Search
Now showing items 11-17 of 17
Espousal of ODF by the Department of IT, GoNCT, Delhi: Open Office Adoption Status (2007) (B)
(2010-09-06)
The case captures the status of OpenOffice adoption, the scenario after the issue of the circular by the Secretary of IT across a few departments of the Government of National Capital Territory, Delhi. The case gives an ...
ODF Adoption at the Election Commission of India: Open Office Implementation Status (2007) (B)
(2010-09-06)
The case captures the status of OpenOffice adoption, a scenario, post the training and the circular issued the Secretary –IT, across all the Chief Electoral Offices in India. The case gives an insight into status of ...
Espousal of ODF by the Department of IT-GoNCT, Delhi (A)
(2010-09-06)
This case represents a situation of new technology adoption in a well structured and established government organisation. The case discusses the adoption of OpenOffice, which is an OpenDocument standards compliant software, ...
ODF Adoption at the Election Commission of India (A)
(2010-09-06)
This case represents a situation of new technology adoption at national level in an established government organisation. OpenOffice software adoption was one of the initiatives among the many IT strategies undertaken by ...
Dynamic pricing using e-coupons
(2010-10-27)
Coupons have been used extensively in the brick and mortar
industries like airlines, hotels along with the retail stores, etc. as a means to
dynamic pricing by price discrimination. This is often done using discounts ...
Exploring the factors affecting the adoption of mobile financial services among the rural under-banked and its implications for micro-finance institutions
(2010-09-06)
Around two and half billion adults worldwide do not have a savings or credit account with
either a traditional (regulated bank) or alternative financial institution (such as a microfinance
institution). On the other hand, ...
PRIVDAM: privacy violation detection and monitoring using data mining
(2010-04-03)
Privacy, its violations and techniques to bypass privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have become conscious of the implications of privacy ...