- Organization of the Book. - The authors explain the specifics of the technology and its potential benefits. - A strength of the book is its international flavor. - Thus, “the relationship marketing process involves an iterative cycle of knowledge acquisition, customer differentiation, and customization of the entire marketing mix” (Moon, 2002).. - Most of the relationship and loyalty programs tend to focus on the. - Table 1 provides an overview of the five CRM factors and their roles in the three phases of firm-customer interactions. - Proceedings of the Fourth Americas Conference on Information Systems, 281-283.. - Proceedings of the Seventh Americas Confer- ence on Information Systems, 900-907.. - Journal of the Academy of Marketing Science . - Relationship marketing – Some reflections on the state of the art of the relational concept. - Proceedings of the 34 th Hawaii Interna- tional Conference on System Sciences. - Proceedings of the Second International Conference on Telecommunication and Electronic Commerce.. - Proceedings of the Seventh American Conference on Infor- mation Systems, 854-856.. - Proceedings of the Seventh Americas Conference on Informa- tion Systems, 450-455.. - Proceedings of the Seventh Ameri- cas Conference in Information Systems, 831-833.. - Proceedings of the Eighth Americas Conference on Information Systems . - Communications of the Association for Information Systems . - Proceedings of the Thirty-fourth Hawaii In- ternational Conference on System Sciences. - Proceedings of the Ninth Americas Conference in Information Sys- tems . - Current Problems and State-of-the-Art. - Only a small part of the representation of the image in the display coordinate system is used for a context overview. - Additional manipulation of the image content needs additional time:. - On the other hand, hierarchical structures allow an efficient control of the number of nodes to be presented. - An orthogonal view of the M AGIC E YE V IEW with about 1,000 nodes. - We applied the concept of the E VENT H ORIZON based on the following considerations:. - Furthermore, subtrees can be folded and unfolded to reduce the complexity of the hierarchy. - Arbitrary nodes of the structure can be selected and the entire. - Reducing the complexity of the graphical output. - Instead of 3D, a 2D representation of the Magic Eye View is used. - Different views of the event horizon: Minigraph with circlets (left) and symbols (right). - Improvements of the algorithm are introduced and published in Battista et al.. - The nodes of the graph are assigned to layers. - This arrangement is done by exploring the complexity of the substructures. - Not all nodes of the original graph are inserted into the hierarchy. - Therefore, changes of the layout are fast and easy to compute. - Textual information can be presented at the status bar at the bottom of the window.. - This requires a special treatment to ensure the information of the whole Web can be used.. - However, a problem is the need for a special preparation of the Web pages.. - Textual elements can use fonts and font size of the handhelds. - This includes the visualization of the Web graph described in the fourth section. - State of the art report, Eurographics 2002, Saarbrücken.. - In the above examples of m-payment models, the role of the customer and the merchants remain consistent.. - Proceedings of the Twelfth BIT Annual Conference, Manchester, UK.. - Proceedings of the Fifteenth International Bled Electronic Commerce Conference, Bled, Slovenia.. - Clash of the Titans – The future of m-financial services in Europe [HTML]. - Proceedings of the IFIP WG 8.4 Confer- ence, Copenhagen, Denmark.. - More specifically, the objectives of the study are:. - The first section provides a brief review of the literature on the technology acceptance model. - The second stage of the analysis concentrates specifically on a quantitative marketing research. - The results of the quantitative marketing research are now summarized. - Composition of the sample. - Software evaluation and choice: Predictive validation of the technology acceptance instrument. - Empirical evaluation of the revised technology acceptance model. - These are a few of the key elements surfacing in response to the digital revolution and the fast paced evolution of mobile technologies. - As a witness to the changes brought on by the evolution of the Internet in the late 1990s, developing countries have made a conscious decision to “leapfrog”. - Many in the industry like to think of the m as representing: multilingual, multicultural, multimodal, multidevice, and so forth. - privatization of many of the industries. - Developing countries and the service providers are claiming to “leapfrog” the rest of the developed world by offering advanced mobile technologies. - The growth of the. - “Village Cell Phone” program was a key in the transformation of the country.. - These relationships led to the creation of the “small-scale telecentres”. - This trend alarmed many of the village leaders and the govern- ment of those developing countries. - The evolution of the Grameen Phone women has not just created a change in the business strategies, but also a social change. - Many of the developing countries are still years behind in social advances. - Vanessa Gray and Michael Minges of the International Telecommunication Union (ITU) discuss the other variables in the effort to narrow the digital divide (see Appendix G). - Human skills refer to literacy, language, and learning as keys to the success of the mobile revolution.. - this allows many to avoid learning the use of the traditional keyboard altogether (BBC News Online, 2002).. - Many of the developing countries face the issues of localization and spoken languages. - Several organizations were established to address the many issues facing women in the developing countries and the narrowing of the gender divide (among many others):. - this is not a reality for many of the women in developing countries. - One of the alternatives has been the growth of the prepaid calling plans. - Many of the countries have yet to relinquish control of the governing. - Ethnologue.com - research of the world’s languages - http://www.. - Recent surveys and public opinion polls have accented the value of the Internet. - On the other hand, the most significant barrier for online shopping – the trust of the customer – begins to fall. - Such initiatives especially focus on the development and progress of the watermarking technology for applications. - One of the most effective copy control mechanisms is the regional code. - In order to design an effective watermarking algorithm the watermarking data or proce- dure can be linked to the content of the digital document. - This classifier is based on the idea and properties of the human visual system (HVS) and human audio system (HAS). - Further techniques consider the transformation of the image and its specific domains. - The detection of the watermark is based on the principles of correlation. - In this case, it is impossible to determine the originator of the document. - Tutorial of the ISPACS ’98 Conference in Melbourne, Australia.. - Proceedings of the IEEE. - An existing work describing DRM entities and their relations is presented in the framework of the <indecs>. - To demonstrate our integrated domain model, we make use of the basic notions in the object-oriented discipline. - negotiation and confirmation of the copyrights and usage rights transfer. - The different dimensions of the creation are taken into account in the description of the material metadata.. - Also, the identifiers are seen as attributes of the entity. - Associations between entities follow the straightforward rules of the <indecs>. - This is due to the close relationship between content and rights expressions, as presented in the framework of the <indecs>. - However, the basic responsibility of the media distributor is to deliver product copies to the customer. - Communica- tions of the ACM . - Communications of the ACM . - Synthesis of the IMPRIMATUR Business Model.. - The critical role of digital rights management processes in the context of the digital media management value chain. - The impact of the former depends on the accuracy of the latter. - We now define measures of the dynamic nature of ad hoc networks. - This metric characterizes the redundancy and connectivity of the target network. - Network diameter Length of the longest path in the network Change rate Total changes per
Xem thử không khả dụng, vui lòng xem tại trang nguồn hoặc xem
Tóm tắt