Evaluation of E-Commerce Security using Shannon Entropy & Dempster-Shafer (DS) theory

Publish Year: 1395
نوع سند: مقاله ژورنالی
زبان: English
View: 117

This Paper With 24 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JITM-8-1_004

تاریخ نمایه سازی: 26 بهمن 1400

Abstract:

The purpose of this study is to develop a method and a structure which enable us to evaluate security in e-commerce in different companies by various experts. In this study, Shannon entropy was placed along with Dempster- Shafer theory so that the ultimate level of security could be measured. Considering the fact that in the present study collecting data is based on the decision of a team of experts, data collection procedures were conducted in two phases; in the first phase, data related to determining the weight of measures were collected and in the second phase, the data about the security level of criteria were collected through interview and using a decision team in four commercial companies in Mashhad who were willing to cooperate. Then, the importance of security measures in relation to each other, security level of each measure and the overall level of security in this commercial company were determined. The final results showed that the overall level of security for the three companies is high and one is medium.

Authors

مریم حاج ملک

MSc., In Business Administration International Marketing, Department of Economics and Business Administration, Ferdowsi University of Mashhad (FUM), Iran

احمد توکلی

Assistant Prof., Faculty of Management Department, Ferdowsi University of Mashhad, Iran.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Aljifri, H. A., Pons, A. & Collins, D. (۲۰۰۳). Global ...
  • Ghasemi Shabankar, K., Mokhtari, V. & Amini Lari, M. (۲۰۰۸). ...
  • Goseva-Popstojanova, K., Anastasovski, G., Dimitrijevikj, A., Pantev, R. & Miller, ...
  • Huynh, V. N. (۲۰۰۹). Discounting and combination scheme in evidence ...
  • Jafari, M. (۲۰۰۷). Cyber Space Security Foundations (First Ed.). Tehran: ...
  • Keersebilck, P. & Vanhoucke, W. (۲۰۰۶). Smart Card (In-) Security. ...
  • Khodadad Hosseini, H. & Fathi, S. (۲۰۰۳). Providing a method ...
  • Kraft, T. A. & Kakar, R. (۲۰۰۹). E-commerce security. In ...
  • Liu, D. (۲۰۱۱). E-commerce system security assessment based on grey ...
  • Mahboub Eshratabadi, H., Mirkamali, M., Esmail Manap, SH. & Mehri, ...
  • Monavarian, A., Manian, A., Movahedi, M. & Akbari, M. (۲۰۱۴). ...
  • Sabaghkermani, M. & Esfidani, M. (۲۰۰۶). A Survey on the ...
  • Sanayei, A. (۲۰۰۵). The E-Commerce in Third Millennium (Second Ed.). ...
  • Sentz, K. & Ferson, S. (۲۰۰۲). Combination of evidence in ...
  • Shahibi, M. S. & Fakeh, S. K. W. (۲۰۱۱). Security ...
  • Tajfar, A.H., Mahmoudi Maymand, M., Rezasoltani, F. & Rezasoltani, P. ...
  • Zhang, Y., Deng, X., Wei, D. & Deng, Y. (۲۰۱۲). ...
  • Zuccato, A. (۲۰۰۴). Holistic Security Requirement Engineering for Electronic Commerce. ...
  • Zuccato, A. (۲۰۰۷). Holistic security management framework applied in electronic ...
  • نمایش کامل مراجع