Next Issue
Volume 5, April
Previous Issue
Volume 4, August
 
 
Journal of Theoretical and Applied Electronic Commerce Research is published by MDPI from Volume 16 Issue 3 (2021). Previous articles were published by another publisher in Open Access under a CC-BY 3.0 licence, and they are hosted by MDPI on mdpi.com as a courtesy and upon agreement with Faculty of Engineering of the Universidad de Talca.

J. Theor. Appl. Electron. Commer. Res., Volume 4, Issue 3 (December 2009) – 8 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
197 KiB  
Article
The Paradoxical Nature of Electronic Decision Aids on Comparison-Shopping: The Experiments and Analysis
by Yun Wan, Satya Menon and Arkalgud Ramaprasad
J. Theor. Appl. Electron. Commer. Res. 2009, 4(3), 80-96; https://doi.org/10.4067/S0718-18762009000300008 - 1 Dec 2009
Cited by 16 | Viewed by 712
Abstract
Consumers who use electronic decision aids such as comparison-shopping agents may be overwhelmed by the amount of choice information available to them, leading to an inability to choose or dissatisfaction with the ultimate choice, a state of “choice overload.” Two experiments were designed [...] Read more.
Consumers who use electronic decision aids such as comparison-shopping agents may be overwhelmed by the amount of choice information available to them, leading to an inability to choose or dissatisfaction with the ultimate choice, a state of “choice overload.” Two experiments were designed to test the choice overload hypothesis. Eight choice tasks of different sizes were presented to subjects. By observing the decision quality, decision time, and decision confidence, we confirmed our hypothesis that choice overload exists when the comparison matrix exceeds a certain size (24 choices and 10 attributes for each choice in this research). Subjects were then given different combinations of decision-making tools (sorting and short-listing) and conditions (refreshing of information) to deal with the same choice task within the choice overload range obtained from the initial experiment. The use of both decision-making tools unexpectedly required more decision-making effort and resulted in less decision satisfaction than when only one decision-making tool was provided. We believe these findings are relevant to the future development of electronic decision aids. Further research is needed in this direction to extend our understanding of decision-making in electronic decision aids mediated environment. Full article
128 KiB  
Article
Securing Electronic Customer-Signatures in Legally Binding Business Processes: A Case Study from the Insurance Industry
by Vincent Wolff-Marting, André Köhler and Volker Gruhn
J. Theor. Appl. Electron. Commer. Res. 2009, 4(3), 72-79; https://doi.org/10.4067/S0718-18762009000300007 - 1 Dec 2009
Cited by 1 | Viewed by 611
Abstract
On the way to a completely electronic workflow, it is necessary to include customer signatures. Legislation in many countries treats electronic signatures similar to handwritten ones. Both are accepted for various purposes such as for finalization of documents, acknowledgement of the document’s contents [...] Read more.
On the way to a completely electronic workflow, it is necessary to include customer signatures. Legislation in many countries treats electronic signatures similar to handwritten ones. Both are accepted for various purposes such as for finalization of documents, acknowledgement of the document’s contents as well as conclusion of agreements. Most important, electronic signatures are accepted as proof of those actions. But customers today often lack knowledge or means to issue them. In this study a business process is described that will produce reliable signatures without the need of previous knowledge or devices on customer side. A threat model for a generic process is described and countermeasures including cryptography, biometric features, tamper-resistant devices, timestamps, signature databases, and others are discussed. Full article
276 KiB  
Article
Supplier Relationship Management: A Case Study in the Context of Health Care
by Tobias Mettler and Peter Rohner
J. Theor. Appl. Electron. Commer. Res. 2009, 4(3), 58-71; https://doi.org/10.4067/S0718-18762009000300006 - 1 Dec 2009
Cited by 33 | Viewed by 6678
Abstract
Supplier Relationship Management (SRM) plays an important role in the reduction of costs and the optimization of performance in industrial enterprises. Despite enormous investments in innovation, the health care sector has not experienced fundamental change yet. However, increased market dynamics and the implementation [...] Read more.
Supplier Relationship Management (SRM) plays an important role in the reduction of costs and the optimization of performance in industrial enterprises. Despite enormous investments in innovation, the health care sector has not experienced fundamental change yet. However, increased market dynamics and the implementation of economic principles will force health service providers to optimize cost structures as well as effectiveness and efficiency of business relationships. This paper reviews the current state of the art in the field, translates and amends the current findings for the health care context, and presents a case study illustrating the impact of the implementation of SRM principles in a leading Swiss hospital. Full article
1148 KiB  
Article
Preference Analysis and Default Optimization in Web-based Product Configuration Systems
by Reinhold Decker and Sören W. Scholz
J. Theor. Appl. Electron. Commer. Res. 2009, 4(3), 43-57; https://doi.org/10.4067/S0718-18762009000300005 - 1 Dec 2009
Cited by 2 | Viewed by 562
Abstract
Today, more and more companies are providing web-based product configuration systems in order to better meet individual customer preferences. In many cases, pre-defined product specifications are additionally offered to facilitate the corresponding choice decisions. Against this background, we present a Poisson regression approach [...] Read more.
Today, more and more companies are providing web-based product configuration systems in order to better meet individual customer preferences. In many cases, pre-defined product specifications are additionally offered to facilitate the corresponding choice decisions. Against this background, we present a Poisson regression approach for analyzing customer preferences and a genetic algorithm for determining preferencebased default products. The basis for this is transaction data, as they are automatically generated when configuring a product online. The potentials of the suggested methodology are demonstrated by means of two case studies referring to different product categories. Full article
233 KiB  
Article
eManaging Ambient Organizations in 3D
by Viktoria Skarler
J. Theor. Appl. Electron. Commer. Res. 2009, 4(3), 30-42; https://doi.org/10.4067/S0718-18762009000300004 - 1 Dec 2009
Viewed by 556
Abstract
As we work in different constellations, levels, networks, and sub networks etc., we need to see networking in multiple dimensions, i.e. as ambient organizations. To summarize the problem statement the article is addressing whether or not there is an added value for interpreting [...] Read more.
As we work in different constellations, levels, networks, and sub networks etc., we need to see networking in multiple dimensions, i.e. as ambient organizations. To summarize the problem statement the article is addressing whether or not there is an added value for interpreting the structure of collaboration by managing ambient organizations in 3D. By utilizing a cybernetic structure and combining a set of specific methods, a clear separation between narrative, content, and contexts of organizations can be determined and challenge the old traditional way of scientific and knowledge management. Take Stafford Beer’s methodology of Team Syntegrity which is based on cybernetic system theory where he uses the model of regular polyedra’s to manage knowledge creating and transferring by organizing individuals with a strict cybernetic structure, and see the group of individuals re-arrange themselves in a self-organizing way. This three dimensional approach of eManagement is used as a platform for suggestions of more 3D tools communication, knowledge-sharing and innovation through the use of the theory on Information Space by Max Boisot. This article focuses upon an ICT and organizational approach to show the difficulties in creating a network based on a virtual platform without equal contribution and interest by all parties involved and a common vision that motivate the individuals to be a part of the network. The support of this multi-dimensionality from information and communication technologies (ICT) moves us towards using the dynamics of social technologies as Web 2.0 (ff Web 3.0) and an intelligent semantic web. Both the ambient organization and the social technologies available raise the challenge of changing our mindset in order to be able to manage at all. Finally the paper applies these systems on the challenge of asymmetric information, globalization, and the economics at the bottom of the pyramid (BOP), which could be implemented or visualized as an e-business model. Full article
152 KiB  
Article
Factors Influencing Corporate Online Identity: A New Paradigm
by Steven Walczak and Dawn G. Gregg
J. Theor. Appl. Electron. Commer. Res. 2009, 4(3), 17-29; https://doi.org/10.4067/S0718-18762009000300003 - 1 Dec 2009
Cited by 11 | Viewed by 852
Abstract
Electronic commerce research has shown that a very wide variety of factors such as website quality and vendor reputation influence consumer behaviors and outcomes. These behaviors and outcomes include: trust, intention to transact, and return visits. However, these factors are typically studied in [...] Read more.
Electronic commerce research has shown that a very wide variety of factors such as website quality and vendor reputation influence consumer behaviors and outcomes. These behaviors and outcomes include: trust, intention to transact, and return visits. However, these factors are typically studied in isolation and often show conflicting results. This paper proposes a unifying model of online identity (or e-image) that combines the various factors that influence user perceptions of an e-business. Survey results support the importance of a wide variety of e-image factors when forming impressions online and show that while information content is the foremost concern for most users, the importance of other factors varies depending on the role of the user in establishing a relationship with the owner of the online identity. Full article
242 KiB  
Article
Read / Write Performance for low memory passive HF RFID tag-reader system
by Chih-Cheng Ou Yang, B.S. Prabhu, Charlie Qu, Chi-Cheng Chu and Rajit Gadh
J. Theor. Appl. Electron. Commer. Res. 2009, 4(3), 1-16; https://doi.org/10.4067/S0718-18762009000300002 - 1 Dec 2009
Cited by 3 | Viewed by 668
Abstract
Certain applications of passive radio frequency identification (RFID), such as those in healthcare where the patient’s name, identification or medical record must be stored, require data within a tag to be encrypted. Encrypted data within an RFID tag has the potential to affect [...] Read more.
Certain applications of passive radio frequency identification (RFID), such as those in healthcare where the patient’s name, identification or medical record must be stored, require data within a tag to be encrypted. Encrypted data within an RFID tag has the potential to affect the accuracy or time to read/write the data by the reader. The current research measures and analyzes the effects of encryption, distance of read and delay time between two read/write cycles on the accuracy of the read or write function in an RFID infrastructure. The research also measures and evaluates the time to read/write (R/W) data that is encrypted and compares this encrypted data with unencrypted data.The data encryption standard (DES) encryption method is used in this research due to the limitation of the tag. A multi-functional interface has been developed for the user to test the performance using a High Frequency RFID reader. The measurements were repeated 1000 times for each R/W test.The performance of R/W accuracy is not affected in any meaningful way by encryption even though there is an increase in memory requirement from 88 bytes to 128 bytes. The effect of R/W distance shows that the performance decreases with increase in the distance between the reader and the tag.By inserting a small amount of delay time between different cycles, we can get a significant increase up to 100% accuracy for read function. However, the write accuracy is not affected as significantly as the read accuracy.The effect of the encryption on the time to write the data on the tag shows that encrypted data group takes 70 ~ 120 milliseconds for the transmission more than the unencrypted data group.We conclude that while the encryption does not have a significant impact on the accuracy of R/W, the distance and cycle delay does. Also, the encrypted data takes longer to write to the tag. Full article
29 KiB  
Editorial
Editorial Notes
by Narciso Cerpa
J. Theor. Appl. Electron. Commer. Res. 2009, 4(3), I-III; https://doi.org/10.4067/S0718-18762009000300001 - 1 Dec 2009
Viewed by 491
Abstract
This issue completes the fourth volume of the Journal of Theoretical and Applied Electronic Commerce Research (JTAER).[...] Full article
Previous Issue
Next Issue
Back to TopTop