By Topic

e-Commerce Technology, 2004. CEC 2004. Proceedings. IEEE International Conference on

Date 6-9 July 2004

Filter Results

Displaying Results 1 - 25 of 65
  • Towards a theoretical framework of determinants for the adoption and diffusion of buyer authenticated credit card payment programs: the online merchant's perspective

    Page(s): 349 - 352
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (241 KB) |  | HTML iconHTML  

    This study employs Rogers' framework of perceived innovation attributes augmented by environmental influences and marketing initiatives and a new factor developed for this study, namely, risk mitigation measures, to examine the case of merchant adoption of buyer authenticated credit card payment programs (BACCPPs). Recently introduced by the major credit card associations as replacements for the decommissioned SET and 3DSET protocols, the new payment models, 3DSecure and UCAF/SPA, have been designed to provide an added level of security for merchants and consumers. Using data gleaned from preliminary interviews, discussion forums and promotional material, we present a critical analysis of the potential barriers and facilitators that impact on the widespread diffusion of these programs. This is used as the basis for developing a preliminary theoretical framework of the potential determinants of adoption of BACCPP from the perspective of online merchants, as well as a survey instrument to demonstrate the empirical validity of our theoretical formulation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A computational geometry approach to Web personalization

    Page(s): 377 - 380
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (249 KB) |  | HTML iconHTML  

    In this paper we present an algorithm for efficient personalized clustering. The algorithm combines the orthogonal range search with the k-windows algorithm. It offers a real-time solution for the delivery of personalized services in online shopping environments, since it allows on-line consumers to model their preferences along multiple dimensions, search for product information, and then use the clustered list of products and services retrieved for making their purchase decisions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assisting seller pricing strategy selection for electronic auctions

    Page(s): 27 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (261 KB) |  | HTML iconHTML  

    This research examines sellers' pricing strategy oriented to bidders' risk preferences, within the context of an electronic auction. A business model is then proposed to predict the probability of potential bidders' risk preference, which sellers can consider to set pricing strategy to maximize their profits. A tailored intelligent auction registry engine is constructed based upon an initial version of our business model. Because the extensible markup language (XML)-based simple object access protocol (SOAP) is utilized to support interactions with other resources, our engine is decoupled from the underlying technology choices; therefore, it can be deployed to different platforms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "CONFESS" an incentive compatible reputation mechanism for the hotel booking industry

    Page(s): 205 - 212
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (310 KB) |  | HTML iconHTML  

    Reputation mechanisms provide a promising alternative to the traditional security methods for preventing malicious behavior in online transactions. However, obtaining correct reputation information is not trivial. In the absence of objective authorities (or trusted third parties) which can oversee every transaction, mechanism designers have to ensure that it is rational for the participating parties to report the truth. In this paper we describe a complete reputation mechanism for the online hotel booking industry that is efficient (i.e. the equilibrium behavior is cooperative) and incentive compatible. Our mechanism discovers the true outcome of an interaction by analyzing the two reports coming from the agents involved in the interaction. Based on side payments, such a mechanism makes it profitable for long-run agents to commit to always report the truth. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A service management framework for service-oriented enterprises

    Page(s): 181 - 186
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (270 KB) |  | HTML iconHTML  

    With a steady pace of adoption of service-oriented architecture, companies have made significant progresses in implementing various kinds of Web services and converting existing applications to service-oriented architecture. As significant number of services have been implemented and put into actual use, many service-oriented enterprises are faced with the problem of how to manage these services in an efficient manner. In this paper, we propose a framework for a more efficient management of these services. In this framework, the creation and maintenance of enterprise solutions are modeled by flows, finite state machines (FSMs) among other formal models. For instance, each enterprise solution would be modeled as composite services that can be described by respective flow and FSM models. These solution models can then be stored, and later retrieved for the execution of these composite services. Furthermore, formal models are also used to maintain and update these service-oriented solutions to improve the efficiency and quality of service management by taking advantage of the underlying service-oriented architecture. In this paper, we first provide a normalized categorization of enterprise services. We then describe the framework for managing services in service-oriented enterprises. We also discuss how this framework can help manage enterprise services more efficiently. Finally, we give a real-world example to illustrate how this framework can be used in practice. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shingle-based query indexing for location-based mobile e-commerce

    Page(s): 16 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (343 KB) |  | HTML iconHTML  

    We present a shingle-based query index (SQI) for supporting location-based services in mobile e-commerce. SQI is used to efficiently identify moving objects that are currently located inside a geographical region. A set of virtual shingles is predefined, each with a unique ID. One or more shingles are used to cover the geographical region defined by a range query, where the covering shingles may overlap with one another. SQI maintains a direct mapping from individual shingles to the range queries that contain them. The use of covering shingles has two important properties. First, it does not impose any limit on the object moving speed or direction. Second, it allows the revaluation of continual range queries to capitalize on the incremental changes in object locations. Simulations are conducted to evaluate the effectiveness of SQI and compare it with a cell-based approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building and evaluating nonobvious user profiles for visitors of Web sites

    Page(s): 9 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (296 KB) |  | HTML iconHTML  

    Building profiles of registered users of a Web site, as in case of a portal, is of importance if it goes beyond collecting the obvious information the user is willing to give at the time of registration. The starting point of this work is the assumption that a community of users is registered on a Web site and that for each user a profile is built. Such a profile contains two parts of data: one obvious, given directly by the user and one less obvious, inferred by the user's behavior during his visits on the site. This paper presents ideas on how to build a user profile based on nonobvious information and takes into account various factors influencing in its development. Special emphases are paid on feedback mechanism and several methods of measuring its results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service selection algorithms for Web services with end-to-end QoS constraints

    Page(s): 129 - 136
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3968 KB) |  | HTML iconHTML  

    Web services are new forms of Internet software that can be universally deployed and invoked using standard protocol. Services from different providers can be integrated to provide composite services. In this paper, we study the end-to-end QoS issues of composite service by utilizing a QoS broker that is responsible for coordinating the individual service component to meet the quality constraint. We design the service selection algorithms used by QoS brokers to meet end-to-end QoS constraints. The objective of the algorithms is to maximize the user-defined utility while meeting the end-to-end delay constraint. We model the problem as the multiple choice knapsack problem (MCKP) and provide efficient solutions. The algorithms are tested for their performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case study on retail customer communication applying ubiquitous computing

    Page(s): 42 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (287 KB) |  | HTML iconHTML  

    The use of mobile information systems and communication technology furthers the informatization and automation of operating processes. In the retail industry, mobile communication technology affords new forms of customer communication by establishing electronic and individually designable channels of communication. In conjunction with powerful information systems, these options enable both improved services for customers and an increase in turnover and profit through more flexible and individualized pricing and communication policy. This contribution exemplifies the forms of pricing policy considering the "extra future store" of METRO Group as case study and identifies two determinants of success for these new types of electronic customer communications: the power of disposal over the end device and the range of communication. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On designing a flexible e-payment system with fraud detection capability

    Page(s): 236 - 243
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (269 KB) |  | HTML iconHTML  

    Nowadays security measures especially fraud detection has become an imperative issue in the design of online payment systems. In addition to standard network security schemes such as data encryption and firewalls, payment systems with internal logics that are capable of detecting fraud transaction, and even potential fraud transactions are preferred by both users and solution providers. Currently on the market one can easily purchase a software package for implementing an e-payment system with most standard payment functions. Fraud detection capability, usually implemented as an extra add-on internal logic in the system, however is not included in most packages. It would have to be built in-house. This paper sheds some light on the designing issues on this add-on fraud detection module, namely fraud detection manager. The design is based on the concept of atomic transactions called Coupons that we implemented in e-wallet accounts. This is a relatively simple approach to deter fraud and resolve dispute without the use of digital signing (Peha and Khamitov, 2003). Some issues in handling fraud transactions are discussed from our experiences in operating a commercial e-wallet service. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital watermarking capacity and reliability

    Page(s): 295 - 298
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    Capacity and reliability are two important properties of digital watermarking. In this paper, we realize an adaptive watermarking capacity analysis method, and discuss watermarking capacity in this scenario. We also analyze the relation between watermarking capacity and watermark detection bit error rate (BER), and derive the relation between capacity and the limit of BER. According to the result of our research, watermark detection BER is mainly influenced by the watermarking average energy and watermarking capacity. The BER rises with the increase of watermarking capacity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology-driven Web services composition platform

    Page(s): 146 - 152
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (329 KB) |  | HTML iconHTML  

    Discovering and assembling individual Web services into more complex yet new and more useful Web processes is an important challenge. In this paper, we present techniques for (semi) automatically composing Web services into Web processes by using their ontological descriptions and relationships to other services. In interface-matching automatic composition technique, the possible compositions are obtained by checking semantic similarities between interfaces of individual services. Then these compositions are ranked and an optimum composition is selected. In Human-Assisted composition the user selects a service from a ranked list at certain stages. We also address automatic compositions in a peer-to-peer network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of large catalogs for price enforcement in B2B e-commerce

    Page(s): 79 - 84
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (250 KB) |  | HTML iconHTML  

    This paper presents an efficient architecture to implement a catalog for its application in B2B electronic commerce. The architecture is designed based on a client-server model under the constraint of the unbalanced computing power between the buyer and suppliers. Computational algorithms are designed according to this assumption of limited computer resources at the client side and ample resources at the server side. The application is to provide a complete and workable catalog solution for price enforcement when fulfilling a purchase order to eliminate costs associated with having to make amendments to a past purchase order and having to delay a business transaction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can eCRM and trust improve eC customer base?

    Page(s): 303 - 310
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (253 KB) |  | HTML iconHTML  

    E-commerce (eC) security depends on a complex interrelationship between several components. Securing consumer trust is a key factor in reducing complexity and the management of eC risk. By taking a methodical approach to searching for vulnerabilities on a target system all potential intruder needs to do is to systematically attempt to exploits available vulnerabilities in turn until a weakness that can be exploited is discovered. The current information and communication technologies enable businesses to foster customer relations in a better and more efficient way. Electronic customer relationship management (eCRM) as an extension of the traditional customer relationship management (CRM) provides suitable methods and instruments. This paper discusses how to be effective in managing customer relationship and advocated trust-based approach to viewing eCRM. We also conducted questionnaire survey - to show the organisational value of eCRM and Trust in eC within multinational organisation. Furthermore, we proposed an eC trust model, which incorporates people trust, technology trust and law and policy trust. The question posed by this paper is that: how can organisations improve their eCRM while also securing higher level of consumer trust on eC?. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms for automated negotiations and their applications in information privacy

    Page(s): 255 - 262
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (274 KB) |  | HTML iconHTML  

    Automated negotiations have been an active research topic for many years. Most of the research work on this area focuses either on the abstract and theoretical models or on the system architectures for standalone negotiation applications. There is little work on identifying and studying practical algorithms for automated negotiations. In this paper, two algorithms have been proposed and their innovative applications have been discussed. The first algorithm guarantees that negotiation results are Pareto optimal solutions. The second algorithm guarantees that an agreement can be agreed upon after a certain number of proposal/counterproposal exchanges. These two algorithms can be used in the two-phase model for the automated negotiation process. In addition to these algorithms, their applications in information privacy negotiation have been described. In the information privacy management domain for service industries, it is critical for service requestors to only reveal the absolute necessary private information to the service providers. Traditionally, service requestors usually give whatever private information service providers have asked for. The grave consequence is that service providers may misuse the private information provided by service requestors, even though the service providers may have promised not to reveal it. Algorithms described in this paper can facilitate the privacy negotiation process. In order to show the concept of negotiation in information privacy, credit card information has been used to illustrate the application of algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reestimation of e-business planning model in real business world

    Page(s): 317 - 320
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (324 KB) |  | HTML iconHTML  

    Strategic business planning is a critical decision problem determining the long-term survival and prosperity of companies especially in this E-era. However, due to the dynamic and complicated nature of the e-business environment and decision makers' lack of technological sophistication, the development of e-business strategies constitutes a major challenge for managers. In an ongoing project, we have been focusing on DMSS development and its role in decision support for e-business planning. An E-business planning model was estimated and developed using empirical eBay data. This current study thus aims to reestimate and evaluate such implementation to further broaden the application base in a practical field setting. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dealer collaboration: transforming the value chain through integration and relationships

    Page(s): 325 - 329
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (267 KB) |  | HTML iconHTML  

    The retail and aftermarket in most value chains is highly segmented and can include dealers, distributors, resellers, independent repair shops, parts suppliers, specialized accessory retail stores and content providers. In the automotive industry, the aftermarket value chain is quite large and fragmented. OEMs need to transform the way they do business in order to obtain a share of this aftermarket revenue and provide better quality of service for handling critical product failures. Crucial failure symptom information is lost between the end consumers of products and the manufacturers due to lack of proper collaboration with dealerships and intermediaries offering independent service. Currently, this results in increased warranty costs for manufacturers and customer defection. In this paper, we present an IBM software solution for automotive dealer collaboration, which enhances the OEM-Dealer relationship through contextual collaboration, information integration and transparent process management. The solution is based on open standards such as Web services, J2EE, J2ME, Struts and others. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The architecture of the symbol engine in a programmable autonomous business

    Page(s): 119 - 126
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (492 KB) |  | HTML iconHTML  

    A programmable autonomous business is a kind of online software agent whose function is not to collect or synthesize information for people, but rather to gather and generate customers and income for entrepreneurs. Functionally and compositionally autonomous businesses are indistinguishable from conventional ones. However, an autonomous business is built entirely in software and capable of operating profitably without any employees or managers guiding it. This paper analyses an instance of a successful autonomous business ncovering the processes driving the production of its symbols. A general architecture for symbol engines is induced from these processes. The paper discusses how this architecture applies to other successful autonomous businesses, and concludes with a set of design requirements for symbol engines in autonomous businesses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Jabber IM: a wireless-based text chatting system

    Page(s): 337 - 341
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (407 KB) |  | HTML iconHTML  

    With the rapid advancement of wireless network technologies, wireless communications and mobile-based information services are changing people's life style. How to provide mobile users with cost-effective wireless information services is becoming a hot topic for wireless vendors. Although there are a number of Internet-based instant messaging solutions, there are no published articles addressing how to develop wireless Internet instant messaging solutions. This paper reports recent research and development efforts in constructing a wireless-based text chatting system, Mobile Jabber IM. It discusses the system architecture, design, and technologies. The paper demonstrates the system application examples and shares the development and implementation experiences. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unified commerce server architecture for large number of enterprise stores

    Page(s): 93 - 100
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (276 KB) |  | HTML iconHTML  

    To serve a large number of enterprise customers, enterprise supplier needs to set up many custom B2B stores, each personalized with special promotions and dedicated contracts. The custom store needs to empower business buyers to shop in the following fashions: 1) buyers visit the custom store, make direct decisions on product selection, based on entitled pricing, and check out orders; 2) buyers use their own company's procurement software, perform catalog shopping on one or more remote custom stores, return an order quote locally for approval, and subsequently send approved orders to supplier for fulfillment; 3) buyers shop with own company's procurement software, using catalog pre-loaded with product and pricing information extracted from supplier's custom stores, and then place purchase orders. This paper describes a practical implementation experience, on how these shopping paradigms can be accommodated effectively and efficiently using a unified commerce server architecture. It is explained, how one master catalog subsystem can be personalized to accommodate B2B direct catalog shopping, B2B procurement with remote catalog punchout, B2B procurement with local catalog, and entitled catalog extraction. A detailed discussion on how to build the commerce server in a 2-tier architecture is illustrated by the handling of various different punchout protocols in one common implementation. The study also reports on the issues and efficiency considerations by different approaches for real-time entitled pricing lookup vs. batch pricing extraction operation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel Web sales tracking solution for multi-channel marketing programs on electronic commerce

    Page(s): 362 - 365
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (316 KB) |  | HTML iconHTML  

    Internet based marketing programs have become critically important to many businesses, and at the same time more technologically advanced. If a business practices multiple types of Web marketing campaigns, sells multiple brands, and manages multiple online stores, it has to use market tracking solutions to monitor sales and leads from different marketing programs, and track and evaluate the performance of each program. A solution for tracking Web sales for multi-channel marketing programs is described. It consists of two technological components. A transient landing page provides a unique way to centralize, control and distribute Web traffic from different programs, and in doing so saves a Web merchant time, cost and effort in administrating its online stores. A multi-channel identifier allows the merchant to track sales and leads, and to evaluate the results and effectiveness of each program. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LITESET/A++: a new agent-assisted secure payment protocol

    Page(s): 244 - 251
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (407 KB) |  | HTML iconHTML  

    In this paper, we proposed a new agent-assisted secure payment protocol LITESET/A++, which aims at enabling the dispatched consumer-agent to choose the "best" one after negotiating with merchants to close a deal, autonomously sign contracts and make the payment on behalf of the cardholder without the possibility of disclosing any secret to any participant. This is realized by adopting the signature-share and signcryption-share schemes, and employing a trusted third party (TTP). In LITESET/A++, the principle that each participant knows what is strictly necessary for his/her role is followed as in SET payment protocol while the non-repudiation property is improved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of user intervention mechanisms for privacy on SME online trust

    Page(s): 281 - 288
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (263 KB) |  | HTML iconHTML  

    This paper describes empirical results that quantitatively show that user intervention tools for privacy significantly contribute towards online trust. We extend a seminal, validated measurement scale for online trust by adding measurement items for 5 user intervention (UIVs) mechanisms for trust: P3P, cookie crushers, encryption, pseudonymizer, and anonymizing tools. From analysis of 242 valid user responses collected in fall 2003, we find that those users willing to adopt user intervention mechanisms have statistically significant higher mean online trusting intentions. These users' mean trusting beliefs in small and medium size e-business is stronger than non-adopters and those undecided users sitting on the fence. Finally, we show our amendments to online trust theory to be plausible using the structural equation modeling technique and data for all groups of users. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Java-based information browsing system in a remote display environment

    Page(s): 342 - 346
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (390 KB) |  | HTML iconHTML  

    In this paper, we describe our design and implementation of an information browsing system using Java-based cellular phones in a remote display environment which we have proposed. In this system, an application on a remote display displays various information for users, and a Java application on a cellular phone displays operational pages for users to operate the application on the remote display. Users can operate the application and browse information on the remote display by operating the corresponding operational pages on the cellular phone. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A capacity sizing tool for a business process integration middleware

    Page(s): 195 - 202
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (327 KB) |  | HTML iconHTML  

    Capacity sizing of business process integration (BPI) solutions deals with finding the lowest cost hardware configuration that can satisfy the performance requirements of a BPI solution being planned. Accurate sizing can help control the cost of a proposed BPI project while minimizing the risk of deploying a solution that will fail to meet the performance requirements later on. This paper proposes a model driven approach for predicting the performance of BPI solutions. The approach separates the application and middleware aspects of BPI solutions, and thus allows users to predict the performance of different BPI applications deployed on the same middleware. Using this approach, a sizing tool prototype for the Websphere Interchange Server is developed. Preliminary evaluation shows that the tool is able to recommend the hardware configuration with minimum cost while satisfying the performance objective of the applications. As a by-product, the sizes of the various thread pools of the middleware are also recommended by the sizing tool. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.