• Title/Summary/Keyword: Online Commerce

Search Result 718, Processing Time 0.021 seconds

The Social Environment in the Development of Entrepreneurial Idea Generation and Development

  • MAITLO, Ayaz Ali;MEMON, Salman Bashir;SHAIKH, Iram Rani
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.1093-1106
    • /
    • 2020
  • The role of the social environment for any activity is crucial as it prompts new ideas and plays a role of lever for entrepreneurial longevity and creating value through social wellbeing. The lack of entrepreneurship related knowledge in Pakistan has taken the challenge of lesser entrepreneurial activity as compared to other counterpart Asian countries and ranked 138 out of 189 countries on the level of ease of doing business. The study aims to investigate the social environment as a mediator among idea generation, business creation, financing decision and entrepreneurial activity by utilizing quantitative approach. In order to achieve the objective, a total of thirty eight items scale was self-administered for data collection. A non-probability, snowball sampling technique was employed and assembled a total of 300 complete responses through online and paper based surveys as per information provided by the chamber of commerce of three regions namely; Sukkur, Hyderabad and Karachi Sindh, Pakistan. The data analysis result strongly supported the main research question as the entrepreneurial activity increased up to 43.8% after applying social environment as a mediator. This research can help to enhance entrepreneurial activities in Pakistan by creating awareness to support entrepreneurs at social level for entrepreneurship.

An Evolution Model of Rumor Spreading Based on WeChat Social Circle

  • Wang, Lubang;Guo, Yue
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1422-1437
    • /
    • 2019
  • With the rapid development of the Internet and the Mobile Internet, social communication based on the network has become a life style for many people. WeChat is an online social platform, for about one billion users, therefore, it is meaningful to study the spreading and evolution mechanism of the rumor on the WeChat social circle. The Rumor was injected into the WeChat social circle by certain individuals, and the communication and the evolution occur among the nodes within the circle; after the refuting-rumor-information injected into the circle, subsequently,the density of four types of nodes, including the Susceptible, the Latent, the Infective, and the Recovery changes, which results in evolving the WeChat social circle system. In the study, the evolution characteristics of the four node types are analyzed, through construction of the evolution equation. The evolution process of the rumor injection and the refuting-rumor-information injection is simulated through the structure of the virtual social network, and the evolution laws of the four states are depicted by figures. The significant results from this study suggest that the spreading and evolving of the rumors are closely related to the nodes degree on the WeChat social circle.

Design and Implementation of Component-Based XML/EDI System (컴포넌트기반의 XML/EDI 시스템 설계 및 구현)

  • 문태수;김호진
    • The Journal of Information Systems
    • /
    • v.12 no.1
    • /
    • pp.87-116
    • /
    • 2003
  • One of the important applications for business-to-business electronic commerce is in procurement and inventory management using electronic data interchange(EDI). Using online catalogs and approved supplier lists, firms can easily create requisitions and purchasing documents. The emerging trend in EDI technology is changed from VAN(Value Added Network) based EDI to XML based EDI. This paper intends to suggest a component-based XML/EDI system using Unified Modeling Language(UML), as an application system for automobile part industry. Applying component based XML/EDI systems designed with UML methodology, we analyzed the workflow and the document on procurement process between trading partners and implemented a prototype of efficient XML/EDI system, as a surrogate of existing VAN/EDI. The result of applying object-oriented CBD(Component Based Development) technique is to minimize the risk of life cycle and facilitate the reuse of software as mentioned to limitation of information engineering methodology. It enables the interoperability with corporate legacy systems such as ERP(Enterprise Resource Planning), SCM(Supply Chain Management). This system proposes a solution to apply analysis phase and design phase in implementation of XML/EDI system. The implementation of XML/EDI system using CBD shows the ease of use in software reuse and the interoperability with corporate internal information system. The purchasing department with XML/EDI system can electronically communicate purchase orders, delivery schedules to external suppliers and interoperate with other application systems.

  • PDF

Preliminary Results-Nature as Metaphor : Innovative Visualization of Accounting Information with Lotus Plants

  • Raungpaka, Voraphan;Savetpanuvong, Phannaphatr;Tanlamai, Uthai
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.2
    • /
    • pp.1-14
    • /
    • 2013
  • Learning accounting has always been a challenge for non-accounting students and managers. Understanding accounting information requires more than a numerical description of financial and income statements. Current accounting practice presents accounting reports in the form of tables with values or in two or three dimensional graphs generated by a spread sheet program. The present study proposes an alternative visualization with metaphor from nature as a learning device for novice users and managers. After surveying various kinds of plants, the lotus flower was chosen as an attractive analogy because every part of the plant from leaves to roots is usable and can have economic value. Moreover, lotus flowers, whether man-made or natural, can easily be part of a familiar, natural ecology representing both beauty and serenity. Results from online survey respondents (n = 220) showed that there was no significant difference on overall usability of the Lotus visualization between expert users and novice users. However, verbally-oriented users differed Significantly from visually-oriented users in their usability assessment, perceived usefulness, and intention to use the Lotus visualization.

The Influence of Social Identification and Persistent Communication Activities on Interpersonal Trust in the Virtual Community (온라인 공동체에서 사회적 정체성과 지속적인커뮤니케이션 활동이 구성원 간 신뢰에 미치는 영향에 관한연구)

  • Cho, Seung-Ho
    • Journal of Digital Convergence
    • /
    • v.9 no.2
    • /
    • pp.65-77
    • /
    • 2011
  • The current study investigated how interpersonal trust is developed in online communities, where most of individual identities are unknown or doubtful. To better understand and theorize the underlying mechanism, a survey was conducted integrating the literature on computer-mediated communication (CMC) and extending previous research on social identify model. The findings confirmed that integrity, benevolence, and openness are essential components in the concept of trustworthiness, which is predicted by social identification and persistency of communication activities in the virtual community.

Analysis of Mobile Smishing Hacking Trends and Security Measures (Mobile Smishing 해킹 동향 분석 및 보안대책)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2615-2622
    • /
    • 2015
  • Using the mobile device, such as Smartphones tablet PC, online banking and e-commerce, as well as process and to their work. While going to high availability and convenience of mobile devices castle, SNS, letters, using an email Smishing financial fraud and leakage of personal information such as crime has occurred many. Smishing smartphone accidents increased sharply from 2013, MERS infection cases, landmine provocative events, such as the delivery of Thanksgiving has occurred cleverly using social engineering techniques. In this paper, i analyze the trends in Smishing hacking attacks on mobile devices since 2014. With regard to social issues, it analyzes the process of hacking attacks Smishing leading to financial fraud to mobile users. And, in this paper, i propose a secure way and measures of financial damage for mobile Smishing hacking.

Factors Influencing Digital Transformation of Logistics Service Providers: A Case Study in Thailand

  • SINGHDONG, Putthiwat;SUTHIWARTNARUEPUT, Kamonchanok;PORNCHAIWISESKUL, Pongsa
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.5
    • /
    • pp.241-251
    • /
    • 2021
  • This research explores and develops digital transformation factors influencing the logistics service-provider sector in Thailand while also examining the impact sustainability factors associated with digital transformation. Divided into two parts, Part one of the theoretical study framework covers 21 factors relating to logistics, including drivers, objectives, implications, and success factors. The second part concerns 23 factors associated with logistics sustainability, including economic, environmental, and social aspects. This quantitative empirical research was conducted using an online questionnaire instrument, and a structural equation modeling (SEM) technique was used to test the proposed model. The findings from 545 samples collected between August and November 2020 from respondents working in logistics service-provider companies in Thailand show that digital transformation drivers and objectives seem likely to impact success factors and implications in digital transformation positively. Digital transformation success factors also positively impact logistics sustainability. In comparison, logistics sustainability has a significant impact on Thailand's logistics service-provider sector's economic, environmental, and social aspects. Lastly, this research highlights the significance of digital transformation success factors and extends the current knowledge about digital transformation factors and their potential impact on logistics sustainability.

A Review of Machine Learning Algorithms for Fraud Detection in Credit Card Transaction

  • Lim, Kha Shing;Lee, Lam Hong;Sim, Yee-Wai
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.31-40
    • /
    • 2021
  • The increasing number of credit card fraud cases has become a considerable problem since the past decades. This phenomenon is due to the expansion of new technologies, including the increased popularity and volume of online banking transactions and e-commerce. In order to address the problem of credit card fraud detection, a rule-based approach has been widely utilized to detect and guard against fraudulent activities. However, it requires huge computational power and high complexity in defining and building the rule base for pattern matching, in order to precisely identifying the fraud patterns. In addition, it does not come with intelligence and ability in predicting or analysing transaction data in looking for new fraud patterns and strategies. As such, Data Mining and Machine Learning algorithms are proposed to overcome the shortcomings in this paper. The aim of this paper is to highlight the important techniques and methodologies that are employed in fraud detection, while at the same time focusing on the existing literature. Methods such as Artificial Neural Networks (ANNs), Support Vector Machines (SVMs), naïve Bayesian, k-Nearest Neighbour (k-NN), Decision Tree and Frequent Pattern Mining algorithms are reviewed and evaluated for their performance in detecting fraudulent transaction.

A Study on the Military use of the New Future Battlefield Environment Metaverse (새로운 전장환경 메타버스의 군사적 활용방안 연구)

  • Jung, Min-Sub;Song, Jae Jung;Park, Sang-Hyuk;Moon, Jang-Kwon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.179-185
    • /
    • 2022
  • Society is entering a new transition period due to the metaverse, where a new world is created by the fusion of the online virtual world and the real world with the development of information and communication technology. The realm of Metaverse, which was focused on entertainment, is gradually expanding into everyday areas such as fellowship activities, education, and commerce. Its application is also increasing in the field. Therefore, this study intends to discuss the concept, core type, development trend, and future application of the metaverse in the military field.

Development of Customer Satisfaction Index (CSI) Model for Pakistan

  • HAMAYUN, Khadija;HAFEEZ, Shakir
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.7
    • /
    • pp.153-171
    • /
    • 2022
  • To measure economic performance, customer satisfaction indices are constructed. This study proposes an index for banking and telecom, a significant evaluative system for comparing and enhancing customer satisfaction across the industries. The study suggests and examines amendments and improvements to the prior indices and incorporates ignored indicators to propose a punier index for Pakistan. The study is a pioneer in integrating online and offline indices into a single comprehensive model. The study is enriched by the Theory of Reasoned Action and Technological Acceptance Model. A sample of 320 respondents was used. The sample was divided based on gender and marital status. To authenticate the theoretical model, PLS-SEM was applied. We discovered nine latent variables that define customer satisfaction and conclude that a single model can be utilized for e-commerce enterprises as well. The index scores are comparable to the American index for banking and the Turkish index for telecom. Multi-group analysis (MGA) was used to comprehend the differences among the groups. This reveals that customization, design, reliability, and responsiveness induce satisfaction in telecom male and married customers. For the banking industry, the difference exists in complaint handling, customization, corporate image, perceived price, reliability, responsiveness, sentiments, convenience, and security to satisfaction links, image and complaint handling to loyalty links.