  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/2838</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Securing the Digital Commerce Spectrum and Cyber Security Strategies for Web, E-commerce, M-commerce, and E-mail Security</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Associate Professor, Dept. of CSE, School of Computing, MIT Art, Design and Technology University, Pune, Maharastra, India</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>admin</given_name>
    <surname>admin</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Associate Professor, Dept of CSE (AI &amp; ML), Sri Venkateshwara College of Engineering &amp; Technology, Chittoor, A.P, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>R.</given_name>
    <surname>Mohanraj</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Associate Professor, Department of Computer Science and Engineering, GITAM (Deemed to be University), Visakhapatnam, AP, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>K.</given_name>
    <surname>Sharada</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant professor, Department of information technology, L N Mishra college of business management,  muzaffarpur, Bihar, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Savya</given_name>
    <surname>Sachi</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Asst. Professor, Dept. of IT, St. Martin's Engineering College, Secunderabad, Telangana, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>K.</given_name>
    <surname>Neelima</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant Professor, Dept. of Computer Science &amp; Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, AP, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Punyala</given_name>
    <surname>Ramadevi</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>Secure protection of sensitive data and financial transactions is of the utmost importance in the dynamic world of online trade. In this study, we present a full-stack security architecture that uses five separate algorithms: ECF, Transaction Anomaly Detection, Adaptive Threat Intelligence, Behavioral Biometric Authentication, and Dynamic Encryption Protocol. By creating encryption keys on the fly while the user logs in, the DEP method lays a solid groundwork for safe data transfer. Behavioral biometric authentication (BBA) uses DEP output to verify users based on their distinct behavior, which is an extra layer of security. By combining both current and past threat information, the ATI algorithm is able to constantly adjust security protocols, providing a preventative shield against new dangers. TAD is an expert at detecting anomalies in online purchases, which helps keep financial transactions honest. When ECF and DEP work together, they filter email content, making communication more secure. Flowcharts help to illustrate the interactions between various algorithms, which helps to understand their operations in detail. Every algorithm's importance is brought to light by an ablation study, which shows how each one contributes and how they all work together to affect the overall security posture. The suggested security framework outperforms the state-of-the-art in terms of efficacy, adaptability, and usability, according to performance evaluations conducted using a number of metrics. These findings can help decision-makers build a strong security plan that is specific to the challenges of online shopping. To conclude, the suggested framework is an integrated and complementary strategy that will strengthen online trade in the face of several cyber dangers while simultaneously protecting the confidentiality, authenticity, and availability of all associated communications and transactions.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2024</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2024</year>
  </publication_date>
  <pages>
   <first_page>34</first_page>
   <last_page>49</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.140103</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/2838</resource>
  </doi_data>
 </journal_article>
</journal>
