Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
With the increase of the number of college graduates, the country needs to do much in promoting their employment. Meanwhile as the rapid development of Internet lead to explosive growth of information, the real value needs to be effectively and immediately selected to benefit both employers and employees. This paper aims to propose two content based algorithms, one starting with cold boot and the...
Electronic business (e-business) can potentially develop SME's adeptness and efficacy in facing the fast-changing and competitive business environment. Despite the success of many larger counterparts, SMEs are still lagging behind in using the Internet for their business especially in the context of developing countries. Although it is observed that some SMEs are beginning to catch up, still many...
This paper presents preliminary result of research project, which is aimed to combine ontology information retrieval technology and process mining tools. The ontologies describing both data domains and data sources are used to search news in the Internet and to extract facts. Process Mining tools allows finding regularities, relations between single events or event types to construct formal models...
In 2015, the number of internet user in Indonesia, already reached 88.1 million. There are around 5 million SMEs in Indonesia, but only about 75 thousand are already using e-commerce which means that the adoption of e-commerce by SMEs is still relatively low. Hence, this research aims to investigate what are the supporting and inhibiting factors for sellers (SMEs) in adopting e-commerce. The initial...
The implications of the Trans Pacific Partnership (TPP) Agreement for promoting innovation and growth in the Digital Economy of the Asia-Pacific Region are examined. The Treaty is the first multilateral agreement to specifically take up economic and trade issues related to the Internet and includes ground-breaking provisions with respect to online privacy, cybersecurity, promotion of cross-border...
Online marketing is identified as one of the key drivers of European digital economy. Recent studies have shown that advertising is not adding direct value for the advertisers only, but it creates significant additional indirect value and jobs while boosting innovation and creativity. In Europe online advertising has grown dramatically. It is expected that online advertising revenues will surpass...
The aim of this study was to determine the effect of e-marketing and e-service quality on e-satisfaction and its impact on e-loyalty. This research was conducted on customers in Jakarta. Data were collected from a sample of 100 respondents. The data were analyzed using path analysis. The result of this study found that e-marketing did not affect the e-satisfaction. E-marketing and e-service quality...
This paper examine the importance of website quality indicator in e-commerce efficiency evaluation. It applies Data Envelopment Analysis (DEA) models and traditional production theory to account for how scale affects efficiency in pure e-commerce firms. The results of DEA models identify website quality, user scale and user experience each contribute to improving operations efficiency, but scale expansion...
Applying internet data to investor attention research is a trend now. This paper propose a new method to measure positive and negative investor attention paid to a certain industry by using of search data from search engine. We select keywords from a corpus of energy industry by text-analysis technique including TextRank algorithm instead of taking company names or stock tickers as keywords in previous...
Due to the exponential growth of internet using, the habits of internet users have changed. This generate huge amount of data. It becomes important to explore this mine of knowledge and take advance on concurrent. In context of digital marketing, the user's data is the enterprise assets to personalize the content of websites and establish contact and communication with customers through internet channels...
From history to the present day, especially in the field of technology is provided a wide range of developments. The most important of these developments has achieved the realization of the industrial revolution, has led to play a leading role in the production is done by human beings. The effects on production of industry 4.0 emerging with this mind is very important. The qualified employees should...
We study the relationship between personalization and individual privacy on the customer's online buying behavior. Following a laboratory experiment we tested the differences for number of clicks and number of products added to cart with respect to two factors-personalization and product privacy. Our results show significant mean differences with respect to clicks and number of products added to the...
The emerging markets are experiencing high growths, have massive and still expanding market sizes, and huge labor forces, but they also face significant constraints such as resource constraints, immature infrastructures, and low purchasing power. The internal gap between huge unsatisfied demands for low-cost products from the bottom of the pyramid and the weak economic foundation in emerging markets...
Every year, companies are searching for professionals in cybersecurity more than ever before; however, there is a big void in the pipeline. Interestingly enough, the largest source of security incidents are unintentional insiders, which demonstrates the need for cybersecurity education not only for developing cybersecurity workforce but also to raise mere awareness and consciousness about these issues...
As we know internet is a beautiful thing. But it can lead to enmities, if not used properly. As the use of internet is growing participation of user is also growing. Through internet we can make world smaller by communicating, sharing, posting, tagging information's to people. As informative internet is, it can also be non-informative. This non-informative information is of no use in a business oriented...
Information and Communication Technologies (ICT) have a remarkable potential to improve the agricultural practices and innovation systems and to achieve significant benefits. To achieve the complete benefits of ICT, it is better to understand the constraints in ICT adoption for agricultural development, identify feasible options for reducing the constraints and contribute to develop effective policies...
People are used to getting served by using mobileapplications. Applications for taxi calling such as Uber andDidi are in a dominant position. Along with employing thesesoftwares, personal information may leak while being transferredor preserved on the internet. Consider that a user's information preserved on the internet is obtained by an malicious adversary then he may further speculate user's privacy...
The development of Internet and social networks has provided more emerging network data which facilitates the dynamic network analysis. In this paper, we propose a new method to measure coherence strength, also referred to as community consistency, of a community under dynamic settings. In order to better interpret the influence of evolving community structure on community consistency, we model the...
In this paper, we introduce a new phishing detection method, which is based on the analysis of legitimate website server log information. The idea is based on finding the references. Because of the references, every time the victim opens phishing website, the phishing website will refer to the legitimate website by asking for resources. Then, there is a log, which is recorded by the legal website...
The investors in financial market have shown great concerns in the events that may cause fluctuations in the capital market. Traditional event detection and type recognition methods were majorly based on text processing techniques while few research considers the financial time-series features. As we know, there are large amount of financial time-series data available such as stock transaction data...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.