Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Communities in a Networked Society: e-Commerce, e-Business and e-Government

Buy
Digital Communities in a Networked Society: e-Commerce, e-Business and e-Government deals with the accelerating evolution in the computerization of society. This evolution, or should we call it a revolution, is dominantly driven by the Internet, and documented by the novelties introduced, year by year, by Information and Communication Technologies. The book contains recent results of research and development in the areas of: -E-government, -Business models of e-applications, -Innovative structures in the internet, -Auctions and e-payment, -Future aspects of communication, -Internet and the web, -Advanced platforms and grid computing, -Cooperation and integration, -Modeling and construction of e-services.

In the last years we have observed a accelerating evolution in the computerization of the society. This evolution, or should we call it a revolution, is dominantly driven by the Internet, and documented in several ways:
  • The Information and Communication Technologies (ICT) bring, year per year, novelties: new processing architectures, new software methodologies, new systems and products, new communication networks. Distributed Processing Architectures spread in the Internet (e.g. Enterprise Distributed System, Distributed Object Computing, Grid Computing). Due to the proliferation of Platform and Middleware, some old software development approaches mature (e.g. MDA - Model Driven Architecture). In the field of Knowledge, the last years saw an interesting development of Metadata Techniques (e.g. based on MOFOMG). Otherwise, representation of Knowledge and Semantic Processing, introduced in the past by the AI Community saw a strong push with the proposals of Semantic Web. And, without any question, the new communication technologies, bringing mobility, ubiquity and personalization, will change the ways in which individuals and public organizations perform their activities.
  • The application fields of those technologies are expanding constantly transferring high benefits for the users, human beings (clients, consumers, citizens) and organizations (SME’s and big enterprises, public administration in the spheres of federal, state and local governments activities). Not only do the technologies cause profound modifications in the enterprise structures , but also give new tools to the quest for new organizational forms that bring more productivity and the chance of survival in the new global world of commerce, business and government. In Electronic Business, enterprises build production networks and proceed to expressive reorganization of their internal activities. And in Electronic Government, still in its infancy, practically all nations in the world -rich or poor - search the way to use ICT, to reach efficiency, and to eliminate old problems such as corruption. It is not yet possible to foresee the impacts for the citizen but, by sure, the old democracy is being reshaped.
(HTML tags aren't allowed.)

Playing with Infinity: Mathematical Explorations and Excursions
Playing with Infinity: Mathematical Explorations and Excursions
Popular account ranges from counting to mathematical logic and covers the many mathematical concepts that relate to infinity: graphic representation of functions; pairings and other combinations; prime numbers; logarithms and circular functions; formulas, analytical geometry; infinite lines, complex numbers, expansion in the power series;...
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Modeling for all Scales: An Introduction to System Simulation
Modeling for all Scales: An Introduction to System Simulation
All manner of models are used to describe, simulate, extrapolate, and ultimately understand the function of dynamic systems. These sorts of models are usually based on a mathematical foundation that can be difficult to manipulate, especially for students. Modeling For all Scales uses object-oriented programming to erect and...

Surveillance and Threat Detection: Prevention versus Mitigation
Surveillance and Threat Detection: Prevention versus Mitigation

Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years....

The Six Sigma Handbook: The Complete Guide for Greenbelts, Blackbelts, and Managers at All Levels, Revised and Expanded Edition
The Six Sigma Handbook: The Complete Guide for Greenbelts, Blackbelts, and Managers at All Levels, Revised and Expanded Edition

The most comprehensive Six Sigma reference available, now revised and expanded. Completely rewritten and reorganized, this second edition of The Six Sigma Handbook covers all the basic statistics and quality improvement tools of the Six Sigma quality management system. This new edition reflects the developments in Six Sigma over the...

Hands-On Automation Testing with Java for Beginners: Build automation testing frameworks from scratch with Java
Hands-On Automation Testing with Java for Beginners: Build automation testing frameworks from scratch with Java

Learn Java programming concepts to design automation testing frameworks

Key Features

  • Learn to use Java program logic in application testing
  • Understand various test-driven development concepts with Java tools
  • Master Java with lots of programming...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy