Digital Business: First International ICST Conference, by Veselin Rakocevic, Katarina Stanoevska-Slabeva, Luigi

By Veselin Rakocevic, Katarina Stanoevska-Slabeva, Luigi Telesca

This publication constitutes the lawsuits of the 1st foreign ICST convention, DigiBiz 2009, held in London, united kingdom, in June 2009.
The 19 contributions released during this quantity have been rigorously chosen from over 60 submitted works in a rigorous peer-reviewed process.
The papers handled matters like digital company alliances, organizational and coordination conception, version pushed companies, effective power administration, e-negotiations, destiny web markets and enterprise options, agent applied sciences, recommender for lively choice estimate, belief

Show description

Read Online or Download Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers (Lecture Notes of the Institute ... and Telecommunications Engineering) PDF

Best management information systems books

Outsourcing Management Information Systems

This publication balances the confident results of outsourcing, that have made it a well-liked administration method with the detrimental to supply a extra inclusive selection; it explores probability components that experience no longer but been greatly linked to this process. It specializes in the conceptual "what", "why", and "where" features of outsourcing in addition to the methodological "how" elements"

Design of Sustainable Product Life Cycles

Product existence cycle layout – producing sustainable product lifestyles cycles explains the significance of a holistic long term making plans and administration method of achieving a greatest product profit over the complete lifestyles cycle. The paradigm of considering in product existence cycles helps brands in shaping winning items.

Additional resources for Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers (Lecture Notes of the Institute ... and Telecommunications Engineering)

Sample text

Vmn (1) where m ≤ k. Analogously, we can construct a similar matrix, the opponent’s content matrix at step m, which contains the issues’ values of the offers received by the opponent. We denote such matrix as Wm , where m ≤ k. Note that these matrices contain also missing values. As long as we receive and make new offers, the matrices will increase row by row. 1 During the negotiation process, the user is able to collect a lot of information related to the opponent’s preferences analysing the content of the received offers.

K}. The shape function, given an item, returns an offer to send to the counterpart. Practically, it selects which features of an item to include in the offer. In the next Section we give a formal description of the item set and the offer set. Formally, let O be the offer set, for each user u ∈ U , we define the shape function as shapeu : T −→ O The like function, given an offer, return a label (answer) which is related to the evaluatioLet A = {0, ⊥, 1} be the set of all possible answers to an offer, for each user u ∈ U , we define the like function as likeu : O −→ A The like function is invoked every time we need to evaluate a new opponent’s offer; we emphasize that both the values of the issues and the presence or absence of some issues play a role in the definition of this function.

Content creation has to be kept highly flexible, allowing for usage in different scenarios without any restrictions beforehand. Likewise, semantic capabilities were appreciated, enabling reuse of content generated in different manners. Security aspects have been identified on different levels: (1) Identification, authentication and authorisation – providing controlled access to the platform and the services offered by third parties. (2) Digital signatures - supporting a fast setup and legal binding of actions in a provable/undeniable fashion.

Download PDF sample

Rated 4.67 of 5 – based on 29 votes