Most traditional trust computing models in E-commerce do not take the transaction frequency among participating entities into consideration,which makes it easy for one party of the transaction to obtain a high trust v...Most traditional trust computing models in E-commerce do not take the transaction frequency among participating entities into consideration,which makes it easy for one party of the transaction to obtain a high trust value in a short time,and brings many disadvantages,uncertainties and even attacks.To solve this problem,a transaction frequency based trust is proposed in this study.The proposed method is composed of two parts.The first part is built on the classic Bayes analysis based trust modelswhich are ease of computing for the E-commerce system.The second part is the transaction frequency module which can mitigate the potential insecurity caused by one participating entity gaining trust in a short time.Simulations show that the proposed method can effectively mitigate the self-promoting attacks so as to maintain the function of E-commerce system.展开更多
In this paper, we conduct research on the modern precision e-commerce marketing model under the big data and pattern recognition background. Large amount of consumption data provides the electricity enterprises grasp ...In this paper, we conduct research on the modern precision e-commerce marketing model under the big data and pattern recognition background. Large amount of consumption data provides the electricity enterprises grasp the user consumption pattern and the basis of the electric business enterprise through the use of big data can be personalized, accurate and intelligent advertising push service, service mode for the creation of more interesting and effective. Under this basis, electricity companies can also pass the assurance of pair of big data, looking for better increase user stickiness, development of new products and services, the ways and methods to reduce operational costs and accordingly, we propose the novel perspectives on the corresponding issues for the systematic level enhancement that provides the novel methodology of precision e-commerce marketing.展开更多
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code err...Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span>展开更多
Electronic commerce which denotes the process of electronic transaction via internet has led to a very significant improvement in the level of growth, development, efficiency and productivity of global economies. In o...Electronic commerce which denotes the process of electronic transaction via internet has led to a very significant improvement in the level of growth, development, efficiency and productivity of global economies. In order to benefit from the economic opportunities offered by electronic commerce, Nigerian government and business organizations needs to effectively integrate Information and Communication Technologies (ICTs) as the major component of e-commerce campaign initiatives. The discussion in the paper is centered on e-commerce and ICTs and their resultant effect on Nigeria’s economic growth and development. This paper has presented an in-depth discussion of the various types of e-commerce, the major contributions of e-commerce to the economic growth of Nigeria and finally the challenges that impede the growth of e-commerce in Nigeria were identified and the possible recommendations for solutions to those challenges were provided.展开更多
E-Commerce in China and USA almost synchronously initiated. However, nowadays the differences of E-Commerce between the two countries are larger. In this paper, we try to find out what brings about the differences of ...E-Commerce in China and USA almost synchronously initiated. However, nowadays the differences of E-Commerce between the two countries are larger. In this paper, we try to find out what brings about the differences of E-Commerce between the two countries. We consider the contracting process of E-Commerce and analyze ex ante, ongoing and ex post transaction cost of E-Commerce contract. The conclusion is that the differences in economy and institution between China and USA result in the differences of transaction cost, which make for the differences in status quo of E-Commerce between the two countries.展开更多
This paper draws on the experience of the eighth plenary meeting of the ISO/TC 321, Transaction assurance in e-commerce, held in Hangzhou of China in November 2023, and explores potential ways in which developing coun...This paper draws on the experience of the eighth plenary meeting of the ISO/TC 321, Transaction assurance in e-commerce, held in Hangzhou of China in November 2023, and explores potential ways in which developing countries in Africa can drive their development and contribute to global industrial progress by leveraging ISO/TC 321 standards. It provides practical recommendations for utilizing e-commerce standardization and related standards to stimulate economic growth and enhance business practices.展开更多
With the increasing impact of globalization and informatization,the functional spatial pattern of the Yangtze River Delta,being reshaped by the new economy led by"Internet Plus,"is becoming more complicated....With the increasing impact of globalization and informatization,the functional spatial pattern of the Yangtze River Delta,being reshaped by the new economy led by"Internet Plus,"is becoming more complicated.Hence,the study on the spatial pattern of e-commerce has much practical significance.Considering that B2 B e-commerce is a typical representative of the e-commerce economy currently in China,this paper analyzes the B2 B e-commerce enterprise network and explores whether the globalization and informatization processes have brought about a new spatial pattern in the Yangtze River Delta,to improve its spatial structure recognition.It is found that:(1)the status of Shanghai and Yiwu as two cores of the network has become prominent,while the status of Nanjing and Ningbo as traditional network centers has been weakened;(2)the regional axis has changed,with the Shanghai-Hangzhou-Yiwu axis rising and the traditional economic corridors such as the Shanghai-Nanjing axis and the Hangzhou-Ningbo axis being weakened;(3)the core area of the network connection has expanded,with the Jinhua-Yiwu region and the WenzhouTaizhou region becoming areas with close connections.展开更多
数据流是随着时间顺序快速变化的和连续的,对其进行频繁模式挖掘时会出现概念漂移现象.在一些数据流应用中,通常认为最新的数据具有最大的价值.数据流挖掘会产生大量无用的模式,为了减少无用模式且保证无损压缩,需要挖掘闭合模式.因此,...数据流是随着时间顺序快速变化的和连续的,对其进行频繁模式挖掘时会出现概念漂移现象.在一些数据流应用中,通常认为最新的数据具有最大的价值.数据流挖掘会产生大量无用的模式,为了减少无用模式且保证无损压缩,需要挖掘闭合模式.因此,提出了一种基于时间衰减模型和闭合算子的数据流闭合模式挖掘方式TDMCS(Time-Decay-Model-based Closed frequent pattern mining on data Stream).该算法采用时间衰减模型来区分滑动窗口内的历史和新近事务权重,使用闭合算子提高闭合模式挖掘的效率,设计使用最小支持度-最大误差率-衰减因子的三层架构避免概念漂移,设计一种均值衰减因子平衡算法的高查全率和高查准率.实验分析表明该算法适用于挖掘高密度、长模式的数据流;且具有较高的效率,在不同大小的滑动窗口条件下性能表现是稳态的,同时也优于其他同类算法.展开更多
文摘Most traditional trust computing models in E-commerce do not take the transaction frequency among participating entities into consideration,which makes it easy for one party of the transaction to obtain a high trust value in a short time,and brings many disadvantages,uncertainties and even attacks.To solve this problem,a transaction frequency based trust is proposed in this study.The proposed method is composed of two parts.The first part is built on the classic Bayes analysis based trust modelswhich are ease of computing for the E-commerce system.The second part is the transaction frequency module which can mitigate the potential insecurity caused by one participating entity gaining trust in a short time.Simulations show that the proposed method can effectively mitigate the self-promoting attacks so as to maintain the function of E-commerce system.
文摘In this paper, we conduct research on the modern precision e-commerce marketing model under the big data and pattern recognition background. Large amount of consumption data provides the electricity enterprises grasp the user consumption pattern and the basis of the electric business enterprise through the use of big data can be personalized, accurate and intelligent advertising push service, service mode for the creation of more interesting and effective. Under this basis, electricity companies can also pass the assurance of pair of big data, looking for better increase user stickiness, development of new products and services, the ways and methods to reduce operational costs and accordingly, we propose the novel perspectives on the corresponding issues for the systematic level enhancement that provides the novel methodology of precision e-commerce marketing.
基金Acknowledgements: This work is supported by the National Natural Science Foundation of China (No. 60205007), Natural Science Foundation of Guangdong Province (No.031558, No. 04300462), Research Foundation of National Science and Technology Plan Project (No.2004BA721A02), Research Foundation of Science and Technology Plan Project in Guangdong Province (No.2003C50118), and Research Foundation of Science and Technology Plan Project in Guangzhou City (No.2002Z3-E0017).
文摘Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span>
文摘Electronic commerce which denotes the process of electronic transaction via internet has led to a very significant improvement in the level of growth, development, efficiency and productivity of global economies. In order to benefit from the economic opportunities offered by electronic commerce, Nigerian government and business organizations needs to effectively integrate Information and Communication Technologies (ICTs) as the major component of e-commerce campaign initiatives. The discussion in the paper is centered on e-commerce and ICTs and their resultant effect on Nigeria’s economic growth and development. This paper has presented an in-depth discussion of the various types of e-commerce, the major contributions of e-commerce to the economic growth of Nigeria and finally the challenges that impede the growth of e-commerce in Nigeria were identified and the possible recommendations for solutions to those challenges were provided.
文摘E-Commerce in China and USA almost synchronously initiated. However, nowadays the differences of E-Commerce between the two countries are larger. In this paper, we try to find out what brings about the differences of E-Commerce between the two countries. We consider the contracting process of E-Commerce and analyze ex ante, ongoing and ex post transaction cost of E-Commerce contract. The conclusion is that the differences in economy and institution between China and USA result in the differences of transaction cost, which make for the differences in status quo of E-Commerce between the two countries.
文摘This paper draws on the experience of the eighth plenary meeting of the ISO/TC 321, Transaction assurance in e-commerce, held in Hangzhou of China in November 2023, and explores potential ways in which developing countries in Africa can drive their development and contribute to global industrial progress by leveraging ISO/TC 321 standards. It provides practical recommendations for utilizing e-commerce standardization and related standards to stimulate economic growth and enhance business practices.
文摘With the increasing impact of globalization and informatization,the functional spatial pattern of the Yangtze River Delta,being reshaped by the new economy led by"Internet Plus,"is becoming more complicated.Hence,the study on the spatial pattern of e-commerce has much practical significance.Considering that B2 B e-commerce is a typical representative of the e-commerce economy currently in China,this paper analyzes the B2 B e-commerce enterprise network and explores whether the globalization and informatization processes have brought about a new spatial pattern in the Yangtze River Delta,to improve its spatial structure recognition.It is found that:(1)the status of Shanghai and Yiwu as two cores of the network has become prominent,while the status of Nanjing and Ningbo as traditional network centers has been weakened;(2)the regional axis has changed,with the Shanghai-Hangzhou-Yiwu axis rising and the traditional economic corridors such as the Shanghai-Nanjing axis and the Hangzhou-Ningbo axis being weakened;(3)the core area of the network connection has expanded,with the Jinhua-Yiwu region and the WenzhouTaizhou region becoming areas with close connections.
文摘数据流是随着时间顺序快速变化的和连续的,对其进行频繁模式挖掘时会出现概念漂移现象.在一些数据流应用中,通常认为最新的数据具有最大的价值.数据流挖掘会产生大量无用的模式,为了减少无用模式且保证无损压缩,需要挖掘闭合模式.因此,提出了一种基于时间衰减模型和闭合算子的数据流闭合模式挖掘方式TDMCS(Time-Decay-Model-based Closed frequent pattern mining on data Stream).该算法采用时间衰减模型来区分滑动窗口内的历史和新近事务权重,使用闭合算子提高闭合模式挖掘的效率,设计使用最小支持度-最大误差率-衰减因子的三层架构避免概念漂移,设计一种均值衰减因子平衡算法的高查全率和高查准率.实验分析表明该算法适用于挖掘高密度、长模式的数据流;且具有较高的效率,在不同大小的滑动窗口条件下性能表现是稳态的,同时也优于其他同类算法.