Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.最新文献

筛选
英文 中文
Towards a theoretical framework of determinants for the adoption and diffusion of buyer authenticated credit card payment programs: the online merchant's perspective 对买方认证信用卡支付程序的采用和扩散的决定因素的理论框架:在线商家的观点
Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004. Pub Date : 2004-07-06 DOI: 10.1109/ICECT.2004.1319756
Mustafa A. Ally, M. Toleman
{"title":"Towards a theoretical framework of determinants for the adoption and diffusion of buyer authenticated credit card payment programs: the online merchant's perspective","authors":"Mustafa A. Ally, M. Toleman","doi":"10.1109/ICECT.2004.1319756","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319756","url":null,"abstract":"This study employs Rogers' framework of perceived innovation attributes augmented by environmental influences and marketing initiatives and a new factor developed for this study, namely, risk mitigation measures, to examine the case of merchant adoption of buyer authenticated credit card payment programs (BACCPPs). Recently introduced by the major credit card associations as replacements for the decommissioned SET and 3DSET protocols, the new payment models, 3DSecure and UCAF/SPA, have been designed to provide an added level of security for merchants and consumers. Using data gleaned from preliminary interviews, discussion forums and promotional material, we present a critical analysis of the potential barriers and facilitators that impact on the widespread diffusion of these programs. This is used as the basis for developing a preliminary theoretical framework of the potential determinants of adoption of BACCPP from the perspective of online merchants, as well as a survey instrument to demonstrate the empirical validity of our theoretical formulation.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127217034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A capacity sizing tool for a business process integration middleware 用于业务流程集成中间件的容量调整工具
Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004. Pub Date : 2004-07-06 DOI: 10.1109/ICECT.2004.1319734
Te-Kai Liu, Hui Shen, S. Kumaran
{"title":"A capacity sizing tool for a business process integration middleware","authors":"Te-Kai Liu, Hui Shen, S. Kumaran","doi":"10.1109/ICECT.2004.1319734","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319734","url":null,"abstract":"Capacity sizing of business process integration (BPI) solutions deals with finding the lowest cost hardware configuration that can satisfy the performance requirements of a BPI solution being planned. Accurate sizing can help control the cost of a proposed BPI project while minimizing the risk of deploying a solution that will fail to meet the performance requirements later on. This paper proposes a model driven approach for predicting the performance of BPI solutions. The approach separates the application and middleware aspects of BPI solutions, and thus allows users to predict the performance of different BPI applications deployed on the same middleware. Using this approach, a sizing tool prototype for the Websphere Interchange Server is developed. Preliminary evaluation shows that the tool is able to recommend the hardware configuration with minimum cost while satisfying the performance objective of the applications. As a by-product, the sizes of the various thread pools of the middleware are also recommended by the sizing tool.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130812466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Java-based information browsing system in a remote display environment 基于java的远程显示环境下的信息浏览系统
Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004. Pub Date : 2004-07-06 DOI: 10.1109/ICECT.2004.1319755
T. Maekawa, T. Uemukai, T. Hara, S. Nishio
{"title":"A Java-based information browsing system in a remote display environment","authors":"T. Maekawa, T. Uemukai, T. Hara, S. Nishio","doi":"10.1109/ICECT.2004.1319755","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319755","url":null,"abstract":"In this paper, we describe our design and implementation of an information browsing system using Java-based cellular phones in a remote display environment which we have proposed. In this system, an application on a remote display displays various information for users, and a Java application on a cellular phone displays operational pages for users to operate the application on the remote display. Users can operate the application and browse information on the remote display by operating the corresponding operational pages on the cellular phone.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":" 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132095059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evaluation of user intervention mechanisms for privacy on SME online trust 中小企业网络信任用户隐私干预机制评价
Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004. Pub Date : 2004-07-06 DOI: 10.1109/ICECT.2004.1319744
D. Jutla, E. Kelloway, S. Saifi
{"title":"Evaluation of user intervention mechanisms for privacy on SME online trust","authors":"D. Jutla, E. Kelloway, S. Saifi","doi":"10.1109/ICECT.2004.1319744","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319744","url":null,"abstract":"This paper describes empirical results that quantitatively show that user intervention tools for privacy significantly contribute towards online trust. We extend a seminal, validated measurement scale for online trust by adding measurement items for 5 user intervention (UIVs) mechanisms for trust: P3P, cookie crushers, encryption, pseudonymizer, and anonymizing tools. From analysis of 242 valid user responses collected in fall 2003, we find that those users willing to adopt user intervention mechanisms have statistically significant higher mean online trusting intentions. These users' mean trusting beliefs in small and medium size e-business is stronger than non-adopters and those undecided users sitting on the fence. Finally, we show our amendments to online trust theory to be plausible using the structural equation modeling technique and data for all groups of users.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132159504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Coupon based incentive systems and the implications of equilibrium theory 基于券的激励制度及其均衡理论的启示
Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004. Pub Date : 2004-07-06 DOI: 10.1109/ICECT.2004.1319736
A. Garyfalos, K. Almeroth
{"title":"Coupon based incentive systems and the implications of equilibrium theory","authors":"A. Garyfalos, K. Almeroth","doi":"10.1109/ICECT.2004.1319736","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319736","url":null,"abstract":"\"Coupons \" is an incentive scheme that gives users credit for forwarding information to other users over wireless, potentially ad hoc networks. Having previously performed an initial evaluation of the main characteristics, this paper first examines how this idea works in more complex, hybrid networks and then focuses on the effects of user behavior on system performance. By considering implications of game theory concepts, such as evolutionary stable strategies, particular emphasis is given on how we can reasonably constrain behavior to a range of values, all of which result in good system performance. Results show that by developing and validating effective incentive systems, we can greatly improve the ability to efficiently disseminate information to users throughout the evolving Internet.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125720392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Process information factory: a data management approach for enhancing business process intelligence 流程信息工厂:用于增强业务流程智能的数据管理方法
Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004. Pub Date : 2004-07-06 DOI: 10.1109/ICECT.2004.1319730
Josef Schiefer, J. Jeng, Shubir Kapoor, Pawan Chowdhary
{"title":"Process information factory: a data management approach for enhancing business process intelligence","authors":"Josef Schiefer, J. Jeng, Shubir Kapoor, Pawan Chowdhary","doi":"10.1109/ICECT.2004.1319730","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319730","url":null,"abstract":"With access to critical performance indicators of business processes, executives, business managers and staff members can play a crucial role in improving the speed and effectiveness of an organization's business operations. The monitoring and analysis of business processes are complicated by the variety of organizational units and information systems involved in the execution of these processes. In this paper, we present a process information factory as a solution for managing performance data of business processes. The purpose of the process information factory is to provide a data foundation for a process-driven decision support system to monitor and improve business processes continuously.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121073942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
A secure M+1/sup st/ price auction scheme based on RSAP 基于RSAP的安全M+1/sup / price拍卖方案
Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004. Pub Date : 2004-07-06 DOI: 10.1109/ICECT.2004.1319760
Xiao Qinghua, Ling-di Ping, Xuezeng Pan
{"title":"A secure M+1/sup st/ price auction scheme based on RSAP","authors":"Xiao Qinghua, Ling-di Ping, Xuezeng Pan","doi":"10.1109/ICECT.2004.1319760","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319760","url":null,"abstract":"The Internet is a prime vehicle for supporting electronic auction, a primitive pricing mechanism for setting price. But up to now, the study of efficient and secure M+1/sup st/ price auction is still very weak. Aiming at this drawback, this paper presented a new solution for M+1/sup st/ price auction in the case of protecting bidders. Employing the method of binary search, this scheme resolves the winners and the winning price synchronously and rapidly. If necessary, all auctioneers can collaborate with each other to open the winners' bidding prices without leaking any privacy of losers. Comparison in terms of communication cost between our proposed scheme and others was given at the end of the paper. The result shows that our solution consumes less bandwidth in communication.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123057493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A computational geometry approach to Web personalization Web个性化的计算几何方法
Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004. Pub Date : 2004-07-06 DOI: 10.1109/ICECT.2004.1319762
Maria Rigou, S. Sirmakessis, A. Tsakalidis
{"title":"A computational geometry approach to Web personalization","authors":"Maria Rigou, S. Sirmakessis, A. Tsakalidis","doi":"10.1109/ICECT.2004.1319762","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319762","url":null,"abstract":"In this paper we present an algorithm for efficient personalized clustering. The algorithm combines the orthogonal range search with the k-windows algorithm. It offers a real-time solution for the delivery of personalized services in online shopping environments, since it allows on-line consumers to model their preferences along multiple dimensions, search for product information, and then use the clustered list of products and services retrieved for making their purchase decisions.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133242891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Formal specification and verification of the SET/A protocol with an approach 正式规范和验证SET/A协议的方法
Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004. Pub Date : 2004-07-06 DOI: 10.1109/ICECT.2004.1319738
Vitus S. W. Lam, J. Padget
{"title":"Formal specification and verification of the SET/A protocol with an approach","authors":"Vitus S. W. Lam, J. Padget","doi":"10.1109/ICECT.2004.1319738","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319738","url":null,"abstract":"In this paper, we specify the SET/A protocol which is an agent-based payment protocol for credit card transactions in UML statechart diagrams. Then we translate them into the NuSMV language and analyze the payment protocol using the NuSMV model checker. Although the payment protocol satisfies desired properties including data integrity and deadlock freedom in the absence of an agent failure, a failure analysis reveals that not all desired properties are satisfied when the agent crashes. The agent may fail while it is travelling to a merchant's server or when it is running in the merchant's server. To ensure that a transaction is resilient to the agent failure, an extended SET/A protocol is proposed. Whenever a timeout occurs, the cardholder sends an inquiry request to the merchant directly for finding out the transaction result. Our work contributes the e-commerce field by using an integrated approach for modelling and analyzing the SET/A protocol.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129514517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reestimation of e-business planning model in real business world 对现实商业世界中电子商务规划模型的再评估
Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004. Pub Date : 2004-07-06 DOI: 10.1109/ICECT.2004.1319750
Fen Wang, G. Forgionne, Lidan Ha
{"title":"Reestimation of e-business planning model in real business world","authors":"Fen Wang, G. Forgionne, Lidan Ha","doi":"10.1109/ICECT.2004.1319750","DOIUrl":"https://doi.org/10.1109/ICECT.2004.1319750","url":null,"abstract":"Strategic business planning is a critical decision problem determining the long-term survival and prosperity of companies especially in this E-era. However, due to the dynamic and complicated nature of the e-business environment and decision makers' lack of technological sophistication, the development of e-business strategies constitutes a major challenge for managers. In an ongoing project, we have been focusing on DMSS development and its role in decision support for e-business planning. An E-business planning model was estimated and developed using empirical eBay data. This current study thus aims to reestimate and evaluate such implementation to further broaden the application base in a practical field setting.","PeriodicalId":194289,"journal":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134022860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信