By Topic

Advanced Management of Information for Globalized Enterprises, 2008. AMIGE 2008. IEEE Symposium on

Date 28-29 Sept. 2008

Filter Results

Displaying Results 1 - 25 of 82
  • AMIGE 2008 [Title page]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • AMIGE 2008 [Copyright notice]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • AMIGE 2008 Forward

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • AMIGE 2008 Keynote Speakers

    Publication Year: 2008, Page(s):i - ii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AMIGE 2008 Conference Organization

    Publication Year: 2008, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • AMIGE 2008 Table of contents

    Publication Year: 2008, Page(s):i - v
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • AMIGE 2008 author index

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • An Evaluation Method for Strategic Decision Making on Group Collaboration under Temporary Constraints

    Publication Year: 2008, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (109 KB) | HTML iconHTML

    In this paper, we present an evaluation method for strategic decision making on group collaboration under temporary constraints for avoiding de-escalation moves. Group negotiation has two types of decision making: collaborative and competitive strategies. The collaborative strategy is a type of decision making under which any player in negotiation groups would not leave from non-rep eatable games ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interfirm Business Process Innovation: A Case Study in China

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    Taking China's two successful IOS cases as study object, this paper investigated inter-firm business process transformation enabled by IOS from four aspects, namely, integration, transfer, elimination and creation of inter-firm business processes. This study argues that IOS must be seen as the enabler of organizational structure and business process changes rather than a mere implementation tool f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analytic Network Process Model for Selecting Vendors in Business Process Outsourcing

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Business process outsourcing (BPO) has emerged as a major strategic management issue recently. Vendor selection is a very important step in BPO because it has a significant influence on the success of the outsourcing project. Although there exists some literature on BPO vendor selection, these studies merely consider the unilateral linearization relationship among criteria. In order to overcome th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring Factors Affecting Trust and Purchase Behavior in Virtual Communities

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    Recent years, virtual communities (VCs) have gotten greater attention from researchers. In order to investigate how to build trust in such an environment (VC) and what influences this kind of trust would have on the consumers' behaviors, this study proposes a model combined trust building mechanisms and the consumer purchase decision-making process. Analysis of the data collected from Taobao Virtu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Risks of Fourth-Party Logistics Supply Chain

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Methods of comprehensive and reliability analysis are presented in this paper to evaluate the risks of 4PLSC (forth-party logistics supply chain). Concepts related to risks management of 4PLSC are defined first. Then a factor-based evaluation model, which combines analytic hierarchy process and risk matrix, is described in a case study. A structure-based evaluation model is also presented in analy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stochastic Stock Process and Its Option Pricing for a Risk Aversion Stock Market

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    In this paper, we consider the contingent claim pricing and hedging of European call option. The theory of stock trading volume is applied to describe and study the fluctuations of stock prices in a stock market, and we obtain the formula for pricing a European call option. Then we discuss the range of parameters of the formula in a risk-averse market, and give the corresponding option pricing bou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Simulation of Stock Prices by Contact Model and Statistical Analysis

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    A new stochastic stock price model of stock markets based on the contact process of the interacting particle systems is presented in this paper, where the contact model is a continuous time Markov process, one interpretation of this model is as a model for the spread of an infection. Through this model, the statistical properties of Shanghai stock exchange (SSE) composite index are studied. In the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Bidding Strategy using Genetic Algorithm for Online Auctions

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Due to the proliferation of online auctions, there is an increasing need to monitor and bid in multiple auctions in order to procure the best deal for the desired good. This paper reports on the development of a heuristic decision making framework that an agent can exploit to tackle the problem of bidding across multiple auctions with varying start and end times and with varying protocols. As the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data-Driven Model for Software Development Risk Analysis Using Bayesian Networks

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    In this paper, a data-driven model based on Bayesian Networks (BNs) is presented for the risk analysis of software development. The modeling process consists of three phases: BN initialization, conflict analysis, and risk monitoring and analysis. Using new project data obtained from the process of software development, the model can continually estimate risk probability, identify the sources of ri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Logistics Collaboration Supported by Electronic Logistics Marketplaces

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Globalized commerce has made logistics collaboration more and more important. Electronic logistics marketplaces (ELMs) are now offering collaboration functionalities, but the collaboration concept in an ELM has not been studied systematically. In this paper, we identify nine types of logistics collaboration on two dimensions: the parties involved in the collaboration and the level of collaboration... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Dynamic Agility of Inter-Organizational Processes

    Publication Year: 2008, Page(s):1 - 5
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    The agility of inter-organizational process represents the ability of virtual enterprise to respond rapidly to the changing market environment. Many theories and methodologies about inter-organizational process have been developed but the dynamic agility has seldom been addressed. A virtual enterprise whose process has a high dynamic agility will be able to adjust with the changing environment in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Knowledge Transfer Performance under Environmental Change

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Gaining knowledge from outside of the enterprise is a quick way to innovate and gain competitive advantage to keep pace with the rapid progress of science and technology. Based on 153 questionnaires from Chinese high-tech companies, this paper examines the relationships among environmental change, enterprise culture, knowledge management capability and knowledge transfer performance. The paper dem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Determinants of User Acceptance of Internet Banking: A Theoretical Framework and Empirical Study

    Publication Year: 2008, Page(s):1 - 5
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Internet banking is a hot financial field all over the world these days. According to the unified theory of acceptance and use of technology (UTAUT), performance expectancy, effort expectancy, and social influence are believed to be fundamental in determining the acceptance of various information technologies. In the context of Internet banking, however, these beliefs may not fully explain user's ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Workflow-Mining-Based Approach to Knowledge Maintenance

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    The quality of knowledge in the knowledge repository determines the effects of knowledge reusing and sharing. The control of the knowledge maintenance process is necessary. Workflow system has been used to support the control of knowledge maintenance process. However, it is difficult to create an appropriate knowledge maintenance process. In this paper, workflow mining is used to support the desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Strategic Budgetary Management System Based on ERP

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Based on the requirements of strategic budget, this paper brings forward some ideas about the design of strategic budgetary management system on the premise of the advantages brought by ERP. The function of logical budgetary relationship can be enhanced; the budgetary system can be designed in object-oriented way; furthermore, the core technique in the process of implementation is analyzed. It is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A SOM-Based Framework for Regional Segmentations of Customers

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    Segmentations of customers gained in one area could not be used to predict customers' characteristics in other areas, because regional influences on customers were different. This paper proposed a self-organizing map framework to get regional segmentations of customers. In order to verify the validity of this framework, it was applied to the credit card holders of a famous bank in China. Examinati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Creation and Realization of Security Federation for Cross-Organizational Business Processes

    Publication Year: 2008, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    Execution of cross-organizational business processes requires a federated identity management architecture for administrative domains of different partner organizations, by which each partner in the business processes is enabled to maintain its own identity data and provide authentication information to other partners. This requires partners to trust each other in terms of the identity information... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trilateral Game Analysis on Information Sharing among Members in a Virtual Team

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    Information and communication technology has been greatly contributing to the practice of virtual teams. However, the issues of information sharing might affect the performance of virtual teams fundamentally. To improve the cooperation among virtual team members, information sharing in a virtual team deserves more attention from both researchers and practitioners. In this paper, the KMRW model of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.