Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00-7:30 AM ET (10:00-12:30 UTC).
We apologize for the inconvenience.
By Topic

2012 IEEE 14th International Conference on Commerce and Enterprise Computing

9-11 Sept. 2012

Filter Results

Displaying Results 1 - 25 of 41
  • [Front cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1133 KB)
    Freely Available from IEEE
  • [Title pages i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • [Title pages iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Welcome message from the Program Chairs

    Publication Year: 2012, Page(s):viii - ix
    Request permission for commercial reuse | PDF file iconPDF (93 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Welcome message from the SEMP 2012 Workshop Chairs

    Publication Year: 2012, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome message from the UCIA 2012 Workshop Chairs

    Publication Year: 2012, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (101 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome message from the STIIS 2012 Workshop Chairs

    Publication Year: 2012, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (85 KB) | HTML iconHTML
    Freely Available from IEEE
  • Enterprise Architecture: A Strategic Specialism

    Publication Year: 2012, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (650 KB) | HTML iconHTML

    In this paper we are not so much concerned with enterprise architecture as a product or process, but rather with the competencies of the professionals who are responsible for the creation of an enterprise architecture, i.e. the enterprise architects themselves. We present the integrated result of three surveys held in the Netherlands, on the competencies required from enterprise architects. The su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • REA-DSL: Business Model Driven Data-Engineering

    Publication Year: 2012, Page(s):9 - 16
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB) | HTML iconHTML

    An accounting information system (AIS) manages data about a company's financial and economic status. The contribution of this paper is closing the gap between the languages used by business domain experts and IT-experts in analyzing the relevant data. A well accepted approach for an accountability infrastructure is the Resource-Event-Agent (REA) ontology. Although REA has been based on well-establ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Encoded EDIFACT Messages to Business Concepts Using Semantic Annotations

    Publication Year: 2012, Page(s):17 - 25
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (913 KB) | HTML iconHTML

    Standardized business documents are a prerequisite for Electronic Data Interchange (EDI). One predominant standards family are the Electronic Data Interchange For Administration, Commerce and Transport (EDIFACT) formats created and maintained by the United Nations Centre for Trade Facilitation and Electronic Business. However, EDIFACT formats are currently specified in a textual manner where seman... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differences in Efficiency between B2Bs and B2Cs in the Japanese IT Services Industry

    Publication Year: 2012, Page(s):26 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (655 KB) | HTML iconHTML

    The purpose of this study is to investigate the efficiency of the hierarchies embedded in the Japanese IT services industry. Especially, this paper focuses on the differences in efficiency between B2Bs and B2Cs. Empirical models used in the literature on the productivity paradox and outsourcing often have conflicting results. To mirror the reality of the industry, it is necessary to show results i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavioral Analysis of Registered Web Site Visitors with Help of Mouse Tracking

    Publication Year: 2012, Page(s):33 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    We present a method to extract implicit data of registered users of a web site with the help of mouse tracking. This allows us to generate more accurate interest profiles of visitors of a web site and to obtain a solid basis for the calculation of user interests or trend detection in the Web. On the one hand, web site owners have the opportunity to adjust their sites to the interests of their user... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bootstrapping Trust and Reputation for Web Services

    Publication Year: 2012, Page(s):41 - 48
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    Trust and reputation of web services is usually established based on the historical information about past transactions or rating scores collected over a period of time. However, when a new web service joins a community, normally there is not much information to be relied on to evaluate its initial reputation. Therefore trust bootstrapping, the technique to establish trust for a web service based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Moderating Effect of Legitimacy and Reputation on SMEs in a B2B Environment

    Publication Year: 2012, Page(s):49 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    How to survive and grow has always been a serious problem faced by the small and medium sized enterprises (SMEs) on a B2B platform. A lot of researches in entrepreneurship field have proved the positive effects of entrepreneurial orientation on firms' performance, but few researchers studied how entrepreneurial orientation influences performance. Based on the institutional theory, this paper intro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Based Reputation Management for Service Composition and Reconfiguration

    Publication Year: 2012, Page(s):57 - 61
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    Service-Oriented Architecture (SOA) provides a framework for service composition and reconfiguration. In addition to making composition decisions by considering functional attributes, technology for composition by meeting non-functional requirements such as QoS is also needed. In this paper, we present an approach to compose business process by considering context-based service reputation. Since s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Aware Proactive Process Reconfiguration in Service-Oriented Architecture

    Publication Year: 2012, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (638 KB) | HTML iconHTML

    With the growth of mobile applications, user context becomes a dynamic but important factor for quality of service (QoS) in the cyber world. Many digital services have distinctly different performance under different service contexts. At runtime, an unexpected transition of user context may cause an application to fail to deliver the required QoS. In this paper, we propose a proactive service sele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Generic Architecture for User-Centric Portlet Integration

    Publication Year: 2012, Page(s):70 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (506 KB) | HTML iconHTML

    Numerous attempts have been made towards achieving flexible integration of external applications into a coherent enterprise architecture. The topic of "networked enterprises" describes flexible organisations characterised by distributed teams of partner companies, humans, computer applications, autonomous robots, and devices collaborating with each other in order to achieve higher productivity and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Serendipitous Exploration of Large-scale Product Catalogs

    Publication Year: 2012, Page(s):78 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Online shopping has developed to a stage where catalogs have become very large and diverse. Thus, it is a challenge to present relevant items to potential customers within a very few interactions. This is even more so when users have no defined shopping objectives but operate in an opportunistic mindset. This problem is often tackled by recommender systems. However, these systems rely on consisten... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effects of ICT Innovation and Industry Regulation on Chinese Travel Website's Marketing Logic

    Publication Year: 2012, Page(s):86 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (415 KB) | HTML iconHTML

    Over ten more years of development, travel website has been the intuitive and effective information facility for an ever increasing share of individual and business travelers in China. Notably, with the fast scale expansion of domestic users and online suppliers, the e-tourism market has shown signs of monopolistic competition, which is featured by IT companies dominating instead of travel agencie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Information Assets for Open Data: The Role of Business Architecture and Information Quality

    Publication Year: 2012, Page(s):94 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB) | HTML iconHTML

    The past few years have seen a growing interest in Open Data, a movement that encourages the sharing of public sector information for better governance, greater services and more vibrant economy. While data in government agencies are in abundance, their value and quality vary significantly. Without a structured approach, low-value and poor-quality information assets may be chosen, limiting the pos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social network characteristics of online shopping interpersonal relationship in real and virtual communities

    Publication Year: 2012, Page(s):101 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (673 KB) | HTML iconHTML

    Both real and virtual communities are important channels for consumers to release, disseminate or access to reputation information, and shopping interpersonal relationship appears among community members who communicate with each other through word of mouth. This paper selects 200 true communities and 400 virtual communities, and takes two million real trading data of 100,000 Taobao users in these... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.