商城购物系统设计中英文对照外文翻译文献
- 格式:doc
- 大小:138.00 KB
- 文档页数:25
网站设计与实现中英文对照外文翻译文献中英文对照外文翻译文献(文档含英文原文和中文翻译)H O L I S T I C W E B B R O W S I N G:T R E N D S O F T H E F U T U R EThe future of the Web is everywhere. The future of the Web is not at your desk. It’s not necessarily in your pocket, either. It’s everywhere. With each new technological innovation, we continue to become more and more immersed in the Web, connecting the ever-growing layer of information in the virtual world to the real one around us. But rather than get starry-eyed with utopian wonder about this bright future ahead, we should soberly anticipate the massive amount of planning and design work it will require of designers, developers and others.The gap between technological innovation and its integration in our daily lives is shrinking at a rate much faster than we can keep pace with—consider the number of unique Web applications you signed up for in the past year alone. T his has resulted in a very fragmented experience of the Web. While running several different browsers, with all sorts of plug-ins, you might also be running multiple standalone applications to manage feeds, social media accounts and music playlists.Even though we may be adept at switching from one tab or window to another, we should be working towards a more holistic Web experience, one that seamlessly integrates all of the functionality we need in the simplest and most contextual way. With this in mind, l et’s review four trends that designers and developers would be wise to observe and integrate into their work so as to pave the way for a more holistic Web browsingexperience:1.The browser as operating system,2.Functionally-limited mobile applications,3.Web-enhanced devices,4.Personalization.1. The Browser As Operating SystemThanks to the massive growth of Web productivity applications, creative tools and entertainment options, we are spending more time in the browser than ever before. The more time we spend there, the less we make use of the many tools in the larger operating system that actually runs the browser. As a result, we’re beginning to expect the same high level of reliability and sophistication in our Web experience that we get from our operating system.For the most part, our expectations have been met by such innovations as Google’s Gmail, Talk, Calendar and Docs applications, which all offer varying degrees of integration with one another, and online image editing tools like Picnik and Adobe’s on line version of Photoshop. And those expec tations will continue to be met by upcoming releases, such as the Chrome operating system—we’re already thinking of our browsers as operating systems. Doing everything on the Web was once a pipe dream, but now it’s a reality.U B I Q U I T YThe one limitation of Web browsers that becomes more and more obvious as we make greater use of applications in the cloud is the lack of usable connections between open tabs. Most users have grown accustomed to keeping many tabs open, switching back and forth rapidly between Gmail, Google Calendar, Google Docs and various social media tools. But this switching from tabto tab is indicative of broken connections between applications that really ought to be integrated.Mozilla is attempting to functionally connect tools that we use in the browser in a more intuitive and rich way with Ubiquity. While it’s definitely a step in the right direction, the command-line approach may be a barrier to entry for thoseunable to let go of the mouse. In the screenshot below, you can see how Ubiquity allows you to quickly map a location shown on a Web page without having to open Google Maps in another tab. This is one example of integrated functionality without which you would be required to copy and paste text from one tab to another. Ubi quity’s core capability, which is creating a holistic browsing experience by understanding basic commands and executing them using appropriate Web applications, is certainly the direction in which the browser is heading.This approach, wedded to voice-recognition software, may be how we all navigate the Web in the next decade, or sooner: hands-free.T R A C E M O N K E Y A N D O G GMeanwhile, smaller, quieter releases have been paving the way to holistic browsing. This past summer, Firefox released an update to its software that includes a brand new JavaScript engine called TraceMonkey. This engine delivers a significant boost in speed and image-editing functionality, as well as the ability to play videos without third-party software or codecs.Aside from the speed advances, which are always welcome, the image and video capabilities are perfect examples of how the browser is encroaching on the operating system’s territory. Being able to edit images in the browser could replace the need for local image-editing software on your machine, andpotentially for separate applications such as Picnik. At this point, it’s not certain how sophisticated this functionality can be, and so designers and ordinary users will probably continue to run local copies of Photoshop for some time to come.The new video functionality, which relies on an open-source codeccalled Ogg, opens up many possibilities, the first one being for developers who do not want to license codecs. Currently, developers are required to license a codec if they want their videos to be playable in proprietary software such as Adobe Flash. Ogg allows video to be played back in Firefox itself.What excites many, though, is that the new version of Firefox enables interactivitybetween multiple applications on the same page. One potential application of this technology, as illustrated in the image above, is allowing users to click objects in a video to get additional information about them while the video is playing.2. Functionally-Limited Mobile ApplicationsSo far, our look at a holistic Web experience has been limited to the traditional br owser. But we’re also interacting with the Web more and more on mobile devices. Right now, casual surfing on a mobile device is not a very sophisticated experiences and therefore probably not the main draw for users. Thecombination of small screens, inconsistent input options, slow connections and lack of content optimized for mobile browsers makes this a pretty clumsy, unpredictable and frustrating experience, especially if y ou’re not on an iPhone.However, applications written specifically for mobile environments and that deal with particular, limited sets of data—such as Google’s mobile apps,device-specific applications for Twitter and Facebook and the millions of applications in the iPhone App Store—look more like the future of mobile Web use. Because the mobile browsing experience is in its infancy, here is some advice on designing mobile experiences: rather than squeezing full-sized Web applications (i.e. ones optimized for desktops and laptops) into the pocket, designers and developers should become proficient at identifying and executing limited functionality sets for mobile applications.A M A Z O N M OB I L EA great example of a functionally-limited mobile application is Amazon’s interface for the iPhone (screenshot above). Amazon has reduced the massive scale of its website to the most essential functions: search, shopping cart and lists. And it has optimized the layout specifically for the iPhone’s smaller screen.FA C E B O O K F O R I P H O N EFacebook continues to improve its mobile version. The latest version includes a simplified landing screen, with an icon for every major function of the website in order of priority of use. While information has been reduced and segmented, the scope of the website has not been significantly altered. Each new update brings the app closer to replicating the full experience in a way that feels quite natural.G M A I L F O R I P H O N EFinally,Gmail’s iPhone application is also i mpressive. Google has introduced a floating bar to the interface that allows users to batch process emails, so thatt hey don’t have to open each email in order to deal with it.3. Web-Enhanced DevicesMobile devices will proliferate faster than anything the computer industry has seen before, thereby exploding entry points to the Web. But the Web will vastly expand not solely through personal mobile devices but through completely new Web-enhanced interfaces in transportation vehicles, homes, clothing and other products.In some cases, Web enhancement may lend itself to marketing initiatives and advertising; in other cases, connecting certain devices to the Web will make them more useful and efficient. Here are three examples of Web-enhanced products or services that we may all be using in the coming years: W E B-E N H A N C E D G R O C E RY S H O P P I N GWeb-connected grocery store “VIP” card s may track customer spending as they do today: every time you scan your customer card, your purchases are added to a massive database that grocery stores use to guide their stocking choices. In exchange for your data, the stores offer you discounts on selected products. Soon with Web-enhanced shopping, stores will be able to offer you specific promotions based on your particular purchasing history, and in real time (as illustrated above). This will give shoppers more incentive to sign up for VIP programs and give retailers more flexibility and variety with discounts, sales and other promotions.W E B-E N H A N C E D U T I L I T I E SOne example of a Web-enhanced device we may all see in our homes soon enough is a smart thermostat (illustrated above), which will allow users not only to monitor their power usage using Google PowerMeter but to see their current charges when it matters to them (e.g. when they’re turning up the heater, not sitting in front of a computer).W E B-E N H A N C E D P E R S O N A L B A N K I N GAnother useful Web enhancement would be a display of your current bank account balance directly on your debit or credit card (as shown above). This data would, of course, be protected and displayed only after you clear a biometric security system that reads your fingerprint directly on the card. Admittedly, this idea is rife with privacy and security implications, but something like this will nevertheless likely exist in the not-too-distant future.4. PersonalizationThanks to the rapid adoption of social networking websites, people have become comfortable with more personalized experiences online. Being greeted by name and offered content or search results based on their browsing history not only is common now but makes the Web more appealing to many. The next step is to increase the user’s control of their personal information and to offer more tools that deliver new information tailored to them.C E N T R A L I Z ED P R O F I LE SIf you’re like most people, you probably maintain somewhere between two to six active profiles on various social networks. Each profile contains a set of information about you, and the overlap varies. You probably have unique usernames and passwords for each one, too, though using a single sign-on service to gain access to multiple accounts is becoming more common. But wh y shouldn’t the information you submit to these accounts follow the same approach? In the coming years, what you tell people about yourself online will be more and more under your control. This process starts with centralizing your datain one profile,which will then share bits of it with other profiles. This way, if your information changes, you’ll have to update your profile only once.D ATA O W NE R S H I PThe question of who owns the data that you share online is fuzzy. In many cases, it even remains unaddressed. However, as privacy settings on social networks become more and more complex, users are becoming increasingly concerned about data ownership. In particular, the question of who owns the images, video and messages created by users becomes significant when a user wants to remove their profile. To put it in perspective, Royal Pingdom, inits Internet 2009 in Numbers report, found that 2.5 billion photos were uploaded to Facebook each month in 2009! The more this number grows, the more users will be concerned about what happens to the content they transfer from their machines to servers in the cloud.While it may seem like a step backward, a movement to restore user data storage to personal machines, which would then intelligently share that data with various social networks and other websites, will likely spring up in response to growing privacy concerns. A system like this would allow individuals to assign meta data to files on their computers, such as video clips and photos; this meta data would specify the files’ availability to social network profiles and other websites. Rather than uploading a copy of an image from your computer to Flickr, you would give Flickr access to certain files that remain on your machine. Organizations such as the Data Portability Project areintroducing this kind of thinking accross the Web today.R E C O M M E N D AT I O N E N G I N E SSearch engines—and the whole concept of search itself—will remain in flux as personalization becomes more commonplace. Currently, the major search engines are adapting to this by offering different takes on personalized search results, based on user-specific browsing history. If you are signed in to your Google account and search for a pizza parlor, you will more likely see local results. With its social search experiment, Google also hopes to leverage your social network connections to deliver results from people you already know. Rounding those out with real-time search results gives users a more personal search experience that is a much more realistic representation of the rapid proliferation of new information on the Web. And because the results are filtered based on your behavior and preferences, the search engine will continue to “learn” more about you in order to provide the most useful information.Another new search engine is attempting to get to the heart of personalized results. Hunch provides customized recommendations of information based onusers’ answers to a set of questions for each query. The more you use it, the better the engine gets at recommending information. As long as you maintain a profile with Hunch, you will get increasingly satisfactory answers to general questions like, “Where should I go on vacation?”The trend of personalization will have significant impact on the way individual websites and applications are designed. Today, consumer websites routinely alter their landing pages based on the location of the user. Tomorrow, websites might do similar interface customizations for individual users. Designers anddevelopers will need to plan for such visual and structural versatility to stay on the cutting edge.整体网页浏览:对未来的发展趋势克里斯托弗·巴特勒未来的网页无处不在。
System of Shopping OnlineSummary:Along with Internet and computer’s fast development, in data bank technology network application more and more widespread, moreover more and more good service has been provided for the people by the network. This article has studied one kind of the shopping system on network based on the data association rule, compared with some methods used nowadays network, it has the merits ,such as more simple for user to use, the contact surface are more direct-viewing and so on. On the net the shopping just started in our country, but developed very quickly. Along with the more popularity of our country Internet and the shopping net hastening maturely, it will have more and more big consuming community, the market potential can be put to the full use.Key words: Electronic commerce, system analysis, system designForewordThe electronic commerce source in English ELECTRONIC COMMERCE, the simple form is EC. As the name suggests, its content contains two aspects, the first is the electronic way, and the second is business trade activity. Electronic commerce refers is the use simple, is quick, the low cost electronic communication way, business both sides does not seek a meeting carries on each kind of business trade activity.Designing a electronic commerce website to need to consider to each aspect question, it has needed the information of the client, the information of the merchant, and that needs to deliver the supplier――logistics company aspect the information, and so on. These all designs of the information which a shopping website must understand, only then it had understood this information can have a quite comprehensive understanding to the website design; that can design a quite comprehensive website. Now let’s understand the electronic shopping website the analysis and the design.1. System analysis(1). demands analysesOn the net the shopping, is an electronic commerce concrete manifestation actually, must realize this system, first needs is the commodity information detailed material, thus can realize the commercial activity, next is the user information, only then had the user information commerce activity only then to be able to develop, finally was the order form information, moved after the commerce successfully carries on needs the seller and the buyer achieves the mutual recognition, signed the order form, as well as both sides paid money, commercial activity conclusion. These data items and construction of data as follows:●User information:ID (automatic serial number), user ID, password, name, sex, E-mail address, telephone, address, zip code and registration date and so on.●Commodity information:The commodity number (automatic serial number), commodity ID, business commodity name, respective is big kind, the respective minor sort, the commodity introduced, the commodity price, the member price, stock merchandise the time and the browsing number of times and so on.●Order form information:Order form ID, user ID, name, zip code, telephone, and address and payment method and so on.(2).System overall analysisOn the net the shopping system divides into the front stage management and the backstage management, the front stage management including function and so on browsing commodity, inquiry commodity, fixed purchase commodity, shopping cart, user information maintenance. Backstage management modules include the announcement management, the commodity management, the order form management, the suit management and the user management, and so on.●Website front stage page link structure:After the user enters the system, can carry on a series of operate us to be called on the net the shopping system front stage, it provides the buyer operation a platform. But the backstage buyer is cannot go in, the petroleum manager can carry on the operation to the backstage.RankNew commodity recommendationSale commodityUser managementService center2. System designIn the shopping system analysis, it is not difficult for us to see that each process needs the careful design, but each function module design here seems suitable important.(1) Function module partitionWhen doing function module partition, it can be partitioned into three modules in whole, the distinction:●the front stage module is:●the backend module is:● user administration moduleIn this system, user administration module following chart; When system initialization, some defaults "the system administrator" user Admin, is from our manual increase to the database in. The Admin user may create other administrator information; the average consumer then may modify oneself registers the information and the password.(2) System flow designThis system divides into the front end shopping flow and the backend order form processing flow ● Front stage shopping flow chart:Landing usershopping car Pay moneySubmit the order form● Backstage shopping flow chart:When the user fills in the order form, the manager carries on the order form processing, carries on the final examination to the shopping, in other words must finish in electronic commerce all operations, met down is must carry on the material object the operation. The manager carries on is the background processing work.●Registration function flow chart:When the new user just logged on, by carrying on the user registration, he could enter the shopping activity, how this flow chart carries on the user registration on the extremely explicit introduction user. In the electronic commerce activity, needs the information which the user fills in all is generally the request extremely strict, because once the manager is carrying on the order form to confirm the operation was had discovered the question, could the information paper which filled in through the user come and the user relation, therefore the request user's information was extremely real. But very is all difficult this request to the present to realize, some users can use the vacation the information to cheat the seller.●Commodity search flow chart:The commodity information search is in terms of the database examination, it can reflect the quality of a good electronic commerce website, because the commodity information renewal is this website core, only then promptly deletes the expired commodity information from the database changes into the new commodity the information, can guarantee the electronic commerce website the movement.The user landing chart:The user lands is each website all has, also is necessary, because the present commercial website all is needs the fixed subscriber the support, once lost the user, merchant's commodity very has been difficult to sell. On the other hand, only then registers the user can purchase the thing in this website, mainly is advantageous for the commodity transmission, if the user does not land, 11,000 order forms or the commodity had the problem in the processing process on to be very difficult to inform to buy the buyer.●Order form management flow chart:The order form management is extremely important, we go shopping generally all must first under the order form, produces business only then to be able to deliver goods to us, here also is same, only it also may be advantageous for the product management, at the same time also is the transaction both sides transaction contract, is a certificate.●Commodity control flow chartThe commodity management just like is to the database renewal, must to not have the value the information to carry on the deletion as necessary, the renewal more valuable commodity information, is helpful in the commodity sale and the website operation.●Shopping car flow chart"The shopping car" was in fact we usually when the supermarket shopping uses a shopping car hypothesized realization, it may let the user see has purchased any commodity to oneself, may choose the commodity which oneself wants to purchase whether purchases the commodity which complete or exchanged already chooses.(3). Database structure and designThis system definition database has encompassed 7 tables:Board, Goods Type, Goods, Basket, Complain, Users, and Admin.●Board●Goods Type●Goods●Basket●Complain●Users●AdminUses for to preserve the user the basic information, the structure as follows shows:3. Concluding remarkThrough the analysis design of this system, I realized the basic flows of the electronic commerce system, had the further understanding of the electronic commerce. Along with the electronic commerce development, enterprise's sales ways also change along with the transformation, more and more many enterprises joins to the net on sells, said regarding the small and medium-sized enterprise, for own survival and the development, they always in seeks the opportunity to become on the more transactions chain the link, can have the connection with the different chain host between. Along with the net on the transaction development and the popularization, the small and medium-sized enterprise in under the market competition pressure, could urgently need the electronic commerce platform which set up by the third party, on the net the transaction market has been catering to this kind of demand. It may change in the traditional trade a pair or pair of many patterns, turned has been many to the multi- patterns, and the creation multitudinously bought and sold the on-line transaction space which the merchant gathered. Business both sides not only may seek to the more trades partner, increases the more commercial opportunity, but also can enjoy more conveniences and the standardized commercial service, obtains a good commercial environment.On the net the shopping system has provided a fast development opportunity for all enterprises, moreover also promoted the thing flowing industry development, because regardless of when in the electronic commerce only ison one kind of hypothesized net the transaction activity, must face the customer truly between the actual commodity and the customer relations, therefore electronic commerce not only may impel the modern expense pattern the development, moreover also impelled the new industrial appearance, therefore said electronic commerce is the present society development inevitable product.Reference material:●Sa Shixuan, Wang Shan, "Database System Introduction" (third edition), Beijing: Higher education publishinghouse, 2000.2●Zhang Haifan, "Software engineering Introductory remarks", Beijing: Qing Hua University publishinghouse,2002.7。
外文文献及译文文献、资料题目:Electronic Commerce外文文献:Electronic CommerceElectronic commerce, or Electronic trade, or electronic business as a newly rising mode of commerce will have far-reaching influence on social economy and play an important role in social development worldwide. It represents the trend of world trade in the 21st century and beyond.1. What is Electronic Commerce?Electronic commerce refers to commercial data exchange in digital form through electronic transmission means and commercial activities conducted on-line. Usually, electronic commerce can be divided into two levels: One is low-level electronic commerce that is, electronic commercial intelligence, electronic trade, and electronic contracts. Another is high-level electronic commerce which includes all commercial activities done via Internet, ranging from searching for clients, commercial negotia-tion, making orders, on-line payment, releasing electronic invoice, to electronic dec-laration to Customs, electronic tax-payment, all conducted on Internet.Electronic commerce means electrification of all trade transactions. It is featured by these characters: ①fairness and freedom, ②high efficiency, ③globalization, ④virtualization, ⑤interactivity, ⑥autonomy, ⑦personalized service. With electronic commerce, clients andsuppliers can closely and conveniently contact with each other on a global scale, so that clients can find satisfactory suppliers from all comers of the world to meet their demands.Electronic commerce will change the environment in which enterprises compete with each other and reduce costs which would otherwise be high in traditional market structure. Low costs in transactions, convenience in market entry and government encouragement to use Internet (exemption from tax) activate electronic commerce and boost it to develop rapidly right from its beginning. As experts predicted, by 2000, electronic commerce would reach a scale of 300billion US dollars worldwide. And it has exceeded this scale.To ensure security of electronic commerce, an electronic certification center should be established. Digital ID is used to validate identity. Digital 11 is trusted to a third party, namely, an authorized agency, to release, including identifying informa-tion of the holder (name, address, liaison way, ID card number), an encryptive key for common use by the both parties, period of validity, password and identification in-formation of the authorized agency, etc. With digital ID, both parties in transactions can be assured of identifying the other party and validate that the information sent out from the other party has not been subject to alteration.2. Influence That Electronic Commerce May HaveCompared with traditional commerce, electronic commerce has superiorities as follows *Extensive coverage. A network system combining Internet, Intranet (local area network inside enterprises) and Extranet (networks outside enterprises) enables buy-ers, sellers, manufacturers and their partners to contact with each other and conven-iently transmit commercial intelligence and documents worldwide.*Complete functions. In electronic commerce, users of different types and on dif-ferent tiers can realize different targets in trade, for example, releasing commercial intelligence,on-line negotiation, electronic payment, establishment of virtual com-mercial market place and on-line banking, etc.*Convenience and flexibility in use.. Based on Internet, electronic commerce is free from restriction by specialized protocol for data exchange. Transactions can be conducted conveniently on computer screen, by using any type of PCs, at any place around the world.*Low cost. Use of electronic commerce can cut down costs for hiring employees, maintaining warehouse and storefront, expense for international travel and postage to a great extent. The cost for using Internet is very low.Electronic commerce will have substantial influence on social economy:*Electronic commerce will change the way people used to take in commercial ac-tivities. Through networks, people can enter virtual stores and browse around, select what they are interested in, and enjoy various on-line services. On the other hand, merchants can contact with consumers through networks, decide on buying in goods (categories and quantities) and perform settlement of accounts. Government agencies can perform electronic tendering and pursue government purchase through networks.*The core of electronic commerce is people. It is a social system. On-line shop-ping changes the way of people's daily life and fully embodies autonomy of consum-ers in trade.*Electronic commerce changes the way enterprises produce their goods. Through networks, manufacturers know market demand directly and make arrangement of production, in accordance with consumers' need.*Electronic commerce dramatically raises efficiency of trade. Intermediate links can be cut down; costs for sales will be reduced to minimum. Production can be ar-ranged in "small batches plus diverse varieties", and "zero stock" will be reality.*Electronic commerce calls for reformation of banking services. New concepts like on-line bank, on-line cash card and credit card, on-line settlement of accounts, electronic invoice, electronic "cash"-consumers will no longer use the real cash when shopping-will become reality.*Electronic commerce will change government behavior. Called "on-line gov-ernment", an on-line administration plays the important role of a social channel, maintaining order and fairness and detecting and cracking down on-line fraud.3. The Present Situation of Electronic Commerce in Developed CountriesIn the mid-1990s, when Internet experienced explosive development and micro-computers entered homes in great numbers, computer networks became an indispen-sable part of people's daily life. People expect for more interests and convenience brought in by computer networks. Electronic Commerce emerged just in time. In de-veloped countries, governments timely made policies to boost electronic commerce to practical use and dominant position in a new round of worldwide competition.In 1998, Internet helped the United States to create productive out put of 507 bil-lion US dollars, national income of 301 billion US dollars, and 1. 2 million job op-portunities; of these, electronic commerce created an income of 100 billion US dollars. Internet has be-come the first big industry with yearly productive output increasing by 60%,and accounting for 6% of GDP. Service export from the United States has at-tained 160 billion US dollars each year, and it is predicted that it can compensate trade deficit in commodity trade. Internet played an important role in promoting ex-port from the United States: in 1999, books, automobiles and services were sold through electronic commerce to foreign countries, exceeding 102 billion US dollars.Advocated by the United States, 132 members of WTO decided to turn Internet into a freetrade zone within at least one-year term. Some countries and organizations scrambled to work out development framework for electronic commerce and made laws and regulations for developing electronic commerce. In 1996, the UN Confer-ence on Trade and Development passed "Model Law of Electronic Commerce". In December, 1996, the US government issued "Policy Framework for Global Electronic Commerce".In April 1997, European Union issued "Proposal for Electronic Com-merce in Europe".On July 1 1997, US President Clinton promulgated" A framework for Global Electronic Commerce" which has had great influence on global electronic commerce. In May 1998, WTO minister conference passed "A Manifesto on Global Electronic Commerce", and in September 1998, WTO general council passed "Scheme for Electronic Commerce Work".In October 1998, UN Organization of Economy and Cooperation &Development (OECD) held minister conference at Ottawa, Canada on electronic commerce, which is praised as a milestone of global electronic commerce. In September 1999, Global Business Dialog on Electronic Commerce (GBDE) was held in France and is-sued "Paris Proposal".In December 1999, the United States issued another Internet commerce standard.Electronic commerce in the United States takes the rein of the trade in the world. At present, there are 60 million subscribers of Internet in the United States. More than 98% of purchasing managers seek targets on-line. As estimated, by 2002, the value involved in transactions done through electronic commerce between US enterprises will account for 6.1% of GDP. Fortune magazine's statistics show the 500 top com-panies in the world all engaged in on-line business.25% of income to IBM (about 20 billion US dollars) is related with electronic commerce. Thanks to electronic com-merce, IBM saved its expenses of 250 million US dollars during 1999. HP Company designated its electronic Commerce solution as E-world-anelectronized world. This solution is oriented to medium-and small-size enterprises, and great investment was made to third parties-software companies to develop software suited for medium-and small-size enterprises to engage in electronic commerce. Intel places its risky invest-ment mainly on Internet and electronic commerce. In July 1998, Intel began on-line transactions Its monthly business turn electronic commerce reached one billion US dollars.As a survey made by European Information Technology Observation shows, of the surveyed 570 companies, 47% have implemented electronic commerce of some sorts, and 4/5 of them began their electronic commerce in the latest two years. Execu-tive Committee of European Union plans at least 25% of its purchase done through electronic commerce by 2001. In1998, in Australia, web sites related with electronic commerce on Internet doubled in number, and 11% of Australian enterprises have their web sites. 80% of Australian companies use Internet to transmit E-mails and conduct commercial activities. In 1998, Singapore government promulgated,for electronic commerce. Singapore is the only country in Southeast Asia that formally joined the "Rights and Obligation Electronic commerce In cooperation with US manufacturers and firms, Singapore established an electronic commerce entry in Asia, providing comprehensive Business-to-Business (B to B) service, so as to enable Asian trade companies to enter the rank of global electronic commerce.4. Development of Electronic Commerce in ChinaExploration in electronic commerce, governmental and civil began in 1993 in China. Today, electronic commerce has found its applications in foreign trade, Cus-toms, finance and commerce. Local frameworks have been established in Beijing and Shanghai for electronic commerce. Some electronic commerce web sites have been opened to on-line shopping and on-line settlement of accounts.The Ministry of Foreign Trade set up in February 1996 China Electronic Com-merce Center responsible for research, construction, and operation of international electronic commerce project in CT he Center established "China Commodity Trade Market" on Internet, to put rich resources of goods in China to world market, opening new channel for our exports. The subject "Security Proof of Electronic Commerce" as a key item in science and technology during th9th Five-year Plan period was ap-praised in early 1996 by State Department of Science and Technology and State En-cryptive Code Administration, which laid a foundation for establishing a safe and normal environment for electronic commerce in our country.In March 1999, the Ministry of Information Industry approved the electronic commercial network of pharmaceutics and health as a model project of electronic commerce for all trades. It is one of the six specialized networks in China, which pro-vide all-direction serve of market information, product transaction, warehousing and delivery, and account settlement, etc.In Shanghai, in 1999, "Shanghai Administrative Center of Electronic Commerce Security Certificate" was set up, which provide security platform for electronic com-merce and is responsible for application, appraisal, making and management of digital certificate domestic and foreign clients in Shanghai, and offers services such as certi-fication of digital identity and digital signature, electronic notarization, secure E-mail and secure encryption, etc. In January 1 the first on-line bookstore in China-Shanghai Book City On-line standard. It provides VISA cardholders and card-holders of domestic Great Wall card, Dragon card, Peony card and Pacific card with instant and authorized security service.The measure taken in Beijing to develop electronic commerce is to build a capital electronic commerce city. In November 1998, the capital electronic commerce project formally activated, and a frame-work formally showed off. The Legend Computer Company open editselectronic commerce system in June 1999, and web sites 8848, sina, 163, all activated their electronic commerce.In April 2000, sponsored by the Ministry of Information Indus-try,National Economy and Trade Commission, and China Council for Promotion of International Trade, the 4th China International Electronic Commerce Conference was held. State leaders and superintendents of various ministries and commissions joined the opening conference. Mr. Levy, secretary of Commercial Department of the US government led a delegation of famous US enterprises and media, totally more than 100 persons, to join the conference. More than 60 seminars were held during the conference, to dis-cuss extensive topics on electronic commerce.Despite all these efforts, companies engaged in electronic commerce service in China suffer losses in their B-to-C business (B refers to Business, C refers to Con-sumers). Some Chinese experts attribute this to Chinese shopping habit-Chinese con-sumers treat shopping as an interesting hobby; they enjoy the pleasure of spending their money through appreciating and comparing merchandise, and bargaining; but all these will vanish from on-line shopping. Other experts attribute this phenomenon to the ubiquitous incredulity in society-banks can-not interconnect their business be-cause they fear their customers will be captured by their rivals; cash cards cannot be popularized because banks do not trust civilians; and civilians do not like to do on-line shopping because they do not trust on-line stores,…etc. Why?That's because many things on-line and in society are false, for ex-ample, false number of subscribers, false statistics of access flux, shoddy goods, forged diploma, sham curriculum vitae, sham investment, sham listing, false revenue to listed enterprises, etc. Such an over-all environment will not change within a long period of time. In such environment, no commercial activity can be done. Many IT practitioners are disheartened with elec-tronic commerce in our country.5. Prospects of Electronic CommerceAlthough developing rapidly and seeming to have brilliant prospects, electronic commerce faces a series of real problems, for example, problems involving security, technology, expense, legal system, tax system, conception, protection of privacy, in-frastructure, etc. However, electronic commerce is the mainstream of enterprises in the new century and will develop rapidly in the coming years. Some companies pre-dict that by 2003, electronic commerce between enterprises in developed countries will account for over 9%of the total turnover(1,300 billion US dollars), and in consumer electronic commerce the turnover will attain 76. 3 billion US dollars by 2002. And as experts predicted, electronic commerce in China will catch up with de-veloped countries on the average level, in 10 years. They suggested 3 to 5 years be spent on working out plans, policies and regulations necessary for developing elec-tronic commerce, building substantial and tangible electronic commerce systems, fos-tering specialized talents, optimizing of the electronic commerce systems in some trades and areas; and then 5 to 7 years be spent on linking with international elec-tronic commerce to enable our electronic commerce system as an important compo-nent of international electronic commerce; popularizing of electronic commerce in application, raising electronic commerce in our country to a higher level in research, development and application, to the average level in developed countries.The following description tells what major I/e strategies some major manufactur-ers in the world are taking in development of electronic commerce.IBM: IBM is the pioneer that held up the banner of electronic commerce as a new application of Internet. In people's mind, IBM is now not only manufacturer of main-frames, PCs, servers, software but also the “godfather" of electronic commerce. IBM has always been dedicated to promoting secure commerce over the Internet. It sin-come from selling servers hasaccounted for 60% of its total in-come.IBM not only provides products for large-scale applications of secure, efficient, reliable electronic commerce and payment over Internet, but also for small electronic business as well.IBM Micro Payments an application enabling buyers to purchase low cost items over Internet-is another example of how IBM is expanding to new areas of commerce. By enabling billing servers, content providers and other merchants to profitably sell items for even a few cents, IBM opens up a whole new market.IBM Micro Payments allows buyers, sellers and billing systems to sell content, information, and services over Internet, for small amounts. IBM's commitment to electronic commerce and electronic business makes it a leader in the area of electronic payments. An automated compiler tool transforms existing HTML pages, creating "click and pay" links with either fixed or dynamic prices. Content and service provid-ers can take advantage of the extensive set of APIs and authoring tools to extend IBM Micro Payments available from OEMs. Billing servers can easily integrate the IBM Micro Payments application with existing billing systems and use it to attract content providers and open new sources of revenue.IBM Micro Payments provides scalability and interoperability, which allows widespread availability across Internet, including multi-currency and multilingual support, and low operational costs it easily supports transactions as low as one cent.SUN: SUN as a global leading supplier treats Internet not only a tool but also a new mode of commerce. SUN has provided very flexible solutions to commercial af-fairs for BBC, ETRADE, Federal Express, First Auction, Fruit of the Loom, Kodak, Thomas Cook, Virgin.Microsoft: Microsoft aims at helping enterprises to set up more powerful relation with their clients and partners by three means: (I)Windows 2000, BackOffice, Site Server, Biztalk,etc; (2) MSN (in the United States, more than 40% web users access MSN, and consumers can conduct comparative study when buying articles and ser-vices); (3) Partners provide customers with various products and services on Mi-crosoft MSN platform, realizing electronic commerce solutions, including settling account, paying tax, shopping, logistics, purchasing, accounting, ERP (Electronic Remote Processing) and EDI (Electronic Data Interchange), etc.Site Server and Biz talk are the two major products of Microsoft adopted in exist-ing system for enterprises to develop electronic commerce. Site Server is used for constructing web stores, based on data-it enables the client to easily realize on-line catalog, buying/selling order, exchange of documents for promoting sale, etc. Disre-garding what platform, operating system or technology used in low layer.Novell: Novell defines itself as "NET Service Supplier" after2000. The word NET includes intranet, extranet, Internet, company net, public net, cable net, wireless net. Its aim is to breakout the existing service domain in which most software products can provide services only in a specific environment or for a specific procedure or server (rather than the whole network).Novell's network service software NDS eDirectory as a nucleus helps clients to reduce complexity of business on network, and improve security, so that it enables network, applications and business processing to adapt to electronic commerce, and thus speed up their transfer to electronic commerce.SCO: SCO’s Tarantella is the best solution for existing users to conduct elect ronic commerce. Users can use only a browser to access any applications of platforms in back counter, without the need of re-writing existing applications, in their effort to transfer their business to electronic commercial mode. To ensure electronic commerce to continually operate, SCO provides an incessant cluster solution based on UNIXWARE 7. This product is easy to use,easy to manage and its cost is one-tenth of large-scale product of the same sort for mainframes while its performance doubles. It is a security solution with higher performance/ cost ratio among the same sort for electronic commerce.Tivoli Systems Inc. today announced Tivoli Business Systems Manager, a new, fully integrated solution that allows businesses to manage their IT environments from the top down, creating a powerful view of business systems management.The Tivoli Business Systems Manager solution provides us with business views and control mechanisms to manage all of our distributed IT resources in the retail, banking and electronic commerce environments-including system resources, data-bases, application servers, web servers and electronic commerce applications-from one central location. The Graphical User Interface allows us to monitor all of our re-sources on a single screen, regardless of geographical location.Combining the features of Tivoli Global Enterprise and Tivoli Manager for OS/390, Tivoli Business Systems Manager provides true end-to-end enterprise management from one console, simplifying the administration of heterogeneous environments. Tivoli Business Systems Manager enables customers to manage and control multiple applications that are required for different business functions.中文译文:电子商务电子商务或电子贸易,电子商业,或作为一个新兴的商业模式将产生深远的影响,经济和社会中发挥重要作用的社会发展世界各地。
电子商务物流中英文对照外文翻译文献电子商务物流中英文对照外文翻译文献(文档含英文原文和中文翻译)Introducing Commodity Flow to an Agent-Based ModelE-commerce SystemAbstractIn our model agent-based e-commerce system [2] we have assumed that a certain number of items of a given product is available for sale. In this note we introduce a model logistics subsystem and discuss how it will be integrated with the system. Keywords: e-commerce;logistics system;agent1.IntroductionCurrently, we are developing and implementing a model agent-based e-commerce system (see [2] and references collected there). In this system multiple buyer agents attempt at making purchase by participating in price negotiations in e-stores and selecting the best offer, while e-stores attempt at maximizing profit resulting from product sales.Thus far our attention was focused on buyer-seller interactions. By assuming that products are in the warehouse we have omitted the question where do they come from. The aim of this work is to describe how our system can be extended to include product restocking processes.Before proceeding let us make a few observations. First, the proposed logistics subsystem is not ―stand alone‖(e.g. similar to that considered in [3, 1, 6]). Instead, it has been created within the context of our e-commerce system, which has directly influenced its design. Second, while somewhat similar, processes involved in e-store restocking a warehouse differ from client making a purchase in an e-store (e.g. in product demand prediction, interactions with wholesalers, methods of price negotiations that involve more ―cond itions,‖ offer selection criteria, etc.) Therefore we have created a separate logistics subsystem (instead of reusing already modeled functions; e.g. price negotiations). Third, this note is devoted to the agent structure and agent interactions and, due to the space limitations, we omit important topics like:forecasts derivation, offer evaluation etc.However, these functions can be encapsulated into modules that can become a part of an appropriate agent. Therefore readers should envision that, for instance, when we write that ―rece ived offers are evaluated,‖then their favorite method of offer evaluationhas been utilized.To proceed, first, we briefly describe our e-commerce system.We follow with assumptions that underline the logistics subsystem and description of new agents that were introduced. Finally, we present the sequence diagram of restocking and use it to discuss in detail how this process will take place in our system.2. System DescriptionOur system is a distributed marketplace in which software agents perform e-commerce functions (see [2] for details, the Use Case diagram in particular). User-Client is represented by the Client Agent (CA). The CA is autonomous and when a purchase order is communicated by the User-Client, it works until either it is completed, or purchase is abandoned. The CA communicates with the Client Information Center (CIC), which facilitates information which e-stores sell which products (yellow-page matchmaking).For each store that sells the requested product, the CA delegates a Buyer Agent (BA) to participate in price negotiations and if successful, possibly attempt at making a pur- chase (successful price negotiations result in a product reservation for a specific time; after which products that have not been purchased are available for sale again).Since multiple BAs representing the same CA can win price negotiations the CA makes the decision if either of available offers is good enough to make a purchase. Buyer Agents can participate in negotiations only if the Gatekeeper Agent (GA) admits them (if they are trusted; e.g. BAs that win price negotiations but do not make a purchase may be barred from subsequent negotiations). The GA represents a given e-store and is created by the Shop Agent (SA). The SA is the central manager and facilitating the selling process it utilizes the GA, and a set of Seller Agents (SeA) that negotiate price with incoming BAs, as well as a Warehouse Agent (WA) that is responsible for inventory and reservation management. Thus far, the WA was responsible for managing product reservations and the inventory. Specifically, (1) before a new price negotiation the WA ―re served‖ a given product—so that if negotiation ended successfully there was an item that could be sold; (2) when a reservation ended in purchase, it adjusted product counters; and (3) when a reservation expired it also adjusted products counters. However, the WA was always envisioned as the ―gat eway‖between the store and suppliers, which is one of the foci of this note.3. Assumptions behind the logistics systemLet us now specify assumptions that underline design of the logistics subsystem:1.Nowadays, except of largest store-chains (e.g. TESCO, WalMart), companiesoutsource transportation activities (considered non-core business activities) to specialists (e.g. UPS, Mayflower). However, we assume here that suppliers are still re sponsible for facilitating transportation. Therefore, we omit transportation related processes and focus only in interactions between e-stores and suppliers2. As a result of (1), transportation costs are assumed to be paid by the supplier and included directly in product price (e.g. discount on delivery costs, will manifest itself in the total price).3. While in the original system auction-based price negotiations were used, here we opted for the simplicity of the FIPA Contract Net Protocol [4]. Therefore, in the logistics subsystem, a single round of negotiations consisting of a call for proposals and evaluation of responses, is used.4. New functions and agentsIn order to perform logistics-related tasks, several new roles were introduced; some of them have been delegated to agents existing in the system, while others warranted adding new agents. Specifically:•demand estimation—to draw information from sales data and/or external premises to predict future sales of products,•warehouse monitoring—to observe supply levels and react in case of a risk ofdropping below values considered sufficient to satisfy estimated demand,•order management—to coordinate issuing orders for goods, to assist inevaluating received offers,•ordering goods—to contact suppliers for their of- fers and to select the best offer,•selling goods—in the system suppliers were also modeled; while goods are acquired without extensive price negotiations, ―someone‖ has to deliver proposals to ordering components,•logistics yellow pages—the role of the ―l og istics CIC‖is very similar to the original CIC ([2]); it has to provide lists of potential suppliers of products; obviously, it is possible for a shop to become a sup- plier for another shop and to suggest that the two CIC s could be joined, but we decided to clearly separate the client-side from the shop and from the supply-side. Another reason for this separation was that while some shops may not be interested in becoming wholesaler, we would have to make changes to the original CIC data structure (e.g. wholesaler—yes/no). Finally, since the logistics subsystem does not involve auctions, the separation is even more warranted.Let us now see how these tasks/roles could be placed in our system. The demandestimation role was attributed to the existing Shop Decision Agent (SDA), responsible for the ―kn owledge managemen t‖functions (e.g. trust management, sales trend data mining, etc.) in the shop.The warehouse monitoring role is already a part of the existing WA. The difference is that now WA becomes a proactive manager of supplies; acting on predictions supplied by the SDA.Fulfillment of the order management role required introduction of the Logistics Agent (LA), which became the ―centra l manager‖ of the logistics subsystem. It is responsible for contacting the logistics CIC for the list of potential suppliers and managing a pool of agents responsible for ordering goods from ―wholesalers.‖ Finally, it collects and manages data related to supplier reliability. This data, in turn, will be one of factors in selecting the supplier.The ordering goods process is facilitated by the Ordering Agent (OA), which is also a new agent. Its task is to issue a call for proposals, collect responses and select the best offer taking into account factors such as: price, delivery time, reliability etc. Let us recall that due to the modularity of agent design ([2]), our system is flexible enough so that any method of selecting an offer can be applied (it can be encapsulated in a module and plugged into the OA).The selling goods role is realized by a very simple Wholesale Agent (WhA). Its role is to respond to CFP’s incoming from OA s.Currently we assume that WhA s receive instructions in what way to generate a stream of responses to the CFPs.Finally, logistics yellow pages are facilitated by the logistics CIC Agent. Its role is to store a complete list of suppliers and products that they sell. Obviously, the logistics CIC uses the original product ontology ([2]), extended by the logistics ontology. When the system is initialized, each WhA registers with the logistics CIC and provides it with a list of products for sale.What was described thus far is summarized in an UML use case diagram presented in Figure 1.Figure 1. Use Case of the logistics subsystem5. Typical Product Restocking ProcessLet us now describe the processes involved in restocking the warehouse. Here, we skip the description of system initialization, and start with the Shop Decision Agent sending a forecast to the Warehouse Agent. The sequence of actions resulting form such a forecast is depicted, as a UML sequence diagram in Figure 2.The SDA communicates the forecast to the WA by sending a FIPA Inform message containing the PredictionDescription (which contains all necessary data such as: product ID, amount of predicted sales, standard deviation of sales, expected purchase price, period for which this forecast is valid, etc.). We assume that the SDA forecasts are of the type: until a new fore- cast, weekly sales are expected to be 45 items of a given product. Forecasts can be issued at specific times (e.g. once a week or once a month) and their frequency de- pends on the information found in data analyzed by the SDA to derive forecast(s).The WA starts by examining current stock of a given product, and if current supplies are sufficient, it sets up to check their levels at the end of the time unit specified in the forecast (i.e. forecasts specified on weekly basis are checked once a week). If stocks are insufficient, the WA utilizes the FIPA Request Protocol (FIPA specification SC00026) and FIPA SL language [4] (used in all agent interactions), to com- municate with the Logistics Agent. The initial message from the WA is the FIPA Request message sent to the LA and it contains OrderRequest action with the Or- derRequestDescription. The OrderRequestDescription contains the necessary information specifying the order to be made: product ID, preferred delivery time, amount and maximumprice. Delivery time and amount are computed based on the current product level, predicted delivery time and an overall inventory strategy.Upon receiving the request, the LA dispatches a query to the logistics CIC to obtain a list of suppliers of a given product. Ensuing conversation conforms to the FIPA Query Protocol, starting with the FIPA Query-Ref message containing the CICQuery action with the Product ID. The logistics CIC responds with the FIPA Inform-Ref message containing the CICResponse with a list (possibly empty) of suppliers. Empty list results in a FIPA Failure message (with OrderRequestResult set to failure) send by the LA to the WA. Similar response is sent when the logistics CIC cannot be contacted.When the non-empty list was received, the LA removes these suppliers that have their reliability value below a certain threshold. Then the LAAgentDescriptions list is formed by supplementing each CICAgentDescription received from the logistics CIC with the reliability information. If a given WhA’s is not known a default trust value is used.After preparing the list, the LA utilizes the FIPA Request Protocol to find a free OA. Busy agents will re- spond with FIPA Refuse messages. If all agents respond in such a way, this process may need to be repeated un- til a free OA is found and responds with the FIPA Agree message. The LA then sends the ordering request to the selected OA and awaits for the result of the ordering pro- cess. LA’s message contains the IssueOrder action with the OrderDescription and the LAAgentDescriptions.After obtaining the request from the LA, the OA engages in the FIPA ContractNet Protocol interactions with WhAs from the list. It sends the FIPA CallForProposal message, containing CFPRequest with OrderDescription to the WhAs. WhAs evaluate the CFP and submit their offers by sending FIPA Propose messages containing the CFP Response actionwith OfferDescription or, if terms contained in the CFP are unacceptable/not interesting, respond using the FIPA Refuse message.Responses must arrive within a timeframe speci- fied by the OA, after which the OA proceeds to evalu- ate them. First, it filters unacceptable offers. Note that it is possible that some WhAs may respond knowingly with proposals that violate some of the conditions and in special circumstances when no better offers were found the OA may need to accept such offers. In the next step, offers are ranked and the winner is determined. Winner issent a FIPA AcceptProposal message containing the ConfirmationRequest action with its offer quoted. The winning WhA must in turn reply with the FIPA Inform messagecontaining Confirmation Response action with the OrderConfirmation which has unique orderID generated by the supplier. This successfully completes the ordering process.The winner can also withdraw the offer by sending a FIPA Failure message. In this case, runner-ups are contacted in an iterative manner. In case when there are no more offers left or there were no offers to begin with, the OA sends a FIPA Failure message to the LA,which, in turn, forwards it to the WA. When the winner confirms the order, the OA sends to the LA a FIPA Inform message containing the InformResult action with the WhA-received Or der Confirmation, thus completing the protocol. At this time the LA sends information to the WA, inside a message of the FIPA Agree type. This performative is used in compliance with the protocol to indicate that the LA is performing the desired task (ordering), but its efforts do not guarantee success (ordering success order success), and thus sending the final response (FIPA Inform) is inappropriate at this stage. Meanwhile the OA returns to the pool of available Ordering Agents.Now the purchase enters the delivery monitoring stage. Here, the LA waits for the delivery from the WhA to be registered with the WA. When a delivery arrives the WA sends (to the LA) a plain FIPA Inform message containing the WADelivery action with the DeliveryDescription, which has supplier’s AgentID and the already mentioned orderId. The LA does not need to respond to this message, but it checks the messages to see if it is currently awaiting a delivery with the given orderId coming from a supplier AgentID. If it finds a match, the ordering process is completed. As a result, the reliability value of supplied AgentID is increased. If a delivery notification does not come within time agreed in the OrderConfirm, actions must be undertaken (recall, that receiving supplies is vital to the e-Shop as its warehouse is likely to run out of stock Those actions are: (1) retry the ordering (sending reminder to the WhA / choosing new WhA), if there is still time, and (2) marking that a retry has been made.If there is still time before the deadline (established by the WA), then order can be retried. If it is the first time an attempt to retry the order is made, a reminder is sent to the WhA. To this end, LA contacts a free OA with a FIPA Request Protocol message with a Reminder action containing AgentID of the WhA and the orderId. The OA accepts the job (the FIPA Agree) and contacts the WhA (also using FIPA Request Protocol), sending it the exact same action. The WhA is expected to reply within a timeframe using either a FIPA Failure (offer is withdrawn) or a FIPA Inform providing new Order Confirmationwith a new delivery time, which is forwarded to the LA unchanged. In the case of an agreement, the LA returns to awaiting delivery, in the case of failure, the LA removes this WhA from the LA Agent Description list and locates an OA to perform entirely new search for a supplier. New search is also ordered if a reminder to the supplier whose delivery we were waiting resulted in a failure. The monitoring stage ends when: (1) delivery is received, or (2) reminder to the supplier was made, but it was refused, while deadline has already passed. Note that we assume that the actual order failure occurs only when the delivery deadline has passed and the reminder failed.This is because it is possible that there is an order delay and goods may arrive late. This information can be obtained from the WhA, and thus the need for the reminder.Figure 2. Restocking process: sequence diagramWhen the monitoring stage ends, the WA is notified about the result by the FIPA Inform or the FIPA Failure message to complete the FIPA Request protocol. The message will contain the OrderRequest action with the OrderRequestResult set appropriately. Furthermore, at this stage the reliability bonuses and/or penalties are calculated and applied. Finally, in the case of a successful order, the WA sends to the SDA a FIPA In-form message containing status information about the re-stocking of the warehouse.6. Concluding remarksIn this note we have discussed the way in which the logistics subsystem is being introduced into our model agent-based e-commerce system. We have presented used UML’s use case and sequence diagrams to formally depict and discuss the most important features of our approach. Due to the lack of space, we have focused our attention on agents and their interactions. The proposed system has been implemented and is in the final testing phase.References[1] C. Bádicá, A. Báditá, M. Ganzha, M. Paprzycki, Developing a Model Agent-based E-commerce System. In: Jie Lu et. al. (eds.) E-Service Intelligence—Methodologies, Technologies and Applications, Springer, Berlin, 2007,555–578[2] C. A. Butler and J. T. Eanes. Software agent technology for large scale, real-time logistics decision support. US Army Research Report ADA392670, 2001. 23 pages.[3]W.Ying and S.Dayong. Multi-agent framework for third party logistics in e-commercestar. Expert Systems with Applications, 29(2):431–436, August 2005.引入第三方物流企业的以代理人为基础的电子商务系统模型摘要在我们的模型以代理人为基础的电子商务系统[2]的基础上,我们假定一定数量的物品的某一特定的产品是适合出售的。
二、为什么人去购物?购物如何改变城市?今天的零售商场哈佛大学设计学院购物指南,首先声明“购物可以说是最后剩下的形式的公共活动。
通过一系列越来越掠夺性形式,购物已经渗入,殖民,甚至更换,几乎每个方面的城市生活”(Chung,2001)。
购物是美国文化的一个重要组成部分。
在美国的零售量人均面积是31平方,商场出资74%,而亚洲其他国家范围从0.5万英尺的中国,日本和吉隆坡9平方尺。
在美国的总零售面积占39%,在世界总零售面积等于12.7倍的曼哈顿土地面积的23.7英里。
其他的统计数据显示,世界上最大的零售商沃尔玛(Wal-Mart),销售额大于国内生产总值的四分之三的世界经济。
沃尔玛的年收入可以很容易地超过许多国家的国内生产总值,包括香港,沙特阿拉伯和挪威。
这些统计数据表明,美国城市在很大程度上受到购物影响了。
人们为什么购物?购物不是简单的任务买。
购物中心的先驱,维克多绿色,确定了购物和购买之间的区别。
他解释说,购买是一个结果,一个特定的和坚实的目的,而在购物,人们把他们的时间和使用他们的钱来购买物品。
换句话说,购买是一个必然性但购物是不必要的(Green,1973)。
人们是如何成为购物者?购物被认为是一个不愉快的事,尤其是在女性照顾其他所有家务。
回顾二十世纪重商主义变得如此有影响力的在我们的日常生活中,购物已经获得了更大的意义不仅仅是行动的采购生活必需品。
在第一阶段的20 t”世纪,美国已经是世界上最富裕的国家。
人们花了钱来满足他们的欲望,对抗源于教堂和其他机构教化的过程实施的道德限制。
但它不是一个简单的叛乱。
更重要的是,“消费品的定义和缓解发起、维护和解散的社会关系,可以让人抗议和定义与他人界限。
到自己的被社会认可”(Cross,2000,p.65)到现在为止,这部分的购物体验一直保持不变。
购物提供了一种方法,通过它人们实现他们希望成为谁的鉴定。
在大量移民的国家,购物提供了移民同化问题的最快途径。
电子商务信用中英文对照外文翻译文献(文档含英文原文和中文翻译)英文:Towards Enhancing Trust on Chinese E-Commerce Abstract:E-Commerce has been much more popular in western countries where the development of E-Commerce systems has been relatively matured. While the technology and social credit environment are well developed, E-Commerce is relatively new and receives fewer acceptances within commercial industries in China. Building trust has been identified as one of the major concerns in E-Commerce.In this paper, we will develop an computational model, which may be used to improve the trust-building relationship among consumers, retailers and authorities. This model considers a number of factors including direct experiences, customer recommendations, and authority certification, while parties involved in the E-Commerce activities can confidently establish and reliably enhance the trustworthiness.We also conduct a case study on how to improve consumer-retailer trust relationship in an E-Commerce application by the use of the trust model, which is one of functional electronic storefronts with the consideration of trustworthiness in China. In addition, the findings from this research will also be helpful for national policy maker on legislation of Chinese E-Commerce activities.Key Words: Trust, E-Commerce, Trust-building, Computational model, Chinese E-Commerce.I. Introduction“With the rapid development of Internet technology, the landscape of exchanging information and doing business has been com pletely changed”. As a new way of doing business, E-Commerce is increasingly affecting, changing and even replacing the traditional commerce approach. People are increasingly accepting and using E-Commerce than ever before. Without any doubt, many network applications, based on initial Door to Door to B2B, B2C, and C2C models, have a profound influence on the global economy. However most of the development of E-Commerce is primarily achieved within a handful of countries, particularly in countries like US, Japan and some of European countries. Since the advent of the Internet in the late 1990’s in China, various applications can be seen in the following years, which stirred thousands of ambitious young Chinese people to establish their own business on-line with a dream of getting wealthy overnight. Over the past few years, almost 70% of the growth in Internet users from all over the world occurred only in China. However, in terms of E-Commerce development, there is still a gap between China and the developed countries. With the increased popularity of the Internet and the continuous improvement of Internet technologies, the development of E-Commerce has just made an impressive start. What hinder the development of Chinese E-Commerce can be attributed to various problems and barriers. Some of these problems such as payment method, distribution problem, and security issues have been partially alleviated. Unfortunately the consumers’ lack of trust towards E-Retailers has been identified as the biggest barrier that needs to be overcome in long-term.In the paper, we will identify the challenges in developing Chinese E-Commerce and propose a model to cooperate with current E-Commerce system as a mean of enhancing trustworthiness. The paper is organized into 6 sections. Section 2 introduces the current standing of E-Commerce, and then Section 3 briefly reviews the challenges in developing E-Commerce, and examines the “Trust problem”, which is identified as the major obstacle that hinders the spreading of E-Commerce in China. In Section 4, we propose a computational model that can be used to address the trust problem. Section 5 specifically discusses how to apply the model to improve trustworthiness, and gives a case study in Section 6. Section 7 concludes the paper by discussing further directions for improving trust between E-Commerce users.II. Current Chinese E-Commerce Standing(I) Issues in E-CommerceTrust has always been the main concern among most of Chinese E-Commerce companies. On one hand, people are impressed by doing business on-line, but on the other hand they are still worried about using E-Commerce widely. Consequently, a gap appeared between on-line retailers’interest in attracting shoppers to their electronic storefronts and many consumers’ trust in those activities. Nevertheless, researches have shown that the trust problem is not only technical problem, but more of a social problem caused by various reasons. First and foremost, for historical reasons, people may lack of confiden ce with others, therefore it’s quite difficult to puttrust in someone else in the beginning. Secondly, the commercial law and regulation for E-Commerce cannot fully protect the interests of consumers and merchants. Therefore E-Commerce users lack the confidence to take the risk when communicating with an unfamiliar party. Thirdly, the social credit system and payment system in China are still not strong enough when carrying complex E-Commerce transactions, so that on-line business frauds may happen, and harm consumers. Last but not least Internet security and cryptography techniques, which can increase consumers’confidence in on-line activity, are still under development. Due to all these issues, E-Commerce specialists commonly regard that the bottleneck of Chinese E-Commerce is as a trust problem than anything else.(II) Opportunities of Chinese E-CommerceIn 2005, Chinese E-Commerce has been experiencing the upsurge of B2C markets. With the recognition of trust problem, many retailers are experimenting with various trust building strategies to establish trustworthiness towards E-Retailers. Establishing trust between E-Commerce users is a long term process. Apart from more education or training in the long term, we can resort to technology to enhance consumer trust in an unfamiliar E-retailer. One effective method is to participate in third-party assurance programs, which assist consumers in an accessible level of trust they should place in an E-Commerce transaction. In that way, merchants who agree to meet a third party assures standards can either use the assure certified technology, or agree to be bound in some way by the assure procedures or oversight are registered by the assure and permitted to display an identifying logo or assurance seal on their website. Consumers can reveal specific validation of the merchants good-standing with the assure or additional disclosures related to the merchants’ business practices or history. Some theories suggest that trust in an E-retailer can be speci fically defined as consumers’ willingness to accept vulnerability in an on-line transaction based on their positive expectations regarding an E-Retailers future behavior. By evaluating a party’s post behavior and tracking its activities, the party’s futu re behavior can be expected and trust level can be considered so that consumers can make purchasing decision according to the trust level of E-Retailer. In this paper, a third party assurance program that can be cooperated with the current E-Commerce system is proposed. Through tracking E-Retailer ’s activity records, collecting consumer experiences, and recommendations, the computation model is capable of considering the level that consumer can trust an unfamiliar E-Retailer. More detail about the model is described in Section 4.III. Challenges in Developing Chinese E-CommerceChinese E-Markets is undeniably of great potential. E-Markets are not only beneficial for national economy, but also for the global economy, especially since China has entered the World Trade Organization (WTO). However, in terms of developing E-Commerce, there is a gap between China and other developed countries. The primary cause is that the advent of information age has a great impact on the economy of industrialized countrie s, while the social environment and China hasn’t become used to its coming. These can be noticed from various aspects including information infrastructure, barriers of social environment, degree of technologyinnovation, level of awareness, and trustworthiness and so on. Technically, the improvement is obvious, but it’s difficult to catch up in short term for some social problems.(I) Informationization GapCurrent social environment in China is yet to match the rapid informationization. The understanding of the relation and interaction between industrialization and informationization is inadequate. In addition, the importance and urgency of informationization in social and economic development haven’t been fully appreciated. Apart from that, for a long term progress, the awareness and acceptance to informationization are still underway both theoretically and practically.Furthermore, the global information infrastructure are building up, China is not a exception. However, the popularity of informational and electronic facilities in China is still behind the USA, even though 70% of the growth in Internet users occurred in China. That is mainly due to the huge population of China and the imbalanced development of different regions.In terms of the innovation of information technology, China is catching up to the developed countries progressively, although the exploring and utilization of information resources and services are not yet adequate.(II) Social Barriers in E-CommerceIn China, E-Commerce activities are impeded by some social barriers as well. For instance, the law and regulation are not flawless. E-commerce gives a full impetus to social and economic development; in the meantime, it raises some new problems. So we need to address the inadequacy of traditional policy and laws in the new circumstance, and recommend new and effective law and regulation system. E-commerce may cause multi-facet problems, such as legitimacy and authentication of E-currency, E-contract, and E-bill. Taxation is another problem. It includes how to collect business tax and custom; whether new tax and collecting methods are needed for some intangible products (e.g. software, electrical audio and video); how to secure market and prevent monopoly, especially telecommunication monopoly; how to protect privacy and Intellectual Property(IP); how to manage and control export and import of intangible products, and so on.There is a lack of E-Commerce standard. Standardization and legislation is a difficult but important task in developing E-Commerce. For instance, before the E-Signature Standard was invented in China, there was no particular standard to normalize the behaviors on Internet, therefore, it could not setup a standard business environment compatible with international standards, which has a huge impact on integration of individual country and global economy.Another problem associated with E-Commerce is the social credit system and payment system. The present E-Commerce can only be regarded as quasi-E-Commerce. Since the credit system lacks of trust, effective monitoring and payment mechanism. The Internet commodity transaction centers only fulfilled parts of E-Commerce processes, but by no mean to be full processes from pre-purchase to post-purchase. The current distribution system for Chinese E-Commerce is still not satisfied enough. For instance, the delivery of products has yet to be separated frommanufacturing and commercial enterprisers. The incomplete distribution system still responds passively to production and sales departments, where different processing links such as warehousing, transporting and loading functions as independent entities so that the distribution problem has not been solved well at present.In summary, these informationization gaps and social barriers indeed hinder the development of Chinese E-Commerce, but many people consider lack of consumers trust in E-Commerce merchants, technology, social, financial and legal infrastructures of E-Commerce environment as the most concerned issues that affect the development in an individual country, since most traditional cues for assessing trust in physical world are not available on-line.(III)Trust IssueTrust is a catalyst for human cooperation, and it has received considerable attention in the business and social science literature. Lack of trust can result in a waste of time and resources on protecting ourselves against possible harm and thereby clogs up the economy. Consumer’s trust in an E-Retailer can be defined as consumers’willingness to accept vulnerability in an on-line transaction based on their positive expectations in regard with an E-Retailers future behavior. Factors that affect trust in E-Commerce for consumers include security risks, privacy risks, and lack of reliability in E-Commerce processes in general. As pointed by Nielsen, real trust builds through a company’s actual behavior towards its customers over time, and it is seen to be difficult to build and easy to lose. Theoretically, there are three trust-building processes summarized in:1. Knowledge-based trust is described as a form of trust that develops over time as one party learns about intentions, capabilities, and activity experiences. Example can be recommendation, evaluations, and reputations.2. Institutional-based trust relied on the creation of a “trust infrastructure”, of socially recognized third-party intermediaries that certify the trustworthiness of parties in a commercial exchange or actually enforce trustworthy behaviors on the part of one or both partners. Such example is certificate, membership of association.3. Trust transfer happens when one party ascribes trustworthiness to an unfamiliar exchange partner based on that partner’s association with a trusted party.In the ext section, we will describe a computational model, which can be used to facilitate the trust- building process in E-Commerce, particularly for Chinese E-Commerce market.In this paper, we surveyed the E-Commerce activities currently under going in China. We have closely analyzed the gap between the informationization and barriers of Chinese E-Commerce systems. Among the topics of facilitating development of a positive, effective and satisfied E-Commerce system, “trust” is a major issue, which has not received adequate attention in past decades. We have proposed a computational trust model (ERC2G), which can foster a trust relationship between consumers and merchants, and illustrate how to apply the model in a Chinese E-Commerce system. From the case study of EI Computer, we briefly talked about the implementation of E-Commerce systems with the consideration of enhancing trust. However, establishing trust must be a complex process, which involves moreinformation sources, so continuous improving and enhancing the trustworthiness will be the main objective we need to achieve in future work.翻译:提升中国电子商务信用度摘要电子商务在西方国家已经非常流行,并且电子商务系统在这些国家的发展也相对成熟。
电子商务信息安全中英文对照外文翻译文献(文档含英文原文和中文翻译)原文:E-commerce Information Security ProblemsⅠ. IntroductionE-commerce (E-Business) is in open networks, including between enterprises (B2B), business and consumers (B2C) commercial transactions, compared with the traditional business model, e-commerce with efficient, convenient, covered wide range of characteristics and benefits. However, e-commerce open this Internet-based data exchange is great its security vulnerabilities, security is a core e-commerce development constraints and key issues.In this paper, the basic ideas and principles of systems engineering, analyzes the current security threats facing e-commerce, in this based on security technology from the perspective of development trend of e-commerce.Ⅱ. E-commerce modelModern e-commerce technology has focused on the establishment and operation of the network of stores. Network in the department stores and real stores no distinction between structure and function, differences in their function and structure to achieve these methods and the way business operate.Web store from the front view is a special kind of WEB server. WEB site of modern multimedia support and a good interactive feature as the basis for the establishment of this virtual store, so customers can, as in a real supermarket pushing a shopping cart to select goods, and finally in the checkout check out. These online stores also constitute the three pillars of software: catalog, shopping cart and customer checkout. Customers use an electronic currency and transaction must store customers and stores are safe and reliable.Behind the store in the network, enterprises must first have a product storage warehouse and administration; second network to sell products by mail or other delivery channels to customers hands; Third, enterprises should also be responsible for product after-sales service, This service may be through networks, may not. Internet transactions are usually a first Pay the bill and getting goods shopping. For customers, convenience is that the goods purchased will be directly delivered to their home, but hard to feel assured that the goods can not be confirmed until the handsreach into their own hands, what it is.Therefore, the credibility of the store network and service quality is actually the key to the success of e-commerce.Ⅲ.the key to development of electronic commerceE-commerce in the telecommunications network to develop. Therefore, the advanced computer network infrastructure and telecommunications policy easing the development of electronic commerce has become a prerequisite. Currently, telecom services, high prices, limited bandwidth, the service is not timely or not reliable and so the development of e-commerce has become a constraint. Speed up the construction of telecommunications infrastructure, to break the telecommunications market monopoly, introduce competition mechanism to ensure fair competition in the telecommunications business, to promote networking, ensure to provide users with low-cost, high-speed, reliable communications services is a good construction target network environment, but also all of the world common task.E-commerce the most prominent problem is to solve the on-line shopping, trading and clearing of security issues, including the establishment of e-commerce trust between all the main issues, namely the establishment of safety certification system (CA) issues; choose safety standards (such as SET , SSL, PKI, etc.) problems; using encryption and decryption method and encryption strength problems. Establishment of security authentication system which is the key.Online trading and traditional face to face or written transactions in different ways, it is transmitted through the network business information and trade activities. The security of online transactions means:Validity: the validity of the contract to ensure online transactions, to prevent system failure, computer viruses, hacker attacks.Confidentiality: the content of the transaction, both transactions account, the password is not recognized by others and stealing.Integrity: to prevent the formation of unilateral transaction information and modify.Therefore, the e-commerce security system should include: secure and reliable communications network to ensure reliable data transmission integrity, prevent viruses, hackers; electronic signatures and other authentication systems; complete data encryption system and so on.Ⅳ.e-commerce security issues facingAs e-commerce network is the computer-based, it inevitably faces a number of security issues.(1) Information leakPerformance in e-commerce for the leakage of business secrets, including two aspects: the parties are dealing transactions by third parties to steal the contents; transaction to the other party to provide documents used illegal use by third parties.(2) AlteredE-commerce information for business performance in the authenticity and integrity issues. Electronic transaction information in the network transmission process may be others to illegally modify, delete or re-changed, so that information about its authenticity and integrity.(3) IdentificationWithout identification, third-party transactions is likely to fake the identity of parties to a deal breaker, damage the reputation of being counterfeit or stolen by one party to the transaction fake results and so on, for identification, the transaction between the two sides can prevent suspicion situation.(4) Computer virusesComputer virus appeared 10 years, a variety of new virus and its variants rapidly increasing, the emergence of the Internet for the spread of the virus has provided the best medium. Many new viruses directly using the network as its transmission, as well as many viruses spread faster through dried networks, frequently causing billions of dollars in economic losses.(5) HackerWith the spread of a variety of application tools, hackers have been popular, and are not in the past; non-computer expert can not be a hacker. Have kicked Yahoo's mafia boy did not receive any special training, only a few attacks to the users to download software and learn how to use the Internet on a big dry.Ⅴ.e-commerce security and safety factorsEnterprise application security is the most worried about e-commerce, and how to protect the security of e-commerce activities, will remain the core of e-commerce research. As a secure e-commerce system, we must first have a safe, reliable communication network, to ensure that transaction information secure and rapidtransmission; second database server to ensure absolute security against hackers break into networks to steal information. E-commerce security technologies include encryption, authentication technology and e-commerce security protocols, firewall technology.(A), encryption technologyTo ensure the security of data and transactions to prevent fraud, to confirm the true identity of transaction parties, e-commerce to adopt encryption technology, encryption technology is through the use of code or password to protect data security. For encrypted data is called plaintext, specifically through the role of a encryption algorithm, the conversion into cipher text, we will express this change as the cipher text is called encryption, the cipher text by the decryption algorithm to form a clear role in the output of this a process known as decryption. Encryption algorithm known as the key parameters used. The longer the key, the key space is large, traverse the key space the more time spent, the less likely cracked.Encryption technology can be divided into two categories: symmetric encryption and asymmetric encryption. Symmetric encryption to the data encryption standard DES (Data Encryption Standard) algorithm is represented. Asymmetric encryption is usually RSA (Rivets Shamir Aleman) algorithm is represented.(B), authenticationCommonly used security authentication technologies: digital signatures, digital certificates, digital time stamp, CA security authentication technology.(C), hacker protection technologyCurrently, hackers have become the biggest e-commerce security threats, thus preventing hacking network security technology has become the main content, by governments and industry are highly valued. Hacking techniques include buffer overflow attacks, Trojans, port scans, IP fraud, network monitoring, password attacks, and denial of service Dos attacks. At present, people have made many effective anti-hacker technologies, including firewalls, intrusion detection, and network security evaluation techniques.Ⅵ.the future security of e-commerceIncreasingly severe security problems, are growing threat to national and global economic security, governments have been based on efforts in the following areas: (1) Strengthen the legislation, refer to the advanced countries have effective legislation, innovative, e-commerce and improve the protection of the laws againstcyber-crime security system.(2) Establishment of relevant institutions, to take practical measures to combat cyber crime. Development of the law, the implementing agencies should also be used for its relevant laws, which must establish an independent oversight body, such as the executing agency to implement the law.(3) Increase investment in network security technology; improve the level of network security technology. E-commerce security law is the prerequisite and basis for development and secure e-commerce security technology is a means of protection. There are many security issues are technical reasons, it should increase the technology resources, and continuously push forward the development of old technologies and developing new security technology.(4) To encourage enterprises to protect themselves against Internet crime against. To avoid attack, companies can not hold things to chance, must attach great importance to system vulnerabilities, in time to find security holes to install the operating system and server patches, and network security detection equipment should be used regularly scan the network monitoring, develop a set of complete security protection system to enable enterprises to form a system and combined with the comprehensive protection system.(5) To strengthen international cooperation to strengthen global efforts to combat cyber crime. As e-commerce knows no borders, no geographical, it is a completely open area, so the action against cyber crime e-commerce will also be global. This will require Governments to strengthen cooperation, can not have "the saying which goes, regardless of others, cream tile" misconception.(6) To strengthen the network of national safety education, pay attention to the cultivation of outstanding computer.Ⅶ. ConclusionE-commerce in China has developed rapidly in recent years, but the security has not yet established. This has an impact on the development of electronic commerce as a barrier.To this end, we must accelerate the construction of the e-commerce security systems. This will be a comprehensive, systematic project involving the whole society. Specifically, we want legal recognition of electronic communications records of the effectiveness of legal protection for electronic commerce; we should strengthen the research on electronic signatures, to protect e-commerce technology; we need to build e-commerce authentication system as soon as possible, to organize protection for electronic commerce. Moreover, for e-commerce features without borders, we shouldalso strengthen international cooperation, so that e-commerce truly plays its role. Only in this way, we can adapt to the timesPromoting China's economic development; also the only way we can in the economic globalization today, to participate in international competition, and thus gain a competitive advantage.Source: Michael Hecker, Tharam S. Dillon, and Elizabeth Chang IEEE Internet Computing prentice hall publishing, 2002电子商务中的信息安全问题一、引言电子商务(E-Business)是发生在开放网络上的包括企业之间(B2B)、企业和消费者之间(B2C)的商业交易,与传统商务模式相比,电子商务具有高效、便捷、覆盖范围广等特点和优点。
文献翻译题目小型网上商城的设计与实现学生姓名******专业班级************************* 学号************院(系)软件学院指导老师(职称)************完成时间2015年 4 月14 日改进性能的JSP切分作者:Takuya NakaikeIBM Japan, Ltd摘要当网页应用服务器能分别存储通过执行JSP片段获得的网页页面片段时,把一个JSP(Java服务器页面)页面切分成若干个片段能改进JSP页面的执行性能。
如果一个JSP 页面根据通过执行JSP页面获得的网页页面的每一个部分的不断跟新被切成若干片段,所有切分的JSP片段不需要被再次执行,只有当需要调用的网页片段在缓存中过期了。
另外,一个JSP页面的片段能够被其他的JSP页面再次使用。
在这两种情况下,所有的从JSP页面中切分的JSP片段的执行结果必须与在JSP页面切分之前一样。
在这篇文章中,本文提出JSP切分,它是一种把JSP页面切分成片段的方法,维持了存在于源JSP页面的数据和控制依赖。
JSP切分自动检测了需要维持JSP页面的数据和控制依赖的部分,因为开发者想要从JSP页面中切分这部分。
我们使用GUI工具实施JSP切分,并且证实切分的JSP 片段和JSP页面切分之前是以同一方式执行的。
实验结果显示通过切分一个JSP页面为片段和为通过执行JSP片段获得的网页片段设置不同的存储方法能够减少访问网页的响应时间。
1.引言当网页应用服务器能够分别的存储通过执行JSP页面的片段获得的网页片段时,把一个JSP页面切分成若干片段能改善一些JSP页面的执行性能。
由于内容的动态性,通过JSP引擎产生的存储动态网页的方法是受限的。
当通过JSP引擎产生的网页的存储内容被更新,整个JSP页面必须在应用服务器上再次被执行,尽管网页的改变可能很小。
由于存储网页的不断更新增加应用服务器上的负载,它合理的把JSP页面切分成为若干个片段,并且为通过执行JSP片段获得的网页片段设置不同的存储方法。
跨境电子商务中英文对照外文综合文献
前言:
跨境电子商务是指进行跨境地区间的电子商务交易活动,涉及如商品销售、支付、物流和退款等环节。
随着全球化进程的加快,跨境电子商务在国际贸易中扮演着越来越重要的角色。
本文对跨境电子商务中的相关问题进行了综合研究,分析和比较了中文和英文文献的内容。
主要内容:
1. 跨境电子商务的发展趋势
- 中文文献:中文文献指出,随着互联网技术的快速发展,跨境电子商务得到了长足发展。
中国作为全球最大的电子商务市场之一,积极推动跨境电子商务的发展,并倡导加强国际合作。
- 英文文献:英文文献指出,全球各国的跨境电子商务规模不断扩大。
亚洲地区的跨境电子商务增长最快,尤其是中国和印度等新兴市场。
越来越多的人开始通过跨境电子商务平台购买商品。
2. 跨境电子商务的挑战
- 中文文献:中文文献强调了跨境电子商务面临的挑战,包括语言和文化差异、支付安全、海关监管等方面。
同时也提出了相应的解决方案,如加强培训、加强合作等。
- 英文文献:英文文献指出,跨境电子商务面临着网络安全、消费者保护和知识产权保护等挑战。
各国政府应加强监管和合作,以确保跨境电子商务的健康发展。
结论:
跨境电子商务作为全球化进程的产物,对国际贸易发挥着重要作用。
中文和英文文献都对跨境电子商务的发展趋势和挑战进行了深入研究。
这些文献提供了宝贵的信息和见解,有助于我们更好地理解跨境电子商务的现状和未来发展方向。
参考文献:
- 中文文献引用
- 英文文献引用。
英文文献:The application of e-commerce for SMEsA great advantage of e-commerce is not only suitable for use in large enterprises, but also very beneficial to many small and medium enterprises. Relative to large enterprises, small and medium enterprises of human, financial, information technology, weak and small and medium enterprises to apply e-commerce is a new topic to be studied. Typically, the use of e-commerce has four types: information access, personal communication, shopping services, virtual enterprises.As e-commerce is a complex system engineering, it will use many new technologies, but the most important thing is the following: Electronic Data Interchange (EDI), bar codes, e-mail, Internet, WorldWideWeb, product data exchange and electronic form. The benefits of e-commerce use by SMEsFor small and medium sized e-commerce can give them to bring many new opportunities and challenges facing SMEs it can solve many difficulties and problems. The arrival of Internet for SMEs to open up a broader market space. As the information in the enterprise's competitive edge competitive play an increasingly important role, with e-commerce, information on SMEs and big business competition. Overall, the impact of electronic commerce for small and medium enterprises can be divided into the following areas: 1. Global markets, the competitiveness of SMEs traditional market can be strengthened; SMEs have more opportunities to sell the products to various countries and regions worldwide. 2. Market supply chain suppliers to provide design and engineering services required will increase; manufacturers will outsource more non-core businesses; customers will need more electronic communication for use in orders, billing and other business, when large customers that request, which will have a big impact the supply chain; customers will require their suppliers to provide more inventory management services, such as data warehouse and order management; manufacturers will continue to reduce the total number of suppliers; supply chain links between the companies will more closely. 3. Internal operations and process control with greater use of networked information technology and system integration technology, the company will improve communications and collaboration; will use more automated manufacturing technology for integrating external data and internal operations to provide greater opportunities, such as EDI and MRP systems integration; enterprises will reduce the number of employees, but will increase the workload of each employee; business operationsand management costs will be reduced.4. Customer service providers will try to shorten the manufacturing of new products and services of their available time; manufacturers will try to minimize the price; product quality will be greater attention; suppliers will find a need for faster and better to provide order status information (such as the production date); businesses will pay more attention to the product after-sales service; information and telecommunications services, competition will intensify between; available to manufacturers of information and the types of telecommunications services will increase; The new e-commerce products and services will appear; human resources and work structure; computer's role in the enterprise will become more important; small company in training employees to use computers, the more difficult than those of large companies. 5. Information as business assets, the information itself will become an important marketable commodities (such as databases); company data in decision-making will play an important role; through networking, manufacturers will have more and better opportunities to access more widely useful in commercial and technical information. 6. Small business prospects and timely use of the network can access the latest business trends information to guide their production and sales. Determine the feasibility of e-commerce technology When SMEs decide to use e-commerce, it is necessary to meet these business needs to determine the technical feasibility of the various e-business initiatives. A basic principle is to use the most it can increase the operational capacity of e-commerce technology. Here are the most suitable technology for each number of e-commerce applications, can be used for small and medium enterprises in the choice of reference. 1.EDI the structured data into other Yingyong in (such as the use of customer orders to install the product); when the transaction volume can reduce costs; allow the trading of many Butong Huoban (such as customers, suppliers, manufacturers, etc.) trade between easier.2. Barcodes quickly determine and identify the merchandise; to determine the identity and integration into other applications and databases.3. E-mail to individuals or groups to provide free inquiry and exchange; need to send some simple information sharing to all members of the enterprise; by additional document (attachment) to share complex information; to make long-distance collaboration faster and more convenient.4.WorldWideWeb published information about the company to achieve the purpose of publicity companies; from a large number of data sources to retrieve information; e-commerce to buy / sell goods or services; collaboration between multiple users or information sharing.5. Product data exchange needs to be timely productinformation sent to trading partners; distance together with partners in product design.6. Spreadsheet better way to format a norm concerning the management of data; when it comes to many different tasks simultaneously can track the entire process; artificial input data with data on the machine itself is integrated with; by integration of WWW and the implementation of internal systems to facilitate electronic commerce.Several issues should be notedRelative to large enterprises, small and medium enterprises in human, financial, information technology, weaker, and therefore the process of implementing e-commerce there are some issues warrant particular attention, even small enterprises need on the e-commerce system level of view, this process is very important.When companies feel the need of enterprise systems from anywhere in the process started e-commerce can make use of existing commercial enterprises or technology, you can also e-business from scratch for system-level planning and design. If the enterprise may resolve how to deal with excess inventory when the thought of starting e-commerce, while another company might choose through the implementation of e-commerce strategies to improve customer service levels. This is the advantage of a flexible small and medium enterprises, and large enterprises is different, in order to conduct e-commerce system-level on the need for comprehensive planning. For small and medium terms, system-level programs can also be achieved at various stages of e-commerce start. Even if some companies have implemented e-commerce systems can also be quickly modified.For e-commerce may return to the business benefits to be in the business consequences and evaluate the technical feasibility of both. These two aspects will affect the implementation of e-business attitude and determination. One pair of their competition in the market its ability to company not necessarily can do it well the new e-commerce technology,While the other wants to use the new e-commerce tools to expand their competitive advantage of companies, the pace of implementation of e-commerce may be larger.Because electronic commerce is a systematic project, required before the decision to use it make sure to do so can give enterprises the greatest benefits and minimum adverse effects, most important is to ensure the implementation of e-commerce can bring to the moreenterprise of interest returns.中文翻译:中小企业如何应用电子商务电子商务的一个很大的优点是它不仅适合于大企业使用,而且对众多的中小企业也非常有利。
中英文对照外文翻译文献(文档含英文原文和中文翻译)译文:摘要:Servlet程序在服务器端运行,动态地生成Web页面与传统的CGI和许多其他类似CGI的技术相比,Java Servlet具有更高的效率,更容易使用,功能更强大,具有更好的可移植性,更节省投资。
关键字:JSP技术,Servlet, HTTP 服务1.1Servlet 的功能Servlets是运行在Web或应用服务器上的Java程序,它是一个中间层,负责连接来自Web浏览器或其他HTTP客户程序的请求和HTTP服务器上的数据库或应用程序。
Servlet的工作是执行西门的任务,如图1.1所示。
图1.1 web中间件的作用(1) 读取用户发送的显式数据最终用户一般在页面的HTML表单中输入这些数据。
然而,数据还有可能来自applet或定制的HTTP客户程序。
(2) 读取有浏览器发送的隐式请求数据图1.1中显示了一条从客户端到Web服务器的单箭头,但实际上从客户端传送到Web服务器的数据有两种,它们分别为用户在表单中输入的显式数据,以及后台的HTTP信息。
两种数据都很重要。
HTTP信息包括cookie、浏览器所能识别的媒体类型和压缩模式等。
(3) 生成结果这个过程可能需要访问数据库、执行RMI或EJB调用、调用Web服务,或者直接计算得出对应的响应。
实际的数据可能存储在关系型数据库中。
该数据库可能不理解HTTP,或者不能返回HTML 形式的结果,所有Web浏览器不能直接与数据库进行会话。
即使它能够做到这一点,为了安全上的考虑,我们也不希望让它这么做。
对应大多数其他应用程序,也存在类似的问题。
因此,我们需要Web 中间层从HTTP流中提取输入数据,与应用程序会话,并将结果嵌入到文档中。
(4)向用户发送显式数据(即文档)这个文档可以用各种格式发送,包括文本(HTML或XML),二进制(GIF图),甚至可以式建立在其他底层格式之上的压缩格式,如gzip。
但是,到目前为止,HTML式最常用的格式,故而servelt 和JSP的重要任务之一就式将结果包装到HTML中。
(5)发送隐式的HTTP响应数据图1.1中显示了一条从Web中间层到客户端的单箭头。
但是,实际发送的数据有两种:文档本身,以及后台的HTTP信息。
同样,两种数据对开发来说都式至关重要的。
HTTP响应数据的发送过程涉及告知浏览器或其他客户程序所返回文档的类型(如HTML),设置cookie和缓存参数,以及其他类似的任务。
1.2动态构建网页的原因预先建立的文档可以满足客户的许多请求,服务器无需调用servlet就可以处理这些请求。
然而,许多情况下静态的结果不能满足要求,我们需要针对每个请求生成一个页面。
实时构建页面的理由有很多种:1、网页基于客户发送的数据例如,搜索引擎生成的页面,以及在线商店的订单确认页面,都要针对特定的用户请求而产生。
在没有读取到用户提交的数据之前,我们不知道应该显示什么。
要记住,用户提交两种类型的数据:显示(即HTML表单的数据)和隐式(即HTTP请求的报头)。
两种输入都可用来构建输出页面。
基于cookie值针对具体用户构建页面的情况尤其普遍。
2、页面由频繁改变的数据导出如果页面需要根据每个具体的请求做出相应的改变,当然需要在请求发生时构建响应。
但是,如果页面周期性地改变,我们可以用两种方式来处理它:周期性地在服务器上构建新的页面(和客户请求无关),或者仅仅在用户请求该页面时再构建。
具体应该采用哪种方式要根据具体情况而定,但后一种方式常常更为方便,因为它只需简单地等待用户的请求。
例如,天气预报或新闻网站可能会动态地构建页面,也有可能会返回之前构建的页面。
3、页面中使用了来自公司数据库的信息如果数据存储在数据库中,那么,即使客户端使用动态Web内容,比如applet,我们依旧需要执行服务器端处理。
想象以下,如果一个搜索引擎网站完全使用applet,那么用户将会看到:“正在下载50TB的applet,请等待!”。
显然,这样很愚蠢;这种情况下,我们需要与数据库进行会话。
从客户端到Web层再到数据库(三层结构),要比从applet直接到数据库(二层结构)更灵活,也更安全,而性能上的损失很少甚至没有。
毕竟数据库调用通常是对速度影响最大的步骤,因而,经过中间层可以执行高速缓存和连接共享。
理论上讲,servelt并非只用于处理HTTP请求的Web服务器或应用服务器,它同样可以用于其他类型的服务器。
例如,servlet能够嵌入到FTP或邮件服务器中,扩展他们的功能。
而且,用于会话启动协议服务器的servlet API最近已经被标准化。
但在实践中,servelt的这种用法尚不流行,在此,我们只论述HTTP Servlet。
1.3Servlet相对于“传统”CGI的优点和传统CGI及许多类CGI技术相比,Java servelt效率更高、更易用、更强大、更容易移植、更安全、也更廉价。
1、效率应用传统的CGI,针对每个HTTP请求都用启动一个新的进程。
如果CGI程序自身相对比较简短,那么启动进程的开销会占用大部分执行时间。
而使用servelt,Java虚拟机会一直运行,并用轻量级的Java线程处理每个请求,而非重量级的操作系统进程。
类似地,应用传统的CGI技术,如果存在对同一CGI程序的N个请求,那么CGI 程序的代码会载入内存N次。
同样的情况,如果使用servlet则启动N个线程,单仅仅载入servlet类的单一副本。
这种方式减少了服务器的内存需求,通过实例化更少的对象从而节省了时间。
最后,当CGI程序结束对请求的处理之后,程序结束。
这种方式难以缓存计算结果,保持数据库连接打开,或是执行依靠持续性数据的其他优化。
然而,servelt会一直停留在内存中(即使请求处理完毕),因而可以直接存储客户请求之间的任意复杂数据。
2、便利Servelt提供大量的基础构造,可以自动分析和解码HTML的表单数据,读取和设置HTTP报头,处理cookie,跟踪会话,以及其他次类高级功能。
而在CGI中,大部分工作都需要我们资金完成。
另外,如果您已经了解了Java编程语言,为什么还有学校Perl呢?您已经承认应用Java技术编写的代码要比Visual Basic,VBScript或C ++编写的代码更可靠,且更易重用,为什么还有倒退回去选择那些语言来开发服务器端的程序呢?3、强大Servlet支持常规CGI难以实现或根本不能实现的几项功能。
Servlet能够直接于Web服务器对话,而常规的CGI程序做不到这一点,至少在不使用服务器专有API的情况下是这样。
例如,与Web服务器的通信使得讲相对URL转换成具体的路径名变得更为容易。
多个servelt还可以共享数据,从而易于实现数据库连接共享和类似的资源共享优化。
Servelt还能维护请求之间的信息,使得诸如会话跟踪和计算结果缓存等技术变得更为简单。
4、可移植性Servelt使用Java编程语言,并且遵循标准的API。
所有主要的Web服务器。
实际上都直接或通过插件支持servlet。
因此。
为Macromedia JRun编写的servlet,可以不经过任何修改地在Apache Tomcat,Microsoft Internet Information Server,IBM WebSphere,iPlanet Enterprise Server,Oracle9i AS 或者StrNine WebStar上运行。
他们是java2平台企业版的一部分,所以对servlet的支持越来越普遍。
5、廉价对于开发用的网站、低容量或中等容量网站的部署,有大量免费或极为廉价的Web服务器可供选择。
因此,通过使用servelt和jsp,我们可以从免费或廉价的服务器开始,在项目获得初步成功后,在移植到更高性能或高级管理工具的昂贵的服务器上。
这与其他CGI方案形成鲜明的对比,这些CGI方案在初期都需要为购买专利软件包投入大量的资金。
价格和可移植性在某种程度上是相互关联的。
例如,Marty记录了所有通过电子邮件向他发送问题的读者的所在国。
印度接近列表的顶端,可能仅次于美国。
Marty曾在马尼拉讲授过jsp和servlet培训课程,那儿对servelt和jsp技术抱很大的兴趣。
那么,为什么印度和菲律宾都对这项技术着呢感兴趣呢?我们推测答案可能分两部分。
首先,这两个国家都拥有大量训练有素的软件开发人员。
其次,这两个国家的货币对美元的汇率都极为不利。
因此,从美国公司那里购买专用Web服务器会消耗掉项目的大部分前期资金。
但是,使用servlet 和JSP,他们能够从免费的服务器开始:Apache Tomcat。
项目取得成功之后,他们可以转移到性能更高、管理更容易,但需要付费的服务器。
他们的servelt和jsp不需要重写编写。
如果他们的项目变得更庞大,他们或许希望转移到分布式环境。
没有问题:他们可以转而使用Macromedia JRun Professional,该服务器支持分布式应用。
同样,他们的servelt和jsp没有任何部分需要重写。
如果项目变得极为庞大,错综复杂,他们或许希望使用Enterprise JavaBeans来封装他们的商业逻辑。
因此,他们可以切换到BEA WebLogic或Oracle9i AS。
同样,不需要对servlet和jsp做出更改。
最后,如果他们的项目变得更庞大,他们或许将他从Linux转移到运行IBM WebSphere的IBM大型机上。
他们还是不需要做出任何更改。
6、安全传统CGI程序中主要的漏洞来源之一就是,CGI程序常常由通过的操作系统外壳来执行。
因此,CGI程序必须仔细地过滤掉那些可能被外壳特殊处理的字符,如反引导和分号。
实现这项预防措施的难度可能超出我们的想象,在广泛应用的CGI库中,不断发现由这类问题引发的弱点。
问题的第二个来源是,一些CGI程序用不自动检查数组和字符串边界的语言编写而成。
例如,在C和C++中,可以分配一个100个元素的数组,然后向第999个“元素“写入数据——实际上是程序内存的随机部分,这完全合法。
因而,如果程序员忘记执行这项检查,就会将系统暴露在蓄意或偶然的缓冲区溢出攻击之下。
Servelt不存在这些问题。
即使servelt执行系统调用激活本地操作系统上的程序,它也不会用到外壳来完成这项任务。
当然,数组边界的检查以及其他内存包含特性是java编程语言的核心部分。
7、主流虽然存在许多很好的技术,但是,如果提供商助支持他们,或开发人员不知道如何使用这些技术,那么它们的优点又如何体现呢?servelt和jsp技术得到服务器提供商的广泛支持,包括Apache,Oracle,IBM,Sybase,BEA,Maromedia,Causho,Sun/iPlanet,New Atlanta,ATG,Fujitsu,Lutris,Silverstream,World Wide Web Consortinrm ,以及其他服务器。