Keamanan Dalam Electronic Commerce
DOI:
https://doi.org/10.21512/comtech.v1i2.2623Keywords:
e-commerce, security, threatAbstract
The objective of this paper is to give information and understanding about security threat that could happen in security system in e-commerce. The approach used is how the transaction system is, how the security is applied, and also the possible security threat in e-commerce. The result of this research is that there are still gaps in e-commerce. It is hoped that the business actors will be more realized about the security importance and more aware about the possible threat.
Plum Analytics
References
Laudon, K. C., & Traver, C. G. (2004). E-Commerce, Business. Technology. Society (2nd ed.). Addison-Wesley.
Potter. (2003). Introduction to Information Technology (2nd ed.). New Jersey: John Wiley & Sons, Inc.
Haryadi, H. (2009). Carding, di akses 15 Agustus 2010, dari http://www.tandef.net/carding
Muharami, E. (2010). E-Payment, diakses 14 Agustus 2010, dari http://www.ittelkom.ac.id/library/index.php?option=com_content&view=article&id=652:epayment&catid=6:internet&itemid=15
Purwanto, I. (2010). Internet dan Jaringan Computer, diakses 14 Agustus 2010, dari http://ridha.staff.gunadharma.ac.id
Agustiandar, Y. E. (2008). Keamanan E-Commerce, diakses 14 Agustus 2010, dari http://epolebusiness.wordpress.com/2008/06/04/keamanan-e-commerce/
Zolzer, D. (2002). Security and Encryption, diakses 17 Agustus 2010, dari http://www.csie.ntu.edu.tw/~ec/Laudon/Chapter5.pdf
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
USER RIGHTS
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: