[1]
Gary p · Schneider. E-commerce [m]. Beijing: China machine press, (2008).
Google Scholar
[2]
MingHua Liu, ZhiKao Ren, HongCan Dong. Research on Web-based security model of e-commerce security. Information network security [j], 2009, 100 (4): 33-35. In Chinese.
Google Scholar
[3]
Shuliang Jia, XinGuo Fan. E-commerce security analysis [j]. Journal of Liaoning University of engineering and technology, 2009, 25 (3): 83-85. In Chinese.
Google Scholar
[4]
H. M. Deitel. E-Business and e-Commerce for Managers[j]. Prentice Hall, 2001, 23-30.
Google Scholar
[5]
QingLi Zhang. Research on e-commerce security strategy [d]. Henan University Master's degree thesis, 2012. In Chinese.
Google Scholar
[6]
Kimery, K. M. & McCord, M. (2006). Signals of trustworthiness in e-commerce: Consumer understanding of third-party assurance seals. Journal of ElectronicCommerce in rganizations, 4(4), 52-74.
DOI: 10.4018/jeco.2006100103
Google Scholar
[7]
Kim, D. J, Ferrin, D. L, and Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision SupportSystems, 44, 544-564.
DOI: 10.1016/j.dss.2007.07.001
Google Scholar
[8]
Bing Han. Practical application of firewall technology in network security [j]. Information technology, 2010(01). In Chinese.
Google Scholar
[9]
HaiPing Cao. Online banking authentication based on secure electronic transaction protocol (SET), [j]. Computer system, 2006 (6): 58-60. In Chinese.
Google Scholar
[10]
Roger Grimes. E-commerce in Crisis :When SSL Isn't Safe.Info World,2006. 28(18) :26-28.
Google Scholar