导航:首页 > 电商促销 > 电子商务论文参考文献中英文

电子商务论文参考文献中英文

发布时间:2021-12-02 13:13:27

电子商务对外贸公司的影响英文参考文献

去知网找啊

② 求:英文参考文献 关于电子商务,外贸,英语对外贸影响等相关的英文文献.要英文的哦

YanGuoBin .《discussed shallowly new economy accounting personnel》 quality modern accounting" 2009 (2).
LuoHong ZhuKaiXi ."do not do false account" ecation "with accounting quality accounting friends of 2008(1).

③ 中英文参考文献,有关电子商务方面,最好和edm有关

EDM是神马。。。

④ 电子商务参考文献

1 对话下半场:建立健全电子商务领域金融秩序 电子商务 2007/01
2 携程电子商务模式组成要素分析 电子商务 2007/01
3 电子商务经营模式给企业带来了什么 电子商务 2007/01
4 服务中小企业的第三方电子商务模式研究 电子商务 2007/01
5 电子商务中《消费者权益保护法》适格主体研究 电子商务 2007/01
6 谈新就业形势下的职业院校电子商务专业建设 电子商务 2007/01
7 浅谈物资采购的电子商务化 电子科技 2007/01
8 中国电信新一代B2B电子商务网站商集网上线运营 互联网周刊 2007/02
9 Web数据挖掘在零售业电子商务中的应用 经济师 2007/01
10 电子商务环境下的税收 经济师 2007/01
11 试论电子商务物流隐性成本控制 经济师 2007/01
12 破除制约我国电子商务发展的四大瓶颈 通信世界 2007/02
13 电子商务代表网站及业务模式分析 通信世界 2007/02
14 组建基于企业服务总线的电子商务集成系统研究 计算机应用与软件 2007/01
15 基于SOAP的即时消息在B2C电子商务系统中的应用 计算机应用与软件 2007/01
16 电子商务对会计的影响及电子商务会计的发展 会计之友(中) 2007/01
17 电子商务中数据挖掘技术的使用 内蒙古电大学刊 2007/02
18 电子商务专业毕业生就业率低的原因及其对策 内蒙古电大学刊 2007/02
19 浅谈烟草行业电子商务 华北、东北地区2007年度烟草学术交流研讨会论文集 2007
20 B2C电子商务模式下物流配送路径优化问题研究 北京交通大学 2007
21 电子商务环境下传统企业流程变革研究 同济大学 2007
22 浅析电子商务诚信体系的构建与实现 商场现代化 2007/01
23 基于电子商务的供应链管理研究 商场现代化 2007/01
24 电子商务体系结构与电子支付技术 商场现代化 2007/01
25 论新农村建设中农业电子商务的发展战略 商场现代化 2007/01
26 旅游电子商务网站的构建 商场现代化 2007/01
27 分销商网络团购营销的电子商务模型研究 商场现代化 2007/01
28 电子商务及其安全技术 商场现代化 2007/01
29 浅析电子商务的安全 商场现代化 2007/01
30 Web 2.0技术在电子商务中的应用 商场现代化 2007/01

⑤ 电子商务专业论文之参考文献谢谢了,大神帮忙啊

[1] 莫佳. 数字签名在电子商务中的实现[J]. 福建电脑, 2008,(02) . [2] 张述平,杨国明. 第三方支付竞争策略创新[J]. 电脑知识与技术(学术交流), 2006,(17) . [3] 任莉莉. 基于信息不对称的网上支付风险探讨[J]. 池州学院学报, 2008,(01) . [4] 杨国明. 移动支付商业模式分析[J]. 电脑知识与技术(学术交流), 2006,(20) . [5] 吴凌娇. 网上购物安全问题探讨[J]. 江苏技术师范学院学报, 2006,(04) . [6] 王凤满. 数字图书馆与电子商务服务[J]. 闽江学院学报, 2008,(06) . [7] 赵凤彩,黎超. 航空电子客票的移动支付[J]. 电子商务, 2008,(08) . [8] 徐勇刚,梅耀辉. 浅谈我国电子支付系统的应用现状及发展策略[J]. 当代经理人(中旬刊), 2006,(21) . [9] 宋磊. 电子商务的安全隐患及其防范[J]. 福建行政学院福建经济管理干部学院学报, 2008,(02) . [10] 彭银香,白贞武. 电子商务安全问题及措施研究[J]. 大众科技, 2005,(11) . [1] 林黎明,李新春. 电子商务安全风险管理研究[J]. 计算机与信息技术, 2006,(03) . [2] 宋苑. 影响电子商务发展的网络安全事件分析与对策[J]. 计算机与信息技术, 2006,(Z1) . [3] 付灵丽,朱辉. 基于电子商务的身份认证攻击研究[J]. 电脑应用技术, 2007,(02) . [4] 杨二龙,刘建时. 对电子商务风险的几点思考[J]. 警官文苑, 2007,(01) . [5] 阚晓初. 浅谈电子商务安全策略与技术[J]. 商场现代化, 2007,(01) . [6] 杨晋. 现代电子商务安全技术研究[J]. 网络安全技术与应用, 2007,(01) . [7] 朱虹. 电子商务管理发展研究[J]. 高校图书情报论坛, 2006,(02) . [8] 刘宗梅,李智宇. 电子商务法律环境的构建[J]. 法学与实践, 2007,(01) . [9] 徐效美,林冬梅. 浅析电子商务的安全[J]. 商场现代化, 2007,(01) . [10] 姚树琪. 关于我国电子商务物流发展对策的探讨[J]. 石家庄联合技术职业学院学术研究, 2006,(02) .

⑥ 电子商务专业论文之参考文献

[1] 莫佳. 数字签名在电子商务中的实现[J]. 福建电脑, 2008,(02) .

[2] 张述平,杨国明. 第三方支付竞争策略创新[J]. 电脑知识与技术(学术交流), 2006,(17) .

[3] 任莉莉. 基于信息不对称的网上支付风险探讨[J]. 池州学院学报, 2008,(01) .

[4] 杨国明. 移动支付商业模式分析[J]. 电脑知识与技术(学术交流), 2006,(20) .

[5] 吴凌娇. 网上购物安全问题探讨[J]. 江苏技术师范学院学报, 2006,(04) .

[6] 王凤满. 数字图书馆与电子商务服务[J]. 闽江学院学报, 2008,(06) .

[7] 赵凤彩,黎超. 航空电子客票的移动支付[J]. 电子商务, 2008,(08) .

[8] 徐勇刚,梅耀辉. 浅谈我国电子支付系统的应用现状及发展策略[J]. 当代经理人(中旬刊), 2006,(21) .

[9] 宋磊. 电子商务的安全隐患及其防范[J]. 福建行政学院福建经济管理干部学院学报, 2008,(02) .

[10] 彭银香,白贞武. 电子商务安全问题及措施研究[J]. 大众科技, 2005,(11) .
[1] 林黎明,李新春. 电子商务安全风险管理研究[J]. 计算机与信息技术, 2006,(03) .
[2] 宋苑. 影响电子商务发展的网络安全事件分析与对策[J]. 计算机与信息技术, 2006,(Z1) .
[3] 付灵丽,朱辉. 基于电子商务的身份认证攻击研究[J]. 电脑应用技术, 2007,(02) .
[4] 杨二龙,刘建时. 对电子商务风险的几点思考[J]. 警官文苑, 2007,(01) .
[5] 阚晓初. 浅谈电子商务安全策略与技术[J]. 商场现代化, 2007,(01) .
[6] 杨晋. 现代电子商务安全技术研究[J]. 网络安全技术与应用, 2007,(01) .
[7] 朱虹. 电子商务管理发展研究[J]. 高校图书情报论坛, 2006,(02) .
[8] 刘宗梅,李智宇. 电子商务法律环境的构建[J]. 法学与实践, 2007,(01) .
[9] 徐效美,林冬梅. 浅析电子商务的安全[J]. 商场现代化, 2007,(01) .
[10] 姚树琪. 关于我国电子商务物流发展对策的探讨[J]. 石家庄联合技术职业学院学术研究, 2006,(02) .

⑦ 求电子商务方面的英文文献或论文,翻译成汉字大约3000字。要有明确正规出处

Ecommerce Security Issues
Customer Security: Basic Principles

Most ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements:

privacy: information must be kept from unauthorized parties.

integrity: message must not be altered or tampered with.

authentication: sender and recipient must prove their identities to each other.

non-repudiation: proof is needed that the message was indeed received.

Privacy is handled by encryption. In PKI (public key infrastructure) a message is encrypted by a public key, and decrypted by a private key. The public key is widely distributed, but only the recipient has the private key. For authentication (proving the identity of the sender, since only the sender has the particular key) the encrypted message is encrypted again, but this time with a private key. Such proceres form the basis of RSA (used by banks and governments) and PGP (Pretty Good Privacy, used to encrypt emails).

Unfortunately, PKI is not an efficient way of sending large amounts of information, and is often used only as a first step — to allow two parties to agree upon a key for symmetric secret key encryption. Here sender and recipient use keys that are generated for the particular message by a third body: a key distribution center. The keys are not identical, but each is shared with the key distribution center, which allows the message to be read. Then the symmetric keys are encrypted in the RSA manner, and rules set under various protocols. Naturally, the private keys have to be kept secret, and most security lapses indeed arise here.

:Digital Signatures and Certificates
Digital signatures meet the need for authentication and integrity. To vastly simplify matters (as throughout this page), a plain text message is run through a hash function and so given a value: the message digest. This digest, the hash function and the plain text encrypted with the recipient's public key is sent to the recipient. The recipient decodes the message with their private key, and runs the message through the supplied hash function to that the message digest value remains unchanged (message has not been tampered with). Very often, the message is also timestamped by a third party agency, which provides non-repudiation.

What about authentication? How does a customer know that the website receiving sensitive information is not set up by some other party posing as the e-merchant? They check the digital certificate. This is a digital document issued by the CA (certification authority: Verisign, Thawte, etc.) that uniquely identifies the merchant. Digital certificates are sold for emails, e-merchants and web-servers.

:Secure Socket Layers
Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. Indivial packets are sent by different routes. TCP/IP reassembles them in order and resubmits any packet showing errors. SSL uses PKI and digital certificates to ensure privacy and authentication. The procere is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates.

:PCI, SET, Firewalls and Kerberos
Credit card details can be safely sent with SSL, but once stored on the server they are vulnerable to outsiders hacking into the server and accompanying network. A PCI (peripheral component interconnect: hardware) card is often added for protection, therefore, or another approach altogether is adopted: SET (Secure Electronic Transaction). Developed by Visa and Mastercard, SET uses PKI for privacy, and digital certificates to authenticate the three parties: merchant, customer and bank. More importantly, sensitive information is not seen by the merchant, and is not kept on the merchant's server.

Firewalls (software or hardware) protect a server, a network and an indivial PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees.

Transactions
Sensitive information has to be protected through at least three transactions:

credit card details supplied by the customer, either to the merchant or payment gateway. Handled by the server's SSL and the merchant/server's digital certificates.

credit card details passed to the bank for processing. Handled by the complex security measures of the payment gateway.

order and customer details supplied to the merchant, either directly or from the payment gateway/credit card processing company. Handled by SSL, server security, digital certificates (and payment gateway sometimes).

Practical Consequences
1. The merchant is always responsible for security of the Internet-connected PC where customer details are handled. Virus protection and a firewall are the minimum requirement. To be absolutely safe, store sensitive information and customer details on zip-disks, a physically separate PC or with a commercial file storage service. Always keep multiple back-ups of essential information, and ensure they are stored safely off-site.

2. Where customers order by email, information should be encrypted with PGP or similar software. Or payment should be made by specially encrypted checks and ordering software.

3. Where credit cards are taken online and processed later, it's the merchant's responsibility to check the security of the hosting company's webserver. Use a reputable company and demand detailed replies to your queries.

4. Where credit cards are taken online and processed in real time, four situations arise:

You use a service bureau. Sensitive information is handled entirely by the service bureau, which is responsible for its security. Other customer and order details are your responsibility as in 3. above.

You possess an ecommerce merchant account but use the digital certificate supplied by the hosting company. A cheap option acceptable for smallish transactions with SMEs. Check out the hosting company, and the terms and conditions applying to the digital certificate.

You possess an ecommerce merchant account and obtain your own digital certificate (costing some hundreds of dollars). Check out the hosting company, and enter into a dialogue with the certification authority: they will certainly probe your credentials.

You possess a merchant account, and run the business from your own server. You need trained IT staff to maintain all aspects of security — firewalls, Kerberos, SSL, and a digital certificate for the server (costing thousands or tens of thousands of dollars).

Security is a vexing, costly and complicated business, but a single lapse can be expensive in lost funds, records and reputation. Don't wait for disaster to strike, but stay proactive, employing a security expert where necessary.

Sites on our resources page supplies details.

阅读全文

与电子商务论文参考文献中英文相关的资料

热点内容
社区老人垃圾分类活动策划方案 浏览:826
商场圣诞活动策划方案ppt 浏览:91
2016电子商务行业报告 浏览:295
玩具如何做促销活动 浏览:301
湖南鲜居电子商务有限公司 浏览:232
河南乐淘电子商务 浏览:398
绕车讲解策划方案 浏览:639
积极分子培训活动方案 浏览:915
双11活动策划方案模板 浏览:97
敦煌网营销方案 浏览:403
裁判团队包装推广方案 浏览:187
南昌电子商务公司 浏览:972
泸州供销电子商务有限公司 浏览:454
生鲜的活动营销方案 浏览:673
广东百事泰电子商务 浏览:476
参加培训班方案 浏览:153
幼儿园教师培训方案范文 浏览:198
培训机构合作方案模板 浏览:228
语言文字应用纳入教师培训方案 浏览:66
宣传系统培训方案模板 浏览:689