Application of PCFA in Assessing Security technique in E-Commerce affairs

被引:0
|
作者
Qu Zhiming [1 ]
Li Jinxian [2 ]
机构
[1] Hebei Univ Engn, Sch Civil Engn, Handan 056038, Hebei, Peoples R China
[2] YiChun Univ, Sch Technol, YiChun 336000, Jiangxi, Peoples R China
来源
PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I | 2009年
关键词
PCFA; E-Commerce; security technique; main function index; evaluation;
D O I
10.1109/ISECS.2009.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Using the methods of primary components and factor analysis (PCFA), the security technique in E-Commerce affairs and its evaluation are analyzed. Based on PCFA model and the scores by experts, the analysis results are computed reflecting main function indexes of evaluation in security technique in E-Commerce affairs. Through case study, it can be seen that some indexes play very important role in analyzing and assessing main function indexes and all the evaluation s should be considered because evaluation in security technique in E-Commerce affairs depends on the interaction. Through analysis and deduction, it is concluded that, under the premise of minimizing the data loss, the application of PCFA in assessing evaluation in security technique in E-Commerce affairs approved to be practicable.
引用
收藏
页码:413 / +
页数:2
相关论文
共 50 条
  • [41] Application of e-commerce in banking industry
    Batos, V
    Fertalj, K
    Kalpic, D
    ITI 2003: PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2003, : 107 - 112
  • [42] Application of game theory in e-commerce
    Pozdilkova, Alena
    Komarek, Ondrej
    MATHEMATICAL METHODS IN ECONOMICS (MME 2018), 2018, : 445 - 450
  • [43] Research On E-Commerce Niche State and Momentum Model and Application On E-Commerce Assessment
    Wang, Dongmei
    Liu, Honglu
    Tian, Zhihong
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 1866 - +
  • [44] E-Commerce Security based on a security engineering life cycle
    Wu, Yanyan
    ACHIEVEMENTS IN ENGINEERING MATERIALS, ENERGY, MANAGEMENT AND CONTROL BASED ON INFORMATION TECHNOLOGY, PTS 1 AND 2, 2011, 171-172 : 640 - 643
  • [45] Application of information technology to e-commerce
    Binsaif, Nasser
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2022, 68 (03) : 305 - 311
  • [46] Ontology Mapping in an e-Commerce Application
    Chui, Carmen
    Gruninger, Michael
    van Berkel, Mark
    FORMAL ONTOLOGIES MEET INDUSTRY, FOMI 2015, 2015, 225 : 25 - 38
  • [47] Application of Data Mining in e-Commerce
    Chajri, Mohamed
    Fakir, Mohamed
    JOURNAL OF INFORMATION TECHNOLOGY RESEARCH, 2014, 7 (04) : 79 - 91
  • [48] An optimal and efficient data security technique through crypto-stegano for E-commerce
    Kumbhakar, Dulal
    Sanyal, Kanchan
    Karforma, Sunil
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 21005 - 21018
  • [49] The application in E-commerce profit model
    Zhang, Yan
    Zhu, Shanhong
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6783 - 6786
  • [50] Watermarking of multimedia for e-commerce application
    Kong, X
    Yang, D
    PROCEEDINGS OF THE 2001 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, VOLS I AND II, 2001, : 174 - 178