The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this talk, I'll argue that we need to change our way of thinking drastically and Europe needs to catch up urgently those in the world who have already started to do their homework outside Europe in order to preserve employment and the standard of living in Europe. We have already missed the absolute leadership in the nano-electronics world. It is in the hands of US and Far East owned/based companies...
With the current trend of introducing networking capabilities into traditional industries, Cyber-Physical Production Systems (CPPS) are increasingly targeted by cyber-attacks. Especially with the progression of introducing the industry 4.0 paradigm to sectors that until now worked with strictly sealed environments, new attack surfaces are brought to the attention of cyber-criminals that already possess...
Internet of ETC is a problem that current technology development and users needs to be solved urgently. Furthermore, the risk of Internet access to traditional industry is the main direction currently being explored and studied across all trades. This paper will propose a set of Internet service security system.
The number of active, online phishing websites continues to grow unabated in recent years. This has created an ever-increasing security risk for both individual and enterprise users in terms of identity theft, malware, financial loss, etc. Although resources exist for tracking, cataloguing, and blacklisting these types of sites (e.g., PhishTank.com), the ephemeral nature of phishing websites makes...
Property Management Systems (PMS) are Information Systems, which provide for hotel room check-in and checkout, reservations, rooms and revenue management, and many more features relevant to the hospitality industry. An important factor in choosing between a hosted PMS and an on-premise solution is the Payment Card Industry Data Security Standards (PCI DSS) requirements. PCI DSS are widely accepted...
The paper focuses on Cloud Computing, which is emerged as an important technology for e-commerce industries. The authors, firstly, outline what cloud computing is, the state of the art of cloud research in e-commerce, and various existing cloud based e-commerce model; secondly, propose a conceptual cloud-based e-commerce model for developing e-commerce applications in Bangladesh. The proposed cloud-based...
Electronic Health Record (EHR) Systems dominate healthcare industries in many countries. In the United States, the Obama administration promotes EHR through a significant incentive program, so-called Meaningful Use. This paper shares two important lessons that the majority of stakeholders should have learned as of now, i.e. toward its last phase: (1) significant administrative overhead, and (2) understatement...
Information technology (IT) is one of the most important drivers of innovation in production and automation. In Germany, the term Industrie 4.0 summarizes various activities and developments involved in the evolution of industrial processes in production, logistics, automation, etc. Many research and development projects work on different aspects of these developments. In the view of politics, industry,...
E-commerce business is a new commodity trading patterns that is related with telecommunication and computer perfectly. E-commerce business has been developed rapidly with the development of both telecommunications and computer technologies. This paper makes a brief introduction to the E-commerce business model which is now a very popular technology for venture, and list other business benefits and...
Cyber security is becoming an important aspect in every industry like in banking sector, power and automation sectors. Servers are critical assets in these industries where business critical sensitive data is stored. These servers often incorporates web servers in them through which any business data and operations are performed remotely. Hence, it is obvious that for a reliable operation, security...
The paper is to explore how to satisfy customer-contact employees when they encounter their managers in the Chinese leisure industry. Adopted a qualitative approach, based on a case study of the Chinese golf industry, the research indicates internal service quality is constructed by nine dimensions in the four service situations, and develops a model of internal service quality construct during internal...
The information technology (IT) services industry is undergoing a rapid change with the growth of market interest in cloud, analytics, mobile, social, and security technologies. For service providers to match this pace, they must rapidly transform their workforce in terms of job roles, and do so without incurring excessive cost while continuing to deliver core services. In this paper, we describe...
This paper proposes a practical and framework based approach to design an architecture transformation strategy and roadmap aiming to transform or modernize critical legacy enterprise systems. The approach is business value driven with IT supportability in terms of lower application operational and support costs, higher business value and shorter time to market of application delivery. The approach...
Requirements management and traceability have always been one of grand challenges in software development area. Studies reveal that 30–40% of software defects can be traced to gaps or errors in requirements Although several models and techniques have been defined to optimize the requirements process, ensuring alignment and consistency of elicited requirements continues to be a challenge. All software...
In late 1990s. the multi-application initiative was put forward to have multiple applications on a single smart card. This would have enabled a cardholder to accumulate all of her smart card based applications (e.g. banking, telecom, and transport etc.) on a single device. However, despite the initial fervour for the multi-application smart card initiative, there were no wide spread adoption of this...
This paper tries to evaluate the openness of Chinese tourism market toward foreign travelers. The way of approach is by examining the tourism services trade barriers. This paper includes a model of tourism services trade barrier, which is built based on Paasche index theory, with America's direct tourism output and GNI per capita chosen as its two variables. With this model, the degree of the openness...
The telecommunication industry has been successful in turning the Internet into a mobile service and stimulating the creation of a new set of networked, remote services. In this paper we argue that embracing cloud computing solutions is fundamental for the telecommunication industry to remain competitive. However, there are legal, regulatory, business, market related and technical challenges that...
After socialization group-purchase pattern, which Group on was a representive of, had get ahead in America, Chinese group-purchase websites expanded by leaps and bounds in 2010, because of low investment, low technology and simple mode. During the period, the problems of malicious fraud, quality of product and funds security ect. appeared in quantity, so the group-purchase websites were faced with...
With the development of global information process, tremendous improvement has been seen in China's financial informationization, the software in the financial industry has been made significant applications. The development of software applications on the financial sector has significant impacts, both the positive sides, as well as the negative sides. Therefore, it is essential to make appropriate...
With a very wide variety of potential applications, the market for Machine-to-Machine (M2M) connectivity - sometimes referred to as Embedded Mobile (EM) - is one of the main growth areas in telecommunications and associated vertical industries. There are several major differences between the embedded domain and traditional subscriber-centric mobile communications. Chief among these is the way in which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.