Next Issue
Volume 3, April
Previous Issue
Volume 2, August
 
 
Journal of Theoretical and Applied Electronic Commerce Research is published by MDPI from Volume 16 Issue 3 (2021). Previous articles were published by another publisher in Open Access under a CC-BY 3.0 licence, and they are hosted by MDPI on mdpi.com as a courtesy and upon agreement with Faculty of Engineering of the Universidad de Talca.

J. Theor. Appl. Electron. Commer. Res., Volume 2, Issue 3 (December 2007) – 8 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
350 KiB  
Article
A Survey of Electronic Signature Solutions in Mobile Devices
by Antonio Ruiz-Martínez, Daniel Sánchez-Martínez, María Martínez-Montesinos and Antonio F. Gómez-Skarmeta
J. Theor. Appl. Electron. Commer. Res. 2007, 2(3), 94-109; https://doi.org/10.3390/jtaer2030024 - 01 Dec 2007
Cited by 12 | Viewed by 980
Abstract
The development of electronic signature in mobile devices is an essential issue for the advance and expansion of the mobile electronic commerce since it provides security and trust in the system. E-signatures provide security for the transactions with authenticity and integrity characteristics that [...] Read more.
The development of electronic signature in mobile devices is an essential issue for the advance and expansion of the mobile electronic commerce since it provides security and trust in the system. E-signatures provide security for the transactions with authenticity and integrity characteristics that make non-repudiation of the transactions possible. In recent years, different technologies and infrastructures have been developed with the aim of implementing mobile signature processes. Some are based on the SIM card. Others work over the middleware of the mobile device and cryptographic providers. Finally, there are already some frameworks which are independent of specific mobile device technologies and make mobile signatures available to application providers. Therefore, there is a great range of possibilities. In this paper we review the different solutions to date to provide electronic signature in mobile devices (SMS signature, SATK, WIM, USAT-i, SATSA, Mobile signature service, etc). We will comment on the most important goals of each solution and analyse the advantages and disadvantages. From this analysis we will obtain a global view of the current and future tendencies of mobile signature and thus help to provide mobile signature solutions. Full article
148 KiB  
Article
Self-Regulation of Mobile Marketing Aimed at Children: An Overview of the Spanish Case
by María de Miguel Molina
J. Theor. Appl. Electron. Commer. Res. 2007, 2(3), 80-93; https://doi.org/10.3390/jtaer2030023 - 01 Dec 2007
Cited by 4 | Viewed by 490
Abstract
Mobile phones have changed consumer and company behaviour and today they constitute the most direct means of communication between them. Many groups are targeted through promotion campaigns using mobile phones. Children, who in the future will be the largest consumer of new technologies, [...] Read more.
Mobile phones have changed consumer and company behaviour and today they constitute the most direct means of communication between them. Many groups are targeted through promotion campaigns using mobile phones. Children, who in the future will be the largest consumer of new technologies, are one of these groups. Given that current Spanish legislation does not clearly establish what company policy ought to be in relation to promotions aimed at children, self-regulation of the mobile telephone sector is imperative. Spain is already among the developed countries in which one out of every two children has a mobile phone. Firms should pay special attention to this target group. Firstly, because promotional campaigns aimed at children have their peculiarities and secondly because of the legal and ethical protection that children deserve. Company policy, in this sense, should include the drawing up of Codes of Conduct. This article begins by analysing the child segment as mobile phone consumers. It then highlights the legal and ethical problems of mobile campaigns aimed at children, and looks at some studies carried out by the European Commission and the Spanish government. Finally, this paper draws some conclusions about the measures companies should adopt and offers practical help for self-regulation of the mobile telephone sector in Spain and, if possible, in other countries (especially other European countries within the framework of the agreement signed by the leading European mobile operators in 2007 to develop self-regulatory codes by 2008). Moreover, future research needs to centre on whether these measures increase child protection. Full article
835 KiB  
Article
Business Model Scenarios for Remote Management
by Olivier Braet and Pieter Ballon
J. Theor. Appl. Electron. Commer. Res. 2007, 2(3), 62-79; https://doi.org/10.3390/jtaer2030022 - 01 Dec 2007
Cited by 1 | Viewed by 671
Abstract
This article critically appraises business model challenges in implementing remote management functionalities. Remote management is believed to create new service opportunities and foster convergence between previously dissociated islands of end user devices. Conflicting business logics from disparate industries, however, run counter to this [...] Read more.
This article critically appraises business model challenges in implementing remote management functionalities. Remote management is believed to create new service opportunities and foster convergence between previously dissociated islands of end user devices. Conflicting business logics from disparate industries, however, run counter to this attempt at centralization. We introduce a generic business modeling methodology that aims to move beyond traditional ICT investment appraisal techniques by combining four critical dimensions of design. We develop four business model scenarios based on the organizational design choice of ‘degree of vertical integration’ and the product design choices of ‘degree of product modularity’ and ‘distribution of intelligence’ and offer a description of the effect of these design choices on the intended customer value. Full article
166 KiB  
Article
One-Size E-Business Adoption Model Does Not Fit All
by Barbara Roberts and Mark Toleman
J. Theor. Appl. Electron. Commer. Res. 2007, 2(3), 49-61; https://doi.org/10.3390/jtaer2030021 - 01 Dec 2007
Cited by 7 | Viewed by 542
Abstract
This empirical study of organisational e-business adoption, utilising both qualitative and quantitative data collection methods, examines four major factors influencing adoption in multiple e-business process domains. Support is found for the proposition that factors influencing e-business adoption behaviour have different levels of impact [...] Read more.
This empirical study of organisational e-business adoption, utilising both qualitative and quantitative data collection methods, examines four major factors influencing adoption in multiple e-business process domains. Support is found for the proposition that factors influencing e-business adoption behaviour have different levels of impact across different e-business process domains. Different combinations of factors influence different ebusiness processes and for the most part this occurs independently of organisation size/resource capacity. For example, governments and powerful supply chain organisations have strong influence over some organisational e-business strategy. In particular, e-government influence is strong with regard to use of e-mail and external web sites due to government’s legislative and regulatory compliance power. However, government influence is weak with regard to operation of an organisation’s own web sites. A conceptual model of antecedents and performance outcomes of e-business adoption is modified to take account of findings from this study. Full article
211 KiB  
Article
Toward a Valid Measure of E-Retailing Service Quality
by John R. Rossiter
J. Theor. Appl. Electron. Commer. Res. 2007, 2(3), 36-48; https://doi.org/10.3390/jtaer2030020 - 01 Dec 2007
Cited by 14 | Viewed by 585
Abstract
E-retailers are major players in the field of electronic commerce and their success would seem to depend on service quality, because they are selling the same products that traditional retailers sell. This article critiques Collier and Bienstock’s [5] new measure of e-retailing service [...] Read more.
E-retailers are major players in the field of electronic commerce and their success would seem to depend on service quality, because they are selling the same products that traditional retailers sell. This article critiques Collier and Bienstock’s [5] new measure of e-retailing service quality and shows how the stages of e-retailing service quality can be more validly measured by adopting Rossiter’s [12] C-OAR-SE procedure for scale development. Collier and Bienstock`s measure is insufficiently valid because the measure (1) fails to specify the hierarchical objects that form the construct, and measures the overall object, e-retailing, wrongly by focusing on completed transactions; (2) does not fully acknowledge the hierarchy of attributes that form the construct and operationalizes these attributes wrongly as “reflective” when at all four levels they are “formed”; (3) inappropriately represents the rater entity by using college student participants; (4) employs unnecessarily numerous, often redundant, and sometimes ambiguous scale items, with Likert-type answer scales that make the observed scores managerially almost uninterpretable; and (5) tries to measure overall e-retailing service quality when it makes sense only to measure the separate quality ratings of sequential stages of the e-retailing service process. The article points out how these problems could be avoided by constructing a new measure that properly applies the C-OAR-SE procedure. Full article
490 KiB  
Article
Trading Digital Information Goods Based on Semantic Technologies
by Wolfgang Maass, Wernher Behrendt and Aldo Gangemi
J. Theor. Appl. Electron. Commer. Res. 2007, 2(3), 18-35; https://doi.org/10.3390/jtaer2030019 - 01 Dec 2007
Cited by 3 | Viewed by 506
Abstract
Digital information goods constitute a growing class of economic goods. During decision making for a purchase a buyer searches for information about digital information goods, such as information about the content, price and trading information, usage information, how it can be presented, and [...] Read more.
Digital information goods constitute a growing class of economic goods. During decision making for a purchase a buyer searches for information about digital information goods, such as information about the content, price and trading information, usage information, how it can be presented, and which legal restrictions apply. We present a logical container model for knowledge-intensive digital information goods (knowledge content object - KCO) that directly references formalised semantic descriptions of key information types on information goods. Key information types are formalised as plug-in slots (facets). Facets can be instantiated by semantic descriptions that are linked with domain ontologies. We have identified six logically congruent facet types by which a user can interpret information goods. KCOs are mediated and managed by a technical middleware, called Knowledge Content Carrier Architecture - KCCA. Based on the technical and logical structure of a KCO we will discuss five economic implications that drive further research. Full article
1206 KiB  
Article
Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering
by Lothar Fritsch
J. Theor. Appl. Electron. Commer. Res. 2007, 2(3), 1-17; https://doi.org/10.3390/jtaer2030018 - 01 Dec 2007
Cited by 2 | Viewed by 506
Abstract
This article presents an approach for the design of location-based information systems that support privacy functionality. Privacy-enhancing technology (PET) has been available for a considerable amount of time. New online applications and infrastructures for mobile and ubiquitous use have been installed. This has [...] Read more.
This article presents an approach for the design of location-based information systems that support privacy functionality. Privacy-enhancing technology (PET) has been available for a considerable amount of time. New online applications and infrastructures for mobile and ubiquitous use have been installed. This has been done without usage of available PET, although they are favored by data protection experts. Designers of locationbased services (LBS) create infrastructures for business or application specific purposes. They have profitoriented views on the rationale for PET deployment. Finally, users have requirements that might be neither on the PET community’s nor on the business people's agenda. Many disciplines provide knowledge about the construction of community-spanning information systems. The challenge for designers of infrastructures and applications is to find a consensus that models all stakeholders’ interests – and takes advantage all involved community’s knowledge. This paper groups LBS stakeholders into a framework based onto a sociological knowledge construct called “boundary object”. For this purpose, a taxonomical analysis of publications in the stakeholder communities is performed. Then the paper proposes a socio-technical approach. Its goal is to find a suitable privacy design for a LBS infrastructure based on the boundary object. Topics for further interdisciplinary research efforts are identified and proposed for discussion. Full article
28 KiB  
Editorial
Editorial
by Narciso Cerpa
J. Theor. Appl. Electron. Commer. Res. 2007, 2(3), I-II; https://doi.org/10.3390/jtaer2030017 - 01 Dec 2007
Cited by 1 | Viewed by 390
Abstract
We have met most of the goals set two year [...] Full article
Previous Issue
Next Issue
Back to TopTop