The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) is captivating the society because of its potential to rapidly transform businesses and people's lives. It is widely believed that IoT will also transform the industrial automation business in terms of improved productivity, less cost, flexibility, and increased revenues. Hence, there are some challenges that needs to be addressed when IoT is introduced to the industrial...
The software defined optical network (SDON) service plays an important role in the production and operation of the network system. It's important to solve the problem of how to reduce the risk and distribute the service path more rationally. However, most of the existing algorithms do not take into account service importance. In this paper, a risk balancing routing assignment mechanism based service...
This paper presents a case study from a project in Arusha region (north Tanzania), aiming at improving access to electricity in secondary schools through the establishment of a social enterprise, in charge of promoting rural electrification by applying the “4As Framework” with an innovative way and business structure. The work highlights benefits and challenges from the field, in order to drawn some...
In the light of the rapidly changing and benefits brought by cloud computing, the study is to find the critical factors that may hinder the benefits of cloud adoption, with respective measures proposed. It was found that control self-assessment (CSA) can enhance the IS security and improve business value delivery. A research model between CSA, cloud security (CS) and cloud-related business performance...
This paper aims to study factors influencing trust and purchase intention on the Internet, develop model of trust and purchase intention by empirical data, and analyze path of antecedents influencing purchase intention. This study identifies the factors proposed in the existing social commerce constructs: recommendation and referrals, rating and reviews, forums and communities, together with three...
Conformance checking is a crucial challenge for modern inter-organizational business processes when critical security, privacy and workflow constraints must be satisfied to ensure the reliability of multi-party business procedures. Many of these constraints can be expressed in terms of causal dependencies, and verifying such dependencies can be fundamental to determine the correctness of transactions...
Cloud federation is a group of aggregated providers, who are mutually cooperating and collaborating to share their resources in order to improve each other services. It has lured the attention of commercial industries towards itself for its effective utilization of cloud resources. Effective management of the resource is very much required in order to increase the profits of an individual service...
The rapid growth of Social Commerce (s-commerce) fuels the need for delivering better quality of services. The existence of C2C social commerce on Facebook and other social media networks requires the use of electronic service quality (e-SQ) instruments. The aim of this paper is to apply the existing e-SQ measures to the context of C2C s-commerce in Thailand. A pilot test study was conducted on Facebook...
Cloud computing has proved to be a viable model for delivering information technology services through the web. It provides users the ability to share distributed resources owned by a central service provider at minimal setup costs. However, due to its nature, existing and potential users of the cloud are more concerned about the integrity, security and privacy of their data, and also the ability...
The Prosumers—customers who not only consume energy, but produce energy as well—are not only causing complexity in the electricity system. They hold the key to the resolve that complexity as well, which is energy flexibility in both demand and supply. This flexibility can be used for balancing the energy production and consumption and avoiding grid overload situations. This requires to take into account...
This paper deals with the future development of cloud computing. A detailed SWOT Analysis examines the most important factors to be considered for the future of cloud computing. Based on the outcomes, the real value of cloud computing is discussed, followed by the challenges for the future development of cloud computing. Those points finally lead to a statement regarding whether cloud computing represents...
The paper is to explore how to satisfy customer-contact employees when they encounter their managers in the Chinese leisure industry. Adopted a qualitative approach, based on a case study of the Chinese golf industry, the research indicates internal service quality is constructed by nine dimensions in the four service situations, and develops a model of internal service quality construct during internal...
With the cyber-revolution cause by the development of information technology, the Internet is transfering from Web1.0 Era to Web2.0 Era. As the typical application in Web2.0 Era, social network services are quickly getting popular. In fact, the development of social network services is transferring the information management from offline to online. However, there still exist some problems in its development,...
This paper presents the application of a business case model for the implementation decisions to be done by utility companies. The goal is to modernize the grid and their business, leveraging the potential of the smart grid (SG) for the benefit of the company and the customers (economically and socially), as well as the environment.
Cloud based applications demand a higher level of security, privacy, and reliability toward a more cost effective solution. One of the challenges for the users of cloud-based services and applications is finding the most trusted provider for the minimum cost. The trusted providers from each customer can have different interpretation, or with different priority of the meaning. Furthermore, a tier-1...
as society and economic rely highly on power supply. The self-healing smart distribution system is the ideal solution to solve the conflicts between society requirement and development of power grid. In such system, there are a lot of distributed energy resources (DER), such as new energy resources (wind turbine, photovoltaic, storage device) and small client site generators, which play important...
Cloud computing moves the application software, platform and infrastructure into the large data centers which are maintained at the centralized location. The Cloud Service User (CSU) requests the resources from the cloud for their current requirements without investing the money. It is a pay-as-you-go-basis which means that the CSU pay what they actually consumed. If the Cloud Service Provider (CSP)...
Network marketing in e-commerce is different from traditional marketing in several new features. This paper uses SPSS for the reliability and validity of principal component analysis on indicators, and suggests network marketing models under the framework of performance evaluation index system. Combined with FAHP, we designed two main network marketing business models and conducted related empirical...
Building on Technology Acceptance Model, this paper aims to investigate the influence of perceived ease of use, perceived usefulness and trust on behavioral intention of social commerce users. The model is empirically tested using survey data collected from 220 social commerce users. Our results show that four measures (i.e., security, situational normality, vendor familiarity, structural assurance)...
Are trust and satisfaction important in consumers' electronic commerce acceptance procedure? What are the antecedents of trust and satisfaction in this context? How do trust and satisfaction affect the Internet consumer's purchasing decision? To answer these questions, we develop a theoretical framework describing the trust-satisfaction based decision-making process a consumer uses when making a purchase...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.