Abstract
The trend of economic electronization is deepening, and economic and technological exchanges among countries around the world are becoming more frequent. Under this background, the competition among various industries is becoming more and more fierce. This situation promotes the innovation of technology and business philosophy in many fields. E-commerce is gradually replacing the traditional business model in this period. However, because e-commerce needs to be realized through the Internet, its security has always been the focus of attention. In order to ensure the healthy development of e-commerce, effective measures must be taken to ensure the safe operation of the whole process of e-commerce. This paper will study the security of e-commerce information management system from the perspective of influencing factors and effective measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yang, S., J. Han, J. Li, et al. 2018. Identity-based undetachable digital signature for mobile agents in electronic commerce. Soft Computing 22: 1–15.
Al-Jaljouli, R., J. Abawajy, M. M. Hassan, et al. 2016. Secure multi-attribute one-to-many bilateral negotiation framework for e-commerce. IEEE Transactions on Services Computing 11: 1–1.
Farash, M. S., S. A. Chaudhry, M. Heydari, et al. 2017. A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. International Journal of Communication Systems 30 (4): n/a-n/a.
Alsaad, A., R. Mohamad, and N.A. Ismail. 2017. The moderating role of trust in business to business electronic commerce (B2B EC) adoption. Computers in Human Behavior 68: 157–169.
Zhang, Sheng-fu. 2017. Electronic commerce commodity entity identities based on hierarchical probability model. Cluster Computing.
Hartono, E., C.W. Holsapple, K.Y. Kim, et al. 2014. Measuring perceived security in B2C electronic commerce website usage: A respecification and validation. Decision Support Systems 62 (1246): 11–21.
Yoon, H.S., and L.G. Occeña. 2015. Influencing factors of trust in consumer-to-consumer electronic commerce with gender and age. International Journal of Information Management 35 (3): 352–363.
Djuric, Z., and D. Gasevic. 2015. FEIPS: A secure fair-exchange payment system for internet transactions. Computer Journal 58 (10): 25–37.
Wang, J., W.M. Deng, and X.Y. Yin. 2016. Electronic commerce recommendation mobile crowd system based on cooperative data collection and embedded control. EURASIP Journal on Embedded Systems 2016 (1): 3–9.
Royan, B. 2013. Electronic commerce and the Scottish cultural resources access network. Vine 30 (3): 41–43.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, H., Xue, W. (2020). Application of E-Commerce Network Security Technology. In: Huang, C., Chan, YW., Yen, N. (eds) Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019). Advances in Intelligent Systems and Computing, vol 1088. Springer, Singapore. https://doi.org/10.1007/978-981-15-1468-5_75
Download citation
DOI: https://doi.org/10.1007/978-981-15-1468-5_75
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1467-8
Online ISBN: 978-981-15-1468-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)