India is rapidly becoming a growing E-commerce destination. With the quick utilization of the web, E-commerce has been expanded with the climax. E-commerce deals with the selling and purchase of goods and services, or transportation of assets or information, mainly over the web. Presently a day’s data assumes a critical part in the group. Hence, it is important to frame the information of E-commerce. In this paper, we have discussed different models of E-commerce transactions along with the information security approach of E-commerce. The approach includes the process, dimension, and security threats related to the E- commerce environment. This paper gives a comparative analysis of different E-commerce sites.

1.
Xin
Tian
and
Wei
Dai
, “
Study on Information Management and Security of E-commerce System
,”
International Symposium on Intelligence Information Processing and Trusted Computing
,
2010
.
2.
Qingjie
Zhang
,
Jianming
Zhu
,
Xiaoxu
Wang
,
Yapan
Li
, ”
Monoecism Algorithm in the Application of Ecommerce Information Security
,”
International Conference on Management of e-Commerce and e-Government
,
2014
.
3.
Eser
Kandogan
,
Christopher S.
Campbell
,
Peter
Khooshabeh
,
John
Bailey
and
Paul P.
Maglio
, ”
Policy-based Management of an E-commerce Business Simulation: An Experimental Study
,”
IEEE
,
2006
.
4.
Sun
Jinzhong
and
Lin
Jian
, ”
Inventory Policy Based on Differential Pricing with Stockout Compensation in B2C E-commerce
,”
IEEE International Conference on Grey Systems and Intelligent Services
,
2007
.
5.
Dong-sheng
Liu
,
Wei
Chen
and
Shi-wen
Gao
,”
Gradual Tax Policies for China’s E-commerce Based on Mode Classification
,”
International Joint Conference on Artificial Intelligence
,
2009
.
6.
S. M. Hasan
Mahmud
,
Md Alamgir
Kabir
,
Omar
A. M.
Salem and Kazihise Ntikurako Guy Fernand
,”
The Comparative Analysis of Online Shopping Information Platform’s Security Based on Customer Satisfaction
,”
5th International Conference on Computer Science and Network Technology (ICCSNT
),
2016
.
7.
Jiang
Hua
and
Cui
Zhenxing
, ”
Study on Problems and Countermeasures of Ecommerce Information Security
,”
First International Workshop on Education Technology and Computer Science
,
2009
.
8.
Kutub
Thakur
,
Md Liakat
Ali
,
Keke
Gai
and
Meikang
Qiu
, ”
Information Security Policy for E-Commerce in Saudi Arabia
,”
IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, IEEE International Conference on Intelligent Data and Security
,
2016
.
9.
Ruby B.
Lee
, ”
Challenges in the Design of Security-Aware Processors
,”
Proceedings of the Application-Specific Systems, Architectures, and Processors (ASAP’03)
,
2003
.
10.
Thembekile O.
Mayayise
and
Isaac O.
Osunmakinde
,
”A Compliant Assurance Model for Assessing the Trustworthiness of Cloud-based E-Commerce Systems
,”
IEEE
,
2013
.
11.
David
Scott
and
Richard
Sharp
, ”
Specifying and Enforcing Application-Level Web Security Policies
,”
IEEE transactions on knowledge and data engineering
,
2003
.
12.
Cungang
Yang
and
Chang N.
Zhang
, ”
Designing Secure E-Commerce with Role-based Access Control
,”
Proceedings of the IEEE International Conference on E-Commerce (CEC’03
),
2003
.
13.
Gustavo A. Santana
Torrellas
, ”
A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services
,”
Proceedings of the Third IEEE International Symposium on Network Computing and Applications (NCA’04
),
2004
.
14.
I.
Bose
and
A. C. M.
Leung
, ”
A Comparative Study of Anti-Phishing Preparedness of Hong Kong and Singapore Banks
,”
Proceedings of the 2007 IEEE IEEM
,
2007
.
15.
Badrul
Sarwar
,
George
Karypis
,
Joseph
Konstan
, and
John
Riedl
, ”
Analysis of Recommendation Algorithms for Ecommerce
,”
Copyright 2000 ACM
,
2000
.
16.
Luanna Lopes
Lobato
,
Eduardo B.
Fernandez
and
Sérgio Donizetti
Zorzo
, ”
Patterns to support the development of privacy Policies
,”
International Conference on Availability, Reliability and Security
,
2009
.
17.
Hoopad
Mobahat
, ”
Authentication and Lightweight Cryptography in Low Cost Rfid
,”
2nd International Conference on Software Technology and Engineering (ICSTE
),
2010
.
18.
Z. Zareh
Hosseini
and
E.
Barkhordari
, ”
Enhancement of security with the help of real time authentication and one time password in e-commerce transactions
,”
5th Conference on Information and Knowledge Technology
,
2013
.
19.
Mohammed Ali
Hussain
, ”
A Study of Information Security in E-Commerce Applications
,”
International Journal of Computer Engineering Science (IJCES)
,
2013
.
This content is only available via PDF.
You do not currently have access to this content.