A. 求電子商務B2C模式研究的英文文獻 要求3000字左右
Filed B2C, we may be more familiar to some, it is from the enterprise-to-end customers (indivial consumers and organizations, including the consumer) business model. Have been talking about today's B2C e-commerce through electronic and information means, in particular Internet technology to the enterprise or other business procts and services provided without any channels, directly to consumers, new business models. Because it is closely related to the daily lives of the public, it was first recognized and accepted.
B2C e-commerce model of one of the most familiar form is the realization of the emerging e-commerce site dedicated. Now, as if overnight, the emergence of the numerous such companies, including online stores, online book stores, online ticket sales, etc., and even what some have done, what are the e-commerce site to sell, it is called "Cargo 1000 company ". But no matter what, these new models the emergence of enterprises, so that people at home via the Internet, you can enjoy the purchase of goods or advisory services. This is undoubtedly a big step forward in the times. Emerged in these new Internet companies, Amazon can be said to be the most representative example.
Amazon was selling a book through the Internet online bookstore, almost no one in the store it is clear where, when, it in just one stroke more than two years of countless famous century-old shop has been a long time to become the world's largest bookstore, the market is far more than the book business itself. WEB through the Amazon site, users can enjoy the book a lot of convenience, such as one million kinds in the book to find a book, the traditional methods may be run on a number of bookstores, a lot of time spent However, in the Amazon, the user can, through the search function, just a few mouse clicks, and soon people will want the book to the home. Another attractive aspect of the Amazon is to provide a lot of value-added services, including the provision of a number of comments and introced the book. Sales in the traditional manner, these value-added services will become very expensive. In the "success" will develop into its own beyond the traditional bookstore after the world's largest bookstore, Amazon's business today has been extended to audio-visual procts, software, various types of daily consumer goods and other fields to become the United States, but also the entire the world's largest e-commerce website company. But it's the "successful" in quotation marks are still classified, it is questioned to establish their own in size and customer base at the same time, investors are left to the huge losses.
People to reflect on the reasons for loss of the Amazon realized that perhaps should not be set up the task of B2C e-commerce are placed on these Web sites from scratch, the traditional instries conscious revolution in Internet and e-commerce may be more economical, more affordable and more necessary, not to investors, shareholders brought to so many pressures and worries. Perhaps, only when these two forces together are the same towards the Peak, such as e-commerce world is more exciting, the real era of e-commerce will be coming faster.
Traditional enterprises and e-commerce successful transition to the Internet's most successful example is the DELL, DELL is only the beginning of a computer by telephone direct sales companies, although very successful, but the beginning of the Internet revolution, it did not hesitate to choose a grasp opportunities, all of their business to move online, and in accordance with the requirements of the Internet to their original organizations and carding processes, including development of sales, proction, procurement, services the entire process of e-commerce systems, and make full use of the means of the Internet to provide users with customization and distribution services, greatly improved customer satisfaction, miraculously for many years maintained a growth rate of above 50%, today the world's largest computer manufacturers, but also a slower transition to other competitors has caused tremendous challenges Granville Concord.
B. 電子商務專業方面的文獻(書籍)英文版的,畢業論文要寫譯文~翻譯完必須要2000字求幫助~~~~
我網路空間里有國外大學圖書館的帳號和入口,自己去查回資料庫吧。答
http://hi..com/pxpsd/blog/item/f11407de357a455295ee3726.html
C. 高分急求求一篇關於電子商務的英文文獻``
An additional question is how a marketer could design websites that truly personalize proct recommendations and how consumers react to these versus more neutral, 「third party」 web sites such as www.kbb.com for automobiles.
we address the issue of the structure of one new tool (i.e., e-mail) that can help marketers be more efficient in testing direct marketing efforts.
direct marketing
Furthermore, work by Haubl and Trifts (2000) showed that a comparison matrix similar to the comparator proced higher quality consideration sets and decisions.
the possibility remains that providing information could postpone or even prevent purchase.
Agents are not new; a crude (by today』s standards) agent, Firefly, was developed in the mid-1990s for movie and music recommendations.
the amount of information available on the Web has increased dramatically as has the technological sophistication of the agents which makes continued research in this area important.
In particular, Haubl and Trifts (2000) show that recommender agents based on self-explicatedinformation about a consumer』s utility function (i.e., attribute weights and minimum acceptable attribute levels) rece search effort and improve decisions.
Agents should be adaptive, autonomous, and believable, be able to respond in a timely fashion, and be goal-oriented.
It has also been established that agents, like those studied by H¨aubl and his colleagues, that learn about consumers from choices and consumer preferences perform better in the long run than (say) collaborative filters (Ariely et al., 2004). This suggests that methods that calibrate consumer preferences in real time on-line are crucial to advancement.
polyhedral conjoint analysis (Toubia et al., 2003) satisfies these criteria. Liechty and his colleagues developed a Hierarchical Bayes procere that does so as well.
Montgomery et al. (2004) address the problem of designing a better shopbot.
They show that shopbots are inferior to visiting a favorite retailer if the shopbot visits all retailers.
Indeed, armed with some inferences from previous visits, a small set of initial screener questions can lead to an optimally personalized web interface for the consumer.
Based on a stochastic ration model and Bayesian updating , the authors adapt the testing parameters (e.g., number of e-mails sent for each e-mail design and sending rate) while the testing is in progress so as to minimize the cost of testing both in terms of wasted e-mails and time.
Only if the interactivity pays off.
In bargaining or auction situations, possible lack of trust and the inability to interpret the signalsof the other participant(s).
Managing Channels of Distribution Under the Environment of Electronic Commerce
【英文篇名】 Managing Channels of Distribution Under the Environment of Electronic Commerce
【作者英文名】 ZHENG Bing~ FENG Yixiong~2 1.College of Economics & Management; Dalian University; Dalian 116622; China 2.State Key Laboratory of CAD&CG; Zhejiang University; Hangzhou 310027; China;
【文獻出處】 武漢理工大學學報, Journal of WuhanUniversity of Technology, 編輯部郵箱 2006年 S2期
【英文關鍵詞】 marketing channels; distribution strategy; customer demand; electronic commerce;
Fair E-Payment Protocol Based on Simple Partially Blind Signature Scheme
【英文篇名】 Fair E-Payment Protocol Based on Simple Partially Blind Signature Scheme
【作者英文名】 LIU Jingwei; SUN Rong; KOU Weidong State Key Laboratory of Integrated Service Networks; Xidian University; Xi』an 710071; Shaanxi; China;
【文獻出處】 Wuhan University Journal of Natural Sciences, 武漢大學自然科學學報(英文版), 編輯部郵箱 2007年 01期
【英文關鍵詞】 electronic commerce; e-payment; Schnorr signature; partial blind signature;
【英文摘要】 This paper presents a simple partially blind signature scheme with low computation. By converse using the partially blind signature scheme, we build a simple fair e-payment protocol. In the protocol, two participants achieve the goals of exchanging their digital signatures from each other in a simple way. An ad- vantage of this scheme is that this approach does not require the intervention of the third party in any case. The low-computation property makes our scheme very attractive for mobile client and sma...
D. 電子商務畢業論文英文摘要
The popularity of e-commerce is an inevitable trend, it is not only a sales channel, a new proction management way, and will bring a commercial revolution. Schumpeter, with "the new proction function, market and enterprises need to update and new business model to replace the old commercial mode, this process is called him" creative destruction ".
Based on the basic composition of traditional enterprise business model based on the analysis of the system, from the business mode, and discussed the three layers of e-commerce enterprises for its intrinsic business model, and the influence of traditional enterprise success of e-business two case analysis, further study of the enterprise electronic commerce business model, how to traditional inherent e-commerce enterprises of the level of its final stages division, how to develop e-business, puts forward some countermeasures and Suggestions. Think with the traditional enterprise develop e-commerce, its influence on enterprise business model is one of the outer - middle - lining the progressive process of traditional enterprise electronic commerce, the process must follow the rules, can receive the good effect.
Keywords: electronic commerce mode of traditional enterprise organization structure, core competitiveness
E. 求電子商務方面的英文文獻或論文,翻譯成漢字大約3000字。要有明確正規出處
Ecommerce Security Issues
Customer Security: Basic Principles
Most ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements:
privacy: information must be kept from unauthorized parties.
integrity: message must not be altered or tampered with.
authentication: sender and recipient must prove their identities to each other.
non-repudiation: proof is needed that the message was indeed received.
Privacy is handled by encryption. In PKI (public key infrastructure) a message is encrypted by a public key, and decrypted by a private key. The public key is widely distributed, but only the recipient has the private key. For authentication (proving the identity of the sender, since only the sender has the particular key) the encrypted message is encrypted again, but this time with a private key. Such proceres form the basis of RSA (used by banks and governments) and PGP (Pretty Good Privacy, used to encrypt emails).
Unfortunately, PKI is not an efficient way of sending large amounts of information, and is often used only as a first step — to allow two parties to agree upon a key for symmetric secret key encryption. Here sender and recipient use keys that are generated for the particular message by a third body: a key distribution center. The keys are not identical, but each is shared with the key distribution center, which allows the message to be read. Then the symmetric keys are encrypted in the RSA manner, and rules set under various protocols. Naturally, the private keys have to be kept secret, and most security lapses indeed arise here.
:Digital Signatures and Certificates
Digital signatures meet the need for authentication and integrity. To vastly simplify matters (as throughout this page), a plain text message is run through a hash function and so given a value: the message digest. This digest, the hash function and the plain text encrypted with the recipient's public key is sent to the recipient. The recipient decodes the message with their private key, and runs the message through the supplied hash function to that the message digest value remains unchanged (message has not been tampered with). Very often, the message is also timestamped by a third party agency, which provides non-repudiation.
What about authentication? How does a customer know that the website receiving sensitive information is not set up by some other party posing as the e-merchant? They check the digital certificate. This is a digital document issued by the CA (certification authority: Verisign, Thawte, etc.) that uniquely identifies the merchant. Digital certificates are sold for emails, e-merchants and web-servers.
:Secure Socket Layers
Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. Indivial packets are sent by different routes. TCP/IP reassembles them in order and resubmits any packet showing errors. SSL uses PKI and digital certificates to ensure privacy and authentication. The procere is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates.
:PCI, SET, Firewalls and Kerberos
Credit card details can be safely sent with SSL, but once stored on the server they are vulnerable to outsiders hacking into the server and accompanying network. A PCI (peripheral component interconnect: hardware) card is often added for protection, therefore, or another approach altogether is adopted: SET (Secure Electronic Transaction). Developed by Visa and Mastercard, SET uses PKI for privacy, and digital certificates to authenticate the three parties: merchant, customer and bank. More importantly, sensitive information is not seen by the merchant, and is not kept on the merchant's server.
Firewalls (software or hardware) protect a server, a network and an indivial PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees.
Transactions
Sensitive information has to be protected through at least three transactions:
credit card details supplied by the customer, either to the merchant or payment gateway. Handled by the server's SSL and the merchant/server's digital certificates.
credit card details passed to the bank for processing. Handled by the complex security measures of the payment gateway.
order and customer details supplied to the merchant, either directly or from the payment gateway/credit card processing company. Handled by SSL, server security, digital certificates (and payment gateway sometimes).
Practical Consequences
1. The merchant is always responsible for security of the Internet-connected PC where customer details are handled. Virus protection and a firewall are the minimum requirement. To be absolutely safe, store sensitive information and customer details on zip-disks, a physically separate PC or with a commercial file storage service. Always keep multiple back-ups of essential information, and ensure they are stored safely off-site.
2. Where customers order by email, information should be encrypted with PGP or similar software. Or payment should be made by specially encrypted checks and ordering software.
3. Where credit cards are taken online and processed later, it's the merchant's responsibility to check the security of the hosting company's webserver. Use a reputable company and demand detailed replies to your queries.
4. Where credit cards are taken online and processed in real time, four situations arise:
You use a service bureau. Sensitive information is handled entirely by the service bureau, which is responsible for its security. Other customer and order details are your responsibility as in 3. above.
You possess an ecommerce merchant account but use the digital certificate supplied by the hosting company. A cheap option acceptable for smallish transactions with SMEs. Check out the hosting company, and the terms and conditions applying to the digital certificate.
You possess an ecommerce merchant account and obtain your own digital certificate (costing some hundreds of dollars). Check out the hosting company, and enter into a dialogue with the certification authority: they will certainly probe your credentials.
You possess a merchant account, and run the business from your own server. You need trained IT staff to maintain all aspects of security — firewalls, Kerberos, SSL, and a digital certificate for the server (costing thousands or tens of thousands of dollars).
Security is a vexing, costly and complicated business, but a single lapse can be expensive in lost funds, records and reputation. Don't wait for disaster to strike, but stay proactive, employing a security expert where necessary.
Sites on our resources page supplies details.
F. 求一個電子商務方面的英文文獻及翻譯3000字左右的
http://www.cecb.cn/simple/index.php?t25601.html
或許有你想要的
G. 急求畢業英文文獻翻譯我的論文題目是電子商務管理方面的。想找相關英文文獻要有作者來源的,最好有已翻。
加強教師備課、上課和作業三個方面督促和檢查。 創新備課模式,提高備課實效。備足課時,備優質課,備課內容要有針對性和實效性, 注重課後反思的撰寫,總結教學過程中的得失,完善自己的教學,克服備課過程中的形式主義,杜絕照搬照抄教案、教參或無教案上課現象。 優化課堂教學,提高教學效果。在提高教學效率上下功夫,每節課新授不超過二十分 鍾,訓練時間不低於十分鍾,課堂提問不少於十名學生,體現以學生為主體,教師為主導的「自主、合作、探究」的教學模式,提高學生運用知識解決問題的能力。 堅持以減負高效為原則,科學布置作業。學生作業精心設計,分層布置,同時注重作 業批改的及時性、指導性與鼓勵性,充分發揮其在知識鞏固、智力開發、能力提高、反饋矯正等方面的作用。規范課外作業量,1、2、3年級家庭作業每日控制在30分鍾左右,4、5、6年級作業量在60分鍾左右,鼓勵教師每生每學期作業上指導性、鼓勵性批語不少於15條
H. 求兩篇關於電子商務英文參考文獻
http://59.42.244.59/Readers/Index.aspx
http://www.nstl.gov.cn/index.html
I. 求跨境電商的外文文獻
我處禁止上傳文件,相關PDF外文文獻有,沒那麼多,不知是否滿足近幾版年的要求,翻譯權沒有,翻譯得靠你自己,希望能滿足你的需要,能幫到你,多多給點懸賞分吧,急用的話請多選賞點分吧,這樣更多的知友才會及時幫到你,我找到也是很花時間的,如果需要請直接網路 私信 或者 Hi 中留言貼出你在 網路知道的問題鏈接地址 及 郵箱地址
相關外文文獻已發送,翻譯沒有,翻譯得靠你自己了,希望能滿足你的需要,能幫到你,多多給點懸賞分吧,急用的話請多選賞點分吧,這樣更多的知友才會及時幫到你,我找到也是很花時間的