Communications in Computer and Information Science 113 Marzia Zaman Yawei Liang Sohail M Siddiqui Tim Wang Vincent Liu Ceecee Lu (Eds.) E-business Technology and Strategy International Conference, CETS 2010 Ottawa, Canada, September 29-30, 2010 Proceedings 1 3 VolumeEditors MarziaZaman Queen’sUniversity Kingston,Ontario,Canada E-mail:[email protected] YaweiLiang RoyalMilitaryCollegeofCanada Kingston,Ontario,Canada E-mail:[email protected] SohailMSiddiqui UniversitéduQuébecenOutaouais Gatineau,Québec,Canada E-mail:[email protected] TimWang CeBACanada Ottawa,Ontario,Canada E-mail:[email protected] VincentLiu CarletonUniversity SprottSchoolofBusiness Ottawa,Ontario,Canada E-mail:[email protected] CeeceeLu UniversityofToronto Toronto,Ontario,Canada E-mail:[email protected] LibraryofCongressControlNumber:2010936132 CRSubjectClassification(1998):K.6,K.4.4,H.4,H.3,J.1,H.2 ISSN 1865-0929 ISBN-10 3-642-16396-3SpringerBerlinHeidelbergNewYork ISBN-13 978-3-642-16396-8SpringerBerlinHeidelbergNewYork Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. springer.com ©Springer-VerlagBerlinHeidelberg2010 PrintedinGermany Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper 06/3180 Preface The International Conference on E-business Technology & Strategy (CETS) provides a peer-reviewed forum for researchers from across the globe to share contemporary research on developments in the fields of e-business, information technology and business strategy. It seeks to promote effective and vibrant networking among researchers and practitioners from around the world who are concerned about the effective management of information technology in organizations. This network of researchers views fostering the development of emerging scholars in the information technology and e-business fields as its primary task. Consequently the conference is designed to provide a venue for researchers to get substantive and beneficial feedback on their work. There were 134 contributions submitted to CETS 2010. After in-depth discussions, 29 high-quality contributions were selected for publication in this volume. The authors are from Canada, USA, China, Japan, India and Malaysia. We thank all the authors who submitted papers, the Program Committee members, and the external reviewers. We also thank all the local people who were instrumental in making this edition of CETS another very successful event. In particular, we are very grateful to Ying Xie, who was responsible for the local arrangements. Special gratitude goes to the publishing editor, Leonie Kunz, who managed the complexity of information and communication aspects. Furthermore, we thank the many students who volunteered on the organization team, as well as the IT services of Carleton University. August 2010 Ceecee Lu Marzia Zaman Sohail M Siddiqui Tim Wang Vincent Liu Yawei Liang Organization Conference Chair Yawei Liang Royal Military College of Canada Program Committee Co-chairs Mazia Zaman Queen’s University, Canada Sohail M Siddiqui Université du Québec en Outaouais, Canada Tim Wang Ceba Canada, Canada Vincent Liu Carleton University, Canada Pogram Committee Africa Arino University of Navarra, Barcelona, Spain Alain Sandoz Vauban Technologies, Switzerland Amit Bhardwaj Meerut Institute of Engineering and Technology, India Anne-Françoise Le Meur Université de Lille, France Ceecee Lu University of Toronto, Canada Christian Zirpins University College London, UK Craig Kuziemsky University of Ottawa, Canada David Douglas University of Arkansas, USA Darlene Lui Ericsson Canada Inc, Canada Emmanuel A. Abegunrin Cappella University, USA Gi Wu Alcatel-Lucent Canada, Canada Fahim A. Bhuiyan Strayer University, Maryland, USA Ferhat Khendek Concordia University, Canada Gilbert Babin HEC Montréal, Canada Guoping Xia Beihang University, China Guy Tremblay LATECE – UQAM, Canada Hafedh Mili LATECE – UQAM, Canada Hugh Deng Agriculture Canada, Canada Jacknan Wang University of Toronto, Canada Joseph Bonnici Bryan College, Rhode Island, USA Kamel Adi Université du Québec en Outaouais, Canada Karen Fernandez University of Waikato, New Zealand Kenneth Kraemer University of California, Irvine, USA Liam Peyton University of Ottawa, Canada Lizhi Long University of Rhode Island, USA Lyn S. Amine Saint Louis University, Missouri, USA Lorin M. Hitt University of Pennsylvania, USA VIII Organization Lu Liu Beihang University, China Nigel Melville Boston College, USA Peng Zhou Carleton University, Canada Petko Valtchev LATECE – UQAM, Canada Pravat K. Choudhury Howard University, USA Roy Rada University of Maryland, USA Rex Dumdum Marywood University and State University of NY at Binghamton, USA Shari Shang The University of Melbourne, Australia Stéphane Gagnon Université du Québec en Outaouais, Canada Sohail M. Siddiqui Université du Québec en Outaouais, Canada Soku Byoun University of Southern Indiana, USA Teck-Yong Eng Aston University, UK Tim Wang CeBA Canada, Canada Yan Zhuang Notel Canada, Canada Yawei Liang Royal Military College of Canada Vijay Gurbaxani University of California, Irvine, USA Vincent Liu Carleton University, Carnada Yi Wu Agriculture Canada, Canada Workshops and Tutorials Committee Jacknan Wang University of Toronto, Canada Sohail M. Siddiqui University of Quebec, Canada Tim Wang CeBA Canada, Canada Publicity and Sponsorship Committee Ceecee Lu University of Toronto, Canada Li Zhu CeBA Canada, Canada Vincent Liu Carleton University, Canada Local Arrangements Committee Hongtao Li Carleton University, Canada Kyoko Hirano CeBA Canada, Canada Table of Contents Researchon GroupDecision-Making Mechanismof Internet Emergency Management .................................................... 1 Kefan Xie, Gang Chen, Wu Qian, and Zhao Shi The Challenges and Issues Regarding E-Health and Health Information Technology Trends in the Healthcare Sector ......................... 23 Pouyan Esmaeilzadeh, Murali Sambasivan, and Naresh Kumar The Study of Address Tree Coding Based on the Maximum Matching Algorithm in Courier Business..................................... 38 Shumin Zhou, Bin Tang, and Wen Li Customer Credit Scoring Method Based on the SVDD Classification Model with Imbalanced Dataset ................................... 46 Bo Tian, Lin Nan, Qin Zheng, and Lei Yang K-BRiR: An Efficient and Self-organized Routing Mechanism for Structured Peer-to-PeerService Networks ........................... 61 Zhenhua Tan, Guangming Yang, Zhiliang Zhu, Wei Cheng, and Guiran Chang Study on Amortization Time and Rationality in Real Estate Investment...................................................... 75 Yancang Li, Shujing Zhou, and Juanjuan Suo Risk Evaluation of Business Continuity Management by Using Green Technology...................................................... 86 Chen Gang Automated Methodologies for the Design of Flow Diagrams for Development and Maintenance Activities ........................... 93 Handigund Shivanand M. and Bhat Shweta ACO-Based Projection Pursuit: A Novel Clustering Algorithm......... 105 Yancang Li, Lina Zhao, and Shujing Zhou Ant Colony Algorithm for Multiple-Depot Vehicle Routing Problem with Shortest Finish Time ........................................ 114 Jianhua Ma and Jie Yuan Chaos Caused by a Transitive Map in Information ................... 124 Lidong Wang, Jiao Peng, and Heng Liu X Table of Contents Comparative Study of Methods for Monitoring and Controlling a Regional Economic System........................................ 130 Shi Zheng, Wen Zheng, and Xia Jin EnergyLevels andCo-evolutionof ProductInnovationin Supply Chain Clusters ........................................................ 140 Guojun Ji A Typology Framework of Loyalty Reward Programs................. 159 Yuheng Cao, Aaron L. Nsakanda, and Inder Jit Singh Mann The Knowledge Transfer Factors under Different Perspectives.......... 171 Yuanhua Hu and Lili Xue IT Operational Risk Measurement Model Based on Internal Loss Data of Banks........................................................ 180 Xiaoling Hao Prediction Task Assignment of Multi-UAV Approach Based on Consensus ...................................................... 192 Chen Chen, Zheng Qin, and Jian-kuan Xing A Macroscopic Timing Optimization Model for Signalized Intersections Based on an Extended Internal State Node Model.................... 200 Ximin Liu, Shoufeng Lu, and Shiqiang Dai A Research Methodology for Green IT Systems Based on WSR and Design Science: The Case of a Chinese Company..................... 215 Yinghong Zhong and Hongwei Liu Research on the Hotel Image Based on the Detail Service ............. 226 Ban Li, Zheng Shenghua, and Yi He Impact of Network Information on the Management of Library E-Resources..................................................... 234 Zhixiang Yin and Hua Chen Technology Route and System Design of Green IT ................... 238 Juchi Hou, Ying Liang, and Jianli Wei The Tail of BPM ................................................ 245 Steve Kruba and Jim Meyer The Aggregation-Diffusion Model of Conduction of Technology Value in the Large-Scale Sports Events................................... 258 Chuansheng Dong Specification Patent Management for Web Application Platform Ecosystem ...................................................... 269 Yoshiaki Fukami, Masao Isshiki, Hideaki Takeda, Ikki Ohmukai, and Jiro Kokuryo Table of Contents XI Evaluation of the Acceptance of Audience Response System by Corporations Using the Technology Acceptance Model................ 281 Hsing-Hui Chu, Ta-Jung Lu, and Jong-Wen Wann Identification of Variables and Factors Impacting Consumer Behavior in On-Line Shopping in India: An Empirical Study ................... 292 Sudesh Chhikara Knowledge Model of Emergency Decision-Making Based on Knowledge Supply and Demand.............................................. 305 Bing Wu and Lin-du Zhao The Consistency andRanking MethodBasedonComparisonLinguistic Variable ........................................................ 318 Qisheng Zhao, Fajie Wei, and Shenghan Zhou Author Index.................................................. 327 Research on Group Decision-Making Mechanism of Internet Emergency Management* Kefan Xie, Gang Chen, Wu Qian, and Zhao Shi Management School, Wuhan University of Technology, 125 LuoShi Road, Wuhan, Hubei 430070, China [email protected] Abstract. With the development of information technology, internet has become a popular term and internet emergency has an intensive influence on people’s life. This article offers a short history of internet emergency management. It discusses the definition, characteristics, and factor of internet emergency management. A group decision-making mechanism of internet emergency is presented based on the discussion. The authors establish a so- called Rough Set Scenario Flow Graphs (RSSFG) of group decision-making mechanism of internet emergency management and make an empirical analysis based on the RSSFG approach. The experimental results confirm that this approach is effective in internet emergency decision-making. Keywords: Group Decision-making, Internet Emergency Management, Rough Set Scenario Flow Graphs. 1 Introduction The information age is coming and information is one of indispensable resources to people. With the development of information technology, the application of computer network has deeply touched various fields, which plays a very important role in the development of politics, economy, technology and society. Therefore, network security becomes a crucial issue to social stability and economic development. In December 2006, a computer virus named “Worm Nimaya” was rapidly spreading nationwide in China at the speed of attacking three to five hundred thousand computer systems per day, and produced 700 new heterogeneous viruses in just two months. Until January 2007, over millions of personal computers had been attacked in China, and plenty of personal and commercial files had been damaged. The direct and indirect economic losses for it were out of calculation. Moreover, the horrible virus caused a serious panic. Many netizens and commercial organizations stopped using network in order to protect their computers from the virus so that some online communication was broken. Hereafter, network security organization and some anti-virus software companies were developing anti-virus software to fight off it. At the same time, police office was investigating its human factor with the help of * This research is supported by National Natural Science Foundation of China, project No. 90924010. M. Zaman et al. (Eds.): CETS 2010, CCIS 113, pp. 1–22, 2010. © Springer-Verlag Berlin Heidelberg 2010