⑴ 關於電子商務安全的英文參考文獻
電子商務安全技術的分析與研究
2007-10-12 With the network technology and the rapid development of information technology, e-commerce has been growing a wide range of applications, more and more businesses and indivials rely on e-commerce users quick and efficient. It appears not only to the development and expansion of Internet has provided a new opportunity, but also to the business community into a great power. But e-commerce is based on vector-based computer network and a large number of important status information, accounting information, transaction information needed to carry out in-line transmission, in such circumstances, security issues become a priority issue.
Second, the current e-commerce security issues
1. Network protocol security issue: At present, TCP / IP protocol is the most widely used network protocol, but TCP / IP itself, characterized by openness, enterprise and users of electronic transactions in the course of the data is the form of packet transmission, malicious attackers can easily launch an e-commerce site to a packet interception, or even modify the data packets and counterfeiting.
2. Users of information security issues: At present, the most important form of e-commerce is based on B / S (Browser / Server) structure of the e-commerce sites, users log on using the browser network transactions, as a result of the user in the registry may be used in public computer, such as Internet cafes, offices, computers, etc., then if they have a malicious Trojan horse computer program or virus, the user's login information such as user names, passwords may be the risk of loss.
3. E-commerce Web site security issue: that there are some companies established themselves in the design of e-commerce site will have a number of proction security, server operating system itself, there will be loopholes, unscrupulous attackers to enter the e-commerce site if a large number of user information and transaction information will be stolen, enterprises and users to incalculable losses.
C, e-commerce security requirements
1. The effectiveness of service requirements: e-commerce system should be able to prevent the occurrence of service failures to prevent failure e to network attacks and viruses and other system factors such as suspension of services to ensure that transaction data can be transmitted quickly and accurately.
2. Trading requirements of the confidentiality of information: e-commerce systems to deal with the information sent by users of encryption to effectively prevent the interception of information to decipher, at the same time to prevent unauthorized access to information.
3. Data integrity requirements: the number refers to the integrity of data processing, the original data and existing data is fully consistent between. In order to safeguard the seriousness of business dealings and fair, the transaction documents is not being modified, there will be damage to the commercial interests of the party.
4. The requirements of authentication: e-commerce systems should provide safe and effective authentication mechanism to ensure that transaction information between the two sides are legitimate and effective in order to avoid trade disputes, to provide a legal basis.
D, e-commerce security measures
1. Data encryption technology. Data encryption is the most basic e-commerce information system security precautions. The principle is that information on the use of encryption algorithm will be converted into explicit rules according to a certain encryption ciphertext generated after the transmission, thus ensuring the confidentiality of data. The use of data encryption technology can solve the information requirements of the confidentiality of its own. Data encryption technology can be divided into symmetric key encryption and asymmetric key encryption.
(1) symmetric key encryption (SecretKeyEncryption). Symmetric key encryption also known as secret / Private key encryption, that is, send and receive data between the parties must use the same key for encryption and decryption explicitly computing. Its advantage is encryption, decryption speed, suitable for large amount of data encryption, to ensure data confidentiality and integrity; drawback is that when the large number of users, distribution and management is very difficult to key on.
(2) non-symmetric key encryption (PublicKeyEncryption). Non-symmetric-key encryption also known as public key encryption, it mainly refers to each person only has a pair of corresponding keys: public key (the public key) and private key (the private key) public key public, private saved by the personal secret, a key used to encrypt them, they can only use the other to decrypt the key. Asymmetric key encryption algorithm is the advantage of easy distribution and management, the shortcomings of the algorithm complexity, encryption slow.
(3) the complexity of encryption technology. As a result of these two types of encryption technology, each the length of the relatively common practice is to integrate the two technologies. For example, the use of information to send the information symmetric key encryption, ciphertext generated after the recipient's public key to use symmetric key encryption to generate the number of envelopes, then the number of ciphertext envelope and sent to the receiver at the same time, the receiving party by the opposite clear direction after decryption.
2. Digital signature technology. Digital signature is generated through specific password computing the composition of a series of symbols and codes for a signature key, to replace the written signature or seal, this electronic signature technology can also be carried out to verify, verify the accuracy of its general manual signature and verification seal unmatched. Digital signature technology to ensure the integrity of information transfer and non-repudiation.
3. Accreditation agencies as well as digital certificates. E-commerce transactions e to the general users will not have face to face, so the two sides of the transaction identification is to protect the safety of the premise of e-commerce transactions. Certification body is a public and credible third party to confirm the identity of both parties, the digital certificate is signed by the certification body, including the identity of the owner of public key information as well as the public key of the document. Paid in the transaction process, participants must use the Certification Center of the digital certificate issued to prove his identity.
4. The use of Secure Electronic Transaction protocol (SET: Secure Electronic Transactions). By two major credit cards VISA and MasterCard standards organizations. SET for the division of e-commerce activities and to define the rights and obligations of the parties to the relationship between a given transaction information transmission process standards. SET protocol guarantees the confidentiality of e-commerce systems, integrity, non-repudiation of the legitimacy and identity.
⑵ 求英語參考文獻,最好能帶翻譯的。電子商務會計核算方面~
如果你的單位有購買資料庫的話,上超星,萬方, 期刊等資料庫搜索,具體方法可參考《文獻檢索》
⑶ 電子商務英文文獻
Electronic commerce, commonly known as e-commerce, consists of the buying and selling of procts or services over electronic systems such as the Internet and other computer networks. The amount of trade concted electronically has grown extraordinarily since the spread of the Internet. A wide variety of commerce is concted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.
A large percentage of electronic commerce is concted entirely electronically for virtual items such as access to premium content on a website, but most electronic commerce involves the transportation of physical items in some way. Online retailers are sometimes known as e-tailers and online retail is sometimes known as e-tail. Almost all big retailers have electronic commerce presence on the World Wide Web.
Electronic commerce that is concted between businesses is referred to as Business-to-business or B2B. B2B can be open to all interested parties (e.g. commodity exchange) or limited to specific, pre-qualified participants (private electronic market).
Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of the business transactions.
History
Early development
The meaning of electronic commerce has changed over the last 30 years. Originally, electronic commerce meant the facilitation of commercial transactions electronically, using technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). These were both introced in the late 1970s, allowing businesses to send commercial documents like purchase orders or invoices electronically. The growth and acceptance of credit cards, automated teller machines (ATM) and telephone banking in the 1980s were also forms of electronic commerce. From the 1990s onwards, electronic commerce would additionally include enterprise resource planning systems (ERP), data mining and data warehousing.
Perhaps it is introced from the Telephone Exchange Office, or maybe not.The earliest example of many-to-many electronic commerce in physical goods was the Boston Computer Exchange, a marketplace for used computers launched in 1982. The first online information marketplace, including online consulting, was likely the American Information Exchange, another pre-Internet online system introced in 1991.
Timeline
1990: Tim Berners-Lee wrote the first web browser, WorldWideWeb, using a NeXT computer.
1992: J.H. Snider and Terra Ziporyn published Future Shop: How New Technologies Will Change the Way We Shop and What We Buy. St. Martin's Press. ISBN 0312063598.
1994: Netscape released the Navigator browser in October under the code name Mozilla. Pizza Hut offered pizza ordering on its Web page. The first online bank opened. Attempts to offer flower delivery and magazine subscriptions online. Alt materials were also commercially available, as were cars and bikes. Netscape 1.0 in late 1994 introced SSL encryption that made transactions secure.
1995: Jeff Bezos launched Amazon.com and the first commercial-free 24 hour, internet-only radio stations, Radio HK and NetRadio started broadcasting. Dell and Cisco began to aggressively use Internet for commercial transactions. eBay was founded by computer programmer Pierre Omidyar as AuctionWeb.
1998: Electronic postal stamps can be purchased and downloaded for printing from the Web.
1999: business.com was sold for US $7.5 million, which was purchased in 1997 for US $150,000. The peer-to-peer filesharing software Napster was launched.
2000: The dot-com bust.
2003: Amazon.com had its first year with a full year of profit.
Business applications
Some common applications related to electronic commerce are:
E-mail and messaging
Documents, spreadsheets, database
Accounting and finance systems
Orders and shipment information
Enterprise and client information reporting
Domestic and international payment systems
Newsgroup
On-line Shopping
Messaging
Conferencing
Government regulations
In the United States, some electronic commerce activities are regulated by the Federal Trade Commission (FTC). These activities include the use of commercial e-mails, online advertising and consumer privacy. The CAN-SPAM Act of 2003 establishes national standards for direct marketing over e-mail. The Federal Trade Commission Act regulates all forms of advertising, including online advertising, and states that advertising must be truthful and non-deceptive.[1] Using its authority under Section 5 of the FTC Act, which prohibits unfair or deceptive practices, the FTC has brought a number of cases to enforce the promises in corporate privacy statements, including promises about the security of consumers』 personal information.[2] As result, any corporate privacy policy related to e-commerce activity may be subject to enforcement by the FTC.
Forms
Contemporary electronic commerce involves everything from ordering "digital" content for immediate online consumption, to ordering conventional goods and services, to "meta" services to facilitate other types of electronic commerce.
On the consumer level, electronic commerce is mostly concted on the World Wide Web. An indivial can go online to purchase anything from books, grocery to expensive items like real estate. Another example will be online banking like online bill payments, buying stocks, transferring funds from one account to another, and initiating wire payment to another country. All these activities can be done with a few keystrokes on the keyboard.
On the institutional level, big corporations and financial institutions use the internet to exchange financial data to facilitate domestic and international business. Data integrity and security are very hot and pressing issues for electronic commerce these days.
電子商務或EC(英語: E-Commerce)是指在互聯網(Internet)、企業內部網 (Intranet) 和增值網(VAN, Added Network)上以電子交易方式進行交易活動和相關服務活動,是傳統商業活動各環節的電子化、網路化。電子商務包括電子貨幣交換、供應鏈管理、電子交易市場、網路營銷、在線事務處理、電子數據交換(EDI)、存貨管理和自動數據收集系統。在此過程中,利用到的信息技術包括:互聯網、外聯網、電子郵件、資料庫、電子目錄和行動電話。
而廣義上的電子商務—電子業務或EB(英語: E-Business)則是指對整個商業活動實現電子化,也就是指應用電腦與網路技術與現代信息化通信技術,按照一定標准,利用電子化工具(有時甚至指整個電子媒介領域,包括廣播、電視、電話通訊等等)來實現包括電子商務(或電子交易)在內的商業交換和行政作業的商貿活動的全過程。
發展歷史
在過去的30年間,電子商務的概念發生了很大的變化. 最初,電子商務意味著利用電子化的手段,將商業買賣活動簡化,通常使用的技術包括電子數據交換(EDI)和電子貨幣轉帳,這些技術均是在20世紀70年代末期開始應用。典型的應用是將采購訂單和發票之類的商業文檔通過電子數據的方式發送出去。
電子商務中的「電子」指的是採用的技術和系統,而「商務」指的是傳統的商業模式。電子商務被定義為一整套通過網路支持商業活動的過程。在70年代和80年代,信息分析技術進入電子商務。80年代,隨著信用卡、自動櫃員機和電話銀行的逐漸被接受和應用,這些也成為電子貿易的組成部分。進入90年代,企業資源計劃(ERP)、數據挖掘和數據倉庫也成為電子商務的一個部分。
在「.COM」時代,電子商務增加了新的組成部分——「網路貿易」,客戶在數據加密傳輸技術支持下,利用網上商店的虛擬購物車和信用卡等電子貨幣支付形式,通過互聯網完成商品和服務的采購。
如今,電子商務的涵蓋十分廣泛的商業行為,從電子銀行到信息化的物流管理。電子商務的增長促進了支持系統的發展和進步, 包括後台支持系統、應用系統和中間件,例如寬頻和光纖網路、供應鏈管理模塊、原料規劃模塊、客戶關系管理模塊、存貨控制模塊和會計核算/企業財務模塊。
當互聯網在1994進入公眾的視線時,很多記者和學者預測電子貿易將很快成為主要的商業應用模式。然而,安全協議(例如HTTPS)用了四年的時間才發展的足夠成熟並獲得大范圍的應用。接下來,在1998年和2000年之間,大量的美國和西歐公司開發了許多不成熟的網站。
雖然大量的「純電子商務」公司在2000年和2001年的「.COM」衰退期消失了,還是有很多傳統的「水泥加磚塊」的零售企業認識到這些「.COM」公司揭示了潛在的有價值的市場空間,開始將電子商務的功能增加到網站上。例如,在在線食品銷售公司Webvan倒閉後,兩家傳統的連鎖超級市場Albertsons和Safeway都開始了附屬的電子商務功能,消費者可以直接在線訂購食品。
電子商務的成功因素
技術和組織方面
在很多案例中,一個電子商務公司存活下來,不僅僅是基於自身的產品,而且還擁有一個有能力的管理團隊、良好的售前服務、組織良好的商業結構、網路基礎和一個安全的,設計良好的網站,這些因素包括:
足夠的市場研究和分析。電子商務需要有可行的商業計劃並遵守供需的基本原理。在電子商務領域的失敗往往和其他商業領域的一樣,缺乏對商業基本原則的領會。
一支出色的被信息技術策略武裝起來的管理團隊。一個公司的信息戰略需要成為商業流程重組的一個部分。
為客戶提供一個方便而且安全的方式進行交易。信用卡是最互聯網上普遍的支付手段,大約90%的在線支付均使用信用卡的方式完成。在過去,加密的信用卡號碼信息通過獨立的第三方支付網關在顧客和商戶之間傳遞,現在大部分小企業和個體企業還是如此。如今大部分規模稍大的公司直接在網站上通過與商業銀行或是信用卡公司之間的協議處理信用卡交易。
提供高可靠性和安全性的交易。例如利用並行計算、硬體冗餘、失敗處理、信息加密和網路防火牆技術來達到這個需求。
提供360度視角的客戶關系,即確保無論是公司的雇員、供應商還是夥伴均可以獲得對客戶完整和一致的視角,而不是被選擇或者過濾得信息。因為,客戶不會對在權威主義(老大哥)監視的感覺有好的評價。
構建一個商業模型。如果在2000年的教科書上有這麼一段,很多「.com」公司可能不會破產。
設計一個電子商務價值鏈,關注在數量有限的核心競爭力上,而不是一個一站購齊的解決方案。如果合適的編製程序,網路商店可以在專業或者通用的特性中獲得其中一個。
運作最前沿或者盡可能的接近最前沿的技術,並且在緊緊跟隨技術的變化。(但是需要記住,商業的基本規則和技術的基本規則有很大的區別,不要同樣在商業模式上趕時髦)
建立一個足夠敏感和敏捷的組織,及時應對在經濟、社會和環境上發生的任何變化。
提供一個有足夠吸引力的網站。有品味的使用顏色、圖片、動畫、照片、字體和足夠的留白空間可以達到這一目標。
流暢的商業流程,可以通過流程再造和信息技術來獲得。
提供能完全理解商品和服務的信息,不僅僅包括全部產品信息還有可靠的顧問建議和挑選建議。
自然,電子商務供應商行業需要履行普世的原則,例如保證提供的商品的質量和可用性、物流的可靠性,並且及時有效的處理客戶的投訴。在網路環境下,有一個獨一無二的特點,客戶可以獲得遠多於傳統的「磚塊+水泥」地商業環境下關於商家
顧客為先
一個成功的電子商務機構必須提供一個既滿意而又具意義的經驗給顧客。都由各種顧客為先因素構成,包括以下:
提供額外的利益給顧客: 電子銷售商如要做到這一點,可提供產品或其產品系列,以一個較低的價格吸引潛在的客戶、如傳統商貿一樣.
提供優質服務: 提供一個互動及易於使用的購買經驗及場所,亦如傳統零售商一樣, 都有助某程度上達至上述目標。為鼓勵顧客再回來購買。可利用贈品或促銷禮券、優惠及折扣等。 還可以互相連接其他相關網站和廣告聯盟等。
提供個人服務: 提供個人化的網站、購買建議、個人及特別優惠的方式,有助增加互動、人性化來代替傳統的銷售方式。
提供社區意識: 可以聊天室、討論板以及一些忠誠顧客計劃(亦稱親和力計劃)都對提供社區意識有一定的幫助。
令顧客擁有全面性的體驗: 提供電子個人化服務,根據顧客的喜好,提供個別服務,使顧客感受與別不同的體驗,便可成為公司獨特的賣點及品牌。
自助方式: 提供自助式服務網站、易用及無須協助的環境,都有一定的幫助。包括所有的產品資料,交叉推銷信息、諮詢產品補替、用品及配件選擇等。
提供各種資訊: 如個人電子通訊錄、網上購物等。透過豐富的比較資料及良好的搜索設備,提供信息和構件安全、健康的評論給顧客。可協助個人電子服務來確定更多潛在顧客。
失敗因素
個人資料的外泄是最大的因素,如果有駭客破解網頁原始碼,並在網頁上種下木馬或是病毒,只要你登入並打上個人資料,駭客便可以馬上知道你在網頁上打下哪些個人資料。所以如何保護顧客的個資等是電子商務最大的問題,如果不妥善處理,那此電子店家便會被淘汰。
⑷ 求兩篇關於電子商務英文參考文獻
http://59.42.244.59/Readers/Index.aspx
http://www.nstl.gov.cn/index.html
⑸ 求關於電子商務安全的參考文獻或雜志
[1] 李志民. 基於SET的電子支付安全[J]中國管理信息化(綜合版) , 2006,(08) .
[2] 洪奕. 基於校園網的電子商務網站——網上拍賣[J]貴州商業高等專科學校學報 , 2003,(04) .
[3] 李紅. 網路營銷與信息資源配置[J]東北財經大學學報 , 2005,(05) .
[4] 張洋,楊峰,文庭孝. 電子商務網站設計研究[J]高校圖書館工作 , 2005,(03) .
[5] 代曉紅. 基於SSL協議的電子商務安全性分析[J]工業技術經濟 , 2004,(06) .
[6] 龐瑩,付強. 我國家電產業信息化趨勢及其市場均衡分析[J]產業與科技論壇 , 2006,(03) .
[7] 周宏. 企業開展電子商務的基本問題[J]商業研究 , 2003,(15) .
[8] 趙大鵬. 中國電子政務安全問題分析[J]大連海事大學學報(社會科學版) , 2007,(05) .
[9] 周靖. 加密技術在電子商務活動中的應用[J]沙洲職業工學院學報 , 2006,(03) .
[10] 侯濤. 基於JSP和ASP技術的電子商務系統比較研究[J]情報雜志 , 2003,(02) .
⑹ 急求電子商務相關參考文獻,英文的,只要只要標題和作者
標題、作者、年份
《E-commerce: the role of familiarity and trust》
D Gefen - Omega, 2000
《What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology》
DH McKnight,2001
《 Fuzzy decision support system for risk analysis in e-commerce development》
EWT Ngai, 2005
《 Interactive decision aids for consumer decision making in e-commerce: the influence of perceived strategy restrictiveness》
W Wang, 2009
⑺ 求關於解析電子商務安全的參考文獻
電子商務金融與安全 陳進 清華出版社 2000年
網路與電子商務法 蔣志培 法律出版社 2001年5月
電子商務概論 李宙星 重慶大學出版社 2005年8月
電子商務 李大軍 董鐵 清華出版社 2002年9月
電子商務及應用 康曉東 電子工業出版社 2004年3月
電子商務大全 朱稼興 北京航空航天出版社 2004年3月
因為最近我也在找這些東西,把我的成果和你分享一下~~希望對你有所幫助
⑻ 求:英文參考文獻 關於電子商務,外貿,英語對外貿影響等相關的英文文獻.要英文的哦
YanGuoBin .《discussed shallowly new economy accounting personnel》 quality modern accounting" 2009 (2).
LuoHong ZhuKaiXi ."do not do false account" ecation "with accounting quality accounting friends of 2008(1).
⑼ 求英文參考文獻,關於「電子商務下的客戶信息管理」
商務時代企業將面臨更加激烈的競爭環境,越來越多的公司認識到客戶是公司最稀缺的資源,是公司的財富,無論是開發新客戶、還是維護老客戶,客戶信息的管理是最基礎、最重要的工作,很多公司已經把客戶信息看成公司的核心資產來管理和維護。只有通過顧客信息管理,了解顧客的需求,向其提供滿意的產品和服務,才能緊緊抓住顧客,企業才能生存和發展。本文在對電子商務、信息管理、顧客信息管理等概念進行明確,概念之間的關系進行闡述的基礎上,分析了電子商務時代顧客信息管理的必要性和主要內容;並從顧客信息的收集、存儲、分析、利用的角度介紹了相關的信息技術,重點對網路挖掘進行了系統的研究;接著,本文對目前先進的顧客管理思想--以顧客信息管理為基礎的客戶關系管理(CRM)予以了論述,在對CRM的概念,系統組成介紹的基礎上對系統的應用管理進行了重點說明。
The commercial time enterprise will face the even more keencompetition environment, more and more many companies realized to thecustomer will be the company scarcest resources, will be company'swealth, regardless of will be develops the new customer, or maintainsthe old customer, the customer information management will be the mostfoundation, the most important work, very many companies alreadyregarded as the customer information the company the core property tomanage and the maintenance. Only through the customer informationmanagement, understood customer's demand, provides satisfaction to itthe proct and the service, can closely hold the customer, theenterprise can survive and the development. This article in to conceptand so on electronic commerce, information management, customerinformation management carries on is clear about, between the conceptrelations carry on the elaboration in the foundation, has analyzed theelectronic commerce time customer information management necessity andthe main content; And from the customer information collection, thememory, the analysis, the use angle introced the related informationtechnology, key has concted the system research to the networkexcavation; After that, this article managed the thought to thepresent advanced customer -- (CRM) to give the elaboration take thecustomer information management as the foundation customer relationsmanagement, in to the CRM concept, in the system compositionintroction foundation has carried on the key explanation to thesystem application management.