【正文】
(2) Altered Emerce information for business performance in the authenticity and integrity issues. Electronic transaction information in the work transmission process may be others to illegally modify, delete or rechanged, so that information about its authenticity and integrity. (3) Identification Without identification, thirdparty transactions is likely to fake the identity of parties to a deal breaker, damage the reputation of being counterfeit or stolen by one party to the transaction fake results and so on, for identification, the transaction between the two sides can prevent suspicion situation. (4) Computer viruses Computer virus appeared 10 years, a variety of new virus and its variants rapidly increasing, the emergence of the Inter for the spread of the virus has provided the best medium. Many new viruses directly using the work as its transmission, as well as many viruses spread faster through dried works, frequently causing billions of dollars in economic losses. (5) Hacker With the spread of a variety of application tools, hackers have been popular, and are not in the past。s mafia boy did not receive any special training, only a few attacks to the users to download software and learn how to use the Inter on a big dry. Ⅴ .emerce security and safety factors Enterprise application security is the most worried about emerce, and how to protect the security of emerce activities, will remain the core of emerce research. As a secure emerce system, we must first have a safe, reliable munication work, to ensure that transaction information secure and rapid transmission。 improve the level of work security technology. Emerce security law is the prerequisite and basis for development and secure emerce security technology is a means of protection. There are many security issues are technical reasons, it should increase the technology resources, and continuously push forward the development of old technologies and developing new security technology. (4) To encourage enterprises to protect themselves against Inter crime against. To avoid attack, panies can not hold things to chance, must attach great importance to system vulnerabilities, in time to find security holes to install the operating system and server patches, and work security detection equipment should be used regularly scan the work monitoring, develop a set of plete security protection system to enable enterprises to form a system and bined with the prehensive protection system. (5) To strengthen international cooperation to strengthen global efforts to bat cyber crime. As emerce knows no borders, no geographical, it is a pletely open area, so the action against cyber crime emerce will also be global. This will require Governments to strengthen cooperation, can not have the saying which goes, regardless of others, cream tile misconception. (6) To strengthen the work of national safety education, pay attention to the cultivation of outstanding puter. Ⅶ . Conclusion Emerce in China has developed rapidly in recent years, but