By Topic

Electronic Commerce and Business Intelligence, 2009. ECBI 2009. International Conference on

Date 6-7 June 2009

Filter Results

Displaying Results 1 - 25 of 136
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2307 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (72 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2009, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (71 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • Trust, Guanxi and Supplier Search in China: A Conceptual Guide for the Supplier

    Publication Year: 2009, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    This research paper tries to add trust and Guanxi into the western frame of supplier selection to explain the mechanism of supplier search in China. On the basis of this analysis we make a number of recommendations for improvement of firmpsilas order getting capabilities in China. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Manufacturing Enterprise Supplier Performance Evaluation Indicator Selection under E-procurement

    Publication Year: 2009, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    In order to solve a indicator system of manufacturing enterprise e-procurement under the long-term cooperation partnership between the suppliers comprehensive performance evaluation system. By using of gray relational analysis and related analysis on the indicator system for screening, in order to achieve an accurate and scientific indicators. The index system of supplier selection can not pay att... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Feature Model of General ERP System for Discrete Manufacturing Industry

    Publication Year: 2009, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    The feature modeling which is used for evaluating the management software's adaptability to its flexibility requirements is one of the most important issues in general ERP system development. First, this paper puts forward the construction process of general enterprise resource plan system's feature model by summarizing domain analysis and feature modeling methods. Then according to this construct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Digital Signature Technology in E-commerce Systems

    Publication Year: 2009, Page(s):16 - 19
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    With the development of the Internet, e-commerce has become the new model of business. More and more people conduct business activities through the Internet, however, the security of e-commerce systems is a key factor for its development. This article discusses the public-key cryptosystem and digital signature technology which achieve security in e-commerce systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Analysis of Fairness of the E-commerce Protocol Based on Dynamic Game Theory

    Publication Year: 2009, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    Along with the rapid development of e-commerce, the problems of which has become more and more prominent. One of important problem is the defects of fairness of e-commerce protocol, which make the consumer suffer losses while behavior of operators has not existed fault in business. In this paper, I built e-commerce system model based on dynamic game theory, and put forward structural fairness of e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Analysis of E-government on the Basis of Marginal Theory in Economy

    Publication Year: 2009, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    In the movement of e-government, the research focuses on the performance of e-government gradually. It is difficult for e-government to evaluate the performance in regular way. The paper applies the comparison to analyze the e-government and the traditional government on the basis of the marginal theory in economy. With the economy model, it finds out the law of decreasing marginal revenue exists ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on the Security of Time-Stamping Service Architecture

    Publication Year: 2009, Page(s):28 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    NTSC and Uni-trust are constructing the public time-stamping service platform of China. In this paper, we present the architecture of Time-Stamping service and analyze the threats are encountered in each time-stamping system. Then we propose a modified architecture for overcoming these threats. This architecture is relies on a secure time service to obtain a authentic time stamp from the Time Auth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of Ensemble Model for Knowledge Management

    Publication Year: 2009, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    While general management is concerned with physical and human resources, knowledge management (KM) refers to the allocation of knowledge assets as a means to improve organizational processes. KM approaches include the resources, methods, and instruments to deliver KM goals. KM goals are usually described in terms of knowledge assets. Due to the nature of knowledge assets, organizational processes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Cooperative Relations for Identifying Abnormal Vertices in Complex Financial Networks

    Publication Year: 2009, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    Theory and application of complex network is one of the hot spots in many discipline now. In our economic life financial network is one kind of complex social network. This paper constructs two types of conception models of complex finance network which weights has special meaning. Firstly, this paper uses UCINET (a social network analysis software) to find the clustering characteristic of the fin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Grid Scheduling Algorithm Based on P2P_Grid Model

    Publication Year: 2009, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Task scheduling is an integrated component of grid computing among the key technology of the grid. P2P_Grid model, a new resource manage model of grid is brought up in this paper. In this model, we make some super-peers to join grid, it divides the grid into corresponding sub-grid. Each super-peer composes one local grid system and answers for dealing with events of a local Grid that it belongs to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol Conformance Test Suite for Home Agent of Mobile IPv6

    Publication Year: 2009, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Mobile IPv6 may be considered as a routing protocol and it is designed to send data package to mobile nodes which change their places fast. Home Agent constitutes a significant part in Mobile Ipv6 protocol. The main method for a Mobile IPv6 protocol conformance test is the transverse test which involves a problem of the system synchronization and coordination. In order to overcome the weakness, a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Presentation Mechanism about Temporal Attributes in BCDM Based on RDBMS

    Publication Year: 2009, Page(s):49 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    Bi-temporal conceptual data model (BCDM) expresses bi-temporal mechanism effectively, which achieves the two-dimensional expression about virtual time and transaction time. Based on standardization of the temporal label in BCDM, the paper expresses temporal information based on RDBMS (relational database management system) snapshot model, then analyzes which normal formula can be expressed in BCDM... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology-Based Product Information Modeling of Conceptual Design

    Publication Year: 2009, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    The essay offers product information model based on ontology of conceptual design. It studies concrete content and expression methods of non-geometry, geometry and files relationship information. Use the model of F-B-S (function-behavior-structure) to express non-geometry information. Describe geometry information of conceptual design in a formalization EXPRESS modeling language, realize mapping f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Entropy-Based Study of the Management of Humanization Design of Software

    Publication Year: 2009, Page(s):57 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    The studies of the application of thermodynamics entropy variation theory show that the decrease of entropy in one system is a necessary condition for improvement of organization extent; if we put entropy theory into the management of software humanization design project, then we can find that also there is entropy existing in software humanized design, of which complementary action of positive an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring E-commerce Website Core Competence Based on Principal Component Analysis: The Case of China

    Publication Year: 2009, Page(s):62 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    As a result of the dot-com collapse and the slowdown in the economy, the flood of venture capital dollars for e-commerce has evaporated. E-commerce companies have been enforced to review their core competence. E-commerce Website core competence (EWCC) has been touted to be a critical component that can assist a company in its strategies to become successful. This study proposes a model for evaluat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Does Organizational Culture Affect IS Effectiveness: A Culture-Information System Fit Framework

    Publication Year: 2009, Page(s):67 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Previous research has examined the impact of organizational culture(OC) on the implementation of many information systems. However, there is a lack of overall picture on how OC affects the effectiveness of different information systems differently. Based on the competing value framework, this paper proposes a comprehensive framework to explain how the fit between organizational culture and types o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.