• 首页>范文 > 范文
  • 外文文献翻译范文移动电子商务的兴起

    “移动电子商务”的外文文献

    这是我找到的,看是否能让您满意~~

    包括:

    文档,共6份:

    accessible E-COMMERCE IN AUSTRALIA

    Innovation through E-commerce Title of Paper

    Mobile Computing and Commerce

    Mobile e-commerce

    QUESTIonNAIRE FOR E-COMMERCE BUSINESS PARTNERS

    Wireless E-Commerce and Ubiquitous Computing

    电子书,共3本:

    ISSUES IN MOBILE E-COMMERCE

    Mobile E-Commerce and Location-based Services

    Mobile E-commerce business model

    请一定要严格按照以下步骤操作,确保您的下载成功~

    第一步:打开下面的链接:

    http://rapidshare.com/files/36977780/yddzsw.rar

    第二步:选择本页面最下面的“Free”按钮;

    第三步:选择Download From Level(3)前面的圆圈;

    第四步:输入下方图片中的认证码,点击右侧的下载按钮“Download From Level(3)”。

    注意事项:如果第一次下载失败后请在10分钟后重复下载~好东西就是不容易搞哦~~

    我能容忍自己每个字都是错的,但是却不能容忍其中任何一个字不是真诚的。

    祝好运~~

    求电子商务方面的英文文献或论文,翻译成汉字大约3000字

    Ecommerce Security IssuesCustomer Security: Basic PrinciplesMost ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements: privacy: information must be kept from unauthorized parties.integrity: message must not be altered or tampered with.authentication: sender and recipient must prove their identities to each other.non-repudiation: proof is needed that the message was indeed received.Privacy is handled by encryption. In PKI (public key infrastructure) a message is encrypted by a public key, and decrypted by a private key. The public key is widely distributed, but only the recipient has the private key. For authentication (proving the identity of the sender, since only the sender has the particular key) the encrypted message is encrypted again, but this time with a private key. Such procedures form the basis of RSA (used by banks and governments) and PGP (Pretty Good Privacy, used to encrypt emails).Unfortunately, PKI is not an efficient way of sending large amounts of information, and is often used only as a first step — to allow two parties to agree upon a key for symmetric secret key encryption. Here sender and recipient use keys that are generated for the particular message by a third body: a key distribution center. The keys are not identical, but each is shared with the key distribution center, which allows the message to be read. Then the symmetric keys are encrypted in the RSA manner, and rules set under various protocols. Naturally, the private keys have to be kept secret, and most security lapses indeed arise here.:Digital Signatures and CertificatesDigital signatures meet the need for authentication and integrity. To vastly simplify matters (as throughout this page), a plain text message is run through a hash function and so given a value: the message digest. This digest, the hash function and the plain text encrypted with the recipients public key is sent to the recipient. The recipient decodes the message with their private key, and runs the message through the supplied hash function to that the message digest value remains unchanged (message has not been tampered with). Very often, the message is also timestamped by a third party agency, which provides non-repudiation.What about authentication? How does a customer know that the website receiving sensitive information is not set up by some other party posing as the e-merchant? They check the digital certificate. This is a digital document issued by the CA (certification authority: Verisign, Thawte, etc.) that uniquely identifies the merchant. Digital certificates are sold for emails, e-merchants and web-servers.:Secure Socket LayersInformation sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. Individual packets are sent by different routes. TCP/IP reassembles them in order and resubmits any packet showing errors. SSL uses PKI and digital certificates to ensure privacy and authentication. The procedure is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. once the session keys are agreed, communication continues with these session keys and the digital certificates.:PCI, SET, Firewalls and KerberosCredit card details can be safely sent with SSL, but once stored on the server they are vulnerable to outsiders hacking into the server and accompanying network. A PCI (peripheral component interconnect: hardware) card is often added for protection, therefore, or another approach altogether is adopted: SET (Secure Electronic Transaction). Developed by Visa and Mastercard, SET uses PKI for privacy, and digital certificates to authenticate the three parties: merchant, customer and bank. More importantly, sensitive information is not seen by the merchant, and is not kept on the merchants server.Firewalls (software or hardware) protect a server, a network and an individual PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees.TransactionsSensitive information has to be protected through at least three transactions:credit card details s。

    电子商务英文文献

    Electronic commerce, commonly known as e-commerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily since the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transactions lifecycle, although it can encompass a wider range of technologies such as e-mail as well.A large percentage of electronic commerce is conducted entirely electronically for virtual items such as access to premium content on a website, but most electronic commerce involves the transportation of physical items in some way. online retailers are sometimes known as e-tailers and online retail is sometimes known as e-tail. Almost all big retailers have electronic commerce presence on the World Wide Web.Electronic commerce that is conducted between businesses is referred to as Business-to-business or B2B. B2B can be open to all interested parties (e.g. commodity exchange) or limited to specific, pre-qualified participants (private electronic market).Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of the business transactions.HistoryEarly developmentThe meaning of electronic commerce has changed over the last 30 years. Originally, electronic commerce meant the facilitation of commercial transactions electronically, using technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). These were both introduced in the late 1970s, allowing businesses to send commercial documents like purchase orders or invoices electronically. The growth and acceptance of credit cards, automated teller machines (ATM) and telephone banking in the 1980s were also forms of electronic commerce. From the 1990s onwards, electronic commerce would additionally include enterprise resource planning systems (ERP), data mining and data warehousing.Perhaps it is introduced from the Telephone Exchange Office, or maybe not.The earliest example of many-to-many electronic commerce in physical goods was the Boston Computer Exchange, a marketplace for used computers launched in 1982. The first online information marketplace, including online consulting, was likely the American Information Exchange, another pre-Internet online system introduced in 1991.Timeline1990: Tim Berners-Lee wrote the first web browser, WorldWideWeb, using a NeXT computer. 1992: J.H. Snider and Terra Ziporyn published Future Shop: How New Technologies Will Change the Way We Shop and What We Buy. St. Martins Press. ISBN 0312063598. 1994: Netscape released the Navigator browser in October under the code name Mozilla. Pizza Hut offered pizza ordering on its Web page. The first online bank opened. Attempts to offer flower delivery and magazine subscriptions online. Adult materials were also commercially available, as were cars and bikes. Netscape 1.0 in late 1994 introduced SSL encryption that made transactions secure. 1995: Jeff Bezos launched Amazon.com and the first commercial-free 24 hour, internet-only radio stations, Radio HK and NetRadio started broadcasting. Dell and Cisco began to aggressively use Internet for commercial transactions. eBay was founded by computer programmer Pierre Omidyar as AuctionWeb. 1998: Electronic postal stamps can be purchased and downloaded for printing from the Web. 1999: business.com was sold for US $7.5 million, which was purchased in 1997 for US $150,000. The peer-to-peer filesharing software Napster was launched. 2000: The dot-com bust. 2003: Amazon.com had its first year with a full year of profit. Business applicationsSome common applications related to electronic commerce are:E-mail and messaging documents, spreadsheets, database Accounting and finance systems Orders and shipment information Enterprise and client information reporting Domestic and international payment systems Newsgroup On-line Shopping Messaging Conferencing Government regulationsIn the United States, some electronic commerce activities are regulated by t。

    毕业论文外文翻译:关于电子商务与国际贸易方面的

    《电子商务与国际贸易》毕业论文电子商务与国际贸易的发展 摘要:本文分析了电子商务在国际贸易中的基本功能和优势,指出了电子商务对国际贸易的影响。

    关键词:电子商务,国际贸易,功能,影响基于因特网的、以交易双方为主体,以银行的电子支付和结算为手段. 以客户数据为依托的全新商务模式—— 电子商务正在全球范围内蓬勃兴起.并已成为推动新世纪世界经济增长的关键动力。电子商务的迅猛发展.对传统的国际贸易活动来说.既带来了前所未有的挑战.也提供了十分难得的发展机遇影响将会是十分深远的。

    一、电子商务在国际贸易中的基本功能传统的国际贸易活动.环节众多,业务运作过程十分复杂.效率低.周期长.越来越不适应当今国际贸易业务快速发展的需要。电子商务通过因特网将交易涉及的各方连成~体.把其中部分或全部的业务处理过程转移到网上。

    与传统的国际贸易活动相对应,电子商务在国际贸易中具有以下基本功能:1.物色贸易伙伴。物色贸易伙伴是开展国际贸易的前提。

    利用电子商务物色贸易伙伴 既可以节省大量的人力、物力的投入,而且还不受时间、地点的限制。国内的进出13企业足不出户就可以找到国外的贸易伙伴 国外的客户也可轻而易举地物色到最理想的中国进出13企业。

    2.咨询、洽谈 咨询、洽谈是每一笔国际贸易业务的必经程序,也是交易能否成功的关键环节。通过因特网进行咨询和洽谈可以跨越面对面洽谈的限制,提供多种方便的异地交流方式。

    3.网上订购与支付。电子商务可借助网站中的邮件交互传递网上的订购.并可通过银行和信用卡公司的参与实现网上支付。

    随着网络安全技术的不断发展,网上支付在国际贸易中的优势将会表现得更加明显。4.交易管理。

    电子商务使国际贸易的交易管理做到无纸化、网络化,使从事进出13业务的企业可直接通过因特网办理与银行.保险 税务,运输各方有关的电子票据和电子单证,完成部分或全部的结算以及索赔等工作,大大节省了交易过程的时间和费用。二.电子商务在国际贸易中的主要优势1.显著降低国际贸易成本。

    与国内贸易相比,国际贸易的单证数量繁多,处理费用高昂。如1 9 9 6年全球跨国贸易中以纸面单据为主的各种杂项开支达3 5O0亿美元, 占当年世贸总值的7% 。

    通过电子商务进行国际贸易.既可节省大约90% 左右的文件处理费用,又可缩短交单结汇的时间,加快资金周转.还可节省利息开支.成本优势十分显著。2 交易效率显著提高。

    利用电子商务开展国际贸易,买卖双方可采用标准化、电子化的格式合同、提单、保险凭证、发票和汇票、信用证等,使各种相关单证在网上即可实现瞬间传递,大大节省了单证的传输时间.而且还能有效地减少因纸面单证中数据重复录入导致的各种错误.对提高交易效率的作用十分明显。3 全天候业务运作,提高客户满意度。

    由于世界各地存在时差.进行国际商务的谈判就相当不便,而利用电子商务可以做到24小时的全天候服务.任何客户都可在全球任何地方、任何时间从网上得到相关企业的各种商务信息。4.减少贸易壁垒.扩大贸易机会。

    因特网作为一个全球性的网络,彻底消除了地域的界限.对减少国际贸易中的有形和一无形壁垒有着积极的意义。在网上做生意.没有了宗教信l侮的限制,也没有了种族的歧视.甚至公司的规模和经济实力的差别都显得不再重要。

    5 减轻对实物基础设施的依赖。传统的企业开展国际贸易业务都必须拥有相应的基础设施.如办公用房、仓储设施、产品展示厅、销售店铺等。

    与开展国内贸易相比.进行国际贸易对实物基础设施的依赖程度要高得多。如果利用电子商务开展国际贸易业务的话,则在这方面的投入显然要小很多。

    6.提高外贸企业的国际竞争力。外贸企业可以通过建立相关站点主动发布有关供求信息.及时与客户进行双向沟通与交流.可借助网络宣传自己的企业形象 扩大企业知名度,逐渐利用电子商务这一先进的工具为增强企业的国际市场竞争力服务。

    三、电子商务的发展对国际贸易的影响电子商务的发展将对国际贸易产生深远的影响.无论是国际贸易的业务运作,还是各国政府对国际贸易的监管等各个方面都会发生深刻的变化。1.国际贸易的运作环境将发生变化。

    随着电子商务的迅速发展,国际贸易的业务活动将会逐渐转移到电子虚拟市场进行。与传统市场的运作方式明显不同的是:在电子虚拟市场上.国际贸易业务的实现形式基本上呈现电子化、数字化、网络化和虚拟化的特点。

    2.国际贸易的业务流程将发生改变。电子商务使国际贸易业务运作的流程发生深刻的变化,在交易前,买方通过因特网寻找自己满意的商品和服务,而卖方则可在网络上对其产品进行宣传,及时了解买方的需求,寻找合适的贸易伙伴和恰当的贸易机会;在交易中 交易双方通过因特网对交易进行具体谈判. 谈成后.用电子文件或书面文件的形式签订合同.并通过因特网传递各种贸易单证:交易后.卖方可通过因特网提供售后服务.如发生贸易纠纷.双方还可利用因特网进行必要的磋商。

    3.国际贸易的竞争方式将有所不同。在电子商务环境下.企业之间的竞争也将不再是简单的产品或服务的竞争.而是商务模式和供应链之间的竞争 哪家厂商能以最快的速度把。

    高分急求求一篇关于电子商务的英文文献``

    An additional question is how a marketer could design websites that truly personalize product recommendations and how consumers react to these versus more neutral, “third party” web sites such as www.kbb.com for automobiles. we address the issue of the structure of one new tool (i.e., e-mail) that can help marketers be more efficient in testing direct marketing efforts. direct marketing Furthermore, work by Haubl and Trifts (2000) showed that a comparison matrix similar to the comparator produced higher quality consideration sets and decisions. the possibility remains that providing information could postpone or even prevent purchase. Agents are not new; a crude (by todays standards) agent, Firefly, was developed in the mid-1990s for movie and music recommendations. the amount of information available on the Web has increased dramatically as has the technological sophistication of the agents which makes continued research in this area important. In particular, Haubl and Trifts (2000) show that recommender agents based on self-explicatedinformation about a consumers utility function (i.e., attribute weights and minimum acceptable attribute levels) reduce search effort and improve decisions. Agents should be adaptive, autonomous, and believable, be able to respond in a timely fashion, and be goal-oriented. It has also been established that agents, like those studied by H¨aubl and his colleagues, that learn about consumers from choices and consumer preferences perform better in the long run than (say) collaborative filters (Ariely et al., 2004). This suggests that methods that calibrate consumer preferences in real time on-line are crucial to advancement. polyhedral conjoint analysis (Toubia et al., 2003) satisfies these criteria. Liechty and his colleagues developed a Hierarchical Bayes procedure that does so as well. Montgomery et al. (2004) address the problem of designing a better shopbot. They show that shopbots are inferior to visiting a favorite retailer if the shopbot visits all retailers. Indeed, armed with some inferences from previous visits, a small set of initial screener questions can lead to an optimally personalized web interface for the consumer. based on a stochastic duration model and Bayesian updating , the authors adapt the testing parameters (e.g., number of e-mails sent for each e-mail design and sending rate) while the testing is in progress so as to minimize the cost of testing both in terms of wasted e-mails and time. only if the interactivity pays off. In bargaining or auction situations, possible lack of trust and the inability to interpret the signalsof the other participant(s).Managing Channels of Distribution Under the Environment of Electronic Commerce 【英文篇名】 Managing Channels of Distribution Under the Environment of Electronic Commerce 【作者英文名】 ZHENG Bing~1 FENG Yixiong~2 1.College of Economics & Management; Dalian University; Dalian 116622; China 2.State Key Laboratory of CAD&CG; Zhejiang University; Hangzhou 310027; China; 【文献出处】 武汉理工大学学报, Journal of WuhanUniversity of Technology, 编辑部邮箱 2006年 S2期 【英文关键词】 marketing channels; distribution strategy; customer demand; electronic commerce; Fair E-Payment Protocol based on Simple Partially Blind Signature Scheme 【英文篇名】 Fair E-Payment Protocol based on Simple Partially Blind Signature Scheme 【作者英文名】 LIU Jingwei; SUN Rong; KOU Weidong State Key Laboratory of Integrated Service Networks; Xidian University; Xian 710071; Shaanxi; China; 【文献出处】 Wuhan University Journal of Natural Sciences, 武汉大学自然科学学报(英文版), 编辑部邮箱 2007年 01期 【英文关键词】 electronic commerce; e-payment; Schnorr signature; partial blind signature; 【英文摘要】 This paper presents a simple partially blind signature scheme with low computation. By converse using the partially blind signature scheme, we build a simple fair e-payment protocol. In the protocol, two participants achieve the goals of exchanging their digital signatures from each other in a simple way. An ad- vantage of this scheme is that this approach does not require the intervention of the third party in any case. The low-computation property makes our scheme very attractive for mobile client and sma。

    求一篇关于电子商务的外文翻译 (中文+英文)

    Internet作为电子商务的载体,已成为企业必不可少的信息采集、传输和交换的工具,网络(信息)时代的到来为基于Internet的IT服务业注入了新的活力,

    Internet is electronic vehicle for business on line, it turns to be unsplit tool for company for the purpose of collection, transferring and exchange for information, with the net work ( information) age availability, which input new vigor into IT service industry based on internet.

    其中电子商务(Electronic Commerce, EC)更是备受瞩目,已被公认为是影响21世纪世界经济格局的新型经济模式和催化剂。

    Whereby, Electronic Commerce is the focus of attention, and regarded as new economic mode and activator for global economics in 21st centrury.

    在它经历了三个艰难的发展历程(电子零售、电子贸易和网上交易市场)之后,逐渐成熟起来,它的核心是运用现代计算机通讯技术,

    after it passed 3 difficult stages (electronic retail sales, electronic trading and sales market on line), it is mature step by step, it lies in his core tech. from modern computer communication system.

    尤其是网络技术为企业进行社会生产经营活动服务,使企业提高生产效益、降低经营成本、优化资源配置,从而实现社会财富的最大化。

    Especially net work technology serves for social production operation of companies so as to improve the production output and benefit, to decrease the operation costing, to optimize resource , so that maximum social property can be realised.

    特别是对于中小企业来说电子商务通过良好地运用,更能出现一些惊喜的结果。

    The most surprising target is achieved by small and medium size enterprises who make good use of electronic business.

    本文共分为四章,通过研究电子商务对中小企业的影响和重要性来阐述中小企业在面临这个电子化、网络化的时代所可以采取的一些策略和办法来提高企业的核心竞争力。

    The article is drafted in 4 chapters, with the study on the influence and importance of electronic business for small and medium sized companies, it set forth some strategies and actions can be taken in order to improve the company core competency of competition in the net work age.

    求两篇关于电子商务的英文文献

    查到很多,但是我电脑下载速度慢,现在弄到三篇文章全文如果你觉得合适发邮件到我邮箱我给你全文qingshuixiaobing@126.com[1] Wade, M. and S. Nevo, Development and Validation of a Perceptual Instrument to Measure E-Commerce Performance. International Journal of Electronic Commerce, 2006. 10(2): p. 123-146.[2] Belanger, F., E-Commerce Web Development: Perspective from the Field. Journal of Electronic Commerce in Organizations, 2006. 4(2): p. 1–4.[3] Fisher, J., H. Scheepers, and R. Scheepers, E-Commerce Research in Australia. SCANDINAVIAN JOURNAL OF INFORMATION SYSTEMS, 2007. 19(1): p. 39。

    .。

    发表评论

    登录后才能评论