Trends and Challenges of Electronic Auctions as a New Business Model
Journal Title: TEM JOURNAL - Year 2014, Vol 3, Issue 4
Abstract
The virtual internet based market allowed different forms of trading. Electronic business opens up new markets and market segments. Auctions are a very reliable and competitive trading model which allows to achieve fair prices and to choose the optimal business partners. The purpose of this model is that the system can extend the duration of the auction until they met various commercial applications.The basic motivation for research in this paper is the increasing trend of the use of electronic auctions in the process of selling and buying products and services.
Authors and Affiliations
Margarita Janeska, Dejan Zdraveski, Suzana Taleska
Prediction of Modal Shift Using Artificial Neural Networks
Various public transport concepts have been developed to provide solutions to the ever growing problem of traffic in modern times. For instance, intelligent subscription bus service is one of them. This concept aim...
Customer Satisfaction Index – as a Base for Strategic Marketing Management
Customer satisfaction index -CSI results provide: an economic indicator of the quality of economic output; calculation of the net present value of their company’s customer base as an asset over time; information fo...
Determination of limit bearing capacity of statically indeterminate truss girders
After the theoretical base of the structure limit analysis being presented, this paper presents the algorithm for calculation of limit load in statically indeterminate truss girders. The algorithm is based on the applica...
Managing User Access to Cloud Services by Company Administrators
The number and power of administrator services has been growing lately. In order to perform their job, administrators acquire rights to access user data such as names, addresses, occupations, passwords and so on. T...
The Reliability to Predict Threat in Social Networks
During the analysis and study it will be possible to create and describe information damping mechanism for transition of threats from one user group to another (within the parameters of portraits), which is the mai...