网络营销外文文献及翻译

上传人:仙*** 文档编号:98854645 上传时间:2022-05-30 格式:DOC 页数:13 大小:59.50KB
收藏 版权申诉 举报 下载
网络营销外文文献及翻译_第1页
第1页 / 共13页
网络营销外文文献及翻译_第2页
第2页 / 共13页
网络营销外文文献及翻译_第3页
第3页 / 共13页
资源描述:

《网络营销外文文献及翻译》由会员分享,可在线阅读,更多相关《网络营销外文文献及翻译(13页珍藏版)》请在装配图网上搜索。

1、 毕业设计(论文)外文资料翻译学院系:计算机科学与技术学院 专 业: 网络工程 姓 名: 王灿 学 号: 5 外文出处:附 件: 1.外文资料翻译译文;2.外文原文。指导教师评语: 签名: 年 月 日注:请将该封面与附件装订成册。附件1:外文资料翻译译文网络营销一、网络营销的概念网络营销是企业整体营销战略的一个组成局部,是建立在互联网根底上,借助于互联网的特性来实现一定营销目标的一种营销手段。它以现代营销理论为根底,以开拓市场、增加盈利为目标,利用因特网的技术和功能,最大限度地满足客户需求的经营过程。网络营销的实质是利用互联网对产品的销前、销中、售后个个环节进展跟踪效劳,它自始至终贯穿在企业经

2、营的过程。网络营销在英文中有多种表达方式,每种表达方式都有相应的侧重点和涵,如Internet Marketing,强调的是以因特网为工具的市场营销;Web Marketing指营销,着重于的推广,站点与顾客的沟通;Cyber Marketing指网络营销是在虚拟的计算机空间进展运作;E-marketing指与电子商务相对应的电子化、信息化、网络化的营销活动。现在常用的翻译方式是online Marketing和Internet Marketing,且专指国际互联网营销。网络营销不一定包括完整的商业交易过程例如,它可以不考虑网上支付等环节,但它是电子商务的重要组成局部。在我国,企业应首先开展网

3、络营销,并通过完善企业网络平台稳步过渡到电子商务。网络营销的主要容包括网上市场调查、网上消费行为分析、网络营销策略制定、网络营销价格策略制定、网上营销渠道选择以及网络营销管理与控制等。具体的营销手段有E-mail营销、网络广告和建立网络营销站点等。二、网络营销的特点互联网的出现深刻地影响了人类生活的每个角落,它如同一种“万能胶,把企业组织及个人跨时空地联结在一起。在这样一种新的营销环境下,网络营销呈现其独有的特点。1全球性:网络营销给企业带来了无限的商机,同时也将企业推向一个更广阔、更具选择性的全球市场。互联网信息量大,时效长,且信息交换不受时空的限制,可以随时随地每天24小时提供全球性营销效

4、劳。2互动性:网络营销使得企业可以通过电子布告栏、网上论坛和电子等信息手段,与顾客作双向互动沟通,实时了解消费者的需求,对企业的营销活动进展合理而有效的规那么。3个性化:传统的规模产生使得营销产品只能满足顾客的一般需求,顾客的个别需求难以一对一去满足。网络营销使得根据消费者的特殊需求进展产品设计、开发成为可能。4高效性:信息的快速传播与获取,使得企业可以迅速掌握市场行情。顾客在网上就可以实现购物、交易,节省了时间和精力,提高了工作效率。5经济性:网络营销给交易双方带来了经济上的利益。厂商通过网络直接与顾客联系,减少了沟通的环节,使得销售渠道更加直接,加速了二手书流、资金流和信息流。网络销售为消

5、费者节省了大量的时间和精力。网络使得产品价格透明化,减少消费者与营销人员面对面可能带来的冲突,消费者的购物将更加理智。他们可以登录不同公司的,进展比拟,选择物美价廉的产品。对于生产者来说,网络的媒体功能,可使厂家全方位地展示自己的产品和效劳,节省实际开设商店的资金,降低本钱,同时为中小企业提供了开展契机。任何企业,不管大小,都可以不再受自身规模的限制,与大企业平等地竞争。三、网络营销的策略尽管网络营销具有很强的竞争优势,但并不是每个公司都适合进展网络营销,公司能否实施网络营销要考虑公司的业务需求、目标规模、顾客购置情况、技术支持等。开展网络营销时,仍以4PS作为主体,即Product、Pric

6、e、Place、Promotion,同时贯彻4CS思想,即Consumer、Cost、Convenience、Communication。一产品策略网络营销是在网上虚拟市场开展的。在网络时代,个性化消费成为主流,市场主导地位从企业转向了消费者,公司面临着日益上升的开发、上产和营销费用,为此,首先要对网络营销的产品和效劳进展定位。要通过网络市场调研充分了解消费者的需求,让顾客全程地参与产品的开发过程。应充分利用互联网所具有的双向沟通特性,进展制定营销,使得顾客通过互联网在企业的引导下对产品和效劳进展选择、设计。二定价策略在网络营销中,由于企业生产本钱降低,流通环节减少,价格竞争较为剧烈,消费者会

7、在网上广泛搜集信息,货比多家,这使得网上产品价格较低。为此,首先要以消费者能承受的本钱来定价,先由顾客给出能承受的价格,然后由企业根据该本钱组织产生和销售。其次议价将会是企业产品定价最常见的方式。价格取决于产品对用户的价值,合理的价格表现为较低的价位、周到的效劳和技术支持。三渠道策略网络营销最大的革命在渠道上面,网上销售渠道就是借助互联网将产品从产生者转移到消费者的中间环节,起点是制造商,终点是消费者和用户。一个完善的网络营销渠道用订货系统、供货网络、生产网络、分销网络组成。消费者通过企业的订货系统发出订单,然后经供货系统输入原材料,再经生产网络加工生产,由分销网络将产品送给消费者,最后由效劳

8、网络解决售后效劳问题。四促销策略在网络促销策略中最具有创造力的方式是网络广告,它不同于报纸、杂志、电视这类传统的广告媒体,它将产品的特点、功能、价格等信息放在网络上,由消费者在自己需求或愿意时进展查询。网络广告信息呈现立体化和多方位化,丰富多彩。网络广告改变传播者与承受者之间的关系,由原来单向转为双向互动的信息交流。另外,传统的促销策略如打折、优惠、推行会员制等,也可用于网络促销,通过建立、发送电子、发布新闻等,来宣传网络营销站点,树立企业网上品牌形象,实现网络营销目标。四、电子商务的平安问题一电子商务平安的概念平安问题是电子商务实施中的瓶颈之一,既是技术问题,更是管理问题,具体涉及计算机网络

9、平安和商务平安两大方面。计算机网络平安指的是网络设备、网络系统和数据库等网络本身可能存在的问题。商务交易平安那么是为了保证交易过程中的性、可鉴别性、防篡改性和不可抵赖性,消除信息被窃取、篡改和假冒等种种隐患。如黑客往往从网关或路由器上截取传送的信息,有的掌握了信息的格式后篡改信息,甚至发送假信息,以假乱真。二实施电子商务主要使用的平安技术1防火墙技术防火墙Firewall可看做是一道介于部网与外部公共网之间的屏障,是一种装在主机或路由器等节点上的软件。它的功能是防止非法的通讯和来自外部的攻击:有的防火墙通过读取外来数据的源地址、目标地址等判断是否来自平安站点,并及时拒绝来自危险站点的数据;有的

10、防火墙通过对防火墙部地址和外部地址转换的方法来隐藏部IP地址,借以隐藏部网络的各种信息。2加密技术加密技术用于对重要的信息进展加密。在这过程中需要用到密钥。原理是将文中字母a,b,c,d, ,w,x,y,z的自然顺序保持不变,但使之与E,F,G,Z,A,B,C,D分别对应,然后用E代替a,用F代替b,每每相差四个字母。这条规那么叫做加密算法,而4就是密钥。加密方法有:私钥密码加密、公钥密码加密、数字签字和数字认证等。1私钥密码加密私钥密码加密的工作原理如下:发送方A和承受方B共享共同的有密钥分发中心分发的密钥K。A用密钥K加密得到密文传送到B处,B用一样的密钥解密。常用私钥密码有DES、IDE

11、S、GOST、RC-5、Blowfish、CRAB等。2公钥密码加密公钥密码加密的工作原理:用户A和B各自拥有一对密钥Ka,Ka-1和Kb,Kb-1。私钥Ka-1、Kb-1分别由A和B各自秘密保管,而公钥Ka 、Kb那么以证书的形式对外公布。当A要将明文消息P平安地发送给B,那么A首先应用B的公钥Kb加密P,得到密文C=EKbP;而B收到密文P后,用私钥Kb-1解密恢复明文,得到:P=DKb-1(C)=DKb-1(EKb(P)。常用的公用钥加密算法有RSA,DSS等。3数字签名数字签名用0和1组成的数字表示,它是使用某人的私钥加密特定的消息,经过处理而得到的结果。签字体制中必要的两个组成局部为

12、:签字算法,签字密钥秘密。证实算法公开。数字签名的原理:对消息M的签字可简记为:SigM=S。对S的证实简记为:Ver(S)=|真,伪|=|0,1|。4数字认证和数字证书数字认证是用电子方式来验证信息发送者的身份、信息承受者的身份以及判断文件是否被人修改或照片是否有效的加密技术。数字证书上的容包括版本号、序列号、签名算法标识符、颁发者、拥有者名、公钥及其算法标识符、有效期等字段。三电子商务的平安对策解决电子商务平安问题涉及的面广,其中包括技术、管理、制度、人员和法律等许多方面。其根本策略是综合治理,不仅要注意技术上的创意,更重要的是加强管理。从管理方面加强电子商务平安的对策主要有:1. 制定严

13、格的法律与法规,做到有章可循,使非法分子慑于法律,不敢轻举妄动。2. 制定平安管理措施,具体包括电子商务平安标准的建立、网络的平安管理、设备和密钥的平安管理、平安组织机构与平安责任制度的建立、平安措施确实定和检查实施等。3. 重视平安检测和评估。其中包括入网前和运行中的平安检测和评估。附件2:外文原文复印件Network Marketing First, the concept of network marketingNetwork Marketing is the overall corporate marketing strategy as an integral part of the

14、establishment on the basis of the Internet, through the use of Internet marketing to achieve a certain goal of a marketing tool. It is the basis of modern marketing theory to open up markets, increase profit objectives, the use of the Internet technologies and features to meet customer needs to maxi

15、mize the business process. Network Marketing is the essence of the use of the Internet to sell products, sales, after-sales tracking service session, it permeated throughout the business process.Network Marketing in the English expression in a variety of ways, each expression has a corresponding foc

16、us and content, such as Internet Marketing, stressed on the Internet as a tool for marketing; Web Marketing Web site refers to marketing, focusing on the promotion website , the site of communication with customers; Cyber Marketing Network Marketing is that the computer in the virtual space to opera

17、te E-marketing and e-commerce refers to the corresponding electronic information, Internet-based marketing activities. Now the translation method is commonly used online Marketing and Internet Marketing, and refers specifically to Internet marketing.Network marketing does not include the integrity o

18、f the process of commercial transactions (for example, it can not consider online payment, etc.), but it is an important component of e-commerce. In China, the enterprises should first of all the development of the network marketing, and through improving the enterprise network platform steady trans

19、ition to e-commerce.Network Marketing main content including on-line market research, online consumer behavior analysis, network marketing strategy development, network marketing pricing strategy development, online marketing channel selection and marketing network management and control. Marketing

20、means of a specific E-mail marketing, online advertising and the establishment of networks, such as marketing sites.Second, the characteristics of Network MarketingThe emergence of the Internet has a profound impact on human life in every corner of it as a Monaijiao, their organizations and individu

21、als linked across time and space. In such a new marketing environment, the network marketing has its own unique characteristics.1. Global: network marketing to enterprises brought unlimited business opportunities and will also push enterprises a broader, more selective on the global market. Internet

22、 information, long time, and the exchange of information is not time constraints, can be anywhere, anytime 24 hours a day to provide global marketing services.2. Interactive: network marketing allows companies through electronic bulletin boards, online forums and , and other information tools, and c

23、ustomers for two-way interactive communication, real-time understanding the needs of consumers, enterprises marketing activities rational and effective rules.3. Personalized: the size of a traditional make marketing products can only meet the general needs of customers, customer demand for the indiv

24、idual one-on-one difficult to meet. Network Marketing made in accordance with the special needs of consumer product design, development possible.4. Efficiency: the rapid dissemination of information and access, which allow the enterprise market and can quickly master. Customers can be achieved in th

25、e online shopping transactions, save time and effort and improve work efficiency.5. Economy: network marketing to bring the parties to the transaction economic interests. Network vendors through direct contact with customers, a decrease of communication links, making more direct sales channels, spee

26、d up the flow of goods, capital and information flow. Network sales for consumers to save a great deal of time and effort. Network makes prices more transparent, reduce consumer and marketing staff face-to-face potential conflict, a shopping will be more rational. They can log different companys Web

27、 site, compare, select and inexpensive products. For producers, and network media capabilities, all manufacturers will display their products and services, the actual savings funds set up shop, reduce costs, and at the same time provide SMEs with the opportunity for development. Any business, large

28、or small, can no longer restricted by its own size, and large enterprises equal competition.Third, Network Marketing StrategyAlthough network marketing has a strong competitive advantage, but it is not suitable for every company marketing network, the ability of the Company to consider the implement

29、ation of the network marketing companys business needs, goals scale, customers buy, technical support. Launching Internet sales, as still 4 PS main, Product, Price, Place, Promotion, at the same time implementing the 4 CS idea that Consumer, Cost, Convenience and Communication. 1. Product StrategyNe

30、twork marketing is carried out in the virtual market. In the Internet Age, personality and become mainstream consumer market dominance from the enterprise to consumers, the company faces rising development, the production and marketing costs of this, we must first network marketing products and serv

31、ices positioning. Through market research network fully understand consumer demand for customers involved in the whole process of product development. Should make full use of the Internet is two-way communication features, the process of developing a marketing, making enterprise customers through th

32、e Internet under the guidance of the choice of products and services designed.2. Pricing StrategyIn the network marketing, enterprises reduce production costs, reduce the circulation chain, the more intense price competition, consumers will collect extensive online information, goods than many, whic

33、h makes online product prices lower. To this end, we must first be accepted by consumers at the cost of pricing, customers are given first to accept the price, and then by the enterprises under the cost of production and sales organizations. Second bargaining Product pricing will be the most common

34、approach. Prices depend on the value of products to the users, a reasonable price performance for the lower price, good service and technical support.3. Channel strategyNetwork Marketing biggest revolution in the above channels, online sales channels use the Internet to transfer products from produc

35、ers to consumers intermediate links, is the starting point for manufacturers, end users and consumers. A perfect network marketing channels by ordering system, supply networks, production networks, distribution networks. Consumers through corporate orders issued ordering system and then imported raw

36、 materials supply system, then the production network processing, distribution network will be presented consumer products, services network solutions from the final service issues. 4. Promotion strategy Network marketing strategy in the most creative way is online advertising, it is different from

37、newspapers, magazines, television such traditional advertising media, it will feature products, functionality, price and other information on the Internet by consumers their own needs or to be conducted enquiries. Advertising Information Network showed three-dimensional and multi-directional, and co

38、lorful. Internet advertising change propagator and the relationship between the recipient, from one-way to two-way interactive exchange of information. In addition, traditional marketing strategies such as discounts, offers, the membership and so on, can also be used for network marketing, through t

39、he establishment of links, send , press releases, etc., to promote network marketing site, a corporate online brand image, network marketing goals. Forth, e-commerce security problems 1. The concept of e-commerce securitySecurity issues in the implementation of e-commerce is one of the bottlenecks i

40、s not only technology, but also management issues, specifically related to the computer network security and safety of the two major aspects of business. Computer Network Security refers to the network equipment, network systems and databases, such as the network itself may exist. Business transacti

41、ons in order to ensure security is in the process of confidential transactions, be able to identify, tamper-resistant and non-repudiation, and remove information theft, falsification and counterfeiting, and other hidden dangers. If hackers often gateway or router on the interception of messages sent

42、, and some mastered the information after tampering with the format of the information, and even sent false information to confound truth. 2. The implementation of e-commerce are used mainly for security technology (1) Firewall technology Firewall (Firewall) can be seen as one between the internal n

43、etwork and external barriers between the public network, a host or router installed in the node, and so on the software. Its function is to prevent illegal communications and external attacks: Some firewalls external data by reading the source address, destination address, such as whether the judge

44、from secure sites, and promptly refused to data from dangerous sites; Some firewalls through the firewall address internal and external address translation method to hide internal IP addresses to hide the various internal network information. (2) Encryption technology Encryption technology used to e

45、ncrypt important information. In the process needed for a key. Principle is the text of the letters a, b, c, d, w, x, y, z natural order remains unchanged, but make it with the E, F, G, Z, A, B, C, D , respectively, and then use a substitute E, F replaced by b, often a difference of four letters. Th

46、is rule is called encryption algorithms, and 4 is key. Encryption Method: private key encryption, public key cryptography encryption, digital signatures and digital authentication.1) Private key encryptionPrivate key encryption working principle is as follows: A sender and the recipient of a B share

47、 a common key distribution centres distributed key K. A K encryption key used by the transmission of the B, B decrypted using the same key. Private key is used DES, IDES, GOST, RC-5, Blowfish, such as CRAB. 2) Public key cryptographicPublic-key encryption principle: User A and B each have a pair of

48、keys (Ka, Ka-1) and (Kb, Kb-1). Private key Ka-1, Kb-1 from A and B respectively, their secret custody, and a public key Ka, in the form of certificates while Kb released. When P A security source expressly to send to B, B A first application of the public key encryption P Kb by EKb of the C = (P),

49、and P B receipt of the text, using private key Kb-1 expressly resume declassified by: P = DKb-1 (C) = DKb-1 (EKb (P). Common public key RSA encryption algorithm, such as DSS. 3) Digital Signature Digital Signature with 0 and 1 of the figures indicated that it is using a persons private key encryptio

50、n specific information processed and the results obtained. Signature system necessary for the two components: The signature algorithm, and the signature keys (secret). Confirmed algorithm (closed). Digital Signature principle: M news on the signature can be recorded as simple: Sig (M) = S. S confirm

51、ed the SR mind: Ver (S) = | true, the pseudo-| = | 0,1 |. 4) Digital authentication and digital certificates Digital Authentication using electronic means to verify the identity of the sender of information, information and the identity of recipients of the paper judged to be amended or whether the

52、validity of the photos encryption technology. Digital certificates will include the version number, serial number, signature algorithm identifier issued, the owners were, and public key algorithm identifiers, such as validity of fields. 3. E-commerce security measures E-commerce security solution in

53、volves a wide range of issues, including technology, management, systems, personnel and legal, and many other aspects. The basic strategy is a comprehensive way, we should not only pay attention to technical innovation is more important to strengthen management. From the management to enhance e-comm

54、erce security measures are:(1) Enacting strict laws and regulations so that rule-based, the illegal elements out of fear the law, not to act rashly. (2) To develop safety management measures, specifically including the establishment of standards for e-commerce security, network security management,

55、equipment and the security of key management, security organizations and the establishment of safety responsibility system, the determination of safety and inspection implementation.(3) Attention to safety testing and evaluation. Including the operation of the network before and the security detection and assessment.13 / 13

展开阅读全文
温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!