Academic literature on the topic 'Selling – Data processing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Selling – Data processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Selling – Data processing"

1

Sujan, Mita, James R. Bettman, and Harish Sujan. "Effects of Consumer Expectations on Information Processing in Selling Encounters." Journal of Marketing Research 23, no. 4 (1986): 346–53. http://dx.doi.org/10.1177/002224378602300404.

Full text
Abstract:
The study findings suggest that prior expectations about salespeople affect how consumers process information in a selling situation. When the salesperson is seen as typical, product evaluations are unaffected by the quality of the product arguments cited. Thought listing and recall data provide additional support for the notion that analytical processing of information occurs only when the salesperson is discrepant from expectations.
APA, Harvard, Vancouver, ISO, and other styles
2

Husna, Amrah, Muhammad Khidri Alwi, and Winarno Arifin. "REKAYASA TEKNOLOGI PENGOLAHAN IKAN TEMBANG (Sardinella Sp) MENJADI BEBERAPA PRODUK KOMERSIL DALAM RANGKA MENINGKATKAN NILAI JUAL PRODUK PERIKANAN." JOURNAL OF INDONESIAN TROPICAL FISHERIES (JOINT-FISH) : Jurnal Akuakultur, Teknologi Dan Manajemen Perikanan Tangkap, Ilmu Kelautan 2, no. 1 (2019): 1–17. http://dx.doi.org/10.33096/joint-fish.v2i1.27.

Full text
Abstract:
The optimum effort effort in fishing activities and the actual level of utilization of tembangfish resources in the Makassar Strait waters are increasing every day.Based on the realityconditions above, in order to increase the selling value of tembang fish to further increase theincome of fishermen, engineering research on tembang fish processing technology is needed intoseveral commercial products with more modern processing methods and can be stored in arelatively long time and sell well on standard markets. national and international.The purpose ofthis study was to find out how the practical method of processing tembang fish into canned fish,fish sauce and fish silage, is a standard home industry that has high economic value and relativelylong lasting power. The urgency of this study is expected to be a basic knowledge of thecommunity in order to increase the selling value of tembang fish as a fishery product with higheconomic value that can improve the standard of living of the community.The processing methodcarried out is a combination of traditional methods and modern methods, including methods ofcooking, fermentation, salting, enzyme use, sterilization, and packaging systems to produceprocessed products that are of high quality and have high selling value. Data analysis to becarried out for quantitative data is analysis of variance (complete randomized design) and forqualitative data observed by organoleptic test and processed by descriptive method. Processedproducts produced in this study are fish sauce, canned fish and fish silage.
APA, Harvard, Vancouver, ISO, and other styles
3

Nfn, Amar ,., Tommy F. Lolowang, and Nordy F. L. Waney. "NILAI TAMBAH DARI USAHA PENGOLAHAN TEPUNG TERIGU MENJADI MARTABAK MARKOBAR KOTA MANADO." AGRI-SOSIOEKONOMI 14, no. 2 (2018): 35. http://dx.doi.org/10.35791/agrsosek.14.2.2018.20130.

Full text
Abstract:
This study aims to determine the magnitude: (1) the added value of flour business into martabak Markobar Manado (2) profit from flour processing business into martabak Markobar Manado City. The study was conducted in October to December 2017, located in Markobar Kota Manado. Data collection method is done by using primary data. Primary data was obtained through interviews with relevant parties based on a prepared list of questions, as well as on-site observations. Data analysis in this study using: 1) value-added analysis and 2) profit analysis with the formula π = TR - TC. The results showed that Markobar Manado process 3 types of martabak martabak 2 flavors, martabak 4 flavors and martabak 8 flavors. Number of martabak 2 taste processed ie 96 pieces with selling price per fruit of Rp. 50,000 so the total revenue is Rp.4.800.000. Number of martabak 4 flavors processed ie 144 fruit with the selling price per fruit of Rp. 80,000 so that the revenue received by Markobar is Rp.11.520.000. Number of martabak 8 taste processed ie 240 fruit with selling price per fruit of Rp. 100.00.000 so that the revenue received by Markobar is Rp.24.000.000 Profit business martabak 2 taste of Rp. 485,116.71, business profit martabak 4 taste of Rp. 5,297,675.07 and business profit martabak 8 taste of Rp. 9,322,791.78. Processing business martabak 2 flavors produce value added Rp 2,357,116.71, processing martabak 4 flavors produce value added Rp. 8,105,675.07 and martabak processing 8 flavors produce added value of Rp. 14,002,791.78.*eprm*.
APA, Harvard, Vancouver, ISO, and other styles
4

Dhio Saputra. "Goods Stock Management using the K-Means Algorithm Method." Jurnal Teknologi 10, no. 1 (2020): 22–45. http://dx.doi.org/10.35134/jitekin.v9i2.15.

Full text
Abstract:
The grouping of Mazaya products at PT. Bougenville Anugrah can still do manuals in calculating purchases, sales and product inventories. Requires time and data. For this reason, a research is needed to optimize the inventory of Mazaya goods by computerization. The method used in this research is K-Means Clustering on sales data of Mazaya products. The data processed is the purchase, sales and remaining inventory of Mazaya products in March to July 2019 totaling 40 pieces. Data is grouped into 3 clusters, namely cluster 0 for non-selling criteria, cluster 1 for best-selling criteria and cluster 2 for very best-selling criteria. The test results obtained are cluster 0 with 13 data, cluster 1 with 25 data and cluster 2 with 2 data. So to optimize inventory is to multiply goods in cluster 2, so as to save costs for management of Mazayaproducts that are not available. K-Means clustering method can be used for data processing using data mining in grouping data according to criteria.
APA, Harvard, Vancouver, ISO, and other styles
5

Aprianto, Nico, and Diah Ayu Candraningrum. "Pengaruh Personal Selling terhadap Minat Beli Produk PRUlink Generasi Baru Nasabah Prudential Life Assurance Indonesia." Prologia 3, no. 2 (2020): 313. http://dx.doi.org/10.24912/pr.v3i2.6348.

Full text
Abstract:
This study aims to examine how strong the influence of Personal Selling on Interest in Purchasing New Generation PRUlink products for Prudential Life Assurance Indonesia customers. The data of this study were obtained from the results of questionnaires of 153 Prudential Life Assurance Indonesia customers regarding interest in purchasing New Generation PRUlink products. In this study the research method used is quantitative which aims to test the instrument using the validity, reliability and normality test. The results of data processing using SPSS states that the variable Personal selling (X) influences significantly to the variable purchase interest (Y). Correlation coefficient test results explained there will be a strong relationship between Personal selling (X) to the variable buying interest (Y). Meanwhile, the dimensions that support the effectiveness of personal selling include ability approaching, presentation, handling objection, and closing. The ability to start communication, presenting products, being able to answer prospective customer questions, and close communication well, be an attraction for prospective customers to be the customer. Penelitian ini bertujuan untuk meneliti seberapa kuat pengaruh Personal Selling terhadap Minat Beli produk PRUlink Generasi Baru nasabah Prudential Life Assurance Indonesia. Data penelitian diperoleh melalui penyebaran kuesioner terhadap 153 nasabah Prudential Life Assurance Indonesia mengenai minat beli produk PRUlink Generasi Baru. Penelitian ini merupakan penelitian kuantitatif menggunakan metode survei. Pengujian instrumen berupa uji Validitas, Reliabilitas dan Normalitas. Pengolahan data menggunakan Statistical Package for Social Sciences (SPSS) dan memperoleh hasil bahwa variabel Personal selling (X) berpengaruh secara signifikan terhadap variabel Minat beli (Y). Hasil uji koefisien korelasi menjelaskan akan adanya hubungan yang kuat antara Personal selling (X) terhadap variabel Minat beli (Y). Adapun, dimensi yang mendukung efektivitas personal selling meliputi kemampuan pendekatan, presentasi, mengatasi keberatan, dan penutupan. Kemampuan dalam membuka komunikasi, mempresentasikan produk, mampu menjawab pertanyaan calon nasabah, dan menutup komunikasi dengan baik, sehingga mampu menarik calon nasabah membeli produk asuransi.
APA, Harvard, Vancouver, ISO, and other styles
6

Sunardi, Sunardi, and Sofiansyah Fadli. "SISTEM INFORMASI PENGOLAHAN DATA KELAPA SAWIT BERBASIS CLIENT-SERVER." Jurnal Manajemen Informatika dan Sistem Informasi 1, no. 2 (2018): 23. http://dx.doi.org/10.36595/misi.v1i2.44.

Full text
Abstract:
Currently the development of information technology increasingly widespread, this is in line with the development of computers that are increasingly rapidly. Various technologies can now be created so as to facilitate all human activity. Sophistication of information technology has now become one of the requirements that must be met in order to keep up with technology. Technology and information that can not be separated from one another. But now there are many companies that have not implemented such a system because they various things. One problem is the lack of knowledge about the company's computer system, resulting in the company using the manual method, for example in the process of data processing. In this case PT. Citra Riau Sarana as one of the companies engaged in plantations, especially in the buying and selling palm oil CPO (Crude Palm Oil), which is still occurring problems in the data processing is still manual, so experiencing difficulties and frequent errors in data processing. The method used is the method of data collection by observation, interviews, library research, design models described using data flow diagrams (DAD) and entity relationship diagram (ERD). This application was built using Delphi 7 and SQL Server 2005.
 Applications that use the Desktop and Client-Server based, hoped to use this application the Company may reduce the level of unwanted errors and speed up data processing.
APA, Harvard, Vancouver, ISO, and other styles
7

I.J Agabi and J.S Ibrahim. "Energy Evaluation and Processing Cost Reduction in Agudu Maize Processing Industry." International Journal of Engineering and Management Research 11, no. 1 (2021): 142–55. http://dx.doi.org/10.31033/ijemr.11.1.20.

Full text
Abstract:
This study evaluated energy consumption by Agudu Farms Limited (AFL) that processes maize and cassava into flour for human consumption. The objectives of study included to determine energy contribution to processing cost, to minimize the processing cost and to propose a new selling price per unit of sale of the product. The study materials included; a multi-meter, stopwatch, electrical appliances’ nameplates and bills, fuel purchased receipts, and production records. Data was collected through detailed energy audits and measurements of present electricity consumption. This data was converted into energy intensities, rates and costs, and analyzed. The monthly energy intensity plotted on bar charts using Microsoft excel and the results showed that diesel had the highest consumption variation of 3500 kWh/t, electricity 200kWh/t and labor 110 kWh/t. The percentage of energy contribution to processing cost was 33%. In monetary terms, the processing cost per hour of operation showed average value of ₦830. Whereas, the minimum production cost per hour using Tora software showed ₦767. The new product price per ten-kilogram (10kg) unit of sale of maize flour, using break-even analysis, showed ₦2864. The study observed that diesel contributed more to production cost than electricity and labor and therefore, recommended the setting up of an energy monitoring team to monitor procurement and control utilization of diesel to reduce production cost.
APA, Harvard, Vancouver, ISO, and other styles
8

Melati, Delila, and Titi Sri Wahyuni. "ASSOCIATION RULE DALAM MENENTUKAN CROSS-SELLING PRODUK MENGGUNAKAN ALGORITMA FP-GROWTH." Voteteknika (Vocational Teknik Elektronika dan Informatika) 7, no. 4 (2020): 102. http://dx.doi.org/10.24036/voteteknika.v7i4.106499.

Full text
Abstract:
Sales transaction data at Bigmart stored in a database will be able to become new knowledge if processed using the data mining process. In addition, inventory is also a problem that is being faced by Bigmart. Data mining is able to analyze data into information in the form of transaction patterns that are useful in increasing revenue, one of which is Cross-Selling products. Association rule is one of the data mining methods included in the Market Basket Analysis method. The algorithm used is the FP-Growth algorithm because it has the virtue of shorter time processing data. The pattern obtained is determined by the value of support (support) and the value of confidence (confidence). To find the association rules the FP-Growth algorithm is used. To get more accurate association rules, use the Weka 8.3 tool. There are 11 association rules obtained using the Weka 8.3 tool which is classified as a Stong Rule that meets the Minimum support value of 10% and Minimum confidence 80%. Keywords: Database, Cross-selling, Market Basket Analysis, Association Rule, FP-Growth
APA, Harvard, Vancouver, ISO, and other styles
9

Siregar, Victor Marudut Mulia. "SISTEM INFORMASI PEMBELIAN DAN PENJUALAN PAKAIAN PADA GALOENK DISTRO PEMATANGSIANTAR." JURNAL TEKNOLOGI INFORMASI 1, no. 2 (2018): 219. http://dx.doi.org/10.36294/jurti.v1i2.299.

Full text
Abstract:
Abstrack - Galoenk Distro is a store engaged in the sale of clothing in the city of Pematangsiantar. Processing data on the sale of goods on Galoenk distributions is still done by recording transactions manually on sales invoices and cash books, so that the control of clothing stock and the report making process is less efficient. The design of information systems for buying and selling clothing is done to overcome the inefficient data processing of purchases and sales at the store. This information system provides convenience in processing sales and purchase transactions and minimizes errors that occur in recording sales and sales data per period, so as to produce more precise and accurate sales and purchase reports. Keywords - Information Systems, Sales, Purchases, Efficient, Accurate, Distro
APA, Harvard, Vancouver, ISO, and other styles
10

Harjadi, Dikdik, and Dewi Fatmasari. "Implementation of Integrated Marketing Communication in Image of Private Higher Education." TRIKONOMIKA 16, no. 2 (2017): 63. http://dx.doi.org/10.23969/trikonomika.v16i2.638.

Full text
Abstract:
This study aimed to examine the implementation of integrated marketing communication conducted by private universities in Kuningan Regency and analyze the influence of integrated marketing communication performance which includes advertising, sales promotion, personal selling, public relation, and direct marketing on private university image. The method used was descriptive and verificative method conducted by collecting primary data in the field from private university students in Kuningan Regency. Based on the results of data processing and hypothesis testing, it was known that integrated marketing communication consisting of advertising, personal selling, sales promotion, public relation, and direct marketing simultaneously and partially had a positive and significant impact on private university image. The simultaneous influence is 38.7%, which meant there was still much influence outside the implementation of integrated marketing communication that affected private university image. The biggest influence was sales promotion.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Selling – Data processing"

1

"A study of frequent pattern and association rule mining: with applications in inventory update and marketing." 2004. http://library.cuhk.edu.hk/record=b5891887.

Full text
Abstract:
Wong, Chi-Wing.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.<br>Includes bibliographical references (leaves 149-153).<br>Abstracts in English and Chinese.<br>Abstract --- p.i<br>Acknowledgement --- p.iv<br>Chapter 1 --- Introduction --- p.1<br>Chapter 1.1 --- MPIS --- p.3<br>Chapter 1.2 --- ISM --- p.5<br>Chapter 1.3 --- MPIS and ISM --- p.5<br>Chapter 1.4 --- Thesis Organization --- p.6<br>Chapter 2 --- MPIS --- p.7<br>Chapter 2.1 --- Introduction --- p.7<br>Chapter 2.2 --- Related Work --- p.10<br>Chapter 2.2.1 --- Item Selection Related Work --- p.11<br>Chapter 2.3 --- Problem Definition --- p.22<br>Chapter 2.3.1 --- NP-hardness --- p.25<br>Chapter 2.4 --- Cross Selling Effect by Association Rules --- p.28<br>Chapter 2.5 --- Quadratic Programming Method --- p.32<br>Chapter 2.6 --- Algorithm MPIS_Alg --- p.41<br>Chapter 2.6.1 --- Overall Framework --- p.43<br>Chapter 2.6.2 --- Enhancement Step --- p.47<br>Chapter 2.6.3 --- Implementation Details --- p.48<br>Chapter 2.7 --- Genetic Algorithm --- p.60<br>Chapter 2.7.1 --- Crossover --- p.62<br>Chapter 2.7.2 --- Mutation --- p.64<br>Chapter 2.8 --- Performance Analysis --- p.64<br>Chapter 2.8.1 --- Preparation Phase --- p.65<br>Chapter 2.8.2 --- Main Phase --- p.69<br>Chapter 2.9 --- Experimental Result --- p.77<br>Chapter 2.9.1 --- Tools for Quadratic Programming --- p.77<br>Chapter 2.9.2 --- Partition Matrix Technique --- p.78<br>Chapter 2.9.3 --- Data Sets --- p.81<br>Chapter 2.9.4 --- Empirical Study for GA --- p.84<br>Chapter 2.9.5 --- Experimental Results --- p.92<br>Chapter 2.9.6 --- Scalability --- p.102<br>Chapter 2.10 --- Conclusion --- p.106<br>Chapter 3 --- ISM --- p.107<br>Chapter 3.1 --- Introduction --- p.107<br>Chapter 3.2 --- Related Work --- p.108<br>Chapter 3.2.1 --- Network Model --- p.108<br>Chapter 3.3 --- Problem Definition --- p.112<br>Chapter 3.4 --- Association Based Cross-Selling Effect --- p.117<br>Chapter 3.5 --- Quadratic Programming --- p.118<br>Chapter 3.5.1 --- Quadratic Form --- p.119<br>Chapter 3.5.2 --- Algorithm --- p.128<br>Chapter 3.5.3 --- Example --- p.129<br>Chapter 3.6 --- Hill-Climbing Approach --- p.134<br>Chapter 3.6.1 --- Efficient Calculation of Formula of Profit Gain --- p.134<br>Chapter 3.6.2 --- FP-tree Implementation --- p.135<br>Chapter 3.7 --- Empirical Study --- p.136<br>Chapter 3.7.1 --- Data Set --- p.137<br>Chapter 3.7.2 --- Experimental Results --- p.138<br>Chapter 3.8 --- Conclusion --- p.141<br>Chapter 4 --- Conclusion --- p.147<br>Bibliography --- p.153
APA, Harvard, Vancouver, ISO, and other styles
2

"Selling chain reengineering enabled by information technology: a case of data general corporation." Chinese University of Hong Kong, 1997. http://library.cuhk.edu.hk/record=b5889034.

Full text
Abstract:
by Leung Man-Wai, Dannie.<br>Thesis (M.B.A.)--Chinese University of Hong Kong, 1997.<br>Includes bibliographical references (leaves 68-70).<br>ABSTRACT --- p.i<br>TABLE OF CONTENTS --- p.ii<br>Chapter<br>Chapter I. --- INTRODUCTION --- p.1<br>Chapter II. --- METHODOLOGY --- p.5<br>Chapter III. --- LITERATURE REVIEW --- p.7<br>Reengineering --- p.7<br>What is Reengineering? --- p.7<br>Approaches to Reengineering --- p.10<br>The Role of Management in Reengineering --- p.11<br>Why Reengineering Project Failed and Succeeded? --- p.13<br>Relationship Between Reengineering and Information Technology --- p.14<br>Human Dimensions in Reengineering --- p.16<br>The Concept of Selling Chain Management --- p.18<br>Chapter IV. --- REENGINEERING THE SELLING CHAIN AT DATA GENERAL CORPORATION --- p.20<br>Company Background --- p.20<br>Call to Action --- p.21<br>The Reengineering Competency Group --- p.22<br>Reengineer the Selling Chain --- p.24<br>Problems Before Reengineering --- p.24<br>Three Phases of Reengineering --- p.27<br>Redesign Concepts Applied --- p.37<br>The Lessons Learnt --- p.38<br>The Reengineered Data General --- p.42<br>Critical Success Factors of Data General Reengineering --- p.42<br>Chapter V. --- TECHNOLOGY-ENABLED SELLING --- p.45<br>Aligning Technology-Enabled Selling with Selling Chain Management --- p.45<br>What Is Technology-Enabled Selling? --- p.46<br>The Impact of the Sales Organization on SCM --- p.46<br>A Transition in Customer Relationships --- p.47<br>Moving the Decision Point --- p.47<br>Fact-Based Presentation --- p.48<br>Optimizing the Selling Chain and Maximizing Profit --- p.49<br>The Building Blocks of Technology-Enabled Selling --- p.49<br>Opportunity Management System --- p.49<br>Marketing Information System --- p.50<br>Sales Configuration System --- p.51<br>Sales Order Management System --- p.53<br>The Interactive Selling System --- p.53<br>Which Building Block Should be Implemented First? --- p.54<br>Leveraging the Benefits of Technology-Enabled Selling --- p.55<br>Avoiding the Cost-Reduction Pitfall --- p.55<br>Understand the Market Force --- p.56<br>Demonstrating Customer Value --- p.57<br>Selling Models Consideration --- p.58<br>Chapter VI. --- REDESIGNING DATA GENERAL'S SELLING CHAIN IN ASIA --- p.62<br>Chapter VII. --- CONCLUSION --- p.67<br>BIBLIOGRAPHY --- p.68
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Selling – Data processing"

1

Wallis, Louis A. Computer-based sales force support. Conference Board, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Perera, Peter A. The sales un-process: Combining superior selling skills and powerful information technologies to accommodate how customers buy. Ip² Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Selden, Paul H. Sales process engineering: A personal workshop. ASQC Quality Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Practices, LLC Best. Best practices in sales force automation. Best Practices, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Scofield, Todd C. Sales automation: Concepts, justification, planning, and implementation. Amacom, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Supercharge your sales force: Applying the power of computers to get the best from your sales team. Probus Pub. Co., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Steve, Whitehead, ed. Double your sales commission using a personal computer. W.C. Brown, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

McMahon, Timothy F. Solving the sales manager/sales automation equation. Dartnell Corp., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pentland, Leslie. Salesbook spreadsheets: Sales management, cash management, general management. McGraw-Hill, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Computer-aided marketing and selling: Information asset management. Butterworth-Heinemann, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Selling – Data processing"

1

Samara, Konstantina. "Selling Personal Data." In Personal Data Protection and Legal Developments in the European Union. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9489-5.ch003.

Full text
Abstract:
The prevalent and currently unanimous European legal system regarding personal data comprises a set of protective rules, enshrining, amongst others, the prerequisites for lawful processing. The venture of the ensuing aims to examine, under the scope of both constitutional rules and the ius cogens provisions of the Regulation (EU) 2016/679, the validity of a transaction pertaining to the processing of personal data. The objective of the herein argumentation specifically focuses on the juridical act of selling personal data, in accordance with the principle of contractual freedom and its compatibility with the core of constitutional provisions, which safeguard human value. The correlations examined below are referred to the contractual interaction between the subject of the personal data and the data controller under the scope of a double facet approach of GDPR, as a legal system both personal and property oriented.
APA, Harvard, Vancouver, ISO, and other styles
2

Mishin, Andrey, and Polina Kisarina. "Calendar Spread Hedging Mechanism for Mining Companies." In Advances in Business Strategy and Competitive Advantage. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-0361-4.ch001.

Full text
Abstract:
This chapter attempts to answer the question of how much of its current production a mining company should hedge by forward selling by using a model that allows a company to determine the optimal (profit-maximising) hedge. The risk estimation model of company failure is based on the forward price of metals; the miner's operating costs is based on quantitative approach for mining companies. The chapter considers the transition to advanced digital, intelligent manufacturing technologies, robotic systems, the creation of systems for processing large amounts of data, machine learning, and artificial intelligence. The model calculates the present value of future income distributed as dividends in order to determine the value of the company from the perspective of the owner or investor, a multiple of the current value of the product. By simulating the work of several companies working with different levels of forward, it is possible to determine the relative profitability and survival in the market that allows one to determine the optimal hedging ratio.
APA, Harvard, Vancouver, ISO, and other styles
3

Potti, Ravi, and Swapnil Saurav. "Logistics for Global Automobile Manufacturing Industry." In Innovative Solutions for Implementing Global Supply Chains in Emerging Markets. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9795-9.ch008.

Full text
Abstract:
The automotive industry is truly a global industry. Manufacturing plant of the company is set up in one corner of the earth, sourcing the automobile parts from many companies located all over the globes, and selling the final product in another country. This leads to complex supply chain. Production strategies like just-in-time (JIT) and just-in-sequence (JIS) creates testing times but presents opportunities for the logistics management. But currently, the industry is going through a rough phase. Manufacturing costs are increasing, rise in fuel prices is having its own affect on the industry, competitive landscape is changing, and globalization presents new political and economic challenges. Currently, the company needs to manage its supply chains efficiently, reduce cost and improve the accuracy of processes delivery. Today, the automobile industry is facing significant other challenges due to complex logistics. Logistics is about co-coordinating various activities like materials handling, storage, inventory management, freight transport and the related information flow and processing in a way that meets customer requirements at minimum cost. This paper will talk about the current challenges, opportunities, growth drivers and future strategies of the companies' logistics management. It will also cover how companies are adapting to the changing economic environment. The study is based on the qualitative analysis of secondary data. The challenges and opportunities for the companies exist from the current operations management and risks of globalization. Authors have looked at the challenges and opportunities in detail in this chapter. Improving the organization's performance and securing competitive advantage over others greatly depends on the supply chain management as it is seen that the competition is no longer between the organizations, rather they are amongst supply chains. From the research, it has been found that companies believe that for sustainable transportation and logistics, green supply chain is a must for long term sustainability of the company. Companies finds export compliance to the emerging markets as another major challenge. Transport and warehouse systems are, more or less, stabilized and companies are looking to get most out of them. Though there is connectivity between automobile companies and its suppliers but information is not available real time and hence it's difficult to collaborate. Visibility into logistics has come out as the biggest need for the companies.
APA, Harvard, Vancouver, ISO, and other styles
4

Potti, Ravi, and Swapnil Saurav. "Logistics for Global Automobile Manufacturing Industry." In Supply Chain and Logistics Management. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0945-6.ch062.

Full text
Abstract:
The automotive industry is truly a global industry. Manufacturing plant of the company is set up in one corner of the earth, sourcing the automobile parts from many companies located all over the globes, and selling the final product in another country. This leads to complex supply chain. Production strategies like just-in-time (JIT) and just-in-sequence (JIS) creates testing times but presents opportunities for the logistics management. But currently, the industry is going through a rough phase. Manufacturing costs are increasing, rise in fuel prices is having its own affect on the industry, competitive landscape is changing, and globalization presents new political and economic challenges. Currently, the company needs to manage its supply chains efficiently, reduce cost and improve the accuracy of processes delivery. Today, the automobile industry is facing significant other challenges due to complex logistics. Logistics is about co-coordinating various activities like materials handling, storage, inventory management, freight transport and the related information flow and processing in a way that meets customer requirements at minimum cost. This paper will talk about the current challenges, opportunities, growth drivers and future strategies of the companies' logistics management. It will also cover how companies are adapting to the changing economic environment. The study is based on the qualitative analysis of secondary data. The challenges and opportunities for the companies exist from the current operations management and risks of globalization. Authors have looked at the challenges and opportunities in detail in this chapter. Improving the organization's performance and securing competitive advantage over others greatly depends on the supply chain management as it is seen that the competition is no longer between the organizations, rather they are amongst supply chains. From the research, it has been found that companies believe that for sustainable transportation and logistics, green supply chain is a must for long term sustainability of the company. Companies finds export compliance to the emerging markets as another major challenge. Transport and warehouse systems are, more or less, stabilized and companies are looking to get most out of them. Though there is connectivity between automobile companies and its suppliers but information is not available real time and hence it's difficult to collaborate. Visibility into logistics has come out as the biggest need for the companies.
APA, Harvard, Vancouver, ISO, and other styles
5

Alkadi, Ihssan. "Assessing Security with Regard to Cloud Applications in STEM Education." In Advances in Educational Technologies and Instructional Design. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9924-3.ch017.

Full text
Abstract:
There are many steps involved with securing a cloud system and its applications (SaaS) and developed ones in (PaaS). Security and privacy issues represent the biggest concerns to moving services to external clouds (Public). With cloud computing, data are stored and delivered across the Internet. The owner of the data does not have control or even know where their data are being stored. Additionally, in a multi-tenant environment, it may be very difficult for a cloud service provider to provide the level of isolation and associated guarantees that are possible with an environment dedicated to a single customer. Unfortunately, to develop a security algorithm that outlines and maps out the enforcement of a security policy and procedure can be a daunting task. A good security algorithm presents a strategy to counter the vulnerabilities in a cloud system. This chapter covers the complete overview, comparative analysis of security methods in Cloud Applications in STEM Education and the introduction of a new methodology that will enforce cloud computing security against breaches and intrusions. Much light will be shed on existing methodologies of security on servers used for cloud applications in STEM education and storage of data, and several methods will be presented in addition to the newly developed method of security in cloud-based servers, such as the MIST (Alkadi). Not only can cloud networks be used to gather sensitive information on multiple platforms, also there are needs to prevent common attacks through weak password recovery, retrieval, authentication, and hardening systems; otherwise hackers will spread cyber mayhem. Discussion of current security issues and algorithms in a real world will be presented. Different technologies are being created and in constant competition to meet the demands of users who are generally “busy”. The selling point of these technologies is the ability to address these demands without adding more to any workloads. One of the demands often discussed is that users want to have their digital information accessible from anywhere at any time. This information includes documents, audio libraries, and more. Users also demand the ability to manage, edit and update this information regardless of physical location. Somewhat recently, mobile devices such as laptops, tablets, and smartphones have provided these abilities. This is no small feat as vendors and providers have reduced the size of these devices to increase mobility. However, as the amount of personal information that users are wanting to access has grown exponentially, manipulation and storage of it require more capable devices. To meet increased demands, increasing the capabilities of mobile devices may be impractical. Making mobile devices more powerful without technological advancement would require that the device be larger and use more resources such as battery life and processing power to function properly. Storing all of a user's information on a mobile device that travels everywhere also adds vulnerability risks. The best technical solution to having a user's information accessible is some sort of online storage where there is the convenience to store, manipulate and retrieve data. This is one of the most practical applications for the concept of cloud computing in STEM education. As storage capabilities and Internet bandwidth has increased, so has the amount of personal data that users store online. And today, the average user has billions of bytes of data online. Access is everywhere and whenever is needed. As everyone started doing so, people want their data safe and secure to maintain their privacy. As the user base grew in size, the number of security issues of the personal data started to become increasingly important. As soon as someone's data are in the remote server, unwanted users or “hackers” can have many opportunities to compromise the data. As the online server needs to be up and running all the time, the only way to secure the cloud server is by using better passwords by every user. By the same token, the flaws in the password authentication and protection system can also help unwanted users to get their way to other people's personal data. Thus, the password authentication system should also be free from any loopholes and vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
6

Alkadi, Ihssan. "Assessing Security With Regard to Cloud Applications in STEM Education." In Cyber Security and Threats. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch014.

Full text
Abstract:
There are many steps involved with securing a cloud system and its applications (SaaS) and developed ones in (PaaS). Security and privacy issues represent the biggest concerns to moving services to external clouds (Public). With cloud computing, data are stored and delivered across the Internet. The owner of the data does not have control or even know where their data are being stored. Additionally, in a multi-tenant environment, it may be very difficult for a cloud service provider to provide the level of isolation and associated guarantees that are possible with an environment dedicated to a single customer. Unfortunately, to develop a security algorithm that outlines and maps out the enforcement of a security policy and procedure can be a daunting task. A good security algorithm presents a strategy to counter the vulnerabilities in a cloud system. This chapter covers the complete overview, comparative analysis of security methods in Cloud Applications in STEM Education and the introduction of a new methodology that will enforce cloud computing security against breaches and intrusions. Much light will be shed on existing methodologies of security on servers used for cloud applications in STEM education and storage of data, and several methods will be presented in addition to the newly developed method of security in cloud-based servers, such as the MIST (Alkadi). Not only can cloud networks be used to gather sensitive information on multiple platforms, also there are needs to prevent common attacks through weak password recovery, retrieval, authentication, and hardening systems; otherwise hackers will spread cyber mayhem. Discussion of current security issues and algorithms in a real world will be presented. Different technologies are being created and in constant competition to meet the demands of users who are generally “busy”. The selling point of these technologies is the ability to address these demands without adding more to any workloads. One of the demands often discussed is that users want to have their digital information accessible from anywhere at any time. This information includes documents, audio libraries, and more. Users also demand the ability to manage, edit and update this information regardless of physical location. Somewhat recently, mobile devices such as laptops, tablets, and smartphones have provided these abilities. This is no small feat as vendors and providers have reduced the size of these devices to increase mobility. However, as the amount of personal information that users are wanting to access has grown exponentially, manipulation and storage of it require more capable devices. To meet increased demands, increasing the capabilities of mobile devices may be impractical. Making mobile devices more powerful without technological advancement would require that the device be larger and use more resources such as battery life and processing power to function properly. Storing all of a user's information on a mobile device that travels everywhere also adds vulnerability risks. The best technical solution to having a user's information accessible is some sort of online storage where there is the convenience to store, manipulate and retrieve data. This is one of the most practical applications for the concept of cloud computing in STEM education. As storage capabilities and Internet bandwidth has increased, so has the amount of personal data that users store online. And today, the average user has billions of bytes of data online. Access is everywhere and whenever is needed. As everyone started doing so, people want their data safe and secure to maintain their privacy. As the user base grew in size, the number of security issues of the personal data started to become increasingly important. As soon as someone's data are in the remote server, unwanted users or “hackers” can have many opportunities to compromise the data. As the online server needs to be up and running all the time, the only way to secure the cloud server is by using better passwords by every user. By the same token, the flaws in the password authentication and protection system can also help unwanted users to get their way to other people's personal data. Thus, the password authentication system should also be free from any loopholes and vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
7

Dasgupta, Prithviraj, Louise E. Moser, and P. Michael Melliar-Smith. "Dynamic Pricing for E-Commerce." In Electronic Business. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-056-1.ch025.

Full text
Abstract:
Over the last decade, e-commerce has significantly changed the traditional forms of interaction among humans in conducting business by automating business processes over the Internet. Early seller Web sites consisted of passive text-based catalogs of products that could be manually browsed by potential customers. Online passive catalogs were soon replaced by dynamically updated catalogs containing detailed product descriptions using combinations of text and images that could be searched in various formats and according to different search criteria. E-commerce techniques used by sellers for operations such as price setting, negotiation, and payment have matured from manual off-line processing of sales data to automated algorithms that dynamically determine prices and profits for sellers. Modern e-commerce processes for trading goods between buyers and sellers can be divided into five stages: search, valuation, negotiation, payment, and delivery. Depending on the type of market in which the goods are traded, some of the above stages are more important than others. There are three principal market models that are used for online trading. The most common market model used by online sellers for trading goods over the Internet is the posted-price market model. The other two market models, the auction model (Sandholm, Suri, Gilpin, &amp; Levine, 2002) and the marketplace model (Chavez &amp; Maes, 1996), are used for markets in which niche or specialty items with sporadic or uncertain demand are traded. In the posted-price market model, a seller announces the price of a product on its Web site. Buyers visiting the seller’s Web site request a quote from the seller. The seller responds with a quote in response to the buyers’ requests, and the buyers examine the seller’s quote to make a purchase decision. Unlike auctions and market places, products traded in posted-price markets are no-niche items and exhibit continuous demand over time. The Web site of online book merchant Amazon (http://www.amazon.com) is an example of a posted-price market. A buyer interested in a particular book enters the necessary information through a form on Amazon’s Web site to request the price of the book and receives the price in response. Modern seller Web sites employ automated techniques for the different stages of e-commerce. Intermediaries called intelligent agents are used to automate trading processes by implementing different algorithms for selling products. For example, Web sites such as MySimon (http://www. mysimon.com) and PriceGrabber (http://www. pricegrabber.com) automate the search stage by employing the services of intelligent agents called shopbots. Shopbots enable buyers to make an informed purchase decision by comparing the prices and other attributes of products from thousands of online sellers. Automated price comparison by buyers has resulted in increased competition among sellers. Sellers have responded to this challenge by using intelligent agents called pricebots that dynamically determine the price of a product in response to varying market conditions and buyers’ preferences. Intelligent agents are also used to enable other e-commerce processes, such as supply-chain management and automated negotiation. In this article, we focus on the different algorithms that sellers’ pricebots can use for the dynamic pricing of goods in posted-price markets.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography