With the rapid growth of the Internet, e-commerce has been growing and expanding significantly, according to Fortune, almost all of the global top 500 companies have started online marketing; e-commerce is presently far from the mainstream of modern trade behaviors. The influencing factors in e-commerce transaction behaviors are explored in this paper. This paper takes network customers of a large e-commerce enterprise as research object; the influencing factors are integrated into three categories, respectively managerial factors, external environmental factors and internal environmental factors. And analyzes the influencing factors in the process of e-commerce transaction in terms of customer behaviors, constructs a functional process model for influencing factors in e-commerce transaction activities, integrates such factors into the model, and illustrates the functional mechanism of all the factors in e-commerce transaction. Studies on influencing factors for e-commerce transaction in the perspective of e-commerce customers will help shed light on such contradiction.
{"title":"Exploring Influencing Factors in E-Commerce Transaction Behaviors","authors":"Ranzhe Jing, Jianwei Yu, Zuo Jiang","doi":"10.1109/ISECS.2008.174","DOIUrl":"https://doi.org/10.1109/ISECS.2008.174","url":null,"abstract":"With the rapid growth of the Internet, e-commerce has been growing and expanding significantly, according to Fortune, almost all of the global top 500 companies have started online marketing; e-commerce is presently far from the mainstream of modern trade behaviors. The influencing factors in e-commerce transaction behaviors are explored in this paper. This paper takes network customers of a large e-commerce enterprise as research object; the influencing factors are integrated into three categories, respectively managerial factors, external environmental factors and internal environmental factors. And analyzes the influencing factors in the process of e-commerce transaction in terms of customer behaviors, constructs a functional process model for influencing factors in e-commerce transaction activities, integrates such factors into the model, and illustrates the functional mechanism of all the factors in e-commerce transaction. Studies on influencing factors for e-commerce transaction in the perspective of e-commerce customers will help shed light on such contradiction.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126079164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the resource limited artificial immune system (RLAIS), because the network granularity is determined by the network affinity threshold (NAT) and the initialization value of NAT is obtained by calculating the distance between the antigens each other, the NAT doesn't reflect the network evolution process. The computation of the stimulation level at closer distance doesn't sufficiently reflect its advantage and is too sensitive to the change in the distance. The adoption of pure clone selection and random change operation strategy can impair the convergence of the public and the stability. By analyzing the disadvantages of RLAIS, the modified resource limited artificial immune system (MRLAIS) was proposed. In MRLAIS, during the network evolution process the adaptation threshold value is computed again in each iterative to better characterize the state of affinity of the antibody at that time. A stimulation function is selected that which sufficiently incarnate the advantage of the stimulation level when the antibodies distance is small and is not too sensitive to smaller distances. Finally, a resource allocation function is selected to make the network allocate the antibody more reasonably. The experimental stimulation shows that the MRAIS has the faster evolution speed and the better structure stability.
{"title":"A Modified Resource Limited Artificial Immune System","authors":"Tao Liu, Zhifeng Hu, Yan Zhou, Zhijie Wang","doi":"10.1109/ISECS.2008.52","DOIUrl":"https://doi.org/10.1109/ISECS.2008.52","url":null,"abstract":"In the resource limited artificial immune system (RLAIS), because the network granularity is determined by the network affinity threshold (NAT) and the initialization value of NAT is obtained by calculating the distance between the antigens each other, the NAT doesn't reflect the network evolution process. The computation of the stimulation level at closer distance doesn't sufficiently reflect its advantage and is too sensitive to the change in the distance. The adoption of pure clone selection and random change operation strategy can impair the convergence of the public and the stability. By analyzing the disadvantages of RLAIS, the modified resource limited artificial immune system (MRLAIS) was proposed. In MRLAIS, during the network evolution process the adaptation threshold value is computed again in each iterative to better characterize the state of affinity of the antibody at that time. A stimulation function is selected that which sufficiently incarnate the advantage of the stimulation level when the antibodies distance is small and is not too sensitive to smaller distances. Finally, a resource allocation function is selected to make the network allocate the antibody more reasonably. The experimental stimulation shows that the MRAIS has the faster evolution speed and the better structure stability.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114657625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on previous literature, this paper proposed a conceptual model about consumers' transaction in ecommerce. In this model, we suggest that there are external and internal factors influence consumers' transaction trust in e-commerce. External factors include vendor's trustworthiness and internet intermediary's technical reliability. Internal factors include consumer's perceived gain and perceived risks in the e-commerce. Propositions are suggested according to the analysis. Lastly, we discuss the implications of this conceptual model for research and sellerspsila practice.
{"title":"A Study of Consumer Trust Formation in Electronic-Commerce","authors":"Huiwen Tu, Fengling Xie","doi":"10.1109/ISECS.2008.111","DOIUrl":"https://doi.org/10.1109/ISECS.2008.111","url":null,"abstract":"Based on previous literature, this paper proposed a conceptual model about consumers' transaction in ecommerce. In this model, we suggest that there are external and internal factors influence consumers' transaction trust in e-commerce. External factors include vendor's trustworthiness and internet intermediary's technical reliability. Internal factors include consumer's perceived gain and perceived risks in the e-commerce. Propositions are suggested according to the analysis. Lastly, we discuss the implications of this conceptual model for research and sellerspsila practice.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127507954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of multi-agent based E-commerce systems, on-line automatic negotiation protocol is often needed. But because of incomplete information agents have, the efficiency of on-line negotiation protocol is rather low. To overcome the problem, an on-line agent bilateral multi-issue alternate bidding negotiation protocol based on reinforcement learning is present. The reinforcement learning algorithm is presented to on-line learn the incomplete information of negotiation agent to enhance the efficiency of negotiation protocol. The protocol is applied to on-line multi-agent based electronic commerce. In the protocol experiment, three kinds of agents are used to compare with, which are no-learning agents (NA), static learning agents (SA) and dynamic learning agent (DA) in this paper. In static learning agent, the learning rate of Q-learning is set to 0.1 unchangeable, so itpsilas called static learning. While in dynamic learning proposed in this paper, the learning rate of Q-learning can change dynamically, so itpsilas called dynamic learning. Experiments show that the protocol present in this paper can help agents to negotiate more efficiently.
{"title":"An Agent Bilateral Multi-issue Alternate Bidding Negotiation Protocol Based on Reinforcement Learning and its Application in E-commerce","authors":"Li Jian","doi":"10.1109/ISECS.2008.102","DOIUrl":"https://doi.org/10.1109/ISECS.2008.102","url":null,"abstract":"With the rapid development of multi-agent based E-commerce systems, on-line automatic negotiation protocol is often needed. But because of incomplete information agents have, the efficiency of on-line negotiation protocol is rather low. To overcome the problem, an on-line agent bilateral multi-issue alternate bidding negotiation protocol based on reinforcement learning is present. The reinforcement learning algorithm is presented to on-line learn the incomplete information of negotiation agent to enhance the efficiency of negotiation protocol. The protocol is applied to on-line multi-agent based electronic commerce. In the protocol experiment, three kinds of agents are used to compare with, which are no-learning agents (NA), static learning agents (SA) and dynamic learning agent (DA) in this paper. In static learning agent, the learning rate of Q-learning is set to 0.1 unchangeable, so itpsilas called static learning. While in dynamic learning proposed in this paper, the learning rate of Q-learning can change dynamically, so itpsilas called dynamic learning. Experiments show that the protocol present in this paper can help agents to negotiate more efficiently.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124735388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the review and dissertating of related literature of M-commerce, this paper defined the concept of this emerging business model. Meanwhile, from the scientific research and manufacturing perspectives, we analyzed the development foundation of M-commerce industry in different stages according to the application of mobile communication technology. Moreover, united the application of mobile communication technology in China, this paper analyzed the development basis of China's M-commerce industry in different developing stages in the perspectives of technology and manufacture; and also analyzed the changes of China's market structure of M-commerce in the different stages from the dimension of using intentions and user types.
{"title":"A Study on M-Commerce Industry Development and Market Structure in China","authors":"Yang Xiang, Chen Qi","doi":"10.1109/ISECS.2008.153","DOIUrl":"https://doi.org/10.1109/ISECS.2008.153","url":null,"abstract":"Based on the review and dissertating of related literature of M-commerce, this paper defined the concept of this emerging business model. Meanwhile, from the scientific research and manufacturing perspectives, we analyzed the development foundation of M-commerce industry in different stages according to the application of mobile communication technology. Moreover, united the application of mobile communication technology in China, this paper analyzed the development basis of China's M-commerce industry in different developing stages in the perspectives of technology and manufacture; and also analyzed the changes of China's market structure of M-commerce in the different stages from the dimension of using intentions and user types.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125926005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Secret messages can be embedded into letters in tags of a Webpage in ways that are imperceptible to the human eye viewed with a browser. These messages, however, alter the inherent characteristic of the offset of a tag. This paper presents a new higher-order statistical steganalytic algorithm for detection of secret messages embedded in a Webpage. The offset is used to build the higher-order statistical models to detect whether secret messages hide in tags. 30 homepages are randomly downloaded from different Websites to test, and the results show the reliability and accuracy of statistical characteristics. The probability of missing secret messages decrease as the secret message increase, and it is zero, as 50% letters of tags are used to carry secret message.
{"title":"Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics","authors":"Huajun Huang, Shaohong Zhong, Xingming Sun","doi":"10.1109/ISECS.2008.169","DOIUrl":"https://doi.org/10.1109/ISECS.2008.169","url":null,"abstract":"Secret messages can be embedded into letters in tags of a Webpage in ways that are imperceptible to the human eye viewed with a browser. These messages, however, alter the inherent characteristic of the offset of a tag. This paper presents a new higher-order statistical steganalytic algorithm for detection of secret messages embedded in a Webpage. The offset is used to build the higher-order statistical models to detect whether secret messages hide in tags. 30 homepages are randomly downloaded from different Websites to test, and the results show the reliability and accuracy of statistical characteristics. The probability of missing secret messages decrease as the secret message increase, and it is zero, as 50% letters of tags are used to carry secret message.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126092220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the current e-commerce applications, the existence of a large number of complex issues is mainly due to the complexity of e-commerce applications' own problem domain and the complication caused by building them on Web. In addition, constant changes in business environment have increased the difficulty of software development. Many styles such as heavy SOA style, the workflow-oriented architectural style, and original rest style are created to solve these problems. Unfortunately, the previous studies did not take into account all aspects, and made a number of assumptions excluding the realistic complexity and mutability to facilitate research. This paper attempts to find out the architectural constraints contained in the architectural styles by analyzing the styles mentioned above and to design a set of architectural constraints, which can induce desirable architectural properties for e-commerce applications - e-commerce application architectural style based on the integration of workflow and agile service. In this paper, we evaluate the effectiveness of this architectural style by theoretical derivation and implementation experience.
{"title":"Research on e-Commerce Application Architecture Based on the Integration of Workflow and Agile Service","authors":"X. Wan, Lei Huang","doi":"10.1109/ISECS.2008.78","DOIUrl":"https://doi.org/10.1109/ISECS.2008.78","url":null,"abstract":"In the current e-commerce applications, the existence of a large number of complex issues is mainly due to the complexity of e-commerce applications' own problem domain and the complication caused by building them on Web. In addition, constant changes in business environment have increased the difficulty of software development. Many styles such as heavy SOA style, the workflow-oriented architectural style, and original rest style are created to solve these problems. Unfortunately, the previous studies did not take into account all aspects, and made a number of assumptions excluding the realistic complexity and mutability to facilitate research. This paper attempts to find out the architectural constraints contained in the architectural styles by analyzing the styles mentioned above and to design a set of architectural constraints, which can induce desirable architectural properties for e-commerce applications - e-commerce application architectural style based on the integration of workflow and agile service. In this paper, we evaluate the effectiveness of this architectural style by theoretical derivation and implementation experience.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126784362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To efficiently protect the ownership of multimedia data with watermarking technology, a novel image watermarking algorithm based on discrete wavelet transform (DWT) and memetic algorithm (MA) is proposed in this paper. The watermark is embedded to subband coefficients of subimage which is extracted from the original image with DWT, and watermark extraction is efficiently performed via MA. Experimental results show that the proposed watermarking algorithm results in almost invisible difference between the watermarked image and the original image, and is robust to common image processing operations and JPEG lossy compression.
{"title":"A Watermarking Algorithm Based on MA and DWT","authors":"Xia Sun, Ziqiang Wang, Dexian Zhang","doi":"10.1109/ISECS.2008.31","DOIUrl":"https://doi.org/10.1109/ISECS.2008.31","url":null,"abstract":"To efficiently protect the ownership of multimedia data with watermarking technology, a novel image watermarking algorithm based on discrete wavelet transform (DWT) and memetic algorithm (MA) is proposed in this paper. The watermark is embedded to subband coefficients of subimage which is extracted from the original image with DWT, and watermark extraction is efficiently performed via MA. Experimental results show that the proposed watermarking algorithm results in almost invisible difference between the watermarked image and the original image, and is robust to common image processing operations and JPEG lossy compression.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116578018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SOA is an IT architecture style, which has been proved to be able to help enterprise adapt rapid change and intensive competition. But practicing SOA is difficult, time-consuming and costly. Even worse, after a company manages to implement SOA, it still finds itpsilas difficult to apply it to the partners that havenpsilat enabled SOA yet. In this paper, we design an e-business platform featuring Web services-based SOA. Its basic subsystems establish a social and commercial zone by employing mashups; its intelligent agent detects events defined by users and reacts on behalf of users; its business process coordinator directs and coordinates business process through BPEL; its data sharing controller provides data sharing and notification between users. The highlight of this platform is: for SOA-ready enterprises, they can maximize their investment returns on SOA; for SOA-unready ones, they can still enjoy the services that the platform provides.
{"title":"A Versatile SOA-based E-Business Platform","authors":"Lilin Diao, Yanan Ma","doi":"10.1109/ISECS.2008.49","DOIUrl":"https://doi.org/10.1109/ISECS.2008.49","url":null,"abstract":"SOA is an IT architecture style, which has been proved to be able to help enterprise adapt rapid change and intensive competition. But practicing SOA is difficult, time-consuming and costly. Even worse, after a company manages to implement SOA, it still finds itpsilas difficult to apply it to the partners that havenpsilat enabled SOA yet. In this paper, we design an e-business platform featuring Web services-based SOA. Its basic subsystems establish a social and commercial zone by employing mashups; its intelligent agent detects events defined by users and reacts on behalf of users; its business process coordinator directs and coordinates business process through BPEL; its data sharing controller provides data sharing and notification between users. The highlight of this platform is: for SOA-ready enterprises, they can maximize their investment returns on SOA; for SOA-unready ones, they can still enjoy the services that the platform provides.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122407004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the theory of complex network, this paper focuses on the network planning of logistics nodes for strategic supply chain and proposes a practical mathematical modeling framework that captures many practical aspects of network design problems simultaneously but which have not received adequate attention in the existing literatures. Moreover, capacity expansion and reduction scenarios are also analyzed as well as modular capacity shifts. So this is of great importance for the research of strategic supply chain systems.
{"title":"A Modeling Framework for the Planning of Logistics Nodes in Strategic Supply Chain Based on Complex Network","authors":"Jiang-bo Zheng","doi":"10.1109/ISECS.2008.56","DOIUrl":"https://doi.org/10.1109/ISECS.2008.56","url":null,"abstract":"Based on the theory of complex network, this paper focuses on the network planning of logistics nodes for strategic supply chain and proposes a practical mathematical modeling framework that captures many practical aspects of network design problems simultaneously but which have not received adequate attention in the existing literatures. Moreover, capacity expansion and reduction scenarios are also analyzed as well as modular capacity shifts. So this is of great importance for the research of strategic supply chain systems.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122807674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}