perceptions and elevate their trust levels (Srinivasan,
S., 2004). Unfortunately, when customer is unaware
of such controls it is unlikely that they will affect his
security perception. In this case he will have limited
amount of information to assess security and
trustworthiness of online merchant and in case he
decide to make online transaction with particular
merchant, he might depend on other concerns -
appearance, brand name, or just word of mouth -
which are not necessarily related to the actual
security practices of the merchants.
These findings lead us to conclude that
customers concerns about the security of internet
applications are legitimate because they still suffer
from these technical vulnerabilities which create a
barrier to the full engagement in e-Business
transactions, this should/must increase the
motivation on technology vendors to develop their
security skills and practices in order to reduce
security holes in e-Business applications.
These findings confirm Turner (2003)’s study
which suggests that because customers don’t
understand technical security controls their
perceptions of the website security are formed based
on factors such as reputation and recommendation.
However, Turner’s study didn’t highlight the novelty
of our findings. These are the need for
communicating security to customers and building
their awareness of such security controls which
arguably could improve their security assessments in
two significant ways. First, customers' concerns
might be alleviated when they are made aware of
these security controls, and furthermore their
existence might increase their perception that
merchant is secure and trustworthy. Second, we
argue that this knowledge empowers customers' to
have real controls which can be used alongside with
their anecdotal recommendations and common sense
perceptions to assess online merchant security.
REFERENCES
Katsikas, S., Lopez, J. and Pernul, G.,2005. Trust, Privacy
and Security in E-business, Requirements and
Solutions. Proc. of the 10th Panhellenic Conference
on Informatics (PCI’2005), Volos, Greece, pp. 548-
558.
Alqatawna, J., Siddiqi, J., Akhgar, B., and Hjouj Btoush,
M., 2008. Towards Holistic Approaches to Secure e-
Business: A Critical Review, CSREA EEE, 245-251.
Alqatawna, J., Siddiqi, J., Akhgar, B., and Hjouj Btoush,
M., 2008. A Holistic Framework for Secure e-
Business, CSREA EEE, 257-263.
Paine, C., Reips, U., Stieger, S., Joinson, A., and
Buchanan, T., 2007. Internet users' perceptions of
privacy concerns and privacy actions. Int. J. Hum.-
Comput. Stud, 65(6): 526-536.
Khasawneh, A., Al Azzam, I., and Bsoul, M., 2009. A
study on e-commerce security in Jordan. International
journal of electronic finance, 3 (2), 166-176.
Alsmadi, S., 2002. Consumer attitudes towards online
shopping in Jordan: Opportunities and challenges. In:
the First Forum for Marketing in Arab Countries.
Myers, M., 1997. Qualitative Research in Information
Systems, MIS Quarterly 21(2).
Ritchie, J., Spencer, L., and O'Connor, W., 2003. Carrying
out qualitative analysis. In : Qualitative research
practice. Edited by Ritchie, J., & Lewis, J., SAGE,
London.
Audestad, J. A. 2005. Four reasons why 100% security
cannot be achieved, Telektronikk, vol. 101, pp. 38.
Odlyzko, A., 2003. Economics, psychology, and sociology
of security. Lecture Notes in Computer Science, pp.
182-189.
Suh, B., and Han, I., 2003. The impact of customer trust
and perception of security control on the acceptance of
electronic commerce. International Journal of
Electronic Commerce, vol. 7, pp. 135-161.
Flavián C., and Guinalıú, M., 2006. Consumer trust,
perceived security and privacy policy. Industrial
Management and Data Systems, vol. 106, pp. 601-620.
Salisbury, W. D., Pearson, R. A., Pearson A. W. and
Miller, D. W., 2001. Perceived security and World
Wide Web purchase intention. Industrial Management
and Data Systems, vol. 101, pp. 165-176.
Lee, P. M., 2002. Behavioral model of online purchasers
in e-commerce environment. Electronic Commerce
Research, vol. 2, pp. 75-85.
SANS Institute, "SANS Top 20 vulnerabilities," [Online]
http://www.sans.org/top20, accessed 26/8/2009.
Ahmad, D., 2007. The contemporary software security
landscape. IEEE Security & Privacy, vol. 5, pp. 75-
77.
Howard, M., 2008. Becoming a Security Expert. Security
& Privacy, IEEE, vol. 6; 6, pp. 71-73, 2008.
McGraw, G., 2004. Software security. Security &
Privacy, IEEE,
vol. 2; 2, pp. 80-83.
Schneier, B., 2004. Secrets and Lies: Digital Security in a
Networked World. Wiley New York.
Srinivasan, S., 2004. Role of trust in e-business success.
Information Management and Computer Security, vol.
12, pp. 66-72.
Turner, C., 2000. How do consumers form their judgments
of the security of e-commerce web sites,
ACM/CHI2003 Workshop on Human-Computer
Interaction and Security Systems.
WEBIST 2010 - 6th International Conference on Web Information Systems and Technologies
324