Privacy Threats in E-Shopping (Position Paper)

نویسندگان

  • Jesus Diaz
  • Seung Geol Choi
  • David Arroyo
  • Angelos D. Keromytis
  • Francisco de Borja Rodríguez Ortiz
  • Moti Yung
چکیده

E-shopping has grown considerably in the last years, providing customers with convenience, merchants with increased sales, and financial entities with an additional source of income. However, it may also be the source of serious threats to privacy. In this paper, we review the e-shopping process, discussing attacks or threats that have been analyzed in the literature for each of its stages. By showing that there exist threats to privacy in each of them, we argue our following position: “It is not enough to protect a single independent stage, as is usually done in privacy respectful proposals in this context. Rather, a complete solution is necessary spanning the overall process, dealing also with the required interconnections between stages.” Our overview also reflects the diverse types of information that e-shopping manages, and the benefits (e.g., such as loyalty programs and fraud prevention) that system providers extract from them. This also endorses the need for solutions that, while privacy preserving, do not limit or remove these benefits, if we want prevent all the participating entities from rejecting it.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Economic Model of the Consumers' Online Shopping Utility and Factors Affecting on Online Shopping

This paper integrates extant literature on retailing and consumer choice to develop an economic model of consumer choice in which a consumer self-selects on-line shopping. Three important factors impacting consumer choice of on-line shopping: (1) the online shopping utility (2) the consumers’ perceived product and service risks (Perceived Privacy Protection, Perceived Security Protection etc.) ...

متن کامل

Supply-side hurdles in Internet B2C e-commerce: an empirical investigation

Given Hong Kong’s special circumstances of small physical size, advanced infrastructure, and low shopping cost, a survey is designed under which supply-side problems in Internet business-to-consumer (B2C) e-commerce are indirectly revealed by responses on the demand side. Difficulties arising from the reluctance to answer questionnaires on the part of e-firms wary about trade and innovation sec...

متن کامل

The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy

The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a ...

متن کامل

E-shopping and in-store shopping status in Tehran: Can e-shopping reduce traffic in the future?

Nowadays Information and Communication Technology effects on all aspects of human activities, such as teleworking, electronic commerce, electronic banking, electronic learning, etc. the most of these services can prevent unnecessary travels in cities especially in rush hour. The aim of this study is to explore the frequency of electronic shopping and in-store shopping in Tehran, according to ge...

متن کامل

Privacy Preserving Architectures for Collaborative Intrusion Detection

Collaboration among multiple organizations is imperative for contemporary intrusion detection. As modern threats become well sophisticated it is difficult for organizations to defend with threat context local to their networks alone. Availability of global threat intelligence is must for organizations to defend against modern advanced persistent threats (APTs). In order to benefit from such glo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015