• Title/Summary/Keyword: Electronic Commerce Systems

Search Result 502, Processing Time 0.027 seconds

An Automated Negotiation System Using Intelligent Agents (지능형 에이전트를 이용한 자동협상전략 수립 시스템)

  • Park, Se-Jin;Kwon, Ick-Hyun;Shin, Hyun-Joon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.29 no.2
    • /
    • pp.20-30
    • /
    • 2006
  • Due to recent growing interest in autonomous software agents and their potential application in areas such as electronic commerce, the autonomous negotiation become more important. Evidence from both theoretical analysis and observations of human interactions suggests that if decision makers have prior information on opponents and furthermore learn the behaviors of other agents from interaction, the overall payoff would increase. We propose a new methodology for a strategy finding process using data mining in autonomous negotiation system; ANSIA(Autonomous Negotiation System using Intelligent Agent). ANSIA is a strategy based negotiation system. The framework of ANSIA consists of three component layers; 1) search agent layer, 2) data mining agent layer and 3) negotiation agent layer. ANSIA is motivated by providing a computational framework for negotiation and by defining a strategy finding model with an autonomous negotiation process.

A Comparative Study of Medical Data Classification Methods Based on Decision Tree and System Reconstruction Analysis

  • Tang, Tzung-I;Zheng, Gang;Huang, Yalou;Shu, Guangfu;Wang, Pengtao
    • Industrial Engineering and Management Systems
    • /
    • v.4 no.1
    • /
    • pp.102-108
    • /
    • 2005
  • This paper studies medical data classification methods, comparing decision tree and system reconstruction analysis as applied to heart disease medical data mining. The data we study is collected from patients with coronary heart disease. It has 1,723 records of 71 attributes each. We use the system-reconstruction method to weight it. We use decision tree algorithms, such as induction of decision trees (ID3), classification and regression tree (C4.5), classification and regression tree (CART), Chi-square automatic interaction detector (CHAID), and exhausted CHAID. We use the results to compare the correction rate, leaf number, and tree depth of different decision-tree algorithms. According to the experiments, we know that weighted data can improve the correction rate of coronary heart disease data but has little effect on the tree depth and leaf number.

Optimal Allocation of Purchase Orders in Dynamic Bidding (동적 전자경매 환경에서의 최적 구매주문 할당)

  • Rim, Suk-Chul;Lee, Sang-Won;Kim, Hyun-Soo
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.33 no.3
    • /
    • pp.322-328
    • /
    • 2007
  • Highly standardized products are suitable for automated purchasing using electronic commerce technology, where the price becomes the most important factor. Suppliers can change the prices dynamically based on the inventory level and market situation in order to maximize the sales and profit. In the virtual marketplace where multiple customers purchase multiple standardized products from multiple suppliers repetitively, customers can purchase the required amount of each item as a dynamic bidding by allocating purchase orders to the suppliers based on the current price. Customers need a method to quickly determine the optimal allocation of orders to the suppliers using the dynamically changing data to minimize the total cost. We present a LP model which minimizes the sum of the total price plus transportation cost for this problem. Simulation results using random data show meaningful reduction of the total cost.

Automated Link Tracing for Classification of Malicious Websites in Malware Distribution Networks

  • Choi, Sang-Yong;Lim, Chang Gyoon;Kim, Yong-Min
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.100-115
    • /
    • 2019
  • Malicious code distribution on the Internet is one of the most critical Internet-based threats and distribution technology has evolved to bypass detection systems. As a new defense against the detection bypass technology of malicious attackers, this study proposes the automated tracing of malicious websites in a malware distribution network (MDN). The proposed technology extracts automated links and classifies websites into malicious and normal websites based on link structure. Even if attackers use a new distribution technology, website classification is possible as long as the connections are established through automated links. The use of a real web-browser and proxy server enables an adequate response to attackers' perception of analysis environments and evasion technology and prevents analysis environments from being infected by malicious code. The validity and accuracy of the proposed method for classification are verified using 20,000 links, 10,000 each from normal and malicious websites.

Selecting the Right ERP System for SMEs: An Intelligent Ranking Engine of Cloud SaaS Service Providers based on Fuzziness Quality Attributes

  • Fallatah, Mahmoud Ibrahim;Ikram, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.35-46
    • /
    • 2021
  • Small and Medium Enterprises (SMEs) are increasingly using ERP systems to connect and manage all their functions, whether internally between the different departments, or externally with customers in electronic commerce. However, the selection of the right ERP system is usually an issue, due to the complexities of identifying the criteria, weighting them, and selecting the best system and provider. Because cost is usually important for SMEs, ERP systems based on Cloud Software as a Service (SaaS) has been adopted by many SMEs. However, SMEs face an issue of selecting the right system. Therefore, this paper proposes a fuzziness ranking engine system in order to match the SMEs requirements with the most suitable service provider. The extensive experimental result shows that our approach has better result compared with traditional approaches.

Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering

  • Jeong, Woon-Hae;Kim, Se-Jun;Park, Doo-Soon;Kwak, Jin
    • Journal of Information Processing Systems
    • /
    • v.9 no.1
    • /
    • pp.157-172
    • /
    • 2013
  • There are many recommendation systems available to provide users with personalized services. Among them, the most frequently used in electronic commerce is 'collaborative filtering', which is a technique that provides a process of filtering customer information for the preparation of profiles and making recommendations of products that are expected to be preferred by other users, based on such information profiles. Collaborative filtering systems, however, have in their nature both technical issues such as sparsity, scalability, and transparency, as well as security issues in the collection of the information that becomes the basis for preparation of the profiles. In this paper, we suggest a movie recommendation system, based on the selection of optimal personal propensity variables and the utilization of a secure collaborating filtering system, in order to provide a solution to such sparsity and scalability issues. At the same time, we adopt 'push attack' principles to deal with the security vulnerability of collaborative filtering systems. Furthermore, we assess the system's applicability by using the open database MovieLens, and present a personal propensity framework for improvement in the performance of recommender systems. We successfully come up with a movie recommendation system through the selection of optimal personalization factors and the embodiment of a safe collaborative filtering system.

Design of Fraudulent Process Notification for Management Information Systems (정보시스템 부정행위 신고시스템 설계)

  • Lee, Joong Hee;Lee, Sangwon;Ahn, Hyunsup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.629-631
    • /
    • 2013
  • In many enterprises, fraudulent activities and processes are widely prevalent. But, their employees would not report the illegal activities since they would be attacked by defensive and reactive retaliations in their enterprises. Against this backdrop, we design notification systems for whistle blowing. The design would certainly be useful for fraudulent process notification while using management information systems in the field of business. The fraudulent process notification is related to whistle blowing systems, methods, storage media, and so on. Also, we establish the whole architecture of fraudulent process notification with functional structure from the viewpoint of systems and whistle blower. The flow diagram of notification method is added.

  • PDF

Use of Software Agent Technology in Management Information System: A Literature Review and Classification

  • Hamirahanim Abdul Rahman;Jinsoo Park;Jihae Suh
    • Asia pacific journal of information systems
    • /
    • v.29 no.1
    • /
    • pp.65-82
    • /
    • 2019
  • Technological innovations over the years have accentuated the workings in corporate- connected organizations and different application platforms. Hence, a unified management information system (MIS) that can utilize the Web and propel programming developments is required. Software agents, the latest developments in computer software technology, can be utilized to rapidly and effortlessly build integrated information systems. Consequently, 59 research papers on the use of software agents in MIS were identified from top 40 MIS journals published between 2007 and 2017. Then, we reviewed and classified all the research papers according to two categories: application fields and application categories. The application fields consisted of eight sub-groups: manufacturing, telecommunication systems, traffic and transportation management, information filtering and gathering, electronic commerce, business process management, entertainment, and medical care; whereas the application categories consisted of three sub-groups: multi-agent systems, personal assistants, and multi-agent simulation. The research papers were further divided into journal and year of publication, and journal and application field. The objective of our research was to understand the trend of the use software agent technology in MIS by examining the published research paper beside to add knowledge and content to the information system academic discipline.

A Comparison on the Factors Influencing Customer Values in Electronic Commerce between Korea and China (전자상거래 고객가치 요인의 한·중 비교)

  • Lee, Hyun-Kyu;Han, Jae-Ho
    • The Journal of Information Systems
    • /
    • v.21 no.4
    • /
    • pp.155-183
    • /
    • 2012
  • Means-Ends Network model was used to identify factors of means objective(means supplied by vendor) and fundamental objectives(purchasing motivations) for purchasing decision-making structure and dimensions of customer values on purchasers of internet shopping mall in Korea and China. In Means-Ends Network 6 factors(shopping travel, shipping assurance, vendor trust, online payment, product choice, and recommender systems) were found as a means objectives and 3 factors(shopping convenience, internet environment, customer support) as a fundamental objectives of shopping. However the results of hypotheses test for Means-Ends Network show some important differences between two countries. Something important to notice here is that Chinese customers shopping in China recognize shipping assurance factor and vendor trust factor as important factors satisfying all fundamental objectives unlike as in the case of our country. As these two factors are attribution factors responsible to the sellers, it is identified that customers do not trust the sellers and sellers have not met the expectations of customers. Therefore, these results show that the seller efforts assuring the reliability of the seller themselves, such as conducting its own compensation scheme are more important rather than the establishment of the guarantee institution to guarantee reliability and delivery assurance of sellers and implementation of legal and institutional apparatus such as the settlement of e-commerce licence system. Though this study presents such an important marketing implications, it can be pointed out that the limits are this research was done on the general Internet shopping malls without considering the Internet shopping mall types of diversity, the survey was designed around the student samples for convenience of the investigation because it was an international survey and the collected data has been limited to the western coast cities, such as China's Beijing, Shanghai, and Dalian.

Domastic Blockchain Legislation and Policy Analysis and the Limitations Deriving and Present Improvement Points (국내 블록체인 법제 및 정책 분석과 한계점 도출 및 향상점 제시 -산업 활성화와 정보보호 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.44-51
    • /
    • 2019
  • Recently, various platforms utilizing blockchains have appeared. In order to develop the blockchain, it is required to improve related laws and institutions. In this respect, we analysis of the laws and systems related to domestic blockchains, draw out the limitations, and suggest directions for improvement. The research method was analyzed the literature and related laws through literature review. It is difficult to analyze the whole law and system at one time, so we examined the necessary laws and systems to revitalize the blockchain. It is confirmed that legal improvement is needed on the scope of electronic transactions and electronic financial transactions, electronic commerce, digital signatures, import and export, personal information protection, blockchain industry promotion and research. Through this, we expect a balanced development of effective blockchain revitalization and protection of national fundamental rights. Individual studies on the legal provisions and systems for each item in the future can be conducted.