Building Software Park to develop software industry is widely used around the world. Software park knowledge network plays an important role in Software Park’s technology innovation. This paper gives a definition of software park knowledge network. Based on the analysis of knowledge nodes such as government agencies, Software Park management agencies, software enterprises, academies, service organizations, software platform providers in software park knowledge network and relationships among them, a software knowledge network model is proposed.
{"title":"Modeling Software Park Knowledge Network","authors":"Liu Hongli, Huawei Jing, Zhang Xin","doi":"10.1109/ICEE.2010.469","DOIUrl":"https://doi.org/10.1109/ICEE.2010.469","url":null,"abstract":"Building Software Park to develop software industry is widely used around the world. Software park knowledge network plays an important role in Software Park’s technology innovation. This paper gives a definition of software park knowledge network. Based on the analysis of knowledge nodes such as government agencies, Software Park management agencies, software enterprises, academies, service organizations, software platform providers in software park knowledge network and relationships among them, a software knowledge network model is proposed.","PeriodicalId":420284,"journal":{"name":"2010 International Conference on E-Business and E-Government","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114300534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, after the investigation and study the security situation of the accounting information system at home and abroad, analyzing the current security system of accounting information system with accounting data information security as an entry point, we want to construct a data "audit" model which draw on the experience of relevant principles of the black box in the aircraft, using the knowledge of accounting and auditing as well as relevant technologies about data encryption, digital signatures in computer data processing under the accounting information system. The establishment of this model can be achieved on the review, verification and validation of the source database, which in order to achieve the data in disguise from "audit". Once the source data in the database have been illegally tampered, you can use the data in the data "audit" model to verify and restore the source data in the source database, which can verify the security of the accounting data in source database and realize the source database data protection from another perspective.
{"title":"Data “Audit” Research Based on the Accounting Information System","authors":"Tao Li, Chao Liu","doi":"10.1109/ICEE.2010.610","DOIUrl":"https://doi.org/10.1109/ICEE.2010.610","url":null,"abstract":"In this paper, after the investigation and study the security situation of the accounting information system at home and abroad, analyzing the current security system of accounting information system with accounting data information security as an entry point, we want to construct a data \"audit\" model which draw on the experience of relevant principles of the black box in the aircraft, using the knowledge of accounting and auditing as well as relevant technologies about data encryption, digital signatures in computer data processing under the accounting information system. The establishment of this model can be achieved on the review, verification and validation of the source database, which in order to achieve the data in disguise from \"audit\". Once the source data in the database have been illegally tampered, you can use the data in the data \"audit\" model to verify and restore the source data in the source database, which can verify the security of the accounting data in source database and realize the source database data protection from another perspective.","PeriodicalId":420284,"journal":{"name":"2010 International Conference on E-Business and E-Government","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114573690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, human resource recruitment websites have been more and more popular in the talent market. The HR recruitment website is an important part in the E-business world. Several HR recruitment websites in China have been in a leading position in this field. In the mean time job hunters find it difficult to assess those websites for their choice decision. This paper utilizes Analytical Hierarchy Process (AHP) and Fuzzy Synthetic Evaluation (FSE) to establish a set of methods to evaluate and rank the leading HR recruitment websites in China, helping leaders and managers making decisions in concerning fields as well as helping web surfers and job hunters selecting their preferred channels.
{"title":"HR Recruitment Websites Evaluation Based on AHP-FSE","authors":"Tong Li, Liping Chen","doi":"10.1109/ICEE.2010.1363","DOIUrl":"https://doi.org/10.1109/ICEE.2010.1363","url":null,"abstract":"In recent years, human resource recruitment websites have been more and more popular in the talent market. The HR recruitment website is an important part in the E-business world. Several HR recruitment websites in China have been in a leading position in this field. In the mean time job hunters find it difficult to assess those websites for their choice decision. This paper utilizes Analytical Hierarchy Process (AHP) and Fuzzy Synthetic Evaluation (FSE) to establish a set of methods to evaluate and rank the leading HR recruitment websites in China, helping leaders and managers making decisions in concerning fields as well as helping web surfers and job hunters selecting their preferred channels.","PeriodicalId":420284,"journal":{"name":"2010 International Conference on E-Business and E-Government","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114580616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For automated negotiation scenario's characteristics on supplier Relationship Management, according to the scenes' information of the negotiating parties, such as the negotiating goals, the extent of the relationship, the concept of the goal - relationship (G-R) factors was put forward, and a calculating method of the first proposal in negotiations was built by the concept; At the same time, a forecasting method of the nearest 4 steps trend about the other side' proposals was presented, and a counter-offer model of buyers was given. These methods can provide real-time support information for the negotiators in automated negotiation, improve the efficiency of the negotiations, and guide the negotiations to the benefit of the buyer, achieve better negotiating benefits.
{"title":"Multi-rounds of Price Automated Negotiation Model about Supplier Relationship Management","authors":"Xie Fengling, Ji Guorui, Huang Tiyun","doi":"10.1109/ICEE.2010.394","DOIUrl":"https://doi.org/10.1109/ICEE.2010.394","url":null,"abstract":"For automated negotiation scenario's characteristics on supplier Relationship Management, according to the scenes' information of the negotiating parties, such as the negotiating goals, the extent of the relationship, the concept of the goal - relationship (G-R) factors was put forward, and a calculating method of the first proposal in negotiations was built by the concept; At the same time, a forecasting method of the nearest 4 steps trend about the other side' proposals was presented, and a counter-offer model of buyers was given. These methods can provide real-time support information for the negotiators in automated negotiation, improve the efficiency of the negotiations, and guide the negotiations to the benefit of the buyer, achieve better negotiating benefits.","PeriodicalId":420284,"journal":{"name":"2010 International Conference on E-Business and E-Government","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121843624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Supply chain management had become part of the senior management agenda in the manufacturing and retailing industries. More recently, interest in supply chain management has also been growing in the fishery industry both in developed and developing countries. Along with the occurrence of several catastrophic events in fishery supply chains, fishery risk diversity and insurance problems become more and more important. For lacking sufficient knowledge about the exact probability of the fishery supply chain contract signatory or insured accidents, in the fishery supply chain risk diversity and insurance process, the fishery supply chain risk insurer usually uses the information supplied by the fishery supply chain contract signatory or fishery supply chain insurants and the behavior performed by the fishery supply chain contract signatory or fishery supply chain insurants to establish the parameters of the fishery supply chain insurance contract. In this paper, the fishery risk diversity and insurance problems in such supply chain risk diversity and insurance cases are studied based on the fishery supply chain insurance contract and the behavior of each participant.
{"title":"Novel Method for Fishery Supply Chain Risk Diversity and Insurance","authors":"Yan-Ling Wang","doi":"10.1109/ICEE.2010.472","DOIUrl":"https://doi.org/10.1109/ICEE.2010.472","url":null,"abstract":"Supply chain management had become part of the senior management agenda in the manufacturing and retailing industries. More recently, interest in supply chain management has also been growing in the fishery industry both in developed and developing countries. Along with the occurrence of several catastrophic events in fishery supply chains, fishery risk diversity and insurance problems become more and more important. For lacking sufficient knowledge about the exact probability of the fishery supply chain contract signatory or insured accidents, in the fishery supply chain risk diversity and insurance process, the fishery supply chain risk insurer usually uses the information supplied by the fishery supply chain contract signatory or fishery supply chain insurants and the behavior performed by the fishery supply chain contract signatory or fishery supply chain insurants to establish the parameters of the fishery supply chain insurance contract. In this paper, the fishery risk diversity and insurance problems in such supply chain risk diversity and insurance cases are studied based on the fishery supply chain insurance contract and the behavior of each participant.","PeriodicalId":420284,"journal":{"name":"2010 International Conference on E-Business and E-Government","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122049684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Motional experience design is an important evolving design trend. In the field of Human-Computer Interaction, experience is a very different term with usability which is easier to define and measure. Therefore knowing the experience and capturing the experience are two key points to experience design. Traditional user research methods might not be applicable enough in terms of studying users’ emotional experiences in complicated HCI processes. This paper discussed about a design research and presented a simple and economical way by using participatory design method to research users’ online shopping experience. The research results indicated that through this research method, designer can effectively collect users’ emotional information and learning their mental models which can be applied in future design practices.
{"title":"Using Participatory Design Methods to Study Users' Emotional Experiences","authors":"Zhibin Chen, Zhaohui Su","doi":"10.1109/ICEE.2010.115","DOIUrl":"https://doi.org/10.1109/ICEE.2010.115","url":null,"abstract":"Motional experience design is an important evolving design trend. In the field of Human-Computer Interaction, experience is a very different term with usability which is easier to define and measure. Therefore knowing the experience and capturing the experience are two key points to experience design. Traditional user research methods might not be applicable enough in terms of studying users’ emotional experiences in complicated HCI processes. This paper discussed about a design research and presented a simple and economical way by using participatory design method to research users’ online shopping experience. The research results indicated that through this research method, designer can effectively collect users’ emotional information and learning their mental models which can be applied in future design practices.","PeriodicalId":420284,"journal":{"name":"2010 International Conference on E-Business and E-Government","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129599817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on analyzing the central dogma of biology, this paper raises hypothesis, using the analogism method to set up the corporate hereditary central dogma. It analyzes the differences between the Corporate hereditary central dogma and the central dogma of biology, which explains the significance of research on Corporate hereditary central dogma; it discusses the meanings of all factors of Corporate hereditary central dogma, and believes that the corporate DNA includes the corporate system, the corporate culture, the adaptive mechanism of the corporation to the environment, and the internalization form of the corporate related theory, rule and legislation. The corporate RNA refers to technology, and the corporate protein refers to product. The way of information transfer among corporate DNA, corporate RNA and product is a process of complete circulation.
{"title":"Study on Corporate Hereditary Central Dogma","authors":"Xianbai Li","doi":"10.1109/ICEE.2010.317","DOIUrl":"https://doi.org/10.1109/ICEE.2010.317","url":null,"abstract":"Based on analyzing the central dogma of biology, this paper raises hypothesis, using the analogism method to set up the corporate hereditary central dogma. It analyzes the differences between the Corporate hereditary central dogma and the central dogma of biology, which explains the significance of research on Corporate hereditary central dogma; it discusses the meanings of all factors of Corporate hereditary central dogma, and believes that the corporate DNA includes the corporate system, the corporate culture, the adaptive mechanism of the corporation to the environment, and the internalization form of the corporate related theory, rule and legislation. The corporate RNA refers to technology, and the corporate protein refers to product. The way of information transfer among corporate DNA, corporate RNA and product is a process of complete circulation.","PeriodicalId":420284,"journal":{"name":"2010 International Conference on E-Business and E-Government","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129602556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In network age, more and more consumers make kinds of e-commerce activities via internet. And marketing ethics of online dealers is one of the important factors that impact the efficiency of the cyber-market. Through a questionnaire survey of 167 online consumers, a structural equation model was implemented to test the relation of perceived marketing ethics, trust of B2C dealers and online consumers’ intention of word-of-mouth. It finds that perceived marketing ethics of online dealers not only has direct positive effect on online consumers’ intention of word-of-mouth, but also has indirect positive effect on it through trust of online dealers.
{"title":"The Effects of Perceived Marketing Ethics and Trust of B2C Dealers on Online Consumers' Intention of Word-of-Mouth: An Exploratory Research","authors":"Z. Sha, Q. Ji, Penghui Wu","doi":"10.1109/ICEE.2010.1209","DOIUrl":"https://doi.org/10.1109/ICEE.2010.1209","url":null,"abstract":"In network age, more and more consumers make kinds of e-commerce activities via internet. And marketing ethics of online dealers is one of the important factors that impact the efficiency of the cyber-market. Through a questionnaire survey of 167 online consumers, a structural equation model was implemented to test the relation of perceived marketing ethics, trust of B2C dealers and online consumers’ intention of word-of-mouth. It finds that perceived marketing ethics of online dealers not only has direct positive effect on online consumers’ intention of word-of-mouth, but also has indirect positive effect on it through trust of online dealers.","PeriodicalId":420284,"journal":{"name":"2010 International Conference on E-Business and E-Government","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129854818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The existing web-based learning evaluation systems more focused on learner’s quantitative assessment, they could not be competent for the performance assessment of learner’s complex, high-level learning behavior, abilities or skills. E-Portfolio gives us a new idea and method to the performance assessment in e-learning. In this article, on the base of studying performance assessment and E-Portfolio, the author discussed the design, implementation and application effect of E-Portfolio based performance assessment system in e-learning.
{"title":"The Design and Implementation of E-Portfolio Based Performance Assessment System in E-learning","authors":"Li Li, Kun Wang","doi":"10.1109/ICEE.2010.1393","DOIUrl":"https://doi.org/10.1109/ICEE.2010.1393","url":null,"abstract":"The existing web-based learning evaluation systems more focused on learner’s quantitative assessment, they could not be competent for the performance assessment of learner’s complex, high-level learning behavior, abilities or skills. E-Portfolio gives us a new idea and method to the performance assessment in e-learning. In this article, on the base of studying performance assessment and E-Portfolio, the author discussed the design, implementation and application effect of E-Portfolio based performance assessment system in e-learning.","PeriodicalId":420284,"journal":{"name":"2010 International Conference on E-Business and E-Government","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128217290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although reputation models are available to encourage good services of sellers as well as punish their bad ones in the C2C ecommerce environment, their anti-fraud ability appears to be weak in general. Based on our TRUST model and the method of combing fraud pattern recognition with Time Window, we propose a Fraud Identification Method which has certain anti-fraud capabilities. Simulation experiments show that the introduction of TRUST model of the method in this paper has more advantages.
{"title":"A Pattern Based Anti-Fraud Method in C2C Ecommerce Environment","authors":"Fusheng Jin, Zhendong Niu, Haiyang Lang","doi":"10.1109/ICEE.2010.68","DOIUrl":"https://doi.org/10.1109/ICEE.2010.68","url":null,"abstract":"Although reputation models are available to encourage good services of sellers as well as punish their bad ones in the C2C ecommerce environment, their anti-fraud ability appears to be weak in general. Based on our TRUST model and the method of combing fraud pattern recognition with Time Window, we propose a Fraud Identification Method which has certain anti-fraud capabilities. Simulation experiments show that the introduction of TRUST model of the method in this paper has more advantages.","PeriodicalId":420284,"journal":{"name":"2010 International Conference on E-Business and E-Government","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128286059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}