Skip to main content
Top

2023 | Book

The Whole Process of E-commerce Security Management System

Design and Implementation

Authors: Ronggang Zhang, Lijuan Fang, Xiaoping He, Chuan Wei

Publisher: Springer Nature Singapore

Book Series : Advanced Studies in E-Commerce

share
SHARE
insite
SEARCH

About this book

​This book systematically and integrally introduces the new security management theories and methods in the e-commerce environment. Based on the perspective of dynamic governance of the whole process, starting from the theoretical framework, this book analyzes the gap between the current situation and requirements of security management, defines its nature, function, object and system, and designs and constructs the whole process security management organization and operation system of e-commerce. It focuses on the core and most prominent risk control links (i.e. security impact factors) in e-commerce security, including e-commerce information and network security risk, e-commerce transaction risk, e-commerce credit risk, e-commerce personnel risk, etc. Then, the tools and methods for identifying and controlling various risks are described in detail, at the same time, management decision-making and coordination are integrated into the risk management. Finally, a closed loop of self-optimization is established by a continuous optimization evolution path of e-commerce security management.

Table of Contents

Frontmatter
Chapter 1. Introduction
Abstract
Social system must be in a dynamic balance between security and development, so it is of great significance to carry out effective security management for the rapid development of e-commerce. This chapter defines e-commerce and e-commerce security, analyzes the security elements of e-commerce and the security requirements of e-commerce from the perspective of e-commerce operation and participants, explains the connotation of e-commerce security management, establishes the framework of e-commerce security management, and emphasizes that the best way of e-commerce security management is to combine technical means and management means together.
Ronggang Zhang, Lijuan Fang, Xiaoping He, Chuan Wei
Chapter 2. E-commerce Security Management Plan
Abstract
“Preparedness ensures success and unpreparedness spells failure”. E-commerce security management also follows this rule. This chapter illustrates what is electronic commerce safety management plan, introduces the elements, types, preparation, and optimization of e-commerce security management plan, analyzes the emergency plan of e-commerce security management, including the formulation of emergency response plan of e-commerce security management, the formulation of disaster plan of e-commerce security management, and the formulation of business continuity plan of e-commerce.
Ronggang Zhang, Lijuan Fang, Xiaoping He, Chuan Wei
Chapter 3. E-commerce Security Management Resources and Organization
Abstract
This chapter illustrates what is electronic commerce security management resources and their organization, and analyzes the relationship between them. E-commerce security management resources include human resources, technical resources, financial resources, information resources, and cultural resources. For the allocation of e-commerce security management resources, the emphasis is on personnel allocation and resource allocation. It also introduces the establishment, operation, and reform of e-commerce security management organization, and focuses on the security organization structure of large e-commerce enterprises and small e-commerce enterprises.
Ronggang Zhang, Lijuan Fang, Xiaoping He, Chuan Wei
Chapter 4. Controlling Information Risk in E-commerce
Abstract
“The wise hear in silence, the wise see in the invisible”, which illustrates the importance of e-commerce enterprises to prevent information security risks. This chapter presents the information security risk management process, participants, and their responsibilities, and explains what is information security risk assessment. This paper introduces the form of information security risk assessment, the process of information security risk assessment, as well as the process and method of information security risk disposal, and analyzes the information security risk control measures, mainly including technical measures and normative measures. Among them, technical measures include cryptography, key management technology, network encryption and information protection technology, emerging encryption technology, digital signature technology, authentication technology, digital certificates, and public key infrastructure, while normative measures include information security management measures, information security management organizations, information security standards, information security laws and regulations, etc.
Ronggang Zhang, Lijuan Fang, Xiaoping He, Chuan Wei
Chapter 5. Controlling Network Risk in E-commerce
Abstract
No network security, no e-commerce security. This chapter analyzes the security risks faced by the e-commerce network and how to identify the e-commerce network security risks, then analyzes the e-commerce network security risk assessment content and assessment process, and finally introduces the e-commerce network security analysis and control measures, including common network security models, and e-commerce network security risk control of technical measures and normative measures.
Ronggang Zhang, Lijuan Fang, Xiaoping He, Chuan Wei
Chapter 6. Controlling Transaction Risk in E-commerce
Abstract
Increasing the sense of security of consumers puts forward higher requirements for risk control of e-commerce transactions. This chapter classifies the risk of e-commerce transaction from many angles. According to the stage of e-commerce transaction, the risk of e-commerce transaction can be divided into pre-transaction risk, mid-transaction risk, and post-transaction risk. According to the participants of e-commerce transactions, the risks of e-commerce transactions can be divided into the transaction risks of e-commerce platform operators, the transaction risks of platform operators, and the transaction risks of consumers. This chapter describes how to identify the risk of e-commerce transactions, constructs the risk evaluation index system of e-commerce transactions, introduces the risk control decisions, and on the basis of defining the concept of “norms”, sorts out the norms that the participants of e-commerce transactions should comply with in different stages of e-commerce transactions. At the same time, e-commerce transaction risk control is inseparable from market supervision, industry self-discipline, and social supervision.
Ronggang Zhang, Lijuan Fang, Xiaoping He, Chuan Wei
Chapter 7. Controlling Credit Risk in E-commerce
Abstract
“No man can stand without faith”. Modern society is a credit society, and the importance of social credit system construction is more prominent in the field of e-commerce. This chapter explains what e-commerce credit and e-commerce credit risk are and analyzes the influencing factors of e-commerce credit risk. This paper introduces the performance of trust-breaking behavior reflecting e-commerce credit risk, as well as the evaluation and decision-making of e-commerce credit risk, focusing on the enterprise credit evaluation index, individual credit evaluation index (including buyers and sellers), consumer goods online retail credit evaluation index, and credit evaluation process. It also introduces the guiding ideology, basic principles and various control mechanisms of credit risk control.
Ronggang Zhang, Lijuan Fang, Xiaoping He, Chuan Wei
Chapter 8. Controlling Risk of E-commerce Personnel
Abstract
A company's greatest asset is its people. The risk of e-commerce personnel exists in the whole process of e-commerce, at all levels and in all links, which is a kind of universal risk. In reality, the prevention of internal personnel in e-commerce enterprises is insufficient, which is a very prominent problem. This chapter identifies the risks of e-commerce personnel in three stages: before, during, termination, and change of employment, and makes risk control decisions according to certain principles. Personnel management system (including personnel employment system and authorization management system), safety education and training, safety awareness promotion, integrity education, and integrity culture construction are all helpful to reduce personnel risk.
Ronggang Zhang, Lijuan Fang, Xiaoping He, Chuan Wei
Chapter 9. Supervision and Optimization Mechanism of E-commerce Security Management
Abstract
Maintaining network security requires the participation of the government, enterprises, social organizations, and the majority of Internet users. This chapter analyzes the supervision mechanism of e-commerce safety management, and discusses the power mechanism and realization mechanism of e-commerce safety management supervision. This paper analyzes the optimization mechanism of e-commerce security management, discusses the basic content, implementation premise, and implementation path of e-commerce security management optimization.
Ronggang Zhang, Lijuan Fang, Xiaoping He, Chuan Wei
Metadata
Title
The Whole Process of E-commerce Security Management System
Authors
Ronggang Zhang
Lijuan Fang
Xiaoping He
Chuan Wei
Copyright Year
2023
Publisher
Springer Nature Singapore
Electronic ISBN
978-981-19-9458-6
Print ISBN
978-981-19-9457-9
DOI
https://doi.org/10.1007/978-981-19-9458-6