32 books
In the complex world of international trade, to sustain the competition from developed countries and to achieve competitive and strategic benefits, developing countries are resorting to trade alliances among themselves, which make them combat the hegemonic powers with a collective strength. During the dawn of the twentieth century and after the world wars, many regional economic blocs have been formed to promote trade among nations. Trade blocs come in different ...
The Internet or the www houses millions of web sites, billions of web pages and tons of data and is growing exponentially. Apparently, it is almost impossible to lay one s hands on the right information one is looking for in this ocean of information, unless one knows the exact URL. This condition renders the power of the Internet limited only to the individual s memory. This is where the role of a search engine becomes meaningful. A search engine or search ...
Of late, Behavioral Economics has evolved as a sub discipline of economics, which questioned the fundamental assumptions of traditional economic theory regarding human rationality and economic behavior. Behavioral Economics is based on the psychological underpinnings explaining human economic behavior and decision-making. It attempts to bridge the gaps in neoclassical economic theory by blending psychological, biological and ecological aspects into fundamental ...
From the early days of cracking passwords and stealing information from personal computers to deadly Internet based attacks that can shake the security of an entire nation, cyber crimes have evolved from the endeavors of entertainment by cyber kiddies to the acts of organized crimes and terrorist activities of cyber mafia. Virus attacks, hacking, browser hijacks, spam, DoS attacks, Phishing, Pharming, traffic analysis and so on, are various manifestations of ...
Companies that implement effective technology solutions can gain a competitive advantage in today's environment. The proper use of technology can enhance a company's competitive position. Services industry is one of the key sectors where IT can be exploited to its maximum potential. Substantial portion of delivering services involves a lot of information sharing and customer interaction. Thus, the role of IT becomes paramount in facilitating a smooth flow of ...
A Decision Support System (DSS) can be defined as the combination of data, information and computer and non-computer-based tools and services working within a structured framework to improve the process and the outcome of decision-making. DSS offers flexibility, adaptability and a quick response to its users. The world is full of uncertainties in which business decisions are being taken every day, every hour and every minute. Decision-makers need access to lots ...
As the Internet has increasingly penetrated into all walks of human life, the use of web-related services has also increased by leaps and bounds. After the web, Peer-to-Peer (P2P) is the next big thing that has happened on the Internet, almost redefining the way computers are networked the way services are delivered, and the way users are connecting/communicating/collaborating with other users on the net. The initial super success of P2P-based file-sharing ...
Emerging technology can be defined as a “science-based innovation with the potential to create a new industry or transform an existing industryâ€. The convergence of the Internet, telecom, cable, satellite, computer, entertainment and information industry has created a digital revolution. This digital revolution has driven convergence within the IT and telecom industries and has radically redefined the landscape of these industries ...
To date, "Web Security" has been associated with debates over cryptographic technology, protocols and public policy, obscuring the wider challenges of building trusted Web applications. Since the Web aims at being an information space that reflects not just human knowledge but also human relationships, it will soon realize the full complexity of trust relationships among people, computers and organizations. This has led to a new breed of systems – ...
In this digital era, Information Technology (IT) has become a core element for businesses to make their operations more efficient, improve product quality, comply with statutory requirements, manage risk and security- in short, generate overall business value. As the dependence of organizations on IT had grown, the IT budgets have increased significantly. Thus, the management were required to optimize IT investment and extract maximum value out of every dollar ...
Regardless of industry, size and location, today’s agile and highly productive organizations require something, which is fundamentally different and that makes their operations streamlined, eliminates wastes and enables them to exceed their targets. Presently, business houses look at Knowledge Integration as the solution. Knowledge Integration is essentially a process of exchange, creation and morally appropriate application of knowledge within a complex system ...
A new field, cyber forensics, is in the process of extracting information and data from computer storage media accurately and reliably. However, this is not enough, because here the challenge lies in not just finding and collecting data, but preserving and presenting it in a manner that a judicial prospect will accept it. These are ways of combating cyber crime, which make it important for advances in the law enforcement, legal and forensic computing technical ...
IT is indispensable in smooth functioning of any organization today, irrespective of the industry it functions in. The quantum and quality of IT investment differ as to how the systems are used, the degree to which they align with the strategic goals of the organization and ultimately how much business value they deliver vis-Ã -vis the resources invested. Further, all IT systems employed are not of equal strategic importance. IT systems are categorized into ...
After blogs and RSS feeds, Wikis have opened new avenues of collaborative working both in the knowledge industry and in individual intellectual pursuits. A Wiki is a way of creating interlinked web or HTML pages by using simple mark-up language with a web browser. After the success of 'Wikipedia', an online public encyclopedia, Wikis have become very popular and are used in commercial organizations, research agencies and universities. This book brings to light ...
In the ever evolving field of information technology, every element of the software’s operational environment is in a state of constant flux: frequent changes in the hardware, operating system, cooperating software and client’s expectations are motivated by performance improvements, bug-fixes, security breaches and attempts to assemble synergistically ever more sophisticated software systems. With increasing applications of software, the complexity of the ...
Electronic negotiation is an interdisciplinary research area that combines the best of economics, information systems, computer science, communication theory, sociology and psychology. Today, negotiations are conducted via electronic media powered by sophisticated software applications. These support systems can support collaboration between decision-makers who are separated geographically and is an important part of an e-business today.
Today, the Internet has evolved into a dynamic information warehouse, housing variety of data in diverse data formats. Each data element on the web has a meaning and context attached to it that defines its semantics. The users on Internet need the searched data to be compiled at a faster pace also taking into consideration the relevance of the data. Today, the most advanced search engines facilitate retrieving data from the web on the basis of matching and ...
A new field, cyber forensics, is in the process of extracting information and data from computer storage media accurately and reliably. However, this is not enough, because here the challenge lies in not just finding and collecting data, but preserving and presenting it in a manner that a judicial prospect will accept it. These are ways of combating cyber crime, which make it important for advances in the law enforcement, legal and forensic computing technical ...
For years, computer virus has affected the productive use of computers, often challenging the user and the anti-virus software vendor from preventing or recovering from viral-attacks. Virus attack, hacking, stealing password, browser hijack, spam, and malware are very common major impediments for activities on the Internet. Growing technical sophistication and ingenuity of the masquerader have given birth to another computer malady that has become quite ...
Today, IT complements global businesses to so that it redefines business approaches, economic models and functional frameworks. Consequently, businesses are embracing IT as a strategic tool for competitive advantage. This requires building IT infrastructure by carefully addressing a company’s business goal and complementing its entire organizational strategy. This book outlines the strategic importance of IT, highlights the changing role of CIOs and IT managers ...
The growing ubiquity and pervasiveness of the web in day-to-day life of humans is having a profound impact on the way people socialize, network, communicate and collaborate on the web. Accelerated by the increasing activities on the Internet, coupled with path breaking innovation in web technologies, the web is transforming itself from being a sedate online publishing medium to a dynamic platform for collaboration. The emergence and wide acceptance of the new ...
Growing business complexities and information needs have prompted extensive use of complex software applications in almost every organizational function. These complex applications, from payroll to supply chain integration and customer relationship management, and running on heterogeneous technology infrastructure have exhausted the limits of traditional software architecture. Further, a shift in business orientation, i.e., from product to service calls for a ...
In this digital era, telecommunications and networking technologies are instrumental in enabling people and businesses across the globe to interconnect and transact, shrinking the physical world into a global digital village. However, even after a decade of active proliferation, this connectivity is still eluding the geographically remote and economically backward areas depriving the people there from participating in the digital revolution. Such disconnections ...
Software programs have become the most crucial building blocks of today’s ICT infrastructure. Starting from Operating System to Database Management, Data Communication and myriad software tools run an information system. Software can be developed as proprietary business by an organization or an individual and distributed at cost, or Free/Openly, by the Open Source community of voluntary contributors.