透過您的圖書館登入
IP:18.217.144.32

摘要


近幾年網際網路風靡全球,廣受大家的好評,自1991年網際網路開放於商業用途後,不少商家及企業們面對低成本的商業競爭的環境與眾多的線上消費人口,不禁紛紛投入大量的資金與物力於網路商場的建構。電子商務因公司企業的投入而蓬勃發展,消費者透過網路即可進行購物,企業間可藉由電子資料交換來傳遞商業資訊,而電子化政府、網路報稅及電子銀行更是電子商務未來發展的重點。由於電子商務的快速發展,網路上的交易金額越來越大,相形之下交易安全性也備受重視,交易的保密性、隱私性與完整性是電子商務安全所要考量的重點,另外,交易雙方的身份識別亦被重視。1996年VISA和MasterCard兩大信用卡公司共同提出「安全電子交易」(Secure Electronic Transactions, SET)對於現有的電子商場提供其安全的電子交易需求,使得電子交易過程有了一個共同且安全的規格。本文除了提出電子商務的種類與架構外,並將描述其所受到的各類安全威脅,以及對資訊安全技術提出探討,最後描述現有的電子交易安全協定與系統,以及SET架構。

並列摘要


The love for Internet has been spreading all over the world in the recent years. Since Internet been used for business in 1991, lots of entrepreneurs or businessmen cannot but put themselves into the Internet competition for its attractive lower-cost commercial environments and its huge on-line customers. E-commerce (short for Electronic Commerce) is no doubt growing wider and faster because of their enormous and continuing investments. For customers, the Internet makes shopping be a piece of cake; as for the enterprises, it makes the commercial information sharing much easier and clearer over the electronic data interchange technology. The next step for E-commerce is build up an electronic government, an electronic bank, etc. Owing to its fast development, the security of each transaction over Internet is becoming more and more important. The security, privacy, and integrity of transactions are the discussed points for the E-commercial environments. The identification for both sides in a transaction is discussed, too. In 1996, the first two CreditCard-issuing companies VISA and MasterCard proposed Secure Electronic Transactions, SET, which established a common and safe specification for the electronic business transactions. In this paper, we would like not only to introduce the types and structures of e-commerce, but also to tender all the possible secure threats it could meet; moreover, we will discuss the information secure technology. In the final, we will depict all the current protocols for the security on electronic business transactions, and the structure of SET as well.

被引用紀錄


高芝婷(2017)。MoMo行動購物持續使用意圖之探討〔碩士論文,義守大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0074-1505201712024700

延伸閱讀


  • 吳宗成(2005)。電子商務安全研考雙月刊29(1),68-79。https://doi.org/10.6978/YKSYK.200502.0068
  • 呂志毅(2002)。電子交易安全機制之探討〔碩士論文,元智大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0009-0112200611311897
  • 林俊榮、陳佳珮、蔡宜芳、吳英隆(2005)。電子商務交易安全對消費者購物決策之研究弘光學報(47),111-121。https://doi.org/10.6615/HAR.200511.47.12
  • Huang, S. J. (2020). 物聯網安全機制之研究 [master's thesis, National Taichung University of Science and Technology]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0061-3007202013505100
  • 黃瓊慧、陳政芳、許書偉(2004)。The Value Relevance of E-Commerce Announcements企業管理學報(61),1-28。https://www.airitilibrary.com/Article/Detail?DocID=10259627-200406-x-61-1-28-a

國際替代計量