Academic literature on the topic 'Electronic commerce. Microsoft .NET'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic commerce. Microsoft .NET.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic commerce. Microsoft .NET"

1

Chu, Chengyun. "Introduction to Microsoft .NET Security." IEEE Security & Privacy Magazine 6, no. 6 (November 2008): 73–78. http://dx.doi.org/10.1109/msp.2008.146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Hong. "Residential Property Management Electronic System Design and Implementation." Applied Mechanics and Materials 411-414 (September 2013): 2622–25. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.2622.

Full text
Abstract:
This article focuses on the "sun garden residential property management system design and realization of the development process, from feasibility studies to the system put into use in the documentation. Object-oriented analysis and design methods and tools, and advanced. NET technologies that described the system design and implementation. Development of this system. Net Framework 3.5-based platform using the ASP.NET + SQL Server 2005, six-story mode (GM layer, physical layer, interface layer, data access layer, business layer, presentation layer) to develop generic layer is mainly complete global support functions, the physical layer is responsible for packaging and delivery of data in the entire system, the interface layer is responsible for defining interfaces, data access layer is responsible for the interaction with the data source, data insert, delete, modify, and read data from the database operation, the business layer is responsible for business logic processing, responsible for the logical data generation, processing and conversion, the presentation layer is responsible for receiving user data, the output presented to the user, and access security authentication. Development environment for the Microsoft Visual Studio NET 2008. Use the Microsoft Visual Studio NET 2008 to achieve the logic code.
APA, Harvard, Vancouver, ISO, and other styles
3

Aldridge, David. "Purchasing on the Net - The New Opportunities for Electronic Commerce." Electronic Markets 8, no. 1 (1998): 34–37. http://dx.doi.org/10.1080/10196789800000010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bracci, Margherita, Oronzo Parlangeli, Michele Mariani, and Sebastiano Bagnara. "Understanding the User in Electronic Commerce." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 44, no. 12 (July 2000): 2–563. http://dx.doi.org/10.1177/154193120004401232.

Full text
Abstract:
Electronic commerce has rapidly become a reality giving rise to significant changes in the relationship between vendor/client and thus deserving a deep analysis. In the present scenario, businesses are called upon to provide products that are becoming more and more like services, and the client is invited to enter into a form of relationship marketing. In reference to this aspect of the development of electronic commerce, the present paper proposes a taxonomy of user/client behavior with reference to three factors a) the behavior of users in regard to the supplier of products b) the behavior of users within the Net c) the way in which users process the information content of messages elaborated by product supplier.
APA, Harvard, Vancouver, ISO, and other styles
5

Yakal, Kathy. "Working the net: Electronic commerce: not yet booming but strong beginnings." netWorker 1, no. 3 (November 1997): 23–27. http://dx.doi.org/10.1145/344509.344531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kemal, A. R. "Electronic Commerce and International Trade of Pakistan." Pakistan Development Review 37, no. 4II (December 1, 1998): 849–59. http://dx.doi.org/10.30541/v37i4iipp.849-859.

Full text
Abstract:
The international trade theories assume complete information on demand, supply, prices, product specification and technologies but such assumptions generally do not hold. In particular information is inadequate for both the importers and exporters to make optimal choices. Obviously countries with elaborate information mechanism move closer to their export and import potential than those who lack such mechanism. It is therefore, no wonder that the governments help producers in organising exhibitions, fairs etc for introducing their products. The advent of information technology, e.g. e-mail, Internet and Web sites, provides easy access to information. It provides an opportunity to introduce products and assess the demand for the products and at the same time allows importers to reach the minimum cost source. This also allows the producers to acquire technologies and explore the possibilities of subcontracting. Needless to add that the expanded net work affects disproportionately different producers and different countries; it depends on the intensity of use of electronic commerce
APA, Harvard, Vancouver, ISO, and other styles
7

Miajee, Md Rezaul Karim. "SET for E-commerce Transactions." American International Journal of Sciences and Engineering Research 1, no. 1 (November 30, 2018): 13–15. http://dx.doi.org/10.46545/aijser.v1i1.22.

Full text
Abstract:
The Secure Electronic Transaction (SET) is a convention intended for ensuring Visa exchanges over the Internet. It is an industry-supported standard that was shaped by Master Card and Visa (going about as the administering body) in February 1996. To advance the SET standard all through the installments network, exhortation and help for its improvement have been given by IBM, GTE, Microsoft, Netscape, RSA, SAIC, Terisa and VeriSign. SET depends on cryptography and X.509 v3 computerized certificates to guarantee message confidentiality and security. SET is the main Internet exchange convention to give security through validation. It battles the danger of exchange data being changed in travel by keeping data safely encoded consistently and by utilizing computerized certificates to confirm the personality of those getting to installment points of interest. The specifications of and approaches to encourage secure installment card exchanges on the Internet are completely investigated in this paper.
APA, Harvard, Vancouver, ISO, and other styles
8

Sussex, Roland, and Peter White. "Electronic Networking." Annual Review of Applied Linguistics 16 (March 1996): 200–225. http://dx.doi.org/10.1017/s0267190500001513.

Full text
Abstract:
In Physical terms, the Net—a term used generically—is a global system of computer linked by optical cable, telephone connections, microwave, and satellites. It comprises a number of individual networks, from LANs (Local Area Networks in individual institutions) to the largest, the Internet. (See Appendix Glossary for terminology explanations.) In January 1993, the Matrix News estimated that the Net comprised 2,152,000 host computers and 18,150,000 users. Now, in mid-1995, these figures are 3,500,000 host computers and 55 million users world-wide. From its beginnings in the U.S. military establishment, it now reaches into education, research, business and commerce, government, and private use. France is connecting its entire education system to the Internet. And the U.S.A. is leading the way not only in numbers of connections to the Internet, but also in providing access for non-university education fields. The Net is arguably the most dramatic new communications technology of the latter part of the 20th century.
APA, Harvard, Vancouver, ISO, and other styles
9

Buck, S. Peter. "From electronic money to electronic cash: payment on the Net." Logistics Information Management 10, no. 6 (December 1, 1997): 289–99. http://dx.doi.org/10.1108/09576059710187429.

Full text
Abstract:
The discussion of online payments, while ultimately being a key issue for the future Information SuperHighway, is as significant now as it ever will be. The explosive increase in the use of the Internet has seen the emergence of commercial services and pressures previously restricted to Compuserve and the like. Many predictions see this burgeoning electronic marketplace becoming a significant component of the world economy. However this can only happen once two key problems have been addressed, namely, protecting property rights and Making payments. This has led to a frantic battle for payment mechanisms that can provide the new medium with the means of conducting transactions. Briefly examines the inexorable evolution of money into electronic forms and discusses the alternative types of payment mechanisms proposed, on trial or in use on the Internet. Identifies the key commercial requirements that successful use of the Internet will impose on a payment mechanism, and use these requirements to evaluate each of the mechanisms to determine which (if any) are really suitable for electronic commerce.
APA, Harvard, Vancouver, ISO, and other styles
10

Odeh, Mahmoud, and Mohammad Yousef. "Effect of Covid-19 on the electronic payment system: usage level trust and competence perspectives." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (May 1, 2021): 1144. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp1144-1155.

Full text
Abstract:
<span style="font-size: 9pt; font-family: 'Times New Roman', serif;">Covid-19 has dramatically spread globally and dramatically made several effects in almost all sectors. Electronic commerce and electronic payment systems are important sectors which affected directly by the Covid-19 pandemic. Online markets and electronic payment systems have been recognized as one of the fastest-growing technology in the last decade even within normal situations. However, several factors may influence such growth, which many consider as barriers or enablers of using the electronic payment system. This study aims to shed the light on the influence of Covid-19 on the electronic payment system from trust and competence perspectives. The study employed both qualitative and quantitative methodological approaches for data collection and analysis. The data was collected from 31 semi-structured interviews, 718 surveys, and annual reports. NVivo, Microsoft Visio, and Microsoft power business intelligence were used for the data analysis process. As a part of this study, a proposed framework has been developed which includes both technical and managerial parts.</span>
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Electronic commerce. Microsoft .NET"

1

Singh, Gurinder Jit. "Development of an E-commerce web application using .NET technology." [Chico, Calif. : California State University, Chico], 2009. http://hdl.handle.net/10211.4/103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dou, Jie. "Evaluating Microsoft .NET technology: Implementation online store." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3060.

Full text
Abstract:
The purpose of this project is to design, develop and implement an e-commerce shopping cart system based on Microsoft.NET technology and to evaluate ASP.NET technology by developing a shopping cart system.
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Yan. "E-Marketing of Virtual Products Based onE-Commerce : A Case Study in Net Game Company." Thesis, Karlstad University, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-5584.

Full text
Abstract:

This essay is about the E-marketing of virtual products based on ElectronicCommerce. With the development of the network technology, the improvement ofElectronic Commerce is necessary. The E-Commerce is become more and morepopular with the wide usage of Internet in our daily life. The traditional marketingstrategy is not enough. Hence, I think we should pay more attention on E-Marketingstrategy and earn profits from E-Commerce.The foundation of Electronic Commerce and the development of ChineseElectronic Commerce are introduced in the thesis as well. There is also a discussionthe some concrete methods how to do the marketing of the virtual products based onthe E-Commerce in the thesis, such as software. For the software manufacturers,through the free download and try it attracts users. After the users know about and arefamiliar with the function of software, or after tasting some useful sweet, the furtheruse of the software should be required to do payment to the manufacturerIn particular, take the famous net game Mir2, as an example. We elaborate theE-marketing tactics and some related questions of the net game that is a form ofvirtual products. The typical method is to use New Marketing Group Strategy, “4C”that Customer Want, Convenient, Cost and Communication in the marketing process.I think this case is the typical example to demonstrate the importance of NewMarketing Group Strategy compared with Traditional Marketing Group Strategy,Product, Price, Promotion and Place. When you combine 4P strategy and 4C strategytogether, it will be effective.

APA, Harvard, Vancouver, ISO, and other styles
4

Danzfuss, Theodor Werner. "The technology of casually connected collaboration." Diss., Pretoria : [s.n.], 2009. http://upetd.up.ac.za/thesis/available/etd-11232009-181958/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rama, Jiten. "The design of a protocol for collaboration in a distributed repository - Nomad." Diss., Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-07052007-093209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Electronic commerce on the net: the readiness and challenge of Hong Kong." 1999. http://library.cuhk.edu.hk/record=b5889455.

Full text
Abstract:
by Chan Ka Ching Marina.
Thesis (M.B.A.)--Chinese University of Hong Kong, 1999.
Includes bibliographical references (leaves [52-53]).
ABSTRACT --- p.i
TABLE OF CONTENTS --- p.iii
UST OF FIGURES --- p.v
LIST OF TABLES --- p.vi
Chapter 1. --- INTRODUCTION --- p.1
General Organization of the Dissertation --- p.1
Wave of Electronic Commerce --- p.2
What is Electronic Commerce --- p.3
Development of the Internet in Hong Kong --- p.3
Electronic Commerce Opportunities in Hong Kong --- p.5
Chapter 2. --- RESEARCH METHODOLOGY --- p.8
Literature Review --- p.8
Previous studies and surveys --- p.8
Survey Questionnaires --- p.8
Focus Group - IT consultants specialized in implementing e-commerce --- p.9
Chapter 3. --- PURPOSE OF STUDY --- p.11
Chapter 4. --- LITERATURE REVIEW --- p.12
Chapter 5. --- RESULT OF SURVEYS AND IMPLICATIONS --- p.17
Consumers' readiness and acceptance of e-commerce --- p.17
Demographic Characters of the Respondents --- p.19
"Knowledge on Computer, the Internet and Electronic Commerce" --- p.20
Current Usage of Computer and the Internet --- p.22
Acceptance and Participation in Internet-based Commercial Activities --- p.23
Government Support --- p.25
Summary and Implications --- p.26
Companies' readiness and acceptance of e-commerce --- p.30
Company Profile of the Responding Companies --- p.31
Current Usage of Computer --- p.31
Current Usage of Electronic Commerce --- p.32
Obstacles in applying Electronic Commerce --- p.32
Summary and Implications --- p.34
Chapter 6. --- FINDINGS FROM FOCUS GROUP --- p.36
Past Success --- p.36
Lack of Strategy --- p.37
High Initial Cost --- p.37
Chapter 7. --- ANALYSIS AND RECOMMENDATION --- p.38
Security and Privacy Concerns and Lack of Trust --- p.38
Companies Strategies/Visions on using Internet Commerce --- p.41
Interface for on-line shops --- p.43
IT Professionals --- p.44
IT Culture --- p.45
High Initial Investment Cost --- p.47
Chapter 8. --- CONCLUSION --- p.50
REFERENCE
APPENDIX A SURVEY ON CONSUMER ACCEPTANCE OF ELECTRONIC COMMERCE ON THE NTERNET
APPENDIX B SURVEY ON ELECTRONIC COMMERCE OF LOCAL COMPANIES
APPENDIX C RESULTS OF SURVEY ON READINESS AND ACCEPTANCE OF CONSUMERS ON ELECTRONIC COMMERCE
APPENDIX D RESULTS OF SURVEY ON READINESS AND ACCEPTANCE OF LOCAL COMPANIES ON ELECTRONIC COMMERCE
APA, Harvard, Vancouver, ISO, and other styles
7

Johnston, James. "A framework for secure human computer interaction." Thesis, 2008. http://hdl.handle.net/10210/493.

Full text
Abstract:
This research is concerned with the development of a framework for the analysis and design of interfaces found in a security environment. An example of such an interface is a firewall. The purpose of this research is to use the framework as a method to improve the usability of an interface, thus aiding the user to implement the correct security features. The purpose is also to use the framework to assist in the development of trust between a user and a computer system. In this research the framework comprises six criteria which are used to analyse interfaces found in the traditional software environment, Internet banking environment and e-commerce environment. In order to develop the framework an overview of the fields of information security and human computer interfaces (HCI) is given. The overview provides background information and also establishes the existing research which has been done in these fields. Due to its popularity, the Windows Internet Connection Firewall is analysed in this research. Based on the criteria a level of trust fostered between the user and interface is calculated for the firewall. It is then shown how this level of trust can be improved by modifying the interface. A proposed interface for the firewall is presented according to the criteria. Interfaces found in the online Internet environment are discussed. This is important in order to identify the similarities and differences between traditional software interfaces and web interfaces. Due to these differences the criteria are modified to be relevant in the analysis and design of security interfaces found on the Internet. Three South African online banking websites are analysed according to the modified framework. Each interface is broken down into a number of components which are then analysed individually. The results of the analysis are compared between the three banking sites to identify the elements which make up a successful interface in an online banking environment. Lastly, three interfaces of e-commerce websites are analysed. Recommendations are made on how the interfaces can be improved, thus leading to a higher level of trust.
Labuschagne, L., Prof.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Electronic commerce. Microsoft .NET"

1

Bentrum, Jason. Building e-commerce sites with the .NET framework. Indianapolis, Ind: Sams, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Implementing B2B commerce with .NET: A guide for programmers and technical managers. Boston: Addison-Wesley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1961-, Snowman Geoff, ed. Pro business activity monitoring in BizTalk 2009. Berkeley, CA: Apress, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bloom, Barry. Deploying and managing Microsoft.NET Web farms. Indianapolis, Ind: SAMS, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Preul, Wyatt L. Professional Community Server. New York: John Wiley & Sons, Ltd., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Karli, Watson, and SpringerLink (Online service), eds. Beginning ASP.NET E-Commerce in C#: From Novice to Professional. Berkeley, CA: Apress, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

(Firm), Net Genesis. Build a World Wide Web commerce center: Plan, program, and manage Internet commerce for your company. New York: Wiley, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

James, Naftel, and Williams Kim, eds. Microsoft .Net remoting. Redmond, WA: Microsoft Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gunderloy, Mike. .Net e-commerce programming. San Francisco, CA: Sybex, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barnaby, Tom. Distributed .NET programming in VB .NET. Berkeley, CA: Apress, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Electronic commerce. Microsoft .NET"

1

Edelheit, J. A., and M. R. Miller. "Electronic Commerce Comes to the ‘Net’." In The Internet and Beyond, 25–37. Dordrecht: Springer Netherlands, 1998. http://dx.doi.org/10.1007/978-94-011-4918-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ji, Shujuan, Qijia Tian, and Yongquan Liang. "A Petri-Net-Based Modeling Framework for Automated Negotiation Protocols in Electronic Commerce." In Multi-Agent Systems for Society, 324–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03339-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Lei-da, and Gordon W. Skelton. "Mobile Application Development I." In Mobile Commerce Application Development, 270–307. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-806-2.ch010.

Full text
Abstract:
n the previous chapter on mobile application development, we developed an order placement system (OPS) using Microsoft Embedded Visual Basic (EVB). Although EVB provides developers with the basic tools for developing mobile applications, it has many limitations. Microsoft Visual Studio .NET 2003 addresses these limitations by including tools for developing smart device applications. Using these tools, developers can create mobile applications for PocketPCs or other Windows CE devices with relative ease and flexibility. Similar to EVB, Visual Studio .NET uses a form-based approach to build applications and provides developers with WYSIWYG tools for user interface development, but as you will find in this chapter, it not only provides many new tools to enrich the application but also simplifies many tasks that are cumbersome in EVB (i.e., creating menus and interacting with databases). Furthermore, Visual Studio .NET allows developers to use a number of different programming languages including Visual Basic and C# to develop applications so that developers can leverage their existing programming skill sets. To illustrate how Visual Studio .NET can be deployed to develop mobile applications, we will develop an upgraded version of the OPS in this chapter. In order to provide a better comparison between Visual Studio .NET and EVB, we will use Visual Basic as the programming language in this project.
APA, Harvard, Vancouver, ISO, and other styles
4

Hedley, Steve. "Surfing the Net." In The Law of Electronic Commerce and the Internet in the UK and Ireland, 207–42. Routledge-Cavendish, 2017. http://dx.doi.org/10.4324/9781843148555-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Lei-da, and Gordon W. Skelton. "Dynamic Wireless Application Development II." In Mobile Commerce Application Development, 193–227. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-806-2.ch008.

Full text
Abstract:
In the previous chapter, we created an m-business application using ColdFusion. Besides ColdFusion, many other development tools can be used to develop m-business applications. Visual Studio .NET, an integrated development environment by Microsoft, has become an increasingly popular corporate applicationdevelopment tool due to its ease of use and support for a wide range of programming languages. Besides traditional Windows and Web applications, Visual Studio .NET also allows developers to build mobile and wireless applications with relative ease. The focus of this chapter is to discuss the tools and techniques for developing wireless applications using Visual Studio .NET. Wireless applications are developed using the ASP .NET Mobile Web Application template. The template provides developers with WYSIWYG tools for creating user interfaces for various mobile devices. These tools work seamlessly with ASP.NET, which uses a form-based approach to build server-side applications for processing user requests and interacting with databases. In this chapter, we will develop a business-to-consumter wireless application using Visual Studio .NET.
APA, Harvard, Vancouver, ISO, and other styles
6

Targowski, Andrew. "Enterprise Electronization and Integration." In Electronic Enterprise, 190–248. IGI Global, 2003. http://dx.doi.org/10.4018/978-1-93177-777-3.ch005.

Full text
Abstract:
The goal of the electronic enterprise is to implement all major applications to build the extended enterprise that functions as a paperless organization, whose units and workers process information and communicate via all layers of the Enterprise Information Infrastructure (look at Chapter 3). The strategy of the e-enterprise development is the integration of all business and application components via the Internet or intranet/extranet environment (“electronization”). The e-enterprise evolves from the net-commerce, based on EDI (1980’s/1990’s), the e-commerce stage (1997) and its follower - the e-business stage (1999), as a result of the electronization and integration of all enterprise applications.
APA, Harvard, Vancouver, ISO, and other styles
7

Gupta, Jatinder N. D., and Sushil K. Sharma. "Cyber Shopping and Privacy." In Managing Business with Electronic Commerce, 235–49. IGI Global, 2002. http://dx.doi.org/10.4018/978-1-930708-12-9.ch014.

Full text
Abstract:
At times, privacy issues are perceived as a part of security issues, therefore, let us differentiate them. Security refers to the integrity of the data storage, processing and transmitting system and includes concerns about the reliability of hardware and software, the protection against intrusion or infiltration by unauthorized users. Privacy, on the other hand, refers to controlling the dissemination and use of data, including information that is knowingly or unknowingly disclosed. Privacy could also be the by-product of the information technologies themselves (Cate, 1997). Over the past decade, numerous surveys conducted around the world have found consistently high levels of concern about privacy. Many studies (Dorney, 1997; Allard, 1998; Harris and Westin, 1999) found that more than 80% of Net users are concerned about threats to their privacy while online. The Federal Trade Commission discovered (Privacy online: A report to Congress/Federal Trade Commission, United States, Federal Trade Commission, 1998) that many Web sites collect personal information and release the same without the users’ knowledge and permission. There are methods (Adam et al., 1996; Verton, 2000; Wen, 2001; McGuire, 2000; Feghhi, 1999) that make cyber shopping secure, although consumers may still have concerns about security aspects of cyber shopping. How can one keep information about his/her Internet browsing habits to oneself? It’s a challenge in this era of technological advancements. In this chapter, we focus exclusively on privacy issues that arise in cyber shopping. In the recent past, many articles on privacy have appeared in journals. In this chapter, we review these publications on privacy.
APA, Harvard, Vancouver, ISO, and other styles
8

Karoui, Kamel, and Fakher Ben Ftima. "Effectiveness of Web Services." In Electronic Services, 1754–62. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-967-5.ch106.

Full text
Abstract:
With the development of the Internet, the number of people buying, selling, and performing transactions is expected to increase at a phenomenal rate. The emergence of e-commerce applications has resulted in new net-centric business models. This has created a need for new ways of structuring applications to provide cost-effective and scalable models. Mobile Agents (MA) systems are seen as a promising paradigm for the design and implementation of distributed applications, including e-commerce. MA are also useful in applications requiring distributed information retrieval because they move the location of execution closer to the data to be processed. While MA have generated considerable excitement among the research community, they have not been applied into a significant number of real applications. Web services (WS) are emerging as a dominant paradigm for constructing distributed business applications and enabling enterprise-wide interoperability. A critical factor to the overall utility of WS is a scalable, flexible and robust discovery mechanism; an application can be built by integrating multiple services together to make a more efficient service. WS represent a major development in the e-commerce sector. They enable companies to capitalize on their existing architecture by making their application services accessible via the Internet. The application of MA and WS technologies to e-commerce will provide a new way to conduct business-to-business (B2B), business-to-consumer (B2C), and consumer-to-consumer transactions (C2C) and facilitate the communication between heterogeneous environments. In this article, we first focus on these two technologies of actuality and show their integration in an e-commerce system. Second, we present different kinds of interaction between MA and WS and study their effect on application performance. We also study an example that illustrates an e-commerce system including three categories of transactions: -Shopping transactions: a customer delegates one MA for research and purchase of articles online. The MA will interact with available WS to find the article and its best price. -Salesman transactions: to valorize their products, WS will invoke MA to make publicity for the customers. -Auction transactions: for this type of transaction, a MA (respectively a WS) can sell and buy a product from/to others MA (WS) by auction. Finally, we conclude with a discussion on our inferences and their implications. This work is structured as follows: Section “background” reviews the notions of e-commerce system, WS and MA paradigms. Section “Web services and mobile agents’ technologies on e-commerce system” presents the integration of these two paradigms on the e-commerce system. In section “performance evaluation,” we evaluate the performances of our approach and we study an illustrated example in the section “a case study.” The section “future trends” presents our future perspectives and we end this work with the “conclusion” in the last section.
APA, Harvard, Vancouver, ISO, and other styles
9

"Design of Model Management System Architecture Based on Model Net." In International Symposium on Information Engineering and Electronic Commerce, 3rd (IEEC 2011), 214–17. ASME Press, 2011. http://dx.doi.org/10.1115/1.859759.paper51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Design and Implementation of the Product Information Display System Based on .NET." In International Symposium on Information Engineering and Electronic Commerce, 3rd (IEEC 2011), 433–36. ASME Press, 2011. http://dx.doi.org/10.1115/1.859759.paper106.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Electronic commerce. Microsoft .NET"

1

Gong, Hongqi, Lihua Li, Guangyong Sun, and Hongyu Zhao. "Automating Microsoft Office Word in Visual Basic." In 2009 Second International Symposium on Electronic Commerce and Security. IEEE, 2009. http://dx.doi.org/10.1109/isecs.2009.193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Han-xia, Liu, and Li Rong-jun. "Responsibility of Net-bank in Electronic Payment." In 2008 International Symposium on Electronic Commerce and Security. IEEE, 2008. http://dx.doi.org/10.1109/isecs.2008.133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xia, Chuanliang. "Fairness Analysis of Petri Synthesis Net." In 2010 Third International Symposiums on Electronic Commerce and Security (ISECS). IEEE, 2010. http://dx.doi.org/10.1109/isecs.2010.46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cheng, Qiaolian, Ruijin Zhang, and Yezhuang Tian. "Study on Information Technology Capabilities based on Value Net Theory." In 2008 International Symposium on Electronic Commerce and Security. IEEE, 2008. http://dx.doi.org/10.1109/isecs.2008.203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cai, Lizhi, Jua Zhang, and Zhenyu Liu. "Generating Test Cases Using Colored Petri Net." In 2010 2nd International Symposium on Information Engineering and Electronic Commerce (IEEC). IEEE, 2010. http://dx.doi.org/10.1109/ieec.2010.5533237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ruo-Fei, Han, Wang Hou-Xiang, Xiao Qian, Jing Xiao-Pei, and Li Hui. "Service Oriented Decentralized Access Control for Military Systems in Net-Centric Environment." In 2009 Second International Symposium on Electronic Commerce and Security. IEEE, 2009. http://dx.doi.org/10.1109/isecs.2009.154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Xinnian, and Yixiang Chen. "Research of the Computer Network Architecture Based on Meta-Net." In 2010 2nd International Symposium on Information Engineering and Electronic Commerce (IEEC). IEEE, 2010. http://dx.doi.org/10.1109/ieec.2010.5533190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chenghua, Yan, and Chen Qixiang. "Using a Fuzzy-Petri-Net-Based Approach for the Offshore Weather Prediction." In 2009 International Conference on Electronic Commerce and Business Intelligence, ECBI. IEEE, 2009. http://dx.doi.org/10.1109/ecbi.2009.43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yan Wang and Yinjie Cao. "Digital image processing methods based on Visual C#.NET." In 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC). IEEE, 2011. http://dx.doi.org/10.1109/aimsec.2011.6010731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Maoping Zhou and Saiqun Zou. "On human capital investment of financial decisions in high and new tech enterprises based on net present value method." In 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC). IEEE, 2011. http://dx.doi.org/10.1109/aimsec.2011.6009857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography