学术英语摘要及文献综述

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Literature review:
• Third-party secured payment means that when buyers and sellers reach agreement on merchandise trade, the buyer will pay money to a third party for custody and the third-party won't pay the seller to complete the whole transaction until the buyer receives the seller of goods and confirmed(Yong Xu ,Ruiying YaoXueyan Liu,2009) .However China's e-payment market is essentially developing 50 years late from the US market,In certain aspects there are defects.Such as how to monitor the Precipitation funds and the question of users' Information Security.And now Alipay and tenpay are China's main thirdp a r t y t r a d i n g platforms.Based on the Trust and security system above the C2C EC system with third-party payment has following types of security risks. 1. Breaking in the system ;2. Denial of Service;3. Identity Counterfeit;4. Computer virus;(Wei Feifei,2009)
The Study Of China's Βιβλιοθήκη Baidunternet Safety Of Third-Party Oline Payment
Abstract:
In recent years, with the continuous development of online shopping, third-party online payment mode are increasingly popular among users. With its convenient, high credibility and security, it has become the mainstream model of online payment.And because of it's fast development, the third-party online payment has attracted more and more attention of people from all walks of life. And the focus is the risk of the use of this platform. In this paper, the author introduces the present development status of the third-party online payment. This paper is focusing on risk analysis and monitoring technology using scenario analysis . In order to prevent and control the risk of third party online payment, we should thoroughly research the third party online payment market and consider all aspects.
And security technology of C2C EC based on third-party payment platform has following types.1) Security technology of thirdparty payment account .2)Security Technology in the transaction of C2C EC based on third-party payment platform.3)Other security technologies (Firewall、Antivirus technology ,Security technology related to the login account of C2C EC web site)Whereas as a new technology, it brings some trust and security problems including breaking in the system, denial of Service, identity Counterfeit, computer virus and so on, the system has set up a trust and security system to solve these problem .the trust and security problems can be considered and settled synthetically and the trust and security system framework can be set up. This will be great help for the study and development of C2C EC trust and security.
Reference
Yong Xu ,Ruiying YaoXueyan Liu,2009,A Payment Model of Mobile Phone based on Thirdparty Security.
Wei Feifei,2009,Trust and Security Research of the C2C E-Commerce System Based on third part payment Platform. Zhao Wei-wen and Xu Ying-fu. Discussion on third-party payments business of Commercial banks [J]. Business China.2008 (7): 20-21. Xu Xiao-ping. Research of security electronic payment model based on third payment authority [J].Computer Engineering and Design.2006.27 (12):2136-2139. RandyC.Marehany,JosePhG..Tront,E-Commerce Security Issues, IEEE.2002. Qin Feng and Zhou Li. Study on credit evaluation issue of EC platform based on third-party [J]. China Scientific dissertation Online,2005. Niu yun. Application and research on EC security technology, Beijing: Beijing University of Posts and Telecommunications, 2004. Shuo He, The evolution and development research of Mobile payment [J]. Chinese credit card, 2008,(14) . Juanxiao Sun, Jianling Gao, Lin Zhu, Fei Feng. The analysis of the E-commerce "third-party guarantee to pay" approach [J].Financial Accounting, 2006, (01) Guanrong Wang. The business model and development of Cell phone mobile payment in China[J]. Financial Accounting, 2008, (05)
相关文档
最新文档