导航:首页 > 电商促销 > 电子商务交易安全英文参考文献

电子商务交易安全英文参考文献

发布时间:2021-05-22 22:05:54

⑴ 关于电子商务安全的英文参考文献

电子商务安全技术的分析与研究
2007-10-12 With the network technology and the rapid development of information technology, e-commerce has been growing a wide range of applications, more and more businesses and indivials rely on e-commerce users quick and efficient. It appears not only to the development and expansion of Internet has provided a new opportunity, but also to the business community into a great power. But e-commerce is based on vector-based computer network and a large number of important status information, accounting information, transaction information needed to carry out in-line transmission, in such circumstances, security issues become a priority issue.

Second, the current e-commerce security issues
1. Network protocol security issue: At present, TCP / IP protocol is the most widely used network protocol, but TCP / IP itself, characterized by openness, enterprise and users of electronic transactions in the course of the data is the form of packet transmission, malicious attackers can easily launch an e-commerce site to a packet interception, or even modify the data packets and counterfeiting.
2. Users of information security issues: At present, the most important form of e-commerce is based on B / S (Browser / Server) structure of the e-commerce sites, users log on using the browser network transactions, as a result of the user in the registry may be used in public computer, such as Internet cafes, offices, computers, etc., then if they have a malicious Trojan horse computer program or virus, the user's login information such as user names, passwords may be the risk of loss.
3. E-commerce Web site security issue: that there are some companies established themselves in the design of e-commerce site will have a number of proction security, server operating system itself, there will be loopholes, unscrupulous attackers to enter the e-commerce site if a large number of user information and transaction information will be stolen, enterprises and users to incalculable losses.

C, e-commerce security requirements
1. The effectiveness of service requirements: e-commerce system should be able to prevent the occurrence of service failures to prevent failure e to network attacks and viruses and other system factors such as suspension of services to ensure that transaction data can be transmitted quickly and accurately.
2. Trading requirements of the confidentiality of information: e-commerce systems to deal with the information sent by users of encryption to effectively prevent the interception of information to decipher, at the same time to prevent unauthorized access to information.
3. Data integrity requirements: the number refers to the integrity of data processing, the original data and existing data is fully consistent between. In order to safeguard the seriousness of business dealings and fair, the transaction documents is not being modified, there will be damage to the commercial interests of the party.
4. The requirements of authentication: e-commerce systems should provide safe and effective authentication mechanism to ensure that transaction information between the two sides are legitimate and effective in order to avoid trade disputes, to provide a legal basis.

D, e-commerce security measures
1. Data encryption technology. Data encryption is the most basic e-commerce information system security precautions. The principle is that information on the use of encryption algorithm will be converted into explicit rules according to a certain encryption ciphertext generated after the transmission, thus ensuring the confidentiality of data. The use of data encryption technology can solve the information requirements of the confidentiality of its own. Data encryption technology can be divided into symmetric key encryption and asymmetric key encryption.
(1) symmetric key encryption (SecretKeyEncryption). Symmetric key encryption also known as secret / Private key encryption, that is, send and receive data between the parties must use the same key for encryption and decryption explicitly computing. Its advantage is encryption, decryption speed, suitable for large amount of data encryption, to ensure data confidentiality and integrity; drawback is that when the large number of users, distribution and management is very difficult to key on.
(2) non-symmetric key encryption (PublicKeyEncryption). Non-symmetric-key encryption also known as public key encryption, it mainly refers to each person only has a pair of corresponding keys: public key (the public key) and private key (the private key) public key public, private saved by the personal secret, a key used to encrypt them, they can only use the other to decrypt the key. Asymmetric key encryption algorithm is the advantage of easy distribution and management, the shortcomings of the algorithm complexity, encryption slow.
(3) the complexity of encryption technology. As a result of these two types of encryption technology, each the length of the relatively common practice is to integrate the two technologies. For example, the use of information to send the information symmetric key encryption, ciphertext generated after the recipient's public key to use symmetric key encryption to generate the number of envelopes, then the number of ciphertext envelope and sent to the receiver at the same time, the receiving party by the opposite clear direction after decryption.
2. Digital signature technology. Digital signature is generated through specific password computing the composition of a series of symbols and codes for a signature key, to replace the written signature or seal, this electronic signature technology can also be carried out to verify, verify the accuracy of its general manual signature and verification seal unmatched. Digital signature technology to ensure the integrity of information transfer and non-repudiation.
3. Accreditation agencies as well as digital certificates. E-commerce transactions e to the general users will not have face to face, so the two sides of the transaction identification is to protect the safety of the premise of e-commerce transactions. Certification body is a public and credible third party to confirm the identity of both parties, the digital certificate is signed by the certification body, including the identity of the owner of public key information as well as the public key of the document. Paid in the transaction process, participants must use the Certification Center of the digital certificate issued to prove his identity.
4. The use of Secure Electronic Transaction protocol (SET: Secure Electronic Transactions). By two major credit cards VISA and MasterCard standards organizations. SET for the division of e-commerce activities and to define the rights and obligations of the parties to the relationship between a given transaction information transmission process standards. SET protocol guarantees the confidentiality of e-commerce systems, integrity, non-repudiation of the legitimacy and identity.

⑵ 求英语参考文献,最好能带翻译的。电子商务会计核算方面~

如果你的单位有购买数据库的话,上超星,万方, 期刊等数据库搜索,具体方法可参考《文献检索》

⑶ 电子商务英文文献

Electronic commerce, commonly known as e-commerce, consists of the buying and selling of procts or services over electronic systems such as the Internet and other computer networks. The amount of trade concted electronically has grown extraordinarily since the spread of the Internet. A wide variety of commerce is concted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.

A large percentage of electronic commerce is concted entirely electronically for virtual items such as access to premium content on a website, but most electronic commerce involves the transportation of physical items in some way. Online retailers are sometimes known as e-tailers and online retail is sometimes known as e-tail. Almost all big retailers have electronic commerce presence on the World Wide Web.

Electronic commerce that is concted between businesses is referred to as Business-to-business or B2B. B2B can be open to all interested parties (e.g. commodity exchange) or limited to specific, pre-qualified participants (private electronic market).

Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of the business transactions.

History

Early development
The meaning of electronic commerce has changed over the last 30 years. Originally, electronic commerce meant the facilitation of commercial transactions electronically, using technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). These were both introced in the late 1970s, allowing businesses to send commercial documents like purchase orders or invoices electronically. The growth and acceptance of credit cards, automated teller machines (ATM) and telephone banking in the 1980s were also forms of electronic commerce. From the 1990s onwards, electronic commerce would additionally include enterprise resource planning systems (ERP), data mining and data warehousing.

Perhaps it is introced from the Telephone Exchange Office, or maybe not.The earliest example of many-to-many electronic commerce in physical goods was the Boston Computer Exchange, a marketplace for used computers launched in 1982. The first online information marketplace, including online consulting, was likely the American Information Exchange, another pre-Internet online system introced in 1991.

Timeline
1990: Tim Berners-Lee wrote the first web browser, WorldWideWeb, using a NeXT computer.
1992: J.H. Snider and Terra Ziporyn published Future Shop: How New Technologies Will Change the Way We Shop and What We Buy. St. Martin's Press. ISBN 0312063598.
1994: Netscape released the Navigator browser in October under the code name Mozilla. Pizza Hut offered pizza ordering on its Web page. The first online bank opened. Attempts to offer flower delivery and magazine subscriptions online. Alt materials were also commercially available, as were cars and bikes. Netscape 1.0 in late 1994 introced SSL encryption that made transactions secure.
1995: Jeff Bezos launched Amazon.com and the first commercial-free 24 hour, internet-only radio stations, Radio HK and NetRadio started broadcasting. Dell and Cisco began to aggressively use Internet for commercial transactions. eBay was founded by computer programmer Pierre Omidyar as AuctionWeb.
1998: Electronic postal stamps can be purchased and downloaded for printing from the Web.
1999: business.com was sold for US $7.5 million, which was purchased in 1997 for US $150,000. The peer-to-peer filesharing software Napster was launched.
2000: The dot-com bust.
2003: Amazon.com had its first year with a full year of profit.

Business applications
Some common applications related to electronic commerce are:

E-mail and messaging
Documents, spreadsheets, database
Accounting and finance systems
Orders and shipment information
Enterprise and client information reporting
Domestic and international payment systems
Newsgroup
On-line Shopping
Messaging
Conferencing

Government regulations
In the United States, some electronic commerce activities are regulated by the Federal Trade Commission (FTC). These activities include the use of commercial e-mails, online advertising and consumer privacy. The CAN-SPAM Act of 2003 establishes national standards for direct marketing over e-mail. The Federal Trade Commission Act regulates all forms of advertising, including online advertising, and states that advertising must be truthful and non-deceptive.[1] Using its authority under Section 5 of the FTC Act, which prohibits unfair or deceptive practices, the FTC has brought a number of cases to enforce the promises in corporate privacy statements, including promises about the security of consumers’ personal information.[2] As result, any corporate privacy policy related to e-commerce activity may be subject to enforcement by the FTC.

Forms
Contemporary electronic commerce involves everything from ordering "digital" content for immediate online consumption, to ordering conventional goods and services, to "meta" services to facilitate other types of electronic commerce.

On the consumer level, electronic commerce is mostly concted on the World Wide Web. An indivial can go online to purchase anything from books, grocery to expensive items like real estate. Another example will be online banking like online bill payments, buying stocks, transferring funds from one account to another, and initiating wire payment to another country. All these activities can be done with a few keystrokes on the keyboard.

On the institutional level, big corporations and financial institutions use the internet to exchange financial data to facilitate domestic and international business. Data integrity and security are very hot and pressing issues for electronic commerce these days.

电子商务或EC(英语: E-Commerce)是指在互联网(Internet)、企业内部网 (Intranet) 和增值网(VAN, Added Network)上以电子交易方式进行交易活动和相关服务活动,是传统商业活动各环节的电子化、网路化。电子商务包括电子货币交换、供应链管理、电子交易市场、网路营销、在线事务处理、电子数据交换(EDI)、存货管理和自动数据收集系统。在此过程中,利用到的信息技术包括:互联网、外联网、电子邮件、资料库、电子目录和行动电话。

而广义上的电子商务—电子业务或EB(英语: E-Business)则是指对整个商业活动实现电子化,也就是指应用电脑与网路技术与现代信息化通信技术,按照一定标准,利用电子化工具(有时甚至指整个电子媒介领域,包括广播、电视、电话通讯等等)来实现包括电子商务(或电子交易)在内的商业交换和行政作业的商贸活动的全过程。

发展历史
在过去的30年间,电子商务的概念发生了很大的变化. 最初,电子商务意味著利用电子化的手段,将商业买卖活动简化,通常使用的技术包括电子数据交换(EDI)和电子货币转帐,这些技术均是在20世纪70年代末期开始应用。典型的应用是将采购订单和发票之类的商业文档通过电子数据的方式发送出去。

电子商务中的“电子”指的是采用的技术和系统,而“商务”指的是传统的商业模式。电子商务被定义为一整套通过网路支持商业活动的过程。在70年代和80年代,信息分析技术进入电子商务。80年代,随著信用卡、自动柜员机和电话银行的逐渐被接受和应用,这些也成为电子贸易的组成部分。进入90年代,企业资源计划(ERP)、数据挖掘和数据仓库也成为电子商务的一个部分。

在“.COM”时代,电子商务增加了新的组成部分——“网路贸易”,客户在数据加密传输技术支持下,利用网上商店的虚拟购物车和信用卡等电子货币支付形式,通过互联网完成商品和服务的采购。

如今,电子商务的涵盖十分广泛的商业行为,从电子银行到信息化的物流管理。电子商务的增长促进了支持系统的发展和进步, 包括后台支持系统、应用系统和中间件,例如宽频和光纤网路、供应链管理模块、原料规划模块、客户关系管理模块、存货控制模块和会计核算/企业财务模块。

当互联网在1994进入公众的视线时,很多记者和学者预测电子贸易将很快成为主要的商业应用模式。然而,安全协议(例如HTTPS)用了四年的时间才发展的足够成熟并获得大范围的应用。接下来,在1998年和2000年之间,大量的美国和西欧公司开发了许多不成熟的网站。

虽然大量的“纯电子商务”公司在2000年和2001年的“.COM”衰退期消失了,还是有很多传统的“水泥加砖块”的零售企业认识到这些“.COM”公司揭示了潜在的有价值的市场空间,开始将电子商务的功能增加到网站上。例如,在在线食品销售公司Webvan倒闭后,两家传统的连锁超级市场Albertsons和Safeway都开始了附属的电子商务功能,消费者可以直接在线订购食品。

电子商务的成功因素

技术和组织方面
在很多案例中,一个电子商务公司存活下来,不仅仅是基於自身的产品,而且还拥有一个有能力的管理团队、良好的售前服务、组织良好的商业结构、网路基础和一个安全的,设计良好的网站,这些因素包括:

足够的市场研究和分析。电子商务需要有可行的商业计划并遵守供需的基本原理。在电子商务领域的失败往往和其他商业领域的一样,缺乏对商业基本原则的领会。
一支出色的被信息技术策略武装起来的管理团队。一个公司的信息战略需要成为商业流程重组的一个部分。
为客户提供一个方便而且安全的方式进行交易。信用卡是最互联网上普遍的支付手段,大约90%的在线支付均使用信用卡的方式完成。在过去,加密的信用卡号码信息通过独立的第三方支付网关在顾客和商户之间传递,现在大部分小企业和个体企业还是如此。如今大部分规模稍大的公司直接在网站上通过与商业银行或是信用卡公司之间的协议处理信用卡交易。
提供高可靠性和安全性的交易。例如利用并行计算、硬体冗余、失败处理、信息加密和网路防火墙技术来达到这个需求。
提供360度视角的客户关系,即确保无论是公司的雇员、供应商还是伙伴均可以获得对客户完整和一致的视角,而不是被选择或者过滤得信息。因为,客户不会对在权威主义(老大哥)监视的感觉有好的评价。
构建一个商业模型。如果在2000年的教科书上有这麼一段,很多“.com”公司可能不会破产。
设计一个电子商务价值链,关注在数量有限的核心竞争力上,而不是一个一站购齐的解决方案。如果合适的编制程序,网路商店可以在专业或者通用的特性中获得其中一个。
运作最前沿或者尽可能的接近最前沿的技术,并且在紧紧跟随技术的变化。(但是需要记住,商业的基本规则和技术的基本规则有很大的区别,不要同样在商业模式上赶时髦)
建立一个足够敏感和敏捷的组织,及时应对在经济、社会和环境上发生的任何变化。
提供一个有足够吸引力的网站。有品味的使用颜色、图片、动画、照片、字体和足够的留白空间可以达到这一目标。
流畅的商业流程,可以通过流程再造和信息技术来获得。
提供能完全理解商品和服务的信息,不仅仅包括全部产品信息还有可靠的顾问建议和挑选建议。
自然,电子商务供应商行业需要履行普世的原则,例如保证提供的商品的质量和可用性、物流的可靠性,并且及时有效的处理客户的投诉。在网路环境下,有一个独一无二的特点,客户可以获得远多於传统的“砖块+水泥”地商业环境下关於商家

顾客为先
一个成功的电子商务机构必须提供一个既满意而又具意义的经验给顾客。都由各种顾客为先因素构成,包括以下:

提供额外的利益给顾客: 电子销售商如要做到这一点,可提供产品或其产品系列,以一个较低的价格吸引潜在的客户、如传统商贸一样.
提供优质服务: 提供一个互动及易於使用的购买经验及场所,亦如传统零售商一样, 都有助某程度上达至上述目标。为鼓励顾客再回来购买。可利用赠品或促销礼券、优惠及折扣等。 还可以互相连接其他相关网站和广告联盟等。
提供个人服务: 提供个人化的网站、购买建议、个人及特别优惠的方式,有助增加互动、人性化来代替传统的销售方式。
提供社区意识: 可以聊天室、讨论板以及一些忠诚顾客计划(亦称亲和力计划)都对提供社区意识有一定的帮助。
令顾客拥有全面性的体验: 提供电子个人化服务,根据顾客的喜好,提供个别服务,使顾客感受与别不同的体验,便可成为公司独特的卖点及品牌。
自助方式: 提供自助式服务网站、易用及无须协助的环境,都有一定的帮助。包括所有的产品资料,交叉推销信息、谘询产品补替、用品及配件选择等。
提供各种资讯: 如个人电子通讯录、网上购物等。透过丰富的比较资料及良好的搜索设备,提供信息和构件安全、健康的评论给顾客。可协助个人电子服务来确定更多潜在顾客。

失败因素
个人资料的外泄是最大的因素,如果有骇客破解网页原始码,并在网页上种下木马或是病毒,只要你登入并打上个人资料,骇客便可以马上知道你在网页上打下哪些个人资料。所以如何保护顾客的个资等是电子商务最大的问题,如果不妥善处理,那此电子店家便会被淘汰。

⑷ 求两篇关于电子商务英文参考文献

http://59.42.244.59/Readers/Index.aspx
http://www.nstl.gov.cn/index.html

⑸ 求关于电子商务安全的参考文献或杂志

[1] 李志民. 基于SET的电子支付安全[J]中国管理信息化(综合版) , 2006,(08) .

[2] 洪奕. 基于校园网的电子商务网站——网上拍卖[J]贵州商业高等专科学校学报 , 2003,(04) .

[3] 李红. 网络营销与信息资源配置[J]东北财经大学学报 , 2005,(05) .

[4] 张洋,杨峰,文庭孝. 电子商务网站设计研究[J]高校图书馆工作 , 2005,(03) .

[5] 代晓红. 基于SSL协议的电子商务安全性分析[J]工业技术经济 , 2004,(06) .

[6] 庞莹,付强. 我国家电产业信息化趋势及其市场均衡分析[J]产业与科技论坛 , 2006,(03) .

[7] 周宏. 企业开展电子商务的基本问题[J]商业研究 , 2003,(15) .

[8] 赵大鹏. 中国电子政务安全问题分析[J]大连海事大学学报(社会科学版) , 2007,(05) .

[9] 周靖. 加密技术在电子商务活动中的应用[J]沙洲职业工学院学报 , 2006,(03) .

[10] 侯涛. 基于JSP和ASP技术的电子商务系统比较研究[J]情报杂志 , 2003,(02) .

⑹ 急求电子商务相关参考文献,英文的,只要只要标题和作者

标题、作者、年份

《E-commerce: the role of familiarity and trust》
D Gefen - Omega, 2000

《What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology》
DH McKnight,2001

《 Fuzzy decision support system for risk analysis in e-commerce development》
EWT Ngai, 2005

《 Interactive decision aids for consumer decision making in e-commerce: the influence of perceived strategy restrictiveness》
W Wang, 2009

⑺ 求关于解析电子商务安全的参考文献

电子商务金融与安全 陈进 清华出版社 2000年
网络与电子商务法 蒋志培 法律出版社 2001年5月
电子商务概论 李宙星 重庆大学出版社 2005年8月
电子商务 李大军 董铁 清华出版社 2002年9月
电子商务及应用 康晓东 电子工业出版社 2004年3月
电子商务大全 朱稼兴 北京航空航天出版社 2004年3月

因为最近我也在找这些东西,把我的成果和你分享一下~~希望对你有所帮助

⑻ 求:英文参考文献 关于电子商务,外贸,英语对外贸影响等相关的英文文献.要英文的哦

YanGuoBin .《discussed shallowly new economy accounting personnel》 quality modern accounting" 2009 (2).
LuoHong ZhuKaiXi ."do not do false account" ecation "with accounting quality accounting friends of 2008(1).

⑼ 求英文参考文献,关于“电子商务下的客户信息管理”

商务时代企业将面临更加激烈的竞争环境,越来越多的公司认识到客户是公司最稀缺的资源,是公司的财富,无论是开发新客户、还是维护老客户,客户信息的管理是最基础、最重要的工作,很多公司已经把客户信息看成公司的核心资产来管理和维护。只有通过顾客信息管理,了解顾客的需求,向其提供满意的产品和服务,才能紧紧抓住顾客,企业才能生存和发展。本文在对电子商务、信息管理、顾客信息管理等概念进行明确,概念之间的关系进行阐述的基础上,分析了电子商务时代顾客信息管理的必要性和主要内容;并从顾客信息的收集、存储、分析、利用的角度介绍了相关的信息技术,重点对网络挖掘进行了系统的研究;接着,本文对目前先进的顾客管理思想--以顾客信息管理为基础的客户关系管理(CRM)予以了论述,在对CRM的概念,系统组成介绍的基础上对系统的应用管理进行了重点说明。

The commercial time enterprise will face the even more keencompetition environment, more and more many companies realized to thecustomer will be the company scarcest resources, will be company'swealth, regardless of will be develops the new customer, or maintainsthe old customer, the customer information management will be the mostfoundation, the most important work, very many companies alreadyregarded as the customer information the company the core property tomanage and the maintenance. Only through the customer informationmanagement, understood customer's demand, provides satisfaction to itthe proct and the service, can closely hold the customer, theenterprise can survive and the development. This article in to conceptand so on electronic commerce, information management, customerinformation management carries on is clear about, between the conceptrelations carry on the elaboration in the foundation, has analyzed theelectronic commerce time customer information management necessity andthe main content; And from the customer information collection, thememory, the analysis, the use angle introced the related informationtechnology, key has concted the system research to the networkexcavation; After that, this article managed the thought to thepresent advanced customer -- (CRM) to give the elaboration take thecustomer information management as the foundation customer relationsmanagement, in to the CRM concept, in the system compositionintroction foundation has carried on the key explanation to thesystem application management.

阅读全文

与电子商务交易安全英文参考文献相关的资料

热点内容
疾控中心新进人员培训方案 浏览:541
市场营销推销产品案例 浏览:417
市场促销活动宣传报道 浏览:122
企业营销方案范文 浏览:340
电子商务平台的模式 浏览:562
电子商务营销规划书 浏览:906
中国农村电子商务发展报告 浏览:914
中粮食品的营销方案 浏览:929
花店节日促销活动怎么做 浏览:239
社区迎新春活动策划方案 浏览:663
电子商务15模式 浏览:563
大学学雷锋日策划方案 浏览:275
2012自考市场营销真题及答案 浏览:181
学校培训考核方案设计 浏览:661
高校促销方案 浏览:292
运动会医策划方案 浏览:708
旅游市场营销的特点 浏览:860
吉首大学市场营销学导论练习 浏览:123
防冻液促销方案 浏览:672
药品营销开发方案 浏览:409