
TV, computers, the internet, electronic payments, money-transfer systems and electronic data
interchange. In this study, we only consider electronic commerce transactions that are made via the
internet.
Most of the buyers using the internet buy items from around the world using e-commerce, which can
be used business-to-business, business-to-consumer, business-to-government, consumer-to-business,
consumer-to-consumer, consumer-to-government, government-to-government, government-to-
business and government-to-consumer, as shown in Figure 1. Business-to-business is the e-commerce
relationship between organizations; business-to-customer is the provision of service by a business to a
consumer; customer-to-customer is the e-commerce relationship among consumers.
C2C
C2G
Confirmation
from
C2G Shoppers
G2G Payment
Process
E-
commerce
B2G Customer
Customer Place the
G2C Order
B2B Order
Complete
G2B Delivery to
B2C Customer
E-commerce is also improving business interactions. It facilitates the network form of organization
where small, flexible firms rely on partner companies for supplies and distribution to meet changing
customer demand more effectively. Over the past 20 years, e-commerce has grown rapidly, offering
advantages to both businesses and consumers since the first e-commerce transaction in 1995 (Laudon
and Traver, 2013). As changing regulations lower barriers to ecommerce, it is expected that e-
commerce will continue to evolve in the future. The spread of internet access and the rising
expectations that come with it are two of the main drivers of the development of e-commerce. New
internet users come online every second; currently, about 40% of the world’s population has an
internet connection.
Users Growth % of World Population with Internet(Penetration) Year
12.2% 25.6 2009
16.1% 29.4 2010
11.7% 32.5 2011
10.5% 35.5 2012
8.0% 37.9 2013
7.9% 40.4 2014
Table 1. Internet use in the world (Internet Live Stats, 2015)
In 1995, that figure was less than 1%. The number of internet users increased tenfold from 1999 to
2013. The billion-user mark was reached in 2005, the two-billion mark in 2010, the three-billion in
2014. Figure 3 shows the number of global internet users per year since 1993 (ITU 2014).
The success or failure of an e-commerce business depends on security and privacy (Tripathy and
Mishra, 2013). Users’ trust is essential to business development (Rane and Meshram, 2012). With the
popularization of electronic payment, security issues have become a key problem. Theft of personal
data (privacy) and unauthorized access (security) are serious issues in e-commerce for customers and
service providers alike. Privacy is the ability of an individual to control the terms under which their
personal information is acquired and used (Culnan, 2000). An individual’s privacy, as such, is always
in an inherent state of tension, since it must be defined in conjunction with the capabilities of others to
transact business and even to control their own privacy. Customers are concerned about the risk of
reuse of their personal data for unrelated purposes without their consent. This includes sharing with
third parties who were not part of the transaction in which the consumer related his or her personal
data.
Delivery
Confirmation
Confirmation
customer detail
Confirm the
Confirmation
from Bank
Electronic payment is an easy, quick and cheap payment system based on electronic communication.
Buyers and sellers do their deals without seeing each other. The rapid development of the internet
brought e-commerce to public attention, and it was acknowledged to be full of potential. In e-
commerce, there are many ways in which an unscrupulous person can cheat users. In the early days of
the internet, the popularity of e-commerce hinged on whether data transfers could be made secure.
Although the following options may not be helpful for ending risk in e-commerce, they may help to
reduce it:
1. Training to team on e-commerce risks: Train your team in risk management policies and
procedures, and the fraud and security risks involved in an e-commerce transaction. The more
informed your organization is, the easier it will be to combat online threats and to carry out risk-
mitigating measures.
2. Spread organizational policies to customers: Make sure your website provides guidance to
customers in the form of your privacy policy, information security, shipping & billing policies,
and refund policies. This is also helpful to avoid dissatisfaction and disputes.
3. Ensure Payment Card Industry (PCI) compliance: All e-commerce organizations are required to
be PCI-compliant and must adhere to the rules outlined by the Payment Card Industry Security
Standards Council. If your organization is not PCI-compliant, it may be exposed to severe fines
and the loss of its payment ability.
4. Protect your e-commerce business from intrusion: Check the system for viruses and hackers,
change passwords, make software updates, and check sensitive data on a regular basis to make the
system secure for e-commerce transactions.
5. Know the details of your payment service provider contract: Be familiar with your contract,
particularly the areas that refer to holding funds and chargeback liability. Know the length of time
and conditions under which your deposits may be held, and know your liability for fraudulent
transactions.
6. Make strict laws: Classify e-commerce fraud as a type of crime in which perpetrators interfere
with e-commerce for the purpose of ill-gotten gains.
7. Privacy-enhancing technologies: Although there are many technologies used for surveillance, the
technologies for forming agreements (contracting) about the release of private data, the
technologies for labelling and trust, and privacy-enhancing technologies (PETs) should be much
stronger.
Confirmation to Customer and
CUSTOMER
Delivery
Confirmation
Confirmation
Bank also confirm Order from Vendor
Vendor confirm the Order to bank
customer detail
Confirm the
Confirmation
from Bank
In the last few years, many researchers have offered solutions to the security and privacy issues that
are the loopholes in e-commerce transactions. E-commerce includes the transmission and exchange of
information, products, and services—online transactions and payment, and also resource-sharing
between enterprises. In the effort to make electronic business secure, there are many problems to be
solved beyond privacy and security. Beyond buyers and sellers, financial institutions, government
agencies, certification bodies, distribution centers, and other organizations must contribute solutions.
However, organizational policies and electronic signature technology may play as important a role in
security and privacy as any other solution. Careful analysis will ultimately bring greater transparency
and proficiency to the online process so that users can overcome risk and e-commerce can go on
unhindered. This paper has proposed a set of guidelines for the benefit of users, so that those users
can use online transactions in a safe and secure manner.
Acknowledgment
This research was supported in part by MOST 104-2410-H-194-090-MY2 of Ministry of Science and
Technology, Taiwan.
References
Anderson, R. (2001, December). Why Information Security is Hard-An Economic Perspective. In
Proceedings of the 17th Annual Computer Security Applications Conference, p. 358, IEEE
Computer Society.
ATKearney, Global Retail E-Commerce Keeps on Clicking, https://www.atkearney.com/consumer-
products-retail/e-commerce-index/full-report/-/asset_publisher/87xbENNHPZ3D/content/global-
retail-e-commerce-keeps-on-clicking/10192, (2016/03/10)
Tripathy, B. and Mishra, J. (2013). Protective measures in E-Commerce to deal with security threats
arising out of social issues - A framework. International Journal of Computer Engineering and
Technology (IJCET), 4(1), pp. 46-53.
Culnan, M. J. (2000). Protecting privacy online: Is self-regulation working? Journal of Public Policy &
Marketing, 19(1), pp. 20-26.
Internet Live Stats (2015), http://www.internetlivestats.com/internet-users/, (2016/03/10)
Laudon, C. K. and Traver, G. C. (2013). E-commerce 2013: business, technology, society. Pearson
Education, 9th Edition.
International Telecommunication Union (ITU) (2014), Manual for Measuring ICT Access and Use by
Households and Individuals, http://www.itu.int/dms_pub/itu-d/opb/ind/D-IND-ITCMEAS-2014-
PDF-E.pdf, (2016/03/10)
Niranjanamurthy, M., Kavyashree, N., Jagannath, S. and Dharmendra, C. (2013). Analysis of E-
Commerce and M-Commerce: Advantages, Limitations and Security Issues. International Journal
of Advanced Research in Computer and Communication Engineering, 2(6), pp. 2360- 2370
OECD (2011). OECD Guide to Measuring the Information Society
2011, http://www.oecd.org/sti/ieconomy/oecdguidetomeasuringtheinformationsociety2011.htm,
(2016/03/10)
Rane, P. B. and Meshram, B. B. (2012). Transaction Security for E-commerce Application.
International Journal of Electronics and Computer Science Engineering, 1(3), pp, 1720-1726.
Shapiro, C. and Varian, H. R. (1999). Information Rules. Cambridge, MA: Harvard Business School
Press.
Treese, G. W. and Stewart, L. C. (1998). Designing Systems for Internet Commerce. New York:
Addison-Wesley
Srikanth V. (2012). E-commerce Online Security and Trust Marks. International Journal of Computer
Engineering and Technology, 3(2).
World Trade Organization (WTO) (2013). E-Commerce in Developing Countries: Opportunities and
Challenges for SMEs, https://www.wto.org/english/res_e/booksp_e/ecom_brochure_e.pdf,
(2016/03/10)
Yasin, S., Haseeb, K. and Qureshi, R. J. (2012). Cryptography based e-commerce security: a review.
International Journal of Computer Science Issues, 9(2), 132-137.