The XML-Based Web Languages and Accounting

2011 ◽  
pp. 42-87
Author(s):  
Ashutosh Deshmukh

The Internet spins a vast web of information across the globe. Data and information flow freely — available to anyone for learning, understanding and analysis. Organizations can cooperate across departments, regions and countries. ERP II and ECM herald the era of intra- and inter-business collaboration. Sounds wonderful – what is the problem? The problem is as old as mainframe vs. PC and Windows vs. Macintosh. Data can move freely but are not standardized. Data streams have no universal meanings; consequently, data are not understood by all systems, analyzed easily, translated across different languages and human readable, among other things. Specialized hardware and software is needed for data decoding, and if the required tools are not available, then you are out of luck. This problem is not only confined to the Internet. A great deal of money (by one estimate, almost 20% of the U.S. gross national product) is spent on generating new information, and more than 90% of this information is in documents, not in databases. Businesses in the U.S. produce approximately 100 billion documents per year. This information is stored in various formats across a range of computer systems. These disparate storage formats cause severe problems in accessing, searching and distributing this information. Any solution (a combination of information technology products and services) that manages information across diverse software and hardware platforms must address a few key requirements. First, these solutions should be transparent to users. The technical details should not be handled by users. Second, users should be able to save data and information in the desired format; for example, databases, text files or proprietary formats. Third, a solution must intelligently retrieve data and information. This solution should be knowledgeable regarding meaning of the information itself. Finally, such solution should be capable of providing the desired output — print, screen, Web or CD/DVD format.

Author(s):  
Ran Wei

This chapter introduces adoption theory and applies it to examine the use of wireless fidelity (Wi-Fi), which has the potential to expand virtual workplaces significantly. Research shows that the use of Wi-Fi to access the Internet is surprisingly low. As understanding users and their needs is a prerequisite for the success of any new information technology, this chapter identifies factors accounting for the low usage of Wi-Fi in organizations and seeks to build a model to increase Wi-Fi usage. Empirical research reported in this chapter shows that motivations of Wi-Fi use, mass media use, and technology cluster have impacted on the awareness of, interest in, and likelihood to use Wi-Fi. More important, a chain-effect process in the adoption of Wi-Fi was presented: the awareness of Wi-Fi, which was influenced mostly by reading newspapers, had a direct effect on interest in Wi-Fi, which directly affected the likelihood to use Wi-Fi. Thus, to increase Wi-Fi usage, the awareness of and interest in this newer Internet technology must be in place. The chapter also discusses future trends in Wi-Fi technology and how increased adoption of Wi-Fi enhances the virtual workplace.


2011 ◽  
Vol 121-126 ◽  
pp. 3847-3849
Author(s):  
Yong Ning Guo ◽  
Cheng Lian Liu

The Internet has been population, which it was implement information technology, to every enterprize, also changed their contact mode of information flow style. Since public key conception was proposed, it had authentication function to secure while they are communication, and defense the data to leak based on stranger. In 2010, Xu et al. proposed an improvement of generalized key agreement and password authentication protocol which it based on linear equation in two unknown of congruence. In this paper, we pointed out some errors. Thus, the Xu et al.'s improved scheme may not becomes to be correction


2021 ◽  
pp. 1-12
Author(s):  
Julia Royall

In 1997, Donald A.B. Lindberg M.D., Director, U.S. National Library of Medicine (NLM) agreed to address the request of African malaria researchers for access to the Internet and medical journals as part of the U.S. National Institutes of Health’s (NIH) contribution to the Multilateral Initiative on Malaria (MIM). This challenge matched my interests and previous experience in Africa. I joined NLM in 1997 to help establish the MIM Communications Network (MIMCom) in partnership with several NIH components and more than 30 other partners in Africa, the U.S., the United Kingdom (U.K.), and Europe. After a successful launch of MIMCom, NLM worked with African partners to create a series of innovative programs to build capacity in Africa and enhance global access to indigenous African research.


Author(s):  
Thomas F. Siems

New information technologies, including e-commerce and the Internet, have brought fundamental changes to 21s t century businesses by making more and better information available quickly and inexpensively. Intelligent enterprises are those firms that make the most from new information technologies and Internet business solutions to increase revenue and productivity, hold down costs, and expand markets and opportunities. In this chapter, the macroeconomic benefits that intelligent enterprises can have on the U.S. economy are explored. We find that the U.S. economy has become less volatile, with demand volatility nearly matching sales volatility, particularly in the durable goods sector. Evidence also suggests that firms are utilizing new information technologies to lower inventory levels relative to sales, leading to higher productivity growth, lower prices, and more competitive markets.


Author(s):  
Myungsook Klassen ◽  
Russell Stockard Jr.

The issue of the underrepresentation of women in the information technology (IT) workforce has been the subject of a number of studies, and the gender gap was an issue when the digital divide dominated discourse about women’s and minority groups’ use of the Internet. However, a broader view is needed. That perspective would include the relation of women and IT in the communities in which they live as well as the larger society. The information society that has emerged includes the United States (U.S.) and the globalized economy of which it is an integral part. Women and minorities, such as African Americans and Latinos, are underrepresented in computer science (CS) and other IT positions in the U.S. In addition, while they are no longer numerically underrepresented in access to computers and the Internet, as of 2000 (Gorski, 2001), they continue to enjoy fewer benefits available through the medium than white boys and men. The following article explores the diversity within women from the perspectives of race, ethnicity and social class in North America, mainly the U.S. The technology gender and racial gap persists in education and in the IT workforce. A broader and deeper look at women’s positions in relation to the increasingly techno-centric society reveals that women may have reached equality in access, but not in academic study and job opportunities.


Author(s):  
Thomas F. Siems

New information technologies, including e-commerce and the Internet, have brought fundamental changes to 21st century businesses by making more and better information available quickly and inexpensively. Intelligent enterprises are those firms that make the most from new information technologies and Internet business solutions to increase revenue and productivity, hold down costs, and expand markets and opportunities. In this chapter, the macroeconomic benefits that intelligent enterprises can have on the U.S. economy are explored. We find that the U.S. economy has become less volatile, with demand volatility nearly matching sales volatility, particularly in the durable goods sector. Evidence also suggests that firms are utilizing new information technologies to lower inventory levels relative to sales, leading to higher productivity growth, lower prices, and more competitive markets.


Author(s):  
Daniela Andreini

Marketing is a discipline that concentrates on the process of exchange between two market groups, and for this reason, it has been immediately involved with developments in the Internet—understood as a suitable phenomenon for discovering new opportunities and possible threats to modern business management (Burke, 1996) and as a commercial business tool (Alba et al., 1997; Quelch & Klein, 1996). The aim of this chapter is to highlight the marketing elements that, according to an accurate review of international literature, have been involved in the development of new information technology and, in particular, the Internet. The investigation concerns in particular • customers: the buying behavior of Internet users compared to traditional behavior; • relations and communication: in this section we try to understand what are the barriers to the development of these relations: trust, safety, and manipulation are some of the obstacles examined; • marketing research: an accurate review of international scientific literature highlights the online research techniques and tools that are of greater use to companies; • marketing management: products, prices, place (distribution), and promotion are unequivocally decided by the company but may become an area of negotiation between companies and customers thanks to new multimedia tools; and • marketing performance: this section illustrates what are the best performance indicators for measuring the activities carried out by an e-commerce project.


2003 ◽  
Vol 18 (3) ◽  
pp. 241-263 ◽  

This paper reports the results of a survey of auditing and assurance courses in the U.S. and several other countries conducted during 2000–2001. The survey, commissioned by the Auditing Section of the American Accounting Association, yielded data on a total of 285 auditing and assurance courses taught at 188 colleges and universities in the United States, Canada, and several other countries. The syllabi data were analyzed on a number of dimensions and the results compared to two prior surveys of auditing courses (Frakes 1987; Groomer and Heintz 1994). Our findings document substantial changes in content (e.g., new or expanded coverage of fraud, information technology, and assurance services) and pedagogy (e.g., increased use of team projects, student presentations, cases, and the Internet) in both introductory and advanced auditing courses over the past several years. These changes are discussed in the context of events that significantly impacted auditing education and practice from the late 1980s through the end of the 1990s.


1997 ◽  
Vol 36 (2) ◽  
pp. 375-395

Participants have approved 25 schedules; the share of world trade in information represented in the 25 schedules is more than 92 percent; the schedule of concessions should be released through the internet.


Sign in / Sign up

Export Citation Format

Share Document