As the Internet becomes increasingly interconnected with modern society, the transition to online business has developed into a prevalent form of commerce. While there exist various advantages and disadvantages to online business, it plays a major role in contemporary business methods. Improving E-Commerce Web Applications Through Business Intelligence Techniques provides emerging research on the core areas of e-commerce web applications. While highlighting the use of data mining, search engine optimization, and online marketing to advance online business, readers will learn how the role of online commerce is becoming more prevalent in modern business. This book is an important resource for vendors, website developers, online customers, and scholars seeking current research on the development and use of e-commerce.
In the next few years, it is expected that most businesses will have transitioned to the use of electronic commerce technologies, namely e-commerce. This acceleration in the acceptance of e-commerce not only changes the face of business and retail, but also has introduced new, adaptive business models. The experience of consumers in online shopping and the popularity of the digital marketplace have changed the way businesses must meet the needs of consumers. To stay relevant, businesses must develop new techniques and strategies to remain competitive in a changing commercial atmosphere. The way in which e-commerce is being implemented, the business models that have been developed, and the applications including the benefits and challenges to e-commerce must be discussed to understand modern business. The Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business discusses the best practices, latest strategies, and newest methods for implementing and using e-commerce in modern businesses. This includes not only a view of how business models have changed and what business models have emerged, but also provides a focus on how consumers have changed in terms of their needs, their online behavior, and their use of e-commerce services. Topics including e-business, e-services, mobile commerce, usability models, website development, brand management and marketing, and online shopping will be explored in detail. This book is ideally intended for business managers, e-commerce managers, marketers, advertisers, brand managers, executives, IT consultants, practitioners, researchers, academicians, and students interested in how e-commerce is impacting modern business models.
The main problems that prevent fast and high-quality document processing in electronic document management systems are insufficient and unstructured information, information redundancy, and the presence of large amounts of undesirable user information. The human factor has a significant impact on the efficiency of document search. An average user is not aware of the advanced option of a query language and uses typical queries. Development of a specialized software toolkit intended for information systems and electronic document management systems can be an effective solution of the tasks listed above. Such toolkits should be based on the means and methods of automatic keyword extraction and text classification. The categorization (or classification) of texts into predefined categories has witnessed a booming interest in the last 10 years due to the increased availability of documents in digital form and the ensuing need to organize them. Thus, research on keyword extraction, advancements in the field, and possible future solutions is of great importance in current times. Developing a Keyword Extractor and Document Classifier: Emerging Research and Opportunities presents an information extraction mechanism that can process many kinds of inputs, realize the type of text, and understand the percentage of the keywords that has to be stored. This mechanism then supports information extraction and information categorization mechanisms. This module is used to support a text summarization mechanism, which leads—with the help of the keyword extraction module—to text categorization. It employs lexical and information retrieval techniques to extract phrases from the document text that are likely to characterize it and determines the category of the retrieved text to present a summary to the users. This book is ideal for practitioners, stakeholders, researchers, academicians, and students who are interested in the development of a new keyword extractor and document classifier method.
As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research. Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research.
In today’s globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.
As society continues to rely heavily on technological tools for facilitating business, e-commerce, banking, and communication, among other applications, there has been a significant rise in criminals seeking to exploit these tools for their nefarious gain. Countries all over the world are seeing substantial increases in identity theft and cyberattacks, as well as illicit transactions, including drug trafficking and human trafficking, being made through the dark web internet. Sex offenders and murderers explore unconventional methods of finding and contacting their victims through Facebook, Instagram, popular dating sites, etc., while pedophiles rely on these channels to obtain information and photographs of children, which are shared on hidden community sites. As criminals continue to harness technological advancements that are outpacing legal and ethical standards, law enforcement and government officials are faced with the challenge of devising new and alternative strategies to identify and apprehend criminals to preserve the safety of society. The Encyclopedia of Criminal Activities and the Deep Web is a three-volume set that includes comprehensive articles covering multidisciplinary research and expert insights provided by hundreds of leading researchers from 30 countries including the United States, the United Kingdom, Australia, New Zealand, Germany, Finland, South Korea, Malaysia, and more. This comprehensive encyclopedia provides the most diverse findings and new methodologies for monitoring and regulating the use of online tools as well as hidden areas of the internet, including the deep and dark web. Highlighting a wide range of topics such as cyberbullying, online hate speech, and hacktivism, this book will offer strategies for the prediction and prevention of online criminal activity and examine methods for safeguarding internet users and their data from being tracked or stalked. Due to the techniques and extensive knowledge discussed in this publication it is an invaluable addition for academic and corporate libraries as well as a critical resource for policy makers, law enforcement officials, forensic scientists, criminologists, sociologists, victim advocates, cybersecurity analysts, lawmakers, government officials, industry professionals, academicians, researchers, and students within this field of study.
The use of ICT applications has dipped into almost every aspect of the business sector, including trade. With the volume of e-commerce increasing, international traders must switch their rules and practices to e-trade to survive in such a competitive market. However, the complexity of international trade, which covers customs processes, different legislation, specific documentation requirements, different languages, different currencies, and different payment systems and risk, presents its own challenges in this transition. Tools and Techniques for Implementing International E-Trading Tactics for Competitive Advantage examines the multidisciplinary approach of international e-trade as it applies to information technology, digital marketing, digital communication, online reputation management, and different legislation and risks. The content within this publication examines digital advertising, consumer behavior, and e-commerce and is designed for international traders, entrepreneurs, business professionals, researchers, academicians, and students.
In recent decades, the industrial revolution has increased economic growth despite its immersion in global environmental issues such as climate change. Researchers emphasize the adoption of circular economy practices in global supply chains and businesses for better socio-environmental sustainability without compromising economic growth. Integrating blockchain technology into business practices could promote the circular economy as well as global environmental sustainability. Integrating Blockchain Technology Into the Circular Economy discusses the technological advancements in circular economy practices, which provide better results for both economic growth and environmental sustainability. It provides relevant theoretical frameworks and the latest empirical research findings in the applications of blockchain technology. Covering topics such as big data analytics, financial market infrastructure, and sustainable performance, this book is an essential resource for managers, operations managers, executives, manufacturers, environmentalists, researchers, industry practitioners, students and educators of higher education, and academicians.
In the increasingly competitive corporate sector, businesses must examine their current practices to ensure business success. By examining their social, financial, and environmental risks, obligations, and opportunities, businesses can re-design their operations more effectively to ensure prosperity. Sustainable Business: Concepts, Methodologies, Tools, and Applications is a vital reference source that explores the best practices that promote business sustainability, including examining how economic, social, and environmental aspects are related to each other in the company’s management and performance. Highlighting a range of topics such as lean manufacturing, sustainable business model innovation, and ethical consumerism, this multi-volume book is ideally designed for entrepreneurs, business executives, business professionals, managers, and academics seeking current research on sustainable business practices.
E-commerce customer service technologies adopted by businesses help them present their customers with the information they want quickly, take responsibility for their actions, communicate specific solutions to customers, and maintain their competitive edge. Evidently, different e-commerce customer technologies have different strengths and deficiencies. Principally, this book zeroes in on the strengths and downsides of the e-commerce customer service technologies used by Adidas, Standard Bank, and Coca-Cola currently, comparing the technologies critically. They use the Salesforce Commerce Cloud, Acquire, and Get Satisfaction e-commerce customer service technologies respectively. If a business is required to adopt Get Satisfaction, Acquire, or Salesforce Commerce Cloud as its e-commerce customer technology, it should consider each of the options’ capabilities and deficiencies. Get Satisfaction and Salesforce Commerce Cloud, unlike Acquire, enable businesses build online customer communities. Salesforce Commerce Cloud and Acquire, unlike Get Satisfaction have analytics capabilities, which are rather important to support organizations, including businesses that offer customer support. Salesforce Commerce Cloud and Acquire, unlike Get Satisfaction, help businesses offer consistent customer experiences over varied channels - one of the most critical differentiating factor for retail businesses presently is shopping experience. Acquire and Salesforce Commerce Cloud, unlike Get Satisfaction, assist businesses in integrating customer data.