Skip to main content
Top

2023 | OriginalPaper | Chapter

9. Supervision and Optimization Mechanism of E-commerce Security Management

Authors : Ronggang Zhang, Lijuan Fang, Xiaoping He, Chuan Wei

Published in: The Whole Process of E-commerce Security Management System

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Maintaining network security requires the participation of the government, enterprises, social organizations, and the majority of Internet users. This chapter analyzes the supervision mechanism of e-commerce safety management, and discusses the power mechanism and realization mechanism of e-commerce safety management supervision. This paper analyzes the optimization mechanism of e-commerce security management, discusses the basic content, implementation premise, and implementation path of e-commerce security management optimization.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hou A, Fang L (2020) E-commerce security management. Wuhan University Press, Wuhan Hou A, Fang L (2020) E-commerce security management. Wuhan University Press, Wuhan
2.
go back to reference Chen B, L Yu (eds) (2020) Principle and technology of computer system security, 4th edn. China Machine Press, Beijing Chen B, L Yu (eds) (2020) Principle and technology of computer system security, 4th edn. China Machine Press, Beijing
3.
go back to reference Chen B, L Yu (eds) (2021) Information Security case course: technology and Application, 2nd edn. China Machine Press, Beijing Chen B, L Yu (eds) (2021) Information Security case course: technology and Application, 2nd edn. China Machine Press, Beijing
4.
go back to reference Zhang B, Zhu Y (eds) (2020) E-commerce security, 2nd edn. China Machine Press, Beijing Zhang B, Zhu Y (eds) (2020) E-commerce security, 2nd edn. China Machine Press, Beijing
5.
go back to reference Wang C, Tao L, Gou Y (2014) Information security policies and regulations. Northwestern Polytechnical University Press, Xi'an Wang C, Tao L, Gou Y (2014) Information security policies and regulations. Northwestern Polytechnical University Press, Xi'an
6.
go back to reference Qin C (2012) E-commerce security management. China Machine Press, Beijing Qin C (2012) E-commerce security management. China Machine Press, Beijing
7.
go back to reference Chen C, Zhou X (eds) (2012) Principles of management, 2nd edn. China Machine Press, Beijing Chen C, Zhou X (eds) (2012) Principles of management, 2nd edn. China Machine Press, Beijing
8.
go back to reference Zhang C (2016) E-commerce experiment course. Tsinghua University Press, Beijing Zhang C (2016) E-commerce experiment course. Tsinghua University Press, Beijing
9.
go back to reference Feng X (2017) E-commerce security principle. Tsinghua University Press, Beijing Feng X (2017) E-commerce security principle. Tsinghua University Press, Beijing
10.
go back to reference Lao G (2016) E-commerce security and management, 3rd edn. Higher Education Press, Beijing Lao G (2016) E-commerce security and management, 3rd edn. Higher Education Press, Beijing
11.
go back to reference Cai H (2015) Principles and legal practice of Internet finance. Shanghai Jiao Tong University Press, Shanghai Cai H (2015) Principles and legal practice of Internet finance. Shanghai Jiao Tong University Press, Shanghai
12.
go back to reference High legislation (ed) (2016) Enterprise comprehensive risk management practice, 4th edn. Economy & Management Publishing House, Beijing High legislation (ed) (2016) Enterprise comprehensive risk management practice, 4th edn. Economy & Management Publishing House, Beijing
13.
go back to reference Xiang H, Fu L, Zhan B (2014) Information security assessment and risk assessment, 2nd edn. Electronic Publishing House of Electronics Industry, Beijing Xiang H, Fu L, Zhan B (2014) Information security assessment and risk assessment, 2nd edn. Electronic Publishing House of Electronics Industry, Beijing
15.
go back to reference Liu H (2014) Traditional network and modern network security. Electronic Publishing House of Electronics Industry, Beijing Liu H (2014) Traditional network and modern network security. Electronic Publishing House of Electronics Industry, Beijing
16.
go back to reference Jihua X, Feng Q, Chen Z (2014) The advent of the era of the wise government big data. CITIC Press, Beijing Jihua X, Feng Q, Chen Z (2014) The advent of the era of the wise government big data. CITIC Press, Beijing
17.
go back to reference Zhang J, Wang K, Liu Y (2021) Research on risk management of mobile commerce. China Science Publishing & Media Ltd., Beijing Zhang J, Wang K, Liu Y (2021) Research on risk management of mobile commerce. China Science Publishing & Media Ltd., Beijing
18.
go back to reference Sun J (2013) Ministry of security. Electronic Publishing House of Electronics Industry, Beijing Sun J (2013) Ministry of security. Electronic Publishing House of Electronics Industry, Beijing
19.
go back to reference Li J, Zeng F (2015) E-commerce dispute cases and practice. Tsinghua University Press, Beijing Li J, Zeng F (2015) E-commerce dispute cases and practice. Tsinghua University Press, Beijing
20.
go back to reference Wei K, Weng J, Ren K (2016) Overview of big data security protection technology. Chin J Netw Inf Secur 4:1–11 Wei K, Weng J, Ren K (2016) Overview of big data security protection technology. Chin J Netw Inf Secur 4:1–11
21.
go back to reference Shi L, Zhao H (2015) Network security and management, 2nd edn. Tsinghua University Press, Beijing Shi L, Zhao H (2015) Network security and management, 2nd edn. Tsinghua University Press, Beijing
22.
go back to reference Zhu L (2014) E-commerce security, 2nd edn. Tsinghua University Press, Beijing Zhu L (2014) E-commerce security, 2nd edn. Tsinghua University Press, Beijing
23.
go back to reference He P, Che Y (2017) Big data finance and credit. Tsinghua University Press, Beijing He P, Che Y (2017) Big data finance and credit. Tsinghua University Press, Beijing
24.
go back to reference Zhang S, Pan R, Zong Y (2016) Big data governance and service. Shanghai Scientific & Technical Publishers, Shanghai Zhang S, Pan R, Zong Y (2016) Big data governance and service. Shanghai Scientific & Technical Publishers, Shanghai
25.
go back to reference Stephen, PR, Mary C (2011) Management. Pearson, New York. Chinese edition: Stephen P. R, Mary C (2017) Management (trans: Liu G, Cheng X, Liang H, et al). China people's University Press, Beijing Stephen, PR, Mary C (2011) Management. Pearson, New York. Chinese edition: Stephen P. R, Mary C (2017) Management (trans: Liu G, Cheng X, Liang H, et al). China people's University Press, Beijing
26.
go back to reference Jia T, Hong L (2019) Network security management and practical technology. China Machine Press, Beijing Jia T, Hong L (2019) Network security management and practical technology. China Machine Press, Beijing
27.
go back to reference Toffler A (1984) The third wave. Bantam, New York. Chinese edition: Toffler A (2018) The third wave (trans: Huang M). CITIC Press, Beijing Toffler A (1984) The third wave. Bantam, New York. Chinese edition: Toffler A (2018) The third wave (trans: Huang M). CITIC Press, Beijing
28.
go back to reference Bi W (2013) Network department. Electronic Publishing House of Electronics Industry, Beijing Bi W (2013) Network department. Electronic Publishing House of Electronics Industry, Beijing
29.
go back to reference Bai W (2014) Construction of enterprise risk management system. Shanghai Jiao Tong University Press, Shanghai Bai W (2014) Construction of enterprise risk management system. Shanghai Jiao Tong University Press, Shanghai
30.
go back to reference Xi X, Ju C, Liu K (2009) E-commerce security and law. Economic China Science Publishing & Media Ltd., Beijing Xi X, Ju C, Liu K (2009) E-commerce security and law. Economic China Science Publishing & Media Ltd., Beijing
31.
go back to reference Meng X (2014) E-commerce security management and payment. Tsinghua University Press, Beijing Meng X (2014) E-commerce security management and payment. Tsinghua University Press, Beijing
32.
go back to reference Zhang X (2017) Big data risk control. China Machine Press, Beijing Zhang X (2017) Big data risk control. China Machine Press, Beijing
33.
go back to reference Liu X (2014) Risk management, 2nd edn. Peking University Press, Beijing Liu X (2014) Risk management, 2nd edn. Peking University Press, Beijing
34.
go back to reference Wu Y, Zhang X, Zhang J (eds) (2016) Enterprise risk management, 2nd edn. Tsinghua University Press, Beijing Wu Y, Zhang X, Zhang J (eds) (2016) Enterprise risk management, 2nd edn. Tsinghua University Press, Beijing
35.
go back to reference Xiaohong Y, Ai J (2017) Computer network security practice course. Universitv of Electronic Science and Technology of China Press, Chengdu Xiaohong Y, Ai J (2017) Computer network security practice course. Universitv of Electronic Science and Technology of China Press, Chengdu
36.
go back to reference Zhao Y, Zhao H, Hu Q (eds) (2016) Advanced guide for internet enterprise security. China Machine Press, Beijing Zhao Y, Zhao H, Hu Q (eds) (2016) Advanced guide for internet enterprise security. China Machine Press, Beijing
37.
go back to reference Guo Y, Xu G, Zhang Y (eds) (2017) Information security management, 3rd edn. Beijing University of posts and Telecommunications Press, Beijing Guo Y, Xu G, Zhang Y (eds) (2017) Information security management, 3rd edn. Beijing University of posts and Telecommunications Press, Beijing
40.
go back to reference Xiao Y, Liu B, Xu G (2015) Analysis of mobile internet security technology. China Science Publishing & Media Ltd., Beijing Xiao Y, Liu B, Xu G (2015) Analysis of mobile internet security technology. China Science Publishing & Media Ltd., Beijing
41.
go back to reference Shan Z, Guo Z (2010) E-commerce security and management. China Renmin University Press, Beijing Shan Z, Guo Z (2010) E-commerce security and management. China Renmin University Press, Beijing
Metadata
Title
Supervision and Optimization Mechanism of E-commerce Security Management
Authors
Ronggang Zhang
Lijuan Fang
Xiaoping He
Chuan Wei
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-9458-6_9