936 resultados para Electronic mail systems


Relevância:

90.00% 90.00%

Publicador:

Resumo:

This chapter presents an analysis of the unprecedented use of electronic voting by expatriates during the French 2012 legislative elections, when they elected their own representatives (referred to here as ‘deputies’), to the National Assembly in Paris for the first time, in 11 newly created overseas constituencies.
The study is presented within the broader perspective of electronic voting in France more generally, and in the historical context of extra-territorial voting by French expatriates. The authors discuss the main issues and controversies that arose during the 2012 elections, and in a final section analyse the results. The authors conclude by drawing attention to recent developments in electronic voting in France since the 2012 elections, which suggest that although there was much criticism expressed by experts of electronic voting as to the security and transparency of the system used, the official discourse that acclaimed the experience as a success, appears to have convinced its target audience.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Ethics is an important element in all aspects of computing, but proves to be a real problem in the development and delivery of electronic commerce systems. There are many aspects of ethics that can affect electronic commerce systems, but perhaps the most notable and worrying to both consumers and developers is that of trust.

In a world where so much information is transmitted and shared electronically, ethical standards that in general society are applied to this medium, are often ignored or forgotten. This paper will discuss some of the ethical considerations that should be considered in electronic commerce and offer the possible solutions that can encourage developers to consider ethical considerations and prove excellence and trust to the consumer.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In recent years there has been a remarkable increase in information exchange between organizations due to changes in market structures and new forms of business relationships. The increase in the volume of business-to-business (B2B) transactions has contributed significantly to the expanding need for electronic systems that could effectively support communication between collaborating organizations. Examples of such collaborating systems include those that offer various types of business-to-business services, e.g. electronic commerce, electronic procurement systems, electronic links between legacy systems, or outsourced systems providing data processing services via electronic media. Development and running of B2B electronic systems has not been problem free. One of the most intractable issues found in B2B systems is the prevalence of inter-organisational conflict reported to exist and persists between the participants of interorganisational electronic networks. There have been very few attempts, however, to prescribe any practical method of detecting the antecedents of such conflict early in B2B development to facilitate smooth construction and the subsequent operation of B2B services. The research reported in this paper focuses on the identification and analysis of antecedent conflict in a joint process involving different organizations in a B2B venture. The proposed method involves identification of domain stakeholders, capturing and packaging their views and concerns into a reusable form, and the application of captured domain experience in B2B systems development. The concepts and methods introduced in this paper have been illustrated with examples drawn from our study of six web-enabled payroll systems.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This thesis provides an examination of the work of instructional designers in distance education, through the conceptual lens of chaos theory. Chaos theory was chosen as an analytical tool because of its ability to reveal the patterns and processes of complex systems as they move between order and turbulence. Recent work in the social sciences, specifically literary theory, has provided impetus for applications of chaos theory to educational settings. Specifically, chaos theory is used to analyse eight case studies of projects volunteered by instructional designers working in five institutions in Hong Kong and Australia. Data were gathered over a period of months with each participant, chiefly through interviews, but also involving diary accounts, electronic mail and letters. The methodology was thus qualitative, specifically informed by Eisner's vision of the ‘critical connoisseur’. Eisner equates an ‘enlightened eye’ with attainment of the skills of a critical connoisseur. First, an effective qualitative researcher must develop connoisseurship, the art of appreciation. On its own, though, connoisseurship is not enough; it is a private act, and thus needs a public face or presence. Criticism is this link, criticism being the art of disclosure. The critical connoisseur aims to help others to increase perception and deepen understanding of an educational situation or event. In addition to the empirical work, a parallel strand of this thesis investigates the theory and reported practice of instructional design. A brief history of instructional design is presented, along with discussion of acknowledged deficiencies of current theory and approaches. Recent reported investigations of both theory and practice are analysed from the viewpoint of chaos theory. Examination of key contributions in the literature of instructional design and distance education reveals considerable resonance between these contributions and the fundamental properties of chaotic systems. Links are made, in both the theoretical and empirical strands, between instructional design and the behaviour of dissipative structures, attractors and the process of bifurcation. Use is also made of the time-dependent nature of chaos theory as a theory of becoming, rather than one of being. The thesis comprises eight chapters, two appendices and a references section. The introductory chapter explains the research problem, and outlines the structure of the thesis. Methodological considerations are left until after an assessment of instructional design literature and (reported) practice. This deliberately theoretical investigation (Chapters 2 and 3) comprises the first of the parallel strands that are presented. The basic conclusions are that instructional design theory has not been particularly helpful to or used by instructional designers, and that chaos theory might provide an alternative way of viewing instructional design practice. The other parallel strand is the empirical work, which for four chapters outlines the methodology and my findings concerning the role of instructional designers in distance education. The methodology is detailed in Chapter 4. Chapter 5 establishes the contexts of the participants, by examining their backgrounds and introductions to their roles. It also investigates their views on their role and status within their institutions and with working colleagues. Chapter 6 is an exploration of the major issues that influenced the work of the instructional designers. These are the issues that arose naturally in the interviews as the participants outlined the development and interactions that took place on a day to day basis. Time emerges as a key influence in their work, and its effects on the projects are outlined and analysed. The ways that instructional designers give advice to those with whom they work is also investigated. The next chapter continues consideration of their work, but this time as they reflect on their role and its demands. This includes their reactions to the various metaphors that have appeared in the literature, along with those that they introduced into our discussions. The links that are established between the two parallel strands are drawn more explicitly in the final chapter, Chapter 8, which is a notion of what a model of instructional design based on my conclusions might resemble. It summarises the evidence that it is not necessarily by striving for order—in fact quite the opposite — during key periods of course development, that leads to creative outcomes. The introduction of uncertainty and turbulence does, in some cases and under some conditions, move the system to a higher level. The image that is offered from chaos theory is that of time-bound dissipative structures, interacting with their open environment at far-from-equilibrium conditions, and transforming themselves from disorder to order through bifurcation. The role of strange or chaotic attractors is highlighted in the process. The first appendix gives background information in terms of the methodology. The second is the heart of the data upon which the thesis draws. That is, the second appendix outlines the case studies of the participants. Most are short summaries, but the final one is a detailed study, tracing the progress of the design and development of a subject in distance education.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Pós-graduação em Engenharia Elétrica - FEIS

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In electronic commerce, systems development is based on two fundamental types of models, business models and process models. A business model is concerned with value exchanges among business partners, while a process model focuses on operational and procedural aspects of business communication. Thus, a business model defines the what in an e-commerce system, while a process model defines the how. Business process design can be facilitated and improved by a method for systematically moving from a business model to a process model. Such a method would provide support for traceability, evaluation of design alternatives, and seamless transition from analysis to realization. This work proposes a unified framework that can be used as a basis to analyze, to interpret and to understand different concepts associated at different stages in e-Commerce system development. In this thesis, we illustrate how UN/CEFACT’s recommended metamodels for business and process design can be analyzed, extended and then integrated for the final solutions based on the proposed unified framework. Also, as an application of the framework, we demonstrate how process-modeling tasks can be facilitated in e-Commerce system design. The proposed methodology, called BP3 stands for Business Process Patterns Perspective. The BP3 methodology uses a question-answer interface to capture different business requirements from the designers. It is based on pre-defined process patterns, and the final solution is generated by applying the captured business requirements by means of a set of production rules to complete the inter-process communication among these patterns.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-06

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Prior studies have shown that innovative information systems (IS) adoption behaviour by small-and medium-sized enterprises (SMEs) is greatly dependent on organizational and environmental characteristics. Government influence (i.e., federal and local government agencies) was found to play an important role in the promotion or enforcement of innovative IS adoption by SMEs, and it is vital for ensuring adoption of nationwide innovative IS, particularly in developing economies. This study introduces the construct of enacted capabilities and examines the enacted capabilities that motivate SMEs to use innovative IS (i.e., a government's electronic procurement systems) to its full potential. A model of how enacted capabilities affect IS adoption behaviour through perceived net benefits and attitude is developed. A survey (and follow-up interviews) of CEOs/owners from Malaysian SMEs was conducted. Results indicate the enacted capabilities possessed by SMEs play a prominent role in determining the adoption of government electronic procurement systems by these enterprises.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Electronic Publishing -- Origination, Dissemination and Design (EP-odd) is an academic journal which publishes refereed papers in the subject area of electronic publishing. The authors of the present paper are, respectively, editor-in-chief, system software consultant and senior production manager for the journal. EP-odd's policy is that editors, authors, referees and production staff will work closely together using electronic mail. Authors are also encouraged to originate their papers using one of the approved text-processing packages together with the appropriate set of macros which enforce the layout style for the journal. This same software will then be used by the publisher in the production phase. Our experiences with these strategies are presented, and two recently developed suites of software are described: one of these makes the macro sets available over electronic mail and the other automates the flow of papers through the refereeing process. The decision to produce EP-odd in this way means that the publisher has to adopt production procedures which differ markedly from those employed for a conventional journal.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A key concern organisations face is how to incorporate Internet tools into their marketing communications mix. Where and how should companies invest their human, technological and financial resources? This paper explores a subset of this problem, online complaining and electronic customer service. It applies diffusion of innovation as a theoretical framework to investigate organisational implementation of email technology and explain the outcome of annual customer service surveys in 2001, 2002 and 2003. The results add to the small body of research on electronic service recovery by extending diffusion of innovations to email service recovery and underscoring the importance of adoption phases, particularly for SMEs. Larger companies provide more channels for submitting complaints, which represents an early phase of adoption. There was little difference in how large and small companies respond to online complaints, a later phase of adoption.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

As businesses and organisations move online, many question how to use Internet communication tools effectively, such as Web sites and electronic mail (Porter, 2001). Where and how should they invest their time and money in technology? This research explores a small part of this broad question, online complaining and electronic customer service. This paper extends prior US-based research of consumer complaints by email (Strauss and Hill, 2001) in several ways. First, it replicates their research in an Australian setting. Second, this research addresses several future research issues that Strauss and Hill (2001) raised. And third, this paper uses diffusion of innovation (Rogers, 1995) to explain some of the results. The results partially support the findings of Strauss and Hill (2001), take a small step towards further investigation of effective email responses and provide practical suggestions for better email customer service.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

It has been recognised that brands play a role in industrial markets, but to date a comprehensive model of business-to-business (B2B) branding does not exist, nor has there been an empirical study of the applicability of a full brand equity model in a B2B context. This paper is the first to begin to address these issues. The paper introduces the Customer- Based Brand Equity (CBBE) model by Kevin Keller (1993; 2001; 2003), and empirically tests its applicability in the market of electronic tracking systems for waste management. While Keller claims that the CBBE pyramid can be applied in a B2B context, this research highlights challenges of such an application, and suggests changes to the model are required. Assessing the equity of manufacturers’ brand names is more appropriate than measuring the equity of individual product brands as suggested by Keller. Secondly, the building blocks of Keller’s model appear useful in an organisational context, although differences in the subdimensions are required. Brand feelings appear to lack relevance in the industrial market investigated, and the pinnacle of Keller’s pyramid, resonance, needs serious modifications. Finally, company representatives play a role in building brand equity, indicating a need for this human element to be recognised in a B2B model.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Wideband frequency synthesisers have application in many areas, including test instrumentation and defence electronics. Miniaturisation of these devices provides many advantages to system designers, particularly in applications where extra space and weight are expensive. The purpose of this project was to miniaturise a wideband frequency synthesiser and package it for operation in several different environmental conditions while satisfying demanding technical specifications. The four primary and secondary goals to be achieved were: 1. an operating frequency range from low MHz to greater than 40 GHz, with resolution better than 1 MHz, 2. typical RF output power of +10 dBm, with maximum DC supply of 15 W, 3. synthesiser package of only 150  100  30 mm, and 4. operating temperatures from 20C to +71C, and vibration levels over 7 grms. This task was approached from multiple angles. Electrically, the system is designed to have as few functional blocks as possible. Off the shelf components are used for active functions instead of customised circuits. Mechanically, the synthesiser package is designed for efficient use of the available space. Two identical prototype synthesisers were manufactured to evaluate the design methodology and to show the repeatability of the design. Although further engineering development will improve the synthesiser’s performance, this project has successfully demonstrated a level of miniaturisation which sets a new benchmark for wideband synthesiser design. These synthesisers will meet the demands for smaller, lighter wideband sources. Potential applications include portable test equipment, radar and electronic surveillance systems on unmanned aerial vehicles. They are also useful for reducing the overall weight and power consumption of other systems, even if small dimensions are not essential.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The material presented in this thesis may be viewed as comprising two key parts, the first part concerns batch cryptography specifically, whilst the second deals with how this form of cryptography may be applied to security related applications such as electronic cash for improving efficiency of the protocols. The objective of batch cryptography is to devise more efficient primitive cryptographic protocols. In general, these primitives make use of some property such as homomorphism to perform a computationally expensive operation on a collective input set. The idea is to amortise an expensive operation, such as modular exponentiation, over the input. Most of the research work in this field has concentrated on its employment as a batch verifier of digital signatures. It is shown that several new attacks may be launched against these published schemes as some weaknesses are exposed. Another common use of batch cryptography is the simultaneous generation of digital signatures. There is significantly less previous work on this area, and the present schemes have some limited use in practical applications. Several new batch signatures schemes are introduced that improve upon the existing techniques and some practical uses are illustrated. Electronic cash is a technology that demands complex protocols in order to furnish several security properties. These typically include anonymity, traceability of a double spender, and off-line payment features. Presently, the most efficient schemes make use of coin divisibility to withdraw one large financial amount that may be progressively spent with one or more merchants. Several new cash schemes are introduced here that make use of batch cryptography for improving the withdrawal, payment, and deposit of electronic coins. The devised schemes apply both to the batch signature and verification techniques introduced, demonstrating improved performance over the contemporary divisible based structures. The solutions also provide an alternative paradigm for the construction of electronic cash systems. Whilst electronic cash is used as the vehicle for demonstrating the relevance of batch cryptography to security related applications, the applicability of the techniques introduced extends well beyond this.