44 research outputs found

    Building a Mobile Advertising System for Target Marketing

    Get PDF
    Mobile advertising has become one of the most exciting new technological frontiers in advertising area in recent years. The ubiquitous nature of mobile phones makes it possible for advertisers to target users effectively. This paper proposes a targeted mobile advertising system (TMAS) that works as a platform to provide consumers personalized ads based on the consumers’ contextual and preference. The platform allows shops to provide contextual and time-sensitive ads and consumers to locate ads and promotion information using their smart phone. A demonstration is conducted to show the validity of the key process in the TMAS

    Building a Semantic Tendering System

    Get PDF
    In the new B2B e-commerce arena, applications such as auctions and data exchange are growing rapidly. However, Web content is currently designed for human consumption rather than computer manipulation. This limits the possibility of Web automation. Fortunately, the new development of the Semantic Web that allows Web pages to provide information not only in terms of their content, but also in terms of the properties of that content, can be used for automation. Electronic tendering systems are among the successfully commercial systems that can tremendously benefit from the availability of Semantic Web. This study proposes an e-tendering system that uses the Semantic Web to investigate the automatic negotiation process. The system is built in a P2P environment to simulate a two-player negotiation. It is found that the ontology of semantic information can be used to locate qualified suppliers and precede negotiation. The bargaining power of each party is then determined by the relative magnitude of the negotiators’ respective costs of haggling and the utility that varies with the degree of risk preference. Our experiments showed that applying automatic negotiation strategies to e-tendering system in semantic web can reflect the risk preference of the participants

    Preface

    Get PDF

    Why People Are Willing to Share More Knowledge than Required

    Get PDF
    Knowledge sharing is critical for modern organizations. Besides in-role knowledge sharing, there exists knowledge sharing beyond one’s role, which is called extra-role knowledge sharing. This study investigates the antecedents of the extra-role knowledge sharing from the perspective of organizational citizenship behavior (OCB). Previous studies on OCB and works on knowledge sharing were reviewed to develop a model explaining the factors behind extra- role knowledge sharing. Willingness to help that is hypothesized to be influenced by procedural justice, job satisfaction, and employee personality (extraversion and agreeableness) is believed to influence extra- role knowledge sharing. Empirical data confirmed most of the hypotheses of this study

    A Socio-Technical System Perspective Of Psychological Ownership Toward Sharing IoT Data In Supply Chains

    Get PDF
    Internet of Things can expedite information-sharing between supply chain partners. However, efficient operations within the supply chain may undermine partners’ psychological ownership of shared data. The behavior driven by the feel of ownership may be constrained by social, technical, and environmental factors. This study investigates whether ownership of data may affect willingness to share from the perspective of a socio-technical system. We look into (1) whether the efficiency and adaptability of a supply chain is affected by the possession of data when organizations share IoT data, and (2) whether social and technical systems impact psychological ownership. 302 questionnaires from senior managers of manufactures were collected for analysis. The results show that psychological ownership is positively associated with the efficiency and adaptability of a supply chain and that both social and technical factors enforce it. We also find that social preference can improve the association between a social system and psychological ownership but that technical preference decreases the association between technical system and psychological ownership

    Why do Bloggers Share with Strangers

    Get PDF

    Collaborative Commerce

    Get PDF
    Following the evolution of electronic business, collaborative commerce uses information technology to achieve a closer integration and a better management of business relationships among parties including internal personnel, business partners and customers. Recently, market and globalisation competition, customer oriented service strategy and product complexity have pushed enterprises a step further on in collaborative commerce. In brief, collaborative commerce is (1) a collaborative technology – similar to workflow collaboration, (2) a customer-driven technology – similar to a pull-type supply chain, (3) a functionally-integrated technology – similar to concurrent engineering and (4) a businessdriven technology – similar to enterprise resource planning, for cross-organisational integration. The paper will illustrate the technologies and the critical success factors of collaborative commerce adoption

    Using Association Rule Techniques to Improve Document Retrieval

    Get PDF
    Document management is one of the fastest growing areas of information management. Most conventional approaches assign keywords to documents so that documents can also be retrieved through keywords. The management of data and documents are different. For example, documents have to be appeared in the full contents unlike the selected attributes are retrieved in the data queries. Also, the documents may not relevant even the values of specified attributes are identical. Moreover, documents may be related even they do not have the same keyword value. This study uses an associated knowledge rule algorithm, revised from Apriori algorithm, and classification scheme to discover the relationship between keywords of documents. The proposed algorithm can retrieve related documents without matching specified keywords in users\u27 queries

    Continuous Audit Agent System

    Get PDF
    Recently, the provision of the real-time accounting reports over the Internet for the public corporation became popular. In response to this change on the service requirement, audit professionals considered to provide “continuous auditing” to diminish or minimize the lag time of the provision of an audit opinion behind the occurrence of business events. Though has been proposed the concept at 80’s, the provided implementation models of continuous auditing are still far beyond feasible. Major obstacles to hinder wide adoption in industry lie on two issues. (1) The development of continuous auditing system should be independent to the development of client’s information system. (2) The audit procedures that could be implemented by agent base automatic audit system should not be limited to the analysis on corporation internal data. In this paper, an agent base continuous auditing model and system is proposed to tackle these two major concerns. Several kinds of mobile agents are initiated by an audit agency system to simulate the behaviors of a human auditor on the audit procedures to collect various audit evidences. Each kind of mobile agent simulates a specific kind of audit procedure and acts on behalf of a human auditor to access and to inspect audit-related information hosted in the distributed information source

    A Relationship-Based Acess Control Model for On-demand Privacy and Security Entitlement in RFID-enable Supply Chains

    Get PDF
    RFID adoption in supply chains is both viable in gaining on-target end-to-end visibility and crucial to sustain competitiveness. RFID-based information flow will cut across partners in business chains that extended beyond borders. Privacy and security preferences (PSP) are manifested when supply chain parties are sharing (EPC-RFID-based) data to gain visibility. The role of each party cannot be singly used to determine the preference of either party to derive the necessary entitlement for the requesting party. The preference-based entitlement must ensure data sharing is privacy-protected and security-enforced. In this research, a Relationship-Based Access Control (ReBAC) model is proposed for on-demand privacy and security entitlement in RFID-enabled supply chains. The model includes two key concepts: on-demand preference and privacy and security scheme. Preference is governed by the two parties’ relationship, and the scheme is driven by the data dimensions (i.e., data sensitivity, data location and data ownership). RBAC is capable of addressing one party’s need to gain pre-determined permissions according to role assignment or activation. The relationship-based approach is on-demand, two-party, relationship-based preference to gain entitlement (for visibility services) with scheme-enabled privacy and security activation
    corecore