Research on Internet Culture Model Based on Memetics Literacy Translation Construction

Article Preview

Abstract:

With the development of translation major at home, it becomes urgent to reform the traditional translation pedagogy, which inevitably relies on the research memetics of literacy translation competence, the Internet and modern educational technology. In order to effectively cultivate students' overall literacy translation competence, this paper proposes a cultivation model of translation competence based on the-internet, by analyzing the characteristics of literacy translation sub-competences and the possible applications of various internet platforms to translation teaching.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 971-973)

Pages:

2697-2700

Citation:

Online since:

June 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Orozco M, Amparo H A. Measuring Ttranslation Competence Acquisition [J]. Meta XLVII, 2002, (3): 375-402.

Google Scholar

[2] Neubert A. Competence in Language, Languages, and in Translation, in C. Sch ffner & B. Adab Developing Translation Competence[M]. Amsterdam/Philadelphia: John Benjamins, 2000: 3-18.

DOI: 10.1075/btl.38.03neu

Google Scholar

[3] Pym A. Redefining Translation Competence in an Electronic Age: in Defense of a Minimalist Approach [J]. Meta XLVIII, 2003, (4): 481-497.

DOI: 10.7202/008533ar

Google Scholar

[4] CHEN Li, Constructing a Coupling Mechanism for the Technique Standard of Network Security and the Law Norms, Journal of Fujian Public Safety College, vol. 3, pp.86-89, (2006).

Google Scholar

[5] ZHAO Hong-bin, Research on the system structure of network safety standard and its countermeasure, Information Technology, vol. 28(6), pp.93-97, (2004).

Google Scholar

[6] JI Run-bo, Analyses of actualities and countermeasures of network security in china, Agriculture Network Information, vol. 2, pp.28-30, (2005).

Google Scholar

[7] Wu Yanbo; Xiang Dawei, Threats and protecting strategies of network security, Journal of Hubei Public Security College, vol. 6, pp.79-81, (2004).

Google Scholar