Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

7/7/2009
02:23 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Oracle Report: Consumers Fickle About Ecommerce Security Controls

Nearly one-third of U.K.'s online shoppers don't trust online security measures, but most don't want additional controls if it affects ease and speed of transactions

Online consumers don't have much patience for security controls that slow or complicate their purchases -- even though they say they don't trust existing online security to keep them safe, according to a new report.

In a survey commissioned by Oracle in the U.K., Foviance, a user experience consultancy, found that while two-thirds of U.K. online consumers want more security on Websites where they shop, about 30 percent said they'd go to a retailer's competitor if additional security meant it would take more time to conduct a transaction or add to the complexity.

Oracle released the data yesterday as part of its "Online Security: A Human Perspective" report analyzing online consumers' attitudes and behaviors in regard to security. "Organizations must remember that security is an emotive subject that understandably triggers very primitive instincts for consumers and citizens," says Des Powley, director of security for Oracle UK and Ireland. "It's time to be more strategic, which includes using technologies such as adaptive authentication and single sign-on -- all delivered seamlessly with the service."

Around 30 percent of the nearly 500 respondents say they don't trust online security measures, and 70 percent took the blame for their own security problems. Nearly 25 percent say when they encounter login problems, it's the fault of the Website, brand, or technology. More than 70 percent say they had at least one problem with an ecommerce site in the past three months.

Respondents aren't keeping their user names and passwords safe all of the time, either: Twenty-five percent say they have written lists of their online credentials. Around 30 percent don't trust their local or central government to protect their personal information. Time is a priority when it comes to online shopping: The main reason most abort a transaction is that it took too long (48 percent).

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14230
PUBLISHED: 2019-07-21
An issue was discovered in the Viral Quiz Maker - OnionBuzz plugin before 1.2.7 for WordPress. One could exploit the id parameter in the set_count ajax nopriv handler due to there being no sanitization prior to use in a SQL query in saveQuestionVote. This allows an unauthenticated/unprivileged user ...
CVE-2019-14231
PUBLISHED: 2019-07-21
An issue was discovered in the Viral Quiz Maker - OnionBuzz plugin before 1.2.2 for WordPress. One could exploit the points parameter in the ob_get_results ajax nopriv handler due to there being no sanitization prior to use in a SQL query in getResultByPointsTrivia. This allows an unauthenticated/un...
CVE-2019-14207
PUBLISHED: 2019-07-21
An issue was discovered in Foxit PhantomPDF before 8.3.11. The application could crash when calling the clone function due to an endless loop resulting from confusing relationships between a child and parent object (caused by an append error).
CVE-2019-14208
PUBLISHED: 2019-07-21
An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to a NULL pointer dereference and crash when getting a PDF object from a document, or parsing a certain portfolio that contains a null dictionary.
CVE-2019-14209
PUBLISHED: 2019-07-21
An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to Heap Corruption due to data desynchrony when adding AcroForm.