198,731 research outputs found

    User Acceptance of Electronic Commerce: Contributions from the Bled eConference

    Get PDF
    User acceptance of electronic commerce continues to be a popular topic at the Bled eConference. The paper reviews the past contributions of the conference in this specific area. The review deals with those studies that have an empirical and quantitative component, and those studies where the emphasis has been on testing theories of user acceptance. The paper establishes three phases in which Bled delegates have gradually extended generic user acceptance models to deal with issues of electronic commerce. The first phase (20012003) is one of theory application. The second phase (2004-2007) is one of theory extension. In the third phase, (2008-2011), Bled delegates move beyond traditional models and adopt alternative theoretical approaches. The review ends with three promising avenues for further research in electronic commerce

    Is a knowledge based value network an effective model for implementing e-government?

    Get PDF
    Is a knowledge based value network an effective model for implementing e-government? E-Government is a vision of how public sector organisations will govern, serve citizens, and interact with business partners, their employees, and other Government organisations. The “e” in e-Government represents a move to fully integrated, secure, on-demand accessible electronic Government that will: • improve integrated service delivery • provide universal citizen access • begin to enhance traditional Government structures and processes • support new Government products and services by relying on the emergence and convergence of new technologies • improve effectiveness Electronic commerce (e-commerce) has fundamentally changed the way business is being conducted and Government is rushing to catch up

    Online Consumer Protection from the Perspective of Jordanian Law

    Get PDF
    With the common use of electronic communication tools, electronic commerce became the phenomena of this era. Consumers are able finalize their transactions online, saving both time and effort. Creating electronic contracts require mutual assent between both parties to reach agreement. With the different types of electronic contracts, one might ask how much protection is needed to consumers who are being part of this contract. This paper will highlight the issue of consumer protection in Jordan. With the fact of high number of online users who might indeed get engaged in electronic contacts, how much protection does the current laws in Jordan offer their consumers? In order to answer this question this paper will define electronic contracts and consumers from the Jordanian perspective and then move on to highlight the common laws and regulations in the UK that protect consumers before answering the main question of this paper. With the high number of consumers conducting contracts electronically in Jordan, most of them are unaware of the legal consequences of their transactions. Having said that, the author believes that boosting confidence in electronic commerce in Jordan requires providing protection for consumers from unfair practices that could be carried online. Keywords: consumer protection, fairness, e-contracts, e-commerce, contractual term

    Cross-Cultural Influences on Global Electronic Commerce

    Get PDF
    This paper provides a framework for exploring cultural influences on consumer purchasing behavior in the special case of electronic commerce. The approach adopted in this paper borrows directly from at least two converging sources: the research in international consumer behavior, and the research in marketing issues in electronic commerce. By recognizing the cultural differences in global markets, the firm will be better positioned to satisfy the unique needs of international consumers. The globalization of the international marketplace, which will be facilitated by the emergence of electronic commerce as a new channel of transacting business will result in a move in the firm’s strategy away from niche marketing and towards more head to head competition. In order to survive in this competitive environment it will be essential for firms to have an in-depth understanding of international consumer behavior so that they can effectively cater to the unique tastes of the consumers of each individual culture and thereby gain a competitive advantage in the international marketplace. The managerial implications of this research are answers to questions such as how best can the firm exploit this new form of transacting business to maximize its leverage in the global marketplace and increase its market share? How should the firm position its products in the global electronic marketplace

    Heartland Payment Systems: lessons learned from a data breach

    Get PDF
    On August 13, 2009, the Payment Cards Center hosted a workshop examining the changing nature of data security in consumer electronic payments. The center invited the chairman and CEO of Heartland Payment Systems (HPS or Heartland), Robert (Bob) Carr, to lead this discussion and to share his experiences stemming from the data breach at his company in late 2008 and, as important, to discuss lessons learned as a result of this event. The former director of the Payment Cards Center, Peter Burns, who is acting as a senior payments advisor to HPS, also joined the discussion to outline Heartland's post-breach efforts aimed at improving information sharing and data security within the consumer payments industry. In conclusion, Carr introduced several technology solutions that are under discussion in payment security circles as ways to better secure payment card data as they move among the different parties in the card payment systems: end-to-end encryption, tokenization, and chip technology. While HPS has been very supportive of end-to-end encryption, each of these alternatives offers its own set of advantages and disadvantages.Payment systems ; Data protection ; Electronic commerce

    Recognizing the Importance of an Understanding of Autopoietic and Complexity Theories Within the Electronic Commerce Model for Competitive Advantage

    Get PDF
    Traditionally, management has viewed the organization as a very mechanistic, linear system characterized by a simple and predictable cause and effect. However, complexity theory brings to management an organic, nonlinear, and holistic way of viewing organizational systems. Within the business context in general and the electronic commerce model in specific, the selfproducing and self-organizing nature of the organization combined with the interaction between the autonomous agents of the system, produces emerging patterns and an intrinsic order that flies in the face of the traditional problem-solving techniques. The application of the autopoietic and complexity theories to the virtual systems that exist within the electronic commerce model can assist business management in understanding the nature of the unpredictable, dynamic forces continuously driving forward the dynamics of these New Economy systems. The focus of this research will center on: · identifying the interactive nature of complexity theory within the electronic commerce model;· understanding the virtual society of the electronic commerce model as being functionally differentiated into autonomous autopoietic subsystems, or “meaning worlds” (Teubner & Willke, 1997), which can influence each other only indirectly; · accepting that functional differentiation, complexity theory, and autopoiesis mean it is no longer possible to direct and control these virtual social systems to move along the traditionally predetermined paths through interventions from external systems, such as external entities, business alliances, internal customers, or external customers; · appreciating the creative dynamism unleashed through complexity theory and the autopoietic processes in which the new hyper-extended communication acts to produce new artificial structures within the electronic commerce model that have dynamics of their own and can self-reproduce and self-regulate through autopoiesis; · being aware that these social autopoietics do not give primacy either to the individual or the collective within the virtual social system, but to the emergent new hyper-extended communication system which results from discourses involving the dynamic systemic structures and real people. Hypothesized outcomes of this research also include a better understanding of the emergent behavior of the systems within the electronic commerce model. The application of the autopoietic and complexity theories to these virtual systems can be positively related to organizational success that comes from the networked combinations of freely acting agents. Competitive advantages can be maximized and organizational missions can be achieved though an understanding and application of complexity and autopoietic theories

    Mechanism design for single leader Stackelberg problems and application to procurement auction design

    Get PDF
    In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent, known as the leader, makes the first move and this action is followed by the actions of the remaining agents, which are known as the followers. These problems are also known as single leader rest follower (SLRF) problems. There are many examples of such problems in the areas of electronic commerce, supply chain management, manufacturing systems, distributed computing, transportation networks, and multiagent systems. The game induced among the agents for these problems is a Bayesian Stackelberg game, which is more general than a Bayesian game. For this reason, classical mechanism design, which is based on Bayesian games, cannot be applied as is for solving SLRF mechanism design problems. In this paper, we extend classical mechanism design theory to the specific setting of SLRF problems. As a significant application of the theory developed, we explore two examples from the domain of electronic commerce-first-price and second-price electronic procurement auctions with reserve prices. Using an SLRF model for these auctions, we derive certain key results using the SLRF mechanism design framework developed in this paper. The theory developed has many promising applications in modeling and solving emerging game theoretic problems in engineering

    The Role of E-Commerce Systems for the Construction Industry

    Get PDF
    The use of e-commerce systems has increased substantially in the past five years, and now a number of companies in the construction industry have joined consortiums to develop e-commerce portals. These new systems encourage companies to review the way in which existing processes are undertaken, and often re-engineered process are introduced. It is important to understand the difference between the terms e-commerce and e-business, e-commerce refers to buying and seeling transactions which use some24The Australian Journal of Construction Economics & Building Page (iii)form of electronic media, while e-business suggests a review and redefinition of business models linked to the greater use of IT. It is argued that the greater use of the internet and e-commerce, and the move towards the integration of applications will compel construction companies to re-engineer processes and introduce e-commerce systems. A series of business drivers and business designs are discussed in later sections of this paper.There are many benefits associated with the introduction of e-commerce systems, and these include increases in GDP, real wages and employment together with reduced transaction costs. It has been forecast that there will be more than 400,000 companies in Australia using e-commerce systems by 2005 (NOIE 2000). For the construction industry, the benefits will include increased project efficiencies, communications, control, and reduced design and construction times as well as reduced costs (BuildOnline 2000). In the past year, two local consortiums have been formed to develop and offer e-commerce applications, and this heightens the need for all companies to reflect on how they might engage with these new technologies

    Introducing a Localized Cross-Border E-Commerce Model, case: Iran B2B E-Commerce

    Get PDF
    By the explosive growth of B2B e-commerce transactions in international supply chains and the rapid increase of business documents in Iran’s cross-border trading, effective management of trade processes over borders is vital in B2B e-commerce systems. Structure of the localized model in this paper is based on three major layers of a B2B e-commerce infrastructure, which are messaging layer, business process layer and content layer.  For each of these layers proper standards and solutions are chosen due to Iran’s e-commerce requirements. As it is needed to move smoothly towards electronic documents in Iran, UNedocs standard is suggested to support the contents of both paper and electronic documents. The verification of the suggested model is done by presenting a four phase scenario through case study method.  The localized model in this paper tries to make a strategic view of business documents exchange in trade processes, and getting closer to the key target of regional single windows establishment in global trade e-supply chains

    Computer Crimes: A Case Study of What Malaysia Can Learn from Others?

    Get PDF
    Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real threat. Legislation criminalizing intrusion and destruction activities directed at computers are needed. Malaysia joined the list of countries with computer-specific legislation with the enactment of its Computer Crime Act 1997 (CCA). This paper focuses on hacking as a criminal act, and compares the Malaysian CCA with legislation from other countries. The current computer crime situation in Malaysia is looked at and exposes the difficulties and obstacles Malaysia faces in enforcing the Act. The paper concludes with recommendations for Malaysia in terms of policy, practices and penalties
    • …
    corecore