2012
DOI: 10.1007/s10799-012-0119-8
|View full text |Cite
|
Sign up to set email alerts
|

e-Business systems integration: a systems perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(16 citation statements)
references
References 146 publications
0
14
0
Order By: Relevance
“…To integrate the devices of sensing layers as intrinsic parts of the IoT, effective security technology is essential to ensure security and privacy protection in various activities such as personal activities, business processes, transportations, and information protection (Tan et al [19]; Wang et al [20]; Xing et al [21]). The applications of IoT might be affected by pervasive threats such as RFID tags attacks and data leakage.…”
Section: Security Of Thingsmentioning
confidence: 99%
“…To integrate the devices of sensing layers as intrinsic parts of the IoT, effective security technology is essential to ensure security and privacy protection in various activities such as personal activities, business processes, transportations, and information protection (Tan et al [19]; Wang et al [20]; Xing et al [21]). The applications of IoT might be affected by pervasive threats such as RFID tags attacks and data leakage.…”
Section: Security Of Thingsmentioning
confidence: 99%
“…In this kind of scenario, the communication between the players is important for collaborative work, and this is achieved by providing reliable connection among the smart devices [21][22][23][24][25]. However, in real time, offering continuous availability is a real challenge due to disruption or attenuation of signal medium that results in disconnection with their peers.…”
Section: Introductionmentioning
confidence: 99%
“…If there is a failure in connecting medium, the device has to shift to other medium for nonstop communication among the players. In addition to that, mission requires video streaming of intervention area, group call between the players, etc., that will deplete the battery power of devices [25][26][27].…”
Section: Introductionmentioning
confidence: 99%
“…Enterprise application integration (EAI) technology uses various methods and tools to enable the distributed EIS to connect to each other so that they work as a whole (Xu 2011b;Panetto and Cecil 2013;Wang et al 2012). The recent technology trend is to merge the traditional middleware-based EAI approaches with emerging disciplines such as Business Process Management (BPM) and Service-oriented Architecture (SOA) (Xu 2011b;He and Xu 2014).…”
Section: Introductionmentioning
confidence: 99%