导航:首页 > 电商促销 > 电子商务外文文献综述

电子商务外文文献综述

发布时间:2021-07-30 20:23:44

1. 2018电子商务文献综述选题

2017-2018年电子商务专业毕业论文题目参考对中国电子商务商业模式模仿性创新发展的研究
网络团购的商业与盈利模式研究
我国中小型企业人力资源管理信息化的研究
我国移动电子商务商业模式研究
企业电子商务协同演化及其策略研究
我国电子商务下的消费者权益保护
美国电子商务对我国的启示
外贸B2C平台的发展问题研究
网上消费者行为方式研究
家电B2C商业模式研究
用平衡计分法进行企业绩效评价-以阿里巴巴为例
web2.0与大学生网络创业研究
我国家电专业连锁企业体验营销研究
Facebook的商业模式和价值研究
中小企业人力资源管理信息化实施中的对策
电子商务系统对企业竞争力的提升机制分析:基于信息与知识的视角
中小企业电子商务网站建设探讨与分析
网络交易实名对电子商务发展的影响及实行对策
国内微博广告研究
电子商务企业盈利模式分析
从网络售假肆虐探究C2C电子商务网站的信用管理
基于案例分析的email营销研究
实名制对电子商务发展的作用和影响——基于南海青年网络社区Young地带的分析
"C2C电子商务背景下物流配送的研究
"
Web2.0时代的电子商务发展现状和发展趋势
浅析国内电子商务盈利模式
我国网上书店的发展现状与发展策略分析
珠三角基于电子商务的物流行为分析及策略研究
垂直搜索引擎的比较研究
博客策略在SEO中的应用研究
电子商务下的旅行社业务流程再造研究
我国移动电子商务商业模式和盈利模式的研究
企业组织智力的构成及其测度研究
婚恋交友网站的盈利模式及发展探究
中国银行业客户关系管理应用研究
论微博营销的商业价值
互联网广告盈利模式研究
广州联通客户关系管理策略分析
网店实名制的利弊及对策意见
网上拍卖信誉管理
B2C电子商务环境下物流配送模式研究
我国C2C模式下的电子商务监管研究
浅析我国传统制造业电子商务“瓶颈”问题
电子商务企业的适应性分析
浅谈网上拍卖网站的发展趋势
移动互联网的广告模式
网络实名制的商业机遇与挑战
有关电子商务创业方法的研究
传统企业电子商务转型的演变路径研究
搜索引擎优化在网络营销中的应用
影响我国中小型服装企业实施电子商务因素的研究
论网络广告的娱乐性
客户体验在电子商务中的应用
电子商务中的信用问题研究
互联网广告与网络营销的关系研究
中小企业实施电子商务的优势和战略
团购网站信用体系的研究
中小企业电子商务盈利模式探究
我国网络团购商业模式研究及发展趋势
B2C电子商务网站竞争力评价研究
校园电子商务的问题研究
微博团购营销——团购与微博结合下的微利润最大化
基于电子商务的珠三角民营企业转型对策研究
我国农产品经济的电子商务模式研究
浅析客户体验管理
网络事件营销研究
网上拍卖信誉管理的研究
网络游戏的兴起与现状
论移动电子商务与企业的发展
微博营销模式研究
网络著作权的保护研究
数字鸿沟——电子商务环境下国际贸易引起的马太效应
风险投资与我国互联网企业发展的关系效应分析
浅析基于社交媒体的关系链营销
我国网络著作权侵权及保护
我国物联网行业发展现状及趋势研究
互联网广告研究
淘宝B2C与凡客诚品B2C运营方式比较研究
浅析网络著作权问题
网络交易权益保障
苹果手机市场销售分析
云计算在电子商务中的应用研究

2. 电子商务参考文献

1 对话下半场:建立健全电子商务领域金融秩序 电子商务 2007/01
2 携程电子商务模式组成要素分析 电子商务 2007/01
3 电子商务经营模式给企业带来了什么 电子商务 2007/01
4 服务中小企业的第三方电子商务模式研究 电子商务 2007/01
5 电子商务中《消费者权益保护法》适格主体研究 电子商务 2007/01
6 谈新就业形势下的职业院校电子商务专业建设 电子商务 2007/01
7 浅谈物资采购的电子商务化 电子科技 2007/01
8 中国电信新一代B2B电子商务网站商集网上线运营 互联网周刊 2007/02
9 Web数据挖掘在零售业电子商务中的应用 经济师 2007/01
10 电子商务环境下的税收 经济师 2007/01
11 试论电子商务物流隐性成本控制 经济师 2007/01
12 破除制约我国电子商务发展的四大瓶颈 通信世界 2007/02
13 电子商务代表网站及业务模式分析 通信世界 2007/02
14 组建基于企业服务总线的电子商务集成系统研究 计算机应用与软件 2007/01
15 基于SOAP的即时消息在B2C电子商务系统中的应用 计算机应用与软件 2007/01
16 电子商务对会计的影响及电子商务会计的发展 会计之友(中) 2007/01
17 电子商务中数据挖掘技术的使用 内蒙古电大学刊 2007/02
18 电子商务专业毕业生就业率低的原因及其对策 内蒙古电大学刊 2007/02
19 浅谈烟草行业电子商务 华北、东北地区2007年度烟草学术交流研讨会论文集 2007
20 B2C电子商务模式下物流配送路径优化问题研究 北京交通大学 2007
21 电子商务环境下传统企业流程变革研究 同济大学 2007
22 浅析电子商务诚信体系的构建与实现 商场现代化 2007/01
23 基于电子商务的供应链管理研究 商场现代化 2007/01
24 电子商务体系结构与电子支付技术 商场现代化 2007/01
25 论新农村建设中农业电子商务的发展战略 商场现代化 2007/01
26 旅游电子商务网站的构建 商场现代化 2007/01
27 分销商网络团购营销的电子商务模型研究 商场现代化 2007/01
28 电子商务及其安全技术 商场现代化 2007/01
29 浅析电子商务的安全 商场现代化 2007/01
30 Web 2.0技术在电子商务中的应用 商场现代化 2007/01

3. 求两篇关于电子商务英文参考文献

http://59.42.244.59/Readers/Index.aspx
http://www.nstl.gov.cn/index.html

4. 求一篇电子商务的文献综述

可以在(电子商务评论)刊物上找这类文献吧

5. 电子商务物流国内外文献综述

自己去小米学术检索下载就行啊,在这里问不出来结果的

6. 关于电子商务安全的英文参考文献

电子商务安全技术的分析与研究
2007-10-12 With the network technology and the rapid development of information technology, e-commerce has been growing a wide range of applications, more and more businesses and indivials rely on e-commerce users quick and efficient. It appears not only to the development and expansion of Internet has provided a new opportunity, but also to the business community into a great power. But e-commerce is based on vector-based computer network and a large number of important status information, accounting information, transaction information needed to carry out in-line transmission, in such circumstances, security issues become a priority issue.

Second, the current e-commerce security issues
1. Network protocol security issue: At present, TCP / IP protocol is the most widely used network protocol, but TCP / IP itself, characterized by openness, enterprise and users of electronic transactions in the course of the data is the form of packet transmission, malicious attackers can easily launch an e-commerce site to a packet interception, or even modify the data packets and counterfeiting.
2. Users of information security issues: At present, the most important form of e-commerce is based on B / S (Browser / Server) structure of the e-commerce sites, users log on using the browser network transactions, as a result of the user in the registry may be used in public computer, such as Internet cafes, offices, computers, etc., then if they have a malicious Trojan horse computer program or virus, the user's login information such as user names, passwords may be the risk of loss.
3. E-commerce Web site security issue: that there are some companies established themselves in the design of e-commerce site will have a number of proction security, server operating system itself, there will be loopholes, unscrupulous attackers to enter the e-commerce site if a large number of user information and transaction information will be stolen, enterprises and users to incalculable losses.

C, e-commerce security requirements
1. The effectiveness of service requirements: e-commerce system should be able to prevent the occurrence of service failures to prevent failure e to network attacks and viruses and other system factors such as suspension of services to ensure that transaction data can be transmitted quickly and accurately.
2. Trading requirements of the confidentiality of information: e-commerce systems to deal with the information sent by users of encryption to effectively prevent the interception of information to decipher, at the same time to prevent unauthorized access to information.
3. Data integrity requirements: the number refers to the integrity of data processing, the original data and existing data is fully consistent between. In order to safeguard the seriousness of business dealings and fair, the transaction documents is not being modified, there will be damage to the commercial interests of the party.
4. The requirements of authentication: e-commerce systems should provide safe and effective authentication mechanism to ensure that transaction information between the two sides are legitimate and effective in order to avoid trade disputes, to provide a legal basis.

D, e-commerce security measures
1. Data encryption technology. Data encryption is the most basic e-commerce information system security precautions. The principle is that information on the use of encryption algorithm will be converted into explicit rules according to a certain encryption ciphertext generated after the transmission, thus ensuring the confidentiality of data. The use of data encryption technology can solve the information requirements of the confidentiality of its own. Data encryption technology can be divided into symmetric key encryption and asymmetric key encryption.
(1) symmetric key encryption (SecretKeyEncryption). Symmetric key encryption also known as secret / Private key encryption, that is, send and receive data between the parties must use the same key for encryption and decryption explicitly computing. Its advantage is encryption, decryption speed, suitable for large amount of data encryption, to ensure data confidentiality and integrity; drawback is that when the large number of users, distribution and management is very difficult to key on.
(2) non-symmetric key encryption (PublicKeyEncryption). Non-symmetric-key encryption also known as public key encryption, it mainly refers to each person only has a pair of corresponding keys: public key (the public key) and private key (the private key) public key public, private saved by the personal secret, a key used to encrypt them, they can only use the other to decrypt the key. Asymmetric key encryption algorithm is the advantage of easy distribution and management, the shortcomings of the algorithm complexity, encryption slow.
(3) the complexity of encryption technology. As a result of these two types of encryption technology, each the length of the relatively common practice is to integrate the two technologies. For example, the use of information to send the information symmetric key encryption, ciphertext generated after the recipient's public key to use symmetric key encryption to generate the number of envelopes, then the number of ciphertext envelope and sent to the receiver at the same time, the receiving party by the opposite clear direction after decryption.
2. Digital signature technology. Digital signature is generated through specific password computing the composition of a series of symbols and codes for a signature key, to replace the written signature or seal, this electronic signature technology can also be carried out to verify, verify the accuracy of its general manual signature and verification seal unmatched. Digital signature technology to ensure the integrity of information transfer and non-repudiation.
3. Accreditation agencies as well as digital certificates. E-commerce transactions e to the general users will not have face to face, so the two sides of the transaction identification is to protect the safety of the premise of e-commerce transactions. Certification body is a public and credible third party to confirm the identity of both parties, the digital certificate is signed by the certification body, including the identity of the owner of public key information as well as the public key of the document. Paid in the transaction process, participants must use the Certification Center of the digital certificate issued to prove his identity.
4. The use of Secure Electronic Transaction protocol (SET: Secure Electronic Transactions). By two major credit cards VISA and MasterCard standards organizations. SET for the division of e-commerce activities and to define the rights and obligations of the parties to the relationship between a given transaction information transmission process standards. SET protocol guarantees the confidentiality of e-commerce systems, integrity, non-repudiation of the legitimacy and identity.

7. 急求电子商务相关参考文献,英文的,只要只要标题和作者

标题、作者、年份

《E-commerce: the role of familiarity and trust》
D Gefen - Omega, 2000

《What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology》
DH McKnight,2001

《 Fuzzy decision support system for risk analysis in e-commerce development》
EWT Ngai, 2005

《 Interactive decision aids for consumer decision making in e-commerce: the influence of perceived strategy restrictiveness》
W Wang, 2009

阅读全文

与电子商务外文文献综述相关的资料

热点内容
四月份踏青策划方案 浏览:811
项目成本策划方案 浏览:552
杭州熟买电子商务有限公司 浏览:702
培训机构集体活动策划方案 浏览:542
工会开展职工素质培训方案 浏览:612
评比优秀培训师活动方案 浏览:543
腊八节亲子活动策划方案 浏览:38
我国电子商务外贸现状 浏览:999
酒店怎么做推广方案 浏览:192
运动会筹备策划方案 浏览:148
仪器电子商务网站 浏览:133
药品促销活动方案模板 浏览:517
公司春游岳阳活动策划方案 浏览:242
希尔斯公司提供的培训方案 浏览:275
大型亲子活动策划方案 浏览:166
促销活动的营销策划方案实例 浏览:844
党员干部可以从事电子商务吗 浏览:514
网络汽车营销策划方案 浏览:518
微博宣传推广方案 浏览:14
以纯公司会展策划方案 浏览:64