Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book mainly discusses the background of e-commerce, the basic knowledge of e-commerce, the basic models of e-commerce, the basic principles of e-commerce and the cases of e-commerce. This book has formed a theoretical system of e-commerce with a clear integration boundary. The introduction of the systematic theory is guided by the background of e-commerce, centered on the model of e-commerce, paved with the principles of e-commerce and integrated with the cutting-edge cases. This book defines the basic concepts, models and principle of e-commerce in the form of mathematical analysis and analyzes the basic theory of e-commerce from the perspective of mathematical model. This enables readers to form an abstract understanding of the connotation and extension of e-commerce. It establishes a knowledge system with the background of social ecology, engineering ecology and innovative ecology, taking the models of e-commerce as the core, the principles of e-commerce as the process, the architecture of e-commerce as the platform and the operation and management of e-commerce as the means to integrate the knowledge into application. This book uses case study to comprehensively analyze and apply the knowledge system involved in e-commerce, combining theoretical research with engineering research. Through this book, readers can systematically master all kinds of theories involved in e-commerce. This book aims at different professional and diverse reader groups. It can be used as the basic books for students of various e-commerce-related specialties.
This book focuses on e-commerce industry chain based on the whole process of e-commerce activities (production, distribution, circulation, consumption). It extracted the supporting technology and operation process of e-commerce into general principles in the form of mathematical analysis, helping readers to build the frame of theory and practice of activity link of e-commerce. This book stands on the concepts, carries on the innovation and cases in the practice, helping readers to establish a relatively complete e-commerce system. Also the arising challenges and issues are discussed, and guide for the future e-commerce development under the new situation is presented.
This book seeks to give readers with a preliminary but critical introduction and summary of e-commerce and big data analysis. This book introduces how to achieve data acquisition and pre-processing. Specifically, this book provides three representative and interesting scenarios to demonstrate the application of e-commerce and big data analysis, i.e., trajectory big data mining technology, e-commerce fraud and anti-fraud, and recommendation system. Also this book provides the basic and illustrative operation steps of python programming language for e-commerce and big data analysis. By reading this book, readers can learn the basic concepts and principles of e-commerce and big data analysis.
This book systematically and integrally introduces the new security management theories and methods in the e-commerce environment. Based on the perspective of dynamic governance of the whole process, starting from the theoretical framework, this book analyzes the gap between the current situation and requirements of security management, defines its nature, function, object and system, and designs and constructs the whole process security management organization and operation system of e-commerce. It focuses on the core and most prominent risk control links (i.e. security impact factors) in e-commerce security, including e-commerce information and network security risk, e-commerce transaction risk, e-commerce credit risk, e-commerce personnel risk, etc. Then, the tools and methods for identifying and controlling various risks are described in detail, at the same time, management decision-making and coordination are integrated into the risk management. Finally, a closed loop of self-optimization is established by a continuous optimization evolution path of e-commerce security management.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.