top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Bits, Bytes, and Balance Sheets [[electronic resource] ] : The New Economic Rules of Engagement in a Wireless World
Bits, Bytes, and Balance Sheets [[electronic resource] ] : The New Economic Rules of Engagement in a Wireless World
Autore Wriston Walter B
Pubbl/distr/stampa Chicago, : Hoover Institution Press, 2007
Descrizione fisica 1 online resource (179 p.)
Disciplina 303.48/33
Collana Hoover Institution Press publication Bits, bytes, and balance sheets
Soggetto topico Internet - Economic aspects
Information technology
Electronic commerce
Soggetto genere / forma Electronic books.
ISBN 0-8179-4863-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Book Title; Copyright; Contents; Foreword; A Note to Readers; Preface; Chapter 1 - Unintended Consequences; Chapter 2 - The Creation of Wealth; Chapter 3 - Bits, Bytes, Power, and Diplomacy; Chapter 4 - New Rules: Different in Kind, Not Degree; Chapter 5 - The Whiskey Ain't Working Anymore; Chapter 6 - What Gets Measured, Gets Done; Chapter 7 - The Great Disconnect: Balance Sheets Versus Market Value; Chapter 8 - Politically Correct Versus Accurate Earnings; Chapter 9 - Global Accounting for a GlobalMarket; Chapter 10 - Other People's Money; Afterword; Selected Bibliography
About the AuthorIndex
Record Nr. UNINA-9910462139903321
Wriston Walter B  
Chicago, : Hoover Institution Press, 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bits, Bytes, and Balance Sheets [[electronic resource] ] : The New Economic Rules of Engagement in a Wireless World
Bits, Bytes, and Balance Sheets [[electronic resource] ] : The New Economic Rules of Engagement in a Wireless World
Autore Wriston Walter B
Pubbl/distr/stampa Chicago, : Hoover Institution Press, 2007
Descrizione fisica 1 online resource (179 p.)
Disciplina 303.48/33
Collana Hoover Institution Press publication Bits, bytes, and balance sheets
Soggetto topico Internet - Economic aspects
Information technology
Electronic commerce
ISBN 0-8179-4863-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Book Title; Copyright; Contents; Foreword; A Note to Readers; Preface; Chapter 1 - Unintended Consequences; Chapter 2 - The Creation of Wealth; Chapter 3 - Bits, Bytes, Power, and Diplomacy; Chapter 4 - New Rules: Different in Kind, Not Degree; Chapter 5 - The Whiskey Ain't Working Anymore; Chapter 6 - What Gets Measured, Gets Done; Chapter 7 - The Great Disconnect: Balance Sheets Versus Market Value; Chapter 8 - Politically Correct Versus Accurate Earnings; Chapter 9 - Global Accounting for a GlobalMarket; Chapter 10 - Other People's Money; Afterword; Selected Bibliography
About the AuthorIndex
Record Nr. UNINA-9910786350603321
Wriston Walter B  
Chicago, : Hoover Institution Press, 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bits, bytes, and balance sheets : the new economic rules of engagement in a wireless world / / by Walter B. Wriston
Bits, bytes, and balance sheets : the new economic rules of engagement in a wireless world / / by Walter B. Wriston
Autore Wriston Walter B
Edizione [1st ed.]
Pubbl/distr/stampa Stanford, Calif., : Hoover Institution Press, Stanford University, c2007
Descrizione fisica 1 online resource (179 p.)
Disciplina 303.48/33
Collana Hoover Institution Press publication
Soggetto topico Internet - Economic aspects
Information technology
Electronic commerce
ISBN 0-8179-4863-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Book Title; Copyright; Contents; Foreword; A Note to Readers; Preface; Chapter 1 - Unintended Consequences; Chapter 2 - The Creation of Wealth; Chapter 3 - Bits, Bytes, Power, and Diplomacy; Chapter 4 - New Rules: Different in Kind, Not Degree; Chapter 5 - The Whiskey Ain't Working Anymore; Chapter 6 - What Gets Measured, Gets Done; Chapter 7 - The Great Disconnect: Balance Sheets Versus Market Value; Chapter 8 - Politically Correct Versus Accurate Earnings; Chapter 9 - Global Accounting for a GlobalMarket; Chapter 10 - Other People's Money; Afterword; Selected Bibliography
About the AuthorIndex
Record Nr. UNINA-9910826140303321
Wriston Walter B  
Stanford, Calif., : Hoover Institution Press, Stanford University, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Capitale digitale : la forza dei bussiness web / Don Tapscott, David Ticoll, Alex Lowy
Capitale digitale : la forza dei bussiness web / Don Tapscott, David Ticoll, Alex Lowy
Autore Tapscott, Don
Pubbl/distr/stampa Milano : Tecniche Nuove, stampa 2001
Descrizione fisica xxvi, 305 p. : ill. ; 24 cm
Disciplina 658.84
Altri autori (Persone) Lowy, Alexauthor
Ticoll, Davidauthor
Collana I libri di E-business news
Soggetto topico Electronic commerce - Economic aspects
Internet - Economic aspects
World Wide Web - Economic aspects
ISBN 8848112005
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNISALENTO-991001903879707536
Tapscott, Don  
Milano : Tecniche Nuove, stampa 2001
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
A Comprehensive Guide for Web3 Security : From Technology, Economic and Legal Aspects / / Ken Huang [and four others], editors
A Comprehensive Guide for Web3 Security : From Technology, Economic and Legal Aspects / / Ken Huang [and four others], editors
Edizione [First edition.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Descrizione fisica 1 online resource (287 pages)
Disciplina 384.3
Collana Future of Business and Finance Series
Soggetto topico Internet - Economic aspects
Internet - Law and legislation
Internet - Security measures
ISBN 3-031-39288-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword 1 -- Foreword 2 -- Foreword 3 -- Foreword 4 -- Preface -- Short Recommendations -- Recommendations 1 -- Recommendations 2 -- Recommendations 3 -- Recommendations 4 -- Recommendations 5 -- Recommendations 6 -- Recommendations 7 -- Recommendation 8 -- Acknowledgment -- Contents -- About the Editors and Contributors -- About the Editors -- About the Contributors -- Part I: Foundational Components of Web3 Security -- Chapter 1: The C.I.A Properties of Web3 System -- 1.1 The Confidentiality Property of Blockchain -- 1.1.1 Cryptographic Primitives in Blockchain -- 1.1.1.1 What Are the ECDSA (GeeksforGeeks, 2022) and Schnorr Signature Algorithm (Boneh, 2020) -- 1.1.1.2 What Is a Hash Algorithm and What Is SHA256 (Mycryptopedia, 2022), How SHA256 Is Used in Bitcoin -- 1.1.1.3 What Is Base58 (BitcoinWiki, 2022) and How It Is Used in Bitcoin? -- 1.1.1.4 How Bitcoin Address Is Generated -- 1.1.2 Bitcoin's Lack of Confidential Property -- 1.1.3 Privacy-Preserving Computation for Web3 -- 1.2 The Integrity Property of Blockchain -- 1.2.1 The Integrity of the Base Layer of Blockchain -- 1.2.2 The Integrity of Layer2 Blockchain -- 1.2.2.1 Bitcoin Layer 2 Lightning Network Attack -- 1.2.2.2 Attacks on Ethereum Layer 2 Rollups -- 1.2.2.3 Attacks on Layer 2 Bridges -- 1.2.2.4 Wormhole Attack -- 1.2.3 Integrity of Smart Contract -- 1.3 The Availability Property of Blockchain -- 1.3.1 Availability via Data Replication -- 1.3.2 Availability via Scalability -- 1.3.2.1 Sidechain VS Layer-2 -- Sidechain -- Layer-2 -- 1.3.2.2 Data Availability and Layer 2 Solutions -- 1.3.2.3 Bitcoin Lightning Network for Better Availability -- References -- Chapter 2: Chain Security: Nodes, Algorithm, and Network -- 2.1 What Is Consensus Node? -- 2.2 Consensus Node Configuration Security -- 2.2.1 Bitcoin Node Security Configuration Recommendations.
2.2.2 Ethereum POS Validator Node Security Recommendations -- 2.2.3 Attacks on Consensus Node -- 2.3 Node Centralization and Security Concerns -- 2.4 Bitcoin Security After Mining Rewards Depletion -- 2.5 Attacks on Consensus Algorithm and Countermeasures -- 2.5.1 Attacks on Proof-of-Work (PoW) and Countermeasures -- 2.5.2 Attacks on Proof-of-Stake (PoS) and Countermeasures -- 2.5.3 Attacks on Delegated Proof-of-Stake (DPoS) and Countermeasures -- 2.5.4 Attacks on Proof of Activity (PoA) and Countermeasures -- 2.5.5 Attacks on Proof of Elapsed Time (PoET) and Countermeasures -- 2.5.6 Attacks on Byzantine Fault Tolerance (BFT) and Countermeasures -- 2.6 Attacks on Blockchain Network Layer and Countermeasures -- 2.6.1 Time Jacking Attack and Countermeasures -- 2.6.2 Tampering with Message Body and Countermeasures -- 2.6.3 MEV Attack and Countermeasures -- 2.6.4 Routing Attacks and Countermeasures -- 2.6.5 Fake Bootstrapping Attack and Countermeasures -- 2.6.6 Eclipse Network Attack and Countermeasures -- 2.6.7 Attack on Libp2p and Countermeasures -- References -- Chapter 3: Wallet Security -- 3.1 Introduction -- 3.1.1 Overview of Different Types of Blockchain Wallets -- 3.1.2 Explanation of the Different Kinds of Wallets -- 3.1.3 Comparison of Blockchain Wallets to Traditional Banking and Financial Systems -- 3.1.4 Difference between Custodial and Non-custodial Wallets -- 3.2 How Blockchain Wallets Work -- 3.2.1 Technical Explanation of How Blockchain Wallet Works -- 3.2.2 Overview of the Use of Public and Private Key -- 3.2.3 Overview of the Role of the Wallet in Public and Private Key -- 3.2.4 Smart Contract Wallets -- 3.2.5 Account Abstraction -- 3.2.6 Multisignature Wallets -- 3.2.7 Social Recovery -- 3.2.8 MPC Wallet -- 3.2.9 Most Common Attack Vectors -- 3.2.10 Wallet Security Features -- 3.3 Past Blockchain Wallet Hacks.
3.3.1 Overview of Past Relevant Wallet Hacks -- 3.3.1.1 "NFT God" Hacked, January 2023 -- 3.3.1.2 BitKeep, December 26 2022, 8M Lost -- 3.3.1.3 Deribit, November 2022, 28M Lost -- 3.3.1.4 Solana Wallet Hacks, August 2022, 5M Lost -- 3.3.1.5 Profanity Wallets Hack, 3.3M Lost -- 3.3.1.6 Binance Hot Wallet Hack, May 2019, 40M Lost -- 3.3.1.7 MetaMask iCloud Hack, July 2021 -- 3.3.1.8 Parity Multisig Hack, November 2017, 30M Lost -- 3.3.2 The Impact of Cyberattacks on Blockchain Wallets -- 3.4 The Importance of Auditing a Wallet -- 3.4.1 Explanation of the Importance of Auditing a Wallet -- 3.4.2 Overview of Different Types of Audit that Can Be Performed -- 3.4.3 Different Tools to Audit Wallets -- References -- Chapter 4: Smart Contract Security -- 4.1 Introduction -- 4.1.1 Definition of Smart Contracts in the Context of Web3 Applications -- 4.2 Smart Contract Security Checklist -- 4.2.1 Gas Optimization -- 4.2.2 Compiler Version -- 4.2.3 Access Control -- 4.2.4 Check Effect Interaction -- 4.2.5 SELFDESTRUCT Instruction -- 4.2.6 Denial of Service -- 4.2.7 Deprecated Functions -- 4.2.8 Race Conditions -- 4.2.9 Signature Unique ID -- 4.2.10 Weak Source of Randomness -- 4.2.11 Assets Integrity and User Balance Manipulation -- 4.2.12 Secure Oracle Usage -- 4.2.13 Flash Loans -- 4.2.14 Style Guide and Readability -- 4.2.15 Requirements Compliance -- 4.2.16 Importance of Following the Checklist to Ensure Smart Contract Security -- 4.3 Top Security Vulnerabilities in Smart Contracts -- 4.3.1 Flash Loans -- 4.3.2 Front Running -- 4.3.3 DoS -- 4.3.4 Invalid Calculations -- 4.3.5 Token Supply Manipulation -- 4.3.6 Deprecated Functions -- 4.3.7 Reentrancy Attack -- 4.3.8 Access Control Violation -- 4.3.9 Replay Attacks -- 4.3.10 Weak Source of Randomness -- 4.3.11 Incorrect Oracle Usage -- 4.4 Importance of Smart Contract Audits in Web3 Applications.
4.5 Final Thoughts -- References -- Chapter 5: Token Economics Model Creation and Security -- 5.1 Tokens vs Economy -- 5.2 Economy Design of Tokens Is Not New -- 5.3 Why Is this Important -- 5.3.1 Risks -- 5.4 What Is Token Economics -- 5.5 Web3 Security and Token Economics -- 5.5.1 Ponzinomics -- 5.6 How Web3 Compares with Existing Economic Structures? -- 5.7 What Does Token Economics Entail -- 5.7.1 Economics Design Framework -- 5.7.2 Value Creation -- 5.7.3 Value Creation Cycle -- 5.8 Token Economics Stress Test vs Economics Risk Monitoring -- 5.9 Cyber Security Risks Come In -- 5.10 Summary and Ongoing Work on Tokenomics -- References -- Chapter 6: Economic Exploits and Risk Mitigation Strategies -- 6.1 Case Study 1: Economic Exploit Through Financial Engineering -- 6.1.1 Case Study -- 6.1.2 The Exploit -- 6.1.3 Solution: Risk Adjustment -- 6.2 Case Study 2: Incentive Mechanism Design Risk -- 6.2.1 Case Study -- 6.2.2 The Exploit -- 6.2.3 Solution: Economy Parameter Adjustment -- 6.3 Case Study 3: Bancor's Insurance Mechanism and Celsius' Exploitation -- 6.3.1 Case Study -- 6.3.2 The Exploit -- 6.3.3 Solution: Bancor's Response to the Exploit -- 6.4 Opportunities and Threats with AI -- 6.4.1 Opportunities -- 6.4.2 Threats -- 6.5 10 Economic Risk Metrics Considerations -- 6.6 Why Should We Care -- References -- Part II: Security Concerns for Enterprise Web3 Application Development -- Chapter 7: DevSecOps for Web3 -- 7.1 What Is DevSecOps? -- 7.2 How to Integrate DevSecOps into Web3 -- 7.2.1 DevSecOps during Requirement and Design Phase -- 7.2.1.1 Web3 Product Description and Requirement Document -- 7.2.1.2 Web3 Architecture Document -- Authentication -- Authorization -- Auditing, Logging, Monitoring, and Alerting -- Web3 API Security -- 7.2.1.3 Security Requirement Gathering -- 7.2.1.4 Technical Threat Modeling.
7.2.1.5 Data or Capital Flow Diagram -- 7.2.1.6 Token Economic Model -- 7.2.1.7 Financial Security Model -- 7.2.2 Implementation Phase -- 7.2.2.1 CI/CD Pipeline Security Tools Integration -- 7.2.2.2 IDE Tool Extension -- 7.2.2.3 Security Code Review -- 7.2.3 Testing and External Validation Phase (Testnet Phase) -- 7.2.3.1 Formal Verification -- 7.2.3.2 Third-Party Security Auditing (Not Just Solidity Code, Must Include all Code) -- 7.2.4 Bug Bounty -- 7.2.5 Production (Mainnet) Phase -- 7.2.5.1 Continuous Bug Bounty -- 7.2.5.2 Monitoring/Alerting -- 7.3 Sample Security Tools for Web3 DevSecOps -- 7.3.1 Sample Security Tools Used in during the Requirement and Design Phase -- 7.3.2 Sample Security Tools Used in Implementation and Testing Phase -- 7.3.3 Sample Security Tools Used during Mainnet or Production Phase -- References -- Chapter 8: Web3 Security Analytics -- 8.1 Introduction -- 8.1.1 What Is on-Chain Analytics -- 8.1.2 Preventive Vs Reactive Web3 on-Chain Analytics and Monitoring -- 8.1.2.1 Preventive on-Chain Analysis -- 8.1.2.2 Reactive on-Chain Analysis -- 8.2 Preventive on-Chain Analysis -- 8.2.1 Past and Present of Preventive on-Chain Analysis -- 8.2.1.1 The Past and Present of Preventive on-Chain Analysis: Evolution and Challenges -- 8.2.1.2 The Past: The Evolution of Web2 Monitoring -- 8.2.1.3 The Present: An Overview of Web3 Monitoring -- 8.2.1.4 The Present: Protecting End Users in Web3 -- 8.2.1.5 Challenges in Web3 on-Chain Monitoring -- 8.2.2 Technology Stack Used for Preventive on-Chain Analysis -- 8.2.3 Future of Preventive on-Chain Analysis -- 8.3 Reactive on-Chain Analysis -- 8.3.1 The Problem that Reactive on-Chain Analysis Solves -- 8.3.1.1 Incident Response and Forensic Analysis -- 8.3.1.2 Post-Mortem Analysis and Lessons Learned -- 8.3.1.3 Enhancing Preventive Measures and Proactive Security.
8.3.1.4 Regulatory Compliance and Legal Support.
Record Nr. UNINA-9910799234303321
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital business and electronic commerce : strategy, business models and technology / / Bernd W. Wirtz
Digital business and electronic commerce : strategy, business models and technology / / Bernd W. Wirtz
Autore Wirtz Bernd W.
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (762 pages)
Disciplina 658.84
Collana Springer Texts in Business and Economics
Soggetto topico Electronic commerce - Economic aspects
Internet - Economic aspects
Information technology - Economic aspects
ISBN 3-030-63482-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Author -- Part I: Introduction -- 1: Foundations of Digital Business -- 1.1 Basics of Digital Business -- Development of Information and Communication Applications Until 1956 -- Development of Information and Communication Applications Until 1994 -- Recent Developments of Information and Communication Applications -- Definition and Classification of Digital Business -- Definition of Digital Business (Wirtz 2000c, 2020b) -- 1.2 Actors, Interaction Patterns, and Service Exchange -- Different Interaction Patterns in Digital Business -- Stages of Digital Business Development -- Digital Market -- Activities of Digital Business -- Definition of E-Commerce (Wirtz 2000c, 2020b) -- Definition of Digital Collaboration (Wirtz 2000c, 2020b) -- Definition of Digital Communication (Wirtz 2000c, 2020b) -- Definition of Digital Education (Wirtz 2000c, 2020b) -- Definition of Digital Information/Entertainment (Wirtz 2000c, 2020b) -- 1.3 Development of Digital User Structure -- Digital User Characteristics -- Online Activities -- Digital User Typology -- 1.4 Success Factors of Digital Business -- Digital Innovation Capability -- Strategic and Organizational Flexibility -- Capability for Networking and Integrating -- Ease of Use -- 1.5 Summary -- 2: Mobile Business -- 2.1 Basics of Mobile Business -- Relevance of Mobile Business -- Infrastructure of Mobile Business -- Mobile Business Market and Its Market Leaders -- Definition and Classification of Mobile Business -- Definition of M-Business (Wirtz 2010b, 2020b) -- 2.2 Applications and User Structure of Mobile Business -- Mobile Applications and Mobile Software -- Mobile Applications -- Mobile Software -- Mobile Browsing and Mobile Search -- Mobile Browsing -- Mobile Search -- Mobile Information, Mobile Entertainment, and Mobile Navigation -- Mobile Information.
Mobile Entertainment -- Mobile Navigation -- Mobile Commerce, Mobile Communication, and Mobile Payment -- Mobile Commerce -- Mobile Communication -- Mobile Payment -- Mobile Advertising and Mobile Telemetry -- Mobile Advertising -- Mobile Telemetry -- User Groups in Mobile Business -- 2.3 Success Factors of Mobile Business -- Customization and Mobile Networking -- Absence of Media Disruption and Seamless Connection -- Software Platform and Integration Degree -- Bandwidth -- 2.4 Summary -- 3: Social Media Business -- 3.1 Basics of Social Media Business -- Web 2.0 vs. Social Media -- Definition of Social Media and Social Media Business -- Definition of Social Media (Wirtz and Ullrich 2008 -- Wirtz 2016b, 2020b) -- Definition of Social Media Business (Wirtz 2013a, 2018b) -- Social Media Four-Factor Model -- 3.2 Applications and User Groups in Social Media Business -- Social Media Applications -- Social Media Microtargeting and Social Media Multiplier Effects -- Social Media Convergence and Integration -- User Groups in Social Media Business -- 3.3 Digital Disinformation on Social Media -- News Consumption on Social Media -- Integrated Model of Digital Disinformation -- Governance of Digital Disinformation -- 3.4 Success Factors in Social Media Business -- Appropriate Handling of Data Protection -- Four-Factor Model and Social Media Success -- Business Potential of Various Social Media Tools -- 3.5 Summary -- 4: Digital Government -- 4.1 Basics of Digital Government -- Definition of Digital Government -- Definition of Digital Government (Wirtz and Piehler 2010) -- Actors of Digital Government -- Advantages of Digital Government -- Development of Digital Government -- Country Ranking -- 4.2 Open Government and E-Participation -- Definition of Open Government -- Definition of Open Government (Wirtz et al. 2017a) -- Open Government Framework.
E-Participation and Digital Government -- Definition of E-Participation -- Definition of E-Participation (Wirtz et al. 2016a) -- 4.3 Services and User Structure of Digital Government -- Digital Government Services and User Structure -- Service Channels -- 4.4 Success Factors of Digital Government -- User-Centered Success Factors -- E-Service Success Factors -- IT Success Factors -- 4.5 Summary -- Part II: Technology, Digital Markets and Digital Business Models -- 5: Digital Business Technology and Regulation -- 5.1 Basics of Digital Business Technology -- Client-Server Interaction -- Web Services -- World Wide Web Technologies -- Digital Business Architectures -- 5.2 Technology at the Human-Machine Interface -- Historical Development of the Human-Machine Interface Until 2000 -- Recent Developments of the Human-Machine Interface -- Human-Machine Interaction and Configuration -- Success Factors of Human-Machine Interaction -- 5.3 Security in Digital Business -- Cybersecurity -- Typical Threats in Computer Networks -- Cryptography -- Blockchain -- 5.4 Digital Payment Systems and Applications -- Digital Payment Systems -- Digital Payment Process -- Digital Payment Success Factors -- 5.5 Regulation of Digital Business -- Formally Binding Content-Related Level of Internet Regulation -- Regulatory Aspects of Competition Law -- Regulatory Aspects of Societal Law -- Regulatory Aspects of Criminal and Civil Law -- Organizational, Decision-Making, and Competence-Related Regulation Level -- 5.6 Summary -- 6: Internet of Things -- 6.1 Basics of Internet of Things -- Definition of IoT -- Definition of Internet of Things (Wirtz 2018b) -- IoT IT Infrastructure -- 6.2 Applications of the Internet of Things -- Factories -- Cities and Human -- Retail Environments and Worksites -- Outside and Vehicles -- Home and Offices.
6.3 Internet of Robotic Things: IoT, Robotics, and Industrial Automation -- Opportunities and Challenges of Industry 4.0 for Business -- Stages of Industrial Automation -- 6.4 IoT User Behavior -- Industry -- Consumers -- 6.5 Success Factors of IoT -- IoT Key Competencies -- 6.6 Summary -- 7: Artificial Intelligence, Big Data, and Cloud Computing -- 7.1 Artificial Intelligence Services and Applications -- Definition of Artificial Intelligence -- Definition of Artificial Intelligence (Wirtz et al. 2019) -- Artificial Intelligence Framework -- AI Applications and Use Cases -- Industry-Specific Effects of AI -- Opportunities and Risks -- Artificial Intelligence Governance -- Strategic Four AI Governance Model -- 7.2 Big Data -- Relevance and Growth of Big Data -- Applications and Uses of Big Data Analyses -- Big Data Architecture -- 7.3 Cloud Computing -- Location Independency, Scalability, and Elasticity -- Security and Vendor Lock-In -- Three Types of Cloud Service Models -- 7.4 Summary -- 8: Digital Platforms, Sharing Economy, and Crowd Strategies -- 8.1 Basics of Platform Economics -- Platform Components -- Advantages of Platforms -- Platform Functionality and Strategies -- 8.2 Sharing Economy -- Shareconomy and Sharing Strategies -- SSU Sharing Platform Model -- Applications of the Shareconomy -- 8.3 Crowd Strategies -- Crowdfunding -- Crowd Investing -- Social Trading -- 8.4 Summary -- 9: Digital Ecosystem, Disintermediation, and Disruption -- 9.1 Digital Ecosystem -- Definition of Digital Ecosystem -- Definition of Digital Ecosystem -- Digital Ecosystem Structure: Organizational Models -- Procurement and Procurement Interactions -- Knowledge Creation -- Value Creation -- Value Capture -- Products and Services -- Provision Interactions and Customers -- Digital Ecosystem Technical Infrastructure: Operational Models -- 9.2 Digital Disintermediation.
The Role of Trade in the Value Chain -- The Internet and Its Potential for Disintermediation -- Opportunities and Risks of Disintermediation -- Disintermediation Case Study: HelloFresh -- 9.3 Digital Disruption -- The Structure of the Five-Level Model of Digital Disruption -- The Role of the Disruptor -- Entrepreneurial Strategies for Digital Disruption -- Digital Disruption Case Study: Netflix -- 9.4 Summary -- 10: Digital B2C Business Models -- 10.1 Basics of Digital Business Models -- Definition of Business Model (Wirtz 2011a, 2020b) -- Partial Models of the Integrated Digital Business Model -- Classification of B2C Digital Business Models -- 10.2 Content -- The Content Value Chain -- Content Core Assets and Core Competencies -- E-Information -- E-Entertainment -- E-Infotainment -- E-Education -- 10.3 Commerce -- The Commerce Value Chain -- Commerce Core Assets and Core Competencies -- E-Attraction -- E-Bargaining/E-Negotiation -- E-Transaction -- E-Tailing -- 10.4 Context -- The Context Value Chain -- Context Core Assets and Core Competencies -- E-Search -- E-Catalogs -- 10.5 Connection -- The Connection Value Chain -- Connection Core Assets and Core Competencies -- Intra-Connection -- Inter-Connection -- 10.6 Hybrid Business Models -- Drivers for Developing Hybrid Business Models -- 10.7 Summary -- 11: Digital B2B Business Models -- 11.1 Digital B2B Sourcing Business Model -- Subcategories of the Service Offering -- Development of an Aggregated Value Chain -- Core Assets and Core Competencies -- 11.2 Digital B2B Sales Business Model -- Subcategories of the Service Offering -- Development of an Aggregated Value Chain -- Core Assets and Core Competencies -- 11.3 Digital B2B Supportive Collaboration Business Model -- Subcategories of the Service Offering -- Development of an Aggregated Value Chain -- Core Assets and Core Competencies.
11.4 Digital B2B Service Broker Business Model.
Record Nr. UNINA-9910483538803321
Wirtz Bernd W.  
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital economy report / / United Nations Conference on Trade and Development, UNCTAD
Digital economy report / / United Nations Conference on Trade and Development, UNCTAD
Pubbl/distr/stampa New York, New York : , : United Nations Publications, , 2019-
Descrizione fisica 1 online resource
Soggetto topico Electronic commerce - Developing countries
Internet - Economic aspects - Developing countries
Internet - Economic aspects
Economic policy
Electronic commerce
Soggetto genere / forma Serial publications.
Periodicals.
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Record Nr. UNISA-996419049503316
New York, New York : , : United Nations Publications, , 2019-
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Economic analysis of the digital economy / / edited by Avi Goldfarb, Shane M. Greenstein, and Catherine E. Tucker
Economic analysis of the digital economy / / edited by Avi Goldfarb, Shane M. Greenstein, and Catherine E. Tucker
Pubbl/distr/stampa Chicago : , : University of Chicago Press, , [2015]
Descrizione fisica 1 online resource
Disciplina 302.23/1
Collana National Bureau of Economic Research Conference Report
Soggetto topico Digital media - Economic aspects
Digital media - Government policy
Internet - Economic aspects
Soggetto non controllato economics, economy, analysis, marketing, management, strategy, digital age, data, technology, communication, activity, government, governing, public policies, entrepreneur, consumerism, digitization, supply and demand, access, online, modularity, prediction, google, search engines, housing prices, ideology, platforms, advertising, currency, labor market, copyright, authorship, security
ISBN 0-226-20698-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Frontmatter -- Relation of the Directors to the Work and Publications of the National Bureau of Economic Research -- Contents -- Acknowledgments -- Introduction -- 1. Modularity and the Evolution of the Internet -- 2. What Are We Not Doing When We Are Online? -- 3. The Future of Prediction: How Google Searches Foreshadow Housing Prices and Sales -- 4. Bayesian Variable Selection for Nowcasting Economic Time Series -- 5. Searching for Physical and Digital Media: The Evolution of Platforms for Finding Books -- 6. Ideology and Online News -- 7. Measuring the Effects of Advertising: The Digital Frontier -- 8. Digitization and the Contract Labor Market: A Research Agenda -- 9. Some Economics of Private Digital Currency -- 10. Estimation of Treatment Effects from Combined Data: Identification versus Data Security -- 11. Information Lost: Will the "Paradise" That Information Promises, to Both Consumer and Firm, Be "Lost" on Account of Data Breaches? The Epic is Playing Out -- 12. Copyright and the Profitability of Authorship: Evidence from Payments to Writers in the Romantic Period -- 13. Understanding Media Markets in the Digital Age: Economics and Methodology -- 14. Digitization and the Quality of New Media Products: The Case of Music -- 15. The Nature and Incidence of Software Piracy: Evidence from Windows -- Contributors -- Author Index -- Subject Index
Record Nr. UNINA-9910838251603321
Chicago : , : University of Chicago Press, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Economic perspectives on the Internet / / by Alan E. Wiseman
Economic perspectives on the Internet / / by Alan E. Wiseman
Autore Wiseman Alan E
Pubbl/distr/stampa [Washington, D.C.] : Bureau of Economics, Federal Trade Commission
Soggetto topico Internet industry
Internet - Economic aspects
Electronic commerce
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910689312903321
Wiseman Alan E  
[Washington, D.C.] : Bureau of Economics, Federal Trade Commission
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Food in the internet age / / William Aspray, George Royer, Melissa G. Ocepek
Food in the internet age / / William Aspray, George Royer, Melissa G. Ocepek
Autore Aspray William
Edizione [1st ed. 2013.]
Pubbl/distr/stampa New York : , : Springer, , 2013
Descrizione fisica 1 online resource (xii, 83 pages) : illustrations
Disciplina 005.7
658.11
Collana SpringerBriefs in Food, Health, and Nutrition
Soggetto topico Food industry and trade - United States
Food writing - United States
Internet - Economic aspects
ISBN 3-319-01598-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Food Online: An Introduction to a Complex Environment -- Anatomy of a Dot-Com Failure: The Case of Online Grocer Webvan -- The Dark Side of Online Food Businesses: Harms to Consumers and Main-Street Businesses -- Trust Online: From Amazon to Recipe Sharing.
Record Nr. UNINA-9910739432403321
Aspray William  
New York : , : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui