导航:首页 > 电商促销 > 移动电子商务外文翻译

移动电子商务外文翻译

发布时间:2020-12-19 03:02:13

⑴ 求电子商务方面的英文文献或论文,翻译成汉字大约3000字。要有明确正规出处

Ecommerce Security Issues
Customer Security: Basic Principles

Most ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements:

privacy: information must be kept from unauthorized parties.

integrity: message must not be altered or tampered with.

authentication: sender and recipient must prove their identities to each other.

non-repudiation: proof is needed that the message was indeed received.

Privacy is handled by encryption. In PKI (public key infrastructure) a message is encrypted by a public key, and decrypted by a private key. The public key is widely distributed, but only the recipient has the private key. For authentication (proving the identity of the sender, since only the sender has the particular key) the encrypted message is encrypted again, but this time with a private key. Such proceres form the basis of RSA (used by banks and governments) and PGP (Pretty Good Privacy, used to encrypt emails).

Unfortunately, PKI is not an efficient way of sending large amounts of information, and is often used only as a first step — to allow two parties to agree upon a key for symmetric secret key encryption. Here sender and recipient use keys that are generated for the particular message by a third body: a key distribution center. The keys are not identical, but each is shared with the key distribution center, which allows the message to be read. Then the symmetric keys are encrypted in the RSA manner, and rules set under various protocols. Naturally, the private keys have to be kept secret, and most security lapses indeed arise here.

:Digital Signatures and Certificates
Digital signatures meet the need for authentication and integrity. To vastly simplify matters (as throughout this page), a plain text message is run through a hash function and so given a value: the message digest. This digest, the hash function and the plain text encrypted with the recipient's public key is sent to the recipient. The recipient decodes the message with their private key, and runs the message through the supplied hash function to that the message digest value remains unchanged (message has not been tampered with). Very often, the message is also timestamped by a third party agency, which provides non-repudiation.

What about authentication? How does a customer know that the website receiving sensitive information is not set up by some other party posing as the e-merchant? They check the digital certificate. This is a digital document issued by the CA (certification authority: Verisign, Thawte, etc.) that uniquely identifies the merchant. Digital certificates are sold for emails, e-merchants and web-servers.

:Secure Socket Layers
Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. Indivial packets are sent by different routes. TCP/IP reassembles them in order and resubmits any packet showing errors. SSL uses PKI and digital certificates to ensure privacy and authentication. The procere is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates.

:PCI, SET, Firewalls and Kerberos
Credit card details can be safely sent with SSL, but once stored on the server they are vulnerable to outsiders hacking into the server and accompanying network. A PCI (peripheral component interconnect: hardware) card is often added for protection, therefore, or another approach altogether is adopted: SET (Secure Electronic Transaction). Developed by Visa and Mastercard, SET uses PKI for privacy, and digital certificates to authenticate the three parties: merchant, customer and bank. More importantly, sensitive information is not seen by the merchant, and is not kept on the merchant's server.

Firewalls (software or hardware) protect a server, a network and an indivial PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees.

Transactions
Sensitive information has to be protected through at least three transactions:

credit card details supplied by the customer, either to the merchant or payment gateway. Handled by the server's SSL and the merchant/server's digital certificates.

credit card details passed to the bank for processing. Handled by the complex security measures of the payment gateway.

order and customer details supplied to the merchant, either directly or from the payment gateway/credit card processing company. Handled by SSL, server security, digital certificates (and payment gateway sometimes).

Practical Consequences
1. The merchant is always responsible for security of the Internet-connected PC where customer details are handled. Virus protection and a firewall are the minimum requirement. To be absolutely safe, store sensitive information and customer details on zip-disks, a physically separate PC or with a commercial file storage service. Always keep multiple back-ups of essential information, and ensure they are stored safely off-site.

2. Where customers order by email, information should be encrypted with PGP or similar software. Or payment should be made by specially encrypted checks and ordering software.

3. Where credit cards are taken online and processed later, it's the merchant's responsibility to check the security of the hosting company's webserver. Use a reputable company and demand detailed replies to your queries.

4. Where credit cards are taken online and processed in real time, four situations arise:

You use a service bureau. Sensitive information is handled entirely by the service bureau, which is responsible for its security. Other customer and order details are your responsibility as in 3. above.

You possess an ecommerce merchant account but use the digital certificate supplied by the hosting company. A cheap option acceptable for smallish transactions with SMEs. Check out the hosting company, and the terms and conditions applying to the digital certificate.

You possess an ecommerce merchant account and obtain your own digital certificate (costing some hundreds of dollars). Check out the hosting company, and enter into a dialogue with the certification authority: they will certainly probe your credentials.

You possess a merchant account, and run the business from your own server. You need trained IT staff to maintain all aspects of security — firewalls, Kerberos, SSL, and a digital certificate for the server (costing thousands or tens of thousands of dollars).

Security is a vexing, costly and complicated business, but a single lapse can be expensive in lost funds, records and reputation. Don't wait for disaster to strike, but stay proactive, employing a security expert where necessary.

Sites on our resources page supplies details.

⑵ 求一篇关于电子商务或者网络营销的外文翻译 带原文和出处

亲好^0^

很高兴为你解答问题:

我有几篇关于电子商务或者是网络营销的外文参考,附件已上传,看看是否有帮助。

不懂欢迎追问~

祝生活愉快!

⑶ 求一篇关于电子商务的英文文献及翻译,急~!!!!

An additional question is how a marketer could design websites that truly personalize proct recommendations and how consumers react to these versus more neutral, “third party” web sites such as www.kbb.com for automobiles.
we address the issue of the structure of one new tool (i.e., e-mail) that can help marketers be more efficient in testing direct marketing efforts.
direct marketing
Furthermore, work by Haubl and Trifts (2000) showed that a comparison matrix similar to the comparator proced higher quality consideration sets and decisions.
the possibility remains that providing information could postpone or even prevent purchase.
Agents are not new; a crude (by today’s standards) agent, Firefly, was developed in the mid-1990s for movie and music recommendations.
the amount of information available on the Web has increased dramatically as has the technological sophistication of the agents which makes continued research in this area important.
In particular, Haubl and Trifts (2000) show that recommender agents based on self-explicatedinformation about a consumer’s utility function (i.e., attribute weights and minimum acceptable attribute levels) rece search effort and improve decisions.
Agents should be adaptive, autonomous, and believable, be able to respond in a timely fashion, and be goal-oriented.
It has also been established that agents, like those studied by H¨aubl and his colleagues, that learn about consumers from choices and consumer preferences perform better in the long run than (say) collaborative filters (Ariely et al., 2004). This suggests that methods that calibrate consumer preferences in real time on-line are crucial to advancement.
polyhedral conjoint analysis (Toubia et al., 2003) satisfies these criteria. Liechty and his colleagues developed a Hierarchical Bayes procere that does so as well.
Montgomery et al. (2004) address the problem of designing a better shopbot.
They show that shopbots are inferior to visiting a favorite retailer if the shopbot visits all retailers.
Indeed, armed with some inferences from previous visits, a small set of initial screener questions can lead to an optimally personalized web interface for the consumer.
Based on a stochastic ration model and Bayesian updating , the authors adapt the testing parameters (e.g., number of e-mails sent for each e-mail design and sending rate) while the testing is in progress so as to minimize the cost of testing both in terms of wasted e-mails and time.
Only if the interactivity pays off.
In bargaining or auction situations, possible lack of trust and the inability to interpret the signalsof the other participant(s).
翻译
另外一个问题是,一个营销人员如果设计网页,嫩构真实的又有个性的推荐我们的产品,并且可以让顾客对产品的反应不是保持中立,“第三世界”的网页,就像www.kbb.com
我们对于新工具像email这种方式的看法是,它可以帮助营销人员更有效率的直接测试营销效果。
直接营销
更多的是,通过Haubl和Trifts(2000)的工作可知,类似的矩阵和计算机化相比较,生产出更高质量的产品和高质量的决策
可能性保持在提高那些可能推迟或者现在就购买的信息信息。
代理商,一个新的职业,简单的代理(现在的标准)。萤火虫(?),在20世纪90年代中期在电影和音乐推荐上有很大的发展。
由于代理商的科技的混合应用,使网页上可提供的信息量,有着惊人的增长,这使这个行业继续调长下去变得更为重要。
特别使,Haubl和Trifts(2000)的工作可知,推荐者代理基于对顾客自我阐述商品的信息(比如,重量和最小可接受的级别),减少调查的精力,提高决定能力。
代理商要有很好的适应能力,自主并且有自信,能够在第一时间回应状况,并且有目标。
同时,通过Haubl和其他同事的研究,代理商的形成,与合作过滤相比较,在长期运行中更好的学习了关于顾客的决定和执行偏好。这就给我们在关于顾客网上购物时的偏好提供了标准化。

只翻译了一半,翻不下去了,你参考一下吧,有的句子可能比较奇怪就是了

⑷ 求零售外贸在电子商务的运用相关的外文翻译,要求英文原文字符不少于1.5万字,中文译文不少3000字

不太清楚

⑸ 求一篇关于电子商务的外文文献(税收)加翻译。。

我处禁止上传文件,相关PDF外文文献有,翻译得靠你自己,希望能满足你的需要专,能帮属到你,多多给点悬赏分吧,急用的话请多选赏点分吧,这样更多的知友才会及时帮到你,我找到也是很花时间的,如果需要请直接网络 私信 或者 Hi 中留言贴出你在 网络知道的问题链接地址 及 邮箱地址我处禁止上传文件,相关PDF外文文献有,翻译得靠你自己,希望能满足你的需要,能帮到你,多多给点悬赏分吧,急用的话请多选赏点分吧,这样更多的知友才会及时帮到你,我找到也是很花时间的,如果需要请直接网络 私信 或者 Hi 中留言贴出你在 网络知道的问题链接地址 及 邮箱地址

⑹ 旅游电子商务 外文文献+翻译

最近搞论文的好多 都是100-200分的悬赏
但是我想告诉你
没有那么容易的。专你必须亲属自去搞这个东东。
设想下 此人精通英文 不通旅游电商 给你翻译出来的东西会准确吗?
2个都精通的人 大概也不会在乎你这100分了
倘若你真的有一天出名 小心你就是第二个唐骏

阅读全文

与移动电子商务外文翻译相关的资料

热点内容
菜市场策划方案模板 浏览:540
安防维保培训方案 浏览:271
感恩节的营销方案 浏览:55
街两新党组织书记培训方案 浏览:865
退休老干部春游策划方案 浏览:28
早教开业预售策划方案 浏览:656
青年骨干培训班培训方案 浏览:375
酒店厨师培训方案 浏览:99
职业培训投标方案 浏览:304
区域市场营销与促销策略答案 浏览:529
俄罗斯市场营销 浏览:74
好利来网络营销 浏览:585
酒店搞活动策划方案 浏览:736
深入贯彻党的十九培训方案 浏览:695
新疆干果网络营销策划书 浏览:761
中专市场营销专业技能 浏览:652
幼儿园青年教师学期培训方案 浏览:678
灭火器的使用培训方案 浏览:851
酒店谢师宴促销方案 浏览:324
教育培训立项报告方案 浏览:136