Добірка наукової літератури з теми "Business enterprises Computer networks Malaysia"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Business enterprises Computer networks Malaysia".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Business enterprises Computer networks Malaysia"
Hua, Sim Chia, Modapothala Jashua Rajesh, and Lau Bee Theng. "Determinants of E-Commerce Adoption Among Small and Medium-Sized Enterprises in Malaysia." International Journal of E-Adoption 1, no. 4 (October 2009): 1–18. http://dx.doi.org/10.4018/jea.2009100101.
Повний текст джерелаAsmahani Ibrahim, Nor, and Rosmimah Mohd Roslin. "Incorporating Social Networks in Business Relationships of Retail SMEs for Better Business Performance." International Journal of Engineering & Technology 7, no. 4.38 (December 3, 2018): 1305. http://dx.doi.org/10.14419/ijet.v7i4.38.27811.
Повний текст джерелаChelliah, Shankar, Lee Ming Huoy, and Mohamed Sulaiman. "Social Network and Adaptive Capabilities Among Malaysian Born Global Firms." Advanced Science Letters 21, no. 4 (April 1, 2015): 672–75. http://dx.doi.org/10.1166/asl.2015.5952.
Повний текст джерелаChen, Tsung-Yi. "A Business Model Feasibility Evaluation Method for Enterprise Collaborative Business Innovation." International Journal of e-Collaboration 18, no. 1 (January 2022): 1–19. http://dx.doi.org/10.4018/ijec.290291.
Повний текст джерелаWang, Lai-Wang, Fu-Lin Chu, and Chien-Hua Chang. "The Comprehensive Evaluation Model of Business Performance Based on Artificial Neural Network." Mobile Information Systems 2022 (September 24, 2022): 1–9. http://dx.doi.org/10.1155/2022/2573407.
Повний текст джерелаIbrahim, Nor Asmahani, Rosmimah Roslin, and Rozita Naina Mohamed. "The Role of Propinquity and Coordination in Influencing Competitive Advantage of Retail SMEs in Malaysia." International Journal of Business and Management 6, no. 1 (February 28, 2022): 7–12. http://dx.doi.org/10.26666/rmp.ijbm.2022.1.2.
Повний текст джерелаChen, Huiya. "Development Countermeasures of Business Management Informatization Based on Machine Learning Algorithm." Mobile Information Systems 2022 (August 25, 2022): 1–11. http://dx.doi.org/10.1155/2022/9108656.
Повний текст джерелаShang, Hongjiang, Weijia Li, Gengxin Li, Sheng Zhao, Lei Li, and Yongjian Li. "Analysis and Application of Enterprise Performance Evaluation of Cross-Border E-Commerce Enterprises Based on Deep Learning Model." Mobile Information Systems 2022 (September 20, 2022): 1–11. http://dx.doi.org/10.1155/2022/1058175.
Повний текст джерелаOoi, Shir May, and Christopher Richardson. "The internationalisation of service-sector SMEs in an emerging market." Review of International Business and Strategy 29, no. 1 (March 4, 2019): 44–60. http://dx.doi.org/10.1108/ribs-02-2018-0023.
Повний текст джерелаLi, Jing. "An Early Control Algorithm of Corporate Financial Risk Using Artificial Neural Networks." Mobile Information Systems 2022 (May 2, 2022): 1–12. http://dx.doi.org/10.1155/2022/4398602.
Повний текст джерелаДисертації з теми "Business enterprises Computer networks Malaysia"
Ruyter, Masood. "The measurement of enterprise architecture to add value to small and medium enterprises." Thesis, Cape Peninsula University of Technology, 2012. http://hdl.handle.net/20.500.11838/2293.
Повний текст джерелаSouth Africa has a complex financial and retail service industry with high reliance on the use of IT systems to ensure effectiveness and maintainability. Decision making and improved outcomes may be done through an IT aligned enterprise architecture (EA) strategy. EA is a capability that contributes to the support and success of an organisations' IT. Organisations are currently using EA to better align IT and the business strategy which provides a comprehensive v.ew of the IT system. Thus, EA is increasing in organisations yet the measurement and value of EA is limited to organisations and enterprise architects. The discussions of the benefits and value of EA has been discussed for several years, however there are still no consensus about how the benefits and value of EA can be measured. The lack and clear understanding of the benefits and value of EA needs to consider different aspects of IT as well as the shareholders when measuring the benefits and value of EA to an organisation.
Rosenbaum, Gustav Filip Computer Science & Engineering Faculty of Engineering UNSW. "Providing resilient quality of service connections in provider-based virtual private networks." Awarded by:University of New South Wales. School of Computer Science and Engineering, 2005. http://handle.unsw.edu.au/1959.4/25989.
Повний текст джерела郭偉本 and Wai-pun Kwok. "Business opportunities in internet." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B31267208.
Повний текст джерелаGubanich, Bradford C. "How are U.S. corporations using Intranets for their company's internal communication?" Instructions for remote access. Click here to access this electronic resource. Access available to Kutztown University faculty, staff, and students only, 1998. http://www.kutztown.edu/library/services/remote_access.asp.
Повний текст джерелаSource: Masters Abstracts International, Volume: 45-06, page: 2700. Typescript. Abstract precedes thesis as preliminary leaves [1-2]. Includes bibliographical references (leaves 75-77).
Jacoby, Grant A. "A metric model for Intranet portal business requirements." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FJacoby%5FPhD.pdf.
Повний текст джерелаSherry, Zaida. "Governance of virtual private networks using COBIT as framework." Thesis, Stellenbosch : University of Stellenbosch, 2007. http://hdl.handle.net/10019.1/3389.
Повний текст джерелаThe purpose of this assignment is to ascertain whether the COBIT framework is an adequate framework to assist in the governance of virtual private networks. The assignment focuses on whether the framework can ensure the identification of virtual private network-related risks and address IT compliance with policies and statutory regulations. A brief summary of the risks and issues pertaining to the pre-implementation, implementation and post-implementation phases of virtual private networks is included in the assignment. These risks and issues are then individually mapped onto a relevant COBIT control objective. The scope of the assignment does not include the intricacies of how these networks operate, the different types of network topologies or the different technologies used in virtual private networks. It was found that the COBIT framework can be implemented to manage and/or mitigate virtual private network risks.
Lenaburg, Allen Gregg. "Intranet concept for small business." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2710.
Повний текст джерелаPosthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.
Повний текст джерелаSmeda, Jorina. "Benefits, business considerations and risks of big data." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96684.
Повний текст джерелаENGLISH ABSTRACT: Big data is an emerging technology and its use holds great potential and benefits for organisations. The governance of this technology is something that is still a big concern and as aspect for which guidance to organisations wanting to use this technology is still lacking. In this study an extensive literature review was conducted to identify and define the business imperatives distinctive of an organisation that will benefit from the use of big data. The business imperatives were identified and defined based on the characteristics and benefits of big data. If the characteristics and benefits are clear, the relevant technology will be better understood. Furthermore, the business imperatives provide business managers with guidance to whether their organisation will benefit from the use of this technology or not. The strategic and operational risks related to the use of big data were also identified and they are discussed in this assignment, based on a literature review. The risks specific to big data are highlighted and guidance is given to business managers as to which risks should be addressed when using big data. The risks are then mapped against COBIT 5 (Control Objectives for Information and Related Technology) to highlight the processes most affected when implementing and using big data, providing business managers with guidance when governing this technology.
AFRIKAANSE OPSOMMING: ‘Big data’ is 'n ontwikkelende tegnologie en die gebruik daarvan hou baie groot potensiaal en voordele vir besighede in. Die bestuur van hierdie tegnologie is egter ʼn groot bron van kommer en leiding aan besighede wat hierdie tegnologie wil gebruik ontbreek steeds. Deur middel van 'n uitgebreide literatuuroorsig is die besigheidsimperatiewe kenmerkend van 'n besigheid wat voordeel sal trek uit die gebruik van ‘big data’ geïdentifiseer. Die besigheidsimperatiewe is geïdentifiseer en gedefinieer gebaseer op die eienskappe en voordele van ‘big data’. Indien die eienskappe en voordele behoorlik verstaan word, is 'n beter begrip van die tegnologie moontlik. Daarbenewens bied die besigheidsimperatiewe leiding aan bestuur sodat hulle in staat kan wees om te beoordeel of hulle besigheid voordeel sal trek uit die gebruik van hierdie tegnologie of nie. Die strategiese en operasionele risiko's wat verband hou met die gebruik van ‘big data’ is ook geïdentifiseer en bespreek, gebaseer op 'n literatuuroorsig. Dit beklemtoon die risiko's verbonde aan ‘big data’ en daardeur word leiding verskaf aan besigheidsbestuurders ten opsigte van watter risiko's aangespreek moet word wanneer ‘big data’ gebruik word. Die risiko's is vervolgens gekarteer teen COBIT 5 (‘Control Objectives for Information and Related Technology’) om die prosesse wat die meeste geraak word deur die gebruik van ‘big data’ te beklemtoon, ten einde leiding te gee aan besigheidsbestuurders vir die beheer en kontrole van hierdie tegnologie.
Fitzgerald, Kyle Andrew. "E-commerce application utilisation by South African SMME’s." Thesis, Cape Peninsula University of Technology, 2005. http://hdl.handle.net/20.500.11838/1772.
Повний текст джерелаThe Internet was functioning on Internet protocol (IP) and transmission control protocol (TCP) in the 1970s and soon afterwards electronic mail (email) was invented allowing messages to be sent from one person to another using packet switch services (PSS). However email did not form an information space for information to permanently exist. The World Wide Web (Web) arrived in the late 1980s, riding on top of the Internet providing a global and persistent information space available to everyone. This information space has assisted in small business facing dramatic change, often referred to as the 'e-commerce evolution'. Compared to the industrial revolution with the advent of the railways and electricity the magnitude of ecommerce is no less. Advances in the information technology (or e-comrnerce elements) and the use of Information systems (or applications) are the main drivers behind this e-commerce evolution. Some authors believe all businesses will be equal in the utilisation of e-commerce eroding any competitive advantage the one may have over the other. The 'digital economy' is now available with the explosive popularity of the Internet and the Web as seminal applications of e-commerce. In South Africa the maturity level of e-commerce adoption has increased from skepticism to positivism since the world wide availability of the Internet. Although e-commerce has generated a profusion of articles in South Africa, there has been a lack of research into the effects and benefits of e-commerce utilisation by small business. Various elements of e-commerce are explored highlighting the suitability of use towards a small business. This stUdy will explain the fundamentals that small business owners will need to understand to enable them to knowledgably participate in the global phenomenon of e-commerce. Authors nationally and internationally have explored the applications of e-commerce for example email and electronic data interchange (EDI).
Книги з теми "Business enterprises Computer networks Malaysia"
Luis, Camarinha-Matos, Afsarmanesh Hamideh, and Rabelo Ricardo J, eds. E-business and virtual enterprises: Managing business-to-business cooperation. Boston, MA: Kluwer Academic Publishers, 2000.
Знайти повний текст джерелаBayles, Deborah L. Extranets: Building the business-to-business Web. Upper Saddle River, NJ: Prentice Hall PTR, 1998.
Знайти повний текст джерелаStamper, David A. Business data communications. 2nd ed. Redwood City, Calif: Benjamin/Cummings Pub. Co., 1989.
Знайти повний текст джерелаBusiness data communications. Menlo Park, Calif: Benjamin/Cummings Pub. Co., 1986.
Знайти повний текст джерелаStamper, David A. Business data communications. 3rd ed. Redwood City, Calif: Benjamin/Cummings Pub. Co., 1991.
Знайти повний текст джерелаL, Case Thomas, ed. Business data communications. 6th ed. Upper Saddle River, N.J: Pearson Education, 2003.
Знайти повний текст джерелаBusiness data communications. 5th ed. Reading, Mass: Addison-Wesley, 1999.
Знайти повний текст джерелаBusiness data communications. 4th ed. Redwood City, Calif: Benjamin/Cummings Pub. Co., 1994.
Знайти повний текст джерелаL, Panko Julia, ed. Business data networks and security. 9th ed. Boston: Pearson, 2013.
Знайти повний текст джерелаLewis, Lundy. Managing Business and Service Networks. Cleveland: Kluwer Academic Publishers, 2002.
Знайти повний текст джерелаЧастини книг з теми "Business enterprises Computer networks Malaysia"
Rao, N. Raghavendra. "Cloud Computing: An Enabler in Developing Business Models for Global Enterprises." In Computer Communications and Networks, 159–71. London: Springer London, 2011. http://dx.doi.org/10.1007/978-1-4471-2236-4_8.
Повний текст джерелаRatten, Vanessa. "Social e-Enterprise through Technological Innovations and Mobile Social Networks." In Social E-Enterprise, 96–109. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2667-6.ch006.
Повний текст джерелаFerreira, Luís, Goran D. Putnik, Maria Manuela Cruz-Cunha, and Hélio Castro. "Towards Effective Tourism and People Alignment." In Organizational Integration of Enterprise Systems and Resources, 384–403. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-1764-3.ch022.
Повний текст джерелаMahonen, Petri. "The Standardization Process in IT - Too Slow or Too Fast?" In Information Technology Standards and Standardization, 35–47. IGI Global, 2000. http://dx.doi.org/10.4018/978-1-878289-70-4.ch003.
Повний текст джерелаТези доповідей конференцій з теми "Business enterprises Computer networks Malaysia"
Chalvatzis, Ilias, Dimitrios A. Karras, and Rallis C. Papademetriou. "Evaluation of Security Vulnerability Scanners for Small and Medium Enterprises Business Networks Resilience towards Risk Assessment." In 2019 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA). IEEE, 2019. http://dx.doi.org/10.1109/icaica.2019.8873438.
Повний текст джерела