Tarafdaret al., 2007, "The Impact of Technostress on Role Stress and Productivity", Journal of Management Information Systems, Vol. Weil & Rosen, 1994, "The psychological impact of technology from a global perspective: a study of technological sophistication and technophobia in university students in twenty-three countries", Computers in Human Behavior, Vol.11, No.
Customer's Perception on MTNL Services: An Indian
Viewpoint
KEYWORDS
ABSTRACT
PREAMBLE
VISION FOR TOMORROW
NEED OF THE STUDY
RESEARCH OBJECTIVES
HYPOTHESIS
RESEARCH METHODOLOGY
In general, customers as a source of primary data collection have been studied for the purpose of obtaining information. Primary data regarding customer satisfaction and other feedback for the survey was collected using a questionnaire.
ANALYSIS AND INTERPRETATION
Size 50
The study conducts qualitative research by using survey method for collecting relevant information to analyze the behavior and attitude of respondents towards MTNL connections.
Size 50 Expectation PerceivedQuality
The expectation of phone users is low while the perceived value from MTNL's perceived value is high. The expectation of phone users is low while the perceived value from MTNL's perceived value is high.
Mean values of expectation and satisfaction
FINDING AND DISCUSSION
TANGIBLES
Reliability
Assurance
Responsive
Empathy
CONCLUSION
SUGGESTIONS
N Purohit
M Sherry
KEYWORD
Global Journal of Enterprise Information System Global Journal of Enterprise Informatiesysteem Global Journal of Enterprise Information System.
PREAMBLE PREAMBLE
GENETIC ALGORITHMS VERSUS GENETIC ALGORITHMS VERSUS
CONVENTIONAL SEARCH ALGORITHMSCONVENTIONAL SEARCH ALGORITHMS
Cocomo Model Parameter Estimation Using Genetic Algorithms for RTS Software Projects Page 30 There are a few properties that make it genetic. Genetic algorithms evaluate an individual based on their fitness function rather than the derivative of the function.
PROBLEPROBLE
FITNESS FUNCTIONFITNESS FUNCTION
EFFORT MODEL BASED DLOC EFFORT MODEL BASED DLOC
Cocomo Model Parameter Estimation Using Genetic Algorithms for RTS Software Projects Page 31 to Compute Real-Time Developed Effort. Figures 1–3 show the measured and estimated GA effort, the convergence process for the GAs (i.e. the best-ever VAF curve), and the convergence of the GA model parameters after each generation.
PROPOSED EFFORT MODELS BASED DLOC PROPOSED EFFORT MODELS BASED DLOC
The estimated parameters will significantly generalize the calculation of the effort developed for all projects. In Table 2, we show the actual effort measured over the 18 given projects and the estimated effort based on the GA model.
AND MEAND ME
Estimation of the parameters of the Cocomo model using genetic algorithms for RTS software projects Page 32 Figure:3(a). Estimation of the parameters of the Cocomo model using genetic algorithms for RTS software projects Page 34 Table 6: The tuning parameters for the GA.
RESULTSRESULTS
CONCLUSIONCONCLUSION
We live in the era of social shopping, communities are everywhere and everyone shares information, and until now classic CRM systems operated from static databases. Rather, social CRM systems perform a two-way communication, start a conversation with customers and encourage them to share their thoughts, which is always changing on social media, so that they build a dynamic database and communicate respon- reactions.
ERP SYSTEMS
The community is the first aspect, where the customer gives his opinion about the product or service, and others take these opinions, communicate with each other and express these opinions. All relationship marketing and customer relationship management are worthless if they don't have a proper system behind them.
GLOBAL GLOBAL
THETHE
The interpretation is basically not important, there are authors who do not mention buyer-buyer relationships, but buyer-prospects, which is practically synonymous with the previously discussed processes, but really misleading, because in the background the buyer is in a relationship with his friends and acquaintances. The new direction of marketing also supports communities, which Seth Godin calls tribes and goes into depth when he says that people belong to several tribes based on social motivation and within these tribes communication takes place.
SOCIAL RELATIONS
AND 2.0
Management of Social Relations with the Client Page 42. research is important, because we now need the target segment, the client himself. We must raise the question: is social customer relationship management more than a new channel or a technology question.
SOCIAL MARKETINGSOCIAL MARKETING
There is a trend among researchers who think that social websites will take control of company websites and CRM, and the time has come that we have reached 2011 and the age of "social colonization". The following ages are the "social context". and the "social commerce", but we can already get a glimpse of it with social shopping, where customers are connected to each other, which provides the basis for social customer relationship management systems.
REQUIREMENTS OF SOCIREQUIREMENTS OF SOCI
Profiles: Here you will find customer data, where their actions are summarized in an info stream. Connections: here we can see who customers are related to, it doesn't matter which social media we are talking about, connections count everywhere.
REQUIREMENTS OF SOCI AL CUSTOMER AL CUSTOMER AL CUSTOMER AL CUSTOMER RELATIONSHIP MANAGEM
In those days, there was no technological background management to manage these transactions; which brought a new social media for businesses. Content: This is the most important, where our thoughts, images, videos, links, opinions and problems, everything we want to inform the world about.
RELATIONSHIP MANAGEMRELATIONSHIP MANAGEM
Social Customer Relationship Management Page 45. simplified, so we could only see what we wanted and no more. 2009) Microsoft's Million Members March, Customer Relationship Management Magazine. http://www.vebtraffic.com/social-marketing.php.
UNDERSTANDING CYBER CRIMINALITY
CYBERCYBER
If these strategies would have been followed, the computer technology and the control mechanism could exist at the same level of development. The curriculum of these computer technology courses hardly includes the awareness of cyber crime.
CYBER CRIME CYBER CRIME
The social mechanism in general and the legal mechanism in particular would have to come forward with their regulatory weapons. However, it can be clearly proven that the pace of development of computer technology in relation to the legal mechanism to control cybercrime was not at the same pace where the former has grown by leaps and bounds and the latter remains hidden and dormant.
Cybercrime and its legal control: Stone warfare in the age of the airplane Page 49 The same situation is prevailing in the world. Ignorance of computer-related crime can simply be understood in India when it is located in banks, government offices or sensitive locations; office staff are using simple passwords such as first names, last names, pet names, and school names.
POINT OF VIEWPOINT OF VIEW
Cybercrime and its Legal Control: Battling Stones in the Jet Age Page 51 entire body of criminal law. Cybercrime is equally pernicious, anti-social and has all the features and characteristics of being made a criminal offense but still not within the ambit of the Information Technology Act, 2000 or any other law currently in force.
CYBER CRIME - GRAY AREAS: A COMPARATIVE EVALUATION WITH
Hence, within two years of its creation, most jurists are considering the Information Technology Act, 2000 as obsolete. It is noted that, “Only a recluse would be unaware of the extent to which computers have permeated every aspect of our lives.
CYBER CYBER
HOWEVER, WHAT IS THE SITUATION TODAY?
INDIAN LEGAL SYSTEM INDIAN LEGAL SYSTEM
Besides, what this trio has so far offered to the legal system to deal with the problem of 'Cybercrime' in India. Indian Legal System – A Composite Mixture of Traditional and Modern Interestingly, Indian society is neither completely modernized nor completely traditional.
RELATED ISSUESRELATED ISSUES
CYBER CRIMINALITY CYBER CRIMINALITY
Cybercrime and Its Legal Control: Fighting with Stones in the Jet Age Page 57 caused by the hard blow of an axe. Cybercrime and its legal control: fighting with stones in the jet age Page 58, such as cyberstalking and cyberterrorism.
GLOBALIZATION: CONCEPT NATURE AND SCOPE
Today, due to cyber technology, there has been a complete change in the meaning and methodology of various terminologies in the field of e-commerce. What kind of changes are taking place in the melting pot of cyber technology and the process of globalization.
GLOBALIZATION IN CYBGLOBALIZATION IN CYB
It is interesting to consider the impact analysis of cyber technology on globalization and vice versa. At the same time, what has been the basic requirement of globalization is that cyber technology provided a fertile platform for its growth.
PANDORA'S BOXPANDORA'S BOX
The information stored in the 'pocket form' on different computers or hubs can be accessed from any corner of the world. The last decade of the twentieth century witnessed an exciting and exhaustive explosion in the arena of information augmentation.
Global Journal of Enterprise Information System Global Journal of Enterprise Information System Global Journal of Enterprise Information System Global Journal of Enterprise Information System. A Web Content Management (WCM) system makes it easy to publish content to a website and eliminates the need for the user to have technical knowledge about editing HTML files.
GARTNER DEFINITION OGARTNER DEFINITION O
Such systems allow content creators to add or update content directly on a website without involving an IT department or external company (i.e. Unlike website builders, a WCMS allows non-technical users to make changes to ' make a website with little training WCM systems provide authoring tools that allow users to edit text and upload images and other media in a WYSIWYG fashion (what you see is what you get), i.e.
WHY WCMS ?WHY WCMS ?
A WCMS usually requires an experienced coder to deploy and add features, but is primarily a web maintenance tool for non-technical administrators).
CMS OVERVIEWCMS OVERVIEW
COLLECTIONCOLLECTION
PRIMARY COMPONENT OFPRIMARY COMPONENT OF
MANAGEMENTMANAGEMENT
CAPABILITIES OF WEB CAPABILITIES OF WEB
CAPABILITIES OF WEB CONTENT CONTENT CONTENT CONTENT MANAGEMENT SYSTEM (W
It provides the privilege to the staff (technical and non-technical, i.e. it enables all departments of an organization to update their websites easily without involving the IT Department.) to access and modify relevant information in their sections , but they cannot touch other content articles providing them limited access to content. Content creators take responsibility for the information they provide. Benevolo C and Negri S(2007) “Evaluation of content management systems (CMS): a supply chain analysis” Electronic Journal Information Systems Evaluation Volume 10 Issue 1, p. 9 - 22, available online at www.ejise.com.
Corporate Corporate
The 1 st chapter includes meaning, need, importance, principles and objectives of Corporate
Please check appropriate registration fee for BFI
Student BFI Member Student Non BFI Member
SuBScrIPtIon Form
Blockchain Federation of India
Blockchain Federation of India [BFI]
BYLAWS OF BLOCKCHAIN FEDERATION OF INDIA
BLOCKCHAIN VIRTUAL UNIVERSITY
NAME
PURPOSE
RESTRICTIONS ON ACTIVITIES Section 1. No part of the earnings of the Federation
MEMBERSHIP
OFFICERS
BOARD OF DIRECTORS
BYLAWS OF THE BLOCKCHAIN FEDERATION OF INDIA
These appointed members must sit for the people they replace on the board. Members may be dismissed by a two-thirds vote of the entire board.
STANDING COMMITTEES
The special Officer Nominating Committee will submit a list of candidates for each Officer position to the Federation Manager on or before November 1. The names of these individuals, and other supporting materials deemed appropriate by the Nominating Committee, will be posted on the Board of Directors' password-protected website on or before November 7.
MEMBERSHIP MEETINGS
Directors or Officers, the current Chair of the BFI Nominations Committee and 2 recent Past Chairs will be appointed to resolve any disputes.
AMENDMENTS
INDEMNIFICATION
OTHER PROVISIONS
DISSOLUTION OF THE FEDERATION
MODE OF OPERATION
Copyright Transfer Statement
COPYRIGHT TRANSFER FORM
GJEIS is a methodological journal that focuses on articles about mixed methods research across Enterprise, Information and System. The purpose of VP is to share different views about IT related products and what the individual thinks about it.
10 Incredible Years of GJEIS 2009-2019
The rationale for introducing this QF is to provide insight into structure and pedagogy. It aims to deliver the most visually powerful, immersive and engaging media-rich apps on the web.
About New Submission Policy (NSP) 2019
When a paper is marked for rapid reference during the www.gjeis.com submission line it is reviewed repeatedly and a publication decision is made quickly. GJEIS has developed rapid peer review options to curb some of the unnecessary back and forth between a submitted manuscript and its journal.
FTBS
GJEIS has launched a non-mandatory fast-track examination for fast-track publications to draw attention to important developments in various areas of academic research without compromising on excellence. Please note that we accept a limited number of Fast Track articles in a quarter due to its frequency and the journal's primary email contact for inquiry.
Publication Service
Waiver from Cost Occurred under FTPS
The topics covered by the magazine are IT connections in business and management and other areas related to cyber and its economic areas. The magazine is an international forum for the exchange of ideas, principles and processes regarding the application of various topics of Cyber to organizations, institutions and the world at large.
GJEIS Indexing Till 2018
GJEIS Indexing till 2019
XXXXXXXXXXXXX
Global Journal of
Enterprise Information SystemDeep Learning Architectures is a