158 research outputs found

    Advantages of application of Electronic Commerce in procurement for the Armed Forces of Brazil and South Korea

    Get PDF
    This thesis examines the prospects for international implementation of E-Commerce (EC) in the contexts of the armed forces of Brazil and South Korea. It describes the functions, roles and infrastructure of EC technology. It weighs the advantages and disadvantages of E-Commerce. Particular attention is paid to legal issues, electronic funds transfer and on-line reverse auctions. An E-Commerce implementation plan is presented, benchmarked on the experience of the United States military in using EC to reduce costs and enhance readiness. This plan includes measures of organizational outcomes to evaluate the success of an EC implementation.http://archive.org/details/advantagesofppli10945100

    Getting Around to It: How Design Science Researchers Set Future Work Agendas

    Get PDF
    Background: There is a long tradition of writing about future work in research papers, and information systems design science research (IS DSR) is no exception. However, there is a lack of studies on (1) how IS DSR authors currently envision the next steps for their work and (2) guidelines to improve the communication of opportunities to accumulate knowledge. Method: This paper contributes to this topic, building on a systematic literature review of 123 IS DSR papers published between 2018 and 2022. Results: Design-oriented research requires the research team to decide which tasks to carry out immediately in building the future and which to postpone as research debt. The paper\u27s contribution is threefold. First, we propose a research debt lifecycle to support (1) project stakeholders, (2) IS DSR community, and (3) societies looking for better futures. Second, we discuss the anatomy of future work in recent IS DSR. Finally, we suggest guidelines to manage and report the next research steps. Conclusion: This paper presents a pioneering assessment of future work suggestions in the IS field, focusing on the design science research paradigm. Future work directions emerge from researchers\u27 choices during the IS DSR process that must be continuously managed

    The impact of data breaches on consumers’ attitudes and behaviors

    Get PDF
    There exists some amount of research regarding data breaches and how they affect consumers’ attitudes and behaviors. However, the amount of studies in this context is still low and more research is required. The research has mainly concentrated on the breached companies’ perspective and how the consumers’ attitudes and behaviors have changed due to the breaches. This thesis investigates how the knowledge of data breaches affects consumers’ attitudes and behaviors, and what kinds of attitudes and behaviors consumers have toward breached companies. The study is qualitative in nature and uses semi-structured interviews to gather data from 10 Finnish interviewees. The consumers’ attitudes and behaviors are affected by the knowledge of data breaches, especially due to concerns that the data breaches create. Furthermore, consumers’ attitudes and behaviors towards companies that have experienced a data breach vary depending on different reasons. The results are mixed whether the consumers would do business with a breached company, or sign-in a service that has experienced a breach. The thesis provides more evidence on how consumers are affected by the data breaches and why companies should pay attention to consumers’ data protection

    Please rate after riding : the impact of formal evaluation on consumers’ feedback

    Get PDF
    Advances in Information Technology along with changes in society have allowed for the emergence of collaborative services. The act of sharing among peers -in substitution to ownership- is a growing phenomenon with many successful companies having arisen in the last decade. Since this new economy works mostly on the basis of sharing among strangers, mechanisms for identifying good and ‘bad’ users have become a necessity. One popular tool is a mechanism that allows for mutual evaluation among platform users (peer-providers and peer- users) using reviews and/or ratings as forms of evaluation. However, often users will give a biased feedback or attenuate negative evaluations of their peers due to the nature of collaborative services, where interactions are more personal and social norms seem to exist. This represents a problem especially in situations where the service provided has a failure that goes unreported. Although collaborative services are growing in popularity, few studies have been carried out to investigate how pro-social norms are integrated into practices and interactions between peers. To examine factors leading to feedback bias and its boundary conditions, we conducted two scenario-based experiments online using the context of an on-demand transportation service. We compared feedback (in the form of rating and tip) in a formal type of evaluation to a control condition (i.e. informal). In Study 1, we find that feedback bias in a formal evaluation system can be explained by forgiveness. Furthermore, that the type of service failure directly impacts feedback bias with perceived quality compromised by the failure being a mediator for this effect. We also find tip to be a less biased form of feedback than ratings. In Study 2, we confirm results of Study 1, and investigate overall driver score as a boundary condition for the effect of type of evaluation on feedback. Results show that a high peer score leads to feedback bias in a formal type of evaluation. Additionally, we find anticipation of guilt to be another mediator for the effect of type of evaluation on feedback. Managerial implications and suggestions for further research are discussed

    The Wild East: Criminal Political Economies in South Asia

    Get PDF
    The Wild East bridges political economy and anthropology to examine a variety of il/legal economic sectors and businesses such as red sanders, coal, fire, oil, sand, air spectrum, land, water, real estate, procurement and industrial labour. The 11 case studies, based across India, Pakistan and Bangladesh, explore how state regulative law is often ignored and/or selectively manipulated. The emerging collective narrative shows the workings of regulated criminal economic systems where criminal formations, politicians, police, judges and bureaucrats are deeply intertwined. By pioneering the field-study of the politicisation of economic crime, and disrupting the wider literature on South Asia’s informal economy, The Wild East aims to influence future research agendas through its case for the study of mafia-enterprises and their engagement with governance in South Asia and outside. Its empirical and theoretical contribution to debates about economic crimes in democratic regimes will be of critical value to researchers in Economics, Anthropology, Sociology, Comparative Politics, Political Science and International Relations, Criminologists and Development Studies, as well as to those inside and outside academia interested in current affairs and the relationship between crime, politics and mafia enterprises

    THE INVESTIGATION OF THE FACTORS ASSOCIATING CONSUMERS’ TRUST IN E-COMMERCE ADOPTION

    Get PDF
    The success of electronic commerce significantly depends on providing security and privacy for its consumers’ sensitive personal information. Consumers’ lack of acceptance in electronic commerce adoption today is not merely due to the concerns on security and privacy of their personal information, but also lack of trust and reliability of web vendors. Consumers’ trust in online transactions is crucial for the continuous growth and development of electronic commerce. Since Business to Consumer (B2C) e-commerce requires the consumers to engage the technologies, the consumers face a variety of security risks. This study addressed the role of security, privacy and risk perceptions of consumers to shop online in order to establish a consensus among them. The findings provided reliability, factors analysis for the research variables and for each of the study’s research constructs, correlations as well as regression analyses for both non-online purchasers’ and online purchasers’ perspectives, and structural equation modeling (SEM) for overall model fit. The overall model was tested by AMOS 18.0 and the hypothesis, assumptions for SEM and descriptive statistics were analyzed by SPSS 12.0. The empirical results of the first study indicated that there were poor correlations existed between consumers’ perceived security and consumers’ trust as well as between consumers’ perceived privacy and consumers’ trust regarding e-commerce transactions. However, the construct of perceived privacy manifested itself primarily through perceived security and trustworthiness of web vendors. While trustworthiness of web vendors was a critical factor in explaining consumers’ trust to adopt ecommerce, it was important to pay attention to the consumers’ risk concerns on ecommerce transactions. It was found that economic incentives and institutional trust had no impact on consumers’ perceived risk. Findings from the second study indicated that perceived privacy was still to be the slight concern for consumers’ trust in e-commerce transactions, though poor vi i relationships or associations existed between perceived security and consumers’ trust, between trustworthiness of web vendors and consumers’ trust, and between perceived risk and consumers’ trust. The findings also showed that the construct of perceived privacy manifested itself primarily through perceived security and trustworthiness of web vendors. It was found that though economic incentives influenced a consumers’ perceived risk in online transactions, institutional trust had no impact on consumers’ perceived risk. Overall findings suggested that consumers’ perceived risk influenced their trust in e-commerce transactions, while the construct of perceived privacy manifested itself primarily through perceived security as well as trustworthiness of web vendors. In addition, though economic incentives had no impact on consumers’ perceived risk, institutional trust influenced a consumers’ perceived risk in online transactions. The findings also suggested that economic incentives and institutional trust had relationships or associations with consumers’ perceived privacy. The findings from this research showed that consumers’ perceived security and perceived privacy were not mainly concerned to their trust in e-commerce transactions though consumers’ perceived security and perceived privacy might slightly influence on the trustworthiness of web vendors in dealing with online store sites abroad. Furthermore, consumers’ perceptions on the trustworthiness of web vendors were also related to their perceived risks and the concern about privacy was also addressed to perceived risks. Index terms: Perceived security; perceived privacy; perceived risk; trust; consumers’ behaviour; SE

    The Wild East

    Get PDF
    The Wild East bridges political economy and anthropology to examine a variety of il/legal economic sectors and businesses such as red sanders, coal, fire, oil, sand, air spectrum, land, water, real estate, procurement and industrial labour. The 11 case studies, based across India, Pakistan and Bangladesh, explore how state regulative law is often ignored and/or selectively manipulated. The emerging collective narrative shows the workings of regulated criminal economic systems where criminal formations, politicians, police, judges and bureaucrats are deeply intertwined. By pioneering the field-study of the politicisation of economic crime, and disrupting the wider literature on South Asia’s informal economy, The Wild East aims to influence future research agendas through its case for the study of mafia-enterprises and their engagement with governance in South Asia and outside. Its empirical and theoretical contribution to debates about economic crimes in democratic regimes will be of critical value to researchers in Economics, Anthropology, Sociology, Comparative Politics, Political Science and International Relations, Criminologists and Development Studies, as well as to those inside and outside academia interested in current affairs and the relationship between crime, politics and mafia enterprises

    Online Dispute Resolution for Consumers in the European Union

    Get PDF
    E-commerce offers immense challenges to traditional dispute resolution methods, as it entails parties often located in different parts of the world making contracts with each other at the click of a mouse. The use of traditional litigation for disputes arising in this forum is often inconvenient, impractical, time-consuming and expensive due to the low value of the transactions and the physical distance between the parties. Thus modern legal systems face a crucial choice: either to adopt traditional dispute resolution methods that have served the legal systems well for hundreds of years or to find new methods which are better suited to a world not anchored in territorial borders. Online Dispute Resolution (ODR), originally an off-shoot of Alternative Dispute Resolution (ADR), takes advantage of the speed and convenience of the Internet, becoming the best, and often the only option for enhancing consumer redress and strengthening their trust in e-commerce. This book provides an in-depth account of the potential of ODR for European consumers, offering a comprehensive and up to date analysis of the development of ODR. It considers the current expansion of ODR and evaluates the challenges posed in its growth. The book proposes the creation of legal standards to close the gap between the potential of ODR services and their actual use, arguing that ODR, if it is to realise its full potential in the resolution of e-commerce disputes and in the enforcement of consumer rights, must be grounded firmly on a European regulatory model. Introduction 1. Consumer Protection and Access to Justice in the E-Commerce Era: A European Perspective 2. Online Dispute Resolution as a Consumer Redress Strategy 3. Consumer Adjudicative Processes Supported by ICT: Court Processes and Arbitration 4. Online Mediation for Consumers: The Way Forward 5. The Need for a Legal Framework to Develop Consumer ODR in the E

    Bankrupting DoS Attackers

    Full text link
    To defend against denial-of-service (DoS) attacks, we employ a technique called resource burning (RB). RB is the verifiable expenditure of a resource, such as computational power, required from clients before receiving service from the server. To the best of our knowledge, we present the first DoS defense algorithms where the algorithmic cost -- the cost to both the server and the honest clients -- is bounded as a function of the attacker's cost. We model an omniscient, Byzantine attacker, and a server with access to an estimator that estimates the number of jobs from honest clients in any time interval. We examine two communication models: an idealized zero-latency model and a partially synchronous model. Notably, our algorithms for both models have asymptotically lower costs than the attacker's, as the attacker's costs grow large. Both algorithms use a simple rule to set required RB fees per job. We assume no prior knowledge of the number of jobs, the adversary's costs, or even the estimator's accuracy. However, these quantities parameterize the algorithms' costs. We also prove a lower bound on the cost of any randomized algorithm. This lower bound shows that our algorithms achieve asymptotically tight costs as the number of jobs grows unbounded, whenever the estimator output is accurate to within a constant factor
    • …
    corecore