15 research outputs found

    An Agent Based Market Design Methodology for Combinatorial Auctions

    Get PDF
    Auction mechanisms have attracted a great deal of interest and have been used in diverse e-marketplaces. In particular, combinatorial auctions have the potential to play an important role in electronic transactions. Therefore, diverse combinatorial auction market types have been proposed to satisfy market needs. These combinatorial auction types have diverse market characteristics, which require an effective market design approach. This study proposes a comprehensive and systematic market design methodology for combinatorial auctions based on three phases: market architecture design, auction rule design, and winner determination design. A market architecture design is for designing market architecture types by Backward Chain Reasoning. Auction rules design is to design transaction rules for auctions. The specific auction process type is identified by the Backward Chain Reasoning process. Winner determination design is about determining the decision model for selecting optimal bids and auctioneers. Optimization models are identified by Forward Chain Reasoning. Also, we propose an agent based combinatorial auction market design system using Backward and Forward Chain Reasoning. Then we illustrate a design process for the general n-bilateral combinatorial auction market. This study serves as a guideline for practical implementation of combinatorial auction markets design.Combinatorial Auction, Market Design Methodology, Market Architecture Design, Auction Rule Design, Winner Determination Design, Agent-Based System

    Design and Validation of the Bright Internet

    Get PDF
    Bright Internet research was launched as a core project of the AIS Bright ICT Initiative, which aims to build an ICT-enabled Bright Society. To facilitate research on the Bright Internet, we explicitly define the goals and principles of the Bright Internet, and review the evolution of its principles. The three goals of the Bright Internet are: the realization of preventive security, the provision of the freedom of anonymous expression for innocent netizens, and protection from the risk of privacy infringement that may be caused by preventive security schemes. We respecify design principles to fulfill these seemingly conflicting goals: origin responsibility, deliverer responsibility, identifiable anonymity, global collaboration, and privacy protection. Research for the Bright Internet is characterized by two perspectives: first, the Bright Internet adopts a preventive security paradigm in contrast to the current self-centric defensive protective security paradigm. Second, the target of research is the development and deployment of the Bright Internet on a global scale, which requires the design of technologies and protocols, policies and legislation, and international collaboration and global governance. This research contrasts with behavioral research on individuals and organizations in terms of the protective security paradigm. This paper proposes validation research concerning the principles of the Bright Internet using prevention motivation theory and analogical social norm theory, and demonstrates the need for a holistic and prescriptive design for a global scale information infrastructure, encompassing the constructs of technologies, policies and global collaborations. An important design issue concerns the business model design, which is capable of promoting the propagation of the Bright Internet platform through applications such as Bright Cloud Extended Networks and Bright E-mail platforms. Our research creates opportunities for prescriptive experimental research, and the various design and behavioral studies of the Bright Internet open new horizons toward our common goal of a bright future

    Public e-procurement

    Get PDF
    노트 : 3rd International Public Procurement Conference Proceeding

    EXPLORATIVE STUDY ON THE CYBER-ATTACK SOURCE TRACEBACK TECHNOLOGIES FOR BRIGHT INTERNET

    Get PDF
    In order to cope with the various types of cyber-attacks in the Internet, several methods of tracking the source of attack have been developed. However, until recently, most of them are defensive security methods rather than preventive one. In order to settle the Bright Internet, which is still in its early stage, it is necessary to establish a technical source tracking method. For this, a standard and evaluation criteria are needed to determine which technology would be appropriate for the Bright Internet requirements. In this paper, we classify cyber-attack source traceback technologies and derive some criteria for the evaluation of the technologies for the Bright Internet. Using the criteria, we can evaluate existing traceback technologies from the perspective of the Bright Internet. In this article, we try to evaluate SAVA, PPM, iTrace, Controlled flooding, Input Debugging, Central Track, IPSec, SPIE(Hash-based), and Marking+Logging methods. Based on this research, future research will require in-depth verification of traceback technologies that reflects all the principles of the Bright Internet in practice

    B-Cart based Agent System for B2B EC

    No full text
    To realize the implementation of agent based B2B e-Commerce, we design the b-Cart based B2B agent framework. B-Cart implies a buyer's shopping cart which a buyer carries to the seller's sites. The prototype agent, named AgentB, is designed to provide an effective architecture for employee's direct desktop purchasing from multiple external seller's e-marketplaces. In this paper, we propose the thirteen features of b-cart based agent system in B2B EC; Identification, User Dialog, Collection, Trashing, Individual Purchase Decision Support, Organizational Purchase Decision Support, Negotiation, Ordering, Payment, Tracking, Recording, Record Transmission, Knowledge Maintenance. Based on these features, we design the buying process, message interfaces, and analyze the pros and cons of AgentB. Even though AgentB has some overheads such as in development, operation, and deployment, the buyer using a b-cart can collect items from different e-marketplaces, and can order purchases simultaneously over the collected items. It also supports integrated services in personalized comparison on purchasing items, order tracking, financial/payment management, user's account management, negotiation management, and personal decision support along the organizational decision making process. AgentB architecture allows a tight integration of the b-cart with e-procurement systems

    A STUDY ON THE ANONYMITY PERCEPTIONS IMPACTING ON POSTING MALICIOUS MESSAGES IN ONLINE COMMUNITIE

    No full text
    The development ICT provides many benefits in business, shopping, leisure, finance, information exchange, and community life with a variety of people. However, due to anonymity, a characteristic of cyber space which one can hide him yourself, there are many negative effects such as cyber crimes, use of illegal contents, malicious messages, game addiction, etc. In order to resolve such problems, causes behind cyber crimes need to be determined according to users\u27 personal and psychological attributes. This study dealt with the causal relationship between online community users\u27 degree of anonymity perception and posting malicious messages. Especially, the study was focused on reviewing existing studies regarding anonymity and looking into the effect of anonymity which has been divided into the types of social, visual, definitive, and location anonymity on posting malicious messages. Based on the study results, this study make a contribution in establishing a standard for controlling the degree of anonymity in laying out online community service designs that could reduce the amount of malicious messages in online communities and the phenomenon of cyber verbal violence. Keywords: Anonymity perception, malicious message, online community, bright internet

    Buyer-Carts for B2B EC: The b-Cart Approach

    Get PDF
    Internet technology has been increasingly used to enhance the global competitiveness of various business applications through the widespread electronic commerce (EC) functions. Many Internet-based systems have been designed and developed for supply chain management (SCM) in various areas such as computer, garment, and publishing industries, which mainly center on communication infrastructure, coordination between production and distribution, and procurement functions with security mechanisms. However, EC is not a panacea. On many occasions, participants (including buyers, sellers, and enablers) face various risks and overhead during the deployment of a new technology. In this article, we present the impact of EC on procurement processes in supply chains, highlighting the issues of buyers, sellers, and the transaction processes involved. The procurement processes are classified into preprocurement (sourcing), procurement (quotation, negotiation, order placement, and transaction), and postprocurement (delivery). Moreover, a four-phase migration model of procurement onto the Internet is introduced to illustrate the technical, security, and financial requirements in the deployment process of EC. The migration model not only gives a development guideline of procurement functions, but also provides an evaluation framework of e-procurement. An industrial example is used to illustrate the corresponding evolution as a result of EC deployment. The paper concludes with a summary of EC impact and future research directions.published_or_final_versio

    A Development of a Framework for the Measuring National Information Security Level

    No full text
    corecore