- This paper presents a process to build websites based on personalization issues, aiming the improvement of services for the users. In this process not only the history of navigation and preferences detected or expressed by the user are considered for personalization but also the types of devices and networks used for communication, and even the content presented. The information related to the user interactions is stored and used for construction of user profiles. Such information is obtained through implicit monitoring of the site and is treated using Fuzzy Ontology. The process stands out for directing the architecture of the site to provide personalized services.
{"title":"SADP: Site Architecture Driven by Personalization","authors":"Juliano Z. Blanco, A. F. Prado","doi":"10.1109/CEC.2009.49","DOIUrl":"https://doi.org/10.1109/CEC.2009.49","url":null,"abstract":"- This paper presents a process to build websites based on personalization issues, aiming the improvement of services for the users. In this process not only the history of navigation and preferences detected or expressed by the user are considered for personalization but also the types of devices and networks used for communication, and even the content presented. The information related to the user interactions is stored and used for construction of user profiles. Such information is obtained through implicit monitoring of the site and is treated using Fuzzy Ontology. The process stands out for directing the architecture of the site to provide personalized services.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133224955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Networked enterprises create virtual teams of distributed experts belonging to different enterprises where one user can be part of multiple teams; How to effectively control the sharing of personal and shared context information among members of multiple overlapping teams without compromising their privacy is a challenging research question. This paper describes sharing control in Peer to Peer and Web service based collaborative systems. In contrast to other sharing systems which mostly use static policy and context of requester and owner, we propose DySCon, a context based Dynamic Sharing Control mechanism which allows system defined as well as owner defined runtime policy adaptation for different levels using various contexts. We evaluate our Dynamic Sharing Control architecture by implementing a prototype Dynamic Sharing Control Messenger to enhance privacy of the owner.
{"title":"DySCon: Dynamic Sharing Control for Distributed Team Collaboration in Networked Enterprises","authors":"Ahmad Kamran Malik, Hong Linh Truong, S. Dustdar","doi":"10.1109/CEC.2009.55","DOIUrl":"https://doi.org/10.1109/CEC.2009.55","url":null,"abstract":"Networked enterprises create virtual teams of distributed experts belonging to different enterprises where one user can be part of multiple teams; How to effectively control the sharing of personal and shared context information among members of multiple overlapping teams without compromising their privacy is a challenging research question. This paper describes sharing control in Peer to Peer and Web service based collaborative systems. In contrast to other sharing systems which mostly use static policy and context of requester and owner, we propose DySCon, a context based Dynamic Sharing Control mechanism which allows system defined as well as owner defined runtime policy adaptation for different levels using various contexts. We evaluate our Dynamic Sharing Control architecture by implementing a prototype Dynamic Sharing Control Messenger to enhance privacy of the owner.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123291500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Developing process-oriented enterprise systems not only asks for Business Process Management (BPM) but also for an appropriate user interface and data model. Current BPM and workflow technologies are neither integrated with user dialogs nor offer an appropriate data model. This paper describes a novel integrated framework for modeling process-oriented systems called Processes with User Interfaces and Data Modeling Integration (PUDI), which offers a solution to these shortcomings. For the projects described in this paper, we used the Business Process Modeling Notation (BPMN) for the processes, extensions to BPMN for submit/response-style user interaction, which is characteristic of form-based applications ranging from small Web applications to large ERP systems, and the Unified Modeling Language (UML) for the data model which defines both, the information and the message model. The paper discusses related work and describes real-world application scenarios which motivated our research on the proposed framework and illustrates its practical benefits.
{"title":"Extending BPMN with Submit/Response-Style User Interaction Modeling","authors":"D. Auer, V. Geist, D. Draheim","doi":"10.1109/CEC.2009.75","DOIUrl":"https://doi.org/10.1109/CEC.2009.75","url":null,"abstract":"Developing process-oriented enterprise systems not only asks for Business Process Management (BPM) but also for an appropriate user interface and data model. Current BPM and workflow technologies are neither integrated with user dialogs nor offer an appropriate data model. This paper describes a novel integrated framework for modeling process-oriented systems called Processes with User Interfaces and Data Modeling Integration (PUDI), which offers a solution to these shortcomings. For the projects described in this paper, we used the Business Process Modeling Notation (BPMN) for the processes, extensions to BPMN for submit/response-style user interaction, which is characteristic of form-based applications ranging from small Web applications to large ERP systems, and the Unified Modeling Language (UML) for the data model which defines both, the information and the message model. The paper discusses related work and describes real-world application scenarios which motivated our research on the proposed framework and illustrates its practical benefits.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123612997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Business rules are a cornerstone of the consistency management of e-commerce data. The concurrency of transactions by multiple customers of e-commerce services (e.g., seat reservation systems) is indispensable for most of such services. However, the enforcement of business rules may falter due to extant inconsistencies of legacy data and integrity violations caused by the concurrency of transactions. To avoid this, we propose an inconsistency-tolerant approach to business rules enforcement for e-business applications in which business rules are expressed by database integrity constraints. The extension overcomes problems related to persistent integrity violations of stored data in ecommerce systems with concurrent transactions.
{"title":"Business Rules for Concurrent E-commerce Transactions","authors":"H. Decker","doi":"10.1109/CEC.2009.25","DOIUrl":"https://doi.org/10.1109/CEC.2009.25","url":null,"abstract":"Business rules are a cornerstone of the consistency management of e-commerce data. The concurrency of transactions by multiple customers of e-commerce services (e.g., seat reservation systems) is indispensable for most of such services. However, the enforcement of business rules may falter due to extant inconsistencies of legacy data and integrity violations caused by the concurrency of transactions. To avoid this, we propose an inconsistency-tolerant approach to business rules enforcement for e-business applications in which business rules are expressed by database integrity constraints. The extension overcomes problems related to persistent integrity violations of stored data in ecommerce systems with concurrent transactions.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128733294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Badly and inconsistently layouted business processes are hard to read for humans and therefore lack comprehensibility. Furthermore, processes generated by software have no layout at all. If stakeholders cannot comprehend the process descriptions, they are unable to validate them and ¿nd mistakes. By offering a fully automatic layout algorithm for BPMN, it is possible to layout business processes in a consistent and clear way so that stakeholders can better and quicker comprehend the contents. This leads to better comprehensiblity and thus to better communication in BPM / SOA projects and allows for consistent process layouts throughout projects and enterprises - independent from the model source. In addition, this permits using generated models without manual layouting.
{"title":"A Simple Algorithm for Automatic Layout of BPMN Processes","authors":"I. Kitzmann, C. König, Daniel Lübke, Leif Singer","doi":"10.1109/CEC.2009.28","DOIUrl":"https://doi.org/10.1109/CEC.2009.28","url":null,"abstract":"Badly and inconsistently layouted business processes are hard to read for humans and therefore lack comprehensibility. Furthermore, processes generated by software have no layout at all. If stakeholders cannot comprehend the process descriptions, they are unable to validate them and ¿nd mistakes. By offering a fully automatic layout algorithm for BPMN, it is possible to layout business processes in a consistent and clear way so that stakeholders can better and quicker comprehend the contents. This leads to better comprehensiblity and thus to better communication in BPM / SOA projects and allows for consistent process layouts throughout projects and enterprises - independent from the model source. In addition, this permits using generated models without manual layouting.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130675486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
People, companies, and public authorities can now have a strong on-line presence and a huge amount of interactions on the Internet, made possible by the impressive growth of the World Wide Web and of Web technologies. Many independent parties provide services and exchange information in a plural, dynamic, and open environment. This scenario, where interacting parties are often strangers, naturally brings to attribute-based access control solutions, as traditional identity-based systems are usually inadequate to large open environments. User attributes certified by external authorities, however, tend to be rather general-purpose and to reflect a user point of view, thus they often do not coincide with the concepts that are relevant for the service. In this paper we propose a framework to decouple the user point of view and the service point of view on user attributes: following our model, the service access control policy can focus on the concepts that are relevant for the service logic, whereas a separate attribute mapping policy establishes the bridge between the two domains.
{"title":"Bridging the Gap between User Attributes and Service Policies with Attribute Mapping","authors":"D. Cerri, F. Corcoglioniti","doi":"10.1109/CEC.2009.29","DOIUrl":"https://doi.org/10.1109/CEC.2009.29","url":null,"abstract":"People, companies, and public authorities can now have a strong on-line presence and a huge amount of interactions on the Internet, made possible by the impressive growth of the World Wide Web and of Web technologies. Many independent parties provide services and exchange information in a plural, dynamic, and open environment. This scenario, where interacting parties are often strangers, naturally brings to attribute-based access control solutions, as traditional identity-based systems are usually inadequate to large open environments. User attributes certified by external authorities, however, tend to be rather general-purpose and to reflect a user point of view, thus they often do not coincide with the concepts that are relevant for the service. In this paper we propose a framework to decouple the user point of view and the service point of view on user attributes: following our model, the service access control policy can focus on the concepts that are relevant for the service logic, whereas a separate attribute mapping policy establishes the bridge between the two domains.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127944890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Combinatorial exchanges are double sided marketplaceswith multiple sellers and multiple buyers trading with thehelp of combinatorial bids. The allocation and other associated problems in such exchanges are known to be among the hardest to solve among all economic mechanisms. In this paper, we develop computationally efficient iterative auction mechanisms for solving combinatorial exchanges. Our mechanisms satisfy Individual rationality (IR) and budget-nonnegativity (BN) properties. We also show that the exchange problem can be reduced to combinatorial auction problem when either the buyers or the sellers are single minded. Our numerical experiments show that our algorithm produces good quality solutions and is computationally efficient.
{"title":"Approximately Efficient Iterative Mechanisms for Combinatorial Exchanges","authors":"S. Biswas, Y. Narahari","doi":"10.1109/CEC.2009.61","DOIUrl":"https://doi.org/10.1109/CEC.2009.61","url":null,"abstract":"Combinatorial exchanges are double sided marketplaceswith multiple sellers and multiple buyers trading with thehelp of combinatorial bids. The allocation and other associated problems in such exchanges are known to be among the hardest to solve among all economic mechanisms. In this paper, we develop computationally efficient iterative auction mechanisms for solving combinatorial exchanges. Our mechanisms satisfy Individual rationality (IR) and budget-nonnegativity (BN) properties. We also show that the exchange problem can be reduced to combinatorial auction problem when either the buyers or the sellers are single minded. Our numerical experiments show that our algorithm produces good quality solutions and is computationally efficient.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131348853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many e-stores use conversion rates, ie. how many people convert shopping baskets to actualpurchases as a primary indicator of success. A low conversion rate is used as a reason for spending moretime and effort on improving the usability of the site, assuming thatthe fault must be with the usability of the website.There is some question, however, about whether this focusis justified. We argue here that the online shopping experience has adistinct nature of its own, having different characteristics andencouraging different behaviours. We therefore carried out a study in order tounderstand e-shopper behaviours - specifically their usage ofthe electronic shopping basket and wish list. We used an online survey to ask anumber of questions calculated to explore this usage. We report hereon our findings.We found that eventually, along with becoming more mature in the usageof online ecommerce, every e-shopper will abandon the shoppingbasket. Hence abandonment rates should not be used as a successindicator and a low conversion rate does not indicate that a site'susabiity is poor. We also identified three categories of e-shopper, thevague, the cost conscious and the window shoppers. The first group had the strongest intention to purchase and were the least likely toabandon their shopping baskets with the other two groups being morelikely to abandon.Finally there werealso two distinct types of wish list user: the cleaners and thehoarders. The former were cost conscious and appeared to use the wishlist to monitor prices. The hoarders tended to have used e-commercefor longer and used the wish list to keep track of items they mightwell like to purchase in the future.
{"title":"Everyone Abandons - Eventually: Understanding the Online Shopping Experience","authors":"K. Renaud, T. Cockshott, M. Hair","doi":"10.1109/CEC.2009.22","DOIUrl":"https://doi.org/10.1109/CEC.2009.22","url":null,"abstract":"Many e-stores use conversion rates, ie. how many people convert shopping baskets to actualpurchases as a primary indicator of success. A low conversion rate is used as a reason for spending moretime and effort on improving the usability of the site, assuming thatthe fault must be with the usability of the website.There is some question, however, about whether this focusis justified. We argue here that the online shopping experience has adistinct nature of its own, having different characteristics andencouraging different behaviours. We therefore carried out a study in order tounderstand e-shopper behaviours - specifically their usage ofthe electronic shopping basket and wish list. We used an online survey to ask anumber of questions calculated to explore this usage. We report hereon our findings.We found that eventually, along with becoming more mature in the usageof online ecommerce, every e-shopper will abandon the shoppingbasket. Hence abandonment rates should not be used as a successindicator and a low conversion rate does not indicate that a site'susabiity is poor. We also identified three categories of e-shopper, thevague, the cost conscious and the window shoppers. The first group had the strongest intention to purchase and were the least likely toabandon their shopping baskets with the other two groups being morelikely to abandon.Finally there werealso two distinct types of wish list user: the cleaners and thehoarders. The former were cost conscious and appeared to use the wishlist to monitor prices. The hoarders tended to have used e-commercefor longer and used the wish list to keep track of items they mightwell like to purchase in the future.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133971971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The concept of business integration as the combination of business process management and enterprise applica-tion integration may seem old hat and already well un-derstood. In practice, however, many project managers struggle with the complexity and interdisciplinarity of business integration. Specialized management frame-works are scarce in this field but are crucial to the suc-cess of projects. This paper proposes such a management framework, which has its roots in the St. Gall Manage-ment Model and is strongly influenced by empirical data from existing projects. It defines design objects in two dimensions, which depict the crucial success factors for business integration projects.
{"title":"Management Framework for Business Integration Projects","authors":"Thomas Keller, Thomas Marko","doi":"10.1109/CEC.2009.16","DOIUrl":"https://doi.org/10.1109/CEC.2009.16","url":null,"abstract":"The concept of business integration as the combination of business process management and enterprise applica-tion integration may seem old hat and already well un-derstood. In practice, however, many project managers struggle with the complexity and interdisciplinarity of business integration. Specialized management frame-works are scarce in this field but are crucial to the suc-cess of projects. This paper proposes such a management framework, which has its roots in the St. Gall Manage-ment Model and is strongly influenced by empirical data from existing projects. It defines design objects in two dimensions, which depict the crucial success factors for business integration projects.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126167754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sebastian Hudert, Torsten Eymann, Heiko Ludwig, G. Wirtz
The vision of an open and global Internet of Services (IoS) is driven by globalization and fast changing settings when trading on a world-wide scope. It requires automated on-line techniques for handling services and resources themselves, for advertising and discovery as well as for the on-the-flynegotiation of proper terms for their use. In such a setting covering completely different branches and traditions of business, a flexible infrastructure for negotiating service level agreements is mandatory. In this paper, we propose an extended service usage cycle suitable for IoS along with an expressive but still machine manageable protocol description language capable of specifying a multitude of different negotiation protocols. It supports the extended usage cycle and permits choosing services with appropriate SLA negotiation styles as well as performing SLA negotiations based on the style agreed by potential business partners.
{"title":"A Negotiation Protocol Description Language for Automated Service Level Agreement Negotiations","authors":"Sebastian Hudert, Torsten Eymann, Heiko Ludwig, G. Wirtz","doi":"10.1109/CEC.2009.45","DOIUrl":"https://doi.org/10.1109/CEC.2009.45","url":null,"abstract":"The vision of an open and global Internet of Services (IoS) is driven by globalization and fast changing settings when trading on a world-wide scope. It requires automated on-line techniques for handling services and resources themselves, for advertising and discovery as well as for the on-the-flynegotiation of proper terms for their use. In such a setting covering completely different branches and traditions of business, a flexible infrastructure for negotiating service level agreements is mandatory. In this paper, we propose an extended service usage cycle suitable for IoS along with an expressive but still machine manageable protocol description language capable of specifying a multitude of different negotiation protocols. It supports the extended usage cycle and permits choosing services with appropriate SLA negotiation styles as well as performing SLA negotiations based on the style agreed by potential business partners.","PeriodicalId":384060,"journal":{"name":"2009 IEEE Conference on Commerce and Enterprise Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116533609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}