當前位置:首頁 » 文旅發展 » 翻譯一篇旅遊業電子商務的英文文獻

翻譯一篇旅遊業電子商務的英文文獻

發布時間: 2020-12-04 09:14:38

Ⅰ 求助翻譯一篇關於電子商務的英文

Ebusiness is a term used to describe businesses run on the Internet, or utilizing Internet technologies to improve the proctivity or profitability of a business. In a more general sense, the term may be used to describe any form of electronic business —- that is to say, any business which utilizes a computer. This usage is somewhat archaic, however, and in most contexts ebusiness refers exclusively to Internet businesses.

The most common implementation of ebusiness is as an additional, or in some cases primary, storefront. By selling procts and services online, an ebusiness is able to reach a much wider consumer base than any traditional brick-and-mortar store could ever hope for. This function of ebusiness is referred to as ecommerce, and the terms are occasionally used interchangeably.

An ebusiness may also use the Internet to acquire wholesale procts or supplies for in-house proction. This facet of ebusiness is sometimes referred to as eprocurement, and may offer businesses the opportunity to cut their costs dramatically. Even many ebusinesses which operate without an electronic storefront now use eprocurement as a way to better track and manage their purchasing.

In addition to buying and selling procts, ebusiness may also handle other traditional business aspects. The use of electronic chat as a form of technical and customer support is an excellent example of this. An ebusiness which uses chat to supplement its traditional phone support finds a system which saves incredible amounts of time while providing opportunities unavailable through traditional support. By using virtual computer systems, for example, technical support operators can remotely access a customer's computer and assist them in correcting a problem. And with the download of a small program, all pertinent information about the hardware and software specifications for a user's computer may be relayed to the support operator directly, without having to walk a customer through personally collecting the data.

Using email and private websites as a method for dispensing internal memos and white sheets is another use of the Internet by ebusiness. Rather than procing time-intensive and costly physical copies for each employee, a central server or email list can serve as an efficient method for distributing necessary information.

In the past few years, virtually all businesses have become, to some degree or another, an ebusiness. The pervasiveness of Internet technology, readily available solutions, and the repeatedly demonstrated benefits of electronic technology have made ebusiness the obvious path. This trend continues with new technologies, such as Internet-enabled cell phones and PDAs, and the trend of ebusiness saturation will most likely continue for some time.

Ⅱ 求一篇關於電子商務的英文文獻及翻譯,急~!!!!

An additional question is how a marketer could design websites that truly personalize proct recommendations and how consumers react to these versus more neutral, 「third party」 web sites such as www.kbb.com for automobiles.
we address the issue of the structure of one new tool (i.e., e-mail) that can help marketers be more efficient in testing direct marketing efforts.
direct marketing
Furthermore, work by Haubl and Trifts (2000) showed that a comparison matrix similar to the comparator proced higher quality consideration sets and decisions.
the possibility remains that providing information could postpone or even prevent purchase.
Agents are not new; a crude (by today』s standards) agent, Firefly, was developed in the mid-1990s for movie and music recommendations.
the amount of information available on the Web has increased dramatically as has the technological sophistication of the agents which makes continued research in this area important.
In particular, Haubl and Trifts (2000) show that recommender agents based on self-explicatedinformation about a consumer』s utility function (i.e., attribute weights and minimum acceptable attribute levels) rece search effort and improve decisions.
Agents should be adaptive, autonomous, and believable, be able to respond in a timely fashion, and be goal-oriented.
It has also been established that agents, like those studied by H¨aubl and his colleagues, that learn about consumers from choices and consumer preferences perform better in the long run than (say) collaborative filters (Ariely et al., 2004). This suggests that methods that calibrate consumer preferences in real time on-line are crucial to advancement.
polyhedral conjoint analysis (Toubia et al., 2003) satisfies these criteria. Liechty and his colleagues developed a Hierarchical Bayes procere that does so as well.
Montgomery et al. (2004) address the problem of designing a better shopbot.
They show that shopbots are inferior to visiting a favorite retailer if the shopbot visits all retailers.
Indeed, armed with some inferences from previous visits, a small set of initial screener questions can lead to an optimally personalized web interface for the consumer.
Based on a stochastic ration model and Bayesian updating , the authors adapt the testing parameters (e.g., number of e-mails sent for each e-mail design and sending rate) while the testing is in progress so as to minimize the cost of testing both in terms of wasted e-mails and time.
Only if the interactivity pays off.
In bargaining or auction situations, possible lack of trust and the inability to interpret the signalsof the other participant(s).
翻譯
另外一個問題是,一個營銷人員如果設計網頁,嫩構真實的又有個性的推薦我們的產品,並且可以讓顧客對產品的反應不是保持中立,「第三世界」的網頁,就像www.kbb.com
我們對於新工具像email這種方式的看法是,它可以幫助營銷人員更有效率的直接測試營銷效果。
直接營銷
更多的是,通過Haubl和Trifts(2000)的工作可知,類似的矩陣和計算機化相比較,生產出更高質量的產品和高質量的決策
可能性保持在提高那些可能推遲或者現在就購買的信息信息。
代理商,一個新的職業,簡單的代理(現在的標准)。螢火蟲(?),在20世紀90年代中期在電影和音樂推薦上有很大的發展。
由於代理商的科技的混合應用,使網頁上可提供的信息量,有著驚人的增長,這使這個行業繼續調長下去變得更為重要。
特別使,Haubl和Trifts(2000)的工作可知,推薦者代理基於對顧客自我闡述商品的信息(比如,重量和最小可接受的級別),減少調查的精力,提高決定能力。
代理商要有很好的適應能力,自主並且有自信,能夠在第一時間回應狀況,並且有目標。
同時,通過Haubl和其他同事的研究,代理商的形成,與合作過濾相比較,在長期運行中更好的學習了關於顧客的決定和執行偏好。這就給我們在關於顧客網上購物時的偏好提供了標准化。

只翻譯了一半,翻不下去了,你參考一下吧,有的句子可能比較奇怪就是了

Ⅲ 旅遊電子商務 外文文獻+翻譯

最近抄搞論文的好多 都是襲100-200分的懸賞
但是我想告訴你
沒有那麼容易的。你必須親自去搞這個東東。
設想下 此人精通英文 不通旅遊電商 給你翻譯出來的東西會准確嗎?
2個都精通的人 大概也不會在乎你這100分了
倘若你真的有一天出名 小心你就是第二個唐駿

Ⅳ 求一篇關於電子商務的外文翻譯 (中文+英文)

Internet作為電子商務的載體,已成為企業必不可少的信息採集、傳輸和交換的工具,網路(信息)時代的到來為基於Internet的IT服務業注入了新的活力,
Internet is electronic vehicle for business on line, it turns to be unsplit tool for company for the purpose of collection, transferring and exchange for information, with the net work ( information) age availability, which input new vigor into IT service instry based on internet.
其中電子商務(Electronic Commerce, EC)更是備受矚目,已被公認為是影響21世紀世界經濟格局的新型經濟模式和催化劑。
Whereby, Electronic Commerce is the focus of attention, and regarded as new economic mode and activator for global economics in 21st centrury.
在它經歷了三個艱難的發展歷程(電子零售、電子貿易和網上交易市場)之後,逐漸成熟起來,它的核心是運用現代計算機通訊技術,
after it passed 3 difficult stages (electronic retail sales, electronic trading and sales market on line), it is mature step by step, it lies in his core tech. from modern computer communication system.
尤其是網路技術為企業進行社會生產經營活動服務,使企業提高生產效益、降低經營成本、優化資源配置,從而實現社會財富的最大化。
Especially net work technology serves for social proction operation of companies so as to improve the proction output and benefit, to decrease the operation costing, to optimize resource , so that maximum social property can be realised.
特別是對於中小企業來說電子商務通過良好地運用,更能出現一些驚喜的結果。
The most surprising target is achieved by small and medium size enterprises who make good use of electronic business.
本文共分為四章,通過研究電子商務對中小企業的影響和重要性來闡述中小企業在面臨這個電子化、網路化的時代所可以採取的一些策略和辦法來提高企業的核心競爭力。
The article is drafted in 4 chapters, with the study on the influence and importance of electronic business for small and medium sized companies, it set forth some strategies and actions can be taken in order to improve the company core competency of competition in the net work age.

Ⅳ 求電子商務方面的英文文獻或論文,翻譯成漢字大約3000字。要有明確正規出處

Ecommerce Security Issues
Customer Security: Basic Principles

Most ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements:

privacy: information must be kept from unauthorized parties.

integrity: message must not be altered or tampered with.

authentication: sender and recipient must prove their identities to each other.

non-repudiation: proof is needed that the message was indeed received.

Privacy is handled by encryption. In PKI (public key infrastructure) a message is encrypted by a public key, and decrypted by a private key. The public key is widely distributed, but only the recipient has the private key. For authentication (proving the identity of the sender, since only the sender has the particular key) the encrypted message is encrypted again, but this time with a private key. Such proceres form the basis of RSA (used by banks and governments) and PGP (Pretty Good Privacy, used to encrypt emails).

Unfortunately, PKI is not an efficient way of sending large amounts of information, and is often used only as a first step — to allow two parties to agree upon a key for symmetric secret key encryption. Here sender and recipient use keys that are generated for the particular message by a third body: a key distribution center. The keys are not identical, but each is shared with the key distribution center, which allows the message to be read. Then the symmetric keys are encrypted in the RSA manner, and rules set under various protocols. Naturally, the private keys have to be kept secret, and most security lapses indeed arise here.

:Digital Signatures and Certificates
Digital signatures meet the need for authentication and integrity. To vastly simplify matters (as throughout this page), a plain text message is run through a hash function and so given a value: the message digest. This digest, the hash function and the plain text encrypted with the recipient's public key is sent to the recipient. The recipient decodes the message with their private key, and runs the message through the supplied hash function to that the message digest value remains unchanged (message has not been tampered with). Very often, the message is also timestamped by a third party agency, which provides non-repudiation.

What about authentication? How does a customer know that the website receiving sensitive information is not set up by some other party posing as the e-merchant? They check the digital certificate. This is a digital document issued by the CA (certification authority: Verisign, Thawte, etc.) that uniquely identifies the merchant. Digital certificates are sold for emails, e-merchants and web-servers.

:Secure Socket Layers
Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. Indivial packets are sent by different routes. TCP/IP reassembles them in order and resubmits any packet showing errors. SSL uses PKI and digital certificates to ensure privacy and authentication. The procere is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates.

:PCI, SET, Firewalls and Kerberos
Credit card details can be safely sent with SSL, but once stored on the server they are vulnerable to outsiders hacking into the server and accompanying network. A PCI (peripheral component interconnect: hardware) card is often added for protection, therefore, or another approach altogether is adopted: SET (Secure Electronic Transaction). Developed by Visa and Mastercard, SET uses PKI for privacy, and digital certificates to authenticate the three parties: merchant, customer and bank. More importantly, sensitive information is not seen by the merchant, and is not kept on the merchant's server.

Firewalls (software or hardware) protect a server, a network and an indivial PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees.

Transactions
Sensitive information has to be protected through at least three transactions:

credit card details supplied by the customer, either to the merchant or payment gateway. Handled by the server's SSL and the merchant/server's digital certificates.

credit card details passed to the bank for processing. Handled by the complex security measures of the payment gateway.

order and customer details supplied to the merchant, either directly or from the payment gateway/credit card processing company. Handled by SSL, server security, digital certificates (and payment gateway sometimes).

Practical Consequences
1. The merchant is always responsible for security of the Internet-connected PC where customer details are handled. Virus protection and a firewall are the minimum requirement. To be absolutely safe, store sensitive information and customer details on zip-disks, a physically separate PC or with a commercial file storage service. Always keep multiple back-ups of essential information, and ensure they are stored safely off-site.

2. Where customers order by email, information should be encrypted with PGP or similar software. Or payment should be made by specially encrypted checks and ordering software.

3. Where credit cards are taken online and processed later, it's the merchant's responsibility to check the security of the hosting company's webserver. Use a reputable company and demand detailed replies to your queries.

4. Where credit cards are taken online and processed in real time, four situations arise:

You use a service bureau. Sensitive information is handled entirely by the service bureau, which is responsible for its security. Other customer and order details are your responsibility as in 3. above.

You possess an ecommerce merchant account but use the digital certificate supplied by the hosting company. A cheap option acceptable for smallish transactions with SMEs. Check out the hosting company, and the terms and conditions applying to the digital certificate.

You possess an ecommerce merchant account and obtain your own digital certificate (costing some hundreds of dollars). Check out the hosting company, and enter into a dialogue with the certification authority: they will certainly probe your credentials.

You possess a merchant account, and run the business from your own server. You need trained IT staff to maintain all aspects of security — firewalls, Kerberos, SSL, and a digital certificate for the server (costing thousands or tens of thousands of dollars).

Security is a vexing, costly and complicated business, but a single lapse can be expensive in lost funds, records and reputation. Don't wait for disaster to strike, but stay proactive, employing a security expert where necessary.

Sites on our resources page supplies details.

Ⅵ 電子商務專業方面的文獻(書籍)英文版的,畢業論文要寫譯文~翻譯完必須要2000字求幫助~~~~

我網路空間里有國外大學圖書館的帳號和入口,自版己去查數據權庫吧。
http://hi..com/pxpsd/blog/item/f11407de357a455295ee3726.html

Ⅶ 求一篇關於電子商務方面的外文文獻要求是外國人寫的,有作者,出處和中文翻譯。答謝100財富

自己查資料庫吧,我網路空間里有一些查資料庫的免費帳號,可以自己去下載文獻。

Ⅷ 求一篇關於電子商務的外文文獻(稅收)加翻譯。。

我處禁止上傳文件,相關PDF外文文獻有,翻譯得靠你自己,希望能滿足你的需要,能幫到回你答,多多給點懸賞分吧,急用的話請多選賞點分吧,這樣更多的知友才會及時幫到你,我找到也是很花時間的,如果需要請直接網路 私信 或者 Hi 中留言貼出你在 網路知道的問題鏈接地址 及 郵箱地址我處禁止上傳文件,相關PDF外文文獻有,翻譯得靠你自己,希望能滿足你的需要,能幫到你,多多給點懸賞分吧,急用的話請多選賞點分吧,這樣更多的知友才會及時幫到你,我找到也是很花時間的,如果需要請直接網路 私信 或者 Hi 中留言貼出你在 網路知道的問題鏈接地址 及 郵箱地址

Ⅸ 1、求一篇關於拍拍網或者C2C電子商務的英文文獻(有中文翻譯更好) 2、另尋一牛人幫我翻譯我的論文摘要

taobao 才是名副其實的C2C電子商務網站,在其他的c2c都是山寨的,木有創新性!
淘寶得到了國際性的回認可和投資答!
不論從那個環節比較都是淘寶的最早,理念最先進,拍拍算個什麼?

「正品保障?官方 ?皇冠都有齊」誰保障他的?
保障他的人自己有保障嗎?
被牙防組認證的保障的牙膏你覺得可靠嗎?
先把認證者自己保障了再保障別人!!!誰給拍拍的權利保障別人的,
一個山寨王還有了生殺予奪的權利,真他們的悲劇的!!!!

夠日地白度,你這么就不允許人們說兩句真話啊?
你沒看到到處都是托在回答問題?
回答的口氣像是gov在答記者問似的,明明就是打馬虎眼!
你還不讓大家說真話?

拍拍太爛了!木有被坑過的人是感覺不到他的無恥的!

熱點內容
微山湖島旅遊攻略 發布:2021-03-16 21:45:18 瀏覽:387
適合78月份國內旅遊的地方 發布:2021-03-16 21:42:27 瀏覽:6
文化旅遊部單位 發布:2021-03-16 21:42:22 瀏覽:118
深圳周邊游推薦免費的 發布:2021-03-16 21:42:18 瀏覽:696
塑州旅遊景點 發布:2021-03-16 21:40:53 瀏覽:84
道觀河風景旅遊區發展前景 發布:2021-03-16 21:39:53 瀏覽:658
旅行社psd 發布:2021-03-16 21:39:03 瀏覽:174
常州旅遊業發展現狀 發布:2021-03-16 21:35:14 瀏覽:330
棋牌在線游戲必去797ag 發布:2021-03-16 21:33:30 瀏覽:217
有四個旅遊團三條路線 發布:2021-03-16 21:33:30 瀏覽:164