2,089 research outputs found

    Social commerce activities – a taxonomy

    Get PDF
    In recent years businesses large and small have jumped on the Social Commerce bandwagon, all in the hope of utilising social media services to facilitate various Social Commerce activities. Given the growing influence of social media on social, economic and political events globally, the rise in business interest in Social Commerce is not unexpected. This paper examines the Social Commerce activities of several Fortune 500 businesses. It analyses and categorises how businesses utilise social media to interact with customers, trading partners, employees and other important stakeholders. Two important themes have emerged, firstly, businesses utilise social media services mostly to facilitate Pre- and Post-transactional type Social Commerce activities such as marketing and customer support. Opportunities exist for businesses to leverage social media for transactional type Social Commerce activities such as purchase, payment, and order-fulfilment. Secondly, the business use of social media seems haphazard. Stakeholders wishing to succeed in Social Commerce will have to reformulate their strategies to take advantage of how users behave on social media services and opportunities to draw synergy from utilising an assortment of social media services. The paper contributes to theory by developing a taxonomy of Social Commerce activities. It contributes to practice by highlighting opportunities to engage in Social Commerce activities, in particular, to leverage opportunities from implementing Transactional Social Commerce.<br /

    Security Issues within Virtual Worlds such as Second Life

    Get PDF
    The advancement in Internet and bandwidth has resulted in a number of new applications to be developed. An area of advancement has been in the development of virtual worlds, where people can interact together via virtual characters. Virtual World systems have been so complex that virtual lives can be lived, including all aspect of life such as education, commerce, social activities etc. Not surprisingly, the problems that exist in the real world such as theft, fraud, vandalism and terrorism, also exist in the virtual worlds. The more developed these virtual worlds become the greater the breaches of security will be in the virtual as well as the real world.This paper explores and categorises several security issues within the Virtual World of Second Life. It contributes to practice and research by emphasising the importance of security awareness for businesses and the general public in Virtual Worlds

    B2B Electronic Markets: A Conceptual Model for Analyzing the Sources of Business Value

    Get PDF
    This paper describes research supporting the development of a conceptual model for understanding the sources of business value of Business-to-Business (B2B) Electronic Markets. Based on six case studies and an analysis of current literature, Aggregation, Matching, and Integration emerged as the three key sources of business value. The framework provides a structured and systematic approach for understanding various B2B Electronic Market models, and helps develop strategies to leverage these sources of business value

    Can qualitative content analysis be adapted for use by social informaticians to study social media discourse? A position paper

    Get PDF
    IS research on social media (e.g. Facebook, Twitter, blogs) has so far used user surveys or quantitative content analysis (QuantCA) research methods almost exclusively. There is considerable potential for social informatics research to use qualitative content analysis (QualCA) to explore social media discourse and its appropriation by people &ldquo;in situ&rdquo;. This paper presents the position that QualCA offers researchers the flexibility to identify emergent research questions and units of analysis which they may not have preconceived. This is likely to be important for IS research because of the infancy and evolving nature of social media discourse. The paper puts forward suggestions on how the QualCA research method can be adapted for this type of research.<br /

    Helping business leverage web 2.0 to generate social capital

    Full text link
    Businesses large and small are keen to leverage Web 2.0 applications to interact with customers, suppliers and other stakeholders. Whilst some have achieved success, others are still struggling to understand the opportunities and threats associated with using Web 2.0 in business. This paper discusses the development of a conceptual framework to help businesses understand how they could leverage Web 2.0 applications to generate social capital. The proposed framework helps businesses (i) identify opportunities to leverage the strengths and features of various Web 2.0 applications, and (ii) develop business strategies for Web 2.0. As a positional paper, it contributes to theory by proposing a systematic and structured approach for understanding how social capital is created, captured, distributed, and consumed online.<br /

    Helping Businesses Leverage Web 2.0 to Generate Social Capital

    Get PDF
    Businesses large and small are keen to leverage Web 2.0 applications to interact with customers, suppliers and other stakeholders. Whilst some have achieved success, others are still struggling to understand the opportunities and threats associated with using Web 2.0 in business. This paper discusses the development of a conceptual framework to help businesses understand how they could leverage Web 2.0 applications to generate social capital. The proposed framework helps businesses (i) identify opportunities to leverage the strengths and features of various Web 2.0 applications, and (ii) develop business strategies for Web 2.0. As a positional paper, it contributes to theory by proposing a systematic and structured approach for understanding how social capital is created, captured, distributed, and consumed online

    α2 Integrin-Dependent Suppression of Pancreatic Adenocarcinoma Cell Invasion Involves Ectodomain Regulation of Kallikrein-Related Peptidase-5

    Get PDF
    Previous reports demonstrate that the α2-integrin (α2) mediates pancreatic ductal adenocarcinoma (PDAC) cell interactions with collagens. We found that while well-differentiated cells use α2 exclusively to adhere and migrate on collagenI, poorly differentiated PDAC cells demonstrate reduced reliance on, or complete loss of, α2. Since well-differentiated PDAC lines exhibit reduced in vitro invasion and α2-blockade suppressed invasion of well-differentiated lines exclusively, we hypothesized that α2 may suppress the malignant phenotype in PDAC. Accordingly, ectopic expression of α2 retarded in vitro invasion and maintenance on collagenI exacerbated this effect. Affymetrix profiling revealed that kallikrein-related peptidase-5 (KLK5) was specifically upregulated by α2, and reduced α2 and KLK5 expression was observed in poorly differentiated PDAC cells in situ. Accordingly, well-differentiated PDAC lines express KLK5, and KLK5 blockade increased the invasion of KLK5-positive lines. The α2-cytoplasmic domain was dispensable for these effects, demonstrating that the α2-ectodomain and KLK5 coordinately regulate a less invasive phenotype in PDAC
    corecore