Electronic Business
Latest Publications


TOTAL DOCUMENTS

156
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781605660561, 9781605660578

2009 ◽  
pp. 2367-2388
Author(s):  
Michael Weiss

Agents are rapidly emerging as a new paradigm for developing software applications. They are being used in an increasing variety of applications, ranging from relatively small systems such as assistants to large, open, mission-critical systems like electronic marketplaces. One of the most promising areas of applications for agent technology is e-business. In this chapter, we describe a group of architectural patterns for agent-based e-business systems. These patterns relate to front-end e-business activities that involve interaction with the user, and delegation of user tasks to agents. Patterns capture well-proven, common solutions, and guide developers through the process of designing systems. This chapter should be of interest to designers of e-business systems using agent technology. The description of the patterns is followed by the case study of an online auction system to which the patterns have been applied.


2009 ◽  
pp. 2337-2359
Author(s):  
Yuan-Chu Hwang ◽  
Soe-Tsyr Yuan

Most of the existing mobile services were designed based on the client/server architecture. Those mobile services neither paid much attention to mobile users’ interactions with their environments nor considered the collective efforts between the mobile users in a dynamic peer group. In this article, the notion of ambient e-service is so defined as to identify a new scope of mobile e-service, which address dynamic collective efforts between mobile users (enabled by mobile peer-to-peer technology), dynamic interactions with ambient environments (envisioned by location-based service), the moment of value (empowered by wireless technologies), and low cost service provision. The notable features of ambient e-services are the exhilarated linkage based on social context and significantly rapid growth of connections. We also present an ambient e-service framework that characterizes ambient e-services with three dimensions (value stack, environment stack, and technology stack), followed by several exemplars of ambient e-service applications. Moreover, we present the ambient e-service embracing model (ASEM) that addresses the integrated consideration of trust, reputation, and privacy required for fostering the growth of ambient e-services and steers the directions of future fruitful relevant research.


2009 ◽  
pp. 2284-2303
Author(s):  
Martina Gerst ◽  
Kai Jakobs

Successful cooperation between large manufacturers and their suppliers is a crucial aspect, especially in the automotive industry. Such mutually beneficial cooperation requires at least a certain level of integration and interoperation of the partners’ IT and e-business systems. This chapter looks at two approaches in order to achieve this goal: sector-specific harmonization (in the form of electronic marketplaces) and international, committee-based standardization. This chapter shows that SMEs are facing a severe disadvantage in both cases. This is, however, less pronounced in a formal standards setting, in which capabilities of the individual representatives are more important, at least at the working level.


2009 ◽  
pp. 2099-2114
Author(s):  
Osama Shata

This chapter introduces several aspects related to e-privacy such as needs, approaches, challenges, and models. It argues that e-privacy protection, although being of interest to many parties such as industry, government, and individuals, is very difficult to achieve since these stakeholders often have conflicting needs and requirements and may even have conflicting understanding of e-privacy. So finding one model or one approach to e-privacy protection that may satisfy these stakeholders is a challenging task. Furthermore, the author hopes that this chapter will present an acceptable definition for e-privacy and use this definition to discuss various aspects of e-privacy protection such as principles of developing e-privacy policies, individuals and organizations needs of various privacy issues, challenges of adopting and coping with e-privacy policies, tools and models to support e-privacy protection in both public and private networks, related legislations that protect or constraint e-privacy, and spamming and Internet censorship in the context of e-privacy. The author hopes that understanding these aspects will assist researchers in developing policies and systems that will bring the conflict in e-privacy protection needs of individuals, industry, and government into better alignment.


2009 ◽  
pp. 2072-2087
Author(s):  
Carmen Gould ◽  
Fang Zhao

This chapter reports the results of a national survey which investigated Australian Internet users’ attitudes and behaviours toward online information privacy using a typology that combines specific demographic and attitudinal measurements with behavioural data. The chapter contains a comprehensive examination of the internal, external/ environmental, and behavioural dimensions of information privacy, incorporating a profile of each of the typologies’ categories along with a general profile of total respondents. The implications of the findings for e-entrepreneurship and e-business ethics also are discussed.


2009 ◽  
pp. 1993-2013
Author(s):  
Wonyoung Lee ◽  
Praveen Aggarwal ◽  
Hyonkil Shin ◽  
Taihoon Cha ◽  
Seunghan Kim

The decreasing cost of IT has encouraged organizations to seek new ways of cooperating with members of the supply chain and other key strategic partners. This increased cooperation is giving rise to a new type of interorganizational system (IOS). Before the advent of the Internet, IS integration required significant investments on the part of organizations participating in an IOS. Such heavy investments, in turn, necessitated close strategic cooperation in the non-IS domain, as well. Thus, IS integration went handin- hand with non-IS (relational) integration in the pre-Internet era. However, advances in Internet technology have commoditized IS integration to a significant extent, thereby allowing the uncoupling of IS integration and relational integration. It is now possible for organizations to have IS integration without developing strong non-IS linkages. We propose a framework to account for this recent shift and present a typology for classifying interorganizational systems based on the segregation of IS and relational integration. We also verify the typology in case studies of four large firms.


2009 ◽  
pp. 1853-1869
Author(s):  
S. Pavic ◽  
M. Simpson ◽  
S. C. Lenny Koh

This study explores new ways for SMEs to create a competitive advantage through the use of e-business. It examines the level of ICT use in SMEs and identifies the drivers and barriers which owners/managers face in adopting e-business. Furthermore, it explores the degree of awareness amongst SMEs of the opportunities available to them for developing their employees, their business strategies, and their attitudes toward the range of initiatives and options, on the use of e-business. Industry behaviour and organisational culture in relation to the creation of competitive advantage through e-business also are explored. Case studies and literature review are used to collect information from and about SMEs in the UK. The results of these are employed to propose a prototype business model, named CATE-b – “Competitive Advantage Through e-business.”


2009 ◽  
pp. 1843-1852
Author(s):  
Pallab Saha

E-business process management (e-BPM) entails management of e-business processes with the customer initiating the process and involves non-linear processes with strong focus on value networks leveraging collaboration and alliances, rather than just business processes within the confines of the organization (Kim & Ramkaran, 2004). E-BPM requires organizations to take a process approach to managing their e-business processes (Smith & Fingar, 2003). The advent of business process reengineering (BPR) (Davenport, 1993; Hammer & Champy, 1993) resulted in numerous organizations initiating BPR programs. While BPR aims to enhance an organization’s process capability by adopting engineering discipline, e-BPM goes a step further and targets to improve the organizational process management capability (Smith & Fingar, 2004). Organizations target end-to-end business processes that deliver maximum customer value through e-BPM (Smith & Fingar, 2003). However, by their very nature, end-to-end business processes more often than not span multiple enterprises incorporating their individual value chains (Porter, 1985; Smith & Fingar, 2003; Smith, Neal, Ferrara, & Hayden, 2002) and involve e-business processes (Kim & Ramkaran, 2004). Integrating fragments of processes across multiple functions and organizations not only involves shared activities and tasks among business and trading partners, but also the capability to integrate disparate IT systems (Kalakota & Robinson, 2003). Effective management of e-business processes depends to a great extent on the enabling information technologies. In fact, Smith and Fingar in 2003 have stated that BPM is about technology. Porter’s value chain is about end-to-end business processes needed to get from a customer order to the delivery of the final product or service (Porter, 1985). The pervasive use of technology has created a critical dependency on IT that demands for a specific focus on governance of IT (Grembergen, 2004). Explicitly or implicitly, organizations specify business activities as business processes, and without realizing these tend to be e-business processes. However, given the current business conditions and a clear understanding by organizations about the complexities of their e-business processes, management of e-business processes is taking center stage (Smith et al., 2002). In the current business scenario where e-business processes, along with information are considered key organizational assets and management of business processes a strategic capability (Kalakota & Robinson, 2003), it is imperative that organizations clearly delineate the need for relevant and pertinent information as it provides visibility and transparency. Additionally, IT being the single most important predictor of the business value of IT (Weill & Ross, 2004) drives the need to analyze and understand the implications of e-BPM on IT governance. The key objective of this article is to investigate the implications of e-BPM on IT governance through the analysis of available literature. In particular, the article argues that a direct influence of e-BPM on IT governance performance is inevitable. While the importance of both effective e-BPM and IT governance is intuitively clear, there is currently little research on elements of IT governance that get enabled by e-BPM. More importantly, there is the lack of a theoretical framework that could be used to analyze. To address this shortcoming, the article also presents an analysis framework. The analysis framework is particularly useful as it incorporates elements from prevalent IT governance frameworks. Using the analysis framework, the article then examines the implications of e-BPM on IT governance and develops research propositions. The aim of developing the propositions is to enable further investigation and research thereby contributing to IT management theory.


2009 ◽  
pp. 1723-1738
Author(s):  
Tapen Sinha ◽  
K. Subhadra

This chapter studies outsourcing from the United States to India. First, we show that outsourcing is not taking most jobs out of the United States. Second, we argue that outsourcing does not contradict trade theory. Third, we analyze how India has come to occupy a preeminent position in outsourcing. Fourth, we show that the Indian dominance is likely to continue well into the next decade. Finally, we discuss some risks associated with outsourcing.


2009 ◽  
pp. 1630-1652
Author(s):  
Felix B. Tan ◽  
Helen J. Lin ◽  
Cathy Urquhart

With the increasing popularity of electronic commerce, businesses are starting to recognise that developing a good virtual community can help to generate more profits. Virtual communities can be an instrument for building relationships with customers, and retaining customers’ loyalty. Of interest are the similarities and differences in the design preferences of virtual communities across cultural groups. This paper, therefore, examined the design preferences of virtual communities in two cultural groups. The design preferences studied are Web design, tools used, and types of virtual communities preferred. Content analysis was employed to study 20 of the most popular Chinese and U.S. virtual communities. The study found that there are differences in the preference for the type of virtual communities and the tools used by Chinese and U.S. communities. The findings challenge aspects of Web site design across these cultural groups thought to be dissimilar based on prior research, indicating that designers of virtual communities must treat cultural differences with caution. Implications for research and practice are also discussed.


Sign in / Sign up

Export Citation Format

Share Document