By Topic

Electronic Commerce and Business Intelligence, 2009. ECBI 2009. International Conference on

Date 6-7 June 2009

Filter Results

Displaying Results 1 - 25 of 136
  • [Front cover]

    Publication Year: 2009 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (2307 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (61 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (141 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009 , Page(s): v - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (182 KB)  
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2009 , Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (72 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2009 , Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (71 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009 , Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (78 KB)  
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009 , Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (71 KB)  
    Freely Available from IEEE
  • Trust, Guanxi and Supplier Search in China: A Conceptual Guide for the Supplier

    Publication Year: 2009 , Page(s): 3 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (304 KB) |  | HTML iconHTML  

    This research paper tries to add trust and Guanxi into the western frame of supplier selection to explain the mechanism of supplier search in China. On the basis of this analysis we make a number of recommendations for improvement of firmpsilas order getting capabilities in China. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Manufacturing Enterprise Supplier Performance Evaluation Indicator Selection under E-procurement

    Publication Year: 2009 , Page(s): 7 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (400 KB) |  | HTML iconHTML  

    In order to solve a indicator system of manufacturing enterprise e-procurement under the long-term cooperation partnership between the suppliers comprehensive performance evaluation system. By using of gray relational analysis and related analysis on the indicator system for screening, in order to achieve an accurate and scientific indicators. The index system of supplier selection can not pay attention to hard targets closely, but focus more on long-term cooperative relations of cooperation under the indicator. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Feature Model of General ERP System for Discrete Manufacturing Industry

    Publication Year: 2009 , Page(s): 12 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (342 KB) |  | HTML iconHTML  

    The feature modeling which is used for evaluating the management software's adaptability to its flexibility requirements is one of the most important issues in general ERP system development. First, this paper puts forward the construction process of general enterprise resource plan system's feature model by summarizing domain analysis and feature modeling methods. Then according to this construction process, this paper analyzes the domain common and individual requirements for discrete manufacturing industry and constructs total feature model for the discrete manufacturing industry. At last, this paper establishes the purchasing plan's detail feature model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Digital Signature Technology in E-commerce Systems

    Publication Year: 2009 , Page(s): 16 - 19
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (314 KB) |  | HTML iconHTML  

    With the development of the Internet, e-commerce has become the new model of business. More and more people conduct business activities through the Internet, however, the security of e-commerce systems is a key factor for its development. This article discusses the public-key cryptosystem and digital signature technology which achieve security in e-commerce systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Analysis of Fairness of the E-commerce Protocol Based on Dynamic Game Theory

    Publication Year: 2009 , Page(s): 20 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (307 KB) |  | HTML iconHTML  

    Along with the rapid development of e-commerce, the problems of which has become more and more prominent. One of important problem is the defects of fairness of e-commerce protocol, which make the consumer suffer losses while behavior of operators has not existed fault in business. In this paper, I built e-commerce system model based on dynamic game theory, and put forward structural fairness of e-commerce protocol, and give formal definition of the fairness based on the model to analyze the fairness of the e-commerce protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Analysis of E-government on the Basis of Marginal Theory in Economy

    Publication Year: 2009 , Page(s): 24 - 27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (332 KB) |  | HTML iconHTML  

    In the movement of e-government, the research focuses on the performance of e-government gradually. It is difficult for e-government to evaluate the performance in regular way. The paper applies the comparison to analyze the e-government and the traditional government on the basis of the marginal theory in economy. With the economy model, it finds out the law of decreasing marginal revenue exists in government system. On the incremental change of marginal revenue, the e-government exceeds the traditional government. On the descending turning point of marginal revenue, the e-government is slow. On the marginal cost, the e-government is less than the traditional government. According to economy, the marginal revenue gives the e-government the advantage. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Security of Time-Stamping Service Architecture

    Publication Year: 2009 , Page(s): 28 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (256 KB) |  | HTML iconHTML  

    NTSC and Uni-trust are constructing the public time-stamping service platform of China. In this paper, we present the architecture of Time-Stamping service and analyze the threats are encountered in each time-stamping system. Then we propose a modified architecture for overcoming these threats. This architecture is relies on a secure time service to obtain a authentic time stamp from the Time Authority, and makes the client obtain a trusted time from the TSA during the time-stamping service. This method improves the security of time service in time-stamping service. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of Ensemble Model for Knowledge Management

    Publication Year: 2009 , Page(s): 33 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    While general management is concerned with physical and human resources, knowledge management (KM) refers to the allocation of knowledge assets as a means to improve organizational processes. KM approaches include the resources, methods, and instruments to deliver KM goals. KM goals are usually described in terms of knowledge assets. Due to the nature of knowledge assets, organizational processes tend to improve as knowledge assets are shared and leveraged among organizational members. At the same time, knowledge of people is subjective, ambiguous, and vague in addition to circumstantial. To deal with these properties, in this paper, we are developing the ensemble modeling technique, which provides the tendency of people's opinions and at the same time their diversity. Finally, we also draw conclusions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Cooperative Relations for Identifying Abnormal Vertices in Complex Financial Networks

    Publication Year: 2009 , Page(s): 37 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (348 KB) |  | HTML iconHTML  

    Theory and application of complex network is one of the hot spots in many discipline now. In our economic life financial network is one kind of complex social network. This paper constructs two types of conception models of complex finance network which weights has special meaning. Firstly, this paper uses UCINET (a social network analysis software) to find the clustering characteristic of the finance network. Secondly, this paper constructs a financial network which its weights mean capital transfers frequency and uses short-path algorithm to find the correlation ship of any two account vertexes. All these can provide the foundation for further studies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Grid Scheduling Algorithm Based on P2P_Grid Model

    Publication Year: 2009 , Page(s): 41 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (311 KB) |  | HTML iconHTML  

    Task scheduling is an integrated component of grid computing among the key technology of the grid. P2P_Grid model, a new resource manage model of grid is brought up in this paper. In this model, we make some super-peers to join grid, it divides the grid into corresponding sub-grid. Each super-peer composes one local grid system and answers for dealing with events of a local Grid that it belongs to; these Super-Peers in different local Grid are equal and they change messages by P2P mode. A modified Grid scheduling algorithm is drawn out based on P2P_Grid model environment and the idea of traditional Min_min scheduling algorithm. At last, the new algorithm is compared with traditional Min_min algorithm by simulate experimentation, it shows that the new algorithm has a better quality of system load balancing and the utilization of system resource. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol Conformance Test Suite for Home Agent of Mobile IPv6

    Publication Year: 2009 , Page(s): 45 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (269 KB) |  | HTML iconHTML  

    Mobile IPv6 may be considered as a routing protocol and it is designed to send data package to mobile nodes which change their places fast. Home Agent constitutes a significant part in Mobile Ipv6 protocol. The main method for a Mobile IPv6 protocol conformance test is the transverse test which involves a problem of the system synchronization and coordination. In order to overcome the weakness, a Mobile IPv6 protocol conformance test system based on the ISO standard for conformance tests is designed. This paper presents an improved transverse test, introduces the test structure of the system and the formalization of test suite as presenting a test case example, then discusses test result for a kind of Linux implementation. The result shows that the system for Home Agent implementation is basically consistent with the protocol. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Presentation Mechanism about Temporal Attributes in BCDM Based on RDBMS

    Publication Year: 2009 , Page(s): 49 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (354 KB) |  | HTML iconHTML  

    Bi-temporal conceptual data model (BCDM) expresses bi-temporal mechanism effectively, which achieves the two-dimensional expression about virtual time and transaction time. Based on standardization of the temporal label in BCDM, the paper expresses temporal information based on RDBMS (relational database management system) snapshot model, then analyzes which normal formula can be expressed in BCDM, then decomposes the temporal model to 3NF based on RDBMS snapshot model. This can help to reduce redundancy, and prevent abnormal operation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology-Based Product Information Modeling of Conceptual Design

    Publication Year: 2009 , Page(s): 53 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (338 KB) |  | HTML iconHTML  

    The essay offers product information model based on ontology of conceptual design. It studies concrete content and expression methods of non-geometry, geometry and files relationship information. Use the model of F-B-S (function-behavior-structure) to express non-geometry information. Describe geometry information of conceptual design in a formalization EXPRESS modeling language, realize mapping from EXPRESS to OWL. Describe files relationship information by XML semantic methods. According to integration of conceptual design information ontology mapping, it achieves semantic coherence of product information, in favor of achieving searches, sharing, consequence and reuse of information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Entropy-Based Study of the Management of Humanization Design of Software

    Publication Year: 2009 , Page(s): 57 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (326 KB) |  | HTML iconHTML  

    The studies of the application of thermodynamics entropy variation theory show that the decrease of entropy in one system is a necessary condition for improvement of organization extent; if we put entropy theory into the management of software humanization design project, then we can find that also there is entropy existing in software humanized design, of which complementary action of positive and negative entropy influences humanization design of software. The significance of positive and negative entropy implies that humanization design has more important effects than technology in the management of software development project. Research has been done to show that the controlling of entropy value to improve human and cultural care of design team and staff is a significant way to improve humanization design of software. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring E-commerce Website Core Competence Based on Principal Component Analysis: The Case of China

    Publication Year: 2009 , Page(s): 62 - 66
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (328 KB) |  | HTML iconHTML  

    As a result of the dot-com collapse and the slowdown in the economy, the flood of venture capital dollars for e-commerce has evaporated. E-commerce companies have been enforced to review their core competence. E-commerce Website core competence (EWCC) has been touted to be a critical component that can assist a company in its strategies to become successful. This study proposes a model for evaluating e-commerce website core competence based on principal component analysis (PCA). The model includes not only financial and operational measures, but also customer satisfaction measures by telephone survey. An illustrative example demonstrates that the PCA model can not only effectively reflect the relative core competence of e-commerce firms but also identify their potential problems. Manager can, therefore, take the right remedial actions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Does Organizational Culture Affect IS Effectiveness: A Culture-Information System Fit Framework

    Publication Year: 2009 , Page(s): 67 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (310 KB) |  | HTML iconHTML  

    Previous research has examined the impact of organizational culture(OC) on the implementation of many information systems. However, there is a lack of overall picture on how OC affects the effectiveness of different information systems differently. Based on the competing value framework, this paper proposes a comprehensive framework to explain how the fit between organizational culture and types of IS results in different types of IS effectiveness. This framework can be used by managers to create a proper organizational culture that is compatible with the use of specific information systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.