Online Library TheLib.net » Contemporary Research on E-business Technology and Strategy: International Conference, iCETS 2012, Tianjin, China, August 29-31, 2012, Revised Selected Papers
cover of the book Contemporary Research on E-business Technology and Strategy: International Conference, iCETS 2012, Tianjin, China, August 29-31, 2012, Revised Selected Papers

Ebook: Contemporary Research on E-business Technology and Strategy: International Conference, iCETS 2012, Tianjin, China, August 29-31, 2012, Revised Selected Papers

00
27.01.2024
0
0

This book constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin, China, in August 2012. The 65 revised full papers presented were carefully reviewed and selected from 231 submissions. The papers feature contemporary research on developments in the fields of e-business technology, information management systems, and business strategy. Topics addressed are latest development on e-business technology, computer science and software engineering for e-business, e-business and e-commerce applications, social networking and social engineering for e-business, e-business strategic management and economics development, e-business education, entrepreneurship and e-learning, digital economy strategy, as well as internet and e-commerce policy.




This book constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin, China, in August 2012. The 65 revised full papers presented were carefully reviewed and selected from 231 submissions. The papers feature contemporary research on developments in the fields of e-business technology, information management systems, and business strategy. Topics addressed are latest development on e-business technology, computer science and software engineering for e-business, e-business and e-commerce applications, social networking and social engineering for e-business, e-business strategic management and economics development, e-business education, entrepreneurship and e-learning, digital economy strategy, as well as internet and e-commerce policy.


This book constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin, China, in August 2012. The 65 revised full papers presented were carefully reviewed and selected from 231 submissions. The papers feature contemporary research on developments in the fields of e-business technology, information management systems, and business strategy. Topics addressed are latest development on e-business technology, computer science and software engineering for e-business, e-business and e-commerce applications, social networking and social engineering for e-business, e-business strategic management and economics development, e-business education, entrepreneurship and e-learning, digital economy strategy, as well as internet and e-commerce policy.
Content:
Front Matter....Pages -
E-commerce: Consumer Online Shopping in Canada....Pages 1-14
Integrating Spatial Decision Support System with Graph Mining Technique....Pages 15-24
Engaging Social Customers – Influencing New Marketing Strategies for Social Media Information Sources....Pages 25-40
Concept Based Orchestration of Web Services Using XOT....Pages 41-53
Intellectual Property Rights in E-business Environment: Paradigm Shifts of Legal and Political Measures....Pages 54-61
A Multi-objective Programming for Web Services Composition....Pages 62-72
The Application of SOM and K-Means Algorithms in Public Security Performance Analysis and Forecasting....Pages 73-84
Semi-automatic Acquisition and Formal Representation of OpenAPI....Pages 85-96
A Novel Subspace Classification Method for Large Datasets Based on Kernel-Based Fisher Discriminant Analysis....Pages 97-108
Eliciting Security Requirements Method Based on Safety Knowledge Base....Pages 109-121
Sale Channel Selection of Information Products in the Presence of Network Externality....Pages 122-134
Impact of IT Service Provider’s Expertise and Customer’s Sociability on Continuous Intention to Use....Pages 135-146
ASF: Improving Android Security with Layered Structure Instrumentation....Pages 147-157
A Threat Model-Driven Security Testing Approach for Web Application....Pages 158-168
A Novel Architecture on FPGA for Face Detection Using Jumping Scanning Mechanism....Pages 169-175
On the Generalization of PAC-Bayes Bound for SVM Linear Classifier....Pages 176-186
Optimality of Versioning for Information Products Using Niching SSGA....Pages 187-198
Incorporating Risk Attitude into the Iterated Prisoner’s Dilemma: Application to E-business....Pages 199-213
Dynamic Neural Network Ensemble Construction for Classification....Pages 214-223
A Secure Data Exchange Protocol for the Internet of Things....Pages 224-231
Enhancing Security of Online Payments: A Conceptual Model for a Robust E-Payment Protocol for E-Commerce....Pages 232-239
An Improved Secure Communications Protocol....Pages 240-249
An Efficient Scheme for Implementation of SM2 Digital Signature over GF(p)....Pages 250-258
A Browser Extension Vulnerability Detecting Approach Based on Behavior Monitoring and Analysis....Pages 259-270
Research on Location Selection Based on Genetic and Simulated Annealing Algorithm....Pages 271-281
Design and Implementation of Special Equipment Major Hazard Identification System....Pages 282-291
A Screening Method of Security Functional Components Based on Fuzzy....Pages 292-305
An Assessment of the Use of Information Technology Tools and E-business by Informal Sector Entrepreneurs in Mauritius....Pages 306-315
Secure Operation, Control, and Maintenance in Smart Grid Communications over Wireless Networks....Pages 316-324
Eliminating False Matches Using Geometric Context....Pages 325-334
Online Service Quality in Social Commerce Websites....Pages 335-351
An Improved Algorithm for K-anonymity....Pages 352-360
Factors Affecting Emerging ICT Adoption in SMEs: An Actor Network Theory Analysis....Pages 361-377
A Probability Based Similarity Scoring for DNA Motifs Comparison....Pages 378-389
Security Software Formal Modeling and Verification Method Based on UML and Z....Pages 390-401
Research and Application of Warning and Intelligent Control System to Prevent Hollow Fiber Membrane Fouling....Pages 402-413
Sharing and Building Management System Based on Handheld Mobile Devices....Pages 414-421
Social CRM for SMEs: Current Tools and Strategy....Pages 422-435
Research on Contingency Plan Simulation System Based on CAS Theory....Pages 436-443
MapCombine: A Lightweight Solution to Improve the Efficiency of Iterative MapReduce....Pages 444-456
Centralization vs. Decentralization of Purchasing in the Public Sector: The Role of e-Procurement in the Italian Case....Pages 457-470
Consistent View Mapping of Large-Scale Ontology....Pages 471-485
A Multi-objective Optimization Model for Information System Design....Pages 486-495
An Improved Method for the Feature Extraction of Chinese Text by Combining Rough Set Theory with Automatic Abstracting Technology....Pages 496-509
Neighborhood Covering Based Rule Learning Algorithms....Pages 510-520
Facial Expression Pervasive Analysis Based on Haar-Like Features and SVM....Pages 521-529
Program Package for Decision Making....Pages 530-540
Multi-Modal Fusion Emotion Recognition Based on HMM and ANN....Pages 541-550
Visual Modeling for Multi-level Parallel Computing Environment Based on DSL....Pages 551-560
A Framework for Multi-agent-Based Stock Market Simulation on Parallel Environment....Pages 561-570
Research on Police Performance Appraisal Early Warning Methods Based on Improved Decision Tree Algorithm....Pages 571-583
A GPU-Based Face Detection Algorithm for Low-Bandwidth Implementation....Pages 584-591
Gaze Estimation Research with Single Camera....Pages 592-599
An Improved Text Feature Selection Method for Transfer Learning....Pages 600-611
Three-Dimensional Visual Simulation for Concrete Dam Construction Process....Pages 612-619
Three-Dimensional Tongue Modeling Based on PCA for Visualized Pronunciation Feedback....Pages 620-627
Comprehensive Mining on Medical Homepage Records Using Bayesian Network Approach....Pages 628-637
A Hybrid Recommendation Model for HTML5 Mobile Web Applications....Pages 638-647
A Distributed Ontology Repository Management Approach Based on Semantic Wiki....Pages 648-657
Thai Immigrant Entrepreneurs in New Zealand....Pages 658-670
Application-Aware Storage Strategy for Scientific Data....Pages 671-681
CMMI Based Multi-agent Software Process Control and Improvement Model....Pages 682-695
The Design and Realization of 3G-Based Vehicular Video Surveillance System....Pages 696-707
Mobile Clerk Integral System Based on Distributed Performance Evaluation Systems....Pages 708-714
A Dynamic Scanning Approach Based on Trie Matching for Clustering XML Data in E-business....Pages 715-728
Back Matter....Pages -


This book constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin, China, in August 2012. The 65 revised full papers presented were carefully reviewed and selected from 231 submissions. The papers feature contemporary research on developments in the fields of e-business technology, information management systems, and business strategy. Topics addressed are latest development on e-business technology, computer science and software engineering for e-business, e-business and e-commerce applications, social networking and social engineering for e-business, e-business strategic management and economics development, e-business education, entrepreneurship and e-learning, digital economy strategy, as well as internet and e-commerce policy.
Content:
Front Matter....Pages -
E-commerce: Consumer Online Shopping in Canada....Pages 1-14
Integrating Spatial Decision Support System with Graph Mining Technique....Pages 15-24
Engaging Social Customers – Influencing New Marketing Strategies for Social Media Information Sources....Pages 25-40
Concept Based Orchestration of Web Services Using XOT....Pages 41-53
Intellectual Property Rights in E-business Environment: Paradigm Shifts of Legal and Political Measures....Pages 54-61
A Multi-objective Programming for Web Services Composition....Pages 62-72
The Application of SOM and K-Means Algorithms in Public Security Performance Analysis and Forecasting....Pages 73-84
Semi-automatic Acquisition and Formal Representation of OpenAPI....Pages 85-96
A Novel Subspace Classification Method for Large Datasets Based on Kernel-Based Fisher Discriminant Analysis....Pages 97-108
Eliciting Security Requirements Method Based on Safety Knowledge Base....Pages 109-121
Sale Channel Selection of Information Products in the Presence of Network Externality....Pages 122-134
Impact of IT Service Provider’s Expertise and Customer’s Sociability on Continuous Intention to Use....Pages 135-146
ASF: Improving Android Security with Layered Structure Instrumentation....Pages 147-157
A Threat Model-Driven Security Testing Approach for Web Application....Pages 158-168
A Novel Architecture on FPGA for Face Detection Using Jumping Scanning Mechanism....Pages 169-175
On the Generalization of PAC-Bayes Bound for SVM Linear Classifier....Pages 176-186
Optimality of Versioning for Information Products Using Niching SSGA....Pages 187-198
Incorporating Risk Attitude into the Iterated Prisoner’s Dilemma: Application to E-business....Pages 199-213
Dynamic Neural Network Ensemble Construction for Classification....Pages 214-223
A Secure Data Exchange Protocol for the Internet of Things....Pages 224-231
Enhancing Security of Online Payments: A Conceptual Model for a Robust E-Payment Protocol for E-Commerce....Pages 232-239
An Improved Secure Communications Protocol....Pages 240-249
An Efficient Scheme for Implementation of SM2 Digital Signature over GF(p)....Pages 250-258
A Browser Extension Vulnerability Detecting Approach Based on Behavior Monitoring and Analysis....Pages 259-270
Research on Location Selection Based on Genetic and Simulated Annealing Algorithm....Pages 271-281
Design and Implementation of Special Equipment Major Hazard Identification System....Pages 282-291
A Screening Method of Security Functional Components Based on Fuzzy....Pages 292-305
An Assessment of the Use of Information Technology Tools and E-business by Informal Sector Entrepreneurs in Mauritius....Pages 306-315
Secure Operation, Control, and Maintenance in Smart Grid Communications over Wireless Networks....Pages 316-324
Eliminating False Matches Using Geometric Context....Pages 325-334
Online Service Quality in Social Commerce Websites....Pages 335-351
An Improved Algorithm for K-anonymity....Pages 352-360
Factors Affecting Emerging ICT Adoption in SMEs: An Actor Network Theory Analysis....Pages 361-377
A Probability Based Similarity Scoring for DNA Motifs Comparison....Pages 378-389
Security Software Formal Modeling and Verification Method Based on UML and Z....Pages 390-401
Research and Application of Warning and Intelligent Control System to Prevent Hollow Fiber Membrane Fouling....Pages 402-413
Sharing and Building Management System Based on Handheld Mobile Devices....Pages 414-421
Social CRM for SMEs: Current Tools and Strategy....Pages 422-435
Research on Contingency Plan Simulation System Based on CAS Theory....Pages 436-443
MapCombine: A Lightweight Solution to Improve the Efficiency of Iterative MapReduce....Pages 444-456
Centralization vs. Decentralization of Purchasing in the Public Sector: The Role of e-Procurement in the Italian Case....Pages 457-470
Consistent View Mapping of Large-Scale Ontology....Pages 471-485
A Multi-objective Optimization Model for Information System Design....Pages 486-495
An Improved Method for the Feature Extraction of Chinese Text by Combining Rough Set Theory with Automatic Abstracting Technology....Pages 496-509
Neighborhood Covering Based Rule Learning Algorithms....Pages 510-520
Facial Expression Pervasive Analysis Based on Haar-Like Features and SVM....Pages 521-529
Program Package for Decision Making....Pages 530-540
Multi-Modal Fusion Emotion Recognition Based on HMM and ANN....Pages 541-550
Visual Modeling for Multi-level Parallel Computing Environment Based on DSL....Pages 551-560
A Framework for Multi-agent-Based Stock Market Simulation on Parallel Environment....Pages 561-570
Research on Police Performance Appraisal Early Warning Methods Based on Improved Decision Tree Algorithm....Pages 571-583
A GPU-Based Face Detection Algorithm for Low-Bandwidth Implementation....Pages 584-591
Gaze Estimation Research with Single Camera....Pages 592-599
An Improved Text Feature Selection Method for Transfer Learning....Pages 600-611
Three-Dimensional Visual Simulation for Concrete Dam Construction Process....Pages 612-619
Three-Dimensional Tongue Modeling Based on PCA for Visualized Pronunciation Feedback....Pages 620-627
Comprehensive Mining on Medical Homepage Records Using Bayesian Network Approach....Pages 628-637
A Hybrid Recommendation Model for HTML5 Mobile Web Applications....Pages 638-647
A Distributed Ontology Repository Management Approach Based on Semantic Wiki....Pages 648-657
Thai Immigrant Entrepreneurs in New Zealand....Pages 658-670
Application-Aware Storage Strategy for Scientific Data....Pages 671-681
CMMI Based Multi-agent Software Process Control and Improvement Model....Pages 682-695
The Design and Realization of 3G-Based Vehicular Video Surveillance System....Pages 696-707
Mobile Clerk Integral System Based on Distributed Performance Evaluation Systems....Pages 708-714
A Dynamic Scanning Approach Based on Trie Matching for Clustering XML Data in E-business....Pages 715-728
Back Matter....Pages -
....
Download the book Contemporary Research on E-business Technology and Strategy: International Conference, iCETS 2012, Tianjin, China, August 29-31, 2012, Revised Selected Papers for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen