To see the other types of publications on this topic, follow the link: Electronic commerce – Information technology.

Dissertations / Theses on the topic 'Electronic commerce – Information technology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Electronic commerce – Information technology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Al-jedaibi, Hani K. "Determining how information technology is changing the role of leadership in virtual organization." Online version, 2001. http://www.uwstout.edu/lib/thesis/2001/2001aljedaibih.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hasni, Neji. "Role of electronic-commerce in the growth of Tunisian economy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FHasni.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002.<br>Thesis advisor(s): Thomas Housel, John Osmundson. Includes bibliographical references (p. 61-65). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Wong, Wai Lin. "Cross-context transfer of electronic title documents." Thesis, University of Macau, 2011. http://umaclib3.umac.mo/record=b2492830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hui, Wendy Wan Yee. "Essays on pricing and marketing of information goods /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?ISMT%202006%20HUI.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dresen, Julie Anne. "Assessing local industry needs for the Gateway Technical College IBM Advanced Career Education program." Online version, 2008. http://www.uwstout.edu/lib/thesis/2008/2008dresenj.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pather, Shaun. "E-commerce information systems (ECIS) success: A South African study." Thesis, Cape Peninsula University of Technology, 2006. http://hdl.handle.net/20.500.11838/1409.

Full text
Abstract:
Thesis (DTech (Information Technology))--Cape Peninsula University of Technology, 2006<br>As a phenomenon of the 1990s, e-Commerce is relatively new. Its advent offered the promise of new opportunities to businesses and entrepreneurs around the world. The hyperbole associated with the Internet and the Web resulted in a mindset that e-Commerce was an easy road to success. It was believed that this new technology-based approach would revolutionise business in a number of ways, including changing the relationships between thestakeholders and allowing small organisations to play on the global stage. However, the road to business enhancement through e-Commerce has not been easy. Many organisations have not survived their attempts to engage. in e-Commerce and others have radically changed their approach since the e- . Bubble burst. There were many reasons for the failure of these e-Commerce initiatives. They included poor business ideas, no control of expenditure, lack of general business experience and immaturity, as well as little understanding of the crucial importance of managing the technology through which the Internet and the Web delivers e-Commerce opportunities. This thesis explores the intricacies of IS within the Sduth African B2C eCommerce environment and argues that without a coherent understanding of the factors affecting IS success, the implementation of traditional IS evaluation mechanisms may be problematic. A comparative analysis of studies in this field between the pre- and post- e-Commerce eras, ascertained a paucity of theoretical frameworks and a fragmented body of knowledge in the extant literature, with a narrow focus on web-interface issues.
APA, Harvard, Vancouver, ISO, and other styles
7

劉汝剛 and Yu-kong Lawrence Lau. "Can international trading business gain strategic advantage through the new information technologies?" Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31268961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Van, der Zwaag Frank. "EBusiness systems innovation and change in the passenger airline industry submitted in partial fulfilment of the degree of Master of Business in Information Technology, Auckland University of Technology, December 2004 /." Full thesis, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lopez, Rivera Ibrahim. "Developing Online Trust in Electronic Commerce| A Generational Cohort Study in Puerto Rico." Thesis, Universidad del Turabo (Puerto Rico), 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10279353.

Full text
Abstract:
<p> Developing online trust is crucial for e-commerce vendors in order to attract new consumers and develop long-term relationships with existing ones. We intended to investigate if consumers from different generational cohorts differ on how they develop online trust when utilizing e-commerce websites. Through the analysis of empirical data collected from 138 users of e-commerce, we examined four drivers of online trust between three generational cohorts in Puerto Rico. We reviewed relevant research related to the effects of security, privacy, navigational elements, feedback mechanisms on online trust and generational cohort theory. Partial least square and structural equation modeling was use for analysis. Results suggest that online trust is developed in dissimilar fashions across generations and differ in what drivers they find important. Our research could hold practical and scholarly significance since its findings can help e-commerce and online service providers in determining the important factors they need to have present in their websites in order to address online trust for their target audience. By investigating the differences in the drivers of online trust across three generational cohorts, this study builds upon previous literature that only compared Millennials against Baby Boomers.</p><p>
APA, Harvard, Vancouver, ISO, and other styles
10

Lau, Yu-kong Lawrence. "Can international trading business gain strategic advantage through the new information technologies? /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B20075467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Koch, Hope Arlene. "Business-to-business electronic marketplaces: membership and use drivers." Texas A&M University, 2003. http://hdl.handle.net/1969.1/51.

Full text
Abstract:
Business-to-business (B2B) electronic marketplaces (e-marketplaces) are one of the most heralded developments in recent years. These marketplaces bring together businesses buying and selling goods and services in an online buying community. E-marketplaces promise to increase the efficiency and effectiveness of procurement activities by replacing traditional manual processes with automated electronic procedures and by expanding the number of available trading partners. Despite the technology availability and the high potential benefits, very few e-marketplaces have succeeded. This three-year study identifies and investigates two major B2B e-marketplace stumbling blocks: attracting a sufficient number of members, and then influencing these members to use the e-marketplace. This investigation uses a variety of qualitative techniques to solicit information from nearly fifty executives representing four B2B e-marketplaces with contrasting membership and use levels. Within each e-marketplace, the study solicited information from high and low use organizations, buying and selling organizations, and a nonparticipant organization. The interview data was analyzed using line-by-line analysis from grounded theory. The analysis involved assimilating the unique stories of each manager into drivers that affect e-marketplace membership or use. These drivers were then compared to membership levels and/or use levels. The analysis resulted in three research models. Each research model is a data-driven representation of factors driving B2B e-marketplace membership, B2B e-marketplace use, and a particular organization's B2B e-marketplace use. Each model contains several unique drivers and offers a comprehensive picture of what is happening in e-marketplaces. These findings enhance management's understanding of e-marketplaces, their role in business, their challenges, and ways of overcoming these challenges in order to reap the benefits of e-marketplace participation. This study brings one of the first grounded theory investigations of B2B e-marketplace membership and use to the limited academic research in this area. This research offers insights to a number of theories, including transaction cost economics, institutional theory, resource dependency theory, and public goods theory.
APA, Harvard, Vancouver, ISO, and other styles
12

O'Malley, John Richard Jr. "Electronic Data Interchange: An Inventory Perspective of Its Economic Viability and Recommendations for Information Technology Driven Implementation." Diss., Virginia Tech, 2000. http://hdl.handle.net/10919/37365.

Full text
Abstract:
Electronic commerce (EC) in its various forms is perceived by many organizations as the way that business will be conducted in the future. Much of the current wave of interest in EC is driven by new, readily available technologies like the Internet and the World Wide Web. The excitement regarding Web Commerce has lead many to believe that EC is relatively new. In reality, EC in the form of Electronic Data Interchange (EDI) has existed for 30 years and accounts for far more business than WC. It is the preferred, and often required, way of doing business with many large organizations such as the U.S. Federal Government, Ford, General Motors, and Wal-Mart. While EDI has existed for 30 years, it has not experienced the rapid adoption rate that Web Commerce has in the last few years. Currently, less than 10 percent of U.S. businesses and less than 5 percent of world businesses utilize EDI. The adoption rates for other recent information technologies, such as the World Wide Web and e-mail, have been much higher in a much smaller time frame which leads to the question of why has diffusion of EDI occurred so slowly compared to other recent information technologies. According to Kalakota and Whinston (1996), it is not due to technology problems with EDI but instead with its benefits. This is in conflict with Emmelhainz (1990) and Sokol (1995) who point out the tremendous benefits to firms that adopt EDI. This dissertation researches the reasons for the low EDI adoption rate based on financial benefits. It then develops an economic model that computes the cost savings which result when an EDI system is implemented. Sensitivity analysis is performed to understand the economic mechanisms of EDI. Based on the model developed here, recommendations are made for changing EDI to increase its market penetration. Finally, based on the recommendations an alternative EDI system, JEEDI, is developed. The financial effectiveness of the JEEDI system over existing EDI systems is then demonstrated using the economic model developed here.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
13

Xu, Xin. "The strategic impacts of ICT service innovation on consumers /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?ISMT%202007%20XU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

April, Graham. "Dimensions for evaluating information systems service quality expectations of e-Commerce SMMEs." Thesis, Cape Peninsula University of Technology, 2007. http://hdl.handle.net/20.500.11838/1378.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2007<br>With growing invesbnent in WWW technologies bye-Commerce businesses the measurement of Information Systems (IS) effectiveness in this area has become increasingly important over the last decade. As business users have become reliant on outsourced IS service providers for a wide range of services, the quality of service rendered by the latter is an important issue which impacts on IS effectiveness. Researchers have for many years recognised the importance of service quality as a measure of IS performance. Service quality measurement tools such as SERVQUAL from the marketing field, have been proven to be applicable to the IS domain. However, empirical studies in this regard are concentrated in the context of large, non- eCommerce organisations only. In South Africa, e-Commerce has been recognised as an important driver for growth in SMMEs. The literature suggests that IS service delivery to eCommerce businesses needs to be evaluated differently to that of traditional brick-and-mortar businesses. There is however a paucity of research regarding IS evaluation in e-Commerce environments, including that of the application of service quality principles. It is thus difficult for managers of IS service providers in this context to develop a complete picture of the effectiveness of the IS they deliver. Furthermore, because e-Commerce SMMEs are almost wholly reliant on these service providers for the supply of IS and support, their service expectations could be different from those in traditional businesses. The primary objective of this research was to investigate whether IS service quality criteria applied in large traditional businesses, are also applicable to SMME e-Commerce businesses. The applicability of a service quality measurement instrument, based on SERVQUAL, was tested in an ev Commerce SMME context. Specifically, this instrument measures the service quality expectations that e-Commerce SMMEs have of IS service providers. A SERVQUAL measurement scale from a recent MISQ paper was adapted and used to collect data concerning service quality expectations of e· Commerce SMMEs. Using a structured survey method, the research was delineated to e-Commerce enabled bed-and-breakfast and self-catering accommodation businesses in the Western Cape, South Africa. The research results indicate that, although SERVQUAL principles were applicable to the e-Commerce SMME context, the service quality dimensionality was different. There are four derived dimensions for service quality expectations of e-Commerce SMMEs in this research, viz., Credibility, Expertise, Availability and Supportiveness. A fifth dimension is the Tangibles dimension, which is retained from SERVQUAL. Furthermore the results indicate that the Credibility was the most important dimension in this research context, while the Tangibles dimension was the least important.
APA, Harvard, Vancouver, ISO, and other styles
15

Dou, Jie. "Evaluating Microsoft .NET technology: Implementation online store." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3060.

Full text
Abstract:
The purpose of this project is to design, develop and implement an e-commerce shopping cart system based on Microsoft.NET technology and to evaluate ASP.NET technology by developing a shopping cart system.
APA, Harvard, Vancouver, ISO, and other styles
16

Al, Haraizah Ahed Saket. "E-commerce technology acceptance (ECTA) framework for SMEs in Middle Eastern countries with reference to Jordan : empirical evidence from electronic commerce in SMEs." Thesis, Kingston University, 2010. http://eprints.kingston.ac.uk/20307/.

Full text
Abstract:
Technology has transformed many aspects of business and market activities. Internet is one of the most important technologies, which have created a global digital economy with new opportunities. One of the most noticeable changes of business is e-commerce. E-commerce enables business to sell products and services to consumers on global basis. A prominent role of electronic commerce is that it assists firms to compete, have access to new markets and extend the geographic reach of their operations. An adoption of appropriate technology can lead the company to greater business competency, improve its business performance, and ensure it retains its competitive advantages. Despite this awareness, many SME in the developing countries in the Middle East have yet to fully embrace this adoption of ecommerce in the running of their business. The problem in this research is to identify and bring together in one framework the appropriate issues, variables, components and concepts that need to be addressed to encourage, motivate and enable SME's in Middle Eastern countries to adopt electronic commerce technology in the running of their businesses. The existing innovation adoption models are inadequate in appropriately explaining which factors are involved in the adoption decision, and are particularly insufficient with respect to small and medium sized enterprises (SMEs) and further, less research is available in the context of Middle Eastern countries. The aim of this study is to develop a comprehensive research framework called Electronic Commerce Technology Acceptance (ECTA) framework, which can be utilised for discovering the factors affecting the adoption of e-commerce innovation and to apply this framework for empirically testing the adoption of e-commerce application by SMEs in Middle Eastern Countries. The ECTA framework contains fourteen potential determinant factors covering four phases: social stimulus, cognitive response, affective response, and behavioural response. This empirical study was conducted through survey research and the sample was drawn by means of systematic sampling technique. The empirical data were collected by using self-administrated questionnaires and semi-structured interviews. The data analysis was based on 400 Jordanian SMEs; also data analysis was based on multivariate statistical techniques encompassing multiple linear regression, simple linear regression, one-way ANOVA, and stepwise regression. Miles and Huberman approach and Leximancer software were used for the qualitative data analysis. The findings of the study reveal significant insight into understanding the adoption of electronic commerce by SMEs.This research has developed, presented and evaluated the ECTA framework. This framework has been shown to be very viable and useful. The framework can he used as a tool to enable Technology innovation and adoption scholars to encourage and advising SMEs to adopt appropriate ecommerce technology to improve their business performance. Suggestions are made to improve the framework with future work to apply this framework in more SMEs. A strategy is suggested for policy makers to make use of these findings to improve the adoption of ecommerce in Jordon. The findings from this research show that the ECTA framework is beneficial to both governmental and private sectors who intend to accelerate the adoption rate of electronic commerce implementations and their relevant components among SMEs in Jordan.
APA, Harvard, Vancouver, ISO, and other styles
17

Braun, Patrice. ".comUnity : a study on the adoption and diffusion of internet technologies in a regional tourism network." University of Ballarat, 2003. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/15657.

Full text
Abstract:
This thesis describes the initiation and evolution of an action research project, which investigates the adoption and diffusion of Internet technologies in a regional Australian tourism network. The research evolved out of a portal development consultancy. The aim of the study was two-fold: to investigate the nature of the change process when a collaborative network seeks to adopt e-commerce; and to determine how the change process differed in the face of incremental change (adding some e-commerce solutions to the network), or radical change (changing the overall business model). The purpose of the study was to gain a better understanding of the economic, strategic and social potential of regional business networks in the current techno-economic climate. The study builds on Rogers' (1995) seminal work on the diffusion of innovations and makes a unique contribution to existing diffusion studies by its focus on the nature of the network links as the unit of analysis; and by its application of an action-oriented methodology to untangle the effects of the embedded network structure on diffusion. The study suggests a strong relationship between diffusion and network positioning, both in terms of place (status and position in the network) and space (the geographic make-up of the network). Diffusion further hinged on network cohesion, actors' trust in and engagement with the network. Adoption of e-commerce was obstructed by actors’ worldview; lack of time, reflexive learning, and commitment to change. The incorporation in the study’s diffusion framework of contextual moderators such as network position, worldview, trust, time and commitment considerably extends Rogers’ traditional diffusion framework. Based on its emergent analysis framework, the study introduces a dynamic change model towards sustainable regional network development. It is suggested that both the diffusion framework and the regional innovation model developed in this study may, either jointly or separately, be applicable beyond the tourism and service sector.<br>Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
18

Nomdoe, Herschel Gordon. "Evaluating web-based information systems effectiveness : an e-service quality multi-stakeholder perspective." Thesis, Cape Peninsula University of Technology, 2007. http://hdl.handle.net/20.500.11838/1370.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2007<br>Over a period spanning approximately twenty five years Information Systems (IS) researchers have been plagued by the problem of how to evaluate IS effectiveness or success. After the advent of the World Wide Web (WWW) in the 1990s, questions have arisen regarding the relevance of previously established evaluation approaches to the evaluation of web-based IS. Subsequently, firms have invested billions of dollars anually in information systems but the lack of appropriate frameworks for evaluating their effectiveness made it difficult to determine the return on IS investment. In a period spanning 20 years IS researchers proposed a diverse number of approaches e.g. the communications research of Shannon and Weaver (1949) and the information "influence theory" of Mason (1978). These were subsequently incorporated into a single model in 1992, called the IS Success Model (Delone & McLean, 1992). The principal objective of this research project was to develop a generic methodology for web-based Information Systems (IS) success evaluation from a multi-stakeholder perspective for specific IS contexts. The Delone and McLean IS Success Model (Delone and McLean, 1992) provides an underpinning framework for measuring IS effectiveness. In the latter 1990's the concept of service-quality was introduced into the IS effectiveness literature. In their updated IS Success Model, Delone and McLean (2003) then included service quality as key measure in the evaluation of IS success. Consequently this research project focused on how service quality concepts could be applied as a measure of IS effectiveness within e-commerce. A 3-pronged approach to IS evaluation was proposed viz. identification of generic stakeholder groups such as e-Customer, sponsoring manager, internal users etc.; identification of the context of the IS evaluation for each stakeholder i.e. what is the main function and context of operation of the IS; and lastly identification of stakeholder specific e-SQ criteria. The study demonstrates that the success of IS deployed within online environments, could be evaluated and measured differently by each stakeholder for the various e-Service Quality (e-SQ) dimensions within a particular IS context. The study presents the results of an investigation into a web-based IS at a national telecommunications company in South Africa which was evaluated using e-Service Quality (e-SQ) constructs. The study demonstrates the operationalisation of an e-SQ instrument for the purposes of evaluating IS effectiveness amongst multi-stakeholders. Evidence is provided that measuring attitudes of different stakeholders provides a more holistic perspective of IS success. The primary conclusion reached is that by using a step-by-step methodology of IS success measurement, the objective of establishing whether companies have received a return on web-based IS investment, can be achieved. Furthermore, the outcomes of the study has contributed to existing literature on IS effectiveness measurement. In particular, it will add to the existing body of knowledge regarding the use of e-SQ instrument to evaluate multi-stakeholder perceptions.
APA, Harvard, Vancouver, ISO, and other styles
19

Loubier, Christine. "Les technologies de l'information dans les pays en voie de développement : regard particulier sur l'électronique et le commerce." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33362.

Full text
Abstract:
Knowledge is the key to growth and development. Unfortunately, the knowledge gap which exists between industrialized countries and developing ones is large. As information technologies play an essential role in the movement of knowledge and information, they hold promise for the reduction of this gap. Information technologies are being introduced progressively in all activities of both the public and private sectors. Business organizations and commercial activities are thus being profoundly transformed, at varying levels and by different instruments. Developing countries cannot afford to be left behind in this information revolution. The international community recognizes this, and has instituted a range of programmes promoting electronic commerce in developing countries. However, to maximize the benefits, developing countries must put in place an environment that favours and promotes the acquisition, absorption and communication of knowledge by their citizens and business enterprises.
APA, Harvard, Vancouver, ISO, and other styles
20

Mackenzie, Lara. "Direct income tax and the digital economy." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/18047.

Full text
Abstract:
Due to the nature of the digital economy, multi-national entities are able to trade in countries over the internet without a physical presence, they are setting up group structures across the world, housing intellectual property in tax havens and shifting profits between jurisdictions, lowering their group tax rates. This treatise considered the OECD/G20 BEPS Project 2015 Final Report on Action Plan 1 which discusses the nature, risks and proposed options to combat base erosion and profit sharing (BEPS). Although the OECD have made no recommendations in their report many countries have taken action to protect their tax bases. The scope of this treatise is limited to multi-national entities who avoid tax presence in a country or shift profits to off-shore entities in low/no tax jurisdictions. The aim of this treatise is to identify the risks posed by the nature of the digital economy to direct taxation and analyse proposed solutions to respond to these risks. A comparative study of the proposal and changes implemented in the UK, Australia and India was undertaken to gain an understanding of international thinking regarding the best way to combat BEPS. These proposals were then compared to the South African perspective in order to determine which of the proposals would be feasible to combat BEPS in South Africa.
APA, Harvard, Vancouver, ISO, and other styles
21

De, Heus Louisa. "E-commerce in South Africa : an overview." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52812.

Full text
Abstract:
Thesis (MPhil)--University of Stellenbosch, 2002.<br>ENGLISH ABSTRACT: E-commerce developed as a direct result of the Internet and it has impacted the way South African businesses conduct its operations and consumers receive their information. It is impossible to quantify the e-commerce phenomenon locally - this research study aims to cover most of the important areas impacted bye-commerce in South Africa. There are some barriers slowing the development of e-commerce in this country. The goal of this study is to determine if the local market is ready to accept e-commerce technologies that are already widely used in global markets. This research study examines the history of the Internet in South Africa and also raises the question whether the market was affected by the global dot com crash (also known as the dot bomb crash) experienced in 2000. The study also aims to identify the barriers hindering effective e-commerce in South Africa. It further highlights the importance of other areas of online commerce, such as mobile commerce (m-commerce), to bring the power of technology to consumers and collaboration commerce (c-commerce), to streamline business operations. Lastly, the study aims to explore the South African government's initiatives to effectively formulate a policy for e-commerce to protect the consumers' rights.<br>AFRIKAANSE OPSOMMING: E-handel het ontwikkel as gevolg van die Internet. Dit beïnvloed die manier waarop Suid-Afrikaanse besighede werk, en verbruikers kommunikasie ontvang. Dit is onmoontlik om die omvang van e-handel in Suid-Afrika te kwantifiseer - hierdie navorsingstudie se doel is om te fokus op die belangrikste areas wat deur e-handel beïnvloed is. Daar is hindernisse wat die ontwikkeling van e-handel in Suid-Afrika belemmer. Die doel van hierdie studie is om vas te stelof die plaaslike mark gereed is om e-handeltegnologie, wat alreeds in internasionale markte in gebruik is, te aanvaar. Die navorsingstudie ondersoek die geskiedenis van die Internet in Suid-Afrika en vra ook of die mark beïnvloed was deur die internasionale dot com ineenstorting van 2000 (dit word ook die dot bom ineenstorting genoem). Die studie kyk ook na wat effektiewe e-handel in Suid-Afrika keer. Dit fokus op die belangrikheid van ander areas van e-handel, soos mobiele elektroniese handel (m-handel), wat tegnologie op verbruikers se voorstoepe plaas, en saamwerk elektroniese handel (s-handel), wat besighede meer vaartbelyn maak. Laastens ondersoek die studie die Suid-Afrikaanse regering se pogings om 'n effektiewe beleid op te stel wat die verbruiker se regte te beskerm.
APA, Harvard, Vancouver, ISO, and other styles
22

Wei, Chen. "Multi-collaborative filtering trust network for online recommendation systems." Thesis, University of Macau, 2011. http://umaclib3.umac.mo/record=b2550571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Hu, Guo Dong. "The factors that influence electronic payment adoption by SMEs in two cities of China." Thesis, University of the Western Cape, 2008. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_8049_1263765238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hol, Ana. "An online system to guide etransforming SMEs." View thesis, 2009. http://handle.uws.edu.au:8081/1959.7/41373.

Full text
Abstract:
Thesis (Ph.D.)--University of Western Sydney, 2009.<br>A thesis presented to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics, in fulfilment of the requirements for the degree of Doctor of Philosophy. Includes bibliographies.
APA, Harvard, Vancouver, ISO, and other styles
25

van, Blerk Willem Eben. "The role of emotional intelligence in implementing information technology strategies." Thesis, Cape Peninsula University of Technology, 2013. http://hdl.handle.net/20.500.11838/1411.

Full text
Abstract:
Thesis submitted in fulfilment of the requirements for the degree Doctor of Technology: Information Technology in the Faculty of Informatics and Design at the Cape Peninsula University of Technology 2013<br>The alignment between business and information technology (IT) strategies has been a challenge for many years. Strategic alignment models and enterprise architecture methodologies and frameworks have been developed to assist business and IT managers with improving alignment between business and IT strategies. The business analyst, systems analyst and project manager are key role players in delivering the information systems (IS) needs of business and therefore key in aligning business and IT strategies. Despite literature and research suggesting a positive influence of emotional intelligence on occupational performance in various industries, the development of emotional intelligence of the business analyst, systems analyst and project manager is neglected by software development organisations. Emotional intelligence is neglected in industry IS competency models as well as documented standards for the business analysis and project management profession (BABOK and PMBOK). Emotional intelligence is not addressed in strategic alignment models and enterprise architecture methodologies and frameworks. Emotional intelligence is equally neglected in IS literature. Systematic research investigating the impact of emotional intelligence on occupational performance of IT professionals remains sparse. The purpose of this study was to determine which emotional intelligence competencies are needed to improve the occupational performance of business analysts, systems analysts and project managers in delivering business information system needs. The study took the form of a multiple interpretive case study. Qualitative data was collected using semi-structured interviews with stakeholders from 20 software development organisations utilising the roles of the business analyst, systems analyst and project manager. Quantitative data was collected using the Genos Emotional Intelligence Inventory with the aim of identifying the patterns of emotional intelligence visible in the sample of business analysts, systems analysts and project managers assessed. The study suggests emotional intelligence has a role to play in alignment between business and IT strategies. It is proposed that industry IS competency models as well as the standards for the business analysis and project management profession as documented in BABOK and PMBOK include specific emotional intelligence competencies. The study also proposes that higher education institutions in IT/IS such as universities of technology, as well as training providers focusing on business analysis, systems analysis and project management, should focus not only on technical skills but emotional intelligence skills as well when developing the supply pipeline of business analysts, systems analysts and project managers. Keywords: Emotional intelligence, business – IT alignment, information technology, enterprise architecture, business analyst, systems analyst, project manager, competencies, non-technical skills.
APA, Harvard, Vancouver, ISO, and other styles
26

Pretorius, Linda. "Remote information management of an automated manufacturing system." Thesis, Bloemfontein : Central University of Technology, Free State, 2007. http://hdl.handle.net/11462/104.

Full text
Abstract:
Thesis (M. Tech.) -- Central University of Technology, Free State, 2007<br>With technology advancing, more and more people turn to the World Wide Web to conduct business. This may include buying and selling on the Web, advertising and monitoring of business activities. There is a big need for software and systems that enable remote monitoring and controlling of business activities. The Mechatronics Research Group of the Faculty of Engineering, Information and Communication Technology at the Central University of Technology, Free State, has identified a similar need. This research group has created an Automated Manufacturing System around which research topics revolve. They want to monitor this Automated Manufacturing System from remote locations like their offices or, if possible, from home. The Remote Information Management (RIM) System was developed, using the Rapid Application Development (RAD) Methodology. The reasons why this methodology was used, is because it is the best to use in a changing environment, when the system needs to be developed very quickly and when most of the data is already available. This is a good description of the Automated Manufacturing System’s environment. The RAD methodology consists of four stages: Requirements Planning, User Design, Rapid Construction and Transition. Project Management is used throughout these stages to ensure that the project goes according to plan. Development of the RIM system went through all four stages and project management was applied. The final system consisted of a Web Page with Web Camera views of the Automated Manufacturing System. The application that was developed using National Instruments LabVIEW, Microsoft Visual C++, and Microsoft Excel, is embedded in this Web Page. This application is called a Virtual Instrument (VI). The VI shows real-time data from the Automated Manufacturing System. Control over the VI can be granted and will allow the remote user to create reports on how many different products was produced and system downtimes. A system like the RIM System has advantages in the business world. It can enable telecommuting and will allow employees and managers to monitor (and even control) manufacturing systems, or any system connected to a PLC, from remote locations.
APA, Harvard, Vancouver, ISO, and other styles
27

Lam, Iok Ham. "Collaborative semantic editing of heterogeneous hierarchical concepts." Thesis, University of Macau, 2010. http://umaclib3.umac.mo/record=b2148261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Lenhert, Lance Ronald. "The next generation: A look at where today's enterprise resource planning (ERP) systems came from and where technology is heading." CSUSB ScholarWorks, 2000. https://scholarworks.lib.csusb.edu/etd-project/1689.

Full text
Abstract:
"Currently, the largest barrier to any given market usually involves capital. If a company does not have enough investment capital to start with, it could fail before it even gets started. However, there is a new component that affects some of the largest corporations in the world. The problem relates to being able to sustain current internal processing, as well as adapt and grow in new markets with higher volumes. There are systems out there today that claim to address these issues along with e-commerce and other electronic sharing of information."
APA, Harvard, Vancouver, ISO, and other styles
29

Furuhata, Masabumi. "E-market mechanism design for supply chain management." View thesis, 2009. http://handle.uws.edu.au:8081/1959.7/45409.

Full text
Abstract:
Thesis (Ph.D.)--University of Western Sydney, 2009.<br>A thesis presented to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics for the degree of Doctor of Philosophy and Docteur de L'Université de Toulouse, Faculté d'Informatique, under a cotutelle agreement. Includes bibliographies.
APA, Harvard, Vancouver, ISO, and other styles
30

Connolly, Daniel J. "Understanding Information Technology Investment Decision-Making in the Context of Hotel Global Distribution Systems: a Multiple-Case Study." Diss., Virginia Tech, 1999. http://hdl.handle.net/10919/29814.

Full text
Abstract:
This study investigates what three large, multinational hospitality companies do in practice when evaluating and making IT investment decisions. This study was launched in an attempt to 1) learn more about how multinational hospitality companies evaluate, prioritize, and select IT investments in the context of hotel GDS; 2) call attention to an important and costly topic in hopes of improving current practices; and 3) fill a noticeable literary void so that future researchers on IT and hotel GDS would have a foundation and starting point. The perennial question of any business is "How does an organization add value?" Value can be defined from many different perspectives and may result from tangible and intangible factors. Principal stakeholders include shareholders (investors), customers, and employees. Shareholders typically measure value in terms of economic return on their investment based upon some level of perceived risk. For customers, value is assessed in terms of a price-value relationship; that is, how much they received in terms of product and services for the price they paid. For employees, value is measured by salary and by the intrinsic rewards of the job. Yet, one of the most elusive questions with respect to information technology is "How can value be measured?" Hospitality executives are being pressured daily to invest more in information technology (IT) - especially in the area of hotel global distribution systems (GDS), which have become the cornerstone of a hotel firm's IT infrastructure and portfolio. There are a number of sweeping changes on the horizon impacting hotel GDSs and requiring the development of a well-crafted strategy for global distribution systems. These broad changes include bypass theories to remove airline GDSs and travel agents, the introduction of new and emerging player, and innovative approaches to pricing and promotion. Many of these developments offer promise to hoteliers, but they also threaten their control over their customer relationships and their inventory and add to the complexity and cost of distribution. Selecting the appropriate distribution channels is paramount to success and important if hotel firms are to grow top-line revenue and control overhead; yet the number of choices facing hotel executives is overwhelming. They are also at a loss for measuring value derived from IT. One of the greatest issues plaguing the advancement of technology in the hospitality industry is the difficulty in calculating return on investment. Until recently, most technology investment decisions have been considered using a support or utility mentality that stems from a manufacturing paradigm. Under such thinking, business cases could be built around an application or technology's ability to reduce costs or create labor savings. However, management's attitudes towards technology have been shifting in recent years. The more technologically savvy hospitality companies are looking to IT to build strategic and competitive advantages. These types of investments yield results over time, and seldom in the short-run. This is problematic among owners and investors who demand more immediate results. Moreover, it is difficult to quantify and calculate the tangible benefits of technology when it is used for strategic purposes. Today's financial models are inadequate for estimating the financial benefits for most of the technology projects under consideration today. While the hospitality industry has disciplined models and sufficient history to determine the financial gains or success of opening a new property in a given city, it lacks the same rigorous models and historical data for technology, especially since each technology project is unique. Although this problem is not specific to the hospitality industry, it is particularly problematic since the industry tends to be technologically conservative and unwilling to adopt new technology applications based on the promises of its long-term merits if it cannot quantify the results and calculate a defined payback period. When uncertainty surrounds the investment, when the timing of the cash flows is unpredictable, and when the investment is perceived as risky, owners and investors will most likely channel their investment capital to projects with more certain returns and minimal risk. Thus, under this thinking, technology will always take a back seat to other organizational priorities and initiatives. Efforts must be made to change this thinking and to develop financial models that can accurately predict and capture the financial benefits derived from technology. Given the present predicament and difficulties surrounding the current tools, techniques, and measures, executives are faced with an important choice. They can 1) continue to use the present methods despite their shortcomings, 2) dispense with ROI, cost-benefit, and discounted cash flow analyses altogether for IT projects, or 3) develop new methods, tools, and measures that can accommodate the complexities of IT and quantify the intangibles. This study is a call to action in favor of the latter because the measures determine not only which projects will be accepted but also how their success will be evaluated. Having a rigid evaluation process forces executives to identify a project's potential contribution and align the project's objectives with the firm's strategic goals and objectives. Using the co-alignment principle as its theoretical underpinning, this study employs a multiple-case design to investigate the resource allocation processes used with respect to information technology and global distribution systems. It looks at how three leading, multinational hospitality firms address IT project/investment evaluation and decision-making, the measures they use, and the frustrations they encounter. These frustrations include problems that arise from a hotel firm's fragmented ownership as well as from hotel executives' inability to measure the results of IT through definitive cause-and-effect relationships. The results of the study provide affirmation of the co-alignment principle and document linkages and co-alignment between strategy and IT. Clearly, decisions involving IT and hotel GDSs require multivariate measures, multidimensional perspectives, and multidisciplinary involvement. However, research from the marketing discipline is noticeably absent in this area. This study concludes that because IT plays an important enabling role for marketing initiatives and is redefining the supply chain of a hotel firm, marketing researchers can no longer stand on the sidelines. This study also identifies three important constructs, or classes of variables (context, process, and project), the variables comprising each, and their influences on the evaluation and decision-making processes. These findings add to the understanding of IT evaluation, measurement, and decision-making in the context of hotel GDS. This study clarifies the intangible aspects in hopes that useful measures can be developed in subsequent research to quantify and evaluate these costs and benefits. Finally, this study provides a series of prescriptions or recommendations gleaned from the three companies that were the focus of this study in hopes that they will lead to the development of best practices in the hospitality industry.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
31

Kotschwar, Pavel. "Zavedení elektronického obchodu a jeho význam pro rozvoj malé firmy." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-4140.

Full text
Abstract:
Graduation theses attends to the problems of the floatation of an e-commerce. The forepart of the work creates theoretical solution, the individual chapters are attended to the introduction of the problems of an e-commerce, floatation and the development of an e-commerce, the advantages and the disadvantages of these activities, marketing and security. The practical part of this work attends to the analyse of electronic background and the aplication of theoretical solutions while the implementation of e-commerce. The part of the practical part is the personal research of public and the proposition of marketing, technical and technological processes. At the close is implemented the valuation of economical impacts on the business of a small firm.
APA, Harvard, Vancouver, ISO, and other styles
32

Sheba, M. K. "Marketing Zambia as a tourism destination : e-challenges, e-strategies and opportunities for the Zambia National Tourist Board." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/50394.

Full text
Abstract:
Thesis (MPhil)--Stellenbosch University, 2005.<br>ENGLISH ABSTRACT: Tourism is emerging as one of the most important socio-economic sectors for developing as well as developed countries. Tourism incorporates features of the information society such as globalisation, mobility, and information reach and richness. A national Tourist Office or as commonly referred to Destination Marketing Organization is the core tourism product of any nation. The new forms of ebusiness are offering major opportunities for all tourism destinations and suppliers, whether large or small, to improve their business and remodel such in a more cost-effective manner. The study discusses the impact and existing relationship between ICT and tourism as an emerging ecommerce sector in the Zambian tourism industry. It focuses on the tremendous changes in consumer expectations for the Zambia tourism sector caused by the impact ofInternet revolution. The World Wide Web through Information and Communication Technology (lCT) is the driving force that is changing the tourism landscape and affecting the production, distribution and consumption of its products. This symbiotic relationship existing between ICT and the tourism sector provides an opportunity for the Zambian tourism industry to create a competitive advantage for the 21st century.<br>AFRIKAANSE OPSOMMING: Toerisme kom as een van die belangrikste sosio-ekonomiese sektore in beide ontwikkelende sowel as ontwikkelde lande voor. Kenmerke van die inligtings-gemeenskap soos globalisasie, mobiliteit, inligtings-toegang, -reikafstand en -rykheid word ook in toerisme aangetref. Die kern toerisme-produk van enige nasie is 'n nasionale Toeriste Buro of, soos algemeen verwys word, 'n Bestemming Bemarkings Organisasie (BBO). Toerisme bestemmings en verskaffers, klein of groot, word vele geleenthede aangebied om ten middele van nuwe vorme van e-handel hulle besighede op koste-geskikte manier te verbeter en te hervorm. Die studie bespreek die impak van en die bestaande verwantskap tussen Inligtings en Kommunikasie Teknologie (IKT) en die toerisme-bedryf in die Zambiese toerisme industrie as 'n ontwikkelende e-handel sektor. Daar word hoofsaaklik op die geweldige impak van die Internet-revolusie op verbruikersverwagtinge in die Zambiese toerisme bedryf gefokus. Deur middel van IKT word die Wereld-Wye Web (WWW) die dryfkrag wat die toerisme landskap verander en die produksie, verspreiding en verbruik van sy produkte beïnvloed. Die wedersydse verwantskap tussen IKT en die toerisme sektor verskaf 'n geleentheid vir die Zambiese toerisme industrie om 'n mededingende grondslag vir die 21ste eeu te skep.
APA, Harvard, Vancouver, ISO, and other styles
33

Sánchez, Torres Javier Alirio. "Adoption E-commerce in development country and the moderator effect of digital divide." Doctoral thesis, Universitat de Barcelona, 2018. http://hdl.handle.net/10803/565728.

Full text
Abstract:
With the creation and worldwide diffusion of the Internet since the end of the last century, social and economic relations have seen a strong tendency to move from analog to digital, generating new ways of performing everyday tasks. In going digital, commerce has found a new channel of communication between client and company. E-commerce was created with the characteristics of a new technology which has been widely adopted and diffused in nearly all regions, societies and cultures. However, like all innovations within a social system, there have been differences in its adoption that could be linked to inequalities in access and use. This research focuses on analysing the adoption and diffusion of e-commerce in the developing Latin American country of Colombia. It focuses on Colombia because of the low number of large studies that have been conducted there, despite the great development of the Internet and ICTs in the country. This study applies in parallel two lines of research - on one hand, it validates the UTAUT2 technological acceptance model for different types of e-commerce; on the other hand, it develops an index that measures the digital divide by country, finally analysing the two results to establish if the level of digital divide is linked to behavior in the adoption of e-commerce. The work contains four sections that give rise to the chapters of this thesis in order of appearance: introduction, state of the issue, publications that respond to the objectives, and conclusions and future lines of research. The introductory chapter justifies the relevance of the research in addition to setting the objectives and methodology of the work. The second chapter is the state of the issue, which addresses the main models of e-commerce adoption, as well as the digital divide. Having defined the models and the methodological criteria, the third chapter includes the publications that respond to the objectives, within them the whole empirical process of the research is collected as well as the main results which have gone through the rigorous process of scientific publication in magazines indexed in the Scopus, in their majority. Finally, chapter four contains the main conclusions of the work, as well as possible future lines of research. The results of this doctoral thesis have been valuable, since there were clear indications of the moderating effect of the digital divide on the adoption of e-commerce, which will help those at a business and governmental level to further understand, improve and develop e -commerce in this type of country.
APA, Harvard, Vancouver, ISO, and other styles
34

Koekemoer, Johannes Frederik. "A grounded theory analysis of networking capabilities in virtual organizing." Thesis, Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-11102008-150737/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Sheriff, Ray E. "The 2009 Electronics and Telecommunications Research Seminar Series: 8th Workshop Proceedings." University of Bradford, 2009. http://hdl.handle.net/10454/3559.

Full text
Abstract:
Yes<br>This is the eighth workshop to be organised under the postgraduate programmes in electrical and electronic engineering (EEE). The workshop concludes the Research Seminar Series, which has provided a platform for disseminating the latest research activities in related technologies through its weekly seminars. The EEE courses cover a broad range of technologies and this is reflected in the variety of topics presented during the workshop. In total, thirty-three papers have been selected for the proceedings, which have been divided into seven sections. The workshop aims to be as close to a `real¿ event as possible. Hence, authors have responded to a Call for Papers with an abstract, prior to the submission of the final paper. This has been a novel experience for many, if not all of the contributors. Clearly, authors have taken up the challenge with enthusiasm, resulting in what promises to be an interesting and informative workshop.
APA, Harvard, Vancouver, ISO, and other styles
36

Piva, Fabio Rogério 1982. "Addressing human factors in the design of cryptographic solutions = a two-case study in item validation and authentication." [s.n.], 2014. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275510.

Full text
Abstract:
Orientador: Ricardo Dahab<br>Tese (doutorado) - Universidade Estadual de Campinas, Instituto de Computação<br>Made available in DSpace on 2018-08-25T09:03:51Z (GMT). No. of bitstreams: 1 Piva_FabioRogerio_D.pdf: 7931626 bytes, checksum: 2a9d167e0a1fd625d636fd24d4c0028e (MD5) Previous issue date: 2014<br>Resumo: O projeto de soluções criptográficas seguras a partir de uma perspectiva puramente teórica não é suficiente para garantir seu sucesso em cenários realistas. Diversas vezes, as premissas sob as quais estas soluções são propostas não poderiam estar mais longe das necessidades do mundo real. Um aspecto frequentemente esquecido, que pode influenciar em como a solução se sai ao ser integrada, é a forma como o usuário final interage com ela (i.e., fatores humanos). Neste trabalho, estudamos este problema através da análise de dois cenários de aplicação bem conhecidos da pesquisa em Segurança da Informação: O comércio eletrônico de itens digitais e Internet banking. Protocolos de trocas justas tem sido amplamente estudados, mas continuam não sendo implementados na maioria das transações de comércio eletrônico disponíveis. Para diversos tipos de itens digitais (e-goods), o modelo de negócios atual para comércio eletrônico falha em garantir justiça aos clientes. A validação de itens é um passo crítico em trocas justas, e recebeu pouca atenção dos pesquisadores. Nós acreditamos que estes problemas devam ser abordados de forma integrada, para que os protocolos de trocas justas possam ser efetivamente implementados no mercado. De forma geral, acreditamos também que isso seja um reflexo de paradigmas de projeto orientado a sistemas para soluções de segurança, que são centrados em dados em vez de usuários, o que resulta em métodos e técnicas que frequentemente desconsideram os requisitos de usuários. Contextualizamos como, ao subestimar as sutilezas do problema da validação de itens, o modelo atual para compra e venda de itens digitais falha em garantir sucesso, na perspectiva dos compradores, para as transações ¿ sendo, portanto, injusto por definição. Também introduzimos o conceito de Degradação Reversível, um método que inerentemente inclui o passo de validação de itens em transações de compra e venda com a finalidade de mitigar os problemas apresentados. Como prova-de-conceito, produzimos uma implementação de Degradação Reversível baseada em códigos corretores de erros sistemáticos (SECCs), destinada a conteúdo multimídia. Este método é também o subproduto de uma tentativa de incluir os requisitos do usuário no processo de construção de métodos criptográficos, uma abordagem que, em seguida, evoluímos para o denominado projeto de protocolos orientado a itens. De uma perspectiva semelhante, também propomos um método inovador para a autenticação de usuários e de transações para cenários de Internet Banking. O método proposto, baseado em Criptografia Visual, leva em conta tanto requisitos técnicos quanto de usuário, e cabe como um componente seguro ¿ e intuitivo ¿ para cenários práticos de autenticação de transações<br>Abstract: Designing secure cryptographic solutions from a purely theoretical perspective is not enough to guarantee their success in a realistic scenario. Many times, the assumptions under which these solutions are designed could not be further from real-world necessities. One particular, often-overlooked aspect that may impact how the solution performs after deployment is how the final user interacts with it (i.e., human factors). In this work, we take a deeper look into this issue by analyzing two well known application scenarios from Information Security research: The electronic commerce of digital items and Internet banking. Fair exchange protocols have been widely studied, but are still not implemented on most e-commerce transactions available. For several types of digital items (e-goods), the current e-commerce business model fails to provide fairness to customers. A critical step in fair exchange is item validation, which still lacks proper attention from researchers. We believe this issue should be addressed in a comprehensive and integrated fashion before fair exchange protocols can be effectively deployed in the marketplace. More generally, we also believe this to be the consequence of ongoing system-oriented security solution design paradigms that are data-centered, as opposed to user-centered, thus leading to methods and techniques that often disregard users¿ requirements. We contextualize how, by overlooking the subtleties of the item validation problem, the current model for buying and selling digital items fails to provide guarantees of a successful transaction outcome to customers, thus being unfair by design. We also introduce the concept of Reversible Degradation, a method for enhancing buy-sell transactions concerning digital items that inherently includes the item validation step in the purchase protocol in order to tackle the discussed problems. As a proof-of-concept, we produce a deliverable instantiation of Reversible Degradation based on systematic error correction codes (SECCs), suitable for multimedia content. This method is also the byproduct of an attempt to include users¿ requirements into the cryptographic method construction process, an approach that we further develop into a so-called item-aware protocol design. From a similar perspective, we also propose a novel method for user and transaction authentication for Internet Banking scenarios. The proposed method, which uses Visual Cryptography, takes both technical and user requirements into account, and is suitable as a secure ¿ yet intuitive ¿ component for practical transaction authentication scenarios<br>Doutorado<br>Ciência da Computação<br>Doutor em Ciência da Computação
APA, Harvard, Vancouver, ISO, and other styles
37

Sheriff, Ray E. "The 2010 Electronics and Telecommunications Research Seminar Series: 9th Workshop Proceedings." University of Bradford, 2010. http://hdl.handle.net/10454/4355.

Full text
Abstract:
yes<br>This is the ninth workshop to be organised under the postgraduate programmes in electrical and electronic engineering (EEE). The workshop concludes the Research Seminar Series, which has provided a platform for disseminating the latest research activities in related technologies through its weekly seminars. The EEE courses cover a broad range of technologies and this is reflected in the variety of topics presented during the workshop. In total, forty-four papers have been selected for the proceedings, which have been divided into eight sections. The workshop aims to be as close to a `real¿ event as possible. Hence, authors have responded to a Call for Papers with an abstract, prior to the submission of the final paper. This has been a novel experience for many, if not all of the contributors. As usual, authors have taken up the challenge with enthusiasm, resulting in a collection of papers that reflects today¿s research challenges.<br>School of Engineering, Design and Technology
APA, Harvard, Vancouver, ISO, and other styles
38

Wong, Chong Wan. "Using dynamically-generated account to integrate heterogeneous B2C e-payment systems." Thesis, University of Macau, 2010. http://umaclib3.umac.mo/record=b2148240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Schmees, Markus. "Electronic Commerce im Technology Enhanced Learning /." Edewecht OlWIR, Oldenburger Verl. für Wirtschaft, Informatik und Recht, 2007. http://deposit.d-nb.de/cgi-bin/dokserv?id=2982667&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Modimogale, Lloyd. "ICT and SMEs’ competitiveness in South Africa : how SMEs could use ICT to become competitive in South Africa." Diss., University of Pretoria, 2008. http://hdl.handle.net/2263/27585.

Full text
Abstract:
This mini-dissertation reviews present literature to define ICT and SMEs and determine the current situation in South Africa with regard to the use of ICT by SMEs, including possible benefits to SMEs as well as stumbling blocks to adopting ICT. The research consists of collecting data from ten SMEs in Gauteng in South Africa using questionnaires and interviews, to determine how SMEs can use ICT to become more competitive. The mini-dissertation will have a number of chapters: the first chapter will give an overview of the subject. The second chapter will explain the research motivation and methodology while the third chapter will be the literature review, which will explore the topic of ICT and SMEs in depth, with a focus on South Africa. Chapter four will deal with data collection and analysis; the main source of data will be interviews based on structured questions. The fifth chapter will be the discussion and recommendations based on the results of the analysis and the literature review. Chapter Six will be the conclusion.<br>Dissertation (MIT)--University of Pretoria, 2008.<br>Informatics<br>unrestricted
APA, Harvard, Vancouver, ISO, and other styles
41

Bilyayeva, Tetiana A. "Cross-Cultural Comparative Study of Users’ Perception of the Navigation Organization of an E-Commerce Web Application." UNF Digital Commons, 2012. http://digitalcommons.unf.edu/etd/413.

Full text
Abstract:
The object of this study was to assess the influence of native language, as a principal cultural characteristic, one users’ behavior when using a web-based e-commerce application. The study expands on previous research by comparing English and Russian users. The research also considered demographic data to assess additional factors that influence behavior and task performance. The research design encompassed an online shopping application with two different navigation menus. One menu was based on the action-object model and the other was based on the object-action model. The user interface was created in two different languages (Russian and English). This study suggests that language, as a cultural indicator, has a direct relationship to user satisfaction and performance in e-commerce web applications.
APA, Harvard, Vancouver, ISO, and other styles
42

Li, Mingzhi. "Quality uncertainty and information exchange on the electronic commerce markets /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Lo, Chi-lik Eric, and 盧至力. "Bridging data integration technology and e-commerce." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29360705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Smith, Leslie Gordon. "The role of the notary in secure electronic commerce." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16407/.

Full text
Abstract:
The profession of the notary is at a cross roads. The Notary operates in a world of paperbased transactions where the use of traditional signatures and seals are mandatory. The practices and procedures which have evolved over centuries simply cannot be applied directly in a digital environment. Establishing a framework for the authentication of computer-based information in today's commercial environment requires a familiarity with concepts and professional skills from both the legal and computer security fields. Combining these two disciplines is not an easy task. Concepts from the information security field often correspond only loosely with concepts from the legal field, even in situations where the terminology is similar. This thesis explores the history of the Notary, the fundamental concepts of e-commerce, the importance of the digital or electronic signature and the role of the emerging &quotCyber" or &quotElectronic" Notary (E-Notary) in the world of electronic commerce. The research investigates whether or not the functions of the &quotNotary Public" can successfully evolve in the world of E-Commerce, and if so what are the ramifications. This thesis comprises a survey and critical analysis of proposed architectures and implementations for &quotElectronic Notary Services" in an Internet based, electronic commerce environment. It includes an analysis of relevant historical and legal factors relevant to these emerging technologies. Given the highly dynamic nature of this topic, this thesis does not propose or recommend a single architecture or implementation but emphasises the need for further research not only into technological factors but also into the real legal and social needs that affect the role of the E-Notary. The approach undertaken was an analytical approach to the available current documentation against input from leading practitioners included practicing Notaries from Australia, the United States and the Court of Faculties - London.
APA, Harvard, Vancouver, ISO, and other styles
45

Mehenni, Sadaoui. "Electronic commerce : Consumers’ perception of mobile social commerce in Sweden." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97359.

Full text
Abstract:
The evolution of mobile telephony and social media platforms gave birth to different new concepts of electronic commerce (e-commerce), such as mobile commerce (m-commerce) and social commerce (s-commerce). In 2014 a new concept called mobile social commerce (mscommerce) was introduced. This concept occurs when e-commerce activities are performed on social media platforms using mobile devices. Many researchers did look into e-commerce and its different concepts, but not so many did look into ms-commerce, especially when it comes to exploring the consumers’ perception of this concept and their shopping motivation. The aim of this study is to explore the relation between ms-commerce and the Swedish consumers in order to find out what is the consumers’ perception of ms-commerce in Sweden, and how ms-commerce affects consumers’ shopping motivation. To do this a qualitative approach is used where interviews with 9 people using ms-commerce platforms to buy products were conducted. The research is based on the extended unified theory of acceptance and use of technology model (UTAUT2). The findings of this study indicate that consumers perceive ms-commerce in Sweden as a very useful and entertaining technology that has economic benefits for the consumers, but they also perceive it to have privacy issues and to be lacking trustworthiness. Furthermore, the findings strongly suggest that ms-commerce comments on products available on ms-commerce platforms have a direct influence on consumers’ shopping motivation, the live chat feature available on ms-commerce platforms is a very good tool that has a positive influence on consumers shopping motivation, and targeted advertisement in ms-commerce has no influence on consumers’ shopping motivation.
APA, Harvard, Vancouver, ISO, and other styles
46

Wang, Hua. "Access management in electronic commerce system." University of Southern Queensland, Faculty of Sciences, 2004. http://eprints.usq.edu.au/archive/00001522/.

Full text
Abstract:
The definition of Electronic commerce is the use of electronic transmission mediums to engage in the exchange, including buying and selling, of products and services requiring transportation, either physically or digitally, from location to location. Electronic commerce systems, including mobile e-commerce, are widely used since 1990. The number of world-wide Internet users tripled between 1993 and 1995 to 60 million, and by 2000 there were 250 million users. More than one hundred countries have Internet access. Electronic commerce, especial mobile e-commerce systems, allows their users to access a large set of traditional (for example, voice communications) and contemporary (for example, e-­shop) services without being tethered to one particular physical location. With the increasing use of electronic service systems for security sensitive application (for example, e-shop) that can be expected in the future, the provision of secure services becomes more important. The dynamic mobile environment is incompatible with static security services. Electronic service access across multiple service domains, and the traditional access mechanisms rely on cross-domain authentication using roaming agreements starting home location. Cross-domain authentication involves many complicated authentication activities when the roam path is long. This limits future electronic commerce applications. Normally, there are three participants in an electronic service. These are users, service providers, and services. Some services bind users and service providers as well as services such as flight services; other services do not bind any participants, for instance by using cash in shopping services, everyone can use cash to buy anything in shops. Hence, depending on which parts are bound, there are different kinds of electronic services. However, there is no scheme to provide a solution for all kinds of electronic services. Users have to change service systems if they want to apply different kind of electronic services on the Internet. From the consumer's point of view, users often prefer to have a total solution for all kinds of service problems, some degree of anonymity with no unnecessary cross authentications and a clear statement of account when shopping over the Internet. There are some suggested solutions for electronic service systems, but the solutions are neither total solution for all kinds of services nor have some degree of anonymity with a clear statement of account. In our work, we build a bridge between existing technologies and electronic service theory such as e-payment, security and so on. We aim to provide a foundation for the improvement of technology to aid electronic service application. As validation, several technologies for electronic service system design have been enhanced and improved in this project. To fix the problems mentioned above, we extend our idea to a ticket based access service system. The user in the above electronic service system has to pay when s/he obtains service. S/He can pay by traditional cash (physical cash), check, credit or electronic cash. The best way to pay money for goods or services on the Internet is using electronic cash. Consumers, when shopping over the Internet, often prefer to have a high level of anonymity with important things and a low level with general one. The ideal system needs to provide some degree of anonymity for consumers so that they cannot be traced by banks. There are a number of proposals for electronic cash systems. All of them are either too large to manage or lack flexibility in providing anonymity. Therefore, they are not suitable solutions for electronic payment in the future. We propose a secure, scalable anonymity and practical payment protocol for Internet purchases. The protocol uses electronic cash for payment transactions. In this new protocol, from the viewpoint of banks, consumers can improve anonymity if they are worried about disclosure of their identities. An agent, namely anonymity provider agent provides a higher anonymous certificate and improves the security of the consumers. The agent will certify re-encrypted data after verifying the validity of the content from consumers, but with no private information of the consumers required. With this new method, each consumer can get the required anonymity level. Electronic service systems involve various subsystems such as service systems, payment systems, and management systems. Users and service providers are widely distributed and use heterogeneous catalog systems. They are rapidly increasing in dynamic environments. The management of these service systems will be very complex. Whether systems are successful or not depends on the quality of their management. To simplify the management of e-commerce systems \cite{Sandhu97}, we discuss role based access control management. We define roles and permissions in the subsystems. For example, there are roles TELLER, AUDITOR, MANAGER and permissions teller (account operation), audit operation, managerial decision in a bank system. Permissions are assigned to roles such as permission teller is assigned to role TELLER. People (users) employed in the bank are granted roles to perform associated duties. However, there are conflicts between various roles as well as between various permissions. These conflicts may cause serious security problems with the bank system. For instance, if permissions teller and audit operation are assigned to a role, then a person with this role will have too much privilege to break the security of the bank system. Therefore, the organizing of relationships between users and roles, roles and permissions currently requires further development. Role based access control (RBAC) has been widely used in database management and operating systems. In 1993, the National Institute of Standards and Technology (NIST) developed prototype implementations, sponsored external research, and published formal RBAC models. Since then, many RBAC practical applications have been implemented, because RBAC has many advantages such as reducing administration cost and complexity. However, there are some problems which may arise in RBAC management. One is related to authorization granting process. For example, when a role is granted to a user, this role may conflict with other roles of the user or together with this role; the user may have or derive a high level of authority. Another is related to authorization revocation. For instance, when a role is revoked from a user, the user may still have the role. To solve these problems, we present an authorization granting algorithm, and weak revocation and strong revocation algorithms that are based on relational algebra. The algorithms check conflicts and therefore help allocate the roles and permissions without compromising the security in RBAC. We describe the applications of the new algorithms with an anonymity scalable payment scheme. In summary, this thesis has made the following major contributions in electronic service systems: 1. A ticket based global solution for electronic commerce systems; A ticket based solution is designed for different kinds of e-services. Tickets provide a flexible mechanism and users can check charges at anytime. 2. Untraceable electronic cash system; An untraceable e-cash system is developed, in which the bank involvement in the payment transaction between a user and a receiver is eliminated. Users remain anonymous, unless she/he spends a coin more than once. 3. A self-scalable anonymity electronic payment system; In this payment system, from the viewpoint of banks, consumers can improve anonymity if they are worried about disclosure of their identities. Each consumer can get the required anonymity level. 4. Using RBAC to manage electronic payment system; The basic structure of RBAC is reviewed. The challenge problems in the management of RBAC with electronic payment systems are analysed and how to use RBAC to manage electronic payment system is proposed. 5. The investigation of recovery algorithms for conflicting problems in user-role assignments and permission-role assignments. Formal authorization allocation algorithms for role-based access control have developed. The formal approaches are based on relational structure, and relational algebra and are used to check conflicting problems between roles and between permissions.
APA, Harvard, Vancouver, ISO, and other styles
47

Nwoffiah, Lucy Chineze. "E-commerce: the impact of internet technology on retailing." Thesis, Cape Peninsula University of Technology, 2005. http://hdl.handle.net/20.500.11838/1771.

Full text
Abstract:
Thesis (MTech (Business Information Systems))--Cape Peninsula University of Technology, 2005<br>Where customers have freedom of choice, their level of satisfaction will determine if they are loyal, long-term and profitable customers. If customers are not satisfied they will take their business elsewhere. The increase in the level of satisfaction in key element areas would increase overall customer satisfaction and increase customers' future behaviours such as purchasing on the Internet and recommending the e-retail websites to others. This thesis also explains in the previous chapters that early adopters of eretailing exhibited more of the elements of service transactions than goods transactions and that these elements best explain the e-retailer-consumer relationship. Creating the trust between a customer and its service provider {e-retailer} is one of the key factors in ensuring customer loyalty and retention. Other challenges that were discussed include controlling customer data, integrating on-offline orders, delivering goods cost effectively and handling of returns. Strategies e-retail businesses implement and use in improving product and service quality, gain market share and maintain greater customer loyalty were discussed in this research. If the e-retail businesses can continue to improve consumers' satisfaction they will be rewarded with continued improvement in overall customer satisfaction, customer loyalty and retention and increase profitability. While the Internet certainly poses new challenges for e-retailers, and offers them invaluable new tools, a spate of new research suggests that there is no reason for traditional retailers to consider themselves doomed. The big question is: how does Internet technology assist e-retail businesses to create loyal e-customers?
APA, Harvard, Vancouver, ISO, and other styles
48

Keck, Andrew G. "Electronic discovery." Thesis, Utica College, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10101099.

Full text
Abstract:
<p> Cyber incidents continue to increase across the entire globe. The increase in security threats requires organizations to rethink strategies and policies continually fortifying against known and unknown threats. Cyber incident policies and response plans range from non-existent to hundreds of pages in length. A policy may include sections discussing roles and responsibility, incident detection, escalation, and many additional categories, and often discuss the collection and preservation of forensic evidence. Policies briefly address, in many cases, the proper collection of evidence; however, the written regulation concerning the potential liabilities, the risks associated with current and future litigation, and the legal consequences to a cyber incident remains sparse. The desired outcome of this paper is to enlighten the reader through identification of the risks, the potential pitfalls, and steps to policy development pertaining to the handling of electronic evidence, with a cross examination of overlapping sectors between forensics, electronic discovery, and cyber security.</p>
APA, Harvard, Vancouver, ISO, and other styles
49

Ye, Ruyi. "An economic model of investment in information security /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ISMT%202004%20YE.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.<br>Includes bibliographical references (leaves 39-41). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
50

Luo, Chuan. "The influence of information-seeking strategies on uncertainty in electronic commerce /." access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?phd-is-b30082730f.pdf.

Full text
Abstract:
Thesis (Ph.D.)--City University of Hong Kong, 2009.<br>"Submitted to Department of Information Systems in partial fulfillment of the requirements for the degree of Doctor of Philosophy." Includes bibliographical references (leaves 106-114)
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography