Tuesday, December 31, 2019
Have You Ever Wondered How Much Exercise You Need To Get
Have you ever wondered how much exercise you need to get maximum benefits? And what exactly type of activity/exercise do you need to be doing? I chose this topic simply because I, myself, have been recently pondering how much exercise I need. I started consistently working out in January. I go to the Great Life gym either in Hartford or in Sioux Falls. Iââ¬â¢ve discovered when I workout, I am a much happier person. My mood and energy level improve all around. However, I donââ¬â¢t want to be pushing my body too hard. So how much exercise do I need weekly? Am I doing the correct exercises making sure to not strain my body? What I already know I know that exercise should be a very important part of everyoneââ¬â¢s daily routine. Exercise is when aâ⬠¦show more contentâ⬠¦It didnââ¬â¢t take me long before I found the perfect article. I read through the article and realized this is exactly the information I need. I then exported the article into EasyBib and continued on with my search. I continued using EBSCO database. I tried using the keywords fitness, mental and benefits. Again, I realized I needed to narrow down my search. Four hundred different articles had come up. I narrowed my search down by using moderate exercise, mental, and benefits. EBSCO provided me with 27 different articles. I found one that would work perfectly for my research. While reading through this article, I noticed a word I didnââ¬â¢t recognize. I quickly used the dictionary built in on my computer to look up the word ââ¬Å"adjunct.â⬠I learned this word means a thing added to something else as a supplementary rather than an essen tial part. Next, I switched my database to Proquest. I used the keywords weekly, benefits, mental, and exercise. When I searched the keywords, Proquest provided me with 56 articles. I read through each carefully to find one that matched my topic. In the article I chose to use, researchers tested a group of students. They recorded mood and anxiety levels before and after the workout. The students exercised at different paces and for different amounts of time. Finally, for my last search I used the keywords exercise, improve, and mood. Proquest brought up 43 articles. As I scrolled through them, I realized the first article was actually the best one. IShow MoreRelated A Great Teacher - Original Writing Essay1510 Words à |à 7 PagesA Great Teacher - Original Writing I was 20 yearls old when I was assigned to interview someone whom I admire. By those days I wanted to get a degree as an English teacher, so I thought it was a great idea to interview one of my high school teachers. I decided to interview the most taugh and admirable teacher I have ever had: Mr. Stucchi. Surrounded by a circle of students, Mr. Stucchi answered questions, gave instructions, and explained assignments. I slowly approachedRead MoreExercise. Why I Want To Know. Have You Ever Wondered How1306 Words à |à 6 PagesExercise Why I Want to Know Have you ever wondered how much exercise you need to get maximum benefits? And what exactly type of activity/exercise do you need to be doing? I chose this topic simply because I, myself, have been recently pondering how much exercise I need. I started consistently working out in January. I go to the Great Life gym either in Hartford or in Sioux Falls. Iââ¬â¢ve discovered when I workout, I am a much happier person. My mood and energy level improve all around. However, IRead MoreThe Effects Of Drinking Water On Our Lives Essay1323 Words à |à 6 PagesMost dancers know the importance of drinking water in our busy lives. But have you ever wondered what the actual effects of the consumption does for us? More than I thought, thats for sure. I wanted to take the time to look into this simple task we do. Being a dancer were athletes and must pay more attention to how much water we consume daily than an average person. A study conducted by the Centers for Disease Control and Preventio n (CDC) showed us results in water consumption in peoples daily livesRead MoreEffective Weight Loss : What You Avoid?1785 Words à |à 8 PagesValla Mistake number 1: Isolation exercises such as bicep curls and the adductor machine (you know the one, where you have to push your legs together whilst seated) For effective weight loss and to get the physique you really want it s no good trying to spot target certain areas of your body such as your biceps, bingo wings, your thigh because you won t achieve effective results this way. Isolation exercises are useless if your goal is weight loss, or you want to expose muscles that are currentlyRead MoreVirgin American Airlines Screens For Virgins866 Words à |à 4 PagesHave you ever wondered how or why Virgin American Airlines screens for virgins or where manufacturers of Virgin Olive Oil find virgins named Olive and what part of Olive they squeeze to get virgin oil? Such thoughts may seem abnormal, but believe it or not, they are very normal. Sometimes strikingly odd or bizarre thoughts that range from the tame to the incendiary take shape in our heads. It is as if a couple of delinquent electrodes, conductors, or cathodes misfire in the brain, and rationalityRead MoreTaking a Look at Accounting1068 Words à |à 4 PagesAccounting Have you ever wondered who files out your financial statements? Ever thought about wanting to be the one to figure out someoneââ¬â¢s financial statements? Well I have chosen to do research about accounting. Accounting is a very well paid career with little schooling required. More than 90 percent of the time you are working in a comfortable environment. Accounting jobs are also available almost anywhere you live or want to work. Work environment for accounting is very comfortable. You will alwaysRead MoreWhy I Don t Take The Leap Of Faith Essay1454 Words à |à 6 PagesIt s amazing how many people know what they want or know what they don t want and yet they don t do anything about it. Have you ever been in a conversation with someone telling you about the late in which they hate their job and how they would love to start a business instead? Yet at the end of the conversation you ask them what are you waiting for and they look at you with a blank face looking at you as if your nuts. The problem is that we want something but then we tell ourselves of all theRead MoreThe Process Of Becoming An Adult1420 Words à |à 6 Pagessteps when going from a child to an adult. I have had a lot of rewarding experiences and non-rewarding while growing into the adult I am today. There have been a lot of obstacles that came into my path, but I have overcome each one of them. The process of becoming an adult has two main stages: adolescence and early adulthood. I am thankful for how I have grown throughout my years of transforming into an adult. As a young child I would had a lot exercise and physical movement to gain my strength andRead Moreââ¬Å"Physical Activity Is Defined As Any Body Movement That1598 Words à |à 7 Pagesindividual must willingly put up with the strain and difficulty of actually engaging in exercise and physical activity regularly to reap the benefits. This can be hard for those at an older age due to age-associated changes. However in todayââ¬â¢s soci ety, we are aware that physical activity comes with a multitude of benefits, but the prevalence of a sedentary lifestyle overpowers a lifestyle that includes regular exercise. Physical inactivity can be seen in many age groups, but ââ¬Å"elderly people are even lessRead MoreEssay on Identifying Nutrients939 Words à |à 4 Pages(Do these BEFORE using the Gizmo.) 1. What are the major types of nutrients you can get from food? Proteins, lipids, carbohydrates, minerals and vitamins 2. How are these nutrients used by your body? Nutrients are used by your body for everyday functions. Gizmo Warm-up Have you ever wondered what is in your food? Scientists use a variety of tests to determine the nutritional content of food. You will learn four of those tests with the Identifying Nutrients Gizmoâ⠢. 1. Below
Monday, December 23, 2019
The Pitiful Prufrock of The Love Song of J. Alfred...
The Pitiful Prufrock of The Love Song of J. Alfred Prufrock T.S. Elliots The Love Song of J. Alfred Prufrock, is a melancholy poem of one mans frustrated search to find the meaning of his existence. The speakers strong use of imagery contributes to the poems theme of communion and loneliness. The Poem begins with an invitation from Prufrock to follow him through his self-examination. The imagery of this invitation begins with a startling simile, Let us go then you and I/ When the evening is spread out against the sky/ Like a patient etherised upon a table. This simile literally describes the evening sky, but functions on another level. Prufrocks description of theâ⬠¦show more contentâ⬠¦This city is suspended under the same anesthesia that spreads the evening like an etherised patient. Prufrock moves his attention from the city to his final destination; the room the women come and go/ Speaking of Michealangelo. This couplet contrasts with the previous urban landscape and adds anticipation to the ominous tension surrounding the event. This line also is about time. The couplet suggests that Prufrock has been around to see these women come and go, implying Prufrock has been situated in the high societal environment for some time. The line also implies that while others have come and gone from the social circles Prufrock is a part of; Prufrock has stayed stagnating. On the way, Prufrock deliberates on whether he can find value in the cold superficial environment, and ask the overwhelming question, Do I dare/ Disturb the universe?. He feels if he can muster the courage to ask the question, he may at last find value in his life: would it have been worth while/ To have bitten off the matter with a smile,? To have squeezed the universe into aShow MoreRelatedThe Truth Behind The Love Song of J. Alfred Prufrock Essay617 Words à |à 3 PagesThe Truth Behind The Love Song of J. Alfred Prufrock The Truth Behind The Love Song of J. Alfred Prufrock The speaker of this ironic monologue is a modern man who, like many of his kind, feels isolated and incapable of decisive action. Irony is apparent from the title, for this is not a conventional love song. Prufrock would like to speak of love to a woman, but he does not have the nerve. The poem opens with a quoted passage from Dantes INFERNO, If I thought thatRead MoreT.S. Eliot - the Love Song of J. Alfred Prufrock and Preludes - Modernism1143 Words à |à 5 PagesHow has Eliot used both conventional and Modernist poetic techniques to represent his Modernist concerns? The Love Song of J. Alfred Prufrock and Preludes expresses Eliotââ¬â¢s Modernist concerns about the lack of morals and values in modern society through the use of personas within the urban landscape and the urban society. Modern manââ¬â¢s lifestyle of repetition of trivial tasks and the lack of meaningful things in life is represented and emphasised through the use of alliteration, metaphor, fragmentationRead MoreAnalysis of The Love Song of J. Alfred Prufrock Essay1836 Words à |à 8 Pagesââ¬Å"The Love Song of J. Alfred Prufrockâ⬠by T. S. Eliot is a poem I would not recommend anyone still trying to hang on to his or her youth. T. S. Eliotââ¬â¢s poem, about a man named J. Alfred Prufrock, is a pessimistic poem looking at the seemingly wasted life of an aging man. The poem is told from the viewpoint of a very sad man named J. Alfred Prufrock. The poem takes place in the city of St. Louis, which T. S. Eliot does not portray in a very good light. T. S Eliotââ¬â¢s creation of a depressing mood, powerfulRead More Content, Themes, Diction and Imagery of Eliots Poems Essay4170 Words à |à 17 PagesImagery of The Love Song of J. Alfred Prufrock, Portrait of a Lady, Rhapsody on a Windy Night and Preludes à The Love Song of J. Alfred Prufrock, Portrait of a Lady, Rhapsody on a Windy Night and Preludes deal with the psychological impasse of the sensitive person from whom life has been withheld. Both Prufrock and Portrait of a Lady depict self-conscious, philosophical characters who are unable to act and dare not chance acting. As portrayed in Prufrock the character is
Sunday, December 15, 2019
Jealousy and Manipulation in Othello Free Essays
Jealousy and Manipulation in Othello He, who loves his wife for the lust, can run away from the situation that haunts him. But, he who loves his wife like he loves his god, loves to the death. Othello loved his wife so much, that if someone like Iago would plant seeds of lies and misjudgments into Othello, him and any other would go to the extreme as to kill her just to stop the pain. We will write a custom essay sample on Jealousy and Manipulation in Othello or any similar topic only for you Order Now Jealousy itself it self is like a predator searching for the weak. Othello quotes, ââ¬Å"O! beware, my lord, of jealousy; It is the green-eyed monster which doth mock. The meat it feeds on. ~William Shakespeare, Othello. Iago, the predator, purposely imbedding jealous images into Othelloââ¬â¢s head. Othello had no choice but to recognize how close his wifes relationship with Cassio really was. In his mind his closest friend is using their friendship to manipulate him into thinking they are friends just to get closer to Desdemona. ââ¬Å" Get me some poison, Iago; this night! Iââ¬â¢ll not expostulate with her, lest her body and beauty unprovid my mind again. â⬠Iagoââ¬â¢s manipulation is so great that Othello would kill the one he loved so much. Ruthless Iago knew that the only way to make the situation much worse was to convince Othello to murder his beloved with his bare hands. This away he could not get away with this action and he thought this would bring Othello to his own grave. So, Iago said ââ¬Å"Do it not with poison, strangle her in the bed, even the bed she hath contaminated. â⬠Now, I ago had Othelloââ¬â¢s head wrapped around 2 things that this world has always had problems with ââ¬â Jealousy Manipulation. But , the true situation that ran this whole operation was greed. This monster controlled many kings, families and any person who could not control themselves. Iagoââ¬â¢s greed was to become a higher ranked person than Cassio. With this he used his manipulation on Othello and Cassio unsuspectingly in the dungeon. Foolishly tricking Cassio into talking about his girlfriend, but making it seem to Othello he was talking about Desdemona. Iago could not get rid of Cassio himself. This tension was created because of Iagoââ¬â¢s jealousy of Cassio and his rank. Getting rid of Cassio would boost his rank and get one step closer to Othello. Thinking Cassio has mated with his wife Othello cries out he wants Cassio dead. Othello becoming blind because of hatred and jealousy led him into becoming a ââ¬Å"caotic monster. Othelloââ¬â¢s past and current position as a soldier helped him solve how to take care of a problem and to him killing a person got rid of the problems that occurred just like in the wars before. The problem here is not war, it is his extreme love for his wife and his blindness for honesty is what led him into killing. Not know ing the truth can prevent honesty. But, to be manipulated and becoming jealous only fuels the fire. Othelloââ¬â¢s heart for love became a wildfire. In the end greed won the battle, but the truth from Cassio and Iagoââ¬â¢s wife set the pathway to destruction and ending the battles. How to cite Jealousy and Manipulation in Othello, Papers
Saturday, December 7, 2019
Impact Of M-Commerce In Business Application
Question: Understand the central role of information systems and of the world- wide- web in organisations. Identify the elements of hardware and software used for the transmission, storage and retrieval of information. Demonstrate how the quality of management decision making is enhanced by information systems. Answer: Introduction The report firmly focuses on the impact of M-commerce in business. In todays business M-commerce or Mobile commerce plays a vital role. Most of the business activities are completely dependent on electronic devices (Mohapatra, 2013). The business organizations are developing their own mobile applications in order to provide better opportunities and friendly services to the existing consumers. The report -describes the usage of advanced technologies that incorporated by the business associations to implement fast, safe and secure services for the consumers. While an enterprise is considering an electronic platform for their commercial profit they must make sure that the platform is safe enough. Different usage of hardware and software components related to M-commerce is also going to be mentioned along with the use of several social components. Findings and analysis Evaluation of hardware/software components that associated with M-Commerce Software Apps: development app, distribution app, management app, cloud computing: Commerce: banking, advertising, marketing. Hardware / Devices Smart phones: iphone, android devices, windows mobile. Form factors: phablets, flip, smart watches etc. Basic needs of hardware and software in m-commerce are electronic device, and supporting internet services. The mobile commerce development is driven out by analyzing different factors such as- emerging technologies, fast data transmission technology, improved computing capacity, huge data storage with the support of GUI (graphical user interface) (Sila, 2013). The commercial environment brought a revolutionary change by adopting electronic commerce and secures end to end encryption in their services. Incorporation of software, hardware different packages is not the ultimate solution of m-commerce application rather appropriate application is required (Mohapatra, 2013). Figure 1: M-commerce process flow diagram for Business (Source: Zhou, Zhang and Zimmermann 2013, pp-65) (For software hardware components: Refer to Appendix) During evaluation of the software associated characteristics are as followed: Features Application Information exchange technology Hasan, Morris and Probets (2013), stated that, the basic information exchange majorly includes the extensible markup language (XML), wireless markup language (WML) and short message service (SMS). Wireless application protocol WAP protocol is used to develop the level of security and in the end to end transaction. Wireless middleware Wireless middleware is the subset of middleware. Due to its complex nature many challenges are present for the m-commerce. Business application Value concerns Technology requirement Communication Voice SMS Email Data transfer High High High High Cost, security Cost, security Cost, security Cost, security 1G/2G 2G/2.5G 2G/2.5G 2.5G/3G Information Web browser Traffic High High Cost, security Cost, security 1G/2G 1G/2G Entertainment Game Music Horoscope High High Low Cost Cost Cost 2G/3G 2G/3G 2.5G/3G Commerce Tickets booking Banking Retailing Advertising Payment Highest Highest Moderate High High Cost Cost, security Cost, security Cost Cost, security 2.5G/3G 2G/3G 2G/3G 2.5G/3G 2.5G/3G Impact of wireless, next-generation evolution of E-Commerce has on the consumers The consumers and business operators both have an impact of using wireless mobile ecommerce for commercial purposes (Hasan, Morris and Probets, 2013). Three entities are found in m-commerce such as- mobile business, personal network and mobile consumers. Different business model are discussed below: Models Activities Wireless Business to customer Model An interactive relationship between the organization and its consumers are adopted by this model. The model firmly focuses on the mobile advertisement, online shopping, online ticket booking and net banking via wireless network. According to (Sun, Xu and Su, 2014) It reduces the delivery cost; the selling buying process can take place anytime and anywhere. Wireless Business-to-Business Model This model is used to demonstrate the business transaction between the organizations such as manufacturer and the wholesaler (White, Afolayan and Plant, 2014). It also maintains the supply chain management system. It also optimizes the overall cost. Wireless customer to customer Model This model is activated with the interruption of certain third party. For example Electronic mail, games, activities based on location a web access. This model cost little higher than the other models (Poggi et al., 2013). Wireless Consumer-to-Self Model This model has the following entities such as- network operations, technology provides, mobile users, content service providers and calculation of potential benefits (Sila, 2013). All efficient infrastructures can be provided by this model. (For image building of M-commerce: refer to Appendix) Biggest concerns that most of the cell phone users have about using m-commerce services M-commerce technology brings two technologies such as wireless technology and traditional e-commerce technology together in a single platform (Du and Tang, 2014). The biggest concern that most of the cell phone user have about m-commerce are shown below: Infrastructure: While using this technology the basic concern of the users are related to the infrastructure of the website. This is mainly the network infrastructure. Thus, it can be said that for the technology implementation if the provided LAN, WAN connection is not enough secured then the total system will be in vain. Information: As in case of m-commerce net banking is available thus, the banking details and the personal details are also stored in the server database (White, Afolayan and Plant, 2014). If the database security is not up to the level, then it will create problems. The consumers of that service always feel insecure while using the m-commerce. Transaction: During transaction the source and destination must have an appropriate and authenticated security key. The key may be private or it may be public. It means that the key can be unique or it can be shared also. Therefore, while using the m-commerce technologies users are always worried about the security. The advantages and disadvantages are as followed: Advantages Disadvantages M-commerce is a flexible and convenience process that is used in todays business. Easy connectivity is possible in case of M-commerce. The security is not accepted by the users and due to limited band width the cost of the establishing mobile and the wireless broadband infrastructure is supported by the users. During transaction the server holds the personal as well as financial details of the consumers. The infrastructure of the network ensures the managing capabilities of the service (Du and Tang, 2014). Less interoperability in the m-commerce devices might create security related issues (Mohapatra, 2013). The high operational cost of the services puts pressure on the retail changes. Limited memory corrupt the unlimited use of the service provide by the m-commerce business services. Malware antivirus introduction is also not that easy for the services. Enhancing competition creates innovation in the entire application field. It creates innovative ways in order to attract the consumers for doing business. M-commerce provides an amazing platform to the consumers for starting business (Ahsan, 2013). The new technologies are adopting by the consumers. High speed 3G/4G gives the economical services to the consumers. It also possesses an easy and noise free communication. In network technologies it provides the support of GSM, GPRS, EDGE, and 3G/UMTS. Hackers might hack the personal and financial details of the consumers and as a result it may hamper or corrupt the entire system. As m-commerce does not have any standard or benchmark for their services thus, it does not provide a fast life style to the service users. Security in M-commerce technologies Problems Issues Impact Security Personal data, financial data are stored while using the m-commerce services. Thus, if the data are not secured with a particular manner then the data could get hacked by the unauthenticated users of the service. Location management The location management is also not enough efficient for the m-commerce service (Mohapatra, 2013). In this usability section the internet support with relevant platform utilization is strictly required but the Ethics and privacy If the personal and financial data get hacked by the attackers then it will be an ethical issues and due to the interruption in the privacy system the entire system could get corrupted. usability The usability of the service is not enough efficient as it is based on the electronic based platform. Legal challenges In order to serve the services throughout the world legal support is required (Row, Truex and Huynh, 2012). The government support is very much essential to provide the overall support to the consumers regardless of the location of the users. F the legal is not available for that particular service provider then, it will be total in vain. Consumer trust Sometimes the trust of the consumers gets affected due to lack of security (Huang and Benyoucef, 2013). If the data get hacked by the users then for the next time that particular consumer will never come to use the service. interoperability Interoperability issue may also interrupt the overall services provided by the m-commerce servers. Wireless infrastructure As in case of mobile commerce the services served by the wireless electronic device (Sila, 2013). Thus, the medium is required to be noise free. If the channel is not noise free then, the infrastructure will not be supportive to the consumers It will be another major issue to the clients using m-commerce service. Limitations Small screen size is another issue in m-commerce implantation. As the size of the product is not clear enough all time thus, the customer does not feel secure while looking for the online products (White, Afolayan and Plant, 2014). (For M-Commerce security technologies: refer to Appendix) Figure 3: Payment process of M-commerce (Source: Poggi et al., 2013, pp-70) Solution The issues discussed above can be mitigated using some of the advanced technologies and application. The major issue relevant to m-commerce is detected as less security and lack of customer satisfaction. Not mostly but in some cases the consumers of m-commerce services are not feeling satisfied with the provided services. Mitigation techniques are discussed below: Issues Mitigation process Security As m-commerce is a sub part of e-commerce, the security related issue hampers the service most of the time (Hasan, Morris and Probets, 2013). Therefore, advanced end to end asymmetric encryption processes are adopted by the company apps so that the third party cannot interrupt the service without permission. Customer satisfaction During transaction of money Evaluation The m-commerce wireless technology recently engaged many consumers and the user of mobile phones have also started increasing in a rapid manner. The wide development of this technology involves new type of e-commerce that conducts the transmission process through mobile terminals (Sila, 2013). Thus, the technology is known as mobile commerce. Software simulation can only make the application possible. M-commerce is the online buying processes the starts from the service provider and end up to the consumers. The technology evaluation is based on a basic M-commerce architecture. Figure 4: Evaluation of m-commerce (Source: Afshar, 2013, pp-560) From the process flow technique it is found that the primary entities are client and the server and relationship must contain the attributes such as server, client authentication, content request and the content response (Hasan, Morris and Probets, 2013). Crypto function, merchant function and user private key functions are used during the evaluation of the process. In addition to this, a secure communication and the credit card validation techniques are also maintained by the process flow of m-commerce technology. User and the server authentication is the most important part of the online business evaluation process. (For M-Commerce revenue structure: refer to Appendix) Social component of M-Commerce Novak (2014), stated that the social components of m-commerce are proper network connection, m-commerce technology, content and interfaces. These are the basic social requirements for the process and the overall implementation of the technology helps to formulate m-commerce in terms of commercial management. Figure 5: Components of m-commerce (Source: Huang and Benyoucef, 2013, pp-250) Conclusion and recommendations From the overall discussion it can be concluded that the next generation of evolved E-commerce technologies. It also mentioned the impact of m-commerce on the consumers and the business processes relevant to it. Apart from this, the hardware and software associated to m-commerce and its internal analysis also the social components of m-commerce are also demonstrated. These are following recommendations to the M-commerce system: Encrypted communication: Encrypted communication protocols are needed to be incorporated by the business organizations and at the same time, they must leverage the security model to reduce the security related issues took place in m-commerce. User friendly service: In order to gain trust from the consumers the organization should provide better user friendly services to the consumers. Consumer need calculation: The business organization must consider all the influencing and analyzing factors of m- commerce application to fulfill the consumers need. Architectural improvement: The organizations are advised to use cloud based architecture in all the sectors to reduce the cost and to provide a trust worthy platform to the consumers of the m-commerce business. M-commerce faces several issues such as low band width, network problem etc. during implementation. Those can be reduced at a high by using cloud based architecture. References Afshar Jahanshahi, A., X. Zhang, S. and Brem, A. (2013). E-commerce for SMEs: empirical insights from three countries.Journal of Small Business and Enterprise Development,20(4), pp.849-865. Ahsan, M. (2013). Analysis of the m-commerce function at Airtel Bangladesh Limited. Du, Y. and Tang, Y. (2014). Study on the Development of O2O E-commerce Platform of China from the Perspective of Offline Service Quality.International Journal of Business and Social Science,5(4). Hasan, L., Morris, A. and Probets, S. (2013). E-commerce websites for developing countries-A usability evaluation framework.Online Information Review,37(2), pp.231-251. Huang, Z. and Benyoucef, M. (2013). From e-commerce to social commerce: A close look at design features.Electronic Commerce Research and Applications,12(4), pp.246-259. Huang, Z. and Benyoucef, M. (2013). From e-commerce to social commerce: A close look at design features.Electronic Commerce Research and Applications,12(4), pp.246-259. Maity, M. and Dass, M. (2014). Consumer decision-making across modern and traditional channels: E-commerce, m-commerce, in-store.Decision Support Systems,61, pp.34-46. Mohapatra, S. (2013). E-commerce Strategy. InE-Commerce Strategy(pp. 155-171). Springer US. Noh, S.K., Lee, S.R. and Choi, D. (2014). Proposed m-payment system using near-field communication and based on WSN-enabled location-based services for m-commerce.International Journal of Distributed Sensor Networks,2014. Novak, G. (2014). Developing a usability method for assessment of M-Commerce systems: a case study at Ericsson. Poggi, N., Muthusamy, V., Carrera, D. and Khalaf, R. (2013). Business process mining from e-commerce web logs. InBusiness Process Management(pp. 65-80). Springer Berlin Heidelberg. Rowe, F., Truex, D. and Huynh, M.Q. (2012). An empirical study of determinants of e-commerce adoption in SMEs in Vietnam: An economy in transition.Journal of Global Information Management (JGIM),20(3), pp.23-54. Sila, I. (2013). Factors affecting the adoption of B2B e-commerce technologies.Electronic Commerce Research,13(2), pp.199-236. Sun, F., Xu, L. and Su, Z. (2014). Detecting Logic Vulnerabilities in E-commerce Applications. InNDSS. White, G.R., Afolayan, A. and Plant, E. (2014). Challenges to the adoption of e-commerce technology for supply chain management in a developing economy: a focus on Nigerian SMEs. InE-commerce Platform Acceptance(pp. 23-39). Springer International Publishing. Zhou, L., Zhang, P. and Zimmermann, H.D. (2013). Social commerce research: An integrated view.Electronic Commerce Research and Applications,12(2), pp.61-68.
Subscribe to:
Comments (Atom)