當前位置:首頁 » 素材參考 » 電子商務論文參考文獻中英文
擴展閱讀
中國網路原創新人樂團 2021-03-31 20:26:56
黨政視頻素材 2021-03-31 20:25:44
廈門大學統計學碩士 2021-03-31 20:25:36

電子商務論文參考文獻中英文

發布時間: 2021-03-23 19:57:49

⑴ 求一篇電子商務的報告 須按照一般期刊論文的格式提交,需要有中英文關鍵字、摘要,參考文獻等。

我有電子商務的報告

⑵ 電子商務專業論文之參考文獻

[1] 莫佳. 數字簽名在電子商務中的實現[J]. 福建電腦, 2008,(02) .

[2] 張述平,楊國明. 第三方支付競爭策略創新[J]. 電腦知識與技術(學術交流), 2006,(17) .

[3] 任莉莉. 基於信息不對稱的網上支付風險探討[J]. 池州學院學報, 2008,(01) .

[4] 楊國明. 移動支付商業模式分析[J]. 電腦知識與技術(學術交流), 2006,(20) .

[5] 吳凌嬌. 網上購物安全問題探討[J]. 江蘇技術師范學院學報, 2006,(04) .

[6] 王鳳滿. 數字圖書館與電子商務服務[J]. 閩江學院學報, 2008,(06) .

[7] 趙鳳彩,黎超. 航空電子客票的移動支付[J]. 電子商務, 2008,(08) .

[8] 徐勇剛,梅耀輝. 淺談我國電子支付系統的應用現狀及發展策略[J]. 當代經理人(中旬刊), 2006,(21) .

[9] 宋磊. 電子商務的安全隱患及其防範[J]. 福建行政學院福建經濟管理幹部學院學報, 2008,(02) .

[10] 彭銀香,白貞武. 電子商務安全問題及措施研究[J]. 大眾科技, 2005,(11) .
[1] 林黎明,李新春. 電子商務安全風險管理研究[J]. 計算機與信息技術, 2006,(03) .
[2] 宋苑. 影響電子商務發展的網路安全事件分析與對策[J]. 計算機與信息技術, 2006,(Z1) .
[3] 付靈麗,朱輝. 基於電子商務的身份認證攻擊研究[J]. 電腦應用技術, 2007,(02) .
[4] 楊二龍,劉建時. 對電子商務風險的幾點思考[J]. 警官文苑, 2007,(01) .
[5] 闞曉初. 淺談電子商務安全策略與技術[J]. 商場現代化, 2007,(01) .
[6] 楊晉. 現代電子商務安全技術研究[J]. 網路安全技術與應用, 2007,(01) .
[7] 朱虹. 電子商務管理發展研究[J]. 高校圖書情報論壇, 2006,(02) .
[8] 劉宗梅,李智宇. 電子商務法律環境的構建[J]. 法學與實踐, 2007,(01) .
[9] 徐效美,林冬梅. 淺析電子商務的安全[J]. 商場現代化, 2007,(01) .
[10] 姚樹琪. 關於我國電子商務物流發展對策的探討[J]. 石家莊聯合技術職業學院學術研究, 2006,(02) .

⑶ 電子商務參考文獻

1 對話下半場:建立健全電子商務領域金融秩序 電子商務 2007/01
2 攜程電子商務模式組成要素分析 電子商務 2007/01
3 電子商務經營模式給企業帶來了什麼 電子商務 2007/01
4 服務中小企業的第三方電子商務模式研究 電子商務 2007/01
5 電子商務中《消費者權益保護法》適格主體研究 電子商務 2007/01
6 談新就業形勢下的職業院校電子商務專業建設 電子商務 2007/01
7 淺談物資采購的電子商務化 電子科技 2007/01
8 中國電信新一代B2B電子商務網站商集網上線運營 互聯網周刊 2007/02
9 Web數據挖掘在零售業電子商務中的應用 經濟師 2007/01
10 電子商務環境下的稅收 經濟師 2007/01
11 試論電子商務物流隱性成本控制 經濟師 2007/01
12 破除制約我國電子商務發展的四大瓶頸 通信世界 2007/02
13 電子商務代表網站及業務模式分析 通信世界 2007/02
14 組建基於企業服務匯流排的電子商務集成系統研究 計算機應用與軟體 2007/01
15 基於SOAP的即時消息在B2C電子商務系統中的應用 計算機應用與軟體 2007/01
16 電子商務對會計的影響及電子商務會計的發展 會計之友(中) 2007/01
17 電子商務中數據挖掘技術的使用 內蒙古電大學刊 2007/02
18 電子商務專業畢業生就業率低的原因及其對策 內蒙古電大學刊 2007/02
19 淺談煙草行業電子商務 華北、東北地區2007年度煙草學術交流研討會論文集 2007
20 B2C電子商務模式下物流配送路徑優化問題研究 北京交通大學 2007
21 電子商務環境下傳統企業流程變革研究 同濟大學 2007
22 淺析電子商務誠信體系的構建與實現 商場現代化 2007/01
23 基於電子商務的供應鏈管理研究 商場現代化 2007/01
24 電子商務體系結構與電子支付技術 商場現代化 2007/01
25 論新農村建設中農業電子商務的發展戰略 商場現代化 2007/01
26 旅遊電子商務網站的構建 商場現代化 2007/01
27 分銷商網路團購營銷的電子商務模型研究 商場現代化 2007/01
28 電子商務及其安全技術 商場現代化 2007/01
29 淺析電子商務的安全 商場現代化 2007/01
30 Web 2.0技術在電子商務中的應用 商場現代化 2007/01

⑷ 中英文參考文獻,有關電子商務方面,最好和edm有關

EDM是神馬。。。

⑸ 急求電子商務相關參考文獻,英文的,只要只要標題和作者

標題、自作者、年份

《E-commerce: the role of familiarity and trust》
D Gefen - Omega, 2000

《What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology》
DH McKnight,2001

《 Fuzzy decision support system for risk analysis in e-commerce development》
EWT Ngai, 2005

《 Interactive decision aids for consumer decision making in e-commerce: the influence of perceived strategy restrictiveness》
W Wang, 2009

⑹ 求兩篇關於電子商務英文參考文獻

http://59.42.244.59/Readers/Index.aspx
http://www.nstl.gov.cn/index.html

⑺ 關於電子商務安全的英文參考文獻

電子商務安全技術的分析與研究
2007-10-12 With the network technology and the rapid development of information technology, e-commerce has been growing a wide range of applications, more and more businesses and indivials rely on e-commerce users quick and efficient. It appears not only to the development and expansion of Internet has provided a new opportunity, but also to the business community into a great power. But e-commerce is based on vector-based computer network and a large number of important status information, accounting information, transaction information needed to carry out in-line transmission, in such circumstances, security issues become a priority issue.

Second, the current e-commerce security issues
1. Network protocol security issue: At present, TCP / IP protocol is the most widely used network protocol, but TCP / IP itself, characterized by openness, enterprise and users of electronic transactions in the course of the data is the form of packet transmission, malicious attackers can easily launch an e-commerce site to a packet interception, or even modify the data packets and counterfeiting.
2. Users of information security issues: At present, the most important form of e-commerce is based on B / S (Browser / Server) structure of the e-commerce sites, users log on using the browser network transactions, as a result of the user in the registry may be used in public computer, such as Internet cafes, offices, computers, etc., then if they have a malicious Trojan horse computer program or virus, the user's login information such as user names, passwords may be the risk of loss.
3. E-commerce Web site security issue: that there are some companies established themselves in the design of e-commerce site will have a number of proction security, server operating system itself, there will be loopholes, unscrupulous attackers to enter the e-commerce site if a large number of user information and transaction information will be stolen, enterprises and users to incalculable losses.

C, e-commerce security requirements
1. The effectiveness of service requirements: e-commerce system should be able to prevent the occurrence of service failures to prevent failure e to network attacks and viruses and other system factors such as suspension of services to ensure that transaction data can be transmitted quickly and accurately.
2. Trading requirements of the confidentiality of information: e-commerce systems to deal with the information sent by users of encryption to effectively prevent the interception of information to decipher, at the same time to prevent unauthorized access to information.
3. Data integrity requirements: the number refers to the integrity of data processing, the original data and existing data is fully consistent between. In order to safeguard the seriousness of business dealings and fair, the transaction documents is not being modified, there will be damage to the commercial interests of the party.
4. The requirements of authentication: e-commerce systems should provide safe and effective authentication mechanism to ensure that transaction information between the two sides are legitimate and effective in order to avoid trade disputes, to provide a legal basis.

D, e-commerce security measures
1. Data encryption technology. Data encryption is the most basic e-commerce information system security precautions. The principle is that information on the use of encryption algorithm will be converted into explicit rules according to a certain encryption ciphertext generated after the transmission, thus ensuring the confidentiality of data. The use of data encryption technology can solve the information requirements of the confidentiality of its own. Data encryption technology can be divided into symmetric key encryption and asymmetric key encryption.
(1) symmetric key encryption (SecretKeyEncryption). Symmetric key encryption also known as secret / Private key encryption, that is, send and receive data between the parties must use the same key for encryption and decryption explicitly computing. Its advantage is encryption, decryption speed, suitable for large amount of data encryption, to ensure data confidentiality and integrity; drawback is that when the large number of users, distribution and management is very difficult to key on.
(2) non-symmetric key encryption (PublicKeyEncryption). Non-symmetric-key encryption also known as public key encryption, it mainly refers to each person only has a pair of corresponding keys: public key (the public key) and private key (the private key) public key public, private saved by the personal secret, a key used to encrypt them, they can only use the other to decrypt the key. Asymmetric key encryption algorithm is the advantage of easy distribution and management, the shortcomings of the algorithm complexity, encryption slow.
(3) the complexity of encryption technology. As a result of these two types of encryption technology, each the length of the relatively common practice is to integrate the two technologies. For example, the use of information to send the information symmetric key encryption, ciphertext generated after the recipient's public key to use symmetric key encryption to generate the number of envelopes, then the number of ciphertext envelope and sent to the receiver at the same time, the receiving party by the opposite clear direction after decryption.
2. Digital signature technology. Digital signature is generated through specific password computing the composition of a series of symbols and codes for a signature key, to replace the written signature or seal, this electronic signature technology can also be carried out to verify, verify the accuracy of its general manual signature and verification seal unmatched. Digital signature technology to ensure the integrity of information transfer and non-repudiation.
3. Accreditation agencies as well as digital certificates. E-commerce transactions e to the general users will not have face to face, so the two sides of the transaction identification is to protect the safety of the premise of e-commerce transactions. Certification body is a public and credible third party to confirm the identity of both parties, the digital certificate is signed by the certification body, including the identity of the owner of public key information as well as the public key of the document. Paid in the transaction process, participants must use the Certification Center of the digital certificate issued to prove his identity.
4. The use of Secure Electronic Transaction protocol (SET: Secure Electronic Transactions). By two major credit cards VISA and MasterCard standards organizations. SET for the division of e-commerce activities and to define the rights and obligations of the parties to the relationship between a given transaction information transmission process standards. SET protocol guarantees the confidentiality of e-commerce systems, integrity, non-repudiation of the legitimacy and identity.

⑻ 電子商務論文參考文獻

1 對話下半場:建立健全電子商務領域金融秩序 電子商務 2007/01 2 攜程電子商務模式組成要素分析 電子商務 2007/01 3 電子商務經營模式給企業帶來了什麼 電子商務 2007/01 4 服務中小企業的第三方電子商務模式研究 電子商務 2007/01 5 電子商務中《消費者權益保護法》適格主體研究 電子商務 2007/01 6 談新就業形勢下的職業院校電子商務專業建設 電子商務 2007/01 7 淺談物資采購的電子商務化 電子科技 2007/01 8 中國電信新一代B2B電子商務網站商集網上線運營 互聯網周刊 2007/02 9 Web數據挖掘在零售業電子商務中的應用 經濟師 2007/01 10 電子商務環境下的稅收 經濟師 2007/01 11 試論電子商務物流隱性成本控制 經濟師 2007/01 12 破除制約我國電子商務發展的四大瓶頸 通信世界 2007/02 13 電子商務代表網站及業務模式分析 通信世界 2007/02 14 組建基於企業服務匯流排的電子商務集成系統研究 計算機應用與軟體 2007/01 15 基於SOAP的即時消息在B2C電子商務系統中的應用 計算機應用與軟體 2007/01 16 電子商務對會計的影響及電子商務會計的發展 會計之友(中) 2007/01 17 電子商務中數據挖掘技術的使用 內蒙古電大學刊 2007/02 秘書之家 http://www.clerkhome.com18 電子商務專業畢業生就業率低的原因及其對策 內蒙古電大學刊 2007/02 19 淺談煙草行業電子商務 華北、東北地區2007年度煙草學術交流研討會論文集 2007 20 B2C電子商務模式下物流配送路徑優化問題研究 北京交通大學 2007 21 電子商務環境下傳統企業流程變革研究 同濟大學 2007 22 淺析電子商務誠信體系的構建與實現 商場現代化 2007/01 23 基於電子商務的供應鏈管理研究 商場現代化 2007/01 24 電子商務體系結構與電子支付技術 商場現代化 2007/01 25 論新農村建設中農業電子商務的發展戰略 商場現代化 2007/01 26 旅遊電子商務網站的構建 商場現代化 2007/01 27 分銷商網路團購營銷的電子商務模型研究 商場現代化 2007/01 28 電子商務及其安全技術 商場現代化 2007/01 29 淺析電子商務的安全 商場現代化 2007/01 30 Web 2.0技術在電子商務中的應用 商場現代化 2007/01

⑼ 急需有關於電子商務O2O模式畢業論文的中英文參考文獻!

我這邊才整理好,文獻和範本。。。。你看合適嗎