Skip to main content

Controlling Information Risk in E-commerce

  • Chapter
  • First Online:
The Whole Process of E-commerce Security Management System

Part of the book series: Advanced Studies in E-Commerce ((ASEC))

  • 208 Accesses

Abstract

“The wise hear in silence, the wise see in the invisible”, which illustrates the importance of e-commerce enterprises to prevent information security risks. This chapter presents the information security risk management process, participants, and their responsibilities, and explains what is information security risk assessment. This paper introduces the form of information security risk assessment, the process of information security risk assessment, as well as the process and method of information security risk disposal, and analyzes the information security risk control measures, mainly including technical measures and normative measures. Among them, technical measures include cryptography, key management technology, network encryption and information protection technology, emerging encryption technology, digital signature technology, authentication technology, digital certificates, and public key infrastructure, while normative measures include information security management measures, information security management organizations, information security standards, information security laws and regulations, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang C (2016) Information security management and engineering. Tsinghua University Press, Beijing

    Google Scholar 

  2. Zhang J (ed) (2016) Information security risk management. Universitv of Electronic Science and Technology of China Press, Chengdu

    Google Scholar 

  3. Liu J (2020) Introduction to cyberspace security. Tsinghua University Press, Beijing

    Google Scholar 

  4. Wang L (2015) Security technology of electronic commerce. Electronic Publishing House of Electronics Industry, Beijing

    Google Scholar 

  5. Whitman ME, Mattord HJ (2004) Management of information security. Thomson Learning, New York. Chinese edition: Whitman ME, Mattord HJ (2005) Management of information security (trans: Xiang H, Fu L). Chongqing University Press, Chongqing

    Google Scholar 

  6. Yan Q, Hu T, Lu Y (2007) E-commerce security management. China Machine Press, Beijing

    Google Scholar 

  7. Tang S (ed) (2013) E-commerce security. Tsinghua University Press, Beijing

    Google Scholar 

  8. Chen X, Yang L, Luo Y (2017) Big data security protection technology. Adv Eng Sci 5:1–12.https://doi.org/10.15961/j.jsuese.201700726

  9. Chen Z (ed) (2017) Information security standards and laws and regulations, 3rd edn. Wuhan University Press, Wuhan

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ronggang Zhang .

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zhang, R., Fang, L., He, X., Wei, C. (2023). Controlling Information Risk in E-commerce. In: The Whole Process of E-commerce Security Management System . Advanced Studies in E-Commerce. Springer, Singapore. https://doi.org/10.1007/978-981-19-9458-6_4

Download citation

Publish with us

Policies and ethics