SlideShare a Scribd company logo
1 of 4
Download to read offline
MOST VIEWED ARTICLE
(CURRENT ISSUE) IN
ACADEMIA
INTERNATIONAL JOURNAL OF MANAGING INFORMATION
TECHNOLOGY (IJMIT)
http://airccse.org/journal/ijmit/ijmit.html
ISSN: 0975-5586 (ONLINE); 0975-5926 (PRINT)
DEVELOPING THE E-COMMERCE MODEL A CONSUMER TO
CONSUMER USING BLOCKCHAIN NETWORK TECHNIQUE
1
Samer Shorman, 2
Mohammad Allaymoun, 3
Omer Hamid
1
Department of Computer Science, Applied Science University, Kingdom of Bahrain
2,3
Administrative & Financial Sciences, AMA International University, Kingdom of Bahrain
ABSTRACT
E-commerce has increased recently because of the development of the internet and has become a new
concept that is applicable to trade transaction and services providing, using information technology. This
is known as e-commerce that is a means of communicating information products or services through
technical tools. This research proposed model is able to take advantage of Block chain technology to
develop e-commerce especially consumer to consumer. The proposed model adds some advantages to
ecommerce operations, and the possibility of developing them to reach a high percentage of profits by
using block chain technology which led to verify the information of products offered for sale. In addition,
to the possibility of distributing feedback to all Block chain users, through which it develops the
mechanism of trust and cooperation between consumers, it is considered a reference point to explore the
behaviour of commercial consumers which is stored in the data file of consumers. This model facilitates
business processes between consumer and consumer, eliminates the central role of large business
companies in controlling and setting restrictions, and to the development and expansion of this type of
trade.
KEYWORDS
Blockchain, Network, E-Commerce, Consumer To Consumer
For More Details: http://aircconline.com/ijmit/V11N2/11219ijmit04.pdf
http://airccse.org/journal/ijmit/vol11.html
REFERENCES
[1] Nanehkaran, Y.A (2013). An introduction to electronic commerce. International journal of scientific
& technology research, 2(4). Retrieved from http://www.ijstr.org/final-print/apr2013/AnIntroduction- To
Electronic-Commerce.pdf.
[2] Ohidujjaman, Hasan, M. & Huda, M.N. (2013). Ecommerce Challenges, Solutions and Effectiveness
Perspective Bangladesh. International Journal of Computer Applications, 70(9).9-17. Retrieved from
http://icdst.org/pdfs/files/5f540f8a517ec822aaba2ad7869dcdec.pdf.
[3] Gunasekaran, A., et al. "E-commerce and its impact on operations management."International journal
of production economics 75.1 (2002): 185-197.
[4] Lifang Peng, Zhong Chen, Qi Li, "Model and Method for Evaluating Creditability of C2C Electronic
Trade", ICEC'06, August 2006.
[5] Kim, T. Y., Dekker, R., & Heij, C. (2017). Cross-border electronic commerce: Distance effects and
express delivery in European Union markets. International Journal of Electronic Commerce, 21(2),
184–218.
[6] Egger, F. and B. de Groot. (2000). “Developing aModel of Trust for Electronic Commerce: An
Application to a Permissive Marketing Web Site.” In Proceedings of the 9th International World Wide
Web Conference Foretec Seminars.
[7] Hall, L. L., Paso, E., López, F. J., & College, M. S. (2008). Measuring E-Commerce Technology
Enabled Business Value: An Exploratory Research. International Journal of E-Business Research,
4(2), 48-68.
[8] Huang, Z., & Benyoucef, M. (2012). From E-commerce to Social Commerce: A Close Look at Design
Features. Electronic Commerce Research and Applications.
[9] Dylan Yaga,Peter Mell,Nik Roby,Karen Scarfone,(2018).Blockchain Technology Overview.NISTIR
8202.https://doi.org/10.6028/NIST.IR.8202.
[10] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the internet of things,"
IEEE Access, vol. 4, pp. 2292-2303, 2016.
[11] C. Natoli and V. Gramoli, “The blockchain anomaly," in 15th International Symposium on Network
Computing and Applications (NCA), 310-317, IEEE, 2016.
[12] Clemons, E.K. An empirical investigation of third-party seller rating systems in e-commerce: The
case of buySAFE. Journal of Management Information Systems, 24, 2 (2007), 43-71.
[13] Pradnya B. Rane, Dr. B.B.Meshram. "Transaction Security for Ecommerce Application" IJECSE -
ISSN2277-1956. 2012.
[14] Hall, L. L., Paso, E., López, F. J., & College, M. S. (2008). Measuring E-Commerce Technology
Enabled Business Value: An Exploratory Research. International Journal of E-Business Research, 4(2),
48-68.
[15] Peck, Morgen E. “Do You Need a Blockchain?” IEEE Spectrum: Technology, Engineering, and
Science News, IEEE Spectrum, September 29, 2017, https://spectrum.ieee.org/computing/networks/do-
you-need-a-blockchain.
[16] Q. K. Nguyen, “Blockchain-A Financial Technology for Future Sustainable Development,” in Green
Technology and Sustainable Development (GTSD), 2016, pp. 51–54.
[17] Y. Yuan and F. Y. Wang, “Towards blockchain-based intelligent transportation systems,” in 2016
IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), 2016, pp. 2663–
2668.
[18] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.
[19] M. Mettler, “Blockchain technology in healthcare: The revolution starts here,” in e-Health
Networking, Applications and Services (Healthcom), 2016 IEEE 18th International Conference on, 2016,
pp. 1–3.
[20] Reid, F. and Harrigan, M. An analysis of anonymity in the bitcoin system. In Proceedings of the
Third IEEE International Conference on Social Computing (Boston, MA, Oct. 9–11). IEEE Press, 2011,
1318–1326.
[21] X. Xu, C. Pautasso, L. Zhu, V. Gramoli, A. Ponomarev, A. B. Tran, and S. Chen, “The blockchain as
a software connector," in 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA),
pp. 182-191, IEEE, 2016.
[22] G. Karame, “On the security and scalability of bitcoin’s blockchain,” in Proceedings of the 2016
ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016, pp. 1861–1862.
[23] Medium , https://medium.com/@imarticus/infographics-what-is-blockchain-6a1f93e64e79
[24] Mahdi H. Miraz, Maaruf Ali ,(2018).Applications of Blockchain Technology beyond
Cryptocurrency,Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281,
Online ISSN: 2516-029X, pp. 1-6, Vol. 2, No. 1, 1st January 2018, Available:
http://aetic.theiaer.org/archive/v2n1/p1.pdf
[25] Yu Zhang and Jiangtao Wen,(2017).The IoT electric business model: Using blockchain technology
for the internet of things,Peer-to-Peer Networking and Applications, July 2017, Volume 10, Issue 4, pp
983–994
[26] Zott C, Amit R (2008) The fit between product market strategy and business model: implications for
firm performance [J]. Strateg Manag J 29(1):1–26
[27] Hemang Subramanian ,(2018).Decentralized Block chain-Based Electronic Marketplaces,
Communications of the ACM, Vol. 61 No. 1, Pages 78-84,10.1145/315833.

More Related Content

What's hot

Informatics Engineering, an International Journal (IEIJ)
Informatics Engineering, an International Journal (IEIJ)Informatics Engineering, an International Journal (IEIJ)
Informatics Engineering, an International Journal (IEIJ)ieijjournal
 
The road to internet of things :a survey
The road to internet of things :a surveyThe road to internet of things :a survey
The road to internet of things :a surveySana
 
E-government Security Models
E-government Security ModelsE-government Security Models
E-government Security ModelsEditor IJCATR
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...IJNSA Journal
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IJNSA Journal
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
International Journal of Multimedia & Its Applications (IJMA)
International Journal of Multimedia & Its Applications (IJMA)International Journal of Multimedia & Its Applications (IJMA)
International Journal of Multimedia & Its Applications (IJMA)ijma
 
Future Internet: Challenge And Research Trend
Future Internet: Challenge And Research TrendFuture Internet: Challenge And Research Trend
Future Internet: Challenge And Research TrendIJERA Editor
 
Artificial intelligence in cyber physical systems
Artificial intelligence in cyber physical systemsArtificial intelligence in cyber physical systems
Artificial intelligence in cyber physical systemsPetar Radanliev
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...IJNSA Journal
 
The International Journal of Multimedia & Its Applications (IJMA)
The International Journal of Multimedia & Its Applications (IJMA) The International Journal of Multimedia & Its Applications (IJMA)
The International Journal of Multimedia & Its Applications (IJMA) ijma
 
Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadJatin Akar
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
MongoDB IoT CITY Tour EINDHOVEN: Machina Research
MongoDB IoT CITY Tour EINDHOVEN: Machina ResearchMongoDB IoT CITY Tour EINDHOVEN: Machina Research
MongoDB IoT CITY Tour EINDHOVEN: Machina ResearchMongoDB
 
The International Journal of Multimedia & Its Applications (IJMA)
The International Journal of Multimedia & Its Applications (IJMA)The International Journal of Multimedia & Its Applications (IJMA)
The International Journal of Multimedia & Its Applications (IJMA)ijma
 
20220228 uc merced maglio_class v14
20220228 uc merced maglio_class v1420220228 uc merced maglio_class v14
20220228 uc merced maglio_class v14ISSIP
 
20220301 digital person v15
20220301 digital person v1520220301 digital person v15
20220301 digital person v15ISSIP
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)ijwscjournal
 
TOP CITED MANAGING INFORMATION TECHNOLOGY ARTICLES Part 1
TOP CITED MANAGING INFORMATION TECHNOLOGY ARTICLES  Part 1TOP CITED MANAGING INFORMATION TECHNOLOGY ARTICLES  Part 1
TOP CITED MANAGING INFORMATION TECHNOLOGY ARTICLES Part 1IJMIT JOURNAL
 

What's hot (20)

Informatics Engineering, an International Journal (IEIJ)
Informatics Engineering, an International Journal (IEIJ)Informatics Engineering, an International Journal (IEIJ)
Informatics Engineering, an International Journal (IEIJ)
 
The road to internet of things :a survey
The road to internet of things :a surveyThe road to internet of things :a survey
The road to internet of things :a survey
 
E-government Security Models
E-government Security ModelsE-government Security Models
E-government Security Models
 
Bim adoptation to sri lanka
Bim adoptation to sri lanka Bim adoptation to sri lanka
Bim adoptation to sri lanka
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
International Journal of Multimedia & Its Applications (IJMA)
International Journal of Multimedia & Its Applications (IJMA)International Journal of Multimedia & Its Applications (IJMA)
International Journal of Multimedia & Its Applications (IJMA)
 
Future Internet: Challenge And Research Trend
Future Internet: Challenge And Research TrendFuture Internet: Challenge And Research Trend
Future Internet: Challenge And Research Trend
 
Artificial intelligence in cyber physical systems
Artificial intelligence in cyber physical systemsArtificial intelligence in cyber physical systems
Artificial intelligence in cyber physical systems
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
The International Journal of Multimedia & Its Applications (IJMA)
The International Journal of Multimedia & Its Applications (IJMA) The International Journal of Multimedia & Its Applications (IJMA)
The International Journal of Multimedia & Its Applications (IJMA)
 
Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
MongoDB IoT CITY Tour EINDHOVEN: Machina Research
MongoDB IoT CITY Tour EINDHOVEN: Machina ResearchMongoDB IoT CITY Tour EINDHOVEN: Machina Research
MongoDB IoT CITY Tour EINDHOVEN: Machina Research
 
The International Journal of Multimedia & Its Applications (IJMA)
The International Journal of Multimedia & Its Applications (IJMA)The International Journal of Multimedia & Its Applications (IJMA)
The International Journal of Multimedia & Its Applications (IJMA)
 
20220228 uc merced maglio_class v14
20220228 uc merced maglio_class v1420220228 uc merced maglio_class v14
20220228 uc merced maglio_class v14
 
20220301 digital person v15
20220301 digital person v1520220301 digital person v15
20220301 digital person v15
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
 
TOP CITED MANAGING INFORMATION TECHNOLOGY ARTICLES Part 1
TOP CITED MANAGING INFORMATION TECHNOLOGY ARTICLES  Part 1TOP CITED MANAGING INFORMATION TECHNOLOGY ARTICLES  Part 1
TOP CITED MANAGING INFORMATION TECHNOLOGY ARTICLES Part 1
 

Similar to MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT)

Top 10 Read articles in Web & semantic technology
 Top  10 Read articles in Web & semantic technology Top  10 Read articles in Web & semantic technology
Top 10 Read articles in Web & semantic technologydannyijwest
 
April 2020 top read artilce in Computer Science and Information Technology
April 2020 top read artilce in  Computer Science and Information TechnologyApril 2020 top read artilce in  Computer Science and Information Technology
April 2020 top read artilce in Computer Science and Information TechnologyAIRCC Publishing Corporation
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
An overview of big data analysis
An overview of big data analysisAn overview of big data analysis
An overview of big data analysisjournalBEEI
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityIAEME Publication
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityIAEME Publication
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityIAEME Publication
 
Protective measures in e commerce to deal with security threats arising
Protective measures in e commerce to deal with security threats arisingProtective measures in e commerce to deal with security threats arising
Protective measures in e commerce to deal with security threats arisingIAEME Publication
 

Similar to MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT) (20)

Top 10 Read articles in Web & semantic technology
 Top  10 Read articles in Web & semantic technology Top  10 Read articles in Web & semantic technology
Top 10 Read articles in Web & semantic technology
 
April 2020 top read artilce in Computer Science and Information Technology
April 2020 top read artilce in  Computer Science and Information TechnologyApril 2020 top read artilce in  Computer Science and Information Technology
April 2020 top read artilce in Computer Science and Information Technology
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
An overview of big data analysis
An overview of big data analysisAn overview of big data analysis
An overview of big data analysis
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
March 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsMarch 2024 - Top 10 Read Articles in Network Security & Its Applications
March 2024 - Top 10 Read Articles in Network Security & Its Applications
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with security
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with security
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with security
 
Protective measures in e commerce to deal with security threats arising
Protective measures in e commerce to deal with security threats arisingProtective measures in e commerce to deal with security threats arising
Protective measures in e commerce to deal with security threats arising
 

More from IJMIT JOURNAL

MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
 
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...IJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
 
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...IJMIT JOURNAL
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTIJMIT JOURNAL
 
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...IJMIT JOURNAL
 
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODEFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODIJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)IJMIT JOURNAL
 
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUETRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUEIJMIT JOURNAL
 
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...IJMIT JOURNAL
 
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGBUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGIJMIT JOURNAL
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONNETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONIJMIT JOURNAL
 
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...IJMIT JOURNAL
 
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMDEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMIJMIT JOURNAL
 
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
 

More from IJMIT JOURNAL (20)

MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
 
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
 
15223ijmit02.pdf
15223ijmit02.pdf15223ijmit02.pdf
15223ijmit02.pdf
 
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
 
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODEFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
 
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUETRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
 
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
 
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGBUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONNETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
 
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
 
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMDEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
 
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
 

Recently uploaded

An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 

Recently uploaded (20)

An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 

MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT)

  • 1. MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT) http://airccse.org/journal/ijmit/ijmit.html ISSN: 0975-5586 (ONLINE); 0975-5926 (PRINT)
  • 2. DEVELOPING THE E-COMMERCE MODEL A CONSUMER TO CONSUMER USING BLOCKCHAIN NETWORK TECHNIQUE 1 Samer Shorman, 2 Mohammad Allaymoun, 3 Omer Hamid 1 Department of Computer Science, Applied Science University, Kingdom of Bahrain 2,3 Administrative & Financial Sciences, AMA International University, Kingdom of Bahrain ABSTRACT E-commerce has increased recently because of the development of the internet and has become a new concept that is applicable to trade transaction and services providing, using information technology. This is known as e-commerce that is a means of communicating information products or services through technical tools. This research proposed model is able to take advantage of Block chain technology to develop e-commerce especially consumer to consumer. The proposed model adds some advantages to ecommerce operations, and the possibility of developing them to reach a high percentage of profits by using block chain technology which led to verify the information of products offered for sale. In addition, to the possibility of distributing feedback to all Block chain users, through which it develops the mechanism of trust and cooperation between consumers, it is considered a reference point to explore the behaviour of commercial consumers which is stored in the data file of consumers. This model facilitates business processes between consumer and consumer, eliminates the central role of large business companies in controlling and setting restrictions, and to the development and expansion of this type of trade. KEYWORDS Blockchain, Network, E-Commerce, Consumer To Consumer For More Details: http://aircconline.com/ijmit/V11N2/11219ijmit04.pdf http://airccse.org/journal/ijmit/vol11.html
  • 3. REFERENCES [1] Nanehkaran, Y.A (2013). An introduction to electronic commerce. International journal of scientific & technology research, 2(4). Retrieved from http://www.ijstr.org/final-print/apr2013/AnIntroduction- To Electronic-Commerce.pdf. [2] Ohidujjaman, Hasan, M. & Huda, M.N. (2013). Ecommerce Challenges, Solutions and Effectiveness Perspective Bangladesh. International Journal of Computer Applications, 70(9).9-17. Retrieved from http://icdst.org/pdfs/files/5f540f8a517ec822aaba2ad7869dcdec.pdf. [3] Gunasekaran, A., et al. "E-commerce and its impact on operations management."International journal of production economics 75.1 (2002): 185-197. [4] Lifang Peng, Zhong Chen, Qi Li, "Model and Method for Evaluating Creditability of C2C Electronic Trade", ICEC'06, August 2006. [5] Kim, T. Y., Dekker, R., & Heij, C. (2017). Cross-border electronic commerce: Distance effects and express delivery in European Union markets. International Journal of Electronic Commerce, 21(2), 184–218. [6] Egger, F. and B. de Groot. (2000). “Developing aModel of Trust for Electronic Commerce: An Application to a Permissive Marketing Web Site.” In Proceedings of the 9th International World Wide Web Conference Foretec Seminars. [7] Hall, L. L., Paso, E., López, F. J., & College, M. S. (2008). Measuring E-Commerce Technology Enabled Business Value: An Exploratory Research. International Journal of E-Business Research, 4(2), 48-68. [8] Huang, Z., & Benyoucef, M. (2012). From E-commerce to Social Commerce: A Close Look at Design Features. Electronic Commerce Research and Applications. [9] Dylan Yaga,Peter Mell,Nik Roby,Karen Scarfone,(2018).Blockchain Technology Overview.NISTIR 8202.https://doi.org/10.6028/NIST.IR.8202. [10] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the internet of things," IEEE Access, vol. 4, pp. 2292-2303, 2016. [11] C. Natoli and V. Gramoli, “The blockchain anomaly," in 15th International Symposium on Network Computing and Applications (NCA), 310-317, IEEE, 2016. [12] Clemons, E.K. An empirical investigation of third-party seller rating systems in e-commerce: The case of buySAFE. Journal of Management Information Systems, 24, 2 (2007), 43-71. [13] Pradnya B. Rane, Dr. B.B.Meshram. "Transaction Security for Ecommerce Application" IJECSE - ISSN2277-1956. 2012. [14] Hall, L. L., Paso, E., López, F. J., & College, M. S. (2008). Measuring E-Commerce Technology Enabled Business Value: An Exploratory Research. International Journal of E-Business Research, 4(2), 48-68.
  • 4. [15] Peck, Morgen E. “Do You Need a Blockchain?” IEEE Spectrum: Technology, Engineering, and Science News, IEEE Spectrum, September 29, 2017, https://spectrum.ieee.org/computing/networks/do- you-need-a-blockchain. [16] Q. K. Nguyen, “Blockchain-A Financial Technology for Future Sustainable Development,” in Green Technology and Sustainable Development (GTSD), 2016, pp. 51–54. [17] Y. Yuan and F. Y. Wang, “Towards blockchain-based intelligent transportation systems,” in 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), 2016, pp. 2663– 2668. [18] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [19] M. Mettler, “Blockchain technology in healthcare: The revolution starts here,” in e-Health Networking, Applications and Services (Healthcom), 2016 IEEE 18th International Conference on, 2016, pp. 1–3. [20] Reid, F. and Harrigan, M. An analysis of anonymity in the bitcoin system. In Proceedings of the Third IEEE International Conference on Social Computing (Boston, MA, Oct. 9–11). IEEE Press, 2011, 1318–1326. [21] X. Xu, C. Pautasso, L. Zhu, V. Gramoli, A. Ponomarev, A. B. Tran, and S. Chen, “The blockchain as a software connector," in 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), pp. 182-191, IEEE, 2016. [22] G. Karame, “On the security and scalability of bitcoin’s blockchain,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016, pp. 1861–1862. [23] Medium , https://medium.com/@imarticus/infographics-what-is-blockchain-6a1f93e64e79 [24] Mahdi H. Miraz, Maaruf Ali ,(2018).Applications of Blockchain Technology beyond Cryptocurrency,Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 1-6, Vol. 2, No. 1, 1st January 2018, Available: http://aetic.theiaer.org/archive/v2n1/p1.pdf [25] Yu Zhang and Jiangtao Wen,(2017).The IoT electric business model: Using blockchain technology for the internet of things,Peer-to-Peer Networking and Applications, July 2017, Volume 10, Issue 4, pp 983–994 [26] Zott C, Amit R (2008) The fit between product market strategy and business model: implications for firm performance [J]. Strateg Manag J 29(1):1–26 [27] Hemang Subramanian ,(2018).Decentralized Block chain-Based Electronic Marketplaces, Communications of the ACM, Vol. 61 No. 1, Pages 78-84,10.1145/315833.