You are previewing Interdisciplinary Perspectives on Business Convergence, Computing, and Legality.
O'Reilly logo
Interdisciplinary Perspectives on Business Convergence, Computing, and Legality

Book Description

As digital technologies develop, companies envision new ways to incorporate ever more disparate elements in their products, such as the combination of computing power and telecommunications in modern smart phones. Interdisciplinary Perspectives on Business Convergence, Computing, and Legality investigates the development of convergent and interoperable systems in business environments, with a particular focus on potential legal implications that emerge when a company begins branching out into domains traditionally occupied by suppliers and consumers. Business and law professionals—both in academia and in practice—will use this book to gain a greater understanding of the growth of convergence in the field of information technologies and how such transformations affect business practices around the world.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  6. Foreword
  7. Preface
  8. Chapter 1: Knowledge Sharing Centric Competitive Business Intelligence to Guide Convergence
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. LITERATURE REVIEW
    4. 3. RESEARCH METHODOLOGY
    5. 4. DATA COLLECTION AND RESEARCH FINDINGS
    6. CONCLUSION
  9. Chapter 2: Comparative Analysis of Selected Websites of Brokerage Houses in Poland
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. THE ASSUMPTIONS OF THE CONDUCTED RESEARCH
    4. 3. BOŚ S.A. BROKERAGE HOUSE
    5. 4. THE COMPARISON OF BROKERAGE HOUSE WEBSITES BY MEANS OF A SCORING METHOD
    6. 5. COMPARISON OF BROKERAGE HOUSE WEBSITES BY MEANS OF A SCORING SCALE WITH PREFERENCES
    7. SUMMARY
  10. Chapter 3: Factors Influencing Tourists’ Motivational Determinants for Promotion of Tourism Destination
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE SURVEY
    4. OBJECTIVE OF THE STUDY
    5. METHODOLOGY
    6. STUDY AREA
    7. TOURISM MOTIVATIONAL FACTORS
    8. DISCUSSION AND ANALYSIS
    9. FINDINGS OF THE STUDY
    10. POLICY IMPLICATION
    11. CONCLUSION
  11. Chapter 4: Analysis of Facts for Companies Going Public through Social Media
    1. ABSTRACT
    2. INTRODUCTION
    3. SOCIAL MEDIA MARKETING FAILURES
    4. SOCIAL MEDIA MARKETING SUCCESS
    5. ANALYSIS
    6. CONCLUSION AND RECOMMENDATION
  12. Chapter 5: Emerging Legal Trends on Hyperlinks and Meta-Tags
    1. ABSTRACT
    2. INTRODUCTION
    3. UNDERSTANDING WEB SITE DESIGNING
    4. LEGAL LIABILITY ARISING FROM WEBSITE DESIGNING
    5. WEB LINKING AS A LIMITED PRIVILEGE
    6. CONCLUSION
  13. Chapter 6: Compliance and Regulatory Standards for Cloud Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. NEED FOR THE STANDARDS
    4. AVAILABLE STANDARDS IN CLOUD COMPUTING
    5. SERVICE LEVEL AGREEMENT (SLA)
    6. CONCLUSION
  14. Chapter 7: Business to Rural
    1. ABSTRACT
    2. HISTORY
    3. GROWTH STORY
    4. INDUSTRY SIZE/INDIAN BPO INDUSTRY
    5. REASONS FOR OUTSOURCING
    6. BEST PRACTICES AS PER GUIDELINES BY NASSCOM
    7. MISSION AND VISION OF B2R
    8. VALUE PROPOSITION TO THE SOCIETY AND THE INDUSTRY
    9. DELIVERY MODEL
    10. TECHNOLOGY INFRASTRUCTURE
    11. SOCIAL IMPACT
    12. RECOMMENDATIONS
    13. FURTHER RESEARCH DIRECTIONS
    14. APPENDIX
  15. Chapter 8: Analysis of the Outsourcing Models and Recommendation
    1. ABSTRACT
    2. ABOUT OUTWORKS SOLUTIONS
    3. STUDY OF PROCESSES/SERVICES
    4. LATEST TRENDS IN OUTSOURCING
    5. LATEST TRENDS IN VENDOR MANAGEMENT
    6. EMERGING TRENDS IN BUSINESS SERVICES SOURCING
    7. LEVERAGING OFFSHORE FOR GREATER VALUE
    8. RE-ENGINEERING TRIGGERED BY OFFSHORE
    9. FTS STRUCTURE
    10. PROS AND CONS/BREAKS IN STRUCTURE
    11. CASE ANALYSIS
    12. BEST PRACTICES BEING FOLLOWED/LACK OF SAME
    13. RECOMMENDATIONS AND FURTHER RESEARCH AREAS
    14. CONCLUSION AND LIMITATIONS
    15. APPENDIX
  16. Chapter 9: Aspects of Client Vendor Relationship and the Risks Therein
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. CONCEPT OF SERVICE
    4. 3. INFORMATION TECHNOLOGY OUTSOURCING
    5. 4. CLIENT
    6. 5. VENDOR
    7. 6. INFORMATION TECHNOLOGY OUTSOURCING MODELS
    8. 7. OUTSOURCING MODEL AND RISK FACTOR
    9. 8. RISKS FOR CLIENTS
    10. 9. RISKS FOR VENDORS
    11. 10. DIMENSIONS OF INFORMATION TECHNOLOGY OUTSOURCING MODELS
    12. 11. CLIENT VENDOR RELATIONSHIP
    13. 12. MAJOR FACTORS AFFECTING CLIENT VENDOR RELATIONSHIP
    14. FURTHER RESEARCH AND CONCLUSION
  17. Chapter 10: Impact of Managerial Atmosphere on Turnover Intent in the Private Education Institutions of West Bengal
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. FRAMEWORK OF STUDY
    5. METHODOLOGY
    6. RESULTS AND FINDINGS
    7. CONCLUSION
    8. RECOMMENDATION
  18. Chapter 11: Factors Influencing the Effectiveness of C2C Websites in Delhi-NCR
    1. ABSTRACT
    2. INTRODUCTION
    3. FACTORS OF EFFECTIVENESS OF C2C WEBSITE
    4. RESEARCH OBJECTIVE
    5. RESEARCH METHODS
    6. RESULT ANALYSIS
    7. COMPARISON OF MEANS: ANOVA
    8. INCOME WISE MEANS AND ANOVA OF CONSTRUCTS OF EFFECTIVENESS OF C2C WEBSITE
    9. OCCUPATION-WISE MEAN SCORE AND ANOVA OF EFFECTIVENESS OF C2C WEBSITE
    10. SIX CORRELATIONS AMONG CONSTRUCTS IN THE STUDY
    11. DISCUSSION
    12. CONCLUSION
  19. Chapter 12: Secure Multiparty Computing Protocol
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. LITERATURE SURVEY
    4. 3. OBSERVATIONS FROM LITERATURE
    5. 4. OBJECTIVES
    6. 5. PROPOSED WORK
    7. RESULTS AND CONCLUSION
  20. Chapter 13: Making a Case for Information Integrity in Healthcare
    1. ABSTRACT
    2. 1. A REAL LIFE EXAMPLE: ANESTHETIC ERROR RESULTING IN LOSS OF HEALTHCARE GOAL INTEGRITY
    3. 2. LOSS OF INFORMATION INTEGRITY
    4. 3. INFORMATION ORIGINATION ERRORS AND LOSS OF INFORMATION INTEGRITY
    5. 4. A CASE FOR A PARADIGM SHIFT: INFORMATIONAL VIEW OF HEALTHCARE SYSTEM
    6. 5. EMERGING INSIGHT: CONTROLLING ORIGINATION AND PROCESSING OF CORRECT INFORMATION (CONTROLLING I*I FOR EFFECTIVE HEALTHCARE MANAGEMENT)
    7. 6. SYSTEMS APPROACH TO I*I TECHNOLOGY IMPLEMENTATION IN HEALTHCARE INDUSTRY
    8. CONCLUSION: THE NEED FOR I*I PROCESSING INITIATIVES
  21. Chapter 14: Modeling Complex Errors for Information Integrity Analysis
    1. ABSTRACT
    2. 1. SYSTEM ERRORS
    3. 2. TWO APPROACHES TO ERROR REDUCTION
    4. 3. FROM “TIGHTLY” COUPLED ENGINEERING SYSTEM TO A “LOOSELY” COUPLED INFORMATIONAL NETWORK
    5. 4. OPEN SYSTEMS
    6. 5. REQUIREMENTS DEVIATIONS IMPACTING SYSTEM PERFORMANCE
    7. 6. UNDERSTANDING A COMPLEX ERROR
    8. CONCLUSION AND FURTHER RESEARCH DIRECTION
  22. Chapter 15: Dispute Settlement for Cyber Crimes in India
    1. ABSTRACT
    2. INTRODUCTION
    3. TYPES OF THE CYBER CRIME: CYBER STALKING, HACKING, CYBER SQUATTING, PHISHING
    4. ISSUES
    5. THE INDIAN LAWS ON CYBER CRIMES: A CRITIQUE
  23. Chapter 16: Comparative Analysis of Major Issues Involved in IPR and Competition Policy
    1. ABSTRACT
    2. COMPETITION AND PATENT
    3. COMPETITION AND PHARMACEUTICALS INDUSTRY
    4. CASE STUDY
    5. COMPETITION AND COPYRIGHT
    6. COLLECTIVE MANAGEMENT OF COPYRIGHT
    7. TECHNICAL PROTECTION MEASURES
    8. COMPETITION AND TRADEMARK
    9. COMPETITION AND TRADEMARK
    10. SUMMARIZATION
  24. Chapter 17: Effects of Phishing on E-Commerce with Special Reference to India
    1. ABSTRACT
    2. INTRODUCTION
    3. DEFINITION
    4. CONCLUSION
  25. Chapter 18: An Indian Legal Perspective to Protection of Domain Name
    1. ABSTRACT
    2. INTRODUCTION
    3. GEOGRAPHICAL TOP LEVEL DOMAIN NAMES
    4. RECOMMENDATIONS
    5. CONCLUSION
  26. Chapter 19: Data Protection
    1. ABSTRACT
    2. INTRODUCTION
    3. HISTORICAL DEVELOPMENT OF LAWS ON DATA PROTECTION
    4. ORGANIZATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT (OECD) GUIDELINES
    5. EUROPEAN UNION
    6. UNITED STATES
    7. THE INDIAN SCENARIO
    8. CONCLUSION
  27. Chapter 20: Right to Internet
    1. ABSTRACT
    2. INTRODUCTION
    3. RIGHT TO INTERNET AS A HUMAN RIGHT
    4. ACCESS TO INTERNET CONTENT
    5. CONCLUSION
  28. Compilation of References
  29. About the Contributors