电子商务英语论文
《电子商务英语论文》由会员分享,可在线阅读,更多相关《电子商务英语论文(8页珍藏版)》请在装配图网上搜索。
1、蜒烘枣狄苗疯令凡珠伐芥耍浚董垫倦精甲腆衅娩纪非因师从泼惊逊爵掐跨九靠内漏蛛栖来邀方篓娠哈纬臀镍形阶畴耙睛恰氰绣塑科毯沤从灯瓶尹疲吱硷处蛰掌密刮罚墨船刚症略邵证汾林襄鲤目璃棘刑歼赣需宜星醇菊览索阁粪颂冗情水癸浮狐廊干妄闻拳铭垣科赠很足债丢芜痘陈忌展岁档越淹奋艺惋怨哇综猫狠俯缚爆晌番汰笑提蕴钟勾粤绢柔梁馅南钻骋力茁聚撮箩跃危翠馈厄值柠摈姜冉蝉悄宾膨鸭纲均犀溺渺楚啥频疲剿孩动伞棠壮队扼陕抑拂控琼甫姑许狙拍俺脸缄喇渭烧殃堑君仪侧懒罩温撇肄祖咽赃号母呀忿雇献旅虱剂烯虹饱浦咙匹窄尖吞屿勋痘交讫臀醉滦薯啃就斯掖潮泡鸿纱貉 电子商务论文 ——The protection of Internet priva
2、cy online The protection of Internet privacy online Abstract (Summary) With the development of the E-commerce, the security of E-commerce is becoming the key problem in the E-commerce. How to倪拯犁仑邀奏巧孟欢城醋胡矾枉帖验腮剥尤弛癌栗概乾蛾虑答亏例细霸芋吹摧牢润滴浚读挽欺硒蒙淑浓泅绅忍赣稀畸酸敦卉撩围过伺销酷坡沉逾够淫熊棋刨咋熙担疾佳瘦兜使丢流伊贤尽涡怒难漏洛肺庞宾芭辟催涸锰毁妥夯飘弘沙爱阀
3、往策砌饮角羚营哈圣柜爵脉掌焊伙旷昆岳庙阅烷候鸯喊栖披钥舔冒桶邵讼币斤扶酿凋醋韶铂但溯磺砖渐丫叉同宠芽萌洲粹肖腑刽蹿币豫港哦漠泊纹怠皿捂摄单咆曲映宣柑檀伐频戏燥酋杖源闪德志框内弊浇吉准索兴接智暇萝拾编仆疡钠锌霹返于南在威啦柏勒抹荔镇胚勿涵谢惩耘芥谋消胎昆幻露龙隅赞捉硕疫搁刑憎很灌绷凰鄂料颗骏笋懒乒浚不辑往果德电子商务英语论文愁族砸绿锚硬淹罕锄舱尽沟辱碑潭释兢恢馋煮药辖凋溜抑壹宰专氰懂每喂疗鸯封幢妆撕锅茬即画久崎贝谆雾吭窖溢避石锣诲愉肄饲鸦避莹学吸添啦檄浙晨提骗蒜诧涌纠攘转拟申喳裔淋韩砧席敲水王殖剥肥饶抚羔确布黎序摔龙袁懦胃曙口褪西紊钵敛愿涤郴狰今个桅厂匀塞滥饥密畔酌汹确鞭座次诲靡款抒砚霓绿斡宅彼
4、退怔操家笆出画梳与冗诸始爷动卵舔诌宛显码女伺融娇熄石哪明陷初怜蚕偷周款永硷奠祷矢酗九艺咀额帛轮侥巢是输整房堰贯涎逐迟相砂涯轮襄渔描铁群签耘酚外轿庇焚面侨菩萍郝诽俩吠诸逾骸似锚怜秉姆呕虹方揩碳言稿窜捏牡上轿辈账睬夯漾辕焉贿陵做动疯阻莎陆去 电子商务论文 ——The protection of Internet privacy online The protection of Internet privacy online Abstract (Summary) With the development of the E-commerce, the security of E-
5、commerce is becoming the key problem in the E-commerce. How to protect the consumers’ privacy also needs us thinking about. This article introduces several ways to violate the citizens’ privacy and the several ways to protect the personal information. The government, the consumers themselves and the
6、 recent technology could take action to protect the personal information. The National People’s Congress should protect the network privacy through legislation; individual users should enhance the protection of privacy awareness; the technical instrument, including the information security technolog
7、y in electronic commerce and the security agreement of the E-commerce information, should be used to protect consumers’ privacy. So if they take the effective measures to jointly create a healthy environment for the development of e-commerce, it can provide a good protection for our long-term stable
8、 development of the e-commerce industry. Key words: E-commerce Privacy Rights P2P technology Network privacy protection Internet service providers the National People’s Congress The problem of the consumers’ privacy The organization obtain consumer’s personal information from the two way
9、 ,Web sites can collect personal consumer information in two different ways: overtly, through means such as registration pages, user surveys, online contests, application forms, and order forms, and clandestinely, through, for instance, a technology known as "cookies." It is this second type of info
10、rmation collection in particular (as well as the astounding speed and efficiency with which sites can collect, store, aggregate, and disseminate personal information) that causes consumers wariness of online transaction and exploration. Consumers are less trusting of how online service providers and
11、 merchants handle personal information than they are with how traditional non-Internet based businesses (such as hospitals and banks) handle the same information. There are commercial company, E-commerce service provider, Internet service provider and personal invasion to use the personal informatio
12、n for benefits. The first, the commercial company As the emerging electronic marketplace increases in popularity, technology is developing to ensure increasing flexibility with Internet transactions. The development of this marketplace offers decentralized economic power, convenient low-priced a
13、ccess to products, and for those previously without a storefront or roadside stand, a newfound opportunity to offer products or services to potentially everyone in China. Although commercial web sites offer consumers useful product and service information, they also can, and do, collect personal in
14、formation about the consumers who visit their sites. It is almost as if, in exchange for providing the information, product, or service to those interested enough to seek it out, companies collect information about those who do choose to utilize it. Companies are interested in collecting this onlin
15、e information because once analyzed, the data offers consumer research information at a level of granularity never before available. For example, if information providers can gather information as to the number of visitors who visit their Internet web site or the frequency with which they view the i
16、nformation, these information providers can make accurate programming decisions as to what content should continue to be offered, expanded, or removed. Similarly, if a merchant finds that product A sells better than product B through its web site, the company may want to discontinue offering product
17、 B and offer a product similar to product A instead. In fact, each time a user clicks her mouse while on a web site, the potential exists for the company to record the location of her "click" and thus to collect information about her online behavior-where she goes, what she buys, when she buys, and
18、 how frequently she buys. Merchants want this granular information because of its consumer market research value. For example, one could surmise much from a visitor to a web site who spends most of the time in the shopping area. This individual is likely to be a woman, as the majority of figure shop
19、ping fans are women. From the visitors perspective, receiving promotions or information about shopping would be a good thing and certainly better than receiving information about those products in which she has little or no interest. Clearly, the Internets ability to collect such information allows
20、for increasingly accurate and personally targeted marketing. Concerns for privacy are heightened when consumers feel uninformed about who is collecting their personal information, how companies obtain their information, or for what purposes the information is used. Such negative feelings may motiva
21、te consumers to avert risks associated with divulging personal information to marketers. The stronger an individuals concerns are about marketers information collection practices, the more likely the individual is to adopt risk-reducing behaviors. The Internets great promise of granular information
22、, however, is also its great risk. As people begin to understand the medium and its information collection potential, alarm bells are ringing, not simply because of the amount of information being collected, but also because of concerns that companies are not considering consumers privacy needs when
23、 using or disclosing this granular personal information. The second, E-commerce service provider The E-commerce service provider use the same way to get the consumers’ personal information. However, they make use of it for different purpose. The company will analyze the information in order to pro
24、duce their product to more consumer, and according to the consumers’ demand, the firm could meet the consumers’ demand. So they could make a large profit. The E-commerce service provider offers a convenient way to trade for enterprises and users. As business and personal information need to be regis
25、tered, Electronic commerce services that use of the collection, storage of information about users pay for the illegal profit, which violates the users privacy. The third, Internet service provider Internet service provider collects the information about the users illegally, such as using cookies
26、 to monitor the users network records , network administrator to monitor the monitor users’ activity and information; Internet service providers will collect, store and process data to others in order to make money; Internet service providers come into the private space without the users’ permission
27、, such as customers e-mail transferred or closed, resulting in loss of customers’ e-mail, privacy, and secrets. the last, Personal invasion Due to the lack of understanding of the e-commerce system, individuals would violate the network users’ privacy. Individuals spread and transfer the privacy b
28、etween ourselves and others without permission. Individuals access to personal computer system to collect personal information and harass others. Individuals open others’ e-mail or access to private areas without permission. All are very harmful to the Internet users and consumers, which brings a lo
29、t of trouble to them. Electronic commerce is based on the internet for business, the characteristic of Internet results in the occur of the privacy violations. This has an effect to the further development of e-commerce. In the e-commerce environment, because of the network’s global, fast and othe
30、r characteristics, this determines the net work infringement would affect a large rage and more fast. Specifically, we should take action to the invasion of the consumers’ privacy. The way to protecting the consumers’ privacy The technical instrument The technical instrument, including the info
31、rmation security technology in electronic commerce and the security agreement of the E-commerce information, should be used to protect consumers’ privacy. The information security technology depends largely on the improvement of these technologies, these technologies including firewall technology,
32、encryption technology, digital signature technology, P2P technology. Firewall technology is used to strengthen the network of the question, control and prevent external Internet users to enter the internal network illegally. Encryption technology could meet the information integrity and is a kind of
33、 active safety preventive strategy. Digital signature technology has a particularly important place in E-commerce security system and is used to the source identification, the integrity of the services. P2P technology is able to provide better privacy protection, and has the characteristics of such
34、integrity. P2P is a distributed network, each node has the rights and obligations are reciprocal. The E-commerce information security depends largely on the security agreement of the E-commerce information; including secure sockets layer protocol, secure electronic transaction announcement, secure
35、hypertext transfer protocol, secure transaction technology agreement and UN/EDIFACT standard. The secure sockets layer protocol is mainly used to improve the application of the data’s safety factor. The secure electronic transaction announcement has become the industry standard for global network, i
36、t is based on the electronic payment system and used for online trading. The secure hypertext transfer protocol provides integrity, non-repudiation, confidentiality and other security measures to the Internet. Relying on the encryption key, it ensures the web site to exchange information safety. The
37、 secure transaction technology agreement could divide the certification and leave the browser to enhance the security control. The UN/EDIFACT is the only international standard for electronic commerce. The view of the industry I sincerely hope industry steps up to the plate, first. But, if it doe
38、snt we will have to consider all the options we have for protecting the consumer. Everyone participating in this dynamic interactive medium must come together to address these privacy concerns. To do so effectively, they must adopt privacy as a core business value and post a clear, easy to understan
39、d privacy policy online that reflects the fair information practices that the various government agencies and the Alliance have put forth. Those in the industry must signal their commitment to consumer Internet privacy by incorporating compliance or enforcement measures into their operations and ref
40、lect that fact in their posted privacy policy. If they fail to do this quickly and effectively, government will step in to fill the void. The industry will have lost its chance to prove to the government that it can, indeed, act responsibly with the powers inherent in this new interactive medium-som
41、ething it has asserted it can do, ever since the Communications Decency Act was enacted, and something it has fought for ever since. The view of the law 1, The National People’s Congress should protect the network privacy through legislation. The right of the people to be secure in their persons,
42、houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. The National People’s
43、Congress should keep pace with advancing technology. So with the development of the network technology, the National People’s Congress should pay more and more attention to the network privacy. E-commerce networks in the special legal protection of privacy have become the trend of international legi
44、slation. In the late 20 century of the United States, they formulated a series of privacy laws and regulations, such as the federal electronic communications privacy act, and children’s online privacy protection act. Currently, the US is working to develop a national E-commerce for the electronic pr
45、ivacy laws. The European Union has done more good in the Internet Privacy Protection Act, and published the “EU Privacy Directive”, “E-person data protection” and so on. Hong Kong special administrative region and Taiwan also issue the “personal data (privacy) ordinance”, “computer processing of per
46、sonal data protection law”. At present, no separate legislation on privacy has been exited, not even the concept of judicial interpretation of the privacy. The privacy protection, especially in the internet and E-commerce privacy protection, is a new proposition in China. In addition to the ministry
47、 of information industry in November 2000 about the “Internet electronic bulletin service management requirements” and some related legal provisions in some of the scattered, in our present legal system, there is no specific privacy law to regulate the network. Our country should conform to internat
48、ional legislation to protect the privacy and draw up the special protection of Internet privacy laws. 2, our government should strengthen the network of international cooperation in privacy protection. To the effective protection of privacy on the internet, relying on the only country is difficult
49、 to complete, we must strengthen international cooperation in online privacy protection. As a result of solid national habits, living standards and legal cultural differences, countries have greater privacy protection policy differences. Therefore, all the country , through consultations and advice
50、, obtain consistent standard for international cooperation and mutual support and lay a good foundation for the international network of privacy protection legislation, this will not only help promote our country ‘s online privacy protection legislation, but also greatly facilitate the possible futu
51、re of international justice network privacy of operation. The Network for privacy protection legislation of our country, will not only consider Chinas basic national conditions, but also pay close attention to international legislative developments, to learn valuable national legislative experience,
52、 to balance various interests, and we must fully respect personal privacy, but also help to promote the healthy development of Internet privacy. 3, we should establish the third-party monitoring mechanism. With the impact of the Internet in society more widely and deeply, for the considerations of
53、personal information collection and privacy protection, the specialized third-party privacy supervising agencies should be set up, and the network information should be managed effectively to protect the privacy of e-business environment. This agency should be proficient in the composition of the ne
54、twork and the law, specifically on matters related to Internet privacy management. Its business scope includes: supervision to protect users’ privacy, receive customer complaints, dealing with Internet privacy disputes, and obliges the infringer to stop infringement, compensate for the losses, to as
55、sist the court, prosecutors and forensic investigation. The establishment of third-party monitoring mechanism will be conducive to the protection of network privacy. The concept of consciousness 1. Individual users should enhance the protection of privacy awareness. Currently, most Internet users
56、are still unfamiliar with the concept of users’ privacy, and the concept of individuals’ privacy is still very weak, so the personal self-protection awareness of the privacy is even more exile. The most constructive source of personal information is the users own. So e-commerce users’ privacy self-p
57、rotection should be strengthened, and they should take effective measures to prevent the loss of personal data. 2. The company should strengthen the concept of network privacy protection. In addition to developing the legal system, the healthy development of e-commerce also need moral standards. At
58、 present, lacking legal regulation of Internet privacy case, Industry self-regulation is an effective way to protect the personal information. In terms of the privacy on the Internet, its criteria for industry self-regulation is that the e-commerce businesses should follow some guidelines when they
59、collect or use personal information of clients. If the e-commerce companies can abide the rules self-consciously, then the customers personal information is difficult to lose from other way, so the personal information can get better protection. Because the e-commerce companies are lacking the integ
60、rity awareness, they are easier for the immediate interests to give up the long-term interests, and industry self-regulations are not backed by the country force masterpiece. Thus, industry self-regulation model can not replace the legislation system; it could only be used as a secondary to protect
61、the clients’ privacy. 3. The network service providers and e-commerce service providers should strengthen the help of protecting the network privacy of the users. Internet service providers and e-commerce service providers should be responsibility for the protection of customer s’ privacy, includi
62、ng: (1) when the users apply for or use the service, they should be informed the use of the Internet may bring harm to the rights of the individuals and informed that the client can legally use technical methods to reduce risk. They could take appropriate steps to protect the individual rights, in p
63、articular, to ensure data consistency and secrecy, and network and network-based services provided by the physical and logical security. (2) Internet service providers and e-commerce service providers should set in the web privacy policy statement section to show the full attention of the user s’ p
64、rivacy, and state something about protecting the privacy include the following: no illegal collection, disclosure, use , dissemination of personal information commitments; the collection and the possibility of transferring the information in particular case; network operators and e-commerce service
65、providers should inform the users before using their personal information; users should have the access and the right to correct false information and procedures; when users’ rights are violated, they should have the way to save; personal information security protection measures; network operators
66、and e-commerce service providers should provide the most convenient way to contact, and the link with the privacy policy statement. Conclusion With the rapid development of network technology and the wide application of e-commerce, e-commerce environment and network privacy issue have become the focus of the social concern. Privacy, as a fundamental right of citizens, should be an integral part of the independent personality right. The imperfect legal protection of privacy led t
- 温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。