Improving E-Commerce Web Applications Through Business Intelligence Techniques

Improving E-Commerce Web Applications Through Business Intelligence Techniques PDF Author: Sreedhar, G.
Publisher: IGI Global
ISBN: 1522536477
Category : Business & Economics
Languages : en
Pages : 379

Get Book Here

Book Description
As the Internet becomes increasingly interconnected with modern society, the transition to online business has developed into a prevalent form of commerce. While there exist various advantages and disadvantages to online business, it plays a major role in contemporary business methods. Improving E-Commerce Web Applications Through Business Intelligence Techniques provides emerging research on the core areas of e-commerce web applications. While highlighting the use of data mining, search engine optimization, and online marketing to advance online business, readers will learn how the role of online commerce is becoming more prevalent in modern business. This book is an important resource for vendors, website developers, online customers, and scholars seeking current research on the development and use of e-commerce.

Improving E-Commerce Web Applications Through Business Intelligence Techniques

Improving E-Commerce Web Applications Through Business Intelligence Techniques PDF Author: Sreedhar, G.
Publisher: IGI Global
ISBN: 1522536477
Category : Business & Economics
Languages : en
Pages : 379

Get Book Here

Book Description
As the Internet becomes increasingly interconnected with modern society, the transition to online business has developed into a prevalent form of commerce. While there exist various advantages and disadvantages to online business, it plays a major role in contemporary business methods. Improving E-Commerce Web Applications Through Business Intelligence Techniques provides emerging research on the core areas of e-commerce web applications. While highlighting the use of data mining, search engine optimization, and online marketing to advance online business, readers will learn how the role of online commerce is becoming more prevalent in modern business. This book is an important resource for vendors, website developers, online customers, and scholars seeking current research on the development and use of e-commerce.

Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business

Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799889580
Category : Business & Economics
Languages : en
Pages : 1964

Get Book Here

Book Description
In the next few years, it is expected that most businesses will have transitioned to the use of electronic commerce technologies, namely e-commerce. This acceleration in the acceptance of e-commerce not only changes the face of business and retail, but also has introduced new, adaptive business models. The experience of consumers in online shopping and the popularity of the digital marketplace have changed the way businesses must meet the needs of consumers. To stay relevant, businesses must develop new techniques and strategies to remain competitive in a changing commercial atmosphere. The way in which e-commerce is being implemented, the business models that have been developed, and the applications including the benefits and challenges to e-commerce must be discussed to understand modern business. The Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business discusses the best practices, latest strategies, and newest methods for implementing and using e-commerce in modern businesses. This includes not only a view of how business models have changed and what business models have emerged, but also provides a focus on how consumers have changed in terms of their needs, their online behavior, and their use of e-commerce services. Topics including e-business, e-services, mobile commerce, usability models, website development, brand management and marketing, and online shopping will be explored in detail. This book is ideally intended for business managers, e-commerce managers, marketers, advertisers, brand managers, executives, IT consultants, practitioners, researchers, academicians, and students interested in how e-commerce is impacting modern business models.

Developing a Keyword Extractor and Document Classifier: Emerging Research and Opportunities

Developing a Keyword Extractor and Document Classifier: Emerging Research and Opportunities PDF Author: Paul, Dimple Valayil
Publisher: IGI Global
ISBN: 1799837734
Category : Computers
Languages : en
Pages : 229

Get Book Here

Book Description
The main problems that prevent fast and high-quality document processing in electronic document management systems are insufficient and unstructured information, information redundancy, and the presence of large amounts of undesirable user information. The human factor has a significant impact on the efficiency of document search. An average user is not aware of the advanced option of a query language and uses typical queries. Development of a specialized software toolkit intended for information systems and electronic document management systems can be an effective solution of the tasks listed above. Such toolkits should be based on the means and methods of automatic keyword extraction and text classification. The categorization (or classification) of texts into predefined categories has witnessed a booming interest in the last 10 years due to the increased availability of documents in digital form and the ensuing need to organize them. Thus, research on keyword extraction, advancements in the field, and possible future solutions is of great importance in current times. Developing a Keyword Extractor and Document Classifier: Emerging Research and Opportunities presents an information extraction mechanism that can process many kinds of inputs, realize the type of text, and understand the percentage of the keywords that has to be stored. This mechanism then supports information extraction and information categorization mechanisms. This module is used to support a text summarization mechanism, which leads—with the help of the keyword extraction module—to text categorization. It employs lexical and information retrieval techniques to extract phrases from the document text that are likely to characterize it and determines the category of the retrieved text to present a summary to the users. This book is ideal for practitioners, stakeholders, researchers, academicians, and students who are interested in the development of a new keyword extractor and document classifier method.

Encyclopedia of Criminal Activities and the Deep Web

Encyclopedia of Criminal Activities and the Deep Web PDF Author: Khosrow-Pour D.B.A., Mehdi
Publisher: IGI Global
ISBN: 1522597166
Category : True Crime
Languages : en
Pages : 1162

Get Book Here

Book Description
As society continues to rely heavily on technological tools for facilitating business, e-commerce, banking, and communication, among other applications, there has been a significant rise in criminals seeking to exploit these tools for their nefarious gain. Countries all over the world are seeing substantial increases in identity theft and cyberattacks, as well as illicit transactions, including drug trafficking and human trafficking, being made through the dark web internet. Sex offenders and murderers explore unconventional methods of finding and contacting their victims through Facebook, Instagram, popular dating sites, etc., while pedophiles rely on these channels to obtain information and photographs of children, which are shared on hidden community sites. As criminals continue to harness technological advancements that are outpacing legal and ethical standards, law enforcement and government officials are faced with the challenge of devising new and alternative strategies to identify and apprehend criminals to preserve the safety of society. The Encyclopedia of Criminal Activities and the Deep Web is a three-volume set that includes comprehensive articles covering multidisciplinary research and expert insights provided by hundreds of leading researchers from 30 countries including the United States, the United Kingdom, Australia, New Zealand, Germany, Finland, South Korea, Malaysia, and more. This comprehensive encyclopedia provides the most diverse findings and new methodologies for monitoring and regulating the use of online tools as well as hidden areas of the internet, including the deep and dark web. Highlighting a wide range of topics such as cyberbullying, online hate speech, and hacktivism, this book will offer strategies for the prediction and prevention of online criminal activity and examine methods for safeguarding internet users and their data from being tracked or stalked. Due to the techniques and extensive knowledge discussed in this publication it is an invaluable addition for academic and corporate libraries as well as a critical resource for policy makers, law enforcement officials, forensic scientists, criminologists, sociologists, victim advocates, cybersecurity analysts, lawmakers, government officials, industry professionals, academicians, researchers, and students within this field of study.

Modern Theories and Practices for Cyber Ethics and Security Compliance

Modern Theories and Practices for Cyber Ethics and Security Compliance PDF Author: Yaokumah, Winfred
Publisher: IGI Global
ISBN: 1799831507
Category : Computers
Languages : en
Pages : 302

Get Book Here

Book Description
In today’s globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.

Tools and Techniques for Implementing International E-Trading Tactics for Competitive Advantage

Tools and Techniques for Implementing International E-Trading Tactics for Competitive Advantage PDF Author: Meral, Yurdagül
Publisher: IGI Global
ISBN: 1799800377
Category : Business & Economics
Languages : en
Pages : 409

Get Book Here

Book Description
The use of ICT applications has dipped into almost every aspect of the business sector, including trade. With the volume of e-commerce increasing, international traders must switch their rules and practices to e-trade to survive in such a competitive market. However, the complexity of international trade, which covers customs processes, different legislation, specific documentation requirements, different languages, different currencies, and different payment systems and risk, presents its own challenges in this transition. Tools and Techniques for Implementing International E-Trading Tactics for Competitive Advantage examines the multidisciplinary approach of international e-trade as it applies to information technology, digital marketing, digital communication, online reputation management, and different legislation and risks. The content within this publication examines digital advertising, consumer behavior, and e-commerce and is designed for international traders, entrepreneurs, business professionals, researchers, academicians, and students.

Research Anthology on Artificial Intelligence Applications in Security

Research Anthology on Artificial Intelligence Applications in Security PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799877485
Category : Computers
Languages : en
Pages : 2253

Get Book Here

Book Description
As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research. Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research.

Sustainable Business: Concepts, Methodologies, Tools, and Applications

Sustainable Business: Concepts, Methodologies, Tools, and Applications PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 152259616X
Category : Business & Economics
Languages : en
Pages : 1998

Get Book Here

Book Description
In the increasingly competitive corporate sector, businesses must examine their current practices to ensure business success. By examining their social, financial, and environmental risks, obligations, and opportunities, businesses can re-design their operations more effectively to ensure prosperity. Sustainable Business: Concepts, Methodologies, Tools, and Applications is a vital reference source that explores the best practices that promote business sustainability, including examining how economic, social, and environmental aspects are related to each other in the company’s management and performance. Highlighting a range of topics such as lean manufacturing, sustainable business model innovation, and ethical consumerism, this multi-volume book is ideally designed for entrepreneurs, business executives, business professionals, managers, and academics seeking current research on sustainable business practices.

Integrating Blockchain Technology Into the Circular Economy

Integrating Blockchain Technology Into the Circular Economy PDF Author: Khan, Syed Abdul Rehman
Publisher: IGI Global
ISBN: 1799876446
Category : Business & Economics
Languages : en
Pages : 307

Get Book Here

Book Description
In recent decades, the industrial revolution has increased economic growth despite its immersion in global environmental issues such as climate change. Researchers emphasize the adoption of circular economy practices in global supply chains and businesses for better socio-environmental sustainability without compromising economic growth. Integrating blockchain technology into business practices could promote the circular economy as well as global environmental sustainability. Integrating Blockchain Technology Into the Circular Economy discusses the technological advancements in circular economy practices, which provide better results for both economic growth and environmental sustainability. It provides relevant theoretical frameworks and the latest empirical research findings in the applications of blockchain technology. Covering topics such as big data analytics, financial market infrastructure, and sustainable performance, this book is an essential resource for managers, operations managers, executives, manufacturers, environmentalists, researchers, industry practitioners, students and educators of higher education, and academicians.

Research Anthology on Combating Denial-of-Service Attacks

Research Anthology on Combating Denial-of-Service Attacks PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799853497
Category : Computers
Languages : en
Pages : 655

Get Book Here

Book Description
Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to these networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives but also by an inherent logistical bias that grants advantage to attackers. Research Anthology on Combating Denial-of-Service Attacks examines the latest research on the development of intrusion detection systems and best practices for preventing and combatting cyber-attacks intended to disrupt business and user experience. Highlighting a range of topics such as network administration, application-layer protocols, and malware detection, this publication is an ideal reference source for cybersecurity professionals, IT specialists, policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.