<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">C2C Application as an Example of E-shop for Handmade: Tools, Security Issues, Basic Technologies</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Valentyna</forename><surname>Pleskach</surname></persName>
							<email>v.pleskach64@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>Bohdan Hawrylyshyn str. 24</addrLine>
									<postCode>04116</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Vilnius Gediminas Technical University</orgName>
								<address>
									<addrLine>Saulėtekio al. 11</addrLine>
									<postCode>LT-10223</postCode>
									<settlement>Vilnius</settlement>
									<country key="LT">Lithuania</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Viacheslav</forename><surname>Zosimov</surname></persName>
							<email>zosimovvv@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>Bohdan Hawrylyshyn str. 24</addrLine>
									<postCode>04116</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksandra</forename><surname>Bulgakova</surname></persName>
							<email>sashabulgakova2@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>Bohdan Hawrylyshyn str. 24</addrLine>
									<postCode>04116</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mariia</forename><surname>Pleskach</surname></persName>
							<email>pleskachmarija@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Vilnius Gediminas Technical University</orgName>
								<address>
									<addrLine>Saulėtekio al. 11</addrLine>
									<postCode>LT-10223</postCode>
									<settlement>Vilnius</settlement>
									<country key="LT">Lithuania</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Eva</forename><surname>Volnyanska</surname></persName>
							<email>eva.volnyanskaya.0@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>Bohdan Hawrylyshyn str. 24</addrLine>
									<postCode>04116</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">Information Technology and Implementation (IT&amp;I-2022)</orgName>
								<address>
									<addrLine>November 30 -December 02</addrLine>
									<postCode>2022</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">C2C Application as an Example of E-shop for Handmade: Tools, Security Issues, Basic Technologies</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">6C8761227BFF069CFEBEBFBCC6B5E9B4</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T03:54+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The paper is devoted to the analysis of the economic state and level of development of the digital economy and e-commerce, as the main component of the digital economy. The paper presents the C2C application of e-shop for handmade. In this article was determining legal regulation of e-commerce, innovations in this area, security issues, new technologies of building of online shopping website for handicraft. This problem was solved by using the architecture of the designed system, developed according to the type of three-tier client-server architecture. It gives many individuals and small business owners a low-cost way to sell their goods and services. Problems of personal data protection were also considered.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Digital era of web 4 -it is known as Symbiotic and web 5 is coming in the very near future, can be considered as a decentralized Symbionet Web. The future of e-commerce and the Semantic Web is dependent on how far the relevant information technology advances. These include the developments in the global grid, new collaboration technologies, and penetrating computing.</p><p>E-commerce is a branch of the digital economy that represents commercial and monetary transactions and their business processes that take place using computer networks <ref type="bibr" target="#b0">[1]</ref>. E-commerce refers to using the Internet and intranets to purchase, sell, transport, or trade data, goods, or services. Etrade is an integral part of the digital economy. It provides the organization with a number of advantages over ordinary physical representative offices, such as: quick information transactions, which is especially relevant for foreign operations; reduction of costs not related to production; shorter sales cycle; costs for information exchange are significantly reduced due to the use of cheaper telecommunication methods; greater openness of enterprises to users <ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>.</p><p>Consumer-to-consumer (C2C, C2B) e-commerce, which is called peer-to-peer (P2P) e-commerce, refers to electronic transactions completed between and among individuals. These transactions can also include intermediaries, such as olx platforms or social network sites that organize, manage, and facilitate the C2C networks. C2C activities may include transactions resulting from classified music, career, job matching, personal matchmaking services, handmade, etc. One advantage of C2C of ecommerce is that it reduces the administrative and commission costs for both buyers and sellers. It also gives many individuals and small business owners a low-cost way to sell their goods and services.</p><p>According to the Global Payments Report, employment in the e-commerce sector increased by 80% from 1997 to 2016 years <ref type="bibr" target="#b3">[4]</ref>. The global e-commerce market was predicted to grow by $100.63 billion from 2020 to 2024 years <ref type="bibr" target="#b4">[5]</ref>. And the total retail revenue from e-commerce will reach $6.54 trillion. until 2023 year <ref type="bibr" target="#b5">[6]</ref>. It was also expected that by 2040 year, 95% of all purchases will be made through e-commerce <ref type="bibr" target="#b6">[7]</ref>. But the conditions of 2021 year and war state had a significant impact on the development of e-commerce. The COVID-19 pandemic has greatly motivated customers around the world to shop from home. The business responded to the potential customers desire to visit supermarkets, shopping centers and offline stores as rarely as possible, therefore the business urgently updated and expanded the capabilities of online stores and logistics. Companies that did not have time to digitize in a timely and qualitative manner or had too many "problem areas" in their work before the onset of the COVID-19 left the market. According to Deloitte Ukraine survey data, on the eve of the war state, an important trend was observed for the second year in a row: a two-fold predominance of growth rates online over offline <ref type="bibr" target="#b7">[8]</ref>.</p><p>The 22% of respondents indicated that they started to buy more often online, and only 9% shop more often offline. And this trend only intensified. As the research of Soul Partners and Baker Tilly Ukraine showed, the sales of the e-commerce market in 2020 year increased by 41% and reached $4 billion, which was 8.8% of the total volume of retail trade in Ukraine. This share was expected to be at the level of 9.2% or $4.4 billion by the end of 2021 <ref type="bibr">[9]</ref>. After three months of the 2022 year war state, Promodo experts analyzed how key indicators changed in seven segments of Ukrainian e-commerce from February to May. Indicators paid attention to: advertising budget, income, users, customer acquisition cost, average check, part of advertising costs. So, at the beginning of March, e-commerce almost "died". Already on the day of the invasion, all online stores lost an average of 82.7% of sessions <ref type="bibr">[9]</ref>. In the first week, Ukrainian online retailers lost almost all of their income. On average, it fell by 92%. But already in the middle of March, incomes began to grow along with a significant increase in the number of sessions. At the end of May, some categories even returned to pre-war state indicators (pet products and cosmetics together with household and hygiene products) <ref type="bibr" target="#b8">[10]</ref>. The fact is that the war changed not only the place of stay of many Ukrainians, but also the patterns of their shopping behavior <ref type="bibr" target="#b8">[10]</ref>. In a new place, people cannot always find the necessary goods, so they began to order them online more often. The need to arrange life in a new place caused a temporary increase in purchases.</p><p>It is at such a time that the issue of organizing work with user data, methods of ensuring transaction security and protecting confidential user data within the e-trade system becomes quite relevant.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Legal regulation of e-commerce</head><p>Important problem is legal regulation of e-commerce With the emergence of e-commerce in the international economic space, along with its advantages, real and potential risks also appeared, which regulatory and legal acts in the field of e-commerce are designed to regulate.  Among the main challenges faced by e-business entities are:  Users Identification to ensure the safety of financial transactions;  Privacy and protection of consumers personal data ;  Taxation of electronic business entities;  Intellectual property protection;  Content control that is difficult to follow on the Internet;  Disputes settlement and protection of the parties' rights to the conflict. At the moment, there is no single unified set of laws in the field of e-commerce in the world, so every country in the world bears personal responsibility for the development of its own regulations. The state of adoption of regulatory legal acts on e-commerce in the world and in each country can be tracked using the resource of the United Nations Commission on Trade and Development. This is the world's first e-map that tracks the state of e-commerce legislation in the areas of e-transactions, consumer protection, data protection/privacy and cybercrime legislation across the 194 UNCTAD (United Nations Commission on Trade and Development) member countries. It indicates whether this or that country has adopted legislation or has a bill pending adoption <ref type="bibr" target="#b9">[11]</ref>.</p><p>In Ukraine, entrepreneurial activity in the field of electronic commerce did not fall under the jurisdiction of a separate law until September 3, 2015, when a separate Law "On E-Commerce" was established. Before that, all controversial issues, such as the relationship between online stores, services and users, were resolved in accordance with the principles laid down by the Civil Code of Ukraine and the Law of Ukraine "On the Protection of Consumer Rights". The law was amended several times during 2017-2020 and is currently published in the version dated 04. <ref type="bibr" target="#b17">19</ref>.2020 <ref type="bibr" target="#b9">[11]</ref><ref type="bibr" target="#b10">[12]</ref>. Now need to know such as key e-commerce Lawstaxes, payment gateways, trademarks, patents and copyrights, shipping restrictions, inventory, age restrictions, business insurance, licenses and permits, PCI compliance, customer privacy. Legal regulations for e-commerce are well described in site https://single-market-economy.ec.europa.eu/sectors/tourism/business-portal/understandinglegislation/legal-regulations-e-commerce_en.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Innovations in e-commerce</head><p>In order to compete qualitatively in the e-commerce market, the leaders of this industry invest in innovations in this industry, which not only facilitate work, but also increase interaction with consumers.</p><p>Interaction methods with consumers:  With the development of the e-market, classic B2B and B2C models are declining in popularity. Instead, business prefers a new trend -D2C (Direct-to-Consumer). This method consists in the fact that manufacturers abandon middlemen, marketplaces, etc., in favor of direct sales of goods to their target auditory;  Application of the "white label" principle, which means applying your name and brand to the product purchased from the distributor. In this way, the entrepreneur invests not in the creation of the product, but in its marketing, design and application of advanced technologies. Payment methods:  Along with traditional payment methods such as credit cards, bank transfers, e-wallets, etc., currently a very small number of people pay with Bitcoin or other cryptocurrency, about 1% of users <ref type="bibr" target="#b11">[13]</ref>. However, cryptocurrencies, especially Bitcoin, have several advantages for online store owners, such as low transaction fees and no reverse transactions. Perhaps this service will lead to more e-commerce businesses accepting cryptocurrencies for transactions in the near future.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Payment methods using a QR code are becoming very popular <ref type="bibr" target="#b12">[14]</ref>. This methods are expected to be widely used in the near future, especially in growing markets, primarily because it is inexpensive to implement and easy to use. This payment methods are already in use, however, modern QR code payment solutions require special applications that allow them to be used only in one institution. Mature markets are actively using popular digital wallets built in consumer smartphones, such as Apple Pay, Samsung Pay and Google Pay, which is making QR code payments more accessible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Application of artificial intelligence (AI) in the field of payments. Text-to-speech functions or speech-to-text chatbots are becoming much more accessible in this field, which will become an important aspect of digital transformation in the field of in-app payments. Digital banking applications that offer this feature enable customers to initiate invoice payments and transactions via voice commands <ref type="bibr" target="#b13">[15]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Online shopping security</head><p>Problems arising during online ordering can be both from the side of online store owners and from the side of e-business users.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Problems faced by e-business owners</head><p>Consider the complexities that can affect the convenience of providing an online purchase (from the point of e-business owners view):</p><p>1. User identification in the system. When a visitor registers on an e-commerce website, the information they enter may be incorrect, which can lead to further problems. For example, COD purchases made with an invalid phone number and address can result in significant lost revenue. Therefore, it is important to conduct an online background check for each potential client.</p><p>2. Cybersecurity in the system. Cyber attacks can undermine the security of an e-commerce website, infect it with viruses, or even compromise the security of registered customer data. Attackers can potentially gain access to sensitive data, including credit card details. This scenario is one of the biggest problems to overcome in an ecommerce business and it is certainly one of the biggest problems every e-commerce owner faces.</p><p>3. The "abandoned shopping cart" problem.</p><p>A difficult problem that e-commerce businesses face is shopping cart abandonment. Statistics show that online shoppers abandon their shopping carts 68% of the time <ref type="bibr" target="#b14">[16]</ref>, and some stores can experience abandonment rates as high as 80% <ref type="bibr" target="#b6">[7]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Product return and refund policy.</head><p>Over 60% of online shoppers look at a store's return policy before making a purchase <ref type="bibr" target="#b8">[10]</ref>. The 48% of customers would buy more if stores offered less complicated refunds, and inconvenient return policies cause 80% of customers to abandon a purchase from that store <ref type="bibr" target="#b14">[16]</ref>. For e-commerce businesses, the challenge is how to provide convenient returns and refunds to the customer while not incurring business losses.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Security of shopping channels.</head><p>According to statistics, customers who interact with the service using several channels spend three times more in the store than users of one channel <ref type="bibr" target="#b14">[16]</ref>. Setting up an e-commerce system requires significant optimization, taking into account the technical side of implementation, as well as the areas of marketing, content customization, and user service quality.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Security of e-commerce systems</head><p>Creating an online store for conducting e-commerce is more than just the process of selling products over the Internet. E-commerce websites need advanced security systems, as cybercrimes such as identity theft are among the most common crimes committed against consumers. Moreover, the majority of cyberattacks are carried out specifically in the direction of small business electronic stores.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.1.">Personal data protection</head><p>To ensure the security of e-commerce system, should use several e-commerce website protection tools, such as:</p><p>1. Using multi-factor authentication: After the user enters the login information, he will instantly receive an SMS or email with further actions. This move limits the scammers as they need more than just logins and passwords to access legitimate user accounts.</p><p>2. Secure Sockets Layer (SSL) certificates: One of the main benefits of SSL certificates is the encryption of confidential data transmitted over the Internet. This is a very important step because all the data sent will pass through several computers before the destination server receives it. If SSL certificate encryption is missing, any electronic device between the sender and the server can access sensitive data. In this way, hackers can take advantage of exposed passwords, usernames, credit card numbers and other information. An SSL certificate is designed to make data unreadable by third-party users.</p><p>3. Use of firewalls: Firewalls must protect the server against spam, XSS (Cross-Site Scripting), CSRF (Cross-Site Request Forgery), malware, SQL injection and other web attacks -site. This ensures that the traffic that accesses the e-commerce store consists of only real users <ref type="bibr" target="#b15">[17]</ref>.</p><p>In addition to the technical methods of personal data protection listed above, legal measures also play an important role. Thus, e-commerce platforms must ensure and bear responsibility for the safety (protection) of consumer data obtained when concluding a relevant contract (public contract), including an electronic one. It should be noted, that personal data of consumers can be processed, including through profiling, for the purpose of providing the ordered goods or services, ensuring the fulfillment of obligations under the contract and under the condition of: having the unequivocal, prior, recorded consent of the consumer; on the basis of the contract, in the part of the data, the processing of which is necessary to provide the service ordered by the consumer.</p><p>Unfortunately, now, in accordance with Part 3 of Art. 14 of the Law of Ukraine "On Electronic Commerce", the registration of a person in the information system of an e-commerce entity means giving consent to the use and processing of his personal data and taking other actions provided for by the Law of Ukraine " On the Protection of Personal Data". That is, the registration of a user in a certain system implies the automatic granting of his consent to the processing of personal data, even without marking that he gives such consent.</p><p>At the same time, according to Art. 2 of the Law of Ukraine "On the Protection of Personal Data", in the field of e-commerce, the consent of the subject of personal data may be given during registration in the information and telecommunications system of the subject of e-commerce by putting a mark on granting permission to process his personal data in accordance with the formulated the purpose of their provided that such a system does not create opportunities for the processing of personal data until the moment of ticking. That is, Art. 14 of the Law of Ukraine " On Electronic Commerce" requires coordination with the branch Law of Ukraine "On Protection of Personal Data", with the aim of bringing the activities of digital services to the legislation regulating the protection of personal data and reducing cases of violation of the informational rights of users of such services <ref type="bibr">[21]</ref>.</p><p>It should be noted, that the terms of the Agreement on the provision of certain services should not oblige the consumer to give consent to the processing of data that is not necessary for the provision of the services ordered by him, as well as to provide for the processing and/or transfer by third parties of personal data and other data of the consumer for the purpose of providing other services than those provided for in the subject of the Agreement or additional services that the consumer did not order. The composition and content of the consumer's personal data that will be collected and processed during the provision of the service (services), the purposes and duration of their processing, the possibility and method of withdrawing consent to their processing at any time must be determined by the contract for the provision of services and must be appropriate, adequate and not excessive in relation to the purpose of their processing.</p><p>It is extremely important to give the consumer the right to exercise his right to withdraw his consent to the processing of personal data and other consumer data at any time, i.e. the opportunity to fully exercise the "right to be forgotten". Due to the absence of a mandatory provision in the regulatory and legal acts of Ukraine that the procedure for withdrawing consent to the processing of personal data should be as simple as obtaining it, the user of some digital services is deprived of the right to delete personal data about himself and to independently manage his personal account (profile). In this regard, it is necessary to implement the rule that any digital service (regardless of the type: online store, e-mail, gaming business website, etc.) must necessarily contain a technical possibility for the user in any when to delete a personal account, profile or withdraw consent to the processing of personal data. That is, the "right to be forgotten" should be provided, including by automated means using electronic communication networks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.2.">Transaction security</head><p>In the context of protecting credit card data, it is important to follow the standards and protection recommendations proposed by the Payment Card Industry Security Standards Council (PCI SSC) <ref type="bibr" target="#b16">[18]</ref>. It emphasizes the absolute importance of destroying customer data as soon as a transaction is complete. In addition, the PCI SSC absolutely insists that no cardholder information is ever stored on the system's servers. It is worth remembering that if there is nothing to steal in the system, it will not be at risk.</p><p>The main measures to ensure the security of payment data are:  Encryption is a very effective and practical way to protect data transmitted over the network. The sender of the information encrypts the data using a secret code, and only the specified recipient can decrypt the data using the same or a different secret code;</p><p> Digital signature ensures the authenticity of information. A digital signature is an electronic signature certified by encryption and a password;</p><p> Security certificates such as SSL/TLS (Transport Layer Security) not only reduce the risk of security breaches, but also provide a foundation for legal proceedings in the event of a breach.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.3.">Blockchain technologies</head><p>Blockchain or distributed ledger technology (DLT -Distributed Ledger Technology) assumes that data is structured in blocks, and each block copies information about a transaction or a batch of transactions. Each new block is connected to other blocks in a cryptographic chain in such a way that it is almost impossible to break into this system and steal or replace information there. All transactions within blocks are verified and agreed between blocks by a consensus mechanism, ensuring that each transaction is true and correct.</p><p>Thus, blockchain technology provides decentralization of information involving blocks in a distributed network where a single user cannot change the transaction record. This technology is extremely useful in the field of e-commerce, but has certain security nuances and needs further research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Ways of cyber protection on a real example</head><p>An online store selling handmade goods was created to test the technology of intelligent interface customization.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.">Online store description</head><p>Several types of UML diagrams will be schematically depicted below, each of which models the subject area from different perspectives. The online handmade goods store is the main object of the simulation, so all diagrams will be created based on the main component.</p><p>Figure <ref type="figure" target="#fig_0">1</ref> show a diagram of the options for using the developed web resource. The web resource was created according to the classical online stores scheme and has all the necessary functionality: a catalog, a shopping cart, an online order, an authorization system. Figure <ref type="figure" target="#fig_1">2</ref> show the UML class diagram that formed the basis for creating a web resource. It contains classes: Catalog, Category, Product, Website, User, Order. Figure <ref type="figure" target="#fig_2">3</ref> show the sequence of user actions from the moment he entered the site and until the order acceptation. At the top of the diagram, the roles of users are indicated: Client, Administrator, as well as functional modules which the client interacts with: Product catalog, Cart. After entering the site, the client interacts with the product catalog. The result is the added to the necessary products. At the stage of the client interaction with the Cart module, the order is placed. At the final stage, the Administrator who carries out the final confirmation of the order is included in the scheme. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2.">Architectural solutions for e-commerce software system</head><p>The designed system is an example of a three-level type of client-server architecture <ref type="bibr" target="#b17">[19]</ref><ref type="bibr" target="#b18">[20]</ref>. A feature of this type of architecture is the presence of middleware between the client machine and the data server. All data logic and business logic is stored within the middleware. The use of middleware increases the flexibility and productivity of the developed system. The three-tier architecture is divided into 3 layers, such as the presentation (client) layer, the application (business logic) layer, and the database layer (data layer), which can be seen in the system deployment diagram (Figure <ref type="figure" target="#fig_3">4</ref>).</p><p>The deployment system diagram shows the architecture of the designed system, developed according to the type of three-tier client-server architecture. The client machine, which is processed by the presentation level, is schematically represented by blocks Client x1-xn. By connecting via a private network, the system client gets access to the central (intermediate) level of the application. The central element of the developed client-server architecture is the web server, which is a high-performance computer system that can host several web resources.</p><p>Also, as an additional third-party component of the movement and data transfer of the e-commerce system, it was decided to depict the payment system on the diagram, which is referred to by the program for carrying out client transactions. Its component, the payment gateway, is used by the software system to transfer bank data of users using a secure connection with the SSL protocol.</p><p>The design pattern of the project system was based on the principles of the MVC (Model View Controller) model, which assumes that the application consists of a data model, information about the external interface, and information about logic management. The template assumes that each of these elements has been separated into different objects. MVC is an architectural pattern that mostly deals with the user interface and application interaction layer.</p><p>As a result of this type of design, we get a layered and tiered system structure that, while bulky, is justified because it provides a way to easily modify and reuse application modules.  The designed system is divided into separate modules that are responsible for their sphere of responsibilities and refer to each other for interaction. The present modules are responsible for communication with the web server and database, implement data models, and contain classes for encrypting confidential resource data. A connected extension that performs the IsSelected function, which implements the projection of product items of the resource onto the site pages. The implementation of this function occurs from the markup components located in the View model elements, in particular, _FrontLayout.cshtml. Work in the system occurs due to the interaction of system components and at the time of transfer of requests from one component to another. The work is focused on several basic elements of the system: electronic store module, database, user entity, product, payment module. The requests between these modules and the responses they send to each other are depicted in the system sequence diagram (Figure <ref type="figure" target="#fig_4">5</ref>). The diagram shows the sequence of requests coming from the user's web server to the system and the responses that the system sends to the client. The processing of requests begins with the main module of the system, which is an interface of interaction with the client, on which he sees all the information. The sequence in the diagram is left to right and top to bottom. The beginning of the sequence is the client's request to the system.</p><p>The sequence diagram show the main entities of the project: the user, the main module, the client, the product, the database and the payment system and the relationships between them. The main module transfers the processing queue to the client module, which is responsible for user identification. After that, the main functionality of product search and selection, ordering and payment processing is implemented, which is the responsibility of separate relevant modules of the system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.4.">Protection of users' personal data</head><p>Protection of personal data of users of the resource for the sale of handmade products is ensured by encryption of confidential data using a closed (private) key <ref type="bibr" target="#b19">[22]</ref>. This method is a secure method of storing data such as customer passwords, bank details, etc. "Privacy" of the key ensures that the key is stored on the server and cannot be published or shared with third parties. Also, in order to guarantee that the data has not been modified during transmission and is really true, hashing is carried out using "salt", which provides additional protection when processing personal data.</p><p>When the user is authorized, the password provided is applied by a hash function and the result is compared with the one stored on the server. Thus, the system ensures that, firstly, the data stored on the server cannot be stolen and read by third parties and, secondly, user authorization takes place in a reliable manner. User passwords are hashed for storage in the database by salting the raw password using the SH1 algorithm. The process of user authorization and his access to the system module is depicted in the system interaction diagram (Figure <ref type="figure" target="#fig_5">6</ref>). The interaction diagram depicts the process when the user gets to the login point of the authentication service, provides his login data, which is compared by the encryption service with the data stored by the system. If the provided data is incorrect, the client is directed to the exit point of the system. In the case of valid data, the user is directed to the main module of the software system, where his interaction is worked out according to the scheme of the sequence diagram</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>The paper researched the economic state and level of development of the digital economy and ecommerce, as the main component of the digital economy, in Ukraine and the world; analyzed regulatory and legal aspects of conducting electronic business activities, modern approaches to conducting trade activities on the Internet; development prospects, trends and problems of electronic commerce; online payment methods at the global business level and within Ukraine; considered cyber protection systems both at the level of online store owners and at the level of buyers. The application of the principles of security organization and protection of personal data in the system was shown on a real example of C2C application of e-shop for handmade.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: UML-diagram of precedents (options of use)</figDesc><graphic coords="6,72.00,408.30,460.33,243.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: UML class diagram</figDesc><graphic coords="7,89.75,103.30,415.20,367.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: UML sequence diagram without registration and authorization</figDesc><graphic coords="8,72.00,135.24,461.55,268.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: System deployment diagram</figDesc><graphic coords="8,72.00,423.17,459.94,226.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: System sequence diagram</figDesc><graphic coords="9,72.00,280.38,459.35,272.98" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: System interaction diagram</figDesc><graphic coords="10,72.00,191.84,451.00,325.60" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Tumasonis Current State and Trends in the Development of E-Commerce Software Protection Systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Pleskach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Krasnoshchok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Melnyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Klymenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="79" to="88" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<ptr target="https://www.statista.com/statistics/379046/worldwide-retail-e-commerce-sales/" />
		<title level="m">Retail e-commerce sales worldwide</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Improving e-commerce web application through business intelligence techniques</title>
		<author>
			<persName><forename type="first">G</forename><surname>Sreedhar</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
			<publisher>IGI Global</publisher>
			<biblScope unit="page">357</biblScope>
			<pubPlace>N.Y.</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<ptr target="https://hbr.org/2017/01/a-study-of-46000-shoppers-shows-that-omnichannel-retailing-works" />
		<title level="m">A study of 46000 shoppers shows that omnichannel retailing works</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<ptr target="https://tinuiti.com/blog/ecommerce/why-are-shoppers-leaving-my-site/" />
		<title level="m">Why are shoppers leaving my site</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<ptr target="https://www.barilliance.com/cart-abandonment-rate-statistics/" />
		<title level="m">Cart abandonment rate statistics</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<ptr target="https://www.statista.com/chart/13139/estimated-worldwide-mobile-e-commerce-sales/" />
		<title level="m">Estimated worldwide mobile e-commerce sales</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<ptr target="https://digiday.com/marketing/inside-kimberly-clarks-digital-strategy/?_ga=2.251620550.1340709069.1599739754-637882819.1599739754" />
		<title level="m">Inside Kimberly Clarks digital strategy</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<ptr target="https://www.promodo.com/blog/how-the-ukrainian-ecommerce-changed-during-a-month-of-the-war/" />
		<title level="m">How the ukrainian ecommerce changed during a month of the war</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<ptr target="https://unctad.org/" />
		<title level="m">UNCTAD (United Nations Commission on Trade and Development</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Mechanisms for Encrypting Big Unstructured Data</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pleskach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Krasnoshchok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Orliuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Pleskach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Melnyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">11-th International Conference on Advanced Computer Information Technologies, ACIT 2021, Proceedings</title>
				<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="504" to="509" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Cloud Computing: Analysis of the Core Technology</title>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">H</forename><surname>Wu</surname></persName>
		</author>
		<ptr target="http://www.esri.com/news/arcwatch/0110/feature.html" />
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>Posts &amp; Telecom Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<ptr target="https://db-engines.com/en/ranking" />
		<title level="m">Ranking Db-engines</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<ptr target="https://www.pcisecuritystandards.org/pci_security/maintaining_payment_security" />
		<title level="m">Maintaining payment security</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<ptr target="https://www.perzonalization.com/blog/personalized-product-recommendations-in-ecommerce/" />
		<title level="m">Personalized product recommendations in ecommerce</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Risk of Information Loss Using JWT Token</title>
		<author>
			<persName><forename type="first">V</forename><surname>Zosimov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Bulgakova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Popravkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Mashkov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="292" to="299" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<ptr target="https://www.pcisecuritystandards.org/" />
		<title level="m">Payment Card Industry Security Standards Council (PCI SSC)</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Semantic Profile of Corporate Web Resources</title>
		<author>
			<persName><forename type="first">V</forename><surname>Zosimov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Bulgakova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Pozdeev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="389" to="397" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Web Data Displaying Approach Based on User&apos;s Semantic Profile Templates</title>
		<author>
			<persName><forename type="first">V</forename><surname>Zosimov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Bulgakova</surname></persName>
		</author>
		<idno type="DOI">10.1109/csit49958.2020.9321839</idno>
	</analytic>
	<monogr>
		<title level="m">International Scientific and Technical Conference on Computer Sciences and Information Technologies</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="428" to="431" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Turban Electronic Commerce A Managerial and Social Networks Perspective</title>
		<author>
			<persName><forename type="first">E</forename><surname>Turban</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>King</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kyu Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Liang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">C</forename></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-10091-3</idno>
	</analytic>
	<monogr>
		<title level="m">Eighth Edition</title>
				<meeting><address><addrLine>Switzerland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page">791</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
