首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
商业活动中最担心的就是安全问题,数据的安全性将会影响到生意的成败。显然,如何防范数据危机成为了商务人士最终选择笔记本的依据。而惠普Compaqnc6230笔记本电脑最突出的特点,就是安全性的保障能力。安全至上启动惠普Compaqnc6230,要连续输入安全密码和硬盘密码,而且是在进入BIOS之前,并不是常见的BIOS密码。其中,硬盘密码和Smartcard安全智能卡必须同时正确输入和插入,才可以进入系统。更为关键的是,在没有正确智能卡插入的情况下,系统还将被锁定,包括USB等所有接口。如此一来,系统将更为安全。更结实Compaqnc6230在模具上严丝合缝…  相似文献   

2.
联想“简约商务”意欲引领中小企业应用潮流。 “e-business”的提出已经让IBM聚敛了上百亿美元的财富,“easy-bushess”将带给联想什么? 渠道功能化,联想这个手术怎么动?  相似文献   

3.
“我Kao!”,胡一郎看到新的工作任务,差点没把嘴里的茶全喷了。“BD部门近期工作重点:与电信部门洽谈向手机用户提供奥运快讯短信息服务事宜。”胡一郎在脑子里飞快地计算:一条短信息中国移动才向用户收费一毛,公司最多能挣几分钱?My God!原来“最清晰的可盈利电子商务模式”就是挣这点没影儿的钱? 做了这几个月的BD,胡一郎觉得自己彻底晕菜。过去做销售,目的明确,实打实地挣钱;现在可好,找谁?说什么?谈得成谈不成?似乎都不重要,谈成的项目保不齐也会被公司cancel,真不知道自己的工作究竟有什么意义。  相似文献   

4.
5.
Likierman  Andrew 《ITNOW》2005,47(5):28-29
  相似文献   

6.
7.
The banks and retailers involved in the UK’s trials of chip and PIN at the point of sale assure us that customers find no difficulty in using the new system — which is just as well, since the argument for replacing identity verification by signature with a chip and PIN system is a compelling one. The emphasis on card security is now switching to card-not-present transactions — particularly over the Internet. Talk of hackers gathering card data from carelessly guarded call centres or retailer sites may be fanciful; but people have a justified worry about more mundane forms of crime, such as retailers trying to take a higher amount from a card-not-present transaction than has been authorised or loading multiple transactions on a card when the customer has only authorised one.  相似文献   

8.
After discovering the inadequacy of traditional relationships across the value‐chain, many organizations today are establishing new forms of interorganizational systems with their suppliers and customers in an effort to improve total channel performance. Electronic commerce linkages are being created between independent organizations in multiple industries, including manufacturing, financial services, transportation, and retailing. Efforts to improve channel efficiency using business‐to‐business electronic commerce systems generally require increased interdependence and expanded coordination between independent firms to capture the potential benefits enabled by tighter interorganizational integration of operations. Participating firms can gain dramatic benefits from establishing electronic linkage only when the system is used to increase interdependence and to expand coordination between firms involved in the new interorganizational relationship. Drawing on theoretical and empirical research on electronic communications and inter‐firm designs, we develop and test a model for the relationship between performance, interdependence and coordination of firms involved in interorganizational relations within the US grocery channel. The research design includes qualitative case study analysis and quantitative survey data analysis to validate the key case study findings. Both qualitative and quantitative findings indicate that channel performance, interdependence, and coordination are closely related for firms in interorganizational relationships. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   

9.
This article describes another pilot TTP implementation which demonstrated how a European Business Register could be operated electronically. The pilot was undertaken in 1995 with support form the European Commission under the INFOSEC programme.  相似文献   

10.
《Card Technology Today》2000,12(5):14-15
The slow but increasing spread of chip-based payment cards, the introduction of the euro and the recent flurry of panic over the security of the smart card payment system in France offers new opportunities to point-of-sale terminal manufacturers.  相似文献   

11.
12.
According to a recent research report by Pinkerton Consulting and Investigations, only 36% of companies have formal procedures in place for collaboration between their physical and cyber security departments. This lack of security management, the report argues, can result in increased exposure, limited situational awareness, poor accountability and higher operating costs. For example, without physical/cyber security integration, security teams cannot readily determine if someone is trying to use a computer system while its owner is not in the building. This leaves org-anizations vulnerable to insider abuse.  相似文献   

13.
Virtual communities include everything from discussion boards to massive multiplayer online role-playing games and virtual realities such as Second Life. The business world has assumed that virtual communities can be leveraged to provide access to consumers and consumer data. The benefits of this assumption have not always been realized. The purpose of this article is to understand why some business ventures into virtual communities fail and others succeed. Why do virtual communities support certain types of business activities and not others? Which firm activities are the best candidates to benefit from being positioned in virtual communities? The theories of social contracts and trust explain how firms can successfully participate in virtual communities. The theories have implications in the context of transaction-oriented, interest-oriented, relationship-oriented, and fantasy-oriented communities. The value chain provides an instructive background to understand which firm activities are candidates for being included in virtual communities. Success in virtual communities depends on an attitude of contribution, dedication of resources, building a critical mass, and matching community and business needs. Because many social technologies are in the disillusionment stage of the hype cycle, further research in the business use of virtual communities is needed to guide business practices as we move to full adoption.  相似文献   

14.
15.
16.
The traditional way of business process development is via creating a detailed model of a business process in question, acquiring an IT-system to support it, and then implementing it in the organizational practice. Acquiring a system can be done via designing and manufacturing it by the business itself, or via commissioning it to somebody else. Alternatively, a generic system can be bought and configured according to the business process model created. The traditional approach has a number of risks that become visible only during the latest phase of introducing the system in the organizational practice, e.g., when it becomes clear that the system does not fit the business and/or people who work in it. These risks could be mitigated by using an agile approach to the development of business processes. In agile approach: (a) the phases of process modeling, IT-system design, and manufacturing are merged into one, and (b) instead of using one big cycle, a series of smaller development cycles is used. The paper discusses what is needed to implement the agile approach, and in which business situations the agile approach is the most appropriate. Examples of tools to support agile development are presented and analyzed. The results presented in the paper have been achieved based on the knowledge transformation perspective along the lines suggested by Nonaka in SECI model. The modification of this model has been used to understand the risks and requirements connected to a particular process development strategy.  相似文献   

17.
18.
To realise the potentials of CRM (customer relationship management), relationship-specific processes need to be designed and implemented in companies. This is all the more important and complicated in business networks where two or more actors collaborate to serve the customers. A good collaboration within business networks is the basis for understanding the customer process and identifying customer needs. But, even in these days of customer orientation, transaction orientation is still a matter of strong interest, and the following questions remain to be answered: What is the difference between relationship-oriented processes and transaction-oriented processes, and how can relationship-oriented processes be designed for a business network? The authors give first answers to both questions by using a systematic, goal-oriented specialisation of generic actions. To give an example, one relationship-oriented process will be designed and specified for a certain customer process in the course of this paper.  相似文献   

19.
Effective data acquisition for business process monitoring has become a critical element in today’s business world. While the need for monitoring is generally agreed upon by both re- searchers and practitioners alike, the means and mechanisms are often vague. This is especially salient with the fast growing availability of various technologies to monitor in real-time through recent advances such as the Internet of Things (IoT) with specific emphasis on Radio-Frequency IDentification (RFID) and associated sensor networks. This study is motivated by the lack of published literature in data acquisition and analytics that specifically addresses sufficient real-time data acquisition for effective managerial monitoring. As a step in addressing this void, we review and extend existing literature in this general area by studying various requirements and information sources that relate to effective management monitoring. We then design an exploratory study to evaluate current managerial monitoring needs and the importance of automated data collection technologies. Results from this study show that the most important latent factor that influences an organization’s information need is its dynamic competitiveness, and consequently, companies with a dynamic supply chain would need a faster transaction and operations data system. The second important latent factor is the behavioral performance, which renders it essential to have a human-centric data system. This study provides evidence for the significance in adopting technologies such as RFID and other IoT systems for real-time monitoring in highly dynamic organizations and offers guidelines for analytical technology adoption for various industries.  相似文献   

20.
Although many organizations operate in a process-driven way, few members are skilled in specifying and developing business processes??a skill that has become crucial for organization development, in particular to establish agile enterprises. This paper shows, on the basis of natural language constructs (subject, predicate, object) and communication patterns between actors (subjects), how individual members of an organization could contribute to coherent and intelligible process specifications. A language and tool supporting Subject-oriented Business Process Management (S-BPM) are introduced, allowing organizations to cope with strategic and operational challenges dynamically. As many organizations already work with BPM concepts and technologies, existing approaches to process modelling are also revisited with respect to representing natural language constructs and standard sentence syntax. Since most of them refer either to subjects, predicates, objects or to a respective combination, a roadmap can be developed for enriching existing modelling approaches. In doing so, organizations can benefit from stakeholder inputs for effective business process engineering re-using existing specifications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号