Enhanced cybersecurity measures: Protect customer data in e-commerce and retail industry

Olamide Raimat Amosu 1, *, Praveen Kumar 2, Yewande Mariam Ogunsuji 3, Adesola Adelaja 4, Oladapo Faworaja 5 and Kikelomo Adetula 6

1 Darden School of Business, University of Virginia, Charlottesville, VA, USA.
2 The Ohio State University, Fisher College of Business, Columbus, OH, USA.
3 Sahara Group, Lagos, Nigeria.
4 Darden School of Business, University of Virginia, Charlottesville, VA, USA.
5 Booth School of Business, University of Chicago, IL, USA.
6 Quinnipiac University, Hamden, CT, USA.
 
Review Article
World Journal of Advanced Research and Reviews, 2024, 23(02), 890–900
Article DOI: 10.30574/wjarr.2024.23.2.2408
 
Publication history: 
Received on 30 June 2024; revised on 08 August 2024; accepted on 10 August 2024
 
Abstract: 
This study explores developing and implementing advanced cybersecurity protocols to protect customer data and ensure secure transactions within the retail industry. By setting a high standard for data protection, these measures contribute significantly to national cybersecurity efforts. The research analyzes current threats, evaluates existing cybersecurity frameworks, and proposes robust protocols to mitigate potential risks. The findings demonstrate that enhanced cybersecurity measures safeguard sensitive information, reinforce consumer trust, and comply with regulatory requirements. For instance, adopting end-to-end encryption and multi-factor authentication significantly improves data security. Additionally, integrating AI-driven real-time threat detection systems and regular security audits are highlighted as critical components in a comprehensive cybersecurity strategy. This paper provides a comprehensive guide for retail organizations to enhance their cybersecurity posture effectively, contributing to the broader goal of national cybersecurity and setting a high standard for the industry.
 
Keywords: 
Cybersecurity; Retail Industry; Data Protection; Secure Transactions; National Security; Protocols
 
Full text article in PDF: 
Share this