Elkhart, IN, United States
Elkhart, IN, United States

Time filter

Source Type

Liu Y.,Electronic Commerce
International Journal of Grid and Utility Computing | Year: 2013

Strand space logic is a formal method for analysing the security protocol. The electronic commerce protocols are of more complex structures, for example, branch structures, or a protocol is composite of multiple sub-protocols, so the analysis of electronic commerce protocols is far more complex than the analysis of authentication protocols. Fairness is a very important feature in ecommerce protocol. But traditional belief logic is not suitable for this. In this paper, we analyse the strand and bundle of ISI payment protocol and then prove its unfairness. We also present a strand node path method to analyse ASW protocol, which consists of multiple sub-protocols with branch structure, and the strand space analysis shows that this protocol is fair. Copyright © 2013 Inderscience Enterprises Ltd.

Electronic Commerce | Date: 2011-12-22

One or more servers (70) are configured to periodically format (90, 92) and send (94) payments (26) to a payee in an order of preference (62) and a specified payment method until accepted (96). The payments (26) include a consolidated financial instrument (73) and at least one explanation of explanation of benefit (75) associated with the consolidated financial instrument. The consolidated financial instrument (73) transfers accumulated monies without co-mingling funds in compliance with ERISA regulations. The at least one associated explanation of benefit (75) includes a patient identification, a payer identification, a service provider identification, a date of service, a service identification, a patient obligation, and an amount paid. Acceptance of the payment to each payee is recorded (100) in a data store (102).

Electronic Commerce | Date: 2013-12-03

One or more servers (70) are configured to periodically format (90, 92) and send (94) payments (26) to a payee in an order of preference (62) and a specified payment method until accepted (96). The payments (26) include a consolidated financial instrument (73) and at least one explanation of explanation of benefit (75) associated with the consolidated financial instrument. The consolidated financial instrument (73) transfers accumulated monies without co-mingling funds in compliance with ERISA regulations. The at least one associated explanation of benefit (75) includes a patient identification, a payer identification, a service provider identification, a date of service, a service identification, a patient obligation, and an amount paid. Acceptance of the payment to each payee is recorded (100) in a data store (102).

Segregated employer group settlement accounts (10_(1), 10_(2), . . . , 10_(N)) receive payments for medical insurance claims and an explanation of benefits (EOB) memory (14) receives an explanation of the medical services of multiple medical service providers against which parts of the payment are to be applied and explanations of amounts due by individual patients. An electronic sorting and transfer processor (16) in accordance with the explanations of benefits, electronically transfers funds from each of the employer group settlement accounts into each of a plurality of medical service provider settlement accounts (26_(1), 26_(2), . . . 26_(M)) without co-mingling funds. The funds from the service provider settlement accounts are transferred (30) to each medical service providers banking institution (32) concurrently with an electronic transfer of the corresponding EOBs to the medical service providers accounting system (34).

News Article | November 22, 2016
Site: www.prlog.org

E-commerce stands for Electronic Commerce, is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the Internet.

News Article | October 28, 2016
Site: www.marketwired.com

FORT LAUDERDALE-DAVIE, FL--(Marketwired - October 28, 2016) - In an era often defined by cybersecurity threats to internal communications, massive privacy invasions, and a greatly enhance obligation to protect customer information, working professional outside of IT need much greater education and training in cybersecurity regulations and defensive strategies. To respond to this need, Nova Southeastern University's (NSU) Shepard Broad College of Law has developed a new cybersecurity law concentration for its four online Master of Science degree programs for non-lawyers. The new concentration will launch in January 2017. The initial course offerings include Privacy Law, Principles of Information Security; Cyber Law and Modern Mass Communications Policy; Electronic Commerce and Digital Trade; and Cyber and Information Crimes. Additional courses are also under development. "NSU Law's M.S. students reflect working professionals in fields critical to protecting the country's information ecosystem and they have an important role in supporting their schools, companies, and governmental agencies," said Jon M. Garon, dean of the Shepard Broad College of Law. "The Cybersecurity Law Concentration enables these professionals to make an important difference in the operations of their enterprise and become leaders in assuring the safety and security of their clients and customers." The concentration comes in an age where basic field knowledge is no longer sufficient, and gaining knowledge in the legal and informational aspects of an industry are crucial for career advancements. This specialized concentration will allow students to explore the legal, ethical, and professional aspects of information security. NSU College of Law's M.S. program is the second largest in the nation. The concentration will be available to students within any of the four online Master of Science Programs: Health Law, Employment Law, Education Law, and Law and Policy. Taught by full-time College of Law faculty and highly recognized practicing attorneys, the M.S. program provides working professionals the knowledge and skills essential to accelerating their career goals. The program does not enable graduates to practice law but instead helps the graduates manage the regulatory, compliance, and legal constraints that shape modern business. The Cybersecurity Law concentration is part of a series of concentrations available to College of Law students in the four master's degree programs, including: Health Care Administration Law, Regulatory Compliance, Risk Management, Employee Relations Law, Human Resource Managerial Law, Primary Education Law, Higher Education Law, and School Administration Law. The Cybersecurity Law concentration in the College of Law is just one of many nationally leading NSU programs on information security. NSU's College of Engineering and Computing offers the Master of Science in Information Security (MSIS) for students interested in a hand's-on degree program to develop the skills to design, program, enhance and develop cybersecurity technologies that secure information and systems. It also offers the Master of Science in Management Information Systems with Concentration in Information Security Management (MMIS/InfoSec) for students interested in a degree program that focuses on the governance and management of information security in the context of the collection, retention, and dissemination of information in organizations. The College of Engineering and Computing's MSIS and MMIS/InfoSec security programs are recognized by the U.S. National Security Agency (NSA) and the Department of Homeland Security (DHS), along with its Ph.D. program in Information Assurance (DIA). As a result of this recognition, federal agencies may sponsor civilian and military personnel to take the college's certified graduate courses. Individuals may apply to take one or more certified information security courses as non-degree students. Students in the MSIS and MMIS/InfoSec programs may be eligible to apply for admission to the College of Engineering and Computing's Ph.D. programs in Information Assurance or Information Systems. Shepard Broad College of Law: Nova Southeastern University's College of Law offers a cutting edge, skills-centered academic program in three-year full-time and four-year part-time divisions. With its recently redeveloped clinical programs, every NSU Law student is guaranteed a live-client experience. In-house clinical studies are supplemented by full-time field placement opportunities practicing law in Florida, across the United States, or select locations throughout the globe. To solidify student success after graduation, NSU Law pioneered a curriculum on the business of lawyering through the Global Law Leadership Initiative. NSU Law students have a myriad of curricular opportunities, including a rich, diverse curriculum, concentrations in International Law or Health Law; dual degree programs abroad in Rome, Barcelona, or Prague; dual degree programs at many of NSU's 17 colleges; and much more. For more information, please visit www.law.nova.edu. About Nova Southeastern University (NSU): Located in beautiful Fort Lauderdale, Florida, Nova Southeastern University (NSU) is a dynamic research institution dedicated to providing high-quality educational programs at the undergraduate, graduate, and first-professional degree levels. A private, not-for-profit institution, NSU has campuses in Fort Lauderdale, Fort Myers, Jacksonville, Miami, Miramar, Orlando, Palm Beach, and Tampa, Florida, as well as San Juan, Puerto Rico, while maintaining a presence online globally. For more than 50 years, NSU has been awarding degrees in a wide range of fields, while fostering groundbreaking research and an impactful commitment to community. Classified as a research university with "high research activity" by the Carnegie Foundation for the Advancement of Teaching, NSU is 1 of only 50 universities nationwide to also be awarded Carnegie's Community Engagement Classification, and is also the largest private, not-for-profit institution in the United States that meets the U.S. Department of Education's criteria as a Hispanic-serving Institution. Please visit www.nova.edu for more information about NSU and realizingpotential.nova.edu for more information on the largest fundraising campaign in NSU history.

News Article | July 2, 2015
Site: arstechnica.com

WikiLeaks releases secret TISA docs: The more evil sibling of TTIP and TPP The new agreement that would hamstring governments and citizens even further. Not content to simply publish National Security Agency intelligence briefs, WikiLeaks has also released its second round of leaked drafts from the Trade in Services Agreement (TISA) negotiations. For the first time, the group also released the “Core Text”—the primary guiding document part of any trade negotiations. Nearly a month ago, the group released the first round of 17 secret documents. The main participants in the treaty deal are the United States, the European Union, and 23 other countries including Turkey, Mexico, Canada, Australia, Pakistan, Taiwan, and Israel, which together comprise two-thirds of global GDP. The TISA has been criticized by labor and advocacy groups, particularly with respect to some of its tech-related draft provisions. The leak comes just days before the next scheduled round of talks to open on July 6 in Geneva, Switzerland. The new tech-related language in these leaked drafts includes revisions on data protection and national security policy. According to a new 18-page analysis provided by Burcu Kilic of Public Citizen and Tamir Israel of the Canadian Internet Policy & Public Interest Clinic, those revisions contain some questionable provisions. The document is a bit difficult to read as it contains various bracketed portions, articulating various countries’ negotiating positions as represented by two-letter codes such as KR for South Korea, CA for Canada, and TW for Taiwan, and so forth. For example, there's this section in the TISA Annex on Electronic Commerce: [KR: Regarding the article on movement of information, Korea is of the view that any movement of information arising from the actions of a service supplier must be based on “informed consent.” Informed consent refers to the idea that individuals supplying their personal information to service suppliers have full protection and recourse under the law in regards to the usage of their personal information provided to service suppliers. This should be appropriately reflected in the language of the article. HK: The movement of information should be without prejudice to the domestic regime for the protection of personal data and be based on informed consent.] [CA/TW/CO/JP/MX/US propose: No Party may prevent a service supplier of another Party [CO/JP propose: or consumers of those suppliers,] [CA/CO/JP/TW/US propose: from transferring, [accessing, processing or storing] information, including personal information, within or outside the Party’s territory, where such activity is carried out in connection with the conduct of the service supplier’s business.] Data protection laws exist to strike a balance between the rights of individuals to privacy and the ability of businesses to use data for the purposes of their business. This provision provides grant freedom to business on how they use the data (including personal information) without being subject to restrictions. Governments may not be able to ensure that data is processed fairly and lawfully or obtained only for specified and lawful purposes. Since there will be no control over the data, it will not be possible to check whether the data is kept longer than is necessary or for the purposes for which it is processed. It is not clear what would happen in case of unauthorized or unlawful processing, or accidental loss or destruction of, or damage to, personal data. This provision allows for the cross-border transfer of data to a country or territory without confirmation that the country maintains an adequate level of protection for the rights and freedoms of individuals. The European Union, though, claims on its website that its strong data protection laws will not be undermined as part of the agreement: “Nothing in TiSA would stop a country from applying its confidentiality or data protection laws.” Another curious provision is the American-proposed section on national security: [US propose: Nothing in Section III (Electronic Commerce) shall be construed to prevent any Party from taking any action which it considers necessary for the protection of its own essential security interests.] [CO/JP would like to clarify the meaning of “essential security interests” in paragraph 1 of this article.] [KR: Korea would like to have greater discussion on what is meant by “essential security interests” in this article.] The United States clearly wants to preserve its national security infrastructure and be able to snoop on individuals and companies, as the Snowden revelations have demonstrated. Of course, discussion of the TISA would not really be possible without the entire set of drafts being linked in the first place. After all, it’s difficult to provide outside analysis when the negotiating documents are secret to begin with, despite the European Union’s insistence that they are not. “Trade negotiations are not held in public, but they are not secret,” the EU says.

CHARLOTTE, N.C.--(BUSINESS WIRE)--Frontier Capital, a growth equity firm focused on established software and technology-enabled business services companies, today announced a $40 million majority growth investment in Electronic Commerce, Inc. (ECI). This investment represents the first from Frontier’s $390 million Fund IV, L.P. and the fifth recent investment in companies focused on human capital management. ECI, based in Elkhart, Indiana, offers a cloud-based, fully unified HCM platform for the entire employee lifecycle. The company will use the funds to: “Over the last few years, we’ve watched the HCM/HR tech market and ECI show impressive growth,” said Richard Maclean, managing partner, Frontier. “The continued strong demand for ECI’s platform, along with our solid relationship with the ECI management team, makes us confident that the capital and strategic expertise we’re providing will enable the company to grow at a pace necessary to meet demand.” Empower, ECI’s software-as-a-service (SaaS) platform, is a fully featured end-to-end solution designed to accommodate the HCM requirements of mid-size organizations. The company enjoys a 97 percent client retention rate across a strong base of middle market customers in verticals such as manufacturing, non-profits, financial services, healthcare and retail. “Mid-size companies are realizing the benefits of anytime, anywhere access to HR data and technologies via the cloud to manage and streamline the employee lifecycle, with significant boosts to productivity and cost savings over manual and paper processes,” said Jeff Lacy, president and CEO, ECI. “After getting to know the Frontier team, and seeing their success in the HR tech industry, we have no doubt that our partnership will help us better meet the increasing demand we’re experiencing.” Frontier has developed deep domain expertise within the HCM software and services sector. In addition to ECI, Frontier is currently invested in four other HCM-focused companies: WilsonHCG, talentReef, Celergo and eVerifile. Frontier Capital is a Charlotte-based growth equity firm focused exclusively on software and technology-enabled business services companies. Founded in 1999, Frontier partners with management teams that can benefit from capital to accelerate growth, fund acquisitions or generate shareholder liquidity. For more information, please visit www.frontiercapital.com.

News Article | November 12, 2016
Site: www.24-7pressrelease.com

FORT LAUDERDALE, FL, November 12, 2016 /24-7PressRelease/ -- Moving software to the cloud? Have a SaaS agreement you need to negotiate? Or, maybe licensing some software? Enterprise technology transactions lawyer Mark Grossman, named by Best Lawyers as Technology Lawyer of the Year for 2016, is teaming up with business analytics expert and president of Lodestar Solutions Heather Cole to teach you what you need to know to negotiate the best cloud, SaaS, and licensing deals for your organization. Join Mark Grossman and Heather Cole November 17th from 9:30 AM to 12:30 PM EST and discover how to: • identify potential landmines in contracts, • learn skills to negotiate the best contract, and • get software industry insider techniques to save you money. This webinar will be broadcast live from Fort Lauderdale using MIVNET Connect, the cloud-based, high-definition multipoint video collaboration solution powered by eZuce's Viewme software. "MIVNET Connect's unique video collaboration client has the power to give each participant 'the best seat in the house.' Users will be able to customize displays by rearranging, magnifying and moving video tiles and screen shares. Or, participants can choose to join the webinar quickly, 'on the go,' right from a web browser using the Viewme WebRTC," said Grossman. Click here to get your ticket now for 3 hours of insider secrets on negotiating software and SaaS contracts. Cost of the webinar is only $150. Use code "MIVNET25" for a $25 discount. If you're a lawyer, there are three CLE credits pending for New York and Florida. More details are available at http://www.eventbrite.com/e/key-tips-for-negotiating-better-cloud-saas-and-software-licensing-deals-tickets-28403496623. If you're looking for a collaboration platform for your own virtual meeting, MIVNET's community of business professionals will set you up with the most affordable hybrid cloud-based video collaboration solution. MIVNET Connect helps clients conduct interviews, capture depositions, record testimony and receive and provide training remotely. To learn more about MIVNET's collaboration software and services, contact Mark Levy at ml1@mivnet.com. Whether planning you next business meeting, board meeting, webinar or even town meeting, MIVNET Connect can save you time and money on virtual meeting solutions that are right for you. MARK GROSSMAN Mark's practice focuses on the negotiation of enterprise IT deals of every kind and the handling of many kinds of technology-related legal issues. Mark's clients have ranged from Fortune 100 companies to middle market companies in many diverse industries including car rental, oil and gas, automobile distribution and import, recording label, music distribution, supermarkets, medical billing, insurance, hospitals, and digital media. Mark represents and has been a board member for many technology companies, and is also an author, commentator and frequent speaker on technology, outsourcing, and the art of deal negotiation. The Best Lawyers in America (www.bestlawyers.com) named Mark "Lawyer of the Year" for Technology Law in New York City for 2016. Each year, Best Lawyers names a single lawyer in each specialty in each community as a "Lawyer of the Year." Those honored have received particularly outstanding ratings in the surveys by their peers by earning a high level of respect for their abilities, professionalism, and integrity. Further, his peers also selected Mark to be on the 2015 New York Super Lawyers list. Super Lawyers are those who were in top 5% of the vote in a state. Mark has appeared on "The Best Lawyers in America" list since 2003. Since Best Lawyers bases its choices on a confidential peer-review survey in which over 25,000 leading attorneys cast about two million votes on the legal abilities of other lawyers in their specialties, and because lawyers are not allowed to pay a listing fee, inclusion in Best Lawyers is considered a singular honor. Corporate Counsel magazine has called Best Lawyers "the most respected referral list of attorneys in practice." Mark is AV-rated by Martindale-Hubbell, the highest level attainable, and has been a member of the New York City Bar's Computer Law Committee and Florida Bar's Computer Law Committee. Mark began his writing career with PC World Magazine, focusing on technology law just as technology and the Internet exploded. Later, he renamed his column "TechLaw" and moved it to the Miami Herald where it ran for many years. Mark has written articles for several journals published by the New York Bar. Mark also authored two editions of the book Technology Law - What Every Business (and Business-Minded Person) Needs to Know. Since the mid-1990's, Mark has spoken to hundreds of groups domestically and internationally. He has also been a guest on many television and radio shows including CNBC's "Closing Bell," Bloomberg TV's "Bloomberg West," and ABC's "Nightline." Mark has served on the Board of Directors of the South Florida Technology Alliance, the Advisory Board of BNA's Electronic Commerce & Law Newsletter, and the Board of Editors of "Internet Law and Strategy," a publication of Law Journal Newsletters. Mark received his B.A. with high honors in 1979 from Stony Brook University and is a 1982 cum laude graduate of Georgetown University Law Center in Washington, D.C. He is a member of the New York and Florida Bars. HEATHER COLE Heather Cole is an expert in Business Analytics and a self-described "socialized nerd". She is the president of Lodestar Solutions, Inc., a certified woman-owned small business based in Tampa. She is a dynamic speaker that keeps her audience laughing and engaged. Her website, Heatherized.com, teaches soft skills to technical and analytically minded professionals. Heather L. Cole coaches clients in defining their Business Analytics and Financial Performance Management roadmap, which empowers them to meet their strategic goals by leveraging internal resources. She is educated in computer science, finance, and a licensed attorney, with over 25 years of software industry experience. Her passion is inspiring people and companies to advance their thinking and execution in business intelligence and analytics through workshops, webinars, and one-on-one strategic coaching. She was awarded the 2014 Enterprising Women of the Year by Enterprising Women Magazine. Ms. Cole is a four-time winner of the IBM Business Analytics Information Champion Award. She is a board member of Financial Executives International's (FEI) Tampa chapter and volunteers for organization that promote women and minority business owners such as Central & North Florida Minority Supplier Development Council (CNFMSDC) and Go for the Greens, a business development conference for women entrepreneurs. Lodestar's mission is to empower IT and analytical professionals. Lodestar's motto is "Business Analytics involves People, Process and Tools - in that order. We Empower the People."

News Article | February 21, 2017
Site: www.prweb.com

Enhanced Retail Solutions, a leading provider of Software-as-a-Service (SaaS) retail analytic and demand planning solutions to suppliers, licensors and their retail trading partners, announced today that Jim Lewis has been selected as a speaker during the upcoming conference on Thursday, June 1 and Friday, June 2, 2017 at the Double Tree Hotel in Westborough, MA. This presentation will walk the audience through the process of creating a new application to combine EDI documents with other, internal information to synthesize this data. Dashboard/Artificial Intelligence capabilities can follow the data trail of documents and show any breakdowns in the process, highlighting inefficiencies in the system and providing real time analytics/feedback, revealing how companies can take advantage of rich data sets that already exist. "A top retailer had a problem and we used EDI as the main driver to solve it", says Jim Lewis. "What a perfect audience this will be for such a topic." NEECOM (The New England Electronic Commerce Users' Group) generally meets two times a year. Topics vary depending on the current interests of the group. The daylong agenda includes multiple topics, presented by guest speakers, representing a number of perspectives. NEECOM appeals to a wide audience representing its membership, which cuts across various industries. They have covered topics such as XML, portals, EDI over the Internet and EDI in health care, manufacturing, transportation, and retail. About Enhanced Retail Solutions LLC: Enhanced Retail Solutions is a software and consulting firm specializing in retail analysis and demand planning for manufacturers, licensors and their retail partners. ERS' state of the art software tools and consulting deliver critical data quickly, easily and cost effectively, adding over one hundred million dollars to their clients' bottom line. ERS' broad customer base includes industry leaders in the electronics, consumer products, apparel, footwear, home textile, toy, home décor, home improvement, housewares, jewelry and food industries. Headquartered in New York City, Enhanced Retail Solutions has offices in the Dallas, TX and development in the US, Cork, Ireland and Delhi, India. For more information, visit http://www.EnhancedRetailSolutions.com. About NEECOM: The New England Electronic Commerce Users' Group (NEECOM) is a nonprofit organization established in 1990. Its members are large and small organizations in a variety of industries including manufacturers, distributors, retailers, hospitals, insurance companies, motor carriers, universities, banks and government agencies. The common thread is their interest in EC/EDI and related technologies. For more information, visit http://www.neecom.org.

Loading Electronic Commerce collaborators
Loading Electronic Commerce collaborators