期刊文献+
共找到606篇文章
< 1 2 31 >
每页显示 20 50 100
Will Online Car-Hailing Affect Consumers’ Decisions about Automobile Purchase?—An Empirical Study Based on Questionnaire Investigation
1
作者 Xuehong Ji Sisi Chen +1 位作者 Xuecheng Wang Jing Wang 《Journal of Transportation Technologies》 2024年第1期1-15,共15页
The online car-hailing industry, which provides the right of use, has a certain impact on the traditional automobile market, but there is no unified theory on whether it has a positive impact or a negative impact. Bas... The online car-hailing industry, which provides the right of use, has a certain impact on the traditional automobile market, but there is no unified theory on whether it has a positive impact or a negative impact. Based on 362 consumer questionnaire data, this study builds a structural equation model to discuss the driving factors of residents’ choice of online car-hailing and whether the development of online car-hailing will have a certain substitution impact on the sales of private cars. From the perspective of consumers’ purchase intention, the research results show that consumers’ price consciousness, convenience consciousness, environmental protection consciousness and possession tendency will affect their choice of travel mode, and the use of online car-hailing is positively correlated with consumers’ willingness to replace private car ownership with online car-hailing. 展开更多
关键词 online car-hailing Willingness to Use Ownership Substitution Carpooling
下载PDF
How Perceived Benefits and Barriers Affect Millennial Professionals’ Online Security Behaviors
2
作者 Fabrice Djatsa 《Journal of Information Security》 2019年第4期278-301,共24页
Over the past decade, there has been an increase in cybersecurity breaches through identity theft, hacking, phishing attacks, and the use of malware such as viruses, worms, or trojans. The breaches have triggered an i... Over the past decade, there has been an increase in cybersecurity breaches through identity theft, hacking, phishing attacks, and the use of malware such as viruses, worms, or trojans. The breaches have triggered an increase in investment in information security in organizations. As technology continues to improve, the risks of having cybersecurity incidents also increase. Cybersecurity firms reported that in 2016, there were 1209 total breaches with 1.1 billion identities exposed. Most experts agree that human vulnerability is a significant factor in cybersecurity. Most issues related to advanced threats come from human nature and ignorance. For the study, the researcher examined the relationship between Millennial professionals’ perceptions of cybersecurity risks and users’ online security behaviors. The study focused on two elements of perception which are perceived benefits and perceived barriers. The researcher administered a survey to 109 participants randomly selected among Survey Monkey audience members. The Spearman’s correlation test performed supported the analysis of the strength of the relationship and the level of significance between each of the independent variables and the dependent variable. The results from the statistical test provided enough evidence to reject each of the null hypothesis tested in this study. There were significant correlations between each of the independent variables, Perceived Benefits (PBE) and Perceived Barriers (PBA) and the dependent variable Online Security Behaviors (OSB). 展开更多
关键词 PERCEPTIONS Barriers BENEFITS online security BEHAVIORS Millennial
下载PDF
Analysis of the Relationship Between Perceived Security and Customer Trust and Loyalty in Online Shopping
3
作者 Nihan Ozguven 《Chinese Business Review》 2011年第11期990-997,共8页
Advancements in the internet technology triggered a line of developments in the field of marketing. As an alternative to the conventional shopping, online shopping over the internet has gained substantial share of ret... Advancements in the internet technology triggered a line of developments in the field of marketing. As an alternative to the conventional shopping, online shopping over the internet has gained substantial share of retail market. Customers get used to this new shopping venue and nowadays prefer it more and more according to the researchers, ten percent of the global population now uses internet for shopping. In this research, the author explored the relationship between the security measures implemented by a company, very active in the online shopping domain, and the customer trust and loyalty on the online services provided by this company. Findings of this research are based on survey data analyzed in SPSS. This research supports the existence of a relationship between the security of a company's website and customer trust and loyalty on the online services of this company When the perception of security measures improves, customer trust and loyalty increases accordingly 展开更多
关键词 CUSTOMERS customer trust perceived security LOYALTY online shopping WEBSITES
下载PDF
Security Online Transaction Risk and Prevention
4
《China's Foreign Trade》 2001年第10期38-42,共5页
关键词 CSRC security online Transaction Risk and Prevention high STAR THAN
下载PDF
Research on Information Security Technology of Online Insurance System Based on WEB
5
作者 Qingfeng Zhang 《Journal of Electronic Research and Application》 2018年第4期5-9,共5页
With the continuous development and advancement of science and technology,WEB-based online insurance system has become an inevitable choice to adapt to the development trend of the times.On the basis of establishing a... With the continuous development and advancement of science and technology,WEB-based online insurance system has become an inevitable choice to adapt to the development trend of the times.On the basis of establishing a system,it is necessary to manage the safe operation structure,thus effectively establishing complete supervision and maintenance.The system ensures that the management level of insured information security technology can be optimized.This paper briefly analyzes the framework of the WEB-based online insurance system and discusses the security mode and system implementation. 展开更多
关键词 WEB online INSURANCE SYSTEM FRAMEWORK security SYSTEM implementation
下载PDF
Research about Online Security Warning and Risk Assessment of Power Grid Based on Energy Management System
6
作者 Hanyun Wang Kangyuan Wang +2 位作者 Yunxiao Zhang Guoqiang Mei Mingming Wu 《Journal of Energy and Power Engineering》 2012年第3期485-487,共3页
In this paper, online security warning and risk assessment of power grid are proposed, based on data from EMS (Energy Management System), combined with information of real-time operation state, component status and ... In this paper, online security warning and risk assessment of power grid are proposed, based on data from EMS (Energy Management System), combined with information of real-time operation state, component status and external operating environment. It combines the two factors, contingency likelihood and severity, that determine system reliability, into risk indices on different loads and operation modes, which provide precise evaluation of the power grid's security performance. According to these indices, it can know the vulnerable area of the system and whether the normal operating mode or repair mode is over-limited or not, and provide decision-making support for dispatchers. Common cause outages and equipment-aging are considered in terms of the establishment of outage model. Multiple risk indices are defined in order to reflect the risk level of the power grid more comprehensively. 展开更多
关键词 EMS (energy management system) online security warning risk assessment.
下载PDF
Utilization of online systems to promote youth participation in research:A methodological study
7
作者 Marie Salem Lance Pollack +1 位作者 Alex Zepeda Kathleen P Tebb 《World Journal of Methodology》 2023年第4期210-222,共13页
BACKGROUND Online surveys can align with youth’s increased use of the internet and can be a mechanism for expanding youth participation in research.This is particularly important during the coronavirus disease 2019(C... BACKGROUND Online surveys can align with youth’s increased use of the internet and can be a mechanism for expanding youth participation in research.This is particularly important during the coronavirus disease 2019(COVID-19)pandemic,when inperson interactions are limited.However,the advantages and drawbacks of online systems used for research need to be carefully considered before utilizing such methodologies.AIM To describe and discuss the strengths and limitations of an online system developed to recruit adolescent girls for a sexual health research study and conduct a three-month follow up survey.METHODS This methodology paper examines the use of an online system to recruit and follow participants three months after their medical visit to evaluate a mobile sexual and reproductive health application,Health-E You/Salud iTuTM,for adolescent girls attending school-based health centers(SBHCs)across the United States.SBHC staff gave adolescent girls a web link to an online eligibility and consent survey.Participants were then asked to complete two online surveys(baseline and 3-month follow-up).Surveys,reminders,and incentives to complete them were distributed through short message service(SMS)text messages.Upon completing each survey,participants were also sent an email with a link to an electronic gift card as a thank-you for their participation.Barriers to implementing this system were discussed with clinicians and staff at each participating SBHC.RESULTS This online recruitment and retention system enabled participant recruitment at 26 different SBHCs in seven states across the United States.Between September 2021 and June 2022,415 adolescent girls were screened using the Qualtrics online survey platform,and 182 were eligible to participate.Of those eligible,78.0%(n=142)completed the baseline survey.Participants were racially,geographically,and linguistically diverse.Most of the participants(89.4%)were non-White,and 40.8%spoke Spanish.A total of 62.0%(n=88)completed the 3-month follow-up survey.Limitations of this system included reliance on internet access(via Wi-Fi or cell service),which was not universally available or reliable.In addition,an individual unrelated to the study obtained the survey link,filled out multiple surveys,and received multiple gift cards before the research team discovered and stopped this activity.As a result,additional security protocols were instituted.CONCLUSION Online systems for health research can increase the reach and diversity of study participants,reduce costs for research personnel time and travel,allow for continued study operation when in-person visits are limited(such as during the COVID-19 pandemic),and connect youth with research using technology.However,there are challenges and limitations to online systems,which include limited internet access,intermittent internet connection,data security concerns,and the potential for fraudulent users.These challenges should be considered prior to using online systems for research. 展开更多
关键词 online recruitment Adolescents Sexual and reproductive health Mobile data Methodology paper Data security
下载PDF
Legitimation of Business Model Innovation from the Perspective of Evaluator Categorization:A Case Study of the Emergence of Online Car-Hailing
8
作者 TANG Fangcheng JIN Xiaoman GU Shiling 《Frontiers of Business Research in China》 2024年第2期153-194,共42页
Business model innovation faces multiple tests of legitimacy.Most extant research in this area has been conducted from institutional and strategic perspectives while paying insufficient attention to the perspective of... Business model innovation faces multiple tests of legitimacy.Most extant research in this area has been conducted from institutional and strategic perspectives while paying insufficient attention to the perspective of evaluators.Based on the institutionalization of China's online car-hailing industry from 2012 to 2018,this paper analyzes the legitimacy judgment of the stakeholders from the perspective of evaluator categorization and explores the legitimation mechanism of business model innovation.It finds that evaluators judge the legitimacy of business models based on category cognition.Therefore,to achieve the bridging,spillover,and accumulation effects of legitimacy,the legitimation strategy of online car-hailing platforms should dynamically adapt to different evaluators,judgment models,and categorization standards.Ultimately,as quantitative changes lead to qualitative changes,the legitimation of innovative business models is achieved in this way.In this process,stakeholders categorize and evaluate online car-hailing based on prototypes and value goals,and establish a two-way interactive mechanism,which is from behavior guided by cognition to cognition given feedback by behavior.This paper combines the legitimacy judgment with category theory to explain how individual cognition drives the emergence of new categories and identifies a series of legitimacy strategies based on categorization,thus providing theoretical support and practical inspiration for exploring the legitimation of business model innovation. 展开更多
关键词 business model LEGITIMACY evaluator categorization online car-hailing
原文传递
Applications of online monitoring technology for tailings dam on digital mine 被引量:5
9
作者 YU Guang-ming1, SONG Chuan-wang1, ZOU Jing-bo1, WU Yan-xia1, PAN Yong-zhan1, LI Liang1, LI Ran1, WANG Pei-shou2, WANG Yan-lei2 1. School of Civil Engineering, Qingdao Technological University, Qingdao 266033, China 2. Hedong Goldmine, Zhaojin Mining Industry Company, Zhaoyuan 265400, China 《中国有色金属学会会刊:英文版》 CSCD 2011年第S3期604-609,共6页
Considering its structural features, geometric shapes, service mode, environmental media, mechanical behavior, etc, the special nature and complexity of tailings dam were summarized. The technical approach to safety m... Considering its structural features, geometric shapes, service mode, environmental media, mechanical behavior, etc, the special nature and complexity of tailings dam were summarized. The technical approach to safety management for tailings dam was proposed, which is the on-line automated monitoring and early warning information. The results show that a strong theoretical basis can be provided for security monitoring and security management of tailings dam. Online automated monitoring system for tailings dam has full implementation of the information. It is applied widely in Lingnan gold mine, Xiadian gold mine and Hedong gold mine in Zhaoyuan, Shandong Province, and achieves good effect. 展开更多
关键词 digital MINE TAILINGS DAM online MONITORING security MONITORING DIGITIZATION
下载PDF
Online Stability Assessment in Control Room Environment
10
作者 R. Krebs C. Heyde X.-P. Liang 《Journal of Power and Energy Engineering》 2014年第4期368-373,共6页
Power transmission systems are being operated closer to their stability limits compared to twenty years ago. As a result, an increasing risk of blackouts combined with extremely high costs economically and socially is... Power transmission systems are being operated closer to their stability limits compared to twenty years ago. As a result, an increasing risk of blackouts combined with extremely high costs economically and socially is observed. To reduce this risk the personnel in the control rooms of the transmission system operators have to be assisted by a system, which assesses the dynamic state of security online. The system presented in this paper is designed to investigate the security with regards to voltage stability, transient stability and small signal oscillatory stability. New technologies of visualizing the degree of stability to non dynamic stability experts are used as well as integration in existing SCADA/EMS systems are realized. The performance of the system is sufficiently high to be employed in the online environment of the control room. 展开更多
关键词 DSA Dynamic STABILITY Situational AWARENESS STABILITY Monitoring online STABILITY secure Operation LIMIT SOL
下载PDF
A Way to Set up Security Layer over Internet
11
作者 Xiangyi Hu Guifen Zhao Guanning Xu 《Journal of Computer and Communications》 2015年第5期174-181,共8页
A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at network client or mobile phone, and establish key exchange prot... A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at network client or mobile phone, and establish key exchange protocol in the chip of encryption cards at network key management center. A combined key real-time generation algorithm is used to solve the update and management problems. Online or offline authentication and documents encryption transmission protocols are adopted to achieve credible connection between users. Accordingly, set up security layer over Internet, which provides convenient encryption ability to each network user, and build credible and secure network system. 展开更多
关键词 security Layer VERTICAL AUTHENTICATION Combined SECRET Key Credible Network online AUTHENTICATION OFFLINE AUTHENTICATION
下载PDF
The Online Assessment of Electric Distribution Network Load Capability
12
作者 Haoming Liu Zhenkun Li +1 位作者 Kun Yu Xingying Chen 《Journal of Electromagnetic Analysis and Applications》 2009年第1期42-47,共6页
To improve the security and reliability of a distribution network, several issues, such as influences of operation con-strains, real-time load margin calculation, and online security level evaluation, are with great s... To improve the security and reliability of a distribution network, several issues, such as influences of operation con-strains, real-time load margin calculation, and online security level evaluation, are with great significance. In this pa-per, a mathematical model for load capability online assessment of a distribution network is established, and a repeti-tive power flow calculation algorithm is proposed to solve the problem as well. With assessment on three levels: the entire distribution network, a sub-area of the network and a load bus, the security level of current operation mode and load transfer capability during outage are thus obtained. The results can provide guidelines for prevention control, as well as restoration control. Simulation results show that the method is simple, fast and can be applied to distribution networks belonged to any voltage level while taking into account all of the operation constraints. 展开更多
关键词 Distribution Network online security Assessment LOADING CAPABILITY VARIABLE STEP-SIZE REPETITIVE Power Flow Load TRANSFER
下载PDF
Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations
13
作者 Fabrice Djatsa 《Journal of Information Security》 2020年第1期19-45,共27页
As the economy increases its dependence on the internet to increase efficiency and productivity in all aspects of society, close attention has been directed to solve the challenges related to internet security. Despit... As the economy increases its dependence on the internet to increase efficiency and productivity in all aspects of society, close attention has been directed to solve the challenges related to internet security. Despite the large amount of resource invested so far in this area, cybersecurity challenges are still great as the media frequently report new cyber breaches. Although researchers acknowledge that great progress has been made in protecting digital assets, cybercriminals are still successful in their operations which are no longer limited to government entities and corporations but also individual computer users. To improve users’ security posture, the researcher examined the relationship between Millennials’ perceptions of cybersecurity threat, users’ online security behaviors and avoidance motivation. The study focused on three constructs which are Perceived Threat (PTH), Online Security Behaviors (OSB) and Avoidance Motivation (AMO). The researcher administered a survey to 109 participants randomly selected in the United States. The Spearman’s correlation test performed supported the analysis of the strength of the relationship and the level of significance between the independent variable and the dependent variables. The results from the statistical test provided enough evidence to fail to reject the null hypothesis related to relationships between PTH and OSB and to reject the null hypothesis regarding the relationship between PTH and AMO. 展开更多
关键词 Millennial PERCEPTIONS THREAT AVOIDANCE MOTIVATION online security BEHAVIORS
下载PDF
Exploration and Practice of Online Teaching Mode for“Three Preparations Before Class,Five Channels in Class and Five Tracking after Class”
14
作者 Miao Zhang Hua Zhang +2 位作者 Dianhui Chu Xiaojun Tong Kaikun Dong 《计算机教育》 2021年第12期147-156,共10页
Aiming at the characteristics of huge knowledge points,strong practicality and diversity of software security course,adhering to the“Π”scheme for emerging engineering education,based on Tencent classroom,Tencent co... Aiming at the characteristics of huge knowledge points,strong practicality and diversity of software security course,adhering to the“Π”scheme for emerging engineering education,based on Tencent classroom,Tencent conference and Lan ink cloud class,and guided by BOPPPS teaching model and deep learning theory,“three preparations before class,five channels in class and five tracking after class”is proposed.Three preparations before class and five tracking after class serve the five channels in class.Five channels in class take live teaching as the core,and teach students knowledge through five channels.Practice has proved that this mode can effectively solve the problem of teaching a large number of knowledge in limited class hours,improve students’practical ability and enhance the effect of classroom teaching. 展开更多
关键词 online teaching BOPPPS teaching model deep learning flipped classroom software security
下载PDF
A Review of Gaps between Usability and Security/Privacy
15
作者 Majed Alshamari 《International Journal of Communications, Network and System Sciences》 2016年第10期413-429,共17页
Different domains of computing systems require higher level of focus towards specific quality factors like privacy, integrity, flexibility, usability etc. Moreover, certain quality factors help in each other’s existe... Different domains of computing systems require higher level of focus towards specific quality factors like privacy, integrity, flexibility, usability etc. Moreover, certain quality factors help in each other’s existence while others oppose each other significantly. Usability of software applications is one factor that reduces security and privacy up to a substantial level. This paper examines the differences between usability factors and aspects related to security and privacy. A clear understanding of gaps between these two opposing factors has been presented in this paper. In addition, an account of efforts carried out to bridge these gaps has also been presented. We have divided these efforts into the categories of guidelines, frameworks and use of technology. The fields of e-banking and social networks have been considered specifically for identification of gaps in these particular fields. 展开更多
关键词 USABILITY Software Quality Factors security PRIVACY online Social Networks (OSN)
下载PDF
Fuzzy VIKOR Approach to Evaluate the Information Security Policies and Analyze the Content of Press Agencies in Gulf Countries
16
作者 Amir Mohamed Talib 《Journal of Information Security》 2020年第4期189-200,共12页
A news agency is an organization that gathers news reports and sells them to subscribing news organization, such as newspapers, magazines, radio and television broadcasters. A news agency may also be referred to as a ... A news agency is an organization that gathers news reports and sells them to subscribing news organization, such as newspapers, magazines, radio and television broadcasters. A news agency may also be referred to as a wire service, newswire, or news service. The main purpose of this paper is to evaluate the security policies and analyze the content of five press agencies in gulf countries which are (Kuwait News Agency (KUNA), Emirates News Agency (WAM), Saudi Press Agency (SPA), Bahrain News Agency (BNA), and Oman News Agency (OMA)) by using a fuzzy VIKOR approach where linguistic variables are applied to solve the uncertainties and subjectivities in expert decision making. Fuzzy VIKOR approach is one of the best Multi-Criteria Decision Making (MCDM) techniques working in fuzzy environment. This study benefits security and content analysis experts know which press agency has the mandate and the competence to educate the public on news agencies. Besides, this paper contributes to Gulf agencies in helping them in their resolve to ensure the quality of content information and information security policies over the internet. 展开更多
关键词 Content Analysis Fuzzy VIKOR Approach Gulf Countries Information security Policy Press Agencies Multi-Criteria Decision Making (MCDM) online Information Quality
下载PDF
Enhancing Online Privacy Protection for Wireless Networks
17
作者 王静 徐峰 《海外英语》 2010年第12X期278-279,共2页
The increasing popularity of wireless networks makes the protection of online privacy be a common concern of users and internet service providers.Because of the difference of wireless networks and wired networks,it is... The increasing popularity of wireless networks makes the protection of online privacy be a common concern of users and internet service providers.Because of the difference of wireless networks and wired networks,it is proved to be easier for hackers to steal information related to users' privacy in wireless networks than that of wired networks.The issue that whether online privacy protection is necessary or reasonable has given rise to much controversy.In this paper,the discussion of this issue includes what online protection of privacy is,current problems of online privacy protection in wireless networks,exploration of solutions and problems that may caused by the protection.No matter what extent the protection will be,it is proved to be essential for experts,users and IT staff to enhance the protection in wireless networks via new technologies,policy and law.It is also a way for improving the security of information management and business communication in wireless networks. 展开更多
关键词 online PRIVACY wireless network security management BUSINESS communication VIRUS ATTACKS
下载PDF
Development of Online Based Smart House Renting Web Application
18
作者 Dipta Voumick Prince Deb +1 位作者 Sourav Sutradhar Mohammad Monirujjaman Khan 《Journal of Software Engineering and Applications》 2021年第7期312-328,共17页
The house rental issue is one of the elemental parts of society. Nowadays, it is extremely difficult to find suitable accommodation in city areas if people search for it physically. On the other hand, the land owner a... The house rental issue is one of the elemental parts of society. Nowadays, it is extremely difficult to find suitable accommodation in city areas if people search for it physically. On the other hand, the land owner also needs to rent the house. It can be difficult to find tenants just to hang a lease sign on a building, and as a result, they lose money. An online common platform can play a vital role in this case. The purpose of the study is to develop a common web-based online platform for both tenants and house owners so that both tenants and landowners will mutually benefit from the system. This paper presents the development of web applications for the people of Bangladesh where both house owners and tenants can register and tenants can have houses for rent via sophisticated contact with the house owner. In this paper, a common online-based smart house rental web application has been developed both for tenants and for house owners. This web application is very user-friendly, efficient and it has got many unique features that are not offered by other currently available house rental websites here in Bangladesh. Tenants can register using their phone number, store information about their identity, search for available houses, send messages to house owners, and choose a suitable house using developed web applications. House owners can also register for the system, which will manually verify and authenticate the knowledge provided by the house owner can view a tenant’s information history whenever a tenant makes contact through text and supply house-related information accordingly. The proposed online smart house system has been tested and validated. It works very efficiently with many features. The application provided faster and improved opportunities to get houses, as well as ensuring the availability of houses for rent in the greatest number of areas. The system will help to spread trustworthy services nationwide and supply users with the chance to speak and improve the house rent in Bangladesh. Because it has many smart features, this developed online smart house rental web application will make it very easy for tenants to find a house to rent. House owners, on the other hand, can easily rent out their properties. 展开更多
关键词 Web Application online Platform House Renting SMART security Advertise Network Remote Interaction
下载PDF
干部考核标准化线上评议系统的研究和应用
19
作者 李亮亮 刘欣 +1 位作者 李雪涛 武艳伟 《中国标准化》 2024年第4期128-131,共4页
本研究旨在探讨计算机和网络技术在政务部门的标准化应用情景研究,通过设计、研发、应用干部考核标准化线上评议系统,并在疫情特殊环境下得到应用,实现既符合疫情人群不聚集的要求,又加快推进线上考核评议工作标准化的进程,本文对其研... 本研究旨在探讨计算机和网络技术在政务部门的标准化应用情景研究,通过设计、研发、应用干部考核标准化线上评议系统,并在疫情特殊环境下得到应用,实现既符合疫情人群不聚集的要求,又加快推进线上考核评议工作标准化的进程,本文对其研究与应用进行了讨论和分析。这些结果对于深入理解政务业务标准化具有重要意义。 展开更多
关键词 水利行业 考核标准化 线上评议 安全认证 疫情防控
下载PDF
电子商务安全在线课课程思政的设计与应用
20
作者 段亚楠 《昆明冶金高等专科学校学报》 CAS 2024年第1期63-69,共7页
电子商务安全在线课“课程思政”设计与应用旨在强调高职院校开展电子商务安全课程思政示范课的重要性和实施方式。该课程通过引入思政教育元素,对学生进行思想教育,引导他们树立正确的价值观念和道德观念,培养社会责任感和法律意识,激... 电子商务安全在线课“课程思政”设计与应用旨在强调高职院校开展电子商务安全课程思政示范课的重要性和实施方式。该课程通过引入思政教育元素,对学生进行思想教育,引导他们树立正确的价值观念和道德观念,培养社会责任感和法律意识,激发创新创业热情,提高职业素养。探讨了电子商务安全课程思政的总体设计,并提出了在线课程组织实施、课程思政的组织实施和挖掘思政元素等具体措施。最后,总结了电子商务安全课程思政的实施成效。 展开更多
关键词 电子商务安全课程 在线课程 课程思政 思想政治教育
下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部