网络文学翻译论文3000字_网络文学翻译毕业论文范文模板
- 格式:doc
- 大小:39.50 KB
- 文档页数:12
网络文学经济学论文范文网络文学作为一种新兴的文学形式,在当今社会正逐渐成为主流文化的一部分。
随着网络的普及和发展,大量的网络文学作品涌现出来,成为人们日常生活中的重要部分。
网络文学在经济学中的影响也是不可忽视的。
本文将从经济学的角度探讨网络文学的发展对经济的影响,并进行深入分析。
首先,本文将分析网络文学的产业链和价值链,探讨网络文学在经济中的地位和作用。
接着,本文将重点分析网络文学的市场需求和市场竞争,探讨网络文学对经济市场的影响。
最后,本文将提出一些建议和展望,以期为网络文学的发展和经济的繁荣提供一些参考和借鉴。
一、网络文学的产业链和价值链网络文学的产业链和价值链主要包括作家、编辑、平台、读者等。
其中,作家创作文学作品,编辑进行审阅修改,平台提供作品的发布和宣传,读者进行阅读和消费。
这一产业链和价值链形成了一个完整的生态系统,不仅创造了创作者和从业人员的经济收益,也为读者提供了优质的文学产品,同时也为经济市场提供了一种新的文化消费方式。
二、网络文学的市场需求和市场竞争随着网络的发展和普及,网络文学的市场需求在不断增加。
越来越多的人通过网络阅读文学作品,享受到了文学带来的乐趣。
同时,网络文学市场也日益竞争激烈,各个平台纷纷推出各种优惠政策和活动,吸引读者的注意。
在这种市场竞争中,一些优秀的作品和平台得以脱颖而出,成为市场的佼佼者,同时也为整个市场的繁荣做出了贡献。
三、对网络文学市场的建议和展望为了推动网络文学市场的发展,我们需要不断创新,提高作品的质量和产业的服务水平,以吸引更多的读者。
同时,还需要不断加强平台的管理和监管,提倡合法原创,打击盗版和侵权行为,保护作家的合法权益。
随着技术的不断提高和市场的不断扩大,网络文学市场的前景越发广阔,我们可以期待网络文学市场在未来的发展中得到更好的繁荣。
网络文学的蓬勃发展为经济市场带来了新的动力源泉。
从产业链和价值链来看,网络文学产业不仅吸引了大量文学从业者的加入,还催生了一批网络文学平台公司,为经济市场带来了更多的就业机会。
网络文学侵权论文6000字_网络文学侵权毕业论文范文模板网络文学侵权论文6000字(一):网络文学IP改编版权侵权现象探析论文【摘要】目前,在网络文学IP的运营开发中常常出现抄袭或非法改编的情况。
未经授权对网络文学进行抄袭和改编会形成侵权作品,对侵权作品进行衍生开发形成的演绎作品,对被侵权作品的权利保护有何影响?本文对此进行探究,梳理了多种侵权行为并针对不同主体,开发网络文学IP提出合理化建议。
【关键词】网络文学IP著作权演绎作品一、网络文学IP发展背景我国网络文学最早于20世纪90年代末出现,作者多基于个人兴趣进行创作,缺乏成熟的商业运作模式。
随着网络技术和平台服务的完善,文学网站开始摸索商业出路。
2002年,网络文学付费开始出现,文学网站通过用户付费订阅模式激励作者持续创作,并维持自身网站运营,网络文学产业链向集团化、专业化方向发展。
2008年之后,网络文学在电脑端普及并逐渐向移动端转移,一些优秀的网络文学被影视公司购买影视版权,如《失恋33天》《后官甄嬛传》等,相关电影、电视剧的热播,又促使影视投资市场将目光转而集中于网络文学领域。
2012年之后,IP作为知识产权(IntellectualProperty)的代称,进入公众视野,与泛娱乐产业融合。
优质的网络文学作品因有知识产权开发的价值,开始被称作“网络文学IP”。
同一时间,因为影视剧本创作周期长、回报低,影视编剧行业不景气,带来优质原创剧本的缺失。
所以,网络文学丰富的储备资源和庞大的粉丝群,吸引了知名导演、演员的加入,大大降低了投资失败的风险,网络文学IP愈发受到制作公司的青睐。
2015年被称为IP元年,IP成了影视资本市场追逐的热点。
以“网络文学+影视授权”模式经营的电视剧《花千骨》《何以笙箫默》等带来的“追剧”热,又给当时IP影视剧的火爆添柴加薪。
其后,互联网巨头公司立足影视界,放眼整个泛娱乐产业,学习海外,打造新的IP开发模式。
电视剧《择天记》开启了网络文学IP全产业链开发模式,从小说到动漫、电视剧、手游、电影……IP背后潜藏的商业价值开始被最大程度地挖掘。
浅淡网络文学作文
《浅淡网络文学作文》
哎呀呀,说起网络文学呀,那可真是让我又爱又恨呐。
我记得有一次,我迷上了一部网络小说,哇,那情节简直太吸引人了。
当时正值周末,我从早上一起床就捧着手机开始看,啥也不想干,就想知道后面剧情咋发展。
我是一会儿笑得在床上打滚儿,一会儿又紧张得心脏砰砰跳。
我仿佛完全进入了那个小说的世界里,跟着主人公一起冒险、一起经历各种喜怒哀乐。
不知不觉,大半天过去了,我连饭都没顾得上吃,眼睛都快看花了,可还是不愿意停下来。
到了晚上,我才发现自己在这小说上花了这么多时间,眼睛也酸得不行,哎呀,真是太痴迷了。
在现在这个网络时代呀,网络文学真的是无处不在。
有时候坐个地铁,都能看到旁边的人在低着头看网络小说。
它确实给我们带来了很多欢乐和消遣,能让我们在疲惫的时候沉浸其中,暂时忘掉烦恼。
但它也像个小恶魔,有时候会让人沉迷其中不可自拔,耽误一些正事儿呢。
不过呢,咱也不能一棍子打死呀,毕竟它也算是一种独特的文化现象呢。
咱就好好享受它带来的乐趣,但也得把握好度,别让它把咱给“拐跑”咯。
嘿嘿,这就是我对网络文学的那点小感受啦!
这就是我对网络文学的一点小看法,你们是不是也有类似的体验呀?哈哈!。
少数民族网络文学论文一、隐匿与发现:缘自民间的书写姿态1.母语体验与民族精神对于少数民族网络文学十分重要可以肯定的是,网络的兴起与快速普及,不仅推动了民族地区经济、文化、社会发展,而且几乎一夜之间将古老的族群观念和传统习俗晾晒在现代数字化信息桌面之上,逼使偏远山地文化与发达都市文化近距离对视、交流与磨合,促成汉民多元经济、文化、社会生活处于紧张啮合状态,进而唤起少数民族作家“以新载体说老故事”的言说冲动和新奇感受。
所以说,“网络出现之后,各地文学网站如雨后春笋般兴起,在整体上推动了文学创作的繁荣发展,为造就文学新人开辟了一条新的航线。
在某种水准上,少数民族地区反而成为这次传播革命的最大受益者。
一根网线缩短了他们与文化发达地区的时空距离,改变了民族创作的生存空间,巨大而无形的网络为新生一代少数民族作家心灵还乡创造了条件。
具体到少数民族网络文学创作本身,作家主体的姓名符码、题材选择、母语认同、民族精神等无疑是必要而可靠的辨识维度。
限于篇幅,这里只讨论关乎少数民族网络文学民族身份的两大核心指标:一是外在的母语运作,二是内在的精神期盼。
少数民族网络作家的语言认同表现为三个基本层面:单一民族母语认同、汉语共同语认同和汉民双语互译认同。
对于包括部分网络作家在内的年轻一代的少数民族作家而言,一般都有较高学历,出于民族自觉或母语崇拜,常常或不时用母语创作。
有些民族作家坚持用母语方式走网络和纸质双边写作的道路,但多数作家更愿意采取将网络母语文学翻译成汉语纸质文学正式发表或出版的方式。
以藏族作家为例,毛尔盖桑木旦、土登尼玛、昔扎、益西泽仁、列美平措、扎西班典、次仁顿珠、章戈尼玛、根丘多吉、白玛娜珍、才旺瑙乳、旺秀才丹、牧丹、端智嘉、格德嘉、克珠、司徒、央珍、唯色、奔嘉、俄邛、班果等老中青作家中,大多都有双语创作体验,其中的部分青年作家在传统纸质文学和现代网络文学创作中均有实绩,有力推进了当代藏语文学的发展。
这表明,网络文学仅仅少数民族传统文学创作方式的时代延伸,而并非部分学者所想象的那样———是对原有文学传统的彻底颠覆。
Human resource management more and more drives value. Under the system that economy development mature, human resource management have to match with fight for the best resources performance, if out of character of the manpower form couples out of character of post, the resources performance be not only whole have no, or may have already exhaust. The modern economy stress balance and match, promote management effect and quality vegetable, will human resource match with make balance, the inside contents establish human resource structure frame, use most in keeping with of the person do most in keeping with of work. Establishment human resource terrace is a communication and collection information way, everyone's opinion comprehensive, give up short take long, with processing salary, welfare etc. affair. Human resource most the importance be a training and development, human resource development have to investment at training aspect, with exertive each stratum of human resource potential.人力资源管理愈来愈被重视。
3000字论文格式模板中国的文学论文在不断提升,论文格式模板也在不断地发展。
下面小编给大家分享一些3000字论文格式模板,大家快来跟小编一起欣赏吧。
3000字论文格式模板目录一、任务书二、开题报告三、文献综述四、毕业设计(论文)诚信承诺书设计 ( 论文 ) 任务(包括原始数据、技术要求、工作要求)论文设计:结合大学专业学习,以及个人的特点、兴趣、专长,和指导老师研究讨论之后定下“ ”这个论文题目。
搜集资料:根据论文题目和内容查阅资料进行资料搜集,从相关的报刊、杂志和书籍网络中进行有关资料的搜集。
写作提纲:和指导老师交流,征求意见后拟定论文提纲,并于2010年9月上交。
论文进度:2011年7月- 9月完成开题报告,征求导师意见并修改;2011年9月-2011年10月撰写论文初稿、完成初稿;2011年10月提交二、三稿,在指导老师指导下进行修改;2011年11月5日定稿。
工作要求:1. 英语专升本毕业论文(包括翻译类选题)必须用外语撰写,正文长度要求4000字以上。
2. 参考文献必须15篇以上,包括中外文文献,要求至少10篇为外文参考文献(其中翻译类选题要求至少5篇为外文参考文献)。
参考文献只列作者直接阅读过、正式发表的文献资料。
引用网上参考文献时,应注明该文献的准确网页地址和上网检索时间,网上参考文献不包含在上述规定的文献数量之内。
3. 毕业论文的撰写严格依照教务处制定的(见外国语学院网站)的要求进行。
4. 毕业论文要求在教师指导下独立完成。
严禁任何抄袭或复制他人论文的不道德行为,违者按不及格处理。
有以下现象者认定为剽窃或抄袭行为:全文1/3(含1/3)以上与他人研究成果雷同者;论文中有一个自然段(含)以上与他人成果相同者,或有一个自然段(含)以上与他人成果雷同,但有个别词句改变者;完整或部分引用他人的观点,不注明出处者时间安排:2011年7月-9月完成开题报告,征求导师意见并修改;2011年9月-2011年10月撰写论文初稿、完成初稿;2011年10月提交二、三稿,在指导老师指导下进行修改;2011年11月5日定稿;2011年11月12日答辩。
英文学院研究生学期课程论文课程名称文学翻译学期 2011-2012年第1学期学号 2011082姓名刘雅庆专业外国语言学及应用语言学研究方向翻译与翻译研究学生类别硕士生任课教师党争胜成绩评析《三国演义》节选英译一、简介《三国演义》的作者罗贯中是元末明初著名的小说家、戏曲家,是中国章回小说的鼻祖。
罗贯中创作才能是多方面的,一生著作颇丰,其中《三国演义》最为著名。
《三国演义》描写的是从东汉末年到西晋初年之间近100年的l历史风云,全书反映了三国时代的政治军事斗争、三国时代各类社会矛盾的渗透与转化、这一时代的历史巨变塑造了一批叱咤风云的英雄人物。
小说以三国时期的历史为基本内容,通过丰富的艺术想象,详细描写了近半个世纪魏、蜀、吴三国纷争和兴衰过程。
《三国演义》是我国章回小说的开山作品,也是我国最有成就的长篇历史小说之一。
其情节曲折生动,人物形象栩栩如生,结构宏达严密,语言风格独特。
因为《三国演义》是半文言,所以不宜照搬直译,在翻译过程中,我认为此译者遵循了“忠、优、美”的翻译原则,即,“忠实原文”,“优如主文”,“美如客文”。
然而,这些原则的实现离不开作者对翻译理论的掌握和对翻译策略的灵活运用,当然,从翻译批评角度来说,对于一些词语的理解及其翻译,我和译者有一些不同的观点。
以下是我对译本的评析,主要是从翻译理论方面欣赏译者的雅笔,并提出自己的异议。
二、翻译赏析在翻译策略中,增译是很重要的一种方法,在此译文中给我印象最深的是是译者多处使用增译策略,有些是在介绍历史年代,人物,以及一些文化释义词等,为了使目的语读者更好地了解历史事件,有些是在介绍完故事之后,为了前后衔接连贯,承上启下,增译的部分通常放在句末或者句首,例1:原文:时有宦官曹节等弄权,窦武、陈蕃谋诛之,机事不密,反为所害,中涓自此愈横。
译文:Dou Wu and Chen Fan, disgusted with the abuses of the eunuchs in the affairs of the state, plotted the destruction for the power-abusing eunuchs. But Chief Eunuch Cao Jie was not to be disposed of easily. The plot leaked out, and the honest Dou Wu and Chen Fan were put to death, leaving the eunuchs stronger than before. 此划线句子在文中并没出现,但译者为了使故事情节前后连贯,更生动形象增加了此句。
浅淡网络文学作文
《浅淡网络文学作文》
哎呀,说起网络文学啊,那可真是现在特火的一个玩意儿呢!
我就记得有一次,我坐在那沙发上,本来是想找点乐子,就随手点开了一本网络小说。
嘿,这一看可就不得了啦。
那故事情节就跟有魔力似的,勾着我一直看下去。
小说里写的是一个大侠的故事,那大侠可牛了,什么飞檐走壁、以一敌百,看得我那叫一个热血沸腾啊!我就跟被吸进去了一样,眼睛都舍不得眨一下,跟着这个大侠一路闯荡江湖。
我一会儿紧张得不行,一会儿又哈哈大笑,我妈喊我吃饭我都听不见。
从白天看到黑夜,我都差点忘了时间。
这就是网络文学的魅力呀!它能让你沉浸在各种奇妙的世界里,一会儿上天入地,一会儿穿越古今。
虽然有时候情节吧可能有点夸张,语言也没那么讲究,但就是让人欲罢不能呢。
我觉得网络文学就像是我们生活中的调味剂,给我们带来了很多欢乐和想象的空间。
不管咋样,它确实丰富了我们的阅读生活,让我们能随时开启一段不一样的冒险。
总之啊,网络文学这东西还挺有意思的,以后我肯定还会继续看好多好多呢!哈哈!。
Hacking tricks toward security on network environments Tzer-Shyong Chen1, Fuh-Gwo Jeng 2, and Yu-Chia Liu 11 Department of Information Management, Tunghai University, Taiwan2 Department of Applied Mathematics, National Chiayi University, TaiwanE-Mail:****************.edu.twAbstractMounting popularity of the Internet has led to the birth of Instant Messaging, an up-and-coming form of Internet communication. Instant Messaging is very popular with businesses and individuals since it has instant communication ability. As a result, Internet security has become a pressing and important topic for discussion. Therefore, in recent years, a lot of attention has been drawn towards Internet security and the various attacks carried out by hackers over the Internet. People today often handle affairs via the Internet. For instance, instead of the conventional letter, they communicate with others by e-mails; they chat with friends through an instant messenger; find information by browsing websites instead of going to the library; perform e-commerce transactions through the Internet, etc. Although the convenience of the Internet makes our life easier, it is also a threat to Internet security. For instance, a business email intercepted during its transmission may let slip business confidentiality; file transfers via instant messengers may also be intercepted, and then implanted with backdoor malwares; conversations via instant messengers could be eavesdropped. Furthermore, ID and password theft may lose us money when using Internet bank service. Attackers on the Internet use hacking tricks to damage systems while users are connected to the Internet. These threats along with possible careless disclosure of business information make Instant Messaging a very unsafe method of communication for businesses. The paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing or fraud via e-mails. (3) Fake Websites. Keywords:Hacking tricks, Trojan programs, Phishing, Firewall, Intrusion detection system.1. IntroductionIncreasingly more people are using instant messengers such as MSN Messenger, Yahoo! Messenger, ICQ, etc as the media of communication. These instant messengers transmit alphanumeric message as well as permit file sharing. During transfer, a file may be intercepted by a hacker and implanted with backdoor malware. Moreover, the e-mails users receive every day may include Spam, advertisements, and fraudulent mail intended to trick uninformed users. Fake websites too are prevalent. Websites which we often visit could be counterfeited by imitating the interface and the URL of the original, tricking users. The paper classifies hacking tricks into three categories which are explained in the following sections.2. Hacking TricksThe paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing (3) Fake Websites.2.1 Trojan programs that share files via instant messengerInstant messaging allows file-sharing on a computer [9]. All present popular instant messengers have file sharing abilities, or allow users to have the above functionality by installing patches or plug-ins; this is also a major threat to present information security. These communication softwares also makeit difficult for existing hack prevention methods to prevent and control information security. Therefore, we shall discuss how to control the flow of instant messages and how to identify dangerous user behavior.Hackers use instant communication capability to plant Trojan program into an unsuspected program; the planted program is a kind of remotely controlled hacking tool that can conceal itself and is unauthorized. The Trojan program is unknowingly executed, controlling the infected computer; it can read, delete, move and execute any file on the computer. The advantages of a hacker replacing remotely installed backdoor Trojan programs [1] with instant messengers to access files are:When the victim gets online, the hacker will be informed. Thus, a hacker can track and access the infected computer, and incessantly steal user information.A hacker need not open a new port to perform transmissions; he can perform his operations through the already opened instant messenger port.Even if a computer uses dynamic IP addresses, its screen name doesn’t change.Certain Trojan programs are designed especially for instant messengers. These Trojans can change group settings and share all files on the hard disk of the infected computer. They can also destroy or modify data, causing data disarray. This kind of program allows a hacker access to all files on an infected computer, and thus poses a great threat to users. The Trojan program takes up a large amount of the resources of the computer causing it to become very slow and often crashes without a reason.Trojan programs that access a user computer through an instant messenger are probably harder to detect than classic Trojan horse programs. Although classic Trojan intrudes a computer by opening a listening or outgoing port which is used to connect toa remote computer, a desktop firewall can effectively block such Trojans. Alternatively, since it is very difficult for the server’s firewall to spot intrusion by controlling an instant messenger’s flow, it is extremely susceptible to intrusion.Present Trojan programs have already successfully implemented instant messengers. Some Trojan programs are Backdoor Trojan, AIMVision, and Backdoor. Sparta.C. Backdoor Trojans use ICQ pager to send messages to its writer. AIMVision steals AIM related information stored in the Windows registry, enabling a hacker to setup an AIM user id. Backdoor. Sparta.C uses ICQ to communicate with its writer and opens a port on an infected host and send its IP Address to the hacker, and at the same time attempts to terminate the antivirus program or firewall of the host.2.1.1 Hijacking and ImpersonationThere are various ways through which a hacker can impersonate other users [7]. The most commonly used method is eavesdropping on unsuspecting users to retrieve user accounts, passwords and other user related information.The theft of user account number and related information is a very serious problem in any instant messenger. For instance, a hacker after stealing a user’s information impersonate the user; the user’s contacts not knowing that the user’s account has been hacked believe that the person they’re talking to is the user, and are persuaded to execute certain programs or reveal confidential information. Hence, theft of user identity not only endangers a user but also surrounding users. Guarding against Internet security problems is presently the focus of future research; because without good protection, a computer can be easily attacked, causing major losses.Hackers wishing to obtain user accounts may do so with the help of Trojans designed to steal passwords. If an instant messenger client stores his/her password on his/her computer, then a hacker can send a Trojan program to the unsuspecting user. When the user executes the program, the program shall search for the user’s password and send it to the hacker. There are several ways through which a Trojan program can send messages back to the hacker. The methods include instant messenger, IRC, e-mails, etc.Current four most popular instant messengers are AIM, Yahoo! Messenger, ICQ, and MSN Messenger, none of which encrypts its flow. Therefore, a hackercan use a man-in-the-middle attack to hijack a connection, then impersonate the hijacked user and participate in a chat-session. Although difficult, a hacker can use the man-in-the-middle attack to hijack the connection entirely. For example, a user may receive an offline message that resembles that sent by the server, but this message could have been sent by the hacker. All at once, the user could also get disconnected to the server. Furthermore, hackers may also use a Denial of Service (DoS) tool or other unrelated exploits to break the user’s connection. However, the server keeps the connection open, and does not know that the user has been disconnected; thus allowing the hacker to impersonate the user. Moreover, since the data flow is unencrypted and unauthenticated, a hacker can use man-in-the-middle attacks that are similar to that of ARP fraud to achieve its purpose.2.1.2 Denial of Service (DoS)There are many ways through which a hacker can launch a denial of service (DoS) attack [2] on an instant messenger user. A Partial DoS attack will cause a user end to hang, or use up a large portion of CPU resources causing the system to become unstable.Another commonly seen attack is the flooding of messages to a particular user. Most instant messengers allow the blocking of a particular user to prevent flood attacks. However, a hacker can use tools that allow him to log in using several different identities at the same time, or automatically create a large number of new user ids, thus enabling a flood attack. Once a flood attack begins, even if the user realizes that his/her computer has been infected, the computer will not be able to respond. Thus, the problem cannot be solved by putting a hacker’s user id on the ignore list of your instant messenger.A DoS attack on an instant messenger client is only a common hacking tool. The difficulty of taking precautions against it could turn this hacking tool into dangerous DoS type attacks. Moreover, some hacking tools do not just cause an instant messenger client to hang, but also cause the user end to consume large amount of CPU time, causing the computer to crash.2.1.3 Information DisclosureRetrieving system information through instant messenger users is currently the most commonly used hacking tool [4]. It can effortlessly collect user network information like, current IP, port, etc. IP address retriever is an example. IP address retrievers can be used to many purposes; for instance, a Trojan when integrated with an IP address retriever allows a hacker to receive all information related to the infected computer’s IP address as soon as the infected computer connects to the internet. Therefore, even if the user uses a dynamic IP address, hackers can still retrieve the IP address.IP address retrievers and other similar tools can also be used by hackers to send data and Trojans to unsuspecting users. Hackers may also persuade unsuspecting users to execute files through social engineering or other unrelated exploits. These files when executed search for information on the user’s computer and sends them back to the hacker through the instant messenger network.Different Trojan programs were designed for different instant messaging clients. For example, with a user accounts and password stealing Trojans a hacker can have full control of the account once the user logs out. The hacker can thus perform various tasks like changing the password and sending the Trojan program to all of the user’s contacts.Moreover, Trojans is not the only way through which a hacker can cause information disclosure. Since data sent through instant messengers are unencrypted, hackers can sniff and monitor entire instant messaging transmissions. Suppose an employee of an enterprise sends confidential information of the enterprise through the instant messenger; a hacker monitoring the instant messaging session can retrieve the data sent by the enterprise employee. Thus, we must face up to the severity of the problem.2.2 PhishingThe word “Phishing” first appeared in 1996. It is a variant of ‘fishing’, and formed by replacing the ‘f’ in ‘fishing’ with ‘ph’ from phone. It means tricking users of their money through e-mails.Based on the statistics of the Internet Crime Complaint Center, loss due to internet scam was as high as $1.256 million USD in 2004. The Internet Crime Complaint Center has listed the above Nigerian internet scam as one of the ten major internet scams.Based on the latest report of Anti-Phishing Working Group (APWG) [8], there has been a 28% growth of Phishing scams in the past 4 months, mostly in the US and in Asia. Through social engineering and Trojans, it is very difficult for a common user to detect the infection.To avoid exploitation of your compassion, the following should be noted:(1)When you need to enter confidentialinformation, first make sure that theinformation is entered via an entirely secureand official webpage. There are two ways todetermine the security of the webpage:a.The address displayed on the browserbegins with https://, and not http://. Payattention to if the letter ‘s’ exists.b.There is a security lock sign on the lowerright corner of the webpage, and whenyour mouse points to the sign, a securitycertification sign shall appear.(2)Consider installing a browser security softwarelike SpoofStick which can detect fake websites.(3)If you suspect the received e-mail is a Phishinge-mail, do not open attachments attached to theemail. Opening an unknown attachment couldinstall malicious programs onto your computer.(4)Do not click on links attached to your emails. Itis always safer to visit the website through theofficial link or to first confirm the authenticityof the link. Never follow or click on suspiciouslinks in an e-mail. It is advisable to enter theURL at the address bar of the web browser,and not follow the given link.Generally speaking, Phishing [3] [5] is a method that exploits people’s sympathy in the form of aid-seeking e-mails; the e-mail act as bait. These e-mails usually request their readers to visit a link that seemingly links to some charitable organization’s website; but in truth links the readers to a website that will install a Trojan program into the reader’s computer. Therefore, users should not forward unauthenticated charity mails, or click on unfamiliar links in an e-mail. Sometimes, the link could be a very familiar link or an often frequented website, but still, it would be safer if you’d type in the address yourself so as to avoid being linked to a fraudulent website. Phisher deludes people by using similar e-mails mailed by well-known enterprises or banks; these e-mails often asks users to provide personal information, or result in losing their personal rights; they usually contain a counterfeit URL which links to a website where the users can fillin the required information. People are often trapped by phishing due to inattentionBesides, you must also be careful when using a search engine to search for donations and charitable organizations.2.3 Fake WebsitesFake bank websites stealing account numbers and passwords have become increasingly common with the growth of online financial transactions. Hence, when using online banking, we should take precautions like using a secure encrypted customer’s certificate, surf the net following the correct procedure, etc.There are countless kinds of phishing baits, for instance, messages that say data expired, data invalid, please update data, or identity verification intended to steal account ID and matching password. This typeof online scam is difficult for users to identify. As scam methods become finer, e-mails and forged websites created by the impostor resemble their original, and tremendous losses arise from the illegal transactions.The following are methods commonly used by fake websites. First, the scammers create a similar website homepage; then they send out e-mails withenticing messages to attract visitors. They may also use fake links to link internet surfers to their website. Next, the fake website tricks the visitors into entering their personal information, credit card information or online banking account number and passwords. After obtaining a user’s information, the scammers can use the information to drain the bank accounts, shop online or create fake credit cards and other similar crimes. Usually, there will be a quick search option on these fake websites, luring users to enter their account number and password. When a user enters their account number and password, the website will respond with a message stating that the server is under maintenance. Hence, we must observe the following when using online banking:(1)Observe the correct procedure for entering abanking website. Do not use links resultingfrom searches or links on other websites.(2)Online banking certifications are currently themost effective security safeguard measure. (3)Do not easily trust e-mails, phone calls, andshort messages, etc. that asks for your accountnumber and passwords.Phishers often impost a well-known enterprise while sending their e-mails, by changing the sender’s e-mail address to that of the well known enterprise, in order to gain people’s trust. The ‘From’ column of an e-mail is set by the mail software and can be easily changed by the web administrator. Then, the Phisher creates a fake information input website, and send out e-mails containing a link to this fake website to lure e-mail recipients into visiting his fake website.Most Phishers create imitations of well known enterprises websites to lure users into using their fake websites. Even so, a user can easily notice that the URL of the website they’re entering has no relation to the intended enterprise. Hence, Phishers may use different methods to impersonate enterprises and other people. A commonly used method is hiding the URL. This can easily be done with the help of JavaScript.Another way is to exploit the loopholes in an internet browser, for instance, displaying a fake URL in the browser’s address bar. The security loophole causing the address bar of a browser to display a fake URL is a commonly used trick and has often been used in the past. For example, an e-mail in HTML format may hold the URL of a website of a well-known enterprise, but in reality, the link connects to a fake website.The key to successfully use a URL similar to that of the intended website is to trick the visual senses. For example, the sender’s address could be disguised as that of Nikkei BP, and the link set to http://www.nikeibp.co.jp/ which has one k less than the correct URL which is http://www.nikkeibp.co.jp/. The two URLs look very similar, and the difference barely noticeable. Hence people are easily tricked into clicking the link.Besides the above, there are many more scams that exploit the trickery of visual senses. Therefore, you should not easily trust the given sender’s name and a website’s appearance. Never click on unfamiliar and suspicious URLs on a webpage. Also, never enter personal information into a website without careful scrutiny.3. ConclusionsBusiness strategy is the most effective form of defense and also the easiest to carry out. Therefore, they should be the first line of defense, and not last. First, determine if instant messaging is essential in the business; then weigh its pros and cons. Rules and norms must be set on user ends if it is decided that the business cannot do without instant messaging functionality. The end server should be able to support functions like centralized logging and encryption. If not, then strict rules must be drawn, and carried out by the users. Especially, business discussions must not be done over an instant messenger.The paper categorized hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing (3) Fake Websites. Hacking tricks when successfully carried out could cause considerable loss and damage to users. The first category of hacking tricks can be divided into three types: (1) Hijacking and Impersonation; (2) Denial of Service; (3) Information Disclosure.Acknowledgement:This work was supported by the National Science Council, Taiwan, under contract No. NSC 95-2221-E-029-024.References[1] B. Schneier, “The trojan horse race,”Communications of ACM, Vol. 42, 1999, pp.128.[2] C. L. Schuba, “Analysis of a denial of serviceattack on TCP,” IEEE Security and PrivacyConference, 1997, pp. 208-223.[3] E. Schultz, “Phishing is becoming moresophisticated,” Computer and Security, Vol.24(3), 2005, pp. 184-185.[4]G. Miklau, D. Suciu, “A formal analysis ofinformation disclosure in data exchange,”International Conference on Management ofData, 2004, pp. 575-586.[5]J. Hoyle, “'Phishing' for trouble,” Journal ofthe American Detal Association, Vol. 134(9),2003, pp. 1182-1182.[6]J. Scambray, S. McClure, G. Kurtz, Hackingexposed: network security secrets and solutions,McGraw-Hill, 2001.[7]T. Tsuji and A. Shimizu, “An impersonationattack on one-time password authenticationprotocol OSPA,” to appear in IEICE Trans.Commun, Vol. E86-B, No.7, 2003.[8]Anti-Phishing Working Group,.[9]/region/tw/enterprise/article/icq_threat.html.有关网络环境安全的黑客技术摘要:现在人们往往通过互联网处理事务。
汉语言文学专业优秀毕业论文范本网络文学对传统文学的影响研究标题:汉语言文学专业优秀毕业论文范本——网络文学对传统文学的影响研究在当今信息爆炸的时代,网络文学作为一种新兴的文学形式,已经成为了人们获取和传播文学信息的主要途径之一。
在这种情况下,汉语言文学专业的毕业论文范本中,研究网络文学对传统文学的影响变得愈发重要。
本文旨在探讨网络文学对传统文学的影响,并提供一个汉语言文学专业的优秀毕业论文范本。
在论文中,将主要从影响网络文学对传统文学的两个方面展开研究,分别是创作风格的影响和传播方式的影响。
一、创作风格的影响网络文学的兴起对传统文学的创作风格产生了一定的影响。
首先,网络文学的即时性和互动性要求作者在创作过程中更加注重与读者的互动。
这种互动性使得传统文学的创作模式逐渐发生了变化,作者与读者之间建立起了更加紧密的联系,以满足读者的需求。
其次,在网络文学中,对于角色的塑造和情节的设置更加丰富多样。
作者可以通过读者的反馈实时调整故事情节的发展,从而使作品更加具有洞察力和趣味性。
这种创作风格的转变在一定程度上对传统文学产生了启发,使得作者更加注重故事情节的变化和人物形象的描绘。
二、传播方式的影响传统文学的传播主要依靠书籍、报纸和杂志等传统媒体,而网络文学则利用现代技术实现了文学作品的即时发布和共享。
这种传播方式的改变使得更多的人可以轻松地接触到文学作品,并且可以通过各种平台进行互动和分享。
网络文学的传播方式不仅拓宽了文学的传播渠道,也使得传统文学形式得到了一定的变革。
除了传播方式的改变外,网络文学的广泛传播也改变了传统文学作品的受众群体。
传统文学作品往往受限于地域和时间的限制,而网络文学没有这样的限制,任何人都可以通过互联网轻松获取和阅读作品。
这种广泛传播使得文学作品的影响力更加强大,也为传统文学的传承提供了新的动力。
总结网络文学作为一种新兴的文学形式,对传统文学产生了积极的影响。
从创作风格的变化到传播方式的改变,网络文学使得传统文学更加具有活力和创新性。
网络文学翻译论文3000字_网络文学翻译毕业论文范文模板
网络文学翻译论文3000字(一):当代网络文学翻译与传统文学翻译的对比论文
摘要:网络文学翻译作为一种新的翻译模式,正逐渐走进人们的学术生活。网络文学翻译相比传统文学翻译,有翻译技术、网络平台作为支撑,呈现出一些新的特点。网络文学翻译与传统文学翻译相比有哪些优势、劣势,翻译质量如何保障成为值得探讨的问题。
关键词:网络文学翻译;传统文学翻译 随着网络时代的到来,网络文学逐渐兴起,网络翻译也层出不穷,这对传统文学翻译产生了冲击。网络文学翻译相较于传统文学翻译有一些新特征,例如:更即时、更多互动、受众更广、更便捷等。相对于传统文学翻译的唯一性和权威性,网络文学翻译有更多可塑空间,当然网络文学翻译误译、漏译现象也时有发生。
一、传统文学翻译 传统文学翻译是以纸张为媒介,译者把自己的译文逐字逐句誊写在纸上,由出版社编辑出版,最后印刷上市的(张英洁,2013:7)。传统文学翻译的译者完全脱离网络,不借用电子词典或翻译机器,不使用计算机录入文本,这也是最早的一种翻译方法。
二、网络文学翻译 网络文化是当代影响范围最广、传播速度最快的一种文化现象,它以计算机网络技术的迅速发展为契机,渗透到人类社会的方方面面,与此同时,网络也给文学的发展创造了平台,网络文学随之产生。外国文化的流行让翻译外国畅销文学作品成为翻译爱好者一种文学时尚。网络文学翻译就是指翻译行为的网络化,包括把传统文学翻译作品上传到网络上或者直接在网络上利用翻译工具进行文学翻译。这种网络化的文学翻译给文学翻译提供了更大众的平台,让我们重新审视传统文学翻译的翻译策略,以及译者、读者的角色等。(郭振星,2013)
三、网络文学翻译的新特征 (一)即时性 与传统文学翻译相比,网络文学翻译具有即时性。外国文学畅销作品很快能呈现在网上,与之相应的中文版也会在网上随之推出,翻译者可能是翻译专家,也可能是民间翻译团队或个人。网络文学翻译的即时性特点,使读者可以在最短时间内了解文学作品的故事内容,满足了读者的好奇心。当然,和传统文学翻译的严格措辞、编辑、校对相比,网络翻译的质量参差不齐。
(二)互动性 在传统文学翻译中,译者通过自己的理解,把原版作品翻译给读者,与读者没有互动,不同读者对翻译作品的理解也大相径庭。互联网给译者与读者、读者与读者之间创造了交流的平台。在网络翻译中,没有绝对的权威,翻译成为人人可以参与的活动,翻译可以是个体行为,也可以是集体行为,如众多译者在网络上翻译接力。读者可以评价译者的翻译,提出建议或批评,这有利于译者重新审视自己的翻译,提高翻译质量。读者与读者之间也可以交流阅读心得,从不同的角度分析文学作品,剖析人物性格。互动给译者与读者营造了一个轻松交流的氛围,使文学作品变得更生动。
(三)便捷性 阅读传统翻译作品需要通过纸质书籍,而阅读网络翻译作品显得更加便捷和快捷。网络化的生活让很多人都养成了网上阅读的习惯,上网閱读的人数越来越多,读纸质书籍的人越来越少,网络文学逐渐兴起,网络文学翻译成为了文学翻译必不可少的一部分。
网络文学翻译的便捷性还体现在修改方便。译者通过鼠标操作就可以增删译稿,对译文进行反复修改,通过互联网交流,逐渐完善译文。传统文学翻译的修改就显得不那么便捷,但传统纸质翻译更便于收藏、保存更久。
(四)快餐化 网络文学作品通常篇幅比传统文学作品精短,选材更自由,翻译更多为意译。翻译者大多是网络文学的爱好者,在翻译过程中报着娱乐心态,而非盈利目的,更多的使用网络用语等轻松诙谐的语言,有时缺乏传统翻译的严谨态度,有时会出现错译、漏译现象。这更像一种快餐文化。
(五)读者角色多样化 (1)读者兼文学翻译的批评者 读者阅读传统文学翻译作品只能自我吸收,而阅读网络翻译作品可以通过网络发表自己的评论,他们兼翻译作品的批评者。有的评论一针见血、成熟客观,有的评论显得主观偏激,不管批评是否到位,文学批评在网络平台下更加大众化。
(2)读者兼文学翻译的译者 读者们在批评网络译文的同时也争相传播自己的译文,做起了翻译作品的译者。网络民间译者声势浩大,力量不可低估。集体竞译推动了网络文学的繁荣,推动了翻译市场的发展。专业的翻译有时甚至会参考民间翻译,例如哈利波特系列作品之“哈利波特与混血王子”就是民间译者率先译出被人民文学出版社采用的。(张艳琴,2007:17-18)
四、网络文学翻译的质量探讨 网络翻译的质量受到一些传统译者的质疑,如:利用机器翻译会降低翻译质量,多人合译使翻译风格无法统一,网络翻译缺乏科学的态度等等。笔者认为,译文质量与选择的翻译工具、翻译方式没有必然联系,而与译者有关。传统文学翻译的译者大多是翻译大家,五四时期,文学翻译家同时也是著名作家,如鲁迅、茅盾、郭沫若、巴金等人,他们首先是文学家,其次才是文学翻译家。而网络文学翻译由于文学创作和文学翻译的脱离,译者水平的参差不齐,才造成了网络文学翻译的质量鱼龙混杂。但值得一提的是,传统文学翻译作品不一定都是优秀作品,网络文学翻译作品也不一定质量不高。传统文学翻译经过了出版社的严格校对、编辑、包装来保障质量,同样网络文学翻译也可以通过读者对其进行优胜劣汰来保证质量。
对于网络翻译质量的探讨又引出一个新课题即文学翻译是否需要专业化。文学翻译不同于科技翻译,文学本来就是语言创造的艺术,“文学翻译是要用另一种语言工具,把原作的艺术意境传达出来,使读者在读译文的时候能够像品读原著一样从中受到启发、获得感动和美的感受”(刘建林,2009)。文学翻译并不要求译者的精确翻译,而是需要译者的再创作。过于精准的翻译,不一定能达到文学作品的感染力,也不一定满足读者的需要。
五、结语 网络文学翻译是一种文化交流活动,这不同于传统翻译理论所要求的译语表达与源语表达最大程度实现对等,也不再拘束于源语文化需植入译作之中的专业化要求。当代网络文学作品题材丰富、现实感强、风格多样、消费节奏快,这些特征相对传统文学作品来说,对译者的领悟能力、翻译能力和文化素养其实提出了更高的要求。译者对于原作的取与舍,对于源语文化的传递与回避,对于目的语文化的植入与放弃,都是需要译者的再创作。网络文学翻译这种翻译形式不会降低文学翻译的质量,它可以作为传统文学翻译的补充,帮助读者更好地了解作品,同时给传统文学翻译提供借鉴。网络文学翻译的即时、快速传播的特点满足了读者一睹为快的愿望,读者可以给译者提出更多建设性意见帮助提高作品的翻译质量。网络文学翻译和传统文学翻译需要相互借鉴、互为补充、共同发展,这样文学翻译质量才会提高,文学翻译才能朝更好的方向发展。
网络文学翻译毕业论文范文模板(二):网络资源在非文学翻译中的应用论文
摘要:信息时代互联网为译者提供了丰富的资源,译者如何通过互联网有效资源,如在线词典、百科全书、网页搜索引擎、平行文本、专业翻译网站等将原语言文本转化为目标语言文本,成为新时代翻译能力的体现。新时代译者应具备运用信息技术的能力,通过充分有效地运用网络资源,进行信息筛选进而不断提高翻译的速度及质量。
关键词:网络资源非文学翻译汉译英化妆品说明书 1.引言 当今时代,全球经济加速整合,世界文化多元化发展。这些变化对翻译人才、翻译产品、翻译功效和翻译质量都提出了更高的要求。Holmes于1972年设计的翻译研究框架中提出应用翻译研究包括译者培训、翻译辅助和翻译批评(Holmes,2006:88)。翻译能力并不只涉及运用语言本身进行交际的能力,还包含在翻译过程中使用工具协助译者完成翻译任务的能力。Egeberg提出,译者为了从“语言专家”转变成“翻译专家”,必须掌握熟悉提高翻译效率的各种翻译技术;拥有充分的语言能力,使用翻译工具生产高质量的译文。事实上,网络技术的发展给翻译提供了诸多便利,对解决翻译困难起到了巨大的作用,翻译能力的内涵在网络技术支持下得到了极大的拓展。进入21世纪,越来越多的研究者都认同利用网络信息技术是当今翻译工作者必须掌握的一项技能。翻译能力研究小组Pacte提出了一个翻译能力构成模式,主要含有双语能力、言外能力、翻译知识能力、工具辅助能力、策略能力及心理生理因素等六个成分;其中工具辅助能力主要包括使用文献资源及利用适用于翻译的信息技术的能力(葛建平等,2008:63)。
有效利用互联网资源是现代翻译工作者必须掌握的重要技能之一。目前能够在翻译中利用的网络资源包括诸多的在线词典、搜索引擎、机器翻译软件、百科知识、网上论坛翻译论坛、翻译博客等。电子计算机与现代通信技术相结合,为人类提供了一个全新的信息环境,即网络环境。网络环境为译者提供了一个全新的资料库,搜索引擎便是进入这个巨型语料库的一把“钥匙”。能否充分利用这个巨型语料库,很多时候取决于译者能否利用搜索引擎提供的便利(朱明炬等,2003:59)。搜索引擎按其工作方式主要可分为两种:一种是严格意义上的搜索引擎(SearchEngine),最具代表性的有AltaVista、Google、Excite、HotBot、Lycos等。另一种是目录索引(SearchIndexofDirectory),如中国的搜狐、百度、网易、新浪、雅虎。这两种都是进入互联网的门户,是在互联网上查找资料不可或缺的帮手,也是翻译工作者的得力助手。充分利用搜索引擎在互联网上查找所需的资料,无论是译前的文本理解、译中的词语表达,还是译后的检查校对,互联网都可以为译者提供很大的帮助。
2.翻译过程中对互联网资源的有效利用 互联网搜索引擎提供的英语语料是否地道和正确呢·理论上讲,地道英语的标准应该是:(1)英语本族人所使用、所能接受的英语;(2)英语本族人感到自然的英语;(3)某英语地区、英语社会集团的普遍用语(黄和斌等,1998:61)。正式标准英语一般具有规定性、权威性、统一性、局限性、部分陈旧性等特性。非正式标准英语主要表现为广泛性、超前性、部分非规范性、认识的多元性等特性(倪传斌等,2003:54)。
搜索引擎提供的英语语料大致包括:公司、企事业单位主页、正式出版的报纸、小说、科技文献、课本、个人主页、剪贴板、论坛的交流记录等英文文本。有些使用的是正式标准英语,如:公司、企事业单位主页、正式出版的报纸、小说、科技文献、课本等英文文本。有些可能使用的是非正式标准英语、地域方言。利用互联网搜索引擎提供的语料往往是这些内容的“大杂烩”。这种“大杂烩”由于包含了不规范的语言,离“地道英语”的标准还存在一定的差距,离正式标准英语的差距太大,在选择取舍时需要慎重(倪传斌等,2003:54)对待。