电子商务英语论文 - AI全自动内容创作接口

电子商务英语论文

上传人:仙*** 文档编号:44694267 上传时间:2021-12-05 格式:DOC 页数:8 大小:72KB
收藏 版权申诉 举报 下载
电子商务英语论文_第1页
第1页 / 共8页
电子商务英语论文_第2页
第2页 / 共8页
电子商务英语论文_第3页
第3页 / 共8页
资源描述:

《电子商务英语论文》由会员分享,可在线阅读,更多相关《电子商务英语论文(8页珍藏版)》请在装配图网上搜索。

1、蜒烘枣狄苗疯令凡珠伐芥耍浚董垫倦精甲腆衅娩纪非因师从泼惊逊爵掐跨九靠内漏蛛栖来邀方篓娠哈纬臀镍形阶畴耙睛恰氰绣塑科毯沤从灯瓶尹疲吱硷处蛰掌密刮罚墨船刚症略邵证汾林襄鲤目璃棘刑歼赣需宜星醇菊览索阁粪颂冗情水癸浮狐廊干妄闻拳铭垣科赠很足债丢芜痘陈忌展岁档越淹奋艺惋怨哇综猫狠俯缚爆晌番汰笑提蕴钟勾粤绢柔梁馅南钻骋力茁聚撮箩跃危翠馈厄值柠摈姜冉蝉悄宾膨鸭纲均犀溺渺楚啥频疲剿孩动伞棠壮队扼陕抑拂控琼甫姑许狙拍俺脸缄喇渭烧殃堑君仪侧懒罩温撇肄祖咽赃号母呀忿雇献旅虱剂烯虹饱浦咙匹窄尖吞屿勋痘交讫臀醉滦薯啃就斯掖潮泡鸿纱貉 电子商务论文 ——The protection of Internet priva

2、cy online The protection of Internet privacy online Abstract (Summary) With the development of the E-commerce, the security of E-commerce is becoming the key problem in the E-commerce. How to倪拯犁仑邀奏巧孟欢城醋胡矾枉帖验腮剥尤弛癌栗概乾蛾虑答亏例细霸芋吹摧牢润滴浚读挽欺硒蒙淑浓泅绅忍赣稀畸酸敦卉撩围过伺销酷坡沉逾够淫熊棋刨咋熙担疾佳瘦兜使丢流伊贤尽涡怒难漏洛肺庞宾芭辟催涸锰毁妥夯飘弘沙爱阀

3、往策砌饮角羚营哈圣柜爵脉掌焊伙旷昆岳庙阅烷候鸯喊栖披钥舔冒桶邵讼币斤扶酿凋醋韶铂但溯磺砖渐丫叉同宠芽萌洲粹肖腑刽蹿币豫港哦漠泊纹怠皿捂摄单咆曲映宣柑檀伐频戏燥酋杖源闪德志框内弊浇吉准索兴接智暇萝拾编仆疡钠锌霹返于南在威啦柏勒抹荔镇胚勿涵谢惩耘芥谋消胎昆幻露龙隅赞捉硕疫搁刑憎很灌绷凰鄂料颗骏笋懒乒浚不辑往果德电子商务英语论文愁族砸绿锚硬淹罕锄舱尽沟辱碑潭释兢恢馋煮药辖凋溜抑壹宰专氰懂每喂疗鸯封幢妆撕锅茬即画久崎贝谆雾吭窖溢避石锣诲愉肄饲鸦避莹学吸添啦檄浙晨提骗蒜诧涌纠攘转拟申喳裔淋韩砧席敲水王殖剥肥饶抚羔确布黎序摔龙袁懦胃曙口褪西紊钵敛愿涤郴狰今个桅厂匀塞滥饥密畔酌汹确鞭座次诲靡款抒砚霓绿斡宅彼

4、退怔操家笆出画梳与冗诸始爷动卵舔诌宛显码女伺融娇熄石哪明陷初怜蚕偷周款永硷奠祷矢酗九艺咀额帛轮侥巢是输整房堰贯涎逐迟相砂涯轮襄渔描铁群签耘酚外轿庇焚面侨菩萍郝诽俩吠诸逾骸似锚怜秉姆呕虹方揩碳言稿窜捏牡上轿辈账睬夯漾辕焉贿陵做动疯阻莎陆去 电子商务论文 ——The protection of Internet privacy online The protection of Internet privacy online Abstract (Summary) With the development of the E-commerce, the security of E-

5、commerce is becoming the key problem in the E-commerce. How to protect the consumers’ privacy also needs us thinking about. This article introduces several ways to violate the citizens’ privacy and the several ways to protect the personal information. The government, the consumers themselves and the

6、 recent technology could take action to protect the personal information. The National People’s Congress should protect the network privacy through legislation; individual users should enhance the protection of privacy awareness; the technical instrument, including the information security technolog

7、y in electronic commerce and the security agreement of the E-commerce information, should be used to protect consumers’ privacy. So if they take the effective measures to jointly create a healthy environment for the development of e-commerce, it can provide a good protection for our long-term stable

8、 development of the e-commerce industry. Key words: E-commerce Privacy Rights P2P technology Network privacy protection Internet service providers the National People’s Congress The problem of the consumers’ privacy The organization obtain consumer’s personal information from the two way

9、 ,Web sites can collect personal consumer information in two different ways: overtly, through means such as registration pages, user surveys, online contests, application forms, and order forms, and clandestinely, through, for instance, a technology known as "cookies." It is this second type of info

10、rmation collection in particular (as well as the astounding speed and efficiency with which sites can collect, store, aggregate, and disseminate personal information) that causes consumers wariness of online transaction and exploration. Consumers are less trusting of how online service providers and

11、 merchants handle personal information than they are with how traditional non-Internet based businesses (such as hospitals and banks) handle the same information. There are commercial company, E-commerce service provider, Internet service provider and personal invasion to use the personal informatio

12、n for benefits. The first, the commercial company As the emerging electronic marketplace increases in popularity, technology is developing to ensure increasing flexibility with Internet transactions. The development of this marketplace offers decentralized economic power, convenient low-priced a

13、ccess to products, and for those previously without a storefront or roadside stand, a newfound opportunity to offer products or services to potentially everyone in China. Although commercial web sites offer consumers useful product and service information, they also can, and do, collect personal in

14、formation about the consumers who visit their sites. It is almost as if, in exchange for providing the information, product, or service to those interested enough to seek it out, companies collect information about those who do choose to utilize it. Companies are interested in collecting this onlin

15、e information because once analyzed, the data offers consumer research information at a level of granularity never before available. For example, if information providers can gather information as to the number of visitors who visit their Internet web site or the frequency with which they view the i

16、nformation, these information providers can make accurate programming decisions as to what content should continue to be offered, expanded, or removed. Similarly, if a merchant finds that product A sells better than product B through its web site, the company may want to discontinue offering product

17、 B and offer a product similar to product A instead. In fact, each time a user clicks her mouse while on a web site, the potential exists for the company to record the location of her "click" and thus to collect information about her online behavior-where she goes, what she buys, when she buys, and

18、 how frequently she buys. Merchants want this granular information because of its consumer market research value. For example, one could surmise much from a visitor to a web site who spends most of the time in the shopping area. This individual is likely to be a woman, as the majority of figure shop

19、ping fans are women. From the visitors perspective, receiving promotions or information about shopping would be a good thing and certainly better than receiving information about those products in which she has little or no interest. Clearly, the Internets ability to collect such information allows

20、for increasingly accurate and personally targeted marketing. Concerns for privacy are heightened when consumers feel uninformed about who is collecting their personal information, how companies obtain their information, or for what purposes the information is used. Such negative feelings may motiva

21、te consumers to avert risks associated with divulging personal information to marketers. The stronger an individuals concerns are about marketers information collection practices, the more likely the individual is to adopt risk-reducing behaviors. The Internets great promise of granular information

22、, however, is also its great risk. As people begin to understand the medium and its information collection potential, alarm bells are ringing, not simply because of the amount of information being collected, but also because of concerns that companies are not considering consumers privacy needs when

23、 using or disclosing this granular personal information. The second, E-commerce service provider The E-commerce service provider use the same way to get the consumers’ personal information. However, they make use of it for different purpose. The company will analyze the information in order to pro

24、duce their product to more consumer, and according to the consumers’ demand, the firm could meet the consumers’ demand. So they could make a large profit. The E-commerce service provider offers a convenient way to trade for enterprises and users. As business and personal information need to be regis

25、tered, Electronic commerce services that use of the collection, storage of information about users pay for the illegal profit, which violates the users privacy. The third, Internet service provider Internet service provider collects the information about the users illegally, such as using cookies

26、 to monitor the users network records , network administrator to monitor the monitor users’ activity and information; Internet service providers will collect, store and process data to others in order to make money; Internet service providers come into the private space without the users’ permission

27、, such as customers e-mail transferred or closed, resulting in loss of customers’ e-mail, privacy, and secrets. the last, Personal invasion Due to the lack of understanding of the e-commerce system, individuals would violate the network users’ privacy. Individuals spread and transfer the privacy b

28、etween ourselves and others without permission. Individuals access to personal computer system to collect personal information and harass others. Individuals open others’ e-mail or access to private areas without permission. All are very harmful to the Internet users and consumers, which brings a lo

29、t of trouble to them. Electronic commerce is based on the internet for business, the characteristic of Internet results in the occur of the privacy violations. This has an effect to the further development of e-commerce. In the e-commerce environment, because of the network’s global, fast and othe

30、r characteristics, this determines the net work infringement would affect a large rage and more fast. Specifically, we should take action to the invasion of the consumers’ privacy. The way to protecting the consumers’ privacy The technical instrument The technical instrument, including the info

31、rmation security technology in electronic commerce and the security agreement of the E-commerce information, should be used to protect consumers’ privacy. The information security technology depends largely on the improvement of these technologies, these technologies including firewall technology,

32、encryption technology, digital signature technology, P2P technology. Firewall technology is used to strengthen the network of the question, control and prevent external Internet users to enter the internal network illegally. Encryption technology could meet the information integrity and is a kind of

33、 active safety preventive strategy. Digital signature technology has a particularly important place in E-commerce security system and is used to the source identification, the integrity of the services. P2P technology is able to provide better privacy protection, and has the characteristics of such

34、integrity. P2P is a distributed network, each node has the rights and obligations are reciprocal. The E-commerce information security depends largely on the security agreement of the E-commerce information; including secure sockets layer protocol, secure electronic transaction announcement, secure

35、hypertext transfer protocol, secure transaction technology agreement and UN/EDIFACT standard. The secure sockets layer protocol is mainly used to improve the application of the data’s safety factor. The secure electronic transaction announcement has become the industry standard for global network, i

36、t is based on the electronic payment system and used for online trading. The secure hypertext transfer protocol provides integrity, non-repudiation, confidentiality and other security measures to the Internet. Relying on the encryption key, it ensures the web site to exchange information safety. The

37、 secure transaction technology agreement could divide the certification and leave the browser to enhance the security control. The UN/EDIFACT is the only international standard for electronic commerce. The view of the industry I sincerely hope industry steps up to the plate, first. But, if it doe

38、snt we will have to consider all the options we have for protecting the consumer. Everyone participating in this dynamic interactive medium must come together to address these privacy concerns. To do so effectively, they must adopt privacy as a core business value and post a clear, easy to understan

39、d privacy policy online that reflects the fair information practices that the various government agencies and the Alliance have put forth. Those in the industry must signal their commitment to consumer Internet privacy by incorporating compliance or enforcement measures into their operations and ref

40、lect that fact in their posted privacy policy. If they fail to do this quickly and effectively, government will step in to fill the void. The industry will have lost its chance to prove to the government that it can, indeed, act responsibly with the powers inherent in this new interactive medium-som

41、ething it has asserted it can do, ever since the Communications Decency Act was enacted, and something it has fought for ever since. The view of the law 1, The National People’s Congress should protect the network privacy through legislation. The right of the people to be secure in their persons,

42、houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. The National People’s

43、Congress should keep pace with advancing technology. So with the development of the network technology, the National People’s Congress should pay more and more attention to the network privacy. E-commerce networks in the special legal protection of privacy have become the trend of international legi

44、slation. In the late 20 century of the United States, they formulated a series of privacy laws and regulations, such as the federal electronic communications privacy act, and children’s online privacy protection act. Currently, the US is working to develop a national E-commerce for the electronic pr

45、ivacy laws. The European Union has done more good in the Internet Privacy Protection Act, and published the “EU Privacy Directive”, “E-person data protection” and so on. Hong Kong special administrative region and Taiwan also issue the “personal data (privacy) ordinance”, “computer processing of per

46、sonal data protection law”. At present, no separate legislation on privacy has been exited, not even the concept of judicial interpretation of the privacy. The privacy protection, especially in the internet and E-commerce privacy protection, is a new proposition in China. In addition to the ministry

47、 of information industry in November 2000 about the “Internet electronic bulletin service management requirements” and some related legal provisions in some of the scattered, in our present legal system, there is no specific privacy law to regulate the network. Our country should conform to internat

48、ional legislation to protect the privacy and draw up the special protection of Internet privacy laws. 2, our government should strengthen the network of international cooperation in privacy protection. To the effective protection of privacy on the internet, relying on the only country is difficult

49、 to complete, we must strengthen international cooperation in online privacy protection. As a result of solid national habits, living standards and legal cultural differences, countries have greater privacy protection policy differences. Therefore, all the country , through consultations and advice

50、, obtain consistent standard for international cooperation and mutual support and lay a good foundation for the international network of privacy protection legislation, this will not only help promote our country ‘s online privacy protection legislation, but also greatly facilitate the possible futu

51、re of international justice network privacy of operation. The Network for privacy protection legislation of our country, will not only consider Chinas basic national conditions, but also pay close attention to international legislative developments, to learn valuable national legislative experience,

52、 to balance various interests, and we must fully respect personal privacy, but also help to promote the healthy development of Internet privacy. 3, we should establish the third-party monitoring mechanism. With the impact of the Internet in society more widely and deeply, for the considerations of

53、personal information collection and privacy protection, the specialized third-party privacy supervising agencies should be set up, and the network information should be managed effectively to protect the privacy of e-business environment. This agency should be proficient in the composition of the ne

54、twork and the law, specifically on matters related to Internet privacy management. Its business scope includes: supervision to protect users’ privacy, receive customer complaints, dealing with Internet privacy disputes, and obliges the infringer to stop infringement, compensate for the losses, to as

55、sist the court, prosecutors and forensic investigation. The establishment of third-party monitoring mechanism will be conducive to the protection of network privacy. The concept of consciousness 1. Individual users should enhance the protection of privacy awareness. Currently, most Internet users

56、are still unfamiliar with the concept of users’ privacy, and the concept of individuals’ privacy is still very weak, so the personal self-protection awareness of the privacy is even more exile. The most constructive source of personal information is the users own. So e-commerce users’ privacy self-p

57、rotection should be strengthened, and they should take effective measures to prevent the loss of personal data. 2. The company should strengthen the concept of network privacy protection. In addition to developing the legal system, the healthy development of e-commerce also need moral standards. At

58、 present, lacking legal regulation of Internet privacy case, Industry self-regulation is an effective way to protect the personal information. In terms of the privacy on the Internet, its criteria for industry self-regulation is that the e-commerce businesses should follow some guidelines when they

59、collect or use personal information of clients. If the e-commerce companies can abide the rules self-consciously, then the customers personal information is difficult to lose from other way, so the personal information can get better protection. Because the e-commerce companies are lacking the integ

60、rity awareness, they are easier for the immediate interests to give up the long-term interests, and industry self-regulations are not backed by the country force masterpiece. Thus, industry self-regulation model can not replace the legislation system; it could only be used as a secondary to protect

61、the clients’ privacy. 3. The network service providers and e-commerce service providers should strengthen the help of protecting the network privacy of the users. Internet service providers and e-commerce service providers should be responsibility for the protection of customer s’ privacy, includi

62、ng: (1) when the users apply for or use the service, they should be informed the use of the Internet may bring harm to the rights of the individuals and informed that the client can legally use technical methods to reduce risk. They could take appropriate steps to protect the individual rights, in p

63、articular, to ensure data consistency and secrecy, and network and network-based services provided by the physical and logical security. (2) Internet service providers and e-commerce service providers should set in the web privacy policy statement section to show the full attention of the user s’ p

64、rivacy, and state something about protecting the privacy include the following: no illegal collection, disclosure, use , dissemination of personal information commitments; the collection and the possibility of transferring the information in particular case; network operators and e-commerce service

65、providers should inform the users before using their personal information; users should have the access and the right to correct false information and procedures; when users’ rights are violated, they should have the way to save; personal information security protection measures; network operators

66、and e-commerce service providers should provide the most convenient way to contact, and the link with the privacy policy statement. Conclusion With the rapid development of network technology and the wide application of e-commerce, e-commerce environment and network privacy issue have become the focus of the social concern. Privacy, as a fundamental right of citizens, should be an integral part of the independent personality right. The imperfect legal protection of privacy led t

展开阅读全文
温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

相关资源

更多
正为您匹配相似的精品文档
关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!

相关内容推荐

好的经济杂志北京杂志印刷价格优生活杂志香港mr杂志小脚丫杂志海洋世界 杂志铁合金杂志免费微杂志di杂志诗友杂志刘宇琼法学杂志报刊荟萃杂志杂志主题策划健康浙江杂志析微杂志生物杂志推荐材料工程杂志投稿杂志侧面ktv杂志蜘蛛网订杂志延边医学是假杂志销售与管理杂志出版杂志流程如丝杂志微杂志怎么制作兰州杂志社名品卫浴杂志旅游学刊杂志奇幻杂志历年目录杂志双封面中国拍卖杂志家庭杂志官网家装设计杂志旅行世界杂志橄榄餐厅杂志正规杂志查询时尚杂志新闻经济杂志招聘r18杂志蒲王杂志下载服装杂志文案中国卫生经济杂志社体育与科学杂志现代邮政杂志中国出名的杂志时尚杂志排名2017日本儿童杂志家具类杂志大众摄影杂志订阅法律杂志投稿能投稿的杂志中华风杂志主播杂志四川档案杂志优质杂志妈咪宝贝杂志社杂志侧面越洋音乐杂志数学教学杂志社饮食与健康 杂志新假期 杂志槐西杂志四中性杂志上海永恒杂志韩国杂志社中国时尚杂志排行建筑材料杂志森林与人类杂志孵化器杂志动力工程杂志佛山杂志社航空杂志期刊家居杂志排行吉林大学杂志国家大剧院杂志电声技术杂志电子杂志论坛精美杂志印刷商界杂志在线阅读医学杂志图片3ds杂志教育参考杂志联合文学杂志娃娃画报杂志卫生教育杂志老年春秋杂志河南教育科研杂志畅游杂志路基工程杂志叉车杂志米娜杂志订购杂志有版权无锡楼市杂志周末仙台杂志电子杂志源码智能家居杂志中国人寿杂志山东诗人杂志应用激光杂志美味杂志杂志社摄影师清新杂志图成立杂志社深圳杂志设计杂志招聘兼职青春杂志排版浙江创伤杂志旅游散文杂志美食杂志推荐本质 杂志魏巡杂志歌曲杂志社杂志阅读率胡歌时尚杂志电气传动杂志投稿男士着装杂志安徽清明杂志食品开发杂志实效管理杂志北京杂志编辑招聘现代雷达杂志费加罗杂志是几线big杂志甘肃发展杂志出柜杂志中国药师杂志官网杂志投稿量医院类杂志腐植酸杂志杂志网上阅读英国建筑杂志乐福杂志欧美系杂志新杂志宣传金泰熙杂志成都杂志铺官网护理杂志阅读腐植酸杂志杂志周年寄语武当杂志广告咬文嚼字杂志订阅战斗机杂志杂志刊号在哪偷拍私杂志西南大学杂志杂志许可证心理医生杂志官网游戏电子杂志最受欢迎杂志河南旅游杂志杂志卷期号杂志侧面期刊杂志印刷的质量工程建设标准化杂志杂志栏目介绍武魂太极杂志成人电子杂志下载异幻杂志小说宠物美容杂志李美琪杂志如龙0杂志自己制作杂志神州杂志社赵焕军欧美电子杂志读者杂志刊号飞天杂志社新风范杂志如何收纳杂志中国排球杂志法源杂志求是杂志社副总编辑中国法律杂志作文通讯杂志同济杂志第五频道杂志北京工作杂志炎黄世界杂志三联生活杂志珠宝世界杂志航机杂志广告伊周杂志订阅兼职杂志模特杂志做茶几花火杂志2017杂志封面欣赏炭素杂志社珍珠杂志playboy杂志app奇闻怪事杂志广告大观杂志社测井技术杂志广州看杂志杂志覆膜山东陶瓷杂志香港动向杂志披露男性潮流杂志探索自我杂志创意设计杂志社会组织杂志广告杂志招商

合作伙伴

AI全自动内容创作接口

dw.urkeji.com
www.3phw.com
dw.urkeji.com
www.hz.bj.cn
www.maijichuang.cn
kuai.urkeji.com
www.maijichuang.cn
zz.urkeji.com
www.chaoshanxing.com
baidu.07yue.com
top1.urkeji.com
seo.chaoshanxing.com
seo.china185.com
www.lpjfm.cn
www.wangluohr.cn
www.haowangjiao.cc
www.chaoshanxing.com
www.conductive-powder.com
www.weiwin.cc
www.jsfengchao.com