Annotated Bibliography
Annotated Bibliography
Annotated Bibliography
Full Name
Student ID
Table of Contents
Article 1
CITATION Crossler, R. E., Bélanger, F., & Ormond, D. (2017). The quest for complete
https://link.springer.com/article/10.1007/s10796-017-9755-1
buying products and services through internet. Crossler, Bélanger & Ormond
quantitative and qualitative method of research has been beneficial for this
CRITIQUE This study is also crucial for commenting on threat-response pairs that can be
threats of data loss and identity theft have also been discussed in this paper
Article 2
CITATION Patro, S. P., Padhy, N., & Panigrahi, R. (2016). Security issues over
10.17148/IJARCCE.2016.51216
SUMMARY This article highlights the aspects of data security through understanding the
threats. The author trio has adopted secondary method to draw the life cycle of
CRITIQUE This article is also essential for identifying security tools to control e-
commerce and developing mitigation plans for dealing with security threats.
Article 3
https://www.tandfonline.com/doi/abs/10.1080/13215906.2015.1018400
CRITIQUE The article has adopted a secondary research method to reflect on approaches of
breaches and data theft. Although this paper focuses mainly on e-marketing and
threats of e-commerce.
Article 4
CITATION Patel, P., Patel, R., Patel, V., & Pathrabe, T. (2017). Survey of Privacy and
http://www.ijirst.org/articles/SALLTNCSP005.pdf
6
Annotated Bibliography
transactions. Apart from discussing data security issues, the authors have
Article 5
CITATION Gangele, S., Pathak, D., & Verma, D. (2017). The analysis of security issues
http://ijsrst.com/paper/1708.pdf
link data and operate in e-commerce system. It has highlighted reasons for
costs, increased transaction speed along with easy availability. This requires
security collaboration.
CRITIQUE The article has evaluated cloud service provider in e-commerce framework
framework using fuzzy logic and supporting score-based solutions have been
Article 6
CITATION Kaur, K., Pathak, A., Kaur, P., & Kaur, K. (2015). E-Commerce privacy and
8
Annotated Bibliography
https://pdfs.semanticscholar.org/0ae5/7adf43e0081d5e5e3b9ef11c071e847e551e.
is exposed to several threats such as data theft, cybercrime, security breaches and
CRITIQUE This article has focused on adopting a secondary research method for evaluating
mechanisms. Besides, system integrity has also been evaluated in this paper while
commerce system.
9
Annotated Bibliography
Article 7
CITATION Ahmad, K., & Alam, M. S. (2016). E-commerce security through elliptic
doi: 10.1016/j.procs.2016.05.549
adopt e-commerce business approaches for dealing with customers across the
world (Ahmad & Alam, 2016). This particular research has focused on
CRITIQUE The author duo has followed a secondary method of research to explore
Article 8
CITATION Patro, S. P., Padhy, N., & Panigrahi, R. (2016). Security issues over e-
SUMMARY In this paper, the author highlighted the importance of privacy and security
mainly ensures paper-less transactions between B2B, B2C, C2C and C2B.
data confidentiality. Here, the author particularly focused upon the security
issues faced by the banking industry. The issues mainly involve hacking and
security threats. The world is rapidly changing and along with the
CRITIQUE The purpose of writing this article is to understand the security threats of e-
shopping have been the purpose of the study. The author is focused upon
finding the solutions in this study. The author has studied several related
works of previous authors and then developed the solutions. After conducting
data delays should be the focus of businesses. The author has successfully
11
Annotated Bibliography
Article 9
CITATION Gangele, S., Pathak, D., & Verma, D. (2017). The analysis of security issues
SUMMARY The author mainly focused on E-commerce and ways to prevent security
money, security is of utmost importance. Here, the study has been conducted
by using exploratory survey. In this survey, the security frameworks and role
of information technology has been done. Lastly, the authors concluded that
CRITIQUE Here, the author introduced the theory of life cycle to understand security
Article 10
SUMMARY The study is focused upon the ways to manage cyber-security and emphasis
has been given upon small businesses that operate across the globe.
Businesses whether big or small can be affected by cyber breaches and hence
essential to review the available security tools. It is the only way of protecting
crucial and critical data from being breached. After building cybersecurity, it
CRITIQUE After reviewing the article, it has been understood that the author suggested
Customers should be made aware of the security breaches. In this way, small
businesses can build trust. Hence, it can be stated that the authors have given
13
Annotated Bibliography
Article 11
593.
SUMMARY In this article, the author focused on identifying the challenges while ensuring
CRITIQUE The purpose of the study is to understand the challenges faced by businesses
since they use wireless devices. The hazard of each of these challenges has
been discussed and after describing the challenges, the authors concluded that
14
Annotated Bibliography
Article 12
CITATION Neama, G., Alaskar, R., & Alkandari, M. (2016, January). Privacy, security,
ACM.
SUMMARY The study focused on the security threats in e-commerce and the importance
CRITIQUE The purpose of the study is to understand perceived risks and ways it affects
the trust of customers. The study has been conducted by using a survey
After analyzing the various viewpoints of authors regarding security threats in e-commerce, I
have understood that businesses all over the world can function securely only when it has setup a
15
Annotated Bibliography
secure system to save itself from sudden data loss or data breaches. Risks are always involved in
online transactions because huge money is involved in the process. After conducting research
and comparing twelve relevant articles, it has been understood that multilayered security systems
should be established so that businesses whether big or small can function properly without
constant fear and threat of losing financial stability. Practically, it is difficult to go through every
article and therefore I have understood the importance of selecting the relevant ones. The
research has helped me in identifying the loopholes of existing systems that attempts to secure
businesses. It has been further realized that establishing trust with customers is the only way of
retaining them and it could be done by creating awareness among them regarding setting strong
Abstract
TITLE
The aim of the project is to conduct a thoroughly researched study related to threats occurring in
Ecommerce businesses.
METHOD
16
Annotated Bibliography
The study has been conducted by choosing 12 relevant articles from trusted sites by following
the Annotated Bibliography method, the articles has been summarized and presented in a
structured format.
RESULTS
The articles have been analyzed and importance of establishing security standards in web
DISCUSSION
After reviewing the articles, the importance of ensuring security in small and large e-commerce
businesses has been understood. It researchers and authors have put significance to various
CONCLUSION
It can be concluded that creating awareness regarding cyber-security has been the primary
emphasis of the chosen articles. The ultimate contribution of the articles is to gain insight
regarding threats such as data loss, hacking, server threats, loosing customer trust, and delay in
transactions and so on. At the end of the study, each scholar have suggested that using security
tools and clear understanding of web standards can be useful to save businesses from security
threats.
Initially, several authors suggested that it is necessary to create awareness among public
regarding data breaches and consequently businesses need to focus upon choosing a secure
save businesses from unwanted threats. It can be recommended that businesses should setup alert
systems and users should be requested to use strong passwords in case of online transactions.
RESULTS
In today’s technologically advanced world, everything comes easier by a single click. Customers
now usually prefer easy and timesaving strategies and therefore, ecommerce businesses have
increased drastically. Hence, in order to secure the system, it is crucial to backup the database
constantly and creating awareness among people to use strong passwords for any form of online
transaction.
18
Annotated Bibliography
Figure 2: Results