期刊文献+
共找到29篇文章
< 1 2 >
每页显示 20 50 100
Electronic Commerce Security and Risk Management: An Important Part of College Curriculum
1
作者 Yongchang Cai 《Journal of Educational Theory and Management》 2024年第1期18-22,共5页
With the rapid expansion of e-commerce,its security and risk management problems become increasingly prominent.In the current business environment,the ability to understand and apply e-commerce security and risk manag... With the rapid expansion of e-commerce,its security and risk management problems become increasingly prominent.In the current business environment,the ability to understand and apply e-commerce security and risk management has become an important criterion to measure a good person.Therefore,the importance of e-commerce security and risk management courses in college education is self-evident.This course can not only help students master the basic knowledge of e-commerce,but also enable them to understand how to deal with various risks in practical work and ensure the safe operation of e-commerce.At the same time,through the study of e-commerce security and risk management,students can better understand the operation mode and law of e-commerce,and lay a solid foundation for their future career.In general,e-commerce security and risk management occupy an important position in the curriculum of colleges and universities,and play a crucial role in cultivating e-commerce professionals with practical operation ability and innovative thinking. 展开更多
关键词 electronic commerce SECURE Risk management College curriculum
下载PDF
Accountability Analysis of Electronic Commerce Protocols by Finite Automaton Model 被引量:2
2
作者 Xie Xiao-yao 1,2 , Zhang Huan-guo 1 1. School of Computer, Wuhan University, Wuhan 430072, Hubei, China 2. Institute of Network Technology, Guizhou University of Technology, Guiyang 550003, Guizhou, China 《Wuhan University Journal of Natural Sciences》 CAS 2004年第3期293-295,共3页
The accountability of electronic commerce protocols is an important aspect to insures security of electronic transaction. This paper proposes to use Finite Automaton (FA) model as a new kind of framework to analyze th... The accountability of electronic commerce protocols is an important aspect to insures security of electronic transaction. This paper proposes to use Finite Automaton (FA) model as a new kind of framework to analyze the transaction protocols in the application of electronic commerce. Key words finite automaton - electronic commerce - nonrepudiation - information security CLC number TP 393. 08 Foundation item: Supported by the National Natural Science Foundation of China (66973034, 90104005, 60373087)Biography: Xie Xiao-yao (1952-), male, Professor, Ph. D candidate, research direction: information security. 展开更多
关键词 finite automaton electronic commerce nonrepudiation information security
下载PDF
Towards a Methodology for Formal Design and Analysis of Agent Interaction Protocols ——An Investigation in Electronic Commerce
3
作者 Wei Jun 1,2 , Cheung Shing Chi 1, Wang Xu 1 1. Department of Computer Science, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong, China 2. Institute of Software, Chinese Academy of Science, Beijing 100080, Ch 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期126-139,共14页
Various extensions of UML have been developed to meet the challenges of designing modern software systems, such as agent based electronic commerce applications. Recent advances in model checking technology have led i... Various extensions of UML have been developed to meet the challenges of designing modern software systems, such as agent based electronic commerce applications. Recent advances in model checking technology have led it to be introduced into the development of approaches and tools to check the correctness of electronic commerce protocols. This paper focuses on the research of a method that connects an extension of AUML to model checker SPIN/Promela for the specification and verification of agent interaction protocols (AIP) in electronic commerce. The method presented here allows us to combine the benefits of visual specification with the power of some static analysis and model checking. Some algorithms and rules are developed to permit all visual modeling constructs translated mechanically into some Promela models of AIP, as supported by the model checker SPIN. Moreover, a process is illustrated to guide the specification and verification of AIP. The method is demonstrated thoroughly using the e commerce protocol NetBill as an example. 展开更多
关键词 agent UML interaction protocol software agent model checking formal specification electronic commerce protocol
下载PDF
The Integration of Modern Electronic Technology and E-Commerce:the Driving Force of Innovation Development
4
作者 Yongchang Cai 《Journal of Educational Theory and Management》 2024年第2期6-10,共5页
In the 21st century,which is known as the age of information,the integration of electronic technology and e-commerce has become an irreversible trend in the field of business.This trend not only promotes the innovativ... In the 21st century,which is known as the age of information,the integration of electronic technology and e-commerce has become an irreversible trend in the field of business.This trend not only promotes the innovative development of e-commerce,but also brings unprecedented opportunities and challenges for enterprises.With the continuous development and popularization of Internet technology,more and more people choose to carry out shopping,payment and other consumption activities through e-commerce platforms,which also provides merchants with a broader market space and more sales channels.At the same time,e-commerce also brings more convenience and choice to consumers,making it easier for consumers to obtain the goods and services they need.However,the development of e-commerce has also brought some new challenges,such as how to ensure the quality of goods,how to protect consumer privacy and so on.Therefore,enterprises and government departments need to strengthen the supervision and management of e-commerce to ensure its healthy and orderly development.In general,the integration of electronic technology and e-commerce has become an important trend in today’s business field,which brings both opportunities and challenges to enterprises. 展开更多
关键词 electronic technology electronic commerce Innovation and development Driving force
下载PDF
Empirical Study of Consumers’ Purchase Intentions in C2C Electronic Commerce 被引量:5
5
作者 何德华 鲁耀斌 周德翼 《Tsinghua Science and Technology》 SCIE EI CAS 2008年第3期287-292,共6页
Electronic commerce is becoming increasingly important in business, but lack of intention to purchase has become a main barrier in the development of electronic commerce. Thus, effective measures are needed to promote... Electronic commerce is becoming increasingly important in business, but lack of intention to purchase has become a main barrier in the development of electronic commerce. Thus, effective measures are needed to promote consumers’ intentions to purchase in online consumer to consumer (C2C) stores. This paper postulates that five factors, the perceived ease of use of the website, perceived usefulness of the website, vendor competence, introduction and recommendations of third parties, and vendors’ attitude toward customers, influence consumers’ intentions to purchase in online C2C stores and this intention directly leads to their action to purchase from online C2C stores. The structural equation modeling (SEM) method was used to analyze empirical data, supporting these hypotheses except for the effect of vendor competence. 展开更多
关键词 electronic commerce consumer to consumer (C2C) purchase intention technology acceptancemodel (TAM) structural equation modeling (SEM)
原文传递
Security Analysis of an Electronic Commerce Protocol Using Casper/FDR2 被引量:1
6
作者 CHANG Yinlong HU Huaping 《Wuhan University Journal of Natural Sciences》 CAS 2012年第6期499-503,共5页
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure enough.This article extends model checking method with Casper/FDR2 to ... Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure enough.This article extends model checking method with Casper/FDR2 to model and analyze a new electronic protocol.Attacks are found in the protocol and their mechanisms are discussed.A variety of solutions are given to different security flaws.The improved protocol is proven to be robust and secure. 展开更多
关键词 CASPER FDR2 electronic commerce model checking formal analysis
原文传递
Electronic commerce in China:current status,development strategies,and new trends
7
作者 Xiang Junyong Jing Linbo 《China Finance and Economic Review》 2014年第3期71-94,共24页
After years of development in China’s electronic commerce sector,there has been a drastic increase not only in the number of electronic commerce enterprises and online shoppers,but also in electronic commerce market ... After years of development in China’s electronic commerce sector,there has been a drastic increase not only in the number of electronic commerce enterprises and online shoppers,but also in electronic commerce market turnover in China.During this process,the Chinese government has played a key role in establishing legislation and market disciplines for the electronic commerce market.This paper explores policy regarding electronic commerce development in China and analyzes new trends in China’s electronic commerce,including the rise of mobile commerce,social commerce,and cross-border electronic commerce,and the booming industries of internet financing and Big Data.This paper aims to provide a better understanding of the development,uniqueness,and trends of electronic commerce in China.In addition,this paper also provides policymakers in China and other developing countries with policy suggestions regarding electronic commerce. 展开更多
关键词 electronic commerce current status development strategy new trends China
原文传递
A Certification Framework for E-Commerce Digital Competencies
8
作者 Antonia Stefani Bill Vassiliadis 《Open Journal of Applied Sciences》 CAS 2023年第5期758-774,共17页
In this paper, we introduce a comprehensive certification framework for digital competencies. This framework delineates the regulations, processes, and administration necessary for executing certification of a particu... In this paper, we introduce a comprehensive certification framework for digital competencies. This framework delineates the regulations, processes, and administration necessary for executing certification of a particular subset of competencies within the DigComp framework. It stipulates distinct requisites for the methodology employed, assessment instruments, evaluation criteria, and procedures for awarding certificates. The framework encompasses the enhancement of fundamental skills, particularly digital competencies, as well as involving digitally disenfranchised demographics with technology. It can be used to evaluate and certify varying degrees of digital proficiency and to instruct individuals in utilizing essential business-to-consumer e-commerce functionalities. 展开更多
关键词 Certification System DigComp electronic commerce
下载PDF
Insights into B2C E-Commerce Quality Using ISO 25010
9
作者 Antonia Stefani Eleni Vamvatsikou Bill Vassiliadis 《Journal of Software Engineering and Applications》 2023年第11期622-639,共18页
This paper introduces an innovative Software Quality Assurance framework tailored for B2C e-commerce systems, seamlessly integrating software quality with business objectives. Drawing from elements of the ISO 25000 se... This paper introduces an innovative Software Quality Assurance framework tailored for B2C e-commerce systems, seamlessly integrating software quality with business objectives. Drawing from elements of the ISO 25000 series and ISO 20000 standards, this framework specifically addresses challenges inherent to e-commerce. By establishing business-relevant KPIs, the framework ensures that ongoing improvement initiatives resonate with the company’s strategic goals. Additionally, the paper presents a Dynamic Bayesian Network model as a hands-on tool for implementing the framework within e-commerce organisations. 展开更多
关键词 electronic commerce Software Quality Business to Consumer Targeted Software Design ISO 25010
下载PDF
China Chamber of Commerce for Import and Export of Machinery and Electronics Products
10
《China's Foreign Trade》 2000年第2期10-,13,共2页
FoundedinJuly1988,ChinaChamberofCommerceforImportandExportofMachineryandElectronics.Products(CCCME)isalegalcorporateentitywhichhasregisteredinChinabyJlaw,obtainedtherightofhandling1importsandexportsandiscomposedofecon... FoundedinJuly1988,ChinaChamberofCommerceforImportandExportofMachineryandElectronics.Products(CCCME)isalegalcorporateentitywhichhasregisteredinChinabyJlaw,obtainedtherightofhandling1importsandexportsandiscomposedofeconomicentities(includingforeignfund... 展开更多
关键词 China Chamber of commerce for Import and Export of Machinery and electronics Products
下载PDF
Software Technology for E-Commerce Era
11
作者 Chen shing Chou e Toyou International Inc.,Taipei 100,China 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期159-163,共5页
The rapid growth of Internet usage and electronic commerce (e commerce) applications will push traditional industries to transform their business models and to re engineer their information systems. This direction w... The rapid growth of Internet usage and electronic commerce (e commerce) applications will push traditional industries to transform their business models and to re engineer their information systems. This direction will give the software industry either great opportunities for their business growth or crucial challenges to their existence. This article describes two essential challenges the software industry will face and presents relevant new technologies that will be helpful for overcoming those challenges. 展开更多
关键词 Software technology electronic commerce software industry software development domain knowledge knowledge oriented one to one IPR protection
下载PDF
Electronic Payment Scheme to Prevent the Treachery
12
作者 FAN Kai ZHANG Jun KOU Weidong XIAO Guozhen 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1745-1748,共4页
Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and i... Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and its security is analyzed. This scheme can prevent the treachery only with the aid of an un-trusted third party. It is very simple and it also improves the security and provides the non-repudiation, accountability, fairness and privacy. 展开更多
关键词 treachery electronic payment scheme electronic commerce security
下载PDF
Innovation and Evaluation of Technology Acceptance Model (Tam) in S-Commerce: A Case of Social Media Platforms in Ghana
13
作者 Peprah Rene Owusu Ennin Peter Asiedu +1 位作者 Jiangming Ji Francis Atta Sarpong 《Journal of Computer and Communications》 2022年第3期100-124,共25页
Electronic commerce is quickly increasing in several countries, most notably in developing countries. A new electronic-commerce segment known as social commerce has evolved due to the popularity of social media. Consu... Electronic commerce is quickly increasing in several countries, most notably in developing countries. A new electronic-commerce segment known as social commerce has evolved due to the popularity of social media. Consumer trust is important to social commerce success and impacts purchase choices. In modern times, majority of businesses have changed how from the traditional businesses and migrated to social commerce. Electronic commerce was the first of its sort, followed by social commerce, which conducted business via social networking platforms. Identifying the factors that influence social commerce use enables businesses to enhance those features and boost revenue. Thus, the purpose of this study was to examine how increased technology usage influences the social commerce activities of Ghanaian businessmen and women. A review of the literature resulted in the development of a conceptual model. Six hundred and twenty-five responses from Ghanaian enterprises and women who use e-commerce platforms were used to assess the conceptual approach. Partial Least Square Structural Equation Modeling (PLS SEM) was used to validate the model. The reliability and validity of the measuring apparatus were determined using measurement model analysis. To examine the model’s fit and assumptions, we used structural model analysis. Five hypotheses were supported by the structural model data. Effort Expectancy, Perceived Ease of Use, Performance Expectancy, Perceived Utility, and Trust were shown to be the most influential criteria affecting behavioral intention to use s-commerce in Ghana. The findings of this research have major significance for academics and practitioners of social trade. 展开更多
关键词 Technology Acceptance Model (TAM) Smart PLS SEM Social commerce electronic commerce
下载PDF
Harnessing Internet finance with innovative cyber credit management 被引量:8
14
作者 Zhangxi Lin Andrew B.Whinston Shaokun Fan 《Financial Innovation》 2015年第1期46-69,共24页
In the last two decades,Internet technologies,such as cloud computing,mobile communications,social media,and big data analytics,have brought tremendous changes to our society and reshaped the business in various indus... In the last two decades,Internet technologies,such as cloud computing,mobile communications,social media,and big data analytics,have brought tremendous changes to our society and reshaped the business in various industries.Specifically,the mushrooming innovations in the financial area fertilized by information and communication technologies indicates the advent of the Internet finance era.Applying the exploratory research approach,we investigate major innovative Internet-based financial services and classify them into five categories,as of e-commerce,e-payment,e-money market,online loan services,and digital currencies.Then we propose a market structure of Internet finance extended from the traditional financial market.We claim that credit management is the key issue in the marketplace of Internet finance,characterized by big data analytics,in which cyber credit appears as whole-process,multi-dimensional,and holographic.We further suggest that cyber credit be represented in the form of vector to overcome the limits of traditional single-value measure in cyber credit management.Based on this framework,we raise main research issues in Internet finance from the perspectives of theory,technology,and governance. 展开更多
关键词 electronic commerce Internet finance Credit risk REGULATION Financial market INNOVATION
下载PDF
我国化工贸易国际化初探 被引量:3
15
作者 张燕翔 《承德职业学院学报》 2007年第2期53-54,共2页
世界贸易正在发生根本性的变革,为我国化工对外贸易的发展带来了新的机遇。本文就世界贸易发展趋势,我国化工对外贸易的现状、面临的问题和挑战,以及应采取的对策进行探讨。
关键词 chemical trade import and export electronic commerce
下载PDF
A Proxy Blind Signature Scheme Based on DLP 被引量:2
16
作者 YU Baozheng XU Congwei 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期83-86,共4页
A proxy signature scheme allows an original signer to delegate his signing capability to a proxy signer who can sign on behalf of the original signer. A blind signature is the concept with a salient feature that the s... A proxy signature scheme allows an original signer to delegate his signing capability to a proxy signer who can sign on behalf of the original signer. A blind signature is the concept with a salient feature that the signer can not make a linkage between the blind signature and the identity of the requester. Proxy signature and blind signature are used widely in electronic commerce. With satisfying the security properties of both two signatures, a new proxy blind signature scheme based on discrete logarithm problem is proposed. 展开更多
关键词 discrete logarithm problem proxy signature blind signature electronic commerce
下载PDF
From Workflow to Interworkflow 被引量:1
17
作者 Kenichi Okada 1, Haruo Hayami 2, Kimiyo Sagehashi 3 1 Department of Information and Computer Science, Faculty of Science & Technology Keio University 3 14 1Hiyoshi, Kohoku ku,Yokohama 223 8522, Japan 2 Department of Information and Computer S 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期63-71,共9页
Workflow management systems are being introduced in many organizations to automate the business process. The initial emphasis of introducing a workflow management system is on its application to the workflow in a give... Workflow management systems are being introduced in many organizations to automate the business process. The initial emphasis of introducing a workflow management system is on its application to the workflow in a given organization. The next step is to interconnect the workflow across organizations. We call it interworkflow, and the total support technologies, which are necessary for its realization, interworkflow management mechanism. Interworkflow is being expected as a supporting mechanism for Business to Business Electronic Commerce. We had proposed this management mechanism and confirmed its realization with the prototype. At the same time, the interface and the protocol for interconnecting heterogeneous workflow management systems has been standardized by the WfMC. So, we advance the project of the implementation of interworkflow management system for the practical use and its experimental proof. 展开更多
关键词 WORKFLOW interworkflow business to business electronic commerce WFMC
下载PDF
Building an E-business System Using Enterprise JavaBeans Architecture
18
作者 CAI Ling-feng, LIN Cai-xing, LI Min (Mechanical Engineering & Automation Institute, Shanghai University, Shanghai 200072, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期275-,共1页
This paper provides an overview of using Enterprise JavaBeans to build an e-business system. First, the authors point out some difficulties during building an e-business sy stem. For example, how can we integrate all ... This paper provides an overview of using Enterprise JavaBeans to build an e-business system. First, the authors point out some difficulties during building an e-business sy stem. For example, how can we integrate all kinds of software and hardware i n company quickly and economically Then the authors introduce a representative EJB structure and currently EJB deve loping approaches. A representative EJB structure includes an EJB Server, EJB Co ntainers, EJB Clients and JNDI etc. An EJB Server is similar to CORBA ORB. It pr ovides system services such as original implementing environment, multiprocessin g, workload management, equipment accessing, JTS and JNDI service and making the EJB Container visible. The EJB Container plays the role of interface between th e EJB and others. An EJB Client never accesses Bean directly. There are two kind s of containers. One is session contain, it mainly includes brief, impermanent E JB(thus all statuses will not be saved). The other is entity container which inc luding permanent EJB. The EJB Client uses EJB Beans. First it finds EJB Containe r through JNDI interface. Then it transfers EJB methods using EJB Container. Current, EJB developing approaches include several major aspects such as develop ment, deployment, application programs assembling and management of Enterprise B ean etc. Above all, we should define three classes, Bean class, home interface c lass of Bean and remote interface class of Bean. Then we should create a deploym ent descriptor. This is an XML documentation, which declared the properties of E nterprise Bean and bound the class documentations of Bean(including stub documen tation and skeleton documentation). And then we put these deployments into a jar documentation and define environment properties in the deployer. Next, we shoul d assemble application programs including install Enterprise Beans to server and test the connecting of each ties. The program assembler integrates several Ente rprise Beans with other beans(like Servlet, Applet, Script etc) into an integrat ed application program. It also may integrate several Enterprise Beans into a co mplicated Enterprise Bean. Of cause we also need to manage the Enterprise Bean. In the end, the authors point out several major advantages of using EJB to build e-business system such as simplifying application development and deployment, supporting heterogeneous client and server platforms, leveraging existing skills and assets, delivering a secure, scalable, reliable and manageable environment and providing the freedom to implement using many vendors’ products. 展开更多
关键词 electronic commerce Enterprise JavaBeans Java p rogramming language object oriented programming
下载PDF
Fair E-Payment Protocol Based on Simple Partially Blind Signature Scheme
19
作者 LIU Jingwei SUN Rong KOU Weidong 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期181-184,共4页
This paper presents a simple partially blind signature scheme with low computation. By converse using the partially blind signature scheme, we build a simple fair e-payment protocol. In the protocol, two participants ... This paper presents a simple partially blind signature scheme with low computation. By converse using the partially blind signature scheme, we build a simple fair e-payment protocol. In the protocol, two participants achieve the goals of exchanging their digital signatures from each other in a simple way. An ado vantage of this scheme is that this approach does not require the intervention of the third party in any case. The low-computation property makes our scheme very attractive for mobile client and smart-card implementation in many e-commerce applications. 展开更多
关键词 electronic commerce E-PAYMENT Schnorr signature partial blind signature
下载PDF
A New Watermarking Protocol against Conspiracy
20
作者 ZHANG Jun KOU Weidong FAN Kai CAO Xuefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1671-1674,共4页
A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP)... A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided. 展开更多
关键词 watermarking protocol electronic commerce security digital copyright protection conspiracy problem
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部