电子商务信息安全中英文对照外文翻译文献
电子商务网上购物中英文对照外文翻译文献
中英文对照外文翻译(文档含英文原文和中文翻译)附件1:外文翻译译文网上购物的自由、控制和乐趣网上购物的消费者数量和网上购物的数额正在上升;费雷斯特研究公司估计,今年互联网销售额是去年的20亿倍以上。
相比之下,美国去年的整体零售销售额达13万亿美元。
因此,目前电子商务的销售额仅占零售销售额的1%左右。
专家和学者闷得争执消费者网上消费的百分比的可能上限。
网上消费上限将超过其他直接营销的15%,或者如费雷斯特研究公司所建议的,到2010年占许多零售采购产品类别的1/3.最终,在何种程度上满足购物目标导向和有经验的消费者需求将影响消费者会选择花在每个环境中的美元金额。
虽然许多作家都在鼓吹在线媒体提供交互性和个性化的体验的独特功能,例如,很少有系统的集中于网上购物者真正需要什么,以及为什么他们把网上购物放在第一位清楚的了解什么激发消费者网上购物可以并应告知战略、技术和市场营销的决定,以及网站设计。
那么,什么激发网上购物?在离线的环境中营销人员认识到,消费者不同的消费方式取决于他们用于搜索的动机是否主要是体验(因为好玩)还是目标导向(因为效率高)。
我们的网上客户的研究表明,这两种动机同样可以推广到在线环境。
体验行为特别可能发生在消费者有一个持续的爱好型的兴趣类别中。
收藏家和爱好者享受“惊险的狩猎”一样收藏各种收藏品。
同样,有时间保证和欲望刺激可以引起更多的体验购物行为。
学者们还发现,更高的娱乐性与体验行为比专注于目标的购物引起更积极的情绪、更大的网上购物满意度和更高可能性的购物冲动行为。
目标导向或功利购物已被各种营销学者描述为任务导向的,高效的,合理的和蓄意的。
因此,专注于目标的购物是以交易为导向,希望快速购买他们想要的东西而无需焦急。
零售消费者将功力购买描述为“工作”和评估其努力的成功的条款通常与工作表现相关词汇联系起来,如“成功”“完成”。
重要的是,市场调查公司发现,2/3到4/5的互联网买家从事特定产品的狭义在线搜索。
电子商务外文翻译文献
The Strategic Challenges of E-commerceIntroduction11th Century Europe saw the emergence of credit-based banking systemsand f i n ancial instruments such as bills of exchange. These concepts remain withus, in t heir modified form, to this day (Chown, 1994). They underpin all modernforms of commerce. The arrival of information technology (computers and telecommunications) has raised the prospect of radical change to this traditionalmodel.The rise of the Internet (electronic commerce), since the advent of the World Wide Web, has provided an easy to use communication channel for businesses tocontact current and potential customers. The emergence of the Internet as a general communication channel has also given rise to the possibility of widespread electronic commerce. Even though there is still much debate relating to electronic payment for commercial activities, this is clearly an area of growth.It is difficult to say how large the Internet is. Hoffman & Novak (1996) quotea number of surveys (O'Reilly, FIND/SVP , Times Mirror and CommerceNet) which suggest that there are at least 10 million Internet users in the United States alone.The number of computers (hosts) connected to the Internet topped 9.47 million (Network Wizards, 1996) as of January 1996. Note that a single host supportsanywhere from a single user to, in some cases, thousands of users.As of March 21, 1996, 24,347 firms were listed in Open Market's (1996) directory of "Commercial Services on the Net," and there were 54,800 entries inthe "Companies" directory of the Y ah o Guide to WWW (Y ah o , 1996), with thetotal number of Web sites doubling approximately every two months. Jim Clarke, the chairman of Netscape, estimated the Internet has 40 million users in 1995with growth at 8% per month (Clarke, 1995).The Internet is only one aspect of technology. Businesses require information and supporting systems (processes) to handle the data - over time these systems have become computerised (IT). Modern information technology can both support the processes and help capture useful information for the enterprise. These technologies include:anizational support systems, such as workflow and groupware - making businesses more efficient.2.Customer contact databases - helping capture information about customers and facilitate new methods of marketing.3.Electronic payment systems for g o ds and services - these are emerging, although the majority of payments are still based on relatively expensivetraditional cheque clearance.Collectively and individually, these areas will contribute to major changes inthe way a company conducts its business. Enix have coined the term Workware to describe the combination of these technologies.Figure 1 - The emergence of Electronic Commerce will be underpinned by three key c omponentsHowever, there is still widespread misunderstanding on the value of organisational support technology. A recent survey of 437 large enterprises by research company Xephon (1996) indicated that an astonishing proportion (44%) had no immediate intention of introducing modern information handling systems (Groupware was defined by Xephon as Lotus Notes, Microsoft Exchange and Novell GroupWise). Of these, 65% said they were unsure what these technologies could deliver. From these statistics, it is clear many organisations are still sceptical about the benefits of technology.The efficient collection, utilisation, handling, storage and dissemination of information is a vital component of corporate success in the modern business world. However, the gathering and use of information must take into account issues of privacy and security. A recent feature in the Financial Times (1996) notedthat " … in order to thrive in the 1990s, financial services organisations are as much in the business of managing and manipulating information as managing and making money." Furthermore, the interest shown in topics such as TQM andBPR has demonstrated the importance of processes as a fundamental building block.Inevitably a few savvy organizations in each sector will utilise all three components tochange their market or develop new markets. Those who do notadapt quickly to the new ways of working are likely to be disadvantaged as their strategies become redundant. All businesses should investigate the implicationsof these technologies for them and the markets within which they operate.MarketingChampy, Buday and Nohria (1996) argue that the rise of electronic commerce and the changing consumer processes brought about through electronic communities are likely to lead to a new wave of reengineering, mergers and acquisitions. Moreover, organizations may expand into new business areas, takingon roles unforeseen prior to the rise of the Web. For example: a magazinepublisher, Cond Naste, has moved into the travel business; Bill Gates is now an electronic real estate agent; and a recruitment advertising agency, Bernard Hodes, has now become an electronic recruitment company.The emergence of electronic commerce will significantly impact what we currently call‘m arke ting’.Cle arly,the appearance o f electronic communities (Armstrong and Hagel, 1996) implies that marketing professionals must expand their horizons as the advent of this technology will threaten existing channels of business. Those involved in marketing need to understand the full range o f products and services required b y the electronic community. They must learn totake advantage of the technology that allows customers to move seamlessly from information gathering to completion of a transaction, interacting with the various providers of products and services as necessary. A number of interesting questions are implied:1.What kind of information is available for collection? Is it appropriate to gather this information and for what should it be used?2.Are information systems equipped to capture customer information and transactions, making it available for later analysis?3.When dealing with electronic communities, do marketing profe s ionals comprehend the differences? One needs to engage t he customer as part of thetransaction rather than blindly mailing targets.This idea of community has been at the heart of the Internet since its origins as a defence and academic computer network although most communities arestill not particularly oriented toward commerce. However, the World Wide Webhas changed and broadened the nature of the Internet and the way in which commercial transactions are conducted. The CEO of Kodak is alleged to haverem arked that he co uld n’t tell if the Kod ak Web site was a m one y ma ker.But heknew it was important because it was the most personal way of selling since doorto d oo r sale sm e n,o n ly no w the custo m e rs we re kno ckin g o n Ko d ak’s d o o r.Armstrong and Hagel propose four types of non-exclusive electronic communities, those: interested in transactions; sharing common interests; indulging in fantasy games; and with a shared life experience. The busine s opportunity is for those who support and interact with these communities, building customer loyalty on an ongoing basis. By satisfying the requirements ofrelational marketing and transactions, companies may gain important insightsinto their customers’ nature and needs. For example, a baby products company could entice customers to order items from an associated on-line catalogue by providing bulletin boards for new parents.The desire to establish long-term customer relationships with increasingly sophisticated demands has led companies to seek new ways of acquiring,managing and utilising customer information (Peters and Fletcher, 1995).Furthermore, advances in information technology have fundamentally alteredthe channels through which companies and customers maintain their relationships. The capacity to obtain and apply customer information within processes has become a key strategic issue. This often places the company in the position of requiring sensitive personal information from customers.Gummesson (1987, 1994, 1995) views marketing as a set of relationships, networks and interactions and lists 30Rs (relationships) in contrast to McCarthy’s(1981) 4Ps (Product, Price, Place & Promotion). Gummesson highlights the fact that the electronic relationship is not discussed in the marketing literature even though it is practised widely by many businesses. Helinks relationship marketing to the imaginary (similar to a virtual or network) organisation. He argues that by increasingly applying IT, more relationships are established. They create a new type of bond to customers and between employees.The electronic relationship extends beyond the bounds of the organisationinto the market as seen in the example of airline, hotel and car rental reservation systems. Thecommunities established have a re-enforcing effect. These insightsforce us to re-examine traditional theories of economics, systems, organisations, marketing, competition and transaction cost analysis. As the boundaries betweenfirms and markets dissolve, a characteristic of relationship marketing and network organisations, a new image of interaction and business is needed.The importance of information exchange in relationship marketing (particularly using an electronic channel) requires a clear understanding and recognition of the potential problems. Privacy is also an issue - what is private changes from one person to another as well as between different cultures. Those who use the Internet are likely to be better educated and less willing to give information, unless they trust the recipient. Companies need to realise that the only reason they hold information on a customer is because they have a relationship with that customer - something which is not transferable. Those using electronic channels to reach customers are likely to target better educatedand more affluent customers. They need, therefore, to ensure that their customer information systems are appropriate.An understanding of the trust building process is also required. Firms need tomake a feature of their trustworthiness (a unique selling point!). Trust is best developed through processes. Processes tend to be customer facing - within each customer interaction trust is built-up or eroded. Companies must be absolutely clear about the value and intended use of information. Collecting information because it is technically possible (and one day might be useful) is likely to weakentrust development.Hoffman and Novak (1996) assert that the Web heralds an evolution in marketing concepts. In order for marketing efforts to succeed in this new medium, a new business paradigm is required in which the marketing function is reconstructed to facilitate electronic commerce in the emerging electronic society underlying the Web.The "many or any" communication model of the Web (in fact many instancesof many-to-one) turns traditional principles of mass media advertising inside out (a one-to-many model) (Hoffman and Novak, 1994). The application of advertising approaches which assume a passive, captive consumer are redundant on the W eb.Surprisingly, as it is currently evolving, there is little activity aimed at including the consumer in the development of emerging media (Dennis & Pease, 1994). In order to adopt a market orientation, firms must understand their customers and engage in consumer research. Potential customers are most effectively engaged through new conversational marketing approaches.Anecdotal evidence suggests there are two types of customers -‘convenienc e shoppers’and‘explorers’(those str-e s e m tart consum ers whoare happy to surf the Web looking for the best deal or most appropriate product combination). Furthermore, the sheer size of the Web (trillions of documents and growing exponentially) means finding relevant information is becoming moreand more difficult - despite the best efforts of search engines such as Yahoo. Our research suggests that the large proportion of Web users would rather rely on an intermediary (community operator) to sift and select information on their behalf.Web sites not endorsed will require knowledge of the address (URL) and are unlikely to be accessed when similar information, products or services are readily available inside the community.Contributing to the rise of intermediaries are associated issues of privacy,trust andsecurity (Schell, 1996). Whilst there is much discussion on theissues ofInternet privacy and security, in the context of normal business activities, many millions of people trust others with their personal financial information. Examples include ordering over the telephone, passing a credit card to an unknown waiter, even signing direct debit mandates. If an error occurs in these types of transactions we trust the service provider to correct the error. So why is it that weexpect the Internet to support a level of trust and security which we do not observe in everyday life?There is no reason why similar trust relationships cannot be established in electronically mediated discussions. If anything, it becomes easier for an individual (or group of individuals) to seek retribution on those that break therules within an electronic c ommunity. Evidence of this can be found in the tendency to attack those that try to advertise on academic discussion groups(mail bombs) and community policing against pornographers in the Netherlands.Marketeers must reconstruct their advertising models for the interactive, consumer controlled medium. The traditional customer loyalty ladder (Suspect, Prospect, Customer, Client, Partner, Advocate) is still applicable, but now operatesin a different fashion. The first three stages are often instantaneous in electronic commerce. The transition from customer to advocate relies on loyalty earned through trust. The instantaneous nature of the Internet makes this more difficult.Communicating Across The Value ChainIt should be recognized that processes are not confined within one organization - they cross the value chain as demonstrated by the following example. Steinfield, et al (1995) describe a large, multinational, electrical appliance and consumer electronics manufacturer that used France Te le com’s Telnet system to support EDI-like c onnections to approximately 10,000 separateretailers and independent service engineers throughout France (accessed through Minitel terminals). The ubiquitous Telnet service and the commercial applications which emergedto exploit it, provide insights into the developmentof commerce on a world-wide Internet.The after-sales service subsidiary of this manufacturer provided replacement parts and training to its widely dispersed customer base. The Telnet system permitted electronic transactions, even with the smallest trading partners. Through the use of on-line ordering, coupled with courier service for rapiddelivery, the firm was able to eliminate regional parts warehouses and reduce the average repair time from two weeks to two days. In the past, service engineers waited until they had a sufficient need for parts before driving to a regional warehouse. Once the system was implemented, they used the Telnet based "just-in-time" stocking practice for replacement parts.Moving to a centralised warehouse reduced the need for replicated inventories and extra personnel around the country, creating substantial savings. Moreover, service engineers were further bound-in following the introductionofa revenue producing, expert system-based, training application. Technicians connected to the expert system which asked a series of questions designed to diagnose the fault and indicate the repairs needed.。
网络购物行为分析中英文对照外文翻译文献
网络购物行为分析中英文对照外文翻译文献(文档含英文原文和中文翻译)The network shopping behavior analysisAbstractThe thesis analyzes the current situation of online shopping in China. It offers a further analysis to its advantages, and disadvantages, gives solutions to the problems, gives a deep analysis of the benefits it brings to both producer and consumer and make people be more confident with the promising prospect of online shopping in china. It systematically illustrates the exiting problems of online shopping in china from a different view attached with exactly figures and vivid examples. At the same time, it gives relevant resolutions to the existing problems. It includes personal information safety, online payment, logistics, and a series of relevant law problems. The thesis chooses the authentic English materials which gave me a valuable guide and instruction; meanwhile, it has also been attached with specific figures so that people can understand them easily.Key words: Online shopping marketing research logistics service online payment distribution1. IntroductionWith the rapid development of Internet, online shopping has gradually entered the lives of ordinary people. And with the rapid development of Internet in China, more and more Chinese begin to favor online shopping for its convenience, quick delivery and benefit. According to the latest statistics released by China Internet Network Information Centre (CNNIC), the number of netizen in China has hit 87 million, and 7.3 percent said they had the experience of online shopping. Meanwhile, the statistics also showed that 58 percent of netizen in China would try the online shopping next year.Online shopping, in a narrow sense, can be understood as getting online information and inking online deals. In a broad sense, however, once one section of shopping is finished online, it can be regarded as online shopping. In that way, traditional or burgeoning online enterprises may seek a combination, mingling two modes' advantages.The percentage of online shopping in China is growing year on year. According to the experts' prediction, the total volume of China's online shopping is expected to reach 28 billion Yuan in years to come.2. Advantages of the online shopping2.1 Benefits to consumers2.1.1 Saving time and convenienceOnline shopping is becoming popularity ,not only because the great convenience ,but also you can find a shop with so many goods that you may favor. And it also saves your a great some of time ! You can just typing-in the key word of what you want to find , the target will appear on the screen quickly .The online shopping industry has grown a lot in the recent year, and millions of people prefer to buy from the large variety from the online stores than to waste time at the long lines from supermarkets. Furthermore, the online shopping industry keeps growing, and more and more products are made available online. You can now find everything from CD to fruits and books, and you can purchase the items you want just with a few clicks.After you've done some online shopping you'll see how easy it is and you'll quickly get used to it. Soon you will know what the best shopping websites are and you will be able to buy the things you need very easy and fast, saving a lot of time and trouble. Online shopping is the most practical, economical and fun method of shopping, that is perfect for everyone."Online payment provides a more convenient way for consumers who don't carry cash."Beijing resident Ding Xin(丁欣)in her late 20s bought a bottle of perfume online last month."I often browse the websites of online shops because the goods have more attractive prices," she said.With the fast development of the society, the rhythm of life is accelerated progressively, the traffic jam changes crowd gradually, people are unwilling to spend much time to go shopping, and network marketing is accepted by consumers for it’s convenient characteristic Consumers can select the goods at home without going out , with the help of strong database, the shopping course is simplified to an action of " click ", consumers can finish doing shopping at any time, with the appointment of a place to deliver goods.About 41.8 per cent of all online shopping payments are handled over the Internet, the survey shows. And 43.2 per cent of online shopping payments are handled via money remittance personnel and 34.7 per cent are completed in person, the survey shows.2.1.2 Customization and personalizationOnline shopping can provide mass customization and personalization with moderate cost. Point cast, for example, delivers customized news and financial data toevery single customer based on his or her specific needs. displays specific recommendations based on the customer’s previous purchases. These kinds of services are very expensive in traditional marketing .The web providing online shopping can move from providing general products or services customized to a customer’s needs, tastes, and preferences.2.1.3 Access to more informationOne important consumer benefit associated with marketing on the web is the access to greater amounts of dynamic information to support queries for consumer decision-making. Furthermore, the interactive nature of the web and the hypertext environment allow deep, non-liner searches initiated and controlled by customers. Hence marketing communication on the web is more consumer-driven than those provided by traditional media. In addition, recreational uses of the medium manifested in the form of non-directed search behavior are such an important benefit to consumers that they are intrinsically motivated to use the medium.2.1.4 Easier market research and comparisonThe ability of the web to access, analyze and control large quantities of specialized data can enable comparison shopping and spread the process of finding line which may stimulate purchase. There is also the potential of wider availability of hard-to- find products and wider selection of items due to the width and efficiency of the channel.2.2 Benefits to the firms2.2.1 Lower costs and pricesIncreased competition in procurement as more suppliers are able to compete in an electronically open market place causes a greater competition, which naturallylowers prices and costs. This increase in competition leads to better quality and variety of goods through expanded markets and the ability to produce customized goods. One of the reasons to lower cost is that they haven’t traditional warehouses and retail shops in the retailing business of the great majority in the commercial city online. Generally speaking, the network does not have a traditional retail channel to sell. For example like , the online retailing bookshop with no stock of books, places an order with bookseller and sends to consumers directly which aims to realize real " zero stock " to lower cost.2.2.2 Better distributionFirm benefits arise partly from the use of the web as a distribution channel. First, the web potentially offers certain classes of providers and opportunity of participating in a market in which distribution costs or cost-of-sales shrink to zero. This is most likely for product categories. For example, digital products can be delivered immediately and hence such businesses may encounter massive disintermediation or even the eventually elimination of middleman. Moreover buyers and sellers can access and contact each other directly, potentially eliminating some of the marketing cost and constraints imposed by such interactions in the terrestrial world. This may also have the effect of shrinking the channel and making distribution much more efficient (mainly due to reduced overhead costs through such outcomes as uniformity, automation and large-scale integration of management processes). Time to complete business transaction may be reduced as well, translating into additional efficiencies for the firm. However, such potential efficiencies must be tempered with market realities.2.2.3 Marketing communicationWeb sites are available on demand to consumers 24 hours a day. The interactive nature of the medium can be used by marketers to hold the attention of the consumer by engaging the consumer in an asynchronous “dialogue” that occurs at both parties’ convenience. This capability of the medium offers unprecedented opportunities to tailor communications precisely to individual customers, allowing individual consumers to request as much information as desired.Further, it allows the marketer to obtain relevant information from customers for the purpose of serving them more effectively in the future. The simplestimplementations involve engaging customers through the use of the E-mail buttons located strategically on the site. More sophisticated implementations may involve fill-out forms and other incentives designed to engage customers in ongoing relationships with the firm. The objective of such continuous relationship building is dual- pronged: to give consumers information about the firm and its offers and to receive information from consumers about their needs with respect to such offerings.3. Limitations of online shoppingDespite the prospects is optimistic, a shortage in types of online payment, lagging logistics and lack of relevant laws are just some of the problems which continue to hinder the development of online shopping.3.1 Online paymentOnline payment plays a key role in e-commerce, and a safe, convenient, and efficient online payment system is essential. However, safety authentication, one of the main factors of online payment system, is inadequate in China.Online shopping is information technology ---based business , which makes the trade between consumers and firms online through the internet . The two sides from time and space limitation , thus not only greatly expand its network of consumers and firms online on the opportunities of commodities trading , but also greatly reduce the cost of commodities trading. However there are still a number of factors influence the development of online shopping in China .1.Security .Security issues is the biggest problem that have hindered the development of online shopping . Although the existing methods Alipay online shopping played a good role, but it is only a substitute in the period of electronic payments . It has obvious defects on security of electronic payments and real-time of financial flows , which can not fully meet the financial electronic requirements.2.Taxation .With the rapid development of online shopping and online shopping as paperless, no site-based, intangible, unbounded, virtual and electronic payments, etc. to make the work difficult to carry out effectively, there has been a series of loopholesin tax administration led to the draining away of tax chargeable caused enormous economic losses to the state. As for the traditional legal system and tax collection management , it is difficult to resolve tax and related issues online shopping . However there is no clear policy for online shopping recently in China .3.Protection of the interests of consumers .In online shopping activities, there is a shortage of face to face communication , the transaction has a large uncertainty. The buyer gets the goods information through the network. Some unscrupulous Internet companies know consumers can not see the real goods and they can’t see each other , in order to reap huge profits, manufacturing counterfeit products. Therefore, the public generally feel online shopping is not intuitive, secure, they don’t believe the network's "rhetoric". The result is caused to the development of online shopping has a large obstacle . Online shopping is also a vacuum of after-sale security, some problem often arise that customers don’t know who to look for . Thus, in recent years online trading complaints are significant increase. In addition, the delivery time is not accurate . The development of shopping depends on a strong logistics system. But in our country, so far still lack a systematic national freight distribution business. Inadequate logistics infrastructure, third-party logistics services developed slowly, that all hampered the development of online shopping.Although many banks have already set up their own financial authentication center, there lacks a notified and authoritative nationwide authentication center, leading to many cases of cross authentication, repeated authentication and a waste of resources.3.2 Logistics serviceSecond is the limitation in the logistics system. Present from the perspective of the development of the logistics, the logistics of electronic commerce have following problems: the weak link at logistics infrastructure, it has n’t high ly specialization, the third party logistics ineffective work , limited services, that all impact the logistics, logistics have a flavor of planned economy color, from the perspective of logistics activities, our main problems is the development of immature distribution center, a small range of logistics activities, logistics alliance is not high, the low level oflogistics technology, information system applications still closed .Among the corporations providing logistic services for online shopping in China, some 1,000 are traditional ones and their service quality is not good enough; therefore, the need to provide a speedy transaction and delivery regardless of space and distance can hardly be fulfilled.3.3 Legal problems and public-social policiesThe laws and regulations are imperfect. Online shopping, as a new commercial activity, brings unavoidable a series of legal problems, such as the electronic contract, the legal effect question of signing in figure, an economic dispute question of the online trade, computer crime question, etc.There are a number of questions concerning marketing through the web: validity of an electronic signature, legality of an electronic contract, risk, trademarks, loss of right to trade secrets and liabilit y. There are also government’s rules, regulations, economic policies and censorship.Besides, due to the lack of legal protection in this field, arbitration and liability cognizance are difficult when disputes arise. In addition, the efficiency of online payment in China is still low: payment validation from the bank takes a long time (about 10 days), the charge is too high (5 per cent service fee of credit cards transaction), and there are too many restrictions. All these hinder the development of e-commerce in China.4. Solutions to the problems4.1 Establishing a good payment mechanismConsistent with Phoneme Institute's other Privacy Trust studies, the biggest fear consumers have is identity theft (82%), followed by unauthorized access to their bank accounts and telemarketing abuse. Eighty percent of respondents said that the privacy of their personal information is very important or important to them.Based on these findings, banks should concentrate strength on solving the security encryption of the online shopping system, authentication, key technology problem on payment, etc., technically, banks should not only prevent mischief anddestruction to the network of computer by virus and hacker, but also guarantee national benefit and commercial rights and interests and secret of enterprises .At the same time the bank should make breakthrough in trade account settlement and cash allocation between different banks or different regions in order to meet the development demand of network marketingAt the same time, banks should address the online security of their Web sites and provide information about the measures customers can take to protect their financial assets. Banks should clearly communicate their commitment to protecting the privacy of their customers and provide information on how consumers can contact the bank with questions or concerns.Respondents were also asked to suggest actions their bank could take to increase confidence in its ability to protect personal information. The most important issue with online consumers is setting limits on the sharing of personal information with third parties. This finding is also consistent with the results of our 2005 Online Consumer Permissions Study. According to that study, consumers want control over their online experience.The rewards from listening to and respecting the concerns of online consumers can lead to greater trust. And, in the world of online banking, trust is positively related to consumer acceptance and greater use of online banking services.4.2 Improving the lagging logisticsLogistics is defined as a business planning framework for the management of material, service, information, and capital flows .It includes the increasingly complex information, communication and control systems required in today’s business environment.The allocate-and-deliver system of logistics should be perfected. The network marketing has offered internal motive force and external demand to the variety and dispersiveness of the allocate-and-deliver demand and the reform of resources in logistic enterprises. It is urgent to establish a nationwide allocate-and-deliver system, which covers both the urban and rural areas to be accorded to the demand of allocate-and-deliver system of network marketing. Logistic enterprise should not only deliver goods, but also become the service supplier to customer finally to help enterprises to finish the after-sales service, to offer more appreciated service contents,for example, to follow the products order, to offer selling statistics and report form, etc., to further increase the kernel service value of enterprises. In addition, they can develop the third-party-logistics, unify manufacturer service thus to optimize the logistics deliver network, and then the cost of allocate-and-deliver service will be reduced.4.3 Making relevant lawsThe research and formulation of strengthening the laws and regulations to offer the favorable external environment for development of marketing of the network, in order to protect the development of network marketing, developing relevant network management by centering the marketing of the networks, the information safety, settle account in finance, such problems as intellectual property protection, etc., at the same time they should accelerate the modification paces of the current laws and regulations , make and issue the new trade regulation at the same timeThey need not only make the relevant laws, but also strengthen the government’s management the management of government except making the relevant laws.Facing the opportunities and challenges in global development of online shopping, the Chinese government has placed online shopping high on the agenda in its basic economic construction.The key task at present is to establish a unified application and service platform with Chinese characteristics. Upon its completion, currently complicated online shopping can be turned into a simple platform operation, and an advanced service mechanism and infrastructure can be set up, which will facilitate the establishment of a new economic model for e-commerce in traditional enterprises.The government should take an active role in encouraging and supporting the Internationalization of traditional corporations. Besides, it also emphasized the business nature of online shopping, and warned that online shopping activities cannot be done by simply building networks.5. ConclusionThe main advantage of online shopping is that it allows people to browse through many items and categories without leaving their house, to compare the prices of as many shops as they want, and also to order as many items as they can afford without having to worry about how they will transport them, because the online shopping websites also deliver the things to the buyer's home. Furthermore, the Internet is open 24 hours a day, 365 days a year, so you don't have to hurry or worry about finding a parking spot.A new survey shows Internet shopping is increasing thanks to improvements of online payment systems and delivery services. The China Internet Network Information Centre survey reveals 17.9 per cent of consumers shop online often.Among those who have never purchased online, 63.7 per cent said they would convert to online shopping in the future, which means the existence of greater potential market.Online shopping has very bright prospect in china. By the end of 2004, the netizen of Chinese Internet users is 94 million. It is estimated by 2007, Chinese Internet user will reach 140 million. The one faster than this speed is the development of user's number of China's online shopping. It is that 5,630,000 will use users in 2004. It is estimated by 2007, this figure will be up to 16 million, online shopping users will be 3 times those of 2004 in 2007, 28 times those of 2001. In addition, the market scale of online shopping increase by 160% in 2004, the turnover rises to 4,500 million RMB by a wide margin. In 2007 this figure is hopeful to be up to 29,600 million RMB, 6 times those of 2004. In the face of more and more users, in the face of such a big market, I think nobody dares to neglect this market; nobody bets and speaks NO to this market.References1.Hu Chunlan (Hu, Chunlan). New economic English [M]. Tsinghua university press, 20042.Zhang Qingying (Zhang Qingying). Logistics engineering English [M]. Chemical industry press, 20033.ZhuangPeiJun (Zhuang Peijun). Logistics professional English [M]. Electronic industry press, 20034. The fourth one (Ding Mingyi.) enterprise electronic commerce foundation [M]. Electronic industry press, 20025. NiJin (Ni Jin). The wto English [M]. Southeast university press, 2001网络购物行为分析摘要此文从对我国目前网上购物的现实状况入手,深入的分析了网上购物的优,缺点,以及解决的方法等一系列的问题,深入的分析了网上购物给商家和消费者双方带来的利益,使人们对网上购物在中国的发展充满信心。
电子商务安全外国文献翻译
英文翻译*名:**学号:**********指导教师:***专业:电子商务(文)班级:电子商务0903班时间:2013年4月24日电子商务系电子商务系英文翻译评价表英文原文Issues of Security and Privacy in Electronic CommercePart I ---- Introduction & MotivationPeixian LIIntroductionSince the invention of the World Wide Web (WWW) in 1989, Internet-based electronic commerce has been transformed from a mere idea into reality. Consumers browse through catalogues, searching for best offers, order goods, and pay them electronically. Information services can be subscribed online, and many newspapers and scientific journals are even readable via the Internet. Most financial institutions have some sort of online presence, allowing their customers to access and manage their accounts, make financial transactions, trade stocks, and so forth. Electronic mails are exchanged within and between enterprises, and often already replace fax copies. Soon there is arguably no enterprise left that has no Internet presence, if only for advertisement reasons. In early 1998 more than 2 million web servers were connected to the Internet, and more than 300 million host computers. And even if actual Internet business is still marginal: the expectations are high. For instance, Anderson consulting predicts Internet business to grow from $10 billion in 1998 to $500 billion in 2002.Thus, doing some electronic business on the Internet is already an easy task. As is cheating and snooping. Several reasons contribute to this insecurity: The Internet does not offer much security per-se. Eavesdropping and acting under false identity is simple. Stealing data is undetectable in most cases. Popular PC operating systems offer little or no security against virus or other malicious software, which means that users cannot even trust the information displayed on their own screens. At the same time, user awareness for security risks is threateningly low.A report from Goldman, Sachs & Conotes that while commercial properties such as Yahoo! and eBay receive a lot of attention from investors, business to business ECommerce is on the verge of exponential growth. The report predicts that ECommerce will be worth USD1.5 trillion by 2004. However, according to a survey by Net Effect Systems, while 94 percent of online consumers use the Internet to shop, just 10 percent say they prefer to buy things online. 74 percent of consumers cited security and privacy concerns.Therefore, if the security and privacy problems are addressed e-shoppers will be converted intoe-buyers, and the ECommerce will be pushed a big step forward.Non-technical Issues1. Security AwarenessMost opinion surveys list "insecurity of financial transactions" and "loss of privacy" among the major impediments to electronic commerce, but in fact most users have only ague ideas about the threats and risks, and a very limited understanding of the technical and legal options for minimizing their risk. As a result all kinds of misperceptions exist.For instance, the cardholder's risk in sending his or her credit card number over the Internet is typically overestimated. At least as of this writing payments over the Internet are treated like mail-order/telephone-order transactions, which means that the cardholder is not liable at all. All risk is with the merchant.On the other hand, the risks in sending sensitive data in an electronic mail are typically underestimated. Probably most users of email know the mere facts: neither confidentiality nor integrity nor availability is guaranteed. But nevertheless many users do not hesitate to send all kind of very personal and sensitive data to their friends or colleagues, unprotected.Unfortunately, developers of electronic commerce solutions are often as security unaware and ignorant as their prospective users. For instance, still many developers demand that security must be provided by "lower layers" in a "transparent" way. But, for instance, Secure Socket Layer (SSL) in an "opaque socket integration" does not make any sense in most case. Security has to be an integral part of the architecture, design, and implementation.2. Crypto RegulationsSeveral countries regulate the deployment of strong encryption technology by law. For instance, France controls the domestic use of encryption technology, in order to maintain the capability to eavesdrop on the communication of criminals. The USA prohibits the export of strong encryption products for the mass market, for the same reasons as it controls the export of munitions.Such regulations do not discriminate between “good” and “bad” applications, and limit the security of honest citizens and companies to at least the same extent as they limit the security of terrorists and organized crime. Therefore several governments, in particular the US administration, are willing to relax their crypto regulations, provided access to the encrypted information would still be possible on demand. The idea is to introduce new “Trusted Third Parties” where secret keys must either be escrowed in advance, or can be recovered afterwards.All these proposals are still heavily contested, for various technical and political reasons: The Trusted Third Parties would be “single points of failure” for everybody’s, i.e., new and extremelyattractive targets for attacks. It is questionable whether any regulation of encryption technology can be effective in fighting organized crime: tools for strong encryption are publicly available, and steganographic techniques can perfectly conceal the fact that cryptographic techniques are applied.Many types of commercial transactions require strong confidentiality, which cannot be satisfied in some countries, or across some borders. For instance, consider two large companies that prepare a merger. Clearly their negotiations require top confidentiality. Even the fact that they are preparing the merger, i.e., that they acre communicating intensively, will be extremely sensitive. This requires actually services for anonymous communication. Nevertheless using the appropriate cryptographic tools would be illegal in many countries.Political regulations are not subject to scientific research. But we clearly see the need for an international agreement on a more liberal and consistent regulation of cryptography. Electronic commerce demands strong confidentiality, which can be implemented only by strong encryption schemes.3. Legal IssuesSurveying the open legal problems in electronic commerce is beyond the scope of this article. The two most important security-related problems are the following:•Liability: The financial risk of a user in a specific transaction depends on his or her liability. In principle, if a user bears no liability, there is no risk.The main issue here is fairness: The liability of a user should correspond to the security of his or her technical equipment. For instance, if it is technically trivial to forge the digital signature of a user then this party should not be held liable for his or her signatures, in general.•Harmonization: The national laws that regulate electronic commerce over the Internet (like evidential value of digital signatures, consumer protection, copyright protection) are notharmonized, and are partially contradictory. One side result is that there is no mutual recognition between national PKIs, even where comparable laws exist.Technical Components of eCommerce SecurityThere are four components involved in ECommerce Security: client software, server software, the server operating system, and the network transport. Each component has its own set of issues and challenges associated with securing them:•Client software is becoming increasingly more security-focused, however single-user desktop operating systems historically have had no security features implemented. ECommerce software that relies on the security of the desktop operating system is easily compromised without theenforcement of strict physical controls.•Server software is constantly under test and attack by the user community. Although there have been cases of insecurities, a system administrator keeping up with the latest patches and vendor information can provide a high degree of confidence in the security of the server itself.•Operating systems used for hosting ECommerce servers are securable, but rarely shipped from the vendor in a default configuration that are secure. ECommerce servers must protect thedatabase of customer information accumulating on the server as well as provide security while the server is handling a transaction. If it is easier for a thief to compromise the server to obtain credit card numbers, why bother sniffing the network for individual credit card numbers?•Session transport between the client and server uses network protocols that may have little or no built-in security. In addition, networking protocols such as TCP/IP were not designed to haveconfidentiality or authentication capabilities.Why No Unified Standard MethodThe methods and models of securing ECommerce transactions are as diverse as the transactions themselves. ECommerce transactions are performed with varying levels of security, from sending requests in the clear, to encrypted password protection, to using digital certificates.So why not simplify things by implementing one standard method for securing ECommerce transactions? The problem with creating one standard solution is that there are different and sometimes conflicting goals in securing a transaction. The objectives of the merchant may not be the same as those of the user or bank. The merchant, for example, requires a valid transaction, liability coverage, and payment for goods and services. The user would like to purchase a product, protect privacy (name, address, and payment information), and pay for only the products they have agreed to purchase. The institutions providing payment would like to detect and prevent fraud. Many security solutions address one or more of these security goals—but where one solution may focus on providing privacy, another may focus only on transaction validation.In addition to the differences in security goals, vendors and governments introduce complications into selecting security standards for ECommerce. Vendors disagree on implementations and try to push their own products into standards. National governments try to limit and control use of encryption to secure ECommerce transactions. One of the benefits of ECommerce is that it allows a small company to distribute and sell products globally. But national laws and regulations can dilute the standards to the lowest common denominator.Issues of Security and Privacy in Electronic CommercePart II ---- State-of-the-art ReportPeixian LICryptography & Pretty Good Privacy (PGP)1. The need for cryptography in electronic communicationsCryptography has been around for centuries; as long as there has been communication, there has been the need for privacy and safe, secure methods of transmission. Although many types of difficult problems can be classified as cryptography problems, what we are mostly concerned with today is the ability to keep transmissions private through the use of data encryption techniques. This has become an even greater issue due to the changing nature of communications since the information revolution. More and more people rely on electronic communications for the transmission of sensitive or personal data; e-mail, e-commerce, FTP, and HTML are all examples of technology that have already filtered into the social consciousness as primary ways for disseminating and gathering information and for exchanging goods and services. While this technological shift has made communication faster, easier, and better in many ways, it has also brought along with it a whole host of difficult problems and social policy issues.The main problem that comes with electronic communications is the ease with which transmissions can be eavesdropped or impersonated. Paper communications obviously have security problems as well: documents can be stolen, steamed open, have forged signatures or changed contents. However, if someone is trying to catch a specific transmission (or type of communication), it is much easier when dealing with an electronic medium. It is a trivial matter for people to set up programs that systematically scan e-mail for keywords, or that sniff packets in a Telnet session for passwords, whereas randomly steaming open mass quantities of paper mail looking for a certain document is clearly infeasible. Also, since there can be (and often are) multiple copies of any given electronic transmission, it is difficult to know if someone has stolen a copy or somehow altered the original.Secondly, there is an access control problem. Many electronic transmissions are made in a broadcast manner, as seen with cable or satellite television and wireless phones. People can install devices to intercept these transmissions, and senders usually have no way to either monitor or stop this. In order to prevent unwanted people from making free use of their services, senders must encrypt their outgoing transmissions. To their paying customers, they can give special devices to decrypt the information.Finally, there is the problem of authentication: electronic communications are impersonal, and can be easily forged by impersonating IP addresses, changing "sender fields" in e-mail, "cloning" cellular phone numbers, and so forth. In order for people to want to - and, indeed, be able to - use electronic communication in the coming years, it is essential that these problems be resolved. Right now, advances in cryptography are the best way to address these issues. Data encryption not only provides privacy and access control by rendering communications illegible to unauthorized parties; it can provide effective authentication as well through the use of digital signatures and timestamps.2. The primary forms of cryptographyThere are two main forms of cryptography: secret-key (or symmetric) and public-key (or asymmetric).Secret-key cryptographySecret-key cryptography is the more traditional form, and has been used for all kinds of communications throughout the ages. In this method, one "key" is used to both encrypt and decrypt the data. A key can be anything from a secret-decoder ring found in a cereal box to a highly complex mathematical algorithm; keys really only differ in the ease with which they can be broken by third parties. In secret-key cryptography, the sender and receiver must have the same key in order for the transmission to work correctly.Secret-key cryptography suffers from two overwhelming problems. First, any two people that want to communicate with each other must first agree on the key to use. This makes it more difficult to send information to people that you do not already know, and large-scale communication becomes much more difficult. The second, more fundamental, problem is that of "key management", which is the system for transmission and storage of keys. In order to agree on a key, there must first be some sort of communication that occurs, and this communication itself can be eavesdropped. If some third party catches the key that is being used, then all further communications between the two parties are no longer secure and private. Also, the third party could easily impersonate communications because it is believed that no one else knows the key. This problem is exacerbated by the fact that the initial parties might have no way of knowing that the key was stolen. This key management issue causes a "repudiation problem": later on, either of the parties could repudiate messages that had been sent with secret-key encryption, claiming that the key had been stolen and that the messages were compromised or faked. Thus, there is always an inherent lack of security and trust in a purely secret-key environment.Public-key cryptographyThe key management problem inherent to secret-key cryptography needed to be addressed in order for large-scale, secure use of data encryption techniques. In 1976, Whitfield Diffie, a cryptographer and privacy advocate, and Martin Hellman, an electrical engineer, working together discovered the concept of public-key encryption. Instead of having one key shared among both users of an encrypted transmission, each user has his or her own public/private key pair. A user makes the public key open and available to anyone (by publishing it on-line or registering it with a public key server), and keeps the private key hidden away where (hopefully) no one can get at it. The private key is mathematicallyderived from the public key, and thus the two are linked together. In order to send someone a message, the sender encrypts the transmission with the receiver's public key. This can then only be decrypted by the receiver's private key. Thus, anyone can encrypt a message with someone else's public key, but only that person would ever be able to read it.This method solves the problems of secret-key cryptography. Because the only key information that needs to be shared is made public, there is no worry about some third party intercepting and possessing the key. This makes the users of the encryption surer that their transmissions are secure and private. It also solves the repudiation problem, because there is no third party that could ever be blamed - each individual is responsible for safeguarding his or her own private key.The inherent weakness of the public-key method is that the two keys are linked together mathematically. If a third party figures out the exact way that an individual's private key is derived from his or her public key, the whole security of the system will be lost. The only way around this liability (so far) has been to make the derivation so incredibly complex that a brute force attempt to crack it would take a prohibitively long amount of time. As Phil Zimmerman, author of the Pretty Good Policy (PGP) public-key encryption package says of his software: "if they [the NSA] are just having to use methods that are not too much shorter than what we know in published academic literature, then it could be from now until the next ice age before they can break it." It is easy to see that the quality of the method used to create keys is essential to the success of any public-key system.Digital signaturesPublic-key also provides a mechanism for authenticating messages that secret-key techniques do not: digital signatures. The sender of a message completes a calculation (performed by a hash function) involving the actual file structure to be transmitted, and his or her private key, and the result of this (the digital signature itself) is appended to the end of the transmission. The receiver can then perform a calculation involving the received message and the sender's public key, and if everything is valid, the sender's identity will have been verified. A benefit of this signature method is that it not only verifies the sender's identity; it also verifies that the original contents of the transmission have not been alteredin anyway. Because the signature is derived from both the key and the data itself, changing the data later on will cause the receiver's verification to fail. This provides authentication that is even better than a signature on a paper document: a signature can be forged, or the contents of the document could somehow be secretly altered, but with public-key authentication, this cannot be done.Comparison of cryptography methodsClearly, public-key systems have the advantage in terms of security and privacy, due to a key management strategy that is inherently more secure. They are also more convenient because there is no extra step necessary to decide on a common key, and the sender does not have to communicate with the receiver prior to the actual transmission. This is an advantage when people who do not actually know each other want to communicate, and when an individual wants to disseminate information on a large scale. Furthermore, public-key systems provide an extra layer of authentication, via the digitalsignatures, that is missing in secret-key systems; this property of non-repudiation is essential, especially when dealing with transmissions of a critical nature.The primary disadvantage of public-key systems is the fact that they are slower, due to the extra steps involved in the encryption/decryption process. One way around this is to use a "digital envelope", which is a combination of the best features of public- and secret-key systems. A message is encrypted with secret-key cryptography, and the encrypted message and the secret key itself are transmitted via public-key cryptography to the receiver. This allows the actual messages to be sent using the speed of secret-key cryptography, but using the public-key method to prevent the secret-key from being intercepted. The two parties could then continue to use their secret key for as long as they deemed appropriate, because they have already paid the one-time overhead cost of sending the secret key.Because of the different natures of these two cryptography schemes, there is no one method that is always best for every given situation. Secret-key cryptography can be best taken advantage of when there is already a closed, secure environment (such as a well-protected LAN) or single-user environment (such as a user encrypting files on a non-networked PC). Public-key cryptography is usually preferable when there is an open, unsecured, multi-user environment (such as the Internet), and there is no safe, reliable way to transmit private key information.3. What is Pretty Good Privacy (PGP) and Why is it popularPretty Good Privacy (PGP) was developed by Phil Zimmerman in 1991, as a response to a controversial measure in Senate Bill 266 that would have required all encryption techniques to include a back door for law enforcement. PGP is software that combined several high-quality, existing public-key encryption algorithms and protocols into one package for secure, reliable electronic mail and file transfer. PGP provides not only encryption of data, but digital signatures, data compression, and smooth compatibility with e-mail systems. It is able to run on multiple platforms, and it is freely available for download in the US. Due to the usage of RSA, IDEA, Diffie-Hellman, 3DES, and CAST algorithms, PGP falls under the export restrictions of the ITAR, and may not be legally exported.For sending digital signatures, PGP uses an efficient algorithm that generates a hash code from the user's name and other information about the data to be transmitted. This hash code is then encrypted with the sender's private key. The receiver uses the sender's public key to decrypt the hash code. If it matches the hash code sent as the digital signature for the message, then the receiver is sure that the message has arrived securely from the stated sender.PGP is pretty popular now, especially in the email system, because of its advantages:•The software is available - for personal use - for free worldwide, in versions that run on a variety of platforms, including DOS, Windows, Unix, and Macintosh.•PGP is based on algorithms that have survived extensive public review and are considered extremely secure (such as RSA, IDEA, MD5, and Diffie-Hellman).•PGP has a wide range of applicability. It can be used by corporations that want to enforce a standardized scheme for encrypting files and messages, by individuals who wish tocommunicate securely over the Internet and other networks, by political groups actively resisting the government in totalitarian countries, and so on.•It was not developed by, nor is it controlled by, any governmental or standards organization. For the many people with an instinctive distrust of "the establishment" or Big Brother, this makesPGP attractive.4. What is PGP’s limitationThe main weakness in a public system is this: How do I know that the public key really belongs to my correspondent?The most trivial case is the one where the correspondents have had an opportunity to meet, and they've handed over a copy of their keys on floppy disk. They can each be sure that the keys belong to the other person. Obviously, if it is possible to do this then it is surely a good method of knowing that a key may be trusted, however, it is not always practical - otherwise why use Public Key? What if the correspondents never met? This is where key signatures come in.If you have personally verified that a given key belongs to a given person, then it is common practice to sign that key. The signature is made with your private key - so only you can make the signature - your signature may be verified by anybody, comparing the signature with your public key.Now suppose Alice and Bob have a mutual friend, David. David has signed both Alice's key and Bob's key, and both Alice and Bob have a verified copy of David's key.When Bob examines Alice's key he observes that her key was signed by David, Bob trusts that David is reliable when it comes to signing other people's keys. Therefore Bob can be fairly certain that the key belongs to Alice.The thing with PGP in particular is that YOU decide who is trustworthy when it comes to key signing. For instance, it could be that David signs any old key without really verifying the key (as described above) - or it could be that David's private key doesn't belong to David at all. In these cases you'd mark David's key as being "untrustworthy" and his signature would carry no weight.In this way, by verifying and signing keys wherever possible a "web of trust" may be built up. With trusted keys vouching for new keys. Of course, the weak point is now that person who signs a key without justification - this is why PGP is configurable to allow the user to say how much they trust a key's owner to sign other keys, how many valid signatures are required for a valid key, etc.Protocols for Securing ECommerce TransactionThe security of ECommerce transactions depends both on the network protocols and the payment framework used to perform the transaction.Network Transport SecurityModels such as SET, CAFÉ, DigiCash, First Virtual, and Millicent provide a secure payment method. However, the transaction still depends on the privacy and authentication of the data stream. BasicTCP/IP networking protocols do not include encryption and strong authentication. Higher level protocols such as HTTP, FTP, and Telnet do little to provide advanced security measures beyond userid and password authentication. All information sent using these protocols is unencrypted, so the data stream lacks confidentiality.Traditional networking protocols and applications are unable to enforce strong security measures for performing ECommerce transactions securely. This lack of security led to the design and implementation of many new security protocols that strive to reach different security goals. There are some secure transport protocols that provide confidentiality and authentication between systems and applications by using encryption. The following section describes some of the more popular secure transport protocols.•Virtual Private Networking (VPN)The Internet’s lack of security may leave you leery. What can you do if you just want to give company insiders and a few select business partners and customers easy and relatively secure remote access to company data via the Internet? You can set up a virtual private network.Virtual Private Networking technology provides the medium to use the public Internet backbone as an appropriate channel for private data communication. With encryption and encapsulation technology, a VPN essentially carves out a private passageway through the Internet. VPNs will allow remote offices, company road warriors, and even business partners or customers to use the Internet, rather than pricey private lines, to reach company networks. So the companies can save a lot of money.You can also use VPNs to link remote LANs together or give traveling staffers, work-at-home employees, and business partners a simple way to reach past company firewalls and tap into company resources. Virtual private networks are flexible. They are point-to-multipoint connections, rather than point-to-point links. They can be set up or closed down at the network administrator's will, making them ideal for short-term projects.VPN has many advantages: It is much cheaper for connecting WANs than 800 numbers or dedicated T1 lines. It provides encryption and authentication services for a fairly good measure of privacy. Maintenance of the WAN-to-WAN connection is left to Internet Service Providers. It is highly flexible, and can be set up and taken down very easily.Virtual private networks may be new, but the tunneling technology they're based on is well established. Tunneling is a way to transfer data between two similar networks over an intermediate。
电子商务消费者权益保护中英文对照外文翻译文献
电子商务消费者权益保护中英文对照外文翻译文献电子商务消费者权益保护中英文对照外文翻译文献(文档含英文原文和中文翻译)Consumer Protection in Electronic Commerce: Some Remarks on the Jordanian Electronic Transactions Law Emad AbdelElectronic commerce changes the way the world is conducting business. It offers enormous potential for accessing to new markets and transacting between parties who may have had no previous contact or knowledge. With this modern kind of trade, transactions might even be formed by the interaction with or between intelligent software applications without any direct awareness or intervention of the human users.Electronic commerce may also generate many consumer and legal challenges especially regarding the it between law and technology. The law is not just words on a piece of paper, but it might play an active role in building confidence in e-commerce, encouraging efficient business practices, and enhancing the commercial flourish in the networked environment. It is quite possible however that the law might contribute in shaking the trust in e-commerce and undermining the security and reliability of the online environment.It can be said that the success of e-commerce in any country depends primarily on the predictability and suitability of the legal framework and whether such framework copes sensibly with the needs of online consumers. For e-commerce to reach its full potential, consumers must have effective protection when shopping on the Internet, and they have to feel that their data and transmissions are adequately safeguarded andauthenticated. Otherwise, the results will be less and less convincing since individuals will be less willing to engage in the universe of the electronic commerce, and hence, e-commerce will not flourish and its growth will be stifled.Like other countries, Jordan sought to benefit from the advantages and unprecedented opportunities of e-commerce. To achieve this goal, considerable economic and legislative reforms were made during the last decade to bring the Jordanian market into conformity with the global economy and shift the Jordanian economy from protected form of economy to the market one, where the competition practices and liberation of goods and services’ prices are freed. In 2001, Jordan enacted the Electronic Transactions Law No.85 which was largely based on the UNCITRAL model law on electronic commerce. This law has recognized electronic transactions and signatures and placed them on equal footing with their paper counter- parts. Furthermore, Jordan signed and acceded to many treaties and agreements at international, American, and European levels to create a favourable e-commerce climate and meet the standards of international trade.After such changes and in the light of the Jordanian membership in many international agreements, the pressing question that needs to be addressed is whether or not the Jordanian law of electronic transactions deals appropriately with the challenges of e-commerce in a way that strikes a balance between business interests and the need to protect consumer rights. In other words, does the Electronic Transactions Law in Jordan offer the necessary guarantee for a secure online commerce? This question will therefore be the subject matter of this paper.The Protection of Online Consumers in JordanAlthough e-commerce is growing at a dramatic rate, there are still areas of concern that need to be addressed adequately by the legislation in order to promote trust in e-commerce and remove any barriers to its full development. Such areas of concern revolve in one way or another around the issues of consumer protection, privacy, and data protection in an online environment where the contracting parties hardly know each other, and in which electronic communications are rarely subject to direct human review.Online consumers may not use the Internet to make purchases if they find that they do not have a clear protection from unfair contractual terms or that their rights of privacy and transparency are not comprehensively guaranteed. Therefore, it can be argued that the lack of proper legislation may not only shake consumer confidence in online commerce, but it might also threaten the expansion and profitability of e-commerce. It is clear then that the consumer protection in e-commerce is based on several rights such as the right of full information, the right of privacy, the right to withdraw from the contract without penalty, and the right to have effective protection from unfair contractual conditions.Let us now explore the way in which the Electronic Transactions Law deals with such rights and determine whether or not this law gives due attention to consumer protection in an online environment. Let us further permit and encourage debate of what such law should be in order to enhance legal certainty as well as increase confidence in e-commerce in Jordan.The Right of Full InformationIn order to protect online consumers and boost theirconfidence in e-commerce, consumer protection rules in most jurisdictions require that certain information must be provided to the consumer in good time before the contract is concluded. Good examples in this regard are the European Directive 2000/31/EEC on electronic commerce, and the European Directive 1997/7/EC on the protection of consumers in respect of distance contracts which contain specific provisions in terms of information to be provided to the consumer. Such directives aim to encourage greater use of e-commerce by clarifying the rights and obligations of businesses and consumers, enhancing the transparency, and breaking down barriers across Europe. In order to achieve these goals, such Directives require that certain information be supplied to consumers in a clear manner that comports with the means of distance communication used, having regard to the principles of good faith in commercial transactions, and the protection of minors and others unable to give consent. These Directives insist further that online service providers are obliged to provide contact details to the recipients of their services in a form that is easily, directly and permanently accessible.Unlike the European law, the Electronic Transactions Law in Jordan does not contemplate the information that the supplier must provide to the consumer before the conclusion of the electronic contract. By doing so, this law leaves this issue to be governed by the general rules of the Civil Law without in any way recognizing the fact that consumers in an online environment need more protection than that offered by such general rules. Without direct and comprehensible recognition of the full information right, suppliers might have an absolute power to bind their consumers regardless of whether or not they providethem with the necessary information to enter into contracts, and consumers might thus become largely unprotected. If creating a confident and protective environment for online consumers is our concern, it is essential then that the Electronic Transactions Law addresses such issue explicitly by imposing special duties of information on the supplier so that certain details must be provided to the consumer either before the contract is made or in good time after it. The Right to Privacy in Personal Data Many privacy concerns arise in cyberspace where anonymity prevails and in which technology facilitates the collection, processing and transmission of individuals’ information in a matter of a few seconds. On a daily basis, the vast majority of Web sites required e-consumers to disclose some personal identifyinginformation as they complete electronic transactions or create online accounts. Such consumers often provide the required personal information without fully understanding how this information will be used and whether or not it will be shared with third parties. They just do that to complete a transaction or gain access to a service they seek since they know that any refusal to submit the required information will hinder any further meaningful use of a Web site, and hence, they will find themselves unable to complete their intended purchase (Ciocchetti 2008, p. 561).While some Web sites collect personal information from consumers and store it in their databases in order to facilitate transactions and discover consumers’ trends and interests so that they can satisfy the ever-evolving needs of their consumers, other Web sites may collect personal information only to sell it to marketing firms or unrelated third parties for a profit. Thismight not only impact a consumer’s privacy negatively, but it may also cause considerable personal and financial damage especially when very sensitive data falls into the wrong hands. What complicates the matter further is the fact that once such data leaves the hands of its initial collectors, it may be stolen or purchased anonymously and from anywhere around the world. That being the case, it should come as no surprise if consumers know nothing about the identity of the parties that purchase their personal information or the purpose for which such information is used. This situation may infringe the privacy of e-consumers and leave them in the dark as to how their personal information will be used in the future. In order to avoid that, law should determine when, how, and to what extent consumers’ personal information is collected, used, and shared with third parties.Law is also strongly advised to oblige Web sites to notify their customer in advance and in a conspicuous manner of their privacy policy with regard to the collection, use, and dissemination of personal information. Such notification must clarify whether or not this information will be shared externally and must also include the identity of the data controller, the purpose for which the data is collected, and the measures that will be taken to guard such data against loss or unauthorised processing. By doing so, law will surely enable e-consumers to make informed decisions before submitting their personal information online, and provide them with options as to how this information may be used for purposes beyond those necessary to conclude a transaction.Protecting the privacy of personal data is recognized as being important tosociety and to the development of e-commerce in Europe. This is why the European Union has enacted Directive 95/96 in 1995 to determine a basic framework for the protection of personal data while at the same time stressing the freedom of movement of personal data between each of the EU’s Member States. This Directive includes an important language that attempts to identify the core rights of data subjects, such as the right to know what data is held on them and the nature and purpose of the processing. Furthermore, this Directive necessitates that any subsequent use or transfer of the data must be justified in the light of the purpose for which it was acquired.Unlike the European Union, Jordan does not yet have comprehensive legislation pertaining to data privacy. Although the Jordanian Constitution explicitly recognizes the right of each member of the society to maintain and preserve his individual privacy, and although Jordan signed many international agreements which have insisted on the importance of protecting the privacy of personal data, Jordan has no specific data protection or privacy law, and hence, it remains unclear how to deal with the collection, processing, and dissemination of consumers' personal identifying information. In fact, even though Jordan has witnessed significant legislative reforms and amendments during the last decade, none of such reforms and amendments regulate the privacy in online contracting.While the Electronic Transactions Law was well intentioned, its silence with regard to data privacy has effectively undermined the consumer protection which it aimed to provide to Internet users. Instead of safeguarding the rights of consumers to privacy and protection in the online environment, this law says nothing about the collection, use, and disclosure of consumers' personalidentifying information. Furthermore, this law does not require e- commerce companies to create a privacy policy or notify their customers of the purpose for which the personal data are collected from them. That being the case, one may conclude that online companies have too much power to determine the manner in which they collect and process consumers' personal data, and that such companies are absolutely free to sell, swap, or rent consumers’ data to whoever they want without any fear that law will interfere or track down their operations. Under the current legal system in Jordan, online consumers have no control over their submitted information or over the subsequent use of such information, and it still difficult for them to make informed decisions before submitting their personal identifying information online.Privacy is then one of the most complex challenges facing e-commerce in Jordan. Unless the Jordanian legal system meets this challenge adequately in a way that protects the personal information of consumers while also promotes e-commerce efficiency, the interests of Internet users across the country will be largely unprotected. Therefore, law is strongly advised to establish enforceable rules to safeguard users’ rights to privacy in personal data. It is perhaps useful for Jordan to consider the principles of fair information practices for the protection of personal data that can be found in the Data Protection Directive in the European Union. It would also be useful in this regard to contemplate the Organization of Economic Cooperation and Development (OECD) Privacy Guidelines.ConclusionElectronic commerce has brought with it a host of new challenges especially in matters of privacy and consumerprotection. It has become increasingly certain that the absence of an appropriate legal framework to deal with such challenges may have a negative effect on the stability and predictability of e-commerce. For most shoppers, feeling that their data and interests are well protected throughout the different stages of the electronic contracting process is the most important consideration in shopping online. If consumers feel that their rights might be infringed or that their interests might not be effectively and explicitly safeguarded, then they may be less willing to engage in online activities and transactions. It seems thus that the primary challenge is how to deal legally with e-commerce in a way that promotes trust in conducting business over the Internet, and at the same time protects the fundamental rights of online consumers such as the right of full information, the right to have effective protection from unfair contractual terms, the right to review the contract or to withdraw from it, and the right to privacy.The most important initiative drawing the general features of electronic commerce in Jordan is the Electronic Transactions Law No. 85 of 2001 which was adopted in order to accommodate the challenging aspects of e-commerce. The examination of this law however does not paint a positive picture of the future of such commerce in Jordan. Unfortunately, this law says nothing regarding the protection of consumers' rights in the online environment. Furthermore, this law does not include any measures to build confidence in online commerce, nor does it involve any safeguards in relation to misleading advertising, unfair contractual terms, the collection of consumers' personal identifying information, spamming, and othermarketing practices that may confuse or take advantage ofthe consumer. Instead of safeguarding the rights of consumers comprehensively, unambiguously, and directly, this law leaves this issue to be governed by the general rules of the Civil Law without in any way recognizing the fact that consumers in an online environment need more protection than that offered by such general rules.In spite of the significance now being placed internationally on consumer protection, little attention has been given to such issue in Jordan. At the time of writing, Jordan does not yet have specific legislation pertaining to the protection of online consumers. While consumers in most jurisdictions receive the benefit of a wide range of consumer protection laws, there is no detailed or comprehensive legal framework in Jordan for consumer protection. Although the general rules of the Jordanian Civil Law contain in one way or another some kind of indirect consumer protection, such rules may not be sufficient in the digital world due to the fundamental differences between online and offline environments.Although Jordan has proceeded with upgrading its legislation to meet challenges brought by e-commerce, it needs to do more in order to secure a suitable climate for e-commerce and enhance the confidence in conducting business online. In matters of privacy and consumer protection, Jordan should seek to establish explicit rules to safeguard consumers’ interests without invoking and depending on the general rules of the Civil Law or on other traditional laws which may not be applicable for the Internet. For the full potential of e- commerce to be realized, Jordan is also strongly advised to develop effective standards to ensure that there are adequate consumer protection and proper means of redress in place. It is perhaps useful for Jordan toconsider the principles of consumer protection that can be found in the relevant European Directives or OECD Guidelines.From:Jordan electronic trading activities of the law电子商务中的消费者权益保护:一些备注在约旦电子交易活动的律法阿曼德阿布戴尔电子商务改变世界的方式开展业务。
电子商务专业外文文献
本科毕业论文外文文献及译文文献、资料题目:CUSTOMER RELATIONSHIPMANAGEMENT文献、资料来源:加勒斯特经济学院文献、资料发表(出版)日期:2000.3.25院(部):专业:班级:姓名:学号:指导教师:翻译日期:外文文献:CUSTOMER RELATIONSHIP MANAGEMENT1. IntroductionIn the last decade, the majority of the companies were preoccupied with production, recession, mergers, new technologies and business regulation. Romania’s accession in the European Union will bring many advantages for further development, together with membership in a Common Market with common policies on product regulation, and freedom of movement for all the four factors of production (goods, services, capital and labor). This means that Romanian companies will compete with other companies from the EU directly in their home market. European companies are more flexible and mobile and will put a high pressure on the local companies in order to produce better products, launch better offers and services and orientate more towards their customers. High revenue equals important customer is a classic rule when the company organises its customer policy. “An important customer brings a gross amount of money for our enterprise” has become a reflex for many companies a broad and perhaps in Romania, too. But is this always true, or do we need more information than a simple figure reported at the end of the year?2. Marketing information systemA winning company is more productive in acquiring and retaining customers, to expand its clientele (Kotler, 2003). This company improves the value of the customers by reducing the rate of defection, increasing the longevity of customer Management & marketing relationship, making low-profit customers more profitable or terminating them etc. Gathering information on the actual or potential marketplace not only allows the organisation to monitor trends and issues concerning its current customers, but also helps it identify and profile potential customers and new markets, to keep track of its competition, their strategies, tactics and future plans (Brassington and Pettitt,2003). In order to collect and organize a high quantity of diverse information, the enterprises started to build marketing information systems. There are, mainly, a set of procedures and methods by which pertinent, timely and accurate information is continually gathered, sorted, analysed, evaluated, stored and distributed for the use of marketing decisionmakers (Zikmund and D´Amico,1993). The marketing information system includes data from external and internal sources (sales records, customer records, marketing communications, and sales force information). The focus on the customer and the integration of the marketing function helps the company to create customer databases with comprehensive information about individual customers or prospects.3. Customer relationship managementCustomer Relationship Management has been around for the last 30 years, but it became very important when companies changed their attitude towards marketing function. Nowadays, the cross-functional approach to marketing requires an organizational culture and climate that encourages collaboration and cooperation between departments. People within the business must understand their role in serving customers, internal or external one. CRM builds on the principles of relationship marketing and recognizes that customers are a business asset and not simply a commercial audience, implies the structuring of the company from functions to processes, information are used proactively rather than reactively and develops the ne-to-one marketing approaches (Payne, 2006).When defining CRM, we must first explain the difference between customer acquisition and customer retention. The two concepts have different drivers. Attracting customers has become very difficult these days, when people are harder to please. They are smarter, price conscious and sensitive, more demanding, less forgiving, and they are approached by many more competitors with equally good or better offers (Kotler,2003). Companies focus more on sales analysis, customer segmentation, advertising, merchandising and campaign management. The more difficult part is keeping the customers. According to Bruhn, a customer is satisfied when the comparison between offer and consumption fulfils his/her expectations, after he/she accepts the company, trusts it and exhibits a positive attitude towards it, becomes loyal to that company. In this situation, the customer talks favourably about the company and about its products, pays less attention to competing brands and is less sensitive to price, which turns transactions into routine (Bruhn, 1999). With customer retention, the company must pay attention to service satisfaction and trust in Customer relationship management the organization and its staff. Some companies believe that if a customer complaints the problem will be solved, but 96% ofunsatisfied customers don’t complain and go to another company. Therefore, Customer Relationship Management is the mechanism for retaining customers (Russell-Jones, 2003). Mainly CRM allows the company to understand who their customer is, isolate the best customer (those with whom you desire to have long-standing relationships), create relationships stretching over time and involving multi-interactions, manage the relationship to mutual advantage, seek to acquire more of those “best” customers. Inputs like marketing strategy, customer base, products, and regulation, competitors and staff skills are synthesized in a CRM programme which creates outputs as customer service, customer retention, higher share of wallet, customer referral, more predictable revenues streams, improved profitability, lower costs and better compliance (Russell-Jones, 2003).4. Developing a strategy in customer relationship managementBecause CRM is a cross-functional activity and large companies have thousands and millions of customers, the need for a strategic framework is very high. The dimensions of a CRM strategy are mainly focused on defining the following topics:- object of the customer relationship management – the company has three options: focusing on the company itself, on a brand or on the distributor;- target segment – the company usually sets priorities between different customer segments, it defines strategic customers based on the portfolio analyses, factors as revenue, length of the relationship, income, collaboration with the customer. These are its analysis criteria;- ways of retaining the customers –customers’ satisfaction is in the centre of all the decisions, but customers retention can also become a central issue through contractual clauses, such as service, leasing and warranty;- choosing the instruments of CRM – the company combines the instruments of the 4P´s with focus on the customer;- intensity and timing of the CRM decisions –show when and how should the company introduce different instruments; programmes can last from one day to one week, or from three month to two years;- cooperation within the CRM programme – sometimes the company must cooperate with other partners from the distribution channel, mainly between producer and wholesaler and retail.5. Instruments of customer relationship managementThe communication policy plays an important role in the instruments mix. It follows two objectives: first, to build a permanent dialogue with the customer in order to stabilize or change its expectations, and second, to counteract influences after consumption. The main CRM instruments within the communication policy are: Direct-Mail is material distributed through the postal service to the recipients’ home or business address to promote a product or service. In CRM the mailed issue can vary from a simple letter to a catalogue, and its sending will always occur at a particular moment in customer’s life (birthday, invitation for an event). It must incorporate sticky gadgets to increase their chances of being opened and read; Newsletters are distributed to customers for free and contain information about new products, offers for special events and others; Fidelity cards (store cards) are an important tool in gathering information about customer behaviour. By accumulating points of fidelity, the customer can benefit from different special offers; Clients club designates a concept which has grown in parallel with the fidelity cards. Its main forms are VIP-Club, Fan-Club, Product-Interest-Club, and Lifestyle-Club. The club represents an opportunity for the company to make offers in accordance with the social status, acceptance, prestige and expectations of its customers;Telemarketing allows companies to undertake marketing research and is highly measurable and accountable; the number of positive and negative responses are easily recorded and monitored. It provides for interaction, is flexible and permits immediate feed-back. Online-marketing includes many forms such as on-line advertising, on-line sales promotions, on-line direct marketing, on-line public relations, one-line personal selling. The medium used is the internet and the main instrument is the email. Virtual promotions are cheaper than hard copy versions, but the challenge is to drive traffic to your company’s Web site. Event-marketing takes place in three main areas: the product (here, it focuses on increasing sales), the corporation (for developing a corporate body) and the community (to make a difference in the life of the local community) (Bruhn, 1999& Fill, 2002).The price policy can be thought about in various ways when building a CRM programme: discounts for special customers, underselling or matching competitors, loyalty refunds, bundling items together and offering overall prices. Although price is not a measure of inherent value received, it is often used by customers as a benchmark, ignoring any other features or differences.Key factors in the product policy are the product itself, with quality, design, technical features, packaging and service management which includes lifelong warranty, price warranty or a customer telephone line. An active management in the distribution policy can focus on the customer or on the distribution channel. The producer evaluates the activity of the distribution partner and Customer relationship management intervenes when needed. The focus on the customers is realised through a Key Account Management which develops programmes for special customers.6. Customer relationship management in financial servicesFinancial services differ from many other industries. This can be seen particularly in Romania, where 40 commercial banks fight for a population of 21 million citizens. They cover the whole spectrum of customers from individuals to partnerships, institutions, corporations and governments. As a result, it can be very difficult to focus on single markets. Customers are often in two positions: they may have a deposit and savings accounts, but also loans and overdrafts. They are very service focused, they sell only intangibles. Financial services require processing billions of transactions worldwide and they are one of the heaviest regulated industries in the world (Rusell-Jones, 2003).The customers in the financial services are better informed, are switching channels, and seem to be more demanding of service, and used to change. The market is also highly competitive and new entrants are coming with diverse products and approaches.The industry of financial services in Romania has a very high potential and registers every year high growth rates. Till now, the location in a major city of the country with a population around 300.000 people was an advantage of the business and a success factor. Now the battlefield has moved in the small towns. The competition became tougher; banks began to develop and to introduce new products. Some experts say that a weakness of the banking sector is market segmentation. There is lots of information about customers, but it seems that banks prefer to focus on clients with large savings accounts. The main banks in Romania, as BRD, BCR, ING, and HVB-Tiriac announced for the year 2005 an increase in the number of the private banking clients. These are mainly customers with accounts between 50.000 and 100.000 Euros, they benefit of private consultancy, special interest rates, commissions, and special insurances. Customers have also a word to say about their bank. A market study made by DeadalusConsulting revealed that the customer profile for banking services is: person aged between 45-55 years, with higher or middle education. The most utilized service is the bank card for salaries payment (32,6%). Next, savings accounts (10,2%), credits for personal needs (11,1%), credits for buying electronics (9,2%) and auto leasing. The best grades were received by Raiffeisen Bank (8,83), BCR (8,58) and BRD Societe Generale (8,57). A customer’s criteria when choosing a bank are the trust in the bank, the environment in the branch, the quality of the staff, the advice they receive, the best interest rate they can receive, the information about the credit costs, and the conditions for obtaining a credit. A successful service provided by the majority of the banks is internet banking. It allows clients to save time and money, without going to the bank, 24 of 24 from inside or abroad. The access is free of charge or very cheap, and includes all kinds of activities from money transfer, payment orders, currency exchange, payment of current bills, external payments etc. The rate of penetration is still low, ranking between 10% and 30% of the customers in one middle bank.7. ConclusionsRomanian companies must focus in the future on the Customer Relationship Management and try to turn a “susceptible” client into a “partner”, to transform people who once needed their product/service, or occasional business partners into supporters and advocates and, eventually, into loyal partners that “sell” on the behalf of the company. Companies must create a permanent dialogue with their customers, and fight for them, because the clientele is not given for free. Customers that were price sensitive show now a higher interest in quality, service and behaviour of staff, and a company which concentrated on a price strategy should check how prepared its rivals are for a competition in the aforementioned fields. Customer Relationship Management increases its flexibility and adaptability to the market, in a world of capricious clients.中文译文:客户关系管理1.介绍在过去的十年中,大多数企业正在忙于生产,经济衰退,合并,新技术和商业管理。
电子商务信用中英文对照外文翻译文献
电子商务信用中英文对照外文翻译文献(文档含英文原文和中文翻译)英文:Towards Enhancing Trust on Chinese E-Commerce Abstract:E-Commerce has been much more popular in western countries where the development of E-Commerce systems has been relatively matured. While the technology and social credit environment are well developed, E-Commerce is relatively new and receives fewer acceptances within commercial industries in China. Building trust has been identified as one of the major concerns in E-Commerce.In this paper, we will develop an computational model, which may be used to improve the trust-building relationship among consumers, retailers and authorities. This model considers a number of factors including direct experiences, customer recommendations, and authority certification, while parties involved in the E-Commerce activities can confidently establish and reliably enhance the trustworthiness.We also conduct a case study on how to improve consumer-retailer trust relationship in an E-Commerce application by the use of the trust model, which is one of functional electronic storefronts with the consideration of trustworthiness in China. In addition, the findings from this research will also be helpful for national policy maker on legislation of Chinese E-Commerce activities.Key Words: Trust, E-Commerce, Trust-building, Computational model, Chinese E-Commerce.I. Introduction“With the rapid development of Internet technology, the landscape of exchanging information and doing business has been com pletely changed”. As a new way of doing business, E-Commerce is increasingly affecting, changing and even replacing the traditional commerce approach. People are increasingly accepting and using E-Commerce than ever before. Without any doubt, many network applications, based on initial Door to Door to B2B, B2C, and C2C models, have a profound influence on the global economy. However most of the development of E-Commerce is primarily achieved within a handful of countries, particularly in countries like US, Japan and some of European countries. Since the advent of the Internet in the late 1990’s in China, various applications can be seen in the following years, which stirred thousands of ambitious young Chinese people to establish their own business on-line with a dream of getting wealthy overnight. Over the past few years, almost 70% of the growth in Internet users from all over the world occurred only in China. However, in terms of E-Commerce development, there is still a gap between China and the developed countries. With the increased popularity of the Internet and the continuous improvement of Internet technologies, the development of E-Commerce has just made an impressive start. What hinder the development of Chinese E-Commerce can be attributed to various problems and barriers. Some of these problems such as payment method, distribution problem, and security issues have been partially alleviated. Unfortunately the consumers’ lack of trust towards E-Retailers has been identified as the biggest barrier that needs to be overcome in long-term.In the paper, we will identify the challenges in developing Chinese E-Commerce and propose a model to cooperate with current E-Commerce system as a mean of enhancing trustworthiness. The paper is organized into 6 sections. Section 2 introduces the current standing of E-Commerce, and then Section 3 briefly reviews the challenges in developing E-Commerce, and examines the “Trust problem”, which is identified as the major obstacle that hinders the spreading of E-Commerce in China. In Section 4, we propose a computational model that can be used to address the trust problem. Section 5 specifically discusses how to apply the model to improve trustworthiness, and gives a case study in Section 6. Section 7 concludes the paper by discussing further directions for improving trust between E-Commerce users.II. Current Chinese E-Commerce Standing(I) Issues in E-CommerceTrust has always been the main concern among most of Chinese E-Commerce companies. On one hand, people are impressed by doing business on-line, but on the other hand they are still worried about using E-Commerce widely. Consequently, a gap appeared between on-line retailers’interest in attracting shoppers to their electronic storefronts and many consumers’ trust in those activities. Nevertheless, researches have shown that the trust problem is not only technical problem, but more of a social problem caused by various reasons. First and foremost, for historical reasons, people may lack of confiden ce with others, therefore it’s quite difficult to puttrust in someone else in the beginning. Secondly, the commercial law and regulation for E-Commerce cannot fully protect the interests of consumers and merchants. Therefore E-Commerce users lack the confidence to take the risk when communicating with an unfamiliar party. Thirdly, the social credit system and payment system in China are still not strong enough when carrying complex E-Commerce transactions, so that on-line business frauds may happen, and harm consumers. Last but not least Internet security and cryptography techniques, which can increase consumers’confidence in on-line activity, are still under development. Due to all these issues, E-Commerce specialists commonly regard that the bottleneck of Chinese E-Commerce is as a trust problem than anything else.(II) Opportunities of Chinese E-CommerceIn 2005, Chinese E-Commerce has been experiencing the upsurge of B2C markets. With the recognition of trust problem, many retailers are experimenting with various trust building strategies to establish trustworthiness towards E-Retailers. Establishing trust between E-Commerce users is a long term process. Apart from more education or training in the long term, we can resort to technology to enhance consumer trust in an unfamiliar E-retailer. One effective method is to participate in third-party assurance programs, which assist consumers in an accessible level of trust they should place in an E-Commerce transaction. In that way, merchants who agree to meet a third party assures standards can either use the assure certified technology, or agree to be bound in some way by the assure procedures or oversight are registered by the assure and permitted to display an identifying logo or assurance seal on their website. Consumers can reveal specific validation of the merchants good-standing with the assure or additional disclosures related to the merchants’ business practices or history. Some theories suggest that trust in an E-retailer can be speci fically defined as consumers’ willingness to accept vulnerability in an on-line transaction based on their positive expectations regarding an E-Retailers future behavior. By evaluating a party’s post behavior and tracking its activities, the party’s futu re behavior can be expected and trust level can be considered so that consumers can make purchasing decision according to the trust level of E-Retailer. In this paper, a third party assurance program that can be cooperated with the current E-Commerce system is proposed. Through tracking E-Retailer ’s activity records, collecting consumer experiences, and recommendations, the computation model is capable of considering the level that consumer can trust an unfamiliar E-Retailer. More detail about the model is described in Section 4.III. Challenges in Developing Chinese E-CommerceChinese E-Markets is undeniably of great potential. E-Markets are not only beneficial for national economy, but also for the global economy, especially since China has entered the World Trade Organization (WTO). However, in terms of developing E-Commerce, there is a gap between China and other developed countries. The primary cause is that the advent of information age has a great impact on the economy of industrialized countrie s, while the social environment and China hasn’t become used to its coming. These can be noticed from various aspects including information infrastructure, barriers of social environment, degree of technologyinnovation, level of awareness, and trustworthiness and so on. Technically, the improvement is obvious, but it’s difficult to catch up in short term for some social problems.(I) Informationization GapCurrent social environment in China is yet to match the rapid informationization. The understanding of the relation and interaction between industrialization and informationization is inadequate. In addition, the importance and urgency of informationization in social and economic development haven’t been fully appreciated. Apart from that, for a long term progress, the awareness and acceptance to informationization are still underway both theoretically and practically.Furthermore, the global information infrastructure are building up, China is not a exception. However, the popularity of informational and electronic facilities in China is still behind the USA, even though 70% of the growth in Internet users occurred in China. That is mainly due to the huge population of China and the imbalanced development of different regions.In terms of the innovation of information technology, China is catching up to the developed countries progressively, although the exploring and utilization of information resources and services are not yet adequate.(II) Social Barriers in E-CommerceIn China, E-Commerce activities are impeded by some social barriers as well. For instance, the law and regulation are not flawless. E-commerce gives a full impetus to social and economic development; in the meantime, it raises some new problems. So we need to address the inadequacy of traditional policy and laws in the new circumstance, and recommend new and effective law and regulation system. E-commerce may cause multi-facet problems, such as legitimacy and authentication of E-currency, E-contract, and E-bill. Taxation is another problem. It includes how to collect business tax and custom; whether new tax and collecting methods are needed for some intangible products (e.g. software, electrical audio and video); how to secure market and prevent monopoly, especially telecommunication monopoly; how to protect privacy and Intellectual Property(IP); how to manage and control export and import of intangible products, and so on.There is a lack of E-Commerce standard. Standardization and legislation is a difficult but important task in developing E-Commerce. For instance, before the E-Signature Standard was invented in China, there was no particular standard to normalize the behaviors on Internet, therefore, it could not setup a standard business environment compatible with international standards, which has a huge impact on integration of individual country and global economy.Another problem associated with E-Commerce is the social credit system and payment system. The present E-Commerce can only be regarded as quasi-E-Commerce. Since the credit system lacks of trust, effective monitoring and payment mechanism. The Internet commodity transaction centers only fulfilled parts of E-Commerce processes, but by no mean to be full processes from pre-purchase to post-purchase. The current distribution system for Chinese E-Commerce is still not satisfied enough. For instance, the delivery of products has yet to be separated frommanufacturing and commercial enterprisers. The incomplete distribution system still responds passively to production and sales departments, where different processing links such as warehousing, transporting and loading functions as independent entities so that the distribution problem has not been solved well at present.In summary, these informationization gaps and social barriers indeed hinder the development of Chinese E-Commerce, but many people consider lack of consumers trust in E-Commerce merchants, technology, social, financial and legal infrastructures of E-Commerce environment as the most concerned issues that affect the development in an individual country, since most traditional cues for assessing trust in physical world are not available on-line.(III)Trust IssueTrust is a catalyst for human cooperation, and it has received considerable attention in the business and social science literature. Lack of trust can result in a waste of time and resources on protecting ourselves against possible harm and thereby clogs up the economy. Consumer’s trust in an E-Retailer can be defined as consumers’willingness to accept vulnerability in an on-line transaction based on their positive expectations in regard with an E-Retailers future behavior. Factors that affect trust in E-Commerce for consumers include security risks, privacy risks, and lack of reliability in E-Commerce processes in general. As pointed by Nielsen, real trust builds through a company’s actual behavior towards its customers over time, and it is seen to be difficult to build and easy to lose. Theoretically, there are three trust-building processes summarized in:1. Knowledge-based trust is described as a form of trust that develops over time as one party learns about intentions, capabilities, and activity experiences. Example can be recommendation, evaluations, and reputations.2. Institutional-based trust relied on the creation of a “trust infrastructure”, of socially recognized third-party intermediaries that certify the trustworthiness of parties in a commercial exchange or actually enforce trustworthy behaviors on the part of one or both partners. Such example is certificate, membership of association.3. Trust transfer happens when one party ascribes trustworthiness to an unfamiliar exchange partner based on that partner’s association with a trusted party.In the ext section, we will describe a computational model, which can be used to facilitate the trust- building process in E-Commerce, particularly for Chinese E-Commerce market.In this paper, we surveyed the E-Commerce activities currently under going in China. We have closely analyzed the gap between the informationization and barriers of Chinese E-Commerce systems. Among the topics of facilitating development of a positive, effective and satisfied E-Commerce system, “trust” is a major issue, which has not received adequate attention in past decades. We have proposed a computational trust model (ERC2G), which can foster a trust relationship between consumers and merchants, and illustrate how to apply the model in a Chinese E-Commerce system. From the case study of EI Computer, we briefly talked about the implementation of E-Commerce systems with the consideration of enhancing trust. However, establishing trust must be a complex process, which involves moreinformation sources, so continuous improving and enhancing the trustworthiness will be the main objective we need to achieve in future work.翻译:提升中国电子商务信用度摘要电子商务在西方国家已经非常流行,并且电子商务系统在这些国家的发展也相对成熟。
电子商务信息安全中英文对照外文翻译文献
电子商务信息安全中英文对照外文翻译文献(文档含英文原文和中文翻译)原文:E-commerce Information Security ProblemsⅠ. IntroductionE-commerce (E-Business) is in open networks, including between enterprises (B2B), business and consumers (B2C) commercial transactions, compared with the traditional business model, e-commerce with efficient, convenient, covered wide range of characteristics and benefits. However, e-commerce open this Internet-based data exchange is great its security vulnerabilities, security is a core e-commerce development constraints and key issues.In this paper, the basic ideas and principles of systems engineering, analyzes the current security threats facing e-commerce, in this based on security technology from the perspective of development trend of e-commerce.Ⅱ. E-commerce modelModern e-commerce technology has focused on the establishment and operation of the network of stores. Network in the department stores and real stores no distinction between structure and function, differences in their function and structure to achieve these methods and the way business operate.Web store from the front view is a special kind of WEB server. WEB site of modern multimedia support and a good interactive feature as the basis for the establishment of this virtual store, so customers can, as in a real supermarket pushing a shopping cart to select goods, and finally in the checkout check out. These online stores also constitute the three pillars of software: catalog, shopping cart and customer checkout. Customers use an electronic currency and transaction must store customers and stores are safe and reliable.Behind the store in the network, enterprises must first have a product storage warehouse and administration; second network to sell products by mail or other delivery channels to customers hands; Third, enterprises should also be responsible for product after-sales service, This service may be through networks, may not. Internet transactions are usually a first Pay the bill and getting goods shopping. For customers, convenience is that the goods purchased will be directly delivered to their home, but hard to feel assured that the goods can not be confirmed until the handsreach into their own hands, what it is.Therefore, the credibility of the store network and service quality is actually the key to the success of e-commerce.Ⅲ.the key to development of electronic commerceE-commerce in the telecommunications network to develop. Therefore, the advanced computer network infrastructure and telecommunications policy easing the development of electronic commerce has become a prerequisite. Currently, telecom services, high prices, limited bandwidth, the service is not timely or not reliable and so the development of e-commerce has become a constraint. Speed up the construction of telecommunications infrastructure, to break the telecommunications market monopoly, introduce competition mechanism to ensure fair competition in the telecommunications business, to promote networking, ensure to provide users with low-cost, high-speed, reliable communications services is a good construction target network environment, but also all of the world common task.E-commerce the most prominent problem is to solve the on-line shopping, trading and clearing of security issues, including the establishment of e-commerce trust between all the main issues, namely the establishment of safety certification system (CA) issues; choose safety standards (such as SET , SSL, PKI, etc.) problems; using encryption and decryption method and encryption strength problems. Establishment of security authentication system which is the key.Online trading and traditional face to face or written transactions in different ways, it is transmitted through the network business information and trade activities. The security of online transactions means:Validity: the validity of the contract to ensure online transactions, to prevent system failure, computer viruses, hacker attacks.Confidentiality: the content of the transaction, both transactions account, the password is not recognized by others and stealing.Integrity: to prevent the formation of unilateral transaction information and modify.Therefore, the e-commerce security system should include: secure and reliable communications network to ensure reliable data transmission integrity, prevent viruses, hackers; electronic signatures and other authentication systems; complete data encryption system and so on.Ⅳ.e-commerce security issues facingAs e-commerce network is the computer-based, it inevitably faces a number of security issues.(1) Information leakPerformance in e-commerce for the leakage of business secrets, including two aspects: the parties are dealing transactions by third parties to steal the contents; transaction to the other party to provide documents used illegal use by third parties.(2) AlteredE-commerce information for business performance in the authenticity and integrity issues. Electronic transaction information in the network transmission process may be others to illegally modify, delete or re-changed, so that information about its authenticity and integrity.(3) IdentificationWithout identification, third-party transactions is likely to fake the identity of parties to a deal breaker, damage the reputation of being counterfeit or stolen by one party to the transaction fake results and so on, for identification, the transaction between the two sides can prevent suspicion situation.(4) Computer virusesComputer virus appeared 10 years, a variety of new virus and its variants rapidly increasing, the emergence of the Internet for the spread of the virus has provided the best medium. Many new viruses directly using the network as its transmission, as well as many viruses spread faster through dried networks, frequently causing billions of dollars in economic losses.(5) HackerWith the spread of a variety of application tools, hackers have been popular, and are not in the past; non-computer expert can not be a hacker. Have kicked Yahoo's mafia boy did not receive any special training, only a few attacks to the users to download software and learn how to use the Internet on a big dry.Ⅴ.e-commerce security and safety factorsEnterprise application security is the most worried about e-commerce, and how to protect the security of e-commerce activities, will remain the core of e-commerce research. As a secure e-commerce system, we must first have a safe, reliable communication network, to ensure that transaction information secure and rapidtransmission; second database server to ensure absolute security against hackers break into networks to steal information. E-commerce security technologies include encryption, authentication technology and e-commerce security protocols, firewall technology.(A), encryption technologyTo ensure the security of data and transactions to prevent fraud, to confirm the true identity of transaction parties, e-commerce to adopt encryption technology, encryption technology is through the use of code or password to protect data security. For encrypted data is called plaintext, specifically through the role of a encryption algorithm, the conversion into cipher text, we will express this change as the cipher text is called encryption, the cipher text by the decryption algorithm to form a clear role in the output of this a process known as decryption. Encryption algorithm known as the key parameters used. The longer the key, the key space is large, traverse the key space the more time spent, the less likely cracked.Encryption technology can be divided into two categories: symmetric encryption and asymmetric encryption. Symmetric encryption to the data encryption standard DES (Data Encryption Standard) algorithm is represented. Asymmetric encryption is usually RSA (Rivets Shamir Aleman) algorithm is represented.(B), authenticationCommonly used security authentication technologies: digital signatures, digital certificates, digital time stamp, CA security authentication technology.(C), hacker protection technologyCurrently, hackers have become the biggest e-commerce security threats, thus preventing hacking network security technology has become the main content, by governments and industry are highly valued. Hacking techniques include buffer overflow attacks, Trojans, port scans, IP fraud, network monitoring, password attacks, and denial of service Dos attacks. At present, people have made many effective anti-hacker technologies, including firewalls, intrusion detection, and network security evaluation techniques.Ⅵ.the future security of e-commerceIncreasingly severe security problems, are growing threat to national and global economic security, governments have been based on efforts in the following areas: (1) Strengthen the legislation, refer to the advanced countries have effective legislation, innovative, e-commerce and improve the protection of the laws againstcyber-crime security system.(2) Establishment of relevant institutions, to take practical measures to combat cyber crime. Development of the law, the implementing agencies should also be used for its relevant laws, which must establish an independent oversight body, such as the executing agency to implement the law.(3) Increase investment in network security technology; improve the level of network security technology. E-commerce security law is the prerequisite and basis for development and secure e-commerce security technology is a means of protection. There are many security issues are technical reasons, it should increase the technology resources, and continuously push forward the development of old technologies and developing new security technology.(4) To encourage enterprises to protect themselves against Internet crime against. To avoid attack, companies can not hold things to chance, must attach great importance to system vulnerabilities, in time to find security holes to install the operating system and server patches, and network security detection equipment should be used regularly scan the network monitoring, develop a set of complete security protection system to enable enterprises to form a system and combined with the comprehensive protection system.(5) To strengthen international cooperation to strengthen global efforts to combat cyber crime. As e-commerce knows no borders, no geographical, it is a completely open area, so the action against cyber crime e-commerce will also be global. This will require Governments to strengthen cooperation, can not have "the saying which goes, regardless of others, cream tile" misconception.(6) To strengthen the network of national safety education, pay attention to the cultivation of outstanding computer.Ⅶ. ConclusionE-commerce in China has developed rapidly in recent years, but the security has not yet established. This has an impact on the development of electronic commerce as a barrier.To this end, we must accelerate the construction of the e-commerce security systems. This will be a comprehensive, systematic project involving the whole society. Specifically, we want legal recognition of electronic communications records of the effectiveness of legal protection for electronic commerce; we should strengthen the research on electronic signatures, to protect e-commerce technology; we need to build e-commerce authentication system as soon as possible, to organize protection for electronic commerce. Moreover, for e-commerce features without borders, we shouldalso strengthen international cooperation, so that e-commerce truly plays its role. Only in this way, we can adapt to the timesPromoting China's economic development; also the only way we can in the economic globalization today, to participate in international competition, and thus gain a competitive advantage.Source: Michael Hecker, Tharam S. Dillon, and Elizabeth Chang IEEE Internet Computing prentice hall publishing, 2002电子商务中的信息安全问题一、引言电子商务(E-Business)是发生在开放网络上的包括企业之间(B2B)、企业和消费者之间(B2C)的商业交易,与传统商务模式相比,电子商务具有高效、便捷、覆盖范围广等特点和优点。
电子商务外文翻译文献
文献信息:文献标题:ELECTRONIC COMMERCE(电子商务)国外作者:Đerić Slavko文献出处:《Economics》,2017,4字数统计:英文2060单词,11447字符;中文3455汉字外文文献:ELECTRONIC COMMERCESUMMARY Electronic commerce can be defined in different ways. Any definition helps to understand and explain that concept as better as possible. Electronic commerce is a set of procedures and technologies that automate the tasks of financial transactions using electronic means. Also, according to some authors, electronic commerce is defined as a new concept, which is being developed and which includes process of buying and selling or exchanging products, services or information via computer networks, including the Internet. Electronic commerce is not limited just to buying and selling, but it also includes all pre-sales and after-sales ongoing activities along the supply chain. Introducing electronic commerce, using the Internet and Web services in business, realizes the way to a completely new type of economy—internet economy.Keywords:electronic commerce, development, purchase, sale, economy, InternetINTRODUCTIONToday, development of modern means of communication, especially electronic, which radically change the existing power relations and the power on the global market, have a significant role in more evident process of globalization. The magnitude of impact of the development of communication and information resources on the world economy may be implied by the fact that it goes into traditional laborintensive activities, where before there were not opportunities for the application of modern information technology.Managers of large companies, as well as small and medium-sized enterprises, need to understand first of all the importance, as well as many advantages that use of modern digital technology enables them in the creation of new business ideas and their realization. In the new digital era the benefits and opportunities of e-business represent a significant potential that should be used in the best and the most efficient way. Thanks to the internet there are some changes in the way of business, geographical boundaries are disappearing, language barriers and currency restrictions are being bowed down.ELECTRONIC COMMERCEToday’s way of doing business is completely changed, mostly thanks to the Internet. E-commerce has a great role in the process of globalization and in the development of modern means of communication, especially electronic, by radically changing the existing power relations and the power on the global market. In modern business there is a transition from mechanical to electronic phase of business. Besides the technological aspect it is necessary to emphasize the economic aspect and define e-commerce as a new market that offers new types of goods and services, such as digital products through digital processes. Sellers of physical goods are also being included in digital processes, such as on-line ordering, market research and payment, which are the parts of the new market.Electronic commerce is the exchange of business information, maintaining business relationships, and conducting business transactions between different organizations via telecommunication networks and is more than a set of Internet technologies.E-commerce can be viewed from the narrower and wider point of view. In the narrow sense electronic commerce involves buying and selling through the Internet, and in a broader sense it includes the exchange of business information, maintaining business relationships, and conducting business transactions by means oftelecommunications networks. In fulfilling tasks it uses electronic communication media such as the Internet, extranets, e-mail, database and mobile telephony. Electronic commerce includes several activities such as electronic sales and purchases of goods and services, online delivery of digital content, electronic funds transfer, public procurement, direct consumer marketing and other after-sales services. The basis of e-business is often called a fully digital business and it contains three components: product, process and participants, which have two components, physical and digital. Everything that can be sent and received via the Internet is considered to be a digital product.Electronic commerce creates new markets and economic activities, which are characterized by rapid information processes and market dynamics. Electronic networks provide the infrastructure for collecting and disseminating information. They also serve as a new channel for the sales, promotion of products and services delivery. Moreover, network integrate information for managing business activities at all levels of the company and provide new electronic connections with customers and partners in the supply chain. An increasing number of activities that add value to the economy take place in cyberspace through globally connected electronic networks. The Internet has expanded the premises to which companies reach. Managers can detect a greater number of business opportunities due to obtaining many additional business information from the Internet.ELECTRONIC MARKETMilicevic (2002) states that the Internetand new information technologies are leading to restructuring of markets on a global level and some industrial and service sectors. As well as on traditional (physical) market, also in electronic market, customers and sellers exchange goods and services for money or other goods or services, but only electronically. Electronic market uses electronic transactions leading to a new way of distribution of products and services to ultimate consumers. Electronic market means a place where electronic commerce is conducted, that is to say a network of interactions and communication where the information, products,services and payments are exchanged. In recent years, electronic market is gaining importance in the modern way of doing business. When it comes to e-business, business center is a network based on the locations where there are customers, sellers and other participants and they all find each other electronically and do business so.MODELS OF ELECTRONIC COMMERCEThere are many models of electronic commerce that vary according to the relations which exist between participants in trade (companies, customers, employees, government). Some of the models are: B2B, B2C, B2E, C2C, C2B, but lately there are also more complex forms that are created as a combination and updating of existing models such as B2B2C and C2B2C.B2B (Business to Business) is the automated exchange of information between different organizations;B2C (Business to Consumer) means the sale of goods and services to end consumers;B2E (Business to Employee) is a model which is also known as Intranet, or the Web site that gives products or information to employees;C2B (Consumer to Business) is a model where the consumer requests a product or service from the seller;C2C (Consumer to Consumer) is a model in which customers sell to each other;B2B2C (Business to Business to Consumer) is a model that is realized using B2B model that supports the company’s operations on the model of B2C;C2B2C (Consumer to Business to Consumer) is a model that connects consumers using on-line company as an intermediary.LEGAL ISSUES SPECIFIC TO ELECTRONIC COMMERCEThe most important legal issues specific to e-commerce are: assigning domain names, tax collection from incomes generated electronically and intellectual property protection. When assigning Internet addresses or domain names, problems arise when several companies that have similar names compete around the domain. The problemis solved in court or before an international arbitration system. Federal, state and local authorities are trying in every way to calculate how to get a share of revenue generated electronically. The problems are particularly prominent in international trade, when the question is where you need to pay a tax for a business license, income tax, value-added tax, the annual income tax and the like, as well as who controls the charge. Protection of software and other intangible creations is difficult to be implemented over the Web, which is why the issues of copyright and protection of intellectual property are subjects of frequent discussions. One solution might be a tax that is unique to the Internet, the so-called “bit tax”. The idea of this tax is based on the fact that each bit that travels through the network represents a subject to taxation at a rate that is unique. It could be collected in telephone exchanges or at the service provider and to be submitted to the competent tax authorities. However, such a tax would not take account of the nature of the information or goods that are purchased. The largest amount of bits on the Internet belongs to the children’s video games which are in most countries, wheree-business is developed, tax-exempt or taxed at the lowest rate. It is also unclear which government would take over the tax that is a result of cross-border data flow. Besides safety problems, the problem of unclear model of taxation of commercial transactions on the Internet certainly inflicts great torments to fiscal experts worldwide.ADV ANTAGES AND DISADV ANTAGES OF ELECTRONIC COMMERCE The main characteristic of e-commerce is a profound and very rapid change in the way trade is conducted. Today, e-commerce has many advantages over traditional conducting commercial transactions. Extensive use of e-commerce leads to new advantages. A set of interactive, content-rich and personalized messages can be delivered tospecifically selected consumers to increase sales. Today companies have a lot more information than before, which allows them to take advantage of this information as efficiently as possible, to segment the market and to adapt their products or services to potential customers or service users as well as possible.The impact of e-commerce is especially expressed in industries engaged in theproduction of computers, software and computer equipment and other elements necessary for realization of e-commerce. E-commerce has enabled companies to choose suppliers all over the world regardless of their geographical location, and to sell and market their products or services anywhere in the global market.Compared to traditional commerce the advantages of Internet commerce are numerous because properties are not necessary, as well as window dressing, sales staff is reduced to a minimum, there is a possibility of selling around the world, instant communication, presentation of interactive multimedia catalog that can provide the information that the customer wants (there is no classic catalog and postal shipping), promotion is much cheaper, it is easier to achieve publicity on the internet, there are more opportunities to adapt to customer needs, and with allthat the customer is enabled easier purchases carried out from an armchair, with no time limit (nonstop) ,without affecting the sales staff in the decision-making and various other benefits. Due to the complexity of the system of electronic trade problems in the sale or purchase over the Internet may occur. Problems refer to the fact that many potential customers still do not have Internet access or do not use it, some do not have fast Internet connection, online purchase involves a lot of confidence, privacy is compromised and there is a problem of the actual existence of stores on the Internet. Internet is a public network that is accessible to everyone, and because of that there is a possibility that someone monitors comunication without authorization and to abuse it later. Because of these reasons, it is necessary to find mechanisms that will ensure the protection of information, information integrity, and their authenticity. Cryptography is the science that deals with methods of maintenance of the confidentiality of information and which has its own features such as encryption, decryption and key. Defining and verifying the identity of the sender is achieved by using digital signatures and certificates. The purpose of the digital signature is authentication of the message content, as well as provision of guarantee of identity of the sender of the message.CONCLUSIONWith the advent of the Internet a lot has changed in terms of business and trade. Once the operating was based on the principle of face-toface, but now with the advent of the Internet participants in trade do not need to know, nor meet and see each other. With the advent of e-commerce there are no more geographical borders, nor language barriers and currency constraints. In modern business there is a transition from mechanical to electronic phase of business, which leads to more rapid penetration of technical progress in trade. It comes to development of electronic stores, which have significant benefits for end consumers, but there are new problems related to payments and the security of transactions carried out in this way. E-commerce and e-business are becoming inevitable everyday. Paper, pencil, stamp and other equipmentare replaced by computer and the Internet, thanks to which it is much easier and better to conduct an increasing number of business transactions. Online purchase and e-commerce are developing very fast, thus opening up new business opportunities, which affects an increase in productivity, reduction of costs and faster capital turnover. E-commerce creates employment opportunities, stimulates economic growth, investment in innovations, new technologies and knowledge, which contributes to the emergence of new operators in the market.中文译文:电子商务摘要电子商务可以用不同的方式进行定义。
跨境电子商务中英文对照外文综合文献
跨境电子商务中英文对照外文综合文献
前言:
跨境电子商务是指进行跨境地区间的电子商务交易活动,涉及如商品销售、支付、物流和退款等环节。
随着全球化进程的加快,跨境电子商务在国际贸易中扮演着越来越重要的角色。
本文对跨境电子商务中的相关问题进行了综合研究,分析和比较了中文和英文文献的内容。
主要内容:
1. 跨境电子商务的发展趋势
- 中文文献:中文文献指出,随着互联网技术的快速发展,跨境电子商务得到了长足发展。
中国作为全球最大的电子商务市场之一,积极推动跨境电子商务的发展,并倡导加强国际合作。
- 英文文献:英文文献指出,全球各国的跨境电子商务规模不断扩大。
亚洲地区的跨境电子商务增长最快,尤其是中国和印度等新兴市场。
越来越多的人开始通过跨境电子商务平台购买商品。
2. 跨境电子商务的挑战
- 中文文献:中文文献强调了跨境电子商务面临的挑战,包括语言和文化差异、支付安全、海关监管等方面。
同时也提出了相应的解决方案,如加强培训、加强合作等。
- 英文文献:英文文献指出,跨境电子商务面临着网络安全、消费者保护和知识产权保护等挑战。
各国政府应加强监管和合作,以确保跨境电子商务的健康发展。
结论:
跨境电子商务作为全球化进程的产物,对国际贸易发挥着重要作用。
中文和英文文献都对跨境电子商务的发展趋势和挑战进行了深入研究。
这些文献提供了宝贵的信息和见解,有助于我们更好地理解跨境电子商务的现状和未来发展方向。
参考文献:
- 中文文献引用
- 英文文献引用。
电子商务外文翻译doc资料
电子商务外文翻译Information Security Problems in E-commerceⅠ. IntroductionE-commerce (E-Business) is in open networks, including between enterprises (B2B), business and consumers (B2C) commercial transactions, compared with the traditional business model, e-commerce with efficient, convenient, covered wide range of characteristics and benefits. However, e-commerce open this Internet-based data exchange is great its security vulnerabilities, security is a core e-commerce development constraints and key issues.In this paper, the basic ideas and principles of systems engineering, analyzes the current security threats facing e-commerce, in this based on security technology from the perspective of development trend of e-commerce.Ⅱ. E-commerce modelModern e-commerce technology has focused on the establishment and operation of the network of stores. Network in the department stores and real stores no distinction between structure and function, differences in their function and structure to achieve these methods and the way business operate.Web store from the front view is a special kind of WEB server. WEB site of modern multimedia support and a good interactive feature as the basis for the establishment of this virtual store, so customers can, as in a real supermarket pushing a shopping cart to select goods, and finally in the checkout check out. These online stores also constitute the three pillars of software: catalog, shopping cart and customer checkout. Customers use an electronic currency and transaction must store customers and stores are safe and reliable.Behind the store in the network, enterprises must first have a product storage warehouse and administration; second network to sell products by mail or other delivery channels to customers hands; Third, enterprises should also be responsible for product after-sales service, This service may be through networks, may not. Internet transactions are usually a first Pay the bill and getting goods shopping. For customers, convenience is that the goods purchased will be directly delivered to their home, but hard to feel assured that the goods can not be confirmed until the hands reach into their own hands, what it is.Therefore, the credibility of the store network and service quality is actually the key to the success of e-commerce.Ⅲ.the key to development of electronic commerceE-commerce in the telecommunications network to develop. Therefore, the advanced computer network infrastructure and telecommunications policy easing the development of electronic commerce has become a prerequisite. Currently, telecom services, high prices, limited bandwidth, the service is not timely or not reliable and so the development of e-commerce has become a constraint. Speed up the construction of telecommunications infrastructure, to break the telecommunications market monopoly, introduce competition mechanism to ensure fair competition in the telecommunications business, to promote networking, ensure to provide users with low-cost, high-speed, reliable communications services is a good construction targetnetwork environment, but also all of the world common task.E-commerce the most prominent problem is to solve the on-line shopping, trading and clearing of security issues, including the establishment of e-commerce trust between all the main issues, namely the establishment of safety certification system (CA) issues; choose safety standards (such as SET , SSL, PKI, etc.) problems; using encryption and decryption method and encryption strength problems. Establishment of security authentication system which is the key.Online trading and traditional face to face or written transactions in different ways, it is transmitted through the network business information and trade activities. The security of online transactions means:Validity: the validity of the contract to ensure online transactions, to prevent system failure, computer viruses, hacker attacks.Confidentiality: the content of the transaction, both transactions account, the password is not recognized by others and stealing.Integrity: to prevent the formation of unilateral transaction information and modify.Therefore, the e-commerce security system should include: secure and reliable communications network to ensure reliable data transmission integrity, prevent viruses, hackers; electronic signatures and other authentication systems; complete data encryption system and so on.Ⅳ.e-commerce security issues facingAs e-commerce network is the computer-based, it inevitably faces a number of security issues.(1) Information leakPerformance in e-commerce for the leakage of business secrets, including two aspects: the parties are dealing transactions by third parties to steal the contents; transaction to the other party to provide documents used illegal use by third parties.(2) AlteredE-commerce information for business performance in the authenticity and integrity issues. Electronic transaction information in the network transmission process may be others to illegally modify, delete or re-changed, so that information about its authenticity and integrity.(3) IdentificationWithout identification, third-party transactions is likely to fake the identity of parties to a deal breaker, damage the reputation of being counterfeit or stolen by one party to the transaction fake results and so on, for identification, the transaction between the two sides can prevent suspicion situation.(4) Computer virusesComputer virus appeared 10 years, a variety of new virus and its variants rapidly increasing, the emergence of the Internet for the spread of the virus has provided the best medium. Many new viruses directly using the network as its transmission, as well as many viruses spread faster through dried networks, frequently causing billions of dollars in economic losses.(5) HackerWith the spread of a variety of application tools, hackers have been popular, and are not in the past; non-computer expert can not be a hacker. Have kicked Yahoo's mafia boy did not receive any special training, only a few attacks to the users to download software and learn how to use the Internet on a big dry.Ⅴ.e-commerce security and safety factorsEnterprise application security is the most worried about e-commerce, and how to protect the security of e-commerce activities, will remain the core of e-commerce research. As a secure e-commerce system, we must first have a safe, reliable communication network, to ensure that transaction information secure and rapid transmission; second database server to ensure absolute security against hackers break into networks to steal information. E-commerce security technologies include encryption, authentication technology and e-commerce security protocols, firewall technology.(A), encryption technologyTo ensure the security of data and transactions to prevent fraud, to confirm the true identity of transaction parties, e-commerce to adopt encryption technology, encryption technology is through the use of code or password to protect data security. For encrypted data is called plaintext, specifically through the role of a encryption algorithm, the conversion into cipher text, we will express this change as the cipher text is called encryption, the cipher text by the decryption algorithm to form a clear role in the output of this a process known as decryption. Encryption algorithm known as the key parameters used. The longer the key, the key space is large, traverse the key space the more time spent, the less likely cracked.Encryption technology can be divided into two categories: symmetric encryption and asymmetric encryption. Symmetric encryption to the data encryption standard DES (Data Encryption Standard) algorithm is represented. Asymmetric encryption is usually RSA (Rivets Shamir Aleman) algorithm is represented.(B), authenticationCommonly used security authentication technologies: digital signatures, digital certificates, digital time stamp, CA security authentication technology.(C), hacker protection technologyCurrently, hackers have become the biggest e-commerce security threats, thus preventing hacking network security technology has become the main content, by governments and industry are highly valued. Hacking techniques include buffer overflow attacks, Trojans, port scans, IP fraud, network monitoring, password attacks, and denial of service Dos attacks. At present, people have made many effective anti-hacker technologies, including firewalls, intrusion detection, and network security evaluation techniques.Ⅵ.the future security of e-commerceIncreasingly severe security problems, are growing threat to national and global economic security, governments have been based on efforts in the following areas:(1) Strengthen the legislation, refer to the advanced countries have effective legislation, innovative, e-commerce and improve the protection of the laws againstcyber-crime security system.(2) Establishment of relevant institutions, to take practical measures to combat cyber crime. Development of the law, the implementing agencies should also be used for its relevant laws, which must establish an independent oversight body, such as the executing agency to implement the law.(3) Increase investment in network security technology; improve the level of network security technology. E-commerce security law is the prerequisite and basis for development and secure e-commerce security technology is a means of protection. There are many security issues are technical reasons, it should increase the technology resources, and continuously push forward the development of old technologies and developing new security technology.(4) To encourage enterprises to protect themselves against Internet crime against. To avoid attack, companies can not hold things to chance, must attach great importance to system vulnerabilities, in time to find security holes to install the operating system and server patches, and network security detection equipment should be used regularly scan the network monitoring, develop a set of complete security protection system to enable enterprises to form a system and combined with the comprehensive protection system.(5) To strengthen international cooperation to strengthen global efforts to combat cyber crime. As e-commerce knows no borders, no geographical, it is a completely open area, so the action against cyber crime e-commerce will also be global. This will require Governments to strengthen cooperation, can not have "the saying which goes, regardless of others, cream tile" misconception.(6) To strengthen the network of national safety education, pay attention to the cultivation of outstanding computer.Ⅶ. ConclusionE-commerce in China has developed rapidly in recent years, but the security has not yet established. This has an impact on the development of electronic commerce as a barrier.To this end, we must accelerate the construction of the e-commerce security systems. This will be a comprehensive, systematic project involving the whole society. Specifically, we want legal recognition of electronic communications records of the effectiveness of legal protection for electronic commerce; we should strengthen the research on electronic signatures, to protect e-commerce technology; we need to build e-commerce authentication system as soon as possible, to organize protection for electronic commerce. Moreover, for e-commerce features without borders, we should also strengthen international cooperation, so that e-commerce truly plays its role. Only in this way, we can adapt to the times Promoting China's economic development; also the only way we can in the economic globalization today, to participate in international competition, and thus gain a competitive advantage.REFERENCES:[1]Grover, V. et al., 2001, E-Commerce and the Information Market, Communications of the ACM, vol. 44, no. 4, April, 79-86.[2]EWT Ngai.Fuzzy decision support system for risk analysis in e-commerce development. 2005[3]DH McKnight.What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology .2001[4]W Wang.Interactive decision aids for consumer decision making in e-commerce: the influence of perceived strategy restrictiveness .2009[5]Lohse, L. G., Spiller, P., 1998, Electronic Shopping, Communications of the ACM, vol. 41, no. 7, July, 81- 88.[6]Lima, R. S. et al, 2000, Evaluating Web sites for an educational environment target for cardiology, The 3rd European Software Measurement Conference –FESMA-AEMES, Madrid, September.。
跨境电子商务中英文对照外文翻译文献
中英文对照外文翻译(文档含英文原文和中文翻译)译文:本地化跨境电子商务的模型摘要通过对国际供应链的B2B电子商务交易量的快速增长和伊朗快速增加的跨境交易业务,跨境电商过程的有效管理对B2B电子商务系统十分重要。
本文对局部模型的结构是基于B2B电子商务的基础设施三大层,消息层、业务流程层和内容层。
由于伊朗的电子商务的要求,每一层的需要适当的标准和合适的方案的选择。
当电子文件需要移动顺利向伊朗,建议文件的标准为文件内容支持纸质和电子文件阅读。
验证提出的模型是通过案例研究方法呈现一到四阶段的情景。
本文试图通过交换商业文件在贸易过程中这一局部模型,实现在全球电子贸易供应链更接近区域单一窗口建设的关键目标。
关键词:电子商务;跨境贸易;电子文档管理;国际供应链1.简介电子商务是关于在互联网或其他网络电子系统购买和销售产品或服务。
术语B2B(企业对企业),描述了企业间的电子商务交易,如制造商和批发商,或批发商和零售商之间。
本文的研究目标是上两个不同国家贸易商之间的通信。
今天的世界贸易组织的主要目标之一是建立区域单一窗口,可以提高世界各地的贸易便利化。
建立区域单一窗口需要跨境海关,可以有效地交换贸易文件。
因此,首先,简化跨境贸易文件的关键在于朝着国家单一窗口移动。
然后,区域单一窗口可以授权国家之间的通信。
电子商务模型是基于三个主要逻辑层的研究。
这三个层消息传输层,业务处理层和内容层。
本文的局部模型是一种能够自动交换读取文件的过程。
通过与东亚和中东国家的建立区域单一窗口可以在将来得到改善的更多的互操作性,从而建立伊朗国家单一窗口在本文的第二部分讨论引进国际供应链中的跨境B2B模式所需的基本概念和标准。
第三部分介绍在大的模型中引入的组件功能和范围。
第四部分讨论了B2B交易层模型的定位,最后结束本文。
2.背景在本节中,除了了解B2B电子商务在伊朗的情况,还有参考模型的背景等概念以及讨论B2B电子商务跨境模式的本土化。
电子商务简介外文翻译文献
电子商务简介外文翻译文献(文档含英文原文和中文翻译)原文:Electronic commerceElectronic commerce, or the electronics trade, or the electronic business is regarded as a new kind of rising business model which will bring about profound influence on social economy. And it can be said as the important function in the social development of the world-wide locations. It represents the current of the world trade in late of 21 centuries.1). What is the electronic commerce?Electronic commerce point is through the teleportation method to carry on the business data's exchange with the numerical form and on-line business ually, electronic commerce can be divided into dichotomouslayers:The first is a low level electronic commerce, namely electronic business intelligence report, the electronic bargain and electronics contract.The second one is a high electronic commerce, including all kinds of business activities which ask for helping Internet's be engaged ins, from searching the customer, the business negotiation, order, on-line payment,the electronics invoice, going to the electronics to pay customs duties, the electronics pay tax, all of these are engaged in the Internet.The electronic commerce means that all trades with the realization electronical.It has the following characteristics:①Fair freedom, the ②is efficiently, globalization of ③ , the conjecture of ④ turn, interaction of ⑤ , ⑥independence, ⑦ humanization service.Making use of the electronic commerce, customer and provider can contact in the global scope mutually closely and conveniently. As a result the customers can find out their satisfy demanding ideals to provide the goods to the company from each corner in the world. The electronic commerce will change the environment that the business enterprise competes mutually, lower under the residing in the market structure of tradition is high not of cost. trade the cost low and easy to entered person's market and governments to encourage to use Internet( tax-free) to activate the electronic commerce, push its start 伊to start to develop then and quickly. Predict according to the expert, to 2000, the whole world electronic commerce will attain the scale of USD 300,000,000,000.But it has already exceeded this scale. For insuring the safety of the electronic commerce, should build up theelectronics certificate center. The numerical ID card uses to the definite evidence body.The numerical ID card issues to entrust to the third square, namely an authorization machineThe organ carry out, it includes the holder to identify the information( name, address, the contact method, the ID card serial number), both parties pooling key of secret , term of validity, password and the authorization organizations to identify information etc..Make use of the numerical ID card, trade the both parties and can insure to identify another one square's body, and definite evidence another the information that a square send out has not yet to change. 2). the influence that the electronic commerce may produce Compared with the traditional business, the electronic commerce has the following advantage:* Overlay the scope wide:A network system that combines Internet, intranet( the area net of the bureau of the business enterprise inner part) and extranet( the business enterprise exterior network)s make buyer, selling party, manufactory and it cooperate colleague can in the world of scope contact and deliver the business intelligence report and documents expediently mutually.* The function is well-found: In the electronic commerce, different from the customer of different layer can carry out bargain target of different category, for example, release the business intelligence report, on-line negotiation, the electronics payment and build up virtual market and on-line bank etc.s.* Usage the convenience is vivid: According to Internet, the electronic commerce is free from the restrict that the specialized data exchanges theagreement.Can use personal calculator of any type, at in the world any location, carry on the bargain expediently on the calculator screen.* The cost is low:Make use of the electronic commerce, the expenditure that can cut down to used for expenses and international trips that employs the employee, the maintenance warehouse and shop front and mail consumedly. The expenses that uses Internet is very low.The electronic commerce will bring about important influence on social economy:* The electronic commerce will change the people the behavior method that adopt habitually in the business activity. Pass the network, the people can enter the virtual store of person, browsing every where, choose their interested in thing, and enjoy various on-line service. On the other hand, company's house can pass the network and the consumer contacts, deciding to purchase the product( category and quantity) to combine the close book.The government organ can carry on the electronics invitation to bid and government purchases through a network.* The core of the electronic commerce is a person.It is a social system.The on-line store changed the people's daily life method, full body now the consumer is in independent power in the bargain.* The electronic commerce change business enterprise produces the way of the product.Pass the network, the manufactory direct understanding market need, and arrange the production according to the demand of the consumer.* The electronic commerce raised the trade efficiency biggest, can remove in the center link;The biggest limit lowers the sale cost.Produce the arrangement can carry out" the small batch quantity adds the species diverse", but" zero stocks"s become realistic.* The electronic commerce calls the bank service reform.Be like the on-line bank, on-line cash card and credit card, on-line close book, electronics invoice, the electronics" cash"s- hour of the consumer purchase any further need not actual cash- these new the concept will become realistic.* The electronic commerce will change the government behavior.So-called" on-line government", an on-line administration management organization is exertive the important function of the social outlet, keep order and fair, fish for and smash on-line cheat.3). the present condition of the flourishing and national electronic commerce90's in 20 centuries middle, Internet experiences the development of explode the type, the tiny machine enters ten thousand of person's thousand, the calculator network has already become people's daily life in the necessary part.People the in hopes of calculator network brings more advantages and convenience.The electronic commerce emerge with the tide of the times.At flourishing nation, actual applied policy of the government well timed establishment push electronic commerce, occupy the predominant position in newly a competition of scope of world.The electronic commerce of the United States controls the trade ofworld.Currently, there are 60,000,000 customers of Internet in the United States.98% buys the manager above on-line look for the target.According to the estimate of, to 2002, of the American business enterprise pass the value that the electronic commerce completes the trading post to involve and will have 6.1% an of GDP 《wealth 》the covariance enunciation of the magazine,500 strong companies in world all open the on-line business of exhibition.The IBM accepts the person's 25%( about USD 20,000,000,000) to have something to do with electronic commerce.Had the electronic commerce luckily, make the IBM save the expenditure of USD 250,000,000 in 1999.4). the development of the Chinese electronic commerceThe development of the Chinese government and civil electronic commerce begins from 1993.Today, the electronic commerce has already been apply in foreign trade, maritime customs, finance and business realm.Peking and Shanghai has already built up the native electronic commerce frame.Some electronic commerce Web addresses have already openned to the on-line shopping and on-line close book.Though do all these effort, China open the company of the exhibition electronic commerce to suffer the loss in one business of C( the B department points the business, C the department points the consumer) of one to of its Bosomed Chinese experts love this shopping habit that attributes to the Chinese- Chinese consumer the amateur that the shopping sees as a kind of interesting; They enjoy to pass to enjoy and compare the merchandise and haggle to the expensive fun; But all these will start disappear from the on-line shopping.Other experts can't practice the business this phenomenon attributes to the society in the widespread and existent doubt attitude 11 banks with each other because of frightened its rival pulls to walk customer; The bank has to pull to the walk customer; The cash card can't make widely available because the bank does not believe the common people; But the common people do not like the on-line shopping etc. Because of the belief of the on-line store.Why?The reason lies in on-line and society in many affairs that are all deceitful, for example the deceitful customer quantity, deceitful interview flowing the covariance, counterfeits the merchandise, forges the diploma, forges the resume, deceitful investment, deceitful rank, appears on market the business enterprise deceitful accept person etc..Thus a comprehensive environment will not change in very long time recently.In such environment, it can't be engaged in any business activity.So many operators of IT's electronic commerce of our nations lost the confidence.5). the electronic commerce outlookThough the development is quick and seems to have the bright future. The electronic commerce faces a series of actual problems, for example, involving safety, technique, expenses, law system, revenue from tax system, idea, privacy protection, infrastructure etc. problems.However, the electronic commerce has the main current of the new business enterprise of century, and will develop quickly in several years of after time.Some company estimates, until to 2003, the electronic commerce between the developed countries of business enterprises which will have 9% of the business total amount(13, USD 0)above.But in all aspects the online consumes of the electronic commerce ,untilto 2002, the sales amount will attain USD 76,300,000,000.But positive such as the expert's estimate, the electronic commerce of China will catch up within 10 years in the developed countries.They put forward spending 3 to 5 years to draw up developing the electronic commerce. That of plan, policy and regulation, construct huge and solid true at of electronic commerce system, will encourage the specialized talented person, excellent turn the electronic commerce system of some professions and region; Then with 5 to 7 years ,international electronic commerce’s, making our electronic commerce system become the importance of the international electronic commerce to constitute the part; Making widely available the electronic commerce application, we promote the electronic commerce of the our country to the higher level in the aspects of the study, develops and apply, attains average level of the flourishing nation.电子商务电子商务,或者电子贸易,或者电子商业作为一种新兴的商业模式,将对社会经济产生深远的影响,并且在世界各地的社会发展中发挥重要作用。
电子商务论文中英文文献电子商务论文参考文献
电子商务论文中英文文献电子商务论文参考文献电子商务论文参考文献:一、中文文献:[1] 朱鹏飞. 电子商务中供应链管理的问题与对策[J]. 经济经纬,2015(4): 34-38.[2] 李晓荣, 李明. 电子商务在我国经济发展中的作用研究[J]. 科技导报, 2017, 35(6): 98-102.[3] 王志强, 高敬德, 田丰. 电子商务发展对物流业的影响及对策[J].物流技术, 2019, 38(2): 45-50.[4] 张红, 刘晓刚. 电子商务对传统商业模式的影响分析[J]. 经济改革与发展, 2016(5): 56-61.[5] 刘洪理. 移动互联网环境下的电子商务创新模式探讨[D]. 中国人民大学硕士学位论文, 2020.[6] 马云. 电子商务的发展趋势与趋势分析[J]. 中国电子商务, 2018(8): 16-20.二、英文文献:[7] Turban E, Lee J K, King D, et al. Electronic commerce: A managerial and social networks perspective[M]. Springer, 2015.[8] Song J, Duan Y. Social commerce research: An integrated view[J]. Information & Management, 2019, 56(3): 1-14.[9] Yang Z, Cai S, Zhou Z. Development and validation of an instrument to measure user perceived service quality of information presenting web portals[J]. Information & Management, 2005, 42(4): 575-589.[10] Cho Y, Lee H. The impact of post-purchase regrets on online impulse buying[J]. Journal of Business Research, 2018, 82: 127-136.[11] Chen Y H, Barnes S, Scornavacca E. The role of e-commerce in higher education: Case study of online resource sharing and learning[J]. Journal of Organizational Computing and Electronic Commerce, 2013, 23(1-2): 64-87.[12] Lee S M, Lee D H. The effect of product involvement, knowledge, and satisfaction on purchase-decision involvement toward electronic word-of-mouth on social networking service[J]. Journal of Business Research, 2019, 98: 54-64.以上是关于电子商务论文参考文献的示例。
电子商务网络安全毕业设计英文原文及翻译-论文[管理资料]
电子商务网络安全毕业设计英文原文及翻译-论文电子商务网络安全毕业设计英文原文及翻译|计算机专业全套免费毕业设计论文网|任务书|本科毕业设计课题目作品下载附录A---英文原文Web Security Privacy & CommerceThe running battle between hackers and network security professionals has moved beyond the perimeter firewall to hand-to-hand combat at individual Web and corporate servers.And new security weapons have emerged that use ingenious methods to protect Web sites and corporate networks from external and internal security threats.Here are some of the latest tools at your disposal.No exitGillian G-Server doesn’t care how the hacker got in or what changes they may have made to your Web site.Gillian Exit Control technology prevents the world from seeing the consequences of a security breach.Gillian G-Server sits between the Web server and the router or firewall that connects the Web server to the Internet, inspecting every piece of content that goes out. The Exit Control G-Server contains a collection of digital signatures made from authorized Web content during the publication process.Each time the site content producers publish a new or revised object,the G-Server saves a digital backup of the object along with a digital signature.Signatures that don match send up a red flag which triggers the G-Server to immediately replace a bogus page with a secure archived copy of the original,while simultaneously alerting appropriate personnel.Tripwire,Inc. Tripwire for Servers is a similar data and network integrity product.However,Tripwire for Servers takes a different approach ——its software is loaded onto the server that you want to protect.It monitors all file changes,whether they originate from inside or outside the company,and reports back if a change violates predetermined policies.Honeypots or decoysHoneypots are designed to lure and contain an intruder on the network.Honeypots are decoy devices that can divert attacks from production systems and let security administrators study or understand what happening on the network.ManTrap,from Recourse,is a powerful honeypot that deployed next to data servers,if it being used to deflect internal attacks,and located off the firewall in the demilitarized zone (DMZ) if it being used against external threats.The majority of users deploy it internally to get suspicious activity under control.In that scenario,a ManTrap server would be set up to look like a file server that stores intellectual property or business plans.A successful deployment of ManTrap depends on a variety of factors including quality,naming scheme,placement and security policy.For example,deceptive defenses are most effective when deployed in quantities equal to or greater than that of the production system.Honeypots can get expensive which is why companies must pick and choose the critical servers they want to protect.What attracts an attacker to ManTrap is configuring it to make it look more vulnerable than other servers.Once the hacker is on the decoy server,security managers can log the hacker activity and gain insight into what the intruder is trying to accomplish. Fall into the gapAir gap technology provides a physical gap between trusted and untrusted networks, creating an isolated path for moving files between an external server and a company internal network and systems. Vendors include RVT Technologies, Spearhead Technology and Whale Communications.Whale e-Gap Web Shuttle is a nonprogrammable device that switches a memory bank between two computer hosts. The e-Gap Web Shuttle creates an air gap between the Internet and a company back-office systems. Companies might use e-Gap Web Shuttle between an external service running e-commerce applications, such as online banking, and internal databases that might be queried by external users.The e-Gap system consists of the e-Gap appliance that is attached to two PC hosts, one internal and one external. The internal host connects to the company internal network and the external host sits in the DMZ in front of the firewall.All URLs to Web pages are directed to a mock location on the external host. Pages do not actually reside on this host. The external host strips off the protocol headers, extracts only the content of the Secure Sockets Layer (SSL) traffic and passes it to the e-Gap Web Shuttle. The e-Gap Web Shuttle transports the encrypted data to the internal host using a toggling e-disk. The e-Gap internal host decrypts SSL traffic, authenticates the user and filters the URL content. It then passes the URL request to the company production Web server that resides on the back-office network.The fix is inSecurity and vulnerability assessment tools, designed to be used in-house, can detect weaknesses in an organization systems before problems occur and can fix those problems.Retina , from eEye, scans, monitors, alerts and automatically fixes network security vulnerabilities. The product works on Windows NT SP3 or higher and Windows 2000.The software is installed on any machine within the network. The network administrator types in a range of IP addresses to scan and pushes a button. The product scans the network for vulnerabilities, software flaws and policy problems and reports any vulnerabilities.The product “fix it” feature provides network administrator with a description of any found vulnerabilities, information on how to fix it, or access to a fix it button that can repair the vulnerability locally or remotely.Demolishing DoS attacksPerhaps one of the newest categories of security is products that target denial-of-service (DoS) attacks and more. By definition, DoS attacks make computer systems inaccessible by exploiting software bugs or overloading servers or networks so that legitimate users can no longer access those resources. The product category is so new that some products are still in beta test or on the cusp of entering the marketplace. Going after one of the most malicious types of computer vandalism, the DoS attack, are Arbor Networks, of Waltham, Mass.; Mazu Networks, of Cambridge, Mass.; and Asta Networks in Seattle.Mazu’s solution to distributed DoS attacks works via intelligent traffic analysis and filtering across the network. A monitoring device, such as a packet sniffer or packet analyzer, evaluates packets on the network at speeds up to 1G bit/sec. A monitoring device then determines which traffic needs to be filtered out.The good, the bad and the uglyThe good news about all of these new security techniques is that they theoretically offer companies additional layers of security protection, providing better overall security. What this ultimately means to businesses is that additional security mechanisms can succeed where others have failed. Another plus about some of the new products is that they are optimized for a particular application, such as integrity of the Web servers.However, as with any technology, there are pros and cons to consider. In fact, there are some downsides to implementing these new security products. For example: They are all incremental solutions, not replacements.They require a certain amount of expertise.Many vendors are start-ups and there a risk as to how long theyl be around.There a concern, in many IT shops, about adding preventive controls because of associated overhead——a concern that can be easily remedied by investing in additional horsepower.What too much? When does a company run the risk because of having too many products to manage?The bottom line is that security is never a done deal. It a continuing process that a new crop of innovative vendors are making more interesting.Benevolent WormsAlthough the prospect of using virus technology to simplify the task of delivering patches and software updates is tempting, the dangers can outweigh the benefits when the process is too automated. For example, the improved Windows Update feature in Windows XP now allows patches and updates to be downloaded automatically,altho ugh installation is still at the user’s discretion.Trojan horses, worms, and other malicious code forms have proven to be incredibly successful at paralyzing e-mail systems and Internet providers. It is therefore only logical to conceive of ways to use them for productive purposes, much as the Bible exhorts its readers to beat their swords into plowshares and their spears into pruning hooks.Granted, it would be wonderful if IT administrators could distribute patches and software updates to desktops and servers as quickly as an e-mail virus can spread from one machine to the next. But is such a magic wand really a good idea?Well, maybe not exactly. After all, unlike the human immune system, which produces defenses, or antibodies, automatically, the computer must wait for a human to analyze samples of a computer virus, prepare antidotes and vaccines for that specific situation, and only then apply the cure.This observation alone would seem to discredit the idea of a “digital immune system” that the sec urity community has tossed around during the past few years, but there’s an even more important point to consider. Similar to the way that autoimmune diseases turn the body’ s own defenses against itself, so could one turn a viruslike software delivery system against its own computers. Although it would be difficult to monkey with the digital certificates that would conceivably be used to identify trusted patches, it’s not impossible to subvert the certificate issuing system, as Microsoft and VeriSign found to their dismay last March.Ultimately, a viruslike software delivery system would require software publishers to deliberately put a back door into their systems, and few customers will tolerate that practice, even under shrinkwrap licensing terms. Becau se there’s no guarantee thatsuch a tempting target wouldn’t be exploited by hackers, any IT manager deploying such a system would be foolhardy in the extreme.Virus behavior that standpoint go to see from the operate system, is some normal behaviors, and say for the operate system that don't break the law , therefore at kill the virus software to check to kill the virus, usually meeting because operate system of obstruction-" the document was take upped by system and can't change the code at system "," virus the inside to circulate" etc. reason, but can't clean the virus , we at kill the virus of time also want to speak to investigate some techniques, and go to the round over the operate system's obstruction, from success of virus is from the system Speak here of kill the virus method is:Kill the virus with the tool under the safe mode to kill the virus under the pure DOS mode.Why want the pure DOS mode to down kill the virus?Because the virus procedure is under the operate system explain the mode to circulate o, such as:Script virus" new and happiness time", virus etc., they can't circulate in the inside memory, and system also argue all legal procedures but as to it's take in to protect, and guarantee it continue to circulate, prohibition against in the movement procedure right proceed modification, this result ined virus can't quilt the clearance's result for aegis for having under the pure DOS mode, connecting the Windows operate system all don't can quilt circulating, virus more impossible movement, for this reason this hour as to it's checking killing, round over system, attaining cleanly killing the virus.The usage special tool under the safe mode to kill the virusThe each of Windows operate system for edition all contain a safe mode to circulate the way, and here circulate the way bottom can only circulate the most basic procedure, again this mode bottom, you can cancel all of from start the item,avoid the virus's special tool is small and very shrewd, and use it can under the safe mode normal weakness is a result for can aim atting the popular virus of some comparisons, can't attaining completely killing the virus.For attain to kill the clean virus result, we can synthesize to use these two kinds of methods.Kill the virus not equal to defend the virus, and hard work should be protected . Privacy-Protecting techniquesIn this chapter, we will look at some proven techniques to protect your privacy when you use the Internet. Most of these techniques are simple, commonsense rules that you can put into effect immediately-choosing a good service provider, using good password, cleaning up after yourself online, avoiding Spam and junk email, and protecting yourself from identity theft.Choosing a good service providerThe first and most important technique for protecting your privacy is to pick service providers who respect your privacy.Here are some things to consider when you choose an ISP:. Unless you take special measures to obscure the content and destinations of your Internet usage, your ISP can monitor every single web page that you visit, every email message that you send, every email message that you receive, and many others about your Internet usage.. If you have a dialup ISP ,your ISP can also infer when you are at home ,when you go on vacation, and other aspects of your schedule.. If you check your email from work ,your ISP can learn where you work.. Many ISPs routinely monitor the actions of their subscribers for the purposes of testing equipment, learning about their user population, or collecting per-user demographics.. Some ISPs will monitor the web sites that you visit and sell this information for the purpose of increasing their revenue. In some cases, the ISPs clearly state this policy and, in fact ,use the sale of the data as a way of subsidizing the cost of Internet access .Other ISPs silently engage in this practice.. Equipment is now on the market that allows ISPs to monitor the advertisements that are downloaded to your computer and ,in some case, replace the advertisements with different ones. This equipment is also capable of generating detailed user-level statistics.. Some ISPs have strict policies regarding which employees have access to user data and how that data must be protected .Other ISPs have no policies at all.. Many policies that are in use basically say “we can monitor anything that we want.”However,not all ISPs that have these policies actually monitor their users. Picking a Great PasswordPasswords are the simplest from of authentication. Passwords are a secret that you share with the you log in, you type your password to prove to the computer that you are who you claim to be. The computer ensures that the password you type matches the account that you have specified. If they match, you allowed to proceed.Using good passwords for your Internet service is a first line of defense for your privacy. If you pick a password that is easy to guess, then somebody who is targeting you will find it easier to gain access to your personal information. If you use the same password on a variety of different services ,then a person who is able to discover the password for one of your services will be able to access other services.Good Passwords: locked DoorsGood passwords are passwords that are difficult to guess. The best passwords are difficult to guess because they:-Have both uppercase and lowercase letters-Have digits and/or punctuation characters as well as letters-May include some control characters and /of spaces-Are easy to remember, so they do not have to be written down-Are at least seven of eight characters long-Can be typed quickly ,so somebody cannot determine what you type by watching over your shoulderIt is easy to pick a good password. Here are some suggestions:.Take two short words and combine them with a special character or a number, like robot4my or eye-con..Put together an acronym that is special to you, like Notfsw(None of this fancy stuff works),auPEGC(All Unix programmers eat green cheese),orTtl*Hiww(Twinkle,twinkle,little star. How I w onder what…).Cleaning Up After YourselfWhen you use the Internet, you leave traces of the web sites that you visit and the information that you see on your computer. Another person can learn a lot about the web sites that you have visited by examining your computer for these electronic footprints. This process of computer examination is called computer forensics, and it has become a hot area of research in recent years. Special-purpose programs can also examine your computer and either prepare a report, or transmit the report over the Internet to someone else.Although it can be very hard to remove all traces of a web site that you have seen or an email message that you have downloaded, you can do a good job of cleaning up your computer with only a small amount of work. There are also a growing number of programs that can automatically clean up your computer at regular intervals as we will see in the next chapter.Avoiding Spam and Junk EmailUnwanted electronic mail is the number one consumer complaint on the Internet today. A 1999 study by BrightMail,a company that develops antispam technology, found that 84 percent of Internet users had received Spam;42 percent loathed the time it takes to handle Spam;30 percent found it to be a “significant invasion of privacy;”15 percent found it offensive; and ISPs suffered account churn rates as high as percent as a direct result of Spam.Protect Your Email AddressTo send you junk mail, a spammer must have your email address. By understanding how spammers get email addresses, you can keep your mailbox relatively Spam-free: Do not put your email address on your home page, Take your name out of online directories, Do not post to public mailing lists, Do not post to Usenet, Pick an unusual username.附录B---中文翻译网络上的个人和商业安全原文见于,请对照参考。
电子商务的安全The security of EB中英对译
The security of EBSomething worried in EB application At the same time that internet brings people endless convenience and opportunities ,it also brings risks to them .since EB is conducted on internet or WWW, and internet and web are such open systems ,so when data must be electronically processed, transmitted and stored in some mode some risks occurred .the risks associated with… internet and EB applications may occur in many instances different ways ,for example ,data may be stolen ,corrupted ,misused altered or falsely generated ,compute system or website may be attacked and make render systems unable to operate properly ,hardware or the users ,or they may lose money or their businesses come to ruin .Let‘s look at the Figure about perpetration made by outside intruders as reported in a l996 survey for fortune 1000 firms in America:Activity performed by outside intrudersProbing /scanning of system 14.6%Compromised e-mail /documents 12.6%Introduced virus 10.6%Compromised trade secrets 9.8%Download data 8.1%Mainpulated data integrity 6.8%Installed a sniffer 6.6%Denied use of services 6.3%Trojan logons 5.8%Stole password files 5.6%IP spoofing 4.8%Harassed personal 4.5%Other (specified) 3.0%Publicized intrusion 0.5%Stole /diverted money 0.3%Form the figure you can see that the cost of damages or lost brought by Internet attackers are very serious, more important thing is, these attacking may heavily influence your business, even ruin your business.Why are so many unhappy things happened? There are two reasons .One reasons is that Internet is a new generation itself .it is developing very fast.Its attractive perspective ,multifunctional service and exponential growth rate of web sites opened on it attract more and more companies and private users to join in just like to join a gold rush .But in many aspects ,such as the information technologies ,the protocols ,the languages ,the standards ,polices and laws ,which are the premise of Internet operations ,are far From integrity .John .R .Patruck the vice president of the IBM ,Internet technologist ,described the growing information superhighway as a real highway under construction .He said :‖all the lanes have not yet been paved ,there are a few exit ramps that do not go anywhere ,and you wille ncounter occasional accidents ―.The other reason is that people are so eager to join Internet and EB applications that they haven‘t enough time to fully think over the details that may involve in , so they can‘t be ready at any time to deal the Internet p erpetrators a head-on blows , for they haven‘t enough knowledge and experiences about the risks they may encounter ,even they don‘t know how to detect the attempts of these perpetrators ,so ,they haven‘t an adequate control over these perpetrations .The heavy lessons of Internet perpetration draw people‘s attention to improving the situation of Internet and EB security, for they expect to conduct their electronic business in a secure circumstance. Generally, the basic requirement for EB security can be conclude like this:1. To secure the privacy of electronic transactionThis means all the electronic data are protected from unauthorized disclosure .there are many kinds of transaction data .The first category of them is public data ,such as advertisements and product lists ,this kind of data can be ready by any person ,but should be properly protected from being unauthorized disturbed or altered .The second category is copyright data that are not secret ,but can only be read or used after the fee is paid . In order to make profit from copyright data, the security control must be stressed. The third category is secret data ,these data‘s names are not secret ,but the contents are secret ,such as consumer a counts or personal files .The last category is confidential data .the existence and contents of this kind of data are all secret .Nobody should know the existence and content of the data except the authorized persons .The assessing and intend to asses to these confidential data should be monitored strictly and recorded in time manner .so ,we should take different methods to secure different kinds of data .The another meaning of privacy is that the electronic transactions and their contents should and could not be known by any person except the trading partners, currently ,the security techniques. used for secure the privacy are encryption ,firewall and passwords .2. To secure the integrity of electronic transactions.This means to secure and verify the data elements and its contents captured in an electronic transaction base on the agreed elements , and maintain the integrity of the data elements in processing and storage procedures and do not be altered in any unauthorized fashion . But when a message is sent electronically, how can the receiver ensure that the message received is exactly the same as the message transmitted by the sender, an effective means called "hashing" can be used to ensure message integrity. A hash of the message is computed using an algorithm and the message contents the hash value is sent along with the message , when message is received ,another hash is calculated by the receiver using the same hashing algorithm .The two hash values are compared and a match can indicate that the message received is the same as the sent one .Hashing is similar to the use of check-sum digits in accounting .Hashing is not encryption ,but it can be used in conjunction with encryption for adding security.3. Security assurance systems.when the user receives the message sent electronically by a sender ,both theuser and sender ‗s identity need to be conformed in order to verify whether the sender or receiver is he /she claims to be .generally ,their identities could be proved through checking their passwords ,digital signatures or digital certificates issued by the authorized third party .another thing need to assure is whether the transaction exists ,which is called ―Non –repudiation ‖. This means to ensure that the sender cannot falsely deny sending and the receiver cannot falsely deny receiving that message .The security techniques used for proofing of origin ,receipt and contents are time stamps ,digital signatures ,bidirectional hashing and confirmation services .In conclusion ,the EB security requirement is that the content and privacy of electronic transaction must be protected from being intercepted ,abused ,altered ,deleted or disturbed during the electronic data interchange processing ,transmitting and storing .An estimated data shows that the information security breaches are rising .Who are th ose Internet perpetrators ?The America President ‗s commission on critical infrastructure protection , which was established by former president Clinton in July 1996,is charged with ―recommending a national strategy for protecting and assuring critical infrastructures from physical and cyber threats.‖The commission defines a threat as :‖Anyone with the capability ,technology ,opportunity and intent to do harm .Potential threats can be foreign or domestic , internal or external ,state –sponsored or a single rogue element ,terrorists ,insiders ,disgruntled employees ,and hackers are all included in this profile .‖These breaches are really a threat against Internet users .So many businesses and customers slow down the pace of adopting EB applications in all directions, and even some new or potential Internet users are reluctant to begin with any EB applications unless they are ensured that their Internet and Web –based transactions are safe secure and backed up by appropriate controls.Generally speaking, the complete Internet security system should include controls in these following aspects, and every one of them could be indispensable: To employ the technology for detecting and resisting the Internet perpetration such as fire –walls and cryptography and authentication techniques and other new inventions in this field.To set up the risks control policies and supervisory methods for security system management, such as, who is in charge of maintaining and managing of security system? How do they conduct their routine works and how to evaluate their working results?To establish the relevant laws, policies and regulations by every country, government, professional institution and agency to restrain and punish those Internet perpetrations.Besides, another factor should also be taken into consideration ,that is ,although detecting and resisting all those known attacks is an important step in protecting a firm ‗s assets and critical data ,the companies must evaluate the cost for doing that and the benefit got from doing that before they take action.FirewallWhat is the firewall? Actually, firewall is a special world always used in construction field .It is a kind of walls that is made of fire-resistant material and built between buildings .When a fire breaks out on neighborhood building; it can retard the spread of the fire to other locations.But the firewall used in Internet that provides similar controls is not a real wall .It is a component system of the computer hardware and software, which is used as the protection system of a certain network to prevent unauthorized users from accessing those networks.A typical firewall always be ―built ‖ on the gateway point ,where is the accessing point between Intranet and Internet ,or the accessing point between a database (subnet inside the Internet )and Intranet .It controls the information services provided by the certain subnet or database .For example ,some confidential databases can only be visited by the users who is specially authorized to do so .Of course , if the Intranet or host computer is totally isolated from network ,the firewall will be no use .But in many instances circumstances ,it is impossible for a company involved in electronic business to totally isolated their Intranet from Internet ,and we know there are a lot of physical and cyber threats to be faced by Internet connected companies .At this time ,firewall means a lot to them ,that is ,firewall plays an important role in controlling ,monitoring the connections between the private network of a company and Internet (or extranet ),and safeguarding the security and integrity of the documents of a certain company .It can let the inside authorized users use both inside or outside information service ,while unauthorized outside users identified by its security policies are refused to access in the network .There are many kinds of firewalls , such as ―Simple traffic recording ‖, ―IP packets filter gateway (or IP packets examine router ) ‖and the ―proxy application gateway ‖.Each provides different level of security checking .Which is the best ?It is hard to say ,because it depends on what kind of files (database ) you want to protect and what kind of protect you want the firewall to provide ,since we know that there are four kinds of documents: public used , copyrighted ,secret and confidential .So ,the users must think over all above factors and choose the most adequate firewall based on cost-effective rules ,because the more the powerful safeguard the firewall provides ,the higher investment and maintain expenses for the firewall the company will afford .Among all the firewalls , ―Simple traffic recording system ‖ is the simple one .It is a kind of recording device that can keep all the records of passing through traffic in a database or document for aud iting purpose .It has a database called ―audit log file ‖,on which listed chronologically all the visiting records of every file of a certain subnet ,including the name of visited files ,the user‘s address ,the visiting time and times ,and the amount of da ta transferred (downloaded ) .Actually ,it can‘t play a safeguard role ,but only a recorder ,it is often used for monitoring the using of public used data ,such as advertisement or products list on a website ,to provide the information about clients or consumers behaviors for decision makers .The rest kinds of firewalls are all structured on the base of packets filteringtechniques , the packets are small subsets of data that travel through networks ,each with the source address ,destination address ,protocol used ,and part of the e-mail texts .This kind of firewall has two functions :chokes and gates .When the packets sent to the firewall ,the firewall chokes the data flow and examines them based on security rules that the firewall administrator designed and stored in the software of firewall to decide whether or not the packets should pass through .If it could pass ,the gate will act as a typical gateway to provide external connection .The level at which packets can be examined varies by the types of firewalls .There are two types of rules used for examining the data traffic: one is called ―default permit ‖ ,which allows all traffic except that explicitly blocked by firewall administrators ;the other is called ―default deny ‖,which denies all traffic excep t that explicitly allowed by the firewall administrator .Generally speaking ,the latter is better ,for it doesn‘t need to update it‘s checking list often ,because it only let the preauthorized users to access in and turn down all the unauthorized accessing ,no matter what kind of intruders they are ,known or unknown .The packets filter gate (or packets examine router) is a more common used firewall .It is a kind of router used for packet filtering .It can compare the source address, destination address and protocol that inbound or outbound packets used with pre-set control list, and block the unwanted flows, allow the expected traffic passing through .But packet-filtering routers can only limit traffic on the transport level protocol and do nothing more than.Another kind of firewalls is called ―proxy application gateway ‖, which employs the proxy service software ,which not only provides traffic filtering at IP and Transport levels ,but also provides applications level protocol checking at application level .This kind of firewalls acts as a proxy for both side users and also can support many kinds of web browser software .A proxy means to take the place of other‘s and do some thing in other‘s name ,for example ,if an outside user uses FTP to make a connect with an inside host computer ,the Proxy Application Gate will accept the FTP request and then provide the FTP service to the outside users by itself .Besides ,every inside browser doesn‘t directly interact with the outside website anymore ,their requests are distributed to the very proxy allocated to them ,and the proxy knows how to pass the firewall and send the requests to a remote server outside the firewall .When it gets the remote server‘s response ,the proxy sends the response back to the inside browser .In this way ,the outside user does not know who is the real host .So the proxy stresses the security of the Intranet .Its main feature can be described like this :1. Information hiding and address translatingInformation hiding means outside users will never know the names of inside hosts ,the only name they know is the name of the proxy application gateway (the firewall‘s name ).The address translating means the proxies can translate the IP address of the host of Intranet where the documents sent out or received from into another Internet unique IP address when accessing other Internet hosts to protect the Intranet IP address against the IP spoofing attack (IP spoofing is a kind of Internet perpetration theta the attacker pretend his own host as the use r‘s host ).2. Stressing the security controlAll the traffic must be examined by the firewall3. Integrating the identity authenticating systemAll the application traffic can be identified and checked before it gets access in.4. Real time monitoringIt can automatically mark up and record all the failed accessing attempts, and them .If the attempts from the same as address did many times, it can notice the security system administrators by e-mails or audible alarms.Y ou can see that a proxy is more powerful than a packet of filtering router, for is can not only check the traffic in more detail but also provide many proxy services .But it also has some limitations one is that it is more expensive, another is that it focuses all the security duty on one proxy .If the firewall gets damaged, the inside subnet will face disasters.So ,another very important thing is to secure the firewall to ensure that it can work properly .We must think over all the relevant factors and design the firewall system prudently .Generally , the basic elements that must be configured before we ―build ‖ the firewall and put it into operation are :(1)The detailed and explicit security policy, based on which the firewall conduct it‘s safeguarding work, the security policy includes network accessing service policy and firewall design policy.(2)The administration policies and procedures of daily firewall maintaining and operating.Finally ,the users must be very clear about that no firewall are safe ,they are not all powerful .So ,the users must know the level on which their firewall controls and monitors their network security .Further more, some special subnet that is used to conduct high confidential documents should not be connected with to any network at all, and some computer with privacy data should also be isolated from the network.Encryption and authenticationWhen data and documents are stored statically in host or server, firewalls can protect them. But when they ―travel‖ in the Internet, they meet some troubles. For example ,when people conduct electronic business ,some electronic transactions occur ,it is sure that some data or documents are electronically transmitted from on a place to another ,such as orders ,financial data or shipping lists and so on .Internet and web are opening world ,everybody can get access to it by any kind of methods .while the data or documents initially created in business transactions by the business partners are often in the forms of digital ,literal, sound or image ,that is ,often in readable or understandable forms ,this kind of form is always called: ― clear text ‖or ―plain ‖form ,everybody can read or under stand messages presented in these forms .Actually ,a lot of transaction data are very sensitive and confidential ,and are critical for businesses to survive in such keen business competition .And those data are also the focus of the Internet perpetrators ,they always try to intercept or sniff those data during the transmitting process on malicious or profit purpose .If the dataare disclosed or abused ,the result is horrible .So we must do something to ensure the integrity and security of the message during transmission, otherwise, people may hesitate to do electronic businesses until they are ensured that their business transaction data are conducted and transmitted in a reliable, trustworthy way.But how to let the data be safe and not be disclosed during transmitting procedures? The generally accepted solution for this problem is encryption .Encryption is a cryptographic and mathematical process that can transform the data form from clear text into a new form in which data are not readable or understandable , this new form is called cipher-text .The binary code (usually be a large digital number )used to transform the data mathematical is called ―key ―.As a general rule ,the effect of cryptography often depends on the length of the key ,the length of the k ey is described in a kind of unit called ―bit ―,the longer the key length is ,the higher the security is .Because a longer key length includes many possible keys , so the perpetrators may try very hard to find the right one from the possible keys , sometimes , it is impossible .Speaking based on experience ,any key that its length is less than 64 bits is no longer considered to be secure .Now ,there are two commonly used encryption methods ,the older and simpler one is called ―single key‖ or ―secret key ―encryption method , it is also named as symmetric encryption method .The newer and more complicated method is called public key encryption method , which is also named as asymmetric cryptography method .In symmetric key system, the key that the message sender used to encrypt the message is the same key that the message receiver used to decrypt the message, that is, the message sender and receiver share the same secret key, the primary used symmetric encryption algorithm is the Data Encryption Standard (DES) developed in 1 997 by IBM, but this method has following limitations although it is easy to be used:Since the exchanging partners share the same key, so they must know each other well and trust each other, they must keep the key in a safe place for the security of both of them.When the partners are geographically apart, the key assignment becomes a problem. If use e-mail or phone to assign the key to these partners, someone else may intercept it and the encryption will be useless.In EB application ,a company always has lot of customers or trading partners , and some of them haven‘t fixed relationship with the company .So it is not safe to give all of them the same key .But if the company gives each of them a different key for more security , the company will increase both its expenses occurred for assigning the huge amount of keys to every user by phone or e-mail and the risks that some of the keys are intercepted or abused .So this method is not suitable for securing the data exchange conducted in public network with a lot of unknown people .In 1976, another encryption method that is more suitable to be used in more and more opened network was invented .It is more complicated ,but secure ,and has great potential for being used in EB application ,it is the public/private key method (It isalso called a symmetric cryptography ).In public-private key system , each user has his /her own pair of keys , one of the keys is public ,the other one is private ,known as key pairs .The public key can be used by others ,but the private key should be kept in secret , only the owner knows its existence , both these keys should be protected against being altered .In application, the two keys are used together, that is, the data encrypted by one of the keys can only be decrypt by another.The famous algorithm used for key pair generation was developed by Ronald Rivest, Adi Shamir and Leonard Adelman , and it was named as RSA algorithm , the security of this system depends on how different the reversing the computation (the factoring of large pine numbers ) is .Public-Private key pairs can be used in many cases. For example, a company sells adult products on e-shop, customer A want to buy some thing from the shop. But customer A does not want other people to know his credit card data or his shopping list , so he uses the company‘s public key (always available for free using ) to encrypt his credit card message shopping list and transmits them to the company . When the company receives the encoded message , it decrypts it with its own private key that is matched with that public key .Consumer A is quite sure that no one can read the encoded message except the company , for only the company has the private key . Similar cases may happen between the bank and client. Doctor and patient, partners and so on.But the key pair method also has some short-points, for the company has no enough evidences to prove that these message is surely from customer A, because the public key is publicly used, anyone can encode a message with it. So under this circumstances, the company needs to get enough evidences of that the message is surely from customer A, otherwise, sometimes, the behaviors such as falsely deny sending or receiving the message happened. So both sides need the proof of origin, receipt, and contents of the transmitted data, called ―non repudiation ―. One of the solutions for this problem is quite troublesome , that is , the company sends a message encrypted by their own private key to customer A to request a confirmation for this shopping .then customer A uses the company‘s public key to decrypt the request and confirm it , then send back another encoded confirming message to the company . So you can see, if every transaction is conducted like this, both companies and customers will spend lots of time, effort and expense, and still is not safe enough, for someone who has the company‘s public key may intercept and decrypt the company‘s message which encoded with private key.So, some other new authentication tools are needed to solve these problems. The new tools are called Digital Signature and Digital Certificate.Digital Signature is designed to blind the message initiator with the exact contents of the message he/she generated. That is, it can be used to authenticate the sender of the message and to check the integrity of the message from that sender.The initiator can create his digital signature by using his private key and the hashing algorithm technique .A hashing algorithm is a way in which a very large message can be represented in unique way in much smaller format , this format iscalled message digest , then the user use his own private key to encrypt the message digest to from the digital signature ,which is an unique creation of the contents of the message and the send er‘s private key , then the encrypted message and the digital signature are sent to the receiver together ,the receiver uses the sender‘s public key to decrypt the message and digests and uses the hashing algorithm to recalculate the message digest based on the massage received .If the recalculate message digest is identical to the decrypted message digest ,then it is proved that this massage is truly from the authenticated sender .The digital certificate is a kind of publicly accepted evidence use for certificating the identities of document senders and receivers. It is also an algorithm which including the owner‘s public key, name, and the digital signature of the ―Certification Authority ―. This trusted third party always provides the following services to all the people who employ public-private key pairs method.Issue and revoke the user‘s public key certificates and certificate revocation lists (CRLs)Register or attest the identity of CA users.Maintain and manage a public assessable electronic database of relevant certificate documents.However, these above solutions for security are far from integrity, since the EB transaction data are always the target of Internet perpetrators .Some of the perpetrators are IT experts and have a wealth of information and knowledge that may be used to in design malicious schemes .So people should carefully manage and use the current security protection methods properly, and keep on inventing more effective new methods to remedy the weakness of current methods.中文翻译:电子商务的安全在电子商务中一些令人担忧的事情在网络给人们无尽方便与机会的同时,它也给人们带来了风险。
电子商务企业风险防范外文文献翻译最新译文
电子商务企业风险防范外文文献翻译最新译文文献出处: Markus D. The Study On the E-commerce Enterprise Risk Prevention [J]. European Management Journal, 2015, 12(3): 125-135.原文The Study On the E-commerce Enterprise Risk PreventionMarkus DAbstractAt present, the rapid development of e-commerce, occupied the commanding heights of economic development, and become the driving force to promote a new round of economic growth, mean that the society becomes more digitization and information. However, the country still in the early development of electronic commerce, the relevant political, economic and legal conditions are not perfect, enterprises are facing the risk of the external environment; low barriers to entry, market competition, the changing financing constraints, forcing B2C e-commerce business internal focus on risk. Therefore focus its risk prevention research has theoretical and practical significance.Keywords: B2C; E-commerce business; Risk analysis1 IntroductionThe most popular in the 1990 s, electronic commerce, has realized the trade of globalization. E-commerce more than 20 years of development, its rapidly expanding at an average annual rate of 70%.Electronic commerce is the fifth revolution of human society, its mode of production and life bring great change, the impact to the society as any time in the history of the reform.In the rapid development of e-commerce, has some scholars pointed out that B2C e-commerce is the ultimate mode of e-commerce development. From its data representation, B2C e-commerce enterprises showing a strong growth momentum, but in the B2C e-commerce enterprise vigorous development also has exposed many problems. In the era of big data, the change of business environment, electronic business enterprise faces the opportunity of rapid growth, but because of the complexity of the environment and own existence problems will inevitably accompanied by severe challenges. At the same time, because of B2C e-commerce enterprise's financial environment is also a drastic change, it faces more complex and diversified financial risk, and poses a serious threat to the enterprise. In addition, the macro political instability of the situation, the global market supply and demand and price level of volatility, the change of factors such astheir own financial credit policy and the operator's own management level, corporate governance mechanism, internal control mechanism, will influence the development of B2C e-commerce enterprises.2 Related concepts2.1 Electronic commerceThe popularity of the Internet has greatly pushed forward the development of electronic commerce. Of e-commerce to explore gradually from the perspective of e-commerce it extends to the electronic commerce network. But to define, scholars explore different perspective, not yet. The United Nations economic and development organization think e-commerce based on the open network, mainly to business dealings between enterprises, between enterprises and consumers. The definition of electronic commerce is relatively simple, did not specify the electronic commerce connotation and the extension. While Canadaelectronic commerce association believe that e-commerce is through the buying and selling of goods and services, as well as digital devices for the transfer of money. With digital equipment as the foundation for the definition. Include not only online transactions, but also influence enterprise business activities ranging from production to consumption of link, is using the Internet to reflect from the purchase of raw materials, processing, to the finished product and complete chain of online payment etc.2.2 B2C e-commerce enterpriseB2C e-commerce is the enterprise directly facing the consumer business model, is the enterprise through the Internet network consumer direct selling products or providing services to the individual mode of electronic commerce, its integration in the enterprise production and marketing aspects of camp, reshape enterprise business process, organization structure and business model, and implements the enterprise information and electronic. Narrow sense of B2C e-commerce refers to the online retailer, in addition to the way of shopping and payment, similar to traditional stores. Generalized B2C e-commerce enterprise including online retailer, or covered by providing information service and profit of enterprise. This article B2C e-commerce enterprise is narrow, namely online retailer.2.3 B2C e-commerce enterprise featuresB2C e-commerce enterprise through the effective integration of resources, economic, market and industry structure, products, services and circulation, customer segmentation, and businessaspects of a disruptive impact. The difference between the B2C e-commerce enterprise and traditional enterprise lies in itsmode of operation of virtualization; B2C e-commerce enterprise is the backbone of the information technology, computer and network technology provides B2C e-commerce enterprise information layer and network layer, application layer of the technical support. The most notable features of B2C e-commerce enterprises are to implement the efficient integration of the supply chain. Therefore, B2C e-commerce enterprise operating characteristics are: mode of operation of virtualization, technology dependence, supply chain integration. Mode of operation of virtualization, B2C e-commerce enterprises and traditional sales reflected in the visual difference between stores of virtualization, the sales way of virtualization, shelves of wireless, all-weather logistics distribution services, and online services, breakthrough time and space limit, has realized the convenient transactions, reduce costs, etc. Technology dependence, it is embodied in two aspects: one is the dependence on macro environment technology. Second, the reliance is on specific techniques. From the point of macroscopic environment technology, the rapid development of information technology brings the reform of electronic commerce. In the era of "people's online behavior is rely on a web browser to browse the web. Fret entering the WEB2.0 era, people closer links with the Internet, has realized the online dating, produced a variety of modern tools such as instant messaging software, and more affected people's production and way of life. In its dependence on specific techniques, performance and more cooperation enterprise information system, based on ISP technology support. Supply chain integration, refers to the electronic commerce enterprise through the integration of upstream and downstream enterprises, shorten the supply chain directly, improve the service efficiency,reduce transaction costs, increase the coverage, realized the integrated supply chain.3 B2C e-commerce enterprise risk analysisDue to the virtualization of B2C e-commerce enterprises has a mode of operation, technology dependence, the integration of supply chain management features, so its risk has both generality and features. This article was to explore its risk prevention countermeasures, based on the characteristics of the risk.3.1 Strategic riskStephen p. Robbins thinks strategy mainly includes: enterprise overall strategy, business strategy and functional strategy. Which is located in the top of the company strategy, the macroscopically strategy, strong leadership and commander in chief global role? Business strategy is for the enterprise management of a particular business. The micro level, the functional strategy its operability is strong, is mainly used to guide or the specific work of each function department under the state council. In this paper, the strategic risk mainly discussed from the Angle of the company's strategy.B2C e-commerce enterprise strategy features: on the basis of the low cost strategy, condensed enterprise's core competitiveness, giving full play to the advantages of the enterprise, finally forms the comprehensive competitive strategy. Strategic risk refers to the process of strategy formulation and strategy implementation may be hindered enterprise win the advantage of internal and external factors of uncertainty. Strategic risk management is a continuous process, begins with the strategic analysis and selection stage, infiltration in strategy formulation and strategy implementation phase, and the strategic management process, the ultimate goal is to reduce the blocking enterprises win theadvantage of uncertainty, ultimately achieve the goal of the enterprise, to achieve strategy.3.2 Technical riskElectronic commerce is the "modern information technology" and "business" organic combination of the whole. E-commerce covered by "modern information technology" refers to all kinds of electronic technology based communication way.The meaning of "business" is a broad sense, including none one by one and business relations. For e-commerce, the relationship is between the modern information technology and business. Therefore, B2C e-commerce enterprise's technical characteristics is the fusion of technology and business activities with the aid of the development of information technology, B2C e-commerce enterprises to realize the combination of the information flow, cash flow, logistics. The essential difference between B2C e-commerce and traditional sales enterprise lies in information technology. Receive the goods from the seller's release information about the goods to the buyer completed, the whole process with the support of the Internet and information technology. Will produce the following risks, because of the lack of effective, it means of identity authentication and is means of protection information confidentiality and integrity. It is caused by hackers, steal enterprise key information and reveal the risk of important data. Layer information risk is mainly refers to the distortion of information. Information distortion associated with technical flaws, but the more important risk produced by artificially tampered with, including trade information in the process of transmissionwas illegal interception and modification, etc. In the era of big data, therefore, need accurate real time data processing,precise marketing and marketing. If a whole technology, in business express layer, logic layer and data layer can have a fatal blow to the electronic commerce enterprise, resource waste and loss.3.3 Supply chain riskControl is the enterprise through the supply chain logistics, information flow, cash flow, raw materials procurement, manufacturing, sales, and will eventually reach the consumer integration as a whole the function structure of the network model. Around the core enterprise to establish a supply chain enterprise alliance, while improve the efficiency of management and competitiveness will appear the following risks: first of all, the operation of supply chain risk. Supply chain operation is refers to the procurement, production, distribution and other operation link, supplier enterprises need timing quantitative quality to deliver goods or raw materials, production enterprise is responsible for processing, distribution business directly to consumers, to take measures to improve the quality of service, improve the satisfaction of consumer. Second, information transfer risk. Supply chain information flow, logistics, business flow, capital live, but the electronic commerce enterprise is more concerned with information technology. With the increasingly complex supply chain structure, increase the probability of the risk information transfer between enterprises, resulting in decreased efficiency of the supply chain, the crisis is produced.3.4 Investment and financing riskInvestment risk refers to the enterprise in itself or outside of the main activities, for finance and business purposes, in the fixed assets, equity or industry class projects occupied capital, physical, etc.B2C e-commerce enterprise's investment risk is reflected in:first, the macro environment policy, exchange rate uncertainty of many factors, such as increasing the investment risk of the enterprise. The external environment of the enterprise faces the dynamic complexity and the uncertainty of consumer preferences, Internet technology with each passing day, the invasion of foreign e-commerce enterprises, and many other factors make the B2C electronic commerce enterprise investment risk. Second, the complexity of risk in overseas markets.B2C e-commerce enterprise overseas investment is both opportunity and challenge. Faced with the market development opportunities, but at the same time, is the competition strategy of fuzzy, organization structure and management mode of the challenge.B2C e-commerce enterprise financing is more risky than traditional enterprises, this is because: first, it is difficult to achieve long-term funds from the bank, relying too much on short-term borrowing, repayment period is short, the financing risk of the enterprise; When the second, the enterprise need the money, the way to choose equity financing and issuance of bonds, financing cost is high, the stress of fixed costs, such as pay interest.译文电子商务企业风险防范研究Markus D摘要当前电子商务的快速发展,占领了经济发展的制高点,成为推动新一轮经济增长的动力,标志着社会进入数字化和信息化时代。
文献翻译----电子商务中英文对照
外文文献及译文文献、资料题目:Electronic Commerce外文文献:Electronic CommerceElectronic commerce, or Electronic trade, or electronic business as a newly rising mode of commerce will have far-reaching influence on social economy and play an important role in social development worldwide. It represents the trend of world trade in the 21st century and beyond.1. What is Electronic Commerce?Electronic commerce refers to commercial data exchange in digital form through electronic transmission means and commercial activities conducted on-line. Usually, electronic commerce can be divided into two levels: One is low-level electronic commerce that is, electronic commercial intelligence, electronic trade, and electronic contracts. Another is high-level electronic commerce which includes all commercial activities done via Internet, ranging from searching for clients, commercial negotia-tion, making orders, on-line payment, releasing electronic invoice, to electronic dec-laration to Customs, electronic tax-payment, all conducted on Internet.Electronic commerce means electrification of all trade transactions. It is featured by these characters: ①fairness and freedom, ②high efficiency, ③globalization, ④virtualization, ⑤interactivity, ⑥autonomy, ⑦personalized service. With electronic commerce, clients andsuppliers can closely and conveniently contact with each other on a global scale, so that clients can find satisfactory suppliers from all comers of the world to meet their demands.Electronic commerce will change the environment in which enterprises compete with each other and reduce costs which would otherwise be high in traditional market structure. Low costs in transactions, convenience in market entry and government encouragement to use Internet (exemption from tax) activate electronic commerce and boost it to develop rapidly right from its beginning. As experts predicted, by 2000, electronic commerce would reach a scale of 300billion US dollars worldwide. And it has exceeded this scale.To ensure security of electronic commerce, an electronic certification center should be established. Digital ID is used to validate identity. Digital 11 is trusted to a third party, namely, an authorized agency, to release, including identifying informa-tion of the holder (name, address, liaison way, ID card number), an encryptive key for common use by the both parties, period of validity, password and identification in-formation of the authorized agency, etc. With digital ID, both parties in transactions can be assured of identifying the other party and validate that the information sent out from the other party has not been subject to alteration.2. Influence That Electronic Commerce May HaveCompared with traditional commerce, electronic commerce has superiorities as follows *Extensive coverage. A network system combining Internet, Intranet (local area network inside enterprises) and Extranet (networks outside enterprises) enables buy-ers, sellers, manufacturers and their partners to contact with each other and conven-iently transmit commercial intelligence and documents worldwide.*Complete functions. In electronic commerce, users of different types and on dif-ferent tiers can realize different targets in trade, for example, releasing commercial intelligence,on-line negotiation, electronic payment, establishment of virtual com-mercial market place and on-line banking, etc.*Convenience and flexibility in use.. Based on Internet, electronic commerce is free from restriction by specialized protocol for data exchange. Transactions can be conducted conveniently on computer screen, by using any type of PCs, at any place around the world.*Low cost. Use of electronic commerce can cut down costs for hiring employees, maintaining warehouse and storefront, expense for international travel and postage to a great extent. The cost for using Internet is very low.Electronic commerce will have substantial influence on social economy:*Electronic commerce will change the way people used to take in commercial ac-tivities. Through networks, people can enter virtual stores and browse around, select what they are interested in, and enjoy various on-line services. On the other hand, merchants can contact with consumers through networks, decide on buying in goods (categories and quantities) and perform settlement of accounts. Government agencies can perform electronic tendering and pursue government purchase through networks.*The core of electronic commerce is people. It is a social system. On-line shop-ping changes the way of people's daily life and fully embodies autonomy of consum-ers in trade.*Electronic commerce changes the way enterprises produce their goods. Through networks, manufacturers know market demand directly and make arrangement of production, in accordance with consumers' need.*Electronic commerce dramatically raises efficiency of trade. Intermediate links can be cut down; costs for sales will be reduced to minimum. Production can be ar-ranged in "small batches plus diverse varieties", and "zero stock" will be reality.*Electronic commerce calls for reformation of banking services. New concepts like on-line bank, on-line cash card and credit card, on-line settlement of accounts, electronic invoice, electronic "cash"-consumers will no longer use the real cash when shopping-will become reality.*Electronic commerce will change government behavior. Called "on-line gov-ernment", an on-line administration plays the important role of a social channel, maintaining order and fairness and detecting and cracking down on-line fraud.3. The Present Situation of Electronic Commerce in Developed CountriesIn the mid-1990s, when Internet experienced explosive development and micro-computers entered homes in great numbers, computer networks became an indispen-sable part of people's daily life. People expect for more interests and convenience brought in by computer networks. Electronic Commerce emerged just in time. In de-veloped countries, governments timely made policies to boost electronic commerce to practical use and dominant position in a new round of worldwide competition.In 1998, Internet helped the United States to create productive out put of 507 bil-lion US dollars, national income of 301 billion US dollars, and 1. 2 million job op-portunities; of these, electronic commerce created an income of 100 billion US dollars. Internet has be-come the first big industry with yearly productive output increasing by 60%,and accounting for 6% of GDP. Service export from the United States has at-tained 160 billion US dollars each year, and it is predicted that it can compensate trade deficit in commodity trade. Internet played an important role in promoting ex-port from the United States: in 1999, books, automobiles and services were sold through electronic commerce to foreign countries, exceeding 102 billion US dollars.Advocated by the United States, 132 members of WTO decided to turn Internet into a freetrade zone within at least one-year term. Some countries and organizations scrambled to work out development framework for electronic commerce and made laws and regulations for developing electronic commerce. In 1996, the UN Confer-ence on Trade and Development passed "Model Law of Electronic Commerce". In December, 1996, the US government issued "Policy Framework for Global Electronic Commerce".In April 1997, European Union issued "Proposal for Electronic Com-merce in Europe".On July 1 1997, US President Clinton promulgated" A framework for Global Electronic Commerce" which has had great influence on global electronic commerce. In May 1998, WTO minister conference passed "A Manifesto on Global Electronic Commerce", and in September 1998, WTO general council passed "Scheme for Electronic Commerce Work".In October 1998, UN Organization of Economy and Cooperation &Development (OECD) held minister conference at Ottawa, Canada on electronic commerce, which is praised as a milestone of global electronic commerce. In September 1999, Global Business Dialog on Electronic Commerce (GBDE) was held in France and is-sued "Paris Proposal".In December 1999, the United States issued another Internet commerce standard.Electronic commerce in the United States takes the rein of the trade in the world. At present, there are 60 million subscribers of Internet in the United States. More than 98% of purchasing managers seek targets on-line. As estimated, by 2002, the value involved in transactions done through electronic commerce between US enterprises will account for 6.1% of GDP. Fortune magazine's statistics show the 500 top com-panies in the world all engaged in on-line business.25% of income to IBM (about 20 billion US dollars) is related with electronic commerce. Thanks to electronic com-merce, IBM saved its expenses of 250 million US dollars during 1999. HP Company designated its electronic Commerce solution as E-world-anelectronized world. This solution is oriented to medium-and small-size enterprises, and great investment was made to third parties-software companies to develop software suited for medium-and small-size enterprises to engage in electronic commerce. Intel places its risky invest-ment mainly on Internet and electronic commerce. In July 1998, Intel began on-line transactions Its monthly business turn electronic commerce reached one billion US dollars.As a survey made by European Information Technology Observation shows, of the surveyed 570 companies, 47% have implemented electronic commerce of some sorts, and 4/5 of them began their electronic commerce in the latest two years. Execu-tive Committee of European Union plans at least 25% of its purchase done through electronic commerce by 2001. In1998, in Australia, web sites related with electronic commerce on Internet doubled in number, and 11% of Australian enterprises have their web sites. 80% of Australian companies use Internet to transmit E-mails and conduct commercial activities. In 1998, Singapore government promulgated,for electronic commerce. Singapore is the only country in Southeast Asia that formally joined the "Rights and Obligation Electronic commerce In cooperation with US manufacturers and firms, Singapore established an electronic commerce entry in Asia, providing comprehensive Business-to-Business (B to B) service, so as to enable Asian trade companies to enter the rank of global electronic commerce.4. Development of Electronic Commerce in ChinaExploration in electronic commerce, governmental and civil began in 1993 in China. Today, electronic commerce has found its applications in foreign trade, Cus-toms, finance and commerce. Local frameworks have been established in Beijing and Shanghai for electronic commerce. Some electronic commerce web sites have been opened to on-line shopping and on-line settlement of accounts.The Ministry of Foreign Trade set up in February 1996 China Electronic Com-merce Center responsible for research, construction, and operation of international electronic commerce project in CT he Center established "China Commodity Trade Market" on Internet, to put rich resources of goods in China to world market, opening new channel for our exports. The subject "Security Proof of Electronic Commerce" as a key item in science and technology during th9th Five-year Plan period was ap-praised in early 1996 by State Department of Science and Technology and State En-cryptive Code Administration, which laid a foundation for establishing a safe and normal environment for electronic commerce in our country.In March 1999, the Ministry of Information Industry approved the electronic commercial network of pharmaceutics and health as a model project of electronic commerce for all trades. It is one of the six specialized networks in China, which pro-vide all-direction serve of market information, product transaction, warehousing and delivery, and account settlement, etc.In Shanghai, in 1999, "Shanghai Administrative Center of Electronic Commerce Security Certificate" was set up, which provide security platform for electronic com-merce and is responsible for application, appraisal, making and management of digital certificate domestic and foreign clients in Shanghai, and offers services such as certi-fication of digital identity and digital signature, electronic notarization, secure E-mail and secure encryption, etc. In January 1 the first on-line bookstore in China-Shanghai Book City On-line standard. It provides VISA cardholders and card-holders of domestic Great Wall card, Dragon card, Peony card and Pacific card with instant and authorized security service.The measure taken in Beijing to develop electronic commerce is to build a capital electronic commerce city. In November 1998, the capital electronic commerce project formally activated, and a frame-work formally showed off. The Legend Computer Company open editselectronic commerce system in June 1999, and web sites 8848, sina, 163, all activated their electronic commerce.In April 2000, sponsored by the Ministry of Information Indus-try,National Economy and Trade Commission, and China Council for Promotion of International Trade, the 4th China International Electronic Commerce Conference was held. State leaders and superintendents of various ministries and commissions joined the opening conference. Mr. Levy, secretary of Commercial Department of the US government led a delegation of famous US enterprises and media, totally more than 100 persons, to join the conference. More than 60 seminars were held during the conference, to dis-cuss extensive topics on electronic commerce.Despite all these efforts, companies engaged in electronic commerce service in China suffer losses in their B-to-C business (B refers to Business, C refers to Con-sumers). Some Chinese experts attribute this to Chinese shopping habit-Chinese con-sumers treat shopping as an interesting hobby; they enjoy the pleasure of spending their money through appreciating and comparing merchandise, and bargaining; but all these will vanish from on-line shopping. Other experts attribute this phenomenon to the ubiquitous incredulity in society-banks can-not interconnect their business be-cause they fear their customers will be captured by their rivals; cash cards cannot be popularized because banks do not trust civilians; and civilians do not like to do on-line shopping because they do not trust on-line stores,…etc. Why?That's because many things on-line and in society are false, for ex-ample, false number of subscribers, false statistics of access flux, shoddy goods, forged diploma, sham curriculum vitae, sham investment, sham listing, false revenue to listed enterprises, etc. Such an over-all environment will not change within a long period of time. In such environment, no commercial activity can be done. Many IT practitioners are disheartened with elec-tronic commerce in our country.5. Prospects of Electronic CommerceAlthough developing rapidly and seeming to have brilliant prospects, electronic commerce faces a series of real problems, for example, problems involving security, technology, expense, legal system, tax system, conception, protection of privacy, in-frastructure, etc. However, electronic commerce is the mainstream of enterprises in the new century and will develop rapidly in the coming years. Some companies pre-dict that by 2003, electronic commerce between enterprises in developed countries will account for over 9%of the total turnover(1,300 billion US dollars), and in consumer electronic commerce the turnover will attain 76. 3 billion US dollars by 2002. And as experts predicted, electronic commerce in China will catch up with de-veloped countries on the average level, in 10 years. They suggested 3 to 5 years be spent on working out plans, policies and regulations necessary for developing elec-tronic commerce, building substantial and tangible electronic commerce systems, fos-tering specialized talents, optimizing of the electronic commerce systems in some trades and areas; and then 5 to 7 years be spent on linking with international elec-tronic commerce to enable our electronic commerce system as an important compo-nent of international electronic commerce; popularizing of electronic commerce in application, raising electronic commerce in our country to a higher level in research, development and application, to the average level in developed countries.The following description tells what major I/e strategies some major manufactur-ers in the world are taking in development of electronic commerce.IBM: IBM is the pioneer that held up the banner of electronic commerce as a new application of Internet. In people's mind, IBM is now not only manufacturer of main-frames, PCs, servers, software but also the “godfather" of electronic commerce. IBM has always been dedicated to promoting secure commerce over the Internet. It sin-come from selling servers hasaccounted for 60% of its total in-come.IBM not only provides products for large-scale applications of secure, efficient, reliable electronic commerce and payment over Internet, but also for small electronic business as well.IBM Micro Payments an application enabling buyers to purchase low cost items over Internet-is another example of how IBM is expanding to new areas of commerce. By enabling billing servers, content providers and other merchants to profitably sell items for even a few cents, IBM opens up a whole new market.IBM Micro Payments allows buyers, sellers and billing systems to sell content, information, and services over Internet, for small amounts. IBM's commitment to electronic commerce and electronic business makes it a leader in the area of electronic payments. An automated compiler tool transforms existing HTML pages, creating "click and pay" links with either fixed or dynamic prices. Content and service provid-ers can take advantage of the extensive set of APIs and authoring tools to extend IBM Micro Payments available from OEMs. Billing servers can easily integrate the IBM Micro Payments application with existing billing systems and use it to attract content providers and open new sources of revenue.IBM Micro Payments provides scalability and interoperability, which allows widespread availability across Internet, including multi-currency and multilingual support, and low operational costs it easily supports transactions as low as one cent.SUN: SUN as a global leading supplier treats Internet not only a tool but also a new mode of commerce. SUN has provided very flexible solutions to commercial af-fairs for BBC, ETRADE, Federal Express, First Auction, Fruit of the Loom, Kodak, Thomas Cook, Virgin.Microsoft: Microsoft aims at helping enterprises to set up more powerful relation with their clients and partners by three means: (I)Windows 2000, BackOffice, Site Server, Biztalk,etc; (2) MSN (in the United States, more than 40% web users access MSN, and consumers can conduct comparative study when buying articles and ser-vices); (3) Partners provide customers with various products and services on Mi-crosoft MSN platform, realizing electronic commerce solutions, including settling account, paying tax, shopping, logistics, purchasing, accounting, ERP (Electronic Remote Processing) and EDI (Electronic Data Interchange), etc.Site Server and Biz talk are the two major products of Microsoft adopted in exist-ing system for enterprises to develop electronic commerce. Site Server is used for constructing web stores, based on data-it enables the client to easily realize on-line catalog, buying/selling order, exchange of documents for promoting sale, etc. Disre-garding what platform, operating system or technology used in low layer.Novell: Novell defines itself as "NET Service Supplier" after2000. The word NET includes intranet, extranet, Internet, company net, public net, cable net, wireless net. Its aim is to breakout the existing service domain in which most software products can provide services only in a specific environment or for a specific procedure or server (rather than the whole network).Novell's network service software NDS eDirectory as a nucleus helps clients to reduce complexity of business on network, and improve security, so that it enables network, applications and business processing to adapt to electronic commerce, and thus speed up their transfer to electronic commerce.SCO: SCO’s Tarantella is the best solution for existing users to conduct elect ronic commerce. Users can use only a browser to access any applications of platforms in back counter, without the need of re-writing existing applications, in their effort to transfer their business to electronic commercial mode. To ensure electronic commerce to continually operate, SCO provides an incessant cluster solution based on UNIXWARE 7. This product is easy to use,easy to manage and its cost is one-tenth of large-scale product of the same sort for mainframes while its performance doubles. It is a security solution with higher performance/ cost ratio among the same sort for electronic commerce.Tivoli Systems Inc. today announced Tivoli Business Systems Manager, a new, fully integrated solution that allows businesses to manage their IT environments from the top down, creating a powerful view of business systems management.The Tivoli Business Systems Manager solution provides us with business views and control mechanisms to manage all of our distributed IT resources in the retail, banking and electronic commerce environments-including system resources, data-bases, application servers, web servers and electronic commerce applications-from one central location. The Graphical User Interface allows us to monitor all of our re-sources on a single screen, regardless of geographical location.Combining the features of Tivoli Global Enterprise and Tivoli Manager for OS/390, Tivoli Business Systems Manager provides true end-to-end enterprise management from one console, simplifying the administration of heterogeneous environments. Tivoli Business Systems Manager enables customers to manage and control multiple applications that are required for different business functions.中文译文:电子商务电子商务或电子贸易,电子商业,或作为一个新兴的商业模式将产生深远的影响,经济和社会中发挥重要作用的社会发展世界各地。
电子商务的风险与防范外文翻译
Electronic Commerce Risk and PreventionE-commerce credit risk is due to network virtualization and particularity of the deal, the main body of the credit information can't understand the credit risk caused by for each other. In essence, the network to provide a trading platform, the two sides need to meet, nature is the social credit. Under the e-commerce environment, such as spreadsheets, electronic documents, electronic contract via printing.on use, can't use the signature of the traditional way, thus on the authenticity of the risk of new e-commerce success or not depends on the consumer's trust in the online trading, e-commerce trust risk essence is caused by the network transaction virtualization, the first is the buyer's credit risk. Individuals can be any fake information in the network, can forge credit card defraud the seller of goods. Pose a risk to the seller. Then the seller's credit risk, because of asymmetric information consumers can not master all merchants commodity information. Seller commodity information incomplete, inaccurate or merchants excessive inducing consumers to mislead the consumer buying behavior; In addition, the sellers from several, fails to perform the transaction, will cause losses to the buyer. If the enterprise cannot timely, accurately, quantity and to complete the order, will have certain influence for company image, resulting in the loss of customers, thus resulting in a decline in the enterprise market share. At the same time, because of the e-commerce industry involving multiple trading main body, credit risk can also be converted into the risk of the parties involved.Although China's e-commerce industry rapid development and gradually into the high-speed growth in recent years, but with the electronic commerce legal system is still in the construction period of form a complete set, and imperfect relevant laws and regulations, such as the provision of online trading rights and obligations of the not clear, there is no specific law to regulate the behavior of e-commerce operators and users, etc., both parties once a problem in the e-commerce transactions, the rights and interests is difficult to get effective legal protection. In addition, the electronic commerce trade there is the risk of intellectual property rights, the network is an open platform, resources in the network transmission is open. Sharing of resources in the network resources of intellectual property rights protected strength are reduced, thus may lead to e-commerce transactions intellectualproperty disputes, etc. Form a complete set of legal system is not sound will make industry development there is a certain degree of risk, thus sluggish industry development speed.Consumers in the e-commerce transactions when there is a kind of experience, that is in both open a webpage, or browse commodity trading, will come out a table, the main content of these forms is one of the basic information, such as name, gender, birthday, work units, and marital status, there are some is set up in order to complete the transaction, such as address, bank card number, E-mail, etc., there are business survey content, write for goods by the way, let consumer preferences, requirements, etc. In addition to filling out forms, to understand the consumer more quick and comprehensive targeted information, some businesses will adopt advanced computer tracking technology to collect personal data. Such as the commonly used is a type of the tool to determine and track the user's cookies network operation. Free send spam email and data collected individual consumers are also commonly used methods. These data is spread through what way, the data content is restricted to meet the needs of the trading range, whether website and relevant control facilities and security measures, consumer is hard to know more difficult to control. In fact, consumers in online shopping, they are not too much care about these forms, track the testing software and spam, little imagine, some data and information is private Internet service provider or businessmen and walked in quietly, network virtual property, quick sex is the personal data is easy to be mastered some businesses or institutions, for their own privacy.E-commerce inevitably involves the intellectual property rights. Under the network environment, across time and space of the Internet makes the transnational tort became a common phenomenon, the author suddenly found that seems to have some system of copyright and the authors unable to control their work effectively. E-commerce activities involved in the domain name, computer software, copyright, trademark, and many other problems, these problems simply rely on techniques such as encryption is unable to be fully effective protection, must establish a comprehensive legal framework, to provide the holder entity and procedural legal protection.In traditional international trade activities, mostly in the form of foreign buyers to take large order done, importers are usually active intellectual property investigation before the import commodities and risk prevention, for the control of intellectual property rights,domestic exports although not too much concerned about the problem of intellectual property rights are not just property risk. However, different from the traditional pattern of foreign trade, cross-border e-commerce, the seller is given priority to with small and medium-sized enterprises, and even a lot of natural person, they often lack professional knowledge about intellectual property rights, and in the face of foreign buyers also have specificity, therefore the intellectual property rights problems become prominent. At present, intellectual property rights disputes constitutes the main problems of electronic commerce. In the e-commerce industry under the situation of rapid development, intellectual property rights violations occur repeatedly, the serious influence to the international image of China merchants and cross-border e-commerce industry's rapid and healthy development. Domestic intellectual property belongs to the emerging field of e-commerce, the original problem already reorganization, comb. And cross-border e-commerce intellectual property rights has the common nature of e-commerce intellectual property issues, but in the cross-border business environment, it has significant uniqueness, the commonness and individuality intellectual property rights of Taiwanese businessmen and the seller's intellectual property capabilities and risk prevention and control construction put forward higher request, in other words, if not doing enough to perfect the intellectual property, so maybe is just a temporary prosperity, produced by the intellectual property rights are likely to affect the flat of Taiwanese businessmen and business reputation and image in the international market, become the important obstacle for the sustainable development of cross-border e-commerce.The development of electronic commerce requires efficient logistics system guarantee. The current logistics outsourcing mostly form of electronic commerce, because each join express enterprises of different scale, service ability and the credit is uneven, and are independent legal person, the management of each branch beyond the service center, causing slow delivery, express delivery personnel service attitude is poor, express items damaged or lost, and so on and so forth, so that when dealing with customer complaints, and often the heart is unable to service center.China's electricity business has developed rapidly, but the logistics industry development relative lag. At home, high logistics cost and logistics distribution time is too long and other issues have yet to find the other between electricity and balance ofconsumer satisfaction. Compared with the development trend of modern logistics requirements, developing logistics in our country is still in logistics resources integration, logistics facilities, logistics, technical modification of utilization of existing problems, the lagged development of its will greatly affect the development of Internet retailing.China's e-commerce logistics investment opportunities is more, but still have large risk policy and industry. Qing research center analysis, the investment risk to the Chinese e-commerce logistics mainly embodied in the following aspects:First of all, the policy regulation, three son. Regulators in the ministry of railways, civil aviation administration of China logistics industry, planning department, the economic and trade commission and other departments, physical did not form a unified and overlapping management, easy to cause redundant construction. Combined with China's e-commerce logistics industry started relatively late, the industry itself is self-discipline and feasible management way, facing policy regulatory risk.Second, countries in the development of logistics industry has just started, have not form a unified planning, especially in the background of IT systems. E-commerce logistics enterprises have developed the corresponding IT system, tend to invest heavily in the IT system could be related to e-commerce company docking difficult problems in the system. With the rapid development of logistics industry, the state may further promote the standardization of IT systems, this for logistics enterprises, there is a risk of capital investment.At present, from the perspective of the development of e-commerce logistics industry, capital can be cut into the private Courier company belong to the competitive relatively weak link, from the capital, seniority, manpower, etc., with state-owned and foreign express companies such as there is a big gap. Shorten the gap, on the other hand, need long-term accumulation for the development of the company; On the other hand, the large sums of money need to be improved. However, this development is a process of a rising tide lifts all boats, and ownership of funds will also become one of the major barriers to its development.First of all, most of the electronic business enterprise logistics infrastructure is relatively backward, especially the construction of IT system, most of the private logistics company has not yet been established, the backwardness of background managementsystem will affect the long-term development of the enterprise. Second, private third-party logistics company's talent shortage, lack of modern management, it has become a bottleneck affecting the development of our logistics. Again, private Courier company financial management are in urgent need of specifications, delivery personnel should enjoy the treatment is not obtained according to the facts, this is not standard way of financial management for its subsequent development concerns.Because network openness, sharing and dynamic, anyone can freely access to the Internet, lead to the Internet as the main platform of electronic commerce development face serious security problems. Its main technical risk include: network environment risk, risk of data access, online payment riskWeb server often suffered the hacker's attack, individual in the network information system after the attack cannot return to normal operation; Network software is often people to tamper with or damage; Data storage or transmission in a network is often without a grantee to tamper with, add or delete, copy or use. Under the environment of e-commerce business transactions must be conducted through the Internet, the Internet system using open TCP/IP protocol, it is in the form of radio transmission. Vulnerable to computer virus, hacker attack, business information and data is easy to take listening, temptation and steal passwords, hackers break into computer systems for damage, the use of e-commerce systems and management on some holes, after entering the computer system, destroy or tamper with the important data, to steal secrets and resources, control machine, clear record. Set the back door, have disastrous consequences for e-commerce system. Computer virus is a set of program written, can attack the electronic commerce system's data, files, and memory, as to make the computer hardware failure, software paralysis. Data destruction, a system crash, caused irreparable big losses to enterprises and businesses.The risk because of improper data access. The risk is mainly from the enterprise interior. One is the unauthorized personnel enter the system database to modify, and delete data; 2 it is enterprise staff error, affected by the erroneous data and risks, the result must be make the enterprise benefits from loss, or damage to customer interests.Online payment has been considered to be the biggest bottleneck restricting China's e-commerce development. Recently, the China Internet network information center (CNNIC) issued the 37 times China Internet network development state statistic report(hereinafter referred to as the \"report\"). The report shows that as of December 2015, Chinese netizens to scale up to 688 million people, including number of online users reached 413 million, up to sixty percent. As the number of online shoppers leap, also faces many payment security problems. Currently, the main shopping online payment is available to the payments, bank transfer, pay treasure. Can be finished in a short time after the financial electronic gauge larger touch of money transfer, this makes e-commerce financial business environment with a lot of regional openness and internationalization of payment and settlement system, but settlement risk can be enhanced greatly. Financial organizations and customers need a security system, to ensure the order, payment, bank settlement and other online security of financial transactions, ensure that the interests of all parties. It depends on the network bank is gradually mature.Currently, the most common risk from consumers \"phishing\" illegal infringement. According to statistics, in the first quarter of 2016, 360 mobile guards for users to intercept all kinds of fishing attacks across the country 620 million times, in January 250 million and February 160 million and March 210 million times; The data from 2015, rose 87.9% year-on-year in the first quarter of 330 million times. The false shopping accounted for 9.4%, these \"phishing\" page, domain name similar to the official website of height, and matches by teaser of commodity prices, attract buyers take the bait, causing two lost property buyers.Consumers actually doesn't seem to care about the specific technical implementation, that is to say, he doesn't seem to care about technical risk. And seems to consumers for technology has some kind of innate distrust, it is easy to understand. If you have something is not very understanding, so, you will have some degree of suspicion and mistrust. The safety of consumers are concerned about the deal, it may be the trading for the first time the primary consideration. But even so, also mostly involves privacy, rather than the technology itself. Consumers won't ignore you, in other words, the technology and method, also don't care about the technology and methods of hidden trouble, don't have the time to learn more to explore this issue. He CARES about is the businessman can ensure the safety of its trading companies regardless of what method. Therefore, from the beginning, for consumers, there is no problem of technical questions, or the question is not about the technology itself.电子商务的风险与防范电子商务信用风险是由于网络交易的虚拟化和特殊性,其主体的信用信息不能为对方了解所引发的信用风险。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
电子商务信息安全中英文对照外文翻译文献(文档含英文原文和中文翻译)原文:E-commerce Information Security ProblemsⅠ. IntroductionE-commerce (E-Business) is in open networks, including between enterprises (B2B), business and consumers (B2C) commercial transactions, compared with the traditional business model, e-commerce with efficient, convenient, covered wide range of characteristics and benefits. However, e-commerce open this Internet-based data exchange is great its security vulnerabilities, security is a core e-commerce development constraints and key issues.In this paper, the basic ideas and principles of systems engineering, analyzes the current security threats facing e-commerce, in this based on security technology from the perspective of development trend of e-commerce.Ⅱ. E-commerce modelModern e-commerce technology has focused on the establishment and operation of the network of stores. Network in the department stores and real stores no distinction between structure and function, differences in their function and structure to achieve these methods and the way business operate.Web store from the front view is a special kind of WEB server. WEB site of modern multimedia support and a good interactive feature as the basis for the establishment of this virtual store, so customers can, as in a real supermarket pushing a shopping cart to select goods, and finally in the checkout check out. These online stores also constitute the three pillars of software: catalog, shopping cart and customer checkout. Customers use an electronic currency and transaction must store customers and stores are safe and reliable.Behind the store in the network, enterprises must first have a product storage warehouse and administration; second network to sell products by mail or other delivery channels to customers hands; Third, enterprises should also be responsible for product after-sales service, This service may be through networks, may not. Internet transactions are usually a first Pay the bill and getting goods shopping. For customers, convenience is that the goods purchased will be directly delivered to their home, but hard to feel assured that the goods can not be confirmed until the handsreach into their own hands, what it is.Therefore, the credibility of the store network and service quality is actually the key to the success of e-commerce.Ⅲ.the key to development of electronic commerceE-commerce in the telecommunications network to develop. Therefore, the advanced computer network infrastructure and telecommunications policy easing the development of electronic commerce has become a prerequisite. Currently, telecom services, high prices, limited bandwidth, the service is not timely or not reliable and so the development of e-commerce has become a constraint. Speed up the construction of telecommunications infrastructure, to break the telecommunications market monopoly, introduce competition mechanism to ensure fair competition in the telecommunications business, to promote networking, ensure to provide users with low-cost, high-speed, reliable communications services is a good construction target network environment, but also all of the world common task.E-commerce the most prominent problem is to solve the on-line shopping, trading and clearing of security issues, including the establishment of e-commerce trust between all the main issues, namely the establishment of safety certification system (CA) issues; choose safety standards (such as SET , SSL, PKI, etc.) problems; using encryption and decryption method and encryption strength problems. Establishment of security authentication system which is the key.Online trading and traditional face to face or written transactions in different ways, it is transmitted through the network business information and trade activities. The security of online transactions means:Validity: the validity of the contract to ensure online transactions, to prevent system failure, computer viruses, hacker attacks.Confidentiality: the content of the transaction, both transactions account, the password is not recognized by others and stealing.Integrity: to prevent the formation of unilateral transaction information and modify.Therefore, the e-commerce security system should include: secure and reliable communications network to ensure reliable data transmission integrity, prevent viruses, hackers; electronic signatures and other authentication systems; complete data encryption system and so on.Ⅳ.e-commerce security issues facingAs e-commerce network is the computer-based, it inevitably faces a number of security issues.(1) Information leakPerformance in e-commerce for the leakage of business secrets, including two aspects: the parties are dealing transactions by third parties to steal the contents; transaction to the other party to provide documents used illegal use by third parties.(2) AlteredE-commerce information for business performance in the authenticity and integrity issues. Electronic transaction information in the network transmission process may be others to illegally modify, delete or re-changed, so that information about its authenticity and integrity.(3) IdentificationWithout identification, third-party transactions is likely to fake the identity of parties to a deal breaker, damage the reputation of being counterfeit or stolen by one party to the transaction fake results and so on, for identification, the transaction between the two sides can prevent suspicion situation.(4) Computer virusesComputer virus appeared 10 years, a variety of new virus and its variants rapidly increasing, the emergence of the Internet for the spread of the virus has provided the best medium. Many new viruses directly using the network as its transmission, as well as many viruses spread faster through dried networks, frequently causing billions of dollars in economic losses.(5) HackerWith the spread of a variety of application tools, hackers have been popular, and are not in the past; non-computer expert can not be a hacker. Have kicked Yahoo's mafia boy did not receive any special training, only a few attacks to the users to download software and learn how to use the Internet on a big dry.Ⅴ.e-commerce security and safety factorsEnterprise application security is the most worried about e-commerce, and how to protect the security of e-commerce activities, will remain the core of e-commerce research. As a secure e-commerce system, we must first have a safe, reliable communication network, to ensure that transaction information secure and rapidtransmission; second database server to ensure absolute security against hackers break into networks to steal information. E-commerce security technologies include encryption, authentication technology and e-commerce security protocols, firewall technology.(A), encryption technologyTo ensure the security of data and transactions to prevent fraud, to confirm the true identity of transaction parties, e-commerce to adopt encryption technology, encryption technology is through the use of code or password to protect data security. For encrypted data is called plaintext, specifically through the role of a encryption algorithm, the conversion into cipher text, we will express this change as the cipher text is called encryption, the cipher text by the decryption algorithm to form a clear role in the output of this a process known as decryption. Encryption algorithm known as the key parameters used. The longer the key, the key space is large, traverse the key space the more time spent, the less likely cracked.Encryption technology can be divided into two categories: symmetric encryption and asymmetric encryption. Symmetric encryption to the data encryption standard DES (Data Encryption Standard) algorithm is represented. Asymmetric encryption is usually RSA (Rivets Shamir Aleman) algorithm is represented.(B), authenticationCommonly used security authentication technologies: digital signatures, digital certificates, digital time stamp, CA security authentication technology.(C), hacker protection technologyCurrently, hackers have become the biggest e-commerce security threats, thus preventing hacking network security technology has become the main content, by governments and industry are highly valued. Hacking techniques include buffer overflow attacks, Trojans, port scans, IP fraud, network monitoring, password attacks, and denial of service Dos attacks. At present, people have made many effective anti-hacker technologies, including firewalls, intrusion detection, and network security evaluation techniques.Ⅵ.the future security of e-commerceIncreasingly severe security problems, are growing threat to national and global economic security, governments have been based on efforts in the following areas: (1) Strengthen the legislation, refer to the advanced countries have effective legislation, innovative, e-commerce and improve the protection of the laws againstcyber-crime security system.(2) Establishment of relevant institutions, to take practical measures to combat cyber crime. Development of the law, the implementing agencies should also be used for its relevant laws, which must establish an independent oversight body, such as the executing agency to implement the law.(3) Increase investment in network security technology; improve the level of network security technology. E-commerce security law is the prerequisite and basis for development and secure e-commerce security technology is a means of protection. There are many security issues are technical reasons, it should increase the technology resources, and continuously push forward the development of old technologies and developing new security technology.(4) To encourage enterprises to protect themselves against Internet crime against. To avoid attack, companies can not hold things to chance, must attach great importance to system vulnerabilities, in time to find security holes to install the operating system and server patches, and network security detection equipment should be used regularly scan the network monitoring, develop a set of complete security protection system to enable enterprises to form a system and combined with the comprehensive protection system.(5) To strengthen international cooperation to strengthen global efforts to combat cyber crime. As e-commerce knows no borders, no geographical, it is a completely open area, so the action against cyber crime e-commerce will also be global. This will require Governments to strengthen cooperation, can not have "the saying which goes, regardless of others, cream tile" misconception.(6) To strengthen the network of national safety education, pay attention to the cultivation of outstanding computer.Ⅶ. ConclusionE-commerce in China has developed rapidly in recent years, but the security has not yet established. This has an impact on the development of electronic commerce as a barrier.To this end, we must accelerate the construction of the e-commerce security systems. This will be a comprehensive, systematic project involving the whole society. Specifically, we want legal recognition of electronic communications records of the effectiveness of legal protection for electronic commerce; we should strengthen the research on electronic signatures, to protect e-commerce technology; we need to build e-commerce authentication system as soon as possible, to organize protection for electronic commerce. Moreover, for e-commerce features without borders, we shouldalso strengthen international cooperation, so that e-commerce truly plays its role. Only in this way, we can adapt to the timesPromoting China's economic development; also the only way we can in the economic globalization today, to participate in international competition, and thus gain a competitive advantage.Source: Michael Hecker, Tharam S. Dillon, and Elizabeth Chang IEEE Internet Computing prentice hall publishing, 2002电子商务中的信息安全问题一、引言电子商务(E-Business)是发生在开放网络上的包括企业之间(B2B)、企业和消费者之间(B2C)的商业交易,与传统商务模式相比,电子商务具有高效、便捷、覆盖范围广等特点和优点。