dc.identifier.citation | [1] Spiegel, “Security Leaks Found at Dozens E-commerce Sites”. Ecommerce Times, January 17, 2000. [2] [26] Niranjanamurthy et al, “The Study of E-commerce Security Issues and Solutions”, International Journal of Advanced Research in Computer and Communication Engineering. 2(7), 2013. [3] [29] Wipawayangkool & Villafranca, “Exploring Millennials’ Malware Awareness and Intention to Comply with Information Security Policy,” Review of Integrative Business & Economics Reserch. 4(3), 2015. [4] Ladan, “E-commerce Security Issues”. International Conference of Future Internet of Things and Cloud, 2014. [5] Pham et al, “Commitment Issues In Delegation Process”. Proceeding of the Sixth Australasian Conference on Information Security 2008 Wollonglong, Australia, 2008. [6] Oliveira et al, “Modelling and Testing Consumer Trust Dimensions in Ecommerce.” Journal of Computers In Human Behavior, 2017. [7] Mollah et al, “Security and Privacy Challenges in Mobile Cloud Computing: Survey and Way Ahead”, Journal of Network and Computer Applications, 2017. [8] Hillman & Neustaedter, “Trust and Mobile Commerce in North Amerca”, Journal of Computers in Human Behavior, 2017. [9] Khalilzadeh et al, “Security-Related Factors in Extended UTAUT model for NFC Based Mobile Payment In The Restaurant Industry”, Journal of Computers in Human Behavior, 2017. [10] Choshin & Ghaffari, “An Investigation Of The Impact of Effecctive Factors On The Succes Of E-commerce In Small- And Mendium-Sized Companies”, Journal of Computers in Human Behavior. 66, 67-74, 2017. [11] Aljukhadar & Senecal, “The User Multifaced Expertise: Divergent Effects of the Website Versus E-commerce Expertise”, International Journal of Information Management. 36, 322-332, 2016. [12] Yangs et al, Scale, “Congestion, Efficiency and Effectiveness in Ecommerce Firms”, Journal of Electronic Commerce Research and Application, 2016. [13] Tan et al, “Developing Business Analytic Capabilities for Combating Ecommerce Identity Fraud: A Study of Trustev’s Digital Verivication Solution”, Journal of Information and Management, 2016. [14] Alyoubi, “E-commerce in Developing Countriees and How to Develop Them During the Introduction of Modern Systems”, Procedia Computer science. 65, 479-483, 2015. [15] Nilashi et al, “The Role of Security, Design and Content Factors on Costumer Trust in Mobile Commerce”, Journal of Retailing and Consumer Services. 26, 57-69, 2015. [16] Yapar et al, “The Role of Taxation Problems on the Development of Ecommerce”, Procedia – Social and Behavioral Sciences. 195, 642-648, 2015. [17] Chan et al, “Defending Against XMLRelated Attacks In E-commerce Applications With Predictive Fuzzy Associative Rules”, Journal of Applied Sift Computing. 24, 142-157, 2014. [18] Zhang et al, “Trust Fraud: A Crucial Challenge for China’s E-commerce Market”, Journal of Electronic Commerce Research and Appications. 12, 299-308, 2013. [19] Hartono et al, “Measuring Perceived Security in B2C Electronic Commerce Website Usage: A Respectification and Validation”, Journal of Decision Support Systems, 2014. [20] Junhu et al, “The Deficiency of Ecmmerce Contract and Some Propose to Perfect. Energy Procedia. 16, 633-638, 2012. [21] Zhang et al, “Assessment of ECommerce Securing Using AHP and Evidential Reasoning”, Journal of Expert Systems with Applications. 39, 3611- 3623, 2012. [22] Mik Eliza, “Mistaken Identity, Identity Theft and Problems of Remote Autthentication in E-commerce”, Journal of Computer Law & Security Review. 28, 396-402, 2012. [23] Chou & Chao-Hsiu, “Beyond Identifying Privacy Issues in E-learning Setting – Implications for Instructional Designers”, Journal of Computers & Education, 2016. [24] Meskaran et al, “Online Purschase Intention: Effects of Trust and Security Perception”, Australian Journal of Basic and Applied Sciences. 7(6), 307-315, 2013. [25] Nepomuceno et al, “How to Reduce Perceived Risk When Buying Online: The Interactions Between Intangibility, product Knowledge, Brand Familiarity, Privacy and Security Concerns”, Journal of Retailing and Consumer Services, 2013. [27] King & Dennis, “Introduction to Internet and the Digital Economy”, 46th Hawaii International Conference on System Sciences, 2013. [28] Treesinthuros, “E-commerce Transaction Security Model Based on Cloud Computing”, Proceedings Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on, 2012. [30] Chandrate, “Security Issues Related to Web Services in E-commerce”, International Conference on Advances in Communication and Computing Technologies, 2014. [31] Niranjanamurthy et al, “Analysis of Ecommerce and M-commerce: Advantages, Limitations and Security Issues”, International Journal of Advanced Research in Computer and Communication Engineering. 2(6), 2013. [32] Singh, “A Survey of Threats to Ecommerce Applications”, Research Journal Science and Technology. 8(3), 2016. [34] Chatterjee, “Security and Privvacy Issues in E-commerce: A Proposed Guidelines to Mitigate the Risk”. Advance Computing Conference (IACC), 2015 IEEE International, 2015. [35] Sahinoglu et al, “Can We Assess and Monitor Privacy and Security Risk for Social Networks?”, Procedia – Social and Behavioral Science. 57, 163-169, 2012. [36] Ahmad & Alam, “ E-Commerce Security Through Elliptic Curve Cryptography”, Procedia Computer Science. 78, 867-873, 2016. [37] Haufe et al, “Security Management Standards: A Mapping”, Procedia Computer Science. 100, 755-761, 2016. [38] Busalim & Hussin, “Understanding Social Commerce: A Systematic Literature Review and Directions for Further Research”, International Journal of Information Management. 36, 1075- 1088, 2016. [39] Grüschow et al, “How To Different Payment Methods Deliver Cost and Credit Efficiency in Electronic Commerce?”, Journal Electronic Commerce Research and Applications, 2016. [40] Mavlanova et al, “The Role of External and Internal Signals in E-commerce”. Journal Decision Support Systems, 2016. [41] Li et al, “Resolving The Privacy Paradox: Toward A Cognitive Apprisal and Emotion Approach to Online Privacy Behaviors”, Journal Information & management, 2017. [42] Chen et al, “Securing Online Privacy: An Empirical Test on Internet Scam Victimization, Online Privacy Concerns, and Privacy Protection Behaviors”. Journal Computers In Human Behavior, 2017. [43] Chang et al, “User Trust in Social Networking Services: A Comparison of Facebook and Linkedin”, Journal Computers In Human Behavior, 2017. [44] Moreno-Fernández et al, “Fishing for Phishers, Improving Internet Users’ Sensitivity To Visual Deception Cues To Prevent Electronic Fraud”, Journal Computers In Human Behavior, 2017. [45] James et al, “Exposing Others’ Information On Online Social Networks (OSNs): Perceived Shared Risk, Its Determinants, And Its Influence On OSN Privacy Control Use”, Journal of Information & Management. 30, 2017. [46] Kurnia, et al, “A Qualitative Study of Business-to-Business Electronic Commerce Adoption Within The Indonesia Grocery Industry: A Multi- Theory Perspective”, Journal of Information & Management, 2015. [47] Arpaci et al, “Effects of Security andd Privacy Cincerns on Educational Use of Cloud Services”, Journal Computer In Human Behaviour. 45, 93-98, 2015. [48] Junadi & Sfenrianto, “A model of Factors Influencing Consumer’s Intention To Use E-Payment System in Indonesia”, Journal Procedia Computer Science. 59, 214-220, 2015. [49] Aldosari, “A Proposed Security Layer for The Internet of Things Communication Reference Model”, Journal Procedia Computer Science. 65, 95-98, 2015. [50]Fryer et al, “Malicious Web Pages: What If Hosting Providers Could Actually Do Something… “, Journal of Computer Law & Security Review. 31, 490-505, 2015. [51] Jurcut et al, “Design Guidelines for Security Protocols To Prevent Replay & Parallel Session Attacks”. Journal of Computers & Security. 45, 255-273, 2014. [52] Webb et al, “A Situation Awareness Model for Information Security Risk Management”, Journal of Computers & Security. 30, 1-15, 2014.[53] Baskerville et al, “Incident-Centered Information Security: managing a Strategic Balance Between Prevention and Response”, Journal of Information & Management. 51, 138-151, 2014. [54] Ramesh et al, “An Efficacious Method for Detecting Phishing Webpages Through Target Domain Identification”. Journal of Decision Support Systems. 61, 21-22, 2014. [55] Gowtham & Krishnamurthi, “A Comprehensive and Efficacious Architecture for Detecting Phishing Webpages”. Journal of Computer & Security. 40, 23-27, 2014. | in_ID |