oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
A Framework for Effective User Interface Design for Web-Based Electronic Commerce Applications  [PDF]
Justyna Burns,Gregory R Madey
Informing Science The International Journal of an Emerging Transdiscipline , 2001,
Abstract: Efficient delivery of relevant product information is increasingly becoming the central basis of competition between firms. The interface design represents the central component for successful information delivery to consumers. However, interface design for web-based information systems is probably more an art than a science at this point in time. Much research is needed to understand properties of an effective interface for electronic commerce. This paper develops a framework identifying the relationship between user factors, the role of the user interface and overall system success for web-based electronic commerce. The paper argues that web-based systems for electronic commerce have some similar properties to decision support systems (DSS) and adapts an established DSS framework to the electronic commerce domain. Based on a limited amount of research studying web browser interface design, the framework identifies areas of research needed and outlines possible relationships between consumer characteristics, interface design attributes and measures of overall system success.
Reuse of existing applications during the development of Enterprise Portals integrating Web Services  [PDF]
Mohamed Gharzouli
Computer Science , 2013,
Abstract: During these last years, the use of the web technologies in the enterprises becomes an essential factor to define a new business model. Among these technologies, web services and enterprise portals have gathered to integrate existing heterogeneous systems such as e-commerce, eservices hub and e-learning. However, the design and the modeling of the portals, on the one hand, and their integration with the existing applications, on the other hand, are still two points open for discussion. The first problem is related to the development of the lifecycle that can be used for designing and modeling the enterprise portals. For the second problem, which is the integration of the existing applications, the discussion is intended towards the use of technologies based on web services. In This paper, we present a software engineering solution for the development of Web services-based enterprise portals.
E-Commerce Applications Ranking  [PDF]
Marilena DUMITRACHE
Informatica Economica Journal , 2010,
Abstract: The paper presents the cycle of development of e-Commerce applications. The e-commerce applications are analyzed being considered to be a subject for complex evaluations. A set of criteria and factors are presented being considered relevant for e-commerce applications used in complex assessments. A ranking algorithm is proposed based on the AHP (Analytic Hierarchy Process) process, which was implemented and tested with online application IAID. The objective of this paper is to build, implement and test this algorithm with the online application IAID.
ISO- Effective Quality Implementation Tool  [cached]
Mr.Sohan S.Chitlange,Mr.hemant I. Pawar,Mr.Santosh S. Bhujbal,Ms.Anupama A. Suralkar
Pharmaceutical Reviews , 2006,
Abstract: ISO is “International organization for standardization”. Need of ISO 9001; 2000 certification is for competitive advantage, to improve customer demand, to protect business, for new prospects, for easy and cost effectiveness, quality for government contracts, increased creatibility and to develop new customers.Preparation of policy and procedures manuals, their implementation, i.e., it say what you do and do what you say’’ are necessary for achieving certification of ISO 9001; 2000.The advantages of ISO certification are better product design, to improve product quality and credibility, efficient utilization of men, machines and materials resulting in higher productivity, creation of quality, awareness and greater jog satisfaction among employees, improving the company’s quality culture, reduction in scrap, rework and customer complaints and it also inspires confidence in existing / potential customer that company is capable of delivering quality goods and services.Meaning of ISO 1,2Because “International organization for standardization “would have differs abbreviations in different languages (IOS in English, ‘OIN ‘in French for organization internationale de normalisation), it was decided at the outset to use a word derived from the Greek isos, meaning ‘equal ‘. Therefore, whatever the country, whatever the language, the short form of the organization’s name is always ISO.
PKI and Its Applications in E-Commerce in China  [cached]
Qing-hai BAI
Advances in Natural Science , 2010, DOI: 10.3968/916
Abstract: PKI system supports user authentication, message transmission, data integrity, message storage confidentiality, and the non-repudiation of operation. PKI can completely address e-commerce security requirements and PKI technology has been applied successfully in e-commerce as well. This article studies the system compositions of e-commerce, briefly analyzes e-commerce’s applications in various countries, and highlights PKI and its applications in e-commerce in China. Keywords: Public Key Infrastructure; E-commerce; application
Mobile Commerce and Applications: An Exploratory Study and Review  [PDF]
Khawar Hameed,Kamran Ahsan,Weijun Yang
Computer Science , 2010,
Abstract: Mobile commerce is enabling the development of additional revenue streams for organizations through the delivery of chargeable mobile services. According to the European Information Technology Observatory, the total amount of revenue generated by mobile commerce was reported to be less than {\pounds}9 million in the United Kingdom in 2001. By 2005 this had, at least, doubled and more recent industry forecasts project significant global growth in this area. Mobile commerce creates a range of business opportunities and new revenue streams for businesses across industry sectors via the deployment of innovative services, applications and associated information content. This paper presents a review of mobile commerce business models and their importance for the creation of mobile commerce solutions.
Ubiquitous Commerce: Theories, Technologies, and Applications  [cached]
Liyi Zhang,Qihua Liu,Xinjian Li
Journal of Networks , 2009, DOI: 10.4304/jnw.4.4.271-278
Abstract: With the rapid development of ubiquitous computing and mobile communication technologies, the traditional business model will change drastically. As a logical extension of e-commerce and m-commerce, ubiquitous commerce (u-commerce) research and application are currently under transition with a history of numerous tried and failed solutions, and a future of promising but yet uncertain possibilities with potential new technology innovations. At this point of the development, we propose a suitable framework and organize the u-commerce research under the proposed classification scheme. The current situation outlined by the scheme has been addressed by exploratory and early phase studies. We hope the findings of this research will provide useful insights for anyone who is interested in u-commerce. The paper also provides some future directions for research.
Analysis of Formal Methods for Specification of E-Commerce Applications  [PDF]
SADIQ ALI KHAN, HUMA JAMSHED
Mehran University Research Journal of Engineering and Technology , 2016,
Abstract: E-commerce based application characteristics portray elevated dynamics while incorporating decentralized nature. Extreme emphasis influencing structural design plus implementation, positions such applications highly appreciated. Significant research articles reveal that, applying formal methods addressing challenges incumbent with E-commerce based applications, contribute towards reliability and robustness obliging the system. Anticipating and designing sturdy e-process and concurrent implementation, allows application behavior extra strength against errors, frauds and hacking, minimizing program faults during application operations. Programmers find extreme difficulty guaranteeing correct processing under all circumstances, however, not impossible. Concealed flaws and errors, triggered only under unexpected and unanticipated scenarios, pilot subtle mistakes and appalling failures. Code authors utilize various formal methods for reducing these flaws. Mentioning prominent methods would include, ASM (Abstract State Machines), B-Method, z-Language, UML (Unified Modelling Language) etc. This paper primarily focuses different formal methods applied while deliberating specification and verification techniques for cost effective
Applications of Data Mining to Electronic Commerce  [PDF]
Ron Kohavi,Foster Provost
Computer Science , 2000,
Abstract: Electronic commerce is emerging as the killer domain for data mining technology. The following are five desiderata for success. Seldom are they they all present in one data mining application. 1. Data with rich descriptions. For example, wide customer records with many potentially useful fields allow data mining algorithms to search beyond obvious correlations. 2. A large volume of data. The large model spaces corresponding to rich data demand many training instances to build reliable models. 3. Controlled and reliable data collection. Manual data entry and integration from legacy systems both are notoriously problematic; fully automated collection is considerably better. 4. The ability to evaluate results. Substantial, demonstrable return on investment can be very convincing. 5. Ease of integration with existing processes. Even if pilot studies show potential benefit, deploying automated solutions to previously manual processes is rife with pitfalls. Building a system to take advantage of the mined knowledge can be a substantial undertaking. Furthermore, one often must deal with social and political issues involved in the automation of a previously manual business process.
Information Security Techniques and Applications in E-commerce System  [cached]
Hao Lv
International Journal of Business and Management , 2009,
Abstract: The applications of E-commerce rely on the security of communication net foundations. A secure E-commerce system must satisfy the essential demands of information security, integrality, being undeniable and available and keeping bargainer’s identity certifiable. Therefore, all kinds of techniques for information security should be applied, including the data encryption, digital digest, digital signature and digital ID etc. The wide application of these techniques into the secure transaction standards would insure the secure development of E-commerce.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.