Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Society for e-Business Studies
Journal Basic Information
Journal DOI :
Society for e-Business Studies
Editor in Chief :
Volume & Issues
Volume 10, Issue 4 - Nov 2005
Volume 10, Issue 3 - Aug 2005
Volume 10, Issue 2 - May 2005
Volume 10, Issue 1 - Feb 2005
Selecting the target year
Validation of ebXML BPSS Instances Based on Semantic Constraints
Kim, Hyoung-Do ; Kim, Jong-Woo ;
The Journal of Society for e-Business Studies, volume 10, issue 4, 2005, Pages 1~18
In ebXML, a representative framework for electronic commerce, a BPS (Business Process Specification) should be finally defined as an instance of XML-version BPSS for the configuration of B2B (Business to Business) runtime systems . In order to define the instance more complete and consistent, it is required to validate all the semantic constraints on the instance . Due to the limitations of XML Schema constructs, however, current XML-version BPSS fails to specify formal semantic constraints completely. This paper presents how to find, express and reuse BPSS semantic constraints that could not be explicitly defined in the XML-version BPSS. The method facilitates the validation of XML-version BPSS instances easily with some useful guides for fixing violations of semantic constraints. Furthermore, B2B business processes can be standardized and applied more efficiently and effectively.
An Application of the Semantic Web for e-Business Integration
Chang Tai-Woo ; Shin Kitae ; Park Jinwoo ;
The Journal of Society for e-Business Studies, volume 10, issue 4, 2005, Pages 19~33
In this study, we propose a methodology of mating it easy to integrate the heterogeneous and distributed information of e-Business environments with the semantic web components , knowledge representation, ontology and agents. It is based on a collaborative interoperable environment, which should be constructed by meta-modeling and employing agents , and the syntactic/semantic integration. We adopt OWL(Web Ontology Language) to specify ontology in a layered architecture for each agent to use, which is based on the IRDS (Information Resource Dictionary Standard) framework. And we give an illustrative example using the terms from PSL(Process Specification Language)-ontology. By defining, managing and sharing resources and business-processes on the proposed framework, it could be possible to get rid of the cause of redundancy and inconsistency.
A Case Study on e-Collaboration of Federal Structure
Park, Jae-Chon ; Yang, Je-Min ;
The Journal of Society for e-Business Studies, volume 10, issue 4, 2005, Pages 35~52
Collaboration among companies is being emphasized, as e-business is expanding its domain. Generally the collaboration it discussed on the basis of business and technology. In reality, however, collaboration is determined by competitive power of corporation. From this point of view, this study examines a type of collaboration which is effective when the parties concerned have equal footings.
Web Services-Adaptable Privacy-Aware Digital Rights Management Architecture
Song, You-Jin ; Lee, Dong-Hyeok ;
The Journal of Society for e-Business Studies, volume 10, issue 4, 2005, Pages 53~81
Current DRM system has limitation in protection of user's privacy Therefore, many troubles are expected in service providing if it comes into the ubiquitous times of context-aware environment. HKUST Proposed a watermark-based web service DRM system. However, the relevant study does not consider ubiquitous environment and cannot provide service that considered a context. And privacy protection of a user is impossible. On the other hand, Netherlands Phillips laboratory indicated a privacy problem of a DRM system and they proposed an alternative method about this. However, in relevant study, a Sniffing/Replay attack is possible if communicated authentication information are exposed between a user and device. We designed web services adaptable privacy-aware DRM architecture which supplements these disadvantages. Our architecture can secure user authentication mechanism for sniffing/Replay attack and keep anonymity and protect privacy Therefore , we can implement the privacy-aware considered web service DRM system in Context-Aware environment.
The Effects of Perception Toward Cyber Identity on Loyalty and Purchase Intention
Kim Su-Yeon ; Hwang Hyun-Seok ;
The Journal of Society for e-Business Studies, volume 10, issue 4, 2005, Pages 83~100
In this paper, we investigate the concept of cyber identity built in cyberspace and analyze the effects of general perception toward cyber identity on loyalty and purchase intent. Cyber identity is classified into two types: personal and social cyber identity, and has five components. Avatars and online gaming capability make up personal cyber identity while online communities and instant messenger count as social cyber identity. We regard blog personalities as having both personal and social characteristics. In our survey, we conclude that internet users want to purchase cyber items such as avatars, online game items, and wallpaper pictures to enhance their cyber identities. Based on the survey results , we derive five factors comprising personal cyber identity and social cyber identity using factor analysis and analyze overall effects of cyber identity on loyalty and purchase intention using Structural Equation Model.