XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Electronic commerce

Articles & Features

SECTION: Features

An interview with Owen McCall from TREECYCLE

Is cryptocurrency necessarily energy-consuming? Can we use blockchain to facilitate sustainable development? This interview presents insights into an investment project rooted in sustainability, bridging finance and ecology.

By Jiayi Li, Yingfei Wang, June 2021

PDF | HTML | In the Digital Library

Digital development in a remote paradise

International exposure impacts your views on technology, design, consumption, and adoption, and sometimes technology is not even the direct solution. Building a digital ecosystem entails the right policy mix to support the expansion of mobile broadband coupled with complementary policies to boost affordability and digital skills for underserved groups.

By Jimena Luna, March 2021

PDF | HTML | In the Digital Library

Cyber security in Africa: The boring technology story that matters

Cyber security in Africa: The boring technology story that matters

Cybersecurity involves protection of computer systems from theft, damage, or manipulation to the hardware, software, or the data contained on them. A limitless cyberspace, little to no boundaries, and eroding national borders is making Africa vulnerable to cyber threats and potential harms. Cybersecurity represents serious economic and national security challenges, which need to be properly defined and contextualized.

By Hood Mukiibi, November 2019

PDF | HTML | In the Digital Library

COLUMN: Letter from the editors

The winding road toward innovation

By Diane Golay, January 2019

PDF | HTML | In the Digital Library

DEPARTMENT: Hello world

The holy grail of online identity

By Pushkaraj Bhirud, January 2019

PDF | HTML | In the Digital Library

Technology in defense of democracy

COLUMN: Letter from the editors

Technology in defense of democracy

By Jennifer Jacobs, April 2017

PDF | HTML | In the Digital Library

Tech for crises

COLUMN: INIT

Tech for crises

By Rahul R. Divekar, Nidhi Rastogi, April 2017

PDF | HTML | In the Digital Library

In praise of soft skills

COLUMN: Careers

In praise of soft skills

Consider what it takes to stand out as more than just a "good" candidate.

By Christopher Hazlett, April 2017

PDF | HTML | In the Digital Library

From social movements to social surveillance

SECTION: Features

From social movements to social surveillance

How the technology of the Occupy movement became a mobile app for policing.

By Joan Donovan, April 2017

PDF | HTML | In the Digital Library

Filter bubbles and fake news

Filter bubbles and fake news

The results of the 2016 Brexit referendum in the U.K. and presidential election in the U.S. surprised pollsters and traditional media alike, and social media is now being blamed in part for creating echo chambers that encouraged the spread of fake news that influenced voters.

By Dominic DiFranzo, Kristine Gloria-Garcia, April 2017

PDF | HTML | In the Digital Library

Managing crises, one text at a time

Managing crises, one text at a time

Crisis Text Line CTO Jason Bennett shares his insight on the technology behind this helpline using text to reach people in need of counseling during times of crisis.

By Rahul R. Divekar, Nidhi Rastogi, April 2017

PDF | HTML | In the Digital Library

What is Bitcoin?

What is Bitcoin?

Strengths and weaknesses of the leader in a new generation of emerging cryptocurrencies.

By Dominic Hobson, September 2013

PDF | HTML | In the Digital Library

D-Lab-ICT: spreading ICT innovation

DEPARTMENT: Labz

D-Lab-ICT: spreading ICT innovation

By Jonathan Kola, December 2012

PDF | HTML | In the Digital Library

Behold a pail of milk

COLUMN: INIT: issue introduction

Behold a pail of milk

By Malay Bhattacharyya, Vaggelis Giannikas, March 2011

PDF | HTML | In the Digital Library

What can gold farmers teach us about criminal networks?

SECTION: Features

What can gold farmers teach us about criminal networks?

By observing how covert financial networks operate in online games like World of Warcraft, we can learn about how they might function offline.

By Brian Keegan, Muhammad Aurangzeb Ahmad, Dmitri Williams, Jaideep Srivastava, Noshir Contractor, March 2011

PDF | HTML | In the Digital Library

Catching bad guys with graph mining

Catching bad guys with graph mining

Suspicious network patterns may be the key to detecting criminals and fraudsters on e-commerce sites.

By Polo Chau, March 2011

PDF | HTML | In the Digital Library

The 'Internet of Things' and commerce

The 'Internet of Things' and commerce

Everything, everywhere, tagged and tracked. How can this data be harnessed to deliver better products and services?

By Mark Harrison, March 2011

PDF | HTML | In the Digital Library

The problem of money as a measuring stick

The problem of money as a measuring stick

A more accurate measuring instrument may be found in stable money baskets built by computers and mathematics.

By Nikolai V. Hovanov, James W. Kolari, Mikhail V. Sokolov, March 2011

PDF | HTML | In the Digital Library

An interview with Greg Schwartz

An interview with Greg Schwartz

The CIO of USAA, a full-service, branchless financial services operation, sees much more to banking than e-transactions.

By James Stanier, March 2011

PDF | HTML | In the Digital Library

E-Shopping

DEPARTMENT: Back

E-Shopping

By James Stanier, March 2011

PDF | HTML | In the Digital Library

The business of clouds

The business of clouds

At the turn of the 20th century, companies stopped generating their own power and plugged into the electricity grid. In his now famous book The Big Switch, Nick Carr analogizes those events of a hundred years ago to the tectonic shift taking place in the technology industry today.

By Guy Rosen, March 2010

PDF | HTML | In the Digital Library

AmazonViz

This article describes a technique to visualize query results, representing purchase orders placed on Amazon.com, along a traditional 2-D scatter plot and a space-filling spiral. We integrate 3-D objects that vary their spatial placement, color, and texture properties into a visualization algorithm. This algorithm represents important aspects of a purchase order based on experimental results from human vision, computer graphics, and psychology. The resulting visual abstractions are used by viewers to rapidly and effectively explore and analyze the underlying purchase orders data.

By Amit Prakash Sawant, Christopher G. Healey, Dongfeng Chen, Rada Chirkova, March 2009

PDF | HTML | In the Digital Library

Digital blasphemy

By Cara Cocking, December 2008

PDF | HTML | In the Digital Library

RAS

By Jarrod Trevathan, Wayne Read, August 2006

PDF | HTML | In the Digital Library

Service discovery in the future for mobile commerce

By Dipanjan Chakraborty, Harry Chen, December 2000

PDF | HTML | In the Digital Library

E-commerce

By Wael Hassan, September 2000

PDF | HTML | In the Digital Library

Signing electronic contracts

Electronic commerce faces the problem of signing electronic contracts. Three approaches for handling electronic contracts include 1) no trusted third party protocols, 2) strongly-trusted third party protocols and 3) weakly-trusted third party protocols. A secondary problem facing electronic commerce is self-enforcing contract design.

By David Molnar, September 2000

PDF | HTML | In the Digital Library

Cookies

By Michael Nelte, Elton Saul, September 2000

PDF | HTML | In the Digital Library

Designing an e-commerce site for users

By Norbert J. Kubilus, September 2000

PDF | HTML | In the Digital Library