Integrating E-Supply Networks

2009 ◽  
pp. 152-153
Author(s):  
Rana Tassabehji ◽  
James Wallace ◽  
Anastasios Tsoularis

The Internet has reached a stage of maturity where its innovative adoption and implementation can be a source of competitive advantage. Supply chains are one of the areas that has reportedly benefited greatly, achieving optimisation through low cost, high efficiency use of the Internet, almost seamlessly linking global supply chains into e-supply networks. This field is still in its academic and practical infancy, and there is a need for more empirical research to build a robust theoretical foundation, which advances our knowledge and understanding. Here, the main aims and objectives are to highlight the importance of information flows in e-supply chains/networks, and the need for their standardisation to facilitate integration, legality, security, and efficiency of operations. This chapter contributes to the field by recommending a three-stage framework enabling this process through the development of standardised Internet technology platforms (e-platforms), integration requirements and classification of information flows.

Author(s):  
Rana Tassabehji ◽  
James Wallace ◽  
Anastasios Tsoularis

The Internet has reached a stage of maturity where its innovative adoption and implementation can be a source of competitive advantage. Supply chains are one of the areas that has reportedly benefited greatly, achieving optimisation through low cost, high efficiency use of the Internet, almost seamlessly linking global supply chains into e-supply networks. This field is still in its academic and practical infancy, and there is a need for more empirical research to build a robust theoretical foundation, which advances our knowledge and understanding. Here, the main aims and objectives are to highlight the importance of information flows in e-supply chains/networks, and the need for their standardisation to facilitate integration, legality, security, and efficiency of operations. This chapter contributes to the field by recommending a three-stage framework enabling this process through the development of standardised Internet technology platforms (e-platforms), integration requirements and classification of information flows.


Author(s):  
Matthew Warren ◽  
William Hutchinson

During the last ten years there has been a growth of Information Systems and related Internet technology. In recent years the Internet has grown from a solely military/academic network to one that can be used by business or individuals. In the years since the first World Wide Web (WWW) applications were developed, there has been an explosion in the global use of the Internet. With this growth has come an increasing usage of the medium by criminal and terrorist groups.This chapter will explain why and how cyber-terrorists attack these services. The aims of the chapter are to: describe the background of cyber-terrorism; describe what cyber-terrorism is; describe the vulnerabilities of electronic commerce to cyber-terrorism; discuss the future of electronic commerce and cyber-terrorism.


Author(s):  
Adam Dachowicz ◽  
Mikhail Atallah ◽  
Jitesh H. Panchal

Abstract We propose a method for ensuring traceability of metal goods in an efficient and secure manner that leverages data obtained from micrographs of a part’s surface that is instance specific (i.e., different for another instance of that same part). All stakeholders in modern supply chains face a growing need to ensure quality and trust in the goods they produce. Complex supply chains open many opportunities for counterfeiters, saboteurs, or other attackers to infiltrate supply networks, and existing methods for preventing such attacks can be costly, invasive, and ineffective. The proposed method extracts discriminatory-yet-robust intrinsic strings using features extracted from the two-point autocorrelation data of surface microstructures, as well as from local volume fraction data. By using a synthetic dataset of three-phase micrographs similar to those obtained from metal alloy systems using low-cost optical microscopy techniques, we discuss tailoring the method with respect to cost and security and discuss the performance of the method in the context of anticounterfeiting and how similar methods may be evaluated for performance. Cryptographic extensions of this methodology are also discussed.


2019 ◽  
Vol 16 (1) ◽  
pp. 38-44
Author(s):  
Michelle L. Pickett ◽  
Joi Wickliffe ◽  
Amanda Emerson ◽  
Sharla Smith ◽  
Megha Ramaswamy

Purpose The purpose of this paper is to gain insight into justice-involved women’s preferences for an internet-based Sexual Health Empowerment (SHE) curriculum. Design/methodology/approach The authors analyzed data from four focus groups conducted with 52 women in a minimum-security county jail in a Midwestern US city. Findings Women reported daily access to the internet while in the community and use of the internet for searching about health concerns. Four themes emerged in the discussion about preferences for an internet-based SHE curriculum, that it cover healthy sexual expression, how to access resources, video as an educational modality and a non-judgmental approach. Practical implications Justice-involved women are potentially reachable through internet-based health education. Their preferences for content and modality can be used to inform internet-based sexual health programming designed specifically for this population. Using this modality could offer easily disseminated, low-cost and consistent messaging about sexual health for a vulnerable group of women. Originality/value Though internet-based health education programming has been widely utilized in the general population, less attention has been paid to if and how these programs could be utilized with a vulnerable group of women who move between the justice system and communities. This exploratory study begins to fill that gap.


2021 ◽  
Vol 4 (1) ◽  
pp. 1-6
Author(s):  
Yusli Yenni ◽  
Intan Utnasari ◽  
Mega Rahmawati

Abstract: Information technology era requires speed and processing to obtain information. Users are required to quickly obtain and process information as needed. The use of the internet covers many fields of education but the use of the internet also covers the scope of business and transactions. Development of internet technology is widely used in business and sales transactions. Because the internet can create new entrepreneurs. Internet-based social media is an application service that is widely used as a means for the purpose of publishing a service or product. In the implementation of the service, the pre-test method was used which was given to the mothers of the village of RT 03 RW 01 by giving a questionnaire to measure their understanding of social media. Furthermore, given the delivery of material on understanding social media and the internet. The next method is carried out in practice to implement it. This will provide benefits in understanding social media and the internet for business ventures, both businesses that are established individually or in groups. Because social media can be used as a promotional media, see market developments, provide experiences for consumers and serve as social media for competitors. The results obtained from this service, the community / village mothers have business facilities, namely using the social media Facebook. With this media, the native mothers of the village can promote or sell their products there.. Keywords: internet; social media; transactions  Abstrak: Era teknologi informasi memerlukan kecepatan dan pemrosesan untuk mendapatkan informasi. Pengguna dituntut untuk lebih cepat memperoleh dan mengolah informasi sesuai kebutuhan. Penggunaan internet mencangkup banyak bidang pendidikan tetapi penggunaan internet juga mencangkup lingkup bidang usaha dan transaksi.Perkembagan teknologi internet banyak digunakan dalam bidang usaha dan transaksi penjualan. Kerena internet bisa menciptakan para enterpreneur yang baru. Internet berbasis media sosial merupakan suatu layanan aplikasi yang banyak dimanfaatkan sebagai sarana untuk tujuan mempublikasikan suatu jasa atau produk. Dalam pelaksanaan pengabdian digunakan metode pra test yang diberikan kepada ibu-ibu tiban kampung RT 03 RW 01 dengan memberikan koesioner untuk mengukur pemahaman tentang media social. Selanjutnya diberikan penyampaian materi tentang pemahaman media social dan internet. Metode selanjutnya di lakukan pelaksaan prakterk untuk mengimplemantasikannya.  Hal ini akan memberikan pemanfaatand dalam pemahaman media social dan internet  untuk usaha bisnis, baik usaha yang didirikan secara individual maupun kelompok. Karena media sosial dapat dijadikan suatu media promosi, melihat perkembangan pasar, memberikan pengalaman bagi konsumen dan sebagai media sosial kompetitor. Hasil yang didapat dari pengabdian ini, masyarakat/ibu-ibu tiban kampung mempunyai sarana usaha yaitu menggunakan media sosial facebook. Dengan media tersebut ibu-ibu tiban kampung dapat mempromosikan atau menjual produknya di sana. Kata kunci : media sosia; internet; transaksi


10.28945/2731 ◽  
2003 ◽  
Author(s):  
Hong Wang ◽  
Xin-An (Lucian) Lu

Naturally, humans seek physical and psychological joy. Romance, for instance, is one of the means. People are making quick use of the Internet technology to facilitate their seeking of romantic and quasiromantic experience via “virtual reality.” In this paper we concern ourselves mainly with meaning generation and interpretation in the virtual world. With analysis of a reported case of online deception as empirical evidence, we question in the conditions and assumptions Grice based on for his theoretical proposition of the Cooperative Principle. Our research suggests that deception in online romance is hard to find out because the virtual reality does not provide sufficient conditions for generation of conversational implicatures as suggested by Grice’s Cooperative Principle.


Author(s):  
Adam Dachowicz ◽  
Mikhail Atallah ◽  
Jitesh H. Panchal

Abstract We propose a method for ensuring traceability of metal goods in an efficient and secure manner that leverages data obtained from micrographs of a part’s surface that is instance-specific (i.e., different for another instance of that same part). All stakeholders in modern supply chains face a growing need to ensure quality and trust in the goods they produce. Complex supply chains open many opportunities for counterfeiters, saboteurs, or other attackers to infiltrate supply networks, and existing methods for preventing such attacks can be costly, invasive, and ineffective. The proposed method extracts discriminatory-yet-robust intrinsic strings using features extracted from two-point autocorrelation data of surface microstructures. Using a synthetic dataset of three-phase micrographs similar to those obtained from metal alloy systems using low-cost optical microscopy techniques, we discuss the optimization of the method with respect to cost and security, and discuss the performance of the method in the context of anti-counterfeiting. Cryptographic extensions of this methodology are also discussed.


Author(s):  
Edward J. Szewczak

Concerns about the collection of personal information by Internet technology and the possibility of misuse of that information are a primary reason why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, hardware and software watermarks, and biometric devices. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly the technology is global in nature and poses challenges and issues for societies around the world.


Sign in / Sign up

Export Citation Format

Share Document