Font Size: a A A

A Report On The English-to-Chinese Trans-editing Of Developing Cybersecurity Capacity

Posted on:2020-09-04Degree:MasterType:Thesis
Country:ChinaCandidate:S X ZhangFull Text:PDF
GTID:2415330620953222Subject:Master of Translation Professional
Abstract/Summary:PDF Full Text Request
This is a report on the basis of a trans-editing task commissioned by a military unit.It describes the principles and methods of the process of the English-to-Chinese trans-editing,and the object of the trans-editing practice is ?Developing Cybersecurity Capacity-A proof ofconcept implementation guide?.The research book was published by RAND Corporation in 2018.It explores how to improve the developing of cybersecurity capacity from five aspects,including ?Cybersecurity Policy and Strategy;Cybersecurity Culture and Society;Cybersecurity Education,Training and Skills;Legal and Regulatory frameworks;Standards,Organizations and Technologies?.And its purpose is to help decision makers deepen their understanding of the cybersecurity and the developing of cybersecurity capacity.The source text is long and the structure is complicated,but the military unit demand that the target text shall be limited to 15,000 words,and it shall have a good readability.So how to meet these requirements is a challenge.Given all the difficulties,during the whole process of the trans-editing,a good communication with the military unit helps a lot.And finally,the target text was appreciated by the military unit.This practice report focuses on the principles and methods used in the process of trans-editing.In the process of trans-editing,how to convey the main idea,and how to keep the target text within the appropriate length,and how to adjust the structure are three major considerations kept in mind.And five concrete methods of trans-editing are used during the process of trans-editing,including selection,merging,generalization,amplification and inserting.On the one hand,the content of the trans-editing has some significance for the developing of the cybersecurity building.On the other hand,the process of trans-editing and the analysis of the principles and methods have some significance for the practice of trans-editing.
Keywords/Search Tags:cybersecurity, trans-editing practice, trans-editing report
PDF Full Text Request
Related items