Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2016 | 26 | 3 | 83-99

Article title

Modeling the process of purchase payment as a constituent of information security in e-commerce

Content

Title variants

Languages of publication

EN

Abstracts

EN
A mathematical model of the process of payment for purchases in an online store has been pre-sented. The model belongs to the class of semi-open queueing networks with four phases of exponential servers and Poisson arrivals. The authors describe in detail the derivation of the equations describing the system. Analytic expressions are derived on the basis of the proposed model for the average number of online store customers who have already paid for goods. Practical implementation of the model allows us to determine the number of clients who have added goods to their cart, but have not yet passed through the payment verification system, and thus determine the stream of real customers of the online store.

Year

Volume

26

Issue

3

Pages

83-99

Physical description

Contributors

  • Kyiv National Economic University named after Vadym Hetman, Faculty of Computer Science and Technology, Economic-Mathematic Modeling Department, Lvivska ploshcha, 14, Kyiv, 04053, Ukraine
  • Kyiv National Economic University named after Vadym Hetman, Faculty of Computer Science and Technology, Economic-Mathematic Modeling Department, Lvivska ploshcha, 14, Kyiv, 04053, Ukraine

References

  • ANGUS B., 6 steps to an effective ecommerce privacy policy, Pract. Ecommer., 2014, http://www.practicalecommerce.com/articles/75977-6-Steps-to-an-Effective-Ecommerce-Privacy-Policy
  • ANGUS B., Simple questions to improve ecommerce security, Pract. Ecommer., 2014, http://www.practicalecommerce.com/articles/74874-Simple-Questions-to-Improve-Ecommerce-Security
  • Best practices for accepting payment cards, https://squareup.com/help/us/en/article/5079-best-practices-for-accepting-payment-cards#swiping-payments
  • How to make the Internet safe for store customers, http://ubr.ua/ukraine-and-world/technology/kak-sdelat-internet-magazin-bezopasnym-dlia-klientov-354502 (in Russian).
  • IDOV R., Safety of online stores, 2015, http://www.securitylab.ru/blog/company/securityinform /127414.php (in Russian).
  • ISACA Glossary of Terms, http://www.isaca.org/Knowledge-Center/Documents/Glossary/glossary.pdf
  • KHURRAM A., 5 Security essentials for ecommerce sites, 2013, http://www.sitepoint.com/5-security -essentials-ecommerce-sites/
  • KLEINROCK L., Queueing Systems. Vol. 1. Theory, Wiley Interscience, New York 1975.
  • PRABHU N.U., Stochastic Processes: Basic Theory and Its Applications, MacMillan, New York 1965.
  • Protection checking online store, http://www.globaltrust.ru/ru/uslugi/audit-informacionnoi-bezopasnosti /proverka-zaschischennosti-internet-magazina (in Russian).
  • R Core Team, R: A language and environment for statistical computing, R Foundation for Statistical Computing, Vienna 2015, https://www.R-project.org
  • SKITSKO V., IGNATOVA IU., Modeling logistic processes of orders fulfillment by online store as a queue-ing network, Business Inform., 2015, (8), 70 (in Ukrainian).
  • Handbook of Stochastic Models and Analysis of Manufacturing System Operations, J.M. Smith, B. Tan (Eds.), Springer, New York 2013.
  • ZHANG Z., Call centres with balking and abandonment: from queueing to queueing network models, Thesis, University of Saskatchewan Saskatoon, Saskatchewan 2010, https://ecommons.usask.ca /bitstream/handle/10388/etd-06222010-103338/ZhidongZhangThesisFinal.pdf

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-c546cdf1-1dd7-45bf-86b8-fbb6866ff3ce
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.