122 research outputs found
The Demand for Stored Value Payment Instruments
Due to their functionality, stored value purses based on smart card technology are prominent candidates for being the dominant medium of exchange for micropayments. However, the overall prospects of these payment systems are yet ambiguous, both from the perspective of practice and monetary theory, because their potential to substitute for cash is still largely unknown. As a contribution to the field, a model is proposed founding the potential utilization of stored value cards in microeconomic calculus. As a result, the model provides insight into the crucial parameters determining usage. Moreover, the model suggests that issuers should maximize demand and profits by offering interest payments or insurance against loss.Electronic Money, Stored Value, Digital Payment Instruments, Monetary Theory, Demand for Money
Risk in Electronic Commerce: It Does Matter, But Not Equally for all Companies
Based on the Electronic Commerce EnquĂȘte 97/98, one of the largest empirical investigations on business-tobusiness electronic commerce issues in the German-speaking world (n\u3e900), companiesâ perception of risk factors in electronic commerce is revealed using multivariate statistical procedures. As a contribution to the field this paper presents the integral relationships and the importance of technical and nontechnical dimensions of risk related to electronic commerce in various industry segments. Furthermore, using the innovative Limit Conjoint Analysis the potential of Electronic Commerce in terms of market share under alternative risk scenarios is calculated. Companies belonging to different industry segments were asked to rate eight different electronic commerce scenarios with respect to their attitude and willingness to engage in electronic commerce transactions via the World Wide Web. The scenarios incorporate different levels of associated risks capturing the fundamental trade-off between opportunity for profit making versus danger of loss. Using Conjoint Analysis the relative importance of risk factors including psychological risk, financial risk, and technical/legal risk was then quantified. In most cases technical/legal risk over financial and psychological risk is of most importance to the vast majority of firms. In order to group the responding companies for further investigation we used the variable âindustry segmentâ. Applying t-tests, main findings support the hypothesis that there are significant industry segment specific differences of risk perception. The potential of electronic commerce in terms of market share is roughly 40 times bigger if technical/legal risk is low compared to a scenario where technical/legal risk is high. In conclusion, risk matters in varying degrees for all companies and contributes largely to the potential of electronic commerce, thus helping us to better differentiate and assess the importance of risk in electronic commerce
Consumer-Oriented Tech Mining: Integrating the Consumer Perspective into Organizational Technology Intelligence - The Case of Autonomous Driving
To avoid missing technological opportunities and to counteract risks, organizations have to scan and monitor developments in the external environment through a structured process of technology intelligence. Previous approaches in tech miningâthe application of text mining for technology intelligence âhave primarily focused on the elicitation of technical or legal information from web, patent, or research databases. However, knowledge of consumersâ needs, fears, and hopes is a prerequisite for the success of an emerging technology in the marketplace. Thus, we claim that technology intelligence needs to also consider consumersâ technology perceptions. Hence, we propose a novel and comprehensive approach to collect user-generated content from the web and apply text mining to derive consumer perceptions. In doing so, we align with an established tech-mining process. This paper illustrates our approach on the emerging technology of autonomous driving and provides an initial indication of concurrent validity
Application Portfolio ManagementâAn Integrated Framework and a Software Tool Evaluation Approach
Despite the growing number of organizations that have lost track of their application landscape and have suffered from a sharp increase in application portfolio complexity, a comprehensive and systematic approach to Application Portfolio Management (APM) still appears far from being adopted. To move the adoption process along, this paper develops a comprehensive framework assimilating and extending previous research and presents an APM process comprising data collection, analysis, decision-making, and optimization phases. This paper also presents an approach for evaluating software tools for APM and identifies which software tool families are best able to provide support for specific purposes. With this integrated conceptual guideline for APM and its translation into a model for measuring appropriate practical support, this paper not only allows for a move more deeply into the research area but also offers advice for both researchers and practitioners
Designing a Methodology for Marketing Intelligence Systems â The Case of Brand Image Diagnostics
In situations of information overload and complexity, consumers consult their existing knowledge regarding brands as a guide in consumption decisions. This knowledge manifests as brand association networks (BANs) in consumersâ minds and reflects what the consumer thinks of when being confronted with a brand stimulus. BANs therefore characterize a brandâs image that determines consumersâ attitudes and behaviour. BANs serve as diagnostic instruments to explain a brandâs success or failure and to plan or control marketing activities. Traditionally, BANs are elicited directly from consumers utilizing survey-based instruments. However, in a dynamic and interactive environment, user-generated content (UGC) is increasingly relevant for a brandâs image and thus should be exploited for the elicitation of BANs. However, established elicitation instruments either follow another elicitation paradigm (i.e. surveys or interviews), or are unable to cope with volume, velocity, and variety of UGC as a big data source (e.g. content analysis). Hence, exploiting UGC for BAN elicitation requires the development of new, computer-supported instruments. Following a design science research approach, we contribute a novel methodology as our artefact to extract BANs from UGC using text-mining and net- work analysis. We evaluate our solution and demonstrate its utility for brand management on a study of automotive brands
Social Information Systems: Review, Framework, and Research Agenda
In this research-in-progress, we review the literature on an emerging new type of information systems: social information systems. Social information systems are information systems based on social technologies and open collaboration. The paper provides categories defining social information systems and a framework for existing and future research in this field of study
Valuation of online social networks - An economic model and its application using the case of Xing.com
Ubiquitous information technologies like RFID allow for immediate, extensive and fine-grained
capture of real world information. Scalable and efficient networks for exchange of this vast amount of
information amongst companies are crucial for the economic exploitation of benefits of ubiquitous
information technologies. Existing networks bear several limitations like risks of single-point-offailures or bottlenecks, unequally distributed power and burdens as well as inflexibility through
stringent structures and formats. In particular there is a need for improving the scalability of solutions
and ensuring autonomy of network participants. In this paper we introduce a Peer-to-Peer-based
architecture for exchanging distributed information, which are shared among participants of a supply
chain facilitated with ubiquitous information technologies. This architecture builds on the wellestablished EPCglobal standards, but can be implemented as an autonomous network. Unlike other
architectures it does not need central coordination mechanisms, because it is based on self-organizing
Peer-to-Peer protocols. We argue that our architecture supports business processes especially of
small and medium-sized enterprises better than other architectures. We provide a discussion about
requirements for solutions and a simulation-based analysis of the proposed architecture
How is Information Systems Research Justified? An Analysis of Justifications Given by Authors
This study analyses how Information Systems (IS) research is justified by authors. We assess how authors justify their research endeavors based on published IS research papers. We use justification theory [11], which along with later work, identifies seven different value systems (i.e., orders of worth) as co-existing in society, as a conceptual foundation. We qualitatively and quantitatively analyze the justifications in published IS research papers. We provide a breakdown of the justifications used in IS research. Our findings show that the importance and relevance of IS research is predominantly justified in reference to three orders of worth (market, industrial and civic values) at the neglect of the four other orders of worth (domestic, inspiration, fame, green) that equally exist in society. We provide suggestions to stimulate a broader consideration of research topics in relation to these other orders of worth and hence alternative sources of justification for authors
- âŠ