2Greenstein M. , Feiman T. M.. Electronic CommerceSecurity, Risk, Management and Control[ M ]. New York:McGraw2Hill Company,InC. ,2000.
3陈辉.模式演化推进电子商务.北京青年报,2001-4-9
4赛迪顾问.2001年我国B2B电子商务发展情况分析,2002-6-28
5Greenstein M, Feiman T M. Electronic commerce - security、risk、management and control[M]. New York: McGraw-Hill Company, InC., 2000.131 - 192.
6Fischer T R. Hacker proof: the ultimate guide to network secuity[M]. Washington: James Press, 1997.79 - 96; 197 -235.
7Ba S, Lang K R, Whinston A B. Enterprinse decision support using Intranet technology[J]. Decision Support System, 1997,20(2) :99 - 134.
8Post G, Kagan A. Management tradeoffs in anti-virus strategies[ J]. Information & Management, 2000, 37 ( 1 ): 13- 24.
9Janvrin D, Morrison J. Using a structured design approach to reduce risks in end user spreadsheet development [ J ].Information & Management, 2000, 37(1): 1 - 12.