Technological innovation diffusion refers to the continuous promotion and application for new technology after the earliest commercialization, that is, new technology is spread and promoted among potential adopters. Technological innovation diffusion is an important part of technological innovation and the critical link of technological improvement as well. General model of technological innovation diffusion explains the development of new technology diffusion by S-type logic curve. It always only studies technological system itself. In this article, the author attempts to use differential equation to describe the characteristic of technological innovation diffusion, viscidity among enterprises from the microcosmic angle, then he sets up the dynamics model of technological innovation diffusion on the basis of complete consideration on the mutual relationship between technology and environment. It is meaningful for the development of technological innovation and enterprises to learn from each other to some extent.
{"title":"A Study on Viscidity and Dynamics Model of Technological Innovation Diffusion","authors":"Huang Wei","doi":"10.1109/FITME.2008.8","DOIUrl":"https://doi.org/10.1109/FITME.2008.8","url":null,"abstract":"Technological innovation diffusion refers to the continuous promotion and application for new technology after the earliest commercialization, that is, new technology is spread and promoted among potential adopters. Technological innovation diffusion is an important part of technological innovation and the critical link of technological improvement as well. General model of technological innovation diffusion explains the development of new technology diffusion by S-type logic curve. It always only studies technological system itself. In this article, the author attempts to use differential equation to describe the characteristic of technological innovation diffusion, viscidity among enterprises from the microcosmic angle, then he sets up the dynamics model of technological innovation diffusion on the basis of complete consideration on the mutual relationship between technology and environment. It is meaningful for the development of technological innovation and enterprises to learn from each other to some extent.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125518478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article has estimated the stochastic frontier production function of grain farming through building a parallel data model. It has divided the growth source of grain output into factor input, technical progress and technical efficiency. The research indicates that the growth of the grain output in Hubei during the period from 1980-2005 mainly derived from agricultural technical, following was the improvement of technical efficiency, and the 3rd was the input of material expenditure. Another was also found that the lower technical efficiency suffered from the insufficient derived demand of the technology substituting for labor, Hubei grain farmers are not ldquopoor but efficientrdquo.
{"title":"Research on the Source of Grain Output Growth Based on SFA Model","authors":"Yu Zhao, Yu Zhang, Chunjie Qi","doi":"10.1109/FITME.2008.37","DOIUrl":"https://doi.org/10.1109/FITME.2008.37","url":null,"abstract":"This article has estimated the stochastic frontier production function of grain farming through building a parallel data model. It has divided the growth source of grain output into factor input, technical progress and technical efficiency. The research indicates that the growth of the grain output in Hubei during the period from 1980-2005 mainly derived from agricultural technical, following was the improvement of technical efficiency, and the 3rd was the input of material expenditure. Another was also found that the lower technical efficiency suffered from the insufficient derived demand of the technology substituting for labor, Hubei grain farmers are not ldquopoor but efficientrdquo.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130827228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networks even more so than in wired networks. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render the traditional solutions inapplicable. In particular these networks are extremely under threat to insider attacks especially packet dropping attacks. It is very difficult to detect such attacks because they comes in the category of attacks in mobile ad hoc networks in which the attacker nodes becomes the part of the network. In this paper we have proposed a two folded approach, to detect and then to isolate such nodes which become the part of the network to cause packet dropping attacks. First approach will detect the misbehavior of nodes and will identify the malicious activity in network, and then upon identification of nodes misbehavior in network other approach will isolate the malicious node from network.
{"title":"Adding Security against Packet Dropping Attack in Mobile Ad Hoc Networks","authors":"M. Zeshan, S.A. Khan, A. R. Cheema, A. Ahmed","doi":"10.1109/FITME.2008.159","DOIUrl":"https://doi.org/10.1109/FITME.2008.159","url":null,"abstract":"Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networks even more so than in wired networks. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render the traditional solutions inapplicable. In particular these networks are extremely under threat to insider attacks especially packet dropping attacks. It is very difficult to detect such attacks because they comes in the category of attacks in mobile ad hoc networks in which the attacker nodes becomes the part of the network. In this paper we have proposed a two folded approach, to detect and then to isolate such nodes which become the part of the network to cause packet dropping attacks. First approach will detect the misbehavior of nodes and will identify the malicious activity in network, and then upon identification of nodes misbehavior in network other approach will isolate the malicious node from network.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130941376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study examines three project diversity, including project size, project member diversity, technical complexity; five critical success factors, including project objective and bound, top management support, project plan and monitoring, project user involvement, project communications; and six success criteria, including time, cost, quality, information quality, information use, user satisfaction. Through literature review, hypotheses, data collection, data analysis, validation, we get conclusions and recommendations. In this paper, we have found that five critical success factors including project objective and bound, top management support, project plan and monitoring, project user involvement, project communications would have significant impacts on the performance of the information system development projects. On the other words, that means we could gain success by controlling theses critical success factors. Furthermore, we also found that the factors have significant differences between the different projects.
{"title":"Analysis on Factors Impacting to Information System Development","authors":"Xiangnan Lu, Xin Zhao, Hui Han","doi":"10.1109/FITME.2008.134","DOIUrl":"https://doi.org/10.1109/FITME.2008.134","url":null,"abstract":"This study examines three project diversity, including project size, project member diversity, technical complexity; five critical success factors, including project objective and bound, top management support, project plan and monitoring, project user involvement, project communications; and six success criteria, including time, cost, quality, information quality, information use, user satisfaction. Through literature review, hypotheses, data collection, data analysis, validation, we get conclusions and recommendations. In this paper, we have found that five critical success factors including project objective and bound, top management support, project plan and monitoring, project user involvement, project communications would have significant impacts on the performance of the information system development projects. On the other words, that means we could gain success by controlling theses critical success factors. Furthermore, we also found that the factors have significant differences between the different projects.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128815620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For horizontal conflict of marketing channel, this paper has studied the main triggers of channel memberspsila conflict by game theory. The main triggers include the revenue, cost, incentive and punitive mechanisms. The research model is ldquoPrisoner's Dilemmardquo and ldquoNASH Equilibrium Solutionrdquo. Through analyzing the causes of transshipment phenomenon, this paper gave some control measures and solutions.
{"title":"Marketing Channel Horizontal Conflicts and Countermeasures Discussion Based on Game Theory","authors":"Longwen Zhao, Y. Long","doi":"10.1109/FITME.2008.41","DOIUrl":"https://doi.org/10.1109/FITME.2008.41","url":null,"abstract":"For horizontal conflict of marketing channel, this paper has studied the main triggers of channel memberspsila conflict by game theory. The main triggers include the revenue, cost, incentive and punitive mechanisms. The research model is ldquoPrisoner's Dilemmardquo and ldquoNASH Equilibrium Solutionrdquo. Through analyzing the causes of transshipment phenomenon, this paper gave some control measures and solutions.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132448079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The agent-oriented approach has emerged as a novel and popular paradigm for modern management information system analysis, design and implementation. In this paper, the authors concentrate on the design of a real application: SPAERIS (shipping pollution accident emergence reflecting information system), using AUML(agent Unified Modeling Language). Furthermore, we explored and discussed the strengths and weaknesses of AUML, and made some appropriate extension of the approach to better realize our design objectives. The research produced a methodological basis for the analysis, design of distributed management information system. The SPAERIS has been delivered to the users and is on running.
{"title":"Spaeris: A Multi-Agent System Specified by Agent UML","authors":"Chen Fei, Chen Yan","doi":"10.1109/FITME.2008.60","DOIUrl":"https://doi.org/10.1109/FITME.2008.60","url":null,"abstract":"The agent-oriented approach has emerged as a novel and popular paradigm for modern management information system analysis, design and implementation. In this paper, the authors concentrate on the design of a real application: SPAERIS (shipping pollution accident emergence reflecting information system), using AUML(agent Unified Modeling Language). Furthermore, we explored and discussed the strengths and weaknesses of AUML, and made some appropriate extension of the approach to better realize our design objectives. The research produced a methodological basis for the analysis, design of distributed management information system. The SPAERIS has been delivered to the users and is on running.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127108647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Performance assessment is an important component of enterprisespsila strategy implementation and control. This paper proposed an E-commerce performance assessment method based on the D-S theory and the Balanced Score Card (BSC) method. With the BSC method, this paper analyzes the primary factors which should be considered to assess an E-commerce companypsilas performance from four aspects: the enterprise operating ability, the exterior customer relations, the Staff's growth degree and the financial aspects. Also, this paper establishes the E-commerce performance assessment indicator system, and then establishes the performance assessment inference model with D-S theory method. Finally, this paper proves this methodpsilas usability through an example analysis.
{"title":"E-commerce Performance Assessment Research Based on the D-S Theory and the Balanced Score Card Method","authors":"Peide Liu, Zhengwei Du","doi":"10.1109/FITME.2008.149","DOIUrl":"https://doi.org/10.1109/FITME.2008.149","url":null,"abstract":"Performance assessment is an important component of enterprisespsila strategy implementation and control. This paper proposed an E-commerce performance assessment method based on the D-S theory and the Balanced Score Card (BSC) method. With the BSC method, this paper analyzes the primary factors which should be considered to assess an E-commerce companypsilas performance from four aspects: the enterprise operating ability, the exterior customer relations, the Staff's growth degree and the financial aspects. Also, this paper establishes the E-commerce performance assessment indicator system, and then establishes the performance assessment inference model with D-S theory method. Finally, this paper proves this methodpsilas usability through an example analysis.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130706708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Evaluation and management of operational risk has received significant attention as the operational risk extends its influence to the bank industry increasingly. In order to overcome the limit that commercial banks of China are lack of internal loss data, a frame, using an uncertain linguistic term set, based on risk event type as well as the business unit is set up to evaluate the operational risk in commercial bank. UEOWA operator is applied to aggregate the linguistic information which uses an interval form to express some fuzzy indices that are difficult to quantify directly. Then a complete process for evaluating operational risk is introduced. Finally, an example shows that the proposed frame and methods are useful and exercisable.
{"title":"Research on Operational Risk Evaluation of Commercial Bank with Incomplete and Linguistic Information","authors":"Qian Chen, Jinlin Li, Lun Ran","doi":"10.1109/FITME.2008.15","DOIUrl":"https://doi.org/10.1109/FITME.2008.15","url":null,"abstract":"Evaluation and management of operational risk has received significant attention as the operational risk extends its influence to the bank industry increasingly. In order to overcome the limit that commercial banks of China are lack of internal loss data, a frame, using an uncertain linguistic term set, based on risk event type as well as the business unit is set up to evaluate the operational risk in commercial bank. UEOWA operator is applied to aggregate the linguistic information which uses an interval form to express some fuzzy indices that are difficult to quantify directly. Then a complete process for evaluating operational risk is introduced. Finally, an example shows that the proposed frame and methods are useful and exercisable.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133980327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Most software development projects confront great risks and risks might occur in the whole development process. Success of the projects demands effective management of the risks. Five main reasons are analyzed for a complete and clear understanding of the risks. The reasons include the use of new and unproven technologies, system requirements, system architecture, system performance, and organizational or non-functional affairs. The risks can be avoided, confined, mitigated and monitored under effective management. software development project risk management should focus on reduction and prevention of risks, continuously assess possible problems, define potential risks, determine what risks are important and deal with them. Four steps and three countermeasures are put forward to cope with various risks in software development projects. The steps are risk identification, assessing the level of exposure for each risk, risk mitigation and risk conclusion. The countermeasures are careful, typical and flexible countermeasures.
{"title":"A Study of Software Development Project Risk Management","authors":"Ye Tao","doi":"10.1109/FITME.2008.125","DOIUrl":"https://doi.org/10.1109/FITME.2008.125","url":null,"abstract":"Most software development projects confront great risks and risks might occur in the whole development process. Success of the projects demands effective management of the risks. Five main reasons are analyzed for a complete and clear understanding of the risks. The reasons include the use of new and unproven technologies, system requirements, system architecture, system performance, and organizational or non-functional affairs. The risks can be avoided, confined, mitigated and monitored under effective management. software development project risk management should focus on reduction and prevention of risks, continuously assess possible problems, define potential risks, determine what risks are important and deal with them. Four steps and three countermeasures are put forward to cope with various risks in software development projects. The steps are risk identification, assessing the level of exposure for each risk, risk mitigation and risk conclusion. The countermeasures are careful, typical and flexible countermeasures.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132395681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Word of Mouth (WOM) has been extensively studied as persuasive communication but it has seldom been studied as diffusive communication. This study focuses on online WOM as diffusive communication and the accompanying associated ripple effect by examining the informationpsilas quality, authenticity, authority, and interestingness. It also investigates how a participantpsilas opinion leadership and seeking propensities influence consumerpsilas online WOM activities. Our results show that all of the four WOM information dimensions have a positive effect on a transmitterpsilas level of acceptance of WOM, which in turn positively affects the transmitterpsilas sharing intention. This study indicates that in computer-mediated environments opinion seekers are more likely to be transmitter.
{"title":"People as Transmitters: What Makes an Online Marketing Message Contagious?","authors":"Xuesong Huang, Maohong Liu, Minxue Huang","doi":"10.1109/FITME.2008.71","DOIUrl":"https://doi.org/10.1109/FITME.2008.71","url":null,"abstract":"Word of Mouth (WOM) has been extensively studied as persuasive communication but it has seldom been studied as diffusive communication. This study focuses on online WOM as diffusive communication and the accompanying associated ripple effect by examining the informationpsilas quality, authenticity, authority, and interestingness. It also investigates how a participantpsilas opinion leadership and seeking propensities influence consumerpsilas online WOM activities. Our results show that all of the four WOM information dimensions have a positive effect on a transmitterpsilas level of acceptance of WOM, which in turn positively affects the transmitterpsilas sharing intention. This study indicates that in computer-mediated environments opinion seekers are more likely to be transmitter.","PeriodicalId":218182,"journal":{"name":"2008 International Seminar on Future Information Technology and Management Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132554093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}