Font Size: a A A

The Safety Of The User Data In E-commerce Environment Management Research

Posted on:2013-06-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiFull Text:PDF
GTID:2248330395459681Subject:Business administration
Abstract/Summary:PDF Full Text Request
Since the1990s, the information technology in the global got fast development andwidespread application, profoundly affects all aspects of the social life. In the tide of informationtechnology, E-commerce as a new business model, because of its global, efficiency andconvenience is widely recognized, and promote the prosperity of the global trade. With thedevelopment of E-commerce, a large number of user data generates, become effective records ofthe business, and plays an increasingly important role in E-commerce.In recent years, user data leakage incident in our country is a high momentum. Theinformation leakage incident in E-commerce is the most serious. Not only leaked a large amountof data, but also resulted in adverse social impact. User data leakage incident directly restricts thedevelopment of E-commerce, endangering the safety of users’ personal information. Therefore,in the E-commerce environment, how to protect user data security has become a hot issue today.In E-commerce environment, the user data is vulnerable to security challenges from variousaspects, because of its important role played by. At the same time, user data is an important partof the personal information, its safety directly related to the vital interests of the user. Throughaccess to relevant research data at home and abroad, we found, compared with developedcountries, our country is still in a low level in the security of user data. This seriously hamperedthe development of E-commerce, and damaged the vital interests of the user. And in this paper,the security management of the user data under E-commerce environment is the research subject.We hope that through a combination of management science and information technology-relatedknowledge, explore viable channel of user data security management in the E-commerce.First of all, this paper defined user data. The user data is specific information of the businessactivities which belongs to the consumer. Based on them, the consumers can be identified by,and the merchants can provide personalized service. Secondly, through the analysis ofE-commerce, we mastered the classification and characteristics of E-commerce. This paperdiscussed the relationship between user data and E-commerce. In the E-commerce environment,there are many user data security risks. Technical risk mainly includes hardware risk, softwarerisk, natural disasters and accidents, etc. Risk management mainly includes the system loss, less attention, improper staffing, flourishing criminal activities, user security consciousness, etc.Thirdly, through the questionnaire survey we carry out empirical study. Results show that ouruser data safety risk analysis, accords with practice. Finally, to ensure that the user dataprimitiveness, authenticity and integrity and efficiency as the goal, we put forward theconception that to construct user data safety management system.The establishment of a safetymanagement system, starting from the technical and management aspects. Through theimprovement of policies and regulations, sophisticated equipment configuration, master coretechnologies, increased investment in safety, training and access to intensive, with elite forces,various measures to improve the user’s ability to protect themselves, build full orientation of thehigh-level security system. The Construction that to build user data safety management system isproper, comprehensive, practical and feasible.The user data is a critical resource and the basis of E-commerce. Study the security of userdata management problems, can effectively reduce the incidence of leakage incident, to betterprotect the safety of users’ personal information, and vigorously promote the prosperity anddevelopment of E-commerce.
Keywords/Search Tags:E-commerce, User Data, Safety Management System
PDF Full Text Request
Related items