Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsNicolas Kourtellis
Social applications implemented on a peer-to-peer (P2P) architecture mine the social graph of their users for improved performance in search, recommendations, resource
sharing and others. In such applications, the social graph that connects their users is distributed on the peer-to-peer system: the traversal of the social graph translates to a socially-informed routing in the peer-to-peer layer.
In this work we introduce the model of a projection graph that is the result of mapping a social graph onto a peer-to-peer network. We analytically formulate the relation between metrics in the social graph and in the projection graph. We focus on three such graph metrics: degree centrality, node betweenness centrality, and edge betweenness centrality. We evaluate experimentally the feasibility of estimating these metrics in the projection graph from the metrics of the social graph. Our experiments on real networks show that when mapping communities of 50-150 users on a peer, there is an optimal organization of the projection graph with respect to degree and node betweenness centrality. In this range, the association between the properties of the social graph and the projection graph is the highest, and thus the properties of the (dynamic) projection graph can be inferred from
the properties of the (slower changing) social graph. We discuss the applicability of our findings to aspects of peer-to-peer systems such as data dissemination, social search, peer vulnerability, and data placement and caching.
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems. Nicolas Kourtellis and Adriana Iamnitchi. In Proceedings of 11th IEEE International Conference on Peer-to-Peer Computing (P2P'11), Kyoto, Japan, Aug 2011
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsNicolas Kourtellis
Social applications implemented on a peer-to-peer (P2P) architecture mine the social graph of their users for improved performance in search, recommendations, resource
sharing and others. In such applications, the social graph that connects their users is distributed on the peer-to-peer system: the traversal of the social graph translates to a socially-informed routing in the peer-to-peer layer.
In this work we introduce the model of a projection graph that is the result of mapping a social graph onto a peer-to-peer network. We analytically formulate the relation between metrics in the social graph and in the projection graph. We focus on three such graph metrics: degree centrality, node betweenness centrality, and edge betweenness centrality. We evaluate experimentally the feasibility of estimating these metrics in the projection graph from the metrics of the social graph. Our experiments on real networks show that when mapping communities of 50-150 users on a peer, there is an optimal organization of the projection graph with respect to degree and node betweenness centrality. In this range, the association between the properties of the social graph and the projection graph is the highest, and thus the properties of the (dynamic) projection graph can be inferred from
the properties of the (slower changing) social graph. We discuss the applicability of our findings to aspects of peer-to-peer systems such as data dissemination, social search, peer vulnerability, and data placement and caching.
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems. Nicolas Kourtellis and Adriana Iamnitchi. In Proceedings of 11th IEEE International Conference on Peer-to-Peer Computing (P2P'11), Kyoto, Japan, Aug 2011
Running head THE IMPORTANCE OF CLARITY AND CONCISENESS1THE .docxtodd521
Running head: THE IMPORTANCE OF CLARITY AND CONCISENESS 1
THE IMPORTANCE OF CLARITY AND CONCISENESS 7
6-2 (The Importance of Clarity and Conciseness)
Chaston D. Carter
Southern New Hampshire University
There have been many issues of ineffective communication causing directives not to be carried out properly due to its unclear nature. For an example there was an email sent out that stated that the recipient (within the R&D team) was to “create a presentation discussing the new product and send it to the departments who are interested.” The sender of the email did not specify the product he was talking about, since there can be multiple products under development in the R&D department. In addition to this, he didn’t list down any specifications of the aforementioned presentation, the agenda, the length, the purpose, and what it should cover. He also failed to elaborate which departments would be considered “interested”, and what would be the basis on which the R&D team should select the departments to whom the presentation is to be sent.
The second example involved a request for help from the Sales department to Technical Support to help them “with a list of the biggest problems with our hot products”. The sales department only mentioned a list of the problems, and didn’t actually list down the problems themselves. If the Technical Support had an idea of the problems that were faced, they would be adequately prepared to deal with them, and appoint the right man for the job. Secondly, the sales team did not elaborate which products it considered the hot products. And lastly, they also did not set an appointment for the meeting, nor did they highlight the impact of the problems on the sales of the product, and consequently, did not communicate effectively the intensity of the situation. The last example included a memo from the Finance department to all departments to “reduce the number of suppliers being used to better control costs”. This is a very general statement and the finance department did not tell how the cost would be saved and how much impact reducing each supplier would bring. They also did not explain how to reduce the suppliers and still carry on the routine tasks normally. No instructions on how to carry out the order accompanied it. After close review of these directives, they seem to lack clarity, which is unacceptable. To improve these messages, we must eliminate certain barriers within in communication. Clarity in communication is essential for effective communication. However, a lot of potential barriers can arise in communication such as messages with complex content, information that is not been transmitted willfully, ineffective communication through the hierarchy, and no trust amongst different parties because of competition. (Boundless, 2016).
There are three main barriers that we have had an issue with, one is which the complexity of our messages is when they are being sent. It very important that when sendi.
1.1.The words ‘data’ and ‘information’ are often used as though they.pdfaquadreammail
1.1.The words ‘data’ and ‘information’ are often used as though they mean exactly the same
thing, but there is a difference. Data are the undigested facts and figures that are collected on
innumerable subjects. You may gather data yourself or use data that have been gathered by other
people.
1.2..Strengths, weaknesses and suggestions. for the main other information sources reviewed .
1.3.The data must be collected carefully because organisation decision-making processes are
based on the generated information from this data. While selecting data and information for
decision-making we must apply some criteria to this selection such as accuracy, validity, clarity
etc.
1.4.
However simple or complex your data set, think about what you might need to do to ensure that
your management of the data respects the terms of your consent, and in particular, the
confidentiality and anonymity that participants were promised.
Take advice from relevant staff in your institution. Your Data Protection manager can advise you
on protocols for handling personal data. Your computing or information services department
should be able to advise you on setting up secure databases for the different forms of data that
will be generated by your research.
As with everything in this guidebook, the earlier you can start to think about these issues, the
better. When you are preparing your research proposal, you need to plan for data management -
this is a requirement for ESRC applications, and increasingly for other funders. If your work will
generate complex or sensitive datasets, you may need to plan and cost some time for a database
manager or information specialist to develop and manage the systems that you need to keep your
data secure.
Do you have suitable arrangements in place for archiving data? Befor you access or collect your
data, you should check institution what requirements they have in place for data storage, and
what facilities are available (e.g. for data archiving).
2.2. Identify a problem or opportunity, Gather information, Analyze the situation,Develop
options, Evaluate alternatives, Select a preferred alternative,Act on the decision.
2.3.There are numerous ways of presenting data to a client but you have to ask yourself several
questions. Who is the client? To what will they respond best? What response do you require?
Will the information and the decisions you made be transferrable between presentational styles?
Will it be a formalpresentation or can you have some fun?
Once you have answered these questions you can then set about shaping your presentation.
Personally if you are able to do so (as in whether the environment within which you will be
presenting is accommodating and data allows you do) I would recommend the use of pictures,
charts and visual stimuli as much as possible; a picture paints a thousand words after all. Of
course if the decisions you have made cannot be transferred into numerical data any pie charts,
bar graphs or statistical analysi.
After studying this chapter, you should be able to do the foll.docxnettletondevon
After studying this chapter, you should be able to do the following:
LO7.1 Apply principles for writing effective emails.
LO7.2 Explain how to handle emotion effectively in online communications.
LO7.3 Describe strategies for managing digital message overload.
LO7.4 Explain characteristics of the emerging Social Age.
LO7.5 Apply principles of effective social media use in professional settings.
LO7.6 Build a credible online reputation.
LO7.7 Describe the ethical use of social media for work.
Learning Objectives
Email and Social Media
for Business Communication
C
h
a
p
t
er
S
ev
en
car03199_ch07_176-210.indd 176 23/11/12 7:56 PM
J
O
H
N
S
O
N
,
O
L
I
V
I
A
9
1
1
0
WHY DOES T
HIS MATTER?
For nearly two decades, email has been the primary written business communication
tool. In Table 7.1 , you can see that in a recent study, it ranked second in effectiveness
among communication channels for coordinating work. 1 Even with so many emerging
communication tools, email remains the channel of choice . 2
Writing emails will likely consume much of your time early in your career. One
study showed that corporate employees spend 25 percent of their days on email-
related tasks. By comparison, they spend 14 percent of their time in personal meet-
ings and 9 percent of their time in phone conversations. 3 Another study found that
corporate workers average
14.5 hours per week
reading and responding
to email. 4 The number of
emails that business profes-
sionals deal with is astound-
ing; the average business
professional receives 58 le-
gitimate (non-spam) emails
per day and writes 33. By
2015, business profession-
als are projected to receive
71 emails per day and
write 41. 5
Emails, however, are not
efficient for all types of writ-
ten communication. Typically,
email is most appropriate for
private communication. For
team and networked commu-
nication, social media tools
such as blogs and wikis are
generally more efficient (see Chapter 2 for distinctions between private, team, and net-
worked communication). Many businesses are now adopting social media (often used
nearly synonymously with terms such as Web 2.0 , Enterprise 2.0, social networking ,
social software , and a variety of other terms) for internal use; however, these tools still
account for a small percentage of business communication. This will change rapidly
over the next decade. Some analysts project that social media tools will dominate busi-
ness communication by the year 2020. 6
In this chapter we first focus on email in the workplace. Then, we discuss the evolv-
ing adoption of social media tools, which is transforming work culture into the Social
Age. Next, we describe how blogs, wikis, and other social media tools are being
used. We conclude with sections about managing your online reputation and using
social media ethically. Examples throughout the chapter come f.
Mission: Possible! Your cognitive future in governmentIBM Government
Read the full report here: http://bit.ly/CognitiveFutureInGov
Welcome to the age of cognitive computing, where intelligent machines simulate human brain capabilities to help solve society’s most vexing problems. Early adopters in government and other industries are already realizing significant value from this innovative technology, and its potential to transform government is enormous. Currently, cognitive systems are helping government organizations navigate complexity in operational environments and foster improved engagement with constituents. Our research indicates that government leaders are poised to embrace this groundbreaking technology and invest in cognitive capabilities to improve outcomes for government organizations across mission areas.
Our team of email consultants have analysed millions of emails, searched for patterns and identified the top 5 trends that you as an email marketer cannot afford to ignore as you lay the foundation of your 2015 email marketing strategy.
Where do the Telecom CXOs Spend Time to Gather Industry/Domain Related Inform...Saumya Verma
When it comes to being an industry leader, what differentiates one vendor from others is how he connects with decision makers of the target customer companies. For this, a vendor should be very much aware of the major touch points between him and the customer. A clear picture of where the customer spends time, what are the touch points and how a customer uses different channels to gather information about the vendors as well as industry/domain information is required to make a good marketing strategy.
This survey was targeted at CXO people of Telecom Companies. The set of respondents includes 290 CXOs across 33 countries, and 54 unique communication service providers (CSP). Out of them, total 21 responses were received.
COMMUNICATION, COLLABORATION, AND TEAMWORK ARE INCREASINGLY IMPORTANT FOR THE...Hirak Kocharee
Information system projects are critical for success of every business in the current competitive business environment. Thus information system projects are undertaken to build robust information system to thrive in the market. Each project has got dedicated resources responsible for delivering particular deliverables and assigned to a team. Each team has members who are experts in their domain but they work in isolation without communication, collaboration and teamwork which leads to project failures. The author attempts to underline the importance of communication, collaboration, and teamwork for the successful completion of information system projects.
In this 21st era of Globalized business era, communication is one the most important issue to
focus on. Communication theories, methods, ways are very sensitive because they are the
building block of all the managerial function of in any business organization. Correspondence is
a wellspring of data to the hierarchical individuals for basic leadership process as it aides
recognizing and evaluating elective course of activities.
Running head THE IMPORTANCE OF CLARITY AND CONCISENESS1THE .docxtodd521
Running head: THE IMPORTANCE OF CLARITY AND CONCISENESS 1
THE IMPORTANCE OF CLARITY AND CONCISENESS 7
6-2 (The Importance of Clarity and Conciseness)
Chaston D. Carter
Southern New Hampshire University
There have been many issues of ineffective communication causing directives not to be carried out properly due to its unclear nature. For an example there was an email sent out that stated that the recipient (within the R&D team) was to “create a presentation discussing the new product and send it to the departments who are interested.” The sender of the email did not specify the product he was talking about, since there can be multiple products under development in the R&D department. In addition to this, he didn’t list down any specifications of the aforementioned presentation, the agenda, the length, the purpose, and what it should cover. He also failed to elaborate which departments would be considered “interested”, and what would be the basis on which the R&D team should select the departments to whom the presentation is to be sent.
The second example involved a request for help from the Sales department to Technical Support to help them “with a list of the biggest problems with our hot products”. The sales department only mentioned a list of the problems, and didn’t actually list down the problems themselves. If the Technical Support had an idea of the problems that were faced, they would be adequately prepared to deal with them, and appoint the right man for the job. Secondly, the sales team did not elaborate which products it considered the hot products. And lastly, they also did not set an appointment for the meeting, nor did they highlight the impact of the problems on the sales of the product, and consequently, did not communicate effectively the intensity of the situation. The last example included a memo from the Finance department to all departments to “reduce the number of suppliers being used to better control costs”. This is a very general statement and the finance department did not tell how the cost would be saved and how much impact reducing each supplier would bring. They also did not explain how to reduce the suppliers and still carry on the routine tasks normally. No instructions on how to carry out the order accompanied it. After close review of these directives, they seem to lack clarity, which is unacceptable. To improve these messages, we must eliminate certain barriers within in communication. Clarity in communication is essential for effective communication. However, a lot of potential barriers can arise in communication such as messages with complex content, information that is not been transmitted willfully, ineffective communication through the hierarchy, and no trust amongst different parties because of competition. (Boundless, 2016).
There are three main barriers that we have had an issue with, one is which the complexity of our messages is when they are being sent. It very important that when sendi.
1.1.The words ‘data’ and ‘information’ are often used as though they.pdfaquadreammail
1.1.The words ‘data’ and ‘information’ are often used as though they mean exactly the same
thing, but there is a difference. Data are the undigested facts and figures that are collected on
innumerable subjects. You may gather data yourself or use data that have been gathered by other
people.
1.2..Strengths, weaknesses and suggestions. for the main other information sources reviewed .
1.3.The data must be collected carefully because organisation decision-making processes are
based on the generated information from this data. While selecting data and information for
decision-making we must apply some criteria to this selection such as accuracy, validity, clarity
etc.
1.4.
However simple or complex your data set, think about what you might need to do to ensure that
your management of the data respects the terms of your consent, and in particular, the
confidentiality and anonymity that participants were promised.
Take advice from relevant staff in your institution. Your Data Protection manager can advise you
on protocols for handling personal data. Your computing or information services department
should be able to advise you on setting up secure databases for the different forms of data that
will be generated by your research.
As with everything in this guidebook, the earlier you can start to think about these issues, the
better. When you are preparing your research proposal, you need to plan for data management -
this is a requirement for ESRC applications, and increasingly for other funders. If your work will
generate complex or sensitive datasets, you may need to plan and cost some time for a database
manager or information specialist to develop and manage the systems that you need to keep your
data secure.
Do you have suitable arrangements in place for archiving data? Befor you access or collect your
data, you should check institution what requirements they have in place for data storage, and
what facilities are available (e.g. for data archiving).
2.2. Identify a problem or opportunity, Gather information, Analyze the situation,Develop
options, Evaluate alternatives, Select a preferred alternative,Act on the decision.
2.3.There are numerous ways of presenting data to a client but you have to ask yourself several
questions. Who is the client? To what will they respond best? What response do you require?
Will the information and the decisions you made be transferrable between presentational styles?
Will it be a formalpresentation or can you have some fun?
Once you have answered these questions you can then set about shaping your presentation.
Personally if you are able to do so (as in whether the environment within which you will be
presenting is accommodating and data allows you do) I would recommend the use of pictures,
charts and visual stimuli as much as possible; a picture paints a thousand words after all. Of
course if the decisions you have made cannot be transferred into numerical data any pie charts,
bar graphs or statistical analysi.
After studying this chapter, you should be able to do the foll.docxnettletondevon
After studying this chapter, you should be able to do the following:
LO7.1 Apply principles for writing effective emails.
LO7.2 Explain how to handle emotion effectively in online communications.
LO7.3 Describe strategies for managing digital message overload.
LO7.4 Explain characteristics of the emerging Social Age.
LO7.5 Apply principles of effective social media use in professional settings.
LO7.6 Build a credible online reputation.
LO7.7 Describe the ethical use of social media for work.
Learning Objectives
Email and Social Media
for Business Communication
C
h
a
p
t
er
S
ev
en
car03199_ch07_176-210.indd 176 23/11/12 7:56 PM
J
O
H
N
S
O
N
,
O
L
I
V
I
A
9
1
1
0
WHY DOES T
HIS MATTER?
For nearly two decades, email has been the primary written business communication
tool. In Table 7.1 , you can see that in a recent study, it ranked second in effectiveness
among communication channels for coordinating work. 1 Even with so many emerging
communication tools, email remains the channel of choice . 2
Writing emails will likely consume much of your time early in your career. One
study showed that corporate employees spend 25 percent of their days on email-
related tasks. By comparison, they spend 14 percent of their time in personal meet-
ings and 9 percent of their time in phone conversations. 3 Another study found that
corporate workers average
14.5 hours per week
reading and responding
to email. 4 The number of
emails that business profes-
sionals deal with is astound-
ing; the average business
professional receives 58 le-
gitimate (non-spam) emails
per day and writes 33. By
2015, business profession-
als are projected to receive
71 emails per day and
write 41. 5
Emails, however, are not
efficient for all types of writ-
ten communication. Typically,
email is most appropriate for
private communication. For
team and networked commu-
nication, social media tools
such as blogs and wikis are
generally more efficient (see Chapter 2 for distinctions between private, team, and net-
worked communication). Many businesses are now adopting social media (often used
nearly synonymously with terms such as Web 2.0 , Enterprise 2.0, social networking ,
social software , and a variety of other terms) for internal use; however, these tools still
account for a small percentage of business communication. This will change rapidly
over the next decade. Some analysts project that social media tools will dominate busi-
ness communication by the year 2020. 6
In this chapter we first focus on email in the workplace. Then, we discuss the evolv-
ing adoption of social media tools, which is transforming work culture into the Social
Age. Next, we describe how blogs, wikis, and other social media tools are being
used. We conclude with sections about managing your online reputation and using
social media ethically. Examples throughout the chapter come f.
Mission: Possible! Your cognitive future in governmentIBM Government
Read the full report here: http://bit.ly/CognitiveFutureInGov
Welcome to the age of cognitive computing, where intelligent machines simulate human brain capabilities to help solve society’s most vexing problems. Early adopters in government and other industries are already realizing significant value from this innovative technology, and its potential to transform government is enormous. Currently, cognitive systems are helping government organizations navigate complexity in operational environments and foster improved engagement with constituents. Our research indicates that government leaders are poised to embrace this groundbreaking technology and invest in cognitive capabilities to improve outcomes for government organizations across mission areas.
Our team of email consultants have analysed millions of emails, searched for patterns and identified the top 5 trends that you as an email marketer cannot afford to ignore as you lay the foundation of your 2015 email marketing strategy.
Where do the Telecom CXOs Spend Time to Gather Industry/Domain Related Inform...Saumya Verma
When it comes to being an industry leader, what differentiates one vendor from others is how he connects with decision makers of the target customer companies. For this, a vendor should be very much aware of the major touch points between him and the customer. A clear picture of where the customer spends time, what are the touch points and how a customer uses different channels to gather information about the vendors as well as industry/domain information is required to make a good marketing strategy.
This survey was targeted at CXO people of Telecom Companies. The set of respondents includes 290 CXOs across 33 countries, and 54 unique communication service providers (CSP). Out of them, total 21 responses were received.
COMMUNICATION, COLLABORATION, AND TEAMWORK ARE INCREASINGLY IMPORTANT FOR THE...Hirak Kocharee
Information system projects are critical for success of every business in the current competitive business environment. Thus information system projects are undertaken to build robust information system to thrive in the market. Each project has got dedicated resources responsible for delivering particular deliverables and assigned to a team. Each team has members who are experts in their domain but they work in isolation without communication, collaboration and teamwork which leads to project failures. The author attempts to underline the importance of communication, collaboration, and teamwork for the successful completion of information system projects.
In this 21st era of Globalized business era, communication is one the most important issue to
focus on. Communication theories, methods, ways are very sensitive because they are the
building block of all the managerial function of in any business organization. Correspondence is
a wellspring of data to the hierarchical individuals for basic leadership process as it aides
recognizing and evaluating elective course of activities.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
2. Introduction
Effectively cascading the outcome of a meeting is as important, if not
more than the meeting itself.
Distorted messages may not only be ineffective, but also produce just
the opposite of desired objectives
Effective communication is a skill that can and should be acquired, and
this entails employing the right communication medium at the right
time
2
3. Modes of Communication
For the purpose of this presentation, I will classify the modes of communication
into different pairs of juxtaposition:
1. Personal vs Impersonal
2. Synchronous vs Asynchronous
3. Electronic vs Manual
4. Oral vs written
3
5. Determinants of Means/Modes of Communication
Urgency of the information
Size of Audience
Confidentiality
Importance
Status of the recipient
Situational context
5
6. Dynamics of Information Cascade
Given it is known that the audience of the information to be cascaded is
geographically dispersed, I would approach the determination of the suitable means
of communication by considering 2 factors:
1. Importance of the message
2. Urgency of the message
Figure 1 (next slide) is a 2-dimensional chart showing the proposed means of
communication to be adopted under the four possible scenarios when both factors
are considered, which are:
Scenario 1: Urgent and Important Information
Scenario 2: Urgent but not important information
Scenario 3: Important but not urgent information
Scenario 4: Information lacking importance and not urgent.
6
7. Dynamics of Information Cascade
Figure 1: Dynamics of Communication
Importance
Low High
Low High
Urgency
Email; Intranet
Town hall session;
webcasts;
videoconferencing
Text message
broadcast; Email
Organisation’s website,
notice board; social
media
Source: Author
7
Newspaper;
8. Subordinates
In order to communicate the outcome of the meeting to staff, I would consider
using email in the first instance. If the information to be cascaded is expected
to elicit questions and answers, I would arrange for the creation of a intranet
portal (if it doesn’t yet exist) where the message can be pasted, questions
asked and feedback given.
If the information is important, sensitive but not urgent, organising a live
webcast or video conferencing of the various staff locations (in groups) may be
applicable.
8
Application
9. Clients
Urgent and important information could be communicated by email. Blind-copying
the recipients will be appropriate if information is competition
sensitive.
Unimportant and non-urgent information may be published in national dailies
or the organisation’s website.
9
Application (continued)
10. Suppliers
10
Application (continued)
As for clients, urgent and important information could be communicated by
email. Blind-copying the recipients will be appropriate if information is
competition sensitive.
Unimportant and non-urgent information may be published in national dailies
or the organisation’s website.
Furthermore, if the information is important but not urgent, I would consider
calling a face-to-face meeting with suppliers.
Commercial information could also be shared via electronic data interchange
platforms where they exist