scholarly journals Research on the Problems and Countermeasures of Enterprise Financial Management under the Current Internet Economy

2021 ◽  
Vol 2 (5) ◽  
Author(s):  
Yizhong Hu

The application of Internet technology in the development of enterprises can effectively reflect the business situation of enterprises. Through the Internet platform, enterprises can display their own advantages and specialties, realize the supply chain links all over the world, strengthen the development trend of business digitization, use the digital mode to enable their own management mode, give full play to the advantages of e-commerce, and put forward higher requirements for the internal financial management of enterprises.Therefore, we should make full use of the Internet and understand the Internet with the help of the Internet, To improve the efficiency of financial management.

2020 ◽  
Vol 2 (1) ◽  
pp. 58-64
Author(s):  
I Komang Pasek Sudiarsa

Management of academic activities at Mahendradata University is still using manually ways, which means that it has not used an integrated information system yet, for the example the process of registering new students, arranging lecture schedules, filling in student KRS, managing lecture attendance, and managing student grades. Nowadays cultural changes have been marked by the increasingly rapid use of the internet. The internet as an information resources for its existence has now become a necessity. The benefits of the internet are quite large, especially in the world of business, entertainment and education. This system is designed to assist academic processes at the University of Mahendradata. The academic processes that have been analyzed and applied in this developed system are the process of preparing schedules, plotting teaching lecturers, printing KRS, printing lecture attendance, presenting inputs, filling in grades, and printing KHS. And the University can immediately develop a new system in order to work optimally. System design that has been used in developing this system uses the SDLC method, the waterfall method. The implementation of the system uses the PHP programming language Codegniter and MySQL database. The results of this study are in the form of an academic system design at the University of Mahendradata. This developed system is aim to assist the academic processes at the University of Mahendradata


M/C Journal ◽  
1998 ◽  
Vol 1 (1) ◽  
Author(s):  
Joseph Crawfoot

Cities are an important symbol of our contemporary era. They are not just places of commerce, but are emblems of the people who live within them. A significant feature of cities are their meeting places; areas that have either been designed or appropriated by the people. An example of this is the café. Cafés hold a unique place in history, as sites that have witnessed the growth of revolution, relationships great and small, between people and ideas, and more recently, technology. Computers are transcending their place in the private home or office and are now finding their way into café culture. What I am suggesting is that this is bringing about a new way of understanding how cafés foster community and act as media for social interaction. To explore this idea further I will look at the historical background of the café, particularly within Parisian culture. For W. Scott Haine, cities such as Paris have highly influential abilities. As he points out "the Paris milieu determined the consciousness of workers as much as their labor" (114). While specifically related to Paris, Haine is highlighting an important aspect in the relationship between people and the built environment. He suggests that buildings and streets are not just inanimate objects, but structures that shape our habits and our beliefs. Towards the middle of the nineteenth century, Paris was developing a new cultural level, referred to as Bohemia. Derived from the French word for Gypsy (Seigel 5) it was used to denote a class of people who in the eyes of Honoré de Balzac were the talent of the future (Seigel 4). People who would be diplomats, artists, journalists, soldiers, who at that moment existed in a transient state with much social but little material wealth. Emerging within this Bohemian identity were the bourgeois. They were individuals who led a working class existence, they usually held property but more importantly they helped provide the physical environment for Bohemian culture to flourish. Bourgeois society had the money to patronize Bohemian artists. As Seigel says "Bohemian and bourgeois were -- and are -- parts of a single field: they imply, require, and attract each other" (5). Cafés were a site of symbiosis between these two groups. As Seigel points out they were not so much established to create a Bohemian world away from the reality of working life, but to provide a space were the predominantly bourgeois clientèle could be entertained (216). These ideas of entertainment saw the rise of the literary café, a venue not just for drinking and socialization but where potential writers and orators could perform for an audience. Contemporary society has seen a strong decline in Bohemian culture, with the (franchised) café being appropriated by the upper class as a site of lattes and mud cake. Recent developments in Internet technology however have prompted a change in this trend. Whereas in the past cafés had brought about a symbiosis between the classes of Bohemian and bourgeois society they are now becoming sites that foster relationships between the middle class and computer technology. Computers and the Internet have their origins within a privileged community, of government departments, defence forces and universities. It is only in the past three years that Internet technology has moved out of a realm of expert knowledge to achieve a broad level of usage in the average household. Certain barriers still exist though in terms of a person's ability to gain access to this medium. Just as Bohemian culture arose out of a population of educated people lacking skills of manual labor and social status (Seigel 217), computers and Internet culture offer a means for people to go beyond their social boundaries. Cafés were sites for Bohemians to transcend the social, political, and economic dictates that had shaped their lives. In a similar fashion the Internet offers a means for people to explore beyond their physical world. Internet cafés have been growing steadily around the world. What they represent is a change in the concept of social interaction. As in the past with the Paris café and the exchange of ideas, Internet cafés have become places were people can interact not just on a face-to-face basis but also through computer-mediated communication. What this points to is a broadening in the idea of the café as a medium of social interaction. This is where the latte and mud cake trend is beginning to break down. By placing Internet technology within cafés, proprietors are inviting a far greater section of the community within their walls. While these experiences still attract a price tag they suggest a change in the idea that would have seen both the café and the Internet as commodities of the élite. What this is doing is re-invigorating the idea of the streets belonging to the middle class and other sub-cultures, allowing people access to space so that relationships and communities can be formed. References Haine, W. Scott. The World of the Paris Cafe: Sociability amongst the French Working Class 1789 - 1914. Baltimore: Johns Hopkins UP, 1996. Seigel, Jerrold. Bohemian Paris: Culture, Politics and the Boundaries of Bourgeois Life, 1830 - 1930. New York: Penguin Books, 1987. Citation reference for this article MLA style: Joseph Crawfoot. "Cybercafé, Cybercommunity." M/C: A Journal of Media and Culture 1.1 (1998). [your date of access] <http://www.uq.edu.au/mc/9807/cafe.php>. Chicago style: Joseph Crawfoot, "Cybercafé, Cybercommunity," M/C: A Journal of Media and Culture 1, no. 1 (1998), <http://www.uq.edu.au/mc/9807/cafe.php> ([your date of access]). APA style: Joseph Crawfoot. (1998) Cybercafé, cybercommunity. M/C: A Journal of Media and Culture 1(1). <http://www.uq.edu.au/mc/9807/cafe.php> ([your date of access]).


Author(s):  
Rian Septian Anwar ◽  
Nani Agustina

Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus ditopang dengan struktur topology terbaik menurut pemasangannya. Pemilihan topology pada awal pembangunan jaringan sangat penting untuk membuat akses Virtual Private Network (VPN) ini terkoneksi dengan baik.   Kata kunci: VPN, Jaringan, Open VPN-Acces Server.   Abstract: The increasing use of the internet in the world, making internet traffic become high. The need for interconnection between networks is increasing in companies with many branches. Therefore companies are required to spend even more budget. To reduce excess expenditure, a Virtual Private Network (VPN) is needed. By utilizing Open VPN-Server Access that is issued is cheaper compared to VPN-IP leases that are relatively more expensive. For better tissue, it must be supported by the best topological structure according to installation. The choice of topology at the beginning of network development is very important to make this Virtual Private Network (VPN) access well connected.   Keywords: VPN, Networking, Open VPN-Acces Server.


2019 ◽  
pp. 1818-1839
Author(s):  
Hosnieh Rafiee ◽  
Christoph Meinel

With the increased use of the Internet to share confidential information with other users around the world, the demands to protect this information are also increasing. This is why, today, privacy has found its important place in users' lives. However, Internet users have different interpretations of the meaning of privacy. This fact makes it difficult to find the best way to address the privacy issue. In addition, most of the current standard protocols in use over the Internet do not support the level of privacy that most users expect. The purpose of this chapter is to discuss the best balance between users' expectation and the practical level of privacy to address user privacy needs and evaluate the most important protocols from privacy aspects.


Author(s):  
Yukiko Inoue

Twenty First Century Government is enabled by technology— policy is inspired by it, business change is delivered by it, customer and corporate services are dependent on it, and democratic engagement is exploring it. Technology alone does not transform government, but government cannot transform to meet modern citizens’ expectations without it (Cabinet Office, 2005, p. 3). According to the E-Government Readiness Ranking Report (United Nations, 2005), in 2005 the United States was the world leader followed by Denmark, Sweden, and the United Kingdom; and in 2004 the Republic of Korea, Singapore, Estonia, Malta, and Chile were also among the top 25 “e-ready” countries. The Ranking Report further emphasizes that 55 countries, out of 179, which maintained a government Web site, encouraged citizens to participate in discussing key issues of importance, and that most developing country governments around the world are promoting citizen awareness about policies, programs, approaches, and strategies on their Web sites—thus making an effort to engage multi-stakeholders in participatory decision-making. Indeed, one of the significant innovations in information technology (IT) in the digital age has been the creation and ongoing development of the Internet—Internet technology has changed rules about how information is managed, collected, and disseminated in commercial, government, and private domains. Internet technology also increases communication flexibility while reducing cost by permitting the exchange of large amounts of data instantaneously regardless of geographic distance (McNeal, Tolbert, Mossberger, & Dotterweich, 2003). In Hirsch’s (2006) words, “The Internet has finally achieved the convergence dream of the 1970s and everything that can be canned in digital form is traveling the Net” (p.3).


Author(s):  
Dieter Fink

While much attention is currently being devoted to solving technological challenges of the Internet, for example increasing the bandwidth on existing narrowband network platforms to overcome bottlenecks, little attention appears to be given to the nontechnical aspects. This has been a mistake in the past as human resistance to, or incompetence during, the introduction of new Information Technology (IT) often caused Information Systems (IS) to fail. By focusing on a broad range of technical and nontechnical elements early in the adoption of Internet technology, we have the opportunity to avoid the mistakes made in the past. The Internet has given rise to electronic commerce (e-commerce) through the use of the World Wide Web (Web). E-commerce, by its nature, offers enormous possibilities but in an uncontrolled environment. Therefore, for e-commerce to be accepted, trust must be established as soon as interaction with a Web site begins. In the virtual environment of the Web trust has become even more important because the parties are not in physical proximity. There are no handshakes or body language to be observed when closing a deal. Furthermore, jurisdiction is unclear. Developments on a global scale are required that provide assurance that e-commerce can be conducted in a ‘trusting’ manner.


The internet is now the main way in which information is obtained. Chapter 13 considers the internet from a legal perspective, focusing on information and its disclosure. It seeks to provide a non-technical description of the operation of the internet as exemplified by the world wide web. It discusses the use of the internet by bodies subject to the Freedom of Information Act 2000 and other statutes and outlines some of the pitfalls of such use. For instance, a publication of information on a website operated from England may expose the publisher to civil or criminal liability in any country of the world on the basis of the law of those countries. The chapter explains the meaning of cookies, cloud computing, hackers, crackers and viruses. and discusses the problems of determining jurisdiction and seeking enforcement.


Author(s):  
James Griffin

Electronic commerce has been recognised as a source of fundamental, pan-sectoral change to the conduct of business; Chan and Swatman (2000) use the term: “A new paradigm for doing business.” Other authors have gone further, viewing modern IT developments as the latter part of a period starting in the mid-1970s that represents a transition to nothing less than a new phase of capitalist development (Amin, 1994). Benjamin, Rockhart, Scott Morton, and Wyman (1983) also suggest that the world economy has been fundamentally altered by the globalisation of competition which has largely been caused by the declining cost and consequent increasing spread of IT developments.


2009 ◽  
pp. 152-153
Author(s):  
Rana Tassabehji ◽  
James Wallace ◽  
Anastasios Tsoularis

The Internet has reached a stage of maturity where its innovative adoption and implementation can be a source of competitive advantage. Supply chains are one of the areas that has reportedly benefited greatly, achieving optimisation through low cost, high efficiency use of the Internet, almost seamlessly linking global supply chains into e-supply networks. This field is still in its academic and practical infancy, and there is a need for more empirical research to build a robust theoretical foundation, which advances our knowledge and understanding. Here, the main aims and objectives are to highlight the importance of information flows in e-supply chains/networks, and the need for their standardisation to facilitate integration, legality, security, and efficiency of operations. This chapter contributes to the field by recommending a three-stage framework enabling this process through the development of standardised Internet technology platforms (e-platforms), integration requirements and classification of information flows.


Author(s):  
Matthew Warren ◽  
William Hutchinson

During the last ten years there has been a growth of Information Systems and related Internet technology. In recent years the Internet has grown from a solely military/academic network to one that can be used by business or individuals. In the years since the first World Wide Web (WWW) applications were developed, there has been an explosion in the global use of the Internet. With this growth has come an increasing usage of the medium by criminal and terrorist groups.This chapter will explain why and how cyber-terrorists attack these services. The aims of the chapter are to: describe the background of cyber-terrorism; describe what cyber-terrorism is; describe the vulnerabilities of electronic commerce to cyber-terrorism; discuss the future of electronic commerce and cyber-terrorism.


Sign in / Sign up

Export Citation Format

Share Document