Future of Small Business E-Commerce

Author(s):  
Simpson Poon

The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.

2011 ◽  
pp. 2159-2163 ◽  
Author(s):  
Simpson Poon

The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.


2004 ◽  
Vol 66 (2) ◽  
Author(s):  
Matthew E. Shames

And in the beginning, there was e-mail! At least, that may be the perception of the millions of people who use electronic mail (“e-mail”) every day. In fact, the pervasiveness of the Internet in general, and the World Wide Web and e-mail in particular, has made it difficult for many people to remember the world before these technologies changed the face of communications forever. But it was only a decade ago that e-mail was a novelty outside of academic and scientific settings, the Web was not yet viable as a commercial mechanism, and the promise and exuberance surrounding the developing technologies masked the dangers of the road that would lie ahead.


Author(s):  
Pauline Ratnasingam

E-commerce provides different opportunities to small businesses as it overcomes part of their technical, environmental, organizational, and managerial inadequacies (Bergeron, Raymond, & Rivard, 2001; Hussin, King, & Cragg, 2002). According to Forrester Research, e-commerce in the US will grow at 19% reaching $230 billion by 2008. Further, the Internal Revenue Service (IRS) estimated that in 2003, there were 27 million small business tax returns. Small businesses are an important and integral part of every nation’s economy (Hambrick & Crozier, 1985). The US Small Business Administration (SBA) defines a small business as “an independent business having fewer than 500 employees or is independently owned and not dominant in its field of operation.” Small firms play an increasingly crucial role in US economy. They employ more than one half of the US private sector work force, are responsible for about one-half of the GDP, and generate more than one half of all sales in the US create 60%-80% of net new jobs annually (Ibrahim, Angelidids, J. & Parsa, 2004). Alternatively, small businesses are often more challenged than larger firms by resource constraints, such as lack of fi- nancial capital, and technical or managerial skills, knowledge and expertise that significantly reduce the number and types of options available to management (Hodgetts & Kuratko, 2001). Previous research suggests that although most small businesses were connected to the Internet, the potential use of the Internet in their business was rarely explored. Security concerns has a direct impact on every critical part of the small business including reputation, productivity, and business continuity, as they need to adhere to the legal requirement for information management. The research question thus designed for this study is what factors inhibit or pose challenges for e-commerce adoption among small businesses? We discuss the findings of an exploratory case study with four firms, across a section of different industries, on the risks and challenges they encountered when adopting e-commerce. The study contributes to managerial and theoretical implications by increasing the importance and awareness of small businesses in e-commerce adoption.


Author(s):  
Nestor J. Zaluzec

In this tutorial, we will update, review and demonstrate the means of finding and accessing resources of electronic information which are maintained by the Microscopy Society of America and related national/international organizations. During the course of this live demonstration over the Internet, we illustrate the use of Electronic Mail, Newsgroups, File Transfer Protocols, Gophers, and Information Servers using the World Wide Web protocols. Although the MSA electronic bulletin board system (BBS) has be recently discontinued, MSA has recently decided expanded it's role in other telecommunications areas. The procedures needed by individuals or organizations to access this wealth of information will be presented in detail. The following list of topics summarizes some of the areas which will be covered.Electronic Mail: (EMail) is textual communications which is sent over networks from one individual to another. Each user is assigned a unique address by the computer system administrator. The message composed of normal ASCII (text) characters which is sent from one computer to another.


1998 ◽  
Vol 06 (02) ◽  
pp. 217-230
Author(s):  
CHERYL CALVERT ◽  
MIKE O'CONNOR ◽  
JOHN BENTLEY

This paper details an Australian study, conducted by the Small Business Research Unit at Victoria University of Technology, of Internet usage by small business. The objectives of this study were to: explore the expectations of small businesses setting up webpages on the Internet; analyse the commercial impact of the Internet; determine any benefits from using the Internet; and to ascertain any problems associated with using the Internet. The methodology involved a questionnaire distributed either via electronic mail or the World Wide Web. The main findings indicated that the average number of Internet sales inquiries per month appeared low compared to other countries such as the UK and USA. The majority of businesses received less than 20 sales inquiries per month via the Internet and only half of the respondent businesses indicated that sales had increased as a direct result of being on the Internet. Despite this, there existed optimism regarding business use of the Internet with the majority of business owners/managers claiming that the benefits of being on the Internet outweighed the costs, and that their expectations were met in using the Internet. Businesses involved in the computing industry had the highest level of optimism.


1995 ◽  
Vol 9 (1) ◽  
pp. 9-15
Author(s):  
Diane Romm ◽  
Naomi M. Steinberger

Introduces the reader to the history of the Internet and the requirements for accessing it. The three major capabilities of the Internet-electronic mail, telnet, and file transfer protocol are discussed. Examples of how Jewish Internet resources may be used in the educational arena are included. The article concludes with a list of Jewish Internet sites.


1996 ◽  
Vol 6 (4) ◽  
pp. 296-299
Author(s):  
Milton E. McGiffen

Many careers involve working at multiple locations with unpredictable daily schedules. Professionals may have several locations from which they conduct business. Electronic mail (e-mail) and other features of the Internet have facillitated the evolution of the virtual office, which gives the appearance of a single point of contact with mobile, busy people. E-mail is the most obvious use of the Internet. E-mail groups allow for effective discussions with people of similar interests and the exchange of hard-to-acess expert information. Websites and e-mail groups allow rapid dissemination and discussion of multimedia information. The Vegetable Research and Information Center is an example of how to extend the virtual office concept to the departmental level, allowing spatially scattered researchers, extension workers, and their clientele to work together and exchange information.


Author(s):  
Mohini Singh

Australian small businesses are increasingly adopting the Internet and the World Wide Web as a medium of doing business to reach new customers and suppliers, cut costs and expand business. They also use it to enhance communication between buyers and suppliers. This chapter discusses the findings of an exploratory study in Australia that identified the objectives, opportunities and challenges of e-commerce experienced by small businesses that were mostly early adopters of the Internet as a medium of trade. E-commerce issues presented in this chapter include research findings, supported by theory from literature. Electronic commerce opportunities, challenges and organizational learning by small and medium enterprises (SMEs) in Australia indicate that small businesses have created value with e-commerce, although benefits are long term and dependent on a plethora of technological, business and management issues that need to be addressed. Due to the fast-evolving nature of e-business and technological developments that are new to many small businesses, challenges such as managing the expanded flow of information, cross-border taxation, authentication, trust and security, as well as the high costs of acquiring the required technologies and skills, are prevalent. Other challenges of e-commerce range from Web site maintenance to business process reengineering for an integrated environment. Research findings also highlight the fact that small businesses need formal methods of evaluating the performance of e-commerce to realize the benefits of investment and to further expand their e-commerce venture.


Author(s):  
Edwin I. Achugbue

The chapter focuses on the history of the internet system of e-mail; e-mail security; threat to e-mail security, usefulness of e-mail address and country codes, how e-mails can be secured by the individual and electronic mail policy. The future of e-mail security is also described.


Stalking ◽  
2007 ◽  
Author(s):  
Graham D. Glancy ◽  
Alan W. Newman

Cyberstalking involves the use of the Internet or other electronic communication to stalk another person. Already common, it is likely to become more common as the use of the Internet continues to grow. The characteristics of online stalkers and their victims have some differences from those of the offline stalker. Mullen, Pathé, Purcell, and Stuart’s (1999) classification may apply to cyberstalkers except for the apparently common phenomenon of child luring that may be a new category. The methods of cyberstalking, as described in this chapter, are particularly ingenious. We know little about the effect on victims, but postulate that it is similar to offline stalking. We make some suggestions that may prevent cyberstalking, as well as offer some steps to bear in mind once cyberstalking occurs. The proliferation of personal computers with Internet access in the last decade has raised concerns about a new phenomenon known as cyberstalking. The Internet can be used to annoy and harass large numbers of victims in a generic manner by disseminating computer viruses, Internet scams, and “spamming” people with unsolicited e-mail. In 1999 Janet Reno, the attorney general of the United States, defined cyberstalking as the use of the Internet, e-mail, or other electronic communications devices to stalk another person (Reno, 1999). Barak (2005) looked at the issue of sexual harassment on the Internet. He characterizes cyberstalking as one type of sexual coercion. He notes that online behavior is characterized by disinhibition, openness, venture, and bravado—an atmosphere characterized by typical masculine attitudes. He argues that the lack of legal boundaries or enforcement vehicles encourage people to do what they would not have done in offline situations. He notes the near impossibility of implementation of legal procedures on a large scale. In this chapter we will discuss what is known about the prevalence of this phenomenon, the types of cyberstalking, and what is known about the perpetrators. In addition, we will generate some hypotheses about the comparison between online and offline stalkers. We will also discuss the effects on victims and current thoughts and resources for dealing with cyberstalking.


Sign in / Sign up

Export Citation Format

Share Document