A Case Study of using Cryptography for the Improvement of Data Security in E-commerce Industry in the Philippines

Data security is a major concern in the e-commerce industry in the Philippines, leading to trust issues among customers regarding the safety of their personal information. Cryptography is a crucial aspect of securing data in e-commerce by providing privacy to data transmission in the presence of pot...

Full description

Saved in:
Bibliographic Details
Published in2023 8th International Conference on Computer and Communication Systems (ICCCS) pp. 695 - 700
Main Authors Blancaflor, Eric B., Competente, Leigh Ann M., Fallar, Jeremy D., Magadan, Nicole Florence J., Piopongco, Kristine Joy R., Salinas, Leicester Noel L.
Format Conference Proceeding
LanguageEnglish
Published IEEE 21.04.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Data security is a major concern in the e-commerce industry in the Philippines, leading to trust issues among customers regarding the safety of their personal information. Cryptography is a crucial aspect of securing data in e-commerce by providing privacy to data transmission in the presence of potential threats. The study aimed to discuss and understand the improvement of Data Security in the E-commerce industry in the Philippines. A survey was conducted with 21 e-commerce platform users ranging from 18 to 30 years old to evaluate whether cryptography has improved data security in e-commerce from the consumers' perspective. The result showed that most respondents are satisfied with the current data security methods but strongly agreed to improve the E-commerce websites' security further. Thus, the recommendation of Cryptography as a data security method. The findings of this case study highlight that the best cryptography algorithm is the RSA algorithm due to its superior security, effectiveness, and widespread use. Next-generation encryption was found to be the best cryptographic tool, offering multi-layered protection by acting on threat detection across the entire network.
DOI:10.1109/ICCCS57501.2023.10150939