Skip to main content

Über dieses Buch

th I3E 2010 marked the 10 anniversary of the IFIP Conference on e-Business, e- Services, and e-Society, continuing a tradition that was invented in 1998 during the International Conference on Trends in Electronic Commerce, TrEC 1998, in Hamburg (Germany). Three years later the inaugural I3E 2001 conference was held in Zurich (Switzerland). Since then I3E has made its journey through the world: 2002 Lisbon (Portugal), 2003 Sao Paulo (Brazil), 2004 Toulouse (France), 2005 Poznan (Poland), 2006 Turku (Finland), 2007 Wuhan (China), 2008 Tokyo (Japan), and 2009 Nancy (France). I3E 2010 took place in Buenos Aires (Argentina) November 3–5, 2010. Known as “The Pearl” of South America, Buenos Aires is a cosmopolitan, colorful, and vibrant city, surprising its visitors with a vast variety of cultural and artistic performances, European architecture, and the passion for tango, coffee places, and football disc- sions. A cultural reference in Latin America, the city hosts 140 museums, 300 theaters, and 27 public libraries including the National Library. It is also the main educational center in Argentina and home of renowned universities including the U- versity of Buenos Aires, created in 1821. Besides location, the timing of I3E 2010 is th also significant––it coincided with the 200 anniversary celebration of the first local government in Argentina.



Abstracts of Keynote Speeches

e-Health: Data Integration, Data Mining, and Knowledge Management in Health Informatics

In last few decades, with the advent of database systems and networking technologies, a huge volume of health data and valuable medical knowledge have been electronically available, accessible and processible, especially over the virtual cyberspace – the Web, even from a remote corner in the world. Nowadays the wide deployment of Hospital Information Management Systems (HIMS) and Web based clinical or medical systems, for example, the Medical Director, a generic GP clinical system, have made it possible to record, disseminate and implement the health information and clinical practices easily and globally. And health care and medical service is becoming more data-intensive and evidence-based since electronic health records are used to track individuals’ and communities’ health information (particularly changes). These substantially motivate and advance the emergence and the progress of data-centric health data and knowledge management research and practice, for example,

Health Informatics


In this presentation, we will introduce several case studies and research projects to address the challenges encountered in health service. These include data exchange and health service Integration in health information systems, health information visualisation, data mining and data analyse for patient care management. We will then introduce a framework of data integration, knowledge management and user behaviour modelling for complementing and improving existing health care and service systems.

Yanchun Zhang

The Public Value of Government ICT Investments: Foundations and Applications

This paper discusses the concept of public value in relation to government ICT investment from three perspectives – theory foundations, assessment methods, and an application example. The discussion of theory foundations combines attention to the roots of the concept of public value in political philosophy and public administration. The origins of the concept of public value are discussed in terms of foundational ideas in political and moral philosophy about the nature of the good society: utilitarianism and the social contract. The concern with public value, or utility, in early Western moral and political philosophy is central to the two major schools of thought, utilitarian and social contractarian. The social order that produces the greatest good or utility for the greatest number is preferred in the utilitarian perspective. The contractarian view holds that a good society should be based on shared principles and arrangements that avoid the potential evils of unconstrained greed. Though these two views political and moral philosophy differ, they weave similar connections among the basic concept of value, individual interests, societal interests, and institutional forms. These concepts and connections are basic to the public value framework.

The framework links value to the workings of government in terms of individual and group interests in relation to government policies and programs. this view is reflected in recent thinking in public administration, particularly in the public value program described by Moore (1995). In Moore’s terms, “value is rooted in the desires and perceptions of individuals—not necessarily in physical transformations, and not abstractions called societies.” (p. 52) Moore includes both public sector production, i.e., “things of value to particular clients and beneficiaries,” and “establishing and operating an institution that meets citizens’ (and their representatives’) desires for properly ordered and productive public institutions.” (Moore, 1995:53)

These foundational ideas then form the basis for an assessment method and framework designed to operationalize and provide useful data about the public value outcomes of government investment decisions. The paper presents a description of the assessment framework, followed by an example of how the method applies to a specific ICT investment in a government human service program. A discussion of the implications of the public value framework for investment and performance assessment concludes the paper.

Anthony Cresswell

From IT Governance to Enterprise Governance of IT: A Journey for Creating Business Value Out of IT

IT governance is one of those concepts that suddenly emerged and became an important issue in IT. In academic and professional literature, articles mentioningIT governance in the title began to emerge during the late 1990s. In the context of the leading academic HICSS conference, it was defined as the organizational capacity exercised by the board, executive management and IT management, to control the formulation and implementation of IT strategy and in this way ensure the fusion of business and IT.

After the emergence of the IT governance concepts, the notion received a lot of attention. However, due to the focus on “IT” in the naming, the IT governance discussion mainly remained a discussion within IT. Many IT governance implementations are still mainly an issue “within IT”, while one would expect that the business would and should take a leading role here as well.

It is clear that business value from IT investments cannot only be realized through its use of IT capabilities. For example, there will be no business value created when IT delivers a new customer relationship management (CRM) application on time, on budget, and to specification if the business has not made the necessary changes to the business model, business processes, organizational structures, people competencies, and the reward system required to effectively integrate the new IT system into its business operations. IT-enabled investments should therefore always be treated as business programs, composed of a collection of business and IT projects delivering all the capabilities required to create and sustain business value.

This discussion clarifies the need for the business to take ownership of, and be accountable for, governing the use of IT in creating value from IT-enabled business investments. It also implies a crucial shift in the minds of the business and IT, moving away from managing IT as a "cost" toward managing IT as an "asset" to create business value. Acknowledging the prime accountability of the business in value creation initiated a shift in the definition of IT governance, focusing on the business involvement, toward “enterprise governance of IT” (instead of IT governance).

Wim Van Grembergen

Actual Paradigms of Distributed Software Development: Services and Self Organization

State-of-the-art development of distributed software systems is, among other software development techniques, fundamentally based on the paradigm of distributed “software services”. Such services may already exist or may be newly developed for specific application purposes. They are able to interact – also in open and heterogeneous distributed software environments – based on standardised interfaces and inter-connection protocols as, e.g., provided by related “Web Services” standards.

On the application side, a service-based software development paradigm reflects directly modern (e.g. business) scenarios which are increasingly structured as sets of distributed co-operating entities. Such applications often involve many and heterogeneous services from various sources – both internally as well as from external sources. Based on such elementary services, “business procedures” implement more complex business semantics by composing services – even in dynamically changing environments – according to predefined (functional as well as non-functional) application needs.

If, finally, such service become more “independent” and act “autonomously” in order to achieve given (abstract) goals and characteristics, services as well as business procedures may increasingly become “self-organised” according to another actual distributed software paradigm.

Based on such an approach, the EU Network of Excellence on “Software Services and Systems” (S-Cube) coordinates and conducts European research in the area of service-oriented development of distributed software and applications. It aims at establishing agile and holistic service engineering and adaptation principles, techniques and methods to foster innovation for preparing new service technologies integration by establish a unified and multidisciplinary research community.

Winfried Lamersdorf

Session 1: Web Services and SOA

Middleware for the Autonomous Web Services (AWS)

The purpose of the Autonomous Web Services (AWS) is to enable business transaction exchange in the Internet between systems having different business process models, by dynamically harmonizing them when the systems encounter. Based on the principles and the basic methods proposed in the previous researches such as [3], we succeeded in development of the experimental implementation of the AWS middleware. The AWS middleware consists of three software layers - the dynamic model harmonization layer, the application framework layer, and the messaging layer. This paper mentions the development principles, operation concepts, proposed specifications, detailed algorithms and test results of the AWS middleware that we developed. This success of implementation demonstrates the AWS’s theoretical properness and its availability to real world applications, as well as the applicability of the improved model harmonization algorithm proposed in this paper.

Makoto Oya, Masaki Ito, Taisuke Kimura

Dynamic Resources Allocation for Delivery of Personalized Services

The aim of this paper is to introduce a problem of e-health services quality management. The process of delivering e-health services to users consists of two major tasks: service personalization and resources allocation. In this paper we introduce a use-cases of e-health system and distinguish services that can be offered. In order to satisfy user requirements one have to manage resources properly especially when communication conditions change (e.g. in an ambulance). An exemplary solution has been presented and conclusions for further work have been formulated.

Adam Grzech, Paweł Świątek, Piotr Rygielski

Mobile Interfaces for Building Control Surveyors

The problem of integrating heterogeneous back-end platforms used in public administration has been widely addressed in a number of research and development projects. In such a complex and heterogeneous environment, application of the SOA paradigm can be particularly beneficial. However, in some application domains – such as the Building Control Administration – there is an additional requirement: integration of heterogeneous front-end platforms – including access through mobile devices. In this paper, a new method of creating adaptable mobile user interfaces for applications based on SOA services is described. In the adaptation process the displayed content is adjusted, the best way of presenting content is selected and interaction methods are adapted to the capabilities of the particular mobile device. Therefore, it is possible to easily make any service accessible on any mobile device – which is of great importance to the Building Control Administration surveyors that operate out of office, directly in the construction field.

Jacek Chmielewski, Krzysztof Walczak, Wojciech Wiza

Session 2: e-Transformation and Business Processes

An Agent-Based B2B Collaboration Platform for Executing Collaborative Business Processes

Nowadays, organizations establish Business-to-Business (B2B) collaborations with their business partners. Inter-organizational collaboration is carried out through the execution of collaborative business processes. Organizations are requiring and undergoing the setting up of dynamic B2B collaborations, instead of conducting face-to-face negotiations and agreements for executing collaborative processes. This implies that business partners, maybe without a previous relationship, agree dynamically on the execution of collaborative processes based on predefined models of these processes. In this work, we propose an B2B collaboration platform which provides agent-based systems and interaction mechanisms in order to enable organizations to establish dynamic agreements with their partners and carry out the decentralized execution of collaborative processes. Agents use models of collaborative processes to enact them in a dynamic way. The role an organization performs in a collaborative process is translated into a Petri Net model that a collaboration agent interpret to execute the process.

Edgar Tello-Leal, Omar Chiotti, Pablo D. Villarreal

Compound Web Service for Supply Processes Monitoring to Anticipate Disruptive Event

The execution of supply process orders in a supply chain is conditioned by different types of disruptive events that must be detected and solved in real time. In this work we present a compound web service that performs the monitoring and notification functions of a supply chain event management system. This web service is designed based on a reference model that we have proposed to improve the event management activity through a deeper analysis of the occurrence and causality of events, leading to anticipate an exception during the execution of a supply process order. The web service composition is defined based on business processes. The ability to proactively detect, analyze and notify disruptive events is given through of a Bayesian network with decision nodes.

Erica Fernández, Enrique Salomone, Omar Chiotti

Bridging the Gaps between eTransforming SMEs and SME - ICT Providers

Small to Medium Enterprises (SMEs) are struggling to find ICT Providers who could assist them when identifying and implementing adequate Information and Communication Technologies (ICT). Based on this, we conducted a study with 30 SMEs from various industry sectors within Sydney metropolitan region to identify the type of ICT assistance eTransforming SMEs require. Furthermore, to better understand the struggles SMEs go through, we also studied eight ICT Providers. Our findings indicate that in order for the SMEs to successfully eTransform, select and implement appropriate ICT there is need for the ICT Providers to bridge the gaps and understand needs and requirements of the eTransforming companies taking into consideration a holistic view of what eTransforming SMEs need based on their current technology and future business requirements.

Ana Hol, Athula Ginige

Session 3: Measuring and Assessment

Measuring Accumulated Revelations of Private Information by Multiple Media

A metric has been developed for measuring privacy degradation when various types of media reveal private information about a person. The metric, which is based on joint entropy, quantifies accumulated revelations of information about various personal attributes. Application of this metric to entries posted on a social networking service and to leaks from a company database containing personal information showed that it is effective; that is, it can quantify accumulated revelations of information about multiple attributes and can cope with cases in which the attributes affect each other.

Komei Kamiyama, Tran Hong Ngoc, Isao Echizen, Hiroshi Yoshiura

A Methodology to Assess the Benefits of Smart Order Routing

Smart Order Routing technology promises to improve the efficiency of the securities trading value chain by selecting most favourable execution prices among fragmented markets. To measure the extent of sub-optimal order executions in Europe we develop a simulation framework which includes explicit costs associated with switching to a different market. By analysing historical order book data for EURO STOXX 50 securities across ten European lectronic markets we highlight an economically relevant potential of Smart Order Routing to improve the trading process on a gross basis. After the inclusion of switching costs (net basis), the realisability of this value potential depends on whether the user can directly access post-trading infrastructure of foreign markets or has to make use of intermediaries’ services.

Bartholomäus Ende, Peter Gomber, Marco Lutat, Moritz C. Weber

Ontology-Based Evaluation of ISO 27001

Information security risks threaten the ability of organizations of reaching their operational and strategic goals. Increasing diversification of the information security landscapes makes addressing all risks a challenging task. Information security standards have positioned themselves as generic solutions to tackle a broad range of risks and try to guide security managers in their endeav ors. However, it is not evident if such standards have the required holis tic approach to be a solid foundation. In this paper a metamodel of the ISO 27001 security standard explicating its core concepts is presented. We then compare the constructed metamodel with various information security ontolo gies and analyze for comprehensiveness. We conclude with a discussion of core concepts in the information security domain.

Danijel Milicevic, Matthias Goeken

Session 4: e-Services for Society

The Importance of Confirming Citizens’ Expectations in e-Government

Satisfying consumer needs is a core principle of marketing. However, in the context of e-government, most studies up to now have focused on adoption models such as Technology Acceptance Model or Theory of Planned Behavior, forgetting citizens’ needs, demands or expectations. To overcome this, in this work we analyze how confirmation of citizens’ expectations may influence citizens’ perceptions and behavioral intentions in the e-government context. As well, due to its great influence on consumer behavior, we investigate some factors that may enhance citizens’ intention to recommend online public services. Data from 232 citizens reveal that confirmation of expectations and perceived usefulness effectively predicts citizen intention to use online public services. As well, positive word of mouth among citizens is positively affected by confirmation of expectations and intention to use these services. Finally, confirmation of expectations confirms its importance by influencing perceived usefulness too.

Daniel Belanche, Luis V. Casaló, Carlos Flavián

E-Democracy and Network Externalities – The Case of Websites of Finnish Members of Parliament

Effective communication between voters and members of parliament is a key success factor democracy. Fortunately, modern information technology is giving a lot of new channels to take care of this communication. Traditionally, Members of Parliament have maintained static www-sites, but nowadays more dynamic and interactive forms of communication, such as blogs, Facebook and Twitter are almost a must for the Members of Parliament, especially in the case of less popular politicians. As in any technology application, even in www-presence of Members of Parliament network externalities occur: unexpected consequences of web-presence. This article sets out some preliminary concepts and ideas on what these network externalities might be.

Reima Suomi

Educateca: A Web 2.0 Approach to e-Learning with SCORM

This paper introduces the


project, a Web 2.0 approach to e-learning. The project refactors SCORM, the

de facto

e-learning standard, to embrace the two main shifts in Web 2.0: the WOA (Web Oriented Architecture) and the social trends in user involvement. In this new context of the Internet, flexibility is a must and so big and static e-learning content are no longer effective enough. Thus, we propose a more dynamic approach where small pedagogical units are offered as services to be combine on-the-fly, whenever needed. Social aspects are currently another key and so we propose to adapt the e-learning ecosystem to allow students to innovate and create new content and/or assess the existent one. Clearly, in this new philosophy, recommendation is essential to avoid overwhelming users with too much educative content that are not able to filter, asses and/or consume.

Rebeca P. Díaz Redondo, Ana Fernández Vilas, Jose J. Pazos Arias

Session 5: Specifications and Semantics

Achieving Meaning Understanding in E-Marketplace through Document Sense Disambiguation

E-marketplace has a very important requirement of achieving mutual meaning understanding between sellers and buyers. To meet this requirement, this paper has proposed a novel SD-DSD approach, which enables to disambiguate senses between a sender and a receiver for their sent and received documents. This approach has developed five novel strategies for sense disambiguation. Based on them, new document representation models for message exchange are devised, together with their sense consistency control procedures and sense interpretation evaluation method.

Jingzhi Guo, Guangyi Xiao

Automatically Detecting Opportunities for Web Service Descriptions Improvement



-business and


-applications rely on the Service Oriented Computing paradigm and its most popular implementation, namely Web Services. When properly implemented and described, Web Services can be dynamically discovered and reused using Internet technologies, pushing interoperability to unprecedented levels. However, poorly described Web Services are rather difficult to be discovered, understood, and reused. This paper presents heuristics for automatically detecting common pitfalls that should be avoided when creating Web Service descriptions. Experimental results with ca. 400 real-world Web Services, empirically show the feasibility of the proposed heuristics.

Juan Manuel Rodriguez, Marco Crasso, Alejandro Zunino, Marcelo Campo

Exploiting the Social Capital of Folksonomies for Web Page Classification

Collaborative tagging systems (CTSs), also known as folksonomies, have grown in popularity on the Web and social tagging has become an important feature of many Web 2.0 services. It has been argued that the power of tagging lies in the ability for people to freely determine the appropriate tags for resources without having to rely on a predefined lexicon or hierarchy. The free-form nature of tagging causes a number of problems in this social classification scheme, such as synonymy and morphological variety. However, social tagging can be a valuable source of information to help in the organization of Web resources. In this paper we present an empirical analysis carried out to determine the importance of social tagging in Web page classification. Experimental results showed that tag-based classification outperformed classifiers based on full-text of documents.

Daniela Godoy, Analía Amandi

Session 6: Social Networks and Virtual Organizations

Guidelines to Transform Industry Clusters in Virtual Organization Breeding Environments – A Case Study

This paper encompasses the specific problem of how transforming industry clusters in environments prepared to create Virtual Organizations. This kind of coalitions is known as Virtual Organization Breeding Environments (VBEs). In order to reach the envisaged objective a set of guidelines for implementing VBEs has been proposed and its current results have been presented here. These guidelines are strongly based on modeling frameworks. This approach is being tested in a cluster of moulds and dies producers from Brazil. In the future, it is intended to use these guidelines as a structured approach to systematize the implementation of any type of VBE.

Fabiano Baldo, Ricardo J. Rabelo

A Research Framework on Social Networking Sites Usage: Critical Review and Theoretical Extension

Despite the worldwide popularity and rapid proliferation of social networking sites (SNS), e.g., Facebook, our understanding about what drive people to SNS and how they use them remains limited. This study aims at establishing a theoretical framework guiding the research on SNS usage. Built upon the Theory of Acceptance and Use of Technology (UTAUT), the framework makes following major extensions: 1) taking a feature-centric perspective in conceptualizing SNS usage; 2) adopting uses and gratifications paradigm to specify the performance expectancies; 3) accounting for the other important social influences (identification and group norms); 4) accounting for the role of anticipated emotions; and 5) accounting for habituation by including prior usage.

Kathy Ning Shen, Mohamed Khalifa

A Digital Platform for Marketing Communications in the Mobile and Social Media Space

This paper presents a digital platform for marketing communications developed during the last years. Functionalities of the platform are described according to different categories and by means of case studies together with related results. Also further development strategies are discussed, e.g. the planned enlargement of the platform in the field of social media will include three new modules. A browsing module will enable multidimensional browsing in selected social media. The measurement module will facilitate creation of individual social media portfolios. Finally, the engagement module realizes a uniform user interface between the platform and social media.

Otto Petrovic

Session 7: e-Services

Reusing Geographic E-Services: A Case Study in the Marine Ecological Domain

Software product line engineering aims to reduce development time, effort, cost, and complexity by taking advantage of the commonality within a portfolio of similar products. This may benefit the development of applications in several domains, and particularly in geographic information systems (GIS). Reusing services for GIS challenges developers to produce assets highly adaptable to various service clients and contexts. For that, service variability must carefully be modeled by considering different recommendations such as well-established standards. This paper presents an approach that facilitates variability implementation, management and tracing by integrating product-line and GIS development. Features are separated following standard recommendations and composed on a platform-oriented framework. The presented concepts are illustrated with a case study of a marine ecological system.

Patricia Pernich, Agustina Buccella, Alejandra Cechich, Maria del Socorro Doldan, Enrique Morsan

Ontology-Based Process for Recommending Health WebSites

Website content quality is particularly relevant in the health domain. A common user needs to retrieve health information that is precise, reliable and relevant to his/her profile. Website recommendation systems are an aid to get high quality health-related web sites according to the user’s needs. However, in practice, it is not always evident how to describe recommendation criteria for health website. The goal of this paper is to describe, by an ontology network, the criteria used by a health website recommendation process. This ontology network conceptualizes the different domains that are involved in the


Recommendation Project as a set of interrelated ontologies.

Edelweis Rohrer, Regina Motz, Alicia Díaz

A Morphological Box for Handling Temporal Data in B2C Systems

User interfaces are key properties of Business-to-Consumer (B2C) systems, and Web-based reservation systems are an important class of B2C systems. In this paper we show that these systems use a surprisingly broad spectrum of different approaches to handling temporal data in their Web inter faces. Based on these observations and on a literature analysis we develop a Morphological Box to present the main options for handling temporal data and give examples. The results indicate that the present state of developing and maintaining B2C systems has not been much influenced by modern Web Engi neering concepts and that there is considerable potential for improvement.

Gerhard F. Knolmayer, Alessandro Borean

Session 8: Trust and Security

Trust and Privacy Enabled Service Composition Using Social Experience

In this paper, we present a framework for automatic selection and composition of services which exploits trustworthiness of services as a metric for measuring the quality of service composition. Trustworthiness is defined in terms of service reputation extracted from user profiles. The profiles are, in particular, extracted and inferred from a social network which accumulates users past experience with corresponding services. Using our privacy inference model we, first, prune social network to hide privacy sensitive contents and, then, utilize a trust inference based algorithm to measure reputation score of each individual service, and subsequently trustworthiness of their composition.

Shahab Mokarizadeh, Nima Dokoohaki, Mihhail Matskin, Peep Küngas

Trust and Compliance Management Models in Emerging Outsourcing Environments

Businesses today have more than ever a sharp focus on reducing capital and operational expenses. Business Process Outsourcing (BPO), Knowledge Process Outsourcing (KPO) and adoption of shared service models have all increased on a global scale. This results in an emerging complexity and volatility of business relationships. As the future internet of services evolves towards dynamic “service marketplaces”, where shared services are discovered, negotiated and choreographed at run-time, the new approaches to the compliance management in complex environments are needed. We argue that one of the key issues to address is trust. This paper describes the compliance management models in emerging outsourcing environments that include use of shared services such as cloud computing services. In this context, we briefly present MASTER project that, among other things, integrates several mechanisms to increase the trust levels among stakeholders. Finally, we present a solution for the automated evidence collection at the service provider site and discuss related trust issues.

Aljosa Pasic, Juan Bareño, Beatriz Gallego-Nicasio, Rubén Torres, Daniel Fernandez

Security Architecture of Smart Metering Systems

The main goals of smart metering are the reduction of costs, energy and CO


by the provision of actual metering information to the providers and the customer. They allow for flexible possibilities to influence the customers’ energy consumption behavior and to adapt dynamically the power generation and distribution to the requested energy by smart grids. Metering devices are under control of governmental organizations, which are responsible for the permanent correct delivery of metering data. The governmental organizations accept online metering, administration and even software download of regulated software only, if strong, lawful security requirements are fulfilled. This paper describes such a security system. It considers not only the security mechanisms of the metering devices, but also of the complete system hierarchy, which is planned for the communication system of smart metering. It supports also new use cases, which are caused by the liberalization of the energy and metering services markets.

Natasa Zivic, Christoph Ruland

Session 9: ICT Utilization

IT Alignment in the 3PL Industry: A Comparative Study

This research article reports the findings of a survey-based comparative study on current IT utilization by 3PL firms in the United States (US) and the People’s Republic of China (PRC). The findings reveal that in general the level of IT utilization and IT focus of 3PL firms in the PRC are lower than that of their counterparts in the US. This may result in a bigger gap between customer expectations and experiences relating to IT capabilities of 3PL firms as observed in the Annual 3PL Studies. The gap may due to a misalignment in IT strategy and infrastructure between the 3PL firms and their customers. The contribution of this study is that, through the comparative analysis, it reveals the possible causes of the continuing IT capability expectation/performance gap as disclosed by the annual global 3PL studies and points to a potential solution to narrow the gap.

Kwok Hung Lau

Against All Odds - A Story of a Successful Mobile System Acceptance among a Tough Crowd

Two public organizations in early childhood education adopted a simple mobile system with female employees in their 50’s to replace an internal paper based data collection system in order to improve information quality and accelerate the billing and payroll process. The workers of this sector emphasize the human-to-human interaction with children and parents, and perceive ICT as time consuming nuisance leaving less time for actual child caring. The objective of this paper is to explore why the mobile system was accepted, although the odds were against it. The system acceptance and incentives seem to have a connection to information timeliness and quality in this context.

Jonna Järveläinen, Annukka Vahtera

Critical Success Factors of Open Markets on the Internet in Terms of Buyers

Online shopping in open markets becomes increasingly popular with the development of the Internet. The purpose of this study is to formulate and evaluate critical success factors in the open market from the perspective of buyers. Based on an extended technology acceptance model, this study assumes that the success of open markets are influenced by several factors, including perceived website quality, perceived usefulness, third party recognition, satisfaction, and trust. An empirical survey is conducted and questionnaires are collected from the respondents who had experience in using the open markets. The hypotheses are verified by using the structural equation modeling. Testing results are summarized and managerial implications are discussed.

Sung Ho Ha, Luo Tao Liu

Service Oriented Approach for Autonomous Exception Management in Supply Chains

Risk and uncertainty are inherent to Supply Chains; at the execution level unexpected events can disrupt the normal flow of supply processes creating a gap between planned operations and what is actually executed. These disruptions increment rescheduling frequency, generating reconfiguration costs and system’s nervousness. This work proposes a web service based Business Process to support Autonomous Exception Management in Supply chains.

Armando Guarnaschelli, Omar Chiotti, Enrique Salomone


Weitere Informationen

Premium Partner