Project File Details

Original Author (Copyright Owner):



Download the complete computer science project topic and material (chapter 1-5) titled E-COMMERCE SECURITY USING BIOMETRICS TECHNOLOGY here on See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.



The Project File Details

  • Type: PDF and MS Word (DOC)
  • Size: [560KB]
  • Length: [87] Pages



As technology advance daily, attacks on computer system and computer applications are becoming tremendous and increasingly numerous and sophisticated. Thus, e-commerce is threatened due to negative use of technology. The good news is that, the complexity and anonymity of computer systems does not only aid crime in the society but also it’s a combating measure to crime, aids crime prevention and assist investigation when positively utilized. Authentication plays a critical in security related applications like e-commerce websites. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention in e-commerce and security systems at large. Having realized the values of biometrics for two basic purposes namely to verify (authenticate) and identify (recognize). There are numbers of biometrics and different system (application) needs different biometrics. In this research, how to maximize e-commerce security is considered using different biometrics. Also, e-commerce application and systems that has implemented biometrics technology is reviewed.



TITLE PAGES                                                                        i & ii

CERTIFICATION                                                                            iii

DEDICATION                                                                        iv

ACKNOWLEDGEMENT                                                       v

ABSTRACT                                                                            vi

TABLE OF CONTENTS                                                                  vii-ix

LIST OF FIGURES                                                                 x

LIST OF TABLES                                                                            x

CHAPTER ONE – Introduction                                                       1

1.1     Background of study                                                     2

1.2     Objectives of study                                                        4

1.3     Scope of the study                                                                   5

1.4     Motivation                                                                     6

1.5     Statement of Problem

1.6     Limitation of study

1.7     Methodology                                                                           6

CHAPTER TWO – Literature Review                                                        11

2.1     Introduction                                                                                      11

2.2     Review of verification systems                                                         11

CHAPTER THREE – System Analysis and Design                                   29

3.1     Introduction                                                                                      29

3.2     System analysis of the system                                                 29

3.3     Constraints of the existing system                                          31

3.4     Proposed system design                                                          33

3.4.1  System algorithm design                                                                   33

3.4.2  Input design                                                                                      39

3.4.3  Interface design                                                                       41

3.4.4  Output design                                                                          42

3.4.5  System database design                                                           43

3.5     Technology, tools and programming language used                         45

CHAPTER FOUR – Design and Implementation                                       48

4.0     Introduction                                                                                      48

4.1     System design                                                                         48

4.2     System description                                                                           49

4.3     System implementation                                                           52

4.4     Hardware requirement                                                             53

4.5     Software requirement                                                              53

4.6     System testing                                                                         54

4.7     System review and maintenance                                              54

4.8     Installation procedure                                                             55

4.9     User guide                                                                               55

CHAPTER FIVE – Summary and Conclusion                                 57

5.1     Summary                                                                                 57

5.2     Recommendation                                                                     58

5.3     Conclusion                                                                              58

REFERENCE                                                                                   60

APPENDIX (SOURCE CODES)                                                      62




1.1     The SSADM Approach.                                                                   8

1.2     The RAD Model.                                                                     9

2.1     Credit/Debit Card – front and back view                                28

3.1     Input form to add Administrator                                            40

3.2     The main interface form                                                          41

3.3a   Verification Form                                                                    42

3.3b   The Verification Result form                                                   43

3.4     System’s database table for Admin                                         45

4.1     Use Case diagram for SVS                                                      51


2.1     Address Verification Service – the types                                 13

2.2     Address Verification Service – detail description                    17

3.1     Company Table                                                                       44





In the emerging global economy, e-commerce has increasingly become a necessary component of business strategy and a strong catalyst for economic development. The integration of information technology (IT) in business has revolutionized relationships within organizations and those between and among organizations and individuals. Specifically, the use of IT in business has enhanced productivity, encouraged greater customer participation, and enabled mass customization, besides reducing costs.

As electronic-commerce (e-commerce) grows and further exploits the attributes of the Internet, it will likely have significant effects on national economies and industry structure. E-commerce has come to take on two important roles; first as a more effective and efficient conduit and aggregator of information, and second, as a potential mechanism for the replacement of many economic activities once performed within a business enterprise by those that can be done by outside suppliers that compete with each other to execute these activities. In response to this increased level of outsourcing opportunities, businesses will exploit the benefits of e-commerce by decoupling as many links of their production chain as possible in order to seek the most efficient and low cost supplier within the e-marketplace. As the Internet has a global reach, these new e-marketplaces have fast become a product of globalization, leading the Internet and e-commerce to further the process of global integration.

According to Uzoka in Hampo, J.A (2011), “Decisions are largely based on principles and experience. In recent times, efforts are being made to build intelligence into computer system, whereby the computer can be used to process large volume of structured and unstructured information for decision making.”It is recognized that in the Information Age, Internet commerce is a powerful tool in the economic growth of developing countries. While there are indications of ecommerce patronage among large firms in developing countries, there seems to be little and negligible use of the Internet for commerce among small and medium sized firms. E-commerce promises better business for SMEs and sustainable economic development for developing countries. However, this is premised on strong political will and good governance, as well as on a responsible and supportive private sector within an effective policy framework.


Most importantly, the issues of security still remain a big bow to electronic commerce (e-commerce).this is due to the negligence of biometric. Moreover, some other problems of e-commerce are:

  1. High Internet access costs, including connection service fees, communication fees, and hosting charges for websites with sufficient bandwidth;
  2. Non availability of user friendly e-commerce website for online shoppers.
  3. Limited availability of credit cards and a nationwide credit card system;
  4. Underdeveloped transportation infrastructure resulting in slow and uncertain delivery of goods and services;
  5. Network security problems and insufficient security safeguards;
  6. Lack of skilled human resources and key technologies (i.e., inadequate professional IT workforce);
  7. Content restriction on national security and other public policy grounds, which greatly affect business in the field of information services, such as the media and entertainment sectors;
  8. Cross-border issues, such as the recognition of transactions under laws of other ASEAN member-countries, certification services, improvement of delivery methods and customs facilitation; and
  9. The relatively low cost of labor, which implies that a shift to a comparatively capital intensive solution (including investments on the improvement of the physical and network infrastructure) is not apparent.


The aim of the research is to examine e-commerce and its relationship with information technology and biometrics;

The objectives are:

  1. To describe the role of information technology (IT) in e-commerce
  2. To outline some e-commerce technology
  3. To itemize biometric technology and its role in maximizing e-commerce security
  4. To describe common e-commerce model
  5. To explain the various forces fueling e-commerce
  6. e-Commerce insecurity
  7. To show electronic gadget that has biometrics and e-commerce feature(s).
  8. To analyze (and not design) an existing ecommerce system especially ecommerce system with biometrics technology.


This research work will be of great importance to individuals, firms and organizations that are involved in e-commerce or those who intend to trade business online.

1.5     SCOPE

This research work discusses the role of information technology and biometrics to e-commerce security.


Time and financial constraints has constrained this research work to the above scope.


In this research we intend to carry out a system study which will involve visiting of most e-commerce websites to see how well information technology tools and biometrics are used in these websites, and the various limitations. A feasibility study will be carry out after the system study to determine if there are software, hardware and resources available to accomplish a solution. System analysis will then follow, which will include various fact finding techniques such as brainstorming, interviews and observation. The materials and literature review are utilized to the optimum.


In a technological driven generation where technology is used for both positive and negative gain, security remains at the mind of every well orientated human for profit making, customers’ safety and brand protection. Hence, we were motivated to show in this work how information technology tools and biometrics can be used foster the security of e-commerce that will be both beneficial for online shoppers and online shop owners


See more computer science project topics and materials


All project works, files and documents posted on this website, are the property/copyright of their respective owners. They are for research reference/guidance purposes only and the works are crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a guidance purpose only and not copy the work word for word (verbatim). is a repository of research works just like,,,, coursehero and many other platforms where users upload works. The paid subscription on is a means by which the website is maintained to support Open Education. If you see your work posted here, and you want it to be removed/credited, please call us on +2348159154070 or send us a mail together with the web address link to the work, to [email protected] We will reply to and honor every request. Please notice it may take up to 24 - 48 hours to process your request.