期刊文献+

基于网络的移动支付安全风险评估系统设计 被引量:2

Designing a Web-based Security Risk Assessment System for Mobile Payments
下载PDF
导出
摘要 确立适宜于移动支付安全风险评估的分析框架和系统需求,围绕其相关的脆弱性、威胁性和对资产影响这3方面因素,构建风险评估指标体系;从移动支付安全的整体性和系统性出发,以模糊决策环境下的网络平台为基础构架,结合模糊层次网络分析与信息熵技术建立决策模型,设计了一个基于网络的安全风险评估系统,以实现多重定性判断与定量分析综合集成的决策支持。 This paper establishes an analytic framework and systematic design discipline that feasible for mobile payments security (MPS) risk assessment. Then a web-based MPS risk assessment system is designed integrally and systematically. It utilizes fuzzy ANP and entropy technology to build the decision model. The system is capable of addressing multiple qualitative judgments with quantitative support, which is accomplished through the development and use of a framework in a web-based fuzzy decision making environment.
出处 《西华大学学报(自然科学版)》 CAS 2014年第6期5-10,共6页 Journal of Xihua University:Natural Science Edition
基金 中国博士后科学基金(2014M552375) 四川省哲社金融专项基金(SC13JR07)
关键词 移动支付 安全风险评估 网络支持系统 信息熵 决策支持 mobile payments security risk assessment web-based support system entropy decision support
  • 相关文献

参考文献25

  • 1Schierz P G, Schilke O, Wirtz B W. Understanding Consumer Acceptance of Mobile Payment Services: An Empirical Analysis [ J ].Electronic Commerce Research and Applications, 2010, 9 (3): 209 -216.
  • 2中国在线支付安全状况报告[EB/OL].(2012-11-21).[2014-09-12].http://www.cnnic.net.cn.
  • 3Trenas and Prospects of Mobile Payment Industry in China 2012- 2015: Creating Innovative Models, Boosting Mobile Financial Services[ R]. Deloitte China, 2012.
  • 4Robert C D, Matthew W H, Elizabeth A K, et al. Mobile Pay- ments: An Evolving Landscape[J]. Supervisory Insights, 2012, 9(2) : 3 -11.
  • 5Dahlberg T, Mallat N, Ondrus J, et al. Past, Present and Fu- ture of Mobile Payments Research : A Literature Review [ J ]. Electronic Commerce Research and Applications, 2008, 7(2): 165 -181.
  • 6Mobile Payment Heats up the ThirdParty Payment Market [ EB/ OL ]. ( 2013 - 06 - 06 ). [ 2013 - 10 - 23 ]. http ://english. iresearch. com. cn/views/4942, html.
  • 7Au Y A, Kauffman R J. The Economics of Mobile Payments: Understanding Stakeholder Issues for an Emerging Financial Technology Application[J]. Electronic Commerce Research and Applications, 2008, 7(2) : 141 - 164.
  • 8Lin Phone, Chen Hung - Yueh ,FANG Yuguang, et al. A Secure Mobile Electronic Payment Architecture Platform for Wireless Mobile Net- works[ J ]. IEEE Transactions on Wireless Communications, 2008, 7(7) : 2705 -2713.
  • 9SaleemKadhiwal, Anwar Usman Shaheed Zulfiquar. Analysis of Mobile Payment Security Measures and Different Standards[ J]. Comput- er Fraud & Security, 2007(6) : 12 -16.
  • 10Feng N, Li M. An Information Systems Security Risk Assess- ment Model under Uncertain Environment [ J ]. Applied Soft Computing, 2010, 11(7) : 4332 -4340.

二级参考文献23

  • 1穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 2GB/T 20984-2007.信息安全技术信息安全风险评估规范[S].中国国家质量监督检验检疫局,2007.
  • 3Satoh N,Kumamoto H.An application of probabilistic riskassessment to information security audit[C] //Proceedings ofthe 9th WSEAS International Conference on Applied Informaticsand Communications.Kyoto,Japan:World Scientific andEngineering Academy and Society,2009:436-443.
  • 4NIU Honghui,SHANG Yanling.Research on riskassessment model of information security based on particleswarm algorithm—RBF neural network[C] //IEEEProceedings of 2010 Second Pacific-Asia Conference onCircuits,Communications and System.Piscataway,USA:IEEE Press,2010.
  • 5HU Chaoju,LV Chunmei.Method of risk assessment basedon classified security protection and fuzzy neural network[C] //IEEE Proceedings of the 2010Asia-Pacific Conferenceon Wearable Computing Systems.Piscataway,USA:IEEEPress,2010.
  • 6XIAO Long,QI Yong,LI Qianmu.Information security riskassessment based on analytic hierarchy process and fuzzycomprehensive[C] //IEEE Proceedings of the 2008International Conference on Risk Management&EngineeringManagement.Piscataway,USA:IEEE Press,2008.
  • 7Eminagaoglu M,Eren S.Implementation and comparison ofmachine learning classifiers for information security riskanalysis of a human resources department[J].InternationalJournal of Computer Information Systems and IndustrialManagement Applications,2011,3(2011):391-398.
  • 8SUN Lili,Rajendra P S,Theodore J M.An informationsystems security risk assessment model under theDempster-Shafer theory of belief functions[J].Journal ofManagement Information Systems,2006,22(4):109-142.
  • 9ZHAO Dongmei,WANG Jinghong,WU Jing,et al.Usingfuzzy logic and entropy theory to risk assessment of theinformation security[C] //Yeung D S.IEEE Proceedings ofthe Fourth International Conference on Machine Learning andCybernetics.Washington DC,USA:IEEE Computer SocietyPress,2005.
  • 10Gamal A A.Multi-objectives model to process security riskassessment based on AHP-PSO[J].Modem AppliedScience,2011,5(3):246-250.

共引文献47

同被引文献24

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部