20,373 Hits in 4.8 sec


Sunny Baker
1999 Journal of Business Strategy  
For example, a factory-costing application using DB2 technology at Deere’s Moline data center can now access Oracle data- bases in Europe.  ...  Deere is moving toward a completely borderless envi- ronment in terms of data access. This borderless data helps Deere expand its e-commerce capabilities.  ... 
doi:10.1108/eb040016 fatcat:7rugkw5xabcrfkkwj3ighdmw74

The Impacts Information Technology On Business

Moses Isdory Mgunda
2019 Journal of International Conference Proceedings  
This study tries to analyse the impact of IT on business and the performance of the economy. The empirical findings show that the role of IT in business is tremendous.  ...  The revolution of IT and internet facilitates the outstanding performance of the economy in business sector, through the exchanges of information by using internet and electronic devices facilitate accessibility  ...  the E-Commerce Market for Consumer Goods with Values in Us Dollars Total number of people purchasing consumer goods via e-commerce (in billion) Penetration of consumer goods e- commerce (total  ... 
doi:10.32535/jicp.v2i3.656 fatcat:yyiojvadcfhizc3x2isq22xobi

Electronic Commerce in Hong Kong Special Administrative Region of the People's Republic of China

Jan Damsgaard, Ali Farhoomand
1999 Electronic Markets  
We provide an overview of a number of components that are prerequisites for e-commerce.  ...  The major explanatory factor for the favourable state of Hong Kong's ecommerce infrastructure is the coexisting mix of private and public e-commerce initiatives.  ...  Data Interchange (EDI) is playing an important role in fostering and sustaining e-commerce.  ... 
doi:10.1080/101967899359274 fatcat:ozjhhfmcibb4xavzfd2s3swrhi

The Development of Research on e-Logistics

Qurtubi Qurtubi, Dian Janari, Melinska Ayu Febrianti
2021 Estudios de Economía Aplicada  
Literature review is conducted towards 20 research articles of e-logistics that have been written and tracked from five online accesses.  ...  This article discusses about the development of research on e-logistics.  ...  The result of research could be applied as web-based application service provider that sufficient for any companies to access it by internet, to obtain the best schedule for fleet (the cheapest route set  ... 
doi:10.25115/eea.v39i4.4486 fatcat:mcqdtzgjffdwrny5kdj2fo3qn4

An onion ring framework for developing and assessing mobile commerce security

June Wei, Lai C. Liu, Kai S. Koong
2006 International Journal of Mobile Communications  
A five-layer 'onion ring' framework for analysing mobile commerce security requirements and for improving system security performance is presented in this research.  ...  Two quantifiable approaches, based on weighted scores applied to either a spider diagram or a decision solution matrix, are used to demonstrate how the security level can actually be objectively measured  ...  Partial funding for the earlier version was provided by a grant from the Department of Education to the Computing and Information Technology Center at the University of Texas -Pan American.  ... 
doi:10.1504/ijmc.2006.008605 fatcat:ugtezejaxbfs3crbm4nk67ear4

Database Security: A Historical Perspective [article]

Paul Lesov
2010 arXiv   pre-print
Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database.  ...  Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security.  ...  [14] [15] [16] Also, the development of distributed object systems and e-commerce applications resulted in developments or object oriented access control.  ... 
arXiv:1004.4022v1 fatcat:qosmugsvkzh4pmaeiqj2ysq3ay

Digital Supply Chain And Its New Payment Services

G K Vikram, B Seerivasan
2018 Zenodo  
So every people are very eager for online shopping and online banking and quick delivery or quick access to make their work faster.  ...  In these days of generation-Z all people use a smart phone in their day today life , so smart phone play a vital role in these human lifestyle.  ...  RFID can also be used in retail for advertising customer service and loss control; in the supply chain for improved visibility and distribution; and in security situations for access control.  ... 
doi:10.5281/zenodo.1419438 fatcat:tmvruzauszddni3zhkr4rs3wzy

Design of Flow Big Data System Based on Smart Pipeline Theory

Jianqing Zhang, Shuai Li, Lilan Liu, L. Zhao, A. Xavior, J. Cai, L. You
2017 MATEC Web of Conferences  
Intelligent pipe describes operational data, sales data; operator's pipe flow data make the value for e-commerce business form and business model in mobile e-business environment.  ...  Analyzing business data effectively in the intelligent pipeline, and use the results of the analysis and processing for control and management of pipeline is essential for the successful operation of intelligent  ...  Its role is to enable mobile e-business towards intelligent mobile e-commerce, data driven to gather the data for data processing, big data mining and data analysis, and the result used for driving the  ... 
doi:10.1051/matecconf/201710002014 fatcat:ovkllucvl5grfp5ex2pqjz4zfq

Evaluation of e-commerce location and entry to China – implications on shipping and trade

Yulia Panova, Albert Tan, Olli-Pekka Hilmola, M. H. Puvindran, Xu Hongsheng, Weidong Li
2019 Journal of Shipping and Trade  
The outcome of GCA model shows the list of the most preferable locations for e-commerce enterprise development.  ...  locations for e-commerce and consumption are also at north and western parts.  ...  Xu Hongsheng is an Associate Professor at Luoyang Normal University and Henan Key Laboratory for Big Data Processing & Analytics of Electronic Commerce, China.  ... 
doi:10.1186/s41072-019-0045-6 fatcat:bzlo62gzgbcbflldqwjrtpvlje

Artificial intelligence and big data in the Maritime Silk Road Initiative: The road towards Sea Power 2.0 The road towards seapower 4.0

Lungani Nelson Hlongwa
2021 Scientia Militaria  
Although the article focuses mostly on the commercial side of Sea power 2.0, it concludes by pointing out how artificial intelligence and big data could serve military objectives.  ...  However, students of the Belt and Road Initiative ('the Initiative') have focused extensively on the land and sea dimensions of this grand project while only tentatively touching on its other dimensions  ...  cloud-based servers and e-commerce to dominate BRI markets and potentially undermine the growth of local tech firms. 556 At the national level, control over digital data is also becoming an important  ... 
doi:10.5787/49-2-1329 fatcat:zmjqw7tgnnf75idkduyjycgfea

SEA WAF: The Prevention of SQL Injection Attacks on Web Applications

Jeklin Harefa, Gredion Prajena, Alexander Alexander, Abdillah Muhamad, Edmundus Valin Setia Dewa, Sena Yuliandry
2021 Advances in Science, Technology and Engineering Systems  
The security of website application has become important in the last decades.  ...  For the testing scenario, this experiment uses an application that has become an industry standard in identifying and validating security holes on a website.  ...  Conflict of Interest The authors declare no conflict of interest. Acknowledgment This research is partially supported by BINUS University.  ... 
doi:10.25046/aj060247 fatcat:bpec3ifhvzaxxigfyhjmadfsmi


Wiwiek Wiwiek, Widya Mandala Catholic University Surabaya Indonesia
2020 Research In Management and Accounting  
Based on the data processing that has been done, it is found that Trust and Privacy have a positive and significant influence on E-Satisfaction; E-Satisfaction has a positive and significant effect on  ...  A B S T R A C T This study aims to analyze the effect of Trust, Privacy dan Efficiency; and lastly, the effect of Customer Satisfaction on loyalty consumer of Tokopedia in Surabaya.  ...  The second factor that also plays an important role, which concerns customers about the data they provide to commerce sites is about customer data privacy.  ... 
doi:10.33508/rima.v3i1.2744 fatcat:7tf3s6mtane4xhhx6u4ikqemjq

Modeling and Validating Role-Based Authorization Policies for a Port Communication System with UML and OCL

Christian Maeder, Karsten Sohr, Rodrigue Wete Nguempnang, Nils Meyer-Larsen, Rainer Müller
2020 Journal of Object Technology  
We combine and focus on Role-Based Access Control (RBAC) with constraints and Attribute-Based Access Control (ABAC) for finer grained authorization constraints.  ...  The purpose is to increase the integrity of exchanged data and thus reduce the risks of attacks or failures.  ...  Finally, we thank the anonymous reviewers for their valuable feedback.  ... 
doi:10.5381/jot.2020.19.3.a8 fatcat:gmlsb3ts3bgjlefxwmrtrt3doq


Dr. Bhakti D. Mehta
2021 IJARCCE  
E-commerce business represents electronic trade. E-commerce includes an online exchange.  ...  E-Commerce deals in India.  ...  advancements; and handle time to showcase tension for new applications.  ... 
doi:10.17148/ijarcce.2021.101002 fatcat:k5z3iufgnjhabblrxa6ycbs4ya

Community clouds within M-commerce: a privacy by design perspective

Farid Shirazi, Amna Iqbal
2017 Journal of Cloud Computing: Advances, Systems and Applications  
This is followed by a discussion of the current issues based on the PbD framework, as well as offers of a solution framework to address the relevant challenges.  ...  This enables analysis of the Privacy by Design (PbD) framework and uses it to evaluate the next generation of m-commerce designs.  ...  In addition, it enables the research of mobile applications for m-commerce from the perspective of client accessibility.  ... 
doi:10.1186/s13677-017-0093-0 fatcat:4jp2r3fw4ncnlpcj3vjglcc7jy
« Previous Showing results 1 — 15 out of 20,373 results