Contemporary Research on E-business Technology and Strategy

International Conference, iCETS 2012, Tianjin, China, August 29-31, 2012, Revised Selected Papers

ISBN: 978-3-642-34446-6 (Print) 978-3-642-34447-3 (Online)

Table of contents (65 chapters)

previous Page of 4
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-14

    E-commerce: Consumer Online Shopping in Canada

  3. No Access

    Book Chapter

    Pages 15-24

    Integrating Spatial Decision Support System with Graph Mining Technique

  4. No Access

    Book Chapter

    Pages 25-40

    Engaging Social Customers – Influencing New Marketing Strategies for Social Media Information Sources

  5. No Access

    Book Chapter

    Pages 41-53

    Concept Based Orchestration of Web Services Using XOT

  6. No Access

    Book Chapter

    Pages 54-61

    Intellectual Property Rights in E-business Environment: Paradigm Shifts of Legal and Political Measures

  7. No Access

    Book Chapter

    Pages 62-72

    A Multi-objective Programming for Web Services Composition

  8. No Access

    Book Chapter

    Pages 73-84

    The Application of SOM and K-Means Algorithms in Public Security Performance Analysis and Forecasting

  9. No Access

    Book Chapter

    Pages 85-96

    Semi-automatic Acquisition and Formal Representation of OpenAPI

  10. No Access

    Book Chapter

    Pages 97-108

    A Novel Subspace Classification Method for Large Datasets Based on Kernel-Based Fisher Discriminant Analysis

  11. No Access

    Book Chapter

    Pages 109-121

    Eliciting Security Requirements Method Based on Safety Knowledge Base

  12. No Access

    Book Chapter

    Pages 122-134

    Sale Channel Selection of Information Products in the Presence of Network Externality

  13. No Access

    Book Chapter

    Pages 135-146

    Impact of IT Service Provider’s Expertise and Customer’s Sociability on Continuous Intention to Use

  14. No Access

    Book Chapter

    Pages 147-157

    ASF: Improving Android Security with Layered Structure Instrumentation

  15. No Access

    Book Chapter

    Pages 158-168

    A Threat Model-Driven Security Testing Approach for Web Application

  16. No Access

    Book Chapter

    Pages 169-175

    A Novel Architecture on FPGA for Face Detection Using Jumping Scanning Mechanism

  17. No Access

    Book Chapter

    Pages 176-186

    On the Generalization of PAC-Bayes Bound for SVM Linear Classifier

  18. No Access

    Book Chapter

    Pages 187-198

    Optimality of Versioning for Information Products Using Niching SSGA

  19. No Access

    Book Chapter

    Pages 199-213

    Incorporating Risk Attitude into the Iterated Prisoner’s Dilemma: Application to E-business

  20. No Access

    Book Chapter

    Pages 214-223

    Dynamic Neural Network Ensemble Construction for Classification

  21. No Access

    Book Chapter

    Pages 224-231

    A Secure Data Exchange Protocol for the Internet of Things

previous Page of 4