The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


910 INDEX

Electronic tape vaulting,V1: 543
Electronic Theses and Dissertations
(ETDs),V1:515, 524
Electronic transactions, religious,V2:805.
See alsoSecure Electronic
Transactions (SETs)
Electronic vandalism,V1: 425
Electronic vaulting,V1: 547
Electronic whiteboards, shared,V2: 70
Element nodes, extracting data stored in,
V1:763–765
Elements, XHTML,V2:127, 129, 132–133
E-logistics,V1: 720
E-mail,V1:660 –670;V2:289.See also
Electronic mail (e-mail)
attachments to,V1: 665
clients for,V2: 547
commercial,V1:664;V2: 279
conventions for,V2: 278
direct,V1: 605
direct marketing via,V2:567–569
as groupware,V2: 70
history of,V1:663–664
HTML in,V1:664 –665
as an Internet driver,V3: 836
impact on society,V1:661–662
issues related to,V1:668–669
law enforcement,V2: 449
netiquette with,V2:276 –279
network management and,V2:546 –547
personalized opt-in,V1: 815
physicians and,V2: 591
public relations,V2: 774
security standard for,V2: 330
servers,V1: 197
targeted,V1:320 –321
technology behind,V1:664 –665
virtual teams and,V3: 604
voice and video in,V1: 665
wireless and mobile,V1:667–668
E-mail services, direct,V1: 289
E-mail viruses,V1:248–249, 254 –255
avoiding,V1: 255
E-manufacturing,V1:718–731.See also
Manufacturing entries
background of,V1:719–720
case study of,V1:728–730
competitive advantage and,V1: 728
contributions of,V1:718–724
globalization and,V1:724 –726
market potential of,V1: 720
opportunities and challenges of,
V1:722–724
strategy for,V1:721–728
E-marketplaces,V1:215–216, 671–685;
V3:756 –757.See alsoE-markets
assessment tools for,V1:684 –685
benefits of,V1:673, 682–683
buyers in,V1:673–674
classification of,V1:680 –681
development of,V1:674 –676
examples of,V1:676 –679
future of,V1: 683
private,V1:678, 681
successful,V1:679–680
value-add dimensions of,V1:681–683
value chain analysis of,V3: 534
E-markets,V1:110.See also
E-marketplaces
Embargoed nations list,V2: 239

Embedded intelligence,V2:575–576
Embedded programs,V1:381, 382
Embedded SQL,V1:379–380
Embedded Zerotree Wavelet (EZW),
V1: 396
Emergency applications, of Internet relay
chat,V2:318–319
Emergency systems, GIS applications for,
V2: 29
Emoticons,V2: 275
Emphesys.com,V1: 794
Employee-oriented benchmarks,V1: 61
Employee relations sites,V2: 773
Employees.See alsoPersonnel; Staff
compensating,V2:155–156
cybercrime and,V1: 327
directories of,V2: 347
key,V1:99–100
performance of,V2:153–155
privacy policies related to,V3: 101
punishing for attacks,V1:245–246
recruiting,V2: 482
selecting,V2:152–153
telecommuting and,V3: 445
training,V2:156 –158
work-related behavior of,V3: 82
Employee Self-Service (ESS) systems,
V2:150, 151, 155
Employment applications,V2: 294
Ems, font sizes in,V1:160 –161
EMusic,V1: 287
Enabling technologies, for e-commerce,
V1:289–290
Encapsulating Security Payload (ESP),
V3: 586
Encapsulation,V2:247–248, 380, 606
Encarta,V1:133.See alsoEncyclopedias
Encoders,V1:387, 388, 398
Encrypting File System (EFS),V3: 799
Encryption,V1:668–669, 686 –694;
V3: 266
exportation regulations concerning,
V2: 226
international cyberlaw and,V2:226 –228
network transmission,V3: 799
passwords and,V1:689–690
programs,V2: 473
public-key cryptography,V1:690 –693
readings related to,V1: 693
research in,V1: 310
software for,V1: 689
symmetric-key,V1:686 –689
tools for,V2: 83
Encryption/decryption policies,V2: 59
Encryption technologies,V1:116 –117
Encyclopedias, CD-ROM,V1:484.
See alsoEncarta
End demand fulfillment, electronic,
V3:371–372
End-user software piracy,V3:297–298
E-newsletters,V2: 774
Enforcement jurisdiction,V2:220 –221
Engines,V1: 381
English auctions,V1: 288
English server,V1: 510
Enhanced Data Rates for GSM Evolution
(EDGE),V3: 824
wireless networks with,V2: 620
Enhanced TV,V1:695–706.See also
High-Definition Television (HDTV)

applications of,V1:696 –699
business models applicable to,
V1:703–704
impact of,V1:701–703, 703–704
models of,V1:699–701
systems for,V1:696 –697
usage of,V1:701–702
viewer relationships with,
V1:697–699
Web strategies related to,V1: 697
Enrollment, authentication and,V1:72,
75–76
Enterprise application ASPs (Application
Service Providers),V1: 37
Enterprise application integration,
V1:500 –502
Enterprise Capacity and Performance
Planner,V1: 149
Enterprise CDN,V2:511–512
Enterprise firewall architectures,
V1:835–836
Enterprise Information Portals (EIPs),
V1:205, 216
Enterprise JavaBeans (EJB),V1:198–199;
V2:388, 395–397;V3: 290
Enterprise Resource Planning (ERP),
V1:118, 204, 216, 707–717;V2:835.
See alsoERP entries
application service providers and,
V1:714 –715
applications of,V1:710 –712
e-commerce and,V1:708–709
features of,V1:709–710
future of,V1: 716
history of,V1:707–708
implementation of,V1:713–714
issues related to,V1:713–714
principles of,V1: 709
selection and implementation of,
V1:715–716
systems for,V2:375–376
Entertainment industries, multimedia in,
V1: 300
Entertainment portals,V2: 208
Entertainment Web sites,V3: 772
Entities,V1:753–754
XML,V1: 736
Entity authentication,V1: 48
Entropy,V1:385–386, 398, 403
ENUM standard,V3: 657
Environment, GIS applications for,V2: 29
Environmental factors, control and
monitoring of,V3:71–72
Environmental threats, to computing
resources,V3:64 –69
Ephemeral materials, digital,V1: 512
E-procurement,V1:109, 125, 592, 599.
SeeElectronic procurement
(e-procurement)
bank-related,V2:729–730
software,V1: 655
E-Purchasing Plus,V1: 654
Equi-joins, in SQL,V3: 358
Equipment:
ruggedization of,V3: 77
telecommuting,V3: 445
temperature and humidity of,V3: 65
water threat to,V3: 66
Erasable Programmable Read-Only
Memory (EPROM),V1:232, 241
Free download pdf