PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Modeling the process of purchase payment as a constituent of information security in e-commerce

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
A mathematical model of the process of payment for purchases in an online store has been pre-sented. The model belongs to the class of semi-open queueing networks with four phases of exponential servers and Poisson arrivals. The authors describe in detail the derivation of the equations describing the system. Analytic expressions are derived on the basis of the proposed model for the average number of online store customers who have already paid for goods. Practical implementation of the model allows us to determine the number of clients who have added goods to their cart, but have not yet passed through the payment verification system, and thus determine the stream of real customers of the online store.
Rocznik
Strony
83--99
Opis fizyczny
Bibliogr. 14 poz., rys., tab.
Twórcy
autor
  • Kyiv National Economic University named after Vadym Hetman, Faculty of Computer Science and Technology, Economic-Mathematic Modeling Department, Lvivska ploshcha, 14, Kyiv, 04053, Ukraine
autor
  • Kyiv National Economic University named after Vadym Hetman, Faculty of Computer Science and Technology, Economic-Mathematic Modeling Department, Lvivska ploshcha, 14, Kyiv, 04053, Ukraine
Bibliografia
  • [1] ANGUS B., 6 steps to an effective ecommerce privacy policy, Pract. Ecommer., 2014, http://www.practi calecommerce.com/articles/75977-6-Steps-to-an-Effective-Ecommerce-Privacy-Policy
  • [2] ANGUS B., Simple questions to improve ecommerce security, Pract. Ecommer., 2014, http://www.practi calecommerce.com/articles/74874-Simple-Questions-to-Improve-Ecommerce-Security
  • [3] Best practices for accepting payment cards, https://squareup.com/help/us/en/article/5079-best-practices -for-accepting-payment-cards#swiping-payments
  • [4] How to make the Internet safe for store customers, http://ubr.ua/ukraine-and-world/technology /kak-sdelat-internet-magazin-bezopasnym-dlia-klientov-354502 (in Russian).
  • [5] IDOV R., Safety of online stores, 2015, http://www.securitylab.ru/blog/company/securityinform /127414.php (in Russian).
  • [6] ISACA Glossary of Terms, http://www.isaca.org/Knowledge-Center/Documents/Glossary/glossary.pdf
  • [7] KHURRAM A., 5 Security essentials for ecommerce sites, 2013, http://www.sitepoint.com/5-security -essentials-ecommerce-sites/
  • [8] KLEINROCK L., Queueing Systems. Vol. 1. Theory, Wiley Interscience, New York 1975.
  • [9] PRABHU N.U., Stochastic Processes: Basic Theory and Its Applications, MacMillan, New York 1965.
  • [10] Protection checking online store, http://www.globaltrust.ru/ru/uslugi/audit-informacionnoi-bezopasnosti /proverka zaschischennosti-internet-magazina (in Russian).
  • [11] R Core Team, R: A language and environment for statistical computing, R Foundation for Statistical Computing, Vienna 2015, https://www.R-project.org
  • [12] SKITSKO V., IGNATOVA IU., Modeling logistic processes of orders fulfillment by online store as a queue-ing network, Business Inform., 2015, (8), 70 (in Ukrainian).
  • [13] Handbook of Stochastic Models and Analysis of Manufacturing System Operations, J.M. Smith, B. Tan (Eds.), Springer, New York 2013.
  • [14] ZHANG Z., Call centres with balking and abandonment: from queueing to queueing network models, Thesis, University of Saskatchewan Saskatoon, Saskatchewan 2010, https://ecommons.usask.ca /bitstream/handle/10388/etd-06222010-103338/ZhidongZhangThesisFinal.pdf
Uwagi
PL
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e2b93b9b-7fa6-4c6e-bf5a-2a61c0c7ff95
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.