Simona, Rotaru; Petru, Bardaş; Mirela, Ghiţă; Mihaela, Cocoşilă
December 2008
Annals of the University of Oradea, Economic Science Series;2008, Vol. 17 Issue 4, p1504
Academic Journal
The development of the informational and communicational technology makes possible the use of a diversity of systems, instruments and technologies that offer to the decisional factors sharp and safe informations and also proper ways to process and analyse those informations in order to achieve an efficient development of their activities. We chose the internet - for theoretic and also for practical reasons - as informational technology because it stays at the base of other informational, decisional and communicational technologies - the intranet, the extranet, the web, the e-commerce, the groupware etc. Among the practical reasons we mention: low costs, fast communications and the performances inside the office and in relation with other people, especially with the clients; the market's development and the easier acquisition and fusion processes.


Related Articles

  • Extranets linking employees with your vendors. Greengard, Samuel // Workforce (10928332);Nov97, Vol. 76 Issue 11, p28 

    Reports computer companies in United States takes Internet to the next level by linking intranets with vendors. List of companies which uses the extranet; How of extranet system operates; Advantages of using the extranet. INSETS: Five steps to building a successful extranet.;Glossary..

  • NCR provides Web services.  // Automatic I.D. News;Aug97, Vol. 13 Issue 9, p60 

    Announces that NCR is offering a variety of corporate intranet and extranet services for Internet-based electronic commerce including Webenabled data warehouse solutions and NCR WebMining.

  • Usability in intranets and extranets. Cook, Aidan // IM@T.Online;Jun2008, p3 

    The article offers information on the failure of intranets and extranets in organizations. It states that if the owners of the goals set a lower standard, then the intranet or extranet will be rarely used by employees, difficult in unrewarding to update and will have outdated information. It...

  • INSIDE STORY. Stuart, Anne; Maxwell, Jill Hecht // Inc.;Apr2002, Vol. 24 Issue 4, p94 

    Deals with the benefits offered by extranets and intranets in a business enterprise. Opportunities of companies using intranets; Factors that can contribute to the use of computer networks; Cultural change in entrepreneurship through the use of computer networks. INSET: SPIN YOUR OWN.

  • MANAGEMENT IN DIGITAL ECONOMY ORGANIZATION. MUNTEAN, Valerica Doina; MICLĂUŞ, Ioan Marian // Quality - Access to Success;2011 Supplement, p319 

    This paper summarizes the basic knowledge on management information systems, on the premise that it is difficult - even impossible - running a modern organization without a minimum knowledge of computing systems. This means that teamwork, collaboration and cooperation between employees are and...

  • Ask Dr. Intranet. Blass, Steve // Network World;01/10/2000, Vol. 17 Issue 2, p35 

    Responds to an inquiry about intranets. Provision of Internet access to the back-office systems by giving Internet Protocol addresses in the 209.31.36.x range; Configuration of the stock-feed workstations to talk through both gateways.

  • XecurePay Brings Back Trust To Online Payments.  // Software World;Mar2006, Vol. 37 Issue 2, p18 

    The article reports on the problems of online payments and banking in England and the solutions done to regain the trust of customers. A research done by Forrester Research in 2005 revealed that 2.5% e-users have quit e-banking and 6 million Internet users stopped because of security fears and...

  • SPIRAL SECURITY MODEL TO COUNTER THE THREATS DUE TO HUMAN FACTORS IN WEB APPLICATIONS. TRIPATHY, BISWAJIT; MISHRA, JIBITESH // International Journal of Research in Computer Application & Mana;Nov2013, Vol. 3 Issue 11, p36 

    Last few years, the security of web has taken a different turn. More and more attacks are done on applications. Also the severe lack of employee awareness is making security breaches particularly due to their weak operational practices. To make the task of the attackers easier, many a times the...

  • Cap Gemini Group: Bringing Europe's Businesses To Cyberspace. Jones, Kevin // Inter@ctive Week;11/30/98, Vol. 5 Issue 47, p26 

    Highlights the efforts of Cap Gemini Group in penetrating Europe's electronic business. Role of the group in Euro conversion; Comments from Jean Paul Figer, chief technology officer at Cap Gemini; Efforts of the company in building intranets and extranets; Goals; Factors that hinder the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics