Development of a Regional Digital Strategy

Author(s):  
Coralie Haller ◽  
Benjamin Louis

Wine regions constantly question their visibility on the internet to fully be able to embrace the 3.0 digitalization. Recent controversy of the geographic domain name “.vin” and “.wine” has raised awareness of the need to be proactive in Internet naming. The objective of the chapter is to understand how wine regions could develop a digital territory strategy to increase their competitive advantage by using specific geographic domain name. The chapter provides an overview of origin, role, and functioning of stakeholders involved in the internet naming industry. The specific case of Alsace wine region has been investigated with a specific focus on the digital wine territory strategy based on the development of the “wine.alsace.”

2021 ◽  
Vol 4 (1) ◽  
pp. 36-48
Author(s):  
Uyan Wiryadi

The purpose of this study: 1) To find out copyright violations in the field of music in the form of a cover song by recording through social media connected with Law Number 28 of 2014 concerning Copyright. 2) To find out the factors that influence copyright violations in the music field in the form of cover songs by recording through social media. The writing of this thesis uses a statute approach, by reviewing amendments to Law Number 28 of 2014 concerning Copyright and its implications for copyright and its implementation by state institutions and the Republic of Indonesia Law No. 19 of 2016 concerning Amendment of Law Number 11 Year 2008 Regarding Information and Electronic Transactions. Results of research conducted by the author: When someone does a cover song through social media without permission from the creator, both for the purpose not for commercial or commercial purposes, it is an infringement of copyright. Factors that influence the occurrence of violations of copyright in Indonesia include: 1) Weak law enforcement against violators. 2) Works on the internet can easily be duplicated and disseminated globally in a short period of time and in large quantities. 3) There is no limit on the place of the offender because a domain name or website can be accessed by anyone globally. 4) Procedures for events between countries in dealing with violations of copyright on the internet, such as to determine who the perpetrators are and when they occur and determine the jurisdiction of violations still vary.  


Author(s):  
P. Boonyathan ◽  
L. Al-Hakim

Today’s managers are turning to the functions of the supply chain to improve margins and gain competitive advantage. The explosion of the Internet and other e-business technologies has made real-time, online communication throughout the entire supply chain a reality. Electronic supply chain management (e-SCM) is a reference to the supply chain that is structured via electronic technology-enabled relationships. This chapter concentrates on the development of a procedure referred to as eSCM-I for e-SCM process improvement. The procedure focuses on process mapping and relies on principles of coordination theory. It is based on SCOR to standardize the process and take advantage of this technique of benchmarking/best practices potential. The procedure employs IDEF0 technique for mapping the processes.


2022 ◽  
Vol 10 (01) ◽  
pp. 2871-2880
Author(s):  
Dr. Anikwe S. Obinna

Manpower training and development is essential to the success and productivity of every organization.  Although technology and the internet have enabled global collaboration and competition, employees are still the organization’s competitive advantage.  Manpower training and development enables employees to develop skills and competence necessary to enhance bottom-line results for their organizations.


Author(s):  
Iulian Marius COMAN

Technology has become the Intelligence Community’s new reliability, as well as its new challenge. The new transnational adversaries – international terrorists foremost among them – the flood of new information technologies, the easing of export controls on encryption technology and global access to the Internet, has led the security agencies to charting new directions in identifying, gaining access to and successfully exploiting target communications, through cooperation with all related bodies.


Author(s):  
Ronan McIvor ◽  
Paul Humphreys

This chapter examines the implications of business-to-business (B2B) commerce for the buyer-supplier interface. Innovations in electronic commerce have a key role to play in managing inter-organizational networks of supply chain members. The evidence presented in this chapter illustrates that the Internet represents a powerful technology for commerce and communication at the buyer-supplier interface. Internet technologies are having a considerable impact on the communication patterns at the buyer-supplier interface. It is shown how electronic commerce technologies have the potential to create competitive advantage through radically changing the structure and interaction patterns at the buyer-supplier interface. The chapter identifies a number of areas where electronic commerce technologies can make a contribution to the creation of competitive advantage. While the Internet offers ways for organizations to communicate and trade more effectively with their suppliers, and gives consumers higher levels of service and sophistication, it also poses major challenges to those within organizations who have to manage it. It is argued that closed network problems and the nature of buyer-supplier relations present major impediments to electronic commerce achieving its full strategic potential at the buyer-supplier interface.


Author(s):  
Mahmud Akhter Shareef ◽  
Vinod Kumar ◽  
Uma Kumar ◽  
Abdul Hannan Chowdhury ◽  
Subhas C. Misra

Though many countries are still just beginning to grasp the potential uses and impacts of Electronic-government (EG), advances in technologies and their applications continue. Observing the proliferation of EG, countries are increasingly turning to the Internet to market their EG system to gain a competitive advantage. However, the effectiveness and efficiency of such online government systems largely depends on the mission of implementing EG. For successful adoption and implementation of EG, it is essential that a country first identify an explicit objective and a specific strategy. We have examined implemention strategies of EG of seven diverse countries whose objectives and mission for implementing EG differ significantly. However, they have the following strategies in common: i) extensive application of information and communication technology (ICT) in the public sector; ii) overall reformation of the public sector; iii) development of a better quality service structure; and iv) more cohesive integration of citizens with government.


Author(s):  
Troy J. Strader ◽  
Daniel M. Norris ◽  
Philip A. Houle ◽  
Charles B. Shrader

This chapter examines an entrepreneurial effort to provide products in the Internet security marketplace. The specific focus is on a company named Palisade Systems, which is now faced with questions regarding their future business direction in this field (Mahanti et al., 2004). Current questions include how to take advantage of recent legislation regarding privacy and computer security, and the general increase in awareness of the need for security in the Internet and in related networks. In this chapter we discuss the Internet security marketplace, recent legislation and the creation of new opportunities for marketing Internet security products, and how Palisade’s products may match these opportunities.


Author(s):  
Lauren Movius

As the Internet has spread globally, and its economic, political, and cultural influences have increased, it is necessary to develop appropriate policy to govern it, in order to manage and protect it’s presence in our lives. While national governments apply their laws on the Internet, the Internet presents many issues that span national jurisdictions, and therefore requires global governance. Early Internet governance was self-regulatory and involved organizations and a community of users that made decisions through rough consensus. ICANN and the technical issue of domain name and addressing began debates over the issue of Internet governance. Larger issues of Internet governance emerged during the World Summit on the Information Society, whose existence illustrates the shift towards accepting the need for a global, more formal framework of governance. This chapter explores Internet governance and covers the following themes: understanding the challenge of governing the Internet; frameworks and definitions of Internet governance; and the evolution of the Internet governance debate. As there is much disagreement about what Internet governance is, this chapter synthesizes the main issues and debates and provides an overview of Internet governance.


Sign in / Sign up

Export Citation Format

Share Document