You are on page 1of 5

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/304621797

E-Commerce Challenges and Solutions

Article · June 2016

CITATIONS READS
3 27,371

3 authors, including:

Dhiyauddin Aziz
Universiti Teknologi MARA
6 PUBLICATIONS   3 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Evaluating the Usefulness and the Ease of Use of Rental Property Management Apps in Malaysia View project

All content following this page was uploaded by Dhiyauddin Aziz on 29 July 2016.

The user has requested enhancement of the downloaded file.


E-Commerce Challenges and Solutions
Zunawanis Mustafa
Mohd Shahrulnizam Abu Hassan
Mohamad Dhiyauddin Abd Aziz
Faculty of Computer and Mathematical Sciences
Universiti Teknologi Mara
Shah Alam, Selangor
{dzunahu, shahrul85, dayau89}@gmail.com

Abstract – The explosion of e-commerce businesses of gross merchandise value were the Alibaba Group,
has seen the growth of number of the online followed by Amazon and eBay [2].
businesses worldwide. Consumers nowadays are
opted with online business commerce which is Deniably, e-commerce enterprises have
considerably convenience compared to traditional offered a proven number of prospective benefits like
transactions. Deniably, e-commerce enterprises better market access and reach, lower cost for
offer more benefits, comparing to “bricks-and- dealings for both buyers and sellers, improvement
mortal” traditional enterprises, but not to be over domestic and market efficiency, as well as
missed the issues and challenges faced by the e- enhancing involvement in international value chains,
commerce enterprises. This study highlighted the but not to forget, the issues and challenges face by
issues and challenges of e-commerce and a set of new or existing players in the sectors [2].
proposed solutions to those issues and challenges.
Among the issues are trust, readiness and security.
For each of the issues and challenges, proposed
solutions are presented.
II. LITERATURE REVIEW
Keywords – E-commerce; trust; readiness;
e-commerce security
Researchers have defined e-commerce in
many versions. Using the Organization for
I. INTRODUCTION Economic Cooperation and Development (OECD)
The combination of the Internet and e- version, e-commerce can be defined as [3]:
commerce usage has produced a new online “The sale or purchase of goods or services,
atmosphere that is extremely efficient and effective conducted over computer networks by
[1]. The feasibility features offered by e-commerce methods specifically designed for the
has swiftly transforming the way in which enterprises purpose of receiving or placing of orders.
communicating with each other, as well as with The goods or services are ordered by those
consumers and governments. The use of e-commerce methods, but the payment and the ultimate
on micro and small enterprises; and in the service delivery of the goods or services do not have
sectors has a noteworthy blow on firm performance to be conducted online. An e-commerce
[2]. transaction can be between enterprises,
households, individuals, government, and
Most of the international players and the other public or private organizations. To be
largest e-commerce enterprises, measured by online included are orders made over the web,
revenue, come from the United States and China. extranet or electronic data interchange. The
Those companies are Amazon.com (United States), type is defined by the method of placing the
JD.com (China), Dell (United States) and Jia.com order. To be excluded are orders made by
(China). Enterprises like Alibaba Group (China), telephone calls, facsimile or manually typed
eBay (United States) and Rakuten (Japan) provide e-mail.”
platform which allow individuals and small
businesses to offer their goods and services online There are four types of e-commerce; business-to-
[2]. In 2013, the top e-commerce enterprises in term business (B2B), business-to-consumer (B2C),
consumer -to-consumer (C2C) and business-to-
government (B2G). Although the mainstream IV. CHALLENGES
research tends to focus on B2C without making any
difference between B2C and C2C, but C2C e-
commerce has been found to be more popular [1]. A. Trust
The trust between sellers and buyers plays an
important role for any successful e-commerce
A. Business-to-business (B2B) transactions. Yoon and Occena [1] have found out
B2B can be defined as the transaction between that trust is the fundamental problem in e-commerce
businesses, for instance, between a wholesaler and a environment. Comparing to traditional commerce,
retailer, or between a manufacturer and a wholesaler trust is more important in e-commerce because goods
[2]. The total value for this sector is more than $15 and services purchased over the Internet cannot be
trillion in 2013, as estimated by UNCTAD [2]. immediately verified and also because of the lack of
rules and regulation in e-commerce [1].
B. Business-to-consumer (B2C)
B2C is the sales by “pure-play” e-commerce B. Readiness Level
enterprises. Measured by both online buyers and by Readiness level is another factor of the e-
revenue, China emerged as the largest global market commerce challenges. Kurnia et al. [4] presented a
for B2C e-commerce and the market is expanding framework consisting three levels of readiness which
rapidly, especially in Asia and Africa [2]. are Organizational Readiness (OR), Industry
Consumers can be reached via broad range of Readiness (IR) and National Readiness (NR).
channels including dedicated e-commerce websites,
social networks, crowd sourcing platforms, mobile 1) Organizational readiness level
applications and so on [2]. Kurnia et al. [4] defined this first level of
readiness in the context of perceived benefits (PB)
C. Consumer-to-consumer (C2C) and perceived organization resources and governance
C2C is considered as the modern version of (PORaG). PB is used to explain how a certain
classified marketing in newspaper or going to a technology is perceived to be advantageous to an
public sale. It provides a platform offering potentials organization. In this context, PB takes into
for casual enterprises to engage in e-commerce. In consideration, the costs, risks, threats, opportunities
general, C22 like eBay or Taobao covers online and compatibility of the innovation with the existing
public sale and sales within the online communities processes, culture, existing requirements and
[2]. infrastructure. Meanwhile, PORaG is referring to
organizational perceptions of the resources
D. Business-to-government (B2G) availability which including financial, technology
The B2G dealing is similar to B2B, except that and human resources [4].
instead of business, the customers are a government
entity. Example of this sector is public e- 2) Industry readiness level
procurement [2]. Industry readiness denotes the readiness in
nurturing e-commerce technology adoption, given the
fact that small and medium enterprises (SMEs)
having fewer influence and power comparing to
larger organizations [4].
III. RESEARCH METHODOLOGY
3) National readiness level
This level is referring to the availability of
services in a country that support the adoption of e-
This study uses mainly secondary data,
commerce technologies.
which are journals and formal reports. Recent
academic journals were selected, ranging from the
C. E-commerce Security
year 2011 to 2015. The databases used are from
E-commerce security shares the same issues with
IEEE and ScienceDirect. Google Scholar was used
cyber security. The dimensions can be categorized as
as the initial platform to gather relevant articles. The
below [5]:
contents of each journal were browsed, and then
1) Integrity – making sure the data or information
collected. No new model or framework was derived
are not modified or tampered by any
from this study.
unauthorized persons and not using them without
users’ permission.
2) Non-repudiation – making sure not denying any provide personal information over the Internet [1].
sale or purchase. For the enterprises targeting consumers over 40 years
3) Authentication – making sure that only old, the trust can be established by providing
authorized persons are allowed to logon to communities that let consumers to give feedback
system. since the customers’ feedback and comments can
4) Confidentiality – sensitive data and information influence other customers [1]. Other researchers [8,
are encrypted and not easily broken. 9] agree that recommendation from family or friends
5) Privacy – the ability to manage the term under or word of mouth are considered an effective factor
which private information is acquired and used. on reputation and trust.
6) Availability – the software system is always
available and the hardware equipments are Zhang [10] stated that, the trust factors for e-
working properly, and in the case of disaster, the commerce can be measured in the form of; item as
system is able to recover quickly [6]. described in the website, service manner, and
shipping time of the products or services. Using
According to Ladan [7], e-commerce security Taobao.com as the model for the study, the
strategies dealing only with two main issues: researcher mentioned the weaknesses existing in the
protecting the business network integrity and the Taobao rating system. Taobao.com is the China’s
internal systems, and accomplishing secure largest C2C online marketplace [1, 2] where 90
transactions between the customer and the seller. percent of the transactions comes from China [2]. In
2011, the total business transactions is about 600
billion Yuan [10]. Since almost all C2C enterprises
in China has been adopting the same trust models like
Taobao, the researcher has proposed a few
V. PROPOSED SOLUTIONS countermeasures; transaction price weight, time
attenuation coefficient, and trust factors weighted to
overcome the disadvantages of Taobao adopted trust
models [10].
A. Trust Solutions
B. Readiness Solution
Noor et al. [8] proposed a trust framework for
In order to encourage enterprises, especially
social commerce which consisting of Usefulness,
SMEs, to adopt e-commerce technologies, the
Ease of Use, Security, Privacy, Website Design and
collaboration between industry partners and the
E-word of mouth. The study that focuses on S-
government should take place. The government and
commerce which is also applicable for E-commerce
industry partners need to help SMEs to build and
since it’s a subset of E-commerce.
maintain their structures, domestic organizational
According to the researchers, usefulness is the resources and governance in order to fit well with e-
degree to which user recognizes the commerce site to commerce technologies [4].
be beneficial and the user’s decision and perception
to the business transaction are affected by this factor The responsibilities of policymakers also play an
[8]. The next factor that influences the online trust is important role. To increase the awareness of industry
ease of use. standards and structures should be taken by the
policymakers [4]. Furthermore, technological
Yoon and Occena [1] stated that a notable resources, human and financial should be provided to
attempt must be made to improve the website quality facilitate the adoption of e-commerce technologies
and enhance the third-party recognition (TPR). [4].
Using gender and age as the control variables, their
research is to investigate the trust in C2C e- C. Security Solution
commerce. Younger generations are affected by the Ladan [7] stressed out that every e-commerce
quality of an e-commerce website that influence them system should have security measures because it is
to become real online purchasers [1]. E-commerce one of the most important features for e-commerce.
enterprises should come out with a different strategy Security measures should be applied at all levels that
to cater for different target of consumer’s age. For including business applications, the enterprise
the TPR, E-commerce websites have options to use internal networks, front-end clients and servers, and
third-party seals of approval like TRUSTe or also data and information interactions [7]. The
BBBOnline for endorsing the privacy seals since installation and configuration of firewalls and the
users consider them important and are more likely to implementation of DMZ in the enterprises networks
should prevent unauthorized access [7]. In addition, in Advance Computing Conference (IACC), 2015 IEEE
International, 2015, pp. 393-396.
security can be enhanced further by network
[6] H. Matbouli and Q. Gao, "An overview on web security
segregation, strong data encryption, and intrusion threats and impact to e-commerce success," in
detection system (IDS) installation and configuration Information Technology and e-Services (ICITeS), 2012
[7]. International Conference on, 2012, pp. 1-6.
[7] M. I. Ladan, "E-Commerce Security Issues," in Future
Internet of Things and Cloud (FiCloud), 2014
Meanwhile, Matbouli and Gao [6] have International Conference on, 2014, pp. 197-201.
identified five security measures to minimize the [8] A. D. Noor, R. Sulaiman, and A. Abu Bakar, "A review
threat posses by e-commerce security. The measures of factors that influenced online trust in social
are: commerce," in Information Technology and Multimedia
(ICIMU), 2014 International Conference on, 2014, pp.
1) Education – the awareness and knowledge 118-123.
among the consumers regarding the e-commerce [9] F. Meskaran and Z. Ismail, "Customers' trust in e-
security should be taken into consideration. commerce: In collective culture setting," in Information
Retrieval & Knowledge Management (CAMP), 2012
2) Secure Socket Layer (SSL) – the use of public
International Conference on, 2012, pp. 182-186.
key encryption in SSL ensures the [10] Y. Zhang, "Research on trust issue of current chinese
confidentiality, data integrity, authentication, and c2c e-commerce: Problems and solutions," in Trust,
non-repudiation. Security and Privacy in Computing and
Communications (TrustCom), 2012 IEEE 11th
3) Personal Identification Number (PIN) – the use International Conference on, 2012, pp. 1423-1428.
of email callbacks to confirm each transaction.
4) Personal Firewalls – having a firewall is
important to help protect a computer
5) Security Policy – having a clear security policy is
crucial step to secure an e-commerce business
enterprise.

VI. CONCLUSION

As the digital economy is expanding rapidly


and affecting more enterprises activities, it is
important to take into consideration the proposed
solutions for the mentioned issues and challenges of
e-commerce business. Even though e-commerce
enterprises could be from any types, basically they
share the common issues and challenges.

REFERENCES

[1] H. S. Yoon and L. G. Occeña, "Influencing factors of


trust in consumer-to-consumer electronic commerce
with gender and age," International Journal of
Information Management, vol. 35, pp. 352-363, 2015.
[2] UNCTAD, "Information Economy Report 2015-
Unlocking the Potential of E-commerce for Developing
Countries," 2015.
[3] OECD,
https://www.wto.org/english/tratop_e/ecom_e/wkprog_
e.htm (accessed 20 April 2016), 2011.
[4] S. Kurnia, J. Choudrie, R. M. Mahbubur, and B.
Alzougool, "E-commerce technology adoption: A
Malaysian grocery SME retail sector study," Journal of
Business Research, vol. 68, pp. 1906-1918, 2015.
[5] S. Chatterjee, "Security and privacy issues in E-
Commerce: A proposed guidelines to mitigate the risk,"

View publication stats

You might also like