Design Issues of Security and Performance Enhancements in e-Commerce Applications Programming
碩士 === 東吳大學 === 資訊管理學系 === 97 === The advanced technologies of Internet and Web make e-Commerce applications fast growing and more popular, one of the most common applications is e-Commerce on the Internet. In general, e-Commerce utilizes the key technologies of Internet and Web to perform or suppor...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/05553754811988796823 |
id |
ndltd-TW-097SCU05396004 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097SCU053960042015-11-23T04:03:32Z http://ndltd.ncl.edu.tw/handle/05553754811988796823 Design Issues of Security and Performance Enhancements in e-Commerce Applications Programming 電子商務應用程式設計的安全性與績效改善之研究 Chia-Hsin Chen 陳佳欣 碩士 東吳大學 資訊管理學系 97 The advanced technologies of Internet and Web make e-Commerce applications fast growing and more popular, one of the most common applications is e-Commerce on the Internet. In general, e-Commerce utilizes the key technologies of Internet and Web to perform or support automatic business transaction process and to provide exchanging or transferring in products, services, and/or information. Although e-Commerce brings many benefits to organizations, consumers, and society, it still exist some technical and non-technical limitations. Also, lack of security is one of the main technical limitations in e-Commerce. Obviously, we can’t just rely on a single product to support all of the necessary information security, and then we should define security as a process for implementing a securing and efficient information system. Hence, the purposes of this paper are to provide process architecture of information security for e-Commerce system such as B2B or B2C and proposed improving strategy for every level. Then, it spread out an e-Commerce Application method and design its algorithm with security and high performance according to this process architecture. Finally, we take a legacy B2C e-Commerce system and utilize the proposed e-Commerce application programming architecture for system design guideline. Then, we proposed related security functional indicator and improving strategy to validate security and efficiency of this architecture. Then, we propose Key Performance Indicator (KPI) in related Web pages accessing to simulate and validate the Web pages accessing and processing performance of e -Commerce application. In the future, the architecture of e-Commerce can provide a reference model for implementing e-Commerce, ERP II, or EIP systems. Shin-Jer Yang 楊欣哲 2009 學位論文 ; thesis 65 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 東吳大學 === 資訊管理學系 === 97 === The advanced technologies of Internet and Web make e-Commerce applications fast growing and more popular, one of the most common applications is e-Commerce on the Internet. In general, e-Commerce utilizes the key technologies of Internet and Web to perform or support automatic business transaction process and to provide exchanging or transferring in products, services, and/or information. Although e-Commerce brings many benefits to organizations, consumers, and society, it still exist some technical and non-technical limitations. Also, lack of security is one of the main technical limitations in e-Commerce. Obviously, we can’t just rely on a single product to support all of the necessary information security, and then we should define security as a process for implementing a securing and efficient information system. Hence, the purposes of this paper are to provide process architecture of information security for e-Commerce system such as B2B or B2C and proposed improving strategy for every level. Then, it spread out an e-Commerce Application method and design its algorithm with security and high performance according to this process architecture. Finally, we take a legacy B2C e-Commerce system and utilize the proposed e-Commerce application programming architecture for system design guideline. Then, we proposed related security functional indicator and improving strategy to validate security and efficiency of this architecture. Then, we propose Key Performance Indicator (KPI) in related Web pages accessing to simulate and validate the Web pages accessing and processing performance of e -Commerce application. In the future, the architecture of e-Commerce can provide a reference model for implementing e-Commerce, ERP II, or EIP systems.
|
author2 |
Shin-Jer Yang |
author_facet |
Shin-Jer Yang Chia-Hsin Chen 陳佳欣 |
author |
Chia-Hsin Chen 陳佳欣 |
spellingShingle |
Chia-Hsin Chen 陳佳欣 Design Issues of Security and Performance Enhancements in e-Commerce Applications Programming |
author_sort |
Chia-Hsin Chen |
title |
Design Issues of Security and Performance Enhancements in e-Commerce Applications Programming |
title_short |
Design Issues of Security and Performance Enhancements in e-Commerce Applications Programming |
title_full |
Design Issues of Security and Performance Enhancements in e-Commerce Applications Programming |
title_fullStr |
Design Issues of Security and Performance Enhancements in e-Commerce Applications Programming |
title_full_unstemmed |
Design Issues of Security and Performance Enhancements in e-Commerce Applications Programming |
title_sort |
design issues of security and performance enhancements in e-commerce applications programming |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/05553754811988796823 |
work_keys_str_mv |
AT chiahsinchen designissuesofsecurityandperformanceenhancementsinecommerceapplicationsprogramming AT chénjiāxīn designissuesofsecurityandperformanceenhancementsinecommerceapplicationsprogramming AT chiahsinchen diànzishāngwùyīngyòngchéngshìshèjìdeānquánxìngyǔjīxiàogǎishànzhīyánjiū AT chénjiāxīn diànzishāngwùyīngyòngchéngshìshèjìdeānquánxìngyǔjīxiàogǎishànzhīyánjiū |
_version_ |
1718134924803833856 |