skip to main content
article
Free Access

Authentication in e-commerce

Published:01 December 2003Publication History
First page image

References

  1. Autonomous Agents 2001. Fourth International Workshop on Deception, Fraud and Trust in Agent Societies, Montreal, Canada (May 29, 2001); www.ip.rm.cnr.it/news/wstrust.htm.Google ScholarGoogle Scholar
  2. Basu, A. and Muylle, S. Online support for commerce processes by Web retailers. Decision Support Systems 34, 4 (Mar. 2003), 379--395. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Choi, S., Stahl, D., and Whinston, A. The Economics of Electronic Commerce. Macmillan Technical Publishing, Indianapolis, IN, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. CommerceNet. Barriers to Electronic Commerce 2000 Study; http://www.commerce.net.Google ScholarGoogle Scholar
  5. Friedman, B., Kahn, P., and Howe, D. Trust online. Commun. ACM 43, 12 (December 2000), 34--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Grazioli, S., and Jarvenpaa, S. Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man, and Cybernetics---Part A: Systems and Humans 30, 4 (July 2000), 395--410. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hoffman, D., Novak, T., and Peralta, M. Building consumer trust online. Commun. ACM 42, 4 (Apr. 1999), 80--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jarvenpaa, S., and Tractinsky, N. Consumer trust in an Internet store: A cross-cultural validation. Journal of Computer-Mediated Communication 5, 2 (December 1999); http://www.ascusc.org/jcmc/vol5/issue2/jarvenpaa.html.Google ScholarGoogle Scholar
  9. Kambil, A., and van Heck, E. Reengineering the Dutch flower auctions: A framework for analyzing exchange organizations. Information Systems Research 9, 1 (Mar. 1998), 1--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Resnick, P., Zeckhauser, R., Friedman, E., and Kuwabara K. Reputation systems. Commun. ACM 43, 12 (Dec. 2000), 45--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Sandhu, R., and Samarati, P. Authentication, access control, and audit. ACM Computing Surveys 28, 1 (Mar. 1996), 241--243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Whitten, A., and Tygar, J.D. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. Working paper, School of Computer Science, CMU (2002).Google ScholarGoogle Scholar

Index Terms

  1. Authentication in e-commerce

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Communications of the ACM
            Communications of the ACM  Volume 46, Issue 12
            Mobile computing opportunities and challenges
            December 2003
            311 pages
            ISSN:0001-0782
            EISSN:1557-7317
            DOI:10.1145/953460
            Issue’s Table of Contents

            Copyright © 2003 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 December 2003

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format