![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer software packages > General
Applications of Data Mining to Electronic Commerce brings together in one place important contributions and up-to-date research results in this fast moving area. Applications of Data Mining to Electronic Commerce serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.
A research agenda for collaborative networks Purpose. Many practical application experiments and pilot cases nowadays provide evidence on what works and what still remains as a challenge for collaborative networked organizations (CNOs). The fast evolution of the information and communication technologies and in particular the so-called Internet technologies, also represents an important motivator for the emergence of new forms of collaboration. However, most efforts in this area are highly fragmented, considering only some partial facets and not a holistic perspective that would be required. We are therefore at a point in which it is necessary to define much more consolidated and sustainable research strategies for a second phase of research and development in this area. This book addresses the main disciplines involved in CNOs. It further synthesizes the views and opinions expressed by a large number of visionaries from the main disciplines involved in CNOs, and offers a comprehensive set of recommendations for the establishment of a research agenda on collaborative networks. As recognized experts in their specific areas, different authors in this book have presented work that is backed by a large number of research results, each focusing on specific facets of collaborative networks, and coming out of a large number of international and national projects.
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 1-7, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.
This book constitutes the refereed proceedings of the 15th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2012, held in Kuching, Sarawak, Malaysia, in September 2012. The conference was collocated with the 12th Pacific Rim International Conference on Artificial Intelligence, PRICAI. The 17 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on foundations, auctions and negotiation, coalition formation and teamwork, norms and institutions, and applications.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management.
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.
As a foreword, here we publish an email letter of Late Professor Herb Simon, Nobel Laureate, that he wrote on the occasion ofthe death of the fatherofa friend. This letterofcondolence, more than any other wisdom, tells about the essence of the process of scientific creation, which is so important for both, the specific subject being covered by this book, and for the general science. When asked to address an SSGRR conference in Italy, prior to his death, Professor Herb Simon agreed that these lines be presented to all those who are interested in understanding the real essence oftheir own scientific struggle. Dear Professor Milutinovic: I want to extend my deepest sympathy to you and your family on the death of your father. His career was a very distinguished one, and his life spanned a most complex and difficult sequence of epochs in your country's history. Our generation (I am just a year younger than he was), like all its predecessors, leaves many tasks - hopefully no more than it inherited - for the next generation to take up; but even knowing that it must be so does not remove one's senseofloss in the parting.
This two-volume set LNCS 6771 and 6772 constitutes the refereed proceedings of the Symposium on Human Interface 2011, held in Orlando, FL, USA in July 2011 in the framework of the 14th International Conference on Human-Computer Interaction, HCII 2011 with 10 other thematically similar conferences. The 137 revised papers presented in the two volumes were carefully reviewed and selected from numerous submissions. The papers accepted for presentation thoroughly cover the thematic area of human interface and the management of information. The 75 papers of this first volume address the following major topics: design and development methods and tools; information and user interfaces design; visualisation techniques and applications; security and privacy; touch and gesture interfaces; adaption and personalisation; and measuring and recognising human behavior.
E-Business has become a fact for almost all companies. But what are the key technologies for economically successful e-commerce? In this book readers will find all concepts that will coin tomorrow's e-business: virtual sales assistants (shopbots), personalized web pages, electronic market places, vendor managed inventory, virtual organizations, supply chain management. Both technical and economic issues of these concepts are discussed in detail. Leading-edge real world applications are presented that will shape e-business mid-term. This book is a must-read for managers or technical consultants as well as researchers needing in-depth information for strategic business decisions.
Foundations of Web Technology covers the basics of Web technology while being specialized enough to add value to experienced professionals working in this field. Most books on the Web focus on programmatic aspects of languages such as Java, JavaScript, or description of standards such as Hypertext Markup Language (HTML) or Wireless Markup Language (WML). A book that covers the concepts behind the infrastructure of the Web would be indispensable to a wide range of audiences interested in learning how the Web works, how techniques in Web technology can be applied to their own problem, and what the emergent technological trends in these areas are.
This book constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin, China, in August 2012. The 65 revised full papers presented were carefully reviewed and selected from 231 submissions. The papers feature contemporary research on developments in the fields of e-business technology, information management systems, and business strategy. Topics addressed are latest development on e-business technology, computer science and software engineering for e-business, e-business and e-commerce applications, social networking and social engineering for e-business, e-business strategic management and economics development, e-business education, entrepreneurship and e-learning, digital economy strategy, as well as internet and e-commerce policy.
The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012. The 87 revised full papers presented were carefully reviewed and selected from 418 submissions. The papers are organized in topical sections on applications of Web information systems; applications of Web mining; e-government and e-commerce; information security; intelligent networked systems; management information systems; mobile computing; semantic Web and ontologies; Web information extraction; Web intelligence; Web interfaces and applications; and XML and semi-structured data.
This book contains the thoroughly refereed and revised best papers from the 7th International Conference on Web Information Systems and Technologies, WEBIST 2011, held in Nordwijkerhout, The Netherlands, in May 2011, organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), in collaboration with ACM SIGMIS and co-sponsored by the Workflow Management Coalition (WFMC). The 12 papers presented in this book were carefully reviewed and selected from 156 submissions. The papers are grouped into tow parts on "Internet Technology" and "Web Interfaces and Applications". In addition, the three invited presentations are also included.
Enterprise IT infrastructure is getting increasingly complex. With the increase in complexity has arisen the need to manage it. Management in general can be seen as the process of assuring that a managed entity meets its expectations in a controlled and predictable manner. Examples of managed entities are not only components, entire systems, processes, but also people such as employees, developers, or operators, and entire organizations. Traditional management has addressed some of these issues in varied manner. The emergence of Web services has added a new complexity to the management problem and poses a new set of problems. But it also adds to the mix a set of technologies that will make the task of management simpler. Management of Web services will be critical as businesses come to rely on them as a substantial source of their revenue. The book tries to cover the broad area of web services, the concepts, implications for the enterprise, issues involved in their management and how they are being used for management themselves. The book is intended as a reference for current practice and future directions for web services and their management. The book is directed at: * Computing professionals, academicians and students to learn about the important concepts behind the web services paradigm and how it impacts the enterprise in general and how it affects traditional application, network and system management.
This book includes 23 papers dealing with the impact of modern information and communication technologies that support a wide variety of communities: local communities, virtual communities, and communities of practice, such as knowledge communities and scientific communities. The volume is the result of the second multidisciplinary "Communities and Technologies Conference," a major event in this emerging research field. The various chapters discuss how communities are affected by technologies, and how understanding of the way that communities function can be used in improving information systems design. This state of the art overview will be of interest to computer and information scientists, social scientists and practitioners alike.
E-commerce has passed through a number of stages in the minds of most readers of the daily press. Initially it was the province of the specialist and considered almost irrelevant to the needs and activities of everyday life - companies looking for venture capital in this area had little if any chance of obtaining sufficient funds from the rather conservative investors who provided the only source of start-up capital. Then came the dot. com boom -and suddenly e-commerce was the most exciting topic possible Venture capital was available from every possible source and almost any company with a . com in its name could be assured of instant funding on request. This boom was, inevitably, followed by the dot. com bust and the press wamed that the days of e-commerce were gone, perhaps never to return. This apparently confusing 'stages of growth' model is in reality nothing ofthe sort. E-commerce is simply the logical outcome of combining computers with tele communications networks. The astonishing changes which a global economy has brought with it are reflected in the changes to the way we do business which are increasingly synonymous with e-commerce. Indeed, the term e-commerce itself is coming to mean only the transaction-based component of e-business-'any process that a business organisation conducts over a computer-mediated network' as Thomas Mesenbourg ofthe U. S. Census Bureau said in 1999."
Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system. Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted recovery, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Database trusted recovery faces a set of unique challenges. In particular, trusted database recovery is complicated mainly by (a) the presence of benign transactions that depend, directly or indirectly on malicious transactions; and (b) the requirement by many mission-critical database applications that trusted recovery should be done on-the-fly without blocking the execution of new user transactions. Trusted Recovery And Defensive Information Warfare proposes a new model and a set of innovative algorithms for database trusted recovery. Both read-write dependency based and semantics based trusted recovery algorithms are proposed. Both static and dynamic database trusted recovery algorithms are proposed. These algorithms can typically save a lot of work by innocent users and can satisfy a variety of attack recovery requirements of real world database applications. Trusted Recovery And Defensive Information Warfare is suitable as a secondary text for a graduate level course in computer science, and as a reference for researchers and practitioners in information security.
Mobile Information Systems II provides a collection of research on the planning, analysis, design, construction, modification, implementation, utilization, evaluation, and management of mobile information systems. The articles focus on the implications of this research in the world of commerce, and address technical issues and constraints on mobile information systems functionalities and design.
One of the fast growing elements of the Internet is electronic commerce, which refers to the use of electronic means to conduct business transactions within or across business entities. Nearly 80 percent of all Fortune 500 companies have been doing their core business through the Internet. Many issues, and societal implications of electronic commerce, are the subjects of recent research. A supply chain consists of all the entities and activities that enable the production, distribution, and delivery of products and services to consumers. Research in designing and managing supply chains has rapidly expanded during the last decade. In addition, increased and accessible computing power and modeling capabilities have spurred this growth, enabling researchers to simultaneously consider the many interrelated variables and decisions of a supply chain in a single tractable model.
The use of the internet for commerce has spawned a variety of
auctions, marketplaces, and exchanges for trading everything from
bandwidth to books. Mechanisms for bidding agents, dynamic pricing,
and combinatorial bids are being implemented in support of
internet-based auctions, giving rise to new versions of
optimization and resource allocation models. This volume, a
collection of papers from an IMA "Hot Topics" workshop in internet
auctions, includes descriptions of real and proposed auctions,
complete with mathematical model formulations, theoretical results,
solution approaches, and computational studies.
This book records one of the continuous attempts of the IFIP Working Group 8. 2, studying the interaction of information systems and the organization, to explore and understand the shifting boundaries and dependencies between organizational activities and their computer support. The book marks the result of the IFIP WG 8. 2 conference on "Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges. " Since its inception in the late 1970s, IFIP WG 8. 2 has sought to understand how computer-based information systems interact and must be designed as an integrated part of the organizational design. At that time, information systems handled repetitive and remote back-office functions and the main concern was work task design for repetitive input tasks and the potential impact of improved information support on organizational decision-making and structure. The focus of the information system design shifted in the 1980s when computers became part of the furniture and moved into the office. Reflecting this significant change, IFIP WG 8. 2 in 1989 organized a conference dedicated to the design and impact of desktop technology in order to examine how organizational processes and the locus of action changed when the computer was moved into the office. Sixteen years later, we are experiencing another significant change. Computers are now becoming part of our body and sensory system and will move out of the traditional office locations and into the wilderness. Again, IFIP WG 8.
2.1 E-Government: e-Governance and e-Democracy The term Electronic Government (e-Government), as an expression, was coined after the example of Electronic Commerce. In spite of being a relatively recent expression, e-Government designates a field of activity that has been with us for several decades and which has attained a high level of penetration in many countries2. What has been observed over the recent years is a shift on the broadness of the e-Government concept. The ideas inside e-Governance and e- Democracy are to some extent promising big changes in public administration. The demand now is not only simply delivering a service - line. It is to deliver complex and new services, which are all citizen-centric. Another important demand is related to the improvement of citizen's participation in governmental processes and decisions so that the governments' transparency and legitimacy are enforced. In order to fulfill these new demands, a lot of research has been done over the recent years (see Section 3) but many challenges are still to be faced, not only in the technological field, but also in the political and social aspects.
Knowledge-Based Information Retrieval and Filtering from the Web
contains fifteen chapters, contributed by leading international
researchers, addressing the matter of information retrieval,
filtering and management of the information on the Internet. The
research presented deals with the need to find proper solutions for
the description of the information found on the Internet, the
description of the information consumers need, the algorithms for
retrieving documents (and indirectly, the information embedded in
them), and the presentation of the information found. The chapters
include:
Electronic payment is the economic backbone of all e-commerce transactions. This book covers the major subjects related to e-payment such as, for example, public key infrastructure, smart cards, payment agents, digital cash, SET protocols, and micro-payment. Its first part covers the infrastructure for secure e-payment over the Internet, whereas in the second part a variety of e-payment methods and systems are described. This edited volume offers a well-written and sound technical
overview of the state of the art in e-payment for e-business
developers, graduate students, and consultants. It is also ideally
suited for classes and training courses in e-commerce or
e-payment. |
You may like...
College Technology Survival Kit
Marianne Daugharthy, Alanna Duley
Paperback
AI-Driven Intelligent Models for…
Samala Nagaraj, Korupalli V Rajesh Kumar
Hardcover
R6,199
Discovery Miles 61 990
Developing Curriculum for Emergency…
Susana Silva, Paula Peres, …
Hardcover
R5,370
Discovery Miles 53 700
Diverse Perspectives and…
Thomas M. Connolly, Petros Papadopoulos, …
Hardcover
R8,550
Discovery Miles 85 500
|