The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to examine whether DeLone and McLean information system (IS) model can be used in explaining online consumer behavior in China, a model is developed based on it from consumerpsilas perception perspective. Considering Chinese consumerpsilas risk-averse character, a risk factor is added. In empirical analysis, the university students are used as samples and structure equation modeling (SEM)...
J2EE model and technology, and the concept and structure of MVC pattern, are introduced in this paper. Based on the four-tier J2EE architecture and the MVC pattern, a technology roadmap of the e-commerce system architecture is planned out: JSP plus Servlet plus Session Bean plus CMP plus database, which makes up the shortcomings of unclear business logic among tiers in J2EE, simplifies the development...
Considering on judicial forensic requirements and the character of network crime diversity, a architecture based on XML and plug-in techniques is proposed in this paper. The framework adopts encrypt and authentication technology which ensures collected evidence can be accepted by court, so the original evidence in framework is stability. Because of the network applicationpsilas diversity, the judgment...
With the managing transitions and social transformation, enterprises concern about the nonmarket environment and take active steps to adapt to external political and social environment. As a nonmarket act, corporate citizenship behavior refers to the empirical analysis in this paper. On the other hand, based on to explain "corporate citizenship behavior - strategic adaptation - competitive advantage",...
In recent years, technology acceptance model (TAM) has received considerable attentions in the researches of the e-commerce consumer acceptance and behavior intention. The origin and development of TAM in the e-commerce are reviewed, summarized and contrasted respectively. The models are classified into the following three categories: simple modified TAM, models combining TAM with related theories...
E-Commerce systems are suffering more and more security issues. Vulnerabilities of authentication systems are revealed when various attacks and malicious abuses are developed and deployed to violate security of system and information. To improve the ability to defend authentication system against invasion and abuse, a novel penetration testing method for E-Commerce authentication system is proposed...
The fingerprint quality is considered as a good predictor for fingerprint recognition performance and knowing the fingerprint quality in advance is useful to improve the fingerprint recognition performance. The existing fingerprint quality estimation systems are all designed for minutiae-based fingerprint recognition system. But with the obvious advantage and widespread of ROI-based fingerprint recognition...
Authenticated key agreement protocol is the fundamental building block for secure communication in the open network to ensure authentication and confidentiality of e-commerce and e-government applications. Certificateless public key cryptography combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In this paper, we present a secure and efficient two-party...
Recently, Das et al. and Tseng et al. proposed a remote user authentication scheme using bilinear pairings, respectively. They can provide a flexible password change option to the users without any help from the remote server. However, some weaknesses of the two bilinear pairing based remote password authentication schemes are found in the paper. The schemes suffer from offline password guessing attack...
Many e-commerce firms have adopted the portal as the vehicle for their electronic commerce/business transactions. This is an integrative, user-centric and user-intensive approach, which offers various advantages and benefits to all stakeholders involved. This paper argues for the shopping portal based recommendation for personalized service. The paper firstly describes the background and motivation...
This paper investigates the cluster problems of which both the characteristic values and weights of indices are triangular fuzzy numbers. A new maximal tree clustering analysis method is proposed. First, several operational laws of two triangular fuzzy numbers are given. Next, the similarity coefficient is generalized to the triangular fuzzy numbers. Then an clustering algorithm for multiple attribute...
In order to comparatively fully elaborate the application framework of enterprise business intelligence (BI), build a reference system of business intelligence application for enterprises. By analyzing technology implementation and data logic of a real enterprise IT planning scheme model, Hubei provincial branch of China National Tobacco Corporation (CNTC) BI planning, a feasible enterprise business...
According to rough set theory, there are two approaches used to handle incomplete information systems. One is to transfer the incomplete information systems into complete information systems that can be tackled by the classical rough set theory. The other is to deal directly with the incomplete information systems through improving the classical rough set theory. But basically the first approach will...
With the rapid development of e-commerce, there is increasingly tremendous amount of information available on the Web, which is always distributed across different platforms. Thus, how to integrate the information to meet the end-users' need becomes a challenge. The rise of mashup provides a promising solution for this problem. Generally, there are mainly two mashup models, which are client-side based...
The loosely coupled communication is often needed to exchange commerce data asynchronously between different e-commerce applications. This paper proposed an embedded XML data exchange framework for asynchronous communication between different e-commerce systems. The XML data is used to exchange the e-commerce data between the customers and the special e-commerce system. The XML data is embedded into...
ldquoSuper ministry reformrdquo of China provides not only a good environment but also an opportunity for the joint development of e-government. In this paper, some concepts and their relationships are presented from the perspective of economic management, including relationship between collaboration and government affairs collaboration, relationship between collaborative government affairs and e-government...
The global value chain dominated by multinational corporations has become an important form of economic globalization. In global value chain, the relation between upstream enterprises and downstream enterprises is a key for us to understand economic globalization. In this paper a game model analyzing the relation of upstream and downstream enterprises is constructed. From the proportions accounted...
With the rapid development of e-commerce, the problem of information asymmetry has been haunting stock holders in virtual market. It is urgent to strengthen the credit management of the online transaction to enhance the trust between sellers and buyers, decrease the Internet fraud, and reduce the trust risk. This paper makes integrative use of marketing theories, game theory and experimental economics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.