46 resultados para Internet and VPN.


Relevância:

40.00% 40.00%

Publicador:

Resumo:

The need for global logistics services has increased dramatically and become extremely complex and dynamic as a result of a number of changes in manufacturing and in industrial production. In response, the logistics industry is changing in a variety of ways, including mergers to form integrated transportation service providers, outsourcing and increased use of information technology. The aim of this chapter is to provide an overview of the evolution and the most important trends in the logistics services provider (LSP) industry. Specific emphasis will be given to the role of Internet-based applications. Within this context, the chapter will also present the role of logistics e-marketplaces. In particular, based on the secondary research of currently existing logistics on-line marketplaces, an analysis and classification of them is provided with the aim of identifying service gaps. The analysis reveals that logistics electronic marketplaces, despite the increased range of services currently offered, still face limitations with reference to integrated customs links or translation services, which both reduce the efficiency of global operations.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This study is an examination of the timeliness of corporate internet reporting by U.K. companies listed on the London Stock Exchange (LSE). The research examines the significance of several corporate governance and firm-specific characteristics as potential determinants of the timeliness of corporate internet reporting. Our primary analysis provides evidence of a significant association between timely corporate internet reporting and the corporate governance characteristics of board experience and board independence. Our findings provide evidence that boards with less cross directorships, more experience in terms of the average age of directors, and lower length in service for executive directors provide more timely corporate internet reporting. We find that board independence is negatively associated with timely corporate internet reporting. Follow-up analysis provides additional evidence of a significant association between the timeliness of corporate internet reporting and board experience. The evidence indicates that role duality and block ownership are associated with less timely corporate internet reporting. Our findings also reveal strengths and weaknesses in the Internet reporting of U.K. listed companies. Companies need to voluntarily focus on improving the timeliness dimension of their corporate internet reporting so that the EU and U.K. accounting regulators do not replace recommendations with regulations. © 2007 Elsevier Inc. All rights reserved.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Purpose – This study seeks to provide valuable new insight into the timeliness of corporate internet reporting (TCIR) by a sample of Irish-listed companies. Design/methodology/approach – The authors apply an updated version of Abdelsalam et al. TCIR index to assess the timeliness of corporate internet reporting. The index encompasses 13 criteria that are used to measure the TCIR for a sample of Irish-listed companies. In addition, the authors assess the timeliness of posting companies’ annual and interim reports to their web sites. Furthermore, the study examines the influence of board independence and ownership structure on the TCIR behaviour. Board composition is measured by the percentage of independent directors, chairman’s dual role and average tenure of directors. Ownership structure is represented by managerial ownership and blockholder ownership. Findings – It is found that Irish-listed companies, on average, satisfy only 46 per cent of the timeliness criteria assessed by the timeliness index. After controlling for size, audit fees and firm performance, evidence that TCIR is positively associated with board of director’s independence and chief executive officer (CEO) ownership is provided. Furthermore, it is found that large companies are faster in posting their annual reports to their web sites. The findings suggest that board composition and ownership structure influence a firm’s TCIR behaviour, presumably in response to the information asymmetry between management and investors and the resulting agency costs. Practical implications – The findings highlight the need for improvement in TCIR by Irish-listed companies in many areas, especially in regard to the regular updates of information provided on their web sites. Originality/value – This study represents one of the first comprehensive examinations of the important dimension of the TCIR in Irish-listed companies.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The Future Internet is expected to greatly influence how the food and agriculture sector is currently operating. In this paper, we present the specific characteristics of the agri-food sector focusing on how information management in this area will take place under a highly heterogeneous group of actors and services, based on the EU SmartAgriFood project. We also discuss how a new dynamic marketplace will be realized based on the adoption of a number of specialized software modules, called “Generic Enablers” that are currently developed in the context of the EU FI-WARE project. Thus, the paper presents the overall vision for data integration along the supply chain as well as the development and federation of Future Internet services that are expected to revolutionize the agriculture sector.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The Internet poses a number of threats to the safety of young people. Using numerous examples, this article discusses a wide range of such threats, including: cyberstalking; the 'grooming' of potential victims of sexual abuse; a new 'wish list' scene (where teenagers encourage contact with potential abusers); the creation and distribution of child pornography; and the emergence of services that create child pornography to order. It is suggested that the latter has provided individuals with the ability to inflict sexual abuse on young people from a distance, an act the authors have termed virtual sex tourism. The final section of the article suggests that paedophiles and pornographers have been quick to adopt new technology as a means of concealing their activities. The article concludes by warning of the danger of overestimating or underestimating the threats described.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The expansion of the Internet has made the task of searching a crucial one. Internet users, however, have to make a great effort in order to formulate a search query that returns the required results. Many methods have been devised to assist in this task by helping the users modify their query to give better results. In this paper we propose an interactive method for query expansion. It is based on the observation that documents are often found to contain terms with high information content, which can summarise their subject matter. We present experimental results, which demonstrate that our approach significantly shortens the time required in order to accomplish a certain task by performing web searches.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This editorial provides an overview of the themes of network governance and content regulation that are expanded upon in the subsequent articles, identifying key issues and concerns that are prevalent in the literature in this field. In particular, this text considers governance not as an Internet-specific phenomenon, but as a global phenomenon, identifying and discussing literature pertaining to governance both online and offline, and providing examples of theories that seek to explain these forms of governance. Focusing on the interaction between public and private actors in content regulation, this editorial highlights that content regulation is a complex and contested issue that cannot be separated from its social and cultural contexts, and provides an overview of the articles contained.