Preprint Article Version 1 This version is not peer-reviewed

Protection Of Personal Data In The Context Of E-commerce

Version 1 : Received: 6 August 2024 / Approved: 7 August 2024 / Online: 7 August 2024 (11:54:42 CEST)

How to cite: Morić, Z.; Dakić, V.; Đekić, D.; Regvart, D. Protection Of Personal Data In The Context Of E-commerce. Preprints 2024, 2024080480. https://doi.org/10.20944/preprints202408.0480.v1 Morić, Z.; Dakić, V.; Đekić, D.; Regvart, D. Protection Of Personal Data In The Context Of E-commerce. Preprints 2024, 2024080480. https://doi.org/10.20944/preprints202408.0480.v1

Abstract

This paper examines the impact of stringent regulations on personal data protection on customer perception of data security and online shopping behavior. In the context of the rapidly expanding e-commerce landscape, ensuring the security of personal data is a complex and crucial task. The study of several legal frameworks, including Malaysia's compliance with EU regulations and Indonesia's Personal Data Protection Law, provides valuable insights into consumer data protection. The challenges of balancing data safeguarding and unrestricted movement and tackling misuse by external entities are significant and require careful consideration. This research elucidates the pivotal role of trust in e-commerce environments and the deployment of innovative e-commerce models designed to minimize personal data sharing. By integrating advanced privacy-enhancing technologies and adhering to stringent regulatory standards such as the GDPR, this study demonstrates effective strategies for robust data protection. The paper contributes to the academic discourse by providing a comprehensive framework that synergizes legal, technological, and procedural elements to fortify data security and enhance consumer trust in digital marketplaces. This approach aligns with international data protection standards and offers a pragmatic blueprint for achieving sustainable data security in e-commerce.

Keywords

personal data; GDPR; e-commerce; advertising; marketing

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.