Analysis the Development and Security Policy of Third-Party Online Payment Platform

被引:1
作者
Zhen, Chenggang [1 ]
Cheng, Peng [2 ]
机构
[1] North China Elect Power Univ, Network Adm Ctr, Baoding, Peoples R China
[2] North China Elect Power Univ, Coll Comp Sci & Technol, Baoding, Peoples R China
来源
ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3 | 2010年
关键词
online payment; security policy; information security; transaction security;
D O I
10.1109/ICCSIT.2010.5564793
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online payment is the key point and the basic conditions to the development of electronic commerce, which greatly promote the development of e-commerce, and brought prosperity to the e-commerce. As e-commerce is one of the fastest economic growth of China, the online payment and its security becomes particularly important. This paper analysis from three aspects: the current development status of e-commerce online payment in China and its main ways of payment, as well as the existing problems. And combined the actual situation in our country, raised the foundation of e-commerce third-party online payment platform, especially, raised a new perspective: Design and develop the payment software for client-side as well as integrated planning the third-party online payment platform, in order to establish the unit and rational interface which can match the payment software for client-side. Make sure the security of the online payment transactions can be achieved.
引用
收藏
页码:43 / 47
页数:5
相关论文
共 11 条
[1]  
Bagchi K., 2003, COMMUN ASSOC INF SYS, V12, P684
[2]  
Ben-Itzhak Y., 2004, Information Management Computer Security, V12, P299
[3]   A framework of anti-phishing measures aimed at protecting the online consumer's identity [J].
Butler, Rika .
ELECTRONIC LIBRARY, 2007, 25 (05) :517-533
[4]  
Desai M. S., 2003, Information Management & Computer Security, V11, P19, DOI 10.1108/09685220310463696
[5]  
Durkan P., 2003, International Journal of Entrepreneurial Behaviour Research, V9, P93
[6]  
Fletcher N., 2007, Journal of Financial Crime, DOI [https://doi.org/10.1108/13590790710742672, DOI 10.1108/13590790710742672]
[7]   Transnational organised cyber crime: distinguishing threat from reality [J].
McCusker, Rob .
CRIME LAW AND SOCIAL CHANGE, 2006, 46 (4-5) :257-273
[8]  
Raja J., 2008, J INTERNET BANKING C, V13, P1
[9]  
Schneider G., 2004, ELECT COMMERCE 2 WAV, V5th
[10]  
Van Slyke C., 2003, E-business technologies