5RANGANATHAN C, GANAPATHY A. Key dimensions of business-to-customer web sites[J]. Information and Management, 2002, 39(1) :457-465.
6Visa International Service Association. 3- D secure protocal specification core functions[EB/OL], http://international, visa. com/fb/paytech/secure/main, jsp,2004- 01- 07.
7HWANG J J,YEH T C, LI J B. Securing on-line credit card payments without disclosing privacy information[J]. Computer Standards & Interfaces, 2003, 25(2):119-129.
8KRUGTEN van P, HOOGENBOOM M. B2C security-be just secure enough, computers & security[J]. 2000, 19(4):348-356.
9PORTILLO E, PATEL A. Design methodology for secure distributed transactions in electronic commerce [J]. Computer Standards & Interfaces, 1999, 21(3):5-18.
10CHANG J, CHOI B, LEE H. An organizational memory for facilitating knowledge: an application to e-business architecture[J]. Expert Systems with Applications, 2004, 26(9):203-215.