A. 求电子商务B2C模式研究的英文文献 要求3000字左右
Filed B2C, we may be more familiar to some, it is from the enterprise-to-end customers (indivial consumers and organizations, including the consumer) business model. Have been talking about today's B2C e-commerce through electronic and information means, in particular Internet technology to the enterprise or other business procts and services provided without any channels, directly to consumers, new business models. Because it is closely related to the daily lives of the public, it was first recognized and accepted.
B2C e-commerce model of one of the most familiar form is the realization of the emerging e-commerce site dedicated. Now, as if overnight, the emergence of the numerous such companies, including online stores, online book stores, online ticket sales, etc., and even what some have done, what are the e-commerce site to sell, it is called "Cargo 1000 company ". But no matter what, these new models the emergence of enterprises, so that people at home via the Internet, you can enjoy the purchase of goods or advisory services. This is undoubtedly a big step forward in the times. Emerged in these new Internet companies, Amazon can be said to be the most representative example.
Amazon was selling a book through the Internet online bookstore, almost no one in the store it is clear where, when, it in just one stroke more than two years of countless famous century-old shop has been a long time to become the world's largest bookstore, the market is far more than the book business itself. WEB through the Amazon site, users can enjoy the book a lot of convenience, such as one million kinds in the book to find a book, the traditional methods may be run on a number of bookstores, a lot of time spent However, in the Amazon, the user can, through the search function, just a few mouse clicks, and soon people will want the book to the home. Another attractive aspect of the Amazon is to provide a lot of value-added services, including the provision of a number of comments and introced the book. Sales in the traditional manner, these value-added services will become very expensive. In the "success" will develop into its own beyond the traditional bookstore after the world's largest bookstore, Amazon's business today has been extended to audio-visual procts, software, various types of daily consumer goods and other fields to become the United States, but also the entire the world's largest e-commerce website company. But it's the "successful" in quotation marks are still classified, it is questioned to establish their own in size and customer base at the same time, investors are left to the huge losses.
People to reflect on the reasons for loss of the Amazon realized that perhaps should not be set up the task of B2C e-commerce are placed on these Web sites from scratch, the traditional instries conscious revolution in Internet and e-commerce may be more economical, more affordable and more necessary, not to investors, shareholders brought to so many pressures and worries. Perhaps, only when these two forces together are the same towards the Peak, such as e-commerce world is more exciting, the real era of e-commerce will be coming faster.
Traditional enterprises and e-commerce successful transition to the Internet's most successful example is the DELL, DELL is only the beginning of a computer by telephone direct sales companies, although very successful, but the beginning of the Internet revolution, it did not hesitate to choose a grasp opportunities, all of their business to move online, and in accordance with the requirements of the Internet to their original organizations and carding processes, including development of sales, proction, procurement, services the entire process of e-commerce systems, and make full use of the means of the Internet to provide users with customization and distribution services, greatly improved customer satisfaction, miraculously for many years maintained a growth rate of above 50%, today the world's largest computer manufacturers, but also a slower transition to other competitors has caused tremendous challenges Granville Concord.
B. 电子商务专业方面的文献(书籍)英文版的,毕业论文要写译文~翻译完必须要2000字求帮助~~~~
我网络空间里有国外大学图书馆的帐号和入口,自己去查回数据库吧。答
http://hi..com/pxpsd/blog/item/f11407de357a455295ee3726.html
C. 高分急求求一篇关于电子商务的英文文献``
An additional question is how a marketer could design websites that truly personalize proct recommendations and how consumers react to these versus more neutral, “third party” web sites such as www.kbb.com for automobiles.
we address the issue of the structure of one new tool (i.e., e-mail) that can help marketers be more efficient in testing direct marketing efforts.
direct marketing
Furthermore, work by Haubl and Trifts (2000) showed that a comparison matrix similar to the comparator proced higher quality consideration sets and decisions.
the possibility remains that providing information could postpone or even prevent purchase.
Agents are not new; a crude (by today’s standards) agent, Firefly, was developed in the mid-1990s for movie and music recommendations.
the amount of information available on the Web has increased dramatically as has the technological sophistication of the agents which makes continued research in this area important.
In particular, Haubl and Trifts (2000) show that recommender agents based on self-explicatedinformation about a consumer’s utility function (i.e., attribute weights and minimum acceptable attribute levels) rece search effort and improve decisions.
Agents should be adaptive, autonomous, and believable, be able to respond in a timely fashion, and be goal-oriented.
It has also been established that agents, like those studied by H¨aubl and his colleagues, that learn about consumers from choices and consumer preferences perform better in the long run than (say) collaborative filters (Ariely et al., 2004). This suggests that methods that calibrate consumer preferences in real time on-line are crucial to advancement.
polyhedral conjoint analysis (Toubia et al., 2003) satisfies these criteria. Liechty and his colleagues developed a Hierarchical Bayes procere that does so as well.
Montgomery et al. (2004) address the problem of designing a better shopbot.
They show that shopbots are inferior to visiting a favorite retailer if the shopbot visits all retailers.
Indeed, armed with some inferences from previous visits, a small set of initial screener questions can lead to an optimally personalized web interface for the consumer.
Based on a stochastic ration model and Bayesian updating , the authors adapt the testing parameters (e.g., number of e-mails sent for each e-mail design and sending rate) while the testing is in progress so as to minimize the cost of testing both in terms of wasted e-mails and time.
Only if the interactivity pays off.
In bargaining or auction situations, possible lack of trust and the inability to interpret the signalsof the other participant(s).
Managing Channels of Distribution Under the Environment of Electronic Commerce
【英文篇名】 Managing Channels of Distribution Under the Environment of Electronic Commerce
【作者英文名】 ZHENG Bing~ FENG Yixiong~2 1.College of Economics & Management; Dalian University; Dalian 116622; China 2.State Key Laboratory of CAD&CG; Zhejiang University; Hangzhou 310027; China;
【文献出处】 武汉理工大学学报, Journal of WuhanUniversity of Technology, 编辑部邮箱 2006年 S2期
【英文关键词】 marketing channels; distribution strategy; customer demand; electronic commerce;
Fair E-Payment Protocol Based on Simple Partially Blind Signature Scheme
【英文篇名】 Fair E-Payment Protocol Based on Simple Partially Blind Signature Scheme
【作者英文名】 LIU Jingwei; SUN Rong; KOU Weidong State Key Laboratory of Integrated Service Networks; Xidian University; Xi’an 710071; Shaanxi; China;
【文献出处】 Wuhan University Journal of Natural Sciences, 武汉大学自然科学学报(英文版), 编辑部邮箱 2007年 01期
【英文关键词】 electronic commerce; e-payment; Schnorr signature; partial blind signature;
【英文摘要】 This paper presents a simple partially blind signature scheme with low computation. By converse using the partially blind signature scheme, we build a simple fair e-payment protocol. In the protocol, two participants achieve the goals of exchanging their digital signatures from each other in a simple way. An ad- vantage of this scheme is that this approach does not require the intervention of the third party in any case. The low-computation property makes our scheme very attractive for mobile client and sma...
D. 电子商务毕业论文英文摘要
The popularity of e-commerce is an inevitable trend, it is not only a sales channel, a new proction management way, and will bring a commercial revolution. Schumpeter, with "the new proction function, market and enterprises need to update and new business model to replace the old commercial mode, this process is called him" creative destruction ".
Based on the basic composition of traditional enterprise business model based on the analysis of the system, from the business mode, and discussed the three layers of e-commerce enterprises for its intrinsic business model, and the influence of traditional enterprise success of e-business two case analysis, further study of the enterprise electronic commerce business model, how to traditional inherent e-commerce enterprises of the level of its final stages division, how to develop e-business, puts forward some countermeasures and Suggestions. Think with the traditional enterprise develop e-commerce, its influence on enterprise business model is one of the outer - middle - lining the progressive process of traditional enterprise electronic commerce, the process must follow the rules, can receive the good effect.
Keywords: electronic commerce mode of traditional enterprise organization structure, core competitiveness
E. 求电子商务方面的英文文献或论文,翻译成汉字大约3000字。要有明确正规出处
Ecommerce Security Issues
Customer Security: Basic Principles
Most ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements:
privacy: information must be kept from unauthorized parties.
integrity: message must not be altered or tampered with.
authentication: sender and recipient must prove their identities to each other.
non-repudiation: proof is needed that the message was indeed received.
Privacy is handled by encryption. In PKI (public key infrastructure) a message is encrypted by a public key, and decrypted by a private key. The public key is widely distributed, but only the recipient has the private key. For authentication (proving the identity of the sender, since only the sender has the particular key) the encrypted message is encrypted again, but this time with a private key. Such proceres form the basis of RSA (used by banks and governments) and PGP (Pretty Good Privacy, used to encrypt emails).
Unfortunately, PKI is not an efficient way of sending large amounts of information, and is often used only as a first step — to allow two parties to agree upon a key for symmetric secret key encryption. Here sender and recipient use keys that are generated for the particular message by a third body: a key distribution center. The keys are not identical, but each is shared with the key distribution center, which allows the message to be read. Then the symmetric keys are encrypted in the RSA manner, and rules set under various protocols. Naturally, the private keys have to be kept secret, and most security lapses indeed arise here.
:Digital Signatures and Certificates
Digital signatures meet the need for authentication and integrity. To vastly simplify matters (as throughout this page), a plain text message is run through a hash function and so given a value: the message digest. This digest, the hash function and the plain text encrypted with the recipient's public key is sent to the recipient. The recipient decodes the message with their private key, and runs the message through the supplied hash function to that the message digest value remains unchanged (message has not been tampered with). Very often, the message is also timestamped by a third party agency, which provides non-repudiation.
What about authentication? How does a customer know that the website receiving sensitive information is not set up by some other party posing as the e-merchant? They check the digital certificate. This is a digital document issued by the CA (certification authority: Verisign, Thawte, etc.) that uniquely identifies the merchant. Digital certificates are sold for emails, e-merchants and web-servers.
:Secure Socket Layers
Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. Indivial packets are sent by different routes. TCP/IP reassembles them in order and resubmits any packet showing errors. SSL uses PKI and digital certificates to ensure privacy and authentication. The procere is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates.
:PCI, SET, Firewalls and Kerberos
Credit card details can be safely sent with SSL, but once stored on the server they are vulnerable to outsiders hacking into the server and accompanying network. A PCI (peripheral component interconnect: hardware) card is often added for protection, therefore, or another approach altogether is adopted: SET (Secure Electronic Transaction). Developed by Visa and Mastercard, SET uses PKI for privacy, and digital certificates to authenticate the three parties: merchant, customer and bank. More importantly, sensitive information is not seen by the merchant, and is not kept on the merchant's server.
Firewalls (software or hardware) protect a server, a network and an indivial PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees.
Transactions
Sensitive information has to be protected through at least three transactions:
credit card details supplied by the customer, either to the merchant or payment gateway. Handled by the server's SSL and the merchant/server's digital certificates.
credit card details passed to the bank for processing. Handled by the complex security measures of the payment gateway.
order and customer details supplied to the merchant, either directly or from the payment gateway/credit card processing company. Handled by SSL, server security, digital certificates (and payment gateway sometimes).
Practical Consequences
1. The merchant is always responsible for security of the Internet-connected PC where customer details are handled. Virus protection and a firewall are the minimum requirement. To be absolutely safe, store sensitive information and customer details on zip-disks, a physically separate PC or with a commercial file storage service. Always keep multiple back-ups of essential information, and ensure they are stored safely off-site.
2. Where customers order by email, information should be encrypted with PGP or similar software. Or payment should be made by specially encrypted checks and ordering software.
3. Where credit cards are taken online and processed later, it's the merchant's responsibility to check the security of the hosting company's webserver. Use a reputable company and demand detailed replies to your queries.
4. Where credit cards are taken online and processed in real time, four situations arise:
You use a service bureau. Sensitive information is handled entirely by the service bureau, which is responsible for its security. Other customer and order details are your responsibility as in 3. above.
You possess an ecommerce merchant account but use the digital certificate supplied by the hosting company. A cheap option acceptable for smallish transactions with SMEs. Check out the hosting company, and the terms and conditions applying to the digital certificate.
You possess an ecommerce merchant account and obtain your own digital certificate (costing some hundreds of dollars). Check out the hosting company, and enter into a dialogue with the certification authority: they will certainly probe your credentials.
You possess a merchant account, and run the business from your own server. You need trained IT staff to maintain all aspects of security — firewalls, Kerberos, SSL, and a digital certificate for the server (costing thousands or tens of thousands of dollars).
Security is a vexing, costly and complicated business, but a single lapse can be expensive in lost funds, records and reputation. Don't wait for disaster to strike, but stay proactive, employing a security expert where necessary.
Sites on our resources page supplies details.
F. 求一个电子商务方面的英文文献及翻译3000字左右的
http://www.cecb.cn/simple/index.php?t25601.html
或许有你想要的
G. 急求毕业英文文献翻译我的论文题目是电子商务管理方面的。想找相关英文文献要有作者来源的,最好有已翻。
加强教师备课、上课和作业三个方面督促和检查。 创新备课模式,提高备课实效。备足课时,备优质课,备课内容要有针对性和实效性, 注重课后反思的撰写,总结教学过程中的得失,完善自己的教学,克服备课过程中的形式主义,杜绝照搬照抄教案、教参或无教案上课现象。 优化课堂教学,提高教学效果。在提高教学效率上下功夫,每节课新授不超过二十分 钟,训练时间不低于十分钟,课堂提问不少于十名学生,体现以学生为主体,教师为主导的“自主、合作、探究”的教学模式,提高学生运用知识解决问题的能力。 坚持以减负高效为原则,科学布置作业。学生作业精心设计,分层布置,同时注重作 业批改的及时性、指导性与鼓励性,充分发挥其在知识巩固、智力开发、能力提高、反馈矫正等方面的作用。规范课外作业量,1、2、3年级家庭作业每日控制在30分钟左右,4、5、6年级作业量在60分钟左右,鼓励教师每生每学期作业上指导性、鼓励性批语不少于15条
H. 求两篇关于电子商务英文参考文献
http://59.42.244.59/Readers/Index.aspx
http://www.nstl.gov.cn/index.html
I. 求跨境电商的外文文献
我处禁止上传文件,相关PDF外文文献有,没那么多,不知是否满足近几版年的要求,翻译权没有,翻译得靠你自己,希望能满足你的需要,能帮到你,多多给点悬赏分吧,急用的话请多选赏点分吧,这样更多的知友才会及时帮到你,我找到也是很花时间的,如果需要请直接网络 私信 或者 Hi 中留言贴出你在 网络知道的问题链接地址 及 邮箱地址
相关外文文献已发送,翻译没有,翻译得靠你自己了,希望能满足你的需要,能帮到你,多多给点悬赏分吧,急用的话请多选赏点分吧,这样更多的知友才会及时帮到你,我找到也是很花时间的