Tải bản đầy đủ (.pdf) (10 trang)

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P6 pot

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (148.69 KB, 10 trang )

l
Cybercrime
Business organizations and consumers face major economic damages and increased threats when the
underlying information infrastructure is targeted or made vulnerable by unethical, illegal Internet activi-
WLHV&\EHUFULPHLVEHFRPLQJPRUHZLGHVSUHDGDQGDWLPHO\UHYLHZRIH[LVWLQJDSSURDFKHVWR¿JKWLQJ
various forms of cybercrime is vital for the growth of e-business. Some of the cybercrimes include
QHWVSLRQDJHWKHIWRIFRQ¿GHQWLDOLQIRUPDWLRQHWKHIWFUHGLWFDUGIUDXGIUDXGXOHQWLQWHUQHWEDQNLQJ
sites, cyber-terrorism, cyber-piracy, and viruses.
The characteristics of cybercriminals, cybercrime victims, and law enforcement agencies have a re-
inforcing effect on each other, leading to a vicious circle of cybercrime (Kshetri, 2006). Approaches to
¿JKWLQJF\EHUFULPHDUHOHJDORUJDQL]DWLRQDODQGWHFKQLFDO*LYHQWKHGLYHUVLW\RIFXOWXUDODQGEXVLQHVV
practices in different regions of the world, business organizations and law enforcement agencies need
to develop global cybercrime prevention and detection programs standards and a comprehensive ethics
policy. As the global nature of e-business accelerates, it will be also of great importance to promote
common ethical standards and practices across different countries on the Internet.
MANAGERIAL IMPACT OF ELECTRONIC BUSINESS
This section discusses e-business strategies and value creation opportunities.
E-Business Strategy
7KHGLJLWDOHFRQRP\SUHVHQWHGQXPHURXVRSSRUWXQLWLHVDQGFKDOOHQJHVIRU¿UPVOHDGLQJWRWKHHPHU-
gence of new business models, innovative technologies, strategies, and management practices (Thomson,
2006). As the e-business environment becomes more complex economically, socially, politically, and
OHJDOO\LWLVLPSHUDWLYHIRU¿UPVWRGHYHORSHEXVLQHVVVWUDWHJLHVWKDWFRXQWHUWKHFRPSOH[LW\LQWKHLU
HQYLURQPHQW)XUWKHUPRUHLQWKHFXUUHQWJOREDOSROLF\ODQGVFDSHIHZ¿UPVFDQDIIRUGWRLJQRUHJOREDO
policy frontiers, and therefore need to proactively employ theories and methods integrating policy with
market and technology issues (Jarvenppa & Tiller, 1999).
Developing a sound e-strategy should be based on the enterprise plan, business strategy, and enter-
prise information technology plan. Firms need to understand failure factors as well as success factors to
counteract the forces that discourage the growth of e-business. A number of strategy development models
have been suggested to formulate e-strategy including SWOT (strengths, weaknesses, opportunities,
WKUHDWVDQDO\VLV0F&DUWK\¶VIRXUPDUNHWLQJPL[PRGHODQG3RUWHU¶V¿YHFRPSHWLWLYHIRUFHVPRGHO
)LYHHVVHQWLDOVWHSVIRUIRUPXODWLQJHFRPPHUFHEXVLQHVVPRGHOVDQGVWUDWHJLHVLQFOXGHUHGH¿QHWKH


competitive advantage; rethink business strategy; re-examine traditional business and revenue models,
re-engineer the corporation and Web site; and re-invent customer service (Lee, 2001). Realization of
RSHUDWLRQDODQGVWUDWHJLFEHQH¿WVZDVIRXQGWREHFRQWLQJHQWRQHIIHFWLYHDVVLPLODWLRQRIHEXVLQHVV
innovation, top management championship, strategic investment rationale, and extent of coordination
(Chatterjee et al., 2002).
Value Creation Opportunities
7KH YDOXH FUHDWLRQ SRWHQWLDO RI HEXVLQHVVHV KLQJHV RQ IRXU LQWHUGHSHQGHQW GLPHQVLRQV HI¿FLHQF\
complementarities, lock-in, and novelty (Amit and Zott, 2001). To explain the value creation potential
li
of e-business, an integration of the received theoretical perspectives on value creation is needed and a
¿UP¶VEXVLQHVVPRGHOLVDQLPSRUWDQWORFXVRILQQRYDWLRQDQGDFUXFLDOVRXUFHRIYDOXHFUHDWLRQIRUWKH
¿UPDQGLWVVXSSOLHUVSDUWQHUVDQGFXVWRPHUV
.LFNXODQG*XQGU\H[DPLQHGWKHLQÀXHQFHRIPDQDJHPHQWGLYHUVLW\DQGFUHDWLYLW\RQRS-
portunity assessment for e-commerce organizations, and on innovative internal and external managerial
relationships and practices. Opportunity assessment for e-commerce organizations mediates the effects
RIPDQDJHULDOGLYHUVLW\DQGFUHDWLYLW\LQÀXHQFLQJWKHDGRSWLRQRILQQRYDWLYHSUDFWLFHVWKDWIRFXVRQ
employee relationships, external networks, and new products and services.
The role of technological opportunism in the context of e-business adoption was studied to under-
VWDQGZK\VRPH¿UPVDGRSWUDGLFDOWHFKQRORJLHVWRFKDQJHWKHLUEXVLQHVVPRGHOVZKLOHRWKHU¿UPVDUH
reluctant or unable to do so (Srinivasan et al., 2002). Technological opportunism is a capability that
RUJDQL]DWLRQVFDQGHYHORSE\WDNLQJVSHFL¿FDFWLRQVVXFKDVIRFXVLQJRQWKHIXWXUHWRSPDQDJHPHQW
advocating new technologies, and by becoming more of an adhocracy culture and less of a hierarchy
FXOWXUH7KHVWXG\VXJJHVWVWKDWWHFKQRORJLFDORSSRUWXQLVPRIIHUVDVLJQL¿FDQWLQFUHPHQWDOH[SODQDWLRQ
of technology adoption over and above those offered by existing constructs.
CRITICAL ISSUES IN ELECTRONIC BUSINESS
This section discusses privacy and security issues and channel coordination issues.
Privacy and Security Issues
Online privacy policies typically include an organization’s practices on customers’ data collection,
access, disclosure, and disposal. Consumers refer to website privacy policies to decide on the data pro-
vision, search activities, and purchasing decisions. Due to technological, managerial, and legal issues

of privacy and security, corporate online privacy and security have been a subject of in-depth study
LQFOXGLQJSULYDF\SROLFLHVVHFXULW\WUXVWDQGHFRPPHUFHDGRSWLRQ<HHDQG.RUED$VKUD¿
Kuilboer, 2005 Gould & Zhao, 2006). Privacy and security concerns are the number one reason online
users are not purchasing over the Web, since consumers are concerned about the potential for fraud and
the amount of personal information required to complete business transactions.
Privacy issues will become more important, as corporate marketing functions incorporate more web
applications into their marketing tool portfolio. For example, web personalization, one-to-one marketing,
mass customization, and web mining cannot be developed effectively without the privacy issues resolved
between marketers and customers. However, there is a notable discrepancy between what privacy policies
DUHFXUUHQWO\VWDWLQJDQGZKDWXVHUVGHHPPRVWVLJQL¿FDQW(DUSHWDO7KHZLOOLQJQHVVWRSURYLGH
information to Web merchants increased as the level of privacy guaranteed by the statements increased,
and the level of privacy promised by the statements interacted with respondents’ prior familiarity with
policy statements (Meinert et al., 2006). More recently, the values of two types of privacy assurance
(privacy statements and privacy seals) were investigated (Hui et al., 2007). Findings include: (1) the
existence of a privacy statement induced more subjects to disclose their personal information but that
RIDSULYDF\VHDOGLGQRWPRQHWDU\LQFHQWLYHKDGDSRVLWLYHLQÀXHQFHRQGLVFORVXUH
6HFXULW\LVRQHRIWKHPDLQGHWHUPLQDQWVIRUFRQVXPHUWUXVWDQG¿UPV¶PDUNHWYDOXHLQWKHHEXVL-
QHVVHQYLURQPHQW7KHUHLVVLJQL¿FDQWFRQFHUQDPRQJFRQVXPHUVUHJDUGLQJWKH¿QDQFLDOVHFXULW\RI
their online purchasing activities. An awareness of the security technologies may help consumers and
businesses to build trust in e-business (Furnell & Karweni, 1999). A number of technical protocols and
lii
methods have been proposed to resolve security issues. To enhance security, many e-commerce web
sites provide secure private channels over the Internet. The Secure Sockets Layer (SSL) protocol is the
most widely used security protocol. Role-based access control (RBAC) is a preferred method for security
PDQDJHPHQWGXHWRÀH[LELOLW\RIDVVLJQLQJDFFHVVSULYLOHJHVWRUROHVUDWKHUWKDQWRLQGLYLGXDOXVHUV)RU
e-business and other cooperative computing environments, access control to shared resources should
allow users to automatically change roles under different contexts. An object-oriented organizational
PRGHO2UJDQL]DWLRQ0RGHOLQJDQG0DQDJHPHQW200ZDVSUHVHQWHGWRVXSSRUWG\QDPLFUROHGH¿QL-
tion and role resolution in e-business applications (Cheng, 2000).
Announcing an Internet security breach is inversely related to the market value of the announcing

¿UP&DYXVRJOXHWDO7KHEUHDFKHG¿UPVLQWKHVWXG\ORVWRQDYHUDJHSHUFHQWRIWKHLU
market value within two days of the announcement. The security breaches transpired to security devel-
opers. The market value of the security developers is positively related to the announcement of security
EUHDFKHVE\RWKHU¿UPV7KHVHFXULW\GHYHORSHUVLQWKHVDPSOHUHDOL]HGDQDYHUDJHDEQRUPDOUHWXUQRI
1.36 percent during the two-day period after the announcement. The study reveals that the cost of the
VHFXULW\EUHDFKHVLVYHU\KLJKIRUWKHEUHDFKHG¿UPVDQGLQYHVWRUV
Channel Coordination Issues
At click and mortar organizations, internal channel coordination is a critical issue to marketing strat-
HJ\VLQFHWKHDGGLWLRQRIDQRQOLQHVDOHVFKDQQHOPD\FRQÀLFWZLWKRWKHUH[LVWLQJFKDQQHOVZLWKLQWKH
VDPH¿UP0XOOH/DQNHQDX:DUULQJWRQHWDO0DNLQJSURGXFWVDQGVHUYLFHVDYDLODEOH
to customers through multiple channels can provide increased levels of customer choice and sales op-
portunity. As the online sales channel establishes itself as a strategic sales channel, managers are forced
to pay more attention to channel management to deal with a variety of challenging issues. These issues
LQFOXGHHVWDEOLVKLQJWKHUROHRIHFRPPHUFHLQWKHPXOWLFKDQQHOVWUXFWXUH¿QGLQJDQRSWLPDOFKDQQHO
mix, creating synergies across channels, building strategic alliances, creating sustainable competitive
DGYDQWDJHVPDQDJLQJPRUHFRPSOH[VXSSO\FKDLQVGHDOLQJZLWKFRQÀLFWDQGSURYLGLQJWKHOHDGHUVKLS
necessary to attain well integrated multiple channels (Rosenbloom, 2007).
Manufacturers use Web to directly sell products and services to consumers. These direct marketers
DUHRIWHQERWKDVXSSOLHUWRDQGDGLUHFWFRPSHWLWRURIH[LVWLQJUHWDLOHUVZKLFKFDQUHVXOWLQLQWHU¿UP
FKDQQHOFRQÀLFW7VD\DQG$JUDZDOLGHQWL¿HGDQXPEHURIFRXQWHULQWXLWLYHVWUXFWXUDOSURSHUWLHV
useful for the design of effective channel coordination between manufacturers and retailers. Some of
the analytical results showed that a reseller channel is not necessarily detrimental to the reseller, given
the associated adjustment in the manufacturer’s pricing, changes in wholesale pricing, payment to the
reseller a commission for diverting customers toward the direct channel, or concession of the demand
IXO¿OOPHQWIXQFWLRQHQWLUHO\WRWKHUHVHOOHU
A mobile channel is supported by the mobile devices and services and has been popular as a channel
for both sales and marketing communication. Nysveen et al. (2005) studied the effects of mobile chan-
nel additions on consumer-brand relationship dimensions. Surveys of three different brands revealed
positive effects of a mobile channel addition (SMS/MMS) on brand satisfaction, direct relationship
LQYHVWPHQWVLQGLUHFWUHODWLRQVKLSLQYHVWPHQWVDQGPDLQFKDQQHOXVDJH7KH¿QGLQJVVXJJHVWHGWKDWWKH

consumers’ direct relationship investment in the mobile services can lead to increased consumption at
the brand’s main channel.
liii
EMERGING TRENDS IN ELECTRONIC BUSINESS
7KLVVHFWLRQLGHQWL¿HVIRXUHPHUJLQJWUHQGV:HEVHUYLFHVDQG6HPDQWLF:HE:HEYRLFHRYHU,3
(VoIP) and IP communications, and ubiquitous computing and u-commerce.
Web Services and Semantic Web
$FFRUGLQJWRWKH:RUOG:LGH:HE&RQVRUWLXP³:HEVHUYLFHVSURYLGHDVWDQGDUGPHDQVRILQWHU-
operating between different software applications, running on a variety of platforms and/or frameworks.
Web services can be combined in a loosely coupled way in order to accelerate application development
and integration inside and outside the enterprise (Bose & Sugumaran, 2006). Programs providing simple
services can interact with each other in order to deliver sophisticated added-value services. Extensible
Markup Language (XML) plays a central role in the development of Web services by providing a data
interchange format that is independent of programming languages and operating systems.
The Web Services are based on a core set of enabling technologies, including XML, SOAP, WSDL, and
8'',ZKLFKUHÀHFWWKHZRUNRIUHVHDUFKHUVDQGFRQVXOWDQWVIURPDYDULHW\RIFRPSDQLHVDQGLQGXVWULHV
Web services technologies are emerging as the platform that can universally standardize the communica-
tion of applications for automating both the provider and consumer ends of e-business transactions. In
order to connect systems, business partners, and customers cost-effectively, Web services let programs
invoke requests to other programs over the Internet via open protocols and standards businesses.
'XHWRWKHVLJQL¿FDQWSRWHQWLDOEHQH¿WVPDQ\SRSXODU:HEVLWHVVXFKDV*RRJOHDQG$PD]RQFRP
DUHERRVWLQJWKHLUWUDI¿FWKURXJK:HEVHUYLFHV6WDQGDUGVDQGWHFKQRORJLHVIRUPRGHOLQJHEXVLQHVV
processes that use Web services could drive the costs down by achieving automated code generation,
reuse, and interoperability (Selim et al., 2002). Web services have shown promising results such as
greater development productivity gains and easier and faster integration with trading partners. However,
despite the rapid development in the Web services area, many issues including security still remain to
be resolved in the context of e-commerce (Misra et al., 2007; Yau et al., 2007).
Search for appropriate Web services published in Universal Description, Discovery and Integration
(UDDI) registries should be effective in terms of time and uniform in terms of interfaces. A number of
search strategies for Web services have been suggested. Zhang et al. (2003) presented an XML-based

8'',VHDUFKHQJLQHWKDWSURYLGHVGHYHORSHUVZLWKVWDQGDUGLQWHUIDFHVIRUHI¿FLHQWO\LGHQWLI\LQJ:HE
services information in the UDDI registries. The engine processes a search request comprising multiple
queries, UDDI sources, search criteria, and aggregation operator. The UDDI Search Engine (AUSE)
aggregates search results from different UDDI registries to enable easy B2B integration. A single Inter-
net application can invoke many different Web services called composite Web services (Maamar et al.,
2005). Because users’ expectations and requirements constantly change, it is important to include their
preferences, such as quality-of-service and speed in the composition and provisioning of Web services. In
particular, the adoption of loosely coupled and distributed services will cause trustworthiness problems.
The degree of trustworthiness of all involved services in composite Web services need to be evaluated
by analyzing past experiences (Yang et al., 2006).
The Semantic Web has drawn attention from both industry and academia (Cannoy & Iyer, 2007; Joo
et al., 2007). The semantic web is an evolving extension of the World Wide Web in which information
and services on the web are rendered as means for computers and people to work in cooperation (Ber-
ners-Lee et al., 2001). The semantic web comprises the standards and tools of XML, XML Schema,
Resource Description Framework (RDF), RDF Schema, and Web Ontology Language (OWL). Using
semantic web technologies for e-business tasks such as product search or content integration requires
liv
ontologies for products and services. Ontologies can be used to describe products and services so that
DJHQWVFDQDGYHUWLVHDQGGLVFRYHUWKHPDFFRUGLQJWRDVHPDQWLFVSHFL¿FDWLRQRIIXQFWLRQDOLW\DVZHOODV
other parameters such as cost, security, etc. (Trastour et al., 2003). The semantic web can make e-com-
PHUFHLQWHUDFWLRQVPRUHH[SUHVVLYHDQGÀH[LEOHE\VWDQGDUGL]DWLRQRIRQWRORJLHVPHVVDJHFRQWHQWDQG
message protocols (Li & Ling, 2007). .
One important semantic web application area is Web services. Evidence shows that semantic web
services are mandatory components of the semantic web, primarily because entities are more willing to
expose functionality than data in business settings (Hepp, 2006). Semantic web services aim to describe
and implement web services in order to make them more accessible to automated agents. Semantic web
services can support a service description language that can be used to enable an intelligent agent to
behave more like a human user in locating suitable Web services.
7RUHDOL]HWKHVHPDQWLFZHEQHZVWDQGDUGVIRUGH¿QLQJDQGXVLQJRQWRORJLHVDUHEHLQJGHYHORSHG
DAML+OIL is an ontology language which consists of a rich set of primitives. If applications are to

exchange semantic information, they will need to use common ontologies. One such ontology which
has been designed for the purpose of describing web services is the DAML-S ontology written in
DAML+OIL. Li and Horrocks (2004) introduced the concept of service matchmaking for e-commerce,
assessed the requirements for a service description language and ontology, and argued that DAML+OIL
DQG'$0/6IXO¿OOWKHVHUHTXLUHPHQWV
While the development of Web services and semantic web has been impressive, numerous research
RSSRUWXQLWLHVH[LVW)RUH[DPSOHVHPDQWLFZHEWHFKQRORJLHVFDQKHOS¿UPVWRLPSURYHLQWHUQDODQGH[-
ternal data integration, knowledge discovery, knowledge management, and service-oriented architectures.
7RUHDOL]HWKHVHEHQH¿WVUHVHDUFKDQGSUDFWLWLRQHUFRPPXQLWLHVQHHGWRFROODERUDWHRQWKHVWDQGDUGDQG
tool development to encourage the exploration and exploitation of the semantic web technologies, and
VHUYLFHRULHQWHGDSSOLFDWLRQGHYHORSPHQWWRHQKDQFHLQWHU¿UPGDWDVKDULQJDQGFROODERUDWLRQ%HFDXVH
web servers typically contain proprietary information from multiple sources, security control over server
access is essential. The best security measures for this purpose are yet to be determined.
Web 2.0
Web 2.0 is a new generation of Internet paradigm. With its promise of a more powerful, engaging,
and interactive user experience, Web 2.0 seems poised to revolutionize the way in which we interact
with information resources. As consumers are rapidly adopting Web 2.0 technologies and applications
like AJAX, mashup, Web logs, wikis, Really Simple Syndication (RSS), collective games, and social
QHWZRUNV¿UPVDUHTXLFNO\HPEUDFLQJ:HEWHFKQRORJLHVDQGGHYHORSLQJZHEHQDEOHGEXVLQHVV
models and marketing tools. For example, social networking sites such as MySpace and Facebook have
grown tremendously in popularity in the past few years. Social networking services are a fast-growing
business in the Internet. However, it is unknown if online relationships and their growth patterns are the
same as in physical social networks.
,QOLJKWRIWKHVLJQL¿FDQWLPSDFWRQPDUNHWLQJDQGVDOHVUHVHDUFKLVQHHGHGWRGHYHORSDXQL¿HG
framework to understand how consumer perceptions, privacy, risk, trust, and attitudes affect the adop-
WLRQRI:HE)XUWKHUPRUHPDQ\TXHVWLRQVUHPDLQRQKRZ¿UPVFDQLQÀXHQFHWKHFXVWRPHUGHFL-
sion-making process by means of Web 2.0 tools, generate values, and engage consumers in the value
generation process.
lv
Voice over IP (VoIP) and IP Communications

VoIP technologies have continued to evolve, including establishment of several important standards. The
integration of different modes of communication is already happening and the increasing reliability of
the network will foster the rate of adoption of VoIP. The driving forces for the individual and business
DGRSWLRQRIWKH9R,3DUHWKHVLJQL¿FDQWFRVWVDYLQJVSRUWDELOLW\DQGIXQFWLRQDOLW\WKDWFDQEHUHDOL]HG
by switching some or all of their voice services to VoIP. However, there are risks associated with VoIP
services which may impact quality and security of the phone system for voice communications. VoIP
communication may be subject to eavesdropping by anyone on the same LAN or a shared medium such
as neighborhood cable modem. If the VoIP user connects through an open wireless hotspot, there is also
an increased risk of eavesdropping.
The development of broadband and wireless connections has led to a wide diffusion of IP-related
applications for businesses. Currently, a large amount of different services and solutions are available
for business application: advanced IP telephony calls and management, Web, audio, video services,
YLGHRFRQIHUHQFLQJ LQVWDQW PHVVDJLQJ ¿OH VKDULQJ HPDLO ID[ DQG YRLFHPDLO DQG SHUVRQDO YLUWXDO
assistance. An IP communication-based network facilitates the convergence of different applications,
which in turn enhances service quality and decreases service costs at the same time. The prospects for
IP communication systems depend upon the interaction between demand and supply in the process of
evaluating innovative solutions.
As VoIP technology and IP communication technology are still in an early stage, it would be interest-
ing to investigate what factors are drivers and inhibitors for the adoption of these new technologies by
¿UPVDQGXVHUVZKDWYDOXHWKH\FUHDWHIRUEXVLQHVVRUJDQL]DWLRQVDQGKRZWKHWHFKQRORJLFDOIHDWXUHV
interact with users’ characteristics. What are the technological and organizational issues of adopting
these new technologies?
Ubiquitous Computing and U-Commerce
Ubiquitous computing is a paradigm shift where technology becomes virtually invisible in our lives. The
DGYDQFHPHQWRIQHZWHFKQRORJLHVVXFKDVUDGLRIUHTXHQF\LGHQWL¿FDWLRQ5),'DQGVHQVRUQHWZRUNV
KDVLQLWLDWHGDWUHQGWRZDUGVXELTXLWRXVFRPSXWLQJZKLFKLVDOVRFDOOHG³DQ\WLPHDQ\ZKHUH´FRPSXW-
ing (Lyytinen et al., 2004). In a ubiquitous computing environment, computing devices, applications,
QHWZRUNVDQGGDWDZLOOEHIXOO\LQWHJUDWHGDQGPHUJHG-XQJODV:DWVRQ'XHWRWKH³DQ\WLPH
anywhere” pervasive computing, organizational activities become more nomadic. The ubiquitous com-
puting environment will make possible new forms of organizing, communicating, working and living.

However, ubiquitous computing systems create new risks to security and privacy.
Ubiquitous computing has enabled a new paradigm of commerce which goes beyond any traditional
FRPPHUFH-XQJODV:DWVRQ7KLVW\SHRIFRPPHUFHLVFDOOHG³XELTXLWRXVFRPPHUFH´RUVLPSO\
³XFRPPHUFH´DQGLVH[SHFWHGWRKDYHDJUHDWLPSDFWRQEXVLQHVVHV'HVSLWHWKHSURPLVLQJIXWXUHRI
XELTXLWRXVFRPSXWLQJDQGWKHWUHPHQGRXVEHQH¿WVLWFDQEULQJWRFXVWRPHUVFXVWRPHUV¶SULYDF\FRQFHUQV
appear to be the biggest obstacle and social issue (Asif & Mandviwalla, 2005). The advancement of
technologies embedded and used in the u-commerce environment raises concerns of customers because
their personal information can not only be constantly accessed and continuously tracked, but can also be
easily disseminated and possibly used in ways unknown to them (Gunther & Spiekermann, 2005). From
the technical point of view, research needs to address the features of successful ubiquitous computing
applications. From an organizational and behavioral point of view, user interface design, perceptions,
satisfaction, security, and privacy issues need to be addressed.
CONCLUSION
,QWKHFXUUHQWWXUEXOHQWGLJLWDOHFRQRP\¿UPVDUHHDJHUWRH[SORUHDQGH[SORLWQHZWHFKQRORJLHVDQG
experiment with new business models to stay in business and be competitive. Due to the rapid tech-
nological advances in web technologies, managers are facing an unprecedented level of e-business
opportunities and challenges. However, the past and current research in e-business has been studied in
various disciplines and has not yet provided a comprehensive view of future e-business directions to
JXLGHUHVHDUFKHUVDQGSUDFWLWLRQHUV7KHSXUSRVHRIWKLVFKDSWHUZDVWRUHÀHFWRQWKHSDVWDQGFXUUHQW
e-business research and technological developments and to identify emerging trends and research issues
in e-business.
The major observations to be drawn from the past studies include: (1) the realization of operational
DQGVWUDWHJLFEHQH¿WVZDVIRXQGWREHFRQWLQJHQWXSRQHIIHFWLYHDVVLPLODWLRQRIHEXVLQHVVLQQRYDWLRQ
top management championship, strategic investment rationale, and the extent of coordination; (2) the
traditional IT development methodologies and infrastructure became inadequate in supporting the com-
SOH[FDSDELOLWLHVRIHEXVLQHVVDSSOLFDWLRQVWKDWQHHGWROHYHUDJHLQWHU¿UPSURFHVVDQGIURQWHQGDQG
back-end system integration; (3) privacy and security issues are critical for the success of e-business;
(4) m-commerce has enormous potential to become a dominant form of market mechanism; (5) virtual
communities and social networking are growing at an unprecedented rate, and have potential to become
prominent business models structured around user interests and needs. These observations should be

taken into account in the design of future research in emerging trends in e-business.
ACKNOWLEDGMENT
I thank three anonymous reviewers for their helpful comments.
REFERENCES
Adelaar, T. (2000). Electronic commerce and the implications for market structure. Journal of Computer
Mediated Communication, 5(3). Retrieved April 15, 2008, from />elaar.htm
Amit, R., & Zott, C. (2001). Value creation in e-business. Strategic Management Journal, 22, 493–
520.
Andersen, P. H. (2005). Relationship marketing and brand involvement of professionals through web-en-
hanced brand communities: the case of Coloplast. Industrial Marketing Management, 34(3), 285-297.
$VKUD¿1.XLOERHU-33ULYDF\SURWHFWLRQYLDWHFKQRORJ\3ODWIRUPIRUSULYDF\SUHIHUHQFHV
(P3P). International Journal of E-Business Research, 1(2), 56-69.
Asif, Z., & Mandviwalla, M. (2005). Integrating the supply chain with RFID, a technical and business
analysis. Communications of the Association for Information Systems, 15, 393-427.
Bai, L., Chou, D.C., Yen, D.C., & Lin, B. (2005). Mobile commerce: Its market analyses. International
Journal of Mobile Communications, 3(1), 66 - 81.
lvii
Baida, Z., Gordijn, J., Akkermans, H., Sæle, H.& Morch, A. (2007). How e-services satisfy customer
needs: A software-aided reasoning. In I. Lee, E-Business Innovation and Process Management (pp.
198-233), Hershey, PA: CyberTech Publishing.
Bakos, J.Y. (1991). A strategic analysis of electronic marketplaces. MIS Quarterly, 15(3), 294-310.
Barnes, S.J., & Vidgen, R.T. (2002). An integrative approach to the assessment of e-commerce quality,
Journal of Electronic Commerce Research, 3(3), 114-127.
%KDWWDFKHUMHH$,QGLYLGXDOWUXVWLQRQOLQH¿UPVWKHUHODWLYHDQGWHPSRUDOHIIHFWVRIDQWHFHGHQW
beliefs. International Journal of E-Business Research, 2(4), 21-38.
Beck, C. (2007). A communications model for knowledge sharing. In A. Salam; J. Stevens, Semantic
Web Technologies and E-Business: Toward the Integrated Virtual Organization and Business Process
Automation (pp. 237-254), Hershey, PA: IGI Publishing.
Benyoucef, M., Alj, H., Vézeau, M., & Keller, R.K. (2001). Combined Negotiations in E-Commerce:
Concepts and Architecture. Electronic Commerce Research, 1(3), 277-299.

Berners-Lee, T., Hendler, J., & Lassila, O. (2001). The semantic web. 6FLHQWL¿F$PHULFDQ0DJD]LQH.
May 17.
Bichler, M., Segev, A., & Zhao, J.L. (1998). Component-based e-commerce: assessment of current
practices and future directions. ACM SIGMOD Record, 27(4), 7-14.
Bose, R., & Sugumaran, V. (2006). Challenges for deploying web services-based e-business systems in
SMEs. International Journal of E-Business Research, 2(1), 1-18.
Bruce, N., Haruvy, E., & Rao, R. (2004). Seller rating, price, and default in online auctions. Journal of
Interactive Marketing, 18(4), 37-50.
Bughin, J., & Hagel, J. (2000). The operational performance of virtual communities-towards a successful
business model? Electronic Markets, 10(4), 237-243.
BuzReport. (2008a). Retrieved April 15, 2008, from />line_shopping_growth_to_slow.html
BuzReport. (2008b). Retrieved April 15, 2008, from />cial_spending_to_increase_in_08.html
Cannoy, S., & Iyer, L. (2007). Semantic web standards and ontologies in the medical sciences and
healthcare. In A. Salam; J. Stevens, Semantic Web Technologies and E-Business: Toward the Integrated
Virtual Organization and Business Process Automation (pp. 405-420), Hershey, PA: IGI Publishing.
Cavusoglu, H., B Mishra, B., & Raghunathan, S. (2004). The Effect of Internet Security Breach An-
nouncements on Market Value: Capital Market Reactions for Breached Firms and Internet Security
Developers. International Journal of Electronic Commerce, 9(1), 70-104.
Chatterjee, D., Grewal, R., & Sambamurthy, V. (2002). Shaping up for e-commerce: institutional enablers
of the organizational assimilation of Web technologies, MIS Quarterly, 26(2), 65-89.
Cheng, E.C. (2000). An object-oriented organizational model to support dynamic role-based access
control in electronic commerce. Decision Support Systems, 29(4), 357 - 369.
lviii
Cho, Y.H., & Kim, J.K. (2004). Application of web usage mining and product taxonomy to collaborative
recommendations in e-commerce. Expert Systems with Applications, 26(2), 233-246.
Clemons, E.K., & Row M.C. (1992). Information technology and industrial cooperation: the changing
economics of coordination and ownership. Journal of Management Information Systems. 9(2), 9-28.
Dholakia, U.M., (2005). The usefulness of bidders’ reputation ratings to sellers in online auctions. Journal
of Interactive Marketing, 19(1), 31-41.
Doherty, N.F., & Lockett, N.J. (2007). Closing the gap between the expectations of relationship market-

ing and the reality of e-CRM. International Journal of E-Business Research, 3(2), i-v.
'\HU-+(IIHFWLYHLQWHU¿UPFROODERUDWLRQKRZ¿UPVPLQLPL]HWUDQVDFWLRQFRVWVDQGPD[LPL]H
transaction value. Strategic Management Journal, 18(7), 535-556.
(DUS -%$QWRQ$,$LPDQ6PLWK/ 6WXIÀHEHDP:+  ([DPLQLQJ,QWHUQHW SULYDF\
policies within the context of user privacy values. IEEE Transactions on Engineering Management,
52(2), 227 - 237.
Eirinaki, M., & Vazirgiannis, M. (2003). Web mining for web personalization. ACM Transactions on
Internet Technology, 3(1), 1 - 27.
Facca, F.M., & Lanzi, P.L. (2005). Mining interesting knowledge from weblogs: a survey. Data &
Knowledge Engineering, 53(3), 225-241.
Fahey, L., Srivastava, R., Sharon, J. S., & Smith, D.E. (2001). Linking e-business and operating pro-
cesses: The role of knowledge management, IBM Systems Journal, 40(4), 889-907.
Frohlich, M.T. (2002). E-integration in the supply chain: barriers and performance. Decision Sciences,
33(4), 537-556.
Frolick, M.N., & Chen, L.D. (2004). Assessing m-commerce opportunities. Information Systems Man-
agement, 21(2), 53 - 61.
Furnell, S.M., & T. Karweni, T. (2000). Security implications of electronic commerce: A survey of
consumers and businesses. Internet Research, 9(5), 372 - 382.
Garicano, L., & Kaplan, S.N. (2001). The effects of business-to-business e-commerce on transaction
costs. Journal of Industrial Economics, 49(4), 463-485.
Gefen, D., & D Straub, D. (2003). Managing user trust in B2C e-services. e-Service Journal, 2(2), 7-
24.
Gibbs, J., Kraemer, K.L., & Dedrick, J. (2003). Environment and policy factors shaping global e-com-
merce diffusion: a cross-country comparison. The Information Society, 19(1), 5-18.
Goethals, F., Vandenbulcke, J., Lemahieu, W., & Snoeck, M. (2007). Different types of business-to-
business integration: extended enterprise integration vs market B2B integration. In I. Lee, E-Business
Innovation and Process Management (pp. 1-17), Hershey, PA: CyberTech Publishing.
Goh, V.T., & Siddiqi, M.U. (2007). A robust watermarking scheme using codes based on the redundant
residue number system. In G. Radhamani; G.S.V.R.K. Rao, Web Services Security and E-Business (pp.
271-305), Hershey, PA: IGI Publishing.

lix
Gordijn, J., Yu, E., & van der Raadt, B. (2006). e-Service design using i
*
and e
3
value modeling. IEEE
Software, 23(3), 26-33.
*RVDLQ60DOKRWUD$(O6DZ\2$&RRUGLQDWLQJIRUÀH[LELOLW\LQHEXVLQHVVVXSSO\
chains. Journal of Management Information Systems, 21(3), 7 - 45.
Gould, C., & Zhao, F. (2006). Online information privacy and its implications for e-entrepreneurship and
e-busines ethics. In F. Zhao, Entrepreneurship and Innovations in E-Business: An Integrative Perspective
(pp. 200-222), Hershey, PA: Idea Group Publishing.
Guan, S.; Zhu, F. (2007). Ontology exchange and integration via product-brokering agents. In A. Salam;
J. Stevens, Semantic Web Technologies and E-Business: Toward the Integrated Virtual Organization and
Business Process Automation (pp. 169-184), Hershey, PA: IGI Publishing.
Gunther, O., & Spiekermann, S. (2005). RFID and the perception of control: the consumer’s view. Com-
munications of the ACM, 48(9), 73-76.
Gurbaxani, V. and Whang S. (1991). The impact of information aystems on organizations and markets.
Communications of the ACM, 34 (1), 59-73.
Hartung, F., & Ramme, F. (2000). Digital rights management and watermarking of multimedia content
for m-commerce applications. IEEE Communications, 38(11), 78-84.
He, M., Jennings, N.R., & Leung, H.F. (2003). On agent-mediated electronic commerce. IEEE Transac-
tions on Knowledge and Data Engineering, 15(4), 985-1003.
Hepp, M. (2006). Semantic Web and semantic Web services: father and son or indivisible twins? IEEE
Internet Computing, 10(2), 85-88.
Hoffman, D.L., Novak, T.P., & Schlosser, A.E., (2000). The evolution of the digital divide: How gaps
in Internet access may impact electronic commerce. Journal of Computer-Mediated Communication,
5(3). Retrieved June 20, 2008, from />+XL./7HR++/HH6<77KHYDOXHRISULYDF\DVVXUDQFH$QH[SORUDWRU\¿HOGH[SHUL-
ment. MIS Quarterly, 31(1), 19-33.
Jarvenppa S. L., & Tiller E. H. (1999). Integrating market, technology, and policy opportunities in e-

business strategy, Journal of Strategic Information Systems, 8(3), 235-249.
-HQVHQ0&0HFNOLQJ:+7KHRU\RIWKH¿UPPDQDJHULDOEHKDYLRUDJHQF\FRVWVDQG
ownership structure. Journal of Financial Economics, 3(October), 305-360.
Jih, Wen-Jang (2007). Effects of consumer-perceived convenience on shopping intention in mobile com-
merce: An empirical study. International Journal of E-Business Research, 3(4), 33-48.
Jones, K., & Leonard, L.N.K. (2007). Consumer-to-Consumer Electronic Commerce: A Distinct Research
Stream. Journal of Electronic Commerce in Organizations, 5(4), 39-54.
-RR-/HH6-HRQJ<$SSOLFDWLRQRIVHPDQWLFZHEEDVHGRQWKHGRPDLQVSHFL¿FRQWRORJ\
for global km. In A. Salam; J. Stevens, Semantic Web Technologies and E-Business: Toward the Integrated
Virtual Organization and Business Process Automation (pp. 287-309), Hershey, PA: IGI Publishing.
Junglas, I. A., & Watson, R. T. (2006). The u-constructs: four information drives. Communications of
the Associations of Information Systems, 17, 569-592.

×