❶ 關於電子商務安全的英文參考文獻
電子商務安全技術的分析與研究
2007-10-12 With the network technology and the rapid development of information technology, e-commerce has been growing a wide range of applications, more and more businesses and indivials rely on e-commerce users quick and efficient. It appears not only to the development and expansion of Internet has provided a new opportunity, but also to the business community into a great power. But e-commerce is based on vector-based computer network and a large number of important status information, accounting information, transaction information needed to carry out in-line transmission, in such circumstances, security issues become a priority issue.
Second, the current e-commerce security issues
1. Network protocol security issue: At present, TCP / IP protocol is the most widely used network protocol, but TCP / IP itself, characterized by openness, enterprise and users of electronic transactions in the course of the data is the form of packet transmission, malicious attackers can easily launch an e-commerce site to a packet interception, or even modify the data packets and counterfeiting.
2. Users of information security issues: At present, the most important form of e-commerce is based on B / S (Browser / Server) structure of the e-commerce sites, users log on using the browser network transactions, as a result of the user in the registry may be used in public computer, such as Internet cafes, offices, computers, etc., then if they have a malicious Trojan horse computer program or virus, the user's login information such as user names, passwords may be the risk of loss.
3. E-commerce Web site security issue: that there are some companies established themselves in the design of e-commerce site will have a number of proction security, server operating system itself, there will be loopholes, unscrupulous attackers to enter the e-commerce site if a large number of user information and transaction information will be stolen, enterprises and users to incalculable losses.
C, e-commerce security requirements
1. The effectiveness of service requirements: e-commerce system should be able to prevent the occurrence of service failures to prevent failure e to network attacks and viruses and other system factors such as suspension of services to ensure that transaction data can be transmitted quickly and accurately.
2. Trading requirements of the confidentiality of information: e-commerce systems to deal with the information sent by users of encryption to effectively prevent the interception of information to decipher, at the same time to prevent unauthorized access to information.
3. Data integrity requirements: the number refers to the integrity of data processing, the original data and existing data is fully consistent between. In order to safeguard the seriousness of business dealings and fair, the transaction documents is not being modified, there will be damage to the commercial interests of the party.
4. The requirements of authentication: e-commerce systems should provide safe and effective authentication mechanism to ensure that transaction information between the two sides are legitimate and effective in order to avoid trade disputes, to provide a legal basis.
D, e-commerce security measures
1. Data encryption technology. Data encryption is the most basic e-commerce information system security precautions. The principle is that information on the use of encryption algorithm will be converted into explicit rules according to a certain encryption ciphertext generated after the transmission, thus ensuring the confidentiality of data. The use of data encryption technology can solve the information requirements of the confidentiality of its own. Data encryption technology can be divided into symmetric key encryption and asymmetric key encryption.
(1) symmetric key encryption (SecretKeyEncryption). Symmetric key encryption also known as secret / Private key encryption, that is, send and receive data between the parties must use the same key for encryption and decryption explicitly computing. Its advantage is encryption, decryption speed, suitable for large amount of data encryption, to ensure data confidentiality and integrity; drawback is that when the large number of users, distribution and management is very difficult to key on.
(2) non-symmetric key encryption (PublicKeyEncryption). Non-symmetric-key encryption also known as public key encryption, it mainly refers to each person only has a pair of corresponding keys: public key (the public key) and private key (the private key) public key public, private saved by the personal secret, a key used to encrypt them, they can only use the other to decrypt the key. Asymmetric key encryption algorithm is the advantage of easy distribution and management, the shortcomings of the algorithm complexity, encryption slow.
(3) the complexity of encryption technology. As a result of these two types of encryption technology, each the length of the relatively common practice is to integrate the two technologies. For example, the use of information to send the information symmetric key encryption, ciphertext generated after the recipient's public key to use symmetric key encryption to generate the number of envelopes, then the number of ciphertext envelope and sent to the receiver at the same time, the receiving party by the opposite clear direction after decryption.
2. Digital signature technology. Digital signature is generated through specific password computing the composition of a series of symbols and codes for a signature key, to replace the written signature or seal, this electronic signature technology can also be carried out to verify, verify the accuracy of its general manual signature and verification seal unmatched. Digital signature technology to ensure the integrity of information transfer and non-repudiation.
3. Accreditation agencies as well as digital certificates. E-commerce transactions e to the general users will not have face to face, so the two sides of the transaction identification is to protect the safety of the premise of e-commerce transactions. Certification body is a public and credible third party to confirm the identity of both parties, the digital certificate is signed by the certification body, including the identity of the owner of public key information as well as the public key of the document. Paid in the transaction process, participants must use the Certification Center of the digital certificate issued to prove his identity.
4. The use of Secure Electronic Transaction protocol (SET: Secure Electronic Transactions). By two major credit cards VISA and MasterCard standards organizations. SET for the division of e-commerce activities and to define the rights and obligations of the parties to the relationship between a given transaction information transmission process standards. SET protocol guarantees the confidentiality of e-commerce systems, integrity, non-repudiation of the legitimacy and identity.
❷ 急求一份與網路營銷或者電子商務有關的外文文獻及翻譯,要求文獻有版權信息就行!!急急急~~在線等~~
[1]Bih-Yaw Shih,Chen-Yuan Chen,Zih-Siang Chen et al.An Empirical Study of an Internet Marketing Strategy for Search Engine Optimization[J].Human Factors and Ergonomics in Manufacturing & Service Instries,2013,23(6):528-540.
❸ 求一篇關於電子商務的英文文獻及翻譯,急~!!!!
An additional question is how a marketer could design websites that truly personalize proct recommendations and how consumers react to these versus more neutral, 「third party」 web sites such as www.kbb.com for automobiles.
we address the issue of the structure of one new tool (i.e., e-mail) that can help marketers be more efficient in testing direct marketing efforts.
direct marketing
Furthermore, work by Haubl and Trifts (2000) showed that a comparison matrix similar to the comparator proced higher quality consideration sets and decisions.
the possibility remains that providing information could postpone or even prevent purchase.
Agents are not new; a crude (by today』s standards) agent, Firefly, was developed in the mid-1990s for movie and music recommendations.
the amount of information available on the Web has increased dramatically as has the technological sophistication of the agents which makes continued research in this area important.
In particular, Haubl and Trifts (2000) show that recommender agents based on self-explicatedinformation about a consumer』s utility function (i.e., attribute weights and minimum acceptable attribute levels) rece search effort and improve decisions.
Agents should be adaptive, autonomous, and believable, be able to respond in a timely fashion, and be goal-oriented.
It has also been established that agents, like those studied by H¨aubl and his colleagues, that learn about consumers from choices and consumer preferences perform better in the long run than (say) collaborative filters (Ariely et al., 2004). This suggests that methods that calibrate consumer preferences in real time on-line are crucial to advancement.
polyhedral conjoint analysis (Toubia et al., 2003) satisfies these criteria. Liechty and his colleagues developed a Hierarchical Bayes procere that does so as well.
Montgomery et al. (2004) address the problem of designing a better shopbot.
They show that shopbots are inferior to visiting a favorite retailer if the shopbot visits all retailers.
Indeed, armed with some inferences from previous visits, a small set of initial screener questions can lead to an optimally personalized web interface for the consumer.
Based on a stochastic ration model and Bayesian updating , the authors adapt the testing parameters (e.g., number of e-mails sent for each e-mail design and sending rate) while the testing is in progress so as to minimize the cost of testing both in terms of wasted e-mails and time.
Only if the interactivity pays off.
In bargaining or auction situations, possible lack of trust and the inability to interpret the signalsof the other participant(s).
翻譯
另外一個問題是,一個營銷人員如果設計網頁,嫩構真實的又有個性的推薦我們的產品,並且可以讓顧客對產品的反應不是保持中立,「第三世界」的網頁,就像www.kbb.com
我們對於新工具像email這種方式的看法是,它可以幫助營銷人員更有效率的直接測試營銷效果。
直接營銷
更多的是,通過Haubl和Trifts(2000)的工作可知,類似的矩陣和計算機化相比較,生產出更高質量的產品和高質量的決策
可能性保持在提高那些可能推遲或者現在就購買的信息信息。
代理商,一個新的職業,簡單的代理(現在的標准)。螢火蟲(?),在20世紀90年代中期在電影和音樂推薦上有很大的發展。
由於代理商的科技的混合應用,使網頁上可提供的信息量,有著驚人的增長,這使這個行業繼續調長下去變得更為重要。
特別使,Haubl和Trifts(2000)的工作可知,推薦者代理基於對顧客自我闡述商品的信息(比如,重量和最小可接受的級別),減少調查的精力,提高決定能力。
代理商要有很好的適應能力,自主並且有自信,能夠在第一時間回應狀況,並且有目標。
同時,通過Haubl和其他同事的研究,代理商的形成,與合作過濾相比較,在長期運行中更好的學習了關於顧客的決定和執行偏好。這就給我們在關於顧客網上購物時的偏好提供了標准化。
只翻譯了一半,翻不下去了,你參考一下吧,有的句子可能比較奇怪就是了
❹ 國外有關電子商務環境下企業安全管理的英文文獻資料2000字 麻煩註明出處,最好帶有譯文
外文文獻有,翻譯沒有,翻譯得靠你自己了,如果需要回復郵箱地址即可,希望能滿足你的需要,能幫到你,多多給點懸賞分吧,急用的話請多選賞點分吧,這樣更多的知友才會及時幫到你,我找到也是很花時間的
❺ 電子商務安全技術研究如何翻譯成英文
電子商務安全技術研究如何翻譯成英文
How translate the safe technical research of e-commerce into English
電子商務安全技術研究
Safe technical research of e-commerce
❻ 求電子商務下個人隱私保護外文文獻及翻譯
怎麼提供給你,至少留個郵箱地址吧,急用的話多加點分懸賞,這樣才有更多的知友及時幫助你,找文獻也是很費時間和精力的啊