Academic literature on the topic 'Electronic commerce Internet CORBA (Computer architecture)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic commerce Internet CORBA (Computer architecture).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic commerce Internet CORBA (Computer architecture)"

1

BICHLER, MARTIN, ARIE SEGEV, and CARRIE BEAM. "AN ELECTRONIC BROKER FOR BUSINESS-TO-BUSINESS ELECTRONIC COMMERCE ON THE INTERNET." International Journal of Cooperative Information Systems 07, no. 04 (1998): 315–29. http://dx.doi.org/10.1142/s0218843098000155.

Full text
Abstract:
Distributed object standards provide a key to building interoperable applications that can run on a range of platforms. The paper describes a CORBA-based research prototype for an electronic broker in business-to-business electronic commerce. High-level IDL specifications are used to achieve interoperability between components of the electronic marketplace. The two key functionalities of the electronic broker are the ability to dynamically gather information from remote electronic catalogs and the support for negotiations through auction mechanisms. The paper discusses the functionality and the design of the electronic broker and gives an overview of current extensions of the prototype. As application-level interoperability is a crucial precondition for many brokerage services, we put special emphasis on electronic commerce protocol standards.
APA, Harvard, Vancouver, ISO, and other styles
2

Tak, Sungwoo, Yugyung Lee, and Eun Kyo Park. "A software framework for non-repudiation service in electronic commerce based on the Internet." Microprocessors and Microsystems 27, no. 5-6 (2003): 265–76. http://dx.doi.org/10.1016/s0141-9331(03)00027-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lindgreen, Adam, Michael Antioco, and Joost Wouters. "Online support for commerce processes: The Dutch food retailing sector." Journal on Chain and Network Science 4, no. 2 (2004): 95–109. http://dx.doi.org/10.3920/jcns2004.x045.

Full text
Abstract:
Advances in information technology have changed not only traditional goods and services, but also business-to-consumer relationships in terms of interactivity. For example, by facilitating access to company data, offering additional services, and/or providing self-service options through the World Wide Web, consumer requests can be recorded, handled faster, and dealt with more individually in a cost-effective manner. This article examines the extent to which companies in the Dutch food retailing sector are using the World Wide Web and its associated technologies to conduct their business. Employing the electronic commerce architecture suggested by Basu and Muylle (1999, 2002), Muylle and Basu (2003), we analyse the commercial Web sites of Dutch food retail companies (numbering 34 in all) to determine which commerce processes are being supported online in this sector. The results of the research provide insights to academics on the adoption of electronic commerce in a particular industry sector and to food retail managers on their competitors' usage of the World Wide Web. Our findings show that, generally, support for electronic commerce processes and sub-processes is merely 16 per cent of the considered sample. Most retailers use the Internet only as a medium of communications, although others have set up commercial Web sites that provide higher customer support. Several sub-processes appear to be supported such as core logistics, online search of products, and price information display and determination. With the exception of search, there is practically no online customisation possible in the processes. A high correlation was observed between search, valuation, and authentication on the one hand and support for online payment on the other hand. Lastly, there is no significant difference between regional/national retailers or firm size, especially for the search and valuation processes, which share close to identical extent of support.
APA, Harvard, Vancouver, ISO, and other styles
4

Thien Van, Hoang, Vo Anh Tien, Huynh Cong Danh, and Hoang-Sy Nguyen. "Dispatching the problems in implementing mobile payment services from consumer attitude perspective." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 590. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp590-597.

Full text
Abstract:
<span>Due to the abundance of internet and e-commerce (electronic commerce), an excessive amount of data has been generated causing an overload of information to the current network infrastructure. As an attempt to solve this problem, there is a shift to mobile payment in the field of E-commerce. Thus, it is essential to study the adoption level of such service for global markets in general and the Vietnamese market in specific. In this paper, we study the consumers' attitude toward mobile payment, investigated with the theory of planned behavior (TPB) from three perspectives, namely the consumer innovativeness, perceived benefit, and perceived risk. Accordingly, there are six hypotheses proposed to study the consumers' attitude toward the service. Thanks to the structural equation modeling (SEM) method, a population of 250 Vietnamese mobile payment users was analyzed to confirm five out of the six hypotheses. It is drawn that the attitude toward the service is correlated positively with the innovativeness and the perceived benefit, while being correlated negatively with the perceived risk. Besides, the resulted model can elucidate approximately 49% the consumers' intention to reuse the mobile payment service.</span>
APA, Harvard, Vancouver, ISO, and other styles
5

Pushpa, S. Paul, D. Angeline Ranjithamani, and S. Sowmiya. "Online Electrical Goods and Crew." International Journal on Cybernetics & Informatics 10, no. 2 (2021): 157–68. http://dx.doi.org/10.5121/ijci.2021.100218.

Full text
Abstract:
The Online Shopping is a web based application intended for online retailers. The main objective of this application is to make it interactive and its ease of use. Electronic Commerce is process of doing business through computer networks. A person sitting on his chair in front of a computer can access all the facilities of the Internet to buy or sell the products. Unlike traditional commerce that is carried out physically with effort of a person to go & get products, ecommerce has made it easier for human to reduce physical work and to save time. It Provide full electrical work for home and shops etc... We are full responsibility for the work and the website was also include employee allocation details for admin only. In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If their customers wish to see our business online and have instant access to your products or services. Using asp .net for creating this website , Developing Language is C#, Designing languages are CSS and Html. These include multi-tiered architecture, server and client side scripting techniques, implementation technologies such as ASP.NET, programming language (such as C#) and relational databases. The search engine provides an easy and convenient way to search for products where a user can Search for a product interactively and the search engine would refine the products available based on the user’s input.
APA, Harvard, Vancouver, ISO, and other styles
6

Elovici, Yuval, Chanan Glezer, and Bracha Shapira. "Enhancing customer privacy while searching for products and services on the world wide web." Internet Research 15, no. 4 (2005): 378–99. http://dx.doi.org/10.1108/10662240510615164.

Full text
Abstract:
PurposeTo propose a model of a privacy‐enhanced catalogue search system (PECSS) in an attempt to address privacy threats to consumers, who search for products and services on the world wide web.Design/methodology/approachThe model extends an agent‐based architecture for electronic catalogue mediation by supplementing it with a privacy enhancement mechanism. This mechanism introduces fake queries into the original stream of user queries, in an attempt to reduce the similarity between the actual interests of users (“internal user profile”) and the interests as observed by potential eavesdroppers on the web (“external user profile”). A prototype was constructed to demonstrate the feasibility and effectiveness of the model.FindingsThe evaluation of the model indicates that, by generating five fake queries per each original user query, the user's profile is hidden most effectively from any potential eavesdropper. Future research is needed to identify the optimal glossary of fake queries for various clients. The model also should be tested against various attacks perpetrated against the mixed stream of original and fake queries (i.e. statistical clustering).Research limitations/implicationsThe model's feasibility was evaluated through a prototype. It was not empirically tested against various statistical methods used by intruders to reveal the original queries.Practical implicationsA useful architecture for electronic commerce providers, internet service providers (ISP) and individual clients who are concerned with their privacy and wish to minimize their dependencies on third‐party security providers.Originality/valueThe contribution of the PECSS model stems from the fact that, as the internet gradually transforms into a non‐free service, anonymous browsing cannot be employed any more to protect consumers' privacy, and therefore other approaches should be explored. Moreover, unlike other approaches, our model does not rely on the honesty of any third mediators and proxies that are also exposed to the interests of the client. In addition, the proposed model is scalable as it is installed on the user's computer.
APA, Harvard, Vancouver, ISO, and other styles
7

Abraham, Ajith, Sung-Bae Cho, Thomas Hite, and Sang-Yong Han. "Special Issue on Web Services Practices." Journal of Advanced Computational Intelligence and Intelligent Informatics 10, no. 5 (2006): 703–4. http://dx.doi.org/10.20965/jaciii.2006.p0703.

Full text
Abstract:
Web services – a new breed of self-contained, self-describing, modular applications published, located, and invoked across the Web – handle functions, from simple requests to complicated business processes. They are defined as network-based application components with a services-oriented architecture (SOA) using standard interface description languages and uniform communication protocols. SOA enables organizations to grasp and respond to changing trends and to adapt their business processes rapidly without major changes to the IT infrastructure. The Inaugural International Conference on Next-Generation Web Services Practices (NWeSP'05) attracted researchers who are also the world's most respected authorities on the semantic Web, Web-based services, and Web applications and services. NWeSP'05 was held in cooperation with the IEEE Computer Society Task Force on Electronic Commerce, the Technical Committee on Internet, and the Technical Committee on Scalable Computing. This special issue presents eight papers focused on different aspects of Web services and their applications. Papers were selected based on fundamental ideas and concepts rather than the thoroughness of techniques employed. Papers are organized as follows: <I>Taher et al.</I> present the first paper, on a Quality of Service Information and Computational framework (QoS-IC) supporting QoS-based service selection for SOA. The framework's functionality is expanded using a QoS constraints model that establishes an association relationship between different QoS properties and is used to govern QoS-based service selection in the underlying algorithm. Using a prototype implementation, the authors demonstrate how QoS constraints improve QoS-based service selection and save consumers valuable time. Due to the complex infrastructure of web applications, response times perceived by clients may be significantly longer than desired. To overcome some of the current problems, <I>Vilas et al.</I>, in the second paper, propose a cache-based extension of the architecture that enhances the current web services architecture, which is mainly based on program-logic or protocol-dependent optimization. In the third paper, Jo and Yoo present authorization for securing XML sources on the Web. One of the disadvantages of existing access control is that the DOM tree must be loaded into memory while all XML documents are parsed to generate the DOM tree, such that a lot of memory is used in repetitive search for tree to authorize access to all nodes in the DOM tree. The complex authorization evaluation process required thus lowers system performance. Existing access control fails to consider information structure and semantics sufficiently due to basic HTML limitations. The authors overcome some of these limitations in the proposed model. In the fourth paper, Jung and Cho propose a novel behavior-network-based method for Web service composition. The behavior network selects services automatically through internal and external links with environmental information from sensors and goals. An optimal service is selected at each step, resulting in a globally optimal service sequence for achieving preset goals. The authors detail experimental results for the proposed model by comparing them with rule-based system and user tests. <I>Kong et al.</I> present an efficient method in the fifth paper for merging heterogeneous ontologies – no ontology building standard currently exists – and the many ontology-building tools available are based on different ontology languages, mostly focusing on how to create, edit and infer the ontology efficiently. Even ontologies about the same domain differ because ontology experts hold different view points. For these reasons, interoperability between ontologies is very low. The authors propose merging heterogeneous domain ontologies by overcoming some of the above limitations. In the sixth paper, Chen and Che provide polynomial-time tree pattern query minimization algorithm whose efficiency stems from two key observations: (i) Inherent redundant "components" usually exist inside the rudimentary query provided by the user, and (ii) nonedundant nodes may become redundant when constraints such as co-occurrence and required child/descendant are given. They show that the algorithm obtained by first augmenting the input tree pattern using constraints, then applying minimization, invariably finds a unique minimal equivalent to the original query. Chen and Che present a polynomial-time algorithm for tree pattern query (TPQ) minimization without XML constraints in the seventh paper. The two-part algorithm is a dynamic programming strategy for finding all matching subtrees within a TPQ. The algorithm consists of one for subtree recognization and a second for subtree deletion. In the last paper, <I>Bagchi et al.</I> present the mobile distributed virtual memory (MDVM) concept and architecture for cellular networks containing server-groups (SG). They detail a two-round randomized distributed algorithm to elect a unique leader and co-leader of the SG that is free of any assumption about network topology, and buffer space limitations and is based on dynamically elected coordinators eliminating single points of failure. As guest editors, we thank all authors featured in this special issue for their contributions and the referees for critically evaluating the papers within the short time allotted. We sincerely believe that readers will share our enjoyment of this special issue and find the information it presents both timely and useful.
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Fengyi. "A Unified Accounting Information Framework To Modeling Bank Accounting Systems." Journal of Applied Business Research (JABR) 20, no. 4 (2011). http://dx.doi.org/10.19030/jabr.v20i4.2229.

Full text
Abstract:
<p class="MsoNormal" style="text-justify: inter-ideograph; text-align: justify; line-height: 12pt; margin: 0in 0.5in 0pt; mso-line-height-rule: exactly;"><span style="font-size: 10pt;"><span style="font-family: Times New Roman;">This paper discusses the use of distributed middlewares as essential tools for facilitating electronic exchange of standard business document between managers, financial institutes, and trading partners in the banking sector. Internally, companies can benefit by creating information architectures that allow systems to easily exchange data. One less expensive and disruptive option that applies to most banks/financial institutes is used traditional mainframe (legacy) system with an array of distributed middlewares to overcome the aforementioned limitations. This paper focuses on developing a new distributed processing architecture based on client-server technology called UAIF &ndash; Unified Accounting Information Framework. UAIF is designed to assist managers/financial institutes with a transparent access to information anywhere on the LAN or WAN from any desktop and to meet management specific needs so that some of the accounting and financial works can be widely used for World Wide Web (WWW) applications via Internet or Intranet. </span></span></p><p class="MsoNormal" style="line-height: 15pt; margin: 0in 0in 0pt; mso-line-height-rule: exactly;"><span style="font-size: 10pt;"><span style="font-family: Times New Roman;">&nbsp;</span></span></p><p class="MsoNormal" style="text-justify: inter-ideograph; text-align: justify; line-height: 12pt; margin: 0in 0.5in 0pt; mso-line-height-rule: exactly;"><span style="font-size: 10pt;"><span style="font-family: Times New Roman;">For concept verification, we utilize UAIF to modeling a bank accounting system, which is based on an industrial standard CORBA architecture, XML and OMG General Ledger Facility. This methodology integrates enterprise accounting information system (AIS) with distributed systems via Internet, Intranet, and Electronic Commerce. </span></span></p>
APA, Harvard, Vancouver, ISO, and other styles
9

McGuire, Mark. "Ordered Communities." M/C Journal 7, no. 6 (2005). http://dx.doi.org/10.5204/mcj.2474.

Full text
Abstract:
A rhetoric of freedom characterises much of the literature dealing with online communities: freedom from fixed identity and appearance, from the confines of geographic space, and from control. The prevailing view, a combination of futurism and utopianism, is that the lack of order in cyberspace enables the creation of social spaces that will enhance personal freedom and advance the common good. Sherry Turkle argues that computer-mediated communication allows us to create a new form of community, in which identity is multiple and fluid (15-17). Marcos Novak celebrates the possibilities of a dematerialized, ethereal virtual architecture in which the relationships between abstract elements are in a constant state of flux (250). John Perry Barlow employs the frontier metaphor to frame cyberspace as an unmapped, ungoverned territory in which a romantic and a peculiarly American form of individualism can be enjoyed by rough and ready pioneers (“Crime” 460). In his 1993 account as an active participant in The WELL (Whole Earth ‘Lectronic Link), one of the earliest efforts to construct a social space online, Howard Rheingold celebrates the freedom to create a “new kind of culture” and an “authentic community” in the “electronic frontier.” He worries, however, that the freedom enjoyed by early homesteaders may be short lived, because “big power and big money” might soon find ways to control the Internet, just as they have come to dominate and direct other communications media. “The Net,” he states, “is still out of control in fundamental ways, but it might not stay that way for long” (Virtual Community 2-5). The uses of order and disorder Some theorists have identified disorder as a necessary condition for the development of healthy communities. In The Uses of Disorder (1970), Richard Sennett argues that “the freedom to accept and to live with disorder” is integral to our search for community (xviii). In his 1989 study of social space, Ray Oldenburg maintains that public hangouts, which constitute the heart of vibrant communities, support sociability best when activities are unplanned, unorganized, and unrestricted (33). He claims that without the constraints of preplanned control we will be more in control of ourselves and more aware of one another (198). More recently, Charles Landry suggests that “structured instability” and “controlled disruption,” resulting from competition, conflict, crisis, and debate, make cities less comfortable but more exciting. Further, he argues that “endemic structural disorder” requiring ongoing adjustments can generate healthy creative activity and stimulate continual innovation (156-58). Kevin Robins, too, believes that any viable social system must be prepared to accept a level of uncertainty, disorder, and fear. He observes, however, that techno-communities are “driven by the compulsion to neutralize,” and they therefore exclude these possibilities in favour of order and security (90-91). Indeed, order and security are the dominant characteristics that less idealistic observers have identified with cyberspace. Alexander Galloway explains how, despite its potential as a liberating development, the Internet is based on technologies of control. This control is exercised at the code level through technical protocols, such as TCP/IP, DNS, and HTM, that determine disconnections as well as connections (Galloway). Lawrence Lessig suggests that in our examination of the ownership, regulation, and governance of the virtual commons, we must take into account three distinct layers. As well as the “logical” or “code” layer that Galloway foregrounds, we should also consider the “physical” layer, consisting of the computers and wires that carry Internet communications, and the “content” layer, which includes everything that we see and hear over the network. In principle, each of these layers could be free and unorganized, or privately owned and controlled (Lessig 23). Dan Schiller documents the increasing privatization of the Net and argues that corporate cyberspace extends the reach of the market, enabling it to penetrate into areas that have previously been considered to be part of the public domain. For Schiller, the Internet now serves as the main production and control mechanism of a global market system (xiv). Checking into Habbo Hotel Habbo Hotel is an example of a highly ordered and controlled online social space that uses community and game metaphors to suggest something much more open and playful. Designed to attract the teenage market, this graphically intensive cartoon-like hotel is like an interactive Legoland, in which participants assemble a toy-like “Habbo” character and chat, play games, and construct personal environments. The first Habbo Hotel opened its doors in the United Kingdom in 2000, and, by September 2004, localized sites were based in a dozen countries, including Canada, the Unites States, Finland, Japan, Switzerland and Spain, with further expansion planned. At that time, there were more than seventeen million registered Habbo characters worldwide with 2.3 million unique visitors each month (“Strong Growth”). The hotel contains thousands of private rooms and twenty-two public spaces, including a welcome lounge, three lobbies, cinema, game hall, café, pub, and an extensive hallway. Anyone can go to the Room-O-Matic and instantly create a free guest room. However, there are a limited number of layouts to choose from and the furnishings, which must be purchased, have be chosen from a catalog of fixed offerings. All rooms are located on one of five floors, which categorize them according to use (parties, games, models, mazes, and trading). Paradoxically, the so-called public spaces are more restricted and less public than the private guest quarters. The limited capacity of the rooms means that all of the public spaces are full most of the time. Priority is given to paying Habbo Club members and others are denied entry or are unceremoniously ejected from a room when it becomes full. Most visitors never make it into the front lobby. This rigid and restricted construction is far from Novak’s vision of a “liquid architecture” without barriers, that morphs in response to the constantly changing desires of individual inhabitants (Novak 250). Before entering the virtual hotel, individuals must first create a Lego-like avatar. Users choose a unique name for their Habbo (no foul language is allowed) and construct their online persona from a limited selection and colour of body parts. One of two different wardrobes is available, depending on whether “Boy” or “Girl” is chosen. The gender of every Habbo is easily recognizable and the restricted wardrobe results in remarkably similar looking young characters. The lack of differentiation encourages participants to treat other Habbos as generic “Boys” or “Girls” and it encourages limited and predictable conversations that fit the stereotype of male-female interactions in most chat sites. Contrary to Turkle’s contention that computer mediated communication technologies expose the fallacy of a single, fixed, identity, and free participants to experiment with alternative selves (15-17), Habbo characters are permitted just one unchangeable name, and are capable of only limited visual transformations. A fixed link between each Habbo character and its registered user (information that is not available to other participants) allows the hotel management to track members through the site and monitor their behavior. Habbo movements are limited to walking, waving, dancing and drinking virtual alcohol-free beverages. Movement between spaces is accomplished by entering a teleport booth, or by selecting a location by name from the hotel Navigator. Habbos cannot jump, fly or walk through objects or other Habbos. They have no special powers and only a limited ability to interact with objects in their environment. They cannot be hurt or otherwise affected by anything in their surroundings, including other Habbos. The emphasis is on safety and avoidance of conflict. Text chat in Habbo Hotel is limited to one sixty-one-character line, which appears above the Habbo, floats upward, and quickly disappears off the top of the screen. Text must be typed in real time while reading on-going conversations and it is not possible to archive a chat sessions or view past exchanges. There is no way of posting a message on a public board. Using the Habbo Console, shorter messages can also be exchanged between Habbos who may be occupying different rooms. The only other narratives available on the site are in the form of official news and promotions. Before checking into the hotel, Habbos can stop to read Habbo Today, which promotes current offers and activities, and HabboHood Happenings, which offers safety tips, information about membership benefits, jobs (paid in furniture), contest winners, and polls. According to Rheingold, a virtual community can form online when enough people participate in meaningful public discussions over an extended period of time and develop “webs of personal relationships” (Virtual Community 5). By restricting communication to short, fleeting messages between individual Habbos, the hotel frustrates efforts by members to engage in significant dialogue and create a viable social group. Although “community” is an important part of the Habbo Hotel brand, it is unlikely to be a substantial part of the actual experience. The virtual hotel is promoted as a safe, non-threatening environment suitable for the teenagers is designed to attract. Parents’ concerns about the dangers of an unregulated chat space provide the hotel management with a justification for creating a highly controlled social space. The hotel is patrolled twenty-four hours a day by professional moderators backed-up by a team of 180 volunteer “Hobbas,” or guides, who can issue warnings to misbehaving Habbos, or temporarily ban them from the site. All text keyed in by Habbos passes through an automated “Bobba Filter” that removes swearing, racist words, explicit sexual comments and “anything that goes against the “Habbo Way” (“Bad Language”). Stick to the rules and you’ll have fun, Habbos are told, “break them and you’ll get yourself banned” (“Habbo Way”). In Big Brother fashion, messages are displayed throughought the hotel advising members to “Stay safe, read the Habbohood Watch,” “Never give out your details!” and “Obey the Habbo way and you’ll be OK.” This miniature surveillance society contradicts Barlow’s observation that cyberspace serves as “a perfect breeding ground for both outlaws and new ideas about liberty” (“Crime” 460). In his manifesto declaring the independence of cyberspace from government control, he maintains that the state has no authority in the electronic “global social space,” where, he asserts, “[w]e are forming our own Social Contract” based on the Golden Rule (“Declaration”). However, Habbo Hotel shows how the rule of the marketplace, which values profits more than social practices, can limit the freedoms of online civil society just as effectively as the most draconian government regulation. Place your order Far from permitting the “controlled disruption” advocated by Landry, the hotel management ensures that nothing is allowed to disrupt their control over the participants. Without conflict and debate, there are few triggers for creative activity in the site, which is designed to encourage consumption, not community. Timo Soininen, the managing director of the company that designed the hotel, states that, because teenagers like to showcase their own personal style, “self-expression is the key to our whole concept.” However, since it isn’t possible to create a Habbo from scratch, or to import clothing or other objects from outside the site, the only way for members to effectively express themselves is by decorating and furnishing their room with items purchased from the Habbo Catalogue. “You see, this,” admits Soininen, “is where our revenue model kicks in” (Shalit). Real-world products and services are also marketed through ads and promotions that are integrated into chat, news, and games. The result, according to Habbo Ltd, is “the ideal vehicle for third party brands to reach this highly desired 12-18 year-old market in a cost-effective and creative manner” (“Habbo Company Profile”). Habbo Hotel is a good example of what Herbert Schiller describes as the corporate capture of sites of public expression. He notes that, when put at the service of growing corporate power, new technologies “provide the instrumentation for organizing and channeling expression” (5-6). In an afterword to a revised edition of The Virtual Community, published in 2000, Rheingold reports on the sale of the WELL to a privately owned corporation, and its decline as a lively social space when order was imposed from the top down. Although he believes that there is a place for commercial virtual communities on the Net, he acknowledges that as economic forces become more entrenched, “more controls will be instituted because there is more at stake.” While remaining hopeful that activists can leverage the power of many-to-many communications for the public good, he wonders what will happen when “the decentralized network infrastructure and freewheeling network economy collides with the continuing growth of mammoth, global, communication empires” (Virtual Community Rev. 375-7). Although the company that built Habbo Hotel is far from achieving global empire status, their project illustrates how the dominant ethos of privatization and the increasing emphasis on consumption results in gated virtual communities that are highly ordered, restricted, and controlled. The popularity of the hotel reflects the desire of millions of Habbos to express their identities and ideas in a playful environment that they are free to create and manipulate. However, they soon find that the rules are stacked against them. Restricted design options, severe communication limitations, and fixed architectural constraints mean that the only freedom left is the freedom to choose from a narrow range of provided options. In private cyberspaces like Habbo Hotel, the logic of the market rules out unrestrained many-to-many communications in favour of controlled commercial relationships. The liberating potential of the Internet that was recognized by Rheingold and others has been diminished as the forces of globalized commerce impose their order on the electronic frontier. References “Bad Language.” Habbo Hotel. 2004. Sulake UK Ltd. 15 Apr. 2004 http://www.habbohotel.co.uk/habbo/en/help/safety/badlanguage/>. Barlow, John Perry. “Crime and Puzzlement.” High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace. Ed. Peter Ludlow. Cambridge, Mass.: MIT P, 1996. 459-86. ———. “A Declaration of the Independence of Cyberspace.” 8 Feb. 1996. 3 July 2004 http://www.eff.org/~barlow/Declaration-Final.html>. Galloway, Alexander R. Protocol: How Control Exists after Decentralization. Cambridge, Mass.: MIT P, 2004. “Habbo Company Profile.” Habbo Hotel. 2002. Habbo Ltd. 20 Jan. 2003 http://www.habbogroup.com>. “The Habbo Way.” Habbo Hotel. 2004. Sulake UK Ltd. 15 Apr. 2004 http://www.habbohotel.co.uk/habbo/en/help/safety/habboway/>. Landry, Charles. The Creative City: A Toolkit for Urban Innovators. London: Earthscan, 2000. Lessig, Lawrence. The Future of Ideas: The Fate of the Commons in a Connected World. New York: Random, 2001. Novak, Marcos. “Liquid Architecture in Cyberspace.” Cyberspace: First Steps. Ed. Michael Benedikt. Cambridge, Mass.: MIT P, 1991. 225-54. Oldenburg, Ray. The Great Good Place: Cafés, Coffee Shops, Community Centers, Beauty Parlors, General Stores, Bars, Hangouts and How They Get You through the Day. New York: Paragon, 1989. Rheingold, Howard. The Virtual Community: Homesteading on the Electronic Frontier. New York: Harper, 1993. ———. The Virtual Community: Homesteading on the Electronic Frontier. Rev. ed. Cambridge, Mass.: MIT P, 2000. Robins, Kevin. “Cyberspace and the World We Live In.” The Cybercultures Reader. Eds. David Bell and Barbara M. Kennedy. London: Routledge, 2000. 77-95. Schiller, Dan. Digital Capitalism: Networking the Global Market System. Cambridge, Mass.: MIT P, 1999. Schiller, Herbert I. Culture Inc.: The Corporate Takeover of Public Expression. New York: Oxford UP, 1991. Sennett, Richard. The Uses of Disorder: Personal Identity & City Life. New York: Vintage, 1970. Shalit, Ruth. “Welcome to the Habbo Hotel.” mpulse Magazine. Mar. 2002. Hewlett-Packard. 1 Apr. 2004 http://www.cooltown.com/cooltown/mpulse/0302-habbo.asp>. “Strong Growth in Sulake’s Revenues and Profit – Habbo Hotel Online Game Will Launch in the US in September.” 3 Sept. 2004. Sulake. Sulake Corp. 9 Jan. 2005 http://www.sulake.com/>. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Simon, 1997. Citation reference for this article MLA Style McGuire, Mark. "Ordered Communities." M/C Journal 7.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0501/06-mcguire.php>. APA Style McGuire, M. (Jan. 2005) "Ordered Communities," M/C Journal, 7(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0501/06-mcguire.php>.
APA, Harvard, Vancouver, ISO, and other styles
10

Mallan, Kerry Margaret, and Annette Patterson. "Present and Active: Digital Publishing in a Post-print Age." M/C Journal 11, no. 4 (2008). http://dx.doi.org/10.5204/mcj.40.

Full text
Abstract:
At one point in Victor Hugo’s novel, The Hunchback of Notre Dame, the archdeacon, Claude Frollo, looked up from a book on his table to the edifice of the gothic cathedral, visible from his canon’s cell in the cloister of Notre Dame: “Alas!” he said, “this will kill that” (146). Frollo’s lament, that the book would destroy the edifice, captures the medieval cleric’s anxiety about the way in which Gutenberg’s print technology would become the new universal means for recording and communicating humanity’s ideas and artistic expression, replacing the grand monuments of architecture, human engineering, and craftsmanship. For Hugo, architecture was “the great handwriting of humankind” (149). The cathedral as the material outcome of human technology was being replaced by the first great machine—the printing press. At this point in the third millennium, some people undoubtedly have similar anxieties to Frollo: is it now the book’s turn to be destroyed by yet another great machine? The inclusion of “post print” in our title is not intended to sound the death knell of the book. Rather, we contend that despite the enduring value of print, digital publishing is “present and active” and is changing the way in which research, particularly in the humanities, is being undertaken. Our approach has three related parts. First, we consider how digital technologies are changing the way in which content is constructed, customised, modified, disseminated, and accessed within a global, distributed network. This section argues that the transition from print to electronic or digital publishing means both losses and gains, particularly with respect to shifts in our approaches to textuality, information, and innovative publishing. Second, we discuss the Children’s Literature Digital Resources (CLDR) project, with which we are involved. This case study of a digitising initiative opens out the transformative possibilities and challenges of digital publishing and e-scholarship for research communities. Third, we reflect on technology’s capacity to bring about major changes in the light of the theoretical and practical issues that have arisen from our discussion. I. Digitising in a “post-print age” We are living in an era that is commonly referred to as “the late age of print” (see Kho) or the “post-print age” (see Gunkel). According to Aarseth, we have reached a point whereby nearly all of our public and personal media have become more or less digital (37). As Kho notes, web newspapers are not only becoming increasingly more popular, but they are also making rather than losing money, and paper-based newspapers are finding it difficult to recruit new readers from the younger generations (37). Not only can such online-only publications update format, content, and structure more economically than print-based publications, but their wide distribution network, speed, and flexibility attract advertising revenue. Hype and hyperbole aside, publishers are not so much discarding their legacy of print, but recognising the folly of not embracing innovative technologies that can add value by presenting information in ways that satisfy users’ needs for content to-go or for edutainment. As Kho notes: “no longer able to satisfy customer demand by producing print-only products, or even by enabling online access to semi-static content, established publishers are embracing new models for publishing, web-style” (42). Advocates of online publishing contend that the major benefits of online publishing over print technology are that it is faster, more economical, and more interactive. However, as Hovav and Gray caution, “e-publishing also involves risks, hidden costs, and trade-offs” (79). The specific focus for these authors is e-journal publishing and they contend that while cost reduction is in editing, production and distribution, if the journal is not open access, then costs relating to storage and bandwith will be transferred to the user. If we put economics aside for the moment, the transition from print to electronic text (e-text), especially with electronic literary works, brings additional considerations, particularly in their ability to make available different reading strategies to print, such as “animation, rollovers, screen design, navigation strategies, and so on” (Hayles 38). Transition from print to e-text In his book, Writing Space, David Bolter follows Victor Hugo’s lead, but does not ask if print technology will be destroyed. Rather, he argues that “the idea and ideal of the book will change: print will no longer define the organization and presentation of knowledge, as it has for the past five centuries” (2). As Hayles noted above, one significant indicator of this change, which is a consequence of the shift from analogue to digital, is the addition of graphical, audio, visual, sonic, and kinetic elements to the written word. A significant consequence of this transition is the reinvention of the book in a networked environment. Unlike the printed book, the networked book is not bound by space and time. Rather, it is an evolving entity within an ecology of readers, authors, and texts. The Web 2.0 platform has enabled more experimentation with blending of digital technology and traditional writing, particularly in the use of blogs, which have spawned blogwriting and the wikinovel. Siva Vaidhyanathan’s The Googlization of Everything: How One Company is Disrupting Culture, Commerce and Community … and Why We Should Worry is a wikinovel or blog book that was produced over a series of weeks with contributions from other bloggers (see: http://www.sivacracy.net/). Penguin Books, in collaboration with a media company, “Six Stories to Start,” have developed six stories—“We Tell Stories,” which involve different forms of interactivity from users through blog entries, Twitter text messages, an interactive google map, and other features. For example, the story titled “Fairy Tales” allows users to customise the story using their own choice of names for characters and descriptions of character traits. Each story is loosely based on a classic story and links take users to synopses of these original stories and their authors and to online purchase of the texts through the Penguin Books sales website. These examples of digital stories are a small part of the digital environment, which exploits computer and online technologies’ capacity to be interactive and immersive. As Janet Murray notes, the interactive qualities of digital environments are characterised by their procedural and participatory abilities, while their immersive qualities are characterised by their spatial and encyclopedic dimensions (71–89). These immersive and interactive qualities highlight different ways of reading texts, which entail different embodied and cognitive functions from those that reading print texts requires. As Hayles argues: the advent of electronic textuality presents us with an unparalleled opportunity to reformulate fundamental ideas about texts and, in the process, to see print as well as electronic texts with fresh eyes (89–90). The transition to e-text also highlights how digitality is changing all aspects of everyday life both inside and outside the academy. Online teaching and e-research Another aspect of the commercial arm of publishing that is impacting on academe and other organisations is the digitising and indexing of print content for niche distribution. Kho offers the example of the Mark Logic Corporation, which uses its XML content platform to repurpose content, create new content, and distribute this content through multiple portals. As the promotional website video for Mark Logic explains, academics can use this service to customise their own textbooks for students by including only articles and book chapters that are relevant to their subject. These are then organised, bound, and distributed by Mark Logic for sale to students at a cost that is generally cheaper than most textbooks. A further example of how print and digital materials can form an integrated, customised source for teachers and students is eFictions (Trimmer, Jennings, & Patterson). eFictions was one of the first print and online short story anthologies that teachers of literature could customise to their own needs. Produced as both a print text collection and a website, eFictions offers popular short stories in English by well-known traditional and contemporary writers from the US, Australia, New Zealand, UK, and Europe, with summaries, notes on literary features, author biographies, and, in one instance, a YouTube movie of the story. In using the eFictions website, teachers can build a customised anthology of traditional and innovative stories to suit their teaching preferences. These examples provide useful indicators of how content is constructed, customised, modified, disseminated, and accessed within a distributed network. However, the question remains as to how to measure their impact and outcomes within teaching and learning communities. As Harley suggests in her study on the use and users of digital resources in the humanities and social sciences, several factors warrant attention, such as personal teaching style, philosophy, and specific disciplinary requirements. However, in terms of understanding the benefits of digital resources for teaching and learning, Harley notes that few providers in her sample had developed any plans to evaluate use and users in a systematic way. In addition to the problems raised in Harley’s study, another relates to how researchers can be supported to take full advantage of digital technologies for e-research. The transformation brought about by information and communication technologies extends and broadens the impact of research, by making its outputs more discoverable and usable by other researchers, and its benefits more available to industry, governments, and the wider community. Traditional repositories of knowledge and information, such as libraries, are juggling the space demands of books and computer hardware alongside increasing reader demand for anywhere, anytime, anyplace access to information. Researchers’ expectations about online access to journals, eprints, bibliographic data, and the views of others through wikis, blogs, and associated social and information networking sites such as YouTube compete with the traditional expectations of the institutions that fund libraries for paper-based archives and book repositories. While university libraries are finding it increasingly difficult to purchase all hardcover books relevant to numerous and varied disciplines, a significant proportion of their budgets goes towards digital repositories (e.g., STORS), indexes, and other resources, such as full-text electronic specialised and multidisciplinary journal databases (e.g., Project Muse and Proquest); electronic serials; e-books; and specialised information sources through fast (online) document delivery services. An area that is becoming increasingly significant for those working in the humanities is the digitising of historical and cultural texts. II. Bringing back the dead: The CLDR project The CLDR project is led by researchers and librarians at the Queensland University of Technology, in collaboration with Deakin University, University of Sydney, and members of the AustLit team at The University of Queensland. The CLDR project is a “Research Community” of the electronic bibliographic database AustLit: The Australian Literature Resource, which is working towards the goal of providing a complete bibliographic record of the nation’s literature. AustLit offers users with a single entry point to enhanced scholarly resources on Australian writers, their works, and other aspects of Australian literary culture and activities. AustLit and its Research Communities are supported by grants from the Australian Research Council and financial and in-kind contributions from a consortium of Australian universities, and by other external funding sources such as the National Collaborative Research Infrastructure Strategy. Like other more extensive digitisation projects, such as Project Gutenberg and the Rosetta Project, the CLDR project aims to provide a centralised access point for digital surrogates of early published works of Australian children’s literature, with access pathways to existing resources. The first stage of the CLDR project is to provide access to digitised, full-text, out-of-copyright Australian children’s literature from European settlement to 1945, with selected digitised critical works relevant to the field. Texts comprise a range of genres, including poetry, drama, and narrative for young readers and picture books, songs, and rhymes for infants. Currently, a selection of 75 e-texts and digital scans of original texts from Project Gutenberg and Internet Archive have been linked to the Children’s Literature Research Community. By the end of 2009, the CLDR will have digitised approximately 1000 literary texts and a significant number of critical works. Stage II and subsequent development will involve digitisation of selected texts from 1945 onwards. A precursor to the CLDR project has been undertaken by Deakin University in collaboration with the State Library of Victoria, whereby a digital bibliographic index comprising Victorian School Readers has been completed with plans for full-text digital surrogates of a selection of these texts. These texts provide valuable insights into citizenship, identity, and values formation from the 1930s onwards. At the time of writing, the CLDR is at an early stage of development. An extensive survey of out-of-copyright texts has been completed and the digitisation of these resources is about to commence. The project plans to make rich content searchable, allowing scholars from children’s literature studies and education to benefit from the many advantages of online scholarship. What digital publishing and associated digital archives, electronic texts, hypermedia, and so forth foreground is the fact that writers, readers, publishers, programmers, designers, critics, booksellers, teachers, and copyright laws operate within a context that is highly mediated by technology. In his article on large-scale digitisation projects carried out by Cornell and University of Michigan with the Making of America collection of 19th-century American serials and monographs, Hirtle notes that when special collections’ materials are available via the Web, with appropriate metadata and software, then they can “increase use of the material, contribute to new forms of research, and attract new users to the material” (44). Furthermore, Hirtle contends that despite the poor ergonomics associated with most electronic displays and e-book readers, “people will, when given the opportunity, consult an electronic text over the print original” (46). If this preference is universally accurate, especially for researchers and students, then it follows that not only will the preference for electronic surrogates of original material increase, but preference for other kinds of electronic texts will also increase. It is with this preference for electronic resources in mind that we approached the field of children’s literature in Australia and asked questions about how future generations of researchers would prefer to work. If electronic texts become the reference of choice for primary as well as secondary sources, then it seems sensible to assume that researchers would prefer to sit at the end of the keyboard than to travel considerable distances at considerable cost to access paper-based print texts in distant libraries and archives. We considered the best means for providing access to digitised primary and secondary, full text material, and digital pathways to existing online resources, particularly an extensive indexing and bibliographic database. Prior to the commencement of the CLDR project, AustLit had already indexed an extensive number of children’s literature. Challenges and dilemmas The CLDR project, even in its early stages of development, has encountered a number of challenges and dilemmas that centre on access, copyright, economic capital, and practical aspects of digitisation, and sustainability. These issues have relevance for digital publishing and e-research. A decision is yet to be made as to whether the digital texts in CLDR will be available on open or closed/tolled access. The preference is for open access. As Hayles argues, copyright is more than a legal basis for intellectual property, as it also entails ideas about authorship, creativity, and the work as an “immaterial mental construct” that goes “beyond the paper, binding, or ink” (144). Seeking copyright permission is therefore only part of the issue. Determining how the item will be accessed is a further matter, particularly as future technologies may impact upon how a digital item is used. In the case of e-journals, the issue of copyright payment structures are evolving towards a collective licensing system, pay-per-view, and other combinations of print and electronic subscription (see Hovav and Gray). For research purposes, digitisation of items for CLDR is not simply a scan and deliver process. Rather it is one that needs to ensure that the best quality is provided and that the item is both accessible and usable by researchers, and sustainable for future researchers. Sustainability is an important consideration and provides a challenge for institutions that host projects such as CLDR. Therefore, items need to be scanned to a high quality and this requires an expensive scanner and personnel costs. Files need to be in a variety of formats for preservation purposes and so that they may be manipulated to be useable in different technologies (for example, Archival Tiff, Tiff, Jpeg, PDF, HTML). Hovav and Gray warn that when technology becomes obsolete, then content becomes unreadable unless backward integration is maintained. The CLDR items will be annotatable given AustLit’s NeAt funded project: Aus-e-Lit. The Aus-e-Lit project will extend and enhance the existing AustLit web portal with data integration and search services, empirical reporting services, collaborative annotation services, and compound object authoring, editing, and publishing services. For users to be able to get the most out of a digital item, it needs to be searchable, either through double keying or OCR (optimal character recognition). The value of CLDR’s contribution The value of the CLDR project lies in its goal to provide a comprehensive, searchable body of texts (fictional and critical) to researchers across the humanities and social sciences. Other projects seem to be intent on putting up as many items as possible to be considered as a first resort for online texts. CLDR is more specific and is not interested in simply generating a presence on the Web. Rather, it is research driven both in its design and implementation, and in its focussed outcomes of assisting academics and students primarily in their e-research endeavours. To this end, we have concentrated on the following: an extensive survey of appropriate texts; best models for file location, distribution, and use; and high standards of digitising protocols. These issues that relate to data storage, digitisation, collections, management, and end-users of data are aligned with the “Development of an Australian Research Data Strategy” outlined in An Australian e-Research Strategy and Implementation Framework (2006). CLDR is not designed to simply replicate resources, as it has a distinct focus, audience, and research potential. In addition, it looks at resources that may be forgotten or are no longer available in reproduction by current publishing companies. Thus, the aim of CLDR is to preserve both the time and a period of Australian history and literary culture. It will also provide users with an accessible repository of rare and early texts written for children. III. Future directions It is now commonplace to recognize that the Web’s role as information provider has changed over the past decade. New forms of “collective intelligence” or “distributed cognition” (Oblinger and Lombardi) are emerging within and outside formal research communities. Technology’s capacity to initiate major cultural, social, educational, economic, political and commercial shifts has conditioned us to expect the “next big thing.” We have learnt to adapt swiftly to the many challenges that online technologies have presented, and we have reaped the benefits. As the examples in this discussion have highlighted, the changes in online publishing and digitisation have provided many material, network, pedagogical, and research possibilities: we teach online units providing students with access to e-journals, e-books, and customized archives of digitised materials; we communicate via various online technologies; we attend virtual conferences; and we participate in e-research through a global, digital network. In other words, technology is deeply engrained in our everyday lives. In returning to Frollo’s concern that the book would destroy architecture, Umberto Eco offers a placatory note: “in the history of culture it has never happened that something has simply killed something else. Something has profoundly changed something else” (n. pag.). Eco’s point has relevance to our discussion of digital publishing. The transition from print to digital necessitates a profound change that impacts on the ways we read, write, and research. As we have illustrated with our case study of the CLDR project, the move to creating digitised texts of print literature needs to be considered within a dynamic network of multiple causalities, emergent technological processes, and complex negotiations through which digital texts are created, stored, disseminated, and used. Technological changes in just the past five years have, in many ways, created an expectation in the minds of people that the future is no longer some distant time from the present. Rather, as our title suggests, the future is both present and active. References Aarseth, Espen. “How we became Postdigital: From Cyberstudies to Game Studies.” Critical Cyber-culture Studies. Ed. David Silver and Adrienne Massanari. New York: New York UP, 2006. 37–46. An Australian e-Research Strategy and Implementation Framework: Final Report of the e-Research Coordinating Committee. Commonwealth of Australia, 2006. Bolter, Jay David. Writing Space: The Computer, Hypertext, and the History of Writing. Hillsdale, NJ: Erlbaum, 1991. Eco, Umberto. “The Future of the Book.” 1994. 3 June 2008 ‹http://www.themodernword.com/eco/eco_future_of_book.html>. Gunkel, David. J. “What's the Matter with Books?” Configurations 11.3 (2003): 277–303. Harley, Diane. “Use and Users of Digital Resources: A Focus on Undergraduate Education in the Humanities and Social Sciences.” Research and Occasional Papers Series. Berkeley: University of California. Centre for Studies in Higher Education. 12 June 2008 ‹http://www.themodernword.com/eco/eco_future_of_book.html>. Hayles, N. Katherine. My Mother was a Computer: Digital Subjects and Literary Texts. Chicago: U of Chicago P, 2005. Hirtle, Peter B. “The Impact of Digitization on Special Collections in Libraries.” Libraries & Culture 37.1 (2002): 42–52. Hovav, Anat and Paul Gray. “Managing Academic E-journals.” Communications of the ACM 47.4 (2004): 79–82. Hugo, Victor. The Hunchback of Notre Dame (Notre-Dame de Paris). Ware, Hertfordshire: Wordsworth editions, 1993. Kho, Nancy D. “The Medium Gets the Message: Post-Print Publishing Models.” EContent 30.6 (2007): 42–48. Oblinger, Diana and Marilyn Lombardi. “Common Knowledge: Openness in Higher Education.” Opening up Education: The Collective Advancement of Education Through Open Technology, Open Content and Open Knowledge. Ed. Toru Liyoshi and M. S. Vijay Kumar. Cambridge, MA: MIT Press, 2007. 389–400. Murray, Janet H. Hamlet on the Holodeck: The Future of Narrative in Cyberspace. Cambridge, MA: MIT Press, 2001. Trimmer, Joseph F., Wade Jennings, and Annette Patterson. eFictions. New York: Harcourt, 2001.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Electronic commerce Internet CORBA (Computer architecture)"

1

Sethuraman, Meenakshi Sundar. "Framework for accessing CORBA objects with Internet as the backbone." [Gainesville, Fla.] : University of Florida, 2001. http://etd.fcla.edu/etd/uf/2001/anp1296/master.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2001.
Title from first page of PDF file. Document formatted into pages; contains viii, 30 p.; also contains graphics. Vita. Includes bibliographical references (p. 29).
APA, Harvard, Vancouver, ISO, and other styles
2

Jere, Nobert Rangarirai. "Implementation of a rewards based negotiation module for an e commerce platform." Thesis, University of Fort Hare, 2009. http://hdl.handle.net/10353/267.

Full text
Abstract:
Information and Communication Technologies (ICTs) have been widely deployed in developmental programs and this has lead to the creation of a new field – ICT for Development (ICT4D). Within the context of ICT4D, various e-services are being developed, including e-Commerce, e-Government, e-Health and e-Judiciary. ICT4D projects allow Small, Medium and Micro Enterprises (SMMEs) in rural areas to increase sales and gain a market share in the global market. However, many of these ICT4D projects do not succeed, because they fail to bring enough financial value to SMMEs due to the form they currently have. An obvious example is e-Commerce, which should be a source of revenue for business organizations, but most often is not. This thesis presents the design and implementation of a rewarding and negotiation application for a shopping portal to improve the marketing of products for rural entrepreneurs. The shopping portal has been set up for the Dwesa community, a marginalized area in the Eastern Cape province of South Africa. The proposed system, called the Dwesa Rewarding Program (DRP) enables customers buying online to get points for some of the activities carried out on the shopping portal. It also allows customers to negotiate and make offers whilst purchasing and get rewarded for buying online. The novelty of the system is in its flexibility and adaptability. One achievement of this system is the establishment of negotiation rules which allows fairness in rewarding customers. This should in turn lead to increased sales on the e-Commerce platform in marginalized areas and subsequently increased effectiveness of ICT4D for socio-economic development
APA, Harvard, Vancouver, ISO, and other styles
3

Dabous, Feras Taleb Abdel Rahman School of Information Systems Technology &amp Management UNSW. "A pattern based approach for the architectural design of e-business applications." Awarded by:University of New South Wales. School of Information Systems Technology and Management, 2005. http://handle.unsw.edu.au/1959.4/22047.

Full text
Abstract:
With the widespread use of the Internet and its associated technologies, enterprises have to evolve in the way they are conducting business. 'e-business applications' refer to a new class of distributed applications that involves the Internet as a communication platform. Each e-business application supports the full automation of business processes that can span across multiple enterprises. For a given application domain that involves e-business application development, a number of design decisions that best fullfil stakeholders requirements have to be made. One important issue is the reuse of functionality which exists within legacy systems that can belong to one or more enterprises within the same domain. Most existing design approaches are inadequate in supporting the exploration of all design combinations. Moreover, there is little work on how to identify the best design decisions systematically for a given application domain. In this thesis we present a pattern-based approach that addresses the architectural design of e-business applications. We identify a number of architectural patterns whose instantiation on a given design problem correspond to different architectural design alternatives. We also identify models that enable the estimation of quality attributes for such alternatives. Then we investigate and utilise methods to select the best pattern for a given design problem. We also describe the process of generating the alternative architectures, estimating their qualities, and then ranking them with respect to any quality attribute or a combination of quality attributes. We validate this approach on a real life case study in the area of capital markets. The case study concerns realistic e-business applications that rely on existing legacy applications. The validation exercise has produced predictions which have been compared with actual design decisions that have been made. The thesis also proposes a framework for the systematic identification of architectural patterns. An additional set of architectural patterns and their impact on the case study are discussed. The main contribution of this thesis is in the identification of patterns and quality attributes models for the architectural design of e-business applications that aid in the systematic selection of the most appropriate architectural pattern for a given problem context.
APA, Harvard, Vancouver, ISO, and other styles
4

Conradie, Pieter Wynand. "A semi-formal comparison between the Common Object Request Broker Architecture (COBRA) and the Distributed Component Object Model (DCOM)." Diss., 2000. http://hdl.handle.net/10500/17924.

Full text
Abstract:
The way in which application systems and software are built has changed dramatically over the past few years. This is mainly due to advances in hardware technology, programming languages, as well as the requirement to build better software application systems in less time. The importance of mondial (worldwide) communication between systems is also growing exponentially. People are using network-based applications daily, communicating not only locally, but also globally. The Internet, the global network, therefore plays a significant role in the development of new software. Distributed object computing is one of the computing paradigms that promise to solve the need to develop clienVserver application systems, communicating over heterogeneous environments. This study, of limited scope, concentrates on one crucial element without which distributed object computing cannot be implemented. This element is the communication software, also called middleware, which allows objects situated on different hardware platforms to communicate over a network. Two of the most important middleware standards for distributed object computing today are the Common Object Request Broker Architecture (CORBA) from the Object Management Group, and the Distributed Component Object Model (DCOM) from Microsoft Corporation. Each of these standards is implemented in commercially available products, allowing distributed objects to communicate over heterogeneous networks. In studying each of the middleware standards, a formal way of comparing CORBA and DCOM is presented, namely meta-modelling. For each of these two distributed object infrastructures (middleware), meta-models are constructed. Based on this uniform and unbiased approach, a comparison of the two distributed object infrastructures is then performed. The results are given as a set of tables in which the differences and similarities of each distributed object infrastructure are exhibited. By adopting this approach, errors caused by misunderstanding or misinterpretation are minimised. Consequently, an accurate and unbiased comparison between CORBA and DCOM is made possible, which constitutes the main aim of this dissertation.
Computing
M. Sc. (Computer Science)
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Electronic commerce Internet CORBA (Computer architecture)"

1

1935-, Flinn Donald, and Beznosov Konstantin, eds. Enterprise security with EJB and CORBA. J. Wiley & Sons, 2001.

APA, Harvard, Vancouver, ISO, and other styles
2

Infrastructure for electronic business on the Internet. Kluwer Academic Publishers, 2001.

APA, Harvard, Vancouver, ISO, and other styles
3

E-enterprise: Business models, architecture, and components. Cambridge University Press, 2000.

APA, Harvard, Vancouver, ISO, and other styles
4

Hoque, Faisal. E-enterprise: Business models, architecture, and components. Cambridge University Press, 2000.

APA, Harvard, Vancouver, ISO, and other styles
5

Glenn, Stokol, ed. Oracle 8i and Java: From client/server to e-commerce. Prentice Hall PTR, 2001.

APA, Harvard, Vancouver, ISO, and other styles
6

Brown, Ray. Designing solutions with COM+ technologies. Microsoft Press, 2001.

APA, Harvard, Vancouver, ISO, and other styles
7

Mohamed, Jmaiel, Charfi Anis, Graupner Sven, et al., eds. Service-Oriented Computing - ICSOC 2011 Workshops: ICSOC 2011, International Workshops WESOA, NFPSLAM-SOC, and Satellite Events, Paphos, Cyprus, December 5-8, 2011. Revised Selected Papers. Springer Berlin Heidelberg, 2012.

APA, Harvard, Vancouver, ISO, and other styles
8

Hartman, Bret, Donald J. Flinn, and Konstantin Beznosov. Enterprise Security with EJB and CORBA. Wiley & Sons, Incorporated, John, 2002.

APA, Harvard, Vancouver, ISO, and other styles
9

Hartman, Bret, Donald J. Flinn, and Konstantin Beznosov. Enterprise Security with EJB and CORBA(r). John Wiley & Sons, 2001.

APA, Harvard, Vancouver, ISO, and other styles
10

Cashin, Jerry. E-Commerce Success: Building a Global Business Architecture. Computer Technology Research Corporation, 1999.

APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography