導航:首頁 > 電商促銷 > 電子商務方面的外文翻譯

電子商務方面的外文翻譯

發布時間:2021-07-27 01:01:01

㈠ 求一篇電子商務網路營銷方面的外文文獻,翻譯成中文2000左右,要近兩年的

自己去sciencedirect,springerlink等外文資料庫下載啊
或者到知網,維普等中文資料庫下載
很多的,校園網內免費獲取
校園網外可以利用google學術搜索,有部分能免費下載
僅供參考~

㈡ 電子商務 外文翻譯

Basic concepts
什麼是電子商務呢,說白了就是電子是手段,商務是目的。 What is e-commerce it, saying that white is the Electronics is a means, business is the goal. 電子商務,英文是Electronic Commerce,簡稱EC。 E-commerce, English is the Electronic Commerce, referred to as EC. 電子商務涵蓋 E-commerce covers 的范圍很廣,一般可分為企業對企業(Business-to-Business),或企業對消費者(Business-to-Customer)兩種。 A wide range, generally can be divided into business to business (Business-to-Business), or business to consumers (Business-to-Customer) two kinds. 另外還有消費者對消費者(Customer-to-Customer)這種大步增長的模式。 There are also consumers of consumers (Customer-to-Customer) such a big growth pattern. 隨著國內Internet使用人數的增加,利用Internet進行網路購物並以銀行卡付款的消費方式已漸流行,市場份額也在迅速增長, 電子商務網站也層出不窮。 With the increase in the number of domestic Internet use, using Internet for online shopping and bank card payment has graally popular consumption patterns, market share is rapidly growing e-commerce sites are endless. 電子商務最常見之安全機制有SSL(安全套接層協議)及SET( 安全電子交易協議 )兩種。 The most common security mechanism for e-commerce have SSL (Secure Sockets Layer) and SET (Secure Electronic Transaction) two kinds.

定義: Definition:

廣義上指使用各種電子工具從事商務或活動。 The broad sense refers to the use of electronic tools for business or activities. 這些工具包括從初級的電報、電話、廣播、電視、傳真到計算機、 計算機網路 ,到NII(國家信息基礎結構-信息高速公路)、GII(全球信息基礎結構)和Internet等現代系統。 These tools range from elementary telegraph, telephone, radio, television, fax, computer, computer network, to the NII (National Information Infrastructure - Information Highway), GII (Global Information Infrastructure) and the Internet and other modern systems. 而商務活動是從泛商品(實物與非實物,商品與非商品化的生產要素等等)的需求活動到泛商品的合理、合法的消費除去典型的生產過程後的所有活動。 The commercial activities are concted from the Pan-goods (physical and non-physical, non-commercialization of goods and factors of proction, etc.) activities to the needs of the Pan-goods, a reasonable, legitimate consumer to remove the typical post-proction process of all activities. 狹義上指利用Internet從事商務或活動。 A narrow sense, refers to the use of Internet for business or activities.

【網路營銷和電子商務】 【Internet marketing and e-commerce】

從時間上來講,電子商務概念的出現要早於網路營銷。 From the time of speaking, e-commerce earlier than the emergence of the concept of network marketing.

電子商務最早產生於上個世紀60年代,90年代得到長足發展。 E-commerce originated in the last century 60's, 90's by leaps and bounds. 電子商務產生和發展的重要條件主要是: 計算機的廣泛應用。 And development of e-commerce, an important condition for mainly the following: extensive use of computers. 而網路營銷是隨著現代科學技術的發展、消費者價值觀的變革與日趨激烈的市場競爭等諸多因素,出現並迅速崛起的,網路營銷發展的最重要條件是:消費者價值觀念的變革。 Along with the network marketing is the development of modern science and technology, consumer values change and the increasingly fierce market competition, and many other factors, emerged and rapidly growing, Internet marketing, the development of the most important conditions are: changes in consumer values.

從字面意義上講,網路營銷概念要比電子商務大。 From the literal sense, the concept of network marketing than the big e-commerce.

電子商務通常是指是在廣泛的商業貿易活動中,在網際網路開放的網路環境下,買賣雙方不相謀面的情況下,實現交易達成的一種新型的商業運營模式,講求的是在網路銷售中獲得商業盈利。 E-commerce generally refers to commercial trade in a wide range of activities, on the Internet an open network environment, buyers and sellers are not known one another for the case of phase to achieve the deal of a new business model, and stress is that in online sales in the access to commercial profit. 網路營銷(cyber marketing),是指藉助聯機網路,電腦通訊和數字互動式媒體來實現的一種營銷方式,講求的是與目標人群的網路互動。 Internet Marketing (cyber marketing), refers to the use of online networks, computer communications and digital interactive media to achieve a kind of marketing, emphasizes that the network of interactions with the target population.

從包含的各個體系來說,網路營銷和電子商務是交叉存在的。 From the various systems contained in it, network marketing and e-commerce is a cross-exist.

電子商務涵蓋的范圍很廣,一般可分為B2B、B2C、 C2C、B2M四類電子商務模式。 Covers a wide range of e-commerce in general can be divided into B2B, B2C, C2C, B2M four categories of e-business models. 其中企業對企業(Business-to-Business),和企業對消費者(Business-to- Consumer)兩種發展最早,另外還有消費者對消費者(Consumer-to-Consumer)這種大步增長的模式。 Including business to business (Business-to-Business), and business to consumer (Business-to-Consumer) two kinds of the earliest to develop, in addition to consumers for consumers (Consumer-to-Consumer) growth of this step模式. 網路營銷包含網路調研 、 網路廣告 、 網路公關 、整合營銷、seo、sem等內容,每個內容都可以單獨或者整合應用到電子商務中去。 Internet Marketing includes Internet research, online advertising, Internet public relations, integrated marketing, seo, sem and other content, each content can be applied alone or integrated into the e-commerce to go. 同樣電子商務也離不開這些網路營銷手段。 The same e-commerce marketing tool is also inseparable from these networks. 加100分行忙,我盡力了.

㈢ 求電子商務方面的英文文獻或論文,翻譯成漢字大約3000字。要有明確正規出處

Ecommerce Security Issues
Customer Security: Basic Principles

Most ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements:

privacy: information must be kept from unauthorized parties.

integrity: message must not be altered or tampered with.

authentication: sender and recipient must prove their identities to each other.

non-repudiation: proof is needed that the message was indeed received.

Privacy is handled by encryption. In PKI (public key infrastructure) a message is encrypted by a public key, and decrypted by a private key. The public key is widely distributed, but only the recipient has the private key. For authentication (proving the identity of the sender, since only the sender has the particular key) the encrypted message is encrypted again, but this time with a private key. Such proceres form the basis of RSA (used by banks and governments) and PGP (Pretty Good Privacy, used to encrypt emails).

Unfortunately, PKI is not an efficient way of sending large amounts of information, and is often used only as a first step — to allow two parties to agree upon a key for symmetric secret key encryption. Here sender and recipient use keys that are generated for the particular message by a third body: a key distribution center. The keys are not identical, but each is shared with the key distribution center, which allows the message to be read. Then the symmetric keys are encrypted in the RSA manner, and rules set under various protocols. Naturally, the private keys have to be kept secret, and most security lapses indeed arise here.

:Digital Signatures and Certificates
Digital signatures meet the need for authentication and integrity. To vastly simplify matters (as throughout this page), a plain text message is run through a hash function and so given a value: the message digest. This digest, the hash function and the plain text encrypted with the recipient's public key is sent to the recipient. The recipient decodes the message with their private key, and runs the message through the supplied hash function to that the message digest value remains unchanged (message has not been tampered with). Very often, the message is also timestamped by a third party agency, which provides non-repudiation.

What about authentication? How does a customer know that the website receiving sensitive information is not set up by some other party posing as the e-merchant? They check the digital certificate. This is a digital document issued by the CA (certification authority: Verisign, Thawte, etc.) that uniquely identifies the merchant. Digital certificates are sold for emails, e-merchants and web-servers.

:Secure Socket Layers
Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. Indivial packets are sent by different routes. TCP/IP reassembles them in order and resubmits any packet showing errors. SSL uses PKI and digital certificates to ensure privacy and authentication. The procere is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates.

:PCI, SET, Firewalls and Kerberos
Credit card details can be safely sent with SSL, but once stored on the server they are vulnerable to outsiders hacking into the server and accompanying network. A PCI (peripheral component interconnect: hardware) card is often added for protection, therefore, or another approach altogether is adopted: SET (Secure Electronic Transaction). Developed by Visa and Mastercard, SET uses PKI for privacy, and digital certificates to authenticate the three parties: merchant, customer and bank. More importantly, sensitive information is not seen by the merchant, and is not kept on the merchant's server.

Firewalls (software or hardware) protect a server, a network and an indivial PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees.

Transactions
Sensitive information has to be protected through at least three transactions:

credit card details supplied by the customer, either to the merchant or payment gateway. Handled by the server's SSL and the merchant/server's digital certificates.

credit card details passed to the bank for processing. Handled by the complex security measures of the payment gateway.

order and customer details supplied to the merchant, either directly or from the payment gateway/credit card processing company. Handled by SSL, server security, digital certificates (and payment gateway sometimes).

Practical Consequences
1. The merchant is always responsible for security of the Internet-connected PC where customer details are handled. Virus protection and a firewall are the minimum requirement. To be absolutely safe, store sensitive information and customer details on zip-disks, a physically separate PC or with a commercial file storage service. Always keep multiple back-ups of essential information, and ensure they are stored safely off-site.

2. Where customers order by email, information should be encrypted with PGP or similar software. Or payment should be made by specially encrypted checks and ordering software.

3. Where credit cards are taken online and processed later, it's the merchant's responsibility to check the security of the hosting company's webserver. Use a reputable company and demand detailed replies to your queries.

4. Where credit cards are taken online and processed in real time, four situations arise:

You use a service bureau. Sensitive information is handled entirely by the service bureau, which is responsible for its security. Other customer and order details are your responsibility as in 3. above.

You possess an ecommerce merchant account but use the digital certificate supplied by the hosting company. A cheap option acceptable for smallish transactions with SMEs. Check out the hosting company, and the terms and conditions applying to the digital certificate.

You possess an ecommerce merchant account and obtain your own digital certificate (costing some hundreds of dollars). Check out the hosting company, and enter into a dialogue with the certification authority: they will certainly probe your credentials.

You possess a merchant account, and run the business from your own server. You need trained IT staff to maintain all aspects of security — firewalls, Kerberos, SSL, and a digital certificate for the server (costing thousands or tens of thousands of dollars).

Security is a vexing, costly and complicated business, but a single lapse can be expensive in lost funds, records and reputation. Don't wait for disaster to strike, but stay proactive, employing a security expert where necessary.

Sites on our resources page supplies details.

㈣ 求一篇關於電子商務方面的外文文獻要求是外國人寫的,有作者,出處和中文翻譯。答謝100財富

自己查資料庫吧,我網路空間里有一些查資料庫的免費帳號,可以自己去下載文獻。

㈤ 我是電子商務專業的學生,畢業要寫一篇6000字的外文翻譯,不知道有哪些關於電子商務的英文書籍,望推薦!

希望你去網路文庫搜搜,那裡有很多關於電子商務的資料

㈥ 求電子商務論文外文翻譯

原文pdf格式+翻譯好的word文檔格式已排版好,外文翻譯一篇

閱讀全文

與電子商務方面的外文翻譯相關的資料

熱點內容
小學教師學科遠程培訓方案 瀏覽:249
潔凈工程售後人員培訓方案 瀏覽:892
介於淘寶同學課程的推廣方案 瀏覽:918
電子商務法律定義 瀏覽:487
電子商務訓練平台 瀏覽:264
培訓中心晚會策劃方案 瀏覽:779
體育賽事商業贊助策劃方案 瀏覽:589
物業公司內刊策劃方案 瀏覽:552
幼兒園元旦游園方案策劃 瀏覽:77
建材促銷活動簡訊 瀏覽:58
電子商務進農村營銷活動方案 瀏覽:841
圍棋培訓班招生方案 瀏覽:317
四月份踏青策劃方案 瀏覽:811
項目成本策劃方案 瀏覽:552
杭州熟買電子商務有限公司 瀏覽:702
培訓機構集體活動策劃方案 瀏覽:542
工會開展職工素質培訓方案 瀏覽:612
評比優秀培訓師活動方案 瀏覽:543
臘八節親子活動策劃方案 瀏覽:38
我國電子商務外貿現狀 瀏覽:999