Table Of ContentCommunications
in Computer and Information Science 113
Marzia Zaman Yawei Liang
Sohail M Siddiqui Tim Wang
Vincent Liu Ceecee Lu (Eds.)
E-business Technology
and Strategy
International Conference, CETS 2010
Ottawa, Canada, September 29-30, 2010
Proceedings
1 3
VolumeEditors
MarziaZaman
Queen’sUniversity
Kingston,Ontario,Canada
E-mail:[email protected]
YaweiLiang
RoyalMilitaryCollegeofCanada
Kingston,Ontario,Canada
E-mail:[email protected]
SohailMSiddiqui
UniversitéduQuébecenOutaouais
Gatineau,Québec,Canada
E-mail:[email protected]
TimWang
CeBACanada
Ottawa,Ontario,Canada
E-mail:[email protected]
VincentLiu
CarletonUniversity
SprottSchoolofBusiness
Ottawa,Ontario,Canada
E-mail:[email protected]
CeeceeLu
UniversityofToronto
Toronto,Ontario,Canada
E-mail:[email protected]
LibraryofCongressControlNumber:2010936132
CRSubjectClassification(1998):K.6,K.4.4,H.4,H.3,J.1,H.2
ISSN 1865-0929
ISBN-10 3-642-16396-3SpringerBerlinHeidelbergNewYork
ISBN-13 978-3-642-16396-8SpringerBerlinHeidelbergNewYork
Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis
concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting,
reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication
orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965,
initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable
toprosecutionundertheGermanCopyrightLaw.
springer.com
©Springer-VerlagBerlinHeidelberg2010
PrintedinGermany
Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India
Printedonacid-freepaper 06/3180
Preface
The International Conference on E-business Technology & Strategy (CETS) provides 
a peer-reviewed forum for researchers from across the globe to share contemporary 
research on developments in the fields of e-business, information technology and 
business  strategy.  It  seeks  to  promote  effective  and  vibrant  networking  among 
researchers and practitioners from around the world who are concerned about the 
effective management of information technology in organizations. 
This network of researchers views fostering the development of emerging scholars 
in the information technology and e-business fields as its primary task. Consequently 
the conference is designed to provide a venue for researchers to get substantive and 
beneficial feedback on their work. 
There were 134 contributions submitted to CETS 2010. After in-depth discussions, 
29  high-quality  contributions  were  selected  for  publication  in  this  volume.  The 
authors are from Canada, USA, China, Japan, India and Malaysia. 
We thank all the authors who submitted papers, the Program Committee members, 
and the external reviewers. We also thank all the local people who were instrumental in 
making this edition of CETS another very successful event. In particular, we are very 
grateful to Ying Xie, who was responsible for the local arrangements. Special gratitude 
goes  to  the  publishing  editor,  Leonie  Kunz,  who  managed  the  complexity  of 
information and communication aspects. Furthermore, we thank the many students 
who volunteered on the organization team, as well as the IT services of Carleton 
University. 
August 2010  Ceecee Lu 
Marzia Zaman 
Sohail M Siddiqui 
Tim Wang 
Vincent Liu 
Yawei Liang
Organization 
Conference Chair 
Yawei Liang  Royal Military College of Canada 
Program Committee Co-chairs 
Mazia Zaman  Queen’s University, Canada 
Sohail M Siddiqui  Université du Québec en Outaouais, Canada 
Tim Wang  Ceba Canada, Canada 
Vincent Liu  Carleton University, Canada 
Pogram Committee 
Africa Arino  University of Navarra, Barcelona, Spain 
Alain Sandoz  Vauban Technologies, Switzerland  
Amit Bhardwaj  Meerut Institute of Engineering and Technology, India 
Anne-Françoise Le Meur  Université de Lille, France 
Ceecee Lu  University of Toronto, Canada 
Christian Zirpins  University College London, UK 
Craig Kuziemsky  University of Ottawa, Canada 
David Douglas  University of Arkansas, USA 
Darlene Lui  Ericsson Canada Inc, Canada  
Emmanuel A. Abegunrin  Cappella University, USA 
Gi Wu  Alcatel-Lucent Canada, Canada 
Fahim A. Bhuiyan  Strayer University, Maryland, USA 
Ferhat Khendek  Concordia University, Canada 
Gilbert Babin  HEC Montréal, Canada 
Guoping Xia  Beihang University, China 
Guy Tremblay  LATECE – UQAM, Canada  
Hafedh Mili  LATECE – UQAM, Canada  
Hugh Deng  Agriculture Canada, Canada 
Jacknan Wang  University of Toronto, Canada 
Joseph Bonnici  Bryan College, Rhode Island, USA  
Kamel Adi  Université du Québec en Outaouais, Canada 
Karen Fernandez  University of Waikato, New Zealand 
Kenneth Kraemer  University of California, Irvine, USA 
Liam Peyton  University of Ottawa, Canada 
Lizhi Long  University of Rhode Island, USA 
Lyn S. Amine  Saint Louis University, Missouri, USA 
Lorin M. Hitt  University of Pennsylvania, USA
VIII  Organization 
Lu Liu  Beihang University, China 
Nigel Melville  Boston College, USA 
Peng Zhou  Carleton University, Canada 
Petko Valtchev  LATECE – UQAM, Canada  
Pravat K. Choudhury  Howard University, USA 
Roy Rada  University of Maryland, USA  
Rex Dumdum  Marywood University and State University of NY  
at Binghamton, USA 
Shari Shang  The University of Melbourne, Australia 
Stéphane Gagnon  Université du Québec en Outaouais, Canada 
Sohail M. Siddiqui  Université du Québec en Outaouais, Canada 
Soku Byoun  University of Southern Indiana, USA 
Teck-Yong Eng  Aston University, UK 
Tim Wang  CeBA Canada, Canada 
Yan Zhuang  Notel Canada, Canada 
Yawei Liang  Royal Military College of Canada 
Vijay Gurbaxani  University of California, Irvine, USA 
Vincent Liu  Carleton University, Carnada 
Yi Wu  Agriculture Canada, Canada 
Workshops and Tutorials Committee 
Jacknan Wang  University of Toronto, Canada 
Sohail M. Siddiqui  University of Quebec, Canada 
Tim Wang  CeBA Canada, Canada 
Publicity and Sponsorship Committee 
Ceecee Lu  University of Toronto, Canada 
Li Zhu  CeBA Canada, Canada  
Vincent Liu  Carleton University, Canada  
Local Arrangements Committee 
Hongtao Li  Carleton University, Canada 
Kyoko Hirano  CeBA Canada, Canada
Table of Contents
Researchon GroupDecision-Making Mechanismof Internet Emergency
Management .................................................... 1
Kefan Xie, Gang Chen, Wu Qian, and Zhao Shi
The Challenges and Issues Regarding E-Health and Health Information
Technology Trends in the Healthcare Sector ......................... 23
Pouyan Esmaeilzadeh, Murali Sambasivan, and Naresh Kumar
The Study of Address Tree Coding Based on the Maximum Matching
Algorithm in Courier Business..................................... 38
Shumin Zhou, Bin Tang, and Wen Li
Customer Credit Scoring Method Based on the SVDD Classification
Model with Imbalanced Dataset ................................... 46
Bo Tian, Lin Nan, Qin Zheng, and Lei Yang
K-BRiR: An Efficient and Self-organized Routing Mechanism for
Structured Peer-to-PeerService Networks ........................... 61
Zhenhua Tan, Guangming Yang, Zhiliang Zhu, Wei Cheng, and
Guiran Chang
Study on Amortization Time and Rationality in Real Estate
Investment...................................................... 75
Yancang Li, Shujing Zhou, and Juanjuan Suo
Risk Evaluation of Business Continuity Management by Using Green
Technology...................................................... 86
Chen Gang
Automated Methodologies for the Design of Flow Diagrams for
Development and Maintenance Activities ........................... 93
Handigund Shivanand M. and Bhat Shweta
ACO-Based Projection Pursuit: A Novel Clustering Algorithm......... 105
Yancang Li, Lina Zhao, and Shujing Zhou
Ant Colony Algorithm for Multiple-Depot Vehicle Routing Problem
with Shortest Finish Time ........................................ 114
Jianhua Ma and Jie Yuan
Chaos Caused by a Transitive Map in Information ................... 124
Lidong Wang, Jiao Peng, and Heng Liu
X Table of Contents
Comparative Study of Methods for Monitoring and Controlling a
Regional Economic System........................................ 130
Shi Zheng, Wen Zheng, and Xia Jin
EnergyLevels andCo-evolutionof ProductInnovationin Supply Chain
Clusters ........................................................ 140
Guojun Ji
A Typology Framework of Loyalty Reward Programs................. 159
Yuheng Cao, Aaron L. Nsakanda, and Inder Jit Singh Mann
The Knowledge Transfer Factors under Different Perspectives.......... 171
Yuanhua Hu and Lili Xue
IT Operational Risk Measurement Model Based on Internal Loss Data
of Banks........................................................ 180
Xiaoling Hao
Prediction Task Assignment of Multi-UAV Approach Based on
Consensus ...................................................... 192
Chen Chen, Zheng Qin, and Jian-kuan Xing
A Macroscopic Timing Optimization Model for Signalized Intersections
Based on an Extended Internal State Node Model.................... 200
Ximin Liu, Shoufeng Lu, and Shiqiang Dai
A Research Methodology for Green IT Systems Based on WSR and
Design Science: The Case of a Chinese Company..................... 215
Yinghong Zhong and Hongwei Liu
Research on the Hotel Image Based on the Detail Service ............. 226
Ban Li, Zheng Shenghua, and Yi He
Impact of Network Information on the Management of Library
E-Resources..................................................... 234
Zhixiang Yin and Hua Chen
Technology Route and System Design of Green IT ................... 238
Juchi Hou, Ying Liang, and Jianli Wei
The Tail of BPM ................................................ 245
Steve Kruba and Jim Meyer
The Aggregation-Diffusion Model of Conduction of Technology Value
in the Large-Scale Sports Events................................... 258
Chuansheng Dong
Specification Patent Management for Web Application Platform
Ecosystem ...................................................... 269
Yoshiaki Fukami, Masao Isshiki, Hideaki Takeda, Ikki Ohmukai, and
Jiro Kokuryo
Table of Contents XI
Evaluation of the Acceptance of Audience Response System by
Corporations Using the Technology Acceptance Model................ 281
Hsing-Hui Chu, Ta-Jung Lu, and Jong-Wen Wann
Identification of Variables and Factors Impacting Consumer Behavior
in On-Line Shopping in India: An Empirical Study ................... 292
Sudesh Chhikara
Knowledge Model of Emergency Decision-Making Based on Knowledge
Supply and Demand.............................................. 305
Bing Wu and Lin-du Zhao
The Consistency andRanking MethodBasedonComparisonLinguistic
Variable ........................................................ 318
Qisheng Zhao, Fajie Wei, and Shenghan Zhou
Author Index.................................................. 327
Research on Group Decision-Making Mechanism of 
Internet Emergency Management* 
Kefan Xie, Gang Chen, Wu Qian, and Zhao Shi 
Management School, Wuhan University of Technology, 125 LuoShi Road, 
Wuhan, Hubei 430070, China 
[email protected] 
Abstract.  With  the  development  of  information  technology,  internet  has 
become a popular term and internet emergency has an intensive influence on 
people’s  life.  This  article  offers  a  short  history  of  internet  emergency 
management. It discusses the definition, characteristics, and factor of internet 
emergency  management.  A  group  decision-making  mechanism  of  internet 
emergency is presented based on the discussion. The authors establish a so-
called Rough Set Scenario Flow Graphs (RSSFG) of group decision-making 
mechanism of internet emergency management and make an empirical analysis 
based on the RSSFG approach. The experimental results confirm that this 
approach is effective in internet emergency decision-making. 
Keywords: Group Decision-making, Internet Emergency Management, Rough 
Set Scenario Flow Graphs. 
1   Introduction 
The information age is coming and information is one of indispensable resources to 
people. With the development of information technology, the application of computer 
network has deeply touched various fields, which plays a very important role in the 
development  of  politics,  economy,  technology  and  society.  Therefore,  network 
security becomes a crucial issue to social stability and economic development.  
In  December  2006,  a  computer  virus  named  “Worm  Nimaya”  was  rapidly 
spreading  nationwide  in  China  at  the  speed  of  attacking  three  to  five  hundred 
thousand computer systems per day, and produced 700 new heterogeneous viruses in 
just two months. Until January 2007, over millions of personal computers had been 
attacked in China, and plenty of personal and commercial files had been damaged. 
The direct and indirect economic losses for it were out of calculation. Moreover, the 
horrible virus caused a serious panic. Many netizens and commercial organizations 
stopped using network in order to protect their computers from the virus so that some 
online communication was broken. Hereafter, network security organization and some 
anti-virus software companies were developing anti-virus software to fight off it. At 
the same time, police office was investigating its human factor with the help of 
                                                           
*   This research is supported by National Natural Science Foundation of China, project No. 
90924010. 
M. Zaman et al. (Eds.): CETS 2010, CCIS 113, pp. 1–22, 2010. 
© Springer-Verlag Berlin Heidelberg 2010