导航:首页 > 电商促销 > 电子商务方面的外文翻译

电子商务方面的外文翻译

发布时间:2021-07-27 01:01:01

㈠ 求一篇电子商务网络营销方面的外文文献,翻译成中文2000左右,要近两年的

自己去sciencedirect,springerlink等外文数据库下载啊
或者到知网,维普等中文数据库下载
很多的,校园网内免费获取
校园网外可以利用google学术搜索,有部分能免费下载
仅供参考~

㈡ 电子商务 外文翻译

Basic concepts
什么是电子商务呢,说白了就是电子是手段,商务是目的。 What is e-commerce it, saying that white is the Electronics is a means, business is the goal. 电子商务,英文是Electronic Commerce,简称EC。 E-commerce, English is the Electronic Commerce, referred to as EC. 电子商务涵盖 E-commerce covers 的范围很广,一般可分为企业对企业(Business-to-Business),或企业对消费者(Business-to-Customer)两种。 A wide range, generally can be divided into business to business (Business-to-Business), or business to consumers (Business-to-Customer) two kinds. 另外还有消费者对消费者(Customer-to-Customer)这种大步增长的模式。 There are also consumers of consumers (Customer-to-Customer) such a big growth pattern. 随着国内Internet使用人数的增加,利用Internet进行网络购物并以银行卡付款的消费方式已渐流行,市场份额也在迅速增长, 电子商务网站也层出不穷。 With the increase in the number of domestic Internet use, using Internet for online shopping and bank card payment has graally popular consumption patterns, market share is rapidly growing e-commerce sites are endless. 电子商务最常见之安全机制有SSL(安全套接层协议)及SET( 安全电子交易协议 )两种。 The most common security mechanism for e-commerce have SSL (Secure Sockets Layer) and SET (Secure Electronic Transaction) two kinds.

定义: Definition:

广义上指使用各种电子工具从事商务或活动。 The broad sense refers to the use of electronic tools for business or activities. 这些工具包括从初级的电报、电话、广播、电视、传真到计算机、 计算机网络 ,到NII(国家信息基础结构-信息高速公路)、GII(全球信息基础结构)和Internet等现代系统。 These tools range from elementary telegraph, telephone, radio, television, fax, computer, computer network, to the NII (National Information Infrastructure - Information Highway), GII (Global Information Infrastructure) and the Internet and other modern systems. 而商务活动是从泛商品(实物与非实物,商品与非商品化的生产要素等等)的需求活动到泛商品的合理、合法的消费除去典型的生产过程后的所有活动。 The commercial activities are concted from the Pan-goods (physical and non-physical, non-commercialization of goods and factors of proction, etc.) activities to the needs of the Pan-goods, a reasonable, legitimate consumer to remove the typical post-proction process of all activities. 狭义上指利用Internet从事商务或活动。 A narrow sense, refers to the use of Internet for business or activities.

【网络营销和电子商务】 【Internet marketing and e-commerce】

从时间上来讲,电子商务概念的出现要早于网络营销。 From the time of speaking, e-commerce earlier than the emergence of the concept of network marketing.

电子商务最早产生于上个世纪60年代,90年代得到长足发展。 E-commerce originated in the last century 60's, 90's by leaps and bounds. 电子商务产生和发展的重要条件主要是: 计算机的广泛应用。 And development of e-commerce, an important condition for mainly the following: extensive use of computers. 而网络营销是随着现代科学技术的发展、消费者价值观的变革与日趋激烈的市场竞争等诸多因素,出现并迅速崛起的,网络营销发展的最重要条件是:消费者价值观念的变革。 Along with the network marketing is the development of modern science and technology, consumer values change and the increasingly fierce market competition, and many other factors, emerged and rapidly growing, Internet marketing, the development of the most important conditions are: changes in consumer values.

从字面意义上讲,网络营销概念要比电子商务大。 From the literal sense, the concept of network marketing than the big e-commerce.

电子商务通常是指是在广泛的商业贸易活动中,在因特网开放的网络环境下,买卖双方不相谋面的情况下,实现交易达成的一种新型的商业运营模式,讲求的是在网络销售中获得商业盈利。 E-commerce generally refers to commercial trade in a wide range of activities, on the Internet an open network environment, buyers and sellers are not known one another for the case of phase to achieve the deal of a new business model, and stress is that in online sales in the access to commercial profit. 网络营销(cyber marketing),是指借助联机网络,电脑通讯和数字交互式媒体来实现的一种营销方式,讲求的是与目标人群的网络互动。 Internet Marketing (cyber marketing), refers to the use of online networks, computer communications and digital interactive media to achieve a kind of marketing, emphasizes that the network of interactions with the target population.

从包含的各个体系来说,网络营销和电子商务是交叉存在的。 From the various systems contained in it, network marketing and e-commerce is a cross-exist.

电子商务涵盖的范围很广,一般可分为B2B、B2C、 C2C、B2M四类电子商务模式。 Covers a wide range of e-commerce in general can be divided into B2B, B2C, C2C, B2M four categories of e-business models. 其中企业对企业(Business-to-Business),和企业对消费者(Business-to- Consumer)两种发展最早,另外还有消费者对消费者(Consumer-to-Consumer)这种大步增长的模式。 Including business to business (Business-to-Business), and business to consumer (Business-to-Consumer) two kinds of the earliest to develop, in addition to consumers for consumers (Consumer-to-Consumer) growth of this step模式. 网络营销包含网络调研 、 网络广告 、 网络公关 、整合营销、seo、sem等内容,每个内容都可以单独或者整合应用到电子商务中去。 Internet Marketing includes Internet research, online advertising, Internet public relations, integrated marketing, seo, sem and other content, each content can be applied alone or integrated into the e-commerce to go. 同样电子商务也离不开这些网络营销手段。 The same e-commerce marketing tool is also inseparable from these networks. 加100分行忙,我尽力了.

㈢ 求电子商务方面的英文文献或论文,翻译成汉字大约3000字。要有明确正规出处

Ecommerce Security Issues
Customer Security: Basic Principles

Most ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements:

privacy: information must be kept from unauthorized parties.

integrity: message must not be altered or tampered with.

authentication: sender and recipient must prove their identities to each other.

non-repudiation: proof is needed that the message was indeed received.

Privacy is handled by encryption. In PKI (public key infrastructure) a message is encrypted by a public key, and decrypted by a private key. The public key is widely distributed, but only the recipient has the private key. For authentication (proving the identity of the sender, since only the sender has the particular key) the encrypted message is encrypted again, but this time with a private key. Such proceres form the basis of RSA (used by banks and governments) and PGP (Pretty Good Privacy, used to encrypt emails).

Unfortunately, PKI is not an efficient way of sending large amounts of information, and is often used only as a first step — to allow two parties to agree upon a key for symmetric secret key encryption. Here sender and recipient use keys that are generated for the particular message by a third body: a key distribution center. The keys are not identical, but each is shared with the key distribution center, which allows the message to be read. Then the symmetric keys are encrypted in the RSA manner, and rules set under various protocols. Naturally, the private keys have to be kept secret, and most security lapses indeed arise here.

:Digital Signatures and Certificates
Digital signatures meet the need for authentication and integrity. To vastly simplify matters (as throughout this page), a plain text message is run through a hash function and so given a value: the message digest. This digest, the hash function and the plain text encrypted with the recipient's public key is sent to the recipient. The recipient decodes the message with their private key, and runs the message through the supplied hash function to that the message digest value remains unchanged (message has not been tampered with). Very often, the message is also timestamped by a third party agency, which provides non-repudiation.

What about authentication? How does a customer know that the website receiving sensitive information is not set up by some other party posing as the e-merchant? They check the digital certificate. This is a digital document issued by the CA (certification authority: Verisign, Thawte, etc.) that uniquely identifies the merchant. Digital certificates are sold for emails, e-merchants and web-servers.

:Secure Socket Layers
Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. Indivial packets are sent by different routes. TCP/IP reassembles them in order and resubmits any packet showing errors. SSL uses PKI and digital certificates to ensure privacy and authentication. The procere is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates.

:PCI, SET, Firewalls and Kerberos
Credit card details can be safely sent with SSL, but once stored on the server they are vulnerable to outsiders hacking into the server and accompanying network. A PCI (peripheral component interconnect: hardware) card is often added for protection, therefore, or another approach altogether is adopted: SET (Secure Electronic Transaction). Developed by Visa and Mastercard, SET uses PKI for privacy, and digital certificates to authenticate the three parties: merchant, customer and bank. More importantly, sensitive information is not seen by the merchant, and is not kept on the merchant's server.

Firewalls (software or hardware) protect a server, a network and an indivial PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees.

Transactions
Sensitive information has to be protected through at least three transactions:

credit card details supplied by the customer, either to the merchant or payment gateway. Handled by the server's SSL and the merchant/server's digital certificates.

credit card details passed to the bank for processing. Handled by the complex security measures of the payment gateway.

order and customer details supplied to the merchant, either directly or from the payment gateway/credit card processing company. Handled by SSL, server security, digital certificates (and payment gateway sometimes).

Practical Consequences
1. The merchant is always responsible for security of the Internet-connected PC where customer details are handled. Virus protection and a firewall are the minimum requirement. To be absolutely safe, store sensitive information and customer details on zip-disks, a physically separate PC or with a commercial file storage service. Always keep multiple back-ups of essential information, and ensure they are stored safely off-site.

2. Where customers order by email, information should be encrypted with PGP or similar software. Or payment should be made by specially encrypted checks and ordering software.

3. Where credit cards are taken online and processed later, it's the merchant's responsibility to check the security of the hosting company's webserver. Use a reputable company and demand detailed replies to your queries.

4. Where credit cards are taken online and processed in real time, four situations arise:

You use a service bureau. Sensitive information is handled entirely by the service bureau, which is responsible for its security. Other customer and order details are your responsibility as in 3. above.

You possess an ecommerce merchant account but use the digital certificate supplied by the hosting company. A cheap option acceptable for smallish transactions with SMEs. Check out the hosting company, and the terms and conditions applying to the digital certificate.

You possess an ecommerce merchant account and obtain your own digital certificate (costing some hundreds of dollars). Check out the hosting company, and enter into a dialogue with the certification authority: they will certainly probe your credentials.

You possess a merchant account, and run the business from your own server. You need trained IT staff to maintain all aspects of security — firewalls, Kerberos, SSL, and a digital certificate for the server (costing thousands or tens of thousands of dollars).

Security is a vexing, costly and complicated business, but a single lapse can be expensive in lost funds, records and reputation. Don't wait for disaster to strike, but stay proactive, employing a security expert where necessary.

Sites on our resources page supplies details.

㈣ 求一篇关于电子商务方面的外文文献要求是外国人写的,有作者,出处和中文翻译。答谢100财富

自己查数据库吧,我网络空间里有一些查数据库的免费帐号,可以自己去下载文献。

㈤ 我是电子商务专业的学生,毕业要写一篇6000字的外文翻译,不知道有哪些关于电子商务的英文书籍,望推荐!

希望你去网络文库搜搜,那里有很多关于电子商务的资料

㈥ 求电子商务论文外文翻译

原文pdf格式+翻译好的word文档格式已排版好,外文翻译一篇

阅读全文

与电子商务方面的外文翻译相关的资料

热点内容
社区文化周策划方案 浏览:165
小学教师学科远程培训方案 浏览:249
洁净工程售后人员培训方案 浏览:892
介于淘宝同学课程的推广方案 浏览:918
电子商务法律定义 浏览:487
电子商务训练平台 浏览:264
培训中心晚会策划方案 浏览:779
体育赛事商业赞助策划方案 浏览:589
物业公司内刊策划方案 浏览:552
幼儿园元旦游园方案策划 浏览:77
建材促销活动短信 浏览:58
电子商务进农村营销活动方案 浏览:841
围棋培训班招生方案 浏览:317
四月份踏青策划方案 浏览:811
项目成本策划方案 浏览:552
杭州熟买电子商务有限公司 浏览:702
培训机构集体活动策划方案 浏览:542
工会开展职工素质培训方案 浏览:612
评比优秀培训师活动方案 浏览:543
腊八节亲子活动策划方案 浏览:38