Skip to main content

Application of E-Commerce Network Security Technology

  • Conference paper
  • First Online:
Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1088))

Abstract

The trend of economic electronization is deepening, and economic and technological exchanges among countries around the world are becoming more frequent. Under this background, the competition among various industries is becoming more and more fierce. This situation promotes the innovation of technology and business philosophy in many fields. E-commerce is gradually replacing the traditional business model in this period. However, because e-commerce needs to be realized through the Internet, its security has always been the focus of attention. In order to ensure the healthy development of e-commerce, effective measures must be taken to ensure the safe operation of the whole process of e-commerce. This paper will study the security of e-commerce information management system from the perspective of influencing factors and effective measures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Yang, S., J. Han, J. Li, et al. 2018. Identity-based undetachable digital signature for mobile agents in electronic commerce. Soft Computing 22: 1–15.

    Google Scholar 

  2. Al-Jaljouli, R., J. Abawajy, M. M. Hassan, et al. 2016. Secure multi-attribute one-to-many bilateral negotiation framework for e-commerce. IEEE Transactions on Services Computing 11: 1–1.

    Article  Google Scholar 

  3. Farash, M. S., S. A. Chaudhry, M. Heydari, et al. 2017. A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. International Journal of Communication Systems 30 (4): n/a-n/a.

    Article  Google Scholar 

  4. Alsaad, A., R. Mohamad, and N.A. Ismail. 2017. The moderating role of trust in business to business electronic commerce (B2B EC) adoption. Computers in Human Behavior 68: 157–169.

    Article  Google Scholar 

  5. Zhang, Sheng-fu. 2017. Electronic commerce commodity entity identities based on hierarchical probability model. Cluster Computing.

    Article  Google Scholar 

  6. Hartono, E., C.W. Holsapple, K.Y. Kim, et al. 2014. Measuring perceived security in B2C electronic commerce website usage: A respecification and validation. Decision Support Systems 62 (1246): 11–21.

    Article  Google Scholar 

  7. Yoon, H.S., and L.G. Occeña. 2015. Influencing factors of trust in consumer-to-consumer electronic commerce with gender and age. International Journal of Information Management 35 (3): 352–363.

    Article  Google Scholar 

  8. Djuric, Z., and D. Gasevic. 2015. FEIPS: A secure fair-exchange payment system for internet transactions. Computer Journal 58 (10): 25–37.

    Article  Google Scholar 

  9. Wang, J., W.M. Deng, and X.Y. Yin. 2016. Electronic commerce recommendation mobile crowd system based on cooperative data collection and embedded control. EURASIP Journal on Embedded Systems 2016 (1): 3–9.

    Article  Google Scholar 

  10. Royan, B. 2013. Electronic commerce and the Scottish cultural resources access network. Vine 30 (3): 41–43.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weixian Xue .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, H., Xue, W. (2020). Application of E-Commerce Network Security Technology. In: Huang, C., Chan, YW., Yen, N. (eds) Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019). Advances in Intelligent Systems and Computing, vol 1088. Springer, Singapore. https://doi.org/10.1007/978-981-15-1468-5_75

Download citation

Publish with us

Policies and ethics