You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This textbook focuses on the members of the digital value chain of eBusiness and eCommerce and dedicates a separate chapter to each member part: eProducts & eServices, eProcurement, eMarketing, eContracting, eDistribution, ePayment, as well as eCustomer Relationship Management. In addition to business models and business webs, digital procurement and marketing processes are likewise addressed such as electronic negotiation processes, security questions with digital signatures, as well as electronic supplier relationship management and customer relationship management. The topics are described based on explicit procedures and descriptive examples of application. The gradual set-up of an electronic Webshop for DVD’s serves as a continuous case study. The book is directed towards students of economics at universities and technical colleges; it is also suitable for executives, project leaders, and company experts who deal with the digital value chain.
This book is a result of ISD2000-The Ninth International Conference on Infor mation Systems Development: Methods and Tools, Theory and Practice, held August 14-16, in Kristiansand, Norway. The ISD conference has its roots in the first Polish Scandinavian Seminar on Current Trends in Information Systems Development Method ologies, held in Gdansk, Poland in 1988. This year, as the conference carries into the new millennium this fine tradition, it was fitting that it returned to Scandinavia. Velkommen tilbake! Next year, ISD crosses the North Sea and in the traditions of the Vikings, invades England. Like every ISD conference, ISD2000 gave participants an opportunity to express ideas on the current state of the art in information systems development, and to discuss and exchange views about new methods, tools and applications. This is particularly important now, since the field of ISD has seen rapid, and often bewildering, changes. To quote a Chinese proverb, we are indeed cursed, or blessed, depending on how we choose to look at it, to be "living in interesting times".
"This multi-volume book delves into the many applications of information technology ranging from digitizing patient records to high-performance computing, to medical imaging and diagnostic technologies, and much more"--
This book constitutes the refereed proceedings of the Third International Conference on Autonomic and Trusted Computing, ATC 2006, held in Wuhan, China in September 2006. The 57 revised full papers presented together with two keynotes were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections.
"This book explores the possibilities and advantages created by fuzzy methods through the presentation of thorough research and case studies"--Provided by publisher.
From fundamental concepts and theories to implementation protocols and cutting-edge applications, the Handbook of Mobile Systems Applications and Services supplies a complete examination of the evolution of mobile services technologies. It examines service-oriented architecture (SOA) and explains why SOA and service oriented computing (SOC) will pl
2.1 E-Government: e-Governance and e-Democracy The term Electronic Government (e-Government), as an expression, was coined after the example of Electronic Commerce. In spite of being a relatively recent expression, e-Government designates a field of activity that has been with us for several decades and which has attained a high level of penetration in many countries2. What has been observed over the recent years is a shift on the broadness of the e-Government concept. The ideas inside e-Governance and e- Democracy are to some extent promising big changes in public administration. The demand now is not only simply delivering a service - line. It is to deliver complex and new services, which are all citizen-centric. Another important demand is related to the improvement of citizen's participation in governmental processes and decisions so that the governments' transparency and legitimacy are enforced. In order to fulfill these new demands, a lot of research has been done over the recent years (see Section 3) but many challenges are still to be faced, not only in the technological field, but also in the political and social aspects.
Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec’01 is the first of this decade (and century) and it will be devoted to “Trusted Information - the New Decade Challenge” This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Protocols, Smart Card, Network Security and Intrusion Detection, Trusted Platforms. Others sessions are devoted to application like eSociety, TTP Management and PKI, ...
"The book is intended to clarify the hype, which surrounds the concept of mobile multimedia through introducing the idea in a clear and understandable way, with a strong focus on mobile solutions and applications"--Provided by publisher.
"This book provides comprehensive coverage and definitions of the most important issues, concepts, trends, and technologies in fuzzy topics applied to databases, discussing current investigation into uncertainty and imprecision management by means of fuzzy sets and fuzzy logic in the field of databases and data mining. It offers a guide to fuzzy information processing in databases"--Provided by publisher.