{"title":"Dynamic Business Alliance and its Negotiation Model Based on Multi-agent","authors":"Huamei Sun, Weiwei Wang, Ti-Cheng Huang","doi":"10.1109/ICMECG.2009.119","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.119","url":null,"abstract":"With the development of information technology, the operation pattern of enterprises has changed profoundly. Building effective dynamic business alliance and applying information technology, especially multi-agent technology in the process of dynamic business alliance means a lot for enterprises to improve their competitiveness. This paper first elaborates the concept, formation and characteristics of dynamic alliance, then explores agent technology and characteristics of agent negotiation. At last, the paper designs a negotiation model of dynamic alliance based on multi-agent. Result of this present study shows that it’s a feasible and effective way to apply multi-agent technology in dynamic business alliance and its negotiation process.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124062851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ZX: A Novel Service Selection Solution Based on Selector-Side QoS Measuring","authors":"Zhang Li, Anming Xie, Chen Zhong","doi":"10.1109/ICMECG.2009.101","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.101","url":null,"abstract":"This paper proposes a service selection solution named ZX, which is based on the selector-side QoS measuring results. In ZX, we identify the QoS attributes which could be measured in selector's side, and provide possible solutions to gather the QoS information, and we introduce a new service selecting method, which concerns normal-the-better QoS attributes, by implementing the nearest neighbor algorithm.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127713361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System Dynamics Model to Analysis Oscillation and Amplification in the Closed-Loop Supply Chain","authors":"Xiong Ding, Xiaoqing Gan","doi":"10.1109/ICMECG.2009.70","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.70","url":null,"abstract":"A system dynamics model of a traditional /closed loop supply chain system is investigated in the manufacturer echelon chain under APIOBPCS (Automatic Pipeline Inventory and Order Based Production Control System). The effect of remanufacture and the return ratio on the oscillation and amplification effect were studied. Our results clearly showed that ordering policy designed for a production system with unidirectional flow of materials (i.e., up stream to down stream only), when applied to such an integrated system involving manufacturing remanufacturing can create dynamics in the system. Furthermore, we found that the oscillatory and amplificatory amplitude is much larger than one in traditional supply chain when the remanufacture is introduced into the traditional supply chain, and the fluctuation will become even more greater when the return ratio increasing.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127946824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficiency Evaluation of Regional E-government Services in China Based on Relative Efficiency","authors":"M. Liu, Houxing Tang","doi":"10.1109/ICMECG.2009.129","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.129","url":null,"abstract":"In China, E-government services have been set up in almost regions. The input is much, but what about the effect and efficiency? In this paper, firstly, the effect of e-government on regional governments work is analyzed. Secondly, the importance of evaluation regional E-Government services performance from input and output perspective is analyzed. Thirdly, the review on reference studies is summarized. And last, a DEA performance evaluation model of region E-government in China is proposed. This model can not only give a rank to the performance of regional E-government, but also set up an exemplum for inefficient regions to improve its performance.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131178733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Thinking on Electronic Government Affairs Collaboration in Our Country under Super Ministry Regime","authors":"S. Cheng","doi":"10.1109/ICMECG.2009.124","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.124","url":null,"abstract":"“Super ministry reform” of China provides not only a good environment but also an opportunity for the joint development of e-government. In this paper, some concepts and their relationships are presented from the perspective of economic management, including relationship between collaboration and government affairs collaboration, relationship between collaborative government affairs and e-government collaboration, and relationship between collaborative government affairs and collaboration software. Furthermore, this paper analyzes super ministry and its influence on electronic government, puts forward how to achieve e-government collaboration in China under super ministry regime, which has some practical significance.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128175270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Payment Model of Mobile Phone Based on Third-Party Security","authors":"Yong Xu, Xueyan Liu, Ruiying Yao","doi":"10.1109/ICMECG.2009.74","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.74","url":null,"abstract":"This article introduced the existing third-party mobile payment model, as well as third-party network security payment model and analysis their pros and cons and then concluded a mobile payment model of a combination of the two models - mobile payment model based on third-party security .Then systematically introduced the model structure, made the detailed design of their payment flow and pointed out its market advantages and characteristics of the application.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121437512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Network Forensic Based Plug-In Architecture","authors":"Wenqi Wang, Yong Li","doi":"10.1109/ICMECG.2009.122","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.122","url":null,"abstract":"Considering on judicial forensic requirements and the character of network crime diversity, a architecture basedon XML and plug-in techniques is proposed in this paper. The framework adopts encrypt and authentication technologywhich ensures collected evidence can be accepted by court, so the original evidence in framework is stability. Because of the network application’s diversity, the judgment whether the network packet need collect is implemented by plug-in. Finally, based on the framework, the forensic on specifically information and hacker attack are implemented, in which the analyzing of hacker attack forensic adapts intrusion detection system such as snort, consequently, feasibility of architecture is proved by experiment.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121852504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Relationship of Knowledge Management and Organizational Performance","authors":"Y. Hu","doi":"10.1109/ICMECG.2009.15","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.15","url":null,"abstract":"Establishing criteria for knowledge management (KM) is important, because criteria help to establish a basis for assessing the value and evaluating its results. More importantly, the criteria will tell us what the KM outcomes are and their relevance to organizational performance. The literature review has revealed that widely accepted criteria and performance measures have not been developed for KM. Delphi Technique and survey-based research using a questionnaire targeting KM professionals as respondents were aimed at establishing criteria for assessing KM success for different types of organizations. The results show what organizations consider important outcomes of a KM initiative. Contributions from this research effort should support government, nonprofit, and for-profit organizations in making decisions about KM initiatives and measuring KM efforts in terms of its relevance to the performance of organizations. Future research efforts can focus on developing these KM outcomes into detailed measures.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124865792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Watermarking Image Optimization Method Based on Cort and DCT","authors":"Chen Qiansheng","doi":"10.1109/ICMECG.2009.73","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.73","url":null,"abstract":"In this paper, we propose a optimization method of watermarking image based on Cort and DCT. Exploiting human visual system characteristics, our method dynamically chooses the appropriate coefficients of the intermediate frequency and watermarked locations according to different image. Experiments show that the watermarking algorithm performs well in robustness and watermarking imperceptibility.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129748606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Lang, Jonathan Devitt, Seán Kelly, Andrew Kinneen, John O'Malley, D. Prunty
{"title":"Social Networking and Personal Data Security: A Study of Attitudes and Public Awareness in Ireland","authors":"M. Lang, Jonathan Devitt, Seán Kelly, Andrew Kinneen, John O'Malley, D. Prunty","doi":"10.1109/ICMECG.2009.105","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.105","url":null,"abstract":"This paper reports the findings of a study of attitudes towards data security issues and awareness of the potential risks of social networking sites, most notably the possibility of identity fraud. The population for this study is people in the 18-24 age group living in Ireland, for which the students of one of the country’s main universities were used as a proxy sample. The main findings is that many people have a very casual attitude towards data backup and password protection, a considerable number are not adequately aware of the threats posed by viruses transmitted via portable devices and other such means, and a lot of young people are openly publishing personal information of a sensitive nature that could potentially be maliciously exploited.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126155589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}