Web-Enabled Portals for E-Business Workplace

2009 ◽  
pp. 758-765
Author(s):  
Wita Wojtkowski

Portals are information systems that support the user in his or her individual process with information production and communication. The term portal, in information technology terms, appeared in late 1990s at a time of the widespread use of the Internet by individuals and organizations (Finkelstein & Aiken, 1999; Dias, 2001; Bristow, Dickinson, Duke, Henry, & Makey, 2001; Collins, 2001, 2003). There are many types of portals on the Internet: portals for general consumer use and entertainment (my.yahoo.com), for specialized information (www.brint.com), for specific communities (Austrian Academic Portal at www.portal.ac.at/), for business enterprises (NEC global portal at www.nec.com, NEC US portal at www.necus. com/, NEC European portal at www.neceurope. com). In general, portals can be divided into two categories: public and enterprise (Goodman & Kleinschmidt, 2003; Forrester, 2003). Public portals started as Internet directories (Yahoo!) or search engines (Excite, Lycos, Alta- Vista, and InfoSeek). Services that require user registration such as free e-mail, customization features, and chat rooms were added to allow repeated use, and to make users stay longer at the site. Enterprise portals started as intranets and extranets, the “enterprise webs” that were intended to provide easy-to-use, secure, and personalized sites that may extend to an organization’s employees as well as to its customers and business partners. Enterprise portals evolved to include collaboration tools so that customers, business partners, and employees are empowered to maximize their value to the organization. Portals that combine Web communications and thinking inside large enterprises are considered as both a labor-saving and a cost-saving technology. Enterprise portals are also referred to as corporate portals. Some corporate analysts predict that portals spending will be one of the top five areas for growth in the Internet technologies sector.

Author(s):  
Wita Wojtkowski

Portals are information systems that support the user in his or her individual process with information production and communication. The term portal, in information technology terms, appeared in late 1990s at a time of the widespread use of the Internet by individuals and organizations (Finkelstein & Aiken, 1999; Dias, 2001; Bristow, Dickinson, Duke, Henry, & Makey, 2001; Collins, 2001, 2003). There are many types of portals on the Internet: portals for general consumer use and entertainment (my.yahoo.com), for specialized information (www.brint.com), for specific communities (Austrian Academic Portal at www.portal.ac.at/), for business enterprises (NEC global portal at www.nec.com, NEC US portal at www.necus.com/, NEC European portal at www.neceurope.com). In general, portals can be divided into two categories: public and enterprise (Goodman & Kleinschmidt, 2003; Forrester, 2003). Public portals started as Internet directories (Yahoo!) or search engines (Excite, Lycos, AltaVista, and InfoSeek). Services that require user registration such as free e-mail, customization features, and chat rooms were added to allow repeated use, and to make users stay longer at the site. Enterprise portals started as intranets and extranets, the “enterprise webs” that were intended to provide easy-to-use, secure, and personalized sites that may extend to an organization’s employees as well as to its customers and business partners. Enterprise portals evolved to include collaboration tools so that customers, business partners, and employees are empowered to maximize their value to the organization. Portals that combine Web communications and thinking inside large enterprises are considered as both a labor-saving and a cost-saving technology. Enterprise portals are also referred to as corporate portals. Some corporate analysts predict that portals spending will be one of the top five areas for growth in the Internet technologies sector.


2014 ◽  
Vol 513-517 ◽  
pp. 742-749
Author(s):  
Patricia Ghann ◽  
Chang Da Wang ◽  
Cong Hua Zhou

Computer and information technology has evaded our every aspect of life. Information technology is seen in all aspect of the individual from banking and investing to shopping and communicating through the use of the internet services such as emails and chat rooms. Organizations and industries also utilize computer and information technology to collect information on individuals leading to the creation of warehouse of databases that enable them to achieve their objectives. In a distributed network environment today, information security is a very important issue in ensuring a safe computing environment.


Author(s):  
Nicole Godine ◽  
Jeffrey E. Barnett

The use of various technologies in the practice of psychology has increased greatly in recent years in concert with increases in the use of these technologies in the lives of most individuals. E-mail, text messaging, chat rooms, and the Internet have greatly changed how many individuals communicate and maintain relationships. The psychotherapy relationship is no exception. The scope and practice of telepsychology, the use of the Internet and other technologies in the provision of psychological services, is reviewed along with relevant research that supports their use in the treatment of a wide range of conditions and disorders. Clinical, ethical, and legal issues and challenges are addressed and recommendations for the effective and appropriate use of these technologies in psychological practice are provided.


Author(s):  
Andy Paul Harianja ◽  
Iwada Grawilser Talunohi

The development of the field of information technology is very rapid, therefore many companies, industries, shops and other business entities are using information systems to increase their business. Online sales information systems are used to carry out business processes such as distribution, sales, purchasing, marketing of goods or services by using communication networks and the internet. Online sales information systems can help people who do not have a place or shop to carry out their business. Students in this case, especially at the Catholic University of Santo Thomas, are an opportunity to take advantage of this facility in carrying out their business, especially if they do not have a place or shop to carry out their business. For this reason, an online sales information system was built that can be accessed through the website.


JOURNAL ASRO ◽  
2019 ◽  
Vol 10 (2) ◽  
pp. 105
Author(s):  
Khairul Huda ◽  
Zaenal Syahlan ◽  
M Syaifi ◽  
Edy Widodo

The development of information technology also developed in line with thedevelopment of human civilization. The development of information technology is veryhelpful, one of which is the internet. The use of the internet has developed into anappropriate means to convey information that is fast, effective and accurate. Submissionof information is not limited to all soldiers and the general public by utilizing technologicalfacilities, namely websites. In conveying the history of Indonesia Warship Raden EddyMartadinata 331 and Indonesia Warship I Gusti Ngurah Rai 332 are still stored in the formof documents on a computer and are still printed in the form of sheets of paper. Inconveying the history of Indonesia Warship, it must be developed further to conveyinformation in the current era. Historical research that executive focuses on the past. Sofar, information on the Indonesia Warship Indonesia Warship's historical informationsystem Raden Eddy Martadinata - 331 and Indonesia Warship I Gusti Ngurah Rai - 332on the web-based Indonesian Armed Forces fleet are still in print. besides usinginformation books, then try to make other alternatives by creating a website, besides thatmembers are expected to access information easily and efficiently. With theineffectiveness in managing Indonesia Warship Indonesia Warship historical data RadenEddy Martadinata - 331 and Indonesia Warship I Gusti Ngurah Rai - 332, a design of theIndonesia Warship historical information system was built in the web-based IndonesianArmada fleet which aims to facilitate the process of Indonesia Warship history search.PHP as a programmer and MySQL as the database.Keywords: Website-Based Indonesia Warship History Information System. PHP MySQL.


2020 ◽  
Vol 10 (1) ◽  
pp. 37
Author(s):  
ROCHMAT ALI SYAEFUDIN ◽  
Wahyu Hanggoro Suseno

The use of information technology in the government administration is carried out to realize good governance. The use of information systems enables the automation of work and service functions including for human resource administration. Administration of employee leave at the Politeknik Kesehatan Kementerian Kesehatan Surakarta still running manually. Employees who will take leave apply it manually and often cause problems because the application not in accordance with the provisions, among others are the misidentification of the authorized official to provide leave which makes the administration of employee leave ineffective. Sering Cuti using free Google facilities which easy to learn and can be easily used by employees and Autocrat add-on. This add-on processes mail merge the employee leave data, converting into filled application form and sends directly to the employee's e-mail address. Autocrat uses in the Sering Cuti has made it easier to administer and reduce errors in employee leave applications. Sering Cuti can be accessed by employees easily and apply for employee leave anywhere online.


2011 ◽  
pp. 2159-2163 ◽  
Author(s):  
Simpson Poon

The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.


2009 ◽  
pp. 1729-1735
Author(s):  
Myungsook Klassen ◽  
Russell Stockard

The issue of the underrepresentation of women in the information technology workforce has been the subject of a number of studies and the gender gap was an issue when the digital divide dominated discourse about women’s and minority groups’ use of the Internet However, a broader view is needed. That perspective would include the relation of women and IT in the communities in which they live as well as the larger society. The information society that has emerged includes the United States and the globalized economy of which it is an integral part. Women and minorities such as African Americans and Latinos are underrepresented in computer science (CS) and other information technology positions in the United States. In addition, while they areno longer numerically underrepresented in access to computers and the Internet – as of 2000, (Gorski, 2001) - they continue to enjoy fewer benefits available through the medium than white boys and men. The following article explores the diversity within women from the perspectives of race, ethnicity and social class in North America, mainly United States. The technology gender and racial gap persists in education and in the IT workforce. A broader and deeper look at women’s position in relation to the increasingly techno-centric society reveals that women may have reached equality in access, but not equity in academic study and job opportunities.


Stalking ◽  
2007 ◽  
Author(s):  
Graham D. Glancy ◽  
Alan W. Newman

Cyberstalking involves the use of the Internet or other electronic communication to stalk another person. Already common, it is likely to become more common as the use of the Internet continues to grow. The characteristics of online stalkers and their victims have some differences from those of the offline stalker. Mullen, Pathé, Purcell, and Stuart’s (1999) classification may apply to cyberstalkers except for the apparently common phenomenon of child luring that may be a new category. The methods of cyberstalking, as described in this chapter, are particularly ingenious. We know little about the effect on victims, but postulate that it is similar to offline stalking. We make some suggestions that may prevent cyberstalking, as well as offer some steps to bear in mind once cyberstalking occurs. The proliferation of personal computers with Internet access in the last decade has raised concerns about a new phenomenon known as cyberstalking. The Internet can be used to annoy and harass large numbers of victims in a generic manner by disseminating computer viruses, Internet scams, and “spamming” people with unsolicited e-mail. In 1999 Janet Reno, the attorney general of the United States, defined cyberstalking as the use of the Internet, e-mail, or other electronic communications devices to stalk another person (Reno, 1999). Barak (2005) looked at the issue of sexual harassment on the Internet. He characterizes cyberstalking as one type of sexual coercion. He notes that online behavior is characterized by disinhibition, openness, venture, and bravado—an atmosphere characterized by typical masculine attitudes. He argues that the lack of legal boundaries or enforcement vehicles encourage people to do what they would not have done in offline situations. He notes the near impossibility of implementation of legal procedures on a large scale. In this chapter we will discuss what is known about the prevalence of this phenomenon, the types of cyberstalking, and what is known about the perpetrators. In addition, we will generate some hypotheses about the comparison between online and offline stalkers. We will also discuss the effects on victims and current thoughts and resources for dealing with cyberstalking.


Author(s):  
Stylianos Eyaggelos Gouloudis

Constructivism allows the student to build knowledge and learning on his own. Through the discovery, experimentation, and tests, the student tries to consolidate the learning objects. Τhis chapter approaches constructivism through the use of methods used by information technology. An advantage of IT tools is the interaction that turns the teaching into experiential and experimental where the student tries to evaluate and improve his abilities. Methods such as robotics, interactive television, and the use of the internet provide forms of interactive learning based on the methodology of game-based learning, which contribute to constructivism. In this chapter, once the construction and importance in education and especially in IT is presented, the importance of game-based learning and video games is presented. The authors show the role of robotics and the internet in relation to the interaction they offer, and also the role of interactive television in the educational process from the point of view of constructivism.


Sign in / Sign up

Export Citation Format

Share Document