HOME JOURNALS CONTACT

Information Technology Journal

Year: 2013 | Volume: 12 | Issue: 6 | Page No.: 1152-1159
DOI: 10.3923/itj.2013.1152.1159
Progressive Service Value Network Design for Bi-lateral Service Applications
Dian-Hui Chu, Zhong-Jie Wang, Xiao-Fei Xu and Zhe-Ming Lu

Abstract: In service industries, a dominant morphology of service applications is a bi-lateral Resource Integration Service Pattern (called BIRIS), in which the broker is responsible for aggregating distributed service resources into a whole and providing it to customers. The innovation of such a service was based on the innovation of its Service Value Network (SVN) which determined the effectiveness and efficiency of value co-production and delivery to service participants to a large extent. This study presented a progressive service value network design scheme for bi-lateral service scenarios. It consisted of four steps. The first step was the initial SVN identification. The second step was the Virtualized Service Resource (VSR) identification and its lifecycle design. The third step was the importation of enablers and the final step was the selection of brokers. Detailed process for each step was elaborately described and analyzed.

Fulltext PDF Fulltext HTML

How to cite this article
Dian-Hui Chu, Zhong-Jie Wang, Xiao-Fei Xu and Zhe-Ming Lu, 2013. Progressive Service Value Network Design for Bi-lateral Service Applications. Information Technology Journal, 12: 1152-1159.

Keywords: Bi-lateral services, service value network, service enabler, service broker, virtualized service resource and bi-lateral resource integration service

INTRODUCTION

A third-party broker based service pattern, called Bi-Lateral Resource Integration Service (BIRIS) (Wang and Xu, 2009), is a prevalent and dominant morphology in current service applications. In BIRIS, a large number of customers and providers are aggregated by a service broker, providers register their available services to the broker and customers submit their requests to the broker, then the broker acts as an intermediary between both sides by selecting proper services from one or multiple providers to fulfil the customer’s demands. The advantage of BIRIS is that the cost of discovering services (Zhang et al., 2009) and establishing relations between customers and providers can be reduced, the complexity of service collaborations is lowered and the difficulty of monitoring and assuring service quality and credit (Wong, 2009) is released.

The essence of a service is the “value” and the essence of a service system is the ability to assist all participants in co-producing values (Spohrer et al., 2007; Lee and Lee, 2011). The service value is defined as the benefit or improvement that a participant gains from the service. There are tangible and intangible values (Allee, 2002). The former are defined as “all exchanges of goods, services or revenue”, while the latter are mainly defined as “knowledge and benefit”. In spite of the types of values, they are achieved by service behaviors and their interactions, the utilization of service resources, the exchange of information and their compositions (Corchado et al., 2012; Wang et al., 2011). In order to help customers and providers better achieve their expected values, another type of participant, called service enabler, is imported into complex services (Basole and Rouse, 2008). A customer receives the expected values from the service by paying money or another economic cost, a provider receives economic benefits from the service by providing its resources and behaviors to help customers achieve their goals and an enabler helps customers or providers perform a better service.

According to the behavior that an enabler exhibits, there are three types of enablers (Wang et al., 2010): (1) Customer-oriented Enabler (CE) that helps customers to receive the services more easily and conveniently. (2) Provider-oriented Front-stage Enabler (PFE) that helps service providers interact with customers more easily during the front stage of service encounters. (3) Provider-oriented Back-stage Enabler (PBE) that provides support for service providers in the back stage and does not interact directly with customers.

Along with the increasing number of participants (customers, providers and enablers) in a specific service, the interaction and value exchanges between them become increasingly complicated. Service Value Network (SVN) (Allee, 2000) is widely used as a tool to describe the value co-production relationships. An SVN defines a directed network topology in which the nodes are service participants, the directed edges indicate the value production and value recipients and values are attached to corresponding edges. The corresponding service functional models like business processes are utilized to describe the functions that support the implementation of SVN (Saleem et al., 2012).

In one service, there is at least one customer and one provider and zero or multiple enablers. Aiming at a specific BIRIS-oriented service, the most important enabler is the “broker”; besides, there might be a variety of other enablers. Adopting different strategies to import enablers and select a broker, thereby leading to different forms of SVN, has a significant impact on the effectiveness and efficiency of value production and delivery to the customers and providers (Wang et al., 2010, Wang et al., 2012).

This study presented a progressive service value network design process consisting of four steps. The first step was to identify the end participants (customers and providers) and clarify their value expectations, then establish the initial Service Value Network SVN(1). The second step was to identify the Virtualized Service Resources (VSR) and analyze their lifecycle. The third step was to import a set of necessary enablers and form SVN(2). The final step was to identify the broker and form SVN(3).

INITIAL SVN IDENTIFICATION

This step is to identify the end customers and providers along with their value expectations.

The initial SVN is defined as SVN(1) = <C∪P, G, V>, where C and P are the sets of customers and providers, respectively, G is the set of value exchange relationships and V is the set of exchanged values. ∀g∈G, g = <v, ai, aj>, where v∈V is the exchanged value between ai and aj, with ai the value producer and aj the value receiver and ai,aj∈C∪P. ∀ak∈C∪P, Pvk = {v|∀g∈G, g = <v, al, ak>} is the set of values that ak expects to obtain from the service.

A single expected value vi∈PVk of the customer C is exhibited exteriorly as a Virtualized Service Resource, denoted as VSRi = <{rij, Aij}, Di>, where there are multiple concrete resources rij attached with a set of attributes Aij (e.g., quantity and priority) and the Di are the dependencies between different rij. Here, rij may be specific information, behaviour, physical resources, etc. Only when VSRi has been successfully produced and transferred to its receiver, has vi been successfully co-produced and transferred.

In SVN(1), however, there are no enablers or brokers. It does not conform to the BIRIS pattern but it is merely the initial state of a service, i.e., end customers and end providers interact with each other directly without any help from others.

VSR IDENTIFICATION AND ITS LIFECYCLE DESIGN

In this step, the designer analyzes the VSRs identified in the previous step, examining each phase in their lifecycle to ascertain whether there are any deficiencies. The results will facilitate the improvement and optimization of the initial SVN(1) in the next two steps. Two types of lifecycle are used: (1) SR-LC: the lifecycle of a concrete service resource; (2)VSR-LC: the lifecycle of a VSR.

First, the SR-LC is considered. Suppose a resource ‘r’ is provided by ‘p’ and a customer ‘c’ requests it, then ‘r’s’ typical lifecycle is shown in Fig. 1.

The service provider first manufactures r himself or procures r from another resource manufacturer and then publicizes r’s information to potential customers. The customer submits a query and obtains r’s information and then raises a request to use it. The provider accepts the reservation and both sides reach a consensus on the SLA of the usage of r by negotiation. Further, the provider configures the reserved r based on the customer’s personalized demand. In the service process, both sides co-use the resource and co-govern its usage. Thereafter, the customer pays for the resource and the provider receipts the money. No matter whether r is in use or not, the provider should self-govern and maintain r to keep it in a sound condition.

The VSR-LC gets more complicated. When a customer requests the VSR, there are two possible approaches: (1) Following the process of the SR-LC, ‘c’ requests each ‘ri’ contained in the VSR separately, then aggregates them as a VSR. This indicates that (a) c submits a request and negotiates with multiple providers multiple times and (b) c is himself responsible for the governance and payment of multiple resources during the service process. This approach is complex and is actually not the focus of BIRIS.

Fig. 1: Lifecycle of a concrete service resource (SR-LC)

Fig. 2: Lifecycle of VSR (VSR-LC)

(2) There is a broker ‘b’ that is responsible for collecting all the resources and aggregating them as an integrated VSR, which is then provided for c. This lifecycle, as shown in Fig. 2, is the actual approach adopted in BIRIS.

In the VSR-LC, for each service provider pi, some of the phases in the SR-LC are followed, i.e., first, manufacture or procure the resource ri, then publicize it. But now it is not the customer but the broker b, that collects the information of the distributed {ri} (i.e., CollectSR) and aggregates some of them to generate a VSR (i.e., GenerateVSR), the information of which is then publicized to potential customers (i.e., PublicizeVSR). A customer may make a query on the VSR owned by the broker (i.e., QueryVSR), make a corresponding reservation (i.e., RequestVSR and ReserveVSR) and reach a consensus on the SLA by negotiation with the broker (i.e., negotiate). Then, the broker, playing the role of the customer in the SR-LC, sends requests to the providers whose resources have been included in the reserved VSR and makes a reservation for the individual resources {ri}.Next, the configuration of the VSR and {ri} is considered. The broker configures the VSR according to the customer’s personalized demand (i.e., ConfigureVSR). The configuration of the VSR is decomposed into each ri’s configuration, which is sent to the corresponding service providers who then configure their own resources themselves (i.e., configure). Subsequently, the broker schedules the VSR and starts the service process, in which the customer and all the providers use the VSR for value co-production, while the broker governs its usage (i.e., GovernVSR). Based on the statistical data from the governance records, the broker may update the setup and configuration of the VSR for better usage in the future (i.e., UpdateVSR).

Finally, the three parties together make the settlement; specifically, the customer pays the broker, the broker receipts the money and then pays each individual provider (i.e., Receipt&Pay) according to the previously agreed price in the SLA and finally, the providers receipt their own income.

Similarly, each provider self-governs and maintains {ri}, keeping it in a sound condition during the whole lifecycle. A set of domain-independent QoS metrics is attached to each phase of the SR-LC and VSR-LC, including time, cost, availability, reliability, etc. As there are no any enablers in the SVN(1), almost all the phases have obvious defects in terms of these QoS. This is the reason why the next two steps are necessary.

IMPORTING ENABLERS INTO SVN(1)

The objective of this step is to import one or more enablers into the SVN(1) to form SVN(2) = {C, P, E, G, V}, where E is the set of new imported enablers.

Starting with the SVN(1), each of its value exchange relations is analyzed. If there are potential deficiencies, it is modified by iteratively applying one of the three basic operations (i.e., outsourcing, mashup and third-party payment) to import new enablers. This process is repeated until there are no further possible improvements.

The starting point of this phase is SVN(1) and the end point is the SVN(2) and between these phases there may be a set of intermediary SVNs (denoted as SVN(M1), SVN(M2), …) during the continual improvement. For the sake of brevity, here two neighboring SVNs (SVN(i) and SVN(i+1)) are aimed to introduce the method for transforming SVN(i) into SVN(i+1).

In SVN(i), each exchanged value may be exteriorly exhibited in the form of a VSR. Together with the iterative exploitation of the four operations, a VSR is gradually divided into multiple finer-grained VSRs or concrete resources. The decomposition is carried out with gradually imported new enablers that help the original participants provide or use the service resources better. The lifecycle of these VSRs/SRs are also possibly divided and allocated to new enablers, i.e., every new enabler is responsible for one or several phases of the VSR/SR’s lifecycle. This step is a process whereby the VSRs are broken into parts in a top-down manner. Considering the objective of importing new enablers in this step, the deficiencies in the QoS in each phase of the VSR are eliminated or decreased, thereby greatly enhancing the value to both the customer and provider.

Service Outsourcing (OTS): In the proposed context, outsourcing (OTS) is defined as the operation whereby one or many phases of a VSR/SR’s lifecycle are separated out from the responsibility of an original participant p in the SVN(1) to a new enabler e rendering assistance to p. This operation is beneficial to both p and e as it enables p to reduce costs and increase quality in non core areas of the business and to utilize his expertise and competencies to the maximum in his core business, thereby enhancing his competitiveness (Kedia and Lahiri, 2007).

Suppose in SVN (i) there is a value exchange relation g = <v, ai, aj>, where the VSR that satisfies v is VSR = < {rk, wk}, Dk>, ai is the provider of {rk} and the producer of v and aj is the resource user of {rk} and the receiver of v. From the viewpoint of a resource rk∈VSR, there are four types of OTS operations:

OTS(1): This operation takes place from ai’s perspective. After OTS (1) is applied, ai still owns rk, but one or more management or usage-oriented phases of rk (publicize, reserve, negotiate, configure, self-govern, co-govern, maintain, receipt) are transferred from ai to a new PFE al that exercises the management right of rk on behalf of ai. g is subsequently divided into two value exchange relations gil = <v1, ai, al> and glj = <v2, al, aj>.
OTS(2): This operation takes place from ai’s perspective. After OTS (2) is applied, ai no longer owns rk; instead rk is owned by and provided to aj by a new PFE al. This operation splits the original VSR (provided by ai) into two parts ({rk} and VSR\{rk}) provided by al and ai, respectively. g is transformed into glj = <v2, al, aj> and gij = <v2, ai, aj>.
OTS(3): This operation also takes place from ai’s perspective. After OTS(3) is applied, ai no longer owns rk; instead rk is owned by a new enabler al and ai rents rk from al and again provides the usage to aj and the management and provision right belongs to ai. Now al is regarded as a PBE and g is divided into two value exchange relations gli = <v1, al, ai> and gij = <v2, ai, aj>.
OTS(4): This operation takes place from aj’s perspective. After OTS(4) is applied, one or many usage-oriented phases (query, request, negotiate, co-govern, pay) of rk are not dedicated to aj himself, but outsourced to a new Customer-oriented Enabler (CE) al and g is divided into two value exchange relations gil = <v1, ai, al>, glj = <v2, al, aj>.

Fig. 3: Four types of Service Outsourcing (OTS) Operations

The above definitions are based on a single resource rk in a VSR. In fact, the OTS operations may be applied to multiple resources in a VSR individually or simultaneously. Aspects of these OTS operations are depicted in Fig. 3.

Figure 4 gives an example in which four OTS operations are applied jointly.

Fig. 4: Complex service outsourcing example

The original VSR includes four resources {r1, r2, r3, r4} and these are outsourced to new enablers PBE, PFE1, PFE2 and CE, respectively as follows: (1) Applying OTS(1) to r1: P owns r1 but PFE1 manages r1 and provides it to C. (2) Applying OTS(2) to r2: PFE2 owns, manages and provides r2 to C. (3) Applying OTS(3) to r3: PBE owns r3 and provides the usage right to P and P manages r3 and provides it to C. (4) Applying OTS(4) to r4: P owns and manages r4 but CE receives r4 from P and provides it to C.

Service mashup (MSP): Mashup (MSP) is defined as the operation in which new enablers are imported into the original SVN to aggregate resources from multiple providers as an integrated VSR to be provided to customers, or to solicit numerous customers for providers (Zou and Pavlovski, 2007). This operation aims at improving the cost of the query/reservation/usage of service resources to both sides.

There are two types of MSP operations, i.e., MSP(1) and MSP(2). The MSP(1) operation takes place from the customer’s perspective. It aggregates resources of either the same or different types, i.e., (1) If a VSR that a customer expects to receive consists of multiple resources {r1, ..., rn} that are provided by different providers, a new enabler al is imported to aggregate all or part of {r1,..., rn} into a VSR and provide it to the customer; (2) If there are numerous service providers that could provide the same resource rk expected by a customer, a new enabler al is imported to collect and aggregate the information on the multiple available rk, provide it to the customer and assist him in selecting an appropriate one. Suppose there are n value exchange relations g1, g2,…, gn between a customer aj and n providers ai1, ai2, …, ain. Then, after the enabler is imported, they are transformed into <v1, al, aj> and a set of <vk, aik, al> as shown in Fig. 5a. al plays the roles of both CE and PFE. On the other hand, the MSP(2) operation takes place from the provider’s perspective.

Fig. 5(a-b): Service Mashup (MSP) operation

Fig. 6: Third-Party Payment (TPP) operation

When a resource rk is publicized to attract widespread requests from customers, an enabler al intended to appeal to customers, is imported to assist the provider increase the utilization of rk and the scale of the market. This is shown in Fig. 5b.

Third-Party Payment (TPP): Suppose there exist g1=<v1, ai, aj> and g2 = <v2, aj, ai> in which v2 is a kind of economic value, referred to as the money that aj pays to ai. Third-Party Payment (TPP) (Li and Zhang, 2008) is defined as the operation whereby a new enabler al is imported and forms new value exchange relations g1 = <v1, ai, aj>, g2 = <v2, al, ai> and g3 = <v2', aj, al>, as shown in Fig. 6.

In reality, such an operation is usually employed in scenarios where a third-party participant attempts to gain large-scale “attention” (also called propagation effect, advertisement effect, or market effect). In Fig. 6, P owns and provides a concrete resource to C and the service relations between P and C are considered to be a propagation route for the attention to PFE and numerous customers (C) use the resources from P freely and as an auxiliary effect their “attention” to PFE accumulates, forming the advertisement effect that PFE wishes to achieve. This is the reason why PFE is motivated to pay the resource usage fee, also called the “advertisement fee” to P on behalf of C.

Summary: Here the proposed views are reasserted that the above three basic operations aim to improve the QoS of the SR/VSR lifecycle:

OTS: By high-degree socialization (i.e., breaking up the entire VSR into parts), service providers can enhance their specialization of resource affordance and efficiency/quality of resource management, while customers can use the resources with little cost
MSP: Through high-degree aggregation (i.e., merging parts into a whole), customers can easily obtain a coarse-grained VSR at once, while providers can also obtain the attention of more customers
TPP: Through the importation of third-party stakeholders, the customers’ cost to use the resources is reduced and the market scale is increased

Table 1: Improvement in four types of operations on SR-LC phases
OTS(1) is the first type of outsourcing operation defined in the sub-section of Service Outsourcing (OTS), OTS(2) is the second type of outsourcing operation defined in the sub-section of Service Outsourcing (OTS), OTS(3) is the third type of outsourcing operation defined in the sub-section of Service Outsourcing (OTS), OTS(4) is the fourth type of outsourcing operation in the sub-section of Service Outsourcing (OTS), MSP(1) is the first type of mashup operation defined in the sub-section of Service Mashup (MSP), MSP(2) is the second type of outsourcing operation defined in the sub-section of Service Mashup (MSP), TPP is the third-party payment operation defined in the sub-section of Third-Party Payment (TPP), The up arrow ↑ means that the performance of the corresponding phase on the left of the row could be improved by the operation on the top of the column

In Table 1 the symbol “↑” is used to indicate which phases of the SR/VSR-LC are improved by each of the above operations. In most cases, the selection and application of these operations on a specific SVN(i) depends on the experience and intuitive insights of the service designers. Specific decision-making methods are required to make the improvement process more objective and quantitative. This is one of the future work.

SELECTION OF BROKERS FROM ENABLERS

The objective of this step is to select one or several enablers from C∪P∪E as brokers (B) of BIRIS, thereby producing a new value network SVN(3) = {C, P, E, B, G, V}.

Fig. 7: Position that a broker holds in SVN(3)

The position that a broker holds in SVN(3) is shown in Fig. 7. It must be a bi-lateral (connected to both the customer and provider sides) oriented enabler that looks like being imported by the combination of MSP(1) and MSP(2).

The sole decision-making problem during the transformation from SVN(2) to SVN(3) is: which participant(s) should be selected as the broker(s) so that the total performance is optimum?

First, which types of service participants may play the broker’s role are considered. From Fig. 7, it is known that a broker must face up to and connect customers and providers directly or indirectly. Accordingly, of the five types of service participants (C, P, PFE, PBE and CE), only CE and PFE are qualified as brokers (e.g., CE brokers C and PFE/P, PFE brokers C/CE and P), P is qualified as a broker only when it has the corresponding PBE (i.e., it brokers C/CE/PFE and PBE), while C and PBE are unqualified because they are only connected to one side of the service (e.g., C only connects to CE and PBE only connects to P). The analysis results are shown in Table 2.

Secondly, if there are multiple CE/PFE/P in the SVN(2), which would be the best broker? Aiming at one participant p in SVN(2), the following three empirical principles are used to speculate whether it is suitable to act as a broker:

Location of p in SVN(2). The broker should be located in a relatively central position, serving as a connecting hub between the participants on the customer- and provider-oriented sides. The number of participants on both sides should be relatively equal and balanced
p’s market impact. The broker should have the largest impact on the other participants in the service; in other words, he is powerful enough to aggregate a large number of customers to use the service and persuade a large number of providers to publicize and share their resources on the platform
The criticality of resources or their lifecycle phases controlled by p. The broker should own or handle key phases of the SR/VSR, impacting most of the key QoS of the SR/VSR-LC at large

Table 2: Qualifications require to be a broker
C: Customer, CE: Customer-oriented enabler, PFE: Provider-oriented Front-stage enabler, PBE: Provider-oriented Back-stage enabler, P: Provider

Fig. 8: Representative BIRIS-oriented SVN(3)

Once a common CE/PFE/P is promoted to be a broker, besides the original responsibilities it has in SVN(2), a set of extra fundamental functions concerning the VSR’s lifecycle are added, including distributed resource collection, VSR construction, VSR selection/scheduling/usage/feedback/governance/payment, etc.

There may be multiple brokers in a SVN (3) and these take the form of a hierarchically nested structure. In this case, there must be a dominant broker that divides the entire SVN into two halves, while in each half, there exist subordinate brokers and so on. After this step, a representative BIRIS-oriented SVN (3) has the form as illustrated in Fig. 8.

CONCLUSION

Concerning the prevailing bi-lateral resource integration service pattern (BIRIS) in present real-world service applications, the design of its value network is of great significance to the quality of value production and delivery between customers and providers. How to import new enablers and select a proper enabler to play the role of broker, is the core issue addressed in this study. A four steps progressive design process is presented, based on the optimization of Virtualized Service Resource (VSR) lifecycle and the iterative application of three pattern-oriented operations. This work will facilitate the effective innovation of fast-growing service-oriented enterprise information systems. Future work will concentrate on applying our framework to developing a real system and test the effectiveness of our framework in practical applications.

ACKNOWLEDGMENTS

This work is partially supported by the National Science Foundation of China (grant no. 61272187, 6103300, the National Science and Technology Support Program of China (grant no. 2012BAH10F00),Key Technologies R & D Program of Shandong Province (Nos. 2010GZX20126, 2010GGX10116 and 2011GGA10001), Science and technology projects in Jiangsu Province (Nos. BC2010107, CSRC1010 and ZXG201006). The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

REFERENCES

  • Wang, Z.J. and X.F. Xu, 2009. Bilateral resource integration service mode for value innovation. Comput. Integr. Manuf. Syst., 15: 2216-2225.
    Direct Link    


  • Zhang, Y., H. Huang, D. Yang and H. Zhang, 2009. A Hierarchical and Chord-based semantic service discovery system in the universal network. Int. J. Innovative Comput. Inform. Control, 5: 3745-3753.
    Direct Link    


  • Wong, D., 2009. From network management to service management-A challenge to telecom service providers. Int. J. Innovative Comput. Inform. Control, 5: 669-675.
    Direct Link    


  • Spohrer, J., P.P. Maglio, J. Bailey and D. Gruhl, 2007. Steps towards a science of service systems. IEEE Comput., 40: 71-77.
    CrossRef    Direct Link    


  • Lee, W.I. and C.L. Lee, 2011. An innovative information and relationship between service quality, customer value, customer satisfaction, and purchase intention. Int. J. Innovative Comput. Inform. Control, 7: 3571-3581.
    Direct Link    


  • Allee, V., 2002. A value network approach for modeling and measuring intangibles. Presented at Transparent Enterprise, Madrid, Spain. http://www.vernaallee.com/images/VAA-A-ValueNetworkApproach.pdf.


  • Corchado, J.M., D.I. Tapia and J. Bajo, 2012. A Multi-agent architecture for distributed services and applications. Int. J. Innovative Comput. Inform. Control, 8: 2453-2476.
    Direct Link    


  • Wang, J.B., Z.X. Cheng, L. Jing, K. Ota and M. Kansen, 2011. A Smart-gate based composition method to provide services by solving conflict using dynamic user priority and compromise policy. Int. J. Innovative Comput. Inform. Control, 7: 2987-3005.
    Direct Link    


  • Basole, R.C. and W.B. Rouse, 2008. Complexity of service value networks: Conceptualization and empirical investigation. IBM Syst. J., 47: 53-70.
    CrossRef    


  • Wang, Z.J., D.H. Chu and X.F. Xu, 2010. Value network based service choreography design and evolution. Proceedings of the IEEE 7th International Conference on e-Business Engineering, November 10-12, 2010, Shanghai, China, pp: 495-500.


  • Allee, V., 2000. Reconfiguring the value network. J. Bus. Strategy, 21: 36-39.
    CrossRef    Direct Link    


  • Saleem, M.Q., J. Jaafar and M.F. Hassan, 2012. Secure business process modeling of SOA applications using UML-SOA-SEC. Int. J. Innovative Comput. Inform. Control, 8: 2729-2746.
    Direct Link    


  • Kedia, B.L. and S. Lahiri, 2007. International outsourcing of services: A partnership model. J. Int. Manag., 13: 22-37.
    CrossRef    


  • Zou, J. and C.J. Pavlovski, 2007. Towards accountable enterprise mashup services. Proceedings of the 2007 International Conference on e-Business Engineering, October 24-October 26, 2007, Hong Kong, China, pp: 205-212.


  • Li, Y. and X. Zhang, 2008. The revenue model of online third-party payment based on game theory. Proceedings of the International Conference on Management of e-Commerce and e-Government, October 17-October 19, 2008, Jiangxi, China, pp: 349-353.


  • Wang, Z., Q. Wu and X. Xu, 2012. Value-added analysis of bi-lateral e-business services. Proceedings of the International Conference on e-Business Engineering, September 9-11, 2012, Hangzhou, China, pp: 185-192.

  • © Science Alert. All Rights Reserved