英 文 翻 译
姓 名: 张 岩
学 号:**********
**********
专 业:电子商务(文)
班 级:电子商务0903班
时 间:2013年4月24日
电子商务系
电子商务系
英文翻译评价表
学生姓名 | 张岩 | 性别 | 英文报价 男 | 学号权限英文 | 0902110318 |
外文文献标题 | Issues of Security and Privacy in Electronic Commerce |
外文文献出处 | Electronic Commerce Security |
以下内容由指导教师填写(打勾“√”选择) |
评价项目 | bitty评价结论 | 打勾 | 评价结论 | abrupt打勾 | 评价结论prentation是什么意思 | 打勾 |
是否外文期刊文献 | 是 | | 否 | | | |
与本人论文相关 | c c tv5完全相关 | | 一般 | | 不相关 | |
翻译工作量 | 超负荷 | | 饱和 | | 不饱和 | |
翻译态度 | 认真 | | 一般 | | 不认真 | |
翻译进度 | 按计划执行 | | 一般 | | 未按计划执行 | |
翻译训练效果 | 英语单词翻译优 | 良 | 中 | 差 |
综 合 评 语 (是否完成了规定任务、效果是否符合要求等) |
|
指导教师签名: 2013年 4 月 25 日 |
| | | | | | | | | | | | | ear |
英文原文
Issues of Security and Privacy in Electronic Commerce
Part I ---- Introduction & Motivation
Peixian LI
Introduction
Since the invention of the World Wide Web (WWW) in 1989, Internet-bad electronic commerce has been transformed from a mere idea into reality. Consumers brow through catalogues, arching for best offers, order goods, and pay them electronically. Information rvices can be subscribed online, and many newspapers and scientific journals are even readable via the Internet. Most financial institutions have some sort of online prence, allowing their customers to access and manage their accounts, make fin
contactedancial transactions, trade stocks, and so forth. Electronic mails are exchanged within and between enterpris, and often already replace fax copies. Soon there is arguably no enterpri left that has no Internet prence, if only for advertiment reasons. In early 1998 more than 2 million web rvers were connected to the Internet, and more than 300 million host computers. And even if actual Internet business is still marginal: the expectations are high. For instance, Anderson consulting predicts Internet business to grow from $10 billion in 1998 to $500 billion in 2002.
Thus, doing some electronic business on the Internet is already an easy task. As is cheating and snooping. Several reasons contribute to this incurity: The Internet does not offer much curity per-. Eavesdropping and acting under fal identity is simple. Stealing data is undetectable in most cas. Popular PC operating systems offer little or no curity against virus or other malicious software, which means that urs cannot even trust the information displayed on their own screens. At the same time, ur awareness for curity risks is threateningly low.
A report from Goldman, Sachs & Conotes that while commercial properties such as Yahoo! and eBay receive a lot of attention from investors, business to business ECommerce is on the verge of exponential growth. The report predicts that ECommerce will be worth USD1.5 trillion by 2004. However, according to a survey by Net Effect Systems, while 94 percent of online consumers u the Internet to shop, just 10 percent say they prefer to buy things online. 74 percent of consumers cited curity and privacy concerns.
顺其自然英文 Therefore, if the curity and privacy problems are addresd e-shoppers will be converted into e-buyers, and the ECommerce will be pushed a big step forward.
Non-technical Issues
1.Security Awareness
Most opinion surveys list "incurity of financial transactions" and "loss of privacy" among the major impediments to electronic commerce, but in fact most urs have only ague ide
as about the threats and risks, and a very limited understanding of the technical and legal options for minimizing their risk. As a result all kinds of misperceptions exist.
For instance, the cardholder's risk in nding his or her credit card number over the Internet is typically overestimated. At least as of this writing payments over the Internet are treated like mail-order/telephone-order transactions, which means that the cardholder is not liable at all. All risk is with the merchant.
On the other hand, the risks in nding nsitive data in an electronic mail are typically underestimated. Probably most urs of email know the mere facts: neither confidentiality nor integrity nor availability is guaranteed. But nevertheless many urs do not hesitate to nd all kind of very personal and nsitive data to their friends or colleagues, unprotected.
Unfortunately, developers of electronic commerce solutions are often as curity unaware and ignorant as their prospective urs. For instance, still many developers demand that curity must be provided by "lower layers" in a "transparent" way. But, for i
nstance, Secure Socket Layer (SSL) in an "opaque socket integration" does not make any n in most ca. Security has to be an integral part of the architecture, design, and implementation.
2.Crypto Regulations
Several countries regulate the deployment of strong encryption technology by law. For instance, France controls the domestic u of encryption technology, in order to maintain the capability to eavesdrop on the communication of criminals. The USA prohibits the export of strong encryption products for the mass market, for the same reasons as it controls the export of munitions.
Such regulations do not discriminate between “good” and “bad” applications, and limit the curity of honest citizens and companies to at least the same extent as they limit the curity of terrorists and organized crime. Therefore veral governments, in particular the US administration, are willing to relax their crypto regulations, provided access to the encrypted information would still be possible on demand. The idea is to introduce new “Tr
usted Third Parties” where cret keys must either be escrowed in advance, or can be recovered afterwards.