Results 11 to 20 of about 2,093,228 (306)

E-Commerce Japanese Style [PDF]

open access: yes, 1999
Presentation to the Japan Industry and Management of Technology Program (JIMT) on electronic commerce in Japan, how it is different from e-commerce in the US, and the challenges that foreign companies face entering the e-commerce market in Japan.IC2 ...
Katoh, Masanobu
core   +1 more source

Le Brésil et sa généreuse diplomatie : un dragon amical ou un tigre de papier ?

open access: yesRevue Internationale de Politique de Développement, 2012
Jouissant d’une démocratie stable et d’une croissance économique vertigineuse, le Brésil est en passe de devenir une puissance mondiale. Le pays s’attelle aujourd’hui à renforcer ses relations multilatérales et bilatérales en vue de promouvoir le ...
Robert Muggah   +1 more
doaj   +1 more source

Identification of Electronic Commerce Adaption Barriers in Small and Medium Enterprises (SMEs): ACase Study of the Active Firms Based in the Industrial Town of Bushehr City [PDF]

open access: yesکاوش‌های مدیریت بازرگانی, 2018
The purpose of this study is to identify the barriers of adopting e-commerce in small and medium enterprises. The target population consisted of the managers and the staff of the active companies based in the Industrial town of Bushehr city.
Majid Esmailpoor   +2 more
doaj  

Intereses militares, políticos y comerciales en torno al puerto de Sanlúcar de Barrameda (1567-1602)

open access: yesE-Spania, 2017
Cet article analyse les intérêts militaires, politiques et commerciaux sous-jacents derrière une demande que fit un marchand allemand à la mairie de Sanlúcar de Barrameda afin d'obtenir don titre de résidant de la ville.
Luis Parejo Fernández
doaj   +1 more source

UNDERSTANDING THE STATE BUILDING OF MOUNTED PASTORAL NOMADS ON SEDENTATION AND MERCANTILE ACTIVITY OF KHAZAR KHANATE AND VOLGA BULGARS

open access: yesӘл-Фараби Атындағы Қазақ Ұлттық Университеті хабаршы шығыстану сериясы, 2022
The mounted pastoral nomadism was the dominant socio-economical system in Desht-i Kipchak steppes for thousands of years. However, the state building methods and effectiveness of state building apparatus of mounted pastoral nomadic people were subject of
C. Şimşek
doaj   +1 more source

Internet Commerce Managing Financial on the Internet

open access: yesJournal the Winners, 2001
Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes
Chandra Wibowo Widhianto
doaj   +1 more source

From Empire to Federation

open access: yesLer História, 2023
Lords of All the World is a comparative analysis of the history of the ideologies that shaped the Atlantic empires of Spain, France and Britain from the sixteenth to the nineteenth centuries.
Anthony Pagden
doaj   +1 more source

Impact of Macro Economic Factors and Financial Development on Energy Projects - Case in ASEAN Countries

open access: yesManagement, 2020
ASEAN (The Association of SouthEast Asian Nations) demand on energy is depending on economic growth of each country, resources, and political and regulations of each country.
Hanh Hoang Thanh   +4 more
doaj   +1 more source

Access of Discharged Schizophrenia Patients to Employment and Association Memberships in Turkey [PDF]

open access: yesHospital Practices and Research, 2016
Background: Patients with schizophrenia can experience a deteriorated performance in many of the skills needed in daily life, the workplace, the family circle, or in social interactions.Objective: This definitive study used comparison to evaluate the ...
Nermin Gürhan   +2 more
doaj   +1 more source

Blockchain-Based Secure Credit Card Storage System for E-Commerce

open access: yesSakarya University Journal of Computer and Information Sciences, 2021
Recently, serious damages have occurred in e-commerce applications due to rapidly increasing data leaks and end-user vulnerabilities. Although the source of the vulnerabilities is different, attacks result in the theft of unsafe data.
Burhan Duman, Ahmet Ali Süzen
doaj   +1 more source

Home - About - Disclaimer - Privacy