Article
Version 1
This version is not peer-reviewed
Protection Of Personal Data In The Context Of E-commerce
Version 1
: Received: 6 August 2024 / Approved: 7 August 2024 / Online: 7 August 2024 (11:54:42 CEST)
How to cite: Morić, Z.; Dakić, V.; Đekić, D.; Regvart, D. Protection Of Personal Data In The Context Of E-commerce. Preprints 2024, 2024080480. https://doi.org/10.20944/preprints202408.0480.v1 Morić, Z.; Dakić, V.; Đekić, D.; Regvart, D. Protection Of Personal Data In The Context Of E-commerce. Preprints 2024, 2024080480. https://doi.org/10.20944/preprints202408.0480.v1
Abstract
This paper examines the impact of stringent regulations on personal data protection on customer perception of data security and online shopping behavior. In the context of the rapidly expanding e-commerce landscape, ensuring the security of personal data is a complex and crucial task. The study of several legal frameworks, including Malaysia's compliance with EU regulations and Indonesia's Personal Data Protection Law, provides valuable insights into consumer data protection. The challenges of balancing data safeguarding and unrestricted movement and tackling misuse by external entities are significant and require careful consideration. This research elucidates the pivotal role of trust in e-commerce environments and the deployment of innovative e-commerce models designed to minimize personal data sharing. By integrating advanced privacy-enhancing technologies and adhering to stringent regulatory standards such as the GDPR, this study demonstrates effective strategies for robust data protection. The paper contributes to the academic discourse by providing a comprehensive framework that synergizes legal, technological, and procedural elements to fortify data security and enhance consumer trust in digital marketplaces. This approach aligns with international data protection standards and offers a pragmatic blueprint for achieving sustainable data security in e-commerce.
Keywords
personal data; GDPR; e-commerce; advertising; marketing
Subject
Computer Science and Mathematics, Security Systems
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment