COIS 1620 Lecture 6: WEEK 6 LEC NOTES (CHAP 4)

42 views2 pages

Document Summary

The power of watson is used to detect cyber threats: electronic business (e-commerce and e-government) E-commerce the exchange of goods , services and money among firms (b2b) between firms and their customs (b2c, c2b), and between customers (c2c) supported by communication technologies in particular, the internet. Any electronic transaction or information interaction conducted using a wireless mobile device and mobile networks that leads to the transfer of real or perceived value in exchange for information , services or goods. Organizations leveraging social networks to build lasting relationships with their customers and partners, to advertise products and services or otherwise to create value. Use of information systems to provide citizens (g2c), organizations(g2b), and pther governmental agencies with information about public services and to allow for interaction with the government: b2c e- commerce. A global platform where firms across the world can effectively compete for customers. Higher inventory turnover + lower overhead = lower prices. Trust: (cid:862)curre(cid:374)cy of the i(cid:374)for(cid:373)atio(cid:374) age(cid:863, airbnb.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents