当前位置:首页 » 素材参考 » 电子商务论文参考文献中英文
扩展阅读
中国网络原创新人乐团 2021-03-31 20:26:56
党政视频素材 2021-03-31 20:25:44
厦门大学统计学硕士 2021-03-31 20:25:36

电子商务论文参考文献中英文

发布时间: 2021-03-23 19:57:49

⑴ 求一篇电子商务的报告 须按照一般期刊论文的格式提交,需要有中英文关键字、摘要,参考文献等。

我有电子商务的报告

⑵ 电子商务专业论文之参考文献

[1] 莫佳. 数字签名在电子商务中的实现[J]. 福建电脑, 2008,(02) .

[2] 张述平,杨国明. 第三方支付竞争策略创新[J]. 电脑知识与技术(学术交流), 2006,(17) .

[3] 任莉莉. 基于信息不对称的网上支付风险探讨[J]. 池州学院学报, 2008,(01) .

[4] 杨国明. 移动支付商业模式分析[J]. 电脑知识与技术(学术交流), 2006,(20) .

[5] 吴凌娇. 网上购物安全问题探讨[J]. 江苏技术师范学院学报, 2006,(04) .

[6] 王凤满. 数字图书馆与电子商务服务[J]. 闽江学院学报, 2008,(06) .

[7] 赵凤彩,黎超. 航空电子客票的移动支付[J]. 电子商务, 2008,(08) .

[8] 徐勇刚,梅耀辉. 浅谈我国电子支付系统的应用现状及发展策略[J]. 当代经理人(中旬刊), 2006,(21) .

[9] 宋磊. 电子商务的安全隐患及其防范[J]. 福建行政学院福建经济管理干部学院学报, 2008,(02) .

[10] 彭银香,白贞武. 电子商务安全问题及措施研究[J]. 大众科技, 2005,(11) .
[1] 林黎明,李新春. 电子商务安全风险管理研究[J]. 计算机与信息技术, 2006,(03) .
[2] 宋苑. 影响电子商务发展的网络安全事件分析与对策[J]. 计算机与信息技术, 2006,(Z1) .
[3] 付灵丽,朱辉. 基于电子商务的身份认证攻击研究[J]. 电脑应用技术, 2007,(02) .
[4] 杨二龙,刘建时. 对电子商务风险的几点思考[J]. 警官文苑, 2007,(01) .
[5] 阚晓初. 浅谈电子商务安全策略与技术[J]. 商场现代化, 2007,(01) .
[6] 杨晋. 现代电子商务安全技术研究[J]. 网络安全技术与应用, 2007,(01) .
[7] 朱虹. 电子商务管理发展研究[J]. 高校图书情报论坛, 2006,(02) .
[8] 刘宗梅,李智宇. 电子商务法律环境的构建[J]. 法学与实践, 2007,(01) .
[9] 徐效美,林冬梅. 浅析电子商务的安全[J]. 商场现代化, 2007,(01) .
[10] 姚树琪. 关于我国电子商务物流发展对策的探讨[J]. 石家庄联合技术职业学院学术研究, 2006,(02) .

⑶ 电子商务参考文献

1 对话下半场:建立健全电子商务领域金融秩序 电子商务 2007/01
2 携程电子商务模式组成要素分析 电子商务 2007/01
3 电子商务经营模式给企业带来了什么 电子商务 2007/01
4 服务中小企业的第三方电子商务模式研究 电子商务 2007/01
5 电子商务中《消费者权益保护法》适格主体研究 电子商务 2007/01
6 谈新就业形势下的职业院校电子商务专业建设 电子商务 2007/01
7 浅谈物资采购的电子商务化 电子科技 2007/01
8 中国电信新一代B2B电子商务网站商集网上线运营 互联网周刊 2007/02
9 Web数据挖掘在零售业电子商务中的应用 经济师 2007/01
10 电子商务环境下的税收 经济师 2007/01
11 试论电子商务物流隐性成本控制 经济师 2007/01
12 破除制约我国电子商务发展的四大瓶颈 通信世界 2007/02
13 电子商务代表网站及业务模式分析 通信世界 2007/02
14 组建基于企业服务总线的电子商务集成系统研究 计算机应用与软件 2007/01
15 基于SOAP的即时消息在B2C电子商务系统中的应用 计算机应用与软件 2007/01
16 电子商务对会计的影响及电子商务会计的发展 会计之友(中) 2007/01
17 电子商务中数据挖掘技术的使用 内蒙古电大学刊 2007/02
18 电子商务专业毕业生就业率低的原因及其对策 内蒙古电大学刊 2007/02
19 浅谈烟草行业电子商务 华北、东北地区2007年度烟草学术交流研讨会论文集 2007
20 B2C电子商务模式下物流配送路径优化问题研究 北京交通大学 2007
21 电子商务环境下传统企业流程变革研究 同济大学 2007
22 浅析电子商务诚信体系的构建与实现 商场现代化 2007/01
23 基于电子商务的供应链管理研究 商场现代化 2007/01
24 电子商务体系结构与电子支付技术 商场现代化 2007/01
25 论新农村建设中农业电子商务的发展战略 商场现代化 2007/01
26 旅游电子商务网站的构建 商场现代化 2007/01
27 分销商网络团购营销的电子商务模型研究 商场现代化 2007/01
28 电子商务及其安全技术 商场现代化 2007/01
29 浅析电子商务的安全 商场现代化 2007/01
30 Web 2.0技术在电子商务中的应用 商场现代化 2007/01

⑷ 中英文参考文献,有关电子商务方面,最好和edm有关

EDM是神马。。。

⑸ 急求电子商务相关参考文献,英文的,只要只要标题和作者

标题、自作者、年份

《E-commerce: the role of familiarity and trust》
D Gefen - Omega, 2000

《What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology》
DH McKnight,2001

《 Fuzzy decision support system for risk analysis in e-commerce development》
EWT Ngai, 2005

《 Interactive decision aids for consumer decision making in e-commerce: the influence of perceived strategy restrictiveness》
W Wang, 2009

⑹ 求两篇关于电子商务英文参考文献

http://59.42.244.59/Readers/Index.aspx
http://www.nstl.gov.cn/index.html

⑺ 关于电子商务安全的英文参考文献

电子商务安全技术的分析与研究
2007-10-12 With the network technology and the rapid development of information technology, e-commerce has been growing a wide range of applications, more and more businesses and indivials rely on e-commerce users quick and efficient. It appears not only to the development and expansion of Internet has provided a new opportunity, but also to the business community into a great power. But e-commerce is based on vector-based computer network and a large number of important status information, accounting information, transaction information needed to carry out in-line transmission, in such circumstances, security issues become a priority issue.

Second, the current e-commerce security issues
1. Network protocol security issue: At present, TCP / IP protocol is the most widely used network protocol, but TCP / IP itself, characterized by openness, enterprise and users of electronic transactions in the course of the data is the form of packet transmission, malicious attackers can easily launch an e-commerce site to a packet interception, or even modify the data packets and counterfeiting.
2. Users of information security issues: At present, the most important form of e-commerce is based on B / S (Browser / Server) structure of the e-commerce sites, users log on using the browser network transactions, as a result of the user in the registry may be used in public computer, such as Internet cafes, offices, computers, etc., then if they have a malicious Trojan horse computer program or virus, the user's login information such as user names, passwords may be the risk of loss.
3. E-commerce Web site security issue: that there are some companies established themselves in the design of e-commerce site will have a number of proction security, server operating system itself, there will be loopholes, unscrupulous attackers to enter the e-commerce site if a large number of user information and transaction information will be stolen, enterprises and users to incalculable losses.

C, e-commerce security requirements
1. The effectiveness of service requirements: e-commerce system should be able to prevent the occurrence of service failures to prevent failure e to network attacks and viruses and other system factors such as suspension of services to ensure that transaction data can be transmitted quickly and accurately.
2. Trading requirements of the confidentiality of information: e-commerce systems to deal with the information sent by users of encryption to effectively prevent the interception of information to decipher, at the same time to prevent unauthorized access to information.
3. Data integrity requirements: the number refers to the integrity of data processing, the original data and existing data is fully consistent between. In order to safeguard the seriousness of business dealings and fair, the transaction documents is not being modified, there will be damage to the commercial interests of the party.
4. The requirements of authentication: e-commerce systems should provide safe and effective authentication mechanism to ensure that transaction information between the two sides are legitimate and effective in order to avoid trade disputes, to provide a legal basis.

D, e-commerce security measures
1. Data encryption technology. Data encryption is the most basic e-commerce information system security precautions. The principle is that information on the use of encryption algorithm will be converted into explicit rules according to a certain encryption ciphertext generated after the transmission, thus ensuring the confidentiality of data. The use of data encryption technology can solve the information requirements of the confidentiality of its own. Data encryption technology can be divided into symmetric key encryption and asymmetric key encryption.
(1) symmetric key encryption (SecretKeyEncryption). Symmetric key encryption also known as secret / Private key encryption, that is, send and receive data between the parties must use the same key for encryption and decryption explicitly computing. Its advantage is encryption, decryption speed, suitable for large amount of data encryption, to ensure data confidentiality and integrity; drawback is that when the large number of users, distribution and management is very difficult to key on.
(2) non-symmetric key encryption (PublicKeyEncryption). Non-symmetric-key encryption also known as public key encryption, it mainly refers to each person only has a pair of corresponding keys: public key (the public key) and private key (the private key) public key public, private saved by the personal secret, a key used to encrypt them, they can only use the other to decrypt the key. Asymmetric key encryption algorithm is the advantage of easy distribution and management, the shortcomings of the algorithm complexity, encryption slow.
(3) the complexity of encryption technology. As a result of these two types of encryption technology, each the length of the relatively common practice is to integrate the two technologies. For example, the use of information to send the information symmetric key encryption, ciphertext generated after the recipient's public key to use symmetric key encryption to generate the number of envelopes, then the number of ciphertext envelope and sent to the receiver at the same time, the receiving party by the opposite clear direction after decryption.
2. Digital signature technology. Digital signature is generated through specific password computing the composition of a series of symbols and codes for a signature key, to replace the written signature or seal, this electronic signature technology can also be carried out to verify, verify the accuracy of its general manual signature and verification seal unmatched. Digital signature technology to ensure the integrity of information transfer and non-repudiation.
3. Accreditation agencies as well as digital certificates. E-commerce transactions e to the general users will not have face to face, so the two sides of the transaction identification is to protect the safety of the premise of e-commerce transactions. Certification body is a public and credible third party to confirm the identity of both parties, the digital certificate is signed by the certification body, including the identity of the owner of public key information as well as the public key of the document. Paid in the transaction process, participants must use the Certification Center of the digital certificate issued to prove his identity.
4. The use of Secure Electronic Transaction protocol (SET: Secure Electronic Transactions). By two major credit cards VISA and MasterCard standards organizations. SET for the division of e-commerce activities and to define the rights and obligations of the parties to the relationship between a given transaction information transmission process standards. SET protocol guarantees the confidentiality of e-commerce systems, integrity, non-repudiation of the legitimacy and identity.

⑻ 电子商务论文参考文献

1 对话下半场:建立健全电子商务领域金融秩序 电子商务 2007/01 2 携程电子商务模式组成要素分析 电子商务 2007/01 3 电子商务经营模式给企业带来了什么 电子商务 2007/01 4 服务中小企业的第三方电子商务模式研究 电子商务 2007/01 5 电子商务中《消费者权益保护法》适格主体研究 电子商务 2007/01 6 谈新就业形势下的职业院校电子商务专业建设 电子商务 2007/01 7 浅谈物资采购的电子商务化 电子科技 2007/01 8 中国电信新一代B2B电子商务网站商集网上线运营 互联网周刊 2007/02 9 Web数据挖掘在零售业电子商务中的应用 经济师 2007/01 10 电子商务环境下的税收 经济师 2007/01 11 试论电子商务物流隐性成本控制 经济师 2007/01 12 破除制约我国电子商务发展的四大瓶颈 通信世界 2007/02 13 电子商务代表网站及业务模式分析 通信世界 2007/02 14 组建基于企业服务总线的电子商务集成系统研究 计算机应用与软件 2007/01 15 基于SOAP的即时消息在B2C电子商务系统中的应用 计算机应用与软件 2007/01 16 电子商务对会计的影响及电子商务会计的发展 会计之友(中) 2007/01 17 电子商务中数据挖掘技术的使用 内蒙古电大学刊 2007/02 秘书之家 http://www.clerkhome.com18 电子商务专业毕业生就业率低的原因及其对策 内蒙古电大学刊 2007/02 19 浅谈烟草行业电子商务 华北、东北地区2007年度烟草学术交流研讨会论文集 2007 20 B2C电子商务模式下物流配送路径优化问题研究 北京交通大学 2007 21 电子商务环境下传统企业流程变革研究 同济大学 2007 22 浅析电子商务诚信体系的构建与实现 商场现代化 2007/01 23 基于电子商务的供应链管理研究 商场现代化 2007/01 24 电子商务体系结构与电子支付技术 商场现代化 2007/01 25 论新农村建设中农业电子商务的发展战略 商场现代化 2007/01 26 旅游电子商务网站的构建 商场现代化 2007/01 27 分销商网络团购营销的电子商务模型研究 商场现代化 2007/01 28 电子商务及其安全技术 商场现代化 2007/01 29 浅析电子商务的安全 商场现代化 2007/01 30 Web 2.0技术在电子商务中的应用 商场现代化 2007/01

⑼ 急需有关于电子商务O2O模式毕业论文的中英文参考文献!

我这边才整理好,文献和范本。。。。你看合适吗