关于电子商务安全的英文参考文献
电子商务安全技术的分析与研究
电商平台英文文献怎么写_电商平台文献综述
电商平台英文文献怎么写_电商平台文献综述
电商平台英文文献怎么写_电商平台文献综述
电商平台英文文献怎么写_电商平台文献综述
2007-10-12 With the network technology and the rapid dlopment of rmation technology, e-commerce has been growing a wide range of applications, more and more businesses and individuals rely on e-commerce users quick and efficient. It appears not only to the dlopment and expansion of Internet has provided a new opportunity, but also to the business community into a great power. But e-commerce is based on vector-based comr network and a large number of important status rmation, accounting rmation, transaction rmation needed to carry out in-line tranission, in such circumstances, security issues become a priority issue.
Second, the current e-commerce security issues
1. Network protocol security issue: At present, TCP / IP protocol is the most widely used network protocol, but TCP / IP itself, characterized by openness, enterprise and users of electronic transactions in the course of the data is the form of packet tranission, malicious attackers can easily launch an e-commerce site to a packet interception, or n modify the data packets and counterfeiting.
2. Users of rmation security issues: At present, the most important form of e-commerce is based on B / S (Browser / ) structure of the e-commerce sites, users log on using the browser network transactions, as a result of the user in the registry may be used in public comr, such as Internet cafes, offs, comrs, etc., then if they he a malicious Trojan horse comr program or virus, the user's login rmation such as user names, passwords may be the risk of loss.
3. E-commerce Web site security issue: that there are some companies established themselves in the design of e-commerce site will he a number of production security, server operating itself, there will be loopholes, unscrupulous attackers to enter the e-commerce site if a large number of user rmation and transaction rmation will be stolen, enterprises and users to incalculable losses.
C, e-commerce security requirements
1. The effectiveness of serv requirements: e-commerce should be able to prnt the occurrence of serv failures to prnt failure due to network attacks and viruses and other factors such as suspension of servs to ensure that transaction data can be tranitted quickly and accuray.
2. Trading requirements of the confidentiality of rmation: e-commerce s to deal with the rmation sent by users of encryption to effectively prnt the interception of rmation to decipher, at the same time to prnt unauthorized access to rmation.
3. Data integrity requirements: the number refers to the integrity of data processing, the original data and existing data is fully consistent between. In order to safeguard the seriousness of business dealings and fair, the transaction documents is not being modified, there will be damage to the commercial interests of the party.
4. The requirements of authentication: e-commerce s should provide safe and effective authentication mechani to ensure that transaction rmation between the two sides are legitimate and effective in order to oid trade diss, to provide a legal basis.
D, e-commerce security measures
1. Data encryption technology. Data encryption is the most basic e-commerce rmation security precautions. The principle is that rmation on the use of encryption algorithm will be converted into explicit rules according to a certain encryption ciphertext generated after the tranission, thus ensuring the confidentiality of data. The use of data encryption technology can solve the rmation requirements of the confidentiality of its own. Data encryption technology can be divided into symmetric key encryption and asymmetric key encryption.
(1) symmetric key encryption (SecretKeyEncryption). Symmetric key encryption also known as secret / Private key encryption, that is, send and receive data between the parties must use the same key for encryption and decryption explicitly computing. Its aantage is encryption, decryption speed, suitable for large amount of data encryption, to ensure data confidentiality and integrity; drawback is that when the large number of users, distribution and mament is very difficult to key on.
(2) non-symmetric key encryption (PublicKeyEncryption). Non-symmetric-key encryption also known as public key encryption, it mainly refers to each person only has a pair of corresponding keys: public key (the public key) and private key (the private key) public key public, private sed by the personal secret, a key used to encrypt them, they can only use the other to decrypt the key. Asymmetric key encryption algorithm is the aantage of easy distribution and mament, the shortcomings of the algorithm complexity, encryption slow.
(3) the complexity of encryption technology. As a result of these two types of encryption technology, each the length of the relatively common pract is to integrate the two technologies. For example, the use of rmation to send the rmation symmetric key encryption, ciphertext generated after the recipient's public key to use symmetric key encryption to generate the number of envelopes, then the number of ciphertext envelope and sent to the receiver at the same time, the receiving party by the opite clear direction after decryption.
2. Digital signature technology. Digital signature is generated through specific password computing the comition of a series of symbols and codes for a signature key, to replace the written signature or seal, this electronic signature technology can also be carried out to verify, verify the accuracy of its general manual signature and verification seal unmatched. Digital signature technology to ensure the integrity of rmation transfer and non-repudiation.
3. Accreditation agencies as well as digital certificates. E-commerce transactions due to the general users will not he face to face, so the two sides of the transaction identification is to protect the safety of the premise of e-commerce transactions. Certification body is a public and credible third party to confirm the identity of both parties, the digital certificate is signed by the certification body, including the identity of the owner of public key rmation as well as the public key of the document. Paid in the transaction process, participants must use the Certification Center of the digital certificate issued to prove his identity.
4. The use of Secure Electronic Transaction protocol (SET: Secure Electronic Transactions). By two major credit cards VISA and MasterCard standards organizations. SET for the division of e-commerce activities and to define the rights and obligations of the parties to the relationship between a given transaction rmation tranission process standards. SET protocol guarantees the confidentiality of e-commerce s, integrity, non-repudiation of the legitimacy and identity.
求航空电子商务方面的英文参考文献~~~
1.Repeat Bidding on Internet-Based Multiple-Item "Name-Your-Own-Pr" Auctions.
Authors: Gupta, Abhimanyu1 Au E.2 aliabbas@uiuc.edu
Abstract:Name-Your-Own-Pr (NYOP) auctions he gained recent popularity on the Internet. In many NYOP settings, the auction firm displays multiple bidding s for the bidders (such as multiple options of airline tickets) and restricts them to place a single offer. Recent studies he, howr, shown that the Internet environment enables many customers to engage in repeat bidding. Our pure in this is: 1) to yze the consumer value gained by repeat bidding on multiple- NYOP auctions under different-bidding strategies; 2) to derive an upper bound on the value gained by repeat bidding when multiple s are present; and 3) to yze the multiple- NYOP auction from a consumer-firm perspective. We use Monte Carlo simulation to discuss the effects of various auction parameters on the firm's expected profit, and show that the presence of multiple bidding s provides a win-win situation for both the auction firm and the bidders. In particular, we show that multiple s increase the expected value for the consumers and also firms mitigate potential losses due to repeat bidding.
Slow Dutch auctions; Carare, O.; Rothkopf, M. Mament Sci; 2005 Vol. 51 Issue 3, p365-373, 9p. Document Type: Article Citation; (AN MS.EA.CFE.CARARE.SDA) [Citation Record]
PDF Full Text (130KB)
Add to folder Remove from folderTimes Cited in this Database: (7) Order Statistics2. Order Statistics; Did, H.A; 1981 : Wiley (2nd edition). Document Type: Book Citation; (AN OS.DAVID.WILEY.AIHA) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (47) Rrse pricing: The Impact of Sophisticated Consumers, Seller Commitment, and Competition3. Rrse pricing: The Impact of Sophisticated Consumers, Seller Commitment, and Competition; Fay, S. Working Paper; 2007 : University of Florida. Document Type: Book Citation; (AN WP.FAY.UNIVERSITYOFFLORIDA.BJJG) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Partial-repeat-bidding in the name-your-own-pr channel4. Partial-repeat-bidding in the name-your-own-pr channel; Fay, Scott Marketing Sci.; 2004 Vol. 23 Issue 3, p407-418, 12p. Document Type: Article Citation; (AN MS.BC.DJG.FAY.PNC) [Citation Record]
PDF Full Text (169KB)
Add to folder Remove from folderTimes Cited in this Database: (7) The social cost of cheap pseudonyms5. The social cost of cheap pseudonyms; Friedman, E.; Resnick, P. J. Econom. Mament Strategy; 2001 Vol. 10 Issue 1, p173-199, 27p. Document Type: Article Citation; (AN JEMS.AJ.AGC.FRIEDMAN.S) [Citation Record]
PDF Full Text (654KB)
Add to folder Remove from folderTimes Cited in this Database: (28) Measuring frictional cost of online transaction: The case of a NYOP-retailer6. Measuring frictional cost of online transaction: The case of a NYOP-retailer; Hann, I. H.; Terwiesch, C. Mament Sci.; 2003 Vol. 49 Issue 11, p1563-1579, 17p. Document Type: Article Citation; (AN MS.DI.AEFC.HANN.MFCOTC) [Citation Record]
PDF Full Text (233KB)
Add to folder Remove from folderTimes Cited in this Database: (19) An exploration of the adoption of e-auctions in supply mament7. An exploration of the adoption of e-auctions in supply mament; Hartley, J.L.; Lane, M.D.; Hong, Y. IEEE Transactions on Engineering Mament; 2004 Vol. 51 Issue 2, p153-161, 9p. Document Type: Article Citation; (AN ITEM.EA.AEC.HARTLEY.EAESM) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (12) Value of rmation lotteries8. Value of rmation lotteries; Howard, R. A. IEEE Trans. Syst. Sci. Cybern.; 1967 Vol. SSC-3 Issue 1, p24-60, 37p. Document Type: Article Citation; (AN ITSSC.SSC.BD.HOWARD.VIL) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Auctions on the internet: What's being auctioned, and how?9. Auctions on the internet: What's being auctioned, and how?; Lucking-Reiley, Did Journal of Industrial Economics; 2000 Vol. 48 Issue 3, p227-252, 26p. Document Type: Article Citation; (AN JIE.DH.BBG.LUCKINGREILEY.AIWBAH) [Citation Record]
HTML Full Text PDF Full Text (1.5MB)
Add to folder Remove from folderTimes Cited in this Database: (63) An introduction to copulas10. An introduction to copulas; Nelsen, R. Lectures Notes in Statistics; 1998, New York : Springer-Verlag. Document Type: Book Citation; (AN IC.NELSEN.SPRINGERVERLAG.AIIH) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (7) Computationally maable combinational auctions11. Computationally maable combinational auctions; Rothkopf, M. H.; A. Pekec; R. M. Harstad Mament Sci.; 1998 Vol. 44, p1131-1147, 17p. Document Type: Article Citation; (AN MS.DD.AACA.ROTHKOPF.CMCA) [Citation Record]
HTML Full Text PDF Full Text (12.4MB)
Add to folder Remove from folderTimes Cited in this Database: (66) Does the internet promote better consumer decisions? The case of name-your-own-pr auctions12. Does the internet promote better consumer decisions? The case of name-your-own-pr auctions; Spann, M.; Tellis, G. J. Journal of Marketing; 2006 Vol. 70 Issue January, p65-78, 14p. Document Type: Article Citation; (AN JM.GJ.FE.SPANN.DIPBCD) [Citation Record]
PDF Full Text (188KB)
Add to folder Remove from folderTimes Cited in this Database: (8) Online haggling at a name-your-own-pr retailer: Theory and application13. Online haggling at a name-your-own-pr retailer: Theory and application; Terwiesch, C.; Sin, S.; Hann, I. Mament Sci.; 2005 Vol. 51 Issue 3, p339-351, 1. Document Type: Article Citation; (AN MS.EA.CCI.TERWIESCH.OHNRTA) [Citation Record]
PDF Full Text (185KB)
Add to folder Remove from folderTimes Cited in this Database: (6) When should a serv provider employ a "name your own pr" channel?14. When should a serv provider employ a "name your own pr" channel?; Wang, T.; Gal-Or, E.; Chatterjee, R. Working ; 2006 : Kent State University, University of Pitturgh. Document Type: Book Citation; (AN WP.WANG.KENTSTATEUNIVERSITYUNIVER.BJJF)
2."Split-Tender" Ticket Purchases Plunge Airlines Into Dilemma.
Authors:Saytanides, Adam
Abstract:The article reports on the problem encountered by airlines on "split-tender" ticket purchases, wherein customers can pay using more than one card. Airlines with legacy payment s like Delta Air Lines Inc., Northwest Airlines Inc. and United Air Lines Inc., face problems because they do not he e-commerce s that allow them to accept multiple forms of payment with one ticket. According to Bill Houck, director of risk mament of Universal, Universal Air Trel Plan Inc. and Stored Value Solutions are providing a way of handling gift cards.
3.International issues of the design and usage of websites for e-commerce: Ho and airline examples.
Authors:Lituchy, Terri R.1 Roberta Ann2
Abstract:Abstract: Technology has globalized businesses. International business is difficult due to differences in languages and cultures. In terms of technology, in some countries, it is difficult to get data; while in others, data is input in different ways. This examines how international differences affect website design, implementation and usage. We yze websites of airlines and hos. While some websites take into consideration language and culture differences, we find significant room for improvement in both industries. We found support for localization strategy in marketing, communication and transactions. Theoretical and practical implications, including language translators, currency converters and pull-down fields, are discussed. [Copyright 2008 Elsevier] Copyright of Journal of Engineering & Technology Mament is the property of Elsevier Science Publishers B.V. and its content may not be copied or emailed to multiple sites or ted to a listserv without the copyright holder's express written permission. Howr, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts)
1. Online holiday retail sales jump; Acohido, B. USA Today; 2002. Document Type: Article Citation; (AN BEFAHHJHH) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Chinese will become one main internet language2. Chinese will become one main internet language; Asian Info Daily China News Asia Daily China News; 2001 Vol. 1 Issue 10 (December). Document Type: Article Citation; (AN BEFAHHJHI) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Culturability: the merging of culture and usability3. Culturability: the merging of culture and usability; Barber, W.; Bandre, A.N. Proceedings of the Fourth Conference on Human Factors and the Web; 2001. Document Type: Book Citation; (AN BEFAHHJIJ) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Standardization in International Marketing: Is Ted Levitt in Fact Right?4. Standardization in International Marketing: Is Ted Levitt in Fact Right?; Boddewyn, Jean J.; Robin Soehl; Jacques Picard Business Horizons; 1986 Vol. 29 Issue 6, p69-75, 7p. Document Type: Article Citation; (AN BH.BI.FI.BODDEWYN.SIMITL) [Citation Record]
PDF Full Text (514KB)
Add to folder Remove from folderTimes Cited in this Database: (56) Andy Grove: ''We Can't Even Glimpse The Potential'', vol. 38465. Andy Grove: ''We Can't Even Glimpse The Potential'', vol. 3846; Business Week; 2003, New York : Business Week. Document Type: Book Citation; (AN AGCEGPVC.BUSINESS.BUSINESSWEEK.BJJC) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Beyond trust: website design preferences across cultures6. Beyond trust: website design preferences across cultures; Cyr, D.; Bonanni, C.; Bowes, J.; Ilsr, J. Journal of Global Information Mament; 2005 Vol. 13 Issue 4, p25-54, 30p. Document Type: Article Citation; (AN JGIM.AC.BE.CYR.BTWDPA) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Localization of Web design: An empirical comparison of German, Japanese, and U.S. Web site characteristics7. Localization of Web design: An empirical comparison of German, Japanese, and U.S. Web site characteristics; Cyr, D.; Trevor-Smith, H. Journal of the American Society for Information Science and Technology; 2004 Vol. 55 Issue 13, p1-10. Document Type: Article Citation; (AN JASIST.EE.A.CYR.LWDECG) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (2) Applied Nonparametric Statistics8. Applied Nonparametric Statistics; Daniel, W.; 1990, Boston : PWS-Kent Publishing Company. Document Type: Book Citation; (AN ANS.DANIEL.PWSKENTPUBLISHINGCOMPANY.AIIJ) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (15) Introduction to the Symium E-Commerce and Global Business: The Impact of the Information and Communication Technology Revolution on the Conduct of International Business9. Introduction to the Symium E-Commerce and Global Business: The Impact of the Information and Communication Technology Revolution on the Conduct of International Business; De la Torre, Jose; Moxon, Richard W. Journal of International Business Studies; 2001 Vol. 32 Issue 4, p617-639, 2. Document Type: Article Citation; (AN JIBS.CB.FAG.DE.ISEGBI) [Citation Record]
PDF Full Text (3.5MB)
Add to folder Remove from folderTimes Cited in this Database: (3) Global marketing and aertising10. Global marketing and aertising; De Mooij, M. K.; 1998, Thousand Oaks, California : Sage Publications Inc. Document Type: Book Citation; (AN GMA.DE.SAGEPUBLICATIONSINC.AIIH) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (2) Design practs for global gateways11. Design practs for global gateways; DePalma, D.; Beninatto, R. Common Sense Aisory; 2003 Vol. 28 Issue September. Document Type: Article Citation; (AN BEFAHHJII) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Nigating the globe12. Nigating the globe; Dole, K. Marketing Direct; 2003 Vol. 39 Issue July/August. Document Type: Article Citation; (AN BEFAHHAJJ) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) The myth of globalization13. The myth of globalization; Douglas, S.; Yoram, W. Columbia Journal of World Business, Winter; 1987, p19-29, 11p. Document Type: Article Citation; (AN BEFAHHAJA) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Researchers set to break web's language barriers14. Researchers set to break web's language barriers; Europemedia Europemedia; 2002 Issue February (8). Document Type: Article Citation; (AN BEFAHHAJB) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) The role of culture in intece acceptance15. The role of culture in intece acceptance; Evers, V.; Day, D. Human comr interaction; 1997, London : Chapman and Hall. Edited by: Howard, Hammond; Lindegaard. Document Type: Book Citation; (AN HCI.EVERS.CHAPMANANDHALL.AIIG) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (2) Internet diffusion in Japan: cultural consideration16. Internet diffusion in Japan: cultural consideration; Ferle, C.; Edwards, S.; Mizuno, Y. Journal of Aertising Research; 2002, p65-79, 15p. Document Type: Article Citation; (AN BEFAHHAJD) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Discovery of substantive theory: a basic strategy underlying qualitative research17. Discovery of substantive theory: a basic strategy underlying qualitative research; Glasser, B.G.; Strauss, A.L. The American Behioural; 1965 Vol. 8 Issue 6, p5, 1p. Document Type: Article Citation; (AN AB.H.E.GLASSER.DSTBSU) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Cultuies and oiganizations: Sottware of the mind18. Cultuies and oiganizations: Sottware of the mind; Hofstede, G.; 19, London : McGraw-Hill. Document Type: Book Citation; (AN COSMI.HOFSTEDE.MCGRAWHILL.AIIA) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (600) A Conceptual Model for Comparative Analysis of Standardization of Vertical Industry Languages19. A Conceptual Model for Comparative Analysis of Standardization of Vertical Industry Languages; Jain, H.; Zhao, H.; 2001 : MISQ Special Issue Workshop. Document Type: Book Citation; (AN CMCASVIL.JAIN.MISQSPECIALISSUEWORKSHOP.BJJA) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Standardization of International Marketing Strategy: Some Research Hypotheses20. Standardization of International Marketing Strategy: Some Research Hypotheses; Jain, Subhash Journal of Marketing; 1989 Vol. 53 Issue January, p70-79, 10p. Document Type: Article Citation; (AN JM.EC.GJ.JAIN.SIMSSR) [Citation Record]
PDF Full Text (9.5MB)
Add to folder Remove from folderTimes Cited in this Database: (187) Consumer trust in an Internet store: a cross-cultural validation21. Consumer trust in an Internet store: a cross-cultural validation; Jarvenpaa, S.; Tractinsky, N.; Saarinen, L.; Vitale, M. Journal of Comr Mediated Communication; 1999 Vol. 5. Issue 2. Document Type: Article Citation; (AN BEFAHHAAJ) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Robert T. Moran's Guide to Doing Business in Europe22. Robert T. Moran's Guide to Doing Business in Europe; Johnson, M.; Moran, R.T.; 1992, London : Butterworth Heinemann. Document Type: Book Citation; (AN RTMGDBE.JOHNSON.BUTTERWORTHHEINEMANN.AIIB) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Effectiveness of graphical components in Web site e-commerce application: a cultural perspective23. Effectiveness of graphical components in Web site e-commerce application: a cultural perspective; Kang, K.; Corbitt, B. The Electronic Journal Systems in Dloping Countries; 2001. Document Type: Article Citation; (AN BEFAHHAAB) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Cultural Determinants of Search Behior on Websites24. Cultural Determinants of Search Behior on Websites; Kralisch, A.; Berendt, B. Proceedings of the IWIPS 2004 Conference on Culture, Trust, and Design Innovation Vancouver, Canada, July 8-10); 2004. Document Type: Meeting Citation; (AN VCJH.BJJD) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Attracting multicultural clients; as nic groups grow in size and affluence, banks find a pot of gold at end of this rainbow25. Attracting multicultural clients; as nic groups grow in size and affluence, banks find a pot of gold at end of this rainbow; Krebach, K. Bank Investment Marketing; 2002 Vol. 10 Issue 4, p28, 1p. Document Type: Article Citation; (AN BIM.AJ.BH.KREBSBACH.AMCAEG) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Betterness26. Betterness; Levitt, T. Harvard Business Review; 1988 Vol. 66 Issue 6, p9, 1p. Document Type: Article Citation; (AN HBR.FF.I.LEVITT.B) [Citation Record]
PDF Full Text (255KB)
Add to folder Remove from folderTimes Cited in this Database: (1) The globalization of markets27. The globalization of markets; Levitt, T. Harvard Business Review; 1983 Vol. 44, p108-116, 9p. Document Type: Article Citation; (AN HBR.DD.AJH.LEVITT.GM) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Profiles of Internet buyers in 20 countries: Evidence for region-specific strategies28. Profiles of Internet buyers in 20 countries: Evidence for region-specific strategies; LYNCH, P. D.; BECK, J. C. Journal of International Business Studies; 2001 Vol. 32, p725-748, 24p. Document Type: Article Citation; (AN JIBS.CB.GBE.LYNCH.PIBBCE) [Citation Record]
PDF Full Text (3.6MB)
Add to folder Remove from folderTimes Cited in this Database: (19) Language barriers29. Language barriers; MacLeod, M. Supply Mament; 2000 Vol. 5 Issue 14, p27-38, 12p. Document Type: Article Citation; (AN SM.E.BG.MACLEOD.LB) [Citation Record]
Add to folder Remove from folderTimes Cited in this Database: (1) Cultural Dimensions and Global Web User Intece Design30. Cultural Dimensions and Global Web User Intece Design; Marcus, A.; Gould, E.; 2002, Cole, CA : Brookes. Document Type: Book Citation; (AN CDGWUID.MARCUS.BROOKES.BJJB)
这台电脑没装word所以改不了格式,你将就一下吧,上面三个论文都是付费搜索,答辩的导师想查也查不到,所以按你的需要自己编就行了.
电子商务英文摘要
The popularity of e-commerce is an inevitable trend, it is not only a sales channel, a new production mament way, and will bring a commercial revolution. Schumpeter, with "the new production function, market and enterprises need to update and new business model to replace the old commercial mode, this process is called him" creative destruction ".
Based on the basic comition of traditional enterprise business model based on the ysis of the , from the business mode, and discussed the three layers of e-commerce enterprises for its intrinsic business model, and the influence of traditional enterprise success of e-business two case ysis, further study of the enterprise electronic commerce business model, how to traditional inherent e-commerce enterprises of the ll of its final stages division, how to dlop e-business, puts forward some countermeasures and Suggestions. Think with the traditional enterprise dlop e-commerce, its influence on enterprise business model is one of the outer - middle - lining the progressive process of traditional enterprise electronic commerce, the process must follow the rules, can receive the good effect.
Keywords: electronic commerce mode of traditional enterprise organization structure, core competitiveness
求一篇有关网络购物行为的英文文献
Thanks to the internet and the range of retail stores ailable, you can complete most of your festive shopping at the click of a mouse. While the perks of online shopping are obvious, some precautions while that decisive click would ensure you’re shopping safe. Browse
求两篇关于电子商务英文参考文献
Managing Channels of Distribution Under the Environment of Electronic Commerce
【英文篇名】 Managing Channels of Distribution Under the Environment of Electronic Commerce
【作者英文名】 ZHENG Bing~1 FENG Yixiong~2 1.College of Economics & Mament; Dalian University; Dalian 116622; China 2.State Key Laboratory of CAD&CG; Zhejiang University; Hangzhou 310027; China;
【文献出处】 武汉理工大学学报, Journal of WuhanUniversity of Technology, 编辑部邮箱 2006年 S2期
【英文】 marketing channels; distribution strategy; customer demand; electronic commerce;
Fair E-Payment Protocol Based on Simple Partially Blind Signature Scheme
【英文篇名】 Fair E-Payment Protocol Based on Simple Partially Blind Signature Scheme
【作者英文名】 LIU Jingwei; SUN Rong; KOU Weidong State Key Laboratory of Integrated Serv Networks; Xidian University; Xi’an 710071; Shaanxi; China;
【文献出处】 Wuhan University Journal of Natural Sciences, 武汉大学自然科学学报(英文版), 编辑部邮箱 2007年 01期
【英文】 electronic commerce; e-payment; Schnorr signature; partial blind signature;
【英文摘要】 This presents a partially blind signature scheme with low computation. By converse using the partially blind signature scheme, we build a fair e-payment protocol. In the protocol, two participants achi the goals of exchanging their digital signatures from each other in a way. An ad- vantage of this scheme is that this approach does not require the intervention of the third party in any case. The low-computation property makes our scheme very attractive for mobile client and a...
关于电子商务的外文翻译成中文,中英文都要,2000字以上,要注明出处,是近期文献
nternet作为电子商务的载体,已成为企业必不可少的信息采集、传输和交换的工具,网络(信息)时代的到来为基于Internet的IT服务业注入了新的活力,
Internet is electronic vehicle for business on line, it turns to be unsplit tool for company for the pure of collection, transferring and exchange for rmation, with the net work ( rmation) age ailability, which input new vigor into IT serv industry based on internet.
其中电子商务(Electronic Commerce, EC)更是备受瞩目,已被公认为是影响21世纪世界经济格局的新型经济模式和催化剂。
Whereby, Electronic Commerce is the focus of attention, and regarded as new economic mode and activator for global economics in 21st centrury.
在它经历了三个艰难的发展历程(电子零售、电子贸易和网上交易市场)之后,逐渐成熟起来,它的核心是运用现代计算机通讯技术,
after it passed 3 difficult stages (electronic retail sales, electronic trading and sales market on line), it is mature step by step, it lies in his core tech. from modern comr communication .
尤其是网络技术为企业进行生产经营活动服务,使企业提高生产效益、降低经营成本、优化资源配置,从而实现财富的化。
Especially net work technology serves for social production operation of companies so as to improve the production output and benefit, to decrease the operation costing, to optimize resource , so that maximum social property can be realised.
特别是对于中小企业来说电子商务通过良好地运用,更能出现一些惊喜的结果。
The most surprising target is achid by all and medium size enterprises who make good use of electronic business.
本文共分为四章,通过研究电子商务对中小企业的影响和重要性来阐述中小企业在面临这个电子化、网络化的时代所可以采取的一些策略和办法来提高企业的核心竞争力。
The article is drafted in 4 chapters, with the study on the influence and importance of electronic business for all and medium sized companies, it set forth some strategies and actions can be taken in order to improve the company core competency of competition in the net work age.