Knowledge (XXG)

Electronic business

Source 📝

1526:, which is actually a part of cryptography, involves transforming texts or messages into a code that is unreadable. These messages have to be decrypted in order to be understandable or usable for someone. There is a key that identifies the data to a certain person or company. With public-key encryption, there are actually two keys used. One is public and one is private. The public one is used for encryption and the private one for decryption. The level of the actual encryption can be adjusted and should be based on the information. The key can be just a simple slide of letters or a completely random mix-up of letters. This is relatively easy to implement because there is software that a company can purchase. A company needs to be sure that its keys are registered with a certificate authority. 1515:
firewall also has the ability to log attempts into the network and provide warnings as it is happening. They are very beneficial to keep third parties out of the network. Businesses that use Wi-Fi need to consider different forms of protection because these networks are easier for someone to access. They should look into protected access, virtual private networks, or internet protocol security. Another option they have is an intrusion detection system. This system alerts when there are possible intrusions. Some companies set up traps or "hot spots" to attract people and are then able to know when someone is trying to hack into that area.
1485:
software companies, social networks, etc. For those, the most significant operational cost is the maintenance of the platform. Those costs are almost unrelated to every additional customer the business acquires, making the marginal cost almost equal to zero. This is one of the major advantages of that kind of business. The second group are businesses that provide services or products outside of the digital world, like online shops, for those costs are much harder to determine. Some common advantages over traditional businesses are lower marketing cost, lower inventory cost, lower payroll, lower rent, etc.
1539:
from wherever they are. These certificates also use encryption. They are a little more complicated than normal encryption, however. They actually used important information within the code. They do this in order to assure the authenticity of the documents as well as confidentiality and data integrity which always accompany encryption. Digital certificates are not commonly used because they are confusing for people to implement. There can be complications when using different browsers, which means they need to use multiple certificates. The process is being adjusted so that it is easier to use.
3232: 1501:. Numerous things can be done in order to protect our E-Business. Starting off with basic things like switch to HTTPS from old outdated HTTP protocol which is more vulnerable to attacks. Furthermore, the other things that require full attention are securing servers and admin panels, payment gateway security, antivirus and anti-malware software, using firewalls is also a must, regular updates, and back up our data. 3212: 1551:. If a document has a digital signature on it, no one else is able to edit the information without being detected. That way if it is edited, it may be adjusted for reliability after the fact. In order to use a digital signature, one must use a combination of cryptography and a message digest. A message digest is used to give the document a unique value. That value is then encrypted with the sender's private key. 1051:. Electronic business differs from electronic commerce as it does not only deal with online transactions of selling and buying of a product and/or service but also enables to conduct of business processes (inbound/outbound logistics, manufacturing & operations, marketing and sales, customer service) within the value chain through internal or external networks. The term "e-business" was coined by 1069: 1472:
all e-business websites, steps must be taken to prevent disruption of service by events such as power outages and damage to physical infrastructure. Examples to address this include data backup, fire-suppression systems, Uninterrupted Power Supply (UPS) systems, virus protection, as well as making sure that there is sufficient capacity to handle the demands posed by heavy network traffic.
982: 3222: 2124: 1377:
numerous other people use any particular e-business system daily and expect their confidential information to stay secure. Hackers are one of the great threats to the security of e-businesses. Some common security concerns for e-Businesses include keeping business and customer information private and confidential, the authenticity of data, and
1324:, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection. Modern electronic commerce typically uses the World Wide Web for at least one part of the transaction's life cycle, although it may also use other technologies such as e-mail. 1538:
is to identify the owner of a document. This way the receiver knows that it is an authentic document. Companies can use these certificates in several different ways. They can be used as a replacement for user names and passwords. Each employee can be given these to access the documents that they need
1514:
should use this because they can then be sure that the information sent and received to their system is clean. A second way to protect the data is to use firewalls and network protection. A firewall is used to restrict access to private networks, as well as public networks that a company may use. The
1471:
This concern is specifically pertinent to a business's customers as certain information must be available when customers need it. Messages must be delivered in a reliable and timely fashion, and information must be stored and retrieved as required. Because the availability of service is important for
1435:
Data integrity answers the question "Can the information be changed or corrupted in any way?" This leads to the assurance that the message received is identical to the message sent. A business needs to be confident that data is not changed in transit, whether deliberately or by accident. To help with
1304:
Without a well-defined revenue model, that is, a clear plan of how to generate revenues, new businesses will more likely struggle due to costs that they will not be able to sustain. By having a revenue model, a business can focus on a target audience, fund development plans for a product or service,
1243:
to trademark the term "e-business" in the hopes that other companies would use the term and create an entirely new industry. However, this proved to be too successful and by 2000, to differentiate itself, IBM launched a $ 300 million campaign about its "e-business infrastructure" capabilities. Since
1613:
Delivery time: Traditional business enables instant satisfaction as you obtain the product the moment you purchase it, while in electronic business that is not possible. There will always be a waiting period before you receive the product. For example, Amazon assures one-day delivery. This does not
1376:
risks than traditional business systems, therefore it is important for e-business systems to be fully protected against these risks. A far greater number of people have access to e-businesses through the internet than would have access to a traditional business. Customers, suppliers, employees, and
1480:
The business internet which supports e-business has a cost to maintain of about $ 2 trillion in outsourced IT dollars just in the United States alone. With each website custom crafted and maintained in code, the maintenance burden is enormous. In the twenty-first century, look for new businesses
1209:
is considered the developer of the predecessor to online shopping. In 1979, the entrepreneur connected a television set to a transaction processing computer with a telephone line and called it "teleshopping", meaning shopping at distance. From the mid-nineties, major advancements were made in the
1413:
E-business transactions pose greater challenges for establishing authenticity due to the ease with which electronic information may be altered and copied. Both parties in an e-business transaction want to have the assurance that the other party is who they claim to be, especially when a customer
1300:
A key component of the business model is the revenue model or profit model, which is a framework for generating revenues. It identifies which revenue source to pursue, what value to offer, how to price the value, and who pays for the value. It is a key component of a company's business model. It
1609:
Lack of personal touch: The products cannot be examined or felt before the final purchase.  In the traditional model, we have a more personal customer experience, while in the electronic business that is mostly not the case. Another missing factor of personal touch could also be in online
1484:
The cost structure for e-businesses varies a lot from the industry they operate in. There are two major categories that have commune characteristics. The first group is fully digital businesses that do not provide any products or services outside of the digital world. This includes for example
1458:
When certain electronic resources and information is limited to only a few authorized individuals, a business and its customers must have the assurance that no one else can access the systems or information. There are a variety of techniques to address this concern including firewalls, access
1404:
is the extent to which businesses makes personal information available to other businesses and individuals. With any business, confidential information must remain secure and only be accessible to the intended recipient. However, this becomes even more difficult when dealing with e-businesses
1449:
is using digital signatures. A digital signature not only ensures that a message or document has been electronically signed by the person, but since a digital signature can only be created by one person, it also ensures that this person cannot later deny that they provided their signature.
1617:
Security issues: Scams could be mentioned as a factor for people's distrust in electronic business. Hackers can easily get customers' financial and personal details. Some customer still finds it hard to trust electronic businesses because of the lack of security, reliability and integrity
1405:
specifically. To keep such information secure means protecting any electronic records and files from unauthorized access, as well as ensuring safe transmission and data storage of such information. Tools such as encryption and firewalls manage this specific concern within e-business.
1192:
All of them can be either buyers or service providers within the market. There are nine possible combinations for electronic business relationships. B2C and B2B belong to E-commerce, while A2B and A2A belong to the E-government sector which is also a part of the electronic business.
1444:
This concern deals with the existence of proof in a transaction. A business must have the assurance that the receiving party or purchaser cannot deny that a transaction has occurred, and this means having sufficient evidence to prove the transaction. One way to address
1418:(VPN) technology. The establishment of authenticity is even greater when a combination of techniques are used, and such techniques involve checking "something you know" (i.e. password or PIN), "something you need" (i.e. credit card), or "something you are" (i.e. 1564:
When looking at e-business we have many advantages, which are mostly connected to making doing business easier. The benefits of implementing e-business tools are in the streamlining of business processes and not so much in the use of technology. Here are some:
1319:
E-commerce (short for "electronic commerce") is trading in products or services using computer networks, such as the Internet. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management,
1261:
The transformation toward e-business is complex and in order for it to succeed, there is a need to balance between strategy, an adapted business model (e-intermediary, marketplaces), right processes (sales, marketing) and technology
1214:, which launched in 1995, started as an online bookstore and grew to become nowadays the largest online retailer worldwide, selling food, toys, electronics, apparel and more. Other successful stories of online marketplaces include 1572:
Flexible business hours: There are no time barriers that a location-based business can encounter since the internet is available to everyone all the time. Your products and services can be accessed by everyone with an internet
1509:
There are several different ways to prevent access to the data that is kept online. One way is to use anti-virus software. This is something that most people use to protect their networks regardless of the data they have.
1173:
Electronic business can take place between a very large number of market participants; it can be between business and consumer, private individuals, public administrations, or any other organizations such as
1595:
Lower costs of marketing and sales: E-commerce allows the actors of the industry to advertise for their product/service offer (i.e.: house rental) at generally lower costs than by promoting physically their
1426:
methods). Many times in e-business, however, "something you are" is pretty strongly verified by checking the purchaser's "something you have" (i.e. credit card) and "something you know" (i.e. card number).
2066: 1247:
According to the U.S. Department Of Commerce, the estimated retail e-commerce sales in Q1 2020 were representing almost 12% of total U.S. retail sales, against 4% for Q1 2010.
1576:
Cheaper than traditional business: Electronic business is less costly than a traditional business, but it is more expensive to set up. Transactions cost are also cheaper.
1047:
to enable the external activities and relationships of the business with individuals, groups, and other businesses, while e-business refers to business with help of the
1012: 1226:, began to use its foundation in IT solutions and expertise to market itself as a leader of conducting business on the Internet through the term "e-business." Then CEO 2397: 1381:. Some of the methods of protecting e-business security and keeping information secure include physical security measures as well as data storage, data transmission, 1205:. This system replaced traditional mailing and faxing of documents with a digital transfer of data from one computer to another, without any human intervention. 1040:
constitutes the exchange of products and services between businesses, groups, and individuals and can be seen as one of the essential activities of any business.
1579:
No geographical boundaries: The greatest benefit is the possibility of geographical dispersion. Anyone can order anything from anywhere at any time.   
1436:
data integrity, firewalls protect stored data against unauthorized access, while simply backing up data allows recovery should the data or equipment be damaged.
3176: 1905: 2201: 2422: 2074: 1481:
that will help standardize the look and feel of the internet presence of a business to be more uniform in nature to help reduce the cost of maintenance.
1414:
places an order and then submits a payment electronically. One common way to ensure this is to limit access to a network or trusted parties by using a
2554: 2532: 1301:
primarily identifies what product or service will be created in order to generate revenues and the ways in which the product or service will be sold.
1044: 1985: 2196: 1569:
Easy to set up: electronic business is easy to set up even from home, the only requirements are software, a device and an internet connection.
2668: 1633: 1005: 81: 2038: 1605:
Despite all the limits, there are also some disadvantages that we need to address. The most common limitations of electronic business are:
1090: 1867: 2412: 1906:"'Free Shipping Day' Promotion Spurs Late-Season Online Spending Surge, Improving Season-to-Date Growth Rate to 16 Percent vs. Year Ago" 1588:
Lower levels of inventory: Electronic business enables companies to lower their level of inventory by digitalizing their assets. (i.e.:
1244:
that time, the terms, "e-business" and "e-commerce" have been loosely interchangeable and have become a part of the common vernacular.
3275: 3165: 1794: 709: 2899: 2474: 1854: 1756: 1726: 1697: 1677: 1160: 566: 2813: 1585:
Newmarket entry: It has a great potential to enable an entry to a previously unknown market that a traditional business could not.
1141: 2745: 1638: 1267: 998: 615: 1113: 3255: 3245: 3235: 2772: 1920: 3250: 2945: 2935: 2833: 1094: 1890: 1120: 3138: 2904: 2166: 1175: 986: 731: 641: 292: 3265: 3260: 2869: 849: 635: 463: 1849:
Paul Marson, (2000), Electronic Commerce - strategies & models for B2B trading, pp.31, John Wiley & Sons, Ltd,
3298: 2762: 2654: 1202: 839: 726: 676: 1127: 1079: 3133: 3117: 2659: 2614: 2542: 869: 1098: 1083: 3313: 2247: 1582:
Government subsidies: Digitalisation is very encouraged by the government and they provide the necessary support.
874: 653: 595: 297: 129: 1201:
One of the founding pillars of electronic business was the development of the Electronic Data Interchange (EDI)
1109: 3308: 3270: 3051: 2859: 2714: 1349: 889: 864: 600: 310: 244: 214: 2692: 2012: 1239:
that would introduce the concept of "e-business" and advertise IBM's expertise in the new field. IBM decided
3303: 3112: 2818: 2095: 1460: 1459:
privileges, user identification and authentication techniques (such as passwords and digital certificates),
1415: 1263: 1235: 879: 859: 844: 799: 625: 370: 350: 301: 287: 282: 278: 239: 33: 1036:) is any kind of business or commercial transaction that includes sharing information across the internet. 3143: 2914: 2730: 2432: 1935:
University of Pittsburgh, comp. e-Business Resource Group Security Guidelines. Publication. 5 August 2003.
1653: 1493:
When it comes to security solutions, sustainable electronic business requires support for data integrity,
1227: 939: 924: 854: 716: 620: 269: 169: 149: 139: 104: 1989: 1748:
Learning From Winners: How the ARF Ogilvy Award Winners Use Market Research to Create Advertising Success
3159: 3124: 2750: 2709: 2340: 1494: 821: 703: 691: 583: 576: 551: 513: 488: 438: 345: 306: 54: 1270:). When organizations go online, they have to decide which e-business models best suit their goals. A 2979: 2889: 2843: 2838: 2644: 2442: 2387: 2370: 2213: 1386: 884: 809: 794: 681: 671: 648: 588: 556: 458: 400: 162: 59: 1786:
The Fast Path to Corporate Growth: Leveraging Knowledge and Technologies to New Market Applimcations
3318: 3153: 3015: 2755: 2698: 2664: 1648: 1628: 1535: 1423: 1382: 1341: 1333: 1275: 966: 949: 934: 784: 761: 746: 666: 605: 561: 433: 423: 405: 273: 229: 144: 124: 1233:
After conducting worldwide market research in October 1997, IBM began with an eight-page piece in
3128: 3103: 3003: 2985: 2649: 1825: 1337: 1321: 1134: 929: 804: 789: 756: 751: 741: 736: 686: 610: 518: 483: 174: 1223: 3240: 3187: 3081: 3076: 2940: 2864: 2459: 2427: 2335: 2267: 2252: 2159: 1850: 1790: 1752: 1722: 1693: 1673: 1548: 1419: 1361: 909: 816: 772: 698: 571: 478: 448: 385: 179: 1784: 1746: 3170: 2973: 2965: 2894: 2796: 2724: 2325: 2282: 2277: 1373: 1357: 961: 779: 721: 546: 541: 503: 340: 335: 94: 3148: 3061: 2884: 2823: 2469: 2392: 2262: 1643: 1446: 1401: 1206: 914: 766: 659: 523: 453: 443: 360: 257: 224: 189: 109: 89: 3197: 3071: 3066: 3027: 2955: 2909: 2828: 2537: 2417: 2191: 2183: 1711: 1378: 1345: 1271: 1256: 944: 473: 468: 395: 390: 380: 234: 209: 184: 3292: 3046: 3021: 2991: 2777: 2498: 2437: 2345: 2320: 2235: 2096:"Advantages Of E-Business in Today's World | Sri Lanka Tourism Development Authority" 1718: 1295: 919: 355: 202: 2039:"Comparison Between Retail and E-commerce Cost Structures for a $ 150 Apparel Piece" 3215: 3009: 2997: 2602: 2597: 2576: 2152: 1592:
does not sell anymore physical DVDs but proposes online streaming content instead).
498: 375: 365: 77: 1178:(NGOs). These various market participants can be divided into three main groups: 3086: 3056: 2879: 2767: 2491: 2486: 2257: 2067:"Benefits and Limitations of e-Business : Dis-advantages, Solved Questions" 1353: 1068: 954: 493: 134: 119: 114: 1971: 1286:. The concept of the e-business model is the same but used in online presence. 2808: 2801: 2735: 2481: 2302: 2292: 1523: 1390: 1314: 1211: 47: 2566: 2559: 2375: 2297: 2287: 1988:. Santa Clara University. Markkula Center for Applied Ethics. Archived from 1336:, there is also evidence that some aspects of the internet such as maps and 1283: 1279: 428: 330: 323: 981: 17: 3225: 3182: 2930: 2874: 2639: 2624: 2607: 2452: 2380: 2350: 1048: 1037: 264: 219: 3192: 2634: 2629: 2571: 2402: 2330: 1589: 1498: 99: 2619: 2592: 2549: 2527: 2447: 1305:
establish marketing plans, begin a line of credit and raise capital.
1278:
and information flows, and the source of revenues and benefits for
2240: 2103: 1810:
Lowry, Paul Benjamin; Cherrington, J. Owen; Watson, R. J. (2001).
902: 64: 1690:
Who says Elephants Can't Dance? Inside IBM's Historic Turnaround.
2464: 2407: 1219: 1215: 2148: 2175: 1062: 1052: 508: 1230:
was prepared to invest $ 1 billion to market this new brand.
1672:
Beynon-Davies P. (2004). E-Business. Palgrave, Basingstoke.
1891:"E-commerce will make the shopping mall a retail wasteland" 1547:
A final way to secure information online would be to use a
1868:"How the Internet Reinforces Inequality in the Real World" 1332:
While much has been written of the economic advantages of
1614:
resolve the issue completely, but it is an improvement.
2144: 1986:"Privacy: Electronic Information and the Individual" 1826:"Quarterly Retail E-Commerce Sales 1st Quarter 2022" 3095: 3037: 2964: 2923: 2852: 2786: 2682: 2585: 2520: 2511: 2363: 2313: 2228: 2221: 2212: 2182: 1710: 2398:Criminal Reduction Utilising Statistical History 1831:(Press release). US Census Bureau. 19 May 2022 2160: 1348:. Electronic commerce may be responsible for 1006: 8: 1274:is defined as the organization of product, 1097:. Unsourced material may be challenged and 27:Business that takes place over the internet 2517: 2225: 2218: 2167: 2153: 2145: 1967: 1965: 1963: 1961: 1372:E-business systems naturally have greater 1059:Market participants in electronic business 1043:Electronic commerce focuses on the use of 1013: 999: 29: 1959: 1957: 1955: 1953: 1951: 1949: 1947: 1945: 1943: 1941: 1921:"The Death of the American Shopping Mall" 1161:Learn how and when to remove this message 1751:. Taylor & Francis. pp. 32–33. 1740: 1738: 1055:'s marketing and Internet team in 1996. 1045:information and communication technology 1789:. Oxford University Press. p. 30. 1778: 1776: 1774: 1665: 32: 2013:"What Is Nonrepudiation? - Definition" 2533:Center for The Business of Government 2061: 2059: 1634:Electronic Commerce Modeling Language 1360:businesses resulting in increases in 7: 3221: 1095:adding citations to reliable sources 2037:Rodrigue, J-P. (28 November 2017). 2043:The Geography of Transport Systems 25: 2202:PC business acquisition by Lenovo 1866:Badger, Emily (6 February 2013). 1222:. In 1994, IBM, with its agency 987:Business and economics portal 3231: 3230: 3220: 3211: 3210: 2900:Sabre airline reservation system 2746:Thomas J. Watson Research Center 1639:Very Large Business Applications 1268:Customer Relationship Management 1210:commercial use of the Internet. 1067: 980: 2413:Information Management Software 3166:International chess tournament 2946:Globally integrated enterprise 2936:Commercial Processing Workload 1176:non-governmental organizations 1: 2905:Scanning tunneling microscope 642:management information system 293:Chief human resources officer 2073:. 2018-03-10. Archived from 1814:. Boca Raton, FL: CRC Press. 1555:Advantages and disadvantages 636:Enterprise resource planning 464:Financial statement analysis 2773:Canada Head Office Building 2763:Cambridge Scientific Center 2655:Science Research Associates 2423:Mainframe operating systems 1713:The e-business (r)evolution 1397:Privacy and confidentiality 1203:electronic data interchange 3335: 2834:Virtual Universe Community 2555:International subsidiaries 2475:Service Automation Manager 1312: 1293: 1254: 3206: 1984:Westfall, Joseph (2010). 1505:Access and data integrity 1334:Internet-enabled commerce 298:Chief information officer 130:Limited liability company 2860:Automated teller machine 2814:The Great Mind Challenge 2197:Mergers and acquisitions 1745:Pettit, Raymond (2012). 1461:Virtual Private Networks 311:Chief technology officer 245:Mergers and acquisitions 215:Constitutional documents 40:Management of a business 2819:Linux Technology Center 1783:Meyer, Marc H. (2007). 1416:virtual private network 1340:may serve to reinforce 1338:location-aware services 1264:Supply Chain Management 1236:The Wall Street Journal 371:Environmental economics 351:International economics 302:Chief marketing officer 288:Chief financial officer 283:Chief operating officer 279:Chief executive officer 240:International trade law 34:Business administration 3144:Dynamic infrastructure 3109:Big Blue sports teams 2915:Universal Product Code 1717:. Upper Saddle River: 1654:Shopping cart software 1463:(VPN), and much more. 1228:Louis V. Gerstner, Jr. 940:International business 925:Business judgment rule 270:Chief business officer 170:Annual general meeting 150:State-owned enterprise 140:Privately held company 3276:Vacuum tube computers 3160:IBM and the Holocaust 3125:Common Public License 3010:Louis V. Gerstner Jr. 2793:Academy of Technology 2248:Power microprocessors 1924:The Atlantic — Cities 1688:Gerstner, L. (2002). 1495:strong authentication 1110:"Electronic business" 616:Customer relationship 552:Business intelligence 514:Financial institution 489:International finance 439:Cash conversion cycle 346:Development economics 307:Chief product officer 55:Management accounting 2890:Magnetic stripe card 2839:World Community Grid 2715:Toronto Software Lab 2371:Carbon Design System 2326:Cell microprocessors 1530:Digital certificates 1091:improve this section 557:Business development 401:Economic development 163:Corporate governance 60:Financial accounting 3154:GUIDE International 3016:Samuel J. Palmisano 2875:Electronic keypunch 2699:One Atlantic Center 2669:Weather Underground 2665:The Weather Company 1926:, December 26, 2012 1911:, December 23, 2012 1812:E-Business Handbook 1649:Types of E-commerce 1629:Electronic commerce 1536:digital certificate 1383:anti-virus software 1352:and the decline of 1342:economic inequality 1224:Ogilvy & Mather 1026:Electronic business 967:Business statistics 950:International trade 935:Business operations 631:Electronic business 536:Types of management 424:Financial statement 406:Economic statistics 274:Chief brand officer 230:Corporate liability 145:Sole proprietorship 125:Joint-stock company 3299:Business computing 3256:Personal computers 3246:Midrange computers 3236:Navigational boxes 3129:IBM Public License 3104:A Boy and His Atom 3062:Michelle J. Howard 3004:John Fellows Akers 2986:T. Vincent Learson 2693:1250 René-Lévesque 2433:Planning Analytics 2125:"Leaving Facebook" 1896:, January 17, 2013 1543:Digital signatures 1489:Security solutions 1420:digital signatures 1322:Internet marketing 1188:Administration (A) 930:Consumer behaviour 732:Product life-cycle 519:Capital management 484:Managerial finance 175:Board of directors 3286: 3285: 3251:Operating systems 3113:American football 3082:Joseph R. Swedish 3077:Martha E. Pollack 2980:Thomas Watson Jr. 2941:Customer engineer 2865:Cynefin framework 2751:Hakozaki Facility 2710:Rome Software Lab 2678: 2677: 2507: 2506: 2460:Rational Software 2359: 2358: 2341:Personal Computer 2336:Midrange computer 1709:Amor, D. (1999). 1549:digital signature 1424:voice recognition 1362:income inequality 1171: 1170: 1163: 1145: 1023: 1022: 910:Business analysis 479:Corporate finance 449:Capital budgeting 386:Knowledge economy 180:Supervisory board 16:(Redirected from 3326: 3314:Web applications 3234: 3233: 3224: 3223: 3214: 3213: 2974:Thomas J. Watson 2895:Relational model 2844:Think conference 2725:330 North Wabash 2645:Microelectronics 2518: 2443:Quantum Platform 2388:Cognos Analytics 2226: 2219: 2169: 2162: 2155: 2146: 2139: 2138: 2136: 2135: 2129:www.facebook.com 2121: 2115: 2114: 2112: 2111: 2102:. Archived from 2092: 2086: 2085: 2083: 2082: 2063: 2054: 2053: 2051: 2049: 2034: 2028: 2027: 2025: 2023: 2008: 2002: 2001: 1999: 1997: 1981: 1975: 1969: 1936: 1933: 1927: 1918: 1912: 1903: 1897: 1888: 1882: 1881: 1879: 1878: 1863: 1857: 1847: 1841: 1840: 1838: 1836: 1830: 1822: 1816: 1815: 1807: 1801: 1800: 1780: 1769: 1768: 1766: 1765: 1742: 1733: 1732: 1716: 1706: 1700: 1686: 1680: 1670: 1358:brick and mortar 1166: 1159: 1155: 1152: 1146: 1144: 1103: 1071: 1063: 1015: 1008: 1001: 985: 984: 962:Business process 504:Financial market 341:Labour economics 336:Public economics 95:Corporation sole 30: 21: 3334: 3333: 3329: 3328: 3327: 3325: 3324: 3323: 3309:Web development 3289: 3288: 3287: 3282: 3202: 3188:SHARE computing 3149:GlobalFoundries 3091: 3039: 3033: 2960: 2919: 2910:Financial swaps 2885:Hard disk drive 2848: 2782: 2756:Yamato Facility 2674: 2581: 2513: 2503: 2470:Tivoli Software 2355: 2309: 2208: 2178: 2173: 2143: 2142: 2133: 2131: 2123: 2122: 2118: 2109: 2107: 2094: 2093: 2089: 2080: 2078: 2065: 2064: 2057: 2047: 2045: 2036: 2035: 2031: 2021: 2019: 2010: 2009: 2005: 1995: 1993: 1983: 1982: 1978: 1972:eCommerce theme 1970: 1939: 1934: 1930: 1919: 1915: 1904: 1900: 1889: 1885: 1876: 1874: 1865: 1864: 1860: 1848: 1844: 1834: 1832: 1828: 1824: 1823: 1819: 1809: 1808: 1804: 1797: 1782: 1781: 1772: 1763: 1761: 1759: 1744: 1743: 1736: 1729: 1708: 1707: 1703: 1687: 1683: 1671: 1667: 1662: 1644:Digital economy 1625: 1603: 1562: 1557: 1545: 1534:The point of a 1532: 1521: 1507: 1491: 1478: 1469: 1456: 1447:non-repudiation 1442: 1440:Non-repudiation 1433: 1411: 1402:Confidentiality 1399: 1393:to list a few. 1370: 1330: 1317: 1311: 1298: 1292: 1259: 1253: 1207:Michael Aldrich 1199: 1167: 1156: 1150: 1147: 1104: 1102: 1088: 1072: 1061: 1030:online business 1028:(also known as 1019: 979: 972: 971: 915:Business ethics 905: 895: 894: 835: 827: 826: 537: 529: 528: 524:Venture capital 454:Commercial bank 444:Insider dealing 419: 411: 410: 361:Planned economy 326: 316: 315: 260: 258:Corporate title 250: 249: 225:Corporate crime 205: 195: 194: 190:Audit committee 165: 155: 154: 110:Holding company 90:Corporate group 85: 78:Business entity 70: 69: 50: 28: 23: 22: 15: 12: 11: 5: 3332: 3330: 3322: 3321: 3316: 3311: 3306: 3304:Business terms 3301: 3291: 3290: 3284: 3283: 3281: 3280: 3279: 3278: 3273: 3268: 3263: 3258: 3253: 3248: 3243: 3228: 3218: 3207: 3204: 3203: 3201: 3200: 3195: 3190: 3185: 3180: 3173: 3171:Lucifer cipher 3168: 3163: 3156: 3151: 3146: 3141: 3136: 3131: 3122: 3121: 3120: 3115: 3107: 3099: 3097: 3093: 3092: 3090: 3089: 3087:Peter R. Voser 3084: 3079: 3074: 3072:Andrew Liveris 3069: 3067:Arvind Krishna 3064: 3059: 3054: 3049: 3043: 3041: 3035: 3034: 3032: 3031: 3028:Arvind Krishna 3025: 3019: 3013: 3007: 3001: 2995: 2989: 2983: 2977: 2970: 2968: 2962: 2961: 2959: 2958: 2953: 2948: 2943: 2938: 2933: 2927: 2925: 2921: 2920: 2918: 2917: 2912: 2907: 2902: 2897: 2892: 2887: 2882: 2877: 2872: 2867: 2862: 2856: 2854: 2850: 2849: 2847: 2846: 2841: 2836: 2831: 2829:Smarter Planet 2826: 2821: 2816: 2811: 2806: 2805: 2804: 2794: 2790: 2788: 2784: 2783: 2781: 2780: 2775: 2770: 2765: 2760: 2759: 2758: 2753: 2748: 2740: 2739: 2738: 2733: 2728: 2721:IBM Buildings 2719: 2718: 2717: 2712: 2706:Software Labs 2704: 2703: 2702: 2696: 2695:, Montreal, QC 2686: 2684: 2680: 2679: 2676: 2675: 2673: 2672: 2662: 2660:Service Bureau 2657: 2652: 2650:Product Center 2647: 2642: 2637: 2632: 2627: 2622: 2617: 2615:Ambra Computer 2612: 2611: 2610: 2605: 2595: 2589: 2587: 2583: 2582: 2580: 2579: 2574: 2569: 2564: 2563: 2562: 2552: 2547: 2546: 2545: 2535: 2530: 2524: 2522: 2515: 2509: 2508: 2505: 2504: 2502: 2501: 2496: 2495: 2494: 2484: 2479: 2478: 2477: 2467: 2462: 2457: 2456: 2455: 2450: 2440: 2435: 2430: 2425: 2420: 2418:Lotus Software 2415: 2410: 2405: 2400: 2395: 2390: 2385: 2384: 2383: 2373: 2367: 2365: 2361: 2360: 2357: 2356: 2354: 2353: 2348: 2343: 2338: 2333: 2328: 2323: 2317: 2315: 2311: 2310: 2308: 2307: 2306: 2305: 2300: 2295: 2290: 2285: 2280: 2272: 2271: 2270: 2265: 2255: 2250: 2245: 2244: 2243: 2232: 2230: 2223: 2216: 2210: 2209: 2207: 2206: 2205: 2204: 2194: 2188: 2186: 2180: 2179: 2174: 2172: 2171: 2164: 2157: 2149: 2141: 2140: 2116: 2087: 2055: 2029: 2011:Awati, Rahul. 2003: 1976: 1937: 1928: 1913: 1898: 1883: 1858: 1842: 1817: 1802: 1796:978-0195180862 1795: 1770: 1757: 1734: 1727: 1701: 1681: 1664: 1663: 1661: 1658: 1657: 1656: 1651: 1646: 1641: 1636: 1631: 1624: 1621: 1620: 1619: 1615: 1611: 1602: 1599: 1598: 1597: 1593: 1586: 1583: 1580: 1577: 1574: 1570: 1561: 1558: 1556: 1553: 1544: 1541: 1531: 1528: 1520: 1517: 1506: 1503: 1490: 1487: 1477: 1476:Cost structure 1474: 1468: 1465: 1455: 1454:Access control 1452: 1441: 1438: 1432: 1431:Data integrity 1429: 1410: 1407: 1398: 1395: 1379:data integrity 1369: 1366: 1346:digital divide 1329: 1326: 1313:Main article: 1310: 1307: 1294:Main article: 1291: 1288: 1272:business model 1257:Business model 1255:Main article: 1252: 1251:Business model 1249: 1198: 1195: 1190: 1189: 1186: 1183: 1169: 1168: 1075: 1073: 1066: 1060: 1057: 1021: 1020: 1018: 1017: 1010: 1003: 995: 992: 991: 990: 989: 974: 973: 970: 969: 964: 959: 958: 957: 947: 945:Business model 942: 937: 932: 927: 922: 917: 912: 906: 901: 900: 897: 896: 893: 892: 887: 882: 877: 872: 867: 862: 857: 852: 847: 842: 836: 833: 832: 829: 828: 825: 824: 819: 814: 813: 812: 802: 797: 792: 787: 782: 777: 776: 775: 764: 759: 754: 749: 744: 739: 734: 729: 724: 719: 714: 713: 712: 701: 696: 695: 694: 684: 679: 674: 669: 664: 663: 662: 654:Human resource 651: 646: 645: 644: 633: 628: 623: 618: 613: 608: 603: 598: 596:Communications 593: 592: 591: 581: 580: 579: 569: 564: 559: 554: 549: 544: 538: 535: 534: 531: 530: 527: 526: 521: 516: 511: 506: 501: 496: 491: 486: 481: 476: 474:Public finance 471: 469:Financial risk 466: 461: 456: 451: 446: 441: 436: 431: 426: 420: 417: 416: 413: 412: 409: 408: 403: 398: 396:Macroeconomics 393: 391:Microeconomics 388: 383: 381:Market economy 378: 373: 368: 363: 358: 353: 348: 343: 338: 333: 327: 322: 321: 318: 317: 314: 313: 304: 295: 290: 285: 276: 267: 261: 256: 255: 252: 251: 248: 247: 242: 237: 235:Insolvency law 232: 227: 222: 217: 212: 210:Commercial law 206: 201: 200: 197: 196: 193: 192: 187: 185:Advisory board 182: 177: 172: 166: 161: 160: 157: 156: 153: 152: 147: 142: 137: 132: 127: 122: 117: 112: 107: 102: 97: 92: 86: 76: 75: 72: 71: 68: 67: 62: 57: 51: 46: 45: 42: 41: 37: 36: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 3331: 3320: 3317: 3315: 3312: 3310: 3307: 3305: 3302: 3300: 3297: 3296: 3294: 3277: 3274: 3272: 3269: 3267: 3264: 3262: 3259: 3257: 3254: 3252: 3249: 3247: 3244: 3242: 3239: 3238: 3237: 3229: 3227: 3219: 3217: 3209: 3208: 3205: 3199: 3196: 3194: 3191: 3189: 3186: 3184: 3181: 3179: 3178: 3174: 3172: 3169: 3167: 3164: 3162: 3161: 3157: 3155: 3152: 3150: 3147: 3145: 3142: 3140: 3137: 3135: 3132: 3130: 3126: 3123: 3119: 3116: 3114: 3111: 3110: 3108: 3106: 3105: 3101: 3100: 3098: 3094: 3088: 3085: 3083: 3080: 3078: 3075: 3073: 3070: 3068: 3065: 3063: 3060: 3058: 3055: 3053: 3050: 3048: 3047:Thomas Buberl 3045: 3044: 3042: 3036: 3029: 3026: 3023: 3022:Ginni Rometty 3020: 3017: 3014: 3011: 3008: 3005: 3002: 2999: 2996: 2993: 2992:Frank T. Cary 2990: 2987: 2984: 2981: 2978: 2975: 2972: 2971: 2969: 2967: 2963: 2957: 2954: 2952: 2949: 2947: 2944: 2942: 2939: 2937: 2934: 2932: 2929: 2928: 2926: 2922: 2916: 2913: 2911: 2908: 2906: 2903: 2901: 2898: 2896: 2893: 2891: 2888: 2886: 2883: 2881: 2878: 2876: 2873: 2871: 2868: 2866: 2863: 2861: 2858: 2857: 2855: 2851: 2845: 2842: 2840: 2837: 2835: 2832: 2830: 2827: 2825: 2822: 2820: 2817: 2815: 2812: 2810: 2807: 2803: 2800: 2799: 2798: 2795: 2792: 2791: 2789: 2785: 2779: 2778:IBM Rochester 2776: 2774: 2771: 2769: 2766: 2764: 2761: 2757: 2754: 2752: 2749: 2747: 2744: 2743: 2741: 2737: 2734: 2732: 2729: 2727:, Chicago, IL 2726: 2723: 2722: 2720: 2716: 2713: 2711: 2708: 2707: 2705: 2701:, Atlanta, GA 2700: 2697: 2694: 2691: 2690: 2688: 2687: 2685: 2681: 2670: 2666: 2663: 2661: 2658: 2656: 2653: 2651: 2648: 2646: 2643: 2641: 2638: 2636: 2633: 2631: 2628: 2626: 2623: 2621: 2618: 2616: 2613: 2609: 2606: 2604: 2601: 2600: 2599: 2596: 2594: 2591: 2590: 2588: 2584: 2578: 2575: 2573: 2570: 2568: 2565: 2561: 2558: 2557: 2556: 2553: 2551: 2548: 2544: 2541: 2540: 2539: 2536: 2534: 2531: 2529: 2526: 2525: 2523: 2519: 2516: 2510: 2500: 2497: 2493: 2490: 2489: 2488: 2485: 2483: 2480: 2476: 2473: 2472: 2471: 2468: 2466: 2463: 2461: 2458: 2454: 2451: 2449: 2446: 2445: 2444: 2441: 2439: 2436: 2434: 2431: 2429: 2428:Mashup Center 2426: 2424: 2421: 2419: 2416: 2414: 2411: 2409: 2406: 2404: 2401: 2399: 2396: 2394: 2391: 2389: 2386: 2382: 2379: 2378: 2377: 2374: 2372: 2369: 2368: 2366: 2362: 2352: 2349: 2347: 2344: 2342: 2339: 2337: 2334: 2332: 2329: 2327: 2324: 2322: 2319: 2318: 2316: 2312: 2304: 2301: 2299: 2296: 2294: 2291: 2289: 2286: 2284: 2281: 2279: 2276: 2275: 2273: 2269: 2266: 2264: 2261: 2260: 2259: 2256: 2254: 2253:Power Systems 2251: 2249: 2246: 2242: 2239: 2238: 2237: 2234: 2233: 2231: 2227: 2224: 2220: 2217: 2215: 2211: 2203: 2200: 2199: 2198: 2195: 2193: 2190: 2189: 2187: 2185: 2181: 2177: 2170: 2165: 2163: 2158: 2156: 2151: 2150: 2147: 2130: 2126: 2120: 2117: 2106:on 2020-02-20 2105: 2101: 2097: 2091: 2088: 2077:on 2020-07-30 2076: 2072: 2068: 2062: 2060: 2056: 2044: 2040: 2033: 2030: 2018: 2014: 2007: 2004: 1992:on 2010-07-11 1991: 1987: 1980: 1977: 1973: 1968: 1966: 1964: 1962: 1960: 1958: 1956: 1954: 1952: 1950: 1948: 1946: 1944: 1942: 1938: 1932: 1929: 1925: 1922: 1917: 1914: 1910: 1907: 1902: 1899: 1895: 1892: 1887: 1884: 1873: 1869: 1862: 1859: 1856: 1855:0-471-72029-1 1852: 1846: 1843: 1827: 1821: 1818: 1813: 1806: 1803: 1798: 1792: 1788: 1787: 1779: 1777: 1775: 1771: 1760: 1758:9781136676765 1754: 1750: 1749: 1741: 1739: 1735: 1730: 1728:9780130851239 1724: 1720: 1719:Prentice Hall 1715: 1714: 1705: 1702: 1699: 1698:0-06-052379-4 1695: 1691: 1685: 1682: 1679: 1678:1-4039-1348-X 1675: 1669: 1666: 1659: 1655: 1652: 1650: 1647: 1645: 1642: 1640: 1637: 1635: 1632: 1630: 1627: 1626: 1622: 1616: 1612: 1610:transactions. 1608: 1607: 1606: 1601:Disadvantages 1600: 1594: 1591: 1587: 1584: 1581: 1578: 1575: 1571: 1568: 1567: 1566: 1559: 1554: 1552: 1550: 1542: 1540: 1537: 1529: 1527: 1525: 1518: 1516: 1513: 1504: 1502: 1500: 1496: 1488: 1486: 1482: 1475: 1473: 1466: 1464: 1462: 1453: 1451: 1448: 1439: 1437: 1430: 1428: 1425: 1421: 1417: 1408: 1406: 1403: 1396: 1394: 1392: 1388: 1384: 1380: 1375: 1367: 1365: 1363: 1359: 1355: 1351: 1350:consolidation 1347: 1343: 1339: 1335: 1327: 1325: 1323: 1316: 1308: 1306: 1302: 1297: 1296:Revenue model 1290:Revenue model 1289: 1287: 1285: 1281: 1277: 1273: 1269: 1265: 1258: 1250: 1248: 1245: 1242: 1238: 1237: 1231: 1229: 1225: 1221: 1217: 1213: 1208: 1204: 1196: 1194: 1187: 1184: 1181: 1180: 1179: 1177: 1165: 1162: 1154: 1143: 1140: 1136: 1133: 1129: 1126: 1122: 1119: 1115: 1112: –  1111: 1107: 1106:Find sources: 1100: 1096: 1092: 1086: 1085: 1081: 1076:This section 1074: 1070: 1065: 1064: 1058: 1056: 1054: 1050: 1046: 1041: 1039: 1035: 1031: 1027: 1016: 1011: 1009: 1004: 1002: 997: 996: 994: 993: 988: 983: 978: 977: 976: 975: 968: 965: 963: 960: 956: 953: 952: 951: 948: 946: 943: 941: 938: 936: 933: 931: 928: 926: 923: 921: 920:Business plan 918: 916: 913: 911: 908: 907: 904: 899: 898: 891: 888: 886: 883: 881: 878: 876: 873: 871: 868: 866: 863: 861: 858: 856: 853: 851: 850:Communication 848: 846: 843: 841: 838: 837: 831: 830: 823: 820: 818: 815: 811: 810:administrator 808: 807: 806: 803: 801: 798: 796: 793: 791: 788: 786: 783: 781: 778: 774: 771: 770: 768: 765: 763: 760: 758: 755: 753: 750: 748: 745: 743: 740: 738: 735: 733: 730: 728: 725: 723: 720: 718: 715: 711: 708: 707: 705: 702: 700: 697: 693: 692:administrator 690: 689: 688: 685: 683: 680: 678: 675: 673: 670: 668: 665: 661: 658: 657: 655: 652: 650: 647: 643: 640: 639: 637: 634: 632: 629: 627: 624: 622: 619: 617: 614: 612: 609: 607: 604: 602: 601:Configuration 599: 597: 594: 590: 587: 586: 585: 582: 578: 575: 574: 573: 570: 568: 565: 563: 560: 558: 555: 553: 550: 548: 545: 543: 540: 539: 533: 532: 525: 522: 520: 517: 515: 512: 510: 507: 505: 502: 500: 497: 495: 492: 490: 487: 485: 482: 480: 477: 475: 472: 470: 467: 465: 462: 460: 457: 455: 452: 450: 447: 445: 442: 440: 437: 435: 432: 430: 427: 425: 422: 421: 415: 414: 407: 404: 402: 399: 397: 394: 392: 389: 387: 384: 382: 379: 377: 374: 372: 369: 367: 364: 362: 359: 357: 356:Mixed economy 354: 352: 349: 347: 344: 342: 339: 337: 334: 332: 329: 328: 325: 320: 319: 312: 308: 305: 303: 299: 296: 294: 291: 289: 286: 284: 280: 277: 275: 271: 268: 266: 263: 262: 259: 254: 253: 246: 243: 241: 238: 236: 233: 231: 228: 226: 223: 221: 218: 216: 213: 211: 208: 207: 204: 203:Corporate law 199: 198: 191: 188: 186: 183: 181: 178: 176: 173: 171: 168: 167: 164: 159: 158: 151: 148: 146: 143: 141: 138: 136: 133: 131: 128: 126: 123: 121: 118: 116: 113: 111: 108: 106: 103: 101: 98: 96: 93: 91: 88: 87: 83: 79: 74: 73: 66: 63: 61: 58: 56: 53: 52: 49: 44: 43: 39: 38: 35: 31: 19: 3175: 3158: 3139:Deep Thought 3102: 3030:(since 2020) 2998:John R. Opel 2956:Think slogan 2950: 2797:Deep Thunder 2603:Kaleida Labs 2598:AIM alliance 2283:Q System Two 2278:Q System One 2132:. Retrieved 2128: 2119: 2108:. Retrieved 2104:the original 2100:www.sltda.lk 2099: 2090: 2079:. Retrieved 2075:the original 2071:Toppr-guides 2070: 2046:. Retrieved 2042: 2032: 2020:. Retrieved 2016: 2006: 1994:. Retrieved 1990:the original 1979: 1931: 1923: 1916: 1908: 1901: 1893: 1886: 1875:. Retrieved 1872:The Atlantic 1871: 1861: 1845: 1833:. Retrieved 1820: 1811: 1805: 1785: 1762:. Retrieved 1747: 1712: 1704: 1689: 1684: 1668: 1604: 1563: 1546: 1533: 1522: 1512:E-businesses 1511: 1508: 1492: 1483: 1479: 1470: 1467:Availability 1457: 1443: 1434: 1412: 1409:Authenticity 1400: 1371: 1331: 1318: 1303: 1299: 1260: 1246: 1240: 1234: 1232: 1200: 1191: 1185:Consumer (C) 1182:Business (B) 1172: 1157: 1148: 1138: 1131: 1124: 1117: 1105: 1089:Please help 1077: 1042: 1033: 1029: 1025: 1024: 840:Architecture 834:Organization 800:Supply chain 630: 626:Earned value 499:Stock market 376:Open economy 366:Econometrics 105:Conglomerate 3271:Typewriters 3177:Mathematica 3118:Rugby union 3057:Alex Gorsky 3024:(2012–2020) 3018:(2002–2011) 3012:(1993–2002) 3006:(1985–1993) 3000:(1981–1985) 2994:(1973–1981) 2988:(1971–1973) 2982:(1956–1971) 2976:(1914–1956) 2924:Terminology 2880:Floppy disk 2824:SkillsBuild 2787:Initiatives 2768:IBM Hursley 2742:Facilities 2393:Connections 2263:FlashSystem 1996:30 November 1573:connection. 1354:mom-and-pop 1151:August 2024 955:Trade route 870:Engineering 865:Development 717:Performance 660:development 621:Distributed 494:Liquidation 135:Partnership 120:Corporation 115:Cooperative 3319:E-commerce 3293:Categories 3266:System/370 3261:System/360 3052:David Farr 2951:e-business 2853:Inventions 2802:Develothon 2683:Facilities 2543:Promontory 2538:Consulting 2134:2020-05-29 2110:2020-05-29 2081:2020-05-29 2017:TechTarget 1974:by Potenza 1877:2013-02-13 1764:2014-05-31 1660:References 1560:Advantages 1524:Encryption 1519:Encryption 1391:encryption 1315:E-commerce 1309:E-commerce 1121:newspapers 1034:e-business 822:Technology 704:Operations 584:Commercial 577:innovation 567:Capability 459:Derivative 48:Accounting 18:E-business 3134:Deep Blue 3040:directors 2499:WebSphere 2438:PureQuery 2346:Selectric 2321:Blue Gene 2236:Mainframe 2022:12 August 1835:12 August 1596:business. 1387:firewalls 1284:customers 1280:suppliers 1078:does not 890:Structure 875:Hierarchy 795:Strategic 682:Materials 672:Knowledge 649:Financial 589:Marketing 434:Factoring 429:Insurance 331:Commodity 324:Economics 3216:Category 3183:IBM Plex 3038:Board of 2931:Big Blue 2731:Honolulu 2640:Merative 2625:EduQuest 2608:Taligent 2577:Research 2514:entities 2512:Business 2453:OpenQASM 2381:Cloudant 2351:ThinkPad 2274:Quantum 2222:Hardware 2214:Products 1909:Comscore 1692:pg 172. 1623:See also 1374:security 1368:Security 1344:and the 1328:Concerns 1049:internet 1038:Commerce 880:Patterns 860:Conflict 845:Behavior 785:Security 762:Resource 747:Property 710:services 667:Incident 606:Conflict 562:Capacity 265:Chairman 220:Contract 3226:Commons 3193:ScicomP 2736:Seattle 2689:Towers 2635:Lexmark 2630:Kyndryl 2572:Red Hat 2521:Current 2492:Granite 2487:Watsonx 2403:Fortran 2331:PowerPC 2258:Storage 2229:Current 2192:History 2184:History 1618:issues. 1590:Netflix 1499:privacy 1276:service 1197:History 1135:scholar 1099:removed 1084:sources 855:Culture 805:Systems 790:Service 769:  757:Records 752:Quality 742:Project 737:Product 727:Process 706:  687:Network 656:  638:  611:Content 418:Finance 100:Company 3198:Unions 2809:Fellow 2620:Cognos 2593:AdStar 2586:Former 2550:Kenexa 2528:Apptio 2482:Watson 2448:Qiskit 2314:Former 2303:Condor 2293:Osprey 2268:DS8000 2048:5 June 1853:  1793:  1755:  1725:  1696:  1676:  1497:, and 1389:, and 1212:Amazon 1137:  1130:  1123:  1116:  1108:  817:Talent 773:crisis 699:Office 572:Change 3096:Other 2567:Press 2560:India 2376:Cloud 2364:Other 2298:Heron 2288:Eagle 2241:IBM Z 1894:ZDNet 1829:(PDF) 1142:JSTOR 1128:books 903:Trade 885:Space 780:Sales 722:Power 677:Legal 547:Brand 542:Asset 65:Audit 3241:FOSS 2966:CEOs 2870:DRAM 2465:SPSS 2408:ILOG 2050:2021 2024:2022 1998:2010 1851:ISBN 1837:2022 1791:ISBN 1753:ISBN 1723:ISBN 1694:ISBN 1674:ISBN 1282:and 1220:Etsy 1216:eBay 1114:news 1082:any 1080:cite 767:Risk 82:list 2176:IBM 1422:or 1364:. 1241:not 1218:or 1093:by 1053:IBM 1032:or 509:Tax 3295:: 2127:. 2098:. 2069:. 2058:^ 2041:. 2015:. 1940:^ 1870:. 1773:^ 1737:^ 1721:. 1385:, 1356:, 1266:, 3127:/ 2671:) 2667:( 2168:e 2161:t 2154:v 2137:. 2113:. 2084:. 2052:. 2026:. 2000:. 1880:. 1839:. 1799:. 1767:. 1731:. 1262:( 1164:) 1158:( 1153:) 1149:( 1139:· 1132:· 1125:· 1118:· 1101:. 1087:. 1014:e 1007:t 1000:v 309:/ 300:/ 281:/ 272:/ 84:) 80:( 20:)

Index

E-business
Business administration
Accounting
Management accounting
Financial accounting
Audit
Business entity
list
Corporate group
Corporation sole
Company
Conglomerate
Holding company
Cooperative
Corporation
Joint-stock company
Limited liability company
Partnership
Privately held company
Sole proprietorship
State-owned enterprise
Corporate governance
Annual general meeting
Board of directors
Supervisory board
Advisory board
Audit committee
Corporate law
Commercial law
Constitutional documents

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.