{"title":"Decision Analysis of Sequence Multi-Stage IT Project under Uncertainty","authors":"Jian Zhang, Suling Jia, Yanqin Guo","doi":"10.1109/ICMECG.2008.11","DOIUrl":"https://doi.org/10.1109/ICMECG.2008.11","url":null,"abstract":"This article analyzes the limitation and disadvantages of the current IT investment evaluation methods and studies the problem of multi-stage sequential IT investment decision under uncertainty using dynamic programming method. First, the variation mode of cost and benefit of IT investment is discussed and described with mathematic formulation; second, the decision model for IT investment is developed and extended to the multi-stage sequential IT investment; finally, this model is applied to numerical calculation cases to testify its effectiveness, which provide a quantitative research method for independent or multi-stage sequential IT investment decision under uncertainty.","PeriodicalId":155692,"journal":{"name":"2008 International Conference on Management of e-Commerce and e-Government","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123092690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integrated Framework to Explicate CIOs' Impulsions on Technology Investment","authors":"Hongmei Huo, Yang Da","doi":"10.1109/ICMECG.2008.91","DOIUrl":"https://doi.org/10.1109/ICMECG.2008.91","url":null,"abstract":"CIOs' impulsions on technology investment are a critical factor for the development of enterprises, and the research in this area is limited. The authors give an overview about the theoretical background about the decision-makings, summary the difficulties emerging when CIOs make decisions, and go further to propose an integrated framework to explicate the CIOs' behavior .","PeriodicalId":155692,"journal":{"name":"2008 International Conference on Management of e-Commerce and e-Government","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132780487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of Web Service Composition Based on Dynamic Weighted Path Tree","authors":"Huanyao Hu, W. Dong, Guang Yang","doi":"10.1109/ICMECG.2008.10","DOIUrl":"https://doi.org/10.1109/ICMECG.2008.10","url":null,"abstract":"Increasing the efficiency and accuracy on dynamic optimization choosing of Web service composition is the key point of researching on service composition. In allusion to 1 the way that we use a shortest path based on a weighted tree to describe the Web service composition question, users can set the Qos attribute weight to translate their preference and satisfaction into certain constraints on service composition. We can build an optimal Web service composition path tree through a multi-objective optimization Web service choosing technique, and finally use a low cost shortest path algorithm to achieve better service composition.","PeriodicalId":155692,"journal":{"name":"2008 International Conference on Management of e-Commerce and e-Government","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125235954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Science and Technology Program Financial Forecast Model Based on Rough Set and Support Vector Machine","authors":"Bin Hua, Yanan Wu","doi":"10.1109/ICMECG.2008.89","DOIUrl":"https://doi.org/10.1109/ICMECG.2008.89","url":null,"abstract":"Since entering the 21st century, the funds on science and technology programs invested by the country are increasing year by year with the growing demand for science and technology. So, the assessment of science and technology programs is more and more important, especially the evaluating of financial situation which is a key. This text introduces the theory of rough set and support vector machine to analyze and predict the financial situation of enterprises and set up the financial forecast model. It offers the supervision and management before and after the S&T management sector make decision. Finally, it proves the feasibility and practicability of this model through a practical example.","PeriodicalId":155692,"journal":{"name":"2008 International Conference on Management of e-Commerce and e-Government","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122765489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Suggested Choices for the Path to Eliminate Excess Liquidity in China","authors":"Dandan Xu","doi":"10.1109/ICMECG.2008.82","DOIUrl":"https://doi.org/10.1109/ICMECG.2008.82","url":null,"abstract":"This paper has defined excess liquidity as lack of transaction ability of financial assets. From this perspective, the author points out that current excess liquidity in China is originated from the internal and external disequilibrium of economic structure, and that current policies aiming at eliminating excess liquidity take little effect because they put too much focus on the gross control. Thus, it is better to \"dredge\" rather than to \"stifle\" liquidity. Only by changing from passive gross control to active structural adjustment can we achieve benign interaction between economy and finance, and thus branch off the current excess liquidity in China and fully utilize it as well.","PeriodicalId":155692,"journal":{"name":"2008 International Conference on Management of e-Commerce and e-Government","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117130947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Implementation of RSA Algorithm in Java","authors":"Jiezhao Peng, Qi Wu","doi":"10.1109/ICMECG.2008.17","DOIUrl":"https://doi.org/10.1109/ICMECG.2008.17","url":null,"abstract":"This paper briefly introduces the concept of RSA algorithm, and presents the flaws of other existing implementations of RSA Algorithm in Java, thereby designs our improved implementation and analyzes the performance of our implementation. Wepsilave developed a piece of software for encrypting and decrypting text files.","PeriodicalId":155692,"journal":{"name":"2008 International Conference on Management of e-Commerce and e-Government","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116994656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing a Simple Java-Based Mobile Simulation Game","authors":"Lei Shu","doi":"10.1109/ICMECG.2008.48","DOIUrl":"https://doi.org/10.1109/ICMECG.2008.48","url":null,"abstract":"In recent years, mobile games have gained popularity for providing personal entertainment. With the number of mobile gamers around the world becoming larger and larger, the mobile gaming business generates numerous opportunities for game developers and associated professionals. This paper concentrates on SLG, one kind of most popular games, and tells how to developing a simple example of SLG based J2ME. The structure of the example game is analyzed in details and the transformation diagram of game states is given to help understanding the game process.","PeriodicalId":155692,"journal":{"name":"2008 International Conference on Management of e-Commerce and e-Government","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131735837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the E-Government Scheme Based on Multi-Technologies and Bi-Directional Authentication","authors":"Li Liangzhi","doi":"10.1109/ICMECG.2008.41","DOIUrl":"https://doi.org/10.1109/ICMECG.2008.41","url":null,"abstract":"The authentication is the key part of the network security. It is also the main problem we should resolve. This scheme, which is bi-directional, using multi-mechanism to ensure safety authentication and providing a uniform authentication service to other e-government application system, meets the need of current e-government system. But authentication technology and e-government system are continually developing, there are still many problems need to be solved.","PeriodicalId":155692,"journal":{"name":"2008 International Conference on Management of e-Commerce and e-Government","volume":"451 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123046551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Reformation of the C2C Electronic Commerce Transaction Process","authors":"Guoyou Zhang, Yueqiang Zhang, Yu Li","doi":"10.1109/ICMECG.2008.33","DOIUrl":"https://doi.org/10.1109/ICMECG.2008.33","url":null,"abstract":"The article analyzes the problems existing in the process of C2C electronic commerce, and put forwards the preferable solutions by the redesigning and recreating of business transaction process. The solutions include: the regulations about the redesigning and recreating; the general transaction service process; the settlement resulting from the buyerpsilas to receive the products; the settlement of disputes arising from the fact that the buyer finds some defects in the products delivered by the seller; promote healthy transaction through the construction of community culture; protect the interests of the Website, the seller, the logistics and the third party etc.","PeriodicalId":155692,"journal":{"name":"2008 International Conference on Management of e-Commerce and e-Government","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114616978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Neural Network Cost Prediction Model Based on the Rough Sets Theory in ERP","authors":"X.F. Zhang","doi":"10.1109/ICMECG.2008.54","DOIUrl":"https://doi.org/10.1109/ICMECG.2008.54","url":null,"abstract":"Whether an enterprise is able to survive during the cruel competition or not is mostly dependent on the cost of investment. Enterprise resource planning (ERP) has been adopting by more and more enterprises and acquires comprehensive admit because it brings out great benefit for the enterprises. A framework of the system coupled by the cost management of ERP is designed. How to design a rough and artificial neutral network is analyzed based on the theory of rough sets with some reduction. The model based rough sets neural network prediction is more efficient and higher precision than BP model in cost prediction.","PeriodicalId":155692,"journal":{"name":"2008 International Conference on Management of e-Commerce and e-Government","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116806044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}