Securing the virtual marketplace: Navigating the landscape of security and privacy challenges in E-Commerce

George Caleb Oguta *

Jaramogi Oginga Odinga University of Science & Technology, Kenya.
 
Review Article
GSC Advanced Research and Reviews, 2024, 18(01), 084–117.
Article DOI: 10.30574/gscarr.2024.18.1.0488
Publication history: 
Received on 15 November 2023; revised on 06 January 2024; accepted on 09 January 2024
 
Abstract: 
This paper provides a comprehensive examination of the evolving challenges and critical considerations surrounding security and privacy within the realm of e-commerce. As the digital marketplace continues to expand, the significance of safeguarding sensitive information and ensuring user privacy has become paramount. This paper explores various dimensions of security threats, including data breaches, phishing attacks, and vulnerabilities associated with payment gateways, shedding light on the potential repercussions for businesses and consumers alike. Additionally, it delves into emerging technologies and innovative solutions aimed at fortifying e-commerce platforms against evolving cyber threats. The paper not only identifies the existing vulnerabilities but also proposes proactive strategies and future directions for research and implementation. Topics such as biometric authentication, post-quantum cryptography, and privacy-preserving technologies are explored as potential avenues for enhancing the security posture of e-commerce systems. The research presented emphasizes the critical intersection of technology, regulation, and user awareness in fostering a secure and trustworthy online shopping environment. By offering insights into both the current state of e-commerce security and promising avenues for future exploration, this paper aims to contribute to the ongoing discourse on fortifying the digital marketplace against the challenges posed by an ever-evolving cyber landscape.
 
Keywords: 
E-commerce; Attacks; Privacy; Security; Performance; Cyber threats; Data breaches; User authentication
 
Full text article in PDF: 
Share this