<span>βThis book systematically and integrally introduces the new security management theories and methods in the e-commerce environment. Based on the perspective of dynamic governance of the whole process, starting from the theoretical framework, this book analyzes the gap between the current situa
The Whole Process of E-commerce Security Management System: Design and Implementation
β Scribed by Ronggang Zhang; Lijuan Fang; Xiaoping He; Chuan Wei
- Publisher
- Springer Nature
- Year
- 2023
- Tongue
- English
- Leaves
- 301
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
βThis book systematically and integrally introduces the new security management theories and methods in the e-commerce environment. Based on the perspective of dynamic governance of the whole process, starting from the theoretical framework, this book analyzes the gap between the current situation and requirements of security management, defines its nature, function, object and system, and designs and constructs the whole process security management organization and operation system of e-commerce. It focuses on the core and most prominent risk control links (i.e. security impact factors) in e-commerce security, including e-commerce information and network security risk, e-commerce transaction risk, e-commerce credit risk, e-commerce personnel risk, etc. Then, the tools and methods for identifying and controlling various risks are described in detail, at the same time, management decision-making and coordination are integrated into the risk management. Finally, a closed loop of self-optimization is established by a continuous optimization evolution path of e-commerce security management.
π SIMILAR VOLUMES
E-commerce is mushrooming in both business-to-business and business-to- consumer sectors. It shakes the foundation of most industries, leads to entirely new kinds of businesses, and directly affects both our careers and the way we live. One of the most significant changes is the manner in which comp
A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to doc
All designers will feel that creativity and innovation are at the heart of their designs. But for a design to have an effective and lasting impact it needs to work within certain structures, or have those structures created suitably around it. No matter how you work, a design can always be improved
All designers will feel that creativity and innovation are at the heart of their designs. But for a design to have an effective and lasting impact it needs to work within certain structures, or have those structures created suitably around it. No matter how you work, a design can always be improved
Design management (the management of design strategies, processes and projects) is an intricate subject. As the role of design in the world continues to broaden, organisations are increasingly viewing design as being integral to their decision-making processes. Opening with a contextual overview of