{"title":"Towards a theoretical framework of determinants for the adoption and diffusion of buyer authenticated credit card payment programs: the online merchant's perspective","authors":"Mustafa A. Ally, M. Toleman","doi":"10.1109/ICECT.2004.1319756","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319756","url":null,"abstract":"This study employs Rogers' framework of perceived innovation attributes augmented by environmental influences and marketing initiatives and a new factor developed for this study, namely, risk mitigation measures, to examine the case of merchant adoption of buyer authenticated credit card payment programs (BACCPPs). Recently introduced by the major credit card associations as replacements for the decommissioned SET and 3DSET protocols, the new payment models, 3DSecure and UCAF/SPA, have been designed to provide an added level of security for merchants and consumers. Using data gleaned from preliminary interviews, discussion forums and promotional material, we present a critical analysis of the potential barriers and facilitators that impact on the widespread diffusion of these programs. This is used as the basis for developing a preliminary theoretical framework of the potential determinants of adoption of BACCPP from the perspective of online merchants, as well as a survey instrument to demonstrate the empirical validity of our theoretical formulation.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127217034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A capacity sizing tool for a business process integration middleware","authors":"Te-Kai Liu, Hui Shen, S. Kumaran","doi":"10.1109/ICECT.2004.1319734","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319734","url":null,"abstract":"Capacity sizing of business process integration (BPI) solutions deals with finding the lowest cost hardware configuration that can satisfy the performance requirements of a BPI solution being planned. Accurate sizing can help control the cost of a proposed BPI project while minimizing the risk of deploying a solution that will fail to meet the performance requirements later on. This paper proposes a model driven approach for predicting the performance of BPI solutions. The approach separates the application and middleware aspects of BPI solutions, and thus allows users to predict the performance of different BPI applications deployed on the same middleware. Using this approach, a sizing tool prototype for the Websphere Interchange Server is developed. Preliminary evaluation shows that the tool is able to recommend the hardware configuration with minimum cost while satisfying the performance objective of the applications. As a by-product, the sizes of the various thread pools of the middleware are also recommended by the sizing tool.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130812466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Java-based information browsing system in a remote display environment","authors":"T. Maekawa, T. Uemukai, T. Hara, S. Nishio","doi":"10.1109/ICECT.2004.1319755","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319755","url":null,"abstract":"In this paper, we describe our design and implementation of an information browsing system using Java-based cellular phones in a remote display environment which we have proposed. In this system, an application on a remote display displays various information for users, and a Java application on a cellular phone displays operational pages for users to operate the application on the remote display. Users can operate the application and browse information on the remote display by operating the corresponding operational pages on the cellular phone.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":" 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132095059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of user intervention mechanisms for privacy on SME online trust","authors":"D. Jutla, E. Kelloway, S. Saifi","doi":"10.1109/ICECT.2004.1319744","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319744","url":null,"abstract":"This paper describes empirical results that quantitatively show that user intervention tools for privacy significantly contribute towards online trust. We extend a seminal, validated measurement scale for online trust by adding measurement items for 5 user intervention (UIVs) mechanisms for trust: P3P, cookie crushers, encryption, pseudonymizer, and anonymizing tools. From analysis of 242 valid user responses collected in fall 2003, we find that those users willing to adopt user intervention mechanisms have statistically significant higher mean online trusting intentions. These users' mean trusting beliefs in small and medium size e-business is stronger than non-adopters and those undecided users sitting on the fence. Finally, we show our amendments to online trust theory to be plausible using the structural equation modeling technique and data for all groups of users.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132159504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coupon based incentive systems and the implications of equilibrium theory","authors":"A. Garyfalos, K. Almeroth","doi":"10.1109/ICECT.2004.1319736","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319736","url":null,"abstract":"\"Coupons \" is an incentive scheme that gives users credit for forwarding information to other users over wireless, potentially ad hoc networks. Having previously performed an initial evaluation of the main characteristics, this paper first examines how this idea works in more complex, hybrid networks and then focuses on the effects of user behavior on system performance. By considering implications of game theory concepts, such as evolutionary stable strategies, particular emphasis is given on how we can reasonably constrain behavior to a range of values, all of which result in good system performance. Results show that by developing and validating effective incentive systems, we can greatly improve the ability to efficiently disseminate information to users throughout the evolving Internet.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125720392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Josef Schiefer, J. Jeng, Shubir Kapoor, Pawan Chowdhary
{"title":"Process information factory: a data management approach for enhancing business process intelligence","authors":"Josef Schiefer, J. Jeng, Shubir Kapoor, Pawan Chowdhary","doi":"10.1109/ICECT.2004.1319730","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319730","url":null,"abstract":"With access to critical performance indicators of business processes, executives, business managers and staff members can play a crucial role in improving the speed and effectiveness of an organization's business operations. The monitoring and analysis of business processes are complicated by the variety of organizational units and information systems involved in the execution of these processes. In this paper, we present a process information factory as a solution for managing performance data of business processes. The purpose of the process information factory is to provide a data foundation for a process-driven decision support system to monitor and improve business processes continuously.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121073942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure M+1/sup st/ price auction scheme based on RSAP","authors":"Xiao Qinghua, Ling-di Ping, Xuezeng Pan","doi":"10.1109/ICECT.2004.1319760","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319760","url":null,"abstract":"The Internet is a prime vehicle for supporting electronic auction, a primitive pricing mechanism for setting price. But up to now, the study of efficient and secure M+1/sup st/ price auction is still very weak. Aiming at this drawback, this paper presented a new solution for M+1/sup st/ price auction in the case of protecting bidders. Employing the method of binary search, this scheme resolves the winners and the winning price synchronously and rapidly. If necessary, all auctioneers can collaborate with each other to open the winners' bidding prices without leaking any privacy of losers. Comparison in terms of communication cost between our proposed scheme and others was given at the end of the paper. The result shows that our solution consumes less bandwidth in communication.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123057493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A computational geometry approach to Web personalization","authors":"Maria Rigou, S. Sirmakessis, A. Tsakalidis","doi":"10.1109/ICECT.2004.1319762","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319762","url":null,"abstract":"In this paper we present an algorithm for efficient personalized clustering. The algorithm combines the orthogonal range search with the k-windows algorithm. It offers a real-time solution for the delivery of personalized services in online shopping environments, since it allows on-line consumers to model their preferences along multiple dimensions, search for product information, and then use the clustered list of products and services retrieved for making their purchase decisions.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133242891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal specification and verification of the SET/A protocol with an approach","authors":"Vitus S. W. Lam, J. Padget","doi":"10.1109/ICECT.2004.1319738","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319738","url":null,"abstract":"In this paper, we specify the SET/A protocol which is an agent-based payment protocol for credit card transactions in UML statechart diagrams. Then we translate them into the NuSMV language and analyze the payment protocol using the NuSMV model checker. Although the payment protocol satisfies desired properties including data integrity and deadlock freedom in the absence of an agent failure, a failure analysis reveals that not all desired properties are satisfied when the agent crashes. The agent may fail while it is travelling to a merchant's server or when it is running in the merchant's server. To ensure that a transaction is resilient to the agent failure, an extended SET/A protocol is proposed. Whenever a timeout occurs, the cardholder sends an inquiry request to the merchant directly for finding out the transaction result. Our work contributes the e-commerce field by using an integrated approach for modelling and analyzing the SET/A protocol.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129514517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reestimation of e-business planning model in real business world","authors":"Fen Wang, G. Forgionne, Lidan Ha","doi":"10.1109/ICECT.2004.1319750","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319750","url":null,"abstract":"Strategic business planning is a critical decision problem determining the long-term survival and prosperity of companies especially in this E-era. However, due to the dynamic and complicated nature of the e-business environment and decision makers' lack of technological sophistication, the development of e-business strategies constitutes a major challenge for managers. In an ongoing project, we have been focusing on DMSS development and its role in decision support for e-business planning. An E-business planning model was estimated and developed using empirical eBay data. This current study thus aims to reestimate and evaluate such implementation to further broaden the application base in a practical field setting.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134022860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}