Current Search: Electronic commerce -- Management (x)
View All Items
- Title
- Factors separating winners and losers in e-business.
- Creator
- O'Leary, Bay, Florida Atlantic University, Korgaonkar, Pradeep
- Abstract/Description
-
The rapid growth and integration of the Internet as a communication and commercial medium into our society and economy has changed both in many ways. This dissertation is an exploratory study of factors deemed significant in the context of e-business success or failure. A survey instrument is used in addition to qualitative data was gathered from in-depth interviews. Drawing upon the literature from the area of new business in brick and mortar (B&M) firms, an examination of the factors that...
Show moreThe rapid growth and integration of the Internet as a communication and commercial medium into our society and economy has changed both in many ways. This dissertation is an exploratory study of factors deemed significant in the context of e-business success or failure. A survey instrument is used in addition to qualitative data was gathered from in-depth interviews. Drawing upon the literature from the area of new business in brick and mortar (B&M) firms, an examination of the factors that lead to the success or failure of new brick and mortar businesses are examined in terms of new e business companies. Also examined in this study are the business strategies that an e-commerce site should be addressing to avoid failure factors and the types of e-business models that have been employed and have proven to be successful or destructive to an e-business. In an attempt to understand the marketing and managerial implications for the success or failure of an e-business, seven factors are included in the study which have been selected from a group of factors found to be significant in several studies on the factors leading to the success or failure of small businesses in the brick and mortar world and factors which may be considered relevant to an e-business. These are; management factors, entrepreneur factors, product/service factors, marketing factors, market factors, financial factors, and Web site design and efficiency factors.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/12060
- Subject Headings
- Electronic Commerce, Internet Marketing, Electronic Commerce--Management, Entrepreneurship
- Format
- Document (PDF)
- Title
- Key management in mobile ad hoc networks.
- Creator
- Wu, Bing., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In...
Show moreIn mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node's available resources and the dynamic nature of network topology. We proposed a secure and efficient key management framework (SEKM) for MANETs. SEKM builds a PKI by applying a secret sharing scheme and using an underlying multicast server groups. In SEKM, each server group creates a view of the certificate authority (CA) and provides certificate update service for all nodes, including the servers themselves. Motivated by the distributed key management service, we introduced k-Anycast concept and proposed three k-anycast routing schemes for MANETs. k-anycast is proposed to deliver a packet to any threshold k members of a set of hosts. Our goal is to reduce the routing control messages and network delay to reach any k servers. The first scheme is called controlled flooding. The second scheme, called component-based scheme I, is to form multiple components such that each component has at least k members. The third scheme, called component-based scheme II, in which the membership a component maintains is relaxed to be less than k. Collaborative and group-oriented applications in MANETs is an active research area. Group key management is a central building block in securing group communications in MANETs. However, group key management for large and dynamic groups in MANETs is a difficult problem. We propose a simple and efficient group key management scheme that we named SEGK for MANETs, which is based on n-party Diffie-Hellman (DH). The basic idea of our scheme is that a physical multicast tree is formed in MANETs for efficiency. To achieve fault tolerance, double multicast trees are constructed and maintained. A group coordinator computes and distributes intermediate keying materials to all members through multicast tree links. All group members take turns acting as group coordinator and distributing the workload of group rekeying during any change of group membership. Every group member computes the group key in a distributed manner.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12234
- Subject Headings
- Electronic commerce--Technological innovations, Mobile commerce--Technological innovations, Wireless communication systems--Management, Mobile communication systems--Management
- Format
- Document (PDF)
- Title
- Validating the search, experience, and credence product classification framework in a model of patronage intentions.
- Creator
- Girard, Tulay., Florida Atlantic University, Korgaonkar, Pradeep
- Abstract/Description
-
Although the Internet as a shopping medium provides convenience to easily access products, the U.S. e-commerce retail sales still make up a very small percentage of the U.S. total retail sales. To better understand what influences consumers' choices to shop for products or services on the Internet versus local retail stores, this study tests the influence of antecedent factors of consumer patronage intentions for Internet and local retail stores. The study draws the antecedent factors from...
Show moreAlthough the Internet as a shopping medium provides convenience to easily access products, the U.S. e-commerce retail sales still make up a very small percentage of the U.S. total retail sales. To better understand what influences consumers' choices to shop for products or services on the Internet versus local retail stores, this study tests the influence of antecedent factors of consumer patronage intentions for Internet and local retail stores. The study draws the antecedent factors from the extant literature, which include product classes, the importance consumers place on retailer attributes, and consumer perceived risk in product classes. Because the Internet instituted a convenient shopping medium with information distribution and search capabilities, nomological validity of the search, experience, and credence (SEC) product classification framework is tested in the online shopping context. This study tests the validity of the SEC product classification framework by examining whether significant differences exist in (1) the level of importance that consumers place on retailer attributes, (2) the amount and type of risks that online shoppers perceive in product classes (search, experience, and credence), and (3) their patronage intentions for two retailer types---Internet and local retail stores---based on product classes. In the same model, the study also tests the mediating effects of perceived risk in product classes in the relationship between the importance of retailer attributes and patronage intentions for retailer types. Although the relationships between some of the antecedent factors of patronage intentions have been tested in previous studies, they have never been tested jointly in the context of Internet shopping. Data were collected in three stages. The first two stages were the pretest studies that were conducted to select products as examples to represent each product category. The hypotheses were tested using data collected from a nationwide survey of those who previously purchased products or services on the Internet. The results of the analyses support the hypotheses.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/12142
- Subject Headings
- Marketing--Planning, Consumer behavior, Retail trade--Management, Consumers' preferences--Longitudinal studies, Electronic commerce
- Format
- Document (PDF)
- Title
- Evolving Legacy Software Systems with a Resource and Performance-Sensitive Autonomic Interaction Manager.
- Creator
- Mulcahy, James J., Huang, Shihong, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Retaining business value in a legacy commercial enterprise resource planning system today often entails more than just maintaining the software to preserve existing functionality. This type of system tends to represent a significant capital investment that may not be easily scrapped, replaced, or re-engineered without considerable expense. A legacy system may need to be frequently extended to impart new behavior as stakeholder business goals and technical requirements evolve. Legacy ERP...
Show moreRetaining business value in a legacy commercial enterprise resource planning system today often entails more than just maintaining the software to preserve existing functionality. This type of system tends to represent a significant capital investment that may not be easily scrapped, replaced, or re-engineered without considerable expense. A legacy system may need to be frequently extended to impart new behavior as stakeholder business goals and technical requirements evolve. Legacy ERP systems are growing in prevalence and are both expensive to maintain and risky to evolve. Humans are the driving factor behind the expense, from the engineering costs associated with evolving these types of systems to the labor costs required to operate the result. Autonomic computing is one approach that addresses these challenges by imparting self-adaptive behavior into the evolved system. The contribution of this dissertation aims to add to the body of knowledge in software engineering some insight and best practices for development approaches that are normally hidden from academia by the competitive nature of the retail industry. We present a formal architectural pattern that describes an asynchronous, low-complexity, and autonomic approach. We validate the pattern with two real-world commercial case studies and a reengineering simulation to demonstrate that the pattern is repeatable and agnostic with respect to the operating system, programming language, and communication protocols.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004527, http://purl.flvc.org/fau/fd/FA00004527
- Subject Headings
- Business logistics -- Automation, Electronic commerce -- Management, Enterprise application integration (Computer systems), Information resources management, Management information systems, Software reengineering
- Format
- Document (PDF)
- Title
- Progress towards push button verification for business process execution language artifacts.
- Creator
- Vargas, Augusto., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic...
Show moreWeb Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic properties is computationally complex, since it requires enumerating all communication and synchronization amongst various services with itself. This entails modeling BPEL features such as concurrency, hierarchy, interleaving, and non-deterministic choice. The thesis will provide rules and procedures for translating these features to a veriable model written in Promela. We will use these rules to build a program which automates the translation process, bringing us one step closer to push button verification. Finally, two BPEL artifacts will be translated, manually edited, verified, and analyzed.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/369386
- Subject Headings
- Electronic commerce, Computer programs, Computer network architectures, Expert systems (Computer science), Web servers, Management, Computer systems, Verification
- Format
- Document (PDF)
- Title
- Patterns for web services standards.
- Creator
- Ajaj, Ola, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web services intend to provide an application integration technology that can be successfully used over the Internet in a secure, interoperable and trusted manner. Policies are high-level guidelines defining the way an institution conducts its activities. The WS-Policy standard describes how to apply policies of security definition, enforcement of access control, authentication and logging. WS-Trust defines a security token service and a trust engine which are used by web services to...
Show moreWeb services intend to provide an application integration technology that can be successfully used over the Internet in a secure, interoperable and trusted manner. Policies are high-level guidelines defining the way an institution conducts its activities. The WS-Policy standard describes how to apply policies of security definition, enforcement of access control, authentication and logging. WS-Trust defines a security token service and a trust engine which are used by web services to authenticate other web services. Using the functions defined in WS-Trust, applications can engage in secure communication after establishing trust. BPEL is a language for web service composition that intends to provide convenient and effective means for application integration over the Internet. We address security considerations in BPEL and how to enforce them, as well as its interactions with other web services standards such as WS-Security and WS-Policy.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927300
- Subject Headings
- Computational grids (Computer systems), Computer systems, Verification, Expert systems (Computer science), Computer network architectures, Web servers, Management, Electronic commerce, Computer programs
- Format
- Document (PDF)