Safety of Online Shopping Through Mathematics
The easy and convenient way of shopping from the Internet attracts customers from all over the world to shop on-line. Anyone can browse the millions of websites, like Amazon.com and Ebay.com, that sell a variety of items or hold on-line auctions, as long as they have Internet access. Most big chain stores in the United States have on-line stores that sell the items they have in the stores for the convenience of lazy shoppers. However, there are risks that shopper should consider before they decide to buy from a site. Aside from the quality of the item, they have to worry about the safety of the money transition on the web. Most sites accept credit cards as a method of payment. However, how
…show more content…
Public key cryptography plays a major role in the world nowadays since the Internet has become a public place where people can exchange ideas and information. Public key cryptography is important for exchanging messages securely between two parties on the Internet. The RSA algorithm, a method of public key cryptography, was invented and has been the most popular encryption method to date.
Ron Rivest, Adi Shamir, and Leonard Adleman invented the RSA algorithm in 1978 at Massachusetts Institute of Technology. They studied the Diffie-Hellman-Merkle key exchange algorithm, which used public key but didn’t employ digital signatures. They then began searching for a better practical mathematical function of public key cryptography. They worked on more than 40 candidates until they finally discovered a great algorithm that exactly fit the requirements for a convenient public key cryptography implementation.
The RSA algorithm is one of the topics of modular arithmetic in number theory. Number theory, a branch of pure mathematics, is the study of properties of integers. This branch works with different classes of problems that have arisen naturally from the study of integers. It is divided into several fields depending on the methods used and the types of questions researched. Modular arithmetic is one of the fields of number theory. In modular arithmetic, numbers only go from zero up to a certain value, the
Public key and private is a type of encryption technique that can be used ensuring that the communication on the network is secured. When you sending a message to someone through the network, will need to use the public key of the receiver and the receiver will use the private key to decrypt the message. This encryption will avoid unauthorised access to the message such as reading
Online commerce was introduced to consumers in the mid-1990’s, and in the years since, it has grown exponentially. It started out virtually nonexistent and has become a multi-billion dollar industry. Nearly every retail sector has entered online commerce; clothing, electronics, home, health and grooming items, even food and groceries are starting to gain traction online. Online commerce sites rival traditional brick and mortar stores such as Walmart and Target, as well as other big-box stores. As online retailers such as Amazon continue to expand, many brick and mortar stores have been making their way online, indicative of an increasing movement towards online commerce. With more than 80% of the online population having made an online
People use interactive Web pages to obtain stock quotes, receive tax information from the Internal Revenue Service, make appointments with a hairdresser, consult a pregnancy planner to determine ovulation dates, conduct election polls, register for a conference, search for old friends, and the list goes on. It is only natural that the Web's functionality, popularity, and ubiquity have made it the seemingly ideal platform for conducting electronic commerce. People can now go online to buy CDs, clothing, concert tickets, and stocks. Several companies, such Digicash, Cybercash, and First Virtual, have sprung up to provide mechanisms for conducting business on the Web. The savings in cost and the convenience of shopping via the Web are incalculable. Whereas most successful computer systems result from careful, methodical planning, followed by hard work, the Web took on a life of its own from the very beginning. The introduction of a common protocol and a friendly graphical user interface was all that was needed to ignite the Internet explosion. The Web's virtues are extolled without end, but its rapid growth and universal adoption have not been without cost. In particular, security was added as an afterthought.
Many people are moving from physical stores to purchasing merchandise and services on the Internet. Today,
PayPal allows the customer to purchase products with their bank account or credit cards and all they need to do is setup a free account. Identity theft has become very popular both online and in store. The customer needs to check their financial records frequently and to be sure not to give out personal information unless they have reason to trust them. Hacking has become so popular, and consumers need to be aware of ways to protect themselves such as using a prepaid credit card while making online purchases. The customer should only put the amount of money they wish to spend on the prepaid card so if they are one of the customer’s who are hacked, they won’t lose anything. Stores often time have a final sale on some items or a no return policy. Customers need to be aware and ask questions if unsure. Online customers run the risk of orders not arriving, not arriving on time or packages being lost. Stores also offer competitor price matching tools to track prices and offer discounts if products are defective or opened.
Book Bunker’s interest in accepting payments online also requires knowledge regarding online security. Online security is vital to an e-commerce business, because customer information, as well as transaction information is available to hackers if the correct security protocols are not implemented. Creating a secure online environment for Book Bunker customers can be done through various security features such firewalls, software, and a secure e-pay service. Security protocols should be implemented prior to the online payment system being activated, to ensure the customer information and transaction records are protected. The acceptance on online payments will also require preparation, such as creating a merchant account, choosing a service, and imbedding the service on the Book Bunker website. Implementation can be time consuming, but the result will be increased revenue for Book Bunker, because customers will not be deterred by the requirement to complete sales over the phone or in the store.
Nowadays organizations online need to ensure their client's information. If not individual data along with credit card numbers can fall into the wrong hands and we know what will happen at that point. This is one of the issues with online retailers but another is when the retailers sell their client's information. If this is done, then the client will have an issue with who gets their personal information and can be annoyed by the organizations that get their data. Generally, third party organizations are the ones purchasing this data. This can be a scary issue because many individuals are purchasing item online and this increases the risk of their data being sold. The data can go to third parties or into the wrong hands and this is
many customers are still very afraid to purchase online because of the security issues that 's why it 's very good to have more than one payment method, payment methods include E-cheques, credit cards, Gift cards, and the best one from my point of view because it 's very known for safe online shopping is PayPal.
There are two ways to shopping in our modern life : online shopping and traditional shopping . Online shopping allows people to directly purchase clothes , books , apparatus or any goods from an online store over the internet . It is a new technology that has been created along with the development of the Internet . The online shopping services have become common because of the ease of access to the internet and often each person possess a computer and buys something on the internet at least once through online shopping . It is a convenient way of shopping and allows for a vast variety of products to be at your hand but the number of scams and disadvantages in online is also increasing with it .
The buyers and sellers must trust the e-commerce’s computing environment and the infrastructure. If they do not feel comfortable or trust security of the infrastructure he or she will not buy the product he or she was looking to buy (Turban, King, McKay, Marshall, Lee, & Viehland, 2008). There are two ways to increase trust in e-commerce the following are: 1.) Affiliate with an objective third party. This builds trust by putting hypertext links on their website to other trusted reputable companies. 2.) Establish trustworthiness through these key elements integrity, competence, and security (Turban, King, McKay, Marshall, Lee, & Viehland, 2008).
Online shopping has experienced rapid growth during the recent years due to the unique advantages it offers for consumers. While it is still nice to stop by a store to touch and see the products, the convenience of online shopping cannot be beat. And for
Online shopping is a modern concept which has grown in popularity with the rapid global growth in e-commerce. Apparently, many customers are attracted to this new concept of shopping because of the various benefits and offers of the internet. Online shoppers can enjoy the opportunity to shop at any time whenever convenient using an electronic device without the pressure of going to the traditional brick-and-mortar stores. It also allows browsing through seemingly never-ending options for merchandise or products not available in local stores and can let customers evaluate the different online stores to make comparison between items and products, their brands and prices which is difficult and time-consuming
Many researchers show that consumers perceive a high level of risk associated with Internet shopping that is likely to discourage them from engaging in online purchases. Typically, the perceived risk is greater for decisions requiring higher involvement, greater uncertainty, or greater monetary outflow (Grewal, Munger, Iyer, & Levy, 2003). Moreover, prior research suggests that consumers have different risk perceptions related to types of shopping modes (Huang, Schrank, & Dubinsky, 2004). As an example, consumers perceived to be in higher risk when purchasing products and services online than when purchasing products and services through the conventional methods. In the online shopping medium, a level of perceived risk may be higher because consumers have a lesser understanding or unfamiliar with the online retail process. Since online shopping is relatively new and most of the consumers have little experience with it, it is quite a challenge to many consumers and online retailers as well. Generally, consumers may resist and be hesitant to provide personal information in a non-face-to-face interaction, especially on information that is related to financial matters and credit cards because they fear that those who get the information may abuse it or do fraudulent acts which may jeopardise the consumer (So & Scull, 2002). Privacy concerns about the Internet can be divided into four areas (George,
More and more people have experienced shopping online and there are a increasing number of people who prefer E-Purchasing.
Online shopping provides consumers with and experience of sensation. Making payments or shopping can be done everywhere and anywhere as long as there is an internet connection. The internet allows customers to do shopping online anytime and anywhere, which means customer can browse and shopping online 24-hours a day, 7 days a week from home or office, which attracts some time-starved shoppers come to Internet for save time to searching products in physical store. Additionally, Internet offers some good ways to save money and time. For example, shoppers do not need go out to the physical store and thus there is no transportation