Pub Date : 2003-02-06DOI: 10.1109/HICSS.2003.1174395
D. Roussinov, J. Zhao
To determine the important trends and issues in thousands of comments from customers and make strategic decisions about business operations, managers must go over these messages manually and try to make sense of them in a time consuming and tedious manner. There is an urgent need for technologies that help improve the efficiency of customer message management. We develop new issue identification techniques based on clustering and context aware similarity networks to enable managers to discover knowledge in text messages. We engineer a tool set specifically for exploring short text messages in the context of customer relationship management. In this paper, we report a proof of concept prototype called Message Sense Maker that can assist managers to map the overall sentiment of customers semiautomatically. We further justify the choice of particular technologies and validate our system through a field study of a customer support center in a large university.
{"title":"Message Sense Maker: engineering a tool set for customer relationship management","authors":"D. Roussinov, J. Zhao","doi":"10.1109/HICSS.2003.1174395","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174395","url":null,"abstract":"To determine the important trends and issues in thousands of comments from customers and make strategic decisions about business operations, managers must go over these messages manually and try to make sense of them in a time consuming and tedious manner. There is an urgent need for technologies that help improve the efficiency of customer message management. We develop new issue identification techniques based on clustering and context aware similarity networks to enable managers to discover knowledge in text messages. We engineer a tool set specifically for exploring short text messages in the context of customer relationship management. In this paper, we report a proof of concept prototype called Message Sense Maker that can assist managers to map the overall sentiment of customers semiautomatically. We further justify the choice of particular technologies and validate our system through a field study of a customer support center in a large university.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114954408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-02-06DOI: 10.1109/HICSS.2003.1174344
M. Ibrahim
Learning is the most indispensable activity in the current knowledge-based economy where firms, in order to compete and survive, must be constantly alert, capable of adapting to fast change, constantly learn, evolve, and transform themselves rapidly. In that respect, the use of innovative information and communication technology is perceived to play a key role in the development of new learning platforms and mechanisms. One of the emerging solutions is electronic training "eTraining", which is a growing trend and is expected to become crucial in meeting newly introduced challenges and in catering for changing and diversified market needs. The global connectivity of the Internet and the availability of innovative information and communication technology are factors that have contributed in catalyzing the new Internet-based learning paradigm offering great opportunities for organizations to educate and train their management and staff. However, Internet-based training poses several considerable challenges for various organizations especially those operating in developing countries. Within the context of transferring and using information and communication technology into developing countries, this paper demonstrates the outcome of a research aiming at investigating the effectiveness and applicability of Internet-based training in providing training for organizations in Egypt. The focus of the research was mainly soliciting the opinions of three different groups of stake holders; human resources or training managers responsible for setting training policies; instructors responsible for facilitating courses and preparing material; and trainees undertaking the training.
{"title":"Effectiveness and applicability of Internet-based training in the corporation - case of Egypt","authors":"M. Ibrahim","doi":"10.1109/HICSS.2003.1174344","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174344","url":null,"abstract":"Learning is the most indispensable activity in the current knowledge-based economy where firms, in order to compete and survive, must be constantly alert, capable of adapting to fast change, constantly learn, evolve, and transform themselves rapidly. In that respect, the use of innovative information and communication technology is perceived to play a key role in the development of new learning platforms and mechanisms. One of the emerging solutions is electronic training \"eTraining\", which is a growing trend and is expected to become crucial in meeting newly introduced challenges and in catering for changing and diversified market needs. The global connectivity of the Internet and the availability of innovative information and communication technology are factors that have contributed in catalyzing the new Internet-based learning paradigm offering great opportunities for organizations to educate and train their management and staff. However, Internet-based training poses several considerable challenges for various organizations especially those operating in developing countries. Within the context of transferring and using information and communication technology into developing countries, this paper demonstrates the outcome of a research aiming at investigating the effectiveness and applicability of Internet-based training in providing training for organizations in Egypt. The focus of the research was mainly soliciting the opinions of three different groups of stake holders; human resources or training managers responsible for setting training policies; instructors responsible for facilitating courses and preparing material; and trainees undertaking the training.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121740840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-02-06DOI: 10.1109/HICSS.2003.1174616
Benjamin B. M. Shao, W. Shu
In this paper, we measure productivity growth of the information technology (IT) industries in fourteen OECD countries over the thirteen-year period of 1978 through 1990. The IT industries are the providers of IT capital goods, and this macro-level analysis seeks to find out how efficiently IT capital goods are produced. The basic unit of analysis employed is the Malmquist Total Factor Productivity (TFP) index. The Malmquist TFP index is next decomposed into three constituent elements accounting for different sources of productivity growth: technological progress, efficiency change, and the effects of economies of scale. The approach of measurement is based the concept of distance functions and employs the non-parametric frontier method of data envelopment analysis (DEA). Our results indicate that each country's IT industry manifests its own particular patterns in various performance measures. Among the fourteen countries examined, ten had witnessed productivity growth in their IT industries. Overall, these IT industries are found more productive than other industries when compared with previous research. Further analyses reveal that most of productivity growth measured is due to technological progress. Efficiency change is found to exert a relatively small positive effect on the productivity growth. Moreover, the change of scale economies unfavorably affects productivity for most countries. Finally, practical implications for formulating IT policy are drawn from our results for further discussions.
{"title":"Productivity breakdown of the information technology across countries","authors":"Benjamin B. M. Shao, W. Shu","doi":"10.1109/HICSS.2003.1174616","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174616","url":null,"abstract":"In this paper, we measure productivity growth of the information technology (IT) industries in fourteen OECD countries over the thirteen-year period of 1978 through 1990. The IT industries are the providers of IT capital goods, and this macro-level analysis seeks to find out how efficiently IT capital goods are produced. The basic unit of analysis employed is the Malmquist Total Factor Productivity (TFP) index. The Malmquist TFP index is next decomposed into three constituent elements accounting for different sources of productivity growth: technological progress, efficiency change, and the effects of economies of scale. The approach of measurement is based the concept of distance functions and employs the non-parametric frontier method of data envelopment analysis (DEA). Our results indicate that each country's IT industry manifests its own particular patterns in various performance measures. Among the fourteen countries examined, ten had witnessed productivity growth in their IT industries. Overall, these IT industries are found more productive than other industries when compared with previous research. Further analyses reveal that most of productivity growth measured is due to technological progress. Efficiency change is found to exert a relatively small positive effect on the productivity growth. Moreover, the change of scale economies unfavorably affects productivity for most countries. Finally, practical implications for formulating IT policy are drawn from our results for further discussions.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121759470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-02-06DOI: 10.1109/HICSS.2003.1174302
J. Gant, M. Gunter, T. Pardo
This minitrack covers characteristics, development, implementation, and uses of information systems that support the full range of management and administrative functions that are internal to agencies, link multiple public organizations, or connect government to its business suppliers and partners. The first paper, SMART Government On Line Not In Line by Breena E. Coates, is interesting because it sets eGovernment in context with the literature on bureaucracies, the development of this literature and of bureaucracies themselves. This allows for a perspective on IT that brings in the people who design and manage the new interface. The discussion is broad rather than deep and includes such issues as bureaucrats, business improvement, e-talent and expertise, records management, loss, privacy, democracy, and gender. In the second paper, Content Management for Government Agency Web Sites: Initial Results From a Study of State Agency Manual Content Management Processes, Kristin R. Eschenfelder analyzes the management processes supporting content on government agency web sites. The goal of the study is to improve government agency web pages by increasing the understanding of the managerial structures that underlie them. The linkage between the self-efficacy of public managers to employ information technology (IT) and managerial perceptions of IT effects on the operations of public organizations is examined in Managerial Capacity and E-Government in the States: Examining the Link Between Self-Efficacy and Perceptions of New Technologies by Charles C. Hinnant. Data from a national study of state program managers is employed to test five hypotheses regarding computer self-efficacy. Much like their private sector counterparts enabling ecommerce applications to serve customers and support partnerships, public organizations are beginning to embrace electronic government (e-government). In the paper Electronic Government at the Grass Roots: Contemporary Evidence and Future Trend, Stephen H. Holden explores the short and largely undocumented history of electronic government, discusses the literature of e-government at the local government level, and documents the adoption and infusion of e- government among US local governments. Towards an Ontology for e-Document Management in Public Administration - the Case of Schleswig-Holstein by Ralf Klischewski sets out to exemplify ontology-based approaches of e-document management in the public sector. While the focus of the paper is on the case of Schleswig-Holstein, Germany, it introduces a number of similar efforts which can be helpful to e-government efforts world-wide. In Declining Public Trust as Chronic Challenges to Governments: Can IT Restore Public Trust? by M. Jae Moon the decline in public trust is explored in the area of selected administrative factors that might cause the decline of public trust in government in direct or indirect manners. The selected factors include public perception of administrative co
这个迷你轨道涵盖了信息系统的特点、开发、实施和使用,这些信息系统支持各机构内部的全方位管理和行政职能,连接多个公共组织,或将政府与其业务供应商和合作伙伴联系起来。第一篇论文,布里纳·e·科茨的《在线而非在线的智能政府》很有趣,因为它将电子政府与有关官僚机构的文献、这些文献的发展以及官僚机构本身联系起来。这允许从IT角度引入设计和管理新界面的人员。讨论是广泛的,而不是深入的,包括官僚主义、业务改进、电子人才和专业知识、记录管理、损失、隐私、民主和性别等问题。在第二篇论文《政府机构网站的内容管理:国家机构手册内容管理流程研究的初步结果》中,Kristin R. Eschenfelder分析了支持政府机构网站内容的管理流程。这项研究的目的是通过增加对政府机构网页的管理结构的了解来改进这些网页。Charles C. Hinnant的《美国的管理能力与电子政务:检查自我效能与新技术感知之间的联系》一书考察了公共管理人员使用信息技术(IT)的自我效能与管理人员对IT对公共组织运作影响的认知之间的联系。数据从国家研究的国家项目经理被用来检验关于计算机自我效能的五个假设。就像他们的私营部门同行使电子商务应用程序为客户服务并支持合作伙伴关系一样,公共组织也开始接受电子政务(e-government)。在论文《基层电子政务:当代证据和未来趋势》中,斯蒂芬·h·霍尔顿(Stephen H. Holden)探讨了电子政务的短暂且基本上没有文献记载的历史,讨论了地方政府层面的电子政务文献,并记录了美国地方政府对电子政务的采用和注入。面向公共行政电子文档管理的本体论——拉尔夫·克里舍夫斯基的《石勒苏益格-荷尔斯泰因案例》阐述了公共部门电子文档管理的基于本体论的方法。虽然本文的重点是德国石勒苏益格-荷尔斯泰因的案例,但它介绍了一些类似的努力,这些努力可以对全世界的电子政务工作有所帮助。公众信任度下降是政府面临的长期挑战:信息技术能恢复公众信任吗?公众信任的下降是在选定的行政因素方面进行探讨的,这些行政因素可能以直接或间接的方式导致公众对政府的信任下降。选定的因素包括公众对行政腐败(缺乏透明度)、效率低下(浪费)、效率低下和政策疏离的看法。该研究提供了与IT工具解决方案的探索性联系。Jochen Scholl的《电子政务:信息通信技术支持的业务流程变革的特殊案例》讨论了业务流程变革对信息通信技术支持的政府转型的影响。在《评估跨国电子政务网站的质量:战略管理知识交流论坛的案例研究》一书中,Richard Vidgen提出了该领域的一个重要问题:政府机构如何评估网站重新设计工作是否改善了最终用户体验?本文采用了定量和定性相结合的方法来分析他们的案例。Heide Brucher的第九篇论文《利用移动技术支持电子民主》颇具煽动性。其优势包括检查技术与民主参与过程的每个阶段的相互作用,并调查更广泛采用移动技术的关键问题。
{"title":"Information technology and public administrationit-enabled management of government (e-gov-management)) minitrack","authors":"J. Gant, M. Gunter, T. Pardo","doi":"10.1109/HICSS.2003.1174302","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174302","url":null,"abstract":"This minitrack covers characteristics, development, implementation, and uses of information systems that support the full range of management and administrative functions that are internal to agencies, link multiple public organizations, or connect government to its business suppliers and partners. The first paper, SMART Government On Line Not In Line by Breena E. Coates, is interesting because it sets eGovernment in context with the literature on bureaucracies, the development of this literature and of bureaucracies themselves. This allows for a perspective on IT that brings in the people who design and manage the new interface. The discussion is broad rather than deep and includes such issues as bureaucrats, business improvement, e-talent and expertise, records management, loss, privacy, democracy, and gender. In the second paper, Content Management for Government Agency Web Sites: Initial Results From a Study of State Agency Manual Content Management Processes, Kristin R. Eschenfelder analyzes the management processes supporting content on government agency web sites. The goal of the study is to improve government agency web pages by increasing the understanding of the managerial structures that underlie them. The linkage between the self-efficacy of public managers to employ information technology (IT) and managerial perceptions of IT effects on the operations of public organizations is examined in Managerial Capacity and E-Government in the States: Examining the Link Between Self-Efficacy and Perceptions of New Technologies by Charles C. Hinnant. Data from a national study of state program managers is employed to test five hypotheses regarding computer self-efficacy. Much like their private sector counterparts enabling ecommerce applications to serve customers and support partnerships, public organizations are beginning to embrace electronic government (e-government). In the paper Electronic Government at the Grass Roots: Contemporary Evidence and Future Trend, Stephen H. Holden explores the short and largely undocumented history of electronic government, discusses the literature of e-government at the local government level, and documents the adoption and infusion of e- government among US local governments. Towards an Ontology for e-Document Management in Public Administration - the Case of Schleswig-Holstein by Ralf Klischewski sets out to exemplify ontology-based approaches of e-document management in the public sector. While the focus of the paper is on the case of Schleswig-Holstein, Germany, it introduces a number of similar efforts which can be helpful to e-government efforts world-wide. In Declining Public Trust as Chronic Challenges to Governments: Can IT Restore Public Trust? by M. Jae Moon the decline in public trust is explored in the area of selected administrative factors that might cause the decline of public trust in government in direct or indirect manners. The selected factors include public perception of administrative co","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122506155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-02-06DOI: 10.1109/HICSS.2003.1174461
J. Tront, R. Marchany
Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user as well as the server of information. The operating system, as well as application software, provide holes through which security is breached. One vulnerable part of the system that has not received much attention is the hardware. This study examines how various Internet appliances can be classified according to their vulnerabilities.
{"title":"CANDI: a system for classifying the security risks in appliances","authors":"J. Tront, R. Marchany","doi":"10.1109/HICSS.2003.1174461","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174461","url":null,"abstract":"Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user as well as the server of information. The operating system, as well as application software, provide holes through which security is breached. One vulnerable part of the system that has not received much attention is the hardware. This study examines how various Internet appliances can be classified according to their vulnerabilities.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122660704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-02-06DOI: 10.1109/HICSS.2003.1174457
S. Cheung, Dickson K. W. Chiu, Sven Till
E-services refer to the services offered over the Internet. The globalization of economy accelerates the provision of e-services across organizations. Instead of being built from scratch, e-services are mostly extended from existing internal workflows or information systems. In this paper, we examine the requirements of extending a workflow to the provision of e-services, in order to fulfill predefined business processes and data requirements. We also discuss the support of exception handling and asynchronous events across organizational boundaries, through an event publish-and-subscribe mechanism. We demonstrate the feasibility of this approach with the E-ADOME extension layer of our ADOME-WFMS, further illustrated with a system integration example. Our event-driven execution model provides a unified framework for both synchronous execution of workflow and asynchronous handling of events and exceptions. Illustrations are also given on the provision of such e-services over the infrastructure of Web services and Enterprise JavaBeans.
{"title":"Data-driven methodology to extending workflows to e-services over the Internet","authors":"S. Cheung, Dickson K. W. Chiu, Sven Till","doi":"10.1109/HICSS.2003.1174457","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174457","url":null,"abstract":"E-services refer to the services offered over the Internet. The globalization of economy accelerates the provision of e-services across organizations. Instead of being built from scratch, e-services are mostly extended from existing internal workflows or information systems. In this paper, we examine the requirements of extending a workflow to the provision of e-services, in order to fulfill predefined business processes and data requirements. We also discuss the support of exception handling and asynchronous events across organizational boundaries, through an event publish-and-subscribe mechanism. We demonstrate the feasibility of this approach with the E-ADOME extension layer of our ADOME-WFMS, further illustrated with a system integration example. Our event-driven execution model provides a unified framework for both synchronous execution of workflow and asynchronous handling of events and exceptions. Illustrations are also given on the provision of such e-services over the infrastructure of Web services and Enterprise JavaBeans.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132844091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-02-06DOI: 10.1109/HICSS.2003.1173852
R. Tabors, R. Schuler
Reliance on market mechanisms and decentralized decisions as alternatives to central planning and government regulation of energy and other critical infrastructure enterprises has gained momentum worldwide over the last decade. This trend has been seen as the sale of government owned and operated monopolies in energy (electricity, gas and oil), in water and in public transportation. In nations such as the United States where independent ownership was frequently the case, increased dependence on market mechanism is replacing governmental price regulation in these same industries. Whether under the title of privatization, deregulation or restructuring, the movement has been toward allowing competitive market forces to set prices for essential commodities that in the past were actively controlled through direct government ownership or regulation. Within the US there is increased pressure for reregulation of the commodities and for regulation of the derivative markets that have been established to hedge commodity price volatility.
{"title":"Markets and regulation","authors":"R. Tabors, R. Schuler","doi":"10.1109/HICSS.2003.1173852","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1173852","url":null,"abstract":"Reliance on market mechanisms and decentralized decisions as alternatives to central planning and government regulation of energy and other critical infrastructure enterprises has gained momentum worldwide over the last decade. This trend has been seen as the sale of government owned and operated monopolies in energy (electricity, gas and oil), in water and in public transportation. In nations such as the United States where independent ownership was frequently the case, increased dependence on market mechanism is replacing governmental price regulation in these same industries. Whether under the title of privatization, deregulation or restructuring, the movement has been toward allowing competitive market forces to set prices for essential commodities that in the past were actively controlled through direct government ownership or regulation. Within the US there is increased pressure for reregulation of the commodities and for regulation of the derivative markets that have been established to hedge commodity price volatility.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131180314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-02-06DOI: 10.1109/HICSS.2003.1174580
Junseok Hwang, Praveen Aravamudham, E. Liddy, J. Stanton, I. MacInnes
In this paper we present an IRTL (Information Resource Transaction Layer) middleware architecture that addresses some of the important technical challenges associated with heterogeneous resource transactions in the p2p-computing environment. This IRTL will facilitate discovery, valuation, negotiation, coordination, charging and exchange of resources among peer users as a middleware platform. The proposed ITRL will provide an adaptive service that integrates heterogeneous peer-based resources through a service interface independent of any particular system. This paper demonstrates the architecture and design of the IRTL and its mechanisms and protocols for information transaction. By marrying recently developed information resource description facilities with generic functional middleware managers, it presents a middleware service layer with rich support for information resource transactions and resolution. We conclude by discussing the applications and services of the IRTL middleware in the context of the p2p computing, the GRID, and context-aware services.
{"title":"IRTL (information resource transaction layer) middleware design for P2P and open GRID services","authors":"Junseok Hwang, Praveen Aravamudham, E. Liddy, J. Stanton, I. MacInnes","doi":"10.1109/HICSS.2003.1174580","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174580","url":null,"abstract":"In this paper we present an IRTL (Information Resource Transaction Layer) middleware architecture that addresses some of the important technical challenges associated with heterogeneous resource transactions in the p2p-computing environment. This IRTL will facilitate discovery, valuation, negotiation, coordination, charging and exchange of resources among peer users as a middleware platform. The proposed ITRL will provide an adaptive service that integrates heterogeneous peer-based resources through a service interface independent of any particular system. This paper demonstrates the architecture and design of the IRTL and its mechanisms and protocols for information transaction. By marrying recently developed information resource description facilities with generic functional middleware managers, it presents a middleware service layer with rich support for information resource transactions and resolution. We conclude by discussing the applications and services of the IRTL middleware in the context of the p2p computing, the GRID, and context-aware services.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122021612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-02-06DOI: 10.1109/HICSS.2003.1174437
J. Lee-Partridge, Pei See Ho
In the digital economy of information and communication technology, several organizations from various industries are jumping onto the bandwagon of offering consumer-oriented electronic commerce applications. In Singapore, Internet stock trading has been at the forefront of this trend since 1998. However, to date, the penetration rate of online trading remains low. As such, this paper attempts to analyze the factors that affect the growth of Internet stock trading. We used Taylor and Todd's (1995) decomposed theory of planned behavior (TPB) framework to explain investors' acceptance through their intentions to trade online and to rationalize their intentions in terms of attitudes, subjective norms, perceived behavioral control and other related variables. The model is tested based on 291 responses obtained through personal interviews. The measures and hypotheses were analyzed using structural equation modeling. Results show that attitude and social factors significantly influence investors' intention towards adopting Internet stock trading.
{"title":"A retail investor's perspective on the acceptance of Internet stock trading","authors":"J. Lee-Partridge, Pei See Ho","doi":"10.1109/HICSS.2003.1174437","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174437","url":null,"abstract":"In the digital economy of information and communication technology, several organizations from various industries are jumping onto the bandwagon of offering consumer-oriented electronic commerce applications. In Singapore, Internet stock trading has been at the forefront of this trend since 1998. However, to date, the penetration rate of online trading remains low. As such, this paper attempts to analyze the factors that affect the growth of Internet stock trading. We used Taylor and Todd's (1995) decomposed theory of planned behavior (TPB) framework to explain investors' acceptance through their intentions to trade online and to rationalize their intentions in terms of attitudes, subjective norms, perceived behavioral control and other related variables. The model is tested based on 291 responses obtained through personal interviews. The measures and hypotheses were analyzed using structural equation modeling. Results show that attitude and social factors significantly influence investors' intention towards adopting Internet stock trading.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129573772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-02-06DOI: 10.1109/HICSS.2003.1174455
S. Bhattacharjee, R. Gopal, K. Lertwachara, J. Marsden
Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anonymous online networks to exchange audio files at little cost, which has led to millions of shared, illegal copies of music files and related sales losses to the industry. Legal efforts to counter this trend have lagged the advances in technology. This research presents an analysis of selling strategies that can increase a music seller's revenues as online piracy continues to flourish. We study and compare scenarios of traditional music store selling with those of online-based strategies. We model and analyze pure per-unit, pure subscription and mixed strategies for online music services. Analytical modeling, empirical study and simulation analysis were used to investigate the issues in detail. Our results suggest that the quality of pirated music and search effort have a significant impact on viable strategies. For instance, as the quality of pirated music approaches that of a legal online seller, the per unit service becomes the least viable option. An interesting finding was that strategies that minimize piracy do not necessarily maximize revenues. In fact, both revenues and social welfare can be maximized in the subscription-based environment, even though they may lead to higher levels of piracy. Our research findings not only offer insights into an online experience market, but can also serve as a contemporary reflection on other similar information markets.
{"title":"No more shadow boxing with online music piracy: strategic business models to enhance revenues","authors":"S. Bhattacharjee, R. Gopal, K. Lertwachara, J. Marsden","doi":"10.1109/HICSS.2003.1174455","DOIUrl":"https://doi.org/10.1109/HICSS.2003.1174455","url":null,"abstract":"Novel online file sharing technologies have created new market dynamics and posed a great challenge to the music industry to try and retain customers. Consumers have created anonymous online networks to exchange audio files at little cost, which has led to millions of shared, illegal copies of music files and related sales losses to the industry. Legal efforts to counter this trend have lagged the advances in technology. This research presents an analysis of selling strategies that can increase a music seller's revenues as online piracy continues to flourish. We study and compare scenarios of traditional music store selling with those of online-based strategies. We model and analyze pure per-unit, pure subscription and mixed strategies for online music services. Analytical modeling, empirical study and simulation analysis were used to investigate the issues in detail. Our results suggest that the quality of pirated music and search effort have a significant impact on viable strategies. For instance, as the quality of pirated music approaches that of a legal online seller, the per unit service becomes the least viable option. An interesting finding was that strategies that minimize piracy do not necessarily maximize revenues. In fact, both revenues and social welfare can be maximized in the subscription-based environment, even though they may lead to higher levels of piracy. Our research findings not only offer insights into an online experience market, but can also serve as a contemporary reflection on other similar information markets.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"18 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114032719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}