Academic literature on the topic 'Business protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Business protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Business protocol"

1

Seguel, Ricardo, Rik Eshuis, and Paul Grefen. "Architecture Support for Flexible Business Chain Integration Using Protocol Adaptors." International Journal of Cooperative Information Systems 23, no. 04 (December 2014): 1450008. http://dx.doi.org/10.1142/s0218843014500087.

Full text
Abstract:
Business chains increasingly rely on the dynamic integration of business processes of different partners. The interaction constraints that result from the business processes are captured in business protocols. Since the business protocols of each partner support its own way of working, the business protocols can easily mismatch, which hinders organizations from forming a business chain. Such mismatches can be resolved by protocol adaptors. In this paper, we show how protocol adaptors can be used to enable the flexible formation of business chains. For different types of business chains, we present formation cases that describe which partners are responsible for the construction and operation of protocol adaptors. Next, we present for each formation case an accompanying concrete software architecture that realizes the case. The presented software architectures support the flexible formation of business chains and use protocol adaptation as a key component. We show the feasibility of the approach by discussing a prototype implementation, which we apply to a case study from the healthcare domain.
APA, Harvard, Vancouver, ISO, and other styles
2

Fernández y Vázquez, Jorge Jesús. "Introducción al protocolo turístico-hotelero //Introduction to protocol Tourist & Hospitality." REVISTA ESTUDIOS INSTITUCIONALES 2, no. 3 (December 1, 2015): 201. http://dx.doi.org/10.5944/eeii.vol.2.n.3.2015.18370.

Full text
Abstract:
El Protocolo Turístico y Hotelero una visión desde la perspectiva intercultural. Del Profesional del Turismo y Hotelería que ofrece los servicios del sector y del Profesional de Protocolo que necesita de los servicios del Sector Turístico.Un Protocolo que tiene conexión con el Protocolo de Empresa.¿Por qué el Protocolo en el sector Turístico? Por 5 razones importantes, y más especialmente en el Sector Hotelero El Protocolo en la empresa turística se establece desde 3 componentes.The Tourism and Hospitality Protocol a view from an intercultural perspective. Professional Tourism and Hospitality offering services sector and Professional Protocol need the services of the Tourism Sector.A protocol that has connection with the Business Protocol. Why the Protocol on Tourism sector? For 5 important reasons, and especially in the Hospitality Industry. The Protocol on the tourist business is set for 3 components.
APA, Harvard, Vancouver, ISO, and other styles
3

Ott, Hermann E. "The Kyoto Protocol: Unfinished Business." Environment: Science and Policy for Sustainable Development 40, no. 6 (July 1998): 16–20. http://dx.doi.org/10.1080/00139159809604595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dan, A., D. M. Dias, R. Kearney, T. C. Lau, T. N. Nguyen, F. N. Parr, M. W. Sachs, and H. H. Shaikh. "Business-to-business integration with tpaML and a business-to-business protocol framework." IBM Systems Journal 40, no. 1 (2001): 68–90. http://dx.doi.org/10.1147/sj.401.0068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Botero, Isabel C., Gonzalo Gomez Betancourt, Jose Bernardo Betancourt Ramirez, and Maria Piedad Lopez Vergara. "Family protocols as governance tools." Journal of Family Business Management 5, no. 2 (October 12, 2015): 218–37. http://dx.doi.org/10.1108/jfbm-01-2015-0001.

Full text
Abstract:
Purpose – The purpose of this paper is to focus on the family protocol as a governance policy tool that can help ameliorate intra-family conflict and enhance the probabilities of survivability of the family business. Design/methodology/approach – Using equity theory and organizational justice as theoretical frameworks, the authors explain how and why the development of a protocol can help the family firm and their survivability. The authors combine academic and practitioner knowledge to present a process model for creating family protocols. Findings – Based on four important considerations (i.e. process view, deep knowledge about the family business, dynamic environment, and the need for change and adaptation) the authors develop a process model for the development of family tailored protocols. Originality/value – This paper integrates the work of practitioners and academics to help understand what is a family protocol, why and how the protocol affects the family and business relationships and presents a procedural model for the development of a family protocol that can help govern the relationship between the family and the business.
APA, Harvard, Vancouver, ISO, and other styles
6

Cortes, Angélica C. "Business protocol: a public relations approach." Corporate Communications: An International Journal 5, no. 3 (September 2000): 140–43. http://dx.doi.org/10.1108/13563280010377527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nourine, L., R. Ragab, and F. Toumani. "Decidability and Complexity of Web Service Business Protocol Synthesis." International Journal of Cooperative Information Systems 25, no. 03 (September 2016): 1650008. http://dx.doi.org/10.1142/s0218843016500088.

Full text
Abstract:
Automatic synthesis of web services business protocols (BPs) aims at solving algorithmically the problem of deriving a mediator that realizes a BP of a target service using a set of specifications of available services. This problem, and its variants, gave rise to a large number of fundamental research work over the last decade. However, existing works considered this problem under the restriction that the number of instances of an available service that can be involved in a composition is bounded by a constant [Formula: see text] which is fixed a priori. This paper investigates the unbounded variant of this problem using a formal framework in which web service BPs are described by means of finite state machines (FSM). We show that in this context, the protocol synthesis problem can be reduced to that of testing simulation preorder between an FSM and an (infinitely) iterated product of FSMs. Existing results regarding close decision problems in the context of the so-called shuffle languages are rather negative and cannot be directly exploited in our context. In this paper, we develop a novel technique to prove the decidability of testing simulation in our case of interest. We provide complexity bounds for the general protocol synthesis problem and identify two cases of particular interest, namely loop-free target services and hybrid states-free component services, for which protocol synthesis is shown to be respectively NP-COMPETE and EXPTIME-COMPLETE.
APA, Harvard, Vancouver, ISO, and other styles
8

Díaz Gómez, María Angustias, and Elicio Díaz Gómez. "Reflexiones sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las sociedades familiares." Pecvnia : Revista de la Facultad de Ciencias Económicas y Empresariales, Universidad de León, no. 12 (June 1, 2011): 91. http://dx.doi.org/10.18002/pec.v0i12.617.

Full text
Abstract:
El objeto de este trabajo es analizar el Protocolo Familiar, estudiando su concepto, naturaleza jurídica y eficacia, su contenido, publicidad y desarrollo. El protocolo familiar es un instrumento jurídico que pretende organizar la relación entre la familia y la empresa, separando ambas realidades y, especialmente, trata de planificar adecuadamente la sucesión de la empresa familiar. Se trata de reflexionar sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las Sociedades Familiares.<br /><br /><br />The object of this work is to analyze the Family Protocol, studying his concept, juridical nature and effectiveness, his content, advertising and development. The family protocol is a legal instrument that, intends to organize the interaction between a family and their family-owned business, separating both realities and, specially, it tries to plan adequately the succession of the family business. It is a question of thinking about the Spanish Royal decree 171/2007, of February 9rd, by which there is regulated the advertising of the family protocols in the Familiar Companies.<br />
APA, Harvard, Vancouver, ISO, and other styles
9

Zhi, Huang, Xiang Qun Wang, and Wei Chen. "Application of IEEE802.1x Protocol Based on EPON System." Applied Mechanics and Materials 336-338 (July 2013): 2433–37. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2433.

Full text
Abstract:
IEEE 802.1x is a port-based network access control protocol, the one of the newest authentication protocols. With the MD5 algorithm as an example, this paper introduces the type of protocol packets and the authentication process in detail. The authentication port is apart from the business stream based on the logical port. The business stream is transmitted over the controlled port, but the authentication stream is transmitted over the uncontrolled port. Therefore, the port control and authorization for users can be carried out. In this paper, two authentication methods based on EPON system are studied in detail. The 802.1x authentication protocol has many advantages, such as low-cost, simply and so on. It can satisfy the requirement of intelligent distribution network communication system.
APA, Harvard, Vancouver, ISO, and other styles
10

Arteaga, Rocio, and Susana Menéndez-Requejo. "Family Constitution and Business Performance: Moderating Factors." Family Business Review 30, no. 4 (September 27, 2017): 320–38. http://dx.doi.org/10.1177/0894486517732438.

Full text
Abstract:
This study analyzes the relationship between implementing a Family Constitution (Protocol) and future family business performance. We analyze a unique sample of 530 Spanish family businesses. Half of these firms received financial aid from the government to implement a Family Protocol during 2003-2013. The analysis reveals that family businesses that implemented a Family Constitution had significantly improved performance within 2 years after the implementation. The positive relationship between the implementation of a Family Constitution and future firm performance is stronger for firms that had a nonfamily CEO, had multiple family owners, or were controlled by later generations.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Business protocol"

1

Gullová, Soňa. "Společenská etiketa, obchodní a diplomatický protokol." Doctoral thesis, Vysoká škola ekonomická v Praze, 2005. http://www.nusl.cz/ntk/nusl-77056.

Full text
Abstract:
The goal of this Thesis is to uncover, characterize, analyze, describe and define selected contemporary rules of etiquette, international business and diplomatic protocol in international business and diplomatic practice and point out the greatest deficiencies witnessed in practice. The research subject of this Thesis is, thus, the formal aspect of international business and diplomatic cooperation. Its output consists of recommendation on how to correctly apply these rules in practice. I would also like my paper to significantly contribute to the general knowledge of this fascinating and commonly useful knowledge. The structure of the Thesis as it was drawn up in context of its goals consists of three main chapters, introduction and conclusion. The first part of the Thesis deals with Social Etiquette. This part is not conceived as general rules of social intercourse. Instead, it concentrates mainly on the elaboration of contemporary general rules of social intercourse and etiquette to in the context of business and entrepreneurial activities, i.e. Business Protocol. The Thesis would also like to provide answers to the following questions: What is the current standard of social intercourse in the Czech Republic? What are the contemporary rules of social intercourse in the Czech Republic and how do they differ from the etiquette abroad? Can we claim that these rules are being observed? What leads our managers, businessman, diplomats etc. to observing these rules? In my Thesis I strive to evaluate contemporary rules applicable to social, business and diplomatic events as well as in written communication and to draw attention the lack of their knowledge. Another partial goal of the Thesis consists of using carried out analyses, evaluations, inquiries via questionnaires and comparative analyses to point out the differences in the rules of social intercourse, conduct and negotiation in different territories. The working hypothesis of this part of the paper is to indicate on the basis of the above mentioned allegations the relationship between the behaviour and conduct of managers of different provenience and the fact that they have different cultural background. Culture is learned not inherited. It is derived from the social environment not from genes and it must be clearly distinguished from human character and the character of individual people. Significant attention is, therefore, paid to the study of international customs and conventions, especially those of the countries which the representatives of Czech firms, enterprises and institutions most come into contact with. The presented Thesis does not have the ambition to come up with a definitive cookbook as to how to conduct oneself in a given situation within a given territory; it merely strives to point out the pitfalls, misunderstandings and blunders in conduct and barriers in communication and in business or any other professional negotiations. Unlike legal acts the rules of Etiquette are not binding. Laws apply to all and the state prosecutes their infringement. Unlike laws, the rules of Etiquette are not enforceable. Their only form of enforcement is the social pressure which the society effectuates on the individual. Thus, the standards of social conduct only apply to those willing to abide by them. The presented paper is an aggregate of the rules and its author's views. Another author's standpoint may differ. The second part of the Thesis concentrates on the sphere of Diplomatic Protocol in international business and diplomatic practice. The presented paper aims at describing the existing system of Foreign Service and diplomatic activities, presenting the diplomatic representations, consulates, missions and other representatives abroad, their functioning as well as their immunities and privileges. Diplomatic Protocol concerns the formal, not the material, content of international relations. Formal rules of social conduct in intercourse with diplomatic representatives of other countries, the etiquette and the ceremonies applied to the intercourse with these representatives form an integral part of the Diplomatic Protocol. In the initial part I define the very term Diplomatic Protocol and I strive to specify is subject. Successively I address individual respective parts of Diplomatic Protocol and diplomatic practice, such as the methods of establishing diplomatic relationships, the roles of diplomatic missions, ranks of diplomatic representatives and their immunities and privileges, the procedure related to the conferment of agrément and the termination of activity of the head of a diplomatic mission, official visits of foreign guests, organisation of international conferences, diplomatic correspondence, consular activities etc. In the course of its elaboration the presented Thesis should also offer answers to the following questions: What is the current international form, role and significance of the Diplomatic Protocol? What leads states to observing signed conventions? Which diplomatic immunities and privileges are at the moment among the most abused or violated? For the accomplishment of the goals set out in this Thesis I shall strive to outline the scale of theoretic approaches and based on the effective layout and international practice express my own conclusions. Among others, the paper also aims at promoting the development of skills of the current diplomat and acquainting them with the norms of diplomatic correspondence. The aforementioned part of the Thesis also sets out another rather easily attained objective: due to the inexistence of comprehensive publications on this topic to become a handbook and reference manual not only for the young adepts of this profession but for all who for some reason take interest in Diplomacy. It was an ambition of the author to assemble and explain terms, which those interested in the practical aspects of Foreign Service, may be confronted with. The paper reflects current diplomatic practice and takes into account Czech circumstances. The author is endeavouring to mediate the information and knowledge she gained through years of practice at representative offices abroad gained during her practical experience at the Ministry of Foreign Affairs and through more than 20 years of practice in academic research and instruction of this area.
APA, Harvard, Vancouver, ISO, and other styles
2

Eslamichalandar, Maryam. "Web Service Composition Compatibility : adaptation in the presence of Business Protocol Evolution." Thesis, Paris, CNAM, 2013. http://www.theses.fr/2013CNAM0998/document.

Full text
Abstract:
Avec l’utilisation croissante d’architectures logicielles indépendantes de la plate-forme et du langage dans le paradigme de l’architecture orientée services (SOA), la technologie de services web permet l’interopérabilité dynamique et flexible des processus métiers aussi bien au niveau intra qu’inter-organisationnel. Bien que la normalisation des services web permet de réduire l’hétérogénéité et rend plus facile leur interopérabilité, il y a toujours besoin de vérifier leur compatibilité en particulier dans le contexte inter-entreprises. Deux services sont compatibles si une collaboration entre eux est accomplie avec succès et que chacun puisse atteindre ses résultats attendus (états finaux). L’approche typique devant permettre à des services incompatibles d’interagir correctement est l’adaptation du service. L’adaptation consiste dans ce contexte à faire face principalement aux discordances relevées au niveau des interfaces de service (incompatibilités entre signatures de services) ainsi qu’aux discordances qui ont lieu au niveau des protocoles métiers (incompatibilité dans l’ordre des messages échangés entre services). On distingue deux principales techniques d’adaptation: modification de service ou synthèse d’un composant adaptateur. L’adaptation en termes de modification de service exige l’application de certaines mesures d’optimisation pour supporter les spécifications du service partenaire. Dans le cas où l’adaptation traite de la création d’un adaptateur, un composant autonome modère les interactions entre les deux services de sorte que l’interopérabilité soit obtenue. En d’autres termes, l’adaptateur compense les différences entre interfaces de services par conversion de données (c’est-à-dire par transformation de message) et celles entre protocoles métiers en réorganisant les échanges de messages ou en générant un message manquant.Nous nous concentrons ici sur le problème de la reconfiguration dynamique de l’adaptateur en presence d’évolution de protocols métiers. Après avoir traité de la vérification d’un adaptateur en exploitant des techniques structurelles existantes développées dans le cadre de la théorie des réseaux de Petri, nous établissons une identification des patrons de mise à jour d’adaptateurs ainsi que la mise en correspondance de ces patrons avec les différents types d’évolutions possibles au niveau des protocoles métiers des services web. Ce travail a abouti à la proposition d’un algorithme permettant, d’une part de détecter les patrons d’évolution adéquats suite à une évolution d’un des protocoles métier des services partenaires et, d’autre part et sous certaines conditions, la mise à jour à la volée de la specification du nouvel adaptateur obtenu ainsi que sa verification.Enfin, les expérimentations réalisées sur un prototype montrent les avantages en termes de temps et de coût de l'approche dynamique proposée par rapport aux méthodes statiques conduisant systématiquement à la regeneration complète de l’adaptateur
The advent of Web service technologies in the paradigm of Service oriented architecture (SOA) enables dynamic and flexible interoperation of distributed business processes within and across organization boundaries. One of the challenges in working with heterogeneous and autonomous Web services is the need to ensure their interoperability and compatibility. The typical approach for enabling incompatible services to interact is service adaptation. The need for adaptation in Web services comes from the heterogeneity at the levels of service interface and business protocol. The service interface incompatibilities include service signature mismatches (e.g., message and operation name, number; the type of input/output message parameters of operations; and the parameter value constraint). The mismatches at the business protocol (or service behavior) level arise from the order constraints that services impose on messages exchanges (e.g., deadlock where both partner services are mutually waiting to receive some message from the other, and unspecified reception in which one service sends a message while the partner is not expecting it). In service interaction through adaptation, an adapter mediates the interactions between two services with potentially different interfaces and business protocols such that the interoperability is achieved, i.e., adapter compensates for the differences between their interfaces by data mappings, and between their business protocols by rearranging the messages exchanges or generating a missing message. In this dissertation, we focus on how to cope with the dynamic evolution of business protocol P of a given service (i.e., P is changed to P') that is adapted by an adapter in the context of service interaction. Web service specifications constantly evolve. For variety of reasons, service providers may change their business protocols. Therefore, it is important to understand the potential impacts of the changes arising from the evolution of service business protocol on the adapter.We present an approach to automatically detect the effects of business protocols evolution on the adapter and, if possible, to suggest fixes to update the specification of adapter on-the-fly. Besides, we propose a technique to verify the correctness of new adapter which is dynamically re-configured. Finally, we describe a prototype tool where experimentations show the benefits of proposed approach in terms of time and cost compared to the static methods aiming for complete regeneration of adapter or manual inspection and adaption of the adapter with respect to changes in the business protocols
APA, Harvard, Vancouver, ISO, and other styles
3

Pelánová, Pavla. "Obchodní a diplomatický protokol Francie." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-193029.

Full text
Abstract:
The aim of my master thesis was to specify the business and diplomatic protocol in France and answer several questions that I defined. Are there any differences between the facts that we read in books and guides about French business and diplomatic protocol, and the reality? Can we generalize French business protocol and say that it is valid for all sectors and generations of managers? Can we claim that French diplomatic protocol is valid all the time and every single president sticks to it? The first chapter explains all the key terms - protocol, business protocol, diplomatic protocol, business negotiation, etiquette. The second chapter focuses on French business protocol, especially organization and course of business negotiation, dress code and gift-giving etiquette, and finally characterizes a typical French company. The third chapter focuses on French diplomatic protocol, especially on all aspects conserning ambassadors in France. The fourth chapter represents the practical part and gives several practical examples of French business and diplomatic protocol. This part is based on four qualitative conversations with four experts on this domain.
APA, Harvard, Vancouver, ISO, and other styles
4

Morrison, Charles Michael. "An investigation of network efficiency and control protocol issues for a configurable collaboration support system." Diss., The University of Arizona, 1992. http://hdl.handle.net/10150/185931.

Full text
Abstract:
Increased global competition is fueling a movement towards semi-autonomous or "self-managing" business teams. At the same time, the ability to interconnect computers has provided a technological base for increased computer support of business teams. A flexible system should accommodate a wide variety of group and task characteristics in both face-to-face and geographically-dispersed environments. An architecture for a system named TEAMWORK is developed that provides flexible support for business teams. System functions are organized into six configurable components, audio processing, video processing, text processing, graphic processing, data management, and numeric processing, collectively addressing a wide spectrum of group tasks. TeamWriter is highly configurable text processing tool implemented to represent and partially evaluate one aspect of TEAMWORK's architecture. Pulldown menus and picture buttons allow access functions. Support for a wide variety of team access protocols, real- and non-real-time work styles, multi-user document writing, brainstorming, idea consolidation, visual group dynamics, and more is included. Document changes appended to a centrally located server file maintain a linear revision history. Evaluation session indicated participants especially liked TeamWriter's multiuser document writing capabilities, picture buttons, authorship provisions, and multiple configurations. Suggestions for enhancing brainstorming and idea consolidation capabilities are supported by the underlying set of configurable functions and involve adding new interface configurations. Sessions also demonstrated that field testing will be needed to thoroughly evaluate TeamWriter; participants were unable to explore all of TeamWriter's features in the one and a half hour long evaluation sessions. Research contributions include a comprehensive team collaboration support system architecture, an implemented configurable text processing module suited for further evaluation, implementation methods, and insight into the functional requirements of a team collaboration support system. Future research directions include field testing TeamWriter, implementing and evaluating the numeric processing module, and investigating non-hierarchical, iconic interfaces to TeamWriter section. As audio, video, and high speed LAN technology become available, prototypes investigating design and implementation strategies for audio, video, and graphic modules will be built.
APA, Harvard, Vancouver, ISO, and other styles
5

Tycová, Tereza. "Specifika obchodního jednání v Číně." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-206682.

Full text
Abstract:
This thesis aims to provide complex view of business negotiations with Chinese partners, particularly with regard to intercultural differences and characteristics of business protocol. The thesis is divided into four chapters, focused on China as a territory, distinctions in culture and business, as well as selected business dealings between Czech and Chinese company. Knowledge of Chinese "game rules" and sufficient preparation are two essential preconditions for long-term success in the Chinese scene.
APA, Harvard, Vancouver, ISO, and other styles
6

Treleaven, James Burris. "A protocol study of a complexity model of information acquisition from graphs and tables." Case Western Reserve University School of Graduate Studies / OhioLINK, 1990. http://rave.ohiolink.edu/etdc/view?acc_num=case1059052459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schmidt, Robert. "What's Really Keeping the US from Joining the Kyoto Protocol. A Game Theoretic Empirical Analysis." Honors in the Major Thesis, University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/994.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.
Bachelors
Business Administration
Business Economics
APA, Harvard, Vancouver, ISO, and other styles
8

Echaiz, Moreno Daniel. "El protocolo familiar. La contractualización en las familias empresarias para la gestión de las empresas familiares." Instituto de Investigaciones Jurídicas de la UNAM, 2014. http://hdl.handle.net/10757/316346.

Full text
Abstract:
Las empresas familiares son un fenómeno mundial de gran trascendencia por el elevado número de ellas, no obstante se ven agobiadas por el problema de la transición generacional que, en muchas ocaciones, marca el inicio del fin de la empresa familiar. El derecho peruano ha desatendido hasta ahora el presente tema; sin embargo, en otros países se aprecia la atención que se le ofrece desde la perspectiva jurídica, por ejemplo a través del protocolo familiar, un instrumento contractual que favorece a la gestión de las empresas familiares.
The family enterprises are a world phenomenon of great transcendency for the hight number of them, nevertheless they meet overwhelmed by the problem of the generational transition that, in many occasions, it marks the beginning of the end of the family enterprise
APA, Harvard, Vancouver, ISO, and other styles
9

Kozlova, Tatjana, and Olga Tytarenko. "To buy and what to buy? : the study of consumer behaviour on the Internet." Thesis, Gotland University, Department of Business Administration, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hgo:diva-139.

Full text
Abstract:

The process that consumers go through while buying something is called consumer buying process and has been studied for a long time. Three stages of the Five-Stage Model (Kotler, 2006) provide a starting point for analysis in this paper and the reason of using this model is to make collected data more structured and easier for understanding. The purpose of this paper is to describe and analyze costumer buying process online.The method for data collection applied in this study is called “think-aloud” that means participants are verbalizing their screen activity and thoughts during the process of observation. The results of this research show that consumer buying process online is a complex process that is influenced by the amount and intensity of information received during the process as well as consumer knowledge and experience on the area of problem. The sequence of the stages proposed by the research model can vary depending on the preferences of consumer and readiness to make a decision.

APA, Harvard, Vancouver, ISO, and other styles
10

Rana, Chirag N. "Enabling One-Phase Commit (1PC) Protocol for Web Service Atomic Transaction (WS-AT)." UNF Digital Commons, 2014. http://digitalcommons.unf.edu/etd/498.

Full text
Abstract:
Business transactions (a.k.a., business conversations) are series of message exchanges that occur between software applications coordinating to achieve a business objective. Web service has been proven to be a promising technology in supporting business transactions. Business transaction can either be long-running or short-lived. A transaction whether in a database or web service paradigm consists of an “all-or-nothing” property. A transaction could either succeed or fail. Web Service Atomic Transactions (WS-AT) is a specification that currently supports Two-Phase Commit (2PC) protocol in a short-lived transaction. WS-AT is developed by OASIS–a standards development organization. However, not all business process scenarios require a 2PC, in that case, just a One-Phase Commit (1PC) would be sufficient. But unfortunately, WS-AT currently does not support 1PC optimization. The ideal scenario where 1PC can be used instead of 2PC is when there is only a single participant. Short-lived transactions involving only one participant can commit without requiring initial “prepare” phase. Thus, there is no overhead to check whether the participant is prepared to either commit or rollback. This research focuses on designing a mechanism that can add 1PC support in WS-AT. The technical implementation of this mechanism is developed by using JBoss Transaction API. As a part of this thesis, 1PC mechanism for a single participant scenario was implemented. This mechanism optimizes the web service transaction process in terms of overhead and performance in terms of execution time. The technical implementation solution for 1PC mechanism was evaluated using three different business process scenarios in a controlled experiment as a presence or absence test. Evaluation results show that 1PC mechanism has a lower mean for execution time and performed significantly better than 2PC mechanism. Based on the contributions made by this thesis, we recommend OASIS to consider including 1PC mechanism as a part of the WS-AT specification.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Business protocol"

1

Robinson, David. Business protocol: Contemporary American practice. Cincinnati, OH: Atomic Dog Publishing, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Office etiquette and protocol. New York: Learning Express, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yager, Jan. Business protocol: How to survive and succeed in business. New York: Wiley, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yager, Jan. Business protocol: How to survive and succeed in business. 2nd ed. Stamford, CT: Hannacroix Creek Books, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Christofferson, April. The protocol. New York: Forge, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Leaptrott, Nan. Rules of the game: Global business protocol. Cincinnati, Ohio: Thomson Executive Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Monod de Froideville, Gilbert, and Mark Verheul. An Experts' Guide to International Protocol. NL Amsterdam: Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9789463727167.

Full text
Abstract:
Although modern life grows increasingly casual, in many sectors, protocol still reigns supreme. An Expert's Guide to International Protocol offers an overview of its associated practices, including those found within the context of diplomatic relations and the business world. Focusing on a wide range of countries and cultures, the book covers topics like precedence, seating arrangements, flags, ceremonies, invitations, dress codes, gifts and honours, and the roles of the protocol officer, guest and host. Throughout, influential diplomatic, business, and cultural figures share their own experiences with protocols around the world, also throughout the COVID-19 pandemic.
APA, Harvard, Vancouver, ISO, and other styles
8

D, Schmidt Klaus. Business customs and protocol in the ASEAN region. Menlo Park, Calif: Business Intelligence Program, SRI International, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

McKinniss, Candace Bancroft. Business in Mexico: Managerial behavior, protocol, and etiquette. New York: Haworth Press, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Corporate protocol: A brief case for business etiquette. Tulsa: Honor, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Business protocol"

1

Di Lorenzo, Renato. "Protocol Validation." In Perspectives in Business Culture, 51–54. Milano: Springer Milan, 2012. http://dx.doi.org/10.1007/978-88-470-2534-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ritter, Daniel. "The Business Graph Protocol." In Communications in Computer and Information Science, 226–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33308-8_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rekik, Malek, Amel Makhlouf, Mohammad S. Obaidat, and Faouzi Zarai. "A Robust Stream Control Transmission Protocol (SCTP)-Based Authentication Protocol." In E-Business and Telecommunications, 34–57. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25915-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kou, W. "Wireless Application Protocol." In Enabling Technologies for Wireless E-Business, 76–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-30637-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Salhi, Abderrahim, Mariam Belghzal, Brahim Minaoui, and Abdellatif Hair. "Optimization of Leach Protocol for Saving Energie in Wireless Sensor Networks." In Business Intelligence, 361–75. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76508-8_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Karwe, Markus, and Günter Müller. "DPIP: A Demand Response Privacy Preserving Interaction Protocol." In Business Information Systems Workshops, 224–34. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26762-3_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Du, Rong, Colin Boyd, and Ernest Foo. "A Secure E-Tender Submission Protocol." In Trust and Privacy in Digital Business, 213–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11824633_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Seguel, Ricardo, Rik Eshuis, and Paul Grefen. "Business Protocol Adaptation for Flexible Chain Management." In On the Move to Meaningful Internet Systems: OTM 2010, 438–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16934-2_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aziz, Benjamin. "Correcting a Delegation Protocol for Grids." In Trust, Privacy and Security in Digital Business, 198–209. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22890-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wakup, Christian, and Jörg Desel. "Analyzing a TCP/IP-Protocol with Process Mining Techniques." In Business Process Management Workshops, 353–64. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15895-2_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Business protocol"

1

Desai, N., and M. P. Singh. "Protocol-based business process modeling and enactment." In Proceedings. IEEE International Conference on Web Services, 2004. IEEE, 2004. http://dx.doi.org/10.1109/icws.2004.1314721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Bao-Hong, Kun Zhen, and Yin-Liang Zhao. "Symmetrically Oblivious Envelope Protocol." In 2009 IEEE International Conference on e-Business Engineering. IEEE, 2009. http://dx.doi.org/10.1109/icebe.2009.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"HOST IDENTITY PROTOCOL PROXY." In 2nd International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2005. http://dx.doi.org/10.5220/0001409002220230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jiang, Nan, Xiang-dong Liu, Jing-ying Zhao, and De-li Yang. "A Mobile Micropayment Protocol Based on Chaos." In 2009 Eighth International Conference on Mobile Business. IEEE, 2009. http://dx.doi.org/10.1109/icmb.2009.55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hou, Fangtian, Cheng Yang, Jianbo Liu, Yichun Zhang, Jiayin Tian, and Yakun Zhang. "HB-MAP Protocol: A New Secure Bidirectional Light-Wight Authentication Protocol of HB." In 2012 IEEE 9th International Conference on e-Business Engineering (ICEBE). IEEE, 2012. http://dx.doi.org/10.1109/icebe.2012.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Rais, Ansari Mohammad Nabi Azad S., and Anilkumar Vishwakarma. "Enhancement of manet routing protocol." In 2014 Conference on IT in Business, Industry and Government (CSIBIG). IEEE, 2014. http://dx.doi.org/10.1109/csibig.2014.7056979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Li, and Xiaoju Li. "Watermarking Protocol for Broadcast Monitoring." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bîrjoveanu, Cătălin, and Mirela Bîrjoveanu. "Multi-party E-Commerce Protocol for B2C/B2B Applications." In 16th International Conference on e-Business. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007956801640171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Meng, Bo. "Analyzing and Improving Internet Voting Protocol." In IEEE International Conference on e-Business Engineering (ICEBE'07). IEEE, 2007. http://dx.doi.org/10.1109/icebe.2007.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Zhen, Shijie Zhou, and Zongwei Luo. "Design and Analysis for RFID Authentication Protocol." In 2008 IEEE International Conference on e-Business Engineering. IEEE, 2008. http://dx.doi.org/10.1109/icebe.2008.92.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Business protocol"

1

JA Edmonds, CN MacCracken, RD Sands, and SH Kim. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol. Office of Scientific and Technical Information (OSTI), July 2000. http://dx.doi.org/10.2172/757660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography