A Systematic Framework for Building Trusted Online Transaction Environment: Three Information Infrastructures

Article Preview

Abstract:

Absence of trusted online transaction environment (TOTE) becomes the biggest obstacle to e-commerce development, which embodies three key problems: unauthentic identity information, false product information and insecure transaction process. In order to present a systematic method to build trusted online transaction environment with identity authentic information, accurate product information and secure transaction process, this article puts forward a framework composed of three information infrastructures: Identity Authentication Service (IAS), Product Information Service (PIS) and Electronic Contracts Service (ECS). They have been implemented in online pharmaceutical transaction field in China, and have facilitated all online transaction participants such as pharmaceutical manufactures, dealers, consumers, online market operators and government regulators.

You have full access to the following eBook

Info:

[1] DEVARAJ S, FAN M, KOHLI R. Antecedents of B2C channel satisfaction and preference: Validating e-commerce metrics [J]. Information Systems Research, 2002, 13(3): 316-33.

DOI: 10.1287/isre.13.3.316.77

Google Scholar

[2] TEO T S H, YU Y Y. Online buying behavior: a transaction cost economics perspective [J]. Omega-International Journal of Management Science, 2005, 33(5): 451-65.

DOI: 10.1016/j.omega.2004.06.002

Google Scholar

[3] SMITH A D. E-security issues and policy development in an information-sharing and networked environment [J]. Aslib Proceedings, 2004, 56(5): 272-85.

DOI: 10.1108/00012530410560878

Google Scholar

[4] ZIMMER J C, ARSAL R E, AL-MARZOUQ M, et al. Investigating online information disclosure: Effects of information relevance, trust and risk [J]. Information & Management, 2010, 47(2): 115-23.

DOI: 10.1016/j.im.2009.12.003

Google Scholar

[5] SANDHU R, SAMARATI P. Authentication, access control, and audit [J]. Acm Computing Surveys, 1996, 28(1): 241-3.

DOI: 10.1145/234313.234412

Google Scholar

[6] BASU A, MUYLLE S. Authentication in E-Commerce [J]. Communications of the ACM, 2003, 46(12): 159-66.

Google Scholar

[7] HOFFMAN D L, NOVAK T P, PERALTA M. Building consumer trust online [J]. Communications of the Acm, 1999, 42(4): 80-5.

DOI: 10.1145/299157.299175

Google Scholar

[8] HUNT R. Technological infrastructure for PKI and digital certification [J]. Computer Communications, 2001, 24(14): 1460-71.

DOI: 10.1016/s0140-3664(01)00293-6

Google Scholar

[9] BA S L, WHINSTON A B, ZHANG H. Building trust in online auction markets through an economic incentive mechanism [J]. Decision Support Systems, 2003, 35(3): 273-86.

DOI: 10.1016/s0167-9236(02)00074-x

Google Scholar

[10] MAVLANOVA T, BENBUNAN-FICH R. Counterfeit Products on the Internet: The Role of Seller-Level and Product-Level Information [J]. International Journal of Electronic Commerce, 2010, 15(2): 79-104.

DOI: 10.2753/jec1086-4415150203

Google Scholar

[11] DINEV T, HART P. Internet privacy concerns and social awareness as determinants of intention to transact [J]. International Journal of Electronic Commerce, 2005, 10(2): 7-29.

DOI: 10.2753/jec1086-4415100201

Google Scholar

[12] FRIEDMAN B, KAHN P H, HOWE D C. Trust online [J]. Communications of the Acm, 2000, 43(12): 34-40.

Google Scholar

[13] SULIN B, WHINSTON A B, HAN Z. Building trust in online auction markets through an economic incentive mechanism [J]. Decision Support Systems, 2003, 35(3): 273-86.

DOI: 10.1016/s0167-9236(02)00074-x

Google Scholar

[14] BA S, WHINSTON A B, ZHANG H. The dynamics of the electronic market: an evolutionary game approach [J]. Information Systems Frontiers, 2000, 2(1): 31-40.

Google Scholar

[15] LI-TING H, KUO-LIEN Y, CHENG-KIANG F. A study on the role of consumers' awareness of institutional factors on initial trust of online service [J]. WSEAS Transactions on Business and Economics, 2006, 3(2): 67-74.

Google Scholar

[16] SALO J, KARJALUOTO H. A conceptual model of trust in the online environment [J]. Online Information Review, 2007, 31(5): 604-21.

DOI: 10.1108/14684520710832324

Google Scholar

[17] MANCHALA D W. E-commerce trust metrics and models [J]. Ieee Internet Computing, 2000, 4(2): 36-44.

DOI: 10.1109/4236.832944

Google Scholar

[18] XIAO Y, YUETING C, YI L. A secure model for electronic contract enactment, monitoring and management [J]. Proceedings of the Second International Symposium on Electronic Commerce and Security, ISECS 2009, 2009, 296-300.

DOI: 10.1109/isecs.2009.184

Google Scholar