期刊文献+
共找到19,279篇文章
< 1 2 250 >
每页显示 20 50 100
Electronic Commerce Security and Risk Management: An Important Part of College Curriculum
1
作者 Yongchang Cai 《Journal of Educational Theory and Management》 2024年第1期18-22,共5页
With the rapid expansion of e-commerce,its security and risk management problems become increasingly prominent.In the current business environment,the ability to understand and apply e-commerce security and risk manag... With the rapid expansion of e-commerce,its security and risk management problems become increasingly prominent.In the current business environment,the ability to understand and apply e-commerce security and risk management has become an important criterion to measure a good person.Therefore,the importance of e-commerce security and risk management courses in college education is self-evident.This course can not only help students master the basic knowledge of e-commerce,but also enable them to understand how to deal with various risks in practical work and ensure the safe operation of e-commerce.At the same time,through the study of e-commerce security and risk management,students can better understand the operation mode and law of e-commerce,and lay a solid foundation for their future career.In general,e-commerce security and risk management occupy an important position in the curriculum of colleges and universities,and play a crucial role in cultivating e-commerce professionals with practical operation ability and innovative thinking. 展开更多
关键词 electronic commerce secure Risk management College curriculum
下载PDF
Predicting Purchasing Behavior on E-Commerce Platforms: A Regression Model Approach for Understanding User Features that Lead to Purchasing
2
作者 Abraham Jallah Balyemah Sonkarlay J. Y. Weamie +2 位作者 Jiang Bin Karmue Vasco Jarnda Felix Jwakdak Joshua 《International Journal of Communications, Network and System Sciences》 2024年第6期81-103,共23页
This research introduces a novel approach to improve and optimize the predictive capacity of consumer purchase behaviors on e-commerce platforms. This study presented an introduction to the fundamental concepts of the... This research introduces a novel approach to improve and optimize the predictive capacity of consumer purchase behaviors on e-commerce platforms. This study presented an introduction to the fundamental concepts of the logistic regression algorithm. In addition, it analyzed user data obtained from an e-commerce platform. The original data were preprocessed, and a consumer purchase prediction model was developed for the e-commerce platform using the logistic regression method. The comparison study used the classic random forest approach, further enhanced by including the K-fold cross-validation method. Evaluation of the accuracy of the model’s classification was conducted using performance indicators that included the accuracy rate, the precision rate, the recall rate, and the F1 score. A visual examination determined the significance of the findings. The findings suggest that employing the logistic regression algorithm to forecast customer purchase behaviors on e-commerce platforms can improve the efficacy of the approach and yield more accurate predictions. This study serves as a valuable resource for improving the precision of forecasting customers’ purchase behaviors on e-commerce platforms. It has significant practical implications for optimizing the operational efficiency of e-commerce platforms. 展开更多
关键词 e-commerce Platform Purchasing Behavior Prediction Logistic Regression Algorithm
下载PDF
An Application Expert System for Evaluating Effective Factors on Trust in B2C WebsitesTrust, Security, ANFIS, Fuzzy Logic, Rule Based Systems, Electronic Commerce 被引量:4
3
作者 Mehrbakhsh Nilashi Karamollah Bagherifard +2 位作者 Othman Ibrahim Nasim Janahmadi Mousa Barisami 《Engineering(科研)》 2011年第11期1063-1071,共9页
In new environments of trading, customer's trust is vital for the extended progress and development of electronic commerce. This paper proposes that in addition to known factors of electronic commerce B2C websites... In new environments of trading, customer's trust is vital for the extended progress and development of electronic commerce. This paper proposes that in addition to known factors of electronic commerce B2C websites such a design of websites, security of websites and familiarity of website influence customers trust in online transactions. This paper presents an application of expert system on trust in electronic commerce. Based on experts’ judgment, a frame of work was proposed. The proposed model applies ANFIS and Mamdani inference fuzzy system to get the desired results and then results of two methods were compared. Two questionnaires were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of electronic websites. Based on AHP method, Expert Choice software was used to determine the priority of factors in the first questionnaire, and MATLAB and Excel were used for developing the fuzzy rules. Finally, the fuzzy logical kit was used to analyze the generated factors in the model. Our study findings show that trust in EC transactions is strongly mediated by perceived security. 展开更多
关键词 TRUST security ANFIS Fuzzy Logic Rule Based Systems electronic commerce
下载PDF
Design of the XML Security System for Electronic Commerce Application 被引量:1
4
作者 安南 Zhang Shensheng 《High Technology Letters》 EI CAS 2003年第2期81-86,共6页
The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructu... The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application. 展开更多
关键词 electronic commerce security digital certificates smart card digital commerce AUTHeNTICATION transaction integrity verification internet XML
下载PDF
Secure End-to-End Architecture for E-commerce Security-Oriented Transaction 被引量:1
5
作者 Houssam El Ismaili Hanane Houmani Hicham Madroumi 《通讯和计算机(中英文版)》 2013年第7期937-943,共7页
关键词 电子商务安全 交易 导向 架构 经济现象 消费者 消费支出 可能影响
下载PDF
A Survey of E-Commerce Security 被引量:2
6
作者 QIN Zhiguang, LUO Xucheng, GAO Rong (School of Management, University of Electronic Science and Technology of China Chengdu 610054 China) 《Journal of Electronic Science and Technology of China》 2004年第3期173-176,199,共5页
E-commerce is a very active field of Internet research. A very important aspect of e-commerce is its security. Because of the variety of e-commerce applications, many security policies, protocols and techniques are in... E-commerce is a very active field of Internet research. A very important aspect of e-commerce is its security. Because of the variety of e-commerce applications, many security policies, protocols and techniques are involved in the deployment of the security. The related standards and protocols of e-commerce are studied in this paper. The general model of e-commerce security is set forth. In this model, two most important e-commerce protocols including secure sockets layer (SSL) and secure electronic transaction (SET) are analyzed. The open problems and new trends of e-commerce security are presented. 展开更多
关键词 e-commerce security SSL SeT new trends
下载PDF
Model Checking Electronic CommerceSecurity Protocols Based on CTL 被引量:1
7
作者 XIAODe-qin ZHANGHuan-guo 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期333-337,共5页
We present a model based on Computational Temporal Logic (CTL) methods forverifying security requirements of electronic commerce, protocols. The model describes formally theauthentication, confidentiality integrity, n... We present a model based on Computational Temporal Logic (CTL) methods forverifying security requirements of electronic commerce, protocols. The model describes formally theauthentication, confidentiality integrity, non-repudiation) denial of serviee and access control ofthe e-lectronic commerce protocols. We illustrate as case study a variant of the Lu-Smolka protocolproposed by Lu-Smolka Moreover, we have discovered two attacks that allow a dishonest user topurchase a good debiting the amountto another user. And also, we compared our work with relativeresearch works and found lhat the formal way of this paper is more general to specify securityprotocols for E-Commerce. 展开更多
关键词 e-commercc security protocols formal methods computational temporal logic
下载PDF
Design on PKI-Based Anonymous Mobile Agent Security in E-Commerce
8
作者 MENG Xiangsong HAN Fengwu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1907-1910,共4页
The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanis... The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI (public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA (certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit. 展开更多
关键词 mobile Agent PKI ANONYMITY e-commerce security
下载PDF
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems 被引量:1
9
作者 Faisal Nabi Jianming Yong +3 位作者 Xiaohui Tao Muhammad Saqib Malhi Muhammad Farhan Umar Mahmood 《Journal of Information Security》 2021年第3期189-211,共23页
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code err... Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span> 展开更多
关键词 Business Logic Design Flaws Components Integration Flaws e-commerce System Assurance & security Model Based Design Business Logic Attacks Attack Pattern
下载PDF
Secure Bluetooth for Trusted m-Commerce
10
作者 Pasquale Stirparo Jan Loschner 《International Journal of Communications, Network and System Sciences》 2013年第6期277-288,共12页
Our today’s world is becoming digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles... Our today’s world is becoming digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles, etc. One of the most widespread wireless capabilities is the Bluetooth protocol. Just in 2010, 906 million mobile Bluetooth enabled phones had been sold, and in 2011, there were more than 40 million Bluetooth enabled health and medical devices on the market. Still in 2011, one third of all new vehicles produced worldwide included Bluetooth technology. Security and privacy protection is key in the digital world of today. There are security and privacy risks such as device tracking, communication eavesdropping, etc., which may come from improper Bluetooth implementation with very severe consequences for the users. The objective of this paper is to analyze the usage of Bluetooth in m-commerce and m-payment fields. The steps undertaken in this paper in order to come to a proposal for a secure architecture are the analysis of the state of the art of the relevant specifications, the existing risks and the known vulnerabilities the related known attacks. Therefore, we give first an overview of the general characteristics of Bluetooth technology today, going deeper in the analysis of Bluetooth stack’s layers and the security features offered by the specifications. After this analysis of the specifications, we study how known vulnerabilities have been exploited with a comprehensive list of known attacks, which poses serious threats for the users. With all these elements as background, we conclude the paper proposing a design for Secure Architecture for Bluetooth-Enhanced Mobile “Smart” Commerce Environments. 展开更多
关键词 BLUeTOOTH Mobile security Mobile commerce PRIVACY
下载PDF
基于WS-Security的电子商务安全支付系统 被引量:4
11
作者 郭悦红 齐莉丽 《微电子学与计算机》 CSCD 北大核心 2010年第3期151-153,共3页
为实现电子商务交易的安全支付,采用WS-Security规范和XML技术结合构建电子商务安全支付系统.该系统使订单信息和支付信息在同一个过程中进行不同的处理,保证了在消息层上任意敏感信息的安全性,并实现了交易的不可否认性,从而提高了电... 为实现电子商务交易的安全支付,采用WS-Security规范和XML技术结合构建电子商务安全支付系统.该系统使订单信息和支付信息在同一个过程中进行不同的处理,保证了在消息层上任意敏感信息的安全性,并实现了交易的不可否认性,从而提高了电子支付的安全性和灵活性. 展开更多
关键词 电子商务 WS-security XML 电子支付
下载PDF
RCEP协定下跨境电商对贸易影响的时间差异性研究 被引量:1
12
作者 胡艳英 赵家琪 田刚 《对外经贸》 2024年第6期15-19,共5页
为了拓宽双循环渠道,打开外循环新思路,以中国与RCEP成员国在2010年至2021年间进出口面板数据结合中国跨境电商交易额建立VAR模型,研究跨境电子商务发展对我国进出口贸易的动态影响。结果表明,在长期,跨境电商的发展使得发展中国家与我... 为了拓宽双循环渠道,打开外循环新思路,以中国与RCEP成员国在2010年至2021年间进出口面板数据结合中国跨境电商交易额建立VAR模型,研究跨境电子商务发展对我国进出口贸易的动态影响。结果表明,在长期,跨境电商的发展使得发展中国家与我国双边贸易弹性系数高于发达国家,跨境电商的发展有利于我国同发展中国家进行贸易往来;在短期,跨境电商的发展对中国与韩国等部分国家的进出口存在逐渐增强的正向影响;跨境电商的发展对我国与多国贸易存在双向动态交互关系。 展开更多
关键词 RCeP 进出口贸易 跨境电商 VAR模型
下载PDF
基于ADDIE模型的沉浸式电子商务教学实践探索 被引量:1
13
作者 蒋益 《湖北开放职业学院学报》 2024年第4期182-184,共3页
我国电子商务行业方兴未艾,其专业人才的需求旺盛,因而许多高职院校都开设有电子商务专业。但与此同时,高职电子商务专业的毕业生往往就业率偏低且专业不对口的问题一直存在。不少民营企业来校园招聘电子商务人才往往找不到匹配工作岗... 我国电子商务行业方兴未艾,其专业人才的需求旺盛,因而许多高职院校都开设有电子商务专业。但与此同时,高职电子商务专业的毕业生往往就业率偏低且专业不对口的问题一直存在。不少民营企业来校园招聘电子商务人才往往找不到匹配工作岗位的人才。本文分析了造成这样问题的原因,并提出了通过ADDIE模型进行沉浸式教学设计的应对措施。 展开更多
关键词 电子商务 ADDIe模型 沉浸式教学
下载PDF
雨课堂融合OBE理念在高职电子商务类课程混合式教学的实践优化策略 被引量:1
14
作者 尤影 《湖北开放职业学院学报》 2024年第8期177-179,共3页
文章以服务乡村振兴为背景,聚焦高职电子商务类课程混合式教学改革,结合OBE教育理念重构课程内容,提出基于雨课堂教学平台实施项目化教学、七步教学法,并构建多元评价体系。全过程融入思政元素实现“思创融合”,推进岗课赛证综合育人,... 文章以服务乡村振兴为背景,聚焦高职电子商务类课程混合式教学改革,结合OBE教育理念重构课程内容,提出基于雨课堂教学平台实施项目化教学、七步教学法,并构建多元评价体系。全过程融入思政元素实现“思创融合”,推进岗课赛证综合育人,并针对院校、教师、学生提出优化实践效果的具体策略。 展开更多
关键词 OBe理念 雨课堂 混合式教学 高职电子商务类课程 思创融合
下载PDF
RCEP背景下广西面向东盟的跨境电子商务高质量发展路径研究 被引量:1
15
作者 刘丹羽 《中国商论》 2024年第7期37-40,共4页
广西是对接中国和东盟的“桥头堡”,同时东盟国家也是广西开展跨境电子商务的最重要贸易对象,RCEP背景下,东盟的跨境电子商务市场潜力愈发巨大。基于此,广西的跨境电子商务在新的营商环境中需进一步优化和完善,以实现高质量发展。当前,... 广西是对接中国和东盟的“桥头堡”,同时东盟国家也是广西开展跨境电子商务的最重要贸易对象,RCEP背景下,东盟的跨境电子商务市场潜力愈发巨大。基于此,广西的跨境电子商务在新的营商环境中需进一步优化和完善,以实现高质量发展。当前,广西面向东盟的跨境电子商务存在部分RCEP成员电商普及程度较低,区域内跨境电子商务平台交易规则参差不齐、物流体系不完善、交易支付体系未对接、复合型人才短缺等问题。因此,本文建议从加强区域内深度合作、整合成熟电商平台资源、优化物流网络体系、完善交易支付体系、培养新型跨境电子商务人才及政策保障支持等方面促进广西面向东盟的跨境电子商务的高质量发展。 展开更多
关键词 RCeP 广西 东盟 跨境电子商务 国际贸易 高质量发展 区域合作
下载PDF
基于XML技术的Mobile Agent在E-commerce中的应用
16
作者 郑晓梅 张天 夏阳 《计算机应用研究》 CSCD 北大核心 2004年第9期219-221,共3页
首先指出电子商务技术现存的一些问题,分析了MobileAgent及XML的技术在电子商务应用中的优势,最后构建了一个基于MobileAgent电子商务模型,此模型采用ACL-XML作为其中MobileAgent的通信语言。
关键词 移动代理 ACL—XML CBB 电子商务
下载PDF
一种上下文感知的E-commerce评级大数据赋权方法
17
作者 齐连永 窦万春 周毓明 《上海大学学报(自然科学版)》 CAS CSCD 北大核心 2016年第1期36-44,共9页
电子商务(E-commerce)的飞速发展,产生了大量针对商品的在线评级数据,通过分析评级数据,用户可以对商品的质量进行评估.然而,评级数据的海量性和差异性使得用户难以快速而准确地评估商品的质量.鉴于此,提出一种基于E-commerce评级的上... 电子商务(E-commerce)的飞速发展,产生了大量针对商品的在线评级数据,通过分析评级数据,用户可以对商品的质量进行评估.然而,评级数据的海量性和差异性使得用户难以快速而准确地评估商品的质量.鉴于此,提出一种基于E-commerce评级的上下文感知赋权方法(context-aware weighting approach,CWA),以选出少数"重要"的评级数据并抛弃大多数"不重要"的评级数据,从而确保商品质量评估的快速性和准确性.最后,通过一组实验验证了CWA的有效性. 展开更多
关键词 e-commerce 用户评级 大数据 赋权 上下文
下载PDF
RCEP背景下广西跨境电商高质量发展策略
18
作者 李继宏 韦大宇 《对外经贸》 2024年第5期17-20,共4页
随着RCEP生效实施,中国与RCEP成员国经贸合作不断深化,跨境电商市场发展迅速,为广西跨境电商带来了空前发展机遇。深入分析RCEP生效背景下广西跨境电商发展现状以及面临的机遇与挑战,提出了广西跨境电商高质量发展的对策建议,为广西开拓... 随着RCEP生效实施,中国与RCEP成员国经贸合作不断深化,跨境电商市场发展迅速,为广西跨境电商带来了空前发展机遇。深入分析RCEP生效背景下广西跨境电商发展现状以及面临的机遇与挑战,提出了广西跨境电商高质量发展的对策建议,为广西开拓RCEP成员国跨境电商市场提供借鉴与参考。 展开更多
关键词 RCeP 跨境电商 高质量发展 策略
下载PDF
基于DEA模型的陕西县域电商扶贫效率测度及空间特征研究
19
作者 魏笑笑 邢婕 《农学学报》 2024年第9期94-100,共7页
农村电商作为助力乡村振兴的新引擎,测度电商扶贫效率及其空间特征分析对推进乡村振兴具有重要意义。提出一种基于数据包络分析的县域电子商务扶贫效率测度方法,对陕西省84个县域进行静态测算,并分析其空间特征。研究结果显示陕西关中... 农村电商作为助力乡村振兴的新引擎,测度电商扶贫效率及其空间特征分析对推进乡村振兴具有重要意义。提出一种基于数据包络分析的县域电子商务扶贫效率测度方法,对陕西省84个县域进行静态测算,并分析其空间特征。研究结果显示陕西关中、陕北、陕南地区84个县域的电商扶贫综合效率均值为0.613,陕西大部分区县电商扶贫综合效率较低,陕北地区的电商扶贫综合效率最高,与关中、陕南的电商扶贫效率差距较大。陕西县域电商扶贫存在发展不均衡的问题。在空间特征方面,在陕西各县域,电商的发展还处于较为初级的阶段,未能形成相似的产业集群。鉴于此,根据不同县域电商扶贫效率的特点,提出了促进电商扶贫发展的意见和建议。 展开更多
关键词 农村电商 陕西县域 电商扶贫 数据包络分析 空间特征
下载PDF
基于UCL的DTV Commerce安全认证模型
20
作者 孙海峰 马建国 李幼平 《电子技术应用》 北大核心 2008年第1期129-131,共3页
基于UCL技术和互补结构网络的理论,提出了一种在数字电视平台上实现具有高度安全的和信息认证功能的数字电视电子商务系统模型,给出了数字电视电子商务的系统组成和模型的层次结构,实现了电子商务信息和PKI认证系统要素的UCL标引和映射... 基于UCL技术和互补结构网络的理论,提出了一种在数字电视平台上实现具有高度安全的和信息认证功能的数字电视电子商务系统模型,给出了数字电视电子商务的系统组成和模型的层次结构,实现了电子商务信息和PKI认证系统要素的UCL标引和映射,给出了一种安全认证机制。 展开更多
关键词 互补结构网络 统一内容定位 数字电视电子商务 安全认证
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部