- Filter by:
-
Topic
-
Information Systems Success in the Context of Internet Banking: Scale Development
The Internet has revolutionized services across institutions. The banking sector has registered significant change in the quality of service owing to the bandwidth of information flow ensuring greater customer-satisfaction. This has also brought into perspective the security environment within which information flow takes place. This paper initiates a few viable...
Download Now -
The authors analyzed the workflow of sorting systems in destination distribution centers of current courier companies and identified problems. Subsequently, two points of view were put forth regarding the optimization of sorting systems: the first is to apply Radio Frequency IDentification technology (RFID) to sorting systems and vertically optimize the...
Download Now -
This video is a demonstration of how LiveVault, a cloud-based server data protection solution from HP Autonomy, can be used to protect critical file data stored on a HP StoreEasy Storage appliance.
Watch Now -
Implementation of a Multi-Scenario Cost-Benefit Analysis Module for the Risk-CHANGES SDSS Platform
The risk-changes platform is an initiative of the ongoing EU 7th research programme "Changes" to perform fast, easy and web-based risk analysis for different natural hazards. The goal of the risk-changes platform is not only to determine the risk in the current situation but also to be able to calculate...
Download Now -
A Review Paper on e-Commerce Security
E-commerce is the selling and buying of products through transactions on electronic measures. The transaction must be secured from unauthorized means using e-commerce security. E-Commerce security refers to the protection of e-commerce assets from unauthorized access, use, alteration, or destruction. There are six dimensions of E-Commerce security. The first dimension...
Download Now -
A Survey on Mobile Threats and Detection Techniques
In the past few years, the market adoption and utility of mobile devices has expanded intensely. Mobile devices store personal details like contacts and text messages. Due to this widespread growth, Smartphones are attracted towards cyber-criminals. Mobile phone security has become an important characteristic of security issues in wireless multimedia...
Download Now -
Study on Model of Factor Analysis Applied in the Risk Managementof Electronic Commerce Enterprise
The electronic commerce is playing a more and more important role in the operation of the entire national economy. The electronic commerce enterprise is facing more and more risks, including the risk between the enterprise, internal risk, external risk and enterprise and three categories. It will quantify these risks for...
Download Now -
Now-a-days, e-commerce is more and more important in the people lives, and developing more and more rapidly. Perceived credit risk is blocked the development and regarded as a key factor influencing consumer decision-making in the electronic commerce shopping. In this paper, a model based on system dynamic is built to...
Download Now -
Underwater Connectivity: Custom Innovations Connector + Cable
Total Cost of Ownership (TCO) is to avoid the inherent hazards of a narrow-minded bottom line focus. Sometimes focusing on hurdle rates, internal rate of return, and the short-sighted bottom line can lead to disaster. This is often the case when making "Apples to oranges" comparisons. While engineered products can...
Download Now -
Ten Steps to Better Requirements Management
Requirements definition and management is recognized as a necessary step for the successful delivery of systems and software projects; the discipline is also required by standards, regulations and quality improvement initiatives like Capability Maturity Model Integration (CMMI).
Download Now