Loading...
  • Home
  • Search Results
2473-2474 of 4327 Papers

THE TYPES OF ONLINE TO OFFLINE BUSINESS MODEL

Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND INFORMATION TECHNOLOGY
Author(s): ABBY S. T. YANG , SHARI S. C

Abstract: Online-to-Offline (O2O), a brand-new business model that drives online visitors to purchase in-store by offering services online, has received a great deal of attention. The O2O business model has been adopted by companies across a variety of industries, such as Target in retailing, Uniqlo in apparel, Warby Parker in accessories and McDonald’s in food. However, less attention has been paid in the literature to the clear definition and scope of both online and offline businesses in the O2O business model, and there is limited understanding of how to build a successful O2O project. The objective of this study is to organize comprehensive information for the O2O business model and to examine the types of O2O business model. This study plans an empirical study. We build a preliminary finding regarding the 5 major types of O2O business models—(1) Commerce O2O; (2) Try-on O2O; (3) Promotional O2O; (4) Experience O2O; and (5) Crowdsourcing O2O—based on the literature and more than 50 practica

  • Publication Date: 27-May-2015
  • DOI: 10.15224/978-1-63248-061-3-21
  • Views: 0
  • Downloads: 0

A SURVEY ON BOTNET COMMAND AND CONTROL TRAFFIC DETECTION

Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND INFORMATION TECHNOLOGY
Author(s): IBRAHIM GHAFIR , VACLAV PRENOSIL , JAKUB SVOBODA

Abstract: Internet users have been attacked by widespread email viruses earlier, but now scenario has been changed. Now attackers are no more interested to just attract media attention by infecting a large number of computers on the network; in fact, their interest has been shifted to compromising and controlling the infected computers for their personal profits. This new attack trend brings the concept of botnets over the global network of computers. With the high reported infection rates, the vast range of illegal activities and powerful comebacks, botnets are one of the main threats against the cyber security. This paper provides the readers with a background on botnet life-cycle, architecture and malicious activities. It also classifies botnet detection techniques, reviews the recent research works on botnet traffic detection and finally indicates some challenges posed to future work on botnet detection.

  • Publication Date: 27-May-2015
  • DOI: 10.15224/978-1-63248-061-3-22
  • Views: 0
  • Downloads: 0