Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P6 pot

10 420 0
Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P6 pot

Đang tải... (xem toàn văn)

Thông tin tài liệu

l Cybercrime Business organizations and consumers face major economic damages and increased threats when the underlying information infrastructure is targeted or made vulnerable by unethical, illegal Internet activi- WLHV&\EHUFULPHLVEHFRPLQJPRUHZLGHVSUHDGDQGDWLPHO\UHYLHZRIH[LVWLQJDSSURDFKHVWR¿JKWLQJ various forms of cybercrime is vital for the growth of e-business. Some of the cybercrimes include QHWVSLRQDJHWKHIWRIFRQ¿GHQWLDOLQIRUPDWLRQHWKHIWFUHGLWFDUGIUDXGIUDXGXOHQWLQWHUQHWEDQNLQJ sites, cyber-terrorism, cyber-piracy, and viruses. The characteristics of cybercriminals, cybercrime victims, and law enforcement agencies have a re- inforcing effect on each other, leading to a vicious circle of cybercrime (Kshetri, 2006). Approaches to ¿JKWLQJF\EHUFULPHDUHOHJDORUJDQL]DWLRQDODQGWHFKQLFDO*LYHQWKHGLYHUVLW\RIFXOWXUDODQGEXVLQHVV practices in different regions of the world, business organizations and law enforcement agencies need to develop global cybercrime prevention and detection programs standards and a comprehensive ethics policy. As the global nature of e-business accelerates, it will be also of great importance to promote common ethical standards and practices across different countries on the Internet. MANAGERIAL IMPACT OF ELECTRONIC BUSINESS This section discusses e-business strategies and value creation opportunities. E-Business Strategy 7KHGLJLWDOHFRQRP\SUHVHQWHGQXPHURXVRSSRUWXQLWLHVDQGFKDOOHQJHVIRU¿UPVOHDGLQJWRWKHHPHU- gence of new business models, innovative technologies, strategies, and management practices (Thomson, 2006). As the e-business environment becomes more complex economically, socially, politically, and OHJDOO\LWLVLPSHUDWLYHIRU¿UPVWRGHYHORSHEXVLQHVVVWUDWHJLHVWKDWFRXQWHUWKHFRPSOH[LW\LQWKHLU HQYLURQPHQW)XUWKHUPRUHLQWKHFXUUHQWJOREDOSROLF\ODQGVFDSHIHZ¿UPVFDQDIIRUGWRLJQRUHJOREDO policy frontiers, and therefore need to proactively employ theories and methods integrating policy with market and technology issues (Jarvenppa & Tiller, 1999). Developing a sound e-strategy should be based on the enterprise plan, business strategy, and enter- prise information technology plan. Firms need to understand failure factors as well as success factors to counteract the forces that discourage the growth of e-business. A number of strategy development models have been suggested to formulate e-strategy including SWOT (strengths, weaknesses, opportunities, WKUHDWVDQDO\VLV0F&DUWK\¶VIRXUPDUNHWLQJPL[PRGHODQG3RUWHU¶V¿YHFRPSHWLWLYHIRUFHVPRGHO )LYHHVVHQWLDOVWHSVIRUIRUPXODWLQJHFRPPHUFHEXVLQHVVPRGHOVDQGVWUDWHJLHVLQFOXGHUHGH¿QHWKH competitive advantage; rethink business strategy; re-examine traditional business and revenue models, re-engineer the corporation and Web site; and re-invent customer service (Lee, 2001). Realization of RSHUDWLRQDODQGVWUDWHJLFEHQH¿WVZDVIRXQGWREHFRQWLQJHQWRQHIIHFWLYHDVVLPLODWLRQRIHEXVLQHVV innovation, top management championship, strategic investment rationale, and extent of coordination (Chatterjee et al., 2002). Value Creation Opportunities 7KH YDOXH FUHDWLRQ SRWHQWLDO RI HEXVLQHVVHV KLQJHV RQ IRXU LQWHUGHSHQGHQW GLPHQVLRQV HI¿FLHQF\ complementarities, lock-in, and novelty (Amit and Zott, 2001). To explain the value creation potential li of e-business, an integration of the received theoretical perspectives on value creation is needed and a ¿UP¶VEXVLQHVVPRGHOLVDQLPSRUWDQWORFXVRILQQRYDWLRQDQGDFUXFLDOVRXUFHRIYDOXHFUHDWLRQIRUWKH ¿UPDQGLWVVXSSOLHUVSDUWQHUVDQGFXVWRPHUV .LFNXODQG*XQGU\H[DPLQHGWKHLQÀXHQFHRIPDQDJHPHQWGLYHUVLW\DQGFUHDWLYLW\RQRS- portunity assessment for e-commerce organizations, and on innovative internal and external managerial relationships and practices. Opportunity assessment for e-commerce organizations mediates the effects RIPDQDJHULDOGLYHUVLW\DQGFUHDWLYLW\LQÀXHQFLQJWKHDGRSWLRQRILQQRYDWLYHSUDFWLFHVWKDWIRFXVRQ employee relationships, external networks, and new products and services. The role of technological opportunism in the context of e-business adoption was studied to under- VWDQGZK\VRPH¿UPVDGRSWUDGLFDOWHFKQRORJLHVWRFKDQJHWKHLUEXVLQHVVPRGHOVZKLOHRWKHU¿UPVDUH reluctant or unable to do so (Srinivasan et al., 2002). Technological opportunism is a capability that RUJDQL]DWLRQVFDQGHYHORSE\WDNLQJVSHFL¿FDFWLRQVVXFKDVIRFXVLQJRQWKHIXWXUHWRSPDQDJHPHQW advocating new technologies, and by becoming more of an adhocracy culture and less of a hierarchy FXOWXUH7KHVWXG\VXJJHVWVWKDWWHFKQRORJLFDORSSRUWXQLVPRIIHUVDVLJQL¿FDQWLQFUHPHQWDOH[SODQDWLRQ of technology adoption over and above those offered by existing constructs. CRITICAL ISSUES IN ELECTRONIC BUSINESS This section discusses privacy and security issues and channel coordination issues. Privacy and Security Issues Online privacy policies typically include an organization’s practices on customers’ data collection, access, disclosure, and disposal. Consumers refer to website privacy policies to decide on the data pro- vision, search activities, and purchasing decisions. Due to technological, managerial, and legal issues of privacy and security, corporate online privacy and security have been a subject of in-depth study LQFOXGLQJSULYDF\SROLFLHVVHFXULW\WUXVWDQGHFRPPHUFHDGRSWLRQ<HHDQG.RUED$VKUD¿ Kuilboer, 2005 Gould & Zhao, 2006). Privacy and security concerns are the number one reason online users are not purchasing over the Web, since consumers are concerned about the potential for fraud and the amount of personal information required to complete business transactions. Privacy issues will become more important, as corporate marketing functions incorporate more web applications into their marketing tool portfolio. For example, web personalization, one-to-one marketing, mass customization, and web mining cannot be developed effectively without the privacy issues resolved between marketers and customers. However, there is a notable discrepancy between what privacy policies DUHFXUUHQWO\VWDWLQJDQGZKDWXVHUVGHHPPRVWVLJQL¿FDQW(DUSHWDO7KHZLOOLQJQHVVWRSURYLGH information to Web merchants increased as the level of privacy guaranteed by the statements increased, and the level of privacy promised by the statements interacted with respondents’ prior familiarity with policy statements (Meinert et al., 2006). More recently, the values of two types of privacy assurance (privacy statements and privacy seals) were investigated (Hui et al., 2007). Findings include: (1) the existence of a privacy statement induced more subjects to disclose their personal information but that RIDSULYDF\VHDOGLGQRWPRQHWDU\LQFHQWLYHKDGDSRVLWLYHLQÀXHQFHRQGLVFORVXUH 6HFXULW\LVRQHRIWKHPDLQGHWHUPLQDQWVIRUFRQVXPHUWUXVWDQG¿UPV¶PDUNHWYDOXHLQWKHHEXVL- QHVVHQYLURQPHQW7KHUHLVVLJQL¿FDQWFRQFHUQDPRQJFRQVXPHUVUHJDUGLQJWKH¿QDQFLDOVHFXULW\RI their online purchasing activities. An awareness of the security technologies may help consumers and businesses to build trust in e-business (Furnell & Karweni, 1999). A number of technical protocols and lii methods have been proposed to resolve security issues. To enhance security, many e-commerce web sites provide secure private channels over the Internet. The Secure Sockets Layer (SSL) protocol is the most widely used security protocol. Role-based access control (RBAC) is a preferred method for security PDQDJHPHQWGXHWRÀH[LELOLW\RIDVVLJQLQJDFFHVVSULYLOHJHVWRUROHVUDWKHUWKDQWRLQGLYLGXDOXVHUV)RU e-business and other cooperative computing environments, access control to shared resources should allow users to automatically change roles under different contexts. An object-oriented organizational PRGHO2UJDQL]DWLRQ0RGHOLQJDQG0DQDJHPHQW200ZDVSUHVHQWHGWRVXSSRUWG\QDPLFUROHGH¿QL- tion and role resolution in e-business applications (Cheng, 2000). Announcing an Internet security breach is inversely related to the market value of the announcing ¿UP&DYXVRJOXHWDO7KHEUHDFKHG¿UPVLQWKHVWXG\ORVWRQDYHUDJHSHUFHQWRIWKHLU market value within two days of the announcement. The security breaches transpired to security devel- opers. The market value of the security developers is positively related to the announcement of security EUHDFKHVE\RWKHU¿UPV7KHVHFXULW\GHYHORSHUVLQWKHVDPSOHUHDOL]HGDQDYHUDJHDEQRUPDOUHWXUQRI 1.36 percent during the two-day period after the announcement. The study reveals that the cost of the VHFXULW\EUHDFKHVLVYHU\KLJKIRUWKHEUHDFKHG¿UPVDQGLQYHVWRUV Channel Coordination Issues At click and mortar organizations, internal channel coordination is a critical issue to marketing strat- HJ\VLQFHWKHDGGLWLRQRIDQRQOLQHVDOHVFKDQQHOPD\FRQÀLFWZLWKRWKHUH[LVWLQJFKDQQHOVZLWKLQWKH VDPH¿UP0XOOH/DQNHQDX:DUULQJWRQHWDO0DNLQJSURGXFWVDQGVHUYLFHVDYDLODEOH to customers through multiple channels can provide increased levels of customer choice and sales op- portunity. As the online sales channel establishes itself as a strategic sales channel, managers are forced to pay more attention to channel management to deal with a variety of challenging issues. These issues LQFOXGHHVWDEOLVKLQJWKHUROHRIHFRPPHUFHLQWKHPXOWLFKDQQHOVWUXFWXUH¿QGLQJDQRSWLPDOFKDQQHO mix, creating synergies across channels, building strategic alliances, creating sustainable competitive DGYDQWDJHVPDQDJLQJPRUHFRPSOH[VXSSO\FKDLQVGHDOLQJZLWKFRQÀLFWDQGSURYLGLQJWKHOHDGHUVKLS necessary to attain well integrated multiple channels (Rosenbloom, 2007). Manufacturers use Web to directly sell products and services to consumers. These direct marketers DUHRIWHQERWKDVXSSOLHUWRDQGDGLUHFWFRPSHWLWRURIH[LVWLQJUHWDLOHUVZKLFKFDQUHVXOWLQLQWHU¿UP FKDQQHOFRQÀLFW7VD\DQG$JUDZDOLGHQWL¿HGDQXPEHURIFRXQWHULQWXLWLYHVWUXFWXUDOSURSHUWLHV useful for the design of effective channel coordination between manufacturers and retailers. Some of the analytical results showed that a reseller channel is not necessarily detrimental to the reseller, given the associated adjustment in the manufacturer’s pricing, changes in wholesale pricing, payment to the reseller a commission for diverting customers toward the direct channel, or concession of the demand IXO¿OOPHQWIXQFWLRQHQWLUHO\WRWKHUHVHOOHU A mobile channel is supported by the mobile devices and services and has been popular as a channel for both sales and marketing communication. Nysveen et al. (2005) studied the effects of mobile chan- nel additions on consumer-brand relationship dimensions. Surveys of three different brands revealed positive effects of a mobile channel addition (SMS/MMS) on brand satisfaction, direct relationship LQYHVWPHQWVLQGLUHFWUHODWLRQVKLSLQYHVWPHQWVDQGPDLQFKDQQHOXVDJH7KH¿QGLQJVVXJJHVWHGWKDWWKH consumers’ direct relationship investment in the mobile services can lead to increased consumption at the brand’s main channel. liii EMERGING TRENDS IN ELECTRONIC BUSINESS 7KLVVHFWLRQLGHQWL¿HVIRXUHPHUJLQJWUHQGV:HEVHUYLFHVDQG6HPDQWLF:HE:HEYRLFHRYHU,3 (VoIP) and IP communications, and ubiquitous computing and u-commerce. Web Services and Semantic Web $FFRUGLQJWRWKH:RUOG:LGH:HE&RQVRUWLXP³:HEVHUYLFHVSURYLGHDVWDQGDUGPHDQVRILQWHU- operating between different software applications, running on a variety of platforms and/or frameworks. Web services can be combined in a loosely coupled way in order to accelerate application development and integration inside and outside the enterprise (Bose & Sugumaran, 2006). Programs providing simple services can interact with each other in order to deliver sophisticated added-value services. Extensible Markup Language (XML) plays a central role in the development of Web services by providing a data interchange format that is independent of programming languages and operating systems. The Web Services are based on a core set of enabling technologies, including XML, SOAP, WSDL, and 8'',ZKLFKUHÀHFWWKHZRUNRIUHVHDUFKHUVDQGFRQVXOWDQWVIURPDYDULHW\RIFRPSDQLHVDQGLQGXVWULHV Web services technologies are emerging as the platform that can universally standardize the communica- tion of applications for automating both the provider and consumer ends of e-business transactions. In order to connect systems, business partners, and customers cost-effectively, Web services let programs invoke requests to other programs over the Internet via open protocols and standards businesses. 'XHWRWKHVLJQL¿FDQWSRWHQWLDOEHQH¿WVPDQ\SRSXODU:HEVLWHVVXFKDV*RRJOHDQG$PD]RQFRP DUHERRVWLQJWKHLUWUDI¿FWKURXJK:HEVHUYLFHV6WDQGDUGVDQGWHFKQRORJLHVIRUPRGHOLQJHEXVLQHVV processes that use Web services could drive the costs down by achieving automated code generation, reuse, and interoperability (Selim et al., 2002). Web services have shown promising results such as greater development productivity gains and easier and faster integration with trading partners. However, despite the rapid development in the Web services area, many issues including security still remain to be resolved in the context of e-commerce (Misra et al., 2007; Yau et al., 2007). Search for appropriate Web services published in Universal Description, Discovery and Integration (UDDI) registries should be effective in terms of time and uniform in terms of interfaces. A number of search strategies for Web services have been suggested. Zhang et al. (2003) presented an XML-based 8'',VHDUFKHQJLQHWKDWSURYLGHVGHYHORSHUVZLWKVWDQGDUGLQWHUIDFHVIRUHI¿FLHQWO\LGHQWLI\LQJ:HE services information in the UDDI registries. The engine processes a search request comprising multiple queries, UDDI sources, search criteria, and aggregation operator. The UDDI Search Engine (AUSE) aggregates search results from different UDDI registries to enable easy B2B integration. A single Inter- net application can invoke many different Web services called composite Web services (Maamar et al., 2005). Because users’ expectations and requirements constantly change, it is important to include their preferences, such as quality-of-service and speed in the composition and provisioning of Web services. In particular, the adoption of loosely coupled and distributed services will cause trustworthiness problems. The degree of trustworthiness of all involved services in composite Web services need to be evaluated by analyzing past experiences (Yang et al., 2006). The Semantic Web has drawn attention from both industry and academia (Cannoy & Iyer, 2007; Joo et al., 2007). The semantic web is an evolving extension of the World Wide Web in which information and services on the web are rendered as means for computers and people to work in cooperation (Ber- ners-Lee et al., 2001). The semantic web comprises the standards and tools of XML, XML Schema, Resource Description Framework (RDF), RDF Schema, and Web Ontology Language (OWL). Using semantic web technologies for e-business tasks such as product search or content integration requires liv ontologies for products and services. Ontologies can be used to describe products and services so that DJHQWVFDQDGYHUWLVHDQGGLVFRYHUWKHPDFFRUGLQJWRDVHPDQWLFVSHFL¿FDWLRQRIIXQFWLRQDOLW\DVZHOODV other parameters such as cost, security, etc. (Trastour et al., 2003). The semantic web can make e-com- PHUFHLQWHUDFWLRQVPRUHH[SUHVVLYHDQGÀH[LEOHE\VWDQGDUGL]DWLRQRIRQWRORJLHVPHVVDJHFRQWHQWDQG message protocols (Li & Ling, 2007). . One important semantic web application area is Web services. Evidence shows that semantic web services are mandatory components of the semantic web, primarily because entities are more willing to expose functionality than data in business settings (Hepp, 2006). Semantic web services aim to describe and implement web services in order to make them more accessible to automated agents. Semantic web services can support a service description language that can be used to enable an intelligent agent to behave more like a human user in locating suitable Web services. 7RUHDOL]HWKHVHPDQWLFZHEQHZVWDQGDUGVIRUGH¿QLQJDQGXVLQJRQWRORJLHVDUHEHLQJGHYHORSHG DAML+OIL is an ontology language which consists of a rich set of primitives. If applications are to exchange semantic information, they will need to use common ontologies. One such ontology which has been designed for the purpose of describing web services is the DAML-S ontology written in DAML+OIL. Li and Horrocks (2004) introduced the concept of service matchmaking for e-commerce, assessed the requirements for a service description language and ontology, and argued that DAML+OIL DQG'$0/6IXO¿OOWKHVHUHTXLUHPHQWV While the development of Web services and semantic web has been impressive, numerous research RSSRUWXQLWLHVH[LVW)RUH[DPSOHVHPDQWLFZHEWHFKQRORJLHVFDQKHOS¿UPVWRLPSURYHLQWHUQDODQGH[- ternal data integration, knowledge discovery, knowledge management, and service-oriented architectures. 7RUHDOL]HWKHVHEHQH¿WVUHVHDUFKDQGSUDFWLWLRQHUFRPPXQLWLHVQHHGWRFROODERUDWHRQWKHVWDQGDUGDQG tool development to encourage the exploration and exploitation of the semantic web technologies, and VHUYLFHRULHQWHGDSSOLFDWLRQGHYHORSPHQWWRHQKDQFHLQWHU¿UPGDWDVKDULQJDQGFROODERUDWLRQ%HFDXVH web servers typically contain proprietary information from multiple sources, security control over server access is essential. The best security measures for this purpose are yet to be determined. Web 2.0 Web 2.0 is a new generation of Internet paradigm. With its promise of a more powerful, engaging, and interactive user experience, Web 2.0 seems poised to revolutionize the way in which we interact with information resources. As consumers are rapidly adopting Web 2.0 technologies and applications like AJAX, mashup, Web logs, wikis, Really Simple Syndication (RSS), collective games, and social QHWZRUNV¿UPVDUHTXLFNO\HPEUDFLQJ:HEWHFKQRORJLHVDQGGHYHORSLQJZHEHQDEOHGEXVLQHVV models and marketing tools. For example, social networking sites such as MySpace and Facebook have grown tremendously in popularity in the past few years. Social networking services are a fast-growing business in the Internet. However, it is unknown if online relationships and their growth patterns are the same as in physical social networks. ,QOLJKWRIWKHVLJQL¿FDQWLPSDFWRQPDUNHWLQJDQGVDOHVUHVHDUFKLVQHHGHGWRGHYHORSDXQL¿HG framework to understand how consumer perceptions, privacy, risk, trust, and attitudes affect the adop- WLRQRI:HE)XUWKHUPRUHPDQ\TXHVWLRQVUHPDLQRQKRZ¿UPVFDQLQÀXHQFHWKHFXVWRPHUGHFL- sion-making process by means of Web 2.0 tools, generate values, and engage consumers in the value generation process. lv Voice over IP (VoIP) and IP Communications VoIP technologies have continued to evolve, including establishment of several important standards. The integration of different modes of communication is already happening and the increasing reliability of the network will foster the rate of adoption of VoIP. The driving forces for the individual and business DGRSWLRQRIWKH9R,3DUHWKHVLJQL¿FDQWFRVWVDYLQJVSRUWDELOLW\DQGIXQFWLRQDOLW\WKDWFDQEHUHDOL]HG by switching some or all of their voice services to VoIP. However, there are risks associated with VoIP services which may impact quality and security of the phone system for voice communications. VoIP communication may be subject to eavesdropping by anyone on the same LAN or a shared medium such as neighborhood cable modem. If the VoIP user connects through an open wireless hotspot, there is also an increased risk of eavesdropping. The development of broadband and wireless connections has led to a wide diffusion of IP-related applications for businesses. Currently, a large amount of different services and solutions are available for business application: advanced IP telephony calls and management, Web, audio, video services, YLGHRFRQIHUHQFLQJ LQVWDQW PHVVDJLQJ ¿OH VKDULQJ HPDLO ID[ DQG YRLFHPDLO DQG SHUVRQDO YLUWXDO assistance. An IP communication-based network facilitates the convergence of different applications, which in turn enhances service quality and decreases service costs at the same time. The prospects for IP communication systems depend upon the interaction between demand and supply in the process of evaluating innovative solutions. As VoIP technology and IP communication technology are still in an early stage, it would be interest- ing to investigate what factors are drivers and inhibitors for the adoption of these new technologies by ¿UPVDQGXVHUVZKDWYDOXHWKH\FUHDWHIRUEXVLQHVVRUJDQL]DWLRQVDQGKRZWKHWHFKQRORJLFDOIHDWXUHV interact with users’ characteristics. What are the technological and organizational issues of adopting these new technologies? Ubiquitous Computing and U-Commerce Ubiquitous computing is a paradigm shift where technology becomes virtually invisible in our lives. The DGYDQFHPHQWRIQHZWHFKQRORJLHVVXFKDVUDGLRIUHTXHQF\LGHQWL¿FDWLRQ5),'DQGVHQVRUQHWZRUNV KDVLQLWLDWHGDWUHQGWRZDUGVXELTXLWRXVFRPSXWLQJZKLFKLVDOVRFDOOHG³DQ\WLPHDQ\ZKHUH´FRPSXW- ing (Lyytinen et al., 2004). In a ubiquitous computing environment, computing devices, applications, QHWZRUNVDQGGDWDZLOOEHIXOO\LQWHJUDWHGDQGPHUJHG-XQJODV:DWVRQ'XHWRWKH³DQ\WLPH anywhere” pervasive computing, organizational activities become more nomadic. The ubiquitous com- puting environment will make possible new forms of organizing, communicating, working and living. However, ubiquitous computing systems create new risks to security and privacy. Ubiquitous computing has enabled a new paradigm of commerce which goes beyond any traditional FRPPHUFH-XQJODV:DWVRQ7KLVW\SHRIFRPPHUFHLVFDOOHG³XELTXLWRXVFRPPHUFH´RUVLPSO\ ³XFRPPHUFH´DQGLVH[SHFWHGWRKDYHDJUHDWLPSDFWRQEXVLQHVVHV'HVSLWHWKHSURPLVLQJIXWXUHRI XELTXLWRXVFRPSXWLQJDQGWKHWUHPHQGRXVEHQH¿WVLWFDQEULQJWRFXVWRPHUVFXVWRPHUV¶SULYDF\FRQFHUQV appear to be the biggest obstacle and social issue (Asif & Mandviwalla, 2005). The advancement of technologies embedded and used in the u-commerce environment raises concerns of customers because their personal information can not only be constantly accessed and continuously tracked, but can also be easily disseminated and possibly used in ways unknown to them (Gunther & Spiekermann, 2005). From the technical point of view, research needs to address the features of successful ubiquitous computing applications. From an organizational and behavioral point of view, user interface design, perceptions, satisfaction, security, and privacy issues need to be addressed. CONCLUSION ,QWKHFXUUHQWWXUEXOHQWGLJLWDOHFRQRP\¿UPVDUHHDJHUWRH[SORUHDQGH[SORLWQHZWHFKQRORJLHVDQG experiment with new business models to stay in business and be competitive. Due to the rapid tech- nological advances in web technologies, managers are facing an unprecedented level of e-business opportunities and challenges. However, the past and current research in e-business has been studied in various disciplines and has not yet provided a comprehensive view of future e-business directions to JXLGHUHVHDUFKHUVDQGSUDFWLWLRQHUV7KHSXUSRVHRIWKLVFKDSWHUZDVWRUHÀHFWRQWKHSDVWDQGFXUUHQW e-business research and technological developments and to identify emerging trends and research issues in e-business. The major observations to be drawn from the past studies include: (1) the realization of operational DQGVWUDWHJLFEHQH¿WVZDVIRXQGWREHFRQWLQJHQWXSRQHIIHFWLYHDVVLPLODWLRQRIHEXVLQHVVLQQRYDWLRQ top management championship, strategic investment rationale, and the extent of coordination; (2) the traditional IT development methodologies and infrastructure became inadequate in supporting the com- SOH[FDSDELOLWLHVRIHEXVLQHVVDSSOLFDWLRQVWKDWQHHGWROHYHUDJHLQWHU¿UPSURFHVVDQGIURQWHQGDQG back-end system integration; (3) privacy and security issues are critical for the success of e-business; (4) m-commerce has enormous potential to become a dominant form of market mechanism; (5) virtual communities and social networking are growing at an unprecedented rate, and have potential to become prominent business models structured around user interests and needs. These observations should be taken into account in the design of future research in emerging trends in e-business. ACKNOWLEDGMENT I thank three anonymous reviewers for their helpful comments. REFERENCES Adelaar, T. (2000). Electronic commerce and the implications for market structure. Journal of Computer Mediated Communication, 5(3). Retrieved April 15, 2008, from http://jcmc.indiana.edu/vol5/issue3/ad- elaar.htm Amit, R., & Zott, C. (2001). Value creation in e-business. Strategic Management Journal, 22, 493– 520. Andersen, P. H. (2005). Relationship marketing and brand involvement of professionals through web-en- hanced brand communities: the case of Coloplast. Industrial Marketing Management, 34(3), 285-297. $VKUD¿1.XLOERHU-33ULYDF\SURWHFWLRQYLDWHFKQRORJ\3ODWIRUPIRUSULYDF\SUHIHUHQFHV (P3P). International Journal of E-Business Research, 1(2), 56-69. Asif, Z., & Mandviwalla, M. (2005). Integrating the supply chain with RFID, a technical and business analysis. Communications of the Association for Information Systems, 15, 393-427. Bai, L., Chou, D.C., Yen, D.C., & Lin, B. (2005). Mobile commerce: Its market analyses. International Journal of Mobile Communications, 3(1), 66 - 81. lvii Baida, Z., Gordijn, J., Akkermans, H., Sæle, H.& Morch, A. (2007). How e-services satisfy customer needs: A software-aided reasoning. In I. Lee, E-Business Innovation and Process Management (pp. 198-233), Hershey, PA: CyberTech Publishing. Bakos, J.Y. (1991). A strategic analysis of electronic marketplaces. MIS Quarterly, 15(3), 294-310. Barnes, S.J., & Vidgen, R.T. (2002). An integrative approach to the assessment of e-commerce quality, Journal of Electronic Commerce Research, 3(3), 114-127. %KDWWDFKHUMHH$,QGLYLGXDOWUXVWLQRQOLQH¿UPVWKHUHODWLYHDQGWHPSRUDOHIIHFWVRIDQWHFHGHQW beliefs. International Journal of E-Business Research, 2(4), 21-38. Beck, C. (2007). A communications model for knowledge sharing. In A. Salam; J. Stevens, Semantic Web Technologies and E-Business: Toward the Integrated Virtual Organization and Business Process Automation (pp. 237-254), Hershey, PA: IGI Publishing. Benyoucef, M., Alj, H., Vézeau, M., & Keller, R.K. (2001). Combined Negotiations in E-Commerce: Concepts and Architecture. Electronic Commerce Research, 1(3), 277-299. Berners-Lee, T., Hendler, J., & Lassila, O. (2001). The semantic web. 6FLHQWL¿F$PHULFDQ0DJD]LQH. May 17. Bichler, M., Segev, A., & Zhao, J.L. (1998). Component-based e-commerce: assessment of current practices and future directions. ACM SIGMOD Record, 27(4), 7-14. Bose, R., & Sugumaran, V. (2006). Challenges for deploying web services-based e-business systems in SMEs. International Journal of E-Business Research, 2(1), 1-18. Bruce, N., Haruvy, E., & Rao, R. (2004). Seller rating, price, and default in online auctions. Journal of Interactive Marketing, 18(4), 37-50. Bughin, J., & Hagel, J. (2000). The operational performance of virtual communities-towards a successful business model? Electronic Markets, 10(4), 237-243. BuzReport. (2008a). Retrieved April 15, 2008, from http://www.bizreport.com/2008/02/forrester_on- line_shopping_growth_to_slow.html BuzReport. (2008b). Retrieved April 15, 2008, from http://www.bizreport.com/2008/01/emarketer_so- cial_spending_to_increase_in_08.html Cannoy, S., & Iyer, L. (2007). Semantic web standards and ontologies in the medical sciences and healthcare. In A. Salam; J. Stevens, Semantic Web Technologies and E-Business: Toward the Integrated Virtual Organization and Business Process Automation (pp. 405-420), Hershey, PA: IGI Publishing. Cavusoglu, H., B Mishra, B., & Raghunathan, S. (2004). The Effect of Internet Security Breach An- nouncements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers. International Journal of Electronic Commerce, 9(1), 70-104. Chatterjee, D., Grewal, R., & Sambamurthy, V. (2002). Shaping up for e-commerce: institutional enablers of the organizational assimilation of Web technologies, MIS Quarterly, 26(2), 65-89. Cheng, E.C. (2000). An object-oriented organizational model to support dynamic role-based access control in electronic commerce. Decision Support Systems, 29(4), 357 - 369. lviii Cho, Y.H., & Kim, J.K. (2004). Application of web usage mining and product taxonomy to collaborative recommendations in e-commerce. Expert Systems with Applications, 26(2), 233-246. Clemons, E.K., & Row M.C. (1992). Information technology and industrial cooperation: the changing economics of coordination and ownership. Journal of Management Information Systems. 9(2), 9-28. Dholakia, U.M., (2005). The usefulness of bidders’ reputation ratings to sellers in online auctions. Journal of Interactive Marketing, 19(1), 31-41. Doherty, N.F., & Lockett, N.J. (2007). Closing the gap between the expectations of relationship market- ing and the reality of e-CRM. International Journal of E-Business Research, 3(2), i-v. '\HU-+(IIHFWLYHLQWHU¿UPFROODERUDWLRQKRZ¿UPVPLQLPL]HWUDQVDFWLRQFRVWVDQGPD[LPL]H transaction value. Strategic Management Journal, 18(7), 535-556. (DUS -%$QWRQ$,$LPDQ6PLWK/ 6WXIÀHEHDP:+  ([DPLQLQJ,QWHUQHW SULYDF\ policies within the context of user privacy values. IEEE Transactions on Engineering Management, 52(2), 227 - 237. Eirinaki, M., & Vazirgiannis, M. (2003). Web mining for web personalization. ACM Transactions on Internet Technology, 3(1), 1 - 27. Facca, F.M., & Lanzi, P.L. (2005). Mining interesting knowledge from weblogs: a survey. Data & Knowledge Engineering, 53(3), 225-241. Fahey, L., Srivastava, R., Sharon, J. S., & Smith, D.E. (2001). Linking e-business and operating pro- cesses: The role of knowledge management, IBM Systems Journal, 40(4), 889-907. Frohlich, M.T. (2002). E-integration in the supply chain: barriers and performance. Decision Sciences, 33(4), 537-556. Frolick, M.N., & Chen, L.D. (2004). Assessing m-commerce opportunities. Information Systems Man- agement, 21(2), 53 - 61. Furnell, S.M., & T. Karweni, T. (2000). Security implications of electronic commerce: A survey of consumers and businesses. Internet Research, 9(5), 372 - 382. Garicano, L., & Kaplan, S.N. (2001). The effects of business-to-business e-commerce on transaction costs. Journal of Industrial Economics, 49(4), 463-485. Gefen, D., & D Straub, D. (2003). Managing user trust in B2C e-services. e-Service Journal, 2(2), 7- 24. Gibbs, J., Kraemer, K.L., & Dedrick, J. (2003). Environment and policy factors shaping global e-com- merce diffusion: a cross-country comparison. The Information Society, 19(1), 5-18. Goethals, F., Vandenbulcke, J., Lemahieu, W., & Snoeck, M. (2007). Different types of business-to- business integration: extended enterprise integration vs market B2B integration. In I. Lee, E-Business Innovation and Process Management (pp. 1-17), Hershey, PA: CyberTech Publishing. Goh, V.T., & Siddiqi, M.U. (2007). A robust watermarking scheme using codes based on the redundant residue number system. In G. Radhamani; G.S.V.R.K. Rao, Web Services Security and E-Business (pp. 271-305), Hershey, PA: IGI Publishing. lix Gordijn, J., Yu, E., & van der Raadt, B. (2006). e-Service design using i * and e 3 value modeling. IEEE Software, 23(3), 26-33. *RVDLQ60DOKRWUD$(O6DZ\2$&RRUGLQDWLQJIRUÀH[LELOLW\LQHEXVLQHVVVXSSO\ chains. Journal of Management Information Systems, 21(3), 7 - 45. Gould, C., & Zhao, F. (2006). Online information privacy and its implications for e-entrepreneurship and e-busines ethics. In F. Zhao, Entrepreneurship and Innovations in E-Business: An Integrative Perspective (pp. 200-222), Hershey, PA: Idea Group Publishing. Guan, S.; Zhu, F. (2007). Ontology exchange and integration via product-brokering agents. In A. Salam; J. Stevens, Semantic Web Technologies and E-Business: Toward the Integrated Virtual Organization and Business Process Automation (pp. 169-184), Hershey, PA: IGI Publishing. Gunther, O., & Spiekermann, S. (2005). RFID and the perception of control: the consumer’s view. Com- munications of the ACM, 48(9), 73-76. Gurbaxani, V. and Whang S. (1991). The impact of information aystems on organizations and markets. Communications of the ACM, 34 (1), 59-73. Hartung, F., & Ramme, F. (2000). Digital rights management and watermarking of multimedia content for m-commerce applications. IEEE Communications, 38(11), 78-84. He, M., Jennings, N.R., & Leung, H.F. (2003). On agent-mediated electronic commerce. IEEE Transac- tions on Knowledge and Data Engineering, 15(4), 985-1003. Hepp, M. (2006). Semantic Web and semantic Web services: father and son or indivisible twins? IEEE Internet Computing, 10(2), 85-88. Hoffman, D.L., Novak, T.P., & Schlosser, A.E., (2000). The evolution of the digital divide: How gaps in Internet access may impact electronic commerce. Journal of Computer-Mediated Communication, 5(3). Retrieved June 20, 2008, from http://jcmc.indiana.edu/vol5/issue3/hoffman.html +XL./7HR++/HH6<77KHYDOXHRISULYDF\DVVXUDQFH$QH[SORUDWRU\¿HOGH[SHUL- ment. MIS Quarterly, 31(1), 19-33. Jarvenppa S. L., & Tiller E. H. (1999). Integrating market, technology, and policy opportunities in e- business strategy, Journal of Strategic Information Systems, 8(3), 235-249. -HQVHQ0&0HFNOLQJ:+7KHRU\RIWKH¿UPPDQDJHULDOEHKDYLRUDJHQF\FRVWVDQG ownership structure. Journal of Financial Economics, 3(October), 305-360. Jih, Wen-Jang (2007). Effects of consumer-perceived convenience on shopping intention in mobile com- merce: An empirical study. International Journal of E-Business Research, 3(4), 33-48. Jones, K., & Leonard, L.N.K. (2007). Consumer-to-Consumer Electronic Commerce: A Distinct Research Stream. Journal of Electronic Commerce in Organizations, 5(4), 39-54. -RR-/HH6-HRQJ<$SSOLFDWLRQRIVHPDQWLFZHEEDVHGRQWKHGRPDLQVSHFL¿FRQWRORJ\ for global km. In A. Salam; J. Stevens, Semantic Web Technologies and E-Business: Toward the Integrated Virtual Organization and Business Process Automation (pp. 287-309), Hershey, PA: IGI Publishing. Junglas, I. A., & Watson, R. T. (2006). The u-constructs: four information drives. Communications of the Associations of Information Systems, 17, 569-592. . Semantic web standards and ontologies in the medical sciences and healthcare. In A. Salam; J. Stevens, Semantic Web Technologies and E -Business: Toward the Integrated Virtual Organization and Business. over and above those offered by existing constructs. CRITICAL ISSUES IN ELECTRONIC BUSINESS This section discusses privacy and security issues and channel coordination issues. Privacy and Security. lock-in, and novelty (Amit and Zott, 2001). To explain the value creation potential li of e-business, an integration of the received theoretical perspectives on value creation is needed and a

Ngày đăng: 07/07/2014, 10:20

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan