移动商务风险控制方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
移动电子商务在我国正处于起步阶段,其发展中所面临的诸多风险是移动商务在产业化、规模化过程中迫切需要解决的问题。现有的研究往往集中在移动商务的安全风险上,而移动商务的发展所面临的风险来自诸多方面,绝非安全一项。而且,由于移动商务独有的特点,其风险控制不大可能完全搬用传统电子商务的控制方法。为加快移动商务的发展速度,使其得到健康发展,必须找到合理有效的移动商务风险控制方法,这对风险控制理论和移动商务的推广有着重要的理论、实践和经济意义。
     本文站在移动商务服务提供商(SP)的角度,针对移动商务的风险问题,开展了以下四个方面的研究:
     第一,对移动商务的风险评价方法进行研究。作为电子商务的一种形式,移动商务在运营中面临的风险需要得到有效评价,只有解决了风险评价问题,才能有针对性地去解决风险控制问题。本文设计的移动商务风险的评价模型,将风险因素的概率和风险因素的影响程度结合考虑,突破了CIM模型只考虑风险发生概率的局限性。以风险评价模型为基础,设计了改进的风险控制模型,与传统的以绩效为目标的风险控制相比较,能够直接和有效地测量风险控制水平。
     第二,对移动商务信息安全风险控制方法进行研究。信息安全风险对移动商务的市场拓展具有负面作用。用户会因为担心安全问题而拒绝使用移动商务业务。移动商务的技术实现同电子商务有所区别,因此电子商务中的安全风险控制方法不能完全适用于移动商务。本文设计控制安全风险的移动商务用户认证和安全数据传输协议SAydos。该协议可防范中间人攻击等安全问题,能够以较小的运算代价修正Aydos协议的不足与漏洞。在RBAC模型的基础上,设计了改进的移动商务访问控制模型。与传统的RBAC访问控制模型相比,改进的模型能够解决系统粒度、数据传输经济性、用户协作性等诸多问题。
     第三,对移动商务的合作风险控制方法进行研究。同移动商务服务提供商具有合作关系的部门很多,包括CP、AP、设备提供商、移动运营商等。移动商务的成功与否,很大程度上由这些部门提供的产品或服务质量来决定,如何促使这些部门积极与移动商务服务提供商进行合作,从而降低合作风险是移动商务运营中需要关注的问题。另外,在合作伙伴中,移动运营商由于其垄断地位而显得比较特殊,一般性的合作风险控制手段对其不能产生作用。从政策层面对其进行一定的控制是不错的方法。本文提出并设计了控制合作风险的移动商务合作激励模型。该模型采用报酬作为激励工具,同合作伙伴的努力程度紧密联系,将合作伙伴的合作意愿激励到移动商务服务提供商希望的水平,以缓解合作风险。对移动商务监管政策进行了重构。重构的政策为移动商务提供了自由竞争的平台,并在一定程度上缓解来自移动运营商的合作风险。
     第四,对移动商务客户流失风险控制方法进行研究。客户流失,对于具有网络经济效益的移动商务而言是非常不利的。尤其是客户流失具有破窗效应,一个客户的流失可能意味着数十个客户的流失,也就意味着企业资金的流失。如何控制这种流失,对于移动商务运营商而言至关重要。本文根据现有的理论成果,提出并设计了控制移动商务客户流失风险的触发器模型。该模型以数据库中触发器的概念为基础,能够自动地完成客户挽救工作。在数理逻辑理论的基础上,设计了用于触发器模型的复杂触发条件的优先级计算方法。按照优先级顺序对客户进行挽救,能够有效地挽回高价值客户,尽可能减少客户流失损失。针对客户流失风险具有相当的控制能力。
The mobile-commerce in China is at its initial stage, facing kinds of risk problems, which are very urgent for its large-scale industrialization. The existing researches are mainly focus on the security risk but ignoring other sources of risk for the m-commerce. Furthermore, because of the unique features of the m-commerce, methods of risks control in traditional e-commerce cannot be applied completely. For the faster and healthy development of the m-commerce, rational and effective method of m-commerce risk control must be found, which has great theoretical, practicing and economic significance for the risk control theory and promotion of mobile commerce.
     The author stood on the view of m-commerce service provider, make researches on the following four respects for the risk problems in m-commerce:
     (1) Researches on the methods of m-commerce risk assessing. As a form of e-commerce, the m-commerce is facing the problem of lack of effective assessing. Once the risks well assessed, the problems of risk control can be solved targeted. This paper designed the mobile commerce risk-assessing model, which combines probability of risk and the influence of different kinds of risks (power), and breaks though the limitations that CIM model only considers the risk probability. Based on the model, this paper designed improved risk control model. Compared with the traditional risk control model which control target is performance, the improved risk control model could reflect the effect of risk control directly
     (2) Researches on methods of m-commerce information security risk control. The information security risk makes negative effect on the expanding of m-commerce market. The users who worried about security problems would refuse the m-commerce services. Concerning the differences on technology between m-commerce and e-commerce, security risk control methods of e-commerce cannot be used on m-commerce completely. This paper designed SAydos protocol for user authentication and secure data transmission in m-commerce. This protocol can prevent man in the middle attack and correct the vulnerabilities of Aydos protocol with little computing cost. Based on the RBAC model, this paper designed improved access control model for m-commerce. Compared with the traditional RBAC model, improved access control model can solve some issues such as data size, economic data transmission, and user collaboration.
     (3) Researches on methods of cooperation risk control of m-commerce. M-commerce service providers cooperate with several other departments including CP, AP, equipment suppliers and mobile network operators and so on. Whether the m-commerce could get a success is depend on the quality of the goods or services provided by these departments decently. How to reduce cooperation risk by promoting the cooperation between these departments and service providers is the problem that would be focused on through the mobile commerce operation. Furthermore, common cooperation risk control methods can hardly work on the mobile operators who were at the stage of monopoly. Control form the policy method would be much better. This paper designed reward-urging model of cooperation risk control for m-commerce. This model uses reward as the incentive tool and urges the cooperators to a certain level of effort through the payment in order to alleviate cooperation risk. This paper reconstructed the regulation policy of m-commerce, which provides a fair competition environment for m-commerce. At the same time, cooperation risk from mobile operators would be ease to some extent consequently.
     (4) Researches on methods of customer loss risk control at last. The customer loss is very harmful to the m-commerce with network cost-effectiveness. Especially the customer loss has the nature of broken window effect; one customer loss may leads to tens of customer loss, and means financial loss potentially. The issue of how to control these losses means great to the m-commerce operators. With the existing theoretical results, a set of trigger model, which has considerable ability on control customer loss risk, was designed in this paper. This model can automatically carry out customer retention. Based on the mathematical logic theory, this paper designed priority calculation method which used for complex trigger conditions in trigger model. In accordance with the priority order to carry out customer retention, service providers can effedtively restore high-value customers and minimize loss of customer loss risk. The trigger model and the priority calculation have the considerable risk control ability.
引文
1 C Coursaris, K Hassanein. Understanding m-commerce. Quarterly Journal of Electronic Commerce. 2002, 3(3): 247-271
    2吕廷杰.我国移动商务发展趋势分析与展望.北京邮电大学学报(社会科学版). 2006, 18(4): 2-8
    3 Youwei Wang, Yufei Yuan. The role of SMS in mobiled data service diffusion in China: a longitudinal case study based on Actor-Network theory. Twenty-Seventh International Cofernece on Information Systems, Milwaukee. 2006: 1737-1756
    4 E W T Ngai, A Gunasekaran. A review for mobile commerce research and applications. Decision Support Systems. 2007, 43: 3-15
    5党曦明,梁雄健.中国移动数据业务的现状及发展趋势.现代电信科技. 2004(5): 35-37
    6 Jiang Yu, Lanxiang Zhao. Exploring developing model for mobile commerce under the highly-regulated contexts. 2006 IEEE International Conference on Management of Innovation and Technology. 2006: 527-531
    7 J Lembke. Mobile commerce and the creation of a marketplace. The Journal of Policy Regulation and Strategy for Telecommunications.2002, 4(3): 50-56
    8 Stuart J Barnes. The mobile commerce value chain: analysis and future developments. International Journal of Information Management. 2002(22): 91-108
    9 Niina Mallat. Exploring consumer adoption of mobile payments - a qualitative study. Strategic Information Systems. 2007, 16: 413-432
    10 Jaclyn Easton. Going wireless: transform your business with mobile technology. HarperCollins Publishers. 2002: 271-296
    11 R Staton. The mobile internet: what is it? how will it bebuilt? and what services will it deliver? International Review of Law Computers and Technology. 2001, 15(1): 59-71
    12 U Varshney, R Vetter. Mobile commerce: framework, applications and networking support. Mobile Networks and Applications. 2002, 7(3):185-198
    13 U Varshney, R J Vetter, R Kalakota. Mobile commerce: a new frontier.Computer. 2002, 33(10): 32-38
    14 D Critchlow, N Zhang. Security enhanced accountable anonymous PKI certificates for mobile e-commerce. Computer Networks. 2004, 45: 483-503
    15杨帆,杨宁.基于WAP的一定能够电子商务安全研究.科技信息. 2007(15): 320-321
    16 B E Mennecke, T J Strader. Mobile Commerce: Technology, Theory, and Applications. IDEA Group Publishing. 2003: 41-61
    17 K Siau, E P Lim, Z Shen. Mobile commerce: promises, challenges, and research agenda. Journal of Database Management. 2001, 12(3):4-13
    18 S T Chanson, T W Cheung. Design and implementation of a PKI-based end-to-end secure infrastructure for mobile e-commerce. World Wide Web. 2001, 4(4): 235-253
    19 S Guan, C S Ngoo, F Zhu. Handy broker: an intelligent product-brokering agent for m-commerce applications with user preference tracking. Electronic Commerce Research and Applications. 2002, 1(3): 314-330
    20 S Hazari. Challenges of implementing public key infrastructure in Netcentric enterprises. Logistics Information Management. 2002, 15(5): 385-392
    21 O B Kwon, N Sadeh. Applying case-based reasoning and multi-agent intelligent system to context-aware comparative shopping. Decision Support Systems. 2004, 37(2): 199-213
    22 S Ogawara, J C H Chen, Q Zhang. Internet grocery business in Japan: current business models and future trends. Industrial Management. 2003(9): 727-735
    23 S Paurobally, P J Turner, N R Jennings. Automating negotiation for m-services. IEEE Transactions on Systems, Man and Cybernetics, Part A. 2003, 33(6): 709-724
    24 P Tarasewich. Designing mobile commerce applications. Communications of the ACM. 2003, 46(12): 57-60
    25 V Venkatesh, V Ramesh, A P Massey. Understanding usability in mobile commerce. Communications of the ACM. 2003, 46(12): 53-56
    26黄飞.风险管理本质概论.科学管理研究. 1987, 5(5): 41-45
    27朱静怡,朱淑珍.金融风险的传导机制及防御对策分析.东华大学学报(自然科学版). 2001(10): 17-20
    28钟茂华,魏玉东,范维澄,王清安.事故致因理论综述.火灾科学. 1999,8(3): 36-42
    29 D A Weaver. TOR analysis: a diagnostic training tool. ASSE Journal. 1973(6): 14-29
    30 Dan Petersen. Techniques of safety management. McGraw-Hill Companies. 1971
    31蔡勉,卫宏儒.信息系统安全理论与技术.北京工业大学出版社. 2006
    32英国BS7799标准. ISO/IEC 17799. 2002
    33 BS7799. Information Security Management Specification for Information Security Management Systems. 2002
    34郭顺利,杨小虎. COBIT控制目标体系研究及在电子政府中的应用.计算机工程与设计. 2004, 3: 447-450
    35胡润波,王建军,杨德礼.移动商务信誉系统风险评估模型.计算机工程. 2009, 35(3): 186-188
    36许振国.基于共享密钥和HMAC的安全移动支付方案.计算机安全. 2007(2): 46-48
    37先强.基于WPKI的移动电子商务安全研究.商业现代化. 2006(460): 72
    38 Bouchaib Bahli, Younes Benslimance. An exploration of wireless computing risks. Information Management & Computer Security. 2004, 12(3):245-254
    39郭勇,李一军,梁雪峰,张睿.从价值链角度探索移动商务的管制模式. 2nd CNAIS2007 National Congress. 2007: 132-136
    40格林斯坦法因曼.电子商务:安全、风险管理与控制.机械工业出版社. 2000
    41高新亚,邹静.电子商务安全的风险分析和风险管理.武汉理工大学学报(信息与管理工程版). 2005, 27(4): 254-258
    42王燕,高玉飞.移动商务的价值链与商务模式研究.物流科技. 2004, 29(133): 63-66
    43范云峰.企业客户流失的原因及防范措施.中国流通经济. 2003(5): 37-39
    44佚名.解读客户流失的八种原因.今日财富. 2008(4): 57
    45王雷,陈松林,顾学道.客户流失预警模型及其在电信企业的应用.电信科学. 2006(9): 47-51
    46刘伟江,刘扬,王广惠.电子商务活动中的信任与风险问题.长春工业大学学报(社会科学版). 2004, 16(2): 32-34
    47 Snyder L. Formal models of capability-based protection systems. IEEETransactions on Computers. 1981, 30(3): 172-181
    48 Ferraiolo D, Kuhn R. Role-Based access controls. In: Proceedings of the 15th NIST-NCSC National Computer Security Conference. 1992: 554-563
    49 Sandhu R, Conyne EJ, Lfeinstein H, Youman CE. Role based access control models. IEEE Computer, 1996, 29(2):38-47
    50陈旭升,孙勋成.房地产投资的预期收益与风险分析.科技与管理. 2001(4): 92-94
    51 W. Kip Viscusi, John M. Vernon, Joseph E. Harrington. Economics of Regulation and Antitrust (3rd edition). MIT Press. 2000
    52 Das T K, Teng B S. Between trust and control: developing confidence in partner cooperation in alliances. Academy of Management Review. 1998, 23: 491-512
    53 Gerald R. Faulhaber. Policy-induced Competition: the Telecommunications Experiments. Information Economics and Policy. 2003(15): 73-97
    54刘伟江,王勇.电子商务风险及控制策略.东北大学学报(哲学社会科学版). 2005(1): 37-41
    55聂高辉.企业电子商务的风险分类及其管理策略.商业研究. 2006(22): 201-
    204
    56傅少川.企业电子商务风险的危害及控制.中国安全科学学报. 2003, 13(7): 55-60
    57袁峰,邱爱莲,蒋文杨.电子商务企业的风险识别与评价.软科学. 2003, 17(4): 82-84
    58张泽虹.电子商务技术风险评估.商场现代化. 2007(32): 31-33
    59陈伟珂,姚卫峰,王亦虹.基于CIM模型的公共政策风险决策实证研究.天津理工大学学报. 2006, 22(1): 16-18
    60 Theodore Jay Gordon. THE DELPHI METHOD. AC/UNU Millenium Project: Future Research Methodology. 1994: 6
    61 Norman C Dalkey. THE DELPHU METHOD: AN EXPERIMENTAL STUDY OF GROUP OPINION. SANTA MONICA CA. 1969: 15-18
    62陈光.信息系统信息安全风险管理方法研究.国防科技大学管理学博士学位论文. 2006: 30-34
    63王有为,胥正川,杨庆.移动商务原理与应用.清华大学出版社, 2006: 287-339
    64 M Aydos, B Sunar, C K Koc. An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. 2nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications. 1998: 1-12
    65 F Zhu, D S Wong, A H Chan, R Ye. Password authenticated key exchange based on RSA for imbalanced wireless networks. Proceedings of the 5th International Conference on Information Security, Lecture Note on Computer Science. 2002: 150-161
    66 K Shim. Cryptanalysis of mutual authentication and key exchange for low power wireless communications. IEEE Communications Letters. 2003, 7(5): 248-250
    67 K Mangipudi, N Malneedi, R Katti, H Fu. Attacks and Sohutions on Aydos-Savas-Koc’s Wireless Authentication Protocol. IEEE Global Telecommunications Conference, 2004: 2229-2234
    68 LIU Zhimeng, ZHAO Yanli, FAN Hui. A Secure MAKAP for Wireless Communication. Wuhan Unversity Journal of Natural Science. 2006, 11(6): 1749-1752
    69 Michael A Hitt, R Duane Ireland, Robert E Hoskisson.战略管理——竞争与全球化.吕巍.机械工业出版社, 2002: 150-154
    70张维迎.博弈论与信息经济学.上海人民出版社, 2004: 431-441
    71 Jason Oxman. The FCC and the Unregulation of the Internet. OPP Working Paper No.31, 1997
    72张睿.三网融合普遍接入技术和市场及政策选择.哈尔滨工业大学管理学博士学位论文. 2008: 129-131
    73 Parasuraman A, Zeithaml V A. A Conceptual Model of Service Quality and its Implications for Future Research. Journal of Marketing.1985, 49: :41-50
    74 Parasuraman A, Zeithaml V A. A Multiple-Item Scale for Measuring Consumer Perceptions of Service Quality. Journal of Retailing. 1988, 64: 12-40
    75郑灿雷,李飞.客户流失的相关理论探析.江苏商论. 2007(3): 28-30
    76鲁耀斌,邓朝华,陈致豫.移动商务的应用模式与采纳研究.科学出版社, 2008: 298-340
    77陈宏民.网络外部性与规模经济性的替代关系.管理科学预报. 2007, 10(3): 1-6
    78 Satoh a, Takano K. A scalable dual-field elliptic curve cryptographic processor. IEEED Transactions on Computers. 2003, 52(4): 449-460
    79 Jorge G, Christof P. Itoh-Tsujii inversion in standard basis and its application in cryptpgraphy and codes. Designs, Codes and Cryptography. 2001, 25: 207-216
    80赵宗渠,刘艳霞.一种可证安全性的无线网络密钥协商协议.计算机工程. 2008, 34(14): 174-175
    81刘志猛,赵燕丽.无线网中基于ECC的认证和密钥交换协议.燕山大学学报. 2008, 32(1): 1-3
    82邱慧敏,杨义先. Aydos无线认证协议的安全性分析及改进.计算机应用研究. 2005, 22(11): 125-127
    83 Michael Ettredge. Assessing the Risk in E-Commerce. Proceedings of the 356th Hawaii Internatianl Conference on System Sciences. 2002: 1-11
    84黄文莉,马文娜,顾添利.电子商务系统风险评估模型. 2003电子商务与数位生活研讨会. 2003: 192-211
    85张宏斌,唐华俊,辛晓平,姜丽华.主动实时数据库系统触发器模型的设计与实现.计算机工程. 2006, 32(2): 82-84
    86何安华.基于决策树法的渠道客户流失风险预警.市场论坛. 2008(10): 82-84
    87范云峰.企业客户流失的原因及防范措施.中国流通经济. 2003(5): 37-39
    88 Keng Siau, Hong Sheng, Fiona Fui-Hoon Nah. The Value of Mobile Commerce to Customers. Proceedings of the 3rd Annual Workshop on HCI Research in MIS. 2004: 65-69
    89 Constantinos Coursaris, Khaled Hassanein, Milena Head. M-Commerce in Canada: An Interaction Framework for Wireless Privace. Canadian Journal of Administrative Sciences. 2003(1): 54-73
    90 Constantinos Coursaris, Khaled Hassanein. Understanding m-Commerce: A Consumer-Centric Model. Quarterly Journal of Electronic Commerce. 2002, 3(3): 247-271
    91陈庆伟,刘军.电子政府系统访问控制模型探讨.科技情报开发与经济. 2005, 15(19): 236-238
    92 Neil A Doherty. Integrated Risk Management: Techniques and Strategies for Managing Corporate Risk. McGRAW-HILL, INC. 2000: 555-591
    93 Margaret Woods, Philip Linsley, Peter Kajuter. International Risk Management.CIMA Publishing. 2008: 123-143
    94 Ben Gilad. Early Warning: Using Competitive Intelligence to Anticipate Market Shifts, Control Risk, and Create Powerful Strategies. American Management Association Publishing. 2004: 47-79
    95 Brigitte Rasmussen, Carsten D G.ronberg. Accidents and risk control. Journal of Loss Prevention in the Process Industries. 1997, 10: 325-332
    96 Qing Lu, Peter Hwang, Clement K Wang. Agency risk control through reprisal. Journal of Business Ventruing. 2006, 21:369-384
    97 Schwiderski Grosche, S Knospe. Secure mobile commerce. Electronics & Communication Engineering Journal. 2002, 14(5): 228-238
    98 Alia Fourati, Hella Kaffel Ben Ayed, Abdelmalek Benzekri. A SET Based Approach to Secure the Payment in Mobile Commerce. Proceedings of the 27th Annual IEEE Conference on Local Computer Networks. 2002: 1-2
    99 Dennis W. Viehaland.“Risk E-Business”: Assessing Risk in Electronic Commerce. ECOMMERCE. 2002(5): 9-11
    100 ElkeWolf. Mobile Banking and Brokerage Systems- Managing IS Risks in the beginning 21st Century. 16th bled eCommerce Conference-eTransformation. 2003: 918-932
    101张书奎.一个入侵自动响应系统的设计与实现.计算机工程. 2007, 33(9): 134-136
    102梁哄涛,王大萌,黄俊强,马遥.信息安全风险评估规范在电子政务中的应用.信息技术. 2007(7): 133-135
    103刘高峰.我国移动增值业务产业政策分析及发展策略.移动通信. 2004(4): 1-3
    104张赛男,殷兆麟,刘厚泉.软件系统UML建模与其安全建模的集成.计算机工程. 2007, 33(8): 86-89
    105张晓群,董丽丽.角色访问控制模型的研究及应用.计算机技术与发展. 2007, 17(2): 42-45
    106邓集波,洪帆.基于任务的访问控制模型.软件学报. 2003, 14(1): 76-82
    107田敬东,何再朗,王向东,张毓森.基于角色的强制访问控制模型研究. 2006, 35(6): 950-952
    108汪厚祥,李卉.基于角色的访问控制研究.计算机应用研究. 2005(4): 125-127
    109武帅,王雄,段云峰. SVM在移动通信客户流失预测中的应用研究.微计算机信息(管控一体化). 2007, 23(4): 163-165
    110肖水清.基于CRM探讨电信业的客户流失问题.现代计算机. 2006(1): 57-59
    111汪波.基于客户价值评价的核心客户识别研究.安徽工业大学学报. 2006(4): 50-53
    112张亚娟,李景峰,祝跃飞.对MAKAP协议的攻击及其改进.计算机工程. 2007, 33(13): 22-24
    113 Hsu C L, Lu H P, Hsu H H. Adoption of the Mobile Internet: An Empirical Study of Multimedia Message Service(MMS). OMEGA: International Journal of Management Science. 2007, 35(6): 715-726
    114 Lee T. The Impace of Perceptions of Interactivity on Customer Trust and Transaction in Mobile Comerce. Journal of Electronic Commerce Research. 2005, 6(3): 165-180
    115 Lin H H, Wang Y S. An Examof the Determinants of Customer Loyaty in Mobile Commerce Contents. Information & Management. 2006, 43(2): 271-282
    116 Turban E, King D, Lee J, Viehland D. Electronic Commerce: Managerial Perspective. Information & Management. 2006, 43(12): 1-13
    117 Wang Y S, Lin H H, Luarn P. Predicting Consumer Intention to Use Mobile Commerce. Information Systems Journal. 2006, 16(2): 157-179
    118 Wu J H, Wang S C. What Drives Mobile Commerce? An Emprirical Evaluation of the Revised Technology Acceptance Model. Information & Management. 2005, 42(5): 719-729
    119王汝林.移动商务理论与实践.清华大学出版社. 2007: 274-299
    120哈里R范里安.微观经济学:现代观点(第六版).费方域.上海人民出版社. 2006: 175-201
    121冯惠玲.电子文件风险管理.中国人民大学出版社. 2008: 187-214
    122黄梯云,李一军.管理信息系统(第三版).高等教育出版社. 2005: 107-127
    123斯蒂芬哈格,梅芙卡明斯.哈格管理信息系统(第二版).严建援,刘云福,王克聪.中国人民大学出版社. 2008: 210-240
    124黄继忠,曲文轶.自然垄断与规制:理论和经验.经济科学出版社. 2004: 2-34
    125许峰.国外3G业务管制政策研究.通信企业管理. 2005(3): 41-42
    126 Frederick F Reichheld.忠诚法则.陈绍锋,陈玮,蒋攀.中信出版社. 2002: 1-36
    127 Evangelos Xevelonakis. Developing retention strategies based on customer profitability in telecommunications: An empirical study. Database Marketing & Customer Strategy Management. 2005, 12(3): 226-242
    128何华安.基于决策树法的渠道客户流失风险预警.市场营销. 2008(10): 82-84
    129毛世英.“破窗效应”对企业管理的启示.人力资源. 2008(13): 34-35
    130林宏.香港银行服务质量调查及客户投诉程序.统计与预测. 2003(4): 71-73
    131 Hal R Varian. Market Structure in the Network Age. Understanding the Digital Economy conference. 1999: 1-14
    132张寅鹏.网络经济的报酬递增性分析.科技情报开发与经济. 2006, 16(9): 156-158
    133 R Albert, H Jeong, A Barabasi. Diameter of the World-Wide Web. Nature. 1999, 401(9): 131-131
    134 Saurabh Chaturvedi. Importance of Customer Retention in BSNL. ALTZINE Quarterly e-magazine. 2006, 1(4): 1-6
    135 Y Yuan, J Zhang. Towards an Appropriate Business Model for M-commerce. International Journal of Mobile Communication. 2003, 1(2): 35-56
    136 Adrian Wright. Controlling Risks of E-commerce Content. Computers & Security. 2001, 20: 147-154
    137 Tom Addison. E-commerce project development risks: evidence from a Delphi survey. International Journal of Information Management. 2003, 23: 25-40
    138阮新新.电子商务技术风险管理的探讨.经济问题探索. 2004(4): 96-97
    139林黎明,李新春.电子商务企业资源竞争风险的评估与控制.达州职业技术学院学报. 2006, 1(2): 53-55
    140 Ring P S, Van de Ven A H. Developmental process of cooperative interorganizational relationships. Academy of Management Review. 1994, 19: 90-118
    141 Williamson O E. Credible commitments: Using hostages to support exchange. American Economic Review. 1983, 73: 519-540
    142宋光兴,杨肖鸳,张玉青.虚拟企业的合作风险研究.软科学. 2004, 18(3): 83-86
    143赵阳.供应链合作风险与防范.税务与经济. 2008(2): 39-42
    144廖仁斌.电信企业战略转型模型构建与风险控制研究.华中科技大学管理学博士学位论文. 2006: 145-148

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700