电子商务信息安全中英文对照外文翻译文献

合集下载

电子商务网上购物中英文对照外文翻译文献

电子商务网上购物中英文对照外文翻译文献

中英文对照外文翻译(文档含英文原文和中文翻译)附件1:外文翻译译文网上购物的自由、控制和乐趣网上购物的消费者数量和网上购物的数额正在上升;费雷斯特研究公司估计,今年互联网销售额是去年的20亿倍以上。

相比之下,美国去年的整体零售销售额达13万亿美元。

因此,目前电子商务的销售额仅占零售销售额的1%左右。

专家和学者闷得争执消费者网上消费的百分比的可能上限。

网上消费上限将超过其他直接营销的15%,或者如费雷斯特研究公司所建议的,到2010年占许多零售采购产品类别的1/3.最终,在何种程度上满足购物目标导向和有经验的消费者需求将影响消费者会选择花在每个环境中的美元金额。

虽然许多作家都在鼓吹在线媒体提供交互性和个性化的体验的独特功能,例如,很少有系统的集中于网上购物者真正需要什么,以及为什么他们把网上购物放在第一位清楚的了解什么激发消费者网上购物可以并应告知战略、技术和市场营销的决定,以及网站设计。

那么,什么激发网上购物?在离线的环境中营销人员认识到,消费者不同的消费方式取决于他们用于搜索的动机是否主要是体验(因为好玩)还是目标导向(因为效率高)。

我们的网上客户的研究表明,这两种动机同样可以推广到在线环境。

体验行为特别可能发生在消费者有一个持续的爱好型的兴趣类别中。

收藏家和爱好者享受“惊险的狩猎”一样收藏各种收藏品。

同样,有时间保证和欲望刺激可以引起更多的体验购物行为。

学者们还发现,更高的娱乐性与体验行为比专注于目标的购物引起更积极的情绪、更大的网上购物满意度和更高可能性的购物冲动行为。

目标导向或功利购物已被各种营销学者描述为任务导向的,高效的,合理的和蓄意的。

因此,专注于目标的购物是以交易为导向,希望快速购买他们想要的东西而无需焦急。

零售消费者将功力购买描述为“工作”和评估其努力的成功的条款通常与工作表现相关词汇联系起来,如“成功”“完成”。

重要的是,市场调查公司发现,2/3到4/5的互联网买家从事特定产品的狭义在线搜索。

电子商务外文翻译文献

电子商务外文翻译文献

The Strategic Challenges of E-commerceIntroduction11th Century Europe saw the emergence of credit-based banking systemsand f i n ancial instruments such as bills of exchange. These concepts remain withus, in t heir modified form, to this day (Chown, 1994). They underpin all modernforms of commerce. The arrival of information technology (computers and telecommunications) has raised the prospect of radical change to this traditionalmodel.The rise of the Internet (electronic commerce), since the advent of the World Wide Web, has provided an easy to use communication channel for businesses tocontact current and potential customers. The emergence of the Internet as a general communication channel has also given rise to the possibility of widespread electronic commerce. Even though there is still much debate relating to electronic payment for commercial activities, this is clearly an area of growth.It is difficult to say how large the Internet is. Hoffman & Novak (1996) quotea number of surveys (O'Reilly, FIND/SVP , Times Mirror and CommerceNet) which suggest that there are at least 10 million Internet users in the United States alone.The number of computers (hosts) connected to the Internet topped 9.47 million (Network Wizards, 1996) as of January 1996. Note that a single host supportsanywhere from a single user to, in some cases, thousands of users.As of March 21, 1996, 24,347 firms were listed in Open Market's (1996) directory of "Commercial Services on the Net," and there were 54,800 entries inthe "Companies" directory of the Y ah o Guide to WWW (Y ah o , 1996), with thetotal number of Web sites doubling approximately every two months. Jim Clarke, the chairman of Netscape, estimated the Internet has 40 million users in 1995with growth at 8% per month (Clarke, 1995).The Internet is only one aspect of technology. Businesses require information and supporting systems (processes) to handle the data - over time these systems have become computerised (IT). Modern information technology can both support the processes and help capture useful information for the enterprise. These technologies include:anizational support systems, such as workflow and groupware - making businesses more efficient.2.Customer contact databases - helping capture information about customers and facilitate new methods of marketing.3.Electronic payment systems for g o ds and services - these are emerging, although the majority of payments are still based on relatively expensivetraditional cheque clearance.Collectively and individually, these areas will contribute to major changes inthe way a company conducts its business. Enix have coined the term Workware to describe the combination of these technologies.Figure 1 - The emergence of Electronic Commerce will be underpinned by three key c omponentsHowever, there is still widespread misunderstanding on the value of organisational support technology. A recent survey of 437 large enterprises by research company Xephon (1996) indicated that an astonishing proportion (44%) had no immediate intention of introducing modern information handling systems (Groupware was defined by Xephon as Lotus Notes, Microsoft Exchange and Novell GroupWise). Of these, 65% said they were unsure what these technologies could deliver. From these statistics, it is clear many organisations are still sceptical about the benefits of technology.The efficient collection, utilisation, handling, storage and dissemination of information is a vital component of corporate success in the modern business world. However, the gathering and use of information must take into account issues of privacy and security. A recent feature in the Financial Times (1996) notedthat " … in order to thrive in the 1990s, financial services organisations are as much in the business of managing and manipulating information as managing and making money." Furthermore, the interest shown in topics such as TQM andBPR has demonstrated the importance of processes as a fundamental building block.Inevitably a few savvy organizations in each sector will utilise all three components tochange their market or develop new markets. Those who do notadapt quickly to the new ways of working are likely to be disadvantaged as their strategies become redundant. All businesses should investigate the implicationsof these technologies for them and the markets within which they operate.MarketingChampy, Buday and Nohria (1996) argue that the rise of electronic commerce and the changing consumer processes brought about through electronic communities are likely to lead to a new wave of reengineering, mergers and acquisitions. Moreover, organizations may expand into new business areas, takingon roles unforeseen prior to the rise of the Web. For example: a magazinepublisher, Cond Naste, has moved into the travel business; Bill Gates is now an electronic real estate agent; and a recruitment advertising agency, Bernard Hodes, has now become an electronic recruitment company.The emergence of electronic commerce will significantly impact what we currently call‘m arke ting’.Cle arly,the appearance o f electronic communities (Armstrong and Hagel, 1996) implies that marketing professionals must expand their horizons as the advent of this technology will threaten existing channels of business. Those involved in marketing need to understand the full range o f products and services required b y the electronic community. They must learn totake advantage of the technology that allows customers to move seamlessly from information gathering to completion of a transaction, interacting with the various providers of products and services as necessary. A number of interesting questions are implied:1.What kind of information is available for collection? Is it appropriate to gather this information and for what should it be used?2.Are information systems equipped to capture customer information and transactions, making it available for later analysis?3.When dealing with electronic communities, do marketing profe s ionals comprehend the differences? One needs to engage t he customer as part of thetransaction rather than blindly mailing targets.This idea of community has been at the heart of the Internet since its origins as a defence and academic computer network although most communities arestill not particularly oriented toward commerce. However, the World Wide Webhas changed and broadened the nature of the Internet and the way in which commercial transactions are conducted. The CEO of Kodak is alleged to haverem arked that he co uld n’t tell if the Kod ak Web site was a m one y ma ker.But heknew it was important because it was the most personal way of selling since doorto d oo r sale sm e n,o n ly no w the custo m e rs we re kno ckin g o n Ko d ak’s d o o r.Armstrong and Hagel propose four types of non-exclusive electronic communities, those: interested in transactions; sharing common interests; indulging in fantasy games; and with a shared life experience. The busine s opportunity is for those who support and interact with these communities, building customer loyalty on an ongoing basis. By satisfying the requirements ofrelational marketing and transactions, companies may gain important insightsinto their customers’ nature and needs. For example, a baby products company could entice customers to order items from an associated on-line catalogue by providing bulletin boards for new parents.The desire to establish long-term customer relationships with increasingly sophisticated demands has led companies to seek new ways of acquiring,managing and utilising customer information (Peters and Fletcher, 1995).Furthermore, advances in information technology have fundamentally alteredthe channels through which companies and customers maintain their relationships. The capacity to obtain and apply customer information within processes has become a key strategic issue. This often places the company in the position of requiring sensitive personal information from customers.Gummesson (1987, 1994, 1995) views marketing as a set of relationships, networks and interactions and lists 30Rs (relationships) in contrast to McCarthy’s(1981) 4Ps (Product, Price, Place & Promotion). Gummesson highlights the fact that the electronic relationship is not discussed in the marketing literature even though it is practised widely by many businesses. Helinks relationship marketing to the imaginary (similar to a virtual or network) organisation. He argues that by increasingly applying IT, more relationships are established. They create a new type of bond to customers and between employees.The electronic relationship extends beyond the bounds of the organisationinto the market as seen in the example of airline, hotel and car rental reservation systems. Thecommunities established have a re-enforcing effect. These insightsforce us to re-examine traditional theories of economics, systems, organisations, marketing, competition and transaction cost analysis. As the boundaries betweenfirms and markets dissolve, a characteristic of relationship marketing and network organisations, a new image of interaction and business is needed.The importance of information exchange in relationship marketing (particularly using an electronic channel) requires a clear understanding and recognition of the potential problems. Privacy is also an issue - what is private changes from one person to another as well as between different cultures. Those who use the Internet are likely to be better educated and less willing to give information, unless they trust the recipient. Companies need to realise that the only reason they hold information on a customer is because they have a relationship with that customer - something which is not transferable. Those using electronic channels to reach customers are likely to target better educatedand more affluent customers. They need, therefore, to ensure that their customer information systems are appropriate.An understanding of the trust building process is also required. Firms need tomake a feature of their trustworthiness (a unique selling point!). Trust is best developed through processes. Processes tend to be customer facing - within each customer interaction trust is built-up or eroded. Companies must be absolutely clear about the value and intended use of information. Collecting information because it is technically possible (and one day might be useful) is likely to weakentrust development.Hoffman and Novak (1996) assert that the Web heralds an evolution in marketing concepts. In order for marketing efforts to succeed in this new medium, a new business paradigm is required in which the marketing function is reconstructed to facilitate electronic commerce in the emerging electronic society underlying the Web.The "many or any" communication model of the Web (in fact many instancesof many-to-one) turns traditional principles of mass media advertising inside out (a one-to-many model) (Hoffman and Novak, 1994). The application of advertising approaches which assume a passive, captive consumer are redundant on the W eb.Surprisingly, as it is currently evolving, there is little activity aimed at including the consumer in the development of emerging media (Dennis & Pease, 1994). In order to adopt a market orientation, firms must understand their customers and engage in consumer research. Potential customers are most effectively engaged through new conversational marketing approaches.Anecdotal evidence suggests there are two types of customers -‘convenienc e shoppers’and‘explorers’(those str-e s e m tart consum ers whoare happy to surf the Web looking for the best deal or most appropriate product combination). Furthermore, the sheer size of the Web (trillions of documents and growing exponentially) means finding relevant information is becoming moreand more difficult - despite the best efforts of search engines such as Yahoo. Our research suggests that the large proportion of Web users would rather rely on an intermediary (community operator) to sift and select information on their behalf.Web sites not endorsed will require knowledge of the address (URL) and are unlikely to be accessed when similar information, products or services are readily available inside the community.Contributing to the rise of intermediaries are associated issues of privacy,trust andsecurity (Schell, 1996). Whilst there is much discussion on theissues ofInternet privacy and security, in the context of normal business activities, many millions of people trust others with their personal financial information. Examples include ordering over the telephone, passing a credit card to an unknown waiter, even signing direct debit mandates. If an error occurs in these types of transactions we trust the service provider to correct the error. So why is it that weexpect the Internet to support a level of trust and security which we do not observe in everyday life?There is no reason why similar trust relationships cannot be established in electronically mediated discussions. If anything, it becomes easier for an individual (or group of individuals) to seek retribution on those that break therules within an electronic c ommunity. Evidence of this can be found in the tendency to attack those that try to advertise on academic discussion groups(mail bombs) and community policing against pornographers in the Netherlands.Marketeers must reconstruct their advertising models for the interactive, consumer controlled medium. The traditional customer loyalty ladder (Suspect, Prospect, Customer, Client, Partner, Advocate) is still applicable, but now operatesin a different fashion. The first three stages are often instantaneous in electronic commerce. The transition from customer to advocate relies on loyalty earned through trust. The instantaneous nature of the Internet makes this more difficult.Communicating Across The Value ChainIt should be recognized that processes are not confined within one organization - they cross the value chain as demonstrated by the following example. Steinfield, et al (1995) describe a large, multinational, electrical appliance and consumer electronics manufacturer that used France Te le com’s Telnet system to support EDI-like c onnections to approximately 10,000 separateretailers and independent service engineers throughout France (accessed through Minitel terminals). The ubiquitous Telnet service and the commercial applications which emergedto exploit it, provide insights into the developmentof commerce on a world-wide Internet.The after-sales service subsidiary of this manufacturer provided replacement parts and training to its widely dispersed customer base. The Telnet system permitted electronic transactions, even with the smallest trading partners. Through the use of on-line ordering, coupled with courier service for rapiddelivery, the firm was able to eliminate regional parts warehouses and reduce the average repair time from two weeks to two days. In the past, service engineers waited until they had a sufficient need for parts before driving to a regional warehouse. Once the system was implemented, they used the Telnet based "just-in-time" stocking practice for replacement parts.Moving to a centralised warehouse reduced the need for replicated inventories and extra personnel around the country, creating substantial savings. Moreover, service engineers were further bound-in following the introductionofa revenue producing, expert system-based, training application. Technicians connected to the expert system which asked a series of questions designed to diagnose the fault and indicate the repairs needed.。

网络购物行为分析中英文对照外文翻译文献

网络购物行为分析中英文对照外文翻译文献

网络购物行为分析中英文对照外文翻译文献(文档含英文原文和中文翻译)The network shopping behavior analysisAbstractThe thesis analyzes the current situation of online shopping in China. It offers a further analysis to its advantages, and disadvantages, gives solutions to the problems, gives a deep analysis of the benefits it brings to both producer and consumer and make people be more confident with the promising prospect of online shopping in china. It systematically illustrates the exiting problems of online shopping in china from a different view attached with exactly figures and vivid examples. At the same time, it gives relevant resolutions to the existing problems. It includes personal information safety, online payment, logistics, and a series of relevant law problems. The thesis chooses the authentic English materials which gave me a valuable guide and instruction; meanwhile, it has also been attached with specific figures so that people can understand them easily.Key words: Online shopping marketing research logistics service online payment distribution1. IntroductionWith the rapid development of Internet, online shopping has gradually entered the lives of ordinary people. And with the rapid development of Internet in China, more and more Chinese begin to favor online shopping for its convenience, quick delivery and benefit. According to the latest statistics released by China Internet Network Information Centre (CNNIC), the number of netizen in China has hit 87 million, and 7.3 percent said they had the experience of online shopping. Meanwhile, the statistics also showed that 58 percent of netizen in China would try the online shopping next year.Online shopping, in a narrow sense, can be understood as getting online information and inking online deals. In a broad sense, however, once one section of shopping is finished online, it can be regarded as online shopping. In that way, traditional or burgeoning online enterprises may seek a combination, mingling two modes' advantages.The percentage of online shopping in China is growing year on year. According to the experts' prediction, the total volume of China's online shopping is expected to reach 28 billion Yuan in years to come.2. Advantages of the online shopping2.1 Benefits to consumers2.1.1 Saving time and convenienceOnline shopping is becoming popularity ,not only because the great convenience ,but also you can find a shop with so many goods that you may favor. And it also saves your a great some of time ! You can just typing-in the key word of what you want to find , the target will appear on the screen quickly .The online shopping industry has grown a lot in the recent year, and millions of people prefer to buy from the large variety from the online stores than to waste time at the long lines from supermarkets. Furthermore, the online shopping industry keeps growing, and more and more products are made available online. You can now find everything from CD to fruits and books, and you can purchase the items you want just with a few clicks.After you've done some online shopping you'll see how easy it is and you'll quickly get used to it. Soon you will know what the best shopping websites are and you will be able to buy the things you need very easy and fast, saving a lot of time and trouble. Online shopping is the most practical, economical and fun method of shopping, that is perfect for everyone."Online payment provides a more convenient way for consumers who don't carry cash."Beijing resident Ding Xin(丁欣)in her late 20s bought a bottle of perfume online last month."I often browse the websites of online shops because the goods have more attractive prices," she said.With the fast development of the society, the rhythm of life is accelerated progressively, the traffic jam changes crowd gradually, people are unwilling to spend much time to go shopping, and network marketing is accepted by consumers for it’s convenient characteristic Consumers can select the goods at home without going out , with the help of strong database, the shopping course is simplified to an action of " click ", consumers can finish doing shopping at any time, with the appointment of a place to deliver goods.About 41.8 per cent of all online shopping payments are handled over the Internet, the survey shows. And 43.2 per cent of online shopping payments are handled via money remittance personnel and 34.7 per cent are completed in person, the survey shows.2.1.2 Customization and personalizationOnline shopping can provide mass customization and personalization with moderate cost. Point cast, for example, delivers customized news and financial data toevery single customer based on his or her specific needs. displays specific recommendations based on the customer’s previous purchases. These kinds of services are very expensive in traditional marketing .The web providing online shopping can move from providing general products or services customized to a customer’s needs, tastes, and preferences.2.1.3 Access to more informationOne important consumer benefit associated with marketing on the web is the access to greater amounts of dynamic information to support queries for consumer decision-making. Furthermore, the interactive nature of the web and the hypertext environment allow deep, non-liner searches initiated and controlled by customers. Hence marketing communication on the web is more consumer-driven than those provided by traditional media. In addition, recreational uses of the medium manifested in the form of non-directed search behavior are such an important benefit to consumers that they are intrinsically motivated to use the medium.2.1.4 Easier market research and comparisonThe ability of the web to access, analyze and control large quantities of specialized data can enable comparison shopping and spread the process of finding line which may stimulate purchase. There is also the potential of wider availability of hard-to- find products and wider selection of items due to the width and efficiency of the channel.2.2 Benefits to the firms2.2.1 Lower costs and pricesIncreased competition in procurement as more suppliers are able to compete in an electronically open market place causes a greater competition, which naturallylowers prices and costs. This increase in competition leads to better quality and variety of goods through expanded markets and the ability to produce customized goods. One of the reasons to lower cost is that they haven’t traditional warehouses and retail shops in the retailing business of the great majority in the commercial city online. Generally speaking, the network does not have a traditional retail channel to sell. For example like , the online retailing bookshop with no stock of books, places an order with bookseller and sends to consumers directly which aims to realize real " zero stock " to lower cost.2.2.2 Better distributionFirm benefits arise partly from the use of the web as a distribution channel. First, the web potentially offers certain classes of providers and opportunity of participating in a market in which distribution costs or cost-of-sales shrink to zero. This is most likely for product categories. For example, digital products can be delivered immediately and hence such businesses may encounter massive disintermediation or even the eventually elimination of middleman. Moreover buyers and sellers can access and contact each other directly, potentially eliminating some of the marketing cost and constraints imposed by such interactions in the terrestrial world. This may also have the effect of shrinking the channel and making distribution much more efficient (mainly due to reduced overhead costs through such outcomes as uniformity, automation and large-scale integration of management processes). Time to complete business transaction may be reduced as well, translating into additional efficiencies for the firm. However, such potential efficiencies must be tempered with market realities.2.2.3 Marketing communicationWeb sites are available on demand to consumers 24 hours a day. The interactive nature of the medium can be used by marketers to hold the attention of the consumer by engaging the consumer in an asynchronous “dialogue” that occurs at both parties’ convenience. This capability of the medium offers unprecedented opportunities to tailor communications precisely to individual customers, allowing individual consumers to request as much information as desired.Further, it allows the marketer to obtain relevant information from customers for the purpose of serving them more effectively in the future. The simplestimplementations involve engaging customers through the use of the E-mail buttons located strategically on the site. More sophisticated implementations may involve fill-out forms and other incentives designed to engage customers in ongoing relationships with the firm. The objective of such continuous relationship building is dual- pronged: to give consumers information about the firm and its offers and to receive information from consumers about their needs with respect to such offerings.3. Limitations of online shoppingDespite the prospects is optimistic, a shortage in types of online payment, lagging logistics and lack of relevant laws are just some of the problems which continue to hinder the development of online shopping.3.1 Online paymentOnline payment plays a key role in e-commerce, and a safe, convenient, and efficient online payment system is essential. However, safety authentication, one of the main factors of online payment system, is inadequate in China.Online shopping is information technology ---based business , which makes the trade between consumers and firms online through the internet . The two sides from time and space limitation , thus not only greatly expand its network of consumers and firms online on the opportunities of commodities trading , but also greatly reduce the cost of commodities trading. However there are still a number of factors influence the development of online shopping in China .1.Security .Security issues is the biggest problem that have hindered the development of online shopping . Although the existing methods Alipay online shopping played a good role, but it is only a substitute in the period of electronic payments . It has obvious defects on security of electronic payments and real-time of financial flows , which can not fully meet the financial electronic requirements.2.Taxation .With the rapid development of online shopping and online shopping as paperless, no site-based, intangible, unbounded, virtual and electronic payments, etc. to make the work difficult to carry out effectively, there has been a series of loopholesin tax administration led to the draining away of tax chargeable caused enormous economic losses to the state. As for the traditional legal system and tax collection management , it is difficult to resolve tax and related issues online shopping . However there is no clear policy for online shopping recently in China .3.Protection of the interests of consumers .In online shopping activities, there is a shortage of face to face communication , the transaction has a large uncertainty. The buyer gets the goods information through the network. Some unscrupulous Internet companies know consumers can not see the real goods and they can’t see each other , in order to reap huge profits, manufacturing counterfeit products. Therefore, the public generally feel online shopping is not intuitive, secure, they don’t believe the network's "rhetoric". The result is caused to the development of online shopping has a large obstacle . Online shopping is also a vacuum of after-sale security, some problem often arise that customers don’t know who to look for . Thus, in recent years online trading complaints are significant increase. In addition, the delivery time is not accurate . The development of shopping depends on a strong logistics system. But in our country, so far still lack a systematic national freight distribution business. Inadequate logistics infrastructure, third-party logistics services developed slowly, that all hampered the development of online shopping.Although many banks have already set up their own financial authentication center, there lacks a notified and authoritative nationwide authentication center, leading to many cases of cross authentication, repeated authentication and a waste of resources.3.2 Logistics serviceSecond is the limitation in the logistics system. Present from the perspective of the development of the logistics, the logistics of electronic commerce have following problems: the weak link at logistics infrastructure, it has n’t high ly specialization, the third party logistics ineffective work , limited services, that all impact the logistics, logistics have a flavor of planned economy color, from the perspective of logistics activities, our main problems is the development of immature distribution center, a small range of logistics activities, logistics alliance is not high, the low level oflogistics technology, information system applications still closed .Among the corporations providing logistic services for online shopping in China, some 1,000 are traditional ones and their service quality is not good enough; therefore, the need to provide a speedy transaction and delivery regardless of space and distance can hardly be fulfilled.3.3 Legal problems and public-social policiesThe laws and regulations are imperfect. Online shopping, as a new commercial activity, brings unavoidable a series of legal problems, such as the electronic contract, the legal effect question of signing in figure, an economic dispute question of the online trade, computer crime question, etc.There are a number of questions concerning marketing through the web: validity of an electronic signature, legality of an electronic contract, risk, trademarks, loss of right to trade secrets and liabilit y. There are also government’s rules, regulations, economic policies and censorship.Besides, due to the lack of legal protection in this field, arbitration and liability cognizance are difficult when disputes arise. In addition, the efficiency of online payment in China is still low: payment validation from the bank takes a long time (about 10 days), the charge is too high (5 per cent service fee of credit cards transaction), and there are too many restrictions. All these hinder the development of e-commerce in China.4. Solutions to the problems4.1 Establishing a good payment mechanismConsistent with Phoneme Institute's other Privacy Trust studies, the biggest fear consumers have is identity theft (82%), followed by unauthorized access to their bank accounts and telemarketing abuse. Eighty percent of respondents said that the privacy of their personal information is very important or important to them.Based on these findings, banks should concentrate strength on solving the security encryption of the online shopping system, authentication, key technology problem on payment, etc., technically, banks should not only prevent mischief anddestruction to the network of computer by virus and hacker, but also guarantee national benefit and commercial rights and interests and secret of enterprises .At the same time the bank should make breakthrough in trade account settlement and cash allocation between different banks or different regions in order to meet the development demand of network marketingAt the same time, banks should address the online security of their Web sites and provide information about the measures customers can take to protect their financial assets. Banks should clearly communicate their commitment to protecting the privacy of their customers and provide information on how consumers can contact the bank with questions or concerns.Respondents were also asked to suggest actions their bank could take to increase confidence in its ability to protect personal information. The most important issue with online consumers is setting limits on the sharing of personal information with third parties. This finding is also consistent with the results of our 2005 Online Consumer Permissions Study. According to that study, consumers want control over their online experience.The rewards from listening to and respecting the concerns of online consumers can lead to greater trust. And, in the world of online banking, trust is positively related to consumer acceptance and greater use of online banking services.4.2 Improving the lagging logisticsLogistics is defined as a business planning framework for the management of material, service, information, and capital flows .It includes the increasingly complex information, communication and control systems required in today’s business environment.The allocate-and-deliver system of logistics should be perfected. The network marketing has offered internal motive force and external demand to the variety and dispersiveness of the allocate-and-deliver demand and the reform of resources in logistic enterprises. It is urgent to establish a nationwide allocate-and-deliver system, which covers both the urban and rural areas to be accorded to the demand of allocate-and-deliver system of network marketing. Logistic enterprise should not only deliver goods, but also become the service supplier to customer finally to help enterprises to finish the after-sales service, to offer more appreciated service contents,for example, to follow the products order, to offer selling statistics and report form, etc., to further increase the kernel service value of enterprises. In addition, they can develop the third-party-logistics, unify manufacturer service thus to optimize the logistics deliver network, and then the cost of allocate-and-deliver service will be reduced.4.3 Making relevant lawsThe research and formulation of strengthening the laws and regulations to offer the favorable external environment for development of marketing of the network, in order to protect the development of network marketing, developing relevant network management by centering the marketing of the networks, the information safety, settle account in finance, such problems as intellectual property protection, etc., at the same time they should accelerate the modification paces of the current laws and regulations , make and issue the new trade regulation at the same timeThey need not only make the relevant laws, but also strengthen the government’s management the management of government except making the relevant laws.Facing the opportunities and challenges in global development of online shopping, the Chinese government has placed online shopping high on the agenda in its basic economic construction.The key task at present is to establish a unified application and service platform with Chinese characteristics. Upon its completion, currently complicated online shopping can be turned into a simple platform operation, and an advanced service mechanism and infrastructure can be set up, which will facilitate the establishment of a new economic model for e-commerce in traditional enterprises.The government should take an active role in encouraging and supporting the Internationalization of traditional corporations. Besides, it also emphasized the business nature of online shopping, and warned that online shopping activities cannot be done by simply building networks.5. ConclusionThe main advantage of online shopping is that it allows people to browse through many items and categories without leaving their house, to compare the prices of as many shops as they want, and also to order as many items as they can afford without having to worry about how they will transport them, because the online shopping websites also deliver the things to the buyer's home. Furthermore, the Internet is open 24 hours a day, 365 days a year, so you don't have to hurry or worry about finding a parking spot.A new survey shows Internet shopping is increasing thanks to improvements of online payment systems and delivery services. The China Internet Network Information Centre survey reveals 17.9 per cent of consumers shop online often.Among those who have never purchased online, 63.7 per cent said they would convert to online shopping in the future, which means the existence of greater potential market.Online shopping has very bright prospect in china. By the end of 2004, the netizen of Chinese Internet users is 94 million. It is estimated by 2007, Chinese Internet user will reach 140 million. The one faster than this speed is the development of user's number of China's online shopping. It is that 5,630,000 will use users in 2004. It is estimated by 2007, this figure will be up to 16 million, online shopping users will be 3 times those of 2004 in 2007, 28 times those of 2001. In addition, the market scale of online shopping increase by 160% in 2004, the turnover rises to 4,500 million RMB by a wide margin. In 2007 this figure is hopeful to be up to 29,600 million RMB, 6 times those of 2004. In the face of more and more users, in the face of such a big market, I think nobody dares to neglect this market; nobody bets and speaks NO to this market.References1.Hu Chunlan (Hu, Chunlan). New economic English [M]. Tsinghua university press, 20042.Zhang Qingying (Zhang Qingying). Logistics engineering English [M]. Chemical industry press, 20033.ZhuangPeiJun (Zhuang Peijun). Logistics professional English [M]. Electronic industry press, 20034. The fourth one (Ding Mingyi.) enterprise electronic commerce foundation [M]. Electronic industry press, 20025. NiJin (Ni Jin). The wto English [M]. Southeast university press, 2001网络购物行为分析摘要此文从对我国目前网上购物的现实状况入手,深入的分析了网上购物的优,缺点,以及解决的方法等一系列的问题,深入的分析了网上购物给商家和消费者双方带来的利益,使人们对网上购物在中国的发展充满信心。

电子商务安全外国文献翻译

电子商务安全外国文献翻译

英文翻译*名:**学号:**********指导教师:***专业:电子商务(文)班级:电子商务0903班时间:2013年4月24日电子商务系电子商务系英文翻译评价表英文原文Issues of Security and Privacy in Electronic CommercePart I ---- Introduction & MotivationPeixian LIIntroductionSince the invention of the World Wide Web (WWW) in 1989, Internet-based electronic commerce has been transformed from a mere idea into reality. Consumers browse through catalogues, searching for best offers, order goods, and pay them electronically. Information services can be subscribed online, and many newspapers and scientific journals are even readable via the Internet. Most financial institutions have some sort of online presence, allowing their customers to access and manage their accounts, make financial transactions, trade stocks, and so forth. Electronic mails are exchanged within and between enterprises, and often already replace fax copies. Soon there is arguably no enterprise left that has no Internet presence, if only for advertisement reasons. In early 1998 more than 2 million web servers were connected to the Internet, and more than 300 million host computers. And even if actual Internet business is still marginal: the expectations are high. For instance, Anderson consulting predicts Internet business to grow from $10 billion in 1998 to $500 billion in 2002.Thus, doing some electronic business on the Internet is already an easy task. As is cheating and snooping. Several reasons contribute to this insecurity: The Internet does not offer much security per-se. Eavesdropping and acting under false identity is simple. Stealing data is undetectable in most cases. Popular PC operating systems offer little or no security against virus or other malicious software, which means that users cannot even trust the information displayed on their own screens. At the same time, user awareness for security risks is threateningly low.A report from Goldman, Sachs & Conotes that while commercial properties such as Yahoo! and eBay receive a lot of attention from investors, business to business ECommerce is on the verge of exponential growth. The report predicts that ECommerce will be worth USD1.5 trillion by 2004. However, according to a survey by Net Effect Systems, while 94 percent of online consumers use the Internet to shop, just 10 percent say they prefer to buy things online. 74 percent of consumers cited security and privacy concerns.Therefore, if the security and privacy problems are addressed e-shoppers will be converted intoe-buyers, and the ECommerce will be pushed a big step forward.Non-technical Issues1. Security AwarenessMost opinion surveys list "insecurity of financial transactions" and "loss of privacy" among the major impediments to electronic commerce, but in fact most users have only ague ideas about the threats and risks, and a very limited understanding of the technical and legal options for minimizing their risk. As a result all kinds of misperceptions exist.For instance, the cardholder's risk in sending his or her credit card number over the Internet is typically overestimated. At least as of this writing payments over the Internet are treated like mail-order/telephone-order transactions, which means that the cardholder is not liable at all. All risk is with the merchant.On the other hand, the risks in sending sensitive data in an electronic mail are typically underestimated. Probably most users of email know the mere facts: neither confidentiality nor integrity nor availability is guaranteed. But nevertheless many users do not hesitate to send all kind of very personal and sensitive data to their friends or colleagues, unprotected.Unfortunately, developers of electronic commerce solutions are often as security unaware and ignorant as their prospective users. For instance, still many developers demand that security must be provided by "lower layers" in a "transparent" way. But, for instance, Secure Socket Layer (SSL) in an "opaque socket integration" does not make any sense in most case. Security has to be an integral part of the architecture, design, and implementation.2. Crypto RegulationsSeveral countries regulate the deployment of strong encryption technology by law. For instance, France controls the domestic use of encryption technology, in order to maintain the capability to eavesdrop on the communication of criminals. The USA prohibits the export of strong encryption products for the mass market, for the same reasons as it controls the export of munitions.Such regulations do not discriminate between “good” and “bad” applications, and limit the security of honest citizens and companies to at least the same extent as they limit the security of terrorists and organized crime. Therefore several governments, in particular the US administration, are willing to relax their crypto regulations, provided access to the encrypted information would still be possible on demand. The idea is to introduce new “Trusted Third Parties” where secret keys must either be escrowed in advance, or can be recovered afterwards.All these proposals are still heavily contested, for various technical and political reasons: The Trusted Third Parties would be “single points of failure” for everybody’s, i.e., new and extremelyattractive targets for attacks. It is questionable whether any regulation of encryption technology can be effective in fighting organized crime: tools for strong encryption are publicly available, and steganographic techniques can perfectly conceal the fact that cryptographic techniques are applied.Many types of commercial transactions require strong confidentiality, which cannot be satisfied in some countries, or across some borders. For instance, consider two large companies that prepare a merger. Clearly their negotiations require top confidentiality. Even the fact that they are preparing the merger, i.e., that they acre communicating intensively, will be extremely sensitive. This requires actually services for anonymous communication. Nevertheless using the appropriate cryptographic tools would be illegal in many countries.Political regulations are not subject to scientific research. But we clearly see the need for an international agreement on a more liberal and consistent regulation of cryptography. Electronic commerce demands strong confidentiality, which can be implemented only by strong encryption schemes.3. Legal IssuesSurveying the open legal problems in electronic commerce is beyond the scope of this article. The two most important security-related problems are the following:•Liability: The financial risk of a user in a specific transaction depends on his or her liability. In principle, if a user bears no liability, there is no risk.The main issue here is fairness: The liability of a user should correspond to the security of his or her technical equipment. For instance, if it is technically trivial to forge the digital signature of a user then this party should not be held liable for his or her signatures, in general.•Harmonization: The national laws that regulate electronic commerce over the Internet (like evidential value of digital signatures, consumer protection, copyright protection) are notharmonized, and are partially contradictory. One side result is that there is no mutual recognition between national PKIs, even where comparable laws exist.Technical Components of eCommerce SecurityThere are four components involved in ECommerce Security: client software, server software, the server operating system, and the network transport. Each component has its own set of issues and challenges associated with securing them:•Client software is becoming increasingly more security-focused, however single-user desktop operating systems historically have had no security features implemented. ECommerce software that relies on the security of the desktop operating system is easily compromised without theenforcement of strict physical controls.•Server software is constantly under test and attack by the user community. Although there have been cases of insecurities, a system administrator keeping up with the latest patches and vendor information can provide a high degree of confidence in the security of the server itself.•Operating systems used for hosting ECommerce servers are securable, but rarely shipped from the vendor in a default configuration that are secure. ECommerce servers must protect thedatabase of customer information accumulating on the server as well as provide security while the server is handling a transaction. If it is easier for a thief to compromise the server to obtain credit card numbers, why bother sniffing the network for individual credit card numbers?•Session transport between the client and server uses network protocols that may have little or no built-in security. In addition, networking protocols such as TCP/IP were not designed to haveconfidentiality or authentication capabilities.Why No Unified Standard MethodThe methods and models of securing ECommerce transactions are as diverse as the transactions themselves. ECommerce transactions are performed with varying levels of security, from sending requests in the clear, to encrypted password protection, to using digital certificates.So why not simplify things by implementing one standard method for securing ECommerce transactions? The problem with creating one standard solution is that there are different and sometimes conflicting goals in securing a transaction. The objectives of the merchant may not be the same as those of the user or bank. The merchant, for example, requires a valid transaction, liability coverage, and payment for goods and services. The user would like to purchase a product, protect privacy (name, address, and payment information), and pay for only the products they have agreed to purchase. The institutions providing payment would like to detect and prevent fraud. Many security solutions address one or more of these security goals—but where one solution may focus on providing privacy, another may focus only on transaction validation.In addition to the differences in security goals, vendors and governments introduce complications into selecting security standards for ECommerce. Vendors disagree on implementations and try to push their own products into standards. National governments try to limit and control use of encryption to secure ECommerce transactions. One of the benefits of ECommerce is that it allows a small company to distribute and sell products globally. But national laws and regulations can dilute the standards to the lowest common denominator.Issues of Security and Privacy in Electronic CommercePart II ---- State-of-the-art ReportPeixian LICryptography & Pretty Good Privacy (PGP)1. The need for cryptography in electronic communicationsCryptography has been around for centuries; as long as there has been communication, there has been the need for privacy and safe, secure methods of transmission. Although many types of difficult problems can be classified as cryptography problems, what we are mostly concerned with today is the ability to keep transmissions private through the use of data encryption techniques. This has become an even greater issue due to the changing nature of communications since the information revolution. More and more people rely on electronic communications for the transmission of sensitive or personal data; e-mail, e-commerce, FTP, and HTML are all examples of technology that have already filtered into the social consciousness as primary ways for disseminating and gathering information and for exchanging goods and services. While this technological shift has made communication faster, easier, and better in many ways, it has also brought along with it a whole host of difficult problems and social policy issues.The main problem that comes with electronic communications is the ease with which transmissions can be eavesdropped or impersonated. Paper communications obviously have security problems as well: documents can be stolen, steamed open, have forged signatures or changed contents. However, if someone is trying to catch a specific transmission (or type of communication), it is much easier when dealing with an electronic medium. It is a trivial matter for people to set up programs that systematically scan e-mail for keywords, or that sniff packets in a Telnet session for passwords, whereas randomly steaming open mass quantities of paper mail looking for a certain document is clearly infeasible. Also, since there can be (and often are) multiple copies of any given electronic transmission, it is difficult to know if someone has stolen a copy or somehow altered the original.Secondly, there is an access control problem. Many electronic transmissions are made in a broadcast manner, as seen with cable or satellite television and wireless phones. People can install devices to intercept these transmissions, and senders usually have no way to either monitor or stop this. In order to prevent unwanted people from making free use of their services, senders must encrypt their outgoing transmissions. To their paying customers, they can give special devices to decrypt the information.Finally, there is the problem of authentication: electronic communications are impersonal, and can be easily forged by impersonating IP addresses, changing "sender fields" in e-mail, "cloning" cellular phone numbers, and so forth. In order for people to want to - and, indeed, be able to - use electronic communication in the coming years, it is essential that these problems be resolved. Right now, advances in cryptography are the best way to address these issues. Data encryption not only provides privacy and access control by rendering communications illegible to unauthorized parties; it can provide effective authentication as well through the use of digital signatures and timestamps.2. The primary forms of cryptographyThere are two main forms of cryptography: secret-key (or symmetric) and public-key (or asymmetric).Secret-key cryptographySecret-key cryptography is the more traditional form, and has been used for all kinds of communications throughout the ages. In this method, one "key" is used to both encrypt and decrypt the data. A key can be anything from a secret-decoder ring found in a cereal box to a highly complex mathematical algorithm; keys really only differ in the ease with which they can be broken by third parties. In secret-key cryptography, the sender and receiver must have the same key in order for the transmission to work correctly.Secret-key cryptography suffers from two overwhelming problems. First, any two people that want to communicate with each other must first agree on the key to use. This makes it more difficult to send information to people that you do not already know, and large-scale communication becomes much more difficult. The second, more fundamental, problem is that of "key management", which is the system for transmission and storage of keys. In order to agree on a key, there must first be some sort of communication that occurs, and this communication itself can be eavesdropped. If some third party catches the key that is being used, then all further communications between the two parties are no longer secure and private. Also, the third party could easily impersonate communications because it is believed that no one else knows the key. This problem is exacerbated by the fact that the initial parties might have no way of knowing that the key was stolen. This key management issue causes a "repudiation problem": later on, either of the parties could repudiate messages that had been sent with secret-key encryption, claiming that the key had been stolen and that the messages were compromised or faked. Thus, there is always an inherent lack of security and trust in a purely secret-key environment.Public-key cryptographyThe key management problem inherent to secret-key cryptography needed to be addressed in order for large-scale, secure use of data encryption techniques. In 1976, Whitfield Diffie, a cryptographer and privacy advocate, and Martin Hellman, an electrical engineer, working together discovered the concept of public-key encryption. Instead of having one key shared among both users of an encrypted transmission, each user has his or her own public/private key pair. A user makes the public key open and available to anyone (by publishing it on-line or registering it with a public key server), and keeps the private key hidden away where (hopefully) no one can get at it. The private key is mathematicallyderived from the public key, and thus the two are linked together. In order to send someone a message, the sender encrypts the transmission with the receiver's public key. This can then only be decrypted by the receiver's private key. Thus, anyone can encrypt a message with someone else's public key, but only that person would ever be able to read it.This method solves the problems of secret-key cryptography. Because the only key information that needs to be shared is made public, there is no worry about some third party intercepting and possessing the key. This makes the users of the encryption surer that their transmissions are secure and private. It also solves the repudiation problem, because there is no third party that could ever be blamed - each individual is responsible for safeguarding his or her own private key.The inherent weakness of the public-key method is that the two keys are linked together mathematically. If a third party figures out the exact way that an individual's private key is derived from his or her public key, the whole security of the system will be lost. The only way around this liability (so far) has been to make the derivation so incredibly complex that a brute force attempt to crack it would take a prohibitively long amount of time. As Phil Zimmerman, author of the Pretty Good Policy (PGP) public-key encryption package says of his software: "if they [the NSA] are just having to use methods that are not too much shorter than what we know in published academic literature, then it could be from now until the next ice age before they can break it." It is easy to see that the quality of the method used to create keys is essential to the success of any public-key system.Digital signaturesPublic-key also provides a mechanism for authenticating messages that secret-key techniques do not: digital signatures. The sender of a message completes a calculation (performed by a hash function) involving the actual file structure to be transmitted, and his or her private key, and the result of this (the digital signature itself) is appended to the end of the transmission. The receiver can then perform a calculation involving the received message and the sender's public key, and if everything is valid, the sender's identity will have been verified. A benefit of this signature method is that it not only verifies the sender's identity; it also verifies that the original contents of the transmission have not been alteredin anyway. Because the signature is derived from both the key and the data itself, changing the data later on will cause the receiver's verification to fail. This provides authentication that is even better than a signature on a paper document: a signature can be forged, or the contents of the document could somehow be secretly altered, but with public-key authentication, this cannot be done.Comparison of cryptography methodsClearly, public-key systems have the advantage in terms of security and privacy, due to a key management strategy that is inherently more secure. They are also more convenient because there is no extra step necessary to decide on a common key, and the sender does not have to communicate with the receiver prior to the actual transmission. This is an advantage when people who do not actually know each other want to communicate, and when an individual wants to disseminate information on a large scale. Furthermore, public-key systems provide an extra layer of authentication, via the digitalsignatures, that is missing in secret-key systems; this property of non-repudiation is essential, especially when dealing with transmissions of a critical nature.The primary disadvantage of public-key systems is the fact that they are slower, due to the extra steps involved in the encryption/decryption process. One way around this is to use a "digital envelope", which is a combination of the best features of public- and secret-key systems. A message is encrypted with secret-key cryptography, and the encrypted message and the secret key itself are transmitted via public-key cryptography to the receiver. This allows the actual messages to be sent using the speed of secret-key cryptography, but using the public-key method to prevent the secret-key from being intercepted. The two parties could then continue to use their secret key for as long as they deemed appropriate, because they have already paid the one-time overhead cost of sending the secret key.Because of the different natures of these two cryptography schemes, there is no one method that is always best for every given situation. Secret-key cryptography can be best taken advantage of when there is already a closed, secure environment (such as a well-protected LAN) or single-user environment (such as a user encrypting files on a non-networked PC). Public-key cryptography is usually preferable when there is an open, unsecured, multi-user environment (such as the Internet), and there is no safe, reliable way to transmit private key information.3. What is Pretty Good Privacy (PGP) and Why is it popularPretty Good Privacy (PGP) was developed by Phil Zimmerman in 1991, as a response to a controversial measure in Senate Bill 266 that would have required all encryption techniques to include a back door for law enforcement. PGP is software that combined several high-quality, existing public-key encryption algorithms and protocols into one package for secure, reliable electronic mail and file transfer. PGP provides not only encryption of data, but digital signatures, data compression, and smooth compatibility with e-mail systems. It is able to run on multiple platforms, and it is freely available for download in the US. Due to the usage of RSA, IDEA, Diffie-Hellman, 3DES, and CAST algorithms, PGP falls under the export restrictions of the ITAR, and may not be legally exported.For sending digital signatures, PGP uses an efficient algorithm that generates a hash code from the user's name and other information about the data to be transmitted. This hash code is then encrypted with the sender's private key. The receiver uses the sender's public key to decrypt the hash code. If it matches the hash code sent as the digital signature for the message, then the receiver is sure that the message has arrived securely from the stated sender.PGP is pretty popular now, especially in the email system, because of its advantages:•The software is available - for personal use - for free worldwide, in versions that run on a variety of platforms, including DOS, Windows, Unix, and Macintosh.•PGP is based on algorithms that have survived extensive public review and are considered extremely secure (such as RSA, IDEA, MD5, and Diffie-Hellman).•PGP has a wide range of applicability. It can be used by corporations that want to enforce a standardized scheme for encrypting files and messages, by individuals who wish tocommunicate securely over the Internet and other networks, by political groups actively resisting the government in totalitarian countries, and so on.•It was not developed by, nor is it controlled by, any governmental or standards organization. For the many people with an instinctive distrust of "the establishment" or Big Brother, this makesPGP attractive.4. What is PGP’s limitationThe main weakness in a public system is this: How do I know that the public key really belongs to my correspondent?The most trivial case is the one where the correspondents have had an opportunity to meet, and they've handed over a copy of their keys on floppy disk. They can each be sure that the keys belong to the other person. Obviously, if it is possible to do this then it is surely a good method of knowing that a key may be trusted, however, it is not always practical - otherwise why use Public Key? What if the correspondents never met? This is where key signatures come in.If you have personally verified that a given key belongs to a given person, then it is common practice to sign that key. The signature is made with your private key - so only you can make the signature - your signature may be verified by anybody, comparing the signature with your public key.Now suppose Alice and Bob have a mutual friend, David. David has signed both Alice's key and Bob's key, and both Alice and Bob have a verified copy of David's key.When Bob examines Alice's key he observes that her key was signed by David, Bob trusts that David is reliable when it comes to signing other people's keys. Therefore Bob can be fairly certain that the key belongs to Alice.The thing with PGP in particular is that YOU decide who is trustworthy when it comes to key signing. For instance, it could be that David signs any old key without really verifying the key (as described above) - or it could be that David's private key doesn't belong to David at all. In these cases you'd mark David's key as being "untrustworthy" and his signature would carry no weight.In this way, by verifying and signing keys wherever possible a "web of trust" may be built up. With trusted keys vouching for new keys. Of course, the weak point is now that person who signs a key without justification - this is why PGP is configurable to allow the user to say how much they trust a key's owner to sign other keys, how many valid signatures are required for a valid key, etc.Protocols for Securing ECommerce TransactionThe security of ECommerce transactions depends both on the network protocols and the payment framework used to perform the transaction.Network Transport SecurityModels such as SET, CAFÉ, DigiCash, First Virtual, and Millicent provide a secure payment method. However, the transaction still depends on the privacy and authentication of the data stream. BasicTCP/IP networking protocols do not include encryption and strong authentication. Higher level protocols such as HTTP, FTP, and Telnet do little to provide advanced security measures beyond userid and password authentication. All information sent using these protocols is unencrypted, so the data stream lacks confidentiality.Traditional networking protocols and applications are unable to enforce strong security measures for performing ECommerce transactions securely. This lack of security led to the design and implementation of many new security protocols that strive to reach different security goals. There are some secure transport protocols that provide confidentiality and authentication between systems and applications by using encryption. The following section describes some of the more popular secure transport protocols.•Virtual Private Networking (VPN)The Internet’s lack of security may leave you leery. What can you do if you just want to give company insiders and a few select business partners and customers easy and relatively secure remote access to company data via the Internet? You can set up a virtual private network.Virtual Private Networking technology provides the medium to use the public Internet backbone as an appropriate channel for private data communication. With encryption and encapsulation technology, a VPN essentially carves out a private passageway through the Internet. VPNs will allow remote offices, company road warriors, and even business partners or customers to use the Internet, rather than pricey private lines, to reach company networks. So the companies can save a lot of money.You can also use VPNs to link remote LANs together or give traveling staffers, work-at-home employees, and business partners a simple way to reach past company firewalls and tap into company resources. Virtual private networks are flexible. They are point-to-multipoint connections, rather than point-to-point links. They can be set up or closed down at the network administrator's will, making them ideal for short-term projects.VPN has many advantages: It is much cheaper for connecting WANs than 800 numbers or dedicated T1 lines. It provides encryption and authentication services for a fairly good measure of privacy. Maintenance of the WAN-to-WAN connection is left to Internet Service Providers. It is highly flexible, and can be set up and taken down very easily.Virtual private networks may be new, but the tunneling technology they're based on is well established. Tunneling is a way to transfer data between two similar networks over an intermediate。

电子商务消费者权益保护中英文对照外文翻译文献

电子商务消费者权益保护中英文对照外文翻译文献

电子商务消费者权益保护中英文对照外文翻译文献电子商务消费者权益保护中英文对照外文翻译文献(文档含英文原文和中文翻译)Consumer Protection in Electronic Commerce: Some Remarks on the Jordanian Electronic Transactions Law Emad AbdelElectronic commerce changes the way the world is conducting business. It offers enormous potential for accessing to new markets and transacting between parties who may have had no previous contact or knowledge. With this modern kind of trade, transactions might even be formed by the interaction with or between intelligent software applications without any direct awareness or intervention of the human users.Electronic commerce may also generate many consumer and legal challenges especially regarding the it between law and technology. The law is not just words on a piece of paper, but it might play an active role in building confidence in e-commerce, encouraging efficient business practices, and enhancing the commercial flourish in the networked environment. It is quite possible however that the law might contribute in shaking the trust in e-commerce and undermining the security and reliability of the online environment.It can be said that the success of e-commerce in any country depends primarily on the predictability and suitability of the legal framework and whether such framework copes sensibly with the needs of online consumers. For e-commerce to reach its full potential, consumers must have effective protection when shopping on the Internet, and they have to feel that their data and transmissions are adequately safeguarded andauthenticated. Otherwise, the results will be less and less convincing since individuals will be less willing to engage in the universe of the electronic commerce, and hence, e-commerce will not flourish and its growth will be stifled.Like other countries, Jordan sought to benefit from the advantages and unprecedented opportunities of e-commerce. To achieve this goal, considerable economic and legislative reforms were made during the last decade to bring the Jordanian market into conformity with the global economy and shift the Jordanian economy from protected form of economy to the market one, where the competition practices and liberation of goods and services’ prices are freed. In 2001, Jordan enacted the Electronic Transactions Law No.85 which was largely based on the UNCITRAL model law on electronic commerce. This law has recognized electronic transactions and signatures and placed them on equal footing with their paper counter- parts. Furthermore, Jordan signed and acceded to many treaties and agreements at international, American, and European levels to create a favourable e-commerce climate and meet the standards of international trade.After such changes and in the light of the Jordanian membership in many international agreements, the pressing question that needs to be addressed is whether or not the Jordanian law of electronic transactions deals appropriately with the challenges of e-commerce in a way that strikes a balance between business interests and the need to protect consumer rights. In other words, does the Electronic Transactions Law in Jordan offer the necessary guarantee for a secure online commerce? This question will therefore be the subject matter of this paper.The Protection of Online Consumers in JordanAlthough e-commerce is growing at a dramatic rate, there are still areas of concern that need to be addressed adequately by the legislation in order to promote trust in e-commerce and remove any barriers to its full development. Such areas of concern revolve in one way or another around the issues of consumer protection, privacy, and data protection in an online environment where the contracting parties hardly know each other, and in which electronic communications are rarely subject to direct human review.Online consumers may not use the Internet to make purchases if they find that they do not have a clear protection from unfair contractual terms or that their rights of privacy and transparency are not comprehensively guaranteed. Therefore, it can be argued that the lack of proper legislation may not only shake consumer confidence in online commerce, but it might also threaten the expansion and profitability of e-commerce. It is clear then that the consumer protection in e-commerce is based on several rights such as the right of full information, the right of privacy, the right to withdraw from the contract without penalty, and the right to have effective protection from unfair contractual conditions.Let us now explore the way in which the Electronic Transactions Law deals with such rights and determine whether or not this law gives due attention to consumer protection in an online environment. Let us further permit and encourage debate of what such law should be in order to enhance legal certainty as well as increase confidence in e-commerce in Jordan.The Right of Full InformationIn order to protect online consumers and boost theirconfidence in e-commerce, consumer protection rules in most jurisdictions require that certain information must be provided to the consumer in good time before the contract is concluded. Good examples in this regard are the European Directive 2000/31/EEC on electronic commerce, and the European Directive 1997/7/EC on the protection of consumers in respect of distance contracts which contain specific provisions in terms of information to be provided to the consumer. Such directives aim to encourage greater use of e-commerce by clarifying the rights and obligations of businesses and consumers, enhancing the transparency, and breaking down barriers across Europe. In order to achieve these goals, such Directives require that certain information be supplied to consumers in a clear manner that comports with the means of distance communication used, having regard to the principles of good faith in commercial transactions, and the protection of minors and others unable to give consent. These Directives insist further that online service providers are obliged to provide contact details to the recipients of their services in a form that is easily, directly and permanently accessible.Unlike the European law, the Electronic Transactions Law in Jordan does not contemplate the information that the supplier must provide to the consumer before the conclusion of the electronic contract. By doing so, this law leaves this issue to be governed by the general rules of the Civil Law without in any way recognizing the fact that consumers in an online environment need more protection than that offered by such general rules. Without direct and comprehensible recognition of the full information right, suppliers might have an absolute power to bind their consumers regardless of whether or not they providethem with the necessary information to enter into contracts, and consumers might thus become largely unprotected. If creating a confident and protective environment for online consumers is our concern, it is essential then that the Electronic Transactions Law addresses such issue explicitly by imposing special duties of information on the supplier so that certain details must be provided to the consumer either before the contract is made or in good time after it. The Right to Privacy in Personal Data Many privacy concerns arise in cyberspace where anonymity prevails and in which technology facilitates the collection, processing and transmission of individuals’ information in a matter of a few seconds. On a daily basis, the vast majority of Web sites required e-consumers to disclose some personal identifyinginformation as they complete electronic transactions or create online accounts. Such consumers often provide the required personal information without fully understanding how this information will be used and whether or not it will be shared with third parties. They just do that to complete a transaction or gain access to a service they seek since they know that any refusal to submit the required information will hinder any further meaningful use of a Web site, and hence, they will find themselves unable to complete their intended purchase (Ciocchetti 2008, p. 561).While some Web sites collect personal information from consumers and store it in their databases in order to facilitate transactions and discover consumers’ trends and interests so that they can satisfy the ever-evolving needs of their consumers, other Web sites may collect personal information only to sell it to marketing firms or unrelated third parties for a profit. Thismight not only impact a consumer’s privacy negatively, but it may also cause considerable personal and financial damage especially when very sensitive data falls into the wrong hands. What complicates the matter further is the fact that once such data leaves the hands of its initial collectors, it may be stolen or purchased anonymously and from anywhere around the world. That being the case, it should come as no surprise if consumers know nothing about the identity of the parties that purchase their personal information or the purpose for which such information is used. This situation may infringe the privacy of e-consumers and leave them in the dark as to how their personal information will be used in the future. In order to avoid that, law should determine when, how, and to what extent consumers’ personal information is collected, used, and shared with third parties.Law is also strongly advised to oblige Web sites to notify their customer in advance and in a conspicuous manner of their privacy policy with regard to the collection, use, and dissemination of personal information. Such notification must clarify whether or not this information will be shared externally and must also include the identity of the data controller, the purpose for which the data is collected, and the measures that will be taken to guard such data against loss or unauthorised processing. By doing so, law will surely enable e-consumers to make informed decisions before submitting their personal information online, and provide them with options as to how this information may be used for purposes beyond those necessary to conclude a transaction.Protecting the privacy of personal data is recognized as being important tosociety and to the development of e-commerce in Europe. This is why the European Union has enacted Directive 95/96 in 1995 to determine a basic framework for the protection of personal data while at the same time stressing the freedom of movement of personal data between each of the EU’s Member States. This Directive includes an important language that attempts to identify the core rights of data subjects, such as the right to know what data is held on them and the nature and purpose of the processing. Furthermore, this Directive necessitates that any subsequent use or transfer of the data must be justified in the light of the purpose for which it was acquired.Unlike the European Union, Jordan does not yet have comprehensive legislation pertaining to data privacy. Although the Jordanian Constitution explicitly recognizes the right of each member of the society to maintain and preserve his individual privacy, and although Jordan signed many international agreements which have insisted on the importance of protecting the privacy of personal data, Jordan has no specific data protection or privacy law, and hence, it remains unclear how to deal with the collection, processing, and dissemination of consumers' personal identifying information. In fact, even though Jordan has witnessed significant legislative reforms and amendments during the last decade, none of such reforms and amendments regulate the privacy in online contracting.While the Electronic Transactions Law was well intentioned, its silence with regard to data privacy has effectively undermined the consumer protection which it aimed to provide to Internet users. Instead of safeguarding the rights of consumers to privacy and protection in the online environment, this law says nothing about the collection, use, and disclosure of consumers' personalidentifying information. Furthermore, this law does not require e- commerce companies to create a privacy policy or notify their customers of the purpose for which the personal data are collected from them. That being the case, one may conclude that online companies have too much power to determine the manner in which they collect and process consumers' personal data, and that such companies are absolutely free to sell, swap, or rent consumers’ data to whoever they want without any fear that law will interfere or track down their operations. Under the current legal system in Jordan, online consumers have no control over their submitted information or over the subsequent use of such information, and it still difficult for them to make informed decisions before submitting their personal identifying information online.Privacy is then one of the most complex challenges facing e-commerce in Jordan. Unless the Jordanian legal system meets this challenge adequately in a way that protects the personal information of consumers while also promotes e-commerce efficiency, the interests of Internet users across the country will be largely unprotected. Therefore, law is strongly advised to establish enforceable rules to safeguard users’ rights to privacy in personal data. It is perhaps useful for Jordan to consider the principles of fair information practices for the protection of personal data that can be found in the Data Protection Directive in the European Union. It would also be useful in this regard to contemplate the Organization of Economic Cooperation and Development (OECD) Privacy Guidelines.ConclusionElectronic commerce has brought with it a host of new challenges especially in matters of privacy and consumerprotection. It has become increasingly certain that the absence of an appropriate legal framework to deal with such challenges may have a negative effect on the stability and predictability of e-commerce. For most shoppers, feeling that their data and interests are well protected throughout the different stages of the electronic contracting process is the most important consideration in shopping online. If consumers feel that their rights might be infringed or that their interests might not be effectively and explicitly safeguarded, then they may be less willing to engage in online activities and transactions. It seems thus that the primary challenge is how to deal legally with e-commerce in a way that promotes trust in conducting business over the Internet, and at the same time protects the fundamental rights of online consumers such as the right of full information, the right to have effective protection from unfair contractual terms, the right to review the contract or to withdraw from it, and the right to privacy.The most important initiative drawing the general features of electronic commerce in Jordan is the Electronic Transactions Law No. 85 of 2001 which was adopted in order to accommodate the challenging aspects of e-commerce. The examination of this law however does not paint a positive picture of the future of such commerce in Jordan. Unfortunately, this law says nothing regarding the protection of consumers' rights in the online environment. Furthermore, this law does not include any measures to build confidence in online commerce, nor does it involve any safeguards in relation to misleading advertising, unfair contractual terms, the collection of consumers' personal identifying information, spamming, and othermarketing practices that may confuse or take advantage ofthe consumer. Instead of safeguarding the rights of consumers comprehensively, unambiguously, and directly, this law leaves this issue to be governed by the general rules of the Civil Law without in any way recognizing the fact that consumers in an online environment need more protection than that offered by such general rules.In spite of the significance now being placed internationally on consumer protection, little attention has been given to such issue in Jordan. At the time of writing, Jordan does not yet have specific legislation pertaining to the protection of online consumers. While consumers in most jurisdictions receive the benefit of a wide range of consumer protection laws, there is no detailed or comprehensive legal framework in Jordan for consumer protection. Although the general rules of the Jordanian Civil Law contain in one way or another some kind of indirect consumer protection, such rules may not be sufficient in the digital world due to the fundamental differences between online and offline environments.Although Jordan has proceeded with upgrading its legislation to meet challenges brought by e-commerce, it needs to do more in order to secure a suitable climate for e-commerce and enhance the confidence in conducting business online. In matters of privacy and consumer protection, Jordan should seek to establish explicit rules to safeguard consumers’ interests without invoking and depending on the general rules of the Civil Law or on other traditional laws which may not be applicable for the Internet. For the full potential of e- commerce to be realized, Jordan is also strongly advised to develop effective standards to ensure that there are adequate consumer protection and proper means of redress in place. It is perhaps useful for Jordan toconsider the principles of consumer protection that can be found in the relevant European Directives or OECD Guidelines.From:Jordan electronic trading activities of the law电子商务中的消费者权益保护:一些备注在约旦电子交易活动的律法阿曼德阿布戴尔电子商务改变世界的方式开展业务。

电子商务专业外文文献

电子商务专业外文文献

本科毕业论文外文文献及译文文献、资料题目:CUSTOMER RELATIONSHIPMANAGEMENT文献、资料来源:加勒斯特经济学院文献、资料发表(出版)日期:2000.3.25院(部):专业:班级:姓名:学号:指导教师:翻译日期:外文文献:CUSTOMER RELATIONSHIP MANAGEMENT1. IntroductionIn the last decade, the majority of the companies were preoccupied with production, recession, mergers, new technologies and business regulation. Romania’s accession in the European Union will bring many advantages for further development, together with membership in a Common Market with common policies on product regulation, and freedom of movement for all the four factors of production (goods, services, capital and labor). This means that Romanian companies will compete with other companies from the EU directly in their home market. European companies are more flexible and mobile and will put a high pressure on the local companies in order to produce better products, launch better offers and services and orientate more towards their customers. High revenue equals important customer is a classic rule when the company organises its customer policy. “An important customer brings a gross amount of money for our enterprise” has become a reflex for many companies a broad and perhaps in Romania, too. But is this always true, or do we need more information than a simple figure reported at the end of the year?2. Marketing information systemA winning company is more productive in acquiring and retaining customers, to expand its clientele (Kotler, 2003). This company improves the value of the customers by reducing the rate of defection, increasing the longevity of customer Management & marketing relationship, making low-profit customers more profitable or terminating them etc. Gathering information on the actual or potential marketplace not only allows the organisation to monitor trends and issues concerning its current customers, but also helps it identify and profile potential customers and new markets, to keep track of its competition, their strategies, tactics and future plans (Brassington and Pettitt,2003). In order to collect and organize a high quantity of diverse information, the enterprises started to build marketing information systems. There are, mainly, a set of procedures and methods by which pertinent, timely and accurate information is continually gathered, sorted, analysed, evaluated, stored and distributed for the use of marketing decisionmakers (Zikmund and D´Amico,1993). The marketing information system includes data from external and internal sources (sales records, customer records, marketing communications, and sales force information). The focus on the customer and the integration of the marketing function helps the company to create customer databases with comprehensive information about individual customers or prospects.3. Customer relationship managementCustomer Relationship Management has been around for the last 30 years, but it became very important when companies changed their attitude towards marketing function. Nowadays, the cross-functional approach to marketing requires an organizational culture and climate that encourages collaboration and cooperation between departments. People within the business must understand their role in serving customers, internal or external one. CRM builds on the principles of relationship marketing and recognizes that customers are a business asset and not simply a commercial audience, implies the structuring of the company from functions to processes, information are used proactively rather than reactively and develops the ne-to-one marketing approaches (Payne, 2006).When defining CRM, we must first explain the difference between customer acquisition and customer retention. The two concepts have different drivers. Attracting customers has become very difficult these days, when people are harder to please. They are smarter, price conscious and sensitive, more demanding, less forgiving, and they are approached by many more competitors with equally good or better offers (Kotler,2003). Companies focus more on sales analysis, customer segmentation, advertising, merchandising and campaign management. The more difficult part is keeping the customers. According to Bruhn, a customer is satisfied when the comparison between offer and consumption fulfils his/her expectations, after he/she accepts the company, trusts it and exhibits a positive attitude towards it, becomes loyal to that company. In this situation, the customer talks favourably about the company and about its products, pays less attention to competing brands and is less sensitive to price, which turns transactions into routine (Bruhn, 1999). With customer retention, the company must pay attention to service satisfaction and trust in Customer relationship management the organization and its staff. Some companies believe that if a customer complaints the problem will be solved, but 96% ofunsatisfied customers don’t complain and go to another company. Therefore, Customer Relationship Management is the mechanism for retaining customers (Russell-Jones, 2003). Mainly CRM allows the company to understand who their customer is, isolate the best customer (those with whom you desire to have long-standing relationships), create relationships stretching over time and involving multi-interactions, manage the relationship to mutual advantage, seek to acquire more of those “best” customers. Inputs like marketing strategy, customer base, products, and regulation, competitors and staff skills are synthesized in a CRM programme which creates outputs as customer service, customer retention, higher share of wallet, customer referral, more predictable revenues streams, improved profitability, lower costs and better compliance (Russell-Jones, 2003).4. Developing a strategy in customer relationship managementBecause CRM is a cross-functional activity and large companies have thousands and millions of customers, the need for a strategic framework is very high. The dimensions of a CRM strategy are mainly focused on defining the following topics:- object of the customer relationship management – the company has three options: focusing on the company itself, on a brand or on the distributor;- target segment – the company usually sets priorities between different customer segments, it defines strategic customers based on the portfolio analyses, factors as revenue, length of the relationship, income, collaboration with the customer. These are its analysis criteria;- ways of retaining the customers –customers’ satisfaction is in the centre of all the decisions, but customers retention can also become a central issue through contractual clauses, such as service, leasing and warranty;- choosing the instruments of CRM – the company combines the instruments of the 4P´s with focus on the customer;- intensity and timing of the CRM decisions –show when and how should the company introduce different instruments; programmes can last from one day to one week, or from three month to two years;- cooperation within the CRM programme – sometimes the company must cooperate with other partners from the distribution channel, mainly between producer and wholesaler and retail.5. Instruments of customer relationship managementThe communication policy plays an important role in the instruments mix. It follows two objectives: first, to build a permanent dialogue with the customer in order to stabilize or change its expectations, and second, to counteract influences after consumption. The main CRM instruments within the communication policy are: Direct-Mail is material distributed through the postal service to the recipients’ home or business address to promote a product or service. In CRM the mailed issue can vary from a simple letter to a catalogue, and its sending will always occur at a particular moment in customer’s life (birthday, invitation for an event). It must incorporate sticky gadgets to increase their chances of being opened and read; Newsletters are distributed to customers for free and contain information about new products, offers for special events and others; Fidelity cards (store cards) are an important tool in gathering information about customer behaviour. By accumulating points of fidelity, the customer can benefit from different special offers; Clients club designates a concept which has grown in parallel with the fidelity cards. Its main forms are VIP-Club, Fan-Club, Product-Interest-Club, and Lifestyle-Club. The club represents an opportunity for the company to make offers in accordance with the social status, acceptance, prestige and expectations of its customers;Telemarketing allows companies to undertake marketing research and is highly measurable and accountable; the number of positive and negative responses are easily recorded and monitored. It provides for interaction, is flexible and permits immediate feed-back. Online-marketing includes many forms such as on-line advertising, on-line sales promotions, on-line direct marketing, on-line public relations, one-line personal selling. The medium used is the internet and the main instrument is the email. Virtual promotions are cheaper than hard copy versions, but the challenge is to drive traffic to your company’s Web site. Event-marketing takes place in three main areas: the product (here, it focuses on increasing sales), the corporation (for developing a corporate body) and the community (to make a difference in the life of the local community) (Bruhn, 1999& Fill, 2002).The price policy can be thought about in various ways when building a CRM programme: discounts for special customers, underselling or matching competitors, loyalty refunds, bundling items together and offering overall prices. Although price is not a measure of inherent value received, it is often used by customers as a benchmark, ignoring any other features or differences.Key factors in the product policy are the product itself, with quality, design, technical features, packaging and service management which includes lifelong warranty, price warranty or a customer telephone line. An active management in the distribution policy can focus on the customer or on the distribution channel. The producer evaluates the activity of the distribution partner and Customer relationship management intervenes when needed. The focus on the customers is realised through a Key Account Management which develops programmes for special customers.6. Customer relationship management in financial servicesFinancial services differ from many other industries. This can be seen particularly in Romania, where 40 commercial banks fight for a population of 21 million citizens. They cover the whole spectrum of customers from individuals to partnerships, institutions, corporations and governments. As a result, it can be very difficult to focus on single markets. Customers are often in two positions: they may have a deposit and savings accounts, but also loans and overdrafts. They are very service focused, they sell only intangibles. Financial services require processing billions of transactions worldwide and they are one of the heaviest regulated industries in the world (Rusell-Jones, 2003).The customers in the financial services are better informed, are switching channels, and seem to be more demanding of service, and used to change. The market is also highly competitive and new entrants are coming with diverse products and approaches.The industry of financial services in Romania has a very high potential and registers every year high growth rates. Till now, the location in a major city of the country with a population around 300.000 people was an advantage of the business and a success factor. Now the battlefield has moved in the small towns. The competition became tougher; banks began to develop and to introduce new products. Some experts say that a weakness of the banking sector is market segmentation. There is lots of information about customers, but it seems that banks prefer to focus on clients with large savings accounts. The main banks in Romania, as BRD, BCR, ING, and HVB-Tiriac announced for the year 2005 an increase in the number of the private banking clients. These are mainly customers with accounts between 50.000 and 100.000 Euros, they benefit of private consultancy, special interest rates, commissions, and special insurances. Customers have also a word to say about their bank. A market study made by DeadalusConsulting revealed that the customer profile for banking services is: person aged between 45-55 years, with higher or middle education. The most utilized service is the bank card for salaries payment (32,6%). Next, savings accounts (10,2%), credits for personal needs (11,1%), credits for buying electronics (9,2%) and auto leasing. The best grades were received by Raiffeisen Bank (8,83), BCR (8,58) and BRD Societe Generale (8,57). A customer’s criteria when choosing a bank are the trust in the bank, the environment in the branch, the quality of the staff, the advice they receive, the best interest rate they can receive, the information about the credit costs, and the conditions for obtaining a credit. A successful service provided by the majority of the banks is internet banking. It allows clients to save time and money, without going to the bank, 24 of 24 from inside or abroad. The access is free of charge or very cheap, and includes all kinds of activities from money transfer, payment orders, currency exchange, payment of current bills, external payments etc. The rate of penetration is still low, ranking between 10% and 30% of the customers in one middle bank.7. ConclusionsRomanian companies must focus in the future on the Customer Relationship Management and try to turn a “susceptible” client into a “partner”, to transform people who once needed their product/service, or occasional business partners into supporters and advocates and, eventually, into loyal partners that “sell” on the behalf of the company. Companies must create a permanent dialogue with their customers, and fight for them, because the clientele is not given for free. Customers that were price sensitive show now a higher interest in quality, service and behaviour of staff, and a company which concentrated on a price strategy should check how prepared its rivals are for a competition in the aforementioned fields. Customer Relationship Management increases its flexibility and adaptability to the market, in a world of capricious clients.中文译文:客户关系管理1.介绍在过去的十年中,大多数企业正在忙于生产,经济衰退,合并,新技术和商业管理。

电子商务信用中英文对照外文翻译文献

电子商务信用中英文对照外文翻译文献

电子商务信用中英文对照外文翻译文献(文档含英文原文和中文翻译)英文:Towards Enhancing Trust on Chinese E-Commerce Abstract:E-Commerce has been much more popular in western countries where the development of E-Commerce systems has been relatively matured. While the technology and social credit environment are well developed, E-Commerce is relatively new and receives fewer acceptances within commercial industries in China. Building trust has been identified as one of the major concerns in E-Commerce.In this paper, we will develop an computational model, which may be used to improve the trust-building relationship among consumers, retailers and authorities. This model considers a number of factors including direct experiences, customer recommendations, and authority certification, while parties involved in the E-Commerce activities can confidently establish and reliably enhance the trustworthiness.We also conduct a case study on how to improve consumer-retailer trust relationship in an E-Commerce application by the use of the trust model, which is one of functional electronic storefronts with the consideration of trustworthiness in China. In addition, the findings from this research will also be helpful for national policy maker on legislation of Chinese E-Commerce activities.Key Words: Trust, E-Commerce, Trust-building, Computational model, Chinese E-Commerce.I. Introduction“With the rapid development of Internet technology, the landscape of exchanging information and doing business has been com pletely changed”. As a new way of doing business, E-Commerce is increasingly affecting, changing and even replacing the traditional commerce approach. People are increasingly accepting and using E-Commerce than ever before. Without any doubt, many network applications, based on initial Door to Door to B2B, B2C, and C2C models, have a profound influence on the global economy. However most of the development of E-Commerce is primarily achieved within a handful of countries, particularly in countries like US, Japan and some of European countries. Since the advent of the Internet in the late 1990’s in China, various applications can be seen in the following years, which stirred thousands of ambitious young Chinese people to establish their own business on-line with a dream of getting wealthy overnight. Over the past few years, almost 70% of the growth in Internet users from all over the world occurred only in China. However, in terms of E-Commerce development, there is still a gap between China and the developed countries. With the increased popularity of the Internet and the continuous improvement of Internet technologies, the development of E-Commerce has just made an impressive start. What hinder the development of Chinese E-Commerce can be attributed to various problems and barriers. Some of these problems such as payment method, distribution problem, and security issues have been partially alleviated. Unfortunately the consumers’ lack of trust towards E-Retailers has been identified as the biggest barrier that needs to be overcome in long-term.In the paper, we will identify the challenges in developing Chinese E-Commerce and propose a model to cooperate with current E-Commerce system as a mean of enhancing trustworthiness. The paper is organized into 6 sections. Section 2 introduces the current standing of E-Commerce, and then Section 3 briefly reviews the challenges in developing E-Commerce, and examines the “Trust problem”, which is identified as the major obstacle that hinders the spreading of E-Commerce in China. In Section 4, we propose a computational model that can be used to address the trust problem. Section 5 specifically discusses how to apply the model to improve trustworthiness, and gives a case study in Section 6. Section 7 concludes the paper by discussing further directions for improving trust between E-Commerce users.II. Current Chinese E-Commerce Standing(I) Issues in E-CommerceTrust has always been the main concern among most of Chinese E-Commerce companies. On one hand, people are impressed by doing business on-line, but on the other hand they are still worried about using E-Commerce widely. Consequently, a gap appeared between on-line retailers’interest in attracting shoppers to their electronic storefronts and many consumers’ trust in those activities. Nevertheless, researches have shown that the trust problem is not only technical problem, but more of a social problem caused by various reasons. First and foremost, for historical reasons, people may lack of confiden ce with others, therefore it’s quite difficult to puttrust in someone else in the beginning. Secondly, the commercial law and regulation for E-Commerce cannot fully protect the interests of consumers and merchants. Therefore E-Commerce users lack the confidence to take the risk when communicating with an unfamiliar party. Thirdly, the social credit system and payment system in China are still not strong enough when carrying complex E-Commerce transactions, so that on-line business frauds may happen, and harm consumers. Last but not least Internet security and cryptography techniques, which can increase consumers’confidence in on-line activity, are still under development. Due to all these issues, E-Commerce specialists commonly regard that the bottleneck of Chinese E-Commerce is as a trust problem than anything else.(II) Opportunities of Chinese E-CommerceIn 2005, Chinese E-Commerce has been experiencing the upsurge of B2C markets. With the recognition of trust problem, many retailers are experimenting with various trust building strategies to establish trustworthiness towards E-Retailers. Establishing trust between E-Commerce users is a long term process. Apart from more education or training in the long term, we can resort to technology to enhance consumer trust in an unfamiliar E-retailer. One effective method is to participate in third-party assurance programs, which assist consumers in an accessible level of trust they should place in an E-Commerce transaction. In that way, merchants who agree to meet a third party assures standards can either use the assure certified technology, or agree to be bound in some way by the assure procedures or oversight are registered by the assure and permitted to display an identifying logo or assurance seal on their website. Consumers can reveal specific validation of the merchants good-standing with the assure or additional disclosures related to the merchants’ business practices or history. Some theories suggest that trust in an E-retailer can be speci fically defined as consumers’ willingness to accept vulnerability in an on-line transaction based on their positive expectations regarding an E-Retailers future behavior. By evaluating a party’s post behavior and tracking its activities, the party’s futu re behavior can be expected and trust level can be considered so that consumers can make purchasing decision according to the trust level of E-Retailer. In this paper, a third party assurance program that can be cooperated with the current E-Commerce system is proposed. Through tracking E-Retailer ’s activity records, collecting consumer experiences, and recommendations, the computation model is capable of considering the level that consumer can trust an unfamiliar E-Retailer. More detail about the model is described in Section 4.III. Challenges in Developing Chinese E-CommerceChinese E-Markets is undeniably of great potential. E-Markets are not only beneficial for national economy, but also for the global economy, especially since China has entered the World Trade Organization (WTO). However, in terms of developing E-Commerce, there is a gap between China and other developed countries. The primary cause is that the advent of information age has a great impact on the economy of industrialized countrie s, while the social environment and China hasn’t become used to its coming. These can be noticed from various aspects including information infrastructure, barriers of social environment, degree of technologyinnovation, level of awareness, and trustworthiness and so on. Technically, the improvement is obvious, but it’s difficult to catch up in short term for some social problems.(I) Informationization GapCurrent social environment in China is yet to match the rapid informationization. The understanding of the relation and interaction between industrialization and informationization is inadequate. In addition, the importance and urgency of informationization in social and economic development haven’t been fully appreciated. Apart from that, for a long term progress, the awareness and acceptance to informationization are still underway both theoretically and practically.Furthermore, the global information infrastructure are building up, China is not a exception. However, the popularity of informational and electronic facilities in China is still behind the USA, even though 70% of the growth in Internet users occurred in China. That is mainly due to the huge population of China and the imbalanced development of different regions.In terms of the innovation of information technology, China is catching up to the developed countries progressively, although the exploring and utilization of information resources and services are not yet adequate.(II) Social Barriers in E-CommerceIn China, E-Commerce activities are impeded by some social barriers as well. For instance, the law and regulation are not flawless. E-commerce gives a full impetus to social and economic development; in the meantime, it raises some new problems. So we need to address the inadequacy of traditional policy and laws in the new circumstance, and recommend new and effective law and regulation system. E-commerce may cause multi-facet problems, such as legitimacy and authentication of E-currency, E-contract, and E-bill. Taxation is another problem. It includes how to collect business tax and custom; whether new tax and collecting methods are needed for some intangible products (e.g. software, electrical audio and video); how to secure market and prevent monopoly, especially telecommunication monopoly; how to protect privacy and Intellectual Property(IP); how to manage and control export and import of intangible products, and so on.There is a lack of E-Commerce standard. Standardization and legislation is a difficult but important task in developing E-Commerce. For instance, before the E-Signature Standard was invented in China, there was no particular standard to normalize the behaviors on Internet, therefore, it could not setup a standard business environment compatible with international standards, which has a huge impact on integration of individual country and global economy.Another problem associated with E-Commerce is the social credit system and payment system. The present E-Commerce can only be regarded as quasi-E-Commerce. Since the credit system lacks of trust, effective monitoring and payment mechanism. The Internet commodity transaction centers only fulfilled parts of E-Commerce processes, but by no mean to be full processes from pre-purchase to post-purchase. The current distribution system for Chinese E-Commerce is still not satisfied enough. For instance, the delivery of products has yet to be separated frommanufacturing and commercial enterprisers. The incomplete distribution system still responds passively to production and sales departments, where different processing links such as warehousing, transporting and loading functions as independent entities so that the distribution problem has not been solved well at present.In summary, these informationization gaps and social barriers indeed hinder the development of Chinese E-Commerce, but many people consider lack of consumers trust in E-Commerce merchants, technology, social, financial and legal infrastructures of E-Commerce environment as the most concerned issues that affect the development in an individual country, since most traditional cues for assessing trust in physical world are not available on-line.(III)Trust IssueTrust is a catalyst for human cooperation, and it has received considerable attention in the business and social science literature. Lack of trust can result in a waste of time and resources on protecting ourselves against possible harm and thereby clogs up the economy. Consumer’s trust in an E-Retailer can be defined as consumers’willingness to accept vulnerability in an on-line transaction based on their positive expectations in regard with an E-Retailers future behavior. Factors that affect trust in E-Commerce for consumers include security risks, privacy risks, and lack of reliability in E-Commerce processes in general. As pointed by Nielsen, real trust builds through a company’s actual behavior towards its customers over time, and it is seen to be difficult to build and easy to lose. Theoretically, there are three trust-building processes summarized in:1. Knowledge-based trust is described as a form of trust that develops over time as one party learns about intentions, capabilities, and activity experiences. Example can be recommendation, evaluations, and reputations.2. Institutional-based trust relied on the creation of a “trust infrastructure”, of socially recognized third-party intermediaries that certify the trustworthiness of parties in a commercial exchange or actually enforce trustworthy behaviors on the part of one or both partners. Such example is certificate, membership of association.3. Trust transfer happens when one party ascribes trustworthiness to an unfamiliar exchange partner based on that partner’s association with a trusted party.In the ext section, we will describe a computational model, which can be used to facilitate the trust- building process in E-Commerce, particularly for Chinese E-Commerce market.In this paper, we surveyed the E-Commerce activities currently under going in China. We have closely analyzed the gap between the informationization and barriers of Chinese E-Commerce systems. Among the topics of facilitating development of a positive, effective and satisfied E-Commerce system, “trust” is a major issue, which has not received adequate attention in past decades. We have proposed a computational trust model (ERC2G), which can foster a trust relationship between consumers and merchants, and illustrate how to apply the model in a Chinese E-Commerce system. From the case study of EI Computer, we briefly talked about the implementation of E-Commerce systems with the consideration of enhancing trust. However, establishing trust must be a complex process, which involves moreinformation sources, so continuous improving and enhancing the trustworthiness will be the main objective we need to achieve in future work.翻译:提升中国电子商务信用度摘要电子商务在西方国家已经非常流行,并且电子商务系统在这些国家的发展也相对成熟。

电子商务信息安全中英文对照外文翻译文献

电子商务信息安全中英文对照外文翻译文献

电子商务信息安全中英文对照外文翻译文献(文档含英文原文和中文翻译)原文:E-commerce Information Security ProblemsⅠ. IntroductionE-commerce (E-Business) is in open networks, including between enterprises (B2B), business and consumers (B2C) commercial transactions, compared with the traditional business model, e-commerce with efficient, convenient, covered wide range of characteristics and benefits. However, e-commerce open this Internet-based data exchange is great its security vulnerabilities, security is a core e-commerce development constraints and key issues.In this paper, the basic ideas and principles of systems engineering, analyzes the current security threats facing e-commerce, in this based on security technology from the perspective of development trend of e-commerce.Ⅱ. E-commerce modelModern e-commerce technology has focused on the establishment and operation of the network of stores. Network in the department stores and real stores no distinction between structure and function, differences in their function and structure to achieve these methods and the way business operate.Web store from the front view is a special kind of WEB server. WEB site of modern multimedia support and a good interactive feature as the basis for the establishment of this virtual store, so customers can, as in a real supermarket pushing a shopping cart to select goods, and finally in the checkout check out. These online stores also constitute the three pillars of software: catalog, shopping cart and customer checkout. Customers use an electronic currency and transaction must store customers and stores are safe and reliable.Behind the store in the network, enterprises must first have a product storage warehouse and administration; second network to sell products by mail or other delivery channels to customers hands; Third, enterprises should also be responsible for product after-sales service, This service may be through networks, may not. Internet transactions are usually a first Pay the bill and getting goods shopping. For customers, convenience is that the goods purchased will be directly delivered to their home, but hard to feel assured that the goods can not be confirmed until the handsreach into their own hands, what it is.Therefore, the credibility of the store network and service quality is actually the key to the success of e-commerce.Ⅲ.the key to development of electronic commerceE-commerce in the telecommunications network to develop. Therefore, the advanced computer network infrastructure and telecommunications policy easing the development of electronic commerce has become a prerequisite. Currently, telecom services, high prices, limited bandwidth, the service is not timely or not reliable and so the development of e-commerce has become a constraint. Speed up the construction of telecommunications infrastructure, to break the telecommunications market monopoly, introduce competition mechanism to ensure fair competition in the telecommunications business, to promote networking, ensure to provide users with low-cost, high-speed, reliable communications services is a good construction target network environment, but also all of the world common task.E-commerce the most prominent problem is to solve the on-line shopping, trading and clearing of security issues, including the establishment of e-commerce trust between all the main issues, namely the establishment of safety certification system (CA) issues; choose safety standards (such as SET , SSL, PKI, etc.) problems; using encryption and decryption method and encryption strength problems. Establishment of security authentication system which is the key.Online trading and traditional face to face or written transactions in different ways, it is transmitted through the network business information and trade activities. The security of online transactions means:Validity: the validity of the contract to ensure online transactions, to prevent system failure, computer viruses, hacker attacks.Confidentiality: the content of the transaction, both transactions account, the password is not recognized by others and stealing.Integrity: to prevent the formation of unilateral transaction information and modify.Therefore, the e-commerce security system should include: secure and reliable communications network to ensure reliable data transmission integrity, prevent viruses, hackers; electronic signatures and other authentication systems; complete data encryption system and so on.Ⅳ.e-commerce security issues facingAs e-commerce network is the computer-based, it inevitably faces a number of security issues.(1) Information leakPerformance in e-commerce for the leakage of business secrets, including two aspects: the parties are dealing transactions by third parties to steal the contents; transaction to the other party to provide documents used illegal use by third parties.(2) AlteredE-commerce information for business performance in the authenticity and integrity issues. Electronic transaction information in the network transmission process may be others to illegally modify, delete or re-changed, so that information about its authenticity and integrity.(3) IdentificationWithout identification, third-party transactions is likely to fake the identity of parties to a deal breaker, damage the reputation of being counterfeit or stolen by one party to the transaction fake results and so on, for identification, the transaction between the two sides can prevent suspicion situation.(4) Computer virusesComputer virus appeared 10 years, a variety of new virus and its variants rapidly increasing, the emergence of the Internet for the spread of the virus has provided the best medium. Many new viruses directly using the network as its transmission, as well as many viruses spread faster through dried networks, frequently causing billions of dollars in economic losses.(5) HackerWith the spread of a variety of application tools, hackers have been popular, and are not in the past; non-computer expert can not be a hacker. Have kicked Yahoo's mafia boy did not receive any special training, only a few attacks to the users to download software and learn how to use the Internet on a big dry.Ⅴ.e-commerce security and safety factorsEnterprise application security is the most worried about e-commerce, and how to protect the security of e-commerce activities, will remain the core of e-commerce research. As a secure e-commerce system, we must first have a safe, reliable communication network, to ensure that transaction information secure and rapidtransmission; second database server to ensure absolute security against hackers break into networks to steal information. E-commerce security technologies include encryption, authentication technology and e-commerce security protocols, firewall technology.(A), encryption technologyTo ensure the security of data and transactions to prevent fraud, to confirm the true identity of transaction parties, e-commerce to adopt encryption technology, encryption technology is through the use of code or password to protect data security. For encrypted data is called plaintext, specifically through the role of a encryption algorithm, the conversion into cipher text, we will express this change as the cipher text is called encryption, the cipher text by the decryption algorithm to form a clear role in the output of this a process known as decryption. Encryption algorithm known as the key parameters used. The longer the key, the key space is large, traverse the key space the more time spent, the less likely cracked.Encryption technology can be divided into two categories: symmetric encryption and asymmetric encryption. Symmetric encryption to the data encryption standard DES (Data Encryption Standard) algorithm is represented. Asymmetric encryption is usually RSA (Rivets Shamir Aleman) algorithm is represented.(B), authenticationCommonly used security authentication technologies: digital signatures, digital certificates, digital time stamp, CA security authentication technology.(C), hacker protection technologyCurrently, hackers have become the biggest e-commerce security threats, thus preventing hacking network security technology has become the main content, by governments and industry are highly valued. Hacking techniques include buffer overflow attacks, Trojans, port scans, IP fraud, network monitoring, password attacks, and denial of service Dos attacks. At present, people have made many effective anti-hacker technologies, including firewalls, intrusion detection, and network security evaluation techniques.Ⅵ.the future security of e-commerceIncreasingly severe security problems, are growing threat to national and global economic security, governments have been based on efforts in the following areas: (1) Strengthen the legislation, refer to the advanced countries have effective legislation, innovative, e-commerce and improve the protection of the laws againstcyber-crime security system.(2) Establishment of relevant institutions, to take practical measures to combat cyber crime. Development of the law, the implementing agencies should also be used for its relevant laws, which must establish an independent oversight body, such as the executing agency to implement the law.(3) Increase investment in network security technology; improve the level of network security technology. E-commerce security law is the prerequisite and basis for development and secure e-commerce security technology is a means of protection. There are many security issues are technical reasons, it should increase the technology resources, and continuously push forward the development of old technologies and developing new security technology.(4) To encourage enterprises to protect themselves against Internet crime against. To avoid attack, companies can not hold things to chance, must attach great importance to system vulnerabilities, in time to find security holes to install the operating system and server patches, and network security detection equipment should be used regularly scan the network monitoring, develop a set of complete security protection system to enable enterprises to form a system and combined with the comprehensive protection system.(5) To strengthen international cooperation to strengthen global efforts to combat cyber crime. As e-commerce knows no borders, no geographical, it is a completely open area, so the action against cyber crime e-commerce will also be global. This will require Governments to strengthen cooperation, can not have "the saying which goes, regardless of others, cream tile" misconception.(6) To strengthen the network of national safety education, pay attention to the cultivation of outstanding computer.Ⅶ. ConclusionE-commerce in China has developed rapidly in recent years, but the security has not yet established. This has an impact on the development of electronic commerce as a barrier.To this end, we must accelerate the construction of the e-commerce security systems. This will be a comprehensive, systematic project involving the whole society. Specifically, we want legal recognition of electronic communications records of the effectiveness of legal protection for electronic commerce; we should strengthen the research on electronic signatures, to protect e-commerce technology; we need to build e-commerce authentication system as soon as possible, to organize protection for electronic commerce. Moreover, for e-commerce features without borders, we shouldalso strengthen international cooperation, so that e-commerce truly plays its role. Only in this way, we can adapt to the timesPromoting China's economic development; also the only way we can in the economic globalization today, to participate in international competition, and thus gain a competitive advantage.Source: Michael Hecker, Tharam S. Dillon, and Elizabeth Chang IEEE Internet Computing prentice hall publishing, 2002电子商务中的信息安全问题一、引言电子商务(E-Business)是发生在开放网络上的包括企业之间(B2B)、企业和消费者之间(B2C)的商业交易,与传统商务模式相比,电子商务具有高效、便捷、覆盖范围广等特点和优点。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

电子商务信息安全中英文对照外文翻译文献(文档含英文原文和中文翻译)原文:E-commerce Information Security ProblemsⅠ. IntroductionE-commerce (E-Business) is in open networks, including between enterprises (B2B), business and consumers (B2C) commercial transactions, compared with the traditional business model, e-commerce with efficient, convenient, covered wide range of characteristics and benefits. However, e-commerce open this Internet-based data exchange is great its security vulnerabilities, security is a core e-commerce development constraints and key issues.In this paper, the basic ideas and principles of systems engineering, analyzes the current security threats facing e-commerce, in this based on security technology from the perspective of development trend of e-commerce.Ⅱ. E-commerce modelModern e-commerce technology has focused on the establishment and operation of the network of stores. Network in the department stores and real stores no distinction between structure and function, differences in their function and structure to achieve these methods and the way business operate.Web store from the front view is a special kind of WEB server. WEB site of modern multimedia support and a good interactive feature as the basis for the establishment of this virtual store, so customers can, as in a real supermarket pushing a shopping cart to select goods, and finally in the checkout check out. These online stores also constitute the three pillars of software: catalog, shopping cart and customer checkout. Customers use an electronic currency and transaction must store customers and stores are safe and reliable.Behind the store in the network, enterprises must first have a product storage warehouse and administration; second network to sell products by mail or other delivery channels to customers hands; Third, enterprises should also be responsible for product after-sales service, This service may be through networks, may not. Internet transactions are usually a first Pay the bill and getting goods shopping. For customers, convenience is that the goods purchased will be directly delivered to their home, but hard to feel assured that the goods can not be confirmed until the handsreach into their own hands, what it is.Therefore, the credibility of the store network and service quality is actually the key to the success of e-commerce.Ⅲ.the key to development of electronic commerceE-commerce in the telecommunications network to develop. Therefore, the advanced computer network infrastructure and telecommunications policy easing the development of electronic commerce has become a prerequisite. Currently, telecom services, high prices, limited bandwidth, the service is not timely or not reliable and so the development of e-commerce has become a constraint. Speed up the construction of telecommunications infrastructure, to break the telecommunications market monopoly, introduce competition mechanism to ensure fair competition in the telecommunications business, to promote networking, ensure to provide users with low-cost, high-speed, reliable communications services is a good construction target network environment, but also all of the world common task.E-commerce the most prominent problem is to solve the on-line shopping, trading and clearing of security issues, including the establishment of e-commerce trust between all the main issues, namely the establishment of safety certification system (CA) issues; choose safety standards (such as SET , SSL, PKI, etc.) problems; using encryption and decryption method and encryption strength problems. Establishment of security authentication system which is the key.Online trading and traditional face to face or written transactions in different ways, it is transmitted through the network business information and trade activities. The security of online transactions means:Validity: the validity of the contract to ensure online transactions, to prevent system failure, computer viruses, hacker attacks.Confidentiality: the content of the transaction, both transactions account, the password is not recognized by others and stealing.Integrity: to prevent the formation of unilateral transaction information and modify.Therefore, the e-commerce security system should include: secure and reliable communications network to ensure reliable data transmission integrity, prevent viruses, hackers; electronic signatures and other authentication systems; complete data encryption system and so on.Ⅳ.e-commerce security issues facingAs e-commerce network is the computer-based, it inevitably faces a number of security issues.(1) Information leakPerformance in e-commerce for the leakage of business secrets, including two aspects: the parties are dealing transactions by third parties to steal the contents; transaction to the other party to provide documents used illegal use by third parties.(2) AlteredE-commerce information for business performance in the authenticity and integrity issues. Electronic transaction information in the network transmission process may be others to illegally modify, delete or re-changed, so that information about its authenticity and integrity.(3) IdentificationWithout identification, third-party transactions is likely to fake the identity of parties to a deal breaker, damage the reputation of being counterfeit or stolen by one party to the transaction fake results and so on, for identification, the transaction between the two sides can prevent suspicion situation.(4) Computer virusesComputer virus appeared 10 years, a variety of new virus and its variants rapidly increasing, the emergence of the Internet for the spread of the virus has provided the best medium. Many new viruses directly using the network as its transmission, as well as many viruses spread faster through dried networks, frequently causing billions of dollars in economic losses.(5) HackerWith the spread of a variety of application tools, hackers have been popular, and are not in the past; non-computer expert can not be a hacker. Have kicked Yahoo's mafia boy did not receive any special training, only a few attacks to the users to download software and learn how to use the Internet on a big dry.Ⅴ.e-commerce security and safety factorsEnterprise application security is the most worried about e-commerce, and how to protect the security of e-commerce activities, will remain the core of e-commerce research. As a secure e-commerce system, we must first have a safe, reliable communication network, to ensure that transaction information secure and rapidtransmission; second database server to ensure absolute security against hackers break into networks to steal information. E-commerce security technologies include encryption, authentication technology and e-commerce security protocols, firewall technology.(A), encryption technologyTo ensure the security of data and transactions to prevent fraud, to confirm the true identity of transaction parties, e-commerce to adopt encryption technology, encryption technology is through the use of code or password to protect data security. For encrypted data is called plaintext, specifically through the role of a encryption algorithm, the conversion into cipher text, we will express this change as the cipher text is called encryption, the cipher text by the decryption algorithm to form a clear role in the output of this a process known as decryption. Encryption algorithm known as the key parameters used. The longer the key, the key space is large, traverse the key space the more time spent, the less likely cracked.Encryption technology can be divided into two categories: symmetric encryption and asymmetric encryption. Symmetric encryption to the data encryption standard DES (Data Encryption Standard) algorithm is represented. Asymmetric encryption is usually RSA (Rivets Shamir Aleman) algorithm is represented.(B), authenticationCommonly used security authentication technologies: digital signatures, digital certificates, digital time stamp, CA security authentication technology.(C), hacker protection technologyCurrently, hackers have become the biggest e-commerce security threats, thus preventing hacking network security technology has become the main content, by governments and industry are highly valued. Hacking techniques include buffer overflow attacks, Trojans, port scans, IP fraud, network monitoring, password attacks, and denial of service Dos attacks. At present, people have made many effective anti-hacker technologies, including firewalls, intrusion detection, and network security evaluation techniques.Ⅵ.the future security of e-commerceIncreasingly severe security problems, are growing threat to national and global economic security, governments have been based on efforts in the following areas: (1) Strengthen the legislation, refer to the advanced countries have effective legislation, innovative, e-commerce and improve the protection of the laws againstcyber-crime security system.(2) Establishment of relevant institutions, to take practical measures to combat cyber crime. Development of the law, the implementing agencies should also be used for its relevant laws, which must establish an independent oversight body, such as the executing agency to implement the law.(3) Increase investment in network security technology; improve the level of network security technology. E-commerce security law is the prerequisite and basis for development and secure e-commerce security technology is a means of protection. There are many security issues are technical reasons, it should increase the technology resources, and continuously push forward the development of old technologies and developing new security technology.(4) To encourage enterprises to protect themselves against Internet crime against. To avoid attack, companies can not hold things to chance, must attach great importance to system vulnerabilities, in time to find security holes to install the operating system and server patches, and network security detection equipment should be used regularly scan the network monitoring, develop a set of complete security protection system to enable enterprises to form a system and combined with the comprehensive protection system.(5) To strengthen international cooperation to strengthen global efforts to combat cyber crime. As e-commerce knows no borders, no geographical, it is a completely open area, so the action against cyber crime e-commerce will also be global. This will require Governments to strengthen cooperation, can not have "the saying which goes, regardless of others, cream tile" misconception.(6) To strengthen the network of national safety education, pay attention to the cultivation of outstanding computer.Ⅶ. ConclusionE-commerce in China has developed rapidly in recent years, but the security has not yet established. This has an impact on the development of electronic commerce as a barrier.To this end, we must accelerate the construction of the e-commerce security systems. This will be a comprehensive, systematic project involving the whole society. Specifically, we want legal recognition of electronic communications records of the effectiveness of legal protection for electronic commerce; we should strengthen the research on electronic signatures, to protect e-commerce technology; we need to build e-commerce authentication system as soon as possible, to organize protection for electronic commerce. Moreover, for e-commerce features without borders, we shouldalso strengthen international cooperation, so that e-commerce truly plays its role. Only in this way, we can adapt to the timesPromoting China's economic development; also the only way we can in the economic globalization today, to participate in international competition, and thus gain a competitive advantage.Source: Michael Hecker, Tharam S. Dillon, and Elizabeth Chang IEEE Internet Computing prentice hall publishing, 2002电子商务中的信息安全问题一、引言电子商务(E-Business)是发生在开放网络上的包括企业之间(B2B)、企业和消费者之间(B2C)的商业交易,与传统商务模式相比,电子商务具有高效、便捷、覆盖范围广等特点和优点。

相关文档
最新文档