Global Electronic Commerce: Theory and Case Studies

Over the past two decades, businesses in virtually every sector of the world economy have benefited from the technologies of electronic commerce--the automation of commercial transactions using computer and communications technologies. Electronic commerce has spurred far-reaching changes in business, on multiple fronts, using many technologies. This book provides a deep, practical understanding of these technologies and their use in e-commerce. Unlike other books on e-commerce, it does not concentrate solely on the Internet. Instead, it suggests that the Internet is only a bridge technology--attractive because of its low cost and global reach, but unattractive because of its slow speed and poor user interface. Each of the twelve chapters contains an overview of a current theory or practice followed by one or more business case studies. A combination of academic theory and case studies provides a comprehensive picture of how businesspeople use computers to revolutionize the selling and delivery of their products and services.

[1]  John J. Sviokla,et al.  Exploiting the virtual value chain , 1999 .

[2]  G. Seitz GET A HANDLE ON IT , 1999 .

[3]  J. Christopher Westland,et al.  Customer and Merchant Acceptance of Electronic Cash: Evidence from Mondex in Hong Kong , 1998, Int. J. Electron. Commer..

[4]  Eric van Heck,et al.  Re-Engineering the Dutch Flower Auctions: A Framework for Analyzing Exchange Organizations , 1996, Inf. Syst. Res..

[5]  Janice H. Hammond,et al.  REENGINEERING CHANNEL REORDERING PROCESSES TO IMPROVE TOTAL SUPPLY‐CHAIN PERFORMANCE , 1997 .

[6]  Ho Geun Lee,et al.  EDI-Enabled Channel Transformation: Extending Business Process Redesign beyond the Firm , 1997, Int. J. Electron. Commer..

[7]  Mary Meeker Internet Advertising Report , 1997 .

[8]  Jack P. C. Kleijnen,et al.  New entrants and the role of information technology case-study: the Tele Flower Auction in the Netherlands , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[9]  Ho Geun Lee,et al.  Market Process Reengineering through Electronic Market Systems: Opportunities and Challenges , 1996, J. Manag. Inf. Syst..

[10]  J. Christopher Westland,et al.  Automation of China's Securities Markets , 1997, Electron. Mark..

[11]  J. Christopher Westland,et al.  Electronic Cash in Hong Kong , 1997, Electron. Mark..

[12]  J. Christopher Westland,et al.  Cinema theory, video games, and multimedia production , 1996 .

[13]  Mary Meeker,et al.  The Internet Report , 1996 .

[14]  Ho Geun Lee,et al.  Electronic brokerage and electronic auction: the impact of IT on market structures , 1996, Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences.

[15]  Eric K. Clemons,et al.  Reengineering money: the Mondex stored value card and beyond , 1996, Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences.

[16]  Donna B. Stoddard,et al.  Interorganizational business process redesign: merging technological and process innovation , 1996, Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences.

[17]  Eric K. Clemons,et al.  Market dominance as a precursor of market failure: emerging technologies and the competitive advantage of new entrants , 1996, Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences.

[18]  Ken Lindup,et al.  Feature: Hackers for hire , 1996 .

[19]  G. DeSanctis,et al.  Electronic Communication and Changing Organizational Forms , 1995 .

[20]  J. King,et al.  Hardwiring Weak Ties: Interorganizational Computer-Mediated Communication, Occupational Communities, and Organizational Change , 1995 .

[21]  Janice H. Hammond,et al.  The Information-Integrated Channel: A Study of the U.S. Apparel Industry in Transition , 1995 .

[22]  Robert P. Forrestal China's financial markets , 1995 .

[23]  Silvano Ongetta Hackers: an enemy to know better , 1995 .

[24]  Helen Collinson A recipe for hacker heartburn , 1995 .

[25]  J. Christopher Westland Bayesian alternatives to neural computing , 1995, IEEE Trans. Syst. Man Cybern..

[26]  John J. Sviokla,et al.  Managing in the Marketspace , 1994 .

[27]  Strategic issues in telecommunications: Unbundling the information infrastructure , 1994 .

[28]  Tridas Mukhopadhyay,et al.  Interdependent Benefits from Interorganizational Systems: Opportunities for Business Partner Reengineering , 1994, J. Manag. Inf. Syst..

[29]  Chris F. Kemerer,et al.  Computerized Loan Origination Systems: An Industry Case Study of the Electronic Markets Hypothesis , 1994, MIS Q..

[30]  F. Riggins,et al.  The growth of interorganizational systems in the presence of network externalities , 1994 .

[31]  John Ure Telecommunications, with Chinese characteristics , 1994 .

[32]  Wade Roush Hackers taking a byte out of computer crime , 1994 .

[33]  Peter G. Neumann,et al.  Risks of passwords , 1994, CACM.

[34]  Ronald M. Harstad,et al.  Modeling Competitive Bidding: A Critical Essay , 1994 .

[35]  Henry C. Lucas,et al.  The Role of Information Technology in Organization Design , 1994, J. Manag. Inf. Syst..

[36]  M. Venkatraman It-enabled business transformation: from automation to business scope redefinition , 1994 .

[37]  张谷 实验经济学(Experimental Economics)研究思路及成果应用简述 , 1994 .

[38]  Eric K. Clemons,et al.  Information, Power, and Control of the Distribution Channel: Preliminary Results of a Field Study in the Consumer Packaged Goods Industry , 1992, ICIS.

[39]  J. Christopher Westland Economic Incentives for Database Normalization , 1992, Inf. Process. Manag..

[40]  J. Westland Congestion and network externalities in the short run pricing of information system services , 1992 .

[41]  J. Sterman,et al.  Systems thinking and organizational learning: Acting locally and thinking globally in the organization of the future , 1992 .

[42]  Jan Hruska,et al.  Computer security reference book , 1992 .

[43]  Arnold W. Sametz,et al.  The role of financial reform and development in China's economic reform and development , 1991 .

[44]  Yannis Bakos,et al.  Information Links and Electronic Marketplaces: The Role of Interorganizational Information Systems in Vertical Markets , 1991, J. Manag. Inf. Syst..

[45]  Belden Menkus "Hackers": Know the adversary , 1991, Comput. Secur..

[46]  J. Christopher Westland,et al.  Economic constraints in hypertext , 1991, J. Am. Soc. Inf. Sci..

[47]  Vijay Gurbaxani,et al.  The impact of information systems on organizations and markets , 1991, CACM.

[48]  Eli M. Noam,et al.  Technologies without Boundaries: On Telecommunications in a Global Age , 1992 .

[49]  Mariko Inoue,et al.  Japanese social structure and white collar crime: Recruit cosmos and beyond∗ , 1990 .

[50]  J. Christopher Westland Collaboration and Productivity in Information Systems Research , 1990, Inf. Soc..

[51]  Alvin Toffler,et al.  パワーシフト : 21世紀へと変容する知識と富と暴力 = Powershift : knowledge, wealth, and violence at the edge of the 21st century , 1990 .

[52]  D. Parker,et al.  Ethical conflicts in information and computer science, technology, and business , 1990 .

[53]  P. David The Dynamo and the Computer: An Historical Perspective on the Modern Productivity Paradox , 1990 .

[54]  J. Christopher Westland Topic-Specific Market Concentration in the Information Services Industry: Evidence from the DIALOG Group of Data Bases , 1989, Inf. Soc..

[55]  W. Davidson,et al.  Telecommunications policy and economic development: Models for the People's Republic of China , 1989 .

[56]  Louis Phlips,et al.  The Economics of Imperfect Information , 1989 .

[57]  Mei Xia Emerging securities markets : the case of China , 1989 .

[58]  Manfred Kochen,et al.  Small World , 2002 .

[59]  Louis W. Stern,et al.  Management in marketing channels , 1989 .

[60]  David Chaum,et al.  Smart card 2000 : the future of IC cards : proceedings of the IFIP WG 11.6 International Conference on Smart Card 2000--the Future of IC Cards, Laxenburg, Austria, 19-20 October 1987 , 1989 .

[61]  J. Christopher Westland A net benefits approach to measuring retrieval performance , 1989, Inf. Process. Manag..

[62]  Sandra S. Hildreth The A to Z of Wall Street , 1988 .

[63]  Anthony G. Oettinger,et al.  Behind the telephone debates , 1988 .

[64]  R. Porter,et al.  An Empirical Study of an Auction with Asymmetric Information , 1988 .

[65]  JoAnne Yates,et al.  Electronic markets and electronic hierarchies , 1987, CACM.

[66]  T. Roehl,et al.  Mobilizing invisible assets , 1987 .

[67]  J. Beniger The Control Revolution: Technological and Economic Origins of the Information Society , 1986 .

[68]  P. Kotler Prosumers: A New Type of Consumer , 1986 .

[69]  Ithiel de Sola Pool Forecasting the telephone : a retrospective technology assessment , 1986 .

[70]  M. E. Maron,et al.  An evaluation of retrieval effectiveness for a full-text document-retrieval system , 1985, CACM.

[71]  O. Williamson The Economic Institutions of Capitalism: Firms, Markets, Relational Contracting , 1985 .

[72]  J. Goodman,et al.  Dictionary of Finance and Investment Terms , 1985 .

[73]  Richard J. Herrnstein,et al.  Crime and Human Nature , 1985 .

[74]  Ithiel de Sola Pool,et al.  Technologies of Freedom , 1983 .

[75]  Stephanie S. Barrett,et al.  Inter-Organization Information Sharing Systems , 1982, MIS Q..

[76]  G. L. Leffler,et al.  The Stock Market , 1957 .

[77]  George Kingsley Zipf,et al.  Human behavior and the principle of least effort , 1949 .