• 首页>范文 > 范文
  • 电子商务类英文文献综述范文

    1.求关于电子商务的外文参考文献目录,至少五篇写论文要用的,谢谢

    [1]《E-commerce: the role of familiarity and trust》D Gefen - Omega, 2013

    [2]《What trust means in e-commerce customer relationships: aninterdisciplinary conceptual typology》DH McKnight,2014

    [3]《 Fuzzy decision support system for risk analysis in e-commercedevelopment》EWT Ngai, 2013

    [4]《 Interactive decision aids for consumer decision making ine-commerce: the influence of perceived strategy restrictiveness》W Wang, 2015

    [5]W.R.Cornish.Intellectual Property[M].ll.Sweet&Maxwe,2013

    希望能对你有所帮助

    2.关于电子商务安全的英文参考文献

    电子商务安全技术的分析与研究2007-10-12 With the network technology and the rapid development of information technology, e-commerce has been growing a wide range of applications, more and more businesses and individuals rely on e-commerce users quick and efficient. It appears not only to the development and expansion of Internet has provided a new opportunity, but also to the business community into a great power. But e-commerce is based on vector-based computer network and a large number of important status information, accounting information, transaction information needed to carry out in-line transmission, in such circumstances, security issues become a priority issue. Second, the current e-commerce security issues 1. Network protocol security issue: At present, TCP / IP protocol is the most widely used network protocol, but TCP / IP itself, characterized by openness, enterprise and users of electronic transactions in the course of the data is the form of packet transmission, malicious attackers can easily launch an e-commerce site to a packet interception, or even modify the data packets and counterfeiting. 2. Users of information security issues: At present, the most important form of e-commerce is based on B / S (Browser / Server) structure of the e-commerce sites, users log on using the browser network transactions, as a result of the user in the registry may be used in public computer, such as Internet cafes, offices, computers, etc., then if they have a malicious Trojan horse computer program or virus, the user's login information such as user names, passwords may be the risk of loss. 3. E-commerce Web site security issue: that there are some companies established themselves in the design of e-commerce site will have a number of production security, server operating system itself, there will be loopholes, unscrupulous attackers to enter the e-commerce site if a large number of user information and transaction information will be stolen, enterprises and users to incalculable losses. C, e-commerce security requirements 1. The effectiveness of service requirements: e-commerce system should be able to prevent the occurrence of service failures to prevent failure due to network attacks and viruses and other system factors such as suspension of services to ensure that transaction data can be transmitted quickly and accurately. 2. Trading requirements of the confidentiality of information: e-commerce systems to deal with the information sent by users of encryption to effectively prevent the interception of information to decipher, at the same time to prevent unauthorized access to information. 3. Data integrity requirements: the number refers to the integrity of data processing, the original data and existing data is fully consistent between. In order to safeguard the seriousness of business dealings and fair, the transaction documents is not being modified, there will be damage to the commercial interests of the party. 4. The requirements of authentication: e-commerce systems should provide safe and effective authentication mechanism to ensure that transaction information between the two sides are legitimate and effective in order to avoid trade disputes, to provide a legal basis. D, e-commerce security measures 1. Data encryption technology. Data encryption is the most basic e-commerce information system security precautions. The principle is that information on the use of encryption algorithm will be converted into explicit rules according to a certain encryption ciphertext generated after the transmission, thus ensuring the confidentiality of data. The use of data encryption technology can solve the information requirements of the confidentiality of its own. Data encryption technology can be divided into symmetric key encryption and asymmetric key encryption. (1) symmetric key encryption (SecretKeyEncryption). Symmetric key encryption also known as secret / Private key encryption, that is, send and receive data between the parties must use the same key for encryption and decryption explicitly computing. Its advantage is encryption, decryption speed, suitable for large amount of data encryption, to ensure data confidentiality and integrity; drawback is that when the large number of users, distribution and management is very difficult to key on. (2) non-symmetric key encryption (PublicKeyEncryption). Non-symmetric-key encryption also known as public key encryption, it mainly refers to each person only has a pair of corresponding keys: public key (the public key) and private key (the private key) public key public, private saved by the personal 。

    3.电子商务英文文献

    Electronic commerce, commonly known as e-commerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily since the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.A large percentage of electronic commerce is conducted entirely electronically for virtual items such as access to premium content on a website, but most electronic commerce involves the transportation of physical items in some way. online retailers are sometimes known as e-tailers and online retail is sometimes known as e-tail. Almost all big retailers have electronic commerce presence on the World Wide Web.Electronic commerce that is conducted between businesses is referred to as Business-to-business or B2B. B2B can be open to all interested parties (e.g. commodity exchange) or limited to specific, pre-qualified participants (private electronic market).Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of the business transactions.History Early development The meaning of electronic commerce has changed over the last 30 years. Originally, electronic commerce meant the facilitation of commercial transactions electronically, using technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). These were both introduced in the late 1970s, allowing businesses to send commercial documents like purchase orders or invoices electronically. The growth and acceptance of credit cards, automated teller machines (ATM) and telephone banking in the 1980s were also forms of electronic commerce. From the 1990s onwards, electronic commerce would additionally include enterprise resource planning systems (ERP), data mining and data warehousing.Perhaps it is introduced from the Telephone Exchange Office, or maybe not.The earliest example of many-to-many electronic commerce in physical goods was the Boston Computer Exchange, a marketplace for used computers launched in 1982. The first online information marketplace, including online consulting, was likely the American Information Exchange, another pre-Internet online system introduced in 1991.Timeline1990: Tim Berners-Lee wrote the first web browser, WorldWideWeb, using a NeXT computer. 1992: J.H. Snider and Terra Ziporyn published Future Shop: How New Technologies Will Change the Way We Shop and What We Buy. St. Martin's Press. ISBN 0312063598. 1994: Netscape released the Navigator browser in October under the code name Mozilla. Pizza Hut offered pizza ordering on its Web page. The first online bank opened. Attempts to offer flower delivery and magazine subscriptions online. Adult materials were also commercially available, as were cars and bikes. Netscape 1.0 in late 1994 introduced SSL encryption that made transactions secure. 1995: Jeff Bezos launched Amazon.com and the first commercial-free 24 hour, internet-only radio stations, Radio HK and NetRadio started broadcasting. Dell and Cisco began to aggressively use Internet for commercial transactions. eBay was founded by computer programmer Pierre Omidyar as AuctionWeb. 1998: Electronic postal stamps can be purchased and downloaded for printing from the Web. 1999: business.com was sold for US $7.5 million, which was purchased in 1997 for US $150,000. The peer-to-peer filesharing software Napster was launched. 2000: The dot-com bust. 2003: Amazon.com had its first year with a full year of profit. Business applications Some common applications related to electronic commerce are:E-mail and messaging documents, spreadsheets, database Accounting and finance systems Orders and shipment information Enterprise and client information reporting Domestic and international payment systems Newsgroup On-line Shopping Messaging Conferencing Government regulations In the United States, some electronic commerce activities are regulated by the 。

    4.电子商务英文文献

    Electronic commerce, commonly known as e-commerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily since the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.A large percentage of electronic commerce is conducted entirely electronically for virtual items such as access to premium content on a website, but most electronic commerce involves the transportation of physical items in some way. online retailers are sometimes known as e-tailers and online retail is sometimes known as e-tail. Almost all big retailers have electronic commerce presence on the World Wide Web.Electronic commerce that is conducted between businesses is referred to as Business-to-business or B2B. B2B can be open to all interested parties (e.g. commodity exchange) or limited to specific, pre-qualified participants (private electronic market).Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of the business transactions.HistoryEarly developmentThe meaning of electronic commerce has changed over the last 30 years. Originally, electronic commerce meant the facilitation of commercial transactions electronically, using technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). These were both introduced in the late 1970s, allowing businesses to send commercial documents like purchase orders or invoices electronically. The growth and acceptance of credit cards, automated teller machines (ATM) and telephone banking in the 1980s were also forms of electronic commerce. From the 1990s onwards, electronic commerce would additionally include enterprise resource planning systems (ERP), data mining and data warehousing.Perhaps it is introduced from the Telephone Exchange Office, or maybe not.The earliest example of many-to-many electronic commerce in physical goods was the Boston Computer Exchange, a marketplace for used computers launched in 1982. The first online information marketplace, including online consulting, was likely the American Information Exchange, another pre-Internet online system introduced in 1991.Timeline1990: Tim Berners-Lee wrote the first web browser, WorldWideWeb, using a NeXT computer. 1992: J.H. Snider and Terra Ziporyn published Future Shop: How New Technologies Will Change the Way We Shop and What We Buy. St. Martin's Press. ISBN 0312063598. 1994: Netscape released the Navigator browser in October under the code name Mozilla. Pizza Hut offered pizza ordering on its Web page. The first online bank opened. Attempts to offer flower delivery and magazine subscriptions online. Adult materials were also commercially available, as were cars and bikes. Netscape 1.0 in late 1994 introduced SSL encryption that made transactions secure. 1995: Jeff Bezos launched Amazon.com and the first commercial-free 24 hour, internet-only radio stations, Radio HK and NetRadio started broadcasting. Dell and Cisco began to aggressively use Internet for commercial transactions. eBay was founded by computer programmer Pierre Omidyar as AuctionWeb. 1998: Electronic postal stamps can be purchased and downloaded for printing from the Web. 1999: business.com was sold for US $7.5 million, which was purchased in 1997 for US $150,000. The peer-to-peer filesharing software Napster was launched. 2000: The dot-com bust. 2003: Amazon.com had its first year with a full year of profit. Business applicationsSome common applications related to electronic commerce are:E-mail and messaging documents, spreadsheets, database Accounting and finance systems Orders and shipment information Enterprise and client information reporting Domestic and international payment systems Newsgroup On-line Shopping Messaging Conferencing Government regulationsIn the United States, some electronic commerce activities are regulated by the Federa。

    5.急求电子商务相关参考文献,英文的,只要只要标题和作者

    标题、作者、年份

    《E-commerce: the role of familiarity and trust》

    D Gefen - Omega, 2000

    《What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology》

    DH McKnight,2001

    《 Fuzzy decision support system for risk analysis in e-commerce development》

    EWT Ngai, 2005

    《 Interactive decision aids for consumer decision making in e-commerce: the influence of perceived strategy restrictiveness》

    W Wang, 2009

    6.求电子商务方面的英文文献或论文,翻译成汉字大约3000字

    Ecommerce Security IssuesCustomer Security: Basic PrinciplesMost ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements: privacy: information must be kept from unauthorized parties.integrity: message must not be altered or tampered with.authentication: sender and recipient must prove their identities to each other.non-repudiation: proof is needed that the message was indeed received.Privacy is handled by encryption. In PKI (public key infrastructure) a message is encrypted by a public key, and decrypted by a private key. The public key is widely distributed, but only the recipient has the private key. For authentication (proving the identity of the sender, since only the sender has the particular key) the encrypted message is encrypted again, but this time with a private key. Such procedures form the basis of RSA (used by banks and governments) and PGP (Pretty Good Privacy, used to encrypt emails).Unfortunately, PKI is not an efficient way of sending large amounts of information, and is often used only as a first step — to allow two parties to agree upon a key for symmetric secret key encryption. Here sender and recipient use keys that are generated for the particular message by a third body: a key distribution center. The keys are not identical, but each is shared with the key distribution center, which allows the message to be read. Then the symmetric keys are encrypted in the RSA manner, and rules set under various protocols. Naturally, the private keys have to be kept secret, and most security lapses indeed arise here.:Digital Signatures and CertificatesDigital signatures meet the need for authentication and integrity. To vastly simplify matters (as throughout this page), a plain text message is run through a hash function and so given a value: the message digest. This digest, the hash function and the plain text encrypted with the recipient's public key is sent to the recipient. The recipient decodes the message with their private key, and runs the message through the supplied hash function to that the message digest value remains unchanged (message has not been tampered with). Very often, the message is also timestamped by a third party agency, which provides non-repudiation.What about authentication? How does a customer know that the website receiving sensitive information is not set up by some other party posing as the e-merchant? They check the digital certificate. This is a digital document issued by the CA (certification authority: Verisign, Thawte, etc.) that uniquely identifies the merchant. Digital certificates are sold for emails, e-merchants and web-servers.:Secure Socket LayersInformation sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. Individual packets are sent by different routes. TCP/IP reassembles them in order and resubmits any packet showing errors. SSL uses PKI and digital certificates to ensure privacy and authentication. The procedure is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. once the session keys are agreed, communication continues with these session keys and the digital certificates.:PCI, SET, Firewalls and KerberosCredit card details can be safely sent with SSL, but once stored on the server they are vulnerable to outsiders hacking into the server and accompanying network. A PCI (peripheral component interconnect: hardware) card is often added for protection, therefore, or another approach altogether is adopted: SET (Secure Electronic Transaction). Developed by Visa and Mastercard, SET uses PKI for privacy, and digital certificates to authenticate the three parties: merchant, customer and bank. More importantly, sensitive information is not seen by the merchant, and is not kept on the merchant's server.Firewalls (software or hardware) protect a server, a network and an individual PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees.TransactionsSensitive information has to be protected through at least three transactions:credit card details s。

    7.高分急求求一篇关于电子商务的英文文献``

    An additional question is how a marketer could design websites that truly personalize product recommendations and how consumers react to these versus more neutral, “third party” web sites such as for automobiles. we address the issue of the structure of one new tool (i.e., e-mail) that can help marketers be more efficient in testing direct marketing efforts. direct marketing Furthermore, work by Haubl and Trifts (2000) showed that a comparison matrix similar to the comparator produced higher quality consideration sets and decisions. the possibility remains that providing information could postpone or even prevent purchase. Agents are not new; a crude (by today's standards) agent, Firefly, was developed in the mid-1990s for movie and music recommendations. the amount of information available on the Web has increased dramatically as has the technological sophistication of the agents which makes continued research in this area important. In particular, Haubl and Trifts (2000) show that recommender agents based on self-explicatedinformation about a consumer's utility function (i.e., attribute weights and minimum acceptable attribute levels) reduce search effort and improve decisions. Agents should be adaptive, autonomous, and believable, be able to respond in a timely fashion, and be goal-oriented. It has also been established that agents, like those studied by H¨aubl and his colleagues, that learn about consumers from choices and consumer preferences perform better in the long run than (say) collaborative filters (Ariely et al., 2004). This suggests that methods that calibrate consumer preferences in real time on-line are crucial to advancement. polyhedral conjoint analysis (Toubia et al., 2003) satisfies these criteria. Liechty and his colleagues developed a Hierarchical Bayes procedure that does so as well. Montgomery et al. (2004) address the problem of designing a better shopbot. They show that shopbots are inferior to visiting a favorite retailer if the shopbot visits all retailers. Indeed, armed with some inferences from previous visits, a small set of initial screener questions can lead to an optimally personalized web interface for the consumer. based on a stochastic duration model and Bayesian updating , the authors adapt the testing parameters (e.g., number of e-mails sent for each e-mail design and sending rate) while the testing is in progress so as to minimize the cost of testing both in terms of wasted e-mails and time. only if the interactivity pays off. In bargaining or auction situations, possible lack of trust and the inability to interpret the signalsof the other participant(s).Managing Channels of Distribution Under the Environment of Electronic Commerce 【英文篇名】 Managing Channels of Distribution Under the Environment of Electronic Commerce 【作者英文名】 ZHENG Bing~1 FENG Yixiong~2 1.College of Economics & Management; Dalian University; Dalian 116622; China 2.State Key Laboratory of CAD&CG; Zhejiang University; Hangzhou 310027; China; 【文献出处】 武汉理工大学学报, Journal of WuhanUniversity of Technology, 编辑部邮箱 2006年 S2期 【英文关键词】 marketing channels; distribution strategy; customer demand; electronic commerce; Fair E-Payment Protocol based on Simple Partially Blind Signature Scheme 【英文篇名】 Fair E-Payment Protocol based on Simple Partially Blind Signature Scheme 【作者英文名】 LIU Jingwei; SUN Rong; KOU Weidong State Key Laboratory of Integrated Service Networks; Xidian University; Xi'an 710071; Shaanxi; China; 【文献出处】 Wuhan University Journal of Natural Sciences, 武汉大学自然科学学报(英文版), 编辑部邮箱 2007年 01期 【英文关键词】 electronic commerce; e-payment; Schnorr signature; partial blind signature; 【英文摘要】 This paper presents a simple partially blind signature scheme with low computation. By converse using the partially blind signature scheme, we build a simple fair e-payment protocol. In the protocol, two participants achieve the goals of exchanging their digital signatures from each other in a simple way. An ad- vantage of this scheme is that this approach does not require the intervention of the third party in any case. The low-computation property makes our scheme very attractive for mobile client and sma。

    8.电子商务毕业论文英文摘要

    要电子商务的普及是必然的趋势,它不仅仅是一个销售渠道,一种新的生产经营方式。

    认为随着传统企业开展电子商务的深入。熊彼特指出,其对企业商业模式的影响也是一个由外层—中层—内层的层层递进的过程,传统企业电子商务化的过程中必须遵循这一规律,才能收到较好效果,随着“新的生产函数”的出现,进一步研究了企业电子商务化如何影响固有商业模式,市场与企业都需要以新的商业模式来更新和取代旧的商业模式,这一过程被他称为“创造性的破坏”。

    本文在对传统企业商业模式基本构成系统分析的基础上,从商业模式的内、中、外三层详细讨论了企业开展电子商务对其本身固有商业模式的影响,并结合传统企业成功开展电子商务的两个案例分析,对传统企业开展电子商务的层次进行了阶段性划分,最后对其如何开展电子商务提出了一些对策和建议,而且将带来一场商业革命。

    发表评论

    登录后才能评论