11,010 Hits in 8.6 sec

E-Commerce Websites Using Jq.Mobi

Seifedine Kadry
2014 Zenodo  
In the present epoch, it's impossible to live one day without internet. The applications of internet are widely used in E-business and especially in E-Commerce.  ...  E-commerce is the use of the Internet and the Web to transact business. It is digitally enabled commercial transactions between and among organizations and individuals.  ...  The benefits of E-Commerce also extend to the general welfare of society.  ... 
doi:10.5281/zenodo.1000040 fatcat:7fnnqa2i3zg3jea67mo4d2j7gi

Trust Issues in Service Oriented Environment

Farookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon
2006 2006 IEEE International Conference on Service Operations and Logistics, and Informatics  
Even though not all the infrastructures are totally mature, they are regarded as the next generation of e-Commerce or e-Business platforms.  ...  Public brokers are publicly available through the Internet or for open community, while private brokers are limited in access for only authorized groups or a closed community.  ... 
doi:10.1109/soli.2006.328955 fatcat:jyqh2gcotvhohdyx5vnepkv7ua

Digitally Transforming the Web into an EcoSphere of EcoSystems [chapter]

Charlie Northrup
2021 Internet and New Technologies Law  
This paper explores the possibilities of membership in a hyperconnected framework where every individual, household, and organization is represented by a digital twin -an intelligent software agent responsible  ...  The framework provides for the identification, authentication, authorization, and auditing of the people, places, and things involved in the exchange of value within and across these ecosystems.  ...  By 1994 Netscape began exploring a way to change the stateless document sharing system into an e-commerce platform through the use of "cookies".  ... 
doi:10.5771/9783748926979-241 fatcat:ftkg6lxk5ff47cho6fxsdbnsm4

Trading caches: capacity provision networks

Xianjun Geng, R. Gopal, R. Ramesh, A.B. Whinston
2003 IT Professional Magazine  
Peering is basically a business agreement among ISPs to reciprocally provide access to their respective customers through privately established communication links.  ...  Think of a CPN as a virtual network of caches operating on top of physical peering or transit networks; the issues surrounding the implementation of the physical networks also apply to this virtual network  ... 
doi:10.1109/mitp.2003.1216230 fatcat:dvdjdszusndbnixbra6hdkphp4

A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs

Bharat K. Bhargava, Pelin Angin, Rohit Ranchal, Ranjitkumar Sivakumar, Asher Sinclair, Mark Linderman
2012 International Journal of Next-Generation Computing  
However, the nature of the communication between the nodes in these networks makes the disseminated data prone to interception by malicious parties, which could cause serious harm for the designated mission  ...  In this paper, we propose an approach for secure data dissemination in a mobile peer-to-peer network, where the data disclosed to a particular node in the network depends on the trustworthiness of that  ...  International Journal of Next-Generation Computing, Vol. 3, No. 1, March 2012.  ... 
dblp:journals/ijngc/BhargavaARSSL12 fatcat:alu6jntzw5gcxdkxikxmpcfelu

Building an e-marketplace on a peer-to-peer infrastructure

Diogo R Ferreira, JJ Pinto Ferreira
2004 International journal of computer integrated manufacturing (Print)  
The paper discusses the implementation of essential services for P2P e-marketplaces, based on one of the leading P2P platforms, and illustrates its benefits by applying the P2P approach to a vendor of  ...  Peer-to-peer (P2P) architectures will provide far more decentralised infrastructures, while allowing a much wider range of business patterns to take place.  ...  The first author highly appreciates the support of the Fundação para a Ciência e a Tecnologia (, which is funding his research.  ... 
doi:10.1080/09511920310001607069 fatcat:3767w6ilffdp7ox7flxhoxzwru

Secure Data Sharing Model Using New Technique for Preserving Privacy

Sanaa Sarahneh, Radwan Tahboub
2015 Journal of Internet Technology and Secured Transaction  
The use of information technology in different areas began to increase, the exchange and sharing different types of information was required.  ...  Electronic data interchange can be classified as one of the important areas of information technology, where the need for data sharing increasingly required in almost every field.  ...  Managing untrusted peers by private community server and public community server, the private is to maintain a list of registered users and to provide authorized subscribes with a current set of public  ... 
doi:10.20533/jitst.2046.3723.2015.0054 fatcat:b4jatt6khjc35my7lhcizshcsu

Examining the Role of Privacy in Virtual Migration: The Case of WhatsApp and Threema

Michel Schreiner, Thomas Hess
2015 Americas Conference on Information Systems  
To answer these questions, we develop a research model examining the role of privacy in virtual migration, using the push-pullmooring (PPM) migration framework as a theoretical lens.  ...  Thus, the question arises whether users would switch from WhatsApp to Threema for privacy reasons, and what the factors are that would affect their switching intention.  ...  For instance, Hou et al. (2011) use the PPM to explain online gamers' switching intentions in terms of "migrating to a new virtual world."  ... 
dblp:conf/amcis/SchreinerH15 fatcat:wj7dzuigdrhjhm5eajoiduxwb4

The Economic Geography of the Internet's Infrastructure

Edward J. Malecki
2002 Economic Geography  
Interconnection is both critical to the functioning of the Internet and the source of its greatest complications.  ...  A global bias of Internet backbone networks toward world cities is evident, and it is tempered only slightly by a set of urban areas that serve as interconnection points between backbone networks.  ...  , from portals to full e-commerce sites.  ... 
doi:10.2307/4140796 fatcat:abxvmbvutvbona5zxpniamqrsq

The Security and Privacy Issues as One of the Barriers Impeding the E-Business Development in Albania

Linda Cepani
2012 Analele Ştiinţifice ale Universităţii "Al.I. Cuza" din Iaşi: Ştiinţe Economice  
This research gives a general review of the latest developments in e-commerce security and privacy in the world compared to the results of the survey conducted in Albania.  ...  In Albania, as in other Western Balkan countries, e-commerce is regarded as an opportunity for the development of the international trade.  ...  A Virtual Private Network (VPN) can also be created using encryption (Ecommerce Working Group, 2009). It is a secure way for machines to communicate though a public network, privately.  ... 
doi:10.2478/v10316-012-0024-7 fatcat:ctciyywlqnd2he7rsdzszhsnqa

Trust and Security in Service-Oriented Environments [chapter]

2006 Trust and Reputation for Service-Oriented Environments  
These range from writing reports to looking at the news, from selling a car to joining a club, from the purchase of goods (e.g., [1] ) to the purchase of services (e.g., for travel arrangements  ...  Thus, real business value, increased consumer confidence, guaranteed quality of product and service could become a reality in the virtual word.  ...  (peer-to-peer communication), from shopping at the mall ( to bargaining in virtual markets (e-Bay), from e-bill to e-pay, from the virtual community to virtual collaboration, from e-governance  ... 
doi:10.1002/9780470028261.ch1 fatcat:4od6p4wvbng3jcgdikiv2xk7oe

Distributed Marketplaces Using P2P Networks and Public-Key Cryptography

Alessio Signorini, Antonio Gulli, Alberto Maria Segre
2008 Proceedings of the Third International ICST Conference on Scalable Information Systems  
In this paper we introduce a possible architecture for a decentralized marketplace like eBay, that uses an existing P2P networks and well-known cryptographic methods to support secure exchanges and user  ...  Every day billions of dollars are spent in on-line services and electronic transactions among users all over the world.  ...  A new peer joins the network by opening a connection to an existing peer and communicates with the network through it.  ... 
doi:10.4108/icst.infoscale2008.3572 dblp:conf/infoscale/SignoriniGS08 fatcat:5euuyycmtffzre4mr7f7r5agby

A new era in fintech payment innovations? A perspective from the institutions and regulation of payment systems

Iris H-Y Chiu
2017 Law, Innovation and Technology  
services, from products to services and markets, 2 and many aspects could be poised to be 'disruptive innovations', which, in Bower and Christensen's framework, 3 refer to the creation of new markets  ...  and Introduction The growth of financial technology is a marked trend as Price Waterhouse Coopers observes fintech as 'a dynamic segment at the intersection of the financial services and technology sectors  ...  Virtual Currencies The development of e-commerce has also stimulated thinking into whether exchange of value can be made in terms of e-money, as privately arisen tokens of value recognised by, for example  ... 
doi:10.1080/17579961.2017.1377912 fatcat:7etov32kwbcytco5hehtyumv3u

The Economic Geography of the Internet's Infrastructure*

Edward J. Malecki
2009 Economic Geography  
Interconnection is both critical to the functioning of the Internet and the source of its greatest complications.  ...  A global bias of Internet backbone networks toward world cities is evident, and it is tempered only slightly by a set of urban areas that serve as interconnection points between backbone networks.  ...  , from portals to full e-commerce sites.  ... 
doi:10.1111/j.1944-8287.2002.tb00193.x fatcat:q2viljacqrbrjhxtg2iyjsybjm

POPEYE: providing collaborative services for ad hoc and spontaneous communities

Juan A. Botía Blaya, Isabelle Demeure, Paolo Gianrossi, Pedro Garcia Lopez, Juan Antonio Martínez Navarro, Eike Michael Meyer, Patrizio Pelliccione, Frédérique Tastet-Cherel
2009 Service Oriented Computing and Applications  
Next generation collaborative systems will offer mobile users seamless and natural collaboration amongst a diversity of agents, within distributed, knowledge-rich and virtualized working environments.  ...  virtual communities can emerge spontaneously and share data with the appropriate quality of service for business applications (persistence, synchronization, security, etc.).  ...  The Framework UI is used for interactions with general POPEYE functions provided by the Framework Manager.  ... 
doi:10.1007/s11761-009-0038-7 fatcat:vf7dp7mpazhtrmewqtxam3zhai
« Previous Showing results 1 — 15 out of 11,010 results