Search results

1 – 10 of 228
Article
Publication date: 1 December 2004

Lin Chai and Paul A. Pavlou

Globalization and the ubiquitous nature of the Internet facilitate e‐commerce activities across nations. An empirical study was conducted using data from Greek and US consumers in…

3051

Abstract

Globalization and the ubiquitous nature of the Internet facilitate e‐commerce activities across nations. An empirical study was conducted using data from Greek and US consumers in order to obtain a better understanding of cross‐cultural e‐commerce adoption. The results give support for the proposed hypotheses, emphasizing the moderating role of cultural differences on consumer e‐commerce adoption. The unique contributions of this paper are three fold. First, we introduce Hofstede's cultural dimension of uncertainty avoidance to the study of cross‐cultural e‐commerce adoption model. Second, we apply the theory of planned behavior perspective to capture behavioral intentions to transact online in two dissimilar countries – Greece and the US. Finally, the paper discusses several insights from this exploratory study that enrich the cross‐cultural e‐commerce literature.

Details

Journal of Enterprise Information Management, vol. 17 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 1 December 2002

Ramnath K. Chellappa and Paul A. Pavlou

Electronic commerce (EC) transactions are subject to multiple information security threats. Proposes that consumer trust in EC transactions is influenced by perceived information…

7761

Abstract

Electronic commerce (EC) transactions are subject to multiple information security threats. Proposes that consumer trust in EC transactions is influenced by perceived information security and distinguishes it from the objective assessment of security threats. Proposes mechanisms of encryption, protection, authentication, and verification as antecedents of perceived information security. These mechanisms are derived from technological solutions to security threats that are visible to consumers and hence contribute to actual consumer perceptions. Tests propositions in a study of 179 consumers and shows a significant relationship between consumers’ perceived information security and trust in EC transactions. Explores the role of limited financial liability as a surrogate for perceived security. However, the findings show that there is a minimal effect of financial liability on consumers’ trust in EC. Engenders several new insights regarding the role of perceived security in EC transactions.

Details

Logistics Information Management, vol. 15 no. 5/6
Type: Research Article
ISSN: 0957-6053

Keywords

Article
Publication date: 4 April 2023

Hafizah Omar Zaki, Dahlia Fernandez, Omkar Dastane, Aini Aman and Soliha Sanusi

This study unravels the intellectual structure of virtual reality (VR) in digital marketing (DM) research, identifies core research gaps and presents future research avenues. The…

1368

Abstract

Purpose

This study unravels the intellectual structure of virtual reality (VR) in digital marketing (DM) research, identifies core research gaps and presents future research avenues. The study also conducts a performance analysis of publications in the field and identifies the most important stakeholders of the stated topic.

Design/methodology/approach

The Web of Science database was used to retrieve the publications that were relevant to the topic between 2012 and 2022. Biblioshiny, a shiny app for the Bibliometrix R package, is used to conduct a bibliometric analysis by decoding the results into several visual representations.

Findings

This report includes the most prolific contributors, keyword analysis results, productive nations, authors and connections, as well as the most often cited publications on VR in DM. In DM research, numerous perspectives on VR were looked at, explored and revealed.

Practical implications

The findings provide a new perspective and understanding of the issue for researchers in order to improve their research insights in the field. This study will also benefit marketing practitioners in ensuring the sustainability and innovativeness of technology used to run their DM campaigns.

Originality/value

This research provides the first bibliometric analysis of the citation works and productivity in the field of VR in DM using Biblioshiny, identifies core research gaps and provides future research agenda which can be useful to advance the research understanding in this context.

Details

Marketing Intelligence & Planning, vol. 41 no. 4
Type: Research Article
ISSN: 0263-4503

Keywords

Article
Publication date: 12 September 2008

Penelope Sue Greenberg, Ralph H. Greenberg and Yvonne Lederer Antonucci

Business process outsourcing (BPO) has become so prevalent that a new term, the extended enterprise, has arisen to describe this approach to structuring an organization. The…

3117

Abstract

Purpose

Business process outsourcing (BPO) has become so prevalent that a new term, the extended enterprise, has arisen to describe this approach to structuring an organization. The purpose of this paper is to integrate the information systems and the interfirm governance literatures to develop a framework for the role of trust in the governance of extended enterprises.

Design/methodology/approach

This paper uses transaction cost economics (TCE) to identify the elements and stages of BPO relationships. This paper then integrates those elements with the types of trust identified in the information systems (IS) literature to develop a framework.

Findings

TCE identifies three elements that influence the design and function of interfirm relationships: the transaction, the transaction environment and the parties (the client and the vendors). TCE also recognizes three stages in the transaction: contact, contract, and control. The IS literature identifies three types of trust: trusted systems, trusted institutions, and trusted partners. The paper links the two literatures into a framework identifying the type of trust related to each of the TCE elements; it then uses these linkages to identify the types of trust appropriate for each stage of the BPO relationship.

Originality/value

This paper integrates the IS and interfirm governance literatures concerning trust in interorganizational relationships in an effort to offer a framework for building and sustaining trust between BPO vendors and clients and to identify potential directions for future research.

Details

Business Process Management Journal, vol. 14 no. 5
Type: Research Article
ISSN: 1463-7154

Keywords

Article
Publication date: 6 August 2020

Mojtaba Talafidaryani

While the dynamic capabilities perspective is the most cited strategic theory in the information systems field of research, little effort has been made to review and integrate the…

1937

Abstract

Purpose

While the dynamic capabilities perspective is the most cited strategic theory in the information systems field of research, little effort has been made to review and integrate the associate literature of this perspective in the field. Accordingly, this paper aims to systematically analyze the information systems literature on dynamic capabilities and provide a holistic understanding of the topical composition and trend of dynamic capabilities studies in information systems research.

Design/methodology/approach

Using latent Dirichlet allocation as the text analysis algorithm, the author conducted a topic modeling of the dynamic capabilities corpus in the information systems field of research to quantitatively review, summarize and classify the prior literature. The review covered 191 articles published on dynamic capabilities between 1998 and 2018 in pioneering information systems journals and conference proceedings.

Findings

In accordance with the topic modeling results, the topical composition of the dynamic capabilities corpus in information systems research dominantly includes seven themes titled T1. Information systems value, T2. Information systems change, T3. Digitalization, T4. Information systems agility, T5. Big data, T6. Information systems innovation and T7. Information systems alignment. Also, the overall and topical trend of dynamic capabilities studies in the information systems field of research were revealed. The trends indicated that the investigated domain and its prominent sub-domains have generally had positive productivity over the past years.

Originality/value

The current study contributes to the domain by developing knowledge and improving literature on dynamic capabilities in information systems research, discovering the main topics of interest for information systems researchers to deploying the dynamic capabilities perspective in their studies, and prioritizing the future information systems research on dynamic capabilities based on the identified trends of topics.

Article
Publication date: 8 March 2021

Xin Feng, Liangxuan Li, Jiapei Li, Meiru Cui, Liming Sun and Ye Wu

This paper aims to study the characteristics and evolution rules of tagging knowledge network for users with different activity levels in question-and-answer (Q&A) community…

Abstract

Purpose

This paper aims to study the characteristics and evolution rules of tagging knowledge network for users with different activity levels in question-and-answer (Q&A) community represented by Zhihu.

Design/methodology/approach

A random sample of issue tag data generated by topics in the Zhihu network environment is selected. By defining user quality and selecting the top 20% and bottom 20% of users to focus on, i.e. top users and bot users, the authors apply time slicing for both types of data to construct label knowledge networks, use Q-Q diagrams and ARIMA models to analyze network indicators and introduce the theory and methods of network motif.

Findings

This study shows that when the power index of degree distribution is less than or equal to 3.1, the ARIMA model with rank index of label network has a higher fitting degree. With the development of the community, the correlation between tags in the tagging knowledge network is very weak.

Research limitations/implications

It is not comprehensive and sufficient to classify users only according to their activity levels. And traditional statistical analysis is not applicable to large data sets. In the follow-up work, the authors will further explore the characteristics of the network at a larger scale and longer timescale and consider adding more node features, including some edge features. Then, users are statistically classified according to the attributes of nodes and edges to construct complex networks, and algorithms such as machine learning and deep learning are used to calculate large-scale data sets to deeply study the evolution of knowledge networks.

Practical implications

This paper uses the real data of the Zhihu community to divide users according to user activity and combines the theoretical methods of statistical testing, time series and network motifs to carry out the time series evolution of the knowledge network of the Q&A community. And these research methods provide other network problems with some new ideas. Research has found that user activity has a certain impact on the evolution of the tagging network. The tagging network followed by users with high activity level tends to be stable, and the tagging network followed by users with low activity level gradually fluctuates.

Social implications

Research has found that user activity has a certain impact on the evolution of the tagging network. The tagging network followed by users with high activity level tends to be stable, and the tagging network followed by users with low activity level gradually fluctuates. For the community, understanding the formation mechanism of its network structure and key nodes in the network is conducive to improving the knowledge system of the content, finding user behavior preferences and improving user experience. Future research work will focus on identifying outbreak points from a large number of topics, predicting topical trends and conducting timely public opinion guidance and control.

Originality/value

In terms of data selection, the user quality is defined; the Zhihu tags are divided into two categories for time slicing; and network indicators and network motifs are compared and analyzed. In addition, statistical tests, time series analysis and network modality theory are used to analyze the tags.

Details

Information Discovery and Delivery, vol. 49 no. 2
Type: Research Article
ISSN: 2398-6247

Keywords

Article
Publication date: 1 October 2014

Taesoo Ahn, Young Ik Suh, Jin Kyun Lee and Paul M Pedersen

The purpose of this study was to examine purchasing intentions in online sports ticketing websites. Based on previous research related to business-to-consumer (B2C) e-commerce…

1906

Abstract

The purpose of this study was to examine purchasing intentions in online sports ticketing websites. Based on previous research related to business-to-consumer (B2C) e-commerce, this study developed a conceptual model to test the effect of perceived risk, trust and the Technology Acceptance Model (TAM) on purchase intentions in online secondary ticket websites. College students (N = 251) from the northeastern region of the United States were chosen as the sample. Structural Equation Modeling (SEM) was used to investigate the proposed relationships among four major components (i.e. perceived risk, trust, TAM and behavioural intention). The results showed that there were positive effects of key TAM constructs (i.e. perceived usefulness and ease of use) and trust on purchasing intention, but perceived risk was not a significant indicator of purchase intention.

Details

International Journal of Sports Marketing and Sponsorship, vol. 16 no. 1
Type: Research Article
ISSN: 1464-6668

Keywords

Book part
Publication date: 10 December 2015

Dekar Urumsah

The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally. This is…

Abstract

The concept and practice of e-services has become essential in business transactions. Yet there are still many organizations that have not developed e-services optimally. This is especially relevant in the context of Indonesian Airline companies. Therefore, many airline customers in Indonesia are still in doubt about it, or even do not use it. To fill this gap, this study attempts to develop a model for e-services adoption and empirically examines the factors influencing the airlines customers in Indonesia in using e-services offered by the Indonesian airline companies. Taking six Indonesian airline companies as a case example, the study investigated the antecedents of e-services usage of Indonesian airlines. This study further examined the impacts of motivation on customers in using e-services in the Indonesian context. Another important aim of this study was to investigate how ages, experiences and geographical areas moderate effects of e-services usage.

The study adopts a positivist research paradigm with a two-phase sequential mixed method design involving qualitative and quantitative approaches. An initial research model was first developed based on an extensive literature review, by combining acceptance and use of information technology theories, expectancy theory and the inter-organizational system motivation models. A qualitative field study via semi-structured interviews was then conducted to explore the present state among 15 respondents. The results of the interviews were analysed using content analysis yielding the final model of e-services usage. Eighteen antecedent factors hypotheses and three moderating factors hypotheses and 52-item questionnaire were developed. A focus group discussion of five respondents and a pilot study of 59 respondents resulted in final version of the questionnaire.

In the second phase, the main survey was conducted nationally to collect the research data among Indonesian airline customers who had already used Indonesian airline e-services. A total of 819 valid questionnaires were obtained. The data was then analysed using a partial least square (PLS) based structural equation modelling (SEM) technique to produce the contributions of links in the e-services model (22% of all the variances in e-services usage, 37.8% in intention to use, 46.6% in motivation, 39.2% in outcome expectancy, and 37.7% in effort expectancy). Meanwhile, path coefficients and t-values demonstrated various different influences of antecedent factors towards e-services usage. Additionally, a multi-group analysis based on PLS is employed with mixed results. In the final findings, 14 hypotheses were supported and 7 hypotheses were not supported.

The major findings of this study have confirmed that motivation has the strongest contribution in e-services usage. In addition, motivation affects e-services usage both directly and indirectly through intention-to-use. This study provides contributions to the existing knowledge of e-services models, and practical applications of IT usage. Most importantly, an understanding of antecedents of e-services adoption will provide guidelines for stakeholders in developing better e-services and strategies in order to promote and encourage more customers to use e-services. Finally, the accomplishment of this study can be expanded through possible adaptations in other industries and other geographical contexts.

Details

E-services Adoption: Processes by Firms in Developing Nations
Type: Book
ISBN: 978-1-78560-709-7

Keywords

Article
Publication date: 3 May 2011

Yi Wang and Xinping Shi

Small and mid‐sized enterprises (SMEs) are facing challenges in an increasingly fierce environment. This paper aims to explore the promise of information systems (IS) in enhancing…

1485

Abstract

Purpose

Small and mid‐sized enterprises (SMEs) are facing challenges in an increasingly fierce environment. This paper aims to explore the promise of information systems (IS) in enhancing the survival and competitiveness of SMEs in a dynamic environment. To address this issue, the paper draws upon the dynamic capability theory and develops a research model of IS‐enabled dynamic capabilities to examine the role of IS competence for enhancing SMEs dynamic capabilities in a competitive business environment.

Design/methodology/approach

An empirical study is conducted by using survey data from senior managers of 120 SMEs in China.

Findings

The analytic outcomes support the research model and confirm that IS competence significantly contributes to SMEs' dynamic capabilities for gaining competitive advantage.

Research limitations/implications

This paper contributes to the literature on IS impact on dynamic capabilities of SMEs by incorporating IS competences into a research model of IS‐enabled dynamic capabilities and articulating the relationships between IS competences and dynamic capabilities of SMEs in a changing business environment. The research findings enrich dynamic capabilities theory by justifying IS as an enabling antecedent for organizational capability development. The findings may empirically convince SMEs owners and management to effectively invest in and deploy IS for enhancing SMEs' dynamic capabilities and performance.

Originality/value

A capability‐building perspective is used to examine how IS can leverage SMEs' capabilities to enhance their competitive advantage in a dynamic environment.

Details

Journal of Systems and Information Technology, vol. 13 no. 2
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 12 September 2008

Ruey‐Jer “Bryan” Jean, Rudolf R. Sinkovics and Daekwan Kim

Advanced information technology (IT) changes the way companies manage cross‐border supply chains. This paper examines the role of IT in the context of international business to…

6256

Abstract

Purpose

Advanced information technology (IT) changes the way companies manage cross‐border supply chains. This paper examines the role of IT in the context of international business to business (B2B) relationship and its contribution to supply chain performance.

Design/methodology/approach

This literature review paper develops a conceptual model of IT‐mediated relationships in international supply chain relationships. The framework integrates transaction cost economics and resource‐based theory perspectives and argues that IT capabilities facilitate supply chain performance, deter partner's opportunism and this process is mediated by B2B processes. Moreover, environmental, relational, cultural and country level moderators are examined.

Findings

It is suggested that IT capabilities contribute directly to improved organizational process such as coordination, transaction specific investment, absorptive capacity and monitoring. These in turn contribute to strategic and operational performance outcomes. Against a resource‐based as well as a transaction‐cost theory background it is suggested that partner interdependence and environmental, country and cultural factors moderate the process of IT contribution on performance.

Research limitations/implications

The paper provides a number of propositions which can be tested empirically in future studies.

Practical implications

Managers should focus on the complementarities of IT capabilities. Electronic integration in combination with, for example, human IT resources may enhance supply chain performance and mitigate the moderating effects of environmental, relational, cultural and country factors.

Originality/value

The paper develops an integrated conceptual model and propositions which contribute to a clarification of the ambiguous nature of the IT‐business value in international B2B relationship.

Details

International Marketing Review, vol. 25 no. 5
Type: Research Article
ISSN: 0265-1335

Keywords

1 – 10 of 228