{"id":"https://openalex.org/W4382053117","doi":"https://doi.org/10.1109/icccs57501.2023.10150939","title":"A Case Study of using Cryptography for the Improvement of Data Security in E-commerce Industry in the Philippines","display_name":"A Case Study of using Cryptography for the Improvement of Data Security in E-commerce Industry in the Philippines","publication_year":2023,"publication_date":"2023-04-21","ids":{"openalex":"https://openalex.org/W4382053117","doi":"https://doi.org/10.1109/icccs57501.2023.10150939"},"language":"en","primary_location":{"id":"doi:10.1109/icccs57501.2023.10150939","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs57501.2023.10150939","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027459129","display_name":"Eric Blancaflor","orcid":"https://orcid.org/0000-0002-7189-3040"},"institutions":[{"id":"https://openalex.org/I3129998261","display_name":"University of Makati","ror":"https://ror.org/00473rv55","country_code":"PH","type":"education","lineage":["https://openalex.org/I3129998261"]}],"countries":["PH"],"is_corresponding":true,"raw_author_name":"Eric B. Blancaflor","raw_affiliation_strings":["School of Information Technology, Map&#x00FA;a University,Makati City,Philippines"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Map&#x00FA;a University,Makati City,Philippines","institution_ids":["https://openalex.org/I3129998261"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092266709","display_name":"Leigh Ann M. Competente","orcid":null},"institutions":[{"id":"https://openalex.org/I3129998261","display_name":"University of Makati","ror":"https://ror.org/00473rv55","country_code":"PH","type":"education","lineage":["https://openalex.org/I3129998261"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Leigh Ann M. Competente","raw_affiliation_strings":["School of Information Technology, Map&#x00FA;a University,Makati City,Philippines"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Map&#x00FA;a University,Makati City,Philippines","institution_ids":["https://openalex.org/I3129998261"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092266710","display_name":"Jeremy D. Fallar","orcid":null},"institutions":[{"id":"https://openalex.org/I3129998261","display_name":"University of Makati","ror":"https://ror.org/00473rv55","country_code":"PH","type":"education","lineage":["https://openalex.org/I3129998261"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Jeremy D. Fallar","raw_affiliation_strings":["School of Information Technology, Map&#x00FA;a University,Makati City,Philippines"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Map&#x00FA;a University,Makati City,Philippines","institution_ids":["https://openalex.org/I3129998261"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092266711","display_name":"Nicole Florence Magadan","orcid":"https://orcid.org/0000-0002-6848-7754"},"institutions":[{"id":"https://openalex.org/I3129998261","display_name":"University of Makati","ror":"https://ror.org/00473rv55","country_code":"PH","type":"education","lineage":["https://openalex.org/I3129998261"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Nicole Florence J. Magadan","raw_affiliation_strings":["School of Information Technology, Map&#x00FA;a University,Makati City,Philippines"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Map&#x00FA;a University,Makati City,Philippines","institution_ids":["https://openalex.org/I3129998261"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092266712","display_name":"Kristine Joy R. Piopongco","orcid":null},"institutions":[{"id":"https://openalex.org/I3129998261","display_name":"University of Makati","ror":"https://ror.org/00473rv55","country_code":"PH","type":"education","lineage":["https://openalex.org/I3129998261"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Kristine Joy R. Piopongco","raw_affiliation_strings":["School of Information Technology, Map&#x00FA;a University,Makati City,Philippines"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Map&#x00FA;a University,Makati City,Philippines","institution_ids":["https://openalex.org/I3129998261"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092266713","display_name":"Leicester Noel L. Salinas","orcid":null},"institutions":[{"id":"https://openalex.org/I3129998261","display_name":"University of Makati","ror":"https://ror.org/00473rv55","country_code":"PH","type":"education","lineage":["https://openalex.org/I3129998261"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Leicester Noel L. Salinas","raw_affiliation_strings":["School of Information Technology, Map&#x00FA;a University,Makati City,Philippines"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Map&#x00FA;a University,Makati City,Philippines","institution_ids":["https://openalex.org/I3129998261"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5027459129"],"corresponding_institution_ids":["https://openalex.org/I3129998261"],"apc_list":null,"apc_paid":null,"fwci":0.6993,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74838424,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"695","last_page":"700"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.827974796295166},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7340277433395386},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.6589498519897461},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6418243050575256},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6288319826126099},{"id":"https://openalex.org/keywords/financial-cryptography","display_name":"Financial cryptography","score":0.5038401484489441},{"id":"https://openalex.org/keywords/id-based-cryptography","display_name":"ID-based cryptography","score":0.4678063690662384},{"id":"https://openalex.org/keywords/e-commerce","display_name":"E-commerce","score":0.42764949798583984},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.38898810744285583},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.33454275131225586},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12734878063201904},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.08647119998931885}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.827974796295166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7340277433395386},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.6589498519897461},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6418243050575256},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6288319826126099},{"id":"https://openalex.org/C515488857","wikidata":"https://www.wikidata.org/wiki/Q936407","display_name":"Financial cryptography","level":4,"score":0.5038401484489441},{"id":"https://openalex.org/C19150895","wikidata":"https://www.wikidata.org/wiki/Q582616","display_name":"ID-based cryptography","level":5,"score":0.4678063690662384},{"id":"https://openalex.org/C78597825","wikidata":"https://www.wikidata.org/wiki/Q484847","display_name":"E-commerce","level":2,"score":0.42764949798583984},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38898810744285583},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33454275131225586},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12734878063201904},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.08647119998931885}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccs57501.2023.10150939","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs57501.2023.10150939","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W248091370","https://openalex.org/W1568409918","https://openalex.org/W2141196567","https://openalex.org/W2182933069","https://openalex.org/W2206113387","https://openalex.org/W2528950514","https://openalex.org/W2773773675","https://openalex.org/W2972662216","https://openalex.org/W2998065154","https://openalex.org/W3035675221","https://openalex.org/W3138315969","https://openalex.org/W3158721930","https://openalex.org/W4360765377","https://openalex.org/W6686001067","https://openalex.org/W6728094579","https://openalex.org/W6794780034"],"related_works":["https://openalex.org/W11304731","https://openalex.org/W3021642295","https://openalex.org/W2099557070","https://openalex.org/W4382053117","https://openalex.org/W4301284418","https://openalex.org/W125192817","https://openalex.org/W1504353545","https://openalex.org/W3008265109","https://openalex.org/W1593382512","https://openalex.org/W3127541351"],"abstract_inverted_index":{"Data":[0,58],"security":[1,90,109,119,129],"is":[2,27,143],"a":[3,28,127],"major":[4],"concern":[5],"in":[6,10,34,42,60,64,91],"the":[7,11,20,43,55,61,65,94,106,116,122,139,144,162,175],"e-commerce":[8,35,73,92],"industry":[9,63],"Philippines,":[12],"leading":[13],"to":[14,39,51,79,83,114,148,160],"trust":[15],"issues":[16],"among":[17],"customers":[18],"regarding":[19],"safety":[21],"of":[22,31,45,57,124,133],"their":[23],"personal":[24],"information.":[25],"Cryptography":[26,125],"crucial":[29],"aspect":[30],"securing":[32],"data":[33,40,89,108,128],"by":[36,169],"providing":[37],"privacy":[38],"transmission":[41],"presence":[44],"potential":[46],"threats.":[47],"The":[48,97,131],"study":[49,136],"aimed":[50],"discuss":[52],"and":[53,153],"understand":[54],"improvement":[56],"Security":[59],"E-commerce":[62,117],"Philippines.":[66],"A":[67],"survey":[68],"was":[69,158],"conducted":[70],"with":[71,105],"21":[72],"platform":[74],"users":[75],"ranging":[76],"from":[77,93],"18":[78],"30":[80],"years":[81],"old":[82],"evaluate":[84],"whether":[85],"cryptography":[86,141],"has":[87],"improved":[88],"consumers'":[95],"perspective.":[96],"result":[98],"showed":[99],"that":[100,138],"most":[101],"respondents":[102],"are":[103],"satisfied":[104],"current":[107],"methods":[110],"but":[111],"strongly":[112],"agreed":[113],"improve":[115],"websites'":[118],"further.":[120],"Thus,":[121],"recommendation":[123],"as":[126],"method.":[130],"findings":[132],"this":[134],"case":[135],"highlight":[137],"best":[140,163],"algorithm":[142,146],"RSA":[145],"due":[147],"its":[149],"superior":[150],"security,":[151],"effectiveness,":[152],"widespread":[154],"use.":[155],"Next-generation":[156],"encryption":[157],"found":[159],"be":[161],"cryptographic":[164],"tool,":[165],"offering":[166],"multi-layered":[167],"protection":[168],"acting":[170],"on":[171],"threat":[172],"detection":[173],"across":[174],"entire":[176],"network.":[177]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
