« Home « Chủ đề mạng lưới tiếp thị

Chủ đề : mạng lưới tiếp thị


Có 220+ tài liệu thuộc chủ đề "mạng lưới tiếp thị"

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P201

tailieu.vn

¿QGLQJLVVXSSRUWHGE\RWKHUUHVHDUFKHUVZKRZDUQ that initiating an online reverse auction has the potential to damage a long term relationship with the supplier (Jap . Next, I looked to see whether there was a re- lationship between the purchasing agents’ years of buying experience and the impact of ORAs on cooperation in the supplier relationships and long term supplier viability. Again, as the purchasing...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P202

tailieu.vn

In B2C auctions, large mer- chants such as Dell, Disney, Home Depot, IBM, Motorola, Sears, Sun Microsystems, and Sharper Image have been able to use Internet auctions to VHOOH[FHVVLQYHQWRU\IRUJUHDWHUSUR¿WWKDQWKH\. As further evidence of the growth of B2C Internet auctions, E\WKH¿UVWTXDUWHURI,QWHUQHWDXFWLRQHHU eBay alone hosted approximately 383,000 eBay stores worldwide, including 171,000 on Web sites other than their U.S. While many studies...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P203

tailieu.vn

¿UVWGDWDVHWWKH'9'PRYLHWKHFODVVL¿FDWLRQ tree analysis shows that if the initial bid price LVJUHDWHUWKDQWKHQWKH¿QDOELGSULFHLV DERYH WKH DYHUDJH ¿QDO ELGGLQJ SULFH ,Q RWKHU. words, when sellers set the initial bid price at a level greater than $9.63, these sellers earn a price premium (PP). The remaining rules pertain to situations in which the sellers’ initial bid price is less than $9.63. Rule 2 (see...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P204

tailieu.vn

This study may only demonstrate the fact that sales of collectible items will likely be disproportionately affected by the quality of the item and the level of detail in its descrip- tion.. A Communications Model for Knowledge Sharing. An integrative, systems-based model of knowl- edge sharing can provide a way of visualizing the interrelated elements that comprise a knowledge management...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P205

tailieu.vn

Within the knowledge management model, WKHKRUL]RQWDOHOHPHQWVUHÀHFWWKHDQDO\WLFDQG synthetic approaches to knowledge. As with the other elements in the model, QHLWKHUDSSURDFKLV³EHWWHU´WKDQWKHRWKHUUDWKHU they represent alternate ways of combining ideas to reach knowledge or understanding. The model LGHQWL¿HVKXPDQFDWHJRULHVWKDWDSSO\WRDQ\SUR- cess. However, organizations need to adapt these FRQFHSWVWRWKHVSHFL¿FFRQFHSWXDOFRQWH[WVRI knowledge used within the organization.. Method of Knowledge Sharing:. The combination of technological tools and hu- man processes...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P206

tailieu.vn

Granted that much of the conversation has nothing to do with the business at-hand, and is more social in nature, it nonetheless helps build a friendly environment in which knowledge shar- ing becomes easier and more effective. As one PDQDJHURIDUHVWDXUDQWUHPDUNHG³,GRQRWPLQG if my employees engage in conversations during work hours…it is important that they like each other and of course like...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P207

tailieu.vn

DVLJQL¿FDQWH[WHQWWKHUHE\DOORZLQJWKHXQFRX- pling of IS integration and relational integration.. It is now possible for organizations to have IS integration without developing strong non-IS linkages. We propose a framework to account for this recent shift and present a typology for classifying interorganizational systems based on the segregation of IS and relational integration.. As the costs of IT, especially those pertaining to hard-...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P208

tailieu.vn

Unlike Samsung, Hyundai-Kia does not subclassify direct materials into categories such as strategic or non-strategic materials.. We collected information on relational and IS integration from two Hyundai-Kia sites, the Pro- FXUHPHQW+HDGTXDUWHUVLQWKH6HRXO2I¿FHDQGWKH Procurement Team at the Ulsan Plant. Data from these two sites painted a picture of Hyundai-Kia that is quite different from that of Samsung. The level of interorganizational systems...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P209

tailieu.vn

There are substantial inequalities in access to and use of the Internet. These inequalities build on en- during social and economic inequalities that have themselves been rooted in previous rounds of the development of electronic technologies and have largely resisted public policies designed to remedy them. Rapid developments in the use of the In- ternet have great potential for commercialization...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P210

tailieu.vn

(1998) Virtual control and discipling on the Internet: Electronic govern-. ability in the new wired world. (2004) Evaluation of the public Internet access initiative>¿UVWGUDIW@5HWULHYHG from http://www.scotland.gov.uk/library5/fi- nance/epiapi-00.asp. Digital citizenship: Parameters of the digital divide. E-Business in Developing Countries:. A Comparison of China and India. The Internet has changed the way many companies do business, but has also tended to increase...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P211

tailieu.vn

While private sector initiatives expanded the Inter- net infrastructure and Internet services markets, government initiatives promoted the expansion of the Internet into parts of the country not well served by private ISPs (Wolcott et al., 2003).. Rather than acting to leapfrog India into the forefront of the global knowledge community, Mir and Mir (2005) sug- JHVWLWVUROHVKRXOGEHPRUHRI³FDWDO\VLV´$VVXFK ICT works better when...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P212

tailieu.vn

E-Business Offshore Outsourcing. It presents the analysis of the nature and the social impact of information technology and the corresponding formulation DQGMXVWL¿FDWLRQRISROLFLHVIRUWKHHWKLFDOXVHRI technology. &XUUHQWO\WKHUHLVFRQVLGHUDEOHFRQ¿GHQFHWKDWZH are on the edge of an important deepening of the information society. In the same time, the production, services and trade become increas- ingly dispersed over wider area dealing with new goods market and labor market...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P213

tailieu.vn

Ethics and Culture. Through globaliza- tion, non-western cultures around the world are being exposed to the values of the west, and on DVXSHU¿FLDOOHYHODWOHDVWDSSHDUWREHDGRSWLQJ western culture. However, the adoption of the outward signs of western culture such as business dress codes does not necessarily mean that one culture has abandoned its own social, ethical and moral values in favor of those...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P214

tailieu.vn

An e-business company with off- shore outsourcing must provide equal access to the best jobs in the world for people who are willing to compete, and equal employment op- portunity to all employees regardless of age, race, color, national origin, sexual orientation, gender, disability or religion. Besides these global ethics issues, there are nine key ethics issues on the global...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P215

tailieu.vn

Upholding consumer information privacy may not only be good for business in terms of increas- LQJLQIRUPDWLRQHI¿FLHQF\DQGUHGXFLQJSULYDF\. concern, it also may help to engender consumer WUXVW RQOLQH 7UXVW KDV EHHQ GHFODUHG WKH ³sine qua non of the digital economy” (Papadopoulou, Andreou, Kanellis, &. The absence of FRQ¿GHQFHHQJHQGHULQJPHDVXUHV such as physical proximity, handshakes, body language, and so forth may not be exclusive...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P216

tailieu.vn

Although there are methodological limitations which may affect the validity of the results, this study provides e-entrepreneurs with an in-depth insight into Australian Internet users’ attitudes and behaviours toward online information privacy, the knowledge from which, may be applicable cross-culturally.. 162), and the PSI pro-. Managing legal liability of the Net: A ten step guide for IT managers. Regulating privacy...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P217

tailieu.vn

Let us suppose that before the auction begins, bidders B 1 , B 2 , and B 3 make a deal to perform that plan. Let us note that the plan will work only if X sends both the transformation of his or her own bid and the transformation of some other value to bidders in the set {B 1...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P218

tailieu.vn

The European Union has a set of directives UHODWHGWRHSULYDF\FDOOHG³7KH'DWD3URWHFWLRQ Directive” (e.g., Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector [Directive on privacy and electronic communications]) (The European Commission, 2002).. (a) The purpose for which PII needs to be...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P219

tailieu.vn

Retrieved February 18, 2005, from http://. www.parl.gc.ca/36/2/parlbus/chambus/house/bills/. Retrieved Feb- ruary 15, 2005, from http://ipsociety.net/psiframe- ip-security.pdf. Retrieved February 11, 2005, from http://www.alphaworks.ibm.com/. Retrieved February 11, 2005, from http://www.crimes-of-persuasion.com/Crimes/Tele- marketing/Inbound/MajorIn/id_theft.htm Information and Privacy Commissioner for Brit- ish Columbia. Retrieved February 10, 2005, from http://www.oipcbc.org/sector_public/usa_pa- WULRWBDFWSGIVUHSRUWSULYDF\¿QDOSGI. Retrieved February 18, 2005, from http://www.emaillabs.. Retrieved February 20, 2005, from http://www-microsoft.. Retrieved from http://www.. Retrieved February...

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P220

tailieu.vn

In general, access control rules are created to apply WKHUHVWULFWLRQWRVSHFL¿FFRQWHQWVRUDSSOLFDWLRQ IXQFWLRQDOLW\7KHIROORZLQJVSHFL¿FDWLRQVVKRXOG be applied in the Web service architecture to ensure these security goals.. <PaymentInfo[mlns='http://e[Dmple.org/paymentv2'>. <EncryptedDaWD[mlns='http://www.w3.org/[Plenc#' Type='http://www.w3.org/[Plenc#Element'/>. <EncryptionMethod Algorithm='http://www.w3.org/200[mlenc#tripledes-cbc'/>. <ds:KeyInfo [Plns:ds='http://www.w3.org/2000/09/[Pldsig#'>. Audit trails are also an important security re- quirement in Web services architecture (Booth,. They can audit the activities for the Web services architecture such as changes in DQ\FRQ¿JXUDWLRQ2QWKHRWKHUKDQGWKH\PD\. All...