E-Business and Telecommunications

With the development of new multimedia applications, telecommunication networks should be developed to offer real QoS. Different protocols such as MPLS, IntServ and DiffServ introduce new mechanisms which can be used to offer QoS in high speed Next Generation Networks (NGN). This paper is focused essentially on QoS and QoE mechanisms in wired and wireless networks through the presentation of communication architectures and protocols.

[1]  Michael A. Cusumano,et al.  Platform Leadership How Intel, Microsoft, and Cisco Drive Industry Innovation , 2002 .

[2]  Johann Cas Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions , 2011, Computers, Privacy and Data Protection.

[3]  Dimitris Gritzalis,et al.  A Secure Smartphone Applications Roll-out Scheme , 2011, TrustBus.

[4]  Dai Hai-qun,et al.  On relationship marketing , 2005 .

[5]  Dimitris Gritzalis,et al.  In Cloud We Trust: Risk-Assessment-as-a-Service , 2013, IFIPTM.

[6]  Christopher Pearson Fazekas 1984 Is Still Fiction: Electronic Monitoring in the Workplace and U.S. Privacy Law , 2004 .

[7]  Alicja Mikołajewicz-Woźniak,et al.  Virtual currency schemes – the future of financial services , 2015 .

[8]  S. Nason Free: The future of a radical price , 2010 .

[9]  Jean-Charles Rochet,et al.  Cooperation Among Competitors: Some Economics of Payment Card Associations , 2002 .

[10]  Byron Sharp,et al.  Loyalty programs and their impact on repeat-purchase loyalty patterns , 1997 .

[11]  M. Armstrong Competition in Two-Sided Markets ¤ , 2005 .

[12]  Dimitris Gritzalis,et al.  Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..

[13]  Pieter Ballon,et al.  Business Model Scenarios for Remote Management , 2007, J. Theor. Appl. Electron. Commer. Res..

[14]  G. Balabanis,et al.  Bases of e-store loyalty: Perceived switching barriers and satisfaction , 2006 .

[15]  Franck Dumortier Facebook and Risks of "De-contextualization" of Information , 2010, Data Protection in a Profiled World.

[16]  J. Rochet,et al.  Platform competition in two sided markets , 2003 .

[17]  F. Webster The Changing Role of Marketing in the Corporation , 1992 .

[18]  Bart W. Schermer,et al.  The limits of privacy in automated profiling and data mining , 2011, Comput. Law Secur. Rev..

[19]  F. F. Reichheld,et al.  Zero defections: quality comes to services. , 1990, Harvard business review.

[20]  Panayiotis Kotzanikolaou,et al.  Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects , 2011, CRITIS.

[21]  Julie E. Cohen Examined Lives: Informational Privacy and the Subject as Object , 2000 .

[22]  Thomas Cortade A Strategic Guide on Two-Sided Markets Applied to the ISP Market , 2007 .

[23]  Nick Barker,et al.  Buy now fly later: an investigation of airline frequent flyer programmes. , 1996 .

[24]  Luca Buccoliero,et al.  Emerging Trends in Local Governments Web Strategies - Citizen Web Empowerment Assessment in Italy , 2013, DCNET/ICE-B/OPTICS.

[25]  Pieter Ballon,et al.  The Platformisation of the European Mobile Industry , 2009 .

[26]  Denish Shah,et al.  Building and sustaining profitable customer loyalty for the 21st century , 2004 .

[27]  Serge Gutwirth,et al.  Regulating Profiling in a Democratic Constitutional State , 2008, Profiling the European Citizen.

[28]  C. Ranaweera,et al.  On the relative importance of customer satisfaction and trust as determinants of customer retention and positive word of mouth , 2003 .

[29]  Patricia S. Abril,et al.  Blurred Boundaries: Social Media Privacy and the Twenty‐First‐Century Employee , 2012 .

[30]  Lilian Mitrou The impact of communications data retention on fundamental rights and democracy – the case of the EU Data Retention Directive , 2010 .

[31]  Alexander Osterwalder,et al.  The business model ontology a proposition in a design science approach , 2004 .

[32]  L. O’Malley Can loyalty schemes really build loyalty , 1998 .

[33]  U. McMahon-Beattie,et al.  Influences on loyalty programme effectiveness: a conceptual framework and case study investigation , 2000 .

[34]  Pieter Ballon,et al.  Business Modelling Revisited: The Configuration of Control and Value , 2007 .

[35]  M. Uncles,et al.  Do Customer Loyalty Programs Really Work , 1997 .

[36]  Dimitris Gritzalis,et al.  A Formally Verified Mechanism for Countering SPIT , 2010, CRITIS.

[37]  H. Chesbrough Open Business Models: How to Thrive in the New Innovation Landscape , 2006 .