The openness and anonymity of the Internet have given rise to online fraud, which has severely affected the development of China's e-commerce. This paper analyzes the impact of relevant factors on trust in e-commerce of China and proposes that China should draw on the experiences of developed countries to establish and improve relevant legal system, combing personal credit system with the ID card system, developing and improving social credit system, punishing the dishonesty. Meanwhile, the online third-party certificate authority specializing in facilitating the development of e-commerce need to be fostered.
{"title":"A Research of Trust Based on E-Commerce","authors":"Lihua Ruan, Ding-shi Tian","doi":"10.1109/ISECS.2008.166","DOIUrl":"https://doi.org/10.1109/ISECS.2008.166","url":null,"abstract":"The openness and anonymity of the Internet have given rise to online fraud, which has severely affected the development of China's e-commerce. This paper analyzes the impact of relevant factors on trust in e-commerce of China and proposes that China should draw on the experiences of developed countries to establish and improve relevant legal system, combing personal credit system with the ID card system, developing and improving social credit system, punishing the dishonesty. Meanwhile, the online third-party certificate authority specializing in facilitating the development of e-commerce need to be fostered.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131712981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a print-and-scan (PS) resilient watermarking scheme based on the mean of DCT coefficients (MDC) for a fixed AC frequency of image. We investigate the property of MDC in the PS process and find that the MDC is nearly unchanged after PS, which is approximately zero for natural (non-watermarked) images. The watermark bits are embedded by shifting these PS-invariants to be positive or negative. The embedding intensity of the scheme is determined by a JND model to avoid the visible distortion. Experimental results show that the scheme can successfully resist the PS attack in different printing status.
{"title":"A Statistics-Based Watermarking Scheme Robust to Print-and-Scan","authors":"Daofang Cheng, Xiaolong Li, Wenfa Qi, Bin Yang","doi":"10.1109/ISECS.2008.68","DOIUrl":"https://doi.org/10.1109/ISECS.2008.68","url":null,"abstract":"This paper proposes a print-and-scan (PS) resilient watermarking scheme based on the mean of DCT coefficients (MDC) for a fixed AC frequency of image. We investigate the property of MDC in the PS process and find that the MDC is nearly unchanged after PS, which is approximately zero for natural (non-watermarked) images. The watermark bits are embedded by shifting these PS-invariants to be positive or negative. The embedding intensity of the scheme is determined by a JND model to avoid the visible distortion. Experimental results show that the scheme can successfully resist the PS attack in different printing status.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127569232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new algorithm of Web text clustering mining is presented, which is based on the Discovery Feature Sub-space Model (DFSSM). This algorithm includes the training stage of SOM and the clustering stage, which characterizes self-stability and powerful antinoise ability. It can distinguishes the most meaningful features from the Concept Space without the evaluation function. we have applied the algorithm to the modern long-distance education. Through the analysis of the experimental results, it is obvious that this algorithm can effective help users to get valuable information from WWW quickly.
{"title":"A New Web Text Clustering Algorithm Based on DFSSM","authors":"Bingru Yang, Zefeng Song, Yinglong Wang, Wei Song","doi":"10.1109/ISECS.2008.110","DOIUrl":"https://doi.org/10.1109/ISECS.2008.110","url":null,"abstract":"A new algorithm of Web text clustering mining is presented, which is based on the Discovery Feature Sub-space Model (DFSSM). This algorithm includes the training stage of SOM and the clustering stage, which characterizes self-stability and powerful antinoise ability. It can distinguishes the most meaningful features from the Concept Space without the evaluation function. we have applied the algorithm to the modern long-distance education. Through the analysis of the experimental results, it is obvious that this algorithm can effective help users to get valuable information from WWW quickly.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A study of consumer acceptance of the Internet as a channel of purchasing creative products (e.g. apparel) was conducted using a modified technology acceptance model (TAM). Two consumer characteristics (product involvement and product innovativeness) were introduced into the TAM to develop an extended model. Through checking the extended model, we found that the proposed model was valid in explaining and predicting consumer behaviors in the creative product (clothing) e-commerce context. Perceived usefulness and ease of use of online apparel shopping had most significant effect on attitude towards online apparel purchasing, and were the primary determinants of consumerspsila behavioral intention. Conclusion and implications were discussed.
{"title":"An Empirical Study on Predicting User Purchase Intention on the Creative Product: A Case of Apparel","authors":"Chen Pang, Xiaofen Ji","doi":"10.1109/ISECS.2008.176","DOIUrl":"https://doi.org/10.1109/ISECS.2008.176","url":null,"abstract":"A study of consumer acceptance of the Internet as a channel of purchasing creative products (e.g. apparel) was conducted using a modified technology acceptance model (TAM). Two consumer characteristics (product involvement and product innovativeness) were introduced into the TAM to develop an extended model. Through checking the extended model, we found that the proposed model was valid in explaining and predicting consumer behaviors in the creative product (clothing) e-commerce context. Perceived usefulness and ease of use of online apparel shopping had most significant effect on attitude towards online apparel purchasing, and were the primary determinants of consumerspsila behavioral intention. Conclusion and implications were discussed.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Trust between agents is a key issue in multi-agent e-commerce system (MECS). With the expanding of system scale and the rapid increase of e-commerce, scalable trust in e-commerce system becomes critical. This article examines scalable trust of a system, in particular in e-commerce system, and classifies the trust between agents in e-commerce system. Then it discusses the realization of scalable trust from the viewpoint of sociology and engineering.
{"title":"Scalable Trust in Multi-agent E-commerce System","authors":"Shuliang Zhao, Haifeng Liu, Zhaohao Sun","doi":"10.1109/ISECS.2008.84","DOIUrl":"https://doi.org/10.1109/ISECS.2008.84","url":null,"abstract":"Trust between agents is a key issue in multi-agent e-commerce system (MECS). With the expanding of system scale and the rapid increase of e-commerce, scalable trust in e-commerce system becomes critical. This article examines scalable trust of a system, in particular in e-commerce system, and classifies the trust between agents in e-commerce system. Then it discusses the realization of scalable trust from the viewpoint of sociology and engineering.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115192903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A correct outsourcing decision-making is the premise of a successful outsourcing. When making outsourcing decision, enterprise managers focus on inner factors, such as the firmpsilas core competency, financial status, technical status, organizational restructuring, and risk-sharing and so on. However, they neglect issues from the perspective of outsourcing market maturity. Thus it results in a limit decision. In this paper, an outsourcing market maturity model is proposed based on the analysis of outsourcing market. According to capability maturity model for software, an outsourcing decision framework is established, which provides a model on three key dimensions of core competency, asset specificity and market maturity.
{"title":"A Research of Outsourcing Decision-making Based on Outsourcing Market Maturity","authors":"Hongju Zhang, Jiajia Liu, Zhijun Yan","doi":"10.1109/ISECS.2008.15","DOIUrl":"https://doi.org/10.1109/ISECS.2008.15","url":null,"abstract":"A correct outsourcing decision-making is the premise of a successful outsourcing. When making outsourcing decision, enterprise managers focus on inner factors, such as the firmpsilas core competency, financial status, technical status, organizational restructuring, and risk-sharing and so on. However, they neglect issues from the perspective of outsourcing market maturity. Thus it results in a limit decision. In this paper, an outsourcing market maturity model is proposed based on the analysis of outsourcing market. According to capability maturity model for software, an outsourcing decision framework is established, which provides a model on three key dimensions of core competency, asset specificity and market maturity.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114836523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The workflow model is key component of workflow system, it is significant for business process reengineering and optimization that the workflow management system is researched and developed. In this paper, the current state of research in workflow process modeling are overviewed after describing the essence and standard of workflow process modeling, the main common modeling theories include flow figure, status figure, activity network figure, IDEF, ECAA, Petri net, and so on. In order to solve the deficiency of formalized and graphic expression ability, complicated modeling procedure, the methods of solution for problems and development trend of workflow related theories are put forward, the main single advanced modeling methods are process data mining, extended Petri nets and process algebra, and suit modeling environment for these methods are analyzed and compared, and the combined modeling framework is introduced in the last part.
{"title":"Comparative Research of Modeling Methods for Workflow Process","authors":"Guoyin Jiang, Lihong Dong","doi":"10.1109/ISECS.2008.55","DOIUrl":"https://doi.org/10.1109/ISECS.2008.55","url":null,"abstract":"The workflow model is key component of workflow system, it is significant for business process reengineering and optimization that the workflow management system is researched and developed. In this paper, the current state of research in workflow process modeling are overviewed after describing the essence and standard of workflow process modeling, the main common modeling theories include flow figure, status figure, activity network figure, IDEF, ECAA, Petri net, and so on. In order to solve the deficiency of formalized and graphic expression ability, complicated modeling procedure, the methods of solution for problems and development trend of workflow related theories are put forward, the main single advanced modeling methods are process data mining, extended Petri nets and process algebra, and suit modeling environment for these methods are analyzed and compared, and the combined modeling framework is introduced in the last part.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117293875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
User acceptance of mobile service is the first step for enterprises to successfully implement mobile commerce. Extant research has tried to explain user acceptance of mobile commerce based on TAM and neglected the impact of usage cost, enjoyment and social evaluation on user behavior. Based on the theory of perceived value,this paper examines the impact of perceived value on user acceptance behavior. Perceived value as a second-order factor includes four dimensions: financial value, quality value, emotional value and social value. We collected 184 valid papers and conducted data analysis with PLS Graph. The results show that perceived value strongly affects trust and satisfaction, further determining user acceptance intention. Among four dimensions, social value has relatively larger effect and financial value has weaker effect.
{"title":"The Impact of Perceived Value on User Acceptance of Mobile Commerce","authors":"Tao Zhou","doi":"10.1109/ISECS.2008.9","DOIUrl":"https://doi.org/10.1109/ISECS.2008.9","url":null,"abstract":"User acceptance of mobile service is the first step for enterprises to successfully implement mobile commerce. Extant research has tried to explain user acceptance of mobile commerce based on TAM and neglected the impact of usage cost, enjoyment and social evaluation on user behavior. Based on the theory of perceived value,this paper examines the impact of perceived value on user acceptance behavior. Perceived value as a second-order factor includes four dimensions: financial value, quality value, emotional value and social value. We collected 184 valid papers and conducted data analysis with PLS Graph. The results show that perceived value strongly affects trust and satisfaction, further determining user acceptance intention. Among four dimensions, social value has relatively larger effect and financial value has weaker effect.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116398378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reliability of Web services is an important problem for developing electronic business applications. However, when the number of service requests become very huge it is hard to guarantee the availability of a service. In this paper, a novel approach for reliable Web service provisioning based on mobile agent and resource discovery technologies is proposed. In our approach, new service can be appropriately instantiated on demand, therefore reducing the risk of service being unavailable. Then a dispatching algorithm for resources selection and a multi-phase resource planning algorithm for composite Web services are presented. Experimental results show that our approach is more robust and adaptive in highly dynamic environments.
{"title":"A Reliable Web Service Implementation Approach for Large Commercial Applications","authors":"Jianbin Huang, Heli Sun","doi":"10.1109/ISECS.2008.21","DOIUrl":"https://doi.org/10.1109/ISECS.2008.21","url":null,"abstract":"Reliability of Web services is an important problem for developing electronic business applications. However, when the number of service requests become very huge it is hard to guarantee the availability of a service. In this paper, a novel approach for reliable Web service provisioning based on mobile agent and resource discovery technologies is proposed. In our approach, new service can be appropriately instantiated on demand, therefore reducing the risk of service being unavailable. Then a dispatching algorithm for resources selection and a multi-phase resource planning algorithm for composite Web services are presented. Experimental results show that our approach is more robust and adaptive in highly dynamic environments.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"13 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123648363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a novel criterion-based access control approach to deal with multilevel database security. In this approach, authorization rules are transformed to security criteria, security criterion expressions, and security criterion subsets. Security criterion expressions are associated with (sub) objects to serve as locks, and security criteria are associated with users to serve as keys. The fine-grained multilevel access control is achieved by using the available security criteria (keys) to evaluate the security criterion expressions (locks). Whether an (sub) object such as a cell, a row, a column, or a table is accessible to a user depends on the evaluation values of the relevant security criterion expressions.
{"title":"Using Criterion-Based Access Control for Multilevel Database Security","authors":"Leon Pan","doi":"10.1109/ISECS.2008.198","DOIUrl":"https://doi.org/10.1109/ISECS.2008.198","url":null,"abstract":"This paper presents a novel criterion-based access control approach to deal with multilevel database security. In this approach, authorization rules are transformed to security criteria, security criterion expressions, and security criterion subsets. Security criterion expressions are associated with (sub) objects to serve as locks, and security criteria are associated with users to serve as keys. The fine-grained multilevel access control is achieved by using the available security criteria (keys) to evaluate the security criterion expressions (locks). Whether an (sub) object such as a cell, a row, a column, or a table is accessible to a user depends on the evaluation values of the relevant security criterion expressions.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129870972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}