2008 International Symposium on Electronic Commerce and Security最新文献

筛选
英文 中文
A Research of Trust Based on E-Commerce 基于电子商务的信任研究
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.166
Lihua Ruan, Ding-shi Tian
{"title":"A Research of Trust Based on E-Commerce","authors":"Lihua Ruan, Ding-shi Tian","doi":"10.1109/ISECS.2008.166","DOIUrl":"https://doi.org/10.1109/ISECS.2008.166","url":null,"abstract":"The openness and anonymity of the Internet have given rise to online fraud, which has severely affected the development of China's e-commerce. This paper analyzes the impact of relevant factors on trust in e-commerce of China and proposes that China should draw on the experiences of developed countries to establish and improve relevant legal system, combing personal credit system with the ID card system, developing and improving social credit system, punishing the dishonesty. Meanwhile, the online third-party certificate authority specializing in facilitating the development of e-commerce need to be fostered.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131712981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Statistics-Based Watermarking Scheme Robust to Print-and-Scan 一种基于统计的抗打印扫描水印方案
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.68
Daofang Cheng, Xiaolong Li, Wenfa Qi, Bin Yang
{"title":"A Statistics-Based Watermarking Scheme Robust to Print-and-Scan","authors":"Daofang Cheng, Xiaolong Li, Wenfa Qi, Bin Yang","doi":"10.1109/ISECS.2008.68","DOIUrl":"https://doi.org/10.1109/ISECS.2008.68","url":null,"abstract":"This paper proposes a print-and-scan (PS) resilient watermarking scheme based on the mean of DCT coefficients (MDC) for a fixed AC frequency of image. We investigate the property of MDC in the PS process and find that the MDC is nearly unchanged after PS, which is approximately zero for natural (non-watermarked) images. The watermark bits are embedded by shifting these PS-invariants to be positive or negative. The embedding intensity of the scheme is determined by a JND model to avoid the visible distortion. Experimental results show that the scheme can successfully resist the PS attack in different printing status.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127569232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A New Web Text Clustering Algorithm Based on DFSSM 一种基于DFSSM的Web文本聚类算法
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.110
Bingru Yang, Zefeng Song, Yinglong Wang, Wei Song
{"title":"A New Web Text Clustering Algorithm Based on DFSSM","authors":"Bingru Yang, Zefeng Song, Yinglong Wang, Wei Song","doi":"10.1109/ISECS.2008.110","DOIUrl":"https://doi.org/10.1109/ISECS.2008.110","url":null,"abstract":"A new algorithm of Web text clustering mining is presented, which is based on the Discovery Feature Sub-space Model (DFSSM). This algorithm includes the training stage of SOM and the clustering stage, which characterizes self-stability and powerful antinoise ability. It can distinguishes the most meaningful features from the Concept Space without the evaluation function. we have applied the algorithm to the modern long-distance education. Through the analysis of the experimental results, it is obvious that this algorithm can effective help users to get valuable information from WWW quickly.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study on Predicting User Purchase Intention on the Creative Product: A Case of Apparel 创意产品用户购买意愿预测的实证研究——以服装为例
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.176
Chen Pang, Xiaofen Ji
{"title":"An Empirical Study on Predicting User Purchase Intention on the Creative Product: A Case of Apparel","authors":"Chen Pang, Xiaofen Ji","doi":"10.1109/ISECS.2008.176","DOIUrl":"https://doi.org/10.1109/ISECS.2008.176","url":null,"abstract":"A study of consumer acceptance of the Internet as a channel of purchasing creative products (e.g. apparel) was conducted using a modified technology acceptance model (TAM). Two consumer characteristics (product involvement and product innovativeness) were introduced into the TAM to develop an extended model. Through checking the extended model, we found that the proposed model was valid in explaining and predicting consumer behaviors in the creative product (clothing) e-commerce context. Perceived usefulness and ease of use of online apparel shopping had most significant effect on attitude towards online apparel purchasing, and were the primary determinants of consumerspsila behavioral intention. Conclusion and implications were discussed.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scalable Trust in Multi-agent E-commerce System 多代理电子商务系统中的可扩展信任
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.84
Shuliang Zhao, Haifeng Liu, Zhaohao Sun
{"title":"Scalable Trust in Multi-agent E-commerce System","authors":"Shuliang Zhao, Haifeng Liu, Zhaohao Sun","doi":"10.1109/ISECS.2008.84","DOIUrl":"https://doi.org/10.1109/ISECS.2008.84","url":null,"abstract":"Trust between agents is a key issue in multi-agent e-commerce system (MECS). With the expanding of system scale and the rapid increase of e-commerce, scalable trust in e-commerce system becomes critical. This article examines scalable trust of a system, in particular in e-commerce system, and classifies the trust between agents in e-commerce system. Then it discusses the realization of scalable trust from the viewpoint of sociology and engineering.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115192903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Research of Outsourcing Decision-making Based on Outsourcing Market Maturity 基于外包市场成熟度的外包决策研究
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.15
Hongju Zhang, Jiajia Liu, Zhijun Yan
{"title":"A Research of Outsourcing Decision-making Based on Outsourcing Market Maturity","authors":"Hongju Zhang, Jiajia Liu, Zhijun Yan","doi":"10.1109/ISECS.2008.15","DOIUrl":"https://doi.org/10.1109/ISECS.2008.15","url":null,"abstract":"A correct outsourcing decision-making is the premise of a successful outsourcing. When making outsourcing decision, enterprise managers focus on inner factors, such as the firmpsilas core competency, financial status, technical status, organizational restructuring, and risk-sharing and so on. However, they neglect issues from the perspective of outsourcing market maturity. Thus it results in a limit decision. In this paper, an outsourcing market maturity model is proposed based on the analysis of outsourcing market. According to capability maturity model for software, an outsourcing decision framework is established, which provides a model on three key dimensions of core competency, asset specificity and market maturity.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114836523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Research of Modeling Methods for Workflow Process 工作流过程建模方法比较研究
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.55
Guoyin Jiang, Lihong Dong
{"title":"Comparative Research of Modeling Methods for Workflow Process","authors":"Guoyin Jiang, Lihong Dong","doi":"10.1109/ISECS.2008.55","DOIUrl":"https://doi.org/10.1109/ISECS.2008.55","url":null,"abstract":"The workflow model is key component of workflow system, it is significant for business process reengineering and optimization that the workflow management system is researched and developed. In this paper, the current state of research in workflow process modeling are overviewed after describing the essence and standard of workflow process modeling, the main common modeling theories include flow figure, status figure, activity network figure, IDEF, ECAA, Petri net, and so on. In order to solve the deficiency of formalized and graphic expression ability, complicated modeling procedure, the methods of solution for problems and development trend of workflow related theories are put forward, the main single advanced modeling methods are process data mining, extended Petri nets and process algebra, and suit modeling environment for these methods are analyzed and compared, and the combined modeling framework is introduced in the last part.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117293875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Perceived Value on User Acceptance of Mobile Commerce 感知价值对用户接受移动商务的影响
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.9
Tao Zhou
{"title":"The Impact of Perceived Value on User Acceptance of Mobile Commerce","authors":"Tao Zhou","doi":"10.1109/ISECS.2008.9","DOIUrl":"https://doi.org/10.1109/ISECS.2008.9","url":null,"abstract":"User acceptance of mobile service is the first step for enterprises to successfully implement mobile commerce. Extant research has tried to explain user acceptance of mobile commerce based on TAM and neglected the impact of usage cost, enjoyment and social evaluation on user behavior. Based on the theory of perceived value,this paper examines the impact of perceived value on user acceptance behavior. Perceived value as a second-order factor includes four dimensions: financial value, quality value, emotional value and social value. We collected 184 valid papers and conducted data analysis with PLS Graph. The results show that perceived value strongly affects trust and satisfaction, further determining user acceptance intention. Among four dimensions, social value has relatively larger effect and financial value has weaker effect.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116398378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Reliable Web Service Implementation Approach for Large Commercial Applications 大型商业应用程序的可靠Web服务实现方法
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.21
Jianbin Huang, Heli Sun
{"title":"A Reliable Web Service Implementation Approach for Large Commercial Applications","authors":"Jianbin Huang, Heli Sun","doi":"10.1109/ISECS.2008.21","DOIUrl":"https://doi.org/10.1109/ISECS.2008.21","url":null,"abstract":"Reliability of Web services is an important problem for developing electronic business applications. However, when the number of service requests become very huge it is hard to guarantee the availability of a service. In this paper, a novel approach for reliable Web service provisioning based on mobile agent and resource discovery technologies is proposed. In our approach, new service can be appropriately instantiated on demand, therefore reducing the risk of service being unavailable. Then a dispatching algorithm for resources selection and a multi-phase resource planning algorithm for composite Web services are presented. Experimental results show that our approach is more robust and adaptive in highly dynamic environments.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"13 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123648363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using Criterion-Based Access Control for Multilevel Database Security 基于标准的多级数据库安全访问控制
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.198
Leon Pan
{"title":"Using Criterion-Based Access Control for Multilevel Database Security","authors":"Leon Pan","doi":"10.1109/ISECS.2008.198","DOIUrl":"https://doi.org/10.1109/ISECS.2008.198","url":null,"abstract":"This paper presents a novel criterion-based access control approach to deal with multilevel database security. In this approach, authorization rules are transformed to security criteria, security criterion expressions, and security criterion subsets. Security criterion expressions are associated with (sub) objects to serve as locks, and security criteria are associated with users to serve as keys. The fine-grained multilevel access control is achieved by using the available security criteria (keys) to evaluate the security criterion expressions (locks). Whether an (sub) object such as a cell, a row, a column, or a table is accessible to a user depends on the evaluation values of the relevant security criterion expressions.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129870972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信