E-Commerce Security Using Biometrics Technology

Filed in Computer Science Project Topics by on October 20, 2020

E-Commerce Security Using Biometrics Technology.

ABSTRACT

As technology advance daily, attacks on computer system and computer applications are becoming tremendous and increasingly numerous and sophisticated. Thus, e-commerce is threatened due to negative use of technology.

The good news is that, the complexity and anonymity of computer systems does not only aid crime in the society but also it’s a combating measure to crime, aids crime prevention and assist investigation when positively utilized. Authentication plays a critical in security related applications like e-commerce websites.

There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention in e-commerce and security systems at large.

Having realized the values of biometrics for two basic purposes namely to verify (authenticate) and identify (recognize).

INTRODUCTION

In the emerging global economy, e-commerce has increasingly become a necessary component of business strategy and a strong catalyst for economic development.

The integration of information technology (IT) in business has revolutionized relationships within organizations and those between and among organizations and individuals.

Specifically, the use of IT in business has enhanced productivity, encouraged greater customer participation, and enabled mass customization, besides reducing costs.

As electronic-commerce (e-commerce) grows and further exploits the attributes of the Internet, it will likely have significant effects on national economies and industry structure.

REFERENCE

Apanapudor, J.S., Njoseh, I.N., Ogini, N.O., and Omede, G.C. (2006). Introduction to computer science and data processing [A Practical Approach]. Reprinted. Krisbec Publications, Agbor – Nigeria.

Baily, M.N. and Lawrence, R.Z. (2001), “Do We Have a New Economy”, National Bureau of Economic Research, Working Paper, No. 8243, April.

Barney, J.B., and Hansen, M.H (1994) ‘Trustworthiness as a source of competitive advantage, Strategic Management Journal 15: pp. 175-216

Bhatnagar, S. (2003). Development and Telecommunications Access: Cases from South Asia. InC. Avgerou & L. R. La Rovere (Eds.), Information Systems and the Economics of Innovation (33-52). Edward Elgar Publishing.

Bhimani, A. (1996) ‘Securing the Commercial Internet’, Communications of the ACM 39: pp. 29-35.

Byron, S.G. (2001). Theory and Problems of Programming with visual basic Schaum’s Outline. McGraw – Hill USA.

Comments are closed.

Hey Hi

Don't miss this opportunity

Enter Your Details