نتایج جستجو برای: ec electronic commerce
تعداد نتایج: 280780 فیلتر نتایج به سال:
The development of electronic commerce (EC) systems is subject to different conditions than that of conventional software systems. Examples of such differentiating conditions are that the development requires the integration of many systems from various suppliers and that content and functionality have to be coordinated closely. In addition, the roles involved in the development process, their ...
Based on the evolutionary view of electronic commerce (EC), the dynamic capabilities approach and the relational view of the firm, this paper investigates the factors firms to develop capacities to integrate their business-to-business EC applications with their internal information systems (IS). This theoretical model is tested with data collected from 159 executive managers practicing in the w...
Analyzing Competition and Collusion Strategies in Electronic Marketplaces with Information Asymmetry
Electronic commerce (EC) researchers are divided between those who show how EC can cause intense Bertrand competition and those who show an absence of this competition. This research takes a more central stance to show when intense competition occurs and when collusion occurs in an EC environment. We present a multi-industry investigation of competition and collusion related to firm pricing beh...
Business-to-business electronic commerce (B2B EC) opens up new possibilities of trade. For example, new business partners from around the globe can be found, their offers can be compared, even complex negotiations can be conducted electronically, and a contract can be drawn up and fulfilled via an electronic marketplace. However, a sophisticated data management is required to provide such facti...
Electronic commerce (EC) has become an important support for business and is regarded as an efficient system that connects suppliers with online users. Among the applications of EC, the recommender system is undoubtedly a popular issue to make the best recommendation to the users. Even if tremendous approaches have been proposed to perfect the recommendation, a comprehensive module comprising o...
With the development of Electronic Commerce (EC), the need of offering brokerage facilities in a distributed environment has arisen. Customers need, in many situations, systems (broker agents) that simplify them the access to the different products and services provided by suppliers. On the other hand, the existence of brokers increases the globality of EC, since customers are even more unaware...
The growth of electronic commerce (EC) may be impeded because payment systems (PS) designed for offline commerce have been adapted for online use, but without all of the information contained in physical meetings among transaction parties. Resulting problems add costs to transactions and affect profitability for EC transactions. New PS have been developed and are in various stages of theory, de...
With the development of Electronic Commerce (EC), the need of offering brokerage facilities in a distributed environment has arisen. Customers need, in many situations, systems (broker agents) that simplify them the access to the different products and services provided by suppliers. On the other hand, the existence of brokers increases the globality of EC, since customers are even more unaware...
This study surveys the perceptions and experiences of smalland medium-sized enterprises (SMEs) in the implementation of Internet-based Electronic Commerce (EC). This paper proposes a framework of EC implementation success for SMEs. Results of preliminary interviews of small businesses in Australia and Singapore show that respondents’ perceptions of Internet-based EC are pre-dominantly positive....
Electronic commerce (EC) transactions are subject to multiple information security threats. Proposes that consumer trust in EC transactions is influenced by perceived information security and distinguishes it from the objective assessment of security threats. Proposes mechanisms of encryption, protection, authentication, and verification as antecedents of perceived information security. These m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید