Network Security Management in E-commerce: A Systematic Review (CS601)
VerifiedAdded on 2025/04/21
|70
|7377
|119
AI Summary
Desklib provides past papers and solved assignments for students. This literature review examines network security in e-commerce.

Review Based Project Literature Review (Secondary Research)
Student's Name and CSU ID
Project Type Review Based Project
Project Name Decision support system based network security management techniques in e-commerce: A systematic review
Technology Decision Support System
Techniques Network security management technique
Domain E-commerce security
Version 1.0 _ Week 1 (5 Journal Papers from CSU Library)
1
Reference in APA format that will be in
'Reference List'
Barkatullah, A. H. (2018). Does self-regulation provide legal protection and security to e-commerce
consumers?.Electronic Commerce Research and Applications, 30(1), 94-101 DOI:
https://doi.org/10.1016/j.elerap.2018.05.008
Citation that will be in the content (Barkatullah, 2018).
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://www-sciencedirect-
com.ezproxy.csu.edu.au/science/article/
pii/S1567422318300565
Q1 E-commerce,
Customer privacy
Consumer security
1
Student's Name and CSU ID
Project Type Review Based Project
Project Name Decision support system based network security management techniques in e-commerce: A systematic review
Technology Decision Support System
Techniques Network security management technique
Domain E-commerce security
Version 1.0 _ Week 1 (5 Journal Papers from CSU Library)
1
Reference in APA format that will be in
'Reference List'
Barkatullah, A. H. (2018). Does self-regulation provide legal protection and security to e-commerce
consumers?.Electronic Commerce Research and Applications, 30(1), 94-101 DOI:
https://doi.org/10.1016/j.elerap.2018.05.008
Citation that will be in the content (Barkatullah, 2018).
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://www-sciencedirect-
com.ezproxy.csu.edu.au/science/article/
pii/S1567422318300565
Q1 E-commerce,
Customer privacy
Consumer security
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Data protection
Country analysis
Self-regulation
Legal issues
United States
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution &
What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:Self-
regulation technique, verification
technique, analysis technique
Tools:
Research
Digital Signature
VeriSign
Applied Area: E- commerce sector
Problem: Problem that needs to be solved is
whenever there is a network problem than it
will cause error in communication.
Establishing consumers trust is also a big
problem in e-commerce
Goal: The goal of this research is to find an
effective model for implementing self-
regulation which provides state intervention in
the form of legislation.
Implementation of self-regulation
Urgency of merchant
Provide Genuine information about products
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Implementation of self-regulation-In this step,
consumer’s private data like credit card details
and their financial information remain safe
The advantage of this step to build consumer’s
trust in e-commerce sector by proving safety to
their personal information.
N/A
2 Urgency of merchant- In this step, they are The advantage of this step is to increase N/A
2
Country analysis
Self-regulation
Legal issues
United States
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution &
What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:Self-
regulation technique, verification
technique, analysis technique
Tools:
Research
Digital Signature
VeriSign
Applied Area: E- commerce sector
Problem: Problem that needs to be solved is
whenever there is a network problem than it
will cause error in communication.
Establishing consumers trust is also a big
problem in e-commerce
Goal: The goal of this research is to find an
effective model for implementing self-
regulation which provides state intervention in
the form of legislation.
Implementation of self-regulation
Urgency of merchant
Provide Genuine information about products
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Implementation of self-regulation-In this step,
consumer’s private data like credit card details
and their financial information remain safe
The advantage of this step to build consumer’s
trust in e-commerce sector by proving safety to
their personal information.
N/A
2 Urgency of merchant- In this step, they are The advantage of this step is to increase N/A
2

providing full strength and quality to self -
regulation
number of consumer’s in e-commerce sector
3 Provide Genuine information about products-
In this step, merchants has to provide genuine
information about products.
The advantage of this step is that consumers
can buy according to their need and quality of
the goods. This will help the merchants to form
a standard of products offered to consumers
The disadvantage of this step is increasing
the quality of the goods will increase the
price as well and as a result less consumers
will buy that goods because of high price
Validation Criteria (Measurement Criteria)
Dependent Variable Independent Variable
Legal protection Rules
Consumers merchant’s strong convictions
Product Offered
Activities Public’s needs
Input and Output Critical Thinking: Feature of this work, and
Why (Justify)
Critical Thinking: Limitations of the research
current solution, and Why (Justify)
Input (Data) Output (View)
Verification technique
is the input used in
this study by the
author.
To provide legal
protection and
security to the
consumers private
information while
making a transaction
in e-commerce sector.
The main feature of this work is to provide more
security to consumer’s private information through
self-regulation because there is a number of cyber -
attacks happening while you are purchasing a
products through e-commerce site and to reduce
those attacks more security is providing through
this technique so that your private information
remain safe while doing a transaction
Limitations:
Whenever there is server failure or network
failure, this technology creates unique
obstacles.
Sellers can misused the private information of
consumers without consumers permission
3
regulation
number of consumer’s in e-commerce sector
3 Provide Genuine information about products-
In this step, merchants has to provide genuine
information about products.
The advantage of this step is that consumers
can buy according to their need and quality of
the goods. This will help the merchants to form
a standard of products offered to consumers
The disadvantage of this step is increasing
the quality of the goods will increase the
price as well and as a result less consumers
will buy that goods because of high price
Validation Criteria (Measurement Criteria)
Dependent Variable Independent Variable
Legal protection Rules
Consumers merchant’s strong convictions
Product Offered
Activities Public’s needs
Input and Output Critical Thinking: Feature of this work, and
Why (Justify)
Critical Thinking: Limitations of the research
current solution, and Why (Justify)
Input (Data) Output (View)
Verification technique
is the input used in
this study by the
author.
To provide legal
protection and
security to the
consumers private
information while
making a transaction
in e-commerce sector.
The main feature of this work is to provide more
security to consumer’s private information through
self-regulation because there is a number of cyber -
attacks happening while you are purchasing a
products through e-commerce site and to reduce
those attacks more security is providing through
this technique so that your private information
remain safe while doing a transaction
Limitations:
Whenever there is server failure or network
failure, this technology creates unique
obstacles.
Sellers can misused the private information of
consumers without consumers permission
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

(Describe the research/current solution) Evaluation Criteria How this research/current solution is valuable
for your project
What is the Future work that set by the author
in Conclusion and Future work section
Research is all about providing security to the
consumer’s private information while making a
transaction in e-commerce sector.
Self-regulation technique has been used to
provide more security to consumers in e-
commerce site.(Barkatullah, 2016)
This technique can be used in online transaction
where you send or receive money or pay bills
of credit card.
The final result of this research is to overcome
cyber-attacks which are increasing day by day
by using self-regulation technique(Soekanto
and Mamudji, 2014)
This research is valuable in many ways as by
using this technique, there will be less number of
cyber-attacks and personal information of
consumers will remain secure.
In future, they will provide a model for self -
regulation to merchants so that they will get to
know how merchants collect, use, keep and show
private information which they have collected
from the consumers.
Diagram/Flowchart
4
for your project
What is the Future work that set by the author
in Conclusion and Future work section
Research is all about providing security to the
consumer’s private information while making a
transaction in e-commerce sector.
Self-regulation technique has been used to
provide more security to consumers in e-
commerce site.(Barkatullah, 2016)
This technique can be used in online transaction
where you send or receive money or pay bills
of credit card.
The final result of this research is to overcome
cyber-attacks which are increasing day by day
by using self-regulation technique(Soekanto
and Mamudji, 2014)
This research is valuable in many ways as by
using this technique, there will be less number of
cyber-attacks and personal information of
consumers will remain secure.
In future, they will provide a model for self -
regulation to merchants so that they will get to
know how merchants collect, use, keep and show
private information which they have collected
from the consumers.
Diagram/Flowchart
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 1: Process flow
Reference in APA format that will be in 'Reference List'
Barkatullah, A.H., 2016. Legal harmonization as legal protection by the state for stakeholders in International electronic transaction (Harmonisasi
hukum sebagai perlindungan hukum oleh negara bagi para pihak dalam transasi elektronik internasiona). J. Hukum Ius Quia Iustum. 1, 1–22.
Soekanto, S., Mamudji, S., 2014. Normative Law Research (Penelitian Hukum Normatif). Rajawali Press, Jakarta.
Citation that will be in the content
(Barkatullah, 2016)
(Soekanto and Mamudji, 2014)
5
Reference in APA format that will be in 'Reference List'
Barkatullah, A.H., 2016. Legal harmonization as legal protection by the state for stakeholders in International electronic transaction (Harmonisasi
hukum sebagai perlindungan hukum oleh negara bagi para pihak dalam transasi elektronik internasiona). J. Hukum Ius Quia Iustum. 1, 1–22.
Soekanto, S., Mamudji, S., 2014. Normative Law Research (Penelitian Hukum Normatif). Rajawali Press, Jakarta.
Citation that will be in the content
(Barkatullah, 2016)
(Soekanto and Mamudji, 2014)
5

2
Reference in APA format that will be in
'Reference List'
De Gusmão, A. P. H., Silva, M. M., Poleto, T., e Silva, L. C., & Costa, A. P. C. S. (2018). Cybersecurity risk
analysis model using fault tree analysis and fuzzy decision theory. International Journal of Information
Management, 43, 248-260. https://doi.org/10.1016/j.ijinfomgt.2018.08.008
Citation that will be in the content (De Gusmao et al.2018)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://www-sciencedirect-
com.ezproxy.csu.edu.au/science/article/
pii/S026840121830077X
Q1 Cyber security
risk analysis
Information security model
Fuzzy decision theory
Fault tree analysis
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution &
What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name: Fault tree
analysis, decision theory and fuzzy theory
Tools:
Internet
Fuzzy theory
Applied Area: Cyber security
Problem: The problem which is analysis in
this research is that the extensive use of the
network is causing the cyber attacks in the
industrial control system.
Goal: The aim of the research is to evaluate
the technique to reduce the cyber attacks by
using the fault tree analysis, decision theory
and fuzzy theory by considering data
dissemination, data modification of the
industries.
Expert identification
Cause of attack
Defining the criteria
Fuzzy assessment
Aggregation and ordering
6
Reference in APA format that will be in
'Reference List'
De Gusmão, A. P. H., Silva, M. M., Poleto, T., e Silva, L. C., & Costa, A. P. C. S. (2018). Cybersecurity risk
analysis model using fault tree analysis and fuzzy decision theory. International Journal of Information
Management, 43, 248-260. https://doi.org/10.1016/j.ijinfomgt.2018.08.008
Citation that will be in the content (De Gusmao et al.2018)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://www-sciencedirect-
com.ezproxy.csu.edu.au/science/article/
pii/S026840121830077X
Q1 Cyber security
risk analysis
Information security model
Fuzzy decision theory
Fault tree analysis
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution &
What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name: Fault tree
analysis, decision theory and fuzzy theory
Tools:
Internet
Fuzzy theory
Applied Area: Cyber security
Problem: The problem which is analysis in
this research is that the extensive use of the
network is causing the cyber attacks in the
industrial control system.
Goal: The aim of the research is to evaluate
the technique to reduce the cyber attacks by
using the fault tree analysis, decision theory
and fuzzy theory by considering data
dissemination, data modification of the
industries.
Expert identification
Cause of attack
Defining the criteria
Fuzzy assessment
Aggregation and ordering
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Expert identification-it is necessary to identify
the person to act at right time to maximize the
value of decision making.
This process helps in the identification of
vulnerabilities, potential accident of the
organization.
Lengthy
2 Cause of attack-this is done with the use of FTA
technique
This helps in detecting the harming scenarios
timely so that the precaution can be taken.
N/A
3 Defining the criteria-this defines how can the
model can be evaluate at different criteria.
This helps in analysis time restoration and
financial losses for security.
N/A
4 Fuzzy assessment- three alternatives were used
depending upon the organization.
This step helps in evaluating each alternative
with the identified criteria.
N/A
5 Aggregation and ordering –all the observed
criteria is aggregated together.
It determines the conditions which lead the
cyber attack.
Time consuming
Validation Criteria (Measurement Criteria)
Dependent Variable Independent Variable
Information Technology (IT) security Stock market investors
Decision-making processes quantitative analysis of the security
Cyber security risk model Bayesian network
7
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Expert identification-it is necessary to identify
the person to act at right time to maximize the
value of decision making.
This process helps in the identification of
vulnerabilities, potential accident of the
organization.
Lengthy
2 Cause of attack-this is done with the use of FTA
technique
This helps in detecting the harming scenarios
timely so that the precaution can be taken.
N/A
3 Defining the criteria-this defines how can the
model can be evaluate at different criteria.
This helps in analysis time restoration and
financial losses for security.
N/A
4 Fuzzy assessment- three alternatives were used
depending upon the organization.
This step helps in evaluating each alternative
with the identified criteria.
N/A
5 Aggregation and ordering –all the observed
criteria is aggregated together.
It determines the conditions which lead the
cyber attack.
Time consuming
Validation Criteria (Measurement Criteria)
Dependent Variable Independent Variable
Information Technology (IT) security Stock market investors
Decision-making processes quantitative analysis of the security
Cyber security risk model Bayesian network
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Input and Output Critical Thinking: Feature of this work, and
Why (Justify)
Critical Thinking: Limitations of the research
current solution, and Why (Justify)
Input (Data) Output (View)
Internet
transaction
fault tree analysis
Customers
security
Identify the
consequences of
cyber attack
Focuses on the particular accident event
Helps in determining how cyber attacks can be
failed.
FTA supports analysis of the vulnerability of
the system security
Probabilistic approach is restricted in where
the risk is not predictable
Security risks are short lived for malicious
intent behind the attack.
(Describe the research/current solution) Evaluation Criteria How this research/current solution is valuable
for your project
What is the Future work that set by the author
in Conclusion and Future work section
(de Gusmao et al.2018) the author have stated
that the research is about overcoming from the
security attacks which occurs during the extensive
network. The research proposed the FTA model
to find the minimal cost and to illustrate the
increased vulnerability of e-commerce to cyber
security attacks.
The application of fuzzy theory and decision
uncertainty is helpful in evaluating the complexity,
magnitude and detailing the impact of cyber
security. This research can also evaluate time series
modelling for directly comparing with e-commerce,
ERP and websites.
According to the (de Gusmao et al.2018) The
further research in this technique can help in
developing an information security maturity model
which will help in quantifying the risk level.
Diagram/Flowchart
8
Why (Justify)
Critical Thinking: Limitations of the research
current solution, and Why (Justify)
Input (Data) Output (View)
Internet
transaction
fault tree analysis
Customers
security
Identify the
consequences of
cyber attack
Focuses on the particular accident event
Helps in determining how cyber attacks can be
failed.
FTA supports analysis of the vulnerability of
the system security
Probabilistic approach is restricted in where
the risk is not predictable
Security risks are short lived for malicious
intent behind the attack.
(Describe the research/current solution) Evaluation Criteria How this research/current solution is valuable
for your project
What is the Future work that set by the author
in Conclusion and Future work section
(de Gusmao et al.2018) the author have stated
that the research is about overcoming from the
security attacks which occurs during the extensive
network. The research proposed the FTA model
to find the minimal cost and to illustrate the
increased vulnerability of e-commerce to cyber
security attacks.
The application of fuzzy theory and decision
uncertainty is helpful in evaluating the complexity,
magnitude and detailing the impact of cyber
security. This research can also evaluate time series
modelling for directly comparing with e-commerce,
ERP and websites.
According to the (de Gusmao et al.2018) The
further research in this technique can help in
developing an information security maturity model
which will help in quantifying the risk level.
Diagram/Flowchart
8

Figure 2: PROCESSING OF THE MODEL
Reference in APA format that will be in 'Reference List'
9
Reference in APA format that will be in 'Reference List'
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Gai, K., Qiu, L., Chen, M., Zhao, H., & Qiu, M. (2017). SA-EAST : Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous
CloudComputing.
Abdo, H., Kaouk, M., Flaus, J., & Masse, F. (2017). A safety/security risk analysis approach of industrial control systems: A cyber bowtie - Combining
new version of attack tree with bowtie analysis. Computers & security.
Citation that will be in the content
(Gai et al.2017)
(Abdo et al.2017)
10
CloudComputing.
Abdo, H., Kaouk, M., Flaus, J., & Masse, F. (2017). A safety/security risk analysis approach of industrial control systems: A cyber bowtie - Combining
new version of attack tree with bowtie analysis. Computers & security.
Citation that will be in the content
(Gai et al.2017)
(Abdo et al.2017)
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

3
Reference in APA format that will be in
'Reference List'
Bauer, J., & Jannach, D. (2018). Optimal pricing in e-commerce based on sparse and noisy data. Decision
Support Systems, 106, 53-63. https://doi.org/10.1016/j.dss.2017.12.002
Citation that will be in the content (Bauer et al.2018)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://www-sciencedirect-
com.ezproxy.csu.edu.au/science/article/pii/
S016792361730221X
Q1 E-commerce
Dynamic pricing
Data mining
Machine learning
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution &
What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
Online learning technique, Machine
learning system.
Tools: Systematic decision tool
Applied Area: Traditional e- commerce
Current solution: To proposed a
automated method to optimized the
business metrics like profits.
Problem: Frequently changing price in the
market
Goal: frequently changing market to overcome
by e- commerce platform to adjust their prices
in the short time intervals. Also it provide the
optimal price in terms of profits with e
learning based approach.
Competition-based pricing
Derivative-following and model optimizer algorithm
Comparing with other pricing methods for the given
problem
Existing approaches
Dynamically price as reinforcement learning: regret
minimization and multi-armed.
The Process (Mechanism) of this Work; The process steps of the Technique/system
11
Reference in APA format that will be in
'Reference List'
Bauer, J., & Jannach, D. (2018). Optimal pricing in e-commerce based on sparse and noisy data. Decision
Support Systems, 106, 53-63. https://doi.org/10.1016/j.dss.2017.12.002
Citation that will be in the content (Bauer et al.2018)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://www-sciencedirect-
com.ezproxy.csu.edu.au/science/article/pii/
S016792361730221X
Q1 E-commerce
Dynamic pricing
Data mining
Machine learning
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution &
What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
Online learning technique, Machine
learning system.
Tools: Systematic decision tool
Applied Area: Traditional e- commerce
Current solution: To proposed a
automated method to optimized the
business metrics like profits.
Problem: Frequently changing price in the
market
Goal: frequently changing market to overcome
by e- commerce platform to adjust their prices
in the short time intervals. Also it provide the
optimal price in terms of profits with e
learning based approach.
Competition-based pricing
Derivative-following and model optimizer algorithm
Comparing with other pricing methods for the given
problem
Existing approaches
Dynamically price as reinforcement learning: regret
minimization and multi-armed.
The Process (Mechanism) of this Work; The process steps of the Technique/system
11

Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Competition pricing: Some companies like e-
commerce often determines their prices based on
the other competitor.
Competitor basically compare their prices and
they down their market below the other
They are not optimal with respect to their
prices.
2 Derivative and model optimizer algorithm
It proposed 2 solutions: - Derivative-Following
Algorithm (DF)
Model-Optimizer Algorithm (MO)
Algorithm of derivative of highly prone to over
fitting
The following algorithm is to considers the
past price instead of Longer history.
Over-fitting is a problem for model
optimizer algorithm
3 Comparing pricing methods for the given
problem
It compares the different works with the existing
works.
When using DM And Mo no detailed
information is required about the customer.
It neglects data on product level.
4 Dynamically price as reinforcement learning:
regret minimization multi-armed.
Determining new prices in different way based
on previous value
It provides the multi armed application for
dynamic pricing.
learning problem is framed as
reinforcement.
5 Existing approaches
Traditional e- commerce of dynamically pricing
Author developed Decision support frame
work.
Domain specific deal problem.
12
1 Competition pricing: Some companies like e-
commerce often determines their prices based on
the other competitor.
Competitor basically compare their prices and
they down their market below the other
They are not optimal with respect to their
prices.
2 Derivative and model optimizer algorithm
It proposed 2 solutions: - Derivative-Following
Algorithm (DF)
Model-Optimizer Algorithm (MO)
Algorithm of derivative of highly prone to over
fitting
The following algorithm is to considers the
past price instead of Longer history.
Over-fitting is a problem for model
optimizer algorithm
3 Comparing pricing methods for the given
problem
It compares the different works with the existing
works.
When using DM And Mo no detailed
information is required about the customer.
It neglects data on product level.
4 Dynamically price as reinforcement learning:
regret minimization multi-armed.
Determining new prices in different way based
on previous value
It provides the multi armed application for
dynamic pricing.
learning problem is framed as
reinforcement.
5 Existing approaches
Traditional e- commerce of dynamically pricing
Author developed Decision support frame
work.
Domain specific deal problem.
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 70
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.