The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


930 INDEX

federal,V3: 152
international,V3:98–99
Privacy policy,V1:345;V3:104 –105
global,V1:807–808
Privacy protection,V1: 310
technological responses to,V2:225–226
Privacy rights,V2:470 – 471
Private e-marketplace,V1: 681
Private keys,V1: 694
Private networks, public networks versus,
V3:166 –167
Private telephone line,V1: 180
Private Trading Exchanges (PTXs),
V1:205, 207, 208, 216
Privileges, W2K,V3: 797
Problem domain understanding,
V3: 137
Procedural language,V1: 791
Process, knowledge as,V2: 432
Process benchmarking,V1: 59
Process-driven systems,V1:709, 717
Processing:
digital,V1:459– 460
instructions for,V1: 791
overhead for,V1: 147
Perl,V3:47– 49
types of,V1: 238
Process management, e-commerce agents
for,V2:194 –195
Process-oriented integration,V1: 113
Procurement.See alsoElectronic
procurement (e-procurement)
centralized and decentralized,V1:651,
657
marketplaces for,V1: 681
specialists in,V1: 657
strategies for,V1: 653
Prodigy case,V2: 266
Product attributes,V3: 409
Product development,V3: 138
cycle time for,V1: 729
flexible,V3:142–143
Product information Web sites,V3: 772
Production Lead-time:Demand Lead-time
(P:D) ratio,V2:556 –557
Production materials,V1: 120
Production processes,V1:728;
V2:554 –555
Production strategies,V1:725–726
Production systems,V3:237–238.See also
Rule- Based Systems (RBS)
Productivity, groupware and,V2: 74
Product knowledge,V2:574 –576
Product promotion sites,V2: 773
Products:
online selection of,V1:278–279
role in wireless marketing,V3: 856
searches for,V1: 275
Product strategies:
global,V1:812–814
in supply chain management,V3: 366
Product stream value flows,V3:409– 410
Profile association rules,V1: 407
Profiling:
BluetoothTM,V1:92–93
customer,V1: 407
explicit versus implicit,V3: 53
factual and behavioral,V3:51–53
Web quality of service and,V3: 719
Profitability, customer,V1:319, 320

Profit Impact of Marketing Strategy
(PIMS),V1: 58
ProFusion approach, to Web searching,
V3: 749
Program Evaluation and Review
Technique (PERT),V3: 118
Programmable Read-Only Memory
(PROM),V1:231, 241
Programmed Logic for Automated
Teaching Operations (PLATO),
V1:551, 669.See alsoPLATO “Talk”
Programming:
bugs,V1: 250
structured,V3: 609
Visual Basic,V3:612–614
WinSock,V3:638–643
Programming language independence,
ADO,V1: 27
Programming languages,V1:165–166.See
alsoComputer languages; Languages
CGI,V1:225–226
client-side and server-side,V1: 290
compiled,V1:6, 165
interpreted,V1: 165
object-oriented,V1:6–7
scripting versus object-oriented,
V1: 2
Programs, installing,V1:570 –571
Progressive digital video,V3: 539
Project-based simulations,V1: 581
Project charter,V3:111–112
sample,V3: 113
Project Gutenberg,V1:509, 518, 524;
V3: 202
Project i-DLR,V1: 516
Project management.See alsoProject
management techniques; Projects
defined,V3:109–110
groupware products for,V2: 68
as profession,V3: 110
real estate,V3: 197
usability testing and,V3:517–518
software for,V1: 240
Project Management Professional (PMP),
V3: 110
Project management techniques,
V3:108–123.See alsoProject
management
cost management and performance
tracking,V3:119–120
project scheduling tools,V3:116 –119
project-shortening techniques,V3: 119
table of,V3:121–122
types of,V3:111–115
Project MUSE,V1:514;V2: 478
Projects.See alsoProject management
entries
defined,V3:108–109
network diagrams for,V3:116 –118
scope statements for,V3:109, 112–115
selection techniques for,V3: 111
Promotion,V2:779;V3:857–858
global strategies for,V1:814 –815
methods of,V2: 582
mobile computing and,V2:582–583
travel and tourism industry,V3:463– 464
Promotional e-mail,V1: 289
Propagation characteristics.
SeeWireless channel propagation
characteristics

Propagator sites, religious,V2: 804
Properties,V1:23.See alsoCSS properties
JavaBean,V2:391–392
Property editors, JavaBean,V2: 394
Property insurance,V3: 197
Property management,V3: 197
Protected resources, value of,V1: 55
Protection technology,V1: 243
Protocol-level security,V3: 761
Protocols,V1:118, 271
data communications,V3:320 –328
e-commerce enabling,V3:326 –327
Internet,V3:325–326
layering,V3:322–324
mobile e-commerce,V3:326 –327
proprietary webcasting,V3: 682
routing,V3:427– 428
standards for multimedia,V3: 326
verbal analysis of,V3: 516
Web browser,V2: 303
webcasting,V3:680 –682
Protocol-specific Multiplexer (PSM),
V1:90 –91
Protocol stack,V3: 425
Prototypes.See alsoPrototyping
architecture,V3:140 –141
content,V3:139–140
interface,V3: 139
system,V3: 136
Prototyping,V3:135–144.See also
Prototypes
e-commerce software and,V3:137–138,
138–143
in software development,V3:136 –137
software life cycle and,V3:135–136
Visual Basic and,V3: 609
Proxies,V1:834;V2: 258
circuit-level,V1:833–834
Proxy bidding,V2: 715
Proxy servers,V1:67, 197, 833;
V2:547–548
Psychographics,V2: 577
Psychological health issues,V2:104 –109
Psychological services, online,
V2:110 –111
Psychovisual modeling,V3: 544
Public accounting firms,V3:145–155
key applications for,V3:147–150
legal and regulatory issues related to,
V3:152–154
system implementation by,V3:150 –154
trends and opportunities in,V3: 154
Publications.See alsoBooks; Journals;
Newspapers; Periodicals; Publishing
online,V2: 785
orientation of,V2: 794
Publication style,V2:793–794
Public domain programs,V1:574, 576
Public e-marketplace,V1: 681
Public Electronic Network (PEN),V1: 599
Public key certificates,V1:51;
V3:160 –159
Public key cryptography/encryption,
V1:53, 628–629, 690 –693
Public Key Cryptography Standard
(PKCS) #10,V3: 161
Public key deception,V1:528, 533
Public Key Infrastructure (PKI),V1:51,
642, 693;V3:156 –165.See alsoPublic
key certificates
Free download pdf