Table Of ContentCommunications
in Computer and Information Science 332
EditorialBoard
SimoneDinizJunqueiraBarbosa
PontificalCatholicUniversityofRiodeJaneiro(PUC-Rio),
RiodeJaneiro,Brazil
PhoebeChen
LaTrobeUniversity,Melbourne,Australia
AlfredoCuzzocrea
ICAR-CNRandUniversityofCalabria,Italy
XiaoyongDu
RenminUniversityofChina,Beijing,China
JoaquimFilipe
PolytechnicInstituteofSetúbal,Portugal
OrhunKara
TÜBI˙TAKBI˙LGEMandMiddleEastTechnicalUniversity,Turkey
Tai-hoonKim
KonkukUniversity,Chung-ju,Chungbuk,Korea
IgorKotenko
St.PetersburgInstituteforInformaticsandAutomation
oftheRussianAcademyofSciences,Russia
DominikS´le˛zak
UniversityofWarsawandInfobright,Poland
XiaokangYang
ShanghaiJiaoTongUniversity,China
Vasil Khachidze Tim Wang
Sohail Siddiqui Vincent Liu
Sergio Cappuccio Alicia Lim (Eds.)
Contemporary Research
on E-business Technology
and Strategy
International Conference, iCETS 2012
Tianjin, China, August 29-31, 2012
Revised Selected Papers
1 3
VolumeEditors
VasilKhachidze
CeBACanada,Ottawa,ON,Canada
E-mail:[email protected]
TimWang
ITSB,PWGSC,Ottawa,ON,Canada
E-mail:[email protected]
SohailSiddiqui
AlgonquinCollege,WoodroffeCampus,Ottawa,ON,Canada
E-mail:[email protected]
VincentLiu
MacauUniversityofScienceandTechnology,Taipa,Macau
E-mail:[email protected]
SergioCappuccio
NationalResearchCouncil,Ottawa,ON,Canada
E-mail:[email protected]
AliciaLim
CarletonUniversity,Ottawa,ON,Canda
E-mail:[email protected]
ISSN1865-0929 e-ISSN1865-0937
ISBN978-3-642-34446-6 e-ISBN978-3-642-34447-3
DOI10.1007/978-3-642-34447-3
SpringerHeidelbergDordrechtLondonNewYork
LibraryofCongressControlNumber:2012949846
CRSubjectClassification(1998):K.6,K.4.4,H.4,H.3,J.1,H.2
©Springer-VerlagBerlinHeidelberg2012
Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis
concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting,
reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication
orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965,
initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable
toprosecutionundertheGermanCopyrightLaw.
Theuseofgeneraldescriptivenames,registerednames,trademarks,etc.inthispublicationdoesnotimply,
evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevantprotectivelaws
andregulationsandthereforefreeforgeneraluse.
Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India
Printedonacid-freepaper
SpringerispartofSpringerScience+BusinessMedia(www.springer.com)
Preface
The International Conference on E-business Technology and Strategy (iCETS)
provides a peer-reviewed forum for academic researchers, enterprises and busi-
ness analysts,andgovernmentleadersfromacrossthe globeto share contempo-
raryresearchondevelopmentsinthefieldsofe-businesstechnology,information
management systems and business strategy. It seeks to promote effective and
vibrant networking among researchers and practitioners from around the world
whoareconcernedaboutthe effectivemanagementofinformationtechnologyin
organizations.
This network of researchers views fostering the development of emerging
scholars in the information technology and e-business fields as its primary task.
Consequently, the conference is designed to provide a venue for researchers to
obtain substantive and beneficial feedback on their work.
There were 231 contributions submitted to iCETS 2012. After in-depth dis-
cussions, 65 high-quality contributions were selected for publication in this vol-
ume.TheauthorsarefromAustralia,Canada,China,Korea,Italy,Ghana,Geor-
gia, Thailand, UK, among other countries.
We thank all the authors who submitted papers, the Program Committee
members, and the external reviewers. We also thank all the local people who
wereinstrumentalinmakingthiseditionofiCETSanotherverysuccessfulevent.
August 2012 Vasil Khachidze
Tim Wang
Sohail Siddiqui
Vincent Liu
Sergio Cappuccio
Alicia Lim
Organization
Conference Chairs
Khaled Hassanein McMaster University, Canada
Zhiyong Feng Tianjin University, China
Vasil Khachidze CeBA Canada, Canada
Jianwu Dang Tianjin University, China
Yanqing Duan University of Bedfordshire Business School, UK
Ajith Abraham Technical University of Ostrava, Czech Republic
Martin Zhao Mercer University, USA
Kartlos Kachiashvili Georgian Technical University, Georgia
Yi Pan Georgia State University, USA
Carl Adams University of Portsmouth, UK
Marc Adam Karlsruhe Institute of Technology, Germany
Tim Wang ITSB, PWGSC, Canada
Vincent Yide Liu Macau University of Science and Technology,
Macau
Advisory Board
AbdelKrim Hamou-Lhadj IBM Canada, Canada
Ajith Abraham Machine Intelligence Research (MIR) Labs, USA
Volker Gruhn University of Leipzig, Germany
Esma A¨ımeur University of Montreal, Canada
Denghua Zhong Tianjin University, China
George Giaglis Athens University of Economics and Business,
Greece
Carl Adams University of Portsmouth, UK
Ljubo Vlacic Griffith University, Australia
Martin Zhao Mercer University, USA
Zhiyong Feng Tianjin University, China
Sergio Cappuccio National Research Council, Canada
Tim Wang ITSB, PWGSC, Canada
Program Committee
Ajith Abraham MIR Labs, USA
Ali Al Mazari PSCJ, Alfaisal University, Kingdom of
Saudi Arabia
Andreas Pashalidis Katholieke Universiteit Leuven, Belgium
Christos Bouras University of Patras, Greece
Carl Adams University of Portsmouth, UK
VIII Organization
Chunyang Ye University of Toronto, Canada
Chen-Yuan Chen National Pingtung University of Education,
Taiwan
Christopher Westland University of Illinois, USA
Chih-Ping Wei National Taiwan University, Taiwan
Dimitris Karagiannis University of Vienna, Austria
Dan Ma Singapore Management University, Singapore
Esma A¨ımeur University of Montreal, Canada
Francesco Bolici Universita` degli Studi di Cassino, Italy
George Giaglis Athens University of Economics and Business,
Greece
Haibin Zhu Nipissing University, Canada
Hepu Deng RMIT University, Australia
Hui Zhang Tianjin University, China
Indranil Bose University of Hong Kong, Hong Kong
Joseph Barjis Delft University of Technology, The Netherlands
Jingsong Wang Tianjin University of Technology, China
Jung-Ran Park Drexel University, USA
Khalil Drira French National Center for Scientific Research,
France
Kartlos Kachiashvili Georgian Technical University in Tbilisi, Georgia
Ljubo Vlacic Griffith University, Australia
Morad Benyoucef University of Ottawa, Canada
Minqiang Li Tianjin University, China
Marc T.P. Adam Karlsruhe Institute of Technology, Germany
Michael Weiss Carleton University, Canada
Martin Zhao Mercer University, USA
Peng Zhou MinistryofIndustryandInformationTechnology,
China
Shuwu Zhang Chinese Academy of Sciences, China
Sergio Cappuccio National Research Council, Canada
Soon Ae Chun City University of New York, USA
Stoyan Tanev University of Southern Denmark, Denmark
Tao Xu Civil Aviation University of China, China
Thomas Tran University of Ottawa, Canada
Volker Gruhn University of Leipzig, Germany
Wojciech Cellary Poznan University of Economics, Poland
Xiaohui Zhao Unitec Institute of Technology, New Zealand
Yiliu Tu University of Calgary, Canada
Yanchen Li Macau University of Science and Technology,
Macau
Yanbo Han Chinese Academy of Sciences, China
Yanqing Duan University of Bedfordshire, UK
Yide Liu Macau University of Science and Technology,
Macau
Zhaohao Sun University of Ballarat, Australia
Organization IX
Editorial Board
Vasil Khachidze CeBA Canada, Canada
Sohail Siddiqui Department of National Defence, Canada
Tim Wang ITSB, PWGSC, Canada
Vincent Liu Macau University of Science and Technology,
Macau
Sergio Cappuccio National Research Council, Canada
Alicia Lim Carleton University, Canada
Conference Secretariat
Jia Sun Tianjin University, China
Vasil Khachidze JEBTS, CeBA Canada, Canada
Yuexian Hou Tianjin University, China
Tim Wang ITSB, PWGSC, Canada
Vincent Liu Macau University of Science and Technology,
Macau
Sohail Siddiqui Department of National Defence, Canada
Hong Yu CeBA Canada, Canada
Huili Dong Tianjin University, China
Table of Contents
E-commerce: Consumer Online Shopping in Canada.................. 1
Ayoub Yousefi and Jie Tang
Integrating Spatial Decision Support System with Graph Mining
Technique....................................................... 15
Abdul Halim Omar and Mohd Najib Mohd Salleh
Engaging Social Customers – Influencing New Marketing Strategies
for Social Media Information Sources ............................... 25
Barbara Gligorijevic and Edwina Luck
Concept Based Orchestration of Web Services Using XOT............. 41
Ho-Sang Jo, Jae-Dong Yang, and Wan Choi
Intellectual Property Rights in E-business Environment:
ParadigmShifts of Legal and Political Measures ..................... 54
Seyed Reza Eftekhari
A Multi-objective Programming for Web Services Composition ........ 62
Shanshan Hao, Fuzan Chen, Minqiang Li, and Jisong Kou
The Application of SOM and K-Means Algorithms in Public Security
Performance Analysis and Forecasting .............................. 73
Yuanyuan Kou, Hongfei Cui, and Linying Xu
Semi-automatic Acquisition and Formal Representation of OpenAPI.... 85
Xiaocao Hu, Shizhan Chen, and Zhiyong Feng
A Novel Subspace Classification Method for Large Datasets Based
on Kernel-Based Fisher Discriminant Analysis ....................... 97
Yanlan Wang, Fuzan Chen, Minqiang Li, and Jisong Kou
Eliciting Security Requirements Method Based on Safety
Knowledge Base ................................................. 109
Xiaofei Yu, Xiaohong Li, and Qianqian Zhang
Sale Channel Selection of Information Products in the Presence
of Network Externality ........................................... 122
Zhiyong Liu, Minqiang Li, and Jisong Kou
Impact of IT Service Provider’s Expertise and Customer’s Sociability
on Continuous Intention to Use .................................... 135
Jungwoo Lee, Yongki Park, and Junbeom Jang
XII Table of Contents
ASF: Improving Android Security with Layered Structure
Instrumentation ................................................. 147
Qianqian Zhang, Xiaohong Li, Xiaofei Yu, and Zhiyong Feng
A Threat Model-Driven Security Testing Approach
for Web Application.............................................. 158
Bobo Yan, Xiaohong Li, and Zhijie Du
A Novel Architecture on FPGA for Face Detection Using Jumping
Scanning Mechanism ............................................. 169
Chao Qin, Ming Che, and Weichao Li
On the Generalization of PAC-Bayes Bound for SVM
Linear Classifier ................................................. 176
Li Tang, Zheng Zhao, Xiujun Gong, and Huapeng Zeng
Optimality of Versioning for Information Products Using
Niching SSGA ................................................... 187
Haiyang Feng, Minqiang Li, and Fuzan Chen
Incorporating Risk Attitude into the Iterated Prisoner’s Dilemma:
Application to E-business ......................................... 199
Weijun Zeng, Minqiang Li, and Guofang Nan
Dynamic Neural Network Ensemble Construction for Classification..... 214
Jin Tian, Minqiang Li, and Fuzan Chen
A Secure Data Exchange Protocol for the Internet of Things .......... 224
Yaping Zhang, Lina Bo, and Qian Ma
Enhancing Security of Online Payments: A Conceptual Model
for a Robust E-PaymentProtocol for E-Commerce ................... 232
Augustine Takyi and Patrick Ohemeng Gyaase
An Improved Secure Communications Protocol ...................... 240
Yaping Zhang, Chunyan Li, Jingyuan Zhang, and Bing Sun
An Efficient Scheme for Implementation of SM2 Digital Signature
over GF(p)...................................................... 250
Yanhua Liu, Wei Guo, Ya Tan, Jizeng Wei, and Dazhi Sun
A Browser Extension Vulnerability Detecting Approach
Based on Behavior Monitoring and Analysis......................... 259
Qin Wang, Xiaohong Li, and Bobo Yan
Research on Location Selection Based on Genetic and Simulated
Annealing Algorithm ............................................. 271
Wenyuan Tao and Jiayue Liu
Table of Contents XIII
Design and Implementation of Special Equipment Major Hazard
Identification System ............................................. 282
Jiang Liu, Manliang Chen, and Wenyi Xu
A Screening Method of Security Functional Components
Based on Fuzzy.................................................. 292
Yizhen Liu, Zhijie Du, Hong Shi, and Xiaohong Li
An Assessment of the Use of Information Technology Tools
and E-business by Informal Sector Entrepreneurs in Mauritius ......... 306
Asrani Gopaul
Secure Operation, Control, and Maintenance in Smart Grid
Communications over Wireless Networks............................ 316
Vincent Y. Liu and Xiaobing Wang
Eliminating False Matches Using Geometric Context ................. 325
Muhua Zhang, Yuxiong Zhang, and Jianrong Wang
Online Service Quality in Social Commerce Websites ................. 335
Jungwoo Lee, Myung Suk Cha, and Cheulhyun Cho
An Improved Algorithm for K-anonymity ........................... 352
Jing Zhang, Xiujun Gong, Zhipeng Han, and Siling Feng
Factors Affecting Emerging ICT Adoption in SMEs: An Actor Network
Theory Analysis ................................................. 361
Sunday Eze, Yanqing Duan, and Hsin Chen
A Probability Based Similarity Scoring for DNA Motifs Comparison.... 378
Bin Tian, Xiujun Gong, Wenjun Wu, and Siling Feng
Security Software Formal Modeling and Verification Method
Based on UML and Z ............................................ 390
Kunyu Cao, Xiaohong Li, and Jinliang Xing
Research and Application of Warning and Intelligent Control System
to Prevent Hollow Fiber Membrane Fouling ......................... 402
Tong Yun, Qu Ri, Xu Dan-yu, and Zheng Xian-qiang
Sharing and Building Management System Based on Handheld Mobile
Devices ......................................................... 414
Yubao Li, Qing Xie, Guodong Liu, Zhenghua Shu, Dengji Zhao, and
Bingxin Wang
Social CRM for SMEs: Current Tools and Strategy................... 422
Sergio Cappuccio, Sagar Kulkarni, Muhammad Sohail,
Mustafa Haider, and Xiaobing Wang