3,468 research outputs found

    Security Issues in Mobile Payment from the Customer Viewpoint

    Get PDF
    The perception of mobile payment procedures’ security by the customer is one major factor for the market breakthrough of the according systems. In this paper we examine security issues in mobile payment from the viewpoint of customers. Based on theoretical research we analyze empirical data from the MP2 mobile payment study with 8295 respondents in order to develop a set of dimensions, categories and aspects. The results do have a scientific as well as a practical impact: They provide a basis for the selection of appropriate indicators for further empirical studies. Furthermore they can serve as a guideline for mobile payment service providers in order to prevent security concerns through appropriate design and communication of payment procedures and to convince customers of the security of their mobile procedures by meeting concerns in informative advertising.

    AMCIS 2002 Panels and Workshops IV: Principles of Effective E-Commerce Curriculum Development

    Get PDF
    The need to teach e-commerce (EC) is a significant issue for academia. Regardless of the downturn in dot.com startups, many organizations are still very much aware of the need for effective EC strategies and applications. In response to industry demand, some universities across the globe have launched EC programs. Others implemented EC electives at undergraduate and postgraduate levels. This paper presents suggestions for teaching EC. Findings from a study of EC offerings by the top fifty UK business schools are presented. A wide disparity exists across schools in terms of EC offerings, including a significant number of schools that do not offer EC modules or degrees. This paper offers and discusses the following recommendations on how to implement an EC curriculum effectively and economically in a business school: 1. EC should be taught throughout the business school curriculum as part of traditional classes followed by EC specialty classes and practicum courses. It is essential that multiple departments invest in offering EC curriculum. 2. Foundation classes should be taught before EC specialty classes. 3. EC survey courses should not be taught early in the curriculum because they are difficulty to staff and maintain. 4. EC classes should be a balance of each discipline\u27s fundamental principles, along with some newer EC theories and applications. 5. Principles taught in Information Systems classes can have broader application when patterns are taught that span many technologies instead of teaching only specific applications. 6. It is important to leverage alumni and industry volunteers to help provide EC lecture series and for input on EC curriculum and teaching

    Globalization and E-Commerce II: Environment and Policy in Germany

    Get PDF
    Due to its economic power as the largest economy in Europe and third largest in the world, Germany inevitably will play an important role in e-commerce. After the improvement and diffusion of high-speed Internet access, like ISDN or DSL, Germany enjoys more ISDN telephone lines than any country; also the highest DSL per capita ratio, in Europe. Germany includes a large, highly educated and relatively wealthy population, which is an important prerequisite for successful e-commerce activities. Due to foreign language skills in the German population (every pupil is required to learn English; a large number know basic French or Spanish, too), the language barrier to using international Web sites is small. Moreover, the German education system puts increasing emphasis on information and communications technology (ICT) skills. Invention activity in some areas of ICT shows signs of improvement. Starting from a low level, patent activity in mobile communications and the Internet grew faster in Germany than anywhere else in Europe. This growth could be viewed as an early indicator of strengthening the mobile e-commerce sector in Germany and may be interpreted as an important effort in catching-up with overall e-commerce development. More than 80% of the GNP is created in mid-sized companies (Mittelstand), which traditionally are considered as more flexible and innovative than large enterprises. The majority of these small and medium-sized enterprises (SMEs) can access the Internet. Looking at Internet penetration, German SMEs are at the top together with SMEs in Scandinavian countries. The central position of Germany as a hub to Europe together with the excellent public and private transport infrastructure is a competitive advantage to attract foreign investments. Germany follows the innovation model be the best imitator of successful developments and within this course exploits the competitive advantage achievable through integration. After e-commerce technologies proved successful, Germany caught up in developing its relevant infrastructure and is now gaining momentum

    Upaya Pengembangan USAha Kecil Dan Menengah (UKM) Dengan Memanfaatkan E-commerce

    Get PDF
    Usaha Kecil dan Menengah (UKM) merupakan salah satu bidang yang memberikan kontribusi yang signifikan dalam memacu pertumbuhan ekonomi Indonesia. Hal ini dikarenakan daya serap UKM terhadap tenaga kerja yang sangat besar dan dekat dengan rakyat kecil. Tetapi UKM yang ada di Indonesia masih menghadapi berbagai masalah antara lain masalah promosi, pemasaran dan penjualan penjaualan produk yang dihasilkan. Seiring perkembangan teknologi informasi dan komunikasi, maka ia juga telah dimanfaatkan untuk pemasaran dan penjualan produk-produk melalui dunia maya yang sering disebut E-commerce. Penjualan dan pemasaran produk melalui dunia maya mempunyai banyak keuntungan, yaitu cakupan yang luas, tidak mengenal ruang dan waktu, dapat dilakukan kapan saja dan dimana saja. Oleh karena itu E-commerce patut dicoba untuk membantu mengembangkan UKM yang ada di Indonesia

    Security issues in mobile payment from the customer viewpoint

    Get PDF
    The perception of mobile payment procedures’ security by the customer is one major factor for the market breakthrough of the according systems. In this paper we examine security issues in mobile payment from the viewpoint of customers. Based on theoretical research we analyze empirical data from the MP2 mobile payment study with 8295 respondents in order to develop a set of dimensions, categories and aspects. The results do have a scientific as well as a practical impact: They provide a basis for the selection of appropriate indicators for further empirical studies. Furthermore they can serve as a guideline for mobile payment service providers in order to prevent security concerns through appropriate design and communication of payment procedures and to convince customers of the security of their mobile procedures by meeting concerns in informative advertising

    Proceedings of the International Workshop on Enterprise Interoperability (IWEI 2008)

    Get PDF

    Copyright and shared networking technologies

    Get PDF
    PhDThe technological zeitgeist has transformed the social-cultural, legal and commercial aspects of society today. Networking technologies comprise one of the most influential factors in this. Although this transformation can be discounted as a mere historical phenomenon dating back to the advent of the printing press, empirical data concerning usage of these technologies shows that there has been a radical shift in the ability to control the dissemination of copyright works. Networking technologies allow, in an unprecedented manner, user-initiated activities including perfect replications, instantaneous dissemination, and abundant storage. They are immune to technological attempts to dismantle them, and impervious to legal attempts to control and harness them. They affect a global audience, which in turn, undermine at negligible costs, the legal and business parameters of copyright owners. The problem is whether it will now be possible to establish a copyright framework which balances the interests of the following groups: (a) copyright owners in their control of the dissemination of their works; (b) authors demanding remuneration for the exploitation of their works; (c) users wishing to consume works with clear immunity guidelines using networked technologies; (d) technologists striving to continuously innovate without legal and policy restrictions. Copyright law is not a mechanism for preserving the status quo or a particular business model. It is, as suggested above, a reflection of the needs and interests of authors, copyright owners, entertainment industries, users and technologists. This thesis examines whether the balance between these actors can be achieved and, if so, how it can be implemented within international, regional and national copyright laws. It finds that a balance can be struck; but that this balance should be aligned along three key concepts: user integrity; technological innovation; and authors‘ and owners‘ remuneration. The proposal is that the optimal method for achieving this triptych is the introduction and global implementation of a reasonable and unobtrusive system of remuneration
    • …
    corecore