AHP and the Fuzzy Integrated Evaluation on the application of e-commerce security risks

被引:0
|
作者
Liu, Jun'e [1 ]
Shi, Ying [2 ]
机构
[1] Beijing Wuzi Univ, Informat Sch, Beijing 101149, Peoples R China
[2] HeBei Univ Engn, Sch Econ Management, Handan 056038, Peoples R China
来源
PROCEEDINGS OF THE 4TH CONFERENCE ON SYSTEMS SCIENCE, MANAGEMENT SCIENCE AND SYSTEMS DYNAMICS, SSMSSD10, VOL 2 | 2011年
关键词
E-commerce; AHP; Fuzzy Integrated Evaluation; Security risks;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
with the opening of the network system of the rapid development of Internet, the network in the life of people more and more important, e-commerce platform is the Internet. Its' core and problems are safe. This article though uses AHP and the fuzzy integrated evaluation methods, which can confirm information risk, credit risk, management risk and risk of investment weight, using the fuzzy integrated evaluation method for e-commerce security risk evaluation indexes. It will have certain significance for promoting the development of e-commerce.
引用
收藏
页码:343 / 348
页数:6
相关论文
共 50 条
  • [31] E-commerce Security: Classifications and Arts
    Raheem, Osamah Adil
    2018 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2018, : 1 - 3
  • [32] Face recognition for e-commerce security
    Wang, W
    Hui, SC
    Gao, Y
    Leung, MKH
    IC'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS I AND II, 2001, : 904 - 907
  • [33] Study on Security Framework in E-Commerce
    Tao, Lu
    Xue, Lei
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3541 - 3544
  • [34] Security Perceptions of e-Commerce Users
    Schmidt, Mark
    Chen, Jim
    Phan, Dien
    Arnett, Kirk
    JOURNAL OF INTERNET COMMERCE, 2009, 8 (1-2) : 44 - 57
  • [35] Research on Security Architecture of E-Commerce
    Shen-Zihao
    Wang-Hui
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE OF MANAGEMENT SCIENCE AND INFORMATION SYSTEM, VOLS 1-4, 2009, : 185 - 188
  • [36] The Security Research on Network Accounting Based on E-commerce
    Li, Yaping
    Quan, Quan
    Wang, Lingli
    2012 INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION AND COMPUTER TECHNOLOGY (ICFCCT 2012), 2012, : 125 - 129
  • [37] Application of cloud computing in banking and e-commerce and related security threats
    Vinoth, S.
    Vemula, Hari Leela
    Haralayya, Bhadrappa
    Mamgain, Pradeep
    Hasan, Mohammed Faez
    Naved, Mohd
    MATERIALS TODAY-PROCEEDINGS, 2022, 51 : 2172 - 2175
  • [38] E-commerce Smartphone Application
    Alqahtani, Abdullah Saleh
    Goodwin, Robert
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (08) : 54 - 59
  • [39] Application of XML in E-commerce
    Li, Weichao
    Liu, Yong
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 262 - 264
  • [40] Application Research of Voiceprint Recognition Technology in Mobile E-commerce Security
    Wu, Zhenkun
    Peng, Zhenlong
    Yu, Ting
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON ECONOMIC DEVELOPMENT AND EDUCATION MANAGEMENT (ICEDEM 2018), 2018, 290 : 483 - 486