e-Commerce 2011

Transcription

e-Commerce 2011
CCSIS
M
MCCSIS
Proceedings of the
IADIS International Conference
e-Commerce 2011
EDITED BY
Sandeep Krishnamurthy
IADIS INTERNATIONAL CONFERENCE
E-COMMERCE 2011
part of the
IADIS MULTI CONFERENCE ON COMPUTER SCIENCE AND
INFORMATION SYSTEMS 2011
ii
PROCEEDINGS OF THE
IADIS INTERNATIONAL CONFERENCE
E-COMMERCE 2011
part of the
IADIS MULTI CONFERENCE ON COMPUTER SCIENCE AND
INFORMATION SYSTEMS 2011
Rome, Italy
JULY 21 - 23, 2011
Organised by
IADIS
International Association for Development of the Information Society
iii
Copyright 2011
IADIS Press
All rights reserved
This work is subject to copyright. All rights are reserved, whether the whole or part of the material
is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other way, and storage in data banks.
Permission for use must always be obtained from IADIS Press. Please contact [email protected]
Volume Editors:
Sandeep Krishnamurthy
Computer Science and Information Systems Series Editors:
Piet Kommers and Pedro Isaías
Associate Editors: Luís Rodrigues
ISBN: 978-972-8939-51-9
iv
TABLE OF CONTENTS
FOREWORD
ix
PROGRAM COMMITTEE
xi
KEYNOTE LECTURE
xv
FULL PAPERS
MEASURABLE PARAMETERS OF E-COMMERCE SYSTEMS FOCUSED
ON WEB INTERFACE
3
Petr Suchánek, Radim Dolák and Kateřina Slaninová
EVALUATING THE READINESS TO M-GOVERNMENT
IMPLEMENTATION IN BAHRAIN
11
Ahmed Sowaileh and Ali AlSoufi
GENETIC ALGORITHM BASED OPTIMIZATION FOR E-AUCTION
19
Mourad Ykhlef and Reem AlQifari
AN EXAMINATION OF THE CONTENTS OF PRIVACY POLICIES
ON THE AUSTRALIAN LOCAL GOVERNMENT WEBSITES
27
Qiuyan Fan
TAXONOMY OF IT INTANGIBLES ASSETS BASED ON THE ELECTRONIC
GOVERNMENT MATURITY MODEL IN URUGUAY
35
Helena Garbarino, Bruno Delgado and José Carrillo
A MODEL OF CUSTOMER RELATIONSHIP MANAGEMENT FOR THE CONTEXT
OF PERMISSION-BASED E-MAIL MARKETING
43
Hsin-Hui Lin
DETECTING EMERGING TOPICS AND TRENDS
VIA SOCIAL MEDIA ANALYTICS
51
Richard Colbaugh and Kristin Glass
E-LEARNING SEEN AS AN ENTERPRISE BUSINESS PROCESS
59
Fodé Touré and Esma Aïmeur
ANALYZING SENTIMENT OF SOCIAL MEDIA CONTENT
FOR BUSINESS INFORMATICS
Kristin Glass and Richard Colbaugh
v
67
A CONCEPTUAL MODEL OF WEB ATM ADOPTION:
AN INTEGRATED PERSPECTIVE OF THE TRANSACTION COST THEORY
AND INNOVATION DIFFUSION THEORY
75
Yi-Shun Wang, Shun-Cheng Wu, Hsin-Hui Lin, Yu-Min Wang and Ting-Rong He
USING MOBILE MESSAGING SERVICES IN EDUCATION:
DETERMINANTS OF STUDENTS’ ATTITUDES
83
Boonlert Watjatrakul
INTRODUCING MOBILE SERVICES TO DEVELOPING COUNTRIES
- A SOUTH AFRICAN PERSPECTIVE
91
Carolin Löffler and Michael Hettich
THE IMPACT OF INNOVATION, STANDARDIZATION, TECHNOLOGY
MARKETING STRATEGY ON THE PERFORMANCE IN SOFTWARE COMPANY:
COMPARATIVE STUDY ON SOFTWARE TYPE
99
Sung Hee Jang, Dong Man Lee and Hyun Sun Park
E-READINESS IN JORDAN ICT SECTOR COMPANIES
107
Maha Al-khaffaf
PROMOTORS AND INHIBTORS OF ONLINE GROCERY SHOPPING
IN DEVELOPING COUNTRIES FROM THE CONSUMERS’ PERSPECTIVE JORDAN AS CASE STUDY
114
Mohammad Al nawayseh, Bader Al fawwaz and Wamadeva Balachandran
ORGANIZATIONAL CONTROL ENVIRONMENT AND COBIT’S IT CONTROL
PROCESS IMPLEMENTATION
121
Nader Rezaei and Gareth Griffiths
ACCOUNTABILITY IN SINGLE WINDOW SYSTEMS USING AN INTERNAL
CERTIFICATE AUTHORITY - A CASE STUDY ON THAILAND’S NATIONAL
SINGLE WINDOW SYSTEM
129
Potchara Pruksasri, Jan van den Berg and Somnuk Keretho
VIRTUAL RECOMMENDATION DIFFUSION AND CO-SHOPPING INFLUENCE:
THE ROLE OF DYADIC NETWORK-BASED INTERACTIONS
137
Ana Torres and Francisco Martins
WHY DO BIDDERS BID ONLINE? THE VIEW OF CUSTOMER’S VALUE
145
Chiahui Yen, Chun-ming Chang, Chih-chin Yang, Lu-jui Chen and Ming-Chang Chiang
FACTORS INFLUENCING SAUDI CUSTOMERS’ DECISIONS TO PURCHASE
FROM ONLINE RETAILERS IN SAUDI ARABIA: A QUANTITATIVE ANALYSIS
153
Rayed AlGhamdi, Ann Nguyen, Jeremy Nguyen and Steve Drew
SHORT PAPERS
THE DETERMINANTS OF ONLINE HOTEL RESERVATION
Hulisi Öğüt
vi
165
CONSUMER BEHAVIORS IN REVENUE MANAGEMENT
W.R.T AUCTION THEORY
170
Mariam Shafqat and Zeeshan Khawar Malik
IMPACT OF VALUE PROPOSITION OF E-COMMERCE BY FIRMS
ON CUSTOMERS’ ADOPTABILITY
175
Aitzaz Ali and Zeeshan Khawar Malik
CYBERCRIMES AND THE BRAZILILIAN ATTEMPT
TO DEVELOP LEGISLATION
180
Maria Eugênia Finkelstein
MULTICHANNEL RETAILING STRATEGIES IN THE JAPANESE-STYLE
DISTRIBUTION SYSTEM: THE CASE OF KINOKUNIYA’S
MULTICHANNEL STRATEGIES
185
Hyemi Bang
DEVELOPING COMMUNICATION PRACTICES BY COMPUTER
AND VIDEO-CONFERENCING SYSTEMS:
A CASE STUDY OF A FINNISH RETAIL BANK
189
Johanna Ahola and Helena Ahola
A CHOREOGRAPHY LANGUAGE FOR BUSINESS COLLABORATION:
FROM ELECTRONIC CONTRACTING
TO INTER-ORGANIZATIONAL ENACTMENT
194
Alex Norta
CHANGES IN CONSUMER ACCEPTANCE OF DIRECT BANKING IN GERMANY
FOLLOWING THE FINANCIAL CRISES
199
Dirk Braun, Jan Kaehler and Jürgen Karla
REFLECTION PAPERS
IMPACT OF E-GOVERNMENT ON THE PRIVATE SECTOR AND THE ROLE
OF PRIVATE SECTOR IN THE E-GOVERNMENT INITIATIVES
207
Hussain Kassem Wasly and Ali AlSoufi
REFLECTIONS ON PRIVACY IN NEW LOCATION BASED SERVICES
IN SOCIAL NETWORKS
211
A. Paniza-Fullana, M. Payeras-Capellà, M. Mut-Puigserver and A. Isern-Deyà
POSTERS
UTILIZING THE COMMUNICATION-TECHNOLOGY TO MINIMIZE
THE FINANCIAL NEGATIVE INFLUENCE IN THE SUPPLY CHAIN
Ming-Yaun Hsieh, Wen-Yaun Wu, Chaang-Yuan Kung and Ya-Ling Wu
vii
217
INFRASTRUCTURE MODEL FOR ASSURANCE OF AUTHENTICATION DATA
EXCHANGE FORMAT
220
Ahmed Tallat, Hiroshi Yasuda and Kilho Shin
RESEARCH ON USING E-TECHNOLOGY AND E-ACTIVITIES
WITHIN BUSINESSES
Roman Malo
AUTHOR INDEX
viii
223
FOREWORD
These proceedings contain the papers of the IADIS International Conference e-Commerce
2011, which was organised by the International Association for Development of the
Information Society, Rome, Italy, 21 – 23 July, 2011. This conference is part of the Multi
Conference on Computer Science and Information Systems 2011, 20 - 26 July 2011, which
had a total of 1402 submissions.
The IADIS e-Commerce 2011 conference is a major international event for researchers,
academics, industry specialists, practitioners & students interested in the advances in, and
applications of, e-Commerce. The participants will have an opportunity to present and
observe the latest research results, and ideas in these areas. This conference aims to cover
both technological as well as non-technological issues related to this new business
paradigm.
The Conference invited proposals from the introductory through advanced level on all
topics related to e-Commerce. Proposals which address the theory, research and
applications as well as describe innovative projects were encouraged.
The following five main areas have been the object of paper and poster submissions within
specific topics:
- Commerce Technology;
- Global e-Commerce;
- Online Management;
- Online Business Models;
- Regulatory/Policy Issues.
The IADIS e-Commerce 2011 received 112 submissions from more than 24 countries. Each
submission has been anonymously reviewed by an average of four independent reviewers,
to ensure that accepted submissions were of a high standard. Consequently only 20 full
papers were approved which means an acceptance rate below 18 %. A few more papers
were accepted as short papers, reflection papers and posters. An extended version of the
best papers will be published in the IADIS International Journal on Computer Science and
Information Systems (ISSN: 1646-3692) and/or in the IADIS International Journal on
WWW/Internet (ISSN: 1645-7641) and also in other selected journals, including journals
from Inderscience.
Besides the presentation of full papers, short papers, reflection papers and posters, the
conference also included one keynote presentation from an internationally distinguished
researcher. We would therefore like to express our gratitude to Professor Erich
Schweighofer, Vienna University, Austria, for accepting our invitation as keynote speaker.
ix
As we all know, organising a conference requires the effort of many individuals. We would
like to thank all members of the Program Committee, for their hard work in reviewing and
selecting the papers that appear in the proceedings.
This volume has taken shape as a result of the contributions from a number of individuals.
We are grateful to all authors who have submitted their papers to enrich the conference
proceedings. We wish to thank all members of the organizing committee, delegates,
invitees and guests whose contribution and involvement are crucial for the success of the
conference.
Last but not the least, we hope that everybody will have a good time in Rome, and we
invite all participants for the next edition of the IADIS International Conference
e-Commerce 2012, that will be held in Lisbon, Portugal.
Sandeep Krishnamurthy,
Program Chair
University of Washington, USA
e-Commerce 2011 Conference Program Chair
Piet Kommers, University of Twente, The Netherlands
Pedro Isaías, Universidade Aberta (Portuguese Open University), Portugal
MCCSIS 2011 General Conference Co-Chairs
Rome, Portugal
July 2011
x
PROGRAM COMMITTEE
E-COMMERCE CONFERENCE PROGRAM CHAIR
Sandeep Krishnamurthy, University of Washington, USA
MCCSIS GENERAL CONFERENCE CO-CHAIRS
Piet Kommers, University of Twente, The Netherlands
Pedro Isaías, Universidade Aberta (Portuguese Open University), Portugal
E-COMMERCE CONFERENCE COMMITTEE MEMBERS
Abel Usoro, University of the West of Scotland, United Kingdom
Adam Vrechopoulos, Athens University Of Economics And Business, Greece
Adina Magda Florea, Politehnica University Of Bucharest, Romania
Agnes Koschmider, University Karlsruhe, Germany
Ainin Sulaiman, Universiti Malaya, Malaysia
Alex Norta, University Of Helsinki, Finland
Alexios Kaporis, University Of Patras, Greece
Amar Balla, Lcms-esi Ecole Nationale Supérieure , Algeria
Amelia Badica, University Of Craiova, Romania
Ángel Herrero Crespo, Universidad De Cantabria, Spain
Antonio Ruiz Martinez, University Of Murcia, Spain
Antonio Gabriel Lopez Herrera, University of Granada, Spain
Aristogiannis Garmpis, Technological Educational Institution Of Messolong, Greece
Arthur Csetenyi, Budapest Corvinus University, Hungary
Asher Rospigliosi, Brighton Business School, United Kingdom
Blanca Hernandez, Universidad De Zaragoza, Spain
Borislav Josanov, Novi Sad Business School, Serbia
Carla Ruiz Mafe, University Of Valencia, Spain
Chia-chen Lin, Providence University, Usa
Christian Kittl , Evolaris Ebusiness Competence Center, Austria
Christian Schloegl, University of Graz, Austria
Costas Lambrinoudakis, University of Piraeus, Greece
Costin Badica, University Of Craiova, Romania
David Parry, Auckland University Of Technology, New Zealand
Dennis Tachiki, Tamagawa University, Japan
Dimitrios Rigas, De Montfort University, United Kingdom
Dimitris Geneiatakis, University Of The Aegean, Greece
xi
Dimitris Kanellopoulos, University Of Patras, Greece
Dragan Cisic, University Of Rijeka, Croatia
Eduard Cristobal, Universitat De Lleida, Spain
Eduardo Peis, University Of Granada, Spain
Ejub Kajan, State University of Novi Pazar, Serbia
Emmanouel Varvarigos, University Of Patras, Greece
Erik Rolland, University Of California, USA
Esma Aimeur, Université De Montréal, Canada
Euripidis Loukis, University Of The Aegean, Greece
Fahim Akhter, Zayed University, United Arab Emirates
Francisco J. Martinez-Lopez, University Of Granada, Spain
Franz Lehner, Universität Passau, Germany
Gen-yih Liao, Chang Gung University, Taiwan
George Weir, University Of Strathclyde, United Kingdom
Georgios Dafoulas, Middlesex University, United Kingdom
Georgios Kambourakis, University Of The Aegean, Greece
Giorgos Karopoulos, Iit-cnr, Italy
Gisela Ammetller Montes, Universitat Oberta De Catalunya, Spain
Hana Horak, Faculty Of Economics And Business, Croatia
Hans Weigand, Tilburg University, Netherlands
Harekrishna Misra, Institute Of Rural Management Anand, India
Hiroaki Fukuda, Keio University, Japan
Inma Rodriguez-Ardura, Open University of Catalonia (Universitat Oberta d, Spain
Isabel De Felipe, Universidad Politécnica De Madrid, Spain
Isabella Mader, Imac Information & Management Consulting, Germany
Ivan Bedini, Alcatel-lucent Bell Labs, Ireland
Ivan Strugar, Universitiy Of Zagreb, Croatia
Jan Richling, Technische Universität Berlin, Germany
Jemal Abawajy, Deakin University, Australia
Jens Fromm, Fraunhofer FOKUS, Germany
Jeroen Doumen, Irdeto, Netherlands
Jim Buchan, Aut University, New Zealand
Josef Herget, Danube University Krems, Austria
Joseph Heili, Chambery School Of Business, France
Julián Briz, Universidad Politécnica De Madrid, Spain
Kamel Rouibah, College Of Business Administration, Kuwait
Klaus Turowski, University Of Augsburg, Germany
Krassie Petrova, Auckland University Of Technology, New Zealand
Lorena Blasco, Universidad De Zaragoza, Spain
Marc Esteva, Iiia-csic, Spain
Marco Furini, University Of Modena and Reggio Emilia, Italy
Marco Mevius, HTWG Konstanz, Germany
Maria Papadaki, University Of Plymouth, United Kingdom
Mario Spremic, University Of Zagreb, Croatia
xii
Markus Schranz, Vienna University Of Technology, Austria
Masrah Azmi Murad, Universiti Putra Malaysia, Malaysia
Matjaz Gams, Jozef Stefan Institute, Slovenia
Michael Merz, Ponton Consulting, Germany
Michelangelo Ceci, University Of Bari, Italy
Mirjana Pejic, University Of Zagreb, Croatia
Nahed Azab, Middlesex University, United Kingdom
Noha Saleeb, American University In Cairo, Egypt
Noor Akma Mohd Salleh, University Malaya, Malaysia
Nordin Bin Zakaria, Universiti Teknologi Petronas, Malaysia
Olle Olsson, Swedish Institute Of Computer Science, Sweden
Oshadi Alahakoon, Monash University, Australia
Pedro Solana González, Universidad De Cantabria, Spain
Pedro Soto-Acosta, Universidad De Múrcia, Spain
Pere Tumbas, Faculty Of Economics University Of Novi Sad, Serbia
Peter Weiss, FZI Research Center for Information Technology, Germany
Petra Hoepner, Fraunhofer Institut Fokus, Germany
Qun Ren, Bournemouth University, United Kingdom
Rainer Schmidt, Aalen University, Germany
Rajendra Akerkar, Western Norway Research Institute, Norway
Rodziah Atan, Universiti Putra Malaysia, Malaysia
Said Assar, Institut TELECOM Sud Paris, France
Shoba Tegginmath, Auckland University Of Technology, New Zealand
Shukor Abd Razak, Universiti Teknologi Malaysia, Malaysia
Sokratis Katsikas, University Of Piraeus, Greece
Spiros Sirmakessis, Technological Educational Institute of Messolongi, Greece
Spyros Kokolakis, University of the Aegean, Greece
Stefan Fenz, Vienna University of Technology, Austria
Stefanos Gritzalis, University Of The Aegean, Greece
Steven Furnell, University of Plymouth, United Kingdom
Susanne Robra-Bissantz, University Of Braunschweig, Germany
Tadashi Nakano, Osaka University, Japan
Thanassis Tiropanis, University Of Southampton, United Kingdom
Tokuro Matsuo, Yamagata University, Japan
Vaclav Subrta, University Of Economics, Czech Republic
Vassilis Triantafillou, Technological Educational Institution Of Messlongh, Greece
Yannis Stamatiou, University Of Ioannina, Greece
Yingjie Yang, De Montfort University, United Kingdom
Zeljko Panian, University Of Zagreb, Croatia
AUXILIARY REVIEWERS
Aggeliki TSOHOU, University of Piraeus, Greece
Dimitris Geneiatakis, Columbia University, USA
Prokopis DROGKARIS, University of the Aegean, Greece
xiii
xiv
KEYNOTE LECTURE
GOVERNANCE IN E-COMMERCE
Professor Erich Schweighofer,
Vienna University, Austria
ABSTRACT
E-commerce enables businesses to buy and sell products or services over electronic systems worldwide. The latin adage “ubi commercium, ibi jus” says that the efficiency of commerce depends on
an effective law, e.g. market freedoms, legal security etc. This principle remains valid in the
commercial cyberspace. A special cyberspace jurisdiction is without question as businesses,
vendors and consumers still act and live in real space giving States the strongest role as regulator
and enforcer of cyberspace. Thus, a very complex form of multilevel governance divides the
cyberspace in many territorial jurisdictions and compliance regimes. The advantage of more
flexibility and opportunities for businesses is contracted by higher legal risks.
The main question of governance of e-commerce for vendors is identifying relevant jurisdictions.
Businesses have to know which laws apply for doing e-commerce and which laws govern the
relations with customers. A clear set of jurisdictional rules is necessary for foreseeing what
behavior may invoke the laws or jurisdiction of another state. Whereas the situation seems to be
acceptable in the EU or the U.S., many problems exist for businesses acting outside of these
markets.
From the point of view of jurisdiction, cyberspace consists of three layers: physical infrastructure,
logical infrastructure and content layer. At present, due to the principle of network neutrality, most
governmental intervention is done at the content level. Mostly only criminal and political content is
subject to blocking but an extension of strongly considered by content industries (e.g. of file
sharing). The still limited experience proves that blocking cannot substitute the required cooperation between the various regulation providers and the minimum harmonization of rules worldwide. A focus of governance on servers or communications misses the fact that e-commerce
remains an exchange of goods or services under the control of human beings establishing and using
the technological infrastructure. As in real space, e-commerce providers must have a business
license in their respective State. Activities on other countries are subject to their rules, too. In the
EU, the EC E-Commerce-Directive has set the standard that a lawful business activity in one
country may be extended to the whole EEC area (with some limits). Besides that, businesses may
use loopholes in rules of some country. Some States offer favorable regimes for e-businesses (e.g.
media companies in Island). Due to the principle of network neutrality, this practice has to be
accepted because enforcing of contradictory rules in affected other countries may be very difficult.
xv
Businesses face jurisdictional risks due to protection concerns, in particular in the interest of
consumers. The EU Brussels Regulation allows consumers to sue in their country if the business
activities are targeted to this territory. In the US, the Zippo case states that the activity level of
websites – active, passive or interactive – constitutes an important factor in asserting jurisdiction.
As IT sets the factual framework for e-commerce activities, a more developed set of rules seems to
be required. Factors may be the commerciality of the activity, the targeting of this activity to a
particular country, and reasonable care undertaken in avoiding infringement of these rules. Many
rules on business activities, consumer protection and data protection have to be taken into account.
Very often, IT may support compliance with this rules e.g. a “privacy by design” approach. Thus,
IT developers should work very closely with lawyers in designing workable systems in e-commerce
that are compatible with relevant legal systems.
xvi
Full Papers
IADIS International Conference e-Commerce 2011
MEASURABLE PARAMETERS OF E-COMMERCE
SYSTEMS FOCUSED ON WEB INTERFACE
Petr Suchánek, Radim Dolák and Kateřina Slaninová
Silesian University in Opava, School of Business Administration in Karviná
Univerzitní náměstí 1934/3, Karviná, Czech Republic
ABSTRACT
E-commerce systems became essential for providing business in internet. E-commerce system model consists on several
components with appropriate functionality. The theory and practice show that the e-commerce system can be efficient
only, if its components are well defined, stable, and are working properly and optimally. Each of these components can
be considered as a system. The effective control and monitoring of the components can be provided due to the
appropriate definition of the component attributes. The main objective of this paper is to present a basic model of ecommerce system with focus on the web interface component. For this component, there is presented the definition of
key, especially measurable, indicators of website success and performance. The last part of the paper is oriented to the
case study, in which the definition of technical parameters of e-commerce system website using expert system NEST is
presented.
KEYWORDS
E-business, business intelligence, expert systems, measurable parameters, e-commerce, web interface
1. INTRODUCTION
E-commerce systems became a standard tool for business implementation. E-commerce systems are usually
large systems containing various subsystems. The theory and practice show that the e-commerce system as a
whole is successful, only if all the subsystems are working properly and optimally, and therefore the entire ecommerce system and its all parts have to be constantly monitored. The monitoring involves the
measurement of current values, which are then compared with expected values (planned values). The modern
enterprise needs to focus on the core elements that drive profitability and growth over the short, medium and
long term (IBIS ASOCIATES, 2010). In this context, the system values are measured continuously and are
taken as a source for calculations of other key indicators that are monitored at different periods. The basic
condition for the company access is a profit. Several resulting indicators are therefore related to the profit,
and generally, are related to return on investment (ROI). Within the e-commerce system, the individual
values are usually measured through the Internet (web sites) and are analyzed with the help of instruments
contained in the Customer Relationship Management (CRM) and Enerprise Resource Planning (ERP). The
indicator measurements can be performed with a wide range of instruments. In the first group we can include
web statistics systems and clickstream analytics tools such as Google analytics, ClickTracks, Gemius, Google
AdWords, Deep Log Analyzer, WebLog Expert, SawMill, LogAnalyzer, Web Log Explorer 3.21, Geo Log
Analyzer 1.48, Nihuo Web Log Analyzer 3.11, Advanced Web Statistics 7.0, AWStats, W3Perl and more;
the second group consists of tools contained in a number of CRM systems and in the third group we can
include special software tools, for example expert systems. The main objective of this paper is to present a
basic model of the e-commerce system, to define the key indicators of website success and performance, and
to present case study with the application of expert system NEST for parameter measurements of ecommerce system website.
3
ISBN: 978-972-8939-51-9 © 2011 IADIS
2. E-COMMERCE SYSTEM
E-commerce system is an information system with its own architecture. The architecture of an information
system encompasses the hardware and software used to deliver the solution to the final consumer of services.
The architecture is a description of the design and contents of a computerized system (BURD, 2005). The
system architecture must be designed so that the whole system ensures the support for all key areas which
include: administration, finance, sales, production, planning, management, logistics, service delivery,
personnel, IS/IT, and security. Each key area is usually supported (or rather, is created) by one subsystem.
In some publications, for example (GARCIA; PATERNO; GIL, 2002), there is defined the e-commerce
system as only a web server that contains all the necessary functionality. This model can be considered only
as an elementary model presenting a basic communication interface between the user and the Web server.
The modeling of e-commerce systems can be done using process oriented, value-chain oriented or multiagent oriented approach. The main model of the e-commerce system based on the process-oriented approach
is shown for example in (RAJPUT, 2000). This model can be extended, so that we can define the main
components of the e-commerce system including customers, internet, web server (web interface), CRM,
ERP, LAN (Local Network Area), payment system, delivery of goods, after-delivery (after-sales) services,
and finally, information systems of cooperating suppliers and customers (see Figure 1).
Figure 1. E-commerce system
To achieve the efficiency of the whole e-commerce system, the all subsystems from which the system is
composed, must be efficient as well. The problem with one or more of shown e-commerce system
characteristics can have an adverse effect to companies´ business activities, and can be a cause of financial
loss. The significant emphasis should put on the functionality of the information system from the point of
view of its performance. This kind of approach can also be implemented in similar solutions to interactive
systems. (BUCKI, 2007) The entire e-commerce system, as well as all of its subsystems, can be described by
a number of parameters. Furthermore, consistently with the objectives of this paper, we consider only the key
indicators of website success and performance.
4
IADIS International Conference e-Commerce 2011
3. KEY INDICATORS OF WEBSITE SUCCESS AND PERFORMANCE
There are number of indicators that can be measured and calculated (INAN 2010), and by which we can
make a description of the current e-commerce system performance. Within the e-commerce systems, the
measurement can be divided into the following types:
• Performance measurement - measurement of technical parameters (for example web page load time,
speed of processing user commands, speed reporting, etc.),
• Usability testing – usability testing is done in laboratory conditions (for experienced users are set
various tasks),
• Measurement of the success – measurement of the success should answer the question how the ecommerce system helps to meet the company objectives. Outcomes of this measurement are used primarily to
the system optimization and control.
Generally, the first step is to determine all the possible data sources. In the terms of the e-commerce
system, the source data can be divided into the following groups:
• Operational characteristics – on the web interface there are, for example, number of displayed web
pages, number of website visitors; in connection with the information system there can be, for example,
number of successfully completed transactions, number of failed transactions (may be associated with system
disturbances), etc.,
• Customer data – data relate primarily to the demographic characteristics of visitors and their preferences
(city listed in the order, city listed in the query or demand, gender of customer, etc.),
• Transactional data – data directly related to the sale of goods or services. These data are the basis for
financial analysis (e.g. average order value),
• Data from other sources - other data relating to consumer behavior in the website.
As mentioned above, in this article we are interested above all the measurable parameters that can be
measured through a Web interface (web technologies).
The first group of parameters includes the key indicators for the measurement of the e-commerce system
success. In this case, the input data are the number of days (time period), site visits (unique visits), number of
demands received from the web, number of orders received from the web, number of users who have made
an order, and data from CRM and ERP (amount of orders – revenue, margin orders).
Based on these input data, there can be made the calculations, from which we can obtain sales (total
orders), margin (after deduction of all costs), conversion ratio of demands, conversion ratio of orders,
average value per order, average returns per customer, average number of order per customer, average
margin of one order, average margin per customer, average returns per visit, average margin per demand, and
average margin per visit.
These indicators are used for the basic analysis and are very important for the management activities
related to the sale, planning and finance.
Web interface is usually a part of a CRM system that is connected with the ERP. CRM and ERP are the
information systems that are at the core of the enterprise informatics. The indicators from this group belongs
to the area of IS/IT. The basic indicators for the proper operation of the information system are: system
availability, average response time, breakdown intensity, breakdown rate, average download time, failure
rate.
The integral part of the enterprise information system is created by its users at the all levels of the
corporate activities, and in particular, of the management. Each user carries out various activities, while each
of them constitutes interference in the system. In this context, there are indicators that can be included in the
administrative field, partly in the area of security and personnel. In this group of indicators, there can be
included: number of correct user intervention, number of incorrect user intervention (for example, it may be
related to poor secure system, inappropriate user interface, incompetence users), number of system
administrator intervention (corrections system) and number of users involved in processing by one
commercial transaction.
Another important area is logistics. The logistics is a channel of the supply chain which adds the value
of time and place utility. The basic indicators tracked in this area are: product availability, number
of successfully delivered products, number of unsuccessfully delivered products (for example customer
entered incorrect address or error occurred at the side of vendor or carrier), average length of warranty
5
ISBN: 978-972-8939-51-9 © 2011 IADIS
service, storage costs, cost to deliver goods, average delivery time of goods, number of cooperating suppliers
offering the same goods.
The Internet has allowed the development of the new methods of marketing that provide very important
information useful for the management support and the planning. In this area, the important key indicators
are: number of unique customers, average visit frequency, number of repeat customers, margin per customer,
number of first buyer, average sales per repeat customers, average order value per repeat customer, market
share, percentage share of new vs. returning visitors, average conversion rate, average time spent on the
website, average number of pages displayed per visit, percentage share of returns (one page visits), average
number of clicks on adverts. One of the key methods of e-marketing is campaign. For example, in the
campaigns we can trace percentage share of visits according to the type of campaign and percentage share of
conversion rate according to the type of campaign. These values are the basis for the determination of index
of campaign quality.
The e-commerce systems are implemented with a goal to expanse the sales channels, and thus to increase
the profits. In this context, the important general indicator is the return on investments (ROI). To calculate
ROI in the web projects, we can use, inter alia, an online calculator on the website. In this case, the source
data can include: number of days (time period), regular fixed cost (the cost of webhosting, salary, etc.), cost
per customer acquisition, the current daily visit site, the current conversion ratio of orders, the percentage
increase of conversion ratio due to investments, percentage increase of average order value due
to investments, estimated average order value increase after, the current average margins, the percentage
increase of average margins due to investment, and estimated average margin value increase after.
Using these data, we can calculate: number of visitors, number of orders, yields, margins, fixed costs,
direct cost of acquiring visitors, profit, profit per days, and return on initial investments.
4. EXPERT SYSTEMS
Expert systems are computer programs, designed to make available some of the skills of the expert to nonexperts. Since such programs attempt to emulate the thinking patterns of the expert, it is natural that the first
work was done in Artificial Intelligence (AI) circles (SILER, BUCKLEY, 2005).
4.1 Types of Expert Systems
For different purposes of decision making, the different types of the expert systems may be used. Therefore,
it is useful to be acquainted with some of the more commonly used expert system types (RAVINDRANATH,
2003), like Forecasting Systems, Trouble Shooting Type, Monitoring, Educational Expert System, or
Planning.
The expert systems can be built using expert system shells. In essence, these are the expert systems, from
which all domain-specific knowledge has been removed (CURTIS, COBHAM, 2008).
The expert system shells are ideal for creating of small and medium-sized expert systems. Shells are
empty expert systems without the knowledge base. The shell provides the tools for the expert knowledge
representation and the inference mechanism is used to derive the conclusions based on the rules applied
to the specified value input from the users.
In the past, the expert system shells have been difficult and demanding to use – requiring the considerable
expertise in the computer science to understand how to embody the specific enterprise. The advantage of the
object oriented programming languages, such as C++ and Java, has enabled the developers of expert systems
to conceptualize and built the shells to encapsulate and represent the specific domain (CHIOZZA, 2001).
There are several expert system shells – both commercial and Open Source – to assist with the
development of the application-specific expert system. There are known several popular C/C++ based
CLIPS, FuzzyCLIPS and Jess, as well as OpenExpert (FULCHER; JAIN, 2008). Other examples of the most
famous shells are Leonardo or XPertRule.
Rules are used to create the knowledge base of the expert system. There are many alternatives for
building the knowledge base. We can use production rules, association rules, boolean logic, fuzzy rules,
semantic network, or bayesian Networks.
6
IADIS International Conference e-Commerce 2011
5. CASE STUDY: USING EXPERT SYSTEM NEST FOR MEASURING
PARAMETERS OF E-COMMERCE WEBSITE SYSTEMS
The expert systems can be applied in many areas. Analogous to the e-commerce sphere, such systems can be
used for example for the evaluation of e-commerce website performance by the measurable parameters and
also as input information with a certain degree of uncertainty. The analysis of the e-shop websites can be
done in consultation with the experts, who deal with the problem of the e-commerce. But faster and less
expensive should be the alternative to use the expert system that is based on specific measurable parameters
and capable on evaluating the performance of the e-shop.
5.1 Expert System NEST
NEST program is an empty expert system, which includes inference mechanism. NEST was developed at the
University of Economics in Prague, Czech Republic.
The program provides a graphical user interface (GUI) for: recording of existing knowledge bases, setting
the access processing of uncertainty, management consulting (how to obtain data from the user), the target
evaluation and recommendation statement with an explanation of the findings. NEST is the program
designed primarily for the academic purposes, which puts emphasis not only on the appearance, but also
to the functionality of the program aimed at creating a knowledge base, comparing the results of consultation
in the selection of various types of work with uncertainty, etc. (IVÁNEK et all, 2007).
NEST consists of the following components:
• Stand-alone version - a program for consultation,
• Editor - The editor for creating and editing knowledge bases,
• Base converter - a program to convert knowledge bases,
• Client-server version - Remote Access NEST - Network version.
Knowledge Base of NEST is represented by:
• Attributes and propositions,
• Rules,
• Contexts,
• Integrity constraints.
The most important is the usage of attributes, propositions and rules. There will be provided detailed
description of these elements in the next part of the paper.
The proposal of the evaluation process of the e-commerce web interface with technical parameters by the
expert system NEST:
• Definition of the key website technical parameters,
• Creation of the rules for the evaluation of the key website technical parameters,
• Assignment of the rules in the knowledge base of the expert system,
• Debugging of the knowledge base,
• Verification of the knowledge base based on the evaluation of real data.
Criteria for the evaluation of the e-commerce web interface technical parameters:
• Quality of available information,
• Clarity of texts and clarity buttons and links,
• Accessibility and functionality,
• Information quality downloadable documents,
• Speed of loading pages in a browser,
• Graphic processing,
• Position of key words in the search engines (Google, Bing etc.),
• Reference,
• Speed reporting,
• Level of security (username and password, email or mobile phone order confirmation),
• Correspond to the number of steps to create a binding order,
• Confirmation steps,
7
ISBN: 978-972-8939-51-9 © 2011 IADIS
• Legislative requirements for e-shop.
5.2 Creation of Knowledge Base in Expert System NEST
The most important factor for the quality of each expert system is a good knowledge base including
knowledge expressed by the different types of rules. To acquire the knowledge, there is extremely important
to cooperate with the expert knowledge engineer or to study relevant issues.
At first, we define the attributes and derive the propositions from attributes. Then, there can be defined
the rules, which are composed of the specified propositions. For each proposition, there will be allowed
to enter the weight value from the interval [-3; 3]. If the proposition is irrelevant, then enter the weight value
is zero or you can directly select the value of the word "irrelevant". In the
Figure 2 we can see the example of created attributes and propositions for position in the search engines:
Figure 2. Example of created attributes and propositions: Position in the search engines (NEST Editor)
Example of created attribute: Position in the search engines (declaration in XML)
<attribute>
<id>Position in the search engines </id>
<type>numeric</type>
<legal_values>
<lower_bound>0,000</lower_bound>
<upper_bound>100,000</upper_bound>
</legal_values>
<comment>Position of key words in the search engines</comment>
</attribute>
Attribute called Position in the search engines has these possible propositions:
• Excellent,
• Average,
• Below average,
• Poor.
It is not easy to clearly define sharp boundaries, which may indicate a position on search engines such as:
excellent, average, below average or poor. On the Erro! A origem da referência não foi encontrada.3 we
can see the application of the fuzzy intervals for these propositions, which are also supported in the expert
system NEST.
8
IADIS International Conference e-Commerce 2011
Figure 3. Fuzzy Intervals for Position in the Search Engine
Example of proposition: Position in the search engines – excellent and average (declaration in
XML)
<proposition>
<id>excellent</id>
<name>Position in the search engines(excellent)</name>
<weight_function>
<fuzzy_lower_bound>1,000</fuzzy_lower_bound>
<crisp_lower_bound>1,000</crisp_lower_bound>
<crisp_upper_bound>8,000</crisp_upper_bound>
<fuzzy_upper_bound>10,000</fuzzy_upper_bound>
</weight_function>
<comment>Position of key words in the search engines</comment>
</proposition>
<proposition>
<id>average</id>
<name>Position in the search engines (average)</name>
<weight_function>
<fuzzy_lower_bound>8,000</fuzzy_lower_bound>
<crisp_lower_bound>10,000</crisp_lower_bound>
<crisp_upper_bound>14,000</crisp_upper_bound>
<fuzzy_upper_bound>16,000</fuzzy_upper_bound>
</weight_function>
<comment>Position of key words in the search engines</comment>
</proposition>
Example of established rule: Position of key words in the search engines (Google, Bing etc.)
IF Position in the search engines (excellent) THEN SEO Optimization (excellent) [2,500]
Example of question during consultation: Position of key words in the search engines
Find out what position of your site will be placed when entering certain key words in the search engines
(Google).
5.3 The Consultation Process
After creating the knowledge base, the issue of the web performance measurement can be consulted in the
NEST expert system. It is needed to record data of the knowledge base before the start of consultation. We
have created a sample knowledge base called Technical evaluation of website parameters. It is saved in xml
file format.
The next step is to set the consultations parameters: type of uncertainty (standard logic, neural network or
hybrid), priority rules (from the beginning to the end, minimum length, and maximum length, defined by an
expert), default weight (unknown, irrelevant), corresponding method (dialogue, dialogue with the
questionnaire, questionnaire responses from a file upload) and type of consultation (delay, no delay). Then,
the expert system asks questions and user replies to them. After that, there are derived the final results (goal
statements) based on the responses to the questions according to the knowledge base that contains knowledge
9
ISBN: 978-972-8939-51-9 © 2011 IADIS
in the form of the rules. We have defined these final results for the e-commerce system web interface
performance: excellent, average, below average or poor.
6. CONCLUSION
E-commerce system is an information system with its own architecture, which can be described using well
defined model. The entire e-commerce system, as well as all of its subsystems, can be described by a number
of parameters. The paper is oriented to one of the subsystems, to the web interface.
The case study deals with the technical parameters of the e-commerce system web interface using expert
system NEST. NEST is an empty expert system (expert system shell) for diagnostic applications based on
rules. The main advantage of the shell is possibility to create our own knowledge base. We have defined the
key website technical parameters, the rules for the evaluation the key website technical parameters.
Consequently we have created the knowledge base which can be used for qualified assessment of the ecommerce system web interface measurement. The expert system derives results based on the responses
received concerning the defined parameters of the e-commerce web interface technical parameters. As an
example we can point out the final results for the e-commerce system web interface performance: excellent,
average, below average or poor.
In the future, the knowledge base can be improved using the expert system NEST, or any other expert
system that supports the imposition of knowledge base using XML. It is intended, that this knowledge base
became a component of the e-commerce system model defined using multi-agent approach for the future
analysis of the e-commerce systems.
ACKNOWLEDGEMENT
This research has been supported by the project SGS/24/2010 - The Usage of BI and BPM Systems to
Efficiency Management Support of Silesian University in Opava, Czech Republic.
REFERENCES
Beynon-Davies P., 2004. E-Business. Palgrave, Basingstoke.
Bucki, R., 2007. Information Linguistic Systems. Parkland, Florida: Network Integrators Associates, pp. 102.
Burd, S. D., 2005. Systems Architecture. 5 edition. Course Technology, pp. 656.
Curtis, G. and Cobham, D., 2008. Business Information Systems: Analysis, Design and Practice. Pearson Education
Limited: Harlow.
Fulcher, J. and Jain, L. C., 2008. Computational intelligence: a compendium. Springer Berlin: Heidelberg.
Garcia, F. J. et al, 2002. An Adaptive e-Commerce System Definition. Springer Berlin: Heidelberg. pp. 505-509.
Chiozza, E. and Stanford-Smith, B., 2001. E-work and E-commerce: Novel solutions and practices for a global
metworked economy. IOS Press: Amsterdam 2001.
IBIS ASOCIATES. Key Performance Indicators. 2010. Available from: <http://www.ibisassoc.co.uk/ibis-services.htm>
[5 August 2010]
Inan, H., 2010. Meauring the Success of Your Website: A Customer Centric Approach to Website Measurement. Surry
Hills NSW, Australia.
Ivánek, J. et al, 2007. Znalostní inženýrství. OPF SU, Karviná.
Knight, K., 2007. Online shopping forecast: 323 billon euro by 2011. BizReport.
Rajput, W., 2000. E-Commerce Systems Architecture and Applications. Artech House Publishers, pp. 446.
Ravindranath, B., 2003. Decision Support Systems and Data Warehouses. New Age International Publishers: New Delhi
2003.
Siler, W. and Buckley, J.J., 2005. Fuzzy expert systems and fuzzy reasoning. Wiley & Sons: New Jersey.
10
IADIS International Conference e-Commerce 2011
EVALUATING THE READINESS TO M-GOVERNMENT
IMPLEMENTATION IN BAHRAIN
Ahmed Sowaileh1 and Dr Ali AlSoufi2
1
Ministry of Justice, Bahrain
2
University of Bahrain
ABSTRACT
This study is an attempt to evaluate the readiness to m-government implementation in Bahrain in order to identify the
best approach to improve the ability of Bahrain’s governmental organizations to utilize the advantages of mobile and
wireless technologies and to exploit the high mobile phone penetration by providing high quality mobile government
services. This research involves the distribution of a questionnaire to IT professionals involved in the development and
support of e-government services in Bahrain’s government organizations. The results are used to identify the strength and
weakness points that affect the adoption of m-government by Bahrain’s government organizations. Based on the results,
this research provides recommendation to enable the governmental organizations to adopt and support m-government.
KEYWORDS
Bahrain m-government e-government readiness mobile wireless e-service
1. INTRODUCTION
E-government oriented technologies and services are advancing very quickly around the world and are being
used to improve governments’ fundamental functions (Jacobfeuerborn & Muraszkiewicz, 2009; Saxena,
2005). These functions are now spreading the use of mobile and wireless technologies and creating a new
direction: the mobile government (m-government) (Kushchu & Kuscu, 2003).
Kushchu & Kuscu (2003) define M-government as the strategy and its implementation involving the
utilization of all kinds of wireless and mobile technology, services, applications and devices for improving
benefits to the parties involved in e-government including citizens, businesses and all governmental units.
The number of people having access to mobile phones and mobile internet connection is increasing
rapidly (Botha & Van Deventer, 2009; Feldmann, 2003; Novay, 2009). The mobile access anywhere and
anytime is becoming a natural part of daily life (Jacobfeuerborn & Muraszkiewicz, 2009; Barton, Zhai, &
Cousins, 2006). M-government seems to have a substantial influence on the generation of set of complex
strategies and tools for e-government efforts and on their roles and functions (Roggenkamp, 2007). With the
continuous advancements in wireless technologies and the new opportunities to provide government services
through those technologies, m-government seems to be inevitable (Kushchu & Kuscu, 2003; Sadeh, 2002).
Mobile phone penetration in Bahrain is very high. By the end of September 2010, mobile phone
penetration rate in Bahrain reached about 126 per cent, with the number of mobile subscribers increased to
1.6 million. This rate has the potential to reach 164 per cent by the year 2012, and 177 percent by the year
2014 (BMI, 2008, BMI, 2010).
Bahrain’s main e-government channel is the web based eGovernment Portal. Since this channel is
accessed mainly through personal desktop computers, it will be referred to in this study as the PC portal to
distinguish it from the Mobile Portal channel. By the end of November 2010, there were more than 150
services on the PC Portal. The Mobile Portal is the channel that hosts services that are customized for access
through mobile phones. By the end of November, 2010 it hosted 45 services (EGovernment Authority, 2010).
Most of those services are informational.
11
ISBN: 978-972-8939-51-9 © 2011 IADIS
2. PROBLEM STATEMENT
Due to the advanced status of e-government and the high mobile phone penetration, there is a great
opportunity to utilize mobile technologies to improve the delivery of e-government services in Bahrain.
The utilization of mobile services in Bahrain is moving in slow pace relative to the development of
traditional services that are accessed through desktop computers. Most of the services are implemented on the
PC Portal first. Some of the informational and simple transactional services may have their way to the Mobile
Portal, but many of the more complex services that require large amount of data and involve complicated
transactions are more difficult to deliver as mobile services. Complex services that are easily provided
through the PC Portal may need more analysis and reengineering before they can be delivered as mobile
services (Olmstead, Peinel, & Tilsner, 2007).
This research is guided by the following research questions:
1- What are the factors that affect the readiness to m-government adoption by Bahrain’s government
organizations?
2- What is the status of each readiness factor in Bahrain’s government organizations?
The aim of the research questions is to evaluate the level of readiness of Bahrain’s governmental
organizations to implement m-government by identifying factors that can affect the readiness to the
implementation of m-government, and then to measure each factor to identify the strengths that should be
utilized, and the weaknesses that have to be overcome in order to improve the ability to adopt m-government
in Bahrain.
3. M-GOVERNMENT AS AN INNOVATION OF E-GOVERNMENT
The approach that this study follows is to treat m-government as an innovation of e-government where
wireless and mobile technologies, services, applications and devices are deployed to enhance e-government.
This approach is explained in more detail later in this paper.
To identify the factors that affect the adoption of m-government, this study attempts to utilize the
Diffusion of Innovations (DOI) theory developed by Everett Rogers (Rogers, 2003) to describe how, why,
and at what rate new ideas and technology spread through cultures. DOI has been used in diverse areas such
as business, marketing, anthropology, public health, and education (Couros, 2003).
Rogers (2003) defines an innovation as an "idea, practice, or object perceived as new by a unit of
adoption".
According to Rogers (2003) “getting a new idea adopted, even when it has obvious advantages, is
difficult. Many innovations require a lengthy period of many years from the time when they become available
to the time when they are widely adopted. Therefore, a common problem for many individuals and
organizations is how to speed up the rate of diffusion of an innovation”.
M-Government and e-Government are not two separate entities (Capra, Francalanci & Marinoni, 2007).
While e-Government encompasses usage of all technologies to deliver services to citizens and improve the
activities of the government and streamline their processes, m-government is an add-on to e-government
confined to the use of mobile technologies such as mobile phones, PDAs (Personal Digital Assistant), Wi-Fi
enabled devices, bluetooth and wireless networks in delivering e-government services (Ghyasi & Kuschu,
2004).
4. THE DIFFUSION OF INNOVATIONS THEORY (DOI)
Rogers (2003) defines an innovation as an "idea, practice, or object perceived as new by a unit of adoption".
Rogers theorized that innovations would spread through a community in an S-curve, as the early adopters
select the innovation first, followed by the majority, until a technology or innovation has reached its
saturation point in a community.
According to Rogers (2003) the following attributes affect the adoption of new innovations:
1- Relative advantage: the degree to which an advantage is perceived as better than the idea it
supersedes.
12
IADIS International Conference e-Commerce 2011
2- Compatibility: the degree to which an innovation is perceived as being consistent with the existing
values, past experiences and needs of potential adopters.
3- Complexity: the degree to which an innovation is perceived as difficult to understand and use.
4- Trialability: the degree to which an innovation may be experimented with on a limited basis.
5- Observability: the degree to which the results of an innovation are visible to others. The easier it is for
individuals to see the results of an innovation, the more likely they are to adopt it.
6- Type of Innovation Decision: is the decision optional or mandatory?
7- Change Agent’s Promotion: the extent to which the change agent supports and promotes the adoption
of the new innovation.
In addition to the five characteristics of innovations derived by Rogers (1983), Moore and Benbasat
(1991) add Image as a further construct. Image refers to the degree to which the use of the innovation is seen
as enhancing to an individual’s image or social status. The adopters of m-government are the government
organizations, and they can be divided between the five categories identified by diffusion scholars.
Figure 1. show the conceptual model used by this research to evaluate the readiness to the adoption of mgovernment in Bahrain.
Change Agent’s
Promotion
Complexity
Compatibility
Relative
Advantage
Rate of
Adoption
Type of
Innovation
Decision
Trialability
Observability
Image
Figure 1. Conceptual model of the readiness to m-government (based on Rogers (2003) and Moore & Benbasat (1991)
4.1 Research Methodology
Fifteen senior IT experts working in governmental organizations in Bahrain were interviewed in order to
build clear understanding of the important issues related to m-government in Bahrain and to evaluate the
relevance of DOI and to refine the questionnaire to make it as relevant as possible to the case of Bahrain.
A Questionnaire based on the Diffusion of Innovations theory (Rogers, 2003) was used to collect the
primary data. The questionnaire consisted of two sections. The first section consisted of 5 questions to
identify the respondents’ demographics and organizational information. The second section contained 27
items to measure the readiness to m-government adoption. All of the items in the second section were
measured using a five-point Likert scale ranging from “Strongly Disagree” to “Strongly Agree”.
The dependent variable is the Rate of Adoption and it is represented by two variables, ADOPT and
ADOPT_INDEPENDENT. ADOPT measures the perceived readiness to the adoption of m-government.
Since most of the respondents are not managers, and to avoid having results that are merely influenced by the
respondents perception of their management, ADOPT_INDEPENDENT was included to measure the
perceived rate of adoption if the respondents had independent decisions to adopt m-government. Table 1 lists
the questionnaire items with the related variable names used in data analysis.
The survey population is IT professionals involved in the development and support of e-government
services in Bahrain’s government organizations. The number of IT professional was estimated to be about
300. This number was calculated by feedback from the government organizations indicating the number of
13
ISBN: 978-972-8939-51-9 © 2011 IADIS
their IT professionals who are involved in the e-government project. A pilot test that involved twenty
respondents was conducted to evaluate the effectiveness of the questionnaire. Based on the respondents’
comments and recommendations the questionnaire was refined and tested again to confirm its usability.
5. DATA ANALYSIS AND RESULTS
About 230 respondents participated in the survey. About 20 responses were discarded because they were
incomplete. About half of the respondents used the online version and the other half filled the printed copy.
In conformance with the needs of this research, different groups of ages, years of experience, job levels and
types of work were represented as shown in Table 1.
Table 1. Respondents' demographics
Gender
Male (71%)
Female (29%)
Age Groups
20 – 30 (45%)
31 – 40 (36%)
Over 40 (19%)
Years of Experience
1 – 3 (20%)
4 – 6 (25%)
7-9 (14%)
10 or more (41%)
Job Level
Manager (20%)
Supervisor (28%)
Non-management (52%)
Type of Work
Management (20%)
Programming (29%)
Sys Admin Sys analyst Tech Support
(14%)
(14%)
(23%)
Cronbach’s alpha (Cronbach, 1970) was used to assess the reliability of the survey. All of the variables
displayed acceptable reliabilities above or equal 0.700 (Table 3) which is in the range of good reliability
(Kaiser, 1974).
Factor analysis using Principal Component with Varimax rotation was used to evaluate the construct
validity of the survey. Kaiser-Meyer-Olkin (KMO) measure of sampling adequacy showed a value of 0.754
which is in the range of good values indicating that factor analysis should yield distinct and reliable factors
(Kaiser, 1974). The Bartlett’s Test of Sphericity was significant (p < 0.001) indicating an appropriate factor
analysis (Table 2).
Table 2. KMO and Bartlett's Test
Kaiser-Meyer-Olkin Measure of
Sampling Adequacy.
Bartlett's Test of
Sphericity
0.754
Approx. Chi-Square
Df
Sig.
1373.942
171
.000
All of the items loaded properly on the expected factors. However Image was loaded with Relative
Advantage and less highly with Type of Innovation Decision. However, Moore and Benbasat (1991) argue
that Image, although it is part of relative advantage, has a unique importance and can be studied separately.
Descriptive statistics was conducted to measure the level of each DOI attribute. Table 3 summarizes the
results of descriptive and reliability analysis of the questionnaire.
To identify the variables that had the greatest influence on the adoption of m-government, a stepwise
multiple regression analysis was conducted to find the relationship between the independent variables and the
two dependent variables (ADOPT and ADOPT_INDEPENDENT). The results identified the factors that
needed special attention in the development of the target model. The regression equations for both
independent variables were statistically significant (p < .001).
About 37% of the variance in ADOPT variable was explained by the variables DECSN,
CMPLX_MINUS, AGENT, IMG and COMPAT_EXP (R2 = 0.372). The following equation was derived
ADOPT = -0.279 + 0.343 DECSN + 0.204 CMPLX_MINUS + 0.252 AGENT + 0.190 IMG + 0.114
COMPAT_EXP
14
IADIS International Conference e-Commerce 2011
About 34% of the variance in ADOPT_INDEPENDENT variable was explained by the variables IMG,
AGENT, CMPLX_MINUS, TRI_PILOT and OBSERV_EXPECT (R2 = 0.345). The following equation was
derived
ADOPT_INDEPENDENT = -0.209 + 0.357 IMG + 0.181 AGENT + 0.207 CMPLX_MINUS + 0.250
TRI_EXPECT + 0.132 OBSERV_EXPECT
Table 3. Descriptive and reliability statistics
Variable
Relative Advantage
Compatibility
Variable Name
RA
COMPAT_VAL (compatibility with values)
COMPAT_INFRA (infrastructure compatibility)
Cronbach
’s Alpha
.771
.791
COMPAT_EXP (experience)
Complexity
Type of Innovation
Decision
Trialability
Observability
Image
CMPLX_MINUS (larger values indicate smaller complexity)
DECSN
TRI_PILOT (advantage of having pilot projects)
TRI_ACCEPT (readiness to participate in pilot projects)
OBSERV_EXPECT (observability of current services)
OBSERV_EXIST (observability of future services)
IMG
Change Agent’s
Promotion
AGENT
Rate of Adoption
ADOPT
ADOPT_INDEPENDENT
Mean
4.12
3.84
3.37
3.32
.700
.732
.702
.811
2.91
3.31
3.84
3.66
3.50
2.94
4.05
3.41
3.46
3.88
6. DISCUSSION
The first research question was “What are the factors that affect the readiness to m-government adoption by
Bahrain’s government organizations?”
The factors were identified as Relative Advantage, Compatibility, Complexity, Trialability,
Observability, Image, Type of Innovation Decision and Change Agent’s Promotion.
The second research question was “What is the status of each readiness factor in Bahrain’s government
organizations?”
The readiness questionnaire was used to measure these factors. The factors that measured high
represented the strength points that should be utilized, and the factors that measured low represented the
weakness points that need to be improved.
Relative Advantage variable measured high in the survey indicating a high degree of awareness to the
advantages of mobile services. If this variable measured low, then a long preliminary stage to convince
Bahrain’s governmental organizations of the benefits of mobile services would be needed. The results
indicate that such a long stage can be bypassed or need little effort.
Compatibility with the existing values measured high with most of the respondents believed that
providing mobile services fits well with the way they like to deliver their organizations' services.
Compatibility with the existing ICT infrastructure and past experience differed from organization to another
based on the maturity of the hardware and software platforms and the availability of experienced IT
professionals in each organization. The overall results indicate that most organizations already have hardware
and software platforms that can be utilized or need to be upgraded to support mobile services. This reveals
the existence of a good IT infrastructure that should be upgraded and utilized to support m-government
instead of being rebuilt from scratch. The same can be concluded about the existing skills.
The results revealed that Complexity of the services was one of the major barriers to implementing
mobile services in Bahrain’s government organizations. Most of the organizations had services that required
15
ISBN: 978-972-8939-51-9 © 2011 IADIS
process reengineering before they can be implemented as mobile services. And most of them also had
services that cannot be implemented as fully mobile services. In addition, regression analysis revealed that
Complexity is one of the most important factors influencing the ability and willingness to implement mobile
services. As stated in this study, providing government services from start to finish through the interface of
the mobile phone is not as easy as providing them through the interface of the traditional desktop computer.
Tackling service complexity is one of the major tasks that should be conducted to improve the adoption of mgovernment.
Regarding Trialability, majority of the respondents believed that having pilot projects to build and test
mobile government services would be useful in the implementation of mobile services. The majority also
believed that their organizations can participate in such projects. This provides an opportunity to test the
development of mobile services with a number of selected government organizations before implementing
them on a major scale. Pilot projects can provide findings that are not known before conducting the projects
and identify barriers and problems that may occur during the real project. The early identification of such
problems can greatly reduce the risks and saves valuable time and resources (Hallin & Lundevall, 2007;
Bassara et Al., 2005). It is important in this regard to target innovative organizations in such pilot projects
(Rogers, 2003). As explained earlier, the adoption of innovations starts by innovators and has a domino effect
that makes it spread to early adopters and all the way to laggards
The measurement of Observability revealed moderate results. Slightly more than half of the respondents
believed that when a government organization introduces a new mobile service, other government
organizations will know about it, and only about one third of them indicated that they know enough about the
existing mobile services on the mobile portal. Investigation and interviews with government IT experts
revealed that there are efforts to advertise government services, but they don’t go beyond announcing and
celebrating the launch of new services. The introduction of new services does not ensure that citizens and
businesses will use them (Chatzinotas, Ntaliani, Karetsos & Costopoulou, 2006). The existing marketing
procedure should be revised and enhanced so that it provides more details about the services and persuade
customers to use them.
The results confirmed the importance of the Image factor. Majority of the respondents agreed that
providing mobile services can improve the image of their organizations and that top managements would
support mobile services if they know they can improve the image of their organizations. In addition,
regression analysis indicated that this factor is one of most important factors that influence the rate of mgovernment adoption.
Regarding Change Agent’s Promotion, almost half of the respondents were satisfied with the
performance of the eGovernment Authority (eGA) in supporting mobile services. And since regression
analysis revealed that this factor is one of the factors that have great influence on the adoption of mobile
services, it is important to investigate the reasons why the other half is not fully satisfied. As a change agent,
the eGA needs continuous self-assessment to ensure it delivers the best support to enable government
organizations to adopt m-government.
Regarding Type of Innovation Decision, top managements in the government organizations don’t
require the implementation and support of mobile services except for some informational and simple services
in some organizations. Mobile services still have lower priority than other systems, and it is not expected to
increase by much in the coming three years. However most of the top management’s are expected to support
mobile services if they get more time and resources. Regression analysis revealed that Type of Innovation
Decision have strong influence on the confidence of IT professional in the ability of their organization to
adopt m-government. Managers should be supported with the required resources and skills before they can be
convinced to implement and support mobile services.
The measurement of the Rate of Adoption revealed a moderate optimism in the government
organizations’ ability to adopt m-government. About half of the respondents believed that, in three years or
less, their organizations can support mobile service to the best possible extent (ADOPT). The other half did
not have the same optimism. Regression analysis indicates that the confidence in the organizations’ ability to
support m-government is affected by the Type of Innovation Decision, Complexity, Change Agents’
Promotion, Image and Compatibility with the existing experience (COMPAT_EXP).
Majority of the respondents believed that, in three years or less, they would seriously support the adoption
of mobile services if they had the decision (ADOPT_INDEPENENT). Regression analysis indicates that this
confidence is affected mainly by Image, Change Agents’ Promotion, Complexity, the perceived advantage
16
IADIS International Conference e-Commerce 2011
of having pilot projects
(OBSERV_EXPECT).
(TRI_PILOT),
and
the
expected
Observability
of
future
services
7. CONCLUSION
The results revealed the points of strength that should be utilized and the points of weakness that need to be
fixed to enable Bahrain’s governmental organization to implement effective mobile services. Based on the
findings, this research recommends the following steps to enable government organization to adopt and
support m-government:
• Provide eGA guidance and support: As a change agent, the role of the eGovernment Authority (eGA) is
very important in the implementation and adoption of m-government.
• Support top managements and allocate more time and resource for mobile services.
• Involve innovative organizations: While all government organizations should participate in the
implementation of m-government, innovative organizations should be given a special role especially at the
first stages.
• Upgrade and utilize the existing infrastructure: There is an existing infrastructure that should not be
rebuilt from scratch. It should be upgraded and utilized to implement and support mobile services.
• Train and involve the existing skills
• Tackle services complexity: Service complexity should be tackled to enable better adoption of mgovernment.
• Conduct pilot projects: to explore the implementation of mobile services and to identify the
opportunities and challenges before implementing mobile services on a major scale.
• Market beyond service launch announcement: The existing marketing procedure should be revised and
enhanced so that it provides more details about the services and persuade customers to use them.
• Exploit the Image factor: The Image factor can persuade top management to heavily support MGovernment.
• Continuously assess the performance of the eGA and the governmental organizations: The eGA and the
government organizations should evaluate their performance constantly to ensure that they provide the best
support for M-Government. Self-assessment of organizations and services is an essential part of the adoption
of m-government (Coaker & Deans, 2007).
There is a great opportunity to enhance government services using mobile technologies and it should not
be wasted. The eGovernment Authority and the government organizations are invited to study the
recommendations of this research and utilize them to exploit the advantages of mobile technologies and the
high mobile phone penetration to the best possible extent.
REFERENCES
Barton, J. J., Zhai, S., & Cousins, S. B. (2006). Mobile Phones Will Become The Primary Personal Computing Devices.
Proceedings of the Seventh IEEE Workshop on Computing Systems & Applications, Washington, USA.
Bassara, A., Wisniewski, M., Zebrowski, P. (2005). USE-ME.GOV - Usability-driven open platform for mobile
government. Proceedings of Business Information Systems (BIS) 2005, Poznan, Poland.
BMI (2008). Bahrain Telecommunication Report Q3 2008. Business Monitor International .
BMI (2010). Bahrain Telecommunication Report Q4 2010. Business Monitor International .
Botha, A & Van Deventer, A. (2009). Mobile facilitation of science and technology awareness for preschool children.
Proceedings of mLife 2009 Conference & Exhibitions, Barcelona, Spain.
Capra, E., Francalanci, C., & Marinoni, C. (2007). Soft Success Factors for M-Government. In Kushchu, I. (ed.), Mobile
Government: An Emerging Directions in E-Government (pp. 106-133). Hershey PA: IGI Publishing.
Chatzinotas, S., Ntaliani, M., Karetsos, S., & Costopoulou, C. (2006) Securing m-government services: the case of
agroportal. Proceedings of the 2nd European Conference on Mobile Government, Brighton, UK.
Coaker, B., & Deans, D. (2007). An Evaluation of U.S. City Government Wireless Networks for Mobile Internet Access.
In Kushchu, I. (ed.), Mobile Government: An Emerging Directions in E-Government (pp. 357-374). Hershey PA: IGI
Publishing.
17
ISBN: 978-972-8939-51-9 © 2011 IADIS
Couros (2003). Innovation, Change Theory and the Acceptance of New Technologies - A Literature Review. Retrieved
April 12, 2009 from http://www.arp.sprnet.org/inserv/Teacher_Leadership/COMPS/change_theory.pdf
Cronbach, L. J. (1970). Essentials of psychological testing. New York: Harper & Row.
EGovernment Authority (2010). The eGovernment Portal. Retrieved December 1, 2010 from http://www.e.gov.bh/
Feldmann, V. (2003). Mobile overtakes Internet: Implications for Policy and Regulation. Telecommunication Policy
Consultant for the International Telecommunication Union (ITU) Strategy and Policy Unit (SPU). Retrieved
September 17, 2010, from http://www.itu.int/osg/spu/ni/mobileovertakes/Resources/Mobileovertakes_Paper.pdf
Ghyasi, A. , Kushchu, I. (2004). m-Government Adoption: Cases of Developing Countries, proceedings of European
conference on e-Government, Trinity College, Dublin, June 2004.
Hallin, A., & Lundevall, K. (2007). mCity- User Focused Development of Mobile Services within the City of Stockholm.
In Kushchu, I. (ed.), Mobile Government: An Emerging Directions in E-Government (pp. 12-29). Hershey PA: IGI
Publishing.
Jacobfeuerborn, B., & Muraszkiewicz, M. (2009). Can Mobile Networks Threaten Society and Culture?. Proceedings of
mLife 2009 Conference & Exhibitions, Barcelona, Spain.
Kaiser, H.F. (1974). An index of factorial simplicity. Psychometrika, 39, 31-36.
Kushchu, I. & Kuscu, H. (2003). From e-government to m-government: Facing the Inevitable. Proceeding of European
Conference on E-Government (ECEG 2003), Trinity College, Dublin.
Kwik Surveys. (2010), About Kwik Surveys. Retrieved December 11, 2010 from http://www.kwiksurveys.com/about.php
Moore, G. & Benbasat, I. (1991) Development of an instrument to measure the perceptions of adopting an information
technology innovation. Information Systems Research 2(3), 173-191.
Novay (2009). Future Workspaces - Four challenges for knowledge workers - Effects of working anytime, anywhere.
Retrieved September 18, 2010, from https://doc.novay.nl/dsweb/Get/Document-101561.
Olmstead, P. M., Peinel, G., Tilsner D., Abramowicz, W., Bassara, A., Filipowska, A., Wisniewski, M. & Zebrowski, P.
(2007). Usability Driven Open Platform for Mobile Government (USE-ME.GOV). In Kushchu, I. (ed.), Mobile
Government: An Emerging Directions in E-Government (pp. 30-59). Hershey PA: IGI Publishing.
Rogers, R.W. (1983). Diffusion of Innovations(3rd ed.) . New York: Free Press.
Rogers, E.M. (2003). Diffusion of innovations (5th ed.). New York: The Free Press.
Sadeh, N. (2002). M-commerce : technologies, services, and business models. New York: John Wiley & Sons, Inc.
Saxena, K.B.C. (2005). Towards excellence in e-governance. International Journal of Public Sector Management, 18 (6),
498-513.
18
IADIS International Conference e-Commerce 2011
GENETIC ALGORITHM BASED OPTIMIZATION FOR
E-AUCTION
Mourad Ykhlef and Reem AlQifari
King Saud University
ABSTRACT
Double Auction is a type of auction where multiple buyers and sellers compete simultaneously; each one has a price and
quantity. Then, the Auctioneer tries to match buyers and sellers according to their bidding or asking prices and quantities.
The main concern in auctions is how to match them in a way to achieve the maximum profit in the market. The utility
function is used to represent each buyer and seller preferences. Recently, some evolutionary algorithms, such as Particle
Swarm Optimization and Genetic Algorithm, were proposed and have been applied to solve winner determination
problem in variant e-auction types. In this paper, in order to reduce the spent time and provide effective matches in
double auction, Genetic Algorithm has been introduced. The key contribution of this paper is to be the first research that
represent the problem in real-value chromosome and then apply the suitable GA operators. At the end, the results of the
proposed algorithm will prove the advantages of the GA.
KEYWORDS
Double Auction, Genetic Algorithm, Utility Function, Winner Determination Problem.
1. INTRODUCTION
INTERNET auctions appeared on the scene in the mid 1990s, and quickly became one of the most successful
applications of electronic commerce (Peter 2004). Auction is defined as a market mechanism for accepting
bids or offers from buyers or sellers and then used a set of rules to allocate goods. Double auction include
multiple sellers and multiple buyers in the same market where they are competing against each other for
different items (Jin, Hyunchul & Ingoo n.d.) (Rigi, Mohammadi & Delgir 2009).
In a multi unit double auction, each participant should determine how many units of an item and in which
price is his asks or bids. When a buyer’s bid exceeds or matches a seller’s ask, a trade will occur (Dickhaut &
Gjerstad 1998). There are two kinds of Double auctions: synchronous double auction (SDA) and
asynchronous double auction (ASDA) (Dickhaut & Gjerstad 1998). Discrete or continuous time of the
trading process is the main distinction between SDA and ASDA (Jin, Hyunchul & Ingoo n.d.).
The most important issue in a double auction is how to allocate or match buyer with seller to maximize
the rewards. This problem is known as winner determination problem (TEICH et al. 2003). The most
common mechanism that has been used is the utility function. The utility function is used to represent the
participants’ preferences. The previous researchers suggested linear (Huang, Scheller-Wolf & Sycara 2002),
quasi-linear, non-linear (Jin, Hyunchul & Ingoo 2008), or a fuzzy utility (Rigi, Mohammadi & Delgir 2009)
function. In the non-linear and fuzzy utility, the participant has the flexibility to change his preferences in
each round; while in other utility, the participants has identical utility (Jin, Hyunchul & Ingoo 2008) (Huang,
Scheller-Wolf & Sycara 2002).
This paper focuses on optimization for the winner determination problem using a non-linear utility
function that has been suggested (Jin, Hyunchul & Ingoo 2008).
Genetic Algorithm (GA), which is one of the evolutionary algorithms, can be used to solve the problem in
a short time (Goldberg 1989) (Mitchell 1998). A genetic algorithm has been proposed, in this paper, to solve
winner determination problem in a multi-unit double auction. The proposed algorithm concentrates on
decreasing the time and the computational costs with effective matches. Empirical experiments have been
conducted to validate the suggestion.
19
ISBN: 978-972-8939-51-9 © 2011 IADIS
The rest of the paper is organized as follows: Double Auction, Genetic Algorithm, and Utility Function
are defined in section 2, 3, and 4. the proposed approach of applying GA to Double Auction is described in
Section 5. Experimental results are reported in Section 6. At the end, the conclusion of this paper with future
work is presented in section 7.
2. DOUBLE AUCTION
Double Auction is referring to multiple buyers and sellers competing among each other. The double Auction
is divided into a single-unit double auction and a multi-unit double auction (Wang et al. 2010). In a multi-unit
double auction, there are many sellers’ bids prices and many buyers’ bids for variety of items with multi-unit.
Trade is occurred when the buyer’s bids is greater than the seller’s asks (Bichler et al. 2002) (Jin, Hyunchul
& Ingoo n.d.) (Rigi, Mohammadi & Delgir 2009) (Phelps, Sklar & Parsons 2003). Both seller and buyer have
to determine price and quantity for each specific item as the following:
Buyer → item, price, and quantity
Seller → item, price, and quantity
The auctioneer assigns buyers to sellers based on their preferences. There are many sellers’ asks that may
satisfy some buyers’ bids and vice versa (Jin, Hyunchul & Ingoo 2008), (Rigi, Mohammadi & Delgir 2009)
(Bichler et al. 2002) (Phelps, Sklar & Parsons 2003).
The auctioneer in the synchronous auction gets all bids in a preset period of time then makes the matches
and clear the market (Jin, Hyunchul & Ingoo 2008)- (Hu & Wellman 1998).
To solve the previous problem, finding the best representation of the utility function for each bidder is
required.
Most of the previous studies focus on two features of a double auction which are price and quantity. Thus,
they not include other performance factors such as quality, warranty, shipping time and cost.
3. GENETIC ALGORITHM
Darwin's theory about evolution has an impact on Genetic algorithms. Consequently, Solutions to such
problems that have been solved by genetic algorithms is evolving (Jin, Hyunchul & Ingoo 2008).
In the 1960s, John Holland invented Genetic algorithms (GAs), and in the 1960s and the 1970s, Holland,
his students and colleagues at the University of Michigan developed GAs (Holland. 1992) (Mitchell 1998).
Genetic algorithms can be defined as a particular class of evolutionary algorithms that use techniques
inspired by evolutionary biology such as inheritance, mutation, selection, and crossover.
Algorithm starts with a set of random solutions. These solutions are represented as chromosomes that
called population. Forming a new population is driven from previous populations, hoping that the new
population will be better than the old one. Solutions which are selected to form new solutions (offspring) are
elected according to their fitness. This is repeated until stop condition (for example number of populations) is
reached.
In genetic algorithms, the term chromosome usually refers to a candidate solution for a problem that is
often encoded as a bit string. The "genes" is a part of chromosome. An allele is the gene’s value. Crossover
typically consists of exchanging genes between two single chromosomes (parents). Mutation is usually
flipping the bit at randomly chosen genes. In addition, The GA requires a fitness function which assigns a
score to each chromosome in the current population (Mitchell 1998).
4. UTILITY FUNCTION
In a double auction the trade prices is not the ideal for both sellers and buyers. The problem here is how to
achieve the best profit for all sellers and buyers according to their bids and predefined quantities.
This can be achieved through utility mechanism, meaning the gain of bidders in the auction process. The
highest utility of the seller is when it matches the highest bid price of buyers while the highest utility for
20
IADIS International Conference e-Commerce 2011
buyers will be achieved when buyers get matched with the lowest bid price of sellers. Accordingly, to design
an efficient auction, the utility should be maximized (Jin, Hyunchul & Ingoo 2008).
The linear utility function that can be solved as a linear programming problem to find the optimal solution
was proposed by (Huang, Scheller-Wolf & Sycara 2002). They represented the utility as the following linear
equation (Huang, Scheller-Wolf & Sycara 2002):
Where
m
total number of sellers
n
total number of buyers
k
total number of items
price of item a traded between seller i and buyer j
quantity of item a traded between seller i and buyer j
buyer i’s willingness to receive (the minimum acceptable sell price) for item a
seller i’s willingness to pay (the maximum accept able buy price) for item a
trader i’s maximum acceptable quantity for item a
S
set of sellers, in which there are |S|= m sellers
B
set of buyers, in which there are |B|= n buyers.
a non-linear utility function is used (Jin, Hyunchul & Ingoo 2008). They suggest that each bidder has his
own utility function. Therefore, the bidder can specify his sensitivity or the range of acceptance for each
feature (price and quantity). It is shown as the following equation:
We can see that the price and the quantity have been replaced with functions. They suggest two types of
functions: the Early-growth-style and the late-growth style based on a bidder’s choice (Jin, Hyunchul &
Ingoo 2008). In Early–growth style the bidder has the most influence in changing the price or quantity.
4.1 Early-growth Style
Early-growth equations is illustrated as follows: (Jin, Hyunchul & Ingoo 2008)
Price:
Seller Quantity:
Buyer Quantity:
4.2 Late-growth Style
Late-growth equations is illustrated as follows: (Jin, Hyunchul & Ingoo 2008)
Price:
21
ISBN: 978-972-8939-51-9 © 2011 IADIS
Seller Quantity:
Buyer Quantity:
t represents number of steepness.
5. SOLVING WINNER DETERMINATION PROBLEM IN DOUBLE
AUCTION
In this section, several issues related to applying Genetic Algorithm (GA) for Winner Determination Problem
in Double Auction (GA-WDPDA) will be discussed. The discussion is about the GA that has been
developed in this paper with its representations, chromosomes, fitness evaluation and the details of its
algorithmic structure.
5.1 Chromosome
While the chromosome represents a solution, the chromosome in a double auction winner determination
problem (WDP) represents all the winners with prices and quantities of their winning bids. In a double
auction WDP, the size of chromosome is determined based on the number of possible matches. The
following table illustrates the chromosome structure which contains price and quantity that belong to each
match.
Table I Chromosome Structure
Price
Quantity
Now, the question is what is the best chromosome representation?
5.1.2 Representation
There are many types of encoding that can be chosen such as: binary encodings (Buer & Pankratz 2010),
which is the most common type; many−character; real−valued encodings (Movaghar & Khanpour 2006); and
integer encoding (Mitchell 1998). Chromosomes representation became an issue for different structures of
WDP based on the auction type. There are many alternatives to represent a chromosome based on other
problem domains.
To decide which one is the best representation for solving double auction problem, David Goldberg in his
1989 textbook (Goldberg 1989) recommends that the appropriate choice of genetic representation depends
on the problem. According to that, real-valued representation will be chosen because it is the suitable one
with constrained optimization problem.
For example: Let’s say that there are three buyers, three sellers, and two items. Table 2 illustrates the
chromosome.
5.2 Genetic Operator
The chromosome represents offspring of the existing population. This section describes three operators of
Genetic Algorithms that have been used in (GA-WDPDA): selection, crossover and mutation.
22
IADIS International Conference e-Commerce 2011
Table II Chromosome
P
13
Q
6
P
12
Q
4
P
15
Q
3
P
10
Q
3
P
11
Q
2
5.2.1 Selection
Varity of techniques can be used by a Genetic Algorithm for selecting the chromosomes to be copied over
into a new population. In (GA-WDPDA), Elitism has been used which means that some of the best
chromosomes will be copied to the next population as it is without changes (Mitchell 1998).
5.2.2 Crossover
Crossover works to combine two or more solutions to create new one (i.e. offspring). It is used in a way to
come up with possibly better solutions. In most crossover operators, selecting chromosome for crossing over
is based on a probability pc known as crossover probability. In (GA-WDPDA), uniform crossover operation
has been used; crossover can be applied as shown in Figure 1.
Figure 1. Crossover Operator
5.2.3 Mutation
In the mutation, one or more genes value of a selected chromosome will be altered randomly. The mutation
is used to increase the variability of the population. Also, it ensures that every point in the search space will
be reached. There are many mutation operators that depend on the problem and the representation type. In
real-value encoding, the mutation could be done by adding or subtracting a small number to a selected genes
(Mitchell 1998). The mutation can be applied as illustrated in figure 2.
Figure 2. Mutation Operator
23
ISBN: 978-972-8939-51-9 © 2011 IADIS
5.3 Fitness Function
The fitness function is used to measure the performance of the chromosomes. It is calculated for each
chromosome by using the non-linear utility function (Mitchell 1998).
5.4 Termination
Reaching the maximum generation number could be used as termination condition. At the end, the best
chromosomes of the last iteration are considered the best solution or the best price and quantity for each
match.
5.5 GA for Winner Determination Problem in Double Auction
This section presents the algorithmic structure of GA that has been produced. GA optimizer has been used to
match traders. (GA-WDPDA) will work as the flowchart shown in Figure 3.
Figure 3. (GA-WDPDA)
6. EXPEREMENTS RESULTS
This section presents an experiment conducted on GA to test its performance. (GA-WDPDA) has been tested
with different scenarios through different number of buyers, sellers and items. (GA-WDPDA) has been
implemented using Java on Inter® Core™ 2 Duo 3 GHz computer with 4 GB RAM, running with Microsoft
Windows 7.For the controlling parameters of the GA, the crossover and mutation rates are set at 70% and
10%. During the experiments all biddings, items, population size, and generation were given by a user.
The output of this experiment is a chromosome that represents the most suitable solution; For example,
there are three buyers, three sellers and two items, and their biddings are shown in the Table III. The output
solution will be as shown in Table 6. Two experiments have been conducted in order to test the speed and
fitness of (GA-WDPDA). First experiment set the population to 20 and the generation of [20...200]. The
24
IADIS International Conference e-Commerce 2011
second set the generation to 20 and the population of [20...200]. Both experiments have used the same inputs
which are seller matrix, buyer matrix and item vector.
Table 5. Input Scenario
Table 6. (GA-WDPDA) Output
The first experiment, as we can see in Figure 4, shows the spent time, in mille-seconds. In addition, the
second experiment, as shown in Figure 5, shows the utility (best fitness) of the final results of GA.
GA experiments illustrate how time will increase according to the increase of the generation or
population. Consequently, comparing the two experiments, as shown in Figure 4, GA algorithm takes less
time when increasing the population rather than when the generation is increased. In contrast, the bidders’
utility (best fitness) will increase when the populations increase more than when the generation is increased.
Based on these results, we can conclude that the size of population and generation should be
compromised in order to get better results.
Figure 4. The Effect on Time by Altering Population/Generation Size
Figure 5. The Effect on Average Fitness by Altering Population/Generation Size
25
ISBN: 978-972-8939-51-9 © 2011 IADIS
7. CONCLUSION
In this paper, a Genetic Based Algorithm has been proposed to solve winner determination problem in a
multi-unit double auction with a non-linear utility. The proposed solution is focusing on maximizing all
traders’ utility through optimization modeling based on genetic algorithm paradigm. At the end of each
round, the auctioneer gathers all participants’ biddings and then uses these data to execute the GA in order to
find an effective solution for participants. Experimental results demonstrated that this proposal has, as a
feature, high performance concerning the time of execution.
In the future, we will try to improve the performance of GA in a way to achieve better solution in less
time. We will reach that by doing some kind of hybridization genetic with other algorithms perhaps PSO or
better.
REFERENCES
Book
Goldberg, D., 1989, Genetic Algorithms, Addison Wesley.
Mitchell, M., 1998, An Introduction to Genetic Algorithm, MIT Press.
Holland., J 1992, Adaptation in Natural and Artificial, 2nd edn, MIT Press, Ann Arbor.
Journal
Buer, T & Pankratz, G 2010, 'Solving a bi-objective winner determination problem in a transportation procurement
auction', Logistics Research, vol 2, pp. 65-78.
Dickhaut, J & Gjerstad, S 1998, 'Price Formation in Double Auctions', Games and Economic Behavior, vol 20, no. 8, pp.
1-29.
Conference paper or contributed volume
Bichler, M, Kalagnanam, J, Lee, HS & Lee, J 2002, 'Winner Determination Algorithms For Electronic Auctions: A
Framework Design', In E-Commerce And Web Technologies, Springer Berlin / Heidelbergr, France.
Huang, P, Scheller-Wolf, A & Sycara, K 2002, 'Design Of A Multi-Unit Double Auction E-Market', Computational
Intelligence.
Hu, J & Wellman, MP 1998, 'Online Learning About Other Agents In A Dynamic Multiagent System', Autonomous
Agents Conference, New York.
Jin, CH, Hyunchul, A & Ingoo, H 2008, 'Utility-Based Double Auction Mechanism Using Genetic Algorithms', Expert
Systems With Applications.
Peter, WR 2004, 'Online Auction Site Management', In The Internet Encyclopedia, John Wiley & Sons, Inc.
Phelps, S, Sklar, E & Parsons, S 2003, 'Using Genetic Programming To Optimise Pricing Rules For A Double Auction
Market', Proceedings Of The Workshop On Agents For Electronic Commerce, Pittsburgh.
Rigi, M, Mohammadi, S & Delgir, M 2009, 'Designing Fuzzy Utility-Based Double Auctions Using Particle Swarm
Optimization Algorithm', IIT'09 Proceedings Of The 6th International Conference On Innovations In Information
Technology , Al Ain.
Teich, Je, Wallenius, H, Wallenius, J & Koppius, Or 2003, 'Emerging Multiple Issue E-Auctions', Erasmus Research
Institute Of Management Report.
Wang, X, Wang, X, Yi, M, Tan, Z & Huang, M 2010, 'A Double Auction Method For Resource Management And
Bidding Strategy On Grid Resources', IEEE Fourth International Conference On Genetic And Evolutionary
Computing.
26
IADIS International Conference e-Commerce 2011
AN EXAMINATION OF THE CONTENTS OF PRIVACY
POLICIES ON THE AUSTRALIAN LOCAL GOVERNMENT
WEBSITES
Qiuyan Fan
University of Western Sydney, Australia
ABSTRACT
With ever increasing levels of government information and services moving online and the level of citizen data being
collected via government web sites, users are concerned about how their personal information will be collected, used and
secured. Privacy is viewed as a primary concern for e-government websites. While there are considerable studies on
consumer online privacy concerns in the research literature, few studies have focused on the privacy issues of the
constituencies of local e-government. This paper attempts to address this lack by examining the contents of privacy
policies published on the Australian local e-government sites using a content analysis approach.The research is
committed to online privacy protection with a focus on privacy policies posted on the local councils’ websites in the
GWS region, Australia.
To examine and assess how the local government authorities address online privacy issues and their degree of compliance
with legislation, this study attempts to analyse the posted privacy statements of the local government websites against the
legal mandates under which the web sites operate and identify and discuss non legal factors that may affect the quality of
these statements.
The research findings show that 43% of the websites surveyed do not display a privacy policy statement while 36%
appear to have a weak policy statement. Serious deficiencies in relation to the collection, access, amendment, use and
disclosure of personal data were found in the privacy policy statements examined. Widespread non-compliance with the
legislation indicates that the privacy statements are not effective in protecting user privacy online.
In addition to compliance with the legislation, the aspects of transparency, readability and detailed information are seen
as important for a desirable privacy policy. The lack of details, clarity and transparency in privacy policy statements
prevents users from understanding the content and potential issues in submitting their personal data. The results of the
analysis indicate attempts to display and develop an effective privacy policy have not been made by the vast majority of
the websites examined
The analyses can be used as guidelines in ensuring that an organisation’s website privacy policy is in compliance with
privacy legislation. The discussion on weakness in current privacy policy practices provides information that can guide
government authorities when they prepare for privacy policy statements for their websites.
KEYWORDS
Privacy, e-government, Australian local government websites, the privacy and personal information protection act,
privacy policy statement.
1. INTRODUCTION
Over the last decade the development of e-government initiatives has experienced substantial growth.
However, privacy concerns can limit this growth as citizens may view these initiatives as invasion of citizen
privacy by government (Belanger & Hiller 2006). A number of surveys reported that consumer concern with
privacy of information was preventing them from using websites (Green et al, 1998, Harris, 2001 & Pew
Internet, 2000).
With ever increasing levels of government information and services moving online and the level of
citizen data being collected via government websites, users of websites seem to be increasingly concerned
about their lack of control over their personal information. Privacy concerns have negative impact on
consumer online behaviour (Nemdi & Dyke, 2009). Privacy increasingly becomes a key issue that must be
addressed. Privacy and security commitments in e-government are reflected in a privacy policy displayed on
27
ISBN: 978-972-8939-51-9 © 2011 IADIS
the web site.There is evidence that the presence of a privacy statement on a web site has a positive influence
on perceived control over information privacy (Arcand et al (2007). A privacy policy plays an important role
in building trust in the online environment (OECD 2003). While there are considerable studies on consumer
online privacy and security concerns in the research literature (Hoffman et al, 1999; Earp et al, 2005; Nemati
& Dyke, 2009), few studies have focused on the privacy and security issues of the constituencies of local egovernment. This paper attempts to address this lack by examining the privacy policies published on the
Australian local e-government sites using a content analysis approach.
The remainder of this paper is structured as follows: Section 2 provides an overview of privacy and trust.
Section 3 reviews data privacy protection legislations and guidelines at both international and national level.
Section 4 and 5 introduces research context and methodology respectively. Section 6 analyses and discusses
principally the results from the research. Section 7 discusses the limitation of this study and further research.
Section 8 concludes the paper.
2. AN OVERVIEW OF PRIVACY, PRIVACY STATEMENT AND TRUST
Brandeis and Warren (1890) define privacy as the right to be left alone while Shoeman (1984, cited in
Arcand et al 2007) argues that privacy is a state or condition of limited access to individuals. Clarke (2011)
defines information privacy as the claim that personal identifiable information should not be available to
other individuals or organizations and the individual should have secondary control of the data and its use.
There are many dimensions of privacy. Hoffman et al (1999) focus on two dimensions of environmental
control and secondary use of information control and they argue that consumer’s ability to control the actions
of a web site and the use of their personal information directly affects consumer perception of security and
privacy online. The most relevant to this study is personal data protection. For the purpose of this research,
privacy is defined as the ability of an individual to control the collection of personal information and the
secondary use of whatever information that is collected about them (Schwaig, et al, 2006).
Nemdi and Dyke (2009) defined a privacy statement as ‘a formal declaration of privacy policies that is
accessible to the consumer’. Anett, et al (2009) argue ‘the best way to control information security is through
formal policy.’ A privacy policy statement deals with the collection, use, access and disclosure of personal
information. It reassures website users that you will respect their privacy and protect them from loss and
misuse and from unauthorized access, alteration/modification or disclosure of their personal information
when they use your website. Clearly an effective privacy policy statement plays an important part in reducing
privacy concerns in online environment. Many researchers suggest that the presence of a clear privacy
statement have a positive impact on consumer trust (Arcand, et al., 2007, Earp, et al., 2005). Nemati and
Dyke (2009) state that an effective way to increase user trust appears to include a privacy policy statement on
a website. Privacy has a strong influence on the level of trust an individual has with a web site and an
individual’s attitudes and perceptions regarding privacy and security have an influence on his or her
behavioural intentions to participate in an online transaction (Liu et al, 2005). There is evidence that
consumers consider the privacy disclosure an important factor in building trust (Aljukhadar, et al, 2010).
Privacy protection is a prerequisite to build trust (Liu et al, 2005).To earn trust, it has become common
practice for web sites to display a privacy statement to inform user about data handling practices (Pollach,
2007).
3. LEGISLATION PROTECTION OF INFORMATION PRIVACY
Governments and international organisations have developed laws, regulations and guidelines that govern the
collection, control, storage, use, dissemination, and destruction of personal information to secure privacy
right and attempted to formulate privacy policies based on legal principles (Whitman & Mattord, 2011). For
instances, Fair Information Practices (FIPs) are international principles that serve as the basis for the privacy
policies of many countries (Nemati & Dyke, 2009). The FIPs defines Notice, Choice, Access,
Security/Integrity, and Enforcement as five key principles of a desirable privacy policy. The Organization for
Economic Cooperation and Development (OECD) issued the Guidelines on the protection of privacy and
trans-border flows of personal data in 1980, which established eight principles including collection
28
IADIS International Conference e-Commerce 2011
limitation, data quality, purpose specification, use limitation, security safeguards, openness, individual
participation and accountability. While they are not legally binding, the OECD guidelines are the global
standard for privacy protection and are recognized by all OECD member countries (Earp et al 2005).
In Australia a variety of federal, State and Territory Acts contains privacy protection provisions relevant
to the collection, use, disclosure, quality and security of personal information about individuals. For instance,
the federal Privacy Act 1988 provides 11 Information Privacy Principles (IPPs) for the federal public sector
and 10 National Privacy Principles (NPPs) for private sector organisations. Given the federal Privacy Act
1988 does not apply to State/Territory government agencies (except for A.C.T.), several State and Territory
Parliaments have enacted their own privacy legislation in relation to their own public sectors. For instance,
the Privacy and Personal Information Protection Act 1998 is the principal piece of legislation providing
protection of personal information for the public sector in the state of New South Wealth (NSW). The
Privacy and Personal Information Protection Act (PPIPA) 1998 deals with how all New South Wales public
sector agencies manage personal information. The Act sets out 12 Information Protection Principles (IPPs),
which apply to State and local government bodies of NSW. Those Information Protection Principals include:
Principle 1 - Collection of personal information for lawful purposes
Principle 2 - Collection of personal information directly from the individual
Principle 3 – Requirements when collecting personal information
Principle 4 – Other requirements relating to collection of personal information
Principle 5 - Retention and security of personal information
Principle 6 – Information about personal information held by agencies
Principle 7 – Access to personal information held by agencies
Principle 8 – Alteration of personal information
Principle 9 – Agency must check accuracy of personal information before use
Principle 10 – Limits on use of personal information
Principle 11 – Limits on disclosure of personal information
Principle 12 – Special restrictions on disclosure of personal information
(Source: Office of the Privacy Commissioner, 1998)
The local councils surveyed in this study are bound by the PPIPA. In order to comply with the
requirements of this Act, Council will comply with Information Protection Principles (IPPs) in relation to its
handling of personal information.
4. RESEARCH CONTEXT
This research is committed to online privacy protection with a focus on privacy policies on local councils’
websites in the GWS region. The rationale for selecting Greater Western Sydney (GWS) is based on a
number of factors. The e-government literature suggests a positive relationship between population and
strong economy and e-governance capacity at the local level. GWS is a large and dynamic region, which has
experienced strong urban and population growth. GWS has a population of about 1.9 million, which is 43%
of the Sydney metropolitan and is estimated to reach 2.5 million by 2031. The GWS’total GRP (a Gross
Regional Product) represented over one third of the Sydney GRP and over one fifth of the NSW Gross State
Product (GSP).
One of the great strengths of local government in GWS is its diversity. The population and geographic
size of councils differ greatly. There are 14 Local Government Authorities in the GWS areas. All of the local
authorities have their own government websites where the users can register for council services, to make a
request, and to apply for permits as well as to use library service online, and the governments are able to
respond electronically with users. 78.6% of the local councils are offering online submission of service
request or online application for permits via downloadable application forms on the websites (Fan 2009).
7.1% of the local government websites are offering online access to development applications (DA) which
allow residents to track the progress of the application from lodgement through to determination (Fan, 2009).
14.3% of the councils have Internet payment systems available on their websites where users can pay rates
and fees directly through council’s online payment services, while 85.7% provide a link to third party
transactional services such as BPAY and Postbillpay (Fan 2009). These online services allow the councils to
collect the personal information of the residents via their websites, which can increase some serious privacy
29
ISBN: 978-972-8939-51-9 © 2011 IADIS
concerns among users. However, there has been little research into how local government web sites protect
citizen’s personal information.
5. RESEARCH OBJECTIVES AND METHODOLOGY
The OECD guidance on policy and practice recommends that the privacy statement should accurately reflect
your organisation’s personal data practices, comply with applicable national, regional and international laws
and read smoothly (OECD 2003). Sumeeth, et al. (2009, p.93) argue ‘privacy policies are examined for their
coherence, readability and information they convey to users.’ Although Compliance with legal principles is
considered the key factor in assessing quality content of a privacy policy statement, other factors cannot be
ignored.
The primary objectives of this study are to examine the posted privacy statements of local government
websites against the legal mandates under which the web sites operate and identify and discuss non legal
aspects that affect the quality of these statements.
To examine and assess how local government addresses personal information privacy issue and their
degree of compliance with the IPPs of the PPIPA, this research systematically identify and record the privacy
policy statements posted at the 14 local government sites and then analyse what privacy measures are stated
in these statements on the local government web sites. The researcher read the privacy statements in their
entirety. Content analysis has been carried out to scrutinize the contents of privacy statements on the local
government websites.
To achieve the research objective, this study attempts to conduct two separate analyses. The first one is
focusing on compliance with the IPPs of the PPIPA. The PPIPA has extensive coverage of privacy issues and
governs the way in which public and private sector organisations collect, use, disclose, store, secure and
dispose of personal information. The 12 IPP categories were used in coding during the content analysis
process. This analysis aimed at determining whether the contents of privacy statements on the local council
websites conform to the IPPs contained in the PPIPA. The second one goes beyond the minimum legal
requirements expressed in the existing laws and policies on data privacy protection in Australia. It looks at
some non legal factors such as existence, transparency, details, clarity and readability that may affect the
effectiveness of a privacy policy statement. This analysis aims at identifying and discussing weakness in the
privacy policy statements posted on the web sites.
6. DATA ANALYSIS AND FINDINGS
6.1 An Overview of the Results
Privacy is viewed as a primary concern for e-government websites. However, few of the websites surveyed
have an explicit and comprehensive privacy statement. Six out of 14 websites provide no privacy statement.
While 3 provide a reasonable privacy policy statement, 5 present very limited and vague privacy policy
statements.
6.2 How do the Privacy Statements on the Websites Comply with the IPPs of
the PPIPA?
The discussion in this section follows the IPPs contained in the PPIPA.
Data collection and purpose specification
Principles 1 to 4 of the PPIPA specify requirements when collecting personal data. For instances, personal
data should be collected lawfully (Principle 1) and directly from individual (Principle 2). The purpose for
which personal data are collected should be specified (Principle 3) and the information collected should be
relevant to that purpose, not excessive and accurate, up-to-date and complete (Principle 4).
Only three local government web sites make an attempt to comply with these principles of the PPIPA.
30
IADIS International Conference e-Commerce 2011
Five out of 8 available privacy policy statements fail to provide any information regarding the collection of
personal data and purpose for data collection.
Retention and security of personal data
Principle 5 requires councils to secure personal data collected from users against loss or any form of
illegal or unauthorised use and access. However, only one council website indicates they will take reasonable
steps to protect personal information from misuse, loss and unauthorised access but they cannot guarantee
security. 93% of the local government websites failed to provide a privacy statement that has any security
measures in place to protect personal data while it is being stored on or transmitted across the Internet.
To comply with this principle, a council must ensure that the personal information is kept for no longer
than is necessary for the purposes for which the information may lawfully be used and is disposed of securely
and in accordance with any requirements for the retention and disposal of personal information. Only two
privacy policy statements indicate how the councils dispose of the personal information they hold.
Information about personal information held by councils
Principle 6 requires a council to take reasonable steps to enable a person to determine if the council holds
personal information relating to that person. Only one council’s website indicates that a visitor can find out if
the councils are keeping personal data about him or her.
Access and amendment of personal information
Principle 7 requires Council to give individuals access to personal information about them while Principle
8 gives individuals right to update or amend personal information. Only one privacy statement indicates how
a visitor can access to the personal data about him or her and update and amend the information that the
council is holding.
Data quality
Principle 9 requires council to check accuracy of personal information before use to ensure that the
personal data council has recorded is accurate, complete and kept up-to-date. Only two council’s website
privacy statements were found to be in compliance with this principle.
Use and disclosure of personal information
Principle 10 specifies limits on use of personal information while Principles 11 and 12 state restrictions
on disclosure of personal information. To comply with these principles, personal data should not be used for
a purpose other than that for which it was collected unless the individual concerned has consented to the use
of the information for that other purpose. A council that holds personal information must not disclose the
information to third parties unless the disclosure is directly related to the purpose for which the personal
information was collected or necessary to prevent a serious threat to the life or health of the individual
concerned or another person. Any such data should be disclosed with the knowledge or consent of the data
subject.
Three privacy policy statements indicate that the personal data the council is holding will be used for a
purpose for which is was collected but among them only 2 privacy policy statements clearly state that the
councils will not disclose your personal information to any other person or organisation without your consent
or the disclosure of your personal information is legally required.
Although 57% of the local councils have added privacy statements to their websites, the great majority of
the privacy policy statements examined were found to have a wide array of deficiencies in relation to the
collection, use, access and disclosure of personal information. The councils are bound by the PPIPA. The
privacy policy statements published on their website should be in compliance with the IPPs to the extent
required by the PPIPA. However, compliance with the legal principles is found to be poor in this study.
6.3 Identifying and Discussing Weaknesses in the Privacy Statements
In addition to compliance with the legal principles, there are some other factors that cannot be ignored by
websites or online government service providers. The discussion in this section focuses on the non legal
factors that may affect the effectiveness of privacy policy statements.
Existence
For any local government bodies going online, a privacy policy statement is a must and adherence to
them is expected. The formation of a meaningful privacy policy statement is an essential first step to create a
positive image of what you are doing with online privacy protection (Clarke, 2011). Milne and Culnan (2002)
argue ‘while having a privacy policy does not guarantee that the organisation observes fair information
31
ISBN: 978-972-8939-51-9 © 2011 IADIS
practices, absence of a privacy policy is an indicator of a failure to observe the most basic fair information
practice principle’. In Australia, the Office of the Privacy Commissioner (2006) suggests that all
organizations should develop and display a privacy policy in an attempt to reduce privacy concerns.
However, some organizations are rather reactive about online privacy protection. The results of this research
are not promising. Of 14 local e-government sites, 6 websites have not added a privacy policy statement to
their home page.
Details
Drafting a privacy policy is not an easy task and it requires extreme care. Special attention must be paid
to details and clarity. The vast majority of the privacy policy statements studied seem thin on details about
the collection, processing, storage or transmission of personal information. 50% of the available privacy
policy statements failed to describe what information was collected, how that information could be used and
kept secure and how an individual might access to information collected about his or her. Online privacy
policies should be developed into details that ensure your constituents that all data collected about them will
be handled properly.
Transparency
More and more local council websites are capable of interacting with users and processing financial
transactions. A privacy policy statement should provide transparency in letting people know what will
happen after you give your name, email address, or other personal information to the third party. As more
people learn about what has been done with their information and information collected online, they will feel
more comfortable to use online services and information (Jensen, et al., 2005).
Automatic collection of information
In common with e-commerce firms, the government websites use cookies and web logs to collect
information about visitors to their website. These online tools in some way give website a little information
about their visitors visiting date and time, IP address, the URL of any page requested. It is important to let
your visitor know whether your website link non-personal information stored in cookies or logged
automatically with personal data about a specific individual.
Three websites tell a visitor to their site that their Internet service providers (ISPs) will record information
related to website visit such as IP address and the pages you accessed and the documents downloaded. Only
two websites notify their users that they are using cookies while one site claims that they do not use cookies
on any public areas of the site. The rest do not state if their websites use cookies.
While the above website visit information and cookies data are not defined as personal information by the
PPIPA, the data can be used to track individual online activities. The intrusive nature of cookies concerns
many Internet users. External ISPs can trace some of this information to the originating individual, which
may raise some serious privacy concerns.
Use of third party services
Most of the websites studied use third-party credit card processors but they do not provide a link to these
companies’ privacy policies. The privacy policy statements posted on the council’s websites failed to provide
any details in respect of how the third parties manage the personal information of the users of the council
websites. Such a practice would likely discourage people from using government online services as they
cannot be assured that their data are being properly protected once shared with a third party site (UN, 2008).
Users face risks to their privacy when they use these transactional facilities via the council’s web site as they
do not have established business relationship with these third parties. Users should be presented with an
explicit opt-in/opt-out option to information disclosure to a third party.
A good privacy policy will allow people to make an informed decision about whether to give their
personal information or not. It does not necessarily protect them from its misuse but it does help create some
kind of transparency in the hope to gain trust. Privacy policies enhance the transparency of the operations of
organisation and give people a better understanding of their management of personal information (Office of
the Privacy Commissioner, 2006).
Readability
The organisation’s personal data practices and legal requirements should be clearly understood and
reflected in a form of a privacy policy statement through standard and straightforward language. The
language used in privacy policies is often difficult for users to understand (Sumeeth, et al., 2009). The
readability of the privacy policy statements can also be problematic. 50% of the privacy documents examined
were poorly structured and vaguely written.
Contact details and updating
32
IADIS International Conference e-Commerce 2011
In addition to transparency, readability and compliance with legal requirements, a good privacy policy
includes information concerning ways to contact the organization and updates to the privacy policy
statement. Privacy policies need to be updated to stay current with the frequent changes in the online
environment. Only two council’s websites show the last updated date at the top of the statement but no
indication was given of the changes made, and no chain was linked back to earlier versions. Only 2 of the
website privacy statements examined provide visitors to their websites with details of whom to contact if they
have a privacy enquiry or concerns.
7. LIMITATIONS OF THIS STUDY AND FURTHER RESEACH
This research is limited to the local council’s websites in the GWS region, Australia. The relative small
sample size makes it difficult to draw more general conclusions. The challenging results of this study suggest
that additional efforts should be taken to further examine privacy policies posted on local government
websites using a larger sample and different levels of e-government.
Earlier studies have shown that privacy statements are positively associated with trust, which has an
impact on willingness to exchange information and transact business with a web site (Hoffman et al 1999,
Nemdi & Dyke 2009). However, these prior studies primarily focus on e-commerce context. Future research
should be done to study the effect of having good privacy practice on trust and how trust influences user
behavioural intention for using e-government services. Research into privacy issues in e-government context
is not only essential to identify opportunities for and threats to local government web sites and their users but
also to improve the effectiveness of e-government initiatives.
8. CONCLUSIONS
There is an increasing risk of personal privacy invasion from using websites. Users are concerned about how
their personal information will be collected, used and secured in online environment. This has resulted in
increased privacy concerns and a lack of trust among users, which have negative impact on e-government
development. The presence of a well-written, easy to understand privacy statement appears to be an effective
method for building trust.
This study examines the contents of the privacy policy statements published on the local council’s
websites in the GWS region using a content analysis approach. The research findings show that 43% of the
websites surveyed do not display a privacy policy statement while 36% appear to have a weak policy
statement. Serious deficiencies in relation to the collection, access, amendment, use and disclosure of
personal data were found in the privacy statements examined. The great majority of the privacy policy
statements published on the local councils’ websites is not in compliance with the IPPs contained in the
PPIPA and provides little privacy protection to the users of their websites. Widespread non-compliance with
the legislation indicates that the current legislation is not effective in protecting user privacy online.
In addition to compliance with the legislation, the aspects of transparency, readability and detailed
information are seen as important for a desirable privacy policy. The lack of details, clarity and transparency
in privacy policy statements prevents users from understanding the content and potential issues in submitting
their personal data. The results of the analysis indicate attempts to display and develop an effective privacy
policy have not been made by the vast majority of the websites examined. The local governments must take
steps to ensure that their policies are posted online and remain transparency, meaningful, understandable and
accessible to users.
The presence of a privacy policy statement on websites in general indicated that e-government sites are
committed to online privacy protection. It is the responsibility of councils to ensure that privacy policy
statements published on their websites are in compliance with the legislation and address the privacy
concerns of their website users. Governments are expected to take the lead in respecting privacy and ensuring
a secure environment that can be trusted to protect personal information from loss and misuse.
33
ISBN: 978-972-8939-51-9 © 2011 IADIS
REFERENCES
Aljukhadar, M., Senecal, S. & Ouellette, D., 2010, ‘Can the media richness of a privacy disclosure enhance outcome? A
multifaceted view of trust in rich media environments’, International Journal of electronic commerce, vol. 14, No.4,
pp103-126.
Arcand, M., Nantel, J., Arles-Dufour, M. & Vincent, A., 2007, ‘The impact of reading a web site’s privacy statement on
perceived control over privacy and perceived trust’, Online Information Review, vol. 31, no. 5, pp.661-681.
Arnett, K.P,Templeton, G.F. & Vance, D.A., 2009, ‘Information Security by words alone: the case for strong security
policies’, International Journal of Information Security and Privacy, vol. 3, no.2, pp.84-89.
Belanger, F. & Hiller, J.S., 2006, ‘A framework for e-government: privacy implications’, Business Process Management
Journal, vol. 12, No. 1, pp.48-60.
Brandeis, L. & Warren, S., 1890, ‘The right to privacy’, Harvard law review, vol.4, p.193.
Clarke, R, 2011, ‘The effectiveness of privacy policy statements’, in D Kerr, J Gammack and K Bryant (eds.), Digital
Business Security Development: Management Technologies, IGI Global, pp.84-111
Earp, J.B., Anton, A.I., Aiman-Smith, L. & Stufflebeam, W.H., 2005, ‘Examining Internet Privacy Policies Within the
Context of User Privacy Values’, IEEE Transactions on Engineering Management, vol. 52, No. 2, pp.227-237.
Fan, Q, 2009, E-government in practice: An analysis of Australian local government websites, Proceedings of the
international conference on information and communication systems (ICICS 2009), Amman, Jordan, December 2023, 2009
Green, H., Yang,C. & Judge,P.C.,1998, ‘A little privacy, please’, Business Week 3569, pp.98-99
Harris Interactive, 2001, Consumer privacy attitudes and behaviours survey, viewed 16 July 2009,
http://understandingprivacy.org/content/library/harris2-execsum.pdf.
Pew Internet, 2000, Pew Internet and American life Survey, viewed 28 January 2010,
http://www.pewinternet.org/Shared-Content/Data-Sets/2000/April-2000-Survey-Data.aspx
Hoffman, D.L., Novak, T.P. & Marcos, P., 1999, ‘Building consumer trust online’, Communications of the ACM, vol. 42,
No. 4, PP.80-85.
Jensen, C, Potts, C & Jensen, C, 2005, ‘Privacy practices of Internet users: Self-reports versus observed behaviour’,
International Journal of Human-Computer Studies vol. 63, pp.203-227.
Liu, C, Marchewka, J.T, Lu, J. & Yu, Chun-sheng, 2005, ‘Beyond concern – a privacy – trust – behavioural intention
model of electronic commerce’, Information & Management, vol. 42, pp.289-304.
Milne, G.R. & Culnan, M.J., 2002, ‘using the content of online privacy notices to inform public policy: A longitudinal
analysis of the 1998-2001 U.S. Web surveys’, The information society, vol.18, No. 5, pp.345-359.
Nemati, H, & Dyke, V. T, 2009, ‘Do privacy statements really work? The effect of privacy statements and fair
information practices on trust and perceived risk in e-commerce’, International Journal of Information Security and
Privacy, vol. 3, no.1, pp.45-64.
OECD 2003, Privacy online: OECD guidance on policy and practice, viewed 10 October 2010,
http://lysander.sourceoecd.org/vl=37345033/cl=11/nw=1/rpsv/cgibin/fulltextew.pl?prpsv=/ij/oecdthemes/99980134/v2003n13/s1/p1l.idx
Office of the Privacy Commissioner, 1998, Privacy and Personal Information Protection Act 1998, viewed 10 February
2011, http://www.privacy.gov.au
Office of the Privacy Commissioner, 2006, Privacy Policy, viewed 10 February 2011, http://www.privacy.gov.au
Pollach, I., 2007, ‘What is rong with online privacy polices’, Communications of the ACM, vol.50.No. 9, pp.103-108.
Schwaig, K. S., Kane, G.C. & Storey, V.C, 2006, ‘Compliance to the fair information practices: How are the Fortune 500
handling online privacy disclosures?’ , Information & Management, vol 43, pp,805-820.
Shoeman, F., 1984, Philosophical dimensions of privacy, Cambridge University Press, Cambridge.
Sumeeth, M, Singh, R. I & Miller, J, 2009, ‘Are online privacy policies readable?’, International Journal of Information
Security and Privacy, vol. 4, no.1, pp.93-116.
UN (United Nations), 2008, UN e-government survey 2008: From e-government to connected government, Viewed 1
December
2008,
http://www.google.com.au/search?hl=en&q=UN+2008+survey+egovernment&btnG=Google+Search&meta
Whitman, M.E. & Mattord, H.J, 2011, Readings and cases in information security: Law and ethics, Course Technology,
Boston.
34
IADIS International Conference e-Commerce 2011
TAXONOMY OF IT INTANGIBLES ASSETS BASED ON
THE ELECTRONIC GOVERNMENT MATURITY MODEL
IN URUGUAY
Helena Garbarino1, Bruno Delgado1 and José Carrillo2
2
1
Universidad ORT Uruguay
Universidad Politécnica de Madrid
ABSTRACT
This article extends a taxonomy of IT intangible assets indicators for the Public Administration completing it in terms of
traceability with Electronic Government Maturity Model proposed by the Agency for Electronic Government and
Information Society and categorized according to a consolidated intellectual capital model. In the project proposal, the
Maturity Model is mapped with the expanded taxonomy so that it considers all of the relevant aspects associated with the
intangible IT assets of the Public Administration in Uruguay. At the end of the project the taxonomy and its relationship at
the indicator level with the Maturity Model is presented.
KEYWORDS
E-Government, intangible assets, intellectual capital, IT, public administration, indicators
1. INTRODUCTION
The purpose of this article is to provide a taxonomy of IT intangible asset indicators for the Public
Administration defined by (Garbarino and Delgado, 2011), expanding upon and completing it based on
traceability with the Electronic Government Maturity Model (hereinafter EGMM) proposed by AGESIC1 in
the ROU2. The original taxonomy is based on a set previously defined by (Zadrozny, 2005) and categorized
according to a consolidated intellectual capital model. In the project proposal, the EGMM is mapped with
expanded taxonomy so that it considers all of the relevant aspects associated with the intangible IT assets of
the Public Administration in Uruguay. At the end of the project the taxonomy and its relationship at the
indicator level with EGMM is presented.
1.1 Intangible Assets
According to (IASC, 2009), intangible assets “are characterized as identifiable assets, without physical
substance, and that are allocated for use in the production or supply of goods and services to be lent to third
parties, or for administrative ends." Baruch Lev (Lev, 2001) defines intangible assets in the following
manner: “an intangible asset is a claim to future benefits that does not have a physical or financial (a stock
or a bond) embodiment. A patent, a brand, and a unique organizational structure (for example, an Internetbased supply chain) that generate cost savings are intangible assets.”
There are several models whose purpose is to serve as tools for identifying, structuring, and assessing
intangible assets: Balanced Business Scorecard (Kaplan and Norton, 1996), Intellectual Assets Monitor
(Sveiby, 1997), Skandia Navigator (Edvinsson, 1997), Intellect Model (Euroforum, 1998), Intellectus Model
(Trillo and Sánchez, 2006), the AIE model for assessing intangibles (Hubbard, 2007) and MERITUM
(Cañibano Calvo, et al., 2002), among others. This article shall be based on the model proposed by the
1
AGESIC – Agencia para el desarrollo del gobierno de gestión electrónica y del conocimiento (ADEGMK, Agency for the
Development of Electronic Government Management and Knowledge)
ROU - República Oriental del Uruguay (ERU, Eastern Republic of Uruguay)
2
35
ISBN: 978-972-8939-51-9 © 2011 IADIS
MERITUM project, as well as the Intellect model, and its evolution: Intellectus. The first model proposes the
need of a common, internationally accepted framework of reference. This shall serve as a basis for companies
to identify, measure, and track their intangibles, since it is difficult for competitors to imitate these methods,
and they become an important sustainable advantage for companies (Kaplan and Norton, 1996). When
considering intellectual capital, there is a certain consensus comprised by three capitals: human, structural,
and relational (Cañibano, et al., 1999, Euroforum, 1998, Trillo and Sánchez, 2006).
From the strategic perspective of the company, in (Kaplan and Norton, 2004) the human capital is
measured focusing on the capabilities, education, and knowledge that people belonging to the company
possess. The idea that structural capital is divided into organizational capital and technological capital has
been adopted from the Intellectus model. This distinguishes aspects regarding business philosophy and
management, and the technological infrastructure as the knowledge that creates and administrates it.
Finally, what is referred to as relational capital in the Intellect model is divided into business capital when
observing the value it has for the organization in relation to the other basic participants of the business
(clients, suppliers, shareholders, etc.), and social capital when observing the relations to social agents of the
surroundings such as means of communication, public institutions, environmental conservation institutions,
etc. To these five capital categories must be added the proposal by (Trillo and Sánchez, 2006): cultural
capital, which is comprised by values, the organizational culture, the innovative and creative culture, and the
relational culture (Table 1).
Table 1. Intellectual capital based on (Cañibano Calvo, et al., 2002, Euroforum, 1998, Trillo and Sánchez, 2006)
Type
1
2
3
4
Name
Human Capital
Organizational Capital
Technological Capital
Business Capital
5
Social Capital
6
Cultural Capital
Attributes
Competence, Knowledge, Aptitudes, and Attitudes
Structure, Learning, and Processes
Efforts in I+D+I, Technological endowment, and Intellectual property
The value represented by the relationships that the organization maintains
with principal agents associated to the business process
The value represented by the relationships that the organization maintains
with the remaining social agents that act within their surroundings
Cultural values, Organizational culture, innovative culture, and creative and
relational culture
The importance of organizational culture is specifically considered due to the characteristics surrounding
the study. (Trillo and Sánchez, 2006) indicates the close relationship between culture and the characteristics of
the intellectual capital indicators; therefore, intellectual capital would be comprised of six elements: human
capital, organizational capital, technological capital, business capital, social capital, and cultural capital.
1.2 Application Surroundings
Contextual considerations:
Based on the characterization of the evolution of the Uruguayan state carried out by (Garbarino and
Delgado, 2011) and the need for stating the intangibles of the Public Administration, measuring their potential,
directing public policies toward a change in the focus and meaning of public service (Merino Rodríguez, et al.,
2003) (AGESIC, 2011b) and transforming it into a tool that supports the governing of IT in the State, the
model defined in (García de Castro, et al., 2004, Medina, 2003) for public Spanish companies is taken as a
basis. From here a taxonomy of intangible IT indicators is built according to the reality of the Public
Administration of Uruguay (Garbarino and Delgado, 2011).
Scope:
The scope of the proposed model refers to the Central Administration, with the exception of Autonomous
Entities and Departmental Governments (Regional Governments) and Local Councils pursuant to that set forth
by (Garbarino and Delgado, 2011) within the framework of the Constitution of the Eastern Republic of
Uruguay (ROU, 2009) and the clear separation of roles within the Public Administration.
Autonomous Entities are explicitly excluded from the scope of this work (whose management shall be
focused on the criteria of private companies and a ROI to be satisfied), as well as organisms that specialize in
regional and local policies. The central focus of the work shall therefore be the Central Administration, and as
36
IADIS International Conference e-Commerce 2011
a case study for validating comparative data, the executive unit of the Directorate General of Commerce,3
which depends on the Ministry of Economy and Finances.
1.2.1 AGESIC (AEGIS, Agency for Electronic Government and Information Society)
AGESIC4 is the "Agency for the Development of Electronic Government Management and Information
Society." Created in 2005, it depends on the President of the Republic and operates with technical autonomy.
Its mission is to lead the strategy and implementation of Electronic Government in the country as a basis for
an efficient State that is centered on the citizen; fostering the Information Society and promoting the
inclusion of Information and Communication Technology, and the quality of its use.
Its principal actions are centered on defining and disseminating the computer guidelines and overseeing
their fulfillment, analyzing technological trends, developing Information and Communication Technology
projects, advising the public institutions of the State with regard to computer material, disseminating material
regarding Electronic Government, and supporting the transformation and transparency of the State.
1.2.2 EGMM - Electronic Government Maturity Model
EGMM is an assessment guide that enables the analysis of the capabilities of services management for the
citizenry, as well as techniques and strategies (AGESIC, 2008b). It also enables the fulfillment of objectives
for efficiency and effectiveness in the use of Information Technology by the State. In Uruguay, the Public
Administration shows uneven development in its sectoral operational capabilities, in particular in its
capability of efficiently and effectively using Information and Communication Technology (AGESIC, 2009).
The objective of the model is to support the transformation of the State; ensuring the quality of
Management, overseeing the state projects, improving and increasing the number of state transactions and
services online, and strengthening the Public Administration with regard to its organization and capabilities
by means of the implementation of maturity models and continuous training.
National and international experts in Public Administration and different technical areas participated in
defining the model with the objective of obtaining a solution that is in line with the best international
practices, and adapted to the possibilities of the State of Uruguay. The model was used as an assessment tool
for current capabilities and, since it contains a list of good practices, it also serves as a behavioral instigator.
Based on the assessments that were carried out, with a definitive model and a tool for self evaluation
supporting improvement in the level of maturity in the Executive Units and the rest of the organisms of the
Public Administration, progress was made in the drafting of the roadmaps that served in improving and
leveling capabilities (AGESIC, 2009).
As seen in Table 2, the model is based on three dimensions, nine related sub areas, and 35 dependent
subcategories:
Table 2. Breakdown of Areas and Subcategories (AGESIC, 2008a, AGESIC, 2008c, AGESIC, 2011a)
Subcategory
Strategy; Governing; Value Management; External Analysis and Benchmarking
Competence; Culture; Structure; Change Management; Recognition and Rewards
Framework for measuring performance; Indicators
IT
Infrastructure; Networks and Connectivity; Integration; Architecture; Security;
Standards
Content; Architecture; Security; Standards; Privacy/Access to public information
Information
Management; Execution (processes and projects); Origin of Resources;
Operations
Fulfillment; Financing Process
Public Relations Services
Channels; Rendering of Services
Understanding of the citizens’ perspective and their needs; Satisfying the citizens;
Citizens
Participation/Adoption/Involvement with citizens
Communications Internal and External strategies; Execution; Promotion of services
Dimension
Organization
3
4
Area
Strategy
People
Performance
Technology
DGC – Website available at http://www.comercio.gub.uy
AGESIC – Website available at http://www.agesic.gub.uy/
37
ISBN: 978-972-8939-51-9 © 2011 IADIS
2. TAXONOMY
The model to be proposed shall be an extension and adaptation of the proposal by (Merino Rodríguez, et al.,
2003), which has emerged as the result of studying models such as the Intellectus (Trillo and Sánchez, 2006)
with adaptation and subsequent revision by external experts.
Given the characteristics of the surroundings presented, it is established that each one of the six capitals
that are proposed in the model shall exist in the Uruguayan Public Administration; leaving the determination
of which indicators, of those that shall be taken as a basis (Zadrozny, 2005), are appropriate for each one of the
proposed IT assets.
2.1 Indicators
Each one of the six capitals that are mentioned in Table 1 group the intangible assets associated with IT in
relation to defined EGMM. Based on the nature of the knowledge, they breakdown into a set of elements that
conceptually identify and describe homogeneous groups of intangible assets. In Table 3 below, the proposed
indicators are classified according to the type of capital they correspond to.
Table 3. Indicators and grouping by type of capital
Type
1
No.
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.10
2
2.1
2.2
2.3
2.4
2.5
2.6
38
Indicator
Employee Experience
Upper Management
Experience
Quality of Upper
Management
Description
Universal indicator. Applies in the context related to IT Knowledge Management.
Abilities of upper management for fulfilling the mission of the organization;
ability of upper IT management in governing the IT of the organization.
The value contributed by the quality of the management carried out by upper
management significantly influences the quality of the products and services. May
be broken down in order to measure the quality of middle management.
The alignment level of the decision-makers in the middle management chain
Aligning of middle
conditions the effectiveness of the implemented strategies.
management
The final quality of the product or service is associated to the capabilities, training,
Know-How
and knowledge regarding the operation carried out, and the objectives.
Indicators shall be constructed that enable the measurement of different
Capabilities
capabilities in order to fulfill goals. These indicators should refer to: adequately
satisfying the information demands, providing a quality service, or following the
status of good electronic Government practices.
Basic measurement for obtaining employee performance with regard to specific
Employee Added Value
operations, for example: the amount of requests received, the amount of services
carried out at the Service Desk, among others.
This indicator is relevant because of the volatility of technical support personnel
Rotation of support
due to market characteristics, the contracting methods of companies that provide
personnel
services to the state, and the horizontal operational movements between different
public concessions.
Indicator that measures the efficiency of the continuous corporate governing of IT
Training
formation and human resources training.
Measures the level of satisfaction regarding strategy, organization, operation, and
Employee satisfaction
work conditions.
Ability to attract talented There are different perceptions regarding the provision of services to the state, and
working for the state.
employees
Considering this indicator as an investment in organizational structure, it is an
Investments in Internal
improvement indicator that applies within the context.
Structure
Refers to the processes for the acquisition of IT solutions and services.
IT Acquisitions
The capability of measuring the impact of the loss of professionals within the
Loss of
organization.
Professionals/Talent
The capability of measuring lost assets regarding IT (hardware such as general
Lost Assets
infrastructure, and software such as code, executables, technical documentation of
users, and databases). Based on this indicator it may be determined how many,
which, and what percentage may or may not be accepted as a loss. This is a
measurement of the quality of asset management that should be evaluated in
strategic-monetary terms in order to support the decision-making process.
The evaluation of formalized processes is the step subsequent to the formalization
Formalized Processes
IADIS International Conference e-Commerce 2011
2.7
Structural Adaptation
2.8
Costs of Education and
Training
Informal Processes
2.9
2.10
2.11
2.12
2.13
2.14
2.15
2.16
2.17
2.18
2.19
2.20
2.21
2.22
2.23
2.24
2.25
3
3.1
3.2
3.3
3.4
3.5
3.6
3.7
Quality of Processes,
Products, or Services
Investment in IT
Staff renewal ratio
Quality of Corporate
Government
Defined strategy
Quality of the system for
recognition and rewards
Performance - strategy
level
Performance - alignment
Performance - level of
operation
Information Security
and implementation of said processes (for example under a referential ISO,
CMMI, COBIT, etc. framework)
Measurement of the relation between the IT capabilities of the organization, vs. its
operations. When the value is more than one, it can measure the additional
capabilities of offering IT services to other units, and should be related to adequate
demand management.
This is relevant for all organizations, including state organizations. One possible
indicator is the operation cost in comparison with international standards.
Within this context there are several informal processes for various reasons: lack
of resources, lack of orientation culture for processes, including quality processes,
tradition, organizational culture, and informal hierarchical relationships, among
others.
These indicators are currently measured based on international standards derived
from institutions like ISO, in such a way as to enable benchmarking.
This indicator is a fundamental element in the strategy for IT government, and
should consider the different dimensions referring to: the following of IT
principles, the IT architecture of the business and the defined infrastructure,
strategical relevance of investments (integration to the administration strategy),
and decision-making processes.
Indicator that represents the Administration's capability of renewing the IT staff.
The new public management based on transparency in managing, external and
internal auditing, focus on results, and public rendering of accounts.
Explicit definition of the mission and vision of the IT organization, as well as
plans for carrying them out.
Existence, effectiveness, and efficiency of the organization's systems for
recognition and rewards.
Existence of a model for performance indicators.
Alignment of the performance indicator model with the defined strategy.
Effective use of the model.
Security management of the information, including policies for information
security, risk management for information, the following of standards and respect
for privacy and access to public information, as well as auditing procedures
Management of capabilities based on a capabilities plan with a defined
Capabilities
management cycle.
Affective mechanisms for obtaining external resources in order to finance
External financing
Electronic Government initiatives.
Scalability of EG Services Capabilities associated with integration, adaptation, and maintenance of integrated
services on an EG platform.
Capabilities regarding the rendering of services by means of different channels
Multichannel GE
(on-site, electronic, and by telephone).
Services
Communication strategy Existence of an organic communication strategy for dissemination and awareness
of services, as well as management.
Alignment of communications management with the multichannel strategy.
Multichannel
communication
Quality and adaptation of the support systems portfolio of the organization.
Software (baseline)
Quality and adaptation of the organization's applications portfolio focused on
Software (Applications)
rendering specific services.
This applies within a context referring to the focus on acquiring and updating
Purchase of Technology
technology.
Availability of data for constructing measurements that support indicators.
Data Access Capability
Development of in-house This applies within the context referring to the management and development of
IT solutions and services on the part of the organization with its own resources.
IT
This applies within a context referring to the management and development of IT
Development of
solutions and services on the part of third parties. Outsourcing carried out at the
outsourced IT
physical limits of the organization may be distinguished from pure outsourcing for
the purpose of better oversight.
Measurement of the innovation capability regarding improvements in
Research and
effectiveness (more, and better products and services) and efficiency (less costsDevelopment
39
ISBN: 978-972-8939-51-9 © 2011 IADIS
4
5
6
3.8
Systems
3.9
3.10
3.11
Flexibility of the Physical
Plant
Plant Infrastructure
Modernity of the Plant
4.1
Lending of Services
4.2
Operations
4.3
Projects
5.1
Hierarchical knowledge
5.2
Quality of Supplier
contracts
5.3
Deployment of
communication
Organic Growth
6.1
6.2
Organizational
Reputation
6.3
Innovative culture
6.4
Focus on service and the
citizen
Focus on citizen
participation
Encouragement of
multichannel GE
Services
6.5
6.6
time-effort)
At the IT portfolio management level, the strategic relevance, effectiveness, and
efficiency of the information systems and the processes supported by IT regarding
the operations that they carry out shall be measured. Parker and Benson [19] may
be utilized in order to classify them from an economic point of view.
The volume, quality, and flexibility of the physical plant influences the
development of IT capabilities for improved performance, which should be
measured in terms of product and SW service productivity. This is an indicator
that should be supported by several measurements such as the amount of
PF/developed monthly, customer service satisfaction, the capability of a reactive
response to IT demands, and the capability of proactive proposals for IT solutions.
The evaluation of incoming or outgoing products/services to and from third parties
may be an indicator of the organization's IT capabilities. Within the current
framework of EG trends and complementing of state services (with or without an
economic relation), this could be an indicator of maturity, and therefore increase
the IT assets.
Operative management based on an operations plan with a defined management
cycle.
Project management, methodology, integration, institution analogy, and benefit
management.
This is necessary for measuring the satisfaction of citizens with the state services
(within the G2C5 context), the performance of the hierarchies in the fulfillment of
their duties, and the development of electronic government. In this sense the
development of electronic government agencies (AGESIC FOR example)
implement standardized evaluation models for measuring the dimensions of this
attribute.
The integration of products and services with different suppliers is a characteristic
of IT type architecture. Monitoring the relationship and fulfillment by means of
SLA´s5, implies the insurance of quality service.
Monitoring and control of communications while keeping in mind the public
objective (G2C, G2B, G2G, and G2E).
The measurement of the evolution of products and services offered is an indicator
of improvement and added value within the context of innovation.
The state of Uruguay, by means of AGESIC6 , is currently immersed in a
transformation process with the objective of improving its state IT capabilities;
aligning them with better practices, and international standards.
This indicator should be considered, and measured from a citizen satisfaction
point of view, because if a competition policy does not exist at the market level, it
isn't necessary to innovate in order to improve competitiveness.
Capability and focus on IT in satisfying the demands for services on the part of
citizens, companies, and government.
Capability and focus on IT in order to encourage and facilitate citizen
participation.
Focus on the promotion and encouragement of multichannel EG services, with the
objective of improving access, deployment, and the universality of services.
3. TAXONOMY TRACEABILITY PROPOSAL - EGMM
The following displays the complete relationship between EGMM at the subcategories level, and the different
indicators related, which shall enable the measurement of management, as well as each sub area, based on the
different indicators regarding taxonomy.
5
6
Service Level Agreement
AGESIC – Agency for the Development of Electronic Government Management and Knowledge.
40
IADIS International Conference e-Commerce 2011
Table 4. Taxonomy traceability - EGMM
Area
Strategy
People
Performance
Technology
Information
Operations
Services
Citizens
Communications
Subcategory
Strategy
Government
Value management
External analysis and benchmarking
Competition
Culture
Structure
Change management
Acknowledgment and rewards
Framework for measuring performance
Indicators
Infrastructure
Networks and Connectivity
Integration
Architecture
Security
Standards
Content
Architecture
Security
Standards
Privacy/Access to public information
Management
Execution (processes and projects)
Origin of resources
Compliance
Financing process
Channels
Rendering of services
Understanding of the citizen's perspective and needs
Citizen satisfaction
Participation/Adopting/Involving citizens
Internal and external strategy
Execution
Promotion of services
Related indicators
2.14
2.2; 2.3; 2.5; 2.9; 2.11; 2.13; 3.5;
3.6; 5.2
2.5; 2.97; 2.10; 3.5; 3.6
2.6; 2.10; 3.7
1.1; 1.2; 1.3; 1.4; 1.5; 1.8
6.4
6.5
1.3; 1.7; 2.1; 2.4; 2.12
1.10; 2.15
1.6; 3.7
2.16; 2.17; 2.18
2.7; 3.1; 3.2; 3.8; 3.9; 3.10; 3.11; 4.1
2.7; 3.1; 3.9; 3.10; 3.11; 4.1
2.7; 3.1; 3.2; 3.8; 3.9; 3.10; 3.11; 4.1
2.7; 3.1; 3.2; 3.8; 4.1
3.1; 3.2; 4.1
3.1; 3.2; 4.1
3.4
3.4
2.19
2.19
2.19
2.20; 4.2
4.2; 4.3
3.3
3.3; 4.2
2.21
2.22; 2.23; 6.6
5.1; 6.1
6.2; 6.4
5.1; 6.2; 6.3
5.1; 6.1; 6.5
2.24
2.25
6.6
4. CONCLUSIONS AND FUTURE PROJECTS
From the preceding analysis emerges a taxonomy proposal that incorporates new indicators in order to cover
all of the dimensions of the model proposed by AGESIC, without being limited to it. Based on a consolidated
taxonomy of 38 indicators, a total of 58 indicators were reached; representing an increase of 52%.The
taxonomy obtained presents a balance of improved indicators, where the more highly covered EGMM areas
are Technology (33%) and Strategy (18%), while the least covered is Communications with 3%. The final
result achieved is a relationship with complete traceable taxonomy, where all of the sub areas of the EGMM
are covered by different indicators.
Regarding the taxonomy reference (Garbarino and Delgado, 2011), a relevant percentage increase is
observed in business capital (67%), organizational capital (19%) and technological capital (12%), with no
change in the social capital, and both cultural and human capital decreasing in a relevant manner; (40%) and
(23%) respectively.It is concluded that in order to completely cover the EGMM, and therefore serve as a
supporting reference regarding the management of intangible IT assets, the weight of the aspects associated
with human and cultural capital decreased notably in taxonomy.
7
This indicator should be included within the contexts that focus exclusively on processes.
41
ISBN: 978-972-8939-51-9 © 2011 IADIS
As a future project, the construction of the quantitative dimension for each indicator based on the
associated robust measurements, for each case, into existing valuation models of assets, or their mapping to
candidate models is proposed. This will make possible the quantified measurement of the quality of corporate
IT government with regard to the management of intangible IT assets in the public Administration of Uruguay.
REFERENCES
AGESIC, 2008a. Gobernanza en TI. Modelo de Madurez para la Gestión de Gobierno Electrónico.
http://www.agesic.gub.uy/innovaportal/v/457/1/agesic/modelo_de_madurez_para_la_gestion_de_gobierno_electronic
o.html?menuderecho=4.
AGESIC, 2008b. Memoria Anual 2008. Montevideo, Uruguay. Presidencia de la República.
AGESIC, 2008c. Modelo de madurez de Gobierno Electrónico. Montevideo, Uruguay. Presidencia de la República.
AGESIC, 2009. Memoria Anual 2009. Montevideo, Uruguay. Presidencia de la República.
AGESIC, 2011a. Madurez de Gobierno Electrónico - Cuestionario. Montevideo, Uruguay. Presidencia de la República.
AGESIC, 2011b. Plan estratégico 2011 - 2015. Montevideo, Uruguay. Presidencia de la República.
Cañibano Calvo, L., et al., 2002. Directrices para la gestión y difusión de información sobre intangibles. Fundación
Airtel Móvil. Madrid.
Cañibano, L., et al., 1999. The value relevance and managerial implications of intangibles: a literature review. Vol. No.
pp.
Edvinsson, L., 1997. Developing intellectual capital at Skandia. Long Range Planning. Vol. 30. No. 3, pp. 366-373.
Euroforum, 1998. Medición del Capital Intelectual. Modelo Intelect”, IUEE, . IUEE. San Lorenzo del Escorial , Madrid.
Garbarino, H. and B. Delgado, 2011. Taxonomía de indicadores de activos intangibles de TI para la Administración
Pública. Caso República Oriental del Uruguay. CISTI 2011. Portugal.
García de Castro, M. A., et al., 2004. La gestión de activos intangibles en la administración pública. Vol. No. pp.
Hubbard, D. W., 2007. How to Measure Anything: Finding the Value of Intangibles in Business. John Wiley & Sons, Inc.
Hoboken, New Jersey. USA.
IASC, 2009. NIC 38 Activos Intangibles. [23/04/2011]. http://www.iasb.org/NR/rdonlyres/8C28675D-FE12-468C-A7B766F8C1628673/0/IAS38.pdf.
Kaplan, R. and D. Norton, 2004. La disponibilidad estratégica de los activos intangibles. Harvard Business Review. Vol.
122. No. pp. 38 - 51.
Kaplan, R. S. and D. P. Norton, 1996. The Balanced Scorecard. Harvard Business School Press. Barcelona.
Lev, B., 2001. Intangibles: management, measurement, and reporting. Brookings Institution Press. USA.
Medina, A. S., 2003. Modelo para la medición del capital intelectual de territorios insulares. Una aplicación al caso de
Gran Canaria. Facultad de Ciencias Económicas y Empresariales. Departamento de Economía y Dirección de
Empresas Universidad de las Palmas de Gran Canaria.
Merino Rodríguez, B., et al., 2003. Capital Intelectual en la Administración Pública: El caso del Instituto de Estudios
Fiscales. España.
ROU, 2009. Constitución de la República. Constitucion 1967 con las modificaciones plebiscitadas el 26 de noviembre de
1989, el 26 de noviembre de 1994, el 8 de diciembre de 1996 y el 31 de octubre de 2004. Montevideo, Uruguay.
Poder Legislativo.
Sveiby, K. E., 1997. The intangible assets monitor. Journal of Human Resource Costing and Accounting. Vol. 2. No. 1,
pp. 73-97.
Trillo, M. A. and S. M. Sánchez, 2006. Influencia de la cultura organizativa en el concepto de capital intelectual.
Intangible Capital. Vol. 11. No. 2, pp. 164-180.
Zadrozny, W., 2005. Making the Intangibles Visible. How Emerging technologies Will Redefine Enterprise Dashboards.
IBM Research Division. New York, USA.
42
IADIS International Conference e-Commerce 2011
A MODEL OF CUSTOMER RELATIONSHIP
MANAGEMENT FOR THE CONTEXT
OF PERMISSION-BASED E-MAIL MARKETING
Hsin-Hui Lin
Department of Distribution Management, National Taichung Institute of Technology
No. 129, Sec. 3, Sanmin Road, Taichung 404, Taiwan
ABSTRACT
Sending/retrieving e-mails is one of the most prevalent and frequent online activities around the world and also the best
tool for online marketing. However, abuse of unsolicited e-mails has caused much burden to both Internet users and
businesses and also reduced the effects of e-mail advertising. In nowadays, some e-commerce websites have begun to
make a clear distinction between permission-based e-mail marketing (PEM) and simultaneously posted advertising
messages (SPAM) and extensively used PEM to build long-term and lasting customer relationships. As the extant
research of PEM is very limited, this study proposes a conceptual model of customer relationship management model for
the context of permission-based e-mail marketing. The proposed model suggests that relational benefits (i.e., confidence,
social, and special treatment) and functional and process benefits (i.e., information quality, ease of use, and
entertainment) influence relationship outcomes (i.e., loyalty and online word-of-mouth) through the mediation of
relationship quality (i.e., satisfaction and commitment). The proposed model can provide some important implications on
theories and practices of PEM.
KEYWORDS
Permission-based e-mail marketing (PEM), relationship marketing, customer relationship management
1. INTRODUCTION
E-mail has become an indispensable tool for online communications. Epsilon’s 2009 Global Consumer Email
Study also confirmed that e-mail is extensively used by consumers around the world (FIND, 2010). For
businesses, e-mail is undoubtedly one of the best options for online marketing. Slack mentioned that e-mail
marketing offers fast responses along with a high rate of return due to the low cost of the medium. Businesses
are thus beginning to perceive it as a silver bullet for acquisition and retention strategies (Jupiter
Communications, 2001). Acxiom Digital and Harris Interactive pointed out in a 2006 report that 75% of adult
Internet users would open e-mails from businesses and consider those e-mails as “valuable” or “very
valuable”. For retailers, e-mail marketing is an efficient and responsive tool for maintaining customer loyalty.
It helps them communicate with customers in meaningful ways, so they can see the results of e-mail
marketing reflected on their increased revenue (Shih, 2006).
However, abuse of e-mail marketing is one negative phenomenon that bothers many people. A 2008
report released by Taiwan’s National Communications Commission (NCC) indicated that 83.9% of Internet
users in Taiwan received 10-50 unsolicited emails each day, at an average of 29 (Wen, 2009). The excessive
abuse of e-mail-based advertising generates additional burdens to consumers. The simultaneously posted
advertising messages, commonly known as SPAM, also cause a waste of corporate resources and social
costs. Abuse of e-mail marketing may mitigate the effects of advertising and displease or agitate consumers.
Besides, potential consumers may also become highly suspicious of the motives behind the e-mails originally
meant to foster customer relationships. Therefore, most businesses have become aware that in order to
achieve effective marketing, they should use e-mail marketing with more care and ethics. Now, many
businesses are beginning to make a clear distinction between e-mail marketing and spam e-mails. They seek
to adopt better and more ethical marketing strategies so as to build long-term and lasting customer
43
ISBN: 978-972-8939-51-9 © 2011 IADIS
relationships. The concept of permission marketing (PM) was introduced against this background to offer
both businesses and users a win-win solution.
By integrating customer benefits and relationship marketing theories, this paper will develop a model
consisting of antecedent, mediator, and outcome variables for PEM-based websites. In today’s business
environment where customer satisfaction and loyal customer relationship are highly emphasized, this model
is expected to help businesses develop and maintain customer relationships.
2. LITERATURE REVIEW
2.1 Permission-based Email Marketing (PEM)
PEM is commonly defined as “a method of advertising through promotional e-mails whose recipients consent
to receive commercial messages from the sender” (IMT Strategies, 1999; Tezinde, Smith and Murphy, 2002).
Permission relationships start with the consumer’s explicit and active consent to receive commercial
messages at any time. IMT Strategies (1999) pointed out another characteristic of PEM, which is that it can
offer specific, individualized messages to targeted consumers. Godin (1999) mentioned that PEM must
satisfy consumer needs and provide consumer-related information. Consumers expect to receive information
that is directly related to them and of their interest. According to Wathieu (2000), the principle of PEM is to
perform accurately targeted data mining on “right customers”. Rozanski, Bollman, and Lipman (2001)
mentioned that the main characteristic of PEM is that consumers understand what they will get, consent to
receive, and are able to terminate subscription at any time. Marinova et al. (2002) also identified three
characteristics of permission emails, including the opt-in and opt-out list, message customization, and content
relevancy with the recipient.
2.2 Relationship Marketing Model
Berry (1983) defined relationship marketing as “attracting, maintaining, and in multi-services organizations
enhancing customer relationships”. Attracting new customers is only one step in the marketing process. The
main idea of relationship marketing is to substantiate relationships, which is to view consumers as clients to
turn indifferent customers into loyal ones. Hence, relationship marketing is not just about attracting new
customers but also about keeping customers. Hennig-Thurau, Gwinner, and Gremler (2002) proposed a
relationship marketing model to investigate the antecedents and outcomes of a positive customer relationship.
Whether customers are willing to maintain the existing relationship with a business depends largely on their
evaluation of given benefits. Therefore, relational benefits are antecedent variables in the relationship
marketing model. Gwinner, Gremler, and Bitner (1998) identified three types of relational benefits, including
confidence benefits, social benefits, and special treatment benefits. Confidence benefits refer to customer
feelings of trust and anxiety reduction. Social benefits refer to the friendship, recognition, and fraternization
that might arise between the customer and the service provider. Finally, special treatment benefits refer to
price discount, speedy service or additional services that are not available to others (Bendapudi and Berry,
1997; Berry, 1995). Relationship quality is a mediator variable in the relationship marketing model. It
consists of customer satisfaction, trust, and commitment (Crosby, Evans, and Cowles, 1990; Dorsch,
Swanson and Kelley, 1998; Garbarino and Jonson, 1999; Palmer and Bejou, 2006). Hennig-Thurau et al.
(2002) identified only two components of relationship quality, namely satisfaction and commitment.
According to Armstrong and Kotler (2000), satisfaction is a function of perceived performance and
expectations which identifies a person’s feelings resulting from comparing a product’s perceived
performance in relation to his or her expectations. In this paper, satisfaction is defined as “the degree of
feeling pleased or disappointed with a product’s functional characteristics or perceived performance”. It is
one’s perception of his or her overall satisfaction with a product or service. Storbacka et al. (1994) defined
commitment as “the parties’ intentions to act and their attitude towards interacting with each other”. While
businesses tend to evaluate the effectiveness of their efforts at the end of each relationship marketing activity,
enhanced customer loyalty and positive word-of-mouth are viewed as “relationship outcomes” (Berry, 1983;
Morgan and Hunt 1994). Loyalty is a biased repurchase behavior and repatronage accompanied by a
44
IADIS International Conference e-Commerce 2011
favorable attitude (O’Malley, 1998), and word-of-mouth refers to information communications directed at
other consumers at the ownership, usage or characteristics of particular goods, services or their sellers
(Westbrook, 1988).
2.3 Integration of Customer Benefits in the Traditional and the Network
Contexts
It should be noted that Hennig-Thurau et al.’s (2002) model was intended to investigate the relationship
between relational benefits, relationship quality, and relationship outcomes in the traditional context. Their
model must be extended or integrated with other components before it can be applied in the network context.
Whether in the traditional environment or the online environment, customer benefits resulting from
relationship marketing are based upon products and services (or subjects to be exchanged) and benefits
generated in the exchange or service process. The relational benefits approach assumes that both parties in a
relationship must benefit for it to continue in the long run. For the customer, these benefits can be focused
either on the core service or on the relationship itself (Hennig-Thurau et al., 2000). This is because most
relational benefits are benefits that exist above and beyond the core service provided (Gwinner et al., 1998).
In addition to relational benefits, functional benefits and process benefits should be considered in marketing
that relies on customer relationship management (Court et al., 1999; Han and Han, 2001).
In Marketing in 3-D, Court et al. (1999) introduced the idea of “functional benefits”, which are benefits
stemming from physical and mental satisfaction with the performance and quality of the product. The
benefits that exist above and beyond the core service provided are similar to the functional value in
PERVAL, which breaks down into quality and price (Sweeney and Soutar, 2001). Providing information is a
core product or service of a website. Like information quality mentioned by Rai, Lang, and Welker (2002),
informational value introduced by Eighmey (1997) can be viewed as “the degree to which information
produced has the attributes of content, accuracy, and format required by the user”. Information value
resembles content value proposed by Han and Han (2001), as both of them refer to the value and benefits of
information that a website can offer. Therefore, “information quality” corresponds to “functional benefits”
from 3-D marketing.
Besides, in the marketing process, the step next to attracting new customers is turning interested
customers into loyal ones (Berry, 1983). This concept has been introduced into management of customer
relationships in the network context. In 3-D marketing, “process benefits” are benefits that make transactions
between buyers and sellers easier, cheaper, and more pleasant (Court et al., 1999). In PERVAL, emotional
value is defined as the utility derived from the feelings or affective states that a product generates (Sweeney
and Soutar, 2001). In Eighmey (1997), entertainment value is described as the degree to which users feel
entertained by the website. Besides, ease of use measures how a website’s functions are easy to use for
general users. Therefore, we argue that “emotional/entertainment value” and “ease of use” correspond to
“process benefits” from 3-D marketing.
In both the traditional and network contexts, customer relationships are established on mutual benefits
between exchange partners (Barnes, 2001). Court et al. (1999) described “relational benefits” as the benefits
which reward the willingness of consumers to identify themselves and to reveal their purchase behavior.
Benefits such as a feel of comfort, experience of being treated as a friend, price discount, reduction of
transaction time, and individualized services can all be viewed as relational benefits. In this case, relational
benefits encompass confidence benefits, social benefits, and special treatment benefits proposed by Gwinner
et al. (1998) and Hennig-Thurau et al. (2002). Besides, according to Sweeney and Soutar (2001), customers’
social value is the utility derived from the product’s ability to enhance social self-concepts. We argue that
social value corresponds to the above-mentioned social benefits and is covered by relational benefits from 3D marketing (Court et al., 1999). The ideas of trust, interactivity, and marketing perceptions introduced by
Eighmey (1997) respectively correspond to confidence benefits, social benefits, and special treatment
benefits, which are, as aforementioned, collectively encompassed by relational benefits (Court et al., 1999).
A comparison of customer value/benefit dimensions between the traditional and network environments are
shown in Table 1.
45
ISBN: 978-972-8939-51-9 © 2011 IADIS
Table 1. A mapping table of customer value/benefit dimensions
Environment
Traditional
Author(s)
Gwinner et al.
(1998);
HennigThurau et al.
(2002)
Court et al.
(1999)
Sweeney and
Soutar
(2001)
Internet
Eighmey
(1997)
Han and Han
(2001)
This study
Value/benefit dimensions
-
Functional
Confidence
Process
Social
Special
treatment
Relationship
Functional
(price)
Functional
(quality)
-
Emotional
-
Social
-
Information
Ease of
use
Entertainment
Credibility
Interactivity
Marketing
perceptions
Social
Special
treatment
Content
Information
quality
Context
Ease of
use
Entertainment
Confidence
3. RESEARCH MODEL AND HYPOTHESES
Based on the three dimensions of customer benefits proposed by Court et al. (1999), relationship marketing
model introduced by Hennig-Thurau et al. (2002), and benefits of online customers identified by Eighmey
(1997), this paper proposed a modified customer relationship management model to investigate the effects of
customer benefits on relationship quality and relationship marketing outcomes as well as how website
operators can use PEM to develop long-term customer relationships. As shown in Figure 1, the proposed
model consists of antecedents, mediators, and outcome variables.
Korgaonkar & Wolin (1999) argued that in the cyberspace, customers can not only access some general
goods and service information but also seek information and make contacts (FAQ and e-mail) according to
personal needs. If they can obtain needed information from a website, their satisfaction with the website can
be enhanced. Ranft & O’Neill (2001) also mentioned that the prevalence and sufficiency of information on
the Internet will make website providers dare not have deceptive conducts, because a temporary short sight or
opportunistic behaviors may destroy a long-term customer relationship. They concluded that informational
quality are important for both parties of a relationship to maintain the relationship. It can be inferred that
when users perceive that PEM-based websites have more practical information, they will feel more satisfied,
be more willing to maintain relationships with the websites, and have higher intention to continue using the
websites.
H1: Informational quality has a positive influence on user satisfaction.
H2:Informational quality benefit has a positive influence on user commitment.
H3: Informational quality benefit has a positive influence on user loyalty.
Negash, Ryan, & Igbaria (2003) confirmed that system quality (ease of use) is highly correlated with
customer satisfaction. Besides, Hawkins (1994) mentioned that an ease of use interface should be
customizable, easy to understand, highly visualized, easy to browse, and effort-saving. If using Internet is
easy, customers can be more focused on continuation of their relationships. Reichheld, Markey, & Hopton
(2000) also mentioned that many successful firms have discovered that easier or faster transactions can help
consumers get needed services faster and make them more willing to make a repatronage. It can be inferred
that the more easily users can use PEM-based websites, the more satisfied they will be, the more willing they
are to maintain their relationships with the websites, and the higher their loyalty towards the websites can be.
46
IADIS International Conference e-Commerce 2011
Note:- denotes the original relationship marketing model; -denotes the dimensions and paths added by this paper
Figure 1. A Conceptual Model of Customer Relationship Management for the Context of PEM
H4: Ease of use benefit has a positive influence on user satisfaction.
H5: Ease of use benefit has a positive influence on user commitment.
H6: Ease of use benefit has a positive influence on user loyalty.
Many scholars have pointed out that entertainment helps one relax his mood, pass time, and release
emotions (Eighmey, 1997; Ferguson & Perse, 2000; Papacharissi & Rubin, 2000). They proposed that
entertainment can bring positive benefits to customers in the emotional aspect, induce their positive
emotions, and help enhance their satisfaction. Besides, Papacharissi & Rubin (2000) suggests that
entertainment is an important motive for Internet use and has important influence on maintenance of Internetbased customer relationships. Reichheld, Markey, & Hopton (2000) pointed out that if consumers have an
enjoyable and pleasant experience of a transaction on the Internet, they will select websites that can provide
similar experiences for their next deal, and their intention for repeated use will be enhanced. It can be
inferred that the more pleased users can use PEM-based websites, the more satisfied they will be, the more
willing they are to maintain their relationships with the websites, and the higher their loyalty towards the
websites can be.
H7: Entertainment benefit has a positive influence on user satisfaction.
H8: Entertainment benefit has a positive influence on user commitment.
H9: Entertainment benefit has a positive influence on user loyalty.
In a transaction between a manufacturer and a buyer, confidence and trust for the other party has positive
influence on satisfaction of the transaction (Andaleeb and Anwar, 1996). We extend this conclusion to the
use of PEM-based websites. Besides, Morgan & Hunt (1994) and Garbarino & Johnson (1999) mentioned
that confidence in a service provider brings certain benefits to customers (such as reduction of transaction
costs) and will motivate users to make relational commitment to the service provider. According to Berry
(1995), when customers rely on or trust a certain service provider, they have higher loyalty to the firm and
more intention for repeated communication. It can be inferred that users who feel more confident with a
PEM-based website are more likely to feel satisfied with, be willing to maintain relationships with, and have
higher continuance of, the website.
H10: Confidence benefit has a positive influence on user satisfaction.
H11: Confidence benefit has a positive influence on user commitment.
47
ISBN: 978-972-8939-51-9 © 2011 IADIS
H12: Confidence benefit has a positive influence on user loyalty.
Price & Arnould (1999) suggests that there is a positive relationship between commercial friendship
(social benefit) and satisfaction. Previous studies have shown that social benefits are positively correlated
with customer commitment (Goodwin, 1997; Goodwin & Gremler, 1996). Berry (1995) also pointed out that
the social bonds between customers and service provider can increase customers’ commitment to the
organization and also increases customers’ intention for repeated communications. It can be inferred that
when users perceive that PEM-based websites have more friendly treatment, they will feel more satisfied, be
more willing to maintain relationships with the websites, and have higher intention to continue using the
websites.
H13: Social benefit has a positive influence on user satisfaction.
H14: Social benefit has a positive influence on user commitment.
H15: Social benefit has a positive influence on user loyalty.
According to Reynolds & Beatty (1999), special treatment benefits (such as economic savings or
customized service) offered by service providers are like a part of the services provided, so their influence on
satisfaction of the services can be expected. Besides, when customers receive special treatment benefits from
an organization, they will be faced with higher or more emotional or cognitive switching barriers (Fornell,
1992) and thus increase their commitment and continue their use of the services or goods provided by the
organization (Selnes, 1993; Hennig-Thurau et al., 2002). It can be inferred that users who feel more
economic or customized treatments with a PEM-based website are more likely to feel satisfied with, be
willing to maintain relationships with, and have higher continuance of, the website.
H16: Special treatment benefit has a positive influence on user satisfaction.
H17: Special treatment benefit has a positive influence on user commitment.
H18: Special treatment benefit has a positive influence on user loyalty.
Anderson and Srinivasan (2003) proposed that, in an e-commerce environment, higher e-satisfaction
leads to higher e-loyalty. Luarn and Lin (2003) investigated and empirically confirmed the positive
relationship between satisfaction and loyalty in an e-service environment. Henning-Thurau et al. (2002)
suggests that customer satisfaction has significant and strong influence on their word-of-mouth behavior. In
the era with highly advanced information technology, the PEM-based websites has become a new platform
for B2C business transactions and information exchanges. As a result, it is even easier for satisfied customers
to diffuse their word-of-mouth. The following hypotheses are proposed.
H19: User satisfaction has a positive influence on user loyalty.
H20: User satisfaction has a positive influence on user word-of-mouse.
Reichheld, Markey, & Hopton (2000) discovered that customers’ commitment to a website is
significantly influential to their repurchase behavior. Henning-Thurau et al. (2002) discovered that
customers’ commitment to a company positively influences their loyalty. The findings in Roberts, Varki, &
Brodie (2003) reveal that commitment has positive effects on loyalty in a high-quality relationship. Besides,
commitment can be viewed as an important predictive construct of customer’s future behavior (Garbarino &
Johnson, 1999). It has been affirmed that commitment has positive influence on word-of-mouth (Beatty,
Kahle, & Homer, 1988). The following hypotheses are proposed.
H21: User commitment has a positive influence on user loyalty.
H22: User commitment has a positive influence on user word-of-mouse.
4. CONCLUSION
The main purpose of this study is to propose a customer relationship management model for the context of
permission-based e-mail marketing. A conceptual research model and the associated hypotheses are proposed
based on previous literature. The proposed model suggests that relational benefits (i.e., confidence, social,
and special treatment) and functional and process benefits (i.e., information quality, ease of use, and
entertainment) influence relationship outcomes (i.e., loyalty and online word-of-mouth) through the
mediation of relationship quality (i.e., satisfaction and commitment). Future researchers could conduct an
empirical validation of the proposed model. The proposed model can provide some important implications on
theories and practices of PEM.
48
IADIS International Conference e-Commerce 2011
REFERENCES
Shi, H. C. (2006), SPAM E-mails can be Business Opportunities and Arts, Electronic Commerce Times. Retrieved from
URL: http://www.ectimes.org.tw/Shownews.aspx?id=8533
Wen, Y. C. (2009), Abuse of SPAM E-mails Makes Taiwan a Nation of Trash E-Mails, Electronic Commerce Times.
Retrieved from URL: http://www.ectimes.org.tw/Shownews.aspx?id=090402170753
FIND (2010), North American Flooded with SPAM E-Mails, Research and Promotion of Technological Services Value
Chain,
Institute
for
Information
Industry.
Retrieved
from
URL:
http://www.find.org.tw/find/home.aspx?page=news&id=5710
Andaleeb, S. S. & Anwar, S.F. (1996). Factors influencing customer trust in salespersons in a developing country.
Journal of International Marketing, Vol. 4, Iss.4, 35-52.
Anderson, E.W. (1998). Customer Satisfaction and Word of Mouth. Journal of Service Research, 1(1), 5-17.
Anderson, R.E. & Srinivasan, S.S. (2003). E-satisfaction and e-Loyalty: A contingency framework. Psychology and
Marketing, 20(2), 123-138.
Armstrong, G. and Kotler P. (2000). Marketing: An Introduction(5th ed.). New Jersey: Prentice Hall.
Beatty, S.E. Kahle, L.R., and Homer, P. (1988). The Involvement – Commitment Model. Theory and Implications.
Journal of business Research, 16(2), 149-167.
Bendapudi, N. and Berry, L.L. (1997). Customers' Motivations for Maintaining Relationships with Service Providers.
Journal of Retailing, 73(1), 15-37.
Berry, G.L. (1995). Relationship Marketing of Services Growing Interest, Emerging Perspectives. Journal of the
Academy of Marketing Science, 23(4), 236-245.
Berry, L.L. (1983). Relationship Marketing. In L.L. Berry, G.L. Shostack, and G.D. Upah (eds.), Emerging Perspectives
of Services Marketing, American Marketing Association, Chicago, IL.
Bloemer, J. and de Ruyter, K. (1998). On the Relationship Between Store Image, Store Satisfaction and Store Loyalty.
European Journal of Marketing, 32(5/6), 499-513.
Court, D., French, T.D., McGuire, T. I., and Partington, M. (1999). Marketing in 3-D. The Mckinsey Quarterly, 4, 6-17.
Crosby, L.A., Evans, K.R., and Cowles, D. (1990). Relationship Quality in Services Selling: An Interpersonal Influence
Perspective. Journal of Marketing, 54, 68-81
Czepiel, J.A. (1990). Service Encounters and Service Relationships: Implications for Research. Journal of Business
Research, 20(1), 13-21.
Dorsch, M. J., Swanson S. R., and Kelley S. W. (1998). The Role of Relationship Quality in the Stratification of Vendors
as Perceived by Customers. Journal of the Academy of Marketing Science, 26(2), 128-142.
Eighmey, J. (1997). Profiling User Responses to Commercial Web Sites. Journal of Advertising Research, 37(3), 59-66.
Ferguson, A. & Perse, M. (2000). The world wide web as a functional alternative to television. Journal of Broadcasting
& Electronic Media, 44(2), 155-174.
Fletcher, K., Wheeler, C., and Wright, J (1991). Database Marketing: A Channel, A Medium, or A Strategic Approach.
International Journal of Advertising, 10, 117-127.
Fornell, C. (1992). A national customer satisfaction barometer: The Swedish experience. Journal of Marketing, 56, 6-21.
Fornell, C. and Larcker, D.F. (1981). Evaluating Structural Equation Models with Unobservalbe Variables and
Measurement Error. Journal of Marketing Research, 18(1), 39-50.
Garbarino, E. and Johnson, M.S. (1999). The Different Roles of Satisfaction, Trust, and Commitment in Customer
Relationships. Journal of Marketing, 63(2), 70-87.
Godin, S. (1999). Permission Marketing: Turning Strangers in Friends and Friends into Customers. New York: Simon
and Schuster.
Goodwin, C. (1997). Communality as a dimension of service relationships. Journal of Consumer Psychology, 5, 387-415.
Goodwin, C. and Gremler, D.D. (1996). Friendship over the counter: how social aspects of service encounters influence
consumer service loyalty. In T.A. Swartz, D.E. Bowen, & S.W. Brown (Eds.), Advances in Services Marketing and
Management, JAI Press, Greenwich, CT, 5, 247-282.
Gwinner, K., Gremier, D.D., and Bitner, M.J. (1998). Relational Benefits in Services Industries: The Customer's
Perspective. Journal of the Academy of Marketing Science, 26(2), 101-114.
Hair, J.F., Anderson, R.E., Tatham, R.L., and Black, W.C. (1998). Multivariate Data Analysis With Readings(5th ed.).
New York: Macmillan.
Han, J. and Han, D. (2001). A Framework for Analyzing Customer Value of Internet Business. The Journal of
Information Technology Theory and Application, 3(5), 25-38.
Hawkins, T. (1994). Electronic advertising on online information systems. Online Wilton, 18(2), pp. 26-39.
49
ISBN: 978-972-8939-51-9 © 2011 IADIS
Hennig-Thurau, T., Gwinner, K.P., and Gremler, D.D. (2002). Understanding Relationship Marketing Outcomes: An
Integration of Relational Benefits and Relationship Quality. Journal of Service Research, 4(3), 230-247.
IMT
Strategies
(1999).
Permission
e-mail:
The
Future
of
Direct
Marketing.
from:
http://www.wiley.com/legacy/compbooks/permissionemail/imt.pdf
Jupiter Communications. (2001). from http://www.jmm.com
Korgaonkar, K. & Wolin, D. (1999). A multivariate analysis of web usage. Journal of Advertising Research, 39(2), 5368.
Kotler, P. and Armstrong, G. (2001). Principles of Marketing(9th ed.). New Jersey: Prentice Hall.
Luarn, P. and Lin, H. H. (2003). A customer loyalty model for e-service context. Journal of Electronic Commerce
Research, 4(4), 156-167.
Marinova, A., Murrhy, J., and Massey, B.L. (2002). Permission E-mail Marketing: as a Means of Targeted Promotion.
Cornell Hotel and Restaurant Administration Quarterly, 43(1), 61-69.
Morgan, R. and Hunt, S.D. (1994). The Commitment-Trust Theory of Relationship Marketing. Journal of Marketing,
58(3), 20-38.
Negash, S., Ryan, T., & Igbaria, M. (2003). Quality and effectiveness in web-based customer support systems.
Information and Management, 40(8), 757-768.
Oliver, R.L. (1980). A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions. Journal of
Marketing Research, 17(4), 460-469.
O'Malley, L. (1998). Can Loyalty Schemes Really Build Loyalty?. Marketing Intelligence and Planning, 16(1), 47-55.
Palmer, A. and Bejou, D. (2006). The future of relationship marketing, Journal of Relationship Marketing, 4 (3/4), 1-10.
Papacharissi, Z. and Rubin, A. M. (2000). Predictors of Internet Use. Journal of Broadcasting & Electronic Media, 44,
175-196.
Petrison, L. A., Blattberg, R. C., and Wang, P. (1993). Database Marketing: Past, Present and Future, Journal of Direct
Marketing, 7(3), 27-43.
Price, L.L. & Arnould, E.J. (1999). Commercial friendships: Service provider-client relationships in context. Journal of
Marketing, 63(4), 38-56.
Rai, A., Lang, S., and Welker, R. (2002). Assessing the Validity of is Success Models: an Empirical Test and Theoretical
Analysis. Information Systems Research, 13(1), 50-69.
Ranft, A.L. & O’Neill, H.M. (2001). Board composition and high-flying founders: Hints of trouble to come. The
Academy of Management Executive, 15(1), 126-138.
Reichheld, F.F., Markey, R.G., and Hopton, C. Jr (2000). E-Customer Loyalty- Applying the Traditional Rules of
Business for Online Success. European Business Journal, 12(4), 173-179.
Reynolds, K.E. and Beatty, S.E. (1999a). Customer Benefits and Company Consequences of Customer-Salesperson
Relationships in Retailing. Journal of Retailing, 75(1), 11-32.
Roberts, K., Varki S., & Brodie, R. (2003). Measuring the quality of relationship in consumer services: An empirical
study. European Journal of Marketing, 37(1/2), 169-196.
Rozanski, H. Bollman, G., and Lipman, M. (2001). Seize the Occasion, E-insights, The Digital Customer Project,
WCBM, 44, 1-13.
Selnes F. (1993). An Examination of the Product Performance on Brand Reputation Satisfaction and Loyalty. European
Journal of Marketing, 27(9), 19-35.
Sheth, J.N., Newman, B.I., and Gross, B.L. (1991). Consumption Values and Market Choices: Theory and Applications.
Cincinnati, OH: Southwestern Publishing.
Storbacka, K., Strandvik, T., and Gronroos, C. (1994). Managing Customer Relationship for Profit: The Dynamics of
Relationship Quality. International Journal of Service Industry Management, 5(5), 21-38.
Sweeney, J.C. and Soutar G.N. (2001). Consumer Perceived Value: The Development of a Multiple Item Scale. Journal
of Retailing, 77(2), 203-220.
Tezinde, T., Smith, B. and Murphy, J. (2002). Getting permission: Exploring Factors Affecting Permission Marketing.
Journal of Interactive Marketing, 16(4), pp. 28.
Uncles M. (1994). Do You or Your Customers Need a Loyalty Scheme?. Journal of Targeting Measurement and
Analysis for Marketing, 2(4), 335-349.
Wathieu, L. (2000). Case Study: Yesmail.com. Journal of Interactive Marketing, 14(3), 79-92.
Westbrook, A. (1987). Product/Consumption-Based Affective Responses and Post Purchase Process. Journal of
Marketing Research, 24(3), 258-270.
Zeithaml, V.A., Berry, L.L., and Parasuraman, A. (1996). The Behavioral Consequences of Service Quality. Journal of
Marketing, 60(2), 31-46.
50
IADIS International Conference e-Commerce 2011
DETECTING EMERGING TOPICS AND TRENDS VIA
SOCIAL MEDIA ANALYTICS
Richard Colbaugh1 and Kristin Glass2
1
2
Sandia National Laboratories, Albuquerque, New Mexico 87123 USA
New Mexico Institute of Mining and Technology, Socorro, New Mexico 87801 USA
ABSTRACT
Detecting and characterizing emerging topics of discussion and consumer trends through analysis of Internet data is of
great interest to businesses. This paper considers the problem of monitoring the Web to spot emerging memes – distinctive phrases which act as “tracers” for topics – as a means of early detection of new topics and trends. We present a novel
methodology for predicting which memes will propagate widely, appearing in hundreds or thousands of blog posts, and
which will not, thereby enabling discovery of significant topics. We begin by identifying measurables which should be
predictive of meme success. Interestingly, these metrics are not those traditionally used for such prediction but instead are
subtle measures of meme dynamics. These metrics form the basis for learning a classifier which predicts, for a given
meme, whether or not it will diffuse widely. The efficacy of the proposed methodology is demonstrated through analysis
of a sample of 200 memes which emerged online during the second half of 2008.
KEYWORDS
Emerging topic detection, social media, business informatics, predictive analysis.
1. INTRODUCTION
The enormous popularity of “social media”, such as blogs, forums, and social networking sites, represents a
significant challenge to standard business models and practices, as these media move the control of information from companies to consumers (e.g., (Glance et al., 2005), (Ziegler and Skubacz, 2006), (Melville et al.,
2009)). However, social media also offer an unprecedented opportunity to increase business responsiveness
and agility. For example, recent surveys reveal that 32% of the nearly 250 million bloggers worldwide regularly give opinions on products and brands, 71% of active Internet users read blogs, and 70% of consumers
trust opinions posted online by other consumers (Universal McCann, 2010), (Nielson, 2010). Thus social
media are a vast source of business-relevant opinions, and possess a reach that rivals any traditional media
and an influence which substantially exceeds standard advertising channels.
Businesses are therefore strongly motivated to pay attention to social media and other online sources. For
instance, it is important for companies to be able to rapidly detect emerging topics of discussion and consumer trends. Customer complaints and other negative information are much easier to address if discovered
quickly, while early positive “buzz” can be leveraged and amplified. This paper considers the problem of
automated detection and characterization of emerging topics and trends in social media. Recently (Leskovec
et al., 2009) proposed that monitoring social media to spot emerging memes – distinctive phrases which act
as “tracers” for discrete cultural units – can enable early discovery of new topics and trends. These researchers present an elegant solution to the meme detection problem and show that their algorithm is efficient
enough to allow Web-scale analysis. However, a challenge with this method is the fact that the vast majority
of online memes attract little attention before fading into obscurity. In contrast, in most business applications
we are interested in those memes, and the underlying topics, that reach a nontrivial fraction of the population.
This consideration motivates our interest in predictive analysis of meme dynamics: we wish to identify
those memes which will go on to attract substantial attention, and to do so early in the meme lifecycle. This
capability is essential for practical emerging topic discovery, as it would enable early detection of the emergence of significant topics and trends. Standard approaches to predictive analysis of social diffusion phenomena like meme propagation assume, either explicitly or implicitly, that diffusion events which “go viral”
51
ISBN: 978-972-8939-51-9 © 2011 IADIS
possess more appealing “intrinsics” than those which don’t, and focus attention identifying these intrinsics
(Salganik et al., 2006). Recent research calls into question this intuitively plausible premise, indicating that
intrinsic attributes typically don’t possess much predictive power (Salganik et al., 2006), (Colbaugh and
Glass, 2009), (Colbaugh et al., 2010).
This paper proposes that generating useful predictions about social diffusion requires careful consideration of the way individuals influence one another through their social networks. We present a new predictive
methodology which exploits information about network topology and dynamics to accurately forecast which
memes will propagate widely, appearing in hundreds or thousands of blog posts, and which will not. The
particular network features used by the prediction algorithm are those identified as likely to be predictive of
meme success by our recently proposed predictability assessment method (Colbaugh and Glass, 2009). Interestingly, the metrics nominated by this theoretical analysis turn out to be fairly subtle measures of the network dynamics associated with early meme diffusion. Meme prediction is accomplished by a machine learning algorithm that, based upon very early network dynamics, is able to accurately distinguish memes which
will ultimately diffuse widely from those that will not. The efficacy of the proposed algorithm is demonstrated through an empirical study of “successful” and “unsuccessful” memes associated with topics of discussion
that emerged in social media during the second half of 2008. Perhaps surprisingly, we find that although
memes typically propagate for weeks, useful predictions can be made within the first twelve hours after a
meme is detected.
2. PROBLEM FORMULATION
The goal of this paper is to develop a methodology for early and accurate identification of “memes” that will
propagate widely, thereby enabling the discovery of emerging topics and trends which are likely to attract
significant attention. This objective leads naturally to two predictive analysis tasks: 1.) identify measurables
which are predictive of meme success (e.g., post sentiment, early meme dynamics), and 2.) use these predictive measurables as the basis for classifying memes into two groups – those which will acquire many posts
and those that won’t – very early in the meme lifecycle. To support an empirical evaluation of our proposed
solutions to the above problems, we downloaded from (Memetracker, 2010) the time series data for slightly
more than 70 000 memes. These data contain, for each meme M, a sequence of pairs (t1, URL1)M, (t2,
URL2)M, …, (tT, URLT)M, where tk is the time of appearance of the kth blog post or news article that contains
at least one mention of meme M, URLk is the URL of the blog or news site on which that post/article was
published, and T is the total number of posts that mention meme M. From this set of time series we randomly
selected 100 “successful” meme trajectories, defined as those corresponding to memes which attracted at
least 1000 posts during their lifetimes, and 100 “unsuccessful” meme trajectories, defined as those whose
memes acquired no more than 100 total posts. Note that, in assembling the data in (Memetracker, 2010), all
memes which received fewer than 15 total posts were deleted, and that ~50% of the remaining memes have
<50 posts; thus the large majority of memes are unsuccessful by our definition (as well as according to the
criteria of most business applications).
Two other forms of data were collected for this study: 1.) a large Web graph which includes the websites
that appear in the meme time series, and 2.) samples of the text surrounding the memes in the posts which
contain them. The Web graph, denoted Gweb, was obtained via Web crawling and consists of approximately
550 000 vertices/websites and 1.4 million edges/hyperlinks. Samples of text surrounding memes in posts
were assembled by selecting ten posts at random for each meme and then extracting from each post the paragraph which contains the first mention of the meme.
Meme dynamics possess several characteristics which are likely to make predictive analysis challenging.
For example, the distribution for meme success is strongly right-skewed, with most memes receiving relatively little attention and a few attracting considerable interest (Colbaugh and Glass, 2010); it is known that
predicting the evolution of such phenomena using standard methods is quite difficult (Salganik et al., 2006),
(Colbaugh and Glass, 2009), (Colbaugh et al., 2010). Memes also exhibit highly variable times to acquire
their first few posts and to accumulate their final tally of posts. Figure 1 reports the mean and median times
required for successful and unsuccessful memes to attract five, ten, and their total number of posts and illustrates the evolution of several successful memes. It is interesting to note that the median times for unsuccessful memes to attract early posts is actually shorter than the corresponding times for successful memes.
52
IADIS International Conference e-Commerce 2011
Early Meme Dynamics
Successful Memes (>
>1000 posts)
#posts
5
10
total
mean (hr)
108
171
~4400
median (hr)
18.5
41.5
~4400
Unsuccessful Memes (<
<100 posts)
#posts
5
10
total
mean (hr)
375
765
~1010
median (hr)
10.1
30.5
~410
Figure 1. Meme dynamics. In the “stacked” plot at left, thread thickness corresponds to number of posts/articles mentioning the specified meme during that time period (horizontal axis) (Leskovec et al., 2009). The table at right reports the
mean and median time (in hours) required for successful and unsuccessful memes to acquire five posts, ten posts, and
their total number of posts.
3. PREDICTIVE ANALYSIS
In this section we begin by summarizing the application of the predictability assessment process proposed in
(Colbaugh and Glass, 2009), (Colbaugh et al., 2010) to a simple model of meme diffusion. This procedure
reveals two features of meme network dynamics which should be useful for distinguishing successful and
unsuccessful memes early in their lifecycle. We then develop a machine learning-based classification algorithm which employs our new network dynamics metrics to accurately predict, very early in a meme’s lifecycle, whether that meme will propagate widely or not. The performance of the prediction algorithm is illustrated through an empirical study involving successful and unsuccessful memes associated with topics of
discussion that emerged in social media during the second half of 2008.
3.1 Predictability Assessment
Here we summarize the results of applying the predictability assessment procedure derived in (Colbaugh and
Glass, 2009), (Colbaugh et al., 2010) to the task of identifying measurables which should be predictive of
meme success. The discussion begins with brief, intuitive reviews of our predictability assessment process
and social diffusion modeling framework, and then describes the main results obtained through this theoretical analysis.
Predictability. Consider a simple model of information diffusion, in which individuals combine their
own beliefs and opinions regarding a new piece of information with their observations of the actions of others to arrive at their decisions about whether to pass along the information. In such situations it can be quite
difficult to determine which characteristics of the diffusion process, if any, are predictive of things like the
speed or ultimate reach of the diffusion (Salganik et al., 2006), (Colbaugh. and Glass, 2009), (Colbaugh et
al., 2010). In (Colbaugh and Glass, 2009), (Colbaugh et al., 2010), we propose a mathematically rigorous
approach to predictability assessment which, among other things, permits identification of features of social
dynamics which should have predictive power; we now summarize this assessment methodology.
The basic idea behind the proposed approach to predictability analysis is simple and natural: we assess
predictability by answering questions about the reachability of diffusion events. To obtain a mathematical
formulation of this strategy, the behavior about which predictions are to be made is used to define the system
state space subsets of interest (SSI), while the particular set of candidate measurables under consideration
53
ISBN: 978-972-8939-51-9 © 2011 IADIS
allows identification of the candidate starting set (CSS), that is, the set of states and system parameter values
which represent initializations that are consistent with, and equivalent under, the presumed observational
capability. As a simple example, consider an online market with two products, A and B, and suppose the system state variables consist of the current market share for A, ms(A), and the rate of change of this market
share, r(A) (ms(B) and r(B) are not independent state variables because ms(A) + ms(B) = 1 and r(A) + r(B) =
0); let the parameters be the advertising budgets for the products, bud(A) and bud(B). The producer of item A
might find it useful to define the SSI to reflect market share dominance by A, that is, the subset of the twodimensional state space where ms(A) exceeds a specified threshold (and r(A) can take any value). If only
market share and advertising budgets can be measured then the CSS is the one-dimensional subset of stateparameter space consisting of the initial magnitudes for ms(A), bud(A), and bud(B), with r(A) unspecified.
Roughly speaking, the approach to predictability assessment proposed in (Colbaugh and Glass, 2009),
(Colbaugh et al., 2010) involves determining how probable it is to reach the SSI from a CSS and deciding if
these reachability properties are compatible with the prediction goals. If a system’s reachability characteristics are incompatible with the given prediction question – if, say, “hit” and “flop” states in the online market
example are both fairly likely to be reached from the CSS – then the situation is deemed unpredictable. This
setup permits the identification of candidate predictive measurables: these are the measurable states and/or
parameters for which predictability is most sensitive (Colbaugh and Glass, 2009). Continuing with the online
market example, if trajectories with positive early market share rates r(A) are much more likely to yield market share dominance for A than are trajectories with negative early r(A), then the situation is unpredictable
(because the outcome depends stronly on r(A) and this quantity is not measured). Moreover, this analysis
suggests that market share rate is likely to possess predictive power, so it may be possible to increase predictability by adding the capacity to measure this quantity.
Model. In social diffusion, people are affected by what others do. This is easy to visualize in the case of
disease transmission, with infections being passed from person to person. Information, such as that in the
topics of discussion underlying memes, can also propagate through a population, as individuals become
aware of information and persuaded of its relevance through their social and information networks. The dynamics of information diffusion can therefore depend upon the topological features of the pertinent networks.
This dependence suggests that, in order to identify features of social diffusion which possess predictive power, it is necessary to assess predictability using social and information network models with realistic topologies.
Specifically, the social diffusion models examined in this study possess networks with four topological
properties that are ubiquitous in real-world social and information networks and which have the potential to
impact diffusion dynamics:
• right-skewed degree distribution – the property that most vertices have only a few network neighbors
while a few vertices have many neighbors;
• transitivity – the property that the network neighbors of a given vertex have a heightened probability of
being connected to one another;
• community structure – the presence of densely connected groupings of vertices which have only relatively few links to other groups;
• core-periphery structure – the presence of a small group of “core” vertices which are densely connected
to each other and are also close to the other vertices in the network.
It is shown in (Colbaugh and Glass, 2009) that stochastic hybrid dynamical systems (S-HDS) provide a
powerful mathematical formalism with which to represent social diffusion on realistic networks. An S-HDS
is a feedback interconnection of a discrete-state stochastic process, such as a Markov chain, with a family of
continuous-state stochastic dynamical systems (Colbaugh and Glass, 2009). Combining discrete and continuous dynamics within a unified, computationally tractable framework offers an expressive, scalable modeling environment that is amenable to formal mathematical analysis. In particular, S-HDS models can be used
to efficiently represent social diffusion on large-scale networks with the four topological properties listed
above (Colbaugh and Glass, 2010).
As an intuitive illustration of the way S-HDS enable effective, tractable modeling of complex network
phenomena, consider the task of modeling diffusion on a network that possesses community structure. As
shown in Figure 2, this diffusion consists of two components: 1.) intra-community dynamics, involving frequent interactions between individuals within the same community and the resulting gradual change in the
concentrations of “infected” (red) individuals, and 2.) inter-community dynamics, in which the “infection”
54
IADIS International Conference e-Commerce 2011
jumps from one community to another, for instance because an infected individual “visits” a new community.
S-HDS models offer a natural framework for representing these dynamics, with the S-HDS continuous system modeling the intra-community dynamics (e.g., via stochastic differential equations), the discrete system
capturing the inter-community dynamics (e.g., using a Markov chain), and the interplay between these dynamics being represented by the S-HDS feedback structure.
inter-community
dynamics
i
j
inputs
discrete
system
mode
outputs
continuous
system
inputs
k
intra-community
dynamics
Figure 2. Modeling diffusion on networks with community structure via S-HDS. The cartoon at top left depicts a network
with three communities. The cartoon at right illustrates diffusion within a community k and between communities i and j.
The schematic at bottom left shows the basic S-HDS feedback structure; the discrete and continuous systems in this
framework model the inter-community and intra-community diffusion dynamics, respectively.
Results. We have applied the predictability assessment methodology summarized above to a class of empirically-grounded S-HDS models for social diffusion, thereby obtaining a fairly comprehensive theoretical
characterization of the predictability of meme propagation on networks with realistic topologies. The main
findings, of the study, from the perspective of this paper, is a demonstration that predictability of these diffusion models depends crucially upon social and information network topology, and in particular on a network’s community and core-periphery structures. We now summarize the main conclusions of this study; a
more complete discussion of the results is given in (Colbaugh and Glass, 2010).
Community structure is widely recognized to be important in real-world networks, and there exists a
range of qualitative and quantitative definitions for this concept. Here we adopt the modularity-based definition proposed in (Newman, 2006), whereby a good partitioning of a network’s vertices into communities is
one for which the number of edges between putative communities is smaller than would be expected in a
random partitioning. To be concrete, a modularity-based partitioning of a network into two communities
maximizes the modularity Q, defined as Q = sT B s / 4m, where m is the total number of edges in the network,
the partition is specified with the elements of vector s by setting si = 1 if vertex i belongs to community 1 and
si = −1 if it belongs to community 2, and the matrix B has elements Bij = Aij − kikj / 2m, with Aij and ki denoting the network adjacency matrix and degree of vertex i, respectively. Partitions of the network into more
than two communities can be constructed recursively (Newman, 2006). With this definition in hand, we are
in a position to present the first candidate predictive feature nominated by the theoretical predictability assessment: early dispersion of a diffusion process across network communities should be a reliable predictor
that the ultimate reach of the diffusion will be significant (see Figure 3 for an illustration of the basic idea).
Analogously to the situation with network communities, there exist several descriptions of core-periphery
structure in networks. Here we adopt the characterization of network core-periphery which results from kshell decomposition, a well-established technique in graph theory which is summarized, for instance, in
(Carmi et al., 2007). To partition a network into its k-shells, one first removes all vertices with degree one,
repeating this step if necessary until all remaining vertices have degree two or higher; the removed vertices
constitute the 1-shell. Continuing in the same way, all vertices with degree two (or less) are recursively re-
55
ISBN: 978-972-8939-51-9 © 2011 IADIS
moved, creating the 2-shell. This process is repeated until all vertices have been assigned to a k-shell, and the
shell with the highest index, the kmax-shell, is deemed to be the core of the network. Given this definition, we
are in a position to report the second candidate predictive feature nominated by the theoretical predictability
assessment: early diffusion activity within the network kmax-shell should be a reliable predictor that the ultimate reach of the diffusion will be significant. An intuitive illustration of this result is depicted in Figure 4.
Figure 4. Early diffusion within the core is predictive.
The cartoon illustrates the predictive feature associated with k-shell structure: social diffusion initiated
with three “seed” individuals is much more likely to
propagate widely if these seeds reside within the network’s core (left) rather than at its periphery (right).
Note that in (Colbaugh and Glass, 2010) this result is
established for networks of realistic scale and not
simply for “toy” networks.
Figure 3. Early dispersion across communities is predictive. The cartoon illustrates the predictive feature
associated with community structure: social diffusion
initiated with five “seed” individuals is much more
likely to propagate widely if these seeds are dispersed
across three communities (right) rather than concentrated within a single community (left). Note that in
(Colbaugh and Glass, 2010) this result is established for
networks of realistic scale and not simply for “toy”
networks.
3.2 Prediction
We now turn to the task of developing a machine learning-based classifier which is capable of accurately
predicting, very early in the lifecycle of a meme of interest, whether that meme will propagate widely. Two
types of classification algorithm were tested, one simple (standard naïve Bayes (Hastie et al., 2009)) and one
sophisticated (the Avatar ensembles of decision trees algorithm (Avatar, 2010)), to allow the robustness of
the proposed approach to meme prediction to be evaluated. While the two classifiers produce qualitatively
similar results, the Avatar algorithm, denoted A-EDT, is substantially more accurate; thus in what follows
only the results obtained with A-EDT are reported.
Recall that the task of interest is to learn a classifier which takes as input some combination of relevant
post content and meme dynamics and accurately predicts whether a given meme will ultimately be successful
(acquire ≥1000 posts during its lifetime) or unsuccessful (attract ≤100 total posts). We employ standard tenfold cross-validation to estimate the accuracy of our classifier. More specifically, the set of 200 memes (100
successful and 100 unsuccessful) is randomly partitioned into ten subsets of equal size, and the A-EDT algorithm is successively “trained” on nine of the subsets and “tested” on the held-out subset in such a way that
each of the ten subsets is used as the test set exactly once.
A crucial aspect of the analysis is determining which characteristics of memes and their dynamics, if any,
possess exploitable predictive power. We consider three classes of features:
• language-based measures, such as the sentiment and emotion expressed in the text surrounding memes
in posts;
• simple dynamics-based metrics, capturing the early volume of posts mentioning the meme of interest
and the rate at which this volume is increasing;
• network dynamics-based features, such as those identified through the predictability analysis summarized in Section 3.1.
We now describe each of these feature classes. Consider first the language-based measures. Each “document” of text surrounding a meme in its (sample) posts is represented by a simple “bag of words” feature
vector x∈ℜ|V|, where the entries of x are the frequencies with which the words in the vocabulary set V appear
in the document. The sentiment and emotion of a document may be quantified very simply through the use of
appropriate lexicons. Let s∈ℜ|V| denote a lexicon vector, in which each entry of s is a numerical “score”
56
IADIS International Conference e-Commerce 2011
quantifying the sentiment or emotion intensity of the corresponding word in the vocabulary V. The sentiment
or emotion score of document x can then be computed as score(x) = sTx / sT1, where 1 is a vector of ones.
Note that this simple formula estimates the sentiment or emotion of a document x as a weighted average of
the sentiment or emotion scores for the words comprising the document. (If no sentiment or emotion information is available for a particular word in V then the corresponding entry of s is set to zero.)
To characterize the emotion content of a document we use the Affective Norms for English Words
(ANEW) lexicon (Bradley and Lang, 1999); this lexicon consists of 1034 words to which human subjects
assigned numerical scores with respect to three emotion “axes” – happiness, arousal, and dominance. Previous work has shown this set of words bears meaningful emotional content (Bradley and Lang, 1999). Positive or negative sentiment is quantified by employing the “IBM lexicon”, a collection of 2968 words that
were assigned {positive, negative} sentiment labels by human subjects (Ramakrishnan et al., 2003). This
simple approach generates four language features for each meme: the happiness, arousal, dominance, and
positive or negative sentiment of the text surrounding that meme in the (sample) posts containing it. As a
preliminary test, we computed the mean emotion and sentiment of content surrounding the 100 successful
and 100 unsuccessful memes in our dataset. On average the text surrounding successful memes is happier,
more active, more dominant, and more positive than that surrounding unsuccessful memes, and this difference is statistically significant (p<0.0001). Thus it is at least plausible that these four language features may
possess some predictive power regarding meme success.
Consider next two simple dynamics-based features, defined to capture the basic characteristics of the early evolution of meme post volume:
• #posts(τ) – the cumulative number of posts mentioning the given meme by time τ (where τ is small
relative to the typical lifespan of memes);
• post rate(τ) – a simple estimate of the rate of accumulation of such posts at time τ.
Here we estimate post rate via the finite difference formula post rate(τ) = (#posts(τ) − #posts(τ/2)) / (τ/2);
of course, more robust rate estimates could be used.
The simple dynamics-based measures of early meme diffusion defined above, while potentially useful, do
not characterize the manner in which a meme propagates over the underlying social or information networks.
Recall that the predictability assessment summarized in Section 3.1 suggests that both early dispersion of
diffusion activity across network communities and early diffusion activity within the network core ought to
be predictive of meme success. This insight motivates the definition of two network dynamics-based features
for meme prediction:
• community dispersion(τ) – the cumulative number of network communities in Web graph Gweb that, by
time τ, contain at least one post which mentions the meme;
• #k-core blogs(τ) – the cumulative number of blogs in the kmax-shell of Web graph Gweb that, by time τ,
contain at least one post which mentions the meme.
These quantities can be efficiently computed using fast algorithms for partitioning a graph into its communities and for identifying a graph’s kmax-shell (Colbaugh and Glass, 2010), so the features are readily
computable for large graphs.
We now summarize the main results of the prediction study (see (Colbaugh and Glass, 2010) for a more
complete description of the results). First, using the four language features with the A-EDT algorithm to predict which memes will be successful yields a prediction accuracy of 66.5% (ten-fold cross-validation). Since
simply guessing “successful” for all memes gives an accuracy of 50%, it can be seen that these simple language “intrinsics” are not very predictive. For completeness it is mentioned that the ANEW score for “arousal” and the IBM measure of sentiment are the most predictive of the language features.
In contrast, the features characterizing the early network dynamics of memes possess significant predictive power, and in fact are useful even if only very limited early time series is available for use in prediction.
More quantitatively, applying the A-EDT algorithm together with the five meme dynamics features produces
the following results (ten-fold cross-validation):
• τ = 12hr, accuracy = 84.0%, most predictive features: 1.) community dispersion, 2.) #k-core blogs, 3.)
#posts.
• τ = 24hr, accuracy = 91.5%, most predictive features: 1.) community dispersion, 2.) post rate, 3.)
#posts.
• τ = 48hr, accuracy = 92.8%, most predictive features: 1.) community dispersion, 2.) post rate, 3.)
#posts.
57
ISBN: 978-972-8939-51-9 © 2011 IADIS
ACKNOWLEDGEMENT
This work was supported by the U.S. Department of Defense and the Laboratory Directed Research and Development Program at Sandia National Laboratories.
REFERENCES
Avatar, 2010. http://www.sandia.gov/avatar/, accessed July 2010.
Bradley, M. and Lang, P., 1999. Affective Norms for English Words (ANEW): Stimuli, Instruction Manual, and Affective Ratings. Technical Report C1, University of Florida.
Carmi, S. et al., 2007. A Model of Internet Topology Using the K-Shell Decomposition. Proc. National Academy of
Sciences USA, Vol. 104, pp. 11150-11154.
Colbaugh, R. and Glass, K., 2010. Prediction of Social Dynamics via Web Analytics. Sandia National Laboratories
SAND Report.
Colbaugh, R. and Glass, K., 2009. Predictive Analysis for Social Processes I: Multi-scale Hybrid System Modeling, and
II: Predictability and Warning Analysis. Proc. 2009 IEEE Multi-Conference on Systems and Control, Saint Petersburg, RU.
Colbaugh, R. et al., 2010. Predictability of ‘Unpredictable’ Cultural Markets. Proc. 105th Annual Meeting of the American Sociological Association, Atlanta, GA, USA.
Glance, N. et al., 2005. Deriving Marketing Intelligence from Online Discussion. Proc. 11th ACM Int. Conf. on Knowledge Discovery and Data Mining, Chicago, IL, USA.
Hastie, T. et al., 2009. The Elements of Statistical Learning. Second Edition. Springer, New York, USA.
Leskovec, J. et al., 2009. Meme-tracking and the Dynamics of the News Cycle. Proc. 15th ACM Int. Conf. on Knowledge
Discovery and Data Mining, Paris, FR.
Melville, P. et al., 2009. Social Media Analytics: Channeling the Power of the Blogosphere for Marketing Insight. Proc.
Workshop on Information in Networks, New York, NY, USA.
Memetracker, 2010. http://memetracker.org, accessed January 2010.
Newman, M., 2006. Modularity and Community Structure in Networks. Proc. National Academy of Sciences USA, Vol.
103, pp. 8577-8582.
Nielson, 2010. http://www.nielson.com, accessed July 2010.
Ramakrishnan, G. et al., 2003. Question Answering via Bayesian Inference on Lexical Relations. Proc. Annual Meeting
of the Association for Computational Linguistics, Sapporo, JP.
Salganik, M. et al., 2006. Experimental Study of Inequality and Unpredictability in an Artificial Cultural Market. Science,
Vol. 311, pp. 854-856.
Universal McCann, 2010. http://www.universalmccann.com, accessed July 2010.
Ziegler, C. and Skubacz, M., 2006. Towards Automated Reputation and Brand Monitoring on the Web. Proc. IEEE/
ACM Int. Conf. on Web Intelligence, Hong Kong.
58
IADIS International Conference e-Commerce 2011
E-LEARNING SEEN AS AN ENTERPRISE BUSINESS
PROCESS
Fodé Touré and Esma Aïmeur
Department of Computer Science and Operations Research,
Université de Montréal, Montreal, Canada
ABSTRACT
The investment in the human capital, by means of training delivered in enterprise, became an important constituent of
enterprise competitiveness strategy. Consequently business managers require the proofs of training investment yield, in
terms of tangible and intangible profits, from their human resources managers, training departments, or even from
training consultants.
To evaluate enterprise training, two models predominate, namely the model of Kirkpatrick and that of Phillips.
In this paper, we propose an approach of training project evaluation, based on business process management. It is an
approach which fills the gaps raised in the literature and ensures an alignment between training activities and business
needs.
KEYWORDS
Business Process Management, Business Intelligence, e-Learning, Evaluation, Optimization, Business Activity
Monitoring.
1. INTRODUCTION AND PROBLEMATIC
Individual and collective skills are the most important assets of organizations, and determine their
productivity, competitiveness and ability to adapt and to be proactive when uncertain. Training is a key
strategy for generating these skills for employees (Pineda, 2010). Consequently business managers require
from their human resources managers, training departments, or even of consultants working in the field of
training, the proofs of training investment yield in terms of tangible and intangible profits.
In a report entitled “Return to Enterprises on Training Investment”, the Australian government concludes
that, “unless the Return On Investment (ROI) in training is quantified, the transition towards a company with
high yield is not assured”. Besides, a national report published in 2006 underlines the necessity of
demonstrating, to the business community, the critical importance of the training in the improvement of the
yield and net enterprise profits : “if we want that Irish enterprises makes a great use of training, it is essential
to prove its contribution to the objectives of the company” (Bailey, 2007).
Measuring the value of learning is an ongoing challenge. Many organizations assess whether learners
liked a course or acquired new knowledge, but few have cracked the code on how to determine learning ROI.
The most commonly used metrics for evaluating training programs are those derived from the work of
Donald L. Kirkpatrick in the book "Evaluating Training Programs: The Four Levels (Kirkpatrick, 1994)." Dr.
Jack J. Phillips suggests another type of evaluation in his book "Return on Investment in Training and
Performance Improvement Programs (Phillips, 1997)." Phillips believes that learning professionals should
calculate costs for specific training interventions and then quantify the business benefit to determine the
organization's ROI from training. Table 1 shows the measures of course evaluation reported in the 2008
Benchmarking Study conducted by Corporate University Xchange (Rozwell, 2009).
59
ISBN: 978-972-8939-51-9 © 2011 IADIS
Table 1. Course Evaluation Methods by Level (Source: Corporate University Xchange 8th Annual Benchmarking Study,
2008, in (Rozwell, 2009))
Course Method
Level 1: opinion of on the course and
instructor
Level 2: knowledge acquisition
Level 3: behavior change
Level 4: business impact
Level 5: Return On Investment (ROI )
Percentage of Courses Evaluated Using this Method
75%
47%
20%
12%
6%
There are several models in the literature. Some of these models allow calculating the return on the
invested capital, and could help organizations to make better educated decisions regarding workforce
training. The benchmark model in terms of enterprise training evaluation is that of Kirkpatrick. Kirkpatrick's
model includes four levels or steps of outcome evaluation (reaction, learning, behavior, results). In 1996,
Phillips added a fifth level. This level is solely dedicated to measuring the "Return On Investment (ROI)."
Because of the difficulties bound to the use of these models, human resource departments cannot
estimate, in a concrete way, the impact of the training on the economic and social growth of their enterprise.
Indeed, in France for instance, a synthesis entitled “Les pratiques d'évaluation des formations des entreprises
françaises”, concludes that reactions evaluation (level 1 of Kirkpatrick’s model) remains the most practised,
both by enterprises and by training institutions. Besides, methodological problems are also highlighted by
respondents, in particular for evaluation levels 3, 4 and 5 (the level 5 corresponds to Phillips’ model) and
isolation of training effects in the results. Furthermore, reports drafted by several organizations such as the
Canadian Policy Research Networks (CPRN), the Conference Board of Canada, the Canadian Council on
Learning (CCL) abound in the same sense: Canadian enterprises do not invest enough in training compared
with the other countries with economic high yield. They still hesitate to dedicate the necessary resources to
training, because of the difficulty to evaluate the impact of this investment on organizational outcome.
In this paper, we propose a training project management approach based on business process
management: going from concept to optimization, via the evaluation of the financial and none financial
return.
In the remainder of this paper, we shall present, in section 2, the two basic models for evaluating the
training in enterprise, the advantages and criticism of these models. Section 3 will be dedicated to the
presentation of our model and a final conclusion is presented in section 4.
2. EXISTING MODELS OF ENTERPRISE TRAINING PROGRAM
EVALUATION
The concept of yield covers a rather wide spectrum, going from effect perception to the return on investment
calculation. These two dimensions join the distinction made by Dunberry and Péchard (Dunberry and
Péchard, 2007) between “financial yield” to describe the measure or the calculation of what the training
brings to the organization on financial plan and “training results” to describe the impact or the effects which
are not of financial nature.
Before we present how our approach treats all these factors, it seems important to discuss the basic
models that influence the training evaluation practices in enterprise. We begin with the presentation of the
Kirkpatrick’s four levels. Afterwards, we shall see the version modified by Philips in 1996, adapted to
include a measure of the ROI.
2.1 Kirkpatrick’s four Levels of Evaluation Model
Kirkpatrick’s model began in 1959, with a series of four articles on the evaluation of training programs in the
journal “Training and Development”. These four articles defined the four levels of evaluation that would later
have a significant influence on corporate practices.
The four levels of Kirkpatrick's evaluation model essentially measure:
60
IADIS International Conference e-Commerce 2011
Level 1 – Reaction of students. How did the trainees react after the training? Did they appreciate this
one? Are they satisfied? What they thought and felt about the training.
Level 2 – Learning. What they learnt after the training? What knowledge, skills and/or attitudes
(knowledge, know-how, and social skills) have been acquired? Have educational objectives been achieved?
The resulting increase in knowledge or capability. It is about the educational evaluation.
Level 3 – Behavior. Do the trainees use what they learned in training at their workstations? What are
the new professional behaviors that have been adopted? Extent of behavior and capability improvement and
implementation/application.
Level 4 – Results. What is the impact of the training on the results of the company? Example: decrease
in the rate of absenteeism, occupational accidents, growth of turnover, the productivity, customer satisfaction,
etc. The effects on the business or the environment resulting from the trainee's performance.
The first level evaluates participant’s satisfaction after the training and is based on several aspects of the
training (such as objectives, contents, educational methods, teaching style and material available). This
satisfaction is judged in the form of questionnaires. It is the level most frequently used (see Table 1). The
second level measures “learning” of the participants in term of knowledge, skills and attitudes that were
acquired during the training. This measure is mostly made by means of questionnaires or other systems of
systematized evaluation (examinations, for example). The third tier assesses the “behavioral changes” in the
training and the transfer of learning. It is a question of spotting the knowledge, the skills and the attitudes
acquired during the training which give rise to a re-use in the professional practice. This measure is mostly
carried out by questionnaires or interviews and can be performed several times (at the beginning, at the end
and sometimes after the training). The fourth level is the level of the "results" corresponding to the
calculation of various metrics elaborated in connection with the objectives of the training, during the design
of which, they were defined.
A certain number of authors criticize this model. First of all, it is noted that this model cannot be used to
determine cost/benefit ratio and cannot be used to emit a diagnosis when the training has not produced the
expected results. Kraiger (Kraiger, 2002) identifies five major criticisms against the model of Kirkpatrick:
1) The model has little theoretical basis and ignores all the achievements of cognitive theories of the 70s
and 80s,
2) The constructs used, such as the satisfaction or the learning, are not clearly defined, and more complex
than they appear,
3) A strict application of the approach brings illogical behaviour, like not evaluating the learning before
confirming a positive reaction while the participants might be more available.
4) The approach presumes relations between the results of the training which are not confirmed, as it is
the case between the satisfaction and the learning,
5) The approach ignores the purpose of evaluation, by inciting to estimate four levels, while in some
cases the evaluation of the other criteria would be more relevant in regards to the needs of the enterprise.
Another criticism concerns the simple/complex dilemma. At the level of the Kirkpatrick’ model, it is
translated in the following way: trainers use mainly the results obtained from levels 1 (satisfaction) and 2
(learning) as proof of the training’s success, while the exact measure of training impacts on the
performance, that the administrators would wish to obtain, is much more difficult to calculate (Goldwasser,
2001).
Consequently, although the four-level model of Kirkpatrick is widely recognized and accepted, and
although a significant number of evaluation methods find their base there, many have argued that this method
does not provide the data required by managers today, which Phillips has to overcome.
2.2 The Model of Return on Investment of Phillips
To calculate the training yield, Philips recommends adding a fifth level to the model of Kirkpatrick: the yield
of training in enterprise. He established a methodology to convert the subjective, objective, tangible and less
tangible data into monetary units. To do this, the user has to take the data obtained at the level 4 of the initial
model of Kirkpatrick and convert them in monetary values and subsequently, compare these results with the
cost of the training program. According to this model, the calculation of the yield of the training is made by
means of a process by stages which supplies a plan detailed for the planning, the collection and the data
analysis, which includes the calculation of ROI. The process begins with the evaluation planning: where
61
ISBN: 978-972-8939-51-9 © 2011 IADIS
objectives are developed and decisions taken on the way the data will be collected treated and analyzed. The
data collection is made according to training evaluation levels (level 1: reactions / satisfaction; level 2:
learning; level 3: transfer of the learning and the level 4: the organizational results). Finally, at the level of
the data analysis, we have the crucial stages for the analysis of ROI:
Isolate the effects of the training from the other factors of influence (use of one or several methods to
separate the influence of the training project from the other factors which influence the measure of the
organizational results),
Convert the data concerning the organizational impacts into money value for developing an annual
value of the project,
Profits and costs are combined in the ROI calculation,
The intangible profits are identified by this process (they are included in this category only after
having tried to convert them in money values).
However, in the literature, several criticisms are raised with regard to the model of Phillips. Nagle (2002)
relates a series of criticisms towards ROI: difficulty to have a faithful measure; expensive process; complex
process; process that can take up to one year, presence of the other factors (independent from the training)
that influence the performance of the organization.
Concerning the methodological problems, McCain (McCain, 2005) has established a list of the bias that
are likely to have an impact on the observed results and that may not necessarily come to the attention of the
training professional. We can quote the bias of a sample (selection of a non representative sample or one with
a too small size), bias in the interviews (make sure of the good understanding of the questions for example),
bias of acquiescence or neutrality according to the questions presentation.
In conclusion, this second section shows that several models of training evaluation in enterprise exist in
the literature. Nonetheless, because of the difficulties bound to the use of these models, the department of
human resources does not manage to estimate in a concrete way the impact of the training on the economic
and social growth of the enterprise. Thus, to try to bring a solution to the enterprise needs, we present in the
following section an approach of training yield evaluation, based on the business process management.
3. A MODEL OF EVALUATION OF THE TRAINING BASED ON
BUSINESS PROCESS MANAGEMENT
Business Process Management (BPM) represents a strategy of managing and improving business
performance by continuously optimizing business processes in a closed-loop cycle of modeling, execution,
and measurement (Oracle, 2008). As organizations continue to focus on improving and managing business
processes, the ability to acquire and cultivate the appropriate skilled workforce has remained a challenge.
While Business Process Management was once defined in terms of tools and technologies, it has recently
emerged as a discipline encompassing a broad spectrum of organizational practices. As a result, the skillsets
for BPM endeavors of today's organizations have gone beyond the automation of processes to encompass a
wide variety of strategic and technical skills (Antonucci, 2010).
Upon the success achieved by the BPM solutions in the management of enterprise processes, why not use
this approach to manage, efficiently, the training activities in enterprise? An affirmative answer to this
question suggests that we have to consider these activities as business processes.
Indeed, the design and implementation of a training project suppose getting through various stages: going
from the formulation of a request up to the implementation of new skills. The set of these stages,
chronologically listed, constitutes a process, in the terms of which we can record a capital gain, if everything
correctly took place (Bach, 2007). Training is a strategic tool of development. As such, it is induced by a
project, at the origin of which there were some problems that needed to be addressed:
Social problem: for example, it is necessary to decrease the number of unemployed by proposing in
particular specific trainings to help them find some work,
Enterprise problem: for example, the introduction of new machines requires the implementation of a
training for their use,
Individual problem: for example, people wishing to acquire new knowledge to increase their
professional mobility.
62
IADIS International Conference e-Commerce 2011
For the management of the training projects in enterprise, we propose an approach based on five stages,
as shown in Figure 1.
Figure 1. Steps of management of a training program in enterprise
3.1 Stage 1: Study of Training Project
The training in the enterprise is an integrated training, which covers the personal development of the
employees, the enterprise and its services (Figure 2). It consists of a series of specific actions, intended to
resolve a problem with which the enterprise is confronted. Thus, the first stage of our approach consists in
analyzing the demand for training and associating it with elements of performance of the enterprise. It is
translated by a certain number of actions such as: the conversations of exploration of the demand, the
definition of a plan of change, needs analysis, definitions of the objectives, the definition and the choice of
performance indicators, etc.
Figure 2. The impact of an integrated training project (Bach, 2007)
3.2 Stage 2: Modeling and Validation
A process model is the formal definition of a business process. The objective of a model is to produce highlevel specifications of workflows, independently of workflow management system. Consequently, the
processes must be correctly modeled before they are implemented as workflows. The deployment of invalid
processes can lead applications based on these processes to incoherent states and can even provoke very
critical breakdowns without the slightest possibility of resumption. In other words, if a process is put in
production before being validated, it could fail during the execution and cause considerable loss to the
enterprise. To model a business process we use graphical objects developed by Workflow Management
Coalition (WfMC, 1999). In this language, the processes are modeled by using two object types: node and
flow. The node is classified in two categories: task and condition. A task, graphically represented by a
63
ISBN: 978-972-8939-51-9 © 2011 IADIS
rectangle, represents the work to be made to achieve some objectives. A condition, graphically represented
by a circle, is used to build choice structures. A flow, which is graphically represented by an arrow, links two
nodes in graph. There are several aspects in a process model validation including the structure, the dataflow,
the roles, the application interface, the temporal constraints and others. Process structure is the most
important and primary aspect of a process model. It builds the base to capture other needs aspect of the
process model. Thus, structural validation is all techniques used to identify incorrect objects combinations
and all means allowing to avoid them or possibly to correct them in order to increase the pre-execution
reliability of a process.
A Directed Acyclic Graph (DAG) can contain two types of structural conflict: deadlock and lack of
synchronization (Sadiq and Orlowska, 1999), (Van der Aalst et al., 2002), (Lin et al., 2002), (Sadiq et al.,
2004). In order to verify or to assure the correctness of a process model, several propositions were made of
among which: reduction-based algorithms (Sadiq and Orlowska, 2000) (Lin et al., 2002), graph-traversalbased algorithm (Perumal and Mahanti, 2007), approach of transformation of a non valid model into a
valid one (Liu and Kumar, 2005), hybrid approach based on reduction-based algorithms and graph-traversal
algorithm (Touré et al., 2008), approach of model conversion in Petri net (Van der Aalst et al., 2002).
For the management of a training project, there are at least two models of process: the model of process
bound to the plan of the training and the model of process bound to the stages of evaluation of the training
yield (including the stages of evaluation presented in the section 2).
3.3 Stage 3: Configuration and Execution
This stage is dedicated to the evaluation before and during the execution, the initialization of indicators by
their current values in the enterprise before the execution of the training project.
The choice of indicators depends on the type of training and especially the target objectives of the
enterprise. Table 2 presents examples of indicators.
Table 2. Some possible indicators (Bach, 2007)
Satisfaction
Security
Quantitative
- personnel turnover
- rate of absenteeism
- rate of complaints
- rate of abandonments
- numbers of complaints
- deadline of wait
- volume of dysfunctions
- number of accidents
- number of alerts
Qualitative
- index of satisfaction
- typology of complaints
- rate of recommendations
Financial
- cost replacements and
training
- cost of complaints
- gains produced by
recommendations
- typology of dysfunctions
- types of accidents / alerts
- cost of dysfunctions
- cost of accidents
The execution corresponds to the operational phase where the solution of BPM is implemented. It is in
this stage that the evaluation of levels 1, 2 and sometimes 3 of the model of Kirkpatrick (during execution
some of indicators will already be under observation) is performed.
3.4 Stage 4: Monitoring
Monitoring encompasses tracking of individual processes, such as information on their status can be easily
seen, and statistics on the performance of one or more processes can be provided. The degree of monitoring
depends on what information the enterprise wants to evaluate and analyze, and how the enterprise wants it to
be monitored, whether in real-time, near real-time or ad-hoc. Here, business activity monitoring (BAM)
extends and expands the monitoring tools generally provided by business process management System
(BPMS).
This stage of our approach consists in controlling the progress of the processes. A control based on
precise indicators and relevant in order to have dashboards allowing quick and good decision making.
The dashboard of the training has to cover two big dimensions: the efficiency and the efficacy. The
training process is said to be efficient if it gives the maximum of results by consuming the minimum of
resources and is said to be effective if it gives the expected results.
64
IADIS International Conference e-Commerce 2011
The dashboard of the efficiency of the training will be composed of indicators on consumption of
resources and on activities output allowing the measuring of the efficiency of each of the three stages of the
process, as well as the general efficiency of the training project. Indicators below allow building the
dashboard of the efficiency of a training program: time dedicated to the identification and to the needs
analysis (combined time of the employee, his superior and the training manager), perceived usefulness of the
training / time dedicated, the gap between what the employee masters and what he has to master, the
adequate level of training to reduce or cancel the gap (beginner, intermediate, advanced), mode of training
(external, internal, coaching, e-learning, tutoring, etc.), time to design and the elaboration of the program, etc.
The indicator can be analyzed by sex, seniority, social status, type of training, or operational unity (service,
department, store, etc.). The dashboard of the effectiveness focuses either on the effectiveness of a training,
or on the global effectiveness of the training system. Its structure includes the model of training evaluation
and contains more indicators than the efficiency dashboard.
This stage allows us to calculate the tangible and intangible training benefits (without additional costs) by
using indicators values.
3.5 Stage 5: Optimization
Process optimization includes retrieving process performance information from the modeling or monitoring
phase; identifying the potential or actual bottlenecks and the potential opportunities for cost savings or other
improvements; and then, applying these enhancements in the design of the process. Overall, this creates
greater business value.
In this stage of our approach, we use machine learning algorithms (for example, logistic regression,
neural networks or support vector machines) to classify training activities according to defined criteria
(example, financial yield) and to do simulations to increase the efficiency and efficacy of training activities.
For this, we perform a pretreatment on the indicator values to have a data set for a supervised learning
algorithm, unsupervised or semi-supervised. The stages of monitoring and optimization constitute our
module of business intelligence because they allow: improving personal efficiency, speeding up the process
of decision making, increasing organizational control, encouraging exploration and discovery on the part of
the decision maker, speeding up problem solving in an organization, facilitating interpersonal
communication, promoting learning or training, generating new evidence in support of a decision, creating a
competitive advantage over competition, revealing new approaches to thinking about the problem space, and
helping automate managerial processes.
To materialize our approach, our objective is to provide a tool to help the training projects management in
enterprise with the alignment between the training activities and business needs, modeling and validating of
the training processes, execution and supervision of training projects, calculation of tangible and intangible
profits of training, classification of trainings (in two levels: enterprise - employee), trainings optimization (in
two levels: employee - enterprise)
4. CONCLUSION
Because of the difficulties resulting from the use of existing models, human resource departments cannot
manage to evaluate the impact of the training on the economic and social growth of the enterprise in a
concrete manner. Thus, trying to find a solution, we propose an approach of training yield evaluation, based
on the business process management.
The advantages obtained through our approach can be seen from two angles. In the domain of business
process management, we add a new category of business process and extend Business Process Management
System (BPMS) by adding the validation pre-execution (through our tool). Concerning the evaluation of
enterprise training, we propose a complete approach of training project management facilitating decisionmaking and the calculation of the tangible and intangible profits. With regard to the existing models, we add
a level of diagnostic (classification and optimization) allowing the understanding the dysfunctions in order to
correct them. Our approach ensures the training activities alignment with business needs and allows the ROI
calculation without additional investment. Concerning the problems raised in the literature, we reduce the
bias and additional costs bound to training yield calculation. Indeed, from training conception, we bind
65
ISBN: 978-972-8939-51-9 © 2011 IADIS
training objectives and strategies with performance improvements wished by the enterprise. Hence, from the
beginning, the enterprise should be able to connect the effects expected by the training with certain indicators
that it already uses in its current management. When financial yield evaluation will be required, it will be
thus able, without additional costs, to provide data on the quantitative indicators which will show the
evolution of productivity and quality and will be able to translate them into economic value.
REFERENCES
Antonucci, Y. L. (2010). Business process management curriculum. In Bernus, P., Blazewics, J., Schmidt, G., Shaw, M.,
Brocke, J., and Rosemann, M., editors, Handbook on Business Process Management 2, International Handbooks on
Information Systems, pages 423–442. Springer Berlin Heidelberg. 10.1007/978-3-642-01982-1 20.
Bach P., 2007. Le management de projets de formation en entreprise, administration et organisation. De Boeck &
Larcier s.a. , éditions De Boeck Université, rue des Minimes 39, B-1000 Bruxelles.
Bailey A., 2007. Un Investissement Rentable, Mettre l'investissement en formation en rapport avec les résultats
d'entreprise et l'économie. Research Report, Canadian Council on Learning (CCL).
Burkett H., 2005. ROI on a shoe-string: strategies for resource-constrained environments, Measuring more with less (part
I). Industrial and Commercial Training, vol.37, n° 1, p 10-17.
Dunberry A. and Péchard C., 2007. L'évaluation de la formation dans l'entreprise : état de la question et perspectives.
Research Report, Canadian Council on Learning (CCL).
Goldwasser, D., 2001. Beyond ROI (training) . Training, vol 38, number. 1.
Kirkpatrick D. L., 1994 . Evaluating training programs : the four levels. Berrett-Koehler ; Publishers Group West
[distributor], San Francisco : Emeryville, CA :, xv, p. 229
Kraiger, K., 2002. Decision-based evaluation. In Creating, implementing and managing effective training and
development. State-of-the-art lessons for practice. Society for Industrial and Organizational Psychology ed., pp. 331375: Jossey-Bass.
Lin H., Zhao Z., and Li H., and Chen Z., 2002. A Novel Graph Reduction Algorithm to Identify Structural Conflicts.
HICSS, p. 289.
Liu R. and Kumar A., 2005. An Analysis and Taxonomy of Unstructured Workflows. Business Process Management,
p. 268-284.
McCain, D.V., 2005. Evaluation Basics. ASTD Press, Alexandria.
Nagle, B., 2002. ROI gives a way to ROE. Candian HR Reporter, vol. 15, no. 13, p. 7.
Oracle, 2008. Business Process Management, Service-Oriented Architecture, and Web 2.0: Business Transformation or
Train Wreck?. An Oracle White Paper , Updated August 2008.
Perumal S. and Mahanti A., 2007. Applying Graph Search Techniques for Workflow Verification. HICSS, p. 48.
Phillips, Jack J., 1997. Return on investment in training and performance improvement programs. Gulf, Houston
Pineda, P. (2010). Evaluation of training in organisations: a proposal for an integrated model. Journal of European
Industrial Training, 34 Iss: 7:673–693.
Rozwell C., 2009, Forget ROI, Measure Time to Competency to Calculate Learning Value. Gartner Research, ID
Number: G00169917
Sadiq W. and Orlowska M. E., 2000. Analyzing process models using graph reduction techniques. Inf. Syst., vol. 25,
n°2, p. 117—134, Elsevier Science Ltd., Oxford, UK, UK.
Sadiq, S., Orlowska M. E., Sadiq W. and Foulger C., 2004. Data flow and validation in workflow modelling. ADC '04:
Proceedings of the 15th Australasian database conference, Australian Computer Society, Inc., p. 207—214,
Dunedin, New Zealand.
Touré F., Baïna K., and Benali K., 2008. An Efficient Algorithm for Workflow Graph Structural Verification. OTM
Conferences (1), Lecture Notes in Computer Science, Springer, vol. 5331, p. 392-408. Mexico
WfMC, 1999. Workflow Management Coalition Interface 1: Process Definition Interchange Process Model. Technical
Report WFMC-TC-1016-p, ver. 1.1
Wil M. P. van der Aalst, Alexander Hirnschall and H. M. W. (Eric) Verbeek, 2002. An Alternative Way to Analyze
Workflow Graphs. CAiSE, p. 535-552.
66
IADIS International Conference e-Commerce 2011
ANALYZING SENTIMENT OF SOCIAL MEDIA CONTENT
FOR BUSINESS INFORMATICS
Kristin Glass1 and Richard Colbaugh2
1
New Mexico Institute of Mining and Technology, Socorro, New Mexico 87801 USA
2
Sandia National Laboratories, Albuquerque, New Mexico 87123 USA
ABSTRACT
Inferring the sentiment of social media content, for instance blog postings or online product reviews, is both of great
interest to businesses and technically challenging to accomplish. This paper presents two computational methods for
estimating social media sentiment which address the challenges associated with Web-based analysis. Each method
formulates the task as one of text classification, models the data as a bipartite graph of documents and words, and
assumes that only limited prior information is available regarding the sentiment orientation of any of the documents or
words of interest. The first algorithm is a semi-supervised sentiment classifier which combines knowledge of the
sentiment labels for a few documents and words with information present in unlabeled data, which is abundant online.
The second algorithm assumes existence of a set of labeled documents in a domain related to the domain of interest, and
leverages these data to estimate sentiment in the target domain. We demonstrate the utility of the proposed methods by
showing they outperform several standard methods for the task of inferring the sentiment of online reviews of movies,
electronics products, and kitchen appliances.
KEYWORDS
Sentiment analysis, social media, business informatics, machine learning.
1. INTRODUCTION
The enormous popularity of “social media”, such as blogs, forums, and social networking sites, represents a
significant challenge to standard business models and practices, as these media move the control of
information from companies to consumers (e.g., (Glance et al., 2005), (Ziegler and Skubacz, 2006), (Melville
et al., 2009), (Kaplan and Haenlein, 2010), (van der Lans et al., 2010)). However, social media also offer
unprecedented opportunities to increase business responsiveness and agility. For example, recent surveys
reveal that 32% of the nearly 250 million bloggers worldwide regularly give opinions on products and
brands, 71% of active Internet users read blogs, and 70% of consumers trust opinions posted online by other
consumers (Universal McCann, 2010), (Nielson, 2010). Thus social media is a vast source of businessrelevant opinions. Moreover, this information has a reach that rivals any traditional media and an influence
which substantially exceeds standard advertising channels.
Businesses are therefore strongly motivated to pay attention to social media and other online information
sources. For instance, it is crucially important for companies to be able to rapidly discover and characterize
both negative and positive sentiment expressed by current and potential customers. Complaints and other
negative views are easier to address if detected quickly, while early positive “buzz” can be reinforced and
amplified. Identifying nascent consumer concern or enthusiasm about topics which are relevant to company
business can be of great strategic advantage. Indeed, the relevance and timeliness of the information available
in social media has the potential to revolutionize the way business is conducted in many sectors.
While monitoring social media is of considerable interest to businesses, performing such analysis is
technically challenging. The opinions of consumers are typically expressed as informal communications and
are buried in the vast, and largely irrelevant, output of millions of bloggers and other online content
producers. Consequently, effectively exploiting these data requires the development of new, automated
methods of analysis (e.g., (Glance et al., 2005), (Ziegler and Skubacz, 2006), (Melville et al., 2009), (Kaplan
and Haenlein, 2010), (van der Lans et al., 2010)). Although powerful computational analytics have been
67
ISBN: 978-972-8939-51-9 © 2011 IADIS
derived for traditional forms of content, less has been done to develop techniques that are well-suited to the
particular characteristics of the content found in social media.
This paper considers one of the central problems in the new domain of social media analytics: deciding
whether a given document, such as a blog post or forum thread, expresses positive or negative opinion
toward a given topic. The informal nature of social media content poses a challenge for language-based
sentiment analysis. While statistical learning-based methods often provide good performance in unstructured
settings like this (e.g., (Pang and Lee, 2008), (Dhillon, 2001), (Kim and Hovy, 2004), (Sindhwani and
Melville, 2008), (Colbaugh and Glass, 2010), (Pan and Yang, 2010), (Blitzer et al., 2007), (He et al., 2009)),
obtaining the required labeled instances of data, such as a lexicon of sentiment-laden words for a given
domain or a collection of “exemplar” blog posts of known polarity, is expensive and time-consuming for
Web applications.
We present two new computational methods for inferring sentiment orientation of social media content
which address these challenges. Each method formulates the task as one of text classification, models the
data as a bipartite graph of documents and words, and assumes that only limited prior information is available
regarding the sentiment orientation of any of the documents or words of interest. The first algorithm adopts a
semi-supervised approach to sentiment classification, combining knowledge of the sentiment polarity for a
few documents and a small lexicon of words with information present in a corpus of unlabeled documents;
note that such unlabeled data are readily obtainable in online applications. The second algorithm assumes
existence of a set of labeled documents in a domain related to the domain of interest, and provides a
procedure for transferring the sentiment knowledge contained in these data to the target domain. We
demonstrate the efficacy of the proposed algorithms by showing they outperform several standard methods
for the task of inferring the sentiment polarity of online reviews of movies, electronics products, and kitchen
appliances.
2. PRELIMINARIES
We approach the task of estimating the sentiment orientations of a collection of documents as a text
classification problem. Each document of interest is represented as a “bag of words” feature vector x∈ℜ|V|,
where the entries of x are the frequencies with which the words in the vocabulary set V appear in the
document (perhaps normalized in some way (Pang and Lee, 2008)). We wish to learn a vector c∈ℜ|V| such
that the classifier orient = sign(cTx) accurately estimates the sentiment orientation of document x, returning
+1 (−1) for documents expressing positive (negative) sentiment about the topic of interest.
Knowledge-based classifiers leverage prior domain information to construct the vector c. One way to
obtain such a classifier is to assemble lexicons of positive words V+⊆V and negative words V−⊆V, and then
to set ci= +1 if word i∈V+, ci= −1 if i∈V−, and ci=0 if i is not in either lexicon; this classifier simply sums the
positive and negative sentiment words in the document and assigns document orientation accordingly. While
this scheme can provide acceptable performance in certain settings, it is unable to improve its performance or
adapt to new domains, and it is usually labor-intensive to construct lexicons which are sufficiently complete
to enable useful sentiment classification performance to be achieved.
Alternatively, learning-based methods attempt to generate classifier vector c from examples of positive
and negative sentiment. To obtain a learning-based classifier, one can begin by assembling a set of nl labeled
documents {(xi, di)}, where di∈{+1, −1} is the sentiment label for document i. The vector c then can be
learned through “training” with the set {(xi, di)}, for instance by solving the following set of equations for c:
[XTX + γI|V|] c = XT d,
nl×|V|
(1)
nl
Where matrix X∈ℜ
has document vectors for rows, d∈ℜ is the vector of document labels, I|V|
denotes the |V|×|V| identity matrix, and γ≥0 is a constant; this corresponds to regularized least squares (RLS)
learning (Hastie et al., 2009). Many other strategies can be used to compute c, including Naïve Bayes (NB)
statistical inference (Pang and Lee, 2008). Learning-based classifiers have the potential to improve their
performance and to adapt to new situations, but realizing these capabilities requires that fairly large training
sets of labeled documents be obtained and this is usually an expensive undertaking.
Sentiment analysis of social media content for business applications is often characterized by the
existence of only modest levels of prior knowledge regarding the domain of interest, reflected in the
68
IADIS International Conference e-Commerce 2011
availability of a few labeled documents and small lexicon of sentiment-laden words, and by the need to
rapidly learn and adapt to new domains. As a consequence, standard knowledge-based and learning-based
sentiment analysis methods are typically ill-suited for business informatics. In order to address this challenge,
the sentiment analysis methods developed in this paper enable limited labeled data to be combined with
readily available “auxiliary” information to produce accurate sentiment estimates. More specifically, the first
proposed method is a semi-supervised algorithm (e.g., (Sindhwani and Melville, 2008), (Colbaugh and Glass,
2010)) which leverages a source of supplementary data which is abundant online: unlabeled documents and
words. Our second algorithm is a novel transfer learning method (e.g., (Pan and Yang, 2010)) which permits
the knowledge present in data that has been previously labeled in a related domain (say movie reviews) to be
transferred to a new domain (electronics reviews).
documents
words
Figure 1. Cartoon of bipartite graph model Gb, in which documents (red vertices) are connected to the words (blue
vertices) they contain, and the link weights (black edges) can reflect word frequencies
Each of the algorithms proposed in this paper assumes the availability of a modest lexicon of sentimentladen words. This lexicon is encoded as a vector w∈ℜ|Vl|, where Vl = V+∪V− is the sentiment lexicon and the
entries of w are set to +1 or −1 according to the polarity of the corresponding words. The development of the
algorithms begins by modeling the problem data as a bipartite graph Gb of documents and words (see Figure
1). It is easy to see that the adjacency matrix A for graph Gb is given by
 0
A= T
X
X
0 
(2)
Where the matrix X∈ℜn×|V| is constructed by stacking the document vectors as rows, and each ‘0’ is a
matrix of zeros. In both the semi-supervised and transfer learning algorithms, integration of labeled and
“auxiliary” data is accomplished by exploiting the relationships between documents and words encoded in
the bipartite graph model. The basic idea is to assume that, in the bipartite graph Gb, positive/negative
documents will tend to be connected to (contain) positive/negative words, and positive/negative words will
tend to be connected to positive/negative documents.
3. SEMI-SUPERVISED SENTIMENT ANALYSIS
We now derive our first sentiment estimation algorithm for social media content. Consider the common
situation in which only limited prior knowledge is available about the way sentiment is expressed in the
domain of interest, in the form of small sets of documents and words for which sentiment labels are known,
but where abundant unlabeled documents can be easily collected (e.g., via Web crawling). In this setting it is
natural to adopt a semi-supervised approach, in which labeled and unlabeled data are combined and
leveraged in the analysis process. In what follows we present a novel bipartite graph-based approach to semisupervised sentiment analysis.
Assume the initial problem data consists of a corpus of n documents, of which nl << n are labeled, and a
modest lexicon Vl of sentiment-laden words, and suppose that this label information is encoded as vectors
d∈ℜnl and w∈ℜ|Vl|, respectively. Let dest∈ℜn be the vector of estimated sentiment orientations for the
documents in the corpus, and define the “augmented” classifier caug = [destT cT]T∈ℜn+|V| which estimates the
polarity of both documents and words. Note that the quantity caug is introduced for notational convenience in
69
ISBN: 978-972-8939-51-9 © 2011 IADIS
the subsequent development and is not directly employed for classification. More specifically, in the
proposed methodology we learn caug, and therefore c, by solving an optimization problem involving the
labeled and unlabeled training data, and then use c to estimate the sentiment of any new document of interest
with the simple linear classifier orient = sign(cTx). We refer to this classifier as semi-supervised because it is
learned using both labeled and unlabeled data. Assume or ease of notation that the documents and words are
indexed so the first nl elements of dest and |Vl| elements of c correspond to the labeled data.
We wish to learn an augmented classifier caug with the following three properties: 1.) if a document is
labeled, then the corresponding entry of dest should be close to this ±1 label; 2.) if a word is in the sentiment
lexicon, then the corresponding entry of c should be close to this ±1 sentiment polarity; and 3.) if there is an
edge Xij of Gb that connects a document x and a word v∈V and Xij possesses significant weight, then the
estimated polarities of x and v should be similar. These objectives are encoded in the following minimization
problem:
min c Taug Lc aug + β1
c aug
nl
∑
Vl
(d est,i - d i ) 2 + β 2
i =1
∑ (c
i
- wi )2
(3)
i =1
Where L = D − A is the graph Laplacian matrix for Gb, with D the diagonal degree matrix for A (i.e., Dii =
Σj Aij), and β1, β2 are nonnegative constants. Minimizing (3) enforces the three properties we seek for caug,
with the second and third terms penalizing “errors” in the first two properties. To see that the first term
enforces the third property, observe that this expression is a sum of components of the form Xij(dest,i − cj)2.
The constants β 1, β2 can be used to balance the relative importance of the three properties.
The caug which minimizes the objective function (3) can be obtained by solving the following set of linear
equations:
L 13
L 14 
L 11 + β1 I nl L 12
 β1 d 


 0 
L 21
L 22
L 23
L 24 


c aug = 
(4)

β 2 w 
L 31
L 32 L 33 + β 2 I V L 34 
1




L 41
L 42
L 43
L 44 
 0 

Where the Lij are matrix blocks of L of appropriate dimension. The system (4) is sparse because the data
matrix X is sparse, and therefore large-scale problems can be solved efficiently. Note that in situations where
the set of available labeled documents and words is very limited, sentiment classifier performance can be
improved by replacing L in (4) with the normalized Laplacian Ln=D−1/2LD−1/2, or with a power of this matrix
Lnk (for k a positive integer).
We summarize this discussion by sketching an algorithm for learning the proposed semi-supervised
classifier:
Algorithm SS:
1. Construct the set of equations (4), possibly by replacing the graph Laplacian L with Lnk.
2. Solve equations (4) for caug = [ destT cT ]T (for instance using the Conjugate Gradient method).
3. Estimate the sentiment orientation of any new document x of interest as: orient = sign(cTx).
4. CASE STUDY ONE: MOVIE REVIEWS
This case study examines the performance of Algorithm SS for the problem of estimating sentiment of online
movie reviews. The data used in this study is a publicly available set of 2000 movie reviews, 1000 positive
and 1000 negative, collected from the Internet Movie Database and archived at the website (Pang, 2009). The
Lemur Toolkit (Lemur, 2009) was employed to construct the data matrix X and vector of document labels d
from these reviews. A lexicon of ~1400 domain-independent sentiment-laden words was obtained from
(Ramakrishnan et al., 2003) and employed to build the lexicon vector w.
This study compares the movie review orientation classification accuracy of Algorithm SS with that of
three other schemes: 1.) lexicon-only, in which the lexicon vector w is used as the classifier as summarized in
Section 2, 2.) a classical NB classifier obtained from (Borgelt, 2009), and 3.) a well-tuned version of the RLS
classifier (1). Algorithm SS is implemented with the following parameter values: β1 = 0.1, β2 = 0.5, and k =
10. A focus of the investigation is evaluating the extent to which good sentiment estimation performance can
70
IADIS International Conference e-Commerce 2011
be achieved even if only relatively few labeled documents are available for training; thus we examine
training sets which incorporate a range of numbers of labeled documents: nl = 50, 100, 150, 200, 300, 400,
600, 800, 1000.
Figure 2. Results for the movie reviews case study. The plot shows how sentiment estimation accuracy (vertical axis)
varies with number of available labeled movie reviews (horizontal axis) for four different classifiers: lexicon only
(black), NB (magenta), RLS (blue), and Algorithm SS (red).
Sample results from this study are depicted in Figure 2. Each data point in the plots represents the average
of ten trials. In each trial, the movie reviews are randomly partitioned into 1000 training and 1000 test
documents, and a randomly selected subset of training documents of size nl is “labeled” (i.e., the labels for
these reviews are made available to the learning algorithm). As shown in Figure 2, Algorithm SS outperforms
the other three methods. Note that, in particular, the accuracy obtained with the proposed approach is
significantly better than the other techniques when the number of labeled training documents is small. It is
expected that this property of Algorithm SS will be of considerable value in business informatics applications
that involve social media data.
5. TRANSFER LEARNING SENTIMENT ANALYSIS
This section develops the second proposed sentiment estimation algorithm for social media content. Many
business informatics applications are characterized by the presence of limited labeled data for the domain of
interest but ample labeled information for a related domain. For instance, a firm may wish to ascertain the
sentiment of online discussions about its new line of kitchen appliances, and may have in hand a large set of
labeled examples of positive and negative reviews for its electronics products (e.g., from studies of previous
product launches). In this setting it is natural to adopt a transfer learning approach, in which knowledge
concerning the way sentiment is expressed in one domain, the so-called source domain, is transferred to
permit sentiment estimation in a new target domain. In what follows we present a new bipartite graph-based
approach to transfer learning-based sentiment analysis.
Assume that the initial problem data consists of a corpus of n = nT + nS documents, where nT is the (small)
number of labeled documents available for the target domain of interest and nS >> nT is the number of labeled
documents from some related source domain; in addition, suppose that a modest lexicon Vl of sentimentladen words is known. Let this label data be encoded as vectors dT∈ℜnT, dS∈ℜnS, and w∈ℜ|V|, respectively.
Denote by dT,est∈ℜnT, dS,est∈ℜnS, and c∈ℜ|V| the vectors of estimated sentiment orientations for the target and
source documents and the words, and define the augmented classifier as caug = [dS,estT dT,estT cT]T ∈ ℜn+|V|.
71
ISBN: 978-972-8939-51-9 © 2011 IADIS
Note that the quantity caug is introduced for notational convenience in the subsequent development and is not
directly employed for classification.
In what follows we derive an algorithm for learning caug, and therefore c, by solving an optimization
problem involving the labeled source and target training data, and then use c to estimate the sentiment of any
new document of interest via the simple linear classifier orient = sign(cTx). This classifier is referred to as
transfer learning-based because c is learned, in part, by transferring knowledge about the way sentiment is
expressed from a domain which is related to (but need not be identical to) the domain of interest.
We wish to learn an augmented classifier caug with the following four properties: 1.) if a source document
is labeled, then the corresponding entry of dS,est should be close to this ±1 label; 2.) if a target document is
labeled, then the corresponding entry of dT,est should be close to this ±1 label, and the information encoded in
dT should be emphasized relative to that in the source labels dS,; 3.) if a word is in the sentiment lexicon, then
the corresponding entry of c should be close to this ±1 sentiment polarity; and 4.) if there is an edge Xij of Gb
that connects a document x and a word v∈V and Xij possesses significant weight, then the estimated
polarities of x and v should be similar.
The four objectives listed above may be realized by solving the following minimization problem:
min c Taug Lc aug + β 1 d S,est - k S d S
c aug
2
+ β 2 d T,est - k T d T
2
+ β3 c - w
2
(5)
Where L = D − A is the graph Laplacian matrix for Gb, as before, and β1, β2, β3, kS, and kT are
nonnegative constants. Minimizing (5) enforces the four properties we seek for caug. More specifically, the
second, third, and fourth terms penalize “errors” in the first three properties, and choosing β2 > β1 and kT > kS
favors target label data over source labels. To see that the first term enforces the fourth property, note that
this expression is a sum of components of the form Xij (dT,est,i − cj)2 and Xij (dS,est,i − cj)2.The constants β1, β2,
β3 can be used to balance the relative importance of the four properties.
The caug which minimizes the objective function (5) can be obtained by solving the following set of linear
equations:
L + β I

L 12
L 13
 β1 k S d S 
1 nS
 11

 L 21
 c aug = β 2 k T d T 
L 22 + β 2 I nT
L 23
(6)




 β 3 w 
L 31
L 32
L 33 + β 3 I V 


Where the Lij are matrix blocks of L of appropriate dimension. The system (6) is sparse because the data
matrix X is sparse, and therefore large-scale problems can be solved efficiently. In situations where the set of
available labeled documents and words is very limited, sentiment classifier performance can be improved by
replacing L in (6) with the normalized Laplacian Ln or with a power of this matrix Lnk.
We summarize the above discussion by sketching an algorithm for the proposed transfer learning
classifier:
Algorithm TL:
1. Construct the set of equations (6), possibly by replacing the graph Laplacian L with Lnk.
2. Solve equations (6) for caug = [dS,estT dT,estT cT]T.
3. Estimate the sentiment orientation of any new document x of interest as: orient = sign(cTx).
6. CASE STUDY TWO: PRODUCT REVIEWS
This case study examines the performance of Algorithm TL for the problem of estimating sentiment of online
product reviews. The data used in this study is a publicly available set of 1000 reviews of electronics
products, 500 positive and 500 negative, and 1000 reviews of kitchen appliances, 500 positive and 500
negative, collected from Amazon and archived at the website (Dredze, 2010). The Lemur Toolkit (Lemur,
2009) was employed to construct the data matrix X and vectors of document labels dS and dT from these
reviews. A lexicon of 150 domain-independent sentiment-laden words was constructed manually and
employed to form the lexicon vector w.
This study compares the product review sentiment classification accuracy of Algorithm TL with that of
four other strategies: 1.) lexicon-only, in which the lexicon vector w is used as the classifier as summarized in
72
IADIS International Conference e-Commerce 2011
Section 2, 2.) a classical NB classifier obtained from (Borgelt, 2009), 3.) a well-tuned version of the RLS
classifier (1), and 4.) Algorithm SS. Algorithm TL is implemented with the following parameter values: β1 =
1.0, β2 = 3.0, β3 = 5.0, kS = 0.5, kT = 1.0, and k = 5. A focus of the investigation is evaluating the extent to
which the knowledge present in labeled reviews from a related domain, here kitchen appliances, can be
transferred to a new domain for which only limited labeled data is available, in this case electronics. Thus we
assume that all 1000 labeled kitchen reviews are available to Algorithm TL (the only algorithm which is
designed to exploit this information), and examine training sets which incorporate a range of numbers of
labeled documents from the electronics domain: nT = 20, 50, 100, 200, 300, 400.
Figure 3. Results for the consumer product reviews case study. The plot shows how sentiment estimation accuracy
(vertical axis) varies with number of available labeled electronics reviews (horizontal axis) for five different classifiers:
lexicon only (orange), NB (black), RLS (magenta), Algorithm SS (blue), and Algorithm TL (red).
Sample results from this study are depicted in Figure 3. Each data point in the plots represents the average
of ten trials. In each trial, the electronics reviews are randomly partitioned into 500 training and 500 test
documents, and a randomly selected subset of reviews of size nT is extracted from the 500 labeled training
instances and made available to the learning algorithms. As shown in Figure 3, Algorithm TL outperforms
the other four methods. Note that, in particular, the accuracy obtained with the transfer learning approach is
significantly better than the other techniques when the number of labeled training documents in the target
domain is small. It is expected that the ability of Algorithm TL to exploit knowledge from a related domain
to quickly learn an effective sentiment classifier for a new domain will be of considerable value in business
informatics applications.
ACKNOWLEDGEMENT
This research was supported by the U.S. Department of Defense and the Laboratory Directed Research and
Development Program at Sandia National Laboratories.
73
ISBN: 978-972-8939-51-9 © 2011 IADIS
REFERENCES
Blitzer, J. et al., 2007. Biographies, Bollywood, Boom-boxes, and Blenders: Domain Adaptation for Sentiment
Classification. Proc. 45th Annual Meeting of the ACL, Prague, CZ.
Borgelt, C., 2009. http://www.borgelt.net/bayes.html, accessed December 2009.
Colbaugh, R. and Glass, K., 2010. Estimating Sentiment Orientation in Social Media for Intelligence Monitoring and
Analysis. Proc. 2010 IEEE Int. Conf. on Intelligence and Security Informatics, Vancouver, BC, CA.
Dhillon, I., 2001. Co-clustering Documents and Words Using Bipartite Spectral Graph Partitioning. Proc. ACM Int. Conf.
Knowledge Discovery and Data Mining, San Francisco, CA, USA.
Dredze, M., 2010. http://www.cs.jhu.edu/~mdredze/, accessed December 2010.
Glance, N. et al., 2005. Deriving Marketing Intelligence from Online Discussion. Proc. 11th ACM Int. Conf. Knowledge
Discovery and Data Mining, Chicago, IL, USA.
Hastie, T. et al., 2009. The Elements of Statistical Learning. Second Edition, Springer, New York, USA.
He, J. et al., 2009. Graph-based Transfer Learning. Proc. 18th ACM Conf. Information and Knowledge Management,
Hong Kong.
Lemur, 2009. http://www.lemurproject.org/, accessed December 2009.
Kaplan, A. and Haenlein, M., 2010. Users of the World, Unite! The Challenges and Opportunities of Social Media.
Business Horizons, Vol. 53, pp. 59-68.
Kim, S. and Hovy, E., 2004. Determining the Sentiment of Opinions. Proc. Int. Conf. Computational Linguistics.
Melville, P. et al., 2009. Social Media Analytics: Channeling the Power of the Blogosphere for Marketing Insight. Proc.
Workshop on Information in Networks, New York, NY, USA.
Nielson, 2010. http://www.nielson.com, accessed July 2010.
Pan, S. and Yang, Q., 2010. A Survey on Transfer Learning. IEEE Trans. Knowledge and Data Engineering, Vol. 22, pp.
1345-1359.
Pang, B. and Lee, L., 2008. Opinion Mining and Sentiment Analysis. Foundations and Trends in Information Retrieval,
Vol. 2 , pp. 1-135.
Pang, B., 2009. http://www.cs.cornell.edu/People/pabo/movie-review-data/, accessed December 2009.
Ramakrishnan, G. et al., 2003. Question Answering via Bayesian Inference on Lexical Relations. Proc. 41st Annual
Meeting of the ACL.
Sindhwani, V. and Melville, P., 2008. Document-word Co-regularization for Semi-supervised Sentiment Analysis. Proc.
2008 IEEE Int. Conf. Data Mining, Pisa, IT.
Universal McCann, 2010. http://www.universalmccann.com, accessed July 2010.
van der Lans, R. et al., 2010. A Viral Branching Model for Predicting Spread of Electronic Word of Mouth. Marketing
Science, Vol. 29, pp. 348-365.
Ziegler, C. and Skubacz, M., 2006. Towards Automated Reputation and Brand Monitoring on the Web. Proc. IEEE/ACM
Int. Conf. Web Intelligence, Hong Kong.
74
IADIS International Conference e-Commerce 2011
A CONCEPTUAL MODEL OF WEB ATM ADOPTION: AN
INTEGRATED PERSPECTIVE OF THE TRANSACTION
COST THEORY AND INNOVATION DIFFUSION THEORY
Yi-Shun Wang1, Shun-Cheng Wu2, Hsin-Hui Lin3, Yu-Min Wang4 and Ting-Rong He5
1
Department of Information Management, National Changhua University of Education, Taiwan
2
Department of International Business, Vanung University, Taiwan
3
Department of Distribution Management, National Taichung Institute of Technology, Taiwan
4
Department of Information Management, National Chi Nan University, Taiwan
5
CyberLink Corporation, Taipei, Taiwan
ABSTRACT
With the initial success of the traditional internet banking, several banks in Taiwan have been transferring their attention
to implementing Web Automatic Teller Machines (Web ATMs). Due to the multi-channel nature of online banking
services and the difference in equipment requirement between the traditional Internet banking and Web ATM, users’
adoption of traditional internet banking does not promise their adoption of Web ATM. Thus, this study proposes a
conceptual model for exploring the factors influencing the usage behavior of Web ATM by integrating the innovation
diffusion theory (IDT) and transaction cost theory (TCT). The proposed model suggests that perceived relative
advantage, perceived complexity, perceived compatibility, perceived asset specificity, perceived uncertainty, and
perceived transaction frequency are potential determinants of user adoption of Web ATM. The proposed model can
provide some important implications for Web ATM adoption research and practice.
KEYWORDS
Web ATM adoption; Internet banking; Innovation Diffusion Theory (IDT); Transaction Cost Theory (TCT)
1. INTRODUCTION
Continued information technology (IT) innovation and widespread usage of Internet communication have
altered people’s lifestyles and social behavior, especially in terms of money management. Increasingly,
transactions are being conducted via cyberspace rather than through traditional physical channels. Intensive
electronic commerce demand necessitates improvements to the design and delivery of personal financial
services; traditional branch-based retail banks are therefore compelled to provide customers with convenient
online banking services. Online banking is a system that allows individuals to perform banking transactions
at home, via the internet. There are two kinds of online banking systems launched by almost every bank in
Taiwan, including the traditional Internet banking systems (henceforth, ‘Internet banking’) and the Web Auto
Teller Machine (Web ATM) systems.
With the initial success of the Internet banking implementation, many banks in Taiwan have been
implementing a newly-innovated IT service, Web ATM, which can perform all secure online transaction
functions as provided by a physical ATM other than deposits and withdrawals. Different from the Internet
banking systems which users can use to conduct banking transactions as long as they have the PC-connected
Internet, valid accounts, and passwords, and are therefore easy to be attacked by hackers, Web ATM provides
a more secure platform for online banking. Actually, due to the secure concerns, most banks in Taiwan have
disabled the function of non-designated fund outward transfer in their Internet banking services. This has
made some inconvenience for the users of Internet banking. Furthermore, a bank’s Internet banking services
can only be used by the bank’s customers who have previously applied for the bank’s Internet banking
accounts and passwords. Thus, Internet banking systems can only provide services for dedicated customers.
On the other hand, installation of an IC card reader and a Web ATM driver allows any PC connected to the
Internet to serve as a Web ATM platform, which can offer a highly secure, non-dedicated environment for
75
ISBN: 978-972-8939-51-9 © 2011 IADIS
home banking transactions. By inserting any bank’s ATM card into the card reader and browsing the Web
ATM platform website of a specific bank, users can conduct various secure banking transactions at any time
of day, including balance inquiries, fund transfers, and bill or tax payments. Therefore, like physical ATM
systems, a bank’s Web ATM systems can provide secure, non-dedicated banking services for all customers
who have any bank’s ATM cards. Whereas, unlike physical ATM, Web ATM services can save users time
and money in terms of locating a physical ATM, travelling to that ATM, and queuing for service.
Importantly, Web ATM is not a transitional technology or a substitute for Internet banking, but it is a
complement for Internet banking. Actually, most banks in Taiwan have provided dual online banking service
options (i.e., Web ATM and Internet banking services) for their customers. Thus, Web ATM is a new IT
phenomenon and its potential success in Taiwan can provide several important implications for online
banking practitioners all over the world. Most customers may use banking services from multiple channels,
including branch banking, telephone banking, physical ATM, Internet banking, and Web ATM. The multichannel strategy has become the most popular business model for banks (Ho & Wu, 2009). Therefore, many
banks in Taiwan have invested a great deal of money in implementing and promoting Web ATM systems and
taken advantage of Web ATM as a multi-channel marketing opportunity to increase their service quality,
customer satisfaction, customer retention, and online service revenues.
However, due to the multi-channel nature of online banking services and the difference in equipment
requirement between the traditional Internet banking and Web ATM, users’ adoption of Internet banking
does not promise their adoption of Web ATM. While many banks are currently making considerable
investments to make use of the Web ATM systems, potential users may not choose to adopt them in spite of
their availability, security, and convenience. Therefore, how to lead customers to adopt the new online
banking services is an important issue for the bank industry. Specifically, Web ATM implementation success
may depend largely on whether or not users are willing to adopt a new form of IT that is different from what
they have used in the past – to use Web ATM systems, users are required to install an IC card reader and a
specific driver. Thus, the behavioral model of Web ATM adoption may somehow differ from that of
traditional Internet banking adoption. While many prior studies have investigated the factors influencing user
acceptance of Internet banking (e.g., Wang, Wang, Lin, & Tang, 2003; Chau & Lai, 2003; Chan & Lu, 2004),
little research has been conducted on the factors affecting user adoption of Web ATM. Thus, there is a need
for research to investigate the factors that influence Web ATM adoption.
Since the adoption of Web ATM can be viewed as the adoption of an innovation and the selection of a
transaction method, this study employs the Innovation Diffusion Theory (IDT) and the Transaction Cost
Theory (TCT) to investigate the factors that affect user adoption behavior of Web ATM. Specifically, this
study proposes a conceptual model for exploring the factors influencing the usage behavior of Web ATM by
integrating IDT and TCT. The proposed model suggests that perceived relative advantage, perceived
complexity, perceived compatibility, perceived asset specificity, perceived uncertainty, and perceived
transaction frequency are potential determinants of user adoption of Web ATM. The proposed model can
provide some important implications for Web ATM adoption research and practice.
2. THEORETICAL BACKGROUND
2.1 Previous Research on Internet Banking Acceptance
Many prior studies have investigated the factors influencing user acceptance of Internet banking (e.g., Wang
et al., 2003; Chau & Lai, 2003; Lai & Li, 2005; Cheng, Lam, & Yeung, 2006; Muniruddeen, 2007; Yiu,
Grant, & Edgar, 2007; Amin, 2009; Lee, 2009; Chan & Lu, 2004; Aderonke & Charles, 2010; Chang &
Rizal, 2010). However, most of them focus mainly on extending the technology acceptance model (TAM)
(Davis, 1989) to explain user intention to use the traditional Internet banking. TAM suggests that user IT
adoption behavior is determined by the intention to use a particular system, which in turn is determined by
the user attitude. Two beliefs, perceived usefulness and perceived ease of use, are instrumental in
determining the user attitude. Previous studies have found that the effects of user attitude and use intention
are not always significant (Lederer, Maupin, Sena, & Zhuang, 2000; Kamarulzaman, 2007). Hence, several
studies ignored the construct of use intention or user attitude, and instead they investigated the direct effect of
76
IADIS International Conference e-Commerce 2011
perceived ease of use and/or perceived usefulness on usage behavior (Burton-Jones & Hubona, 2006; Chau,
1996; Kamarulzaman, 2007; Kolodinsky, Hogarth, & Hilgert, 2004; Lederer et al., 2000).
This study is different from prior studies that focused mainly on investigating the factors affecting user
intention to use Internet banking by extending the TAM, and focuses primarily on exploring the factors
influencing the usage behavior of Web ATM by integrating the innovation diffusion theory (IDT) and
transaction cost theory (TCT). IDT developed by Rogers claims five technological characteristics as
antecedents to any adoption decision: relative advantage, compatibility, complexity, trial ability, and
observability (Roger, 1983, 1995). However, previous research found that only relative advantage,
compatibility, and complexity were consistently related to innovation adoption (Tornatzky & Klein, 1982).
Further, relative advantage and complexity are conceptually overlapped with TAM’s perceived usefulness
and perceived ease of use, respectively (Moore & Benbasat, 1991). Therefore, similar to TAM, IDT is
suitable to investigate the usage behavior of Web ATM. Different from Internet banking users who do not
have to install additional equipments other than their Internet-connected computers, Web ATM users must
have or purchase an IC card reader and install a Web ATM driver for using the Web ATM. This implies that
transaction costs associated with using Web ATM, such as asset specificity, may be influential in user
adoption of Web ATM. Consequently, the study integrates the IDT and TCT to analyze the usage behavior of
Web ATM. This study also represents three aspects of extensions from previous online banking acceptance
research, including context extension (i.e., from Internet banking to Web ATM), theory extension (i.e., from
TAM to IDT and TCT), and dependent variable extension (i.e., from usage intention to usage behavior).
2.2 Innovation Diffusion Theory
IDT is a broad social psychological theory that purports to describe the patterns of adoption, explain the
mechanisms, and assist in predicting whether and how a new invention will be successful (Rogers, 1983,
1995). Rogers (1995) defines an innovation as an idea, practice, or object that is perceived as new by an
individual or another unit of adoption, and diffusion as the process by which an innovation is communicated
through certain channels over time among the members of a social system. Innovation diffusion is achieved
through user adoption, which means ‘the acceptance into use and the continued use of a new idea or thing’
(Chen, Gillenson, & Sherrell, 2002). IDT can help to explain the innovation decision process and to examine
the concerns that users has in terms of adopting a new innovation; therefore, it is used as the theoretical
foundation for the research model of this study.
IDT has been widely applied in explaining IT adoption behaviors (e.g., Chen et al., 2002; Moore &
Benbasat, 1991; Hsu, Lu, & Hsu, 2007; Wang & Liao, 2008). As noted earlier, IDT posits a set of innovation
attributes to explain the rates of adoption by users: relative advantage, compatibility, complexity, trial ability,
and observability. Also, previous research found only relative advantage, compatibility and complexity to be
consistently related to innovation adoption (Tornatzky & Klein, 1982). In this study, these three attributes are
used to explain user adoption of Web ATM.
2.3 Transaction Cost Theory
TCT (Coase, 1937; Williamson, 1975, 1985) has been widely applied to explain information systems
outsourcing behaviors (e.g., Ang & Straub, 1998; Aubert, Rivard, & Patry, 1996; Wang, 2002; Watjatrakul,
2005). TCT is based on two behavioral assumptions: bounded rationality and opportunism. Bounded
rationality posits that humans are unlikely to have the sufficient abilities, time, information or resources to
consider every state-contingent outcome associated with a transaction that might arise, whereas opportunism
means that humans will act to further their own self-interests, which makes allowances for guile (Williamson,
1985). Williamson (1985) also suggests that three transaction dimensions influence the type of governance
structure chosen for the transaction: asset specificity, uncertainty, and frequency.
Recently, TCT has also been used to explain IT adoption behaviors (Liang & Huang, 1998). Given that
users’ adoption and usage of Web ATM represent a kind of transaction behavior between users and banks
that provide Web ATM services, users may take into consideration the transaction costs involved in bilateral
exchange while deciding whether or not to adopt Web ATM systems. As such, TCT is appropriate for
explaining why users are willing to adopt the new Web ATM technology rather than continuing to use their
current methods of conducting banking transactions, especially since adopters will be required to obtain an
77
ISBN: 978-972-8939-51-9 © 2011 IADIS
IC card reader to switch to the new banking method. On this basis, TCT is used as the theoretical foundation
for the research model of this study. That is, the three transaction dimensions (i.e., asset specificity,
uncertainty, and frequency) are hypothesized to be the determinants of Web ATM adoption.
3. A CONCEPTUAL MODEL OF WEB ATM ADOPTION
The research model used to guide the study is shown in Figure 1; it depicts that perceived relative advantage,
perceived complexity, perceived compatibility, perceived asset specificity, perceived uncertainty, and
perceived transaction frequency are the potential determinants of Web ATM adoption. Moreover, Web ATM
adoption, defined as whether or not the user has adopted the Web ATM service, is the dependent variable in
the research model. It is limited to the actual use of Web ATM, rather than the behavioral intention to use
Web ATM. The proposed constructs and hypotheses in the research model are all based on the IDT, TCT and
information systems literature. The following sections elaborate on the theory base and derive the
hypotheses.
3.1 Perceived Relative Advantage
Rogers (1983) defines ‘relative advantage’ as the degree to which an innovation is perceived as better than
the idea it supersedes. Thus, relative advantage can be considered as the degree to which a new innovation
surpasses current practices. In this study, perceived relative advantage is defined as the user’s subjective
evaluation of the benefit brought by Web ATM usage against that brought by traditional banking behavior. In
fact, perceived relative advantage is conceptually similar to perceived usefulness in the technology
acceptance model (TAM), which reflects the extent to which the user believes that using a particular
information technology can enhance his/her operation performance (Davis, 1989). The ultimate reason that
bank customers adopt a Web ATM system is that they believe the system provides more benefits as
compared to the method(s) that they have previously used to conduct their banking transactions. It is
expected that there is a positive relationship between perceived relative advantage and Web ATM adoption.
Thus, following hypothesis is presented:
H1: Perceived relative advantage has a positive influence on Web ATM adoption.
3.2 Perceived Complexity
Complexity is the degree to which a certain innovation is difficult to understand and use (Rogers, 1983). It is
the opposite of ease of use, which reflects the extent to which the user believes that using a particular system
is free of effort (Davis, 1989). Thus, perceived complexity in this study is defined as the extent to which the
user believes that using a Web ATM is difficult. It is believed that the perceived complexity of an innovation
leads to user resistance due to a lack of user skills and knowledge (Rogers, 1983). Users who perceive a new
innovation as a complex system will tend to decline the adoption of the new system. Thus, this study presents
the following hypothesis:
H2: Perceived complexity has a negative influence on Web ATM adoption.
78
IADIS International Conference e-Commerce 2011
Figure 1. A Conceptual model of Web ATM adoption
3.3 Perceived Compatibility
Compatibility is usually defined as a measure of the degree to which an innovation is perceived as being
compatible with existing values, past experiences, and the needs of potential adopters (Rogers, 1983).
Tornatzky & Klein (1982) found that an innovation is more likely to be adopted when it is compatible with
users’ job responsibility and value system. Based on the previous literature, perceived compatibility in this
study is defined as the degree to which a Web ATM system is perceived as being compatible with existing
values, past experiences and the needs of potential adopters. Chen et al. (2002) contend that greater
compatibility leads to a faster rate of adoption. Previous empirical research also found that perceived
compatibility has a significant influence on behavioral intention to use information systems (Chen et al.,
2002; Wang & Liao, 2008). It is believed that higher perceived compatibility will results in higher Web ATM
usage. Thus, the following hypothesis is presented:
H3: Perceived compatibility has a positive influence on Web ATM adoption.
3.4 Perceived Asset Specificity
Williamson (1985) defines asset specificity as durable investments that are undertaken in support of
particular transactions, and the opportunity cost of (such) investment is much lower in best alternative uses.
According to Erramilli & Rao (1993) and Heide (1994), asset specificity refers to investments in physical or
human assets that are dedicated to a particular business partner and whose redeployment entails considerable
switching costs. As such, a specific asset is significantly more valuable in a particular exchange than in an
alternative exchange and results in a ‘lock-in’ effect that causes hold-up problems (Barney, 1999;
Williamson, 1975). Thus, the value of assets with high specificity is greatly diminished if they must be
redeployed. Since the first-time adopters of Web ATM need to invest in or acquire an IC card reader in order
to conduct Web ATM transactions, they may take into consideration the potential transaction costs resulting
79
ISBN: 978-972-8939-51-9 © 2011 IADIS
from investing in and/or redeploying the transaction-specific asset. If users believe that the use of Web ATM
requires specific assets, their transaction cost of using Web ATMs increases, making them less likely to adopt
the systems. Thus, this study proposes the following hypothesis:
H4: Perceived asset specificity has a negative influence on Web ATM adoption.
3.5 Perceived Uncertainty
All transactions are conducted under a certain level of uncertainty. Uncertainty arises from imperfect
foresight and the human inability to solve complex problems associated with the transaction, which can be
regarded as the cost associated with the unexpected outcome and asymmetry of information (Williamson,
1985). TCT posits that the level of uncertainty is likely to affect whether a decision maker chooses to
insource or outsource (Watjatrakul, 2005). Wang (2002) found that uncertainty has a positive influence on
the contractor’s post-contractual opportunism as perceived by the client, but a negative influence on the
success of software outsourcing.
Perceived uncertainty in this study is defined as the extent to which the user believes that using Web
ATMs includes the possibility of security and privacy threats. Wang et al. (2003) suggest that users’
perception as to the extent to which Internet banking systems ensure that their transactions are conducted
without any breach of security and privacy protection is an important consideration that will affect Internet
banking use. Previous empirical studies also found that security and privacy concerns were a significant
antecedent of behavioral intention to use electronic/mobile banking systems (e.g., Liao & Cheung, 2002;
Wang et al., 2003; Luarn & Lin, 2005; Lee, 2009). Thus, it is expected that as the perceived uncertainty of
using Web ATMs increases, users’ adoption of Web ATM decreases. The following hypothesis is presented:
H5: Perceived uncertainty has a negative influence on Web ATM adoption.
3.6 Perceived Transaction Frequency
Transaction frequency refers to the frequency with which transactions recur (Williamson, 1985). Higher
transaction frequencies provide companies with a motive to employ hierarchical governance structures, as
these structures make it easier to recover large transactions of a recurring kind (Williamson, 1985; Teo,
Wang, & Leong, 2004). Many researchers have failed to confirm empirically that transaction frequency is
related to a choice of governance structure (e.g., Anderson, 1985; Malz, 1994; Rindfleisch & Heide, 1997).
While some studies investigating the factors that affect online shopping behavior chose to omit this construct
from their research models (e.g., Teo et al., 2004; Liang & Huang, 1998), when transactions are supposed to
occur at a high frequency, both transaction parties are likely to desire a specific or convenient platform to
deal with the repeated transactions. Thus, this study continues to explore the relationship between perceived
transaction frequency and Web ATM adoption behavior.
Perceived transaction frequency is herein defined as the extent to which the user perceives that he or she
has to frequently conduct banking transactions. Since Web ATMs enable bank customers to administrate
their bank accounts or conduct banking transactions without adhering to normal limitations associated with
time and location, it is expected that in order to reduce the transaction costs of banking, users with high
scores on perceived transaction frequency will have a higher propensity to adopt Web ATMs than those with
low scores. Thus, this study proposes the following hypothesis.
H6: Perceived transaction frequency has a positive influence on Web ATM adoption.
4. CONCLUSION
This study proposes an integrated model of IDT and TCT to explore and explain user adoption behavior of
Web ATM. Different from prior studies that focused mainly on investigating the factors affecting user
intention to use traditional Internet banking by TAM-based model, this study presents the factors influencing
the usage behavior of Web ATM by integrating IDT and TCT. Thus, this study represents three aspects of
extensions from previous online banking acceptance research, including context extension (i.e., from Internet
banking to Web ATM), theory extension (i.e., from TAM to IDT and TCT), and dependent variable
extension (i.e., from usage intention to usage behavior). Future researchers could conduct an empirical
80
IADIS International Conference e-Commerce 2011
validation of the proposed model. The proposed model will be able to provide a useful framework for bank
managers to assess, develop, and promote better user-acceptance of Web ATM systems. This study also
argues that banks could take advantage of Web ATM as a new, multi-channel service opportunity to increase
their service quality, customer satisfaction, customer retention, cost effectiveness, and online service
revenues.
REFERENCES
Aderonke, A., & Charles, A. (2010). An empirical investigation of the level of users’ acceptance of e-banking in Nigeria.
Journal of Internet Banking & Commerce, 15(1), 1-13.
Amin, H. (2009). An analysis of online banking usage intentions: An extension of the technology acceptance model.
International Journal Business and Society, 10(1), 27-40.
Anderson, E. (1985). The salesperson as outside agent or employee: A transaction cost analysis. Marketing Science, 4(3),
234-254.
Ang, S., & Straub, D.W. (1998). Production and transaction economies and IS outsourcing: A study of the U.S. banking
industry. MIS Quarterly, 22(4), 535-552.
Aubert, B.A., Rivard, S., & Patry, M. (1996). A transaction cost approach to outsourcing behavior: Some empirical
evidence. Information & Management, 30(2), 51-64.
Barney, J.B. (1999). How a firm’s capabilities affect boundary decisions. Sloan Management Review, 40(3), 137-145.
Bohmstedt, G.W. (1970). Reliability and validity assessment in attitude measurement. In G. F. Summers (Ed.). Attitude
Measurement. Chicago: Rand-McNally.
Burton-Jones, A., & Hubona, G.S. (2006). The mediation of external variables in the technology acceptance model.
Information & Management, 43(6), 706-717.
Chan, S.-C., & Lu, M.-T. (2004). Understanding Internet banking adoption and use behavior: A Hong Kong perspective.
Journal of Global Information Management, 12(3), 21-43.
Chang, H.H., & Rizal, M. (2010). An empirical investigation of Internet banking in Taiwan. Global Journal of Business
Research, 4(2), 39-47.
Chau, P.Y.K. (1996). An empirical investigation on factors affecting the acceptance of CASE by systems developers.
Information & Management, 30(6), 269-280.
Chau, P.Y.K., & Lai, V.S.K. (2003). An empirical investigation of the determinants of user acceptance of internet
banking. Journal of Organizational Computing and Electronic Commerce, 13(2), 123-145.
Chen, L.-D., Gillenson, M.L., & Sherrell, D.L. (2002). Enticing online consumers: An extended technology acceptance
perspective. Information & Management, 39(8), 705-719.
Cheng, T.C.E., Lam, D.Y.C., & Yeung, A.C.L. (2006). Adoption of internet banking: An empirical study in Hong Kong.
Decision Support Systems, 42(3), 1558-1572.
Coase, R.H. (1937). The nature of the firm. Economica, 4(16), 386-405.
Davis, F.D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS
Quarterly, 13(3), 318-339.
Erramilli, M.K., & Rao, C.P. (1993). Service firms’ international entry-mode choice: A Modified transaction-cost
analysis approach. Journal of Marketing, 57(3), 19-38.
Hair, J.F., Anderson, R.E, Tatham, R.L., & Black, W.C. (1998). Multivariate data analysis (5th Ed.). Upper Saddle
River, NJ: Prentice-Hall.
Heide, J.B. (1994). Interorganizational governance in marketing channels. Journal of Marketing, 58(1), 71-85.
Ho, C.B., & Wu, D.D. (2009). Online banking performance evaluation using data envelopment analysis and principal
component analysis. Computers & Operations Research, 36(6), 1835-1842.
Hsu, C.-L., Lu, H.-P., & Hsu, H.-H. (2007). Adoption of the mobile Internet: An empirical study of multimedia message
service (MMS). Omega, 35(6), 715-726.
Kamarulzaman, Y. (2007). Adoption of travel e-shopping in the UK. International Journal of Retail & Distribution
Management, 35(9), 703-719.
Kolodinsky, J.M., Hogarth, J.M., & Hilgert, M.A. (2004). The adoption of electronic banking technologies by US
consumers. The International Journal of Bank Marketing, 22(4), 238-259.
Lai, V.S., & Li, H. (2005). Technology acceptance model for Internet banking: An invariance analysis. Information and
Management, 42(2), 373-386.
Lawshe, C.H. (1975). A quantitative approach to content validity. Personnel Psychology, 28(4), 563-575.
81
ISBN: 978-972-8939-51-9 © 2011 IADIS
Lederer, A.L., Maupin, D.J., Sena, M.P., & Zhuang, Y. (2000). The technology acceptance model and the world wide
web. Decision Support Systems, 29(3), 269-282.
Lee, H.-H., & Kim, J. (2008). The effects of shopping orientations on consumers’ satisfaction with product search and
purchases in a multi-channel environment. Journal of Fashion Marketing and Management, 12(2), 193-216.
Lee, M.-C. (2009). Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived
risk and perceived benefit. Electronic Commerce Research and Applications, 8(3), 130-141.
Liang, T.-P., & Huang J.-S. (1998). An empirical study on consumer acceptance of products in electronic markets: A
transaction cost model. Decision Support Systems, 24(1), 29-43.
Liao, Z., & Cheung, M.T. (2002). Internet-based e-banking and consumer attitudes: an empirical study. Information &
Management, 39(4), 283-295.
Littler, D., & Melanthiou, D. (2006). Consumer perceptions of risk and uncertainty and the implications for behavior
towards innovative retail services: The case of internet banking. Journal of Retailing and Consumer Services, 13(6),
431-443.
Luarn, P., & Lin, H-H. (2005). Toward an understanding of the behavioral intension to use mobile banking. Computers in
Human Behavior, 21(6), 873-891.
Malz, A. (1994). Outsourcing the warehouse function: economic and strategic considerations. Logistics and
Transportation Review, 30(3), 245-265.
Moore, G.C., & Benbasat, I. (1991). Development of instrument to measure the perceptions of adopting an information
technology innovation. Information Systems Research, 2(3), 192-222.
Muniruddeen, L. (2007). An examination of individual’s perceived security and privacy of the Internet in Malaysia and
the influence of this on their intention to use E-commerce: Using an extension of the technology acceptance model.
Journal of Internet Banking & Commerce, 12(3), 1-26.
Rangaswamy, A., & Van Bruggen, G.H. (2005). Opportunities and challenges in multichannel marketing: An
introduction to the special issue. Journal of Interactive Marketing, 19(2), 5-11.
Rindfleisch, A., & Heide, J.B. (1997). Transaction cost analysis: past, present and future applications. Journal of
Marketing, 61(4), 30-54.
Rogers, E.M. (1983). The Diffusion of Innovation (3rd Ed.), New York: Free Press.
Rogers, E.M. (1995). The Diffusion of Innovation (4th Ed.), New York: Free Press.
Teo, T.S.H., Wang, P., & Leong, C.H. (2004). Understanding online shopping behavior using a transaction cost
economics approach. International Journal of Internet Marketing and Advertising, 1(1), 62-84.
Tornatzky, L.G., & Klein, K.J. (1982). Innovation characteristics and innovation adoption implementation: a metaanalysis of findings. IEEE Transactions on Engineering Management, 29(1), 28-44.
Tsai, W.-H., Huang, B.-Y., Liu, J.-Y., Tsaur, T.-S., & Lin, S.-J. (2010). The application of web ATMs in e-payment
industry: A case study. Expert Systems with Applications, 37(1), 587-597.
Wang, E.T.G. (2002). Transaction attributes and software outsourcing success: An empirical investigation of transaction
cost theory. Information Systems Journal, 12(2), 153-181.
Wang, Y.-S., & Liao, Y.-W. (2008). Understanding individual adoption of mobile booking services: An empirical
investigation. CyberPsychology & Behavior, 11(5), 603-605.
Wang, Y.-S., Lin, H.-H., & Luarn, P. (2006). Predicting consumer intention to use mobile service. Information Systems
Journal, 16(2), 157-179.
Wang, Y-S., Wang Y-M., Lin, H-H., & Tang, T-I. (2003). Determinants of user acceptance of Internet banking: An
empirical study. International Journal of Service Industry Management, 14(5), 501-519.
Watjatrakul, B. (2005). Determinants of IS sourcing decisions: A comparative study of transaction cost theory versus the
resource-based view. Journal of Strategic Information Systems, 14(4), 389-415.
Williamson, O.E. (1975). Markets and hierarchies, analysis and antitrust implications: A study in the economics of
internal organization. New York: Free Press.
Williamson, O.E. (1985). The economic institutions of capitalism: Firms, markets, relational contracting. New York: Free
Press.
Yiu, C.-S., Grant, K., & Edgar, D. (2007). Factors affecting the adoption of Internet Banking in Hong Kong—
implications for the banking sector. International Journal of Information Management, 27(5), 336-351.
82
IADIS International Conference e-Commerce 2011
USING MOBILE MESSAGING SERVICES IN EDUCATION:
DETERMINANTS OF STUDENTS’ ATTITUDES
Boonlert Watjatrakul
Department of Information Technology
Faculty of Science and Technology
Assumption University, Bangkok, Thailand 10240
ABSTRACT
The impressive use of mobile messaging services is spread into educational institutions. Many universities start using
mobile text messages to communicate with their students. The study empirically investigates factors affecting students’
attitudes toward using the university’s mobile messaging service. It employs the survey method using a structural
equation modeling technique to investigate inter-relationships among the study constructs in the anticipated model and
propose the modification model. The results show that students’ attitudes toward using the university’s mobile messaging
service are influenced by perceived utility, perceived control, social norm and existing knowledge about mobile
communication. Privacy concern and information seeking behavior, however, do not have statistically significant effects
on students’ attitudes toward the university’s mobile messaging service. The study fills the gap in literatures and assists
universities to manage their mobile messaging service effectively. The paper concludes with a discussion of implications
and limitations of the study.
KEYWORDS
Electronic commerce, Mobile commerce, Mobile messaging, Attitude, Education
1. INTRODUCTION
Currently, mobile messaging plays an important role for e-commerce firms. The global mobile messaging
market, including SMS (short messaging service), MMS (multimedia messaging service), mobile e-mail and
mobile IM (instant messaging), will reach USD 233 billion by the end of 2014. Among the mobile messaging
services, SMS yielded the highest revenue in 2009 and annual worldwide SMS traffic volumes will break 6.6
trillion in 2010 (Portio research, 2010). In addition, most people have their own mobile phones. E-commerce
firms, therefore, trend to use more mobile commerce by means of mobile messaging service to communicate
with and advertize their products or services to their customers. Mobile messaging is not only considerably
used in commercial firms but also gradually extended to educational institutions. Most universities perceive
the benefits of using mobile messaging services to enhance communication among university staff,
instructors and students. They trend to use SMS to contact their students. The mobile messaging provides
universities with cost effectiveness, flexibility, traceability and personalization. On the other hand, students
can receive the university’s messages anywhere and anytime.
The two common mobile messaging services used in educational institutions include direct messaging
and query messaging. The direct messaging send messages directly from universities to students’ mobile
devices. Its main objectives are to inform information update and ask questions. For examples, universities
can send messages to remind or change appointments, ask a reason for unauthorized absences, and inform
class cancellation and school closing (Watjatrakul and Barikdar, 2007). The query messaging uses an
automated responding system to send messages in response to the students’ query messages. To retrieved
content from the system, students must send a query message, pre-specified texts or numbers by the
universities, to match the value stored in the system. Students can query specific information such as their
grade release, class schedules and examination schedules from the automated responding systems via their
mobile phones. In general, the university’s mobile messaging services are free services for students;
83
ISBN: 978-972-8939-51-9 © 2011 IADIS
however, students should permit universities to send them messages by registering to the university’s
messaging system.
Previous studies attempted to understand the factors affecting consumer’s adoption of the firm’s mobile
commerce (e.g., (Sultan and Rohm, 2008; Wais and Clemons, 2008)). Limited research, however, has studied
student’s adoption of the university’s mobile messaging service. This study will fill this gap in literatures. In
addition, the communication of mobile message content can only be effective if message recipients permit
the continuous reception of messages on their mobile phone (Godin, 1999). It is important, therefore, to
understand what factors affect student’s attitudes toward receiving the university’s mobile messages.
Accordingly, this study develops the research model to understand the key drivers of students’ attitudes
toward using the university’s mobile messaging service. This study will enable universities to understand
students’ concerns about using their mobile messaging services and improve their services effectively.
2. FACTORS AFFECTING STUDENTS’ ATTITUDES TOWARD MOBILE
MESSAGING SERVICES
Almost every student in universities are using mobile messaging either SMS, MMS, mobile e-mail or mobile
instant messages. However, mobile messaging service is not well established in most educational institutions
in Thailand. As most students have not yet had the chance to use mobile messaging service from their
universities, the actual use of mobile messaging service in a university cannot be measured. Investigation of
students’ attitudes toward using mobile messaging service, therefore, is appropriated and practically valuable
for predicting usage behavior (Bauer et al., 2005). Attitude towards behavior is an individual’s belief of the
performing behavior and the individual’s subjective evaluation of the belief (Ajzen, 1991). The following
sections provide the anticipated factors affecting the students’ attitudes toward using the university’s mobile
messaging service and their inter-relationships.
2.1 Perceived Utility
Many academics posit that consumer’s perceptions of technology utility strongly influence their attitudes
toward using the technology (Davis, 1989; Taylor and Todd, 1995). When consumers perceive some benefits
in receiving advertising messages on their mobile phones, they are more likely to receive and read the
advertising messages (Kavassalis et al., 2003). The utilities of mobile commercial messages are commonly
defined as information, entertainment and social utilities (Bauer et al., 2005). Information utility refers to the
messages providing timely, useful and up-to-date information. Entertainment utility refers to the messages
providing the recipients with excitement and enjoyableness while social utility refers to the messages that
enable the recipients to demonstrate and share their innovativeness to their community (Bauer et al., 2005).
Unlike commercial messages, the university’s mobile messages are more focus on information utility rather
than entertainment and social utilities. It can be speculated that the higher the students’ perceived utility of
the university’s mobile messages, the more the students’ attitudes toward using the university’s mobile
messaging service.
H1: Perceived utility of the university’s mobile messaging service positively influences students’ attitudes
toward using the university’s mobile messaging service.
2.2 Perceived Control
Perceived control refers to people’s perceptions of their abilities to perform a given behavior or activity
(Jayawardhena et al., 2009). Under the theory of planned behavior, perceived control is not actual control but
the perception of control associated with psychological interest (Ajzen, 1991). Individuals have fully control
over technology when they can decide at will to perform it or not to perform it. If they lack control over it,
their attitudes toward using the technology are thwarted. In addition, individuals who are able to control the
innovative technology will trailer the technology to benefit themselves. Therefore, the more control over the
mobile service, the more perceived utility of the service.
84
IADIS International Conference e-Commerce 2011
H2: Perceived control over the mobile messaging service positively influences students’ perceived utility
of the university’s mobile messaging service.
The concept of perceived control is similar to self-efficacy that has been used to understand technology
adoption (Mathieson, 1991). In the mobile marketing area, the feeling of lack of control may prevent
consumers from participating in mobile marketing service (Jayawardhena et al., 2009). Accordingly, students
are more willing to use the university’s mobile messaging service, if they can control over the university’s
mobile messaging service. For example, students can control the number of messages they received, choose
the type of mobile messages (e.g., text, picture or video messages), select the message content to be received,
and cancel the permission to receive mobile messages. Therefore, the higher the student’s perceived control
over the mobile messages, the higher the students’ attitudes toward using the university’s mobile messaging
service.
H3: Perceived control over the mobile messaging service positively influences students’ attitudes toward
the university’s mobile messaging service.
2.3 Existing Knowledge
Existing knowledge affects the cognitive process of acceptance decision (Barutcu, 2007). Consumers’
existing knowledge about mobile communication determines their abilities to understand the features and
usage of mobile marketing services. According to the diffusion theory, technology complexity restrains the
use of the technology. When users perceived difficulty of using an innovative technology associated with
services, they are unlikely to adopt the services. In other words, consumers’ knowledge about mobile
communication services decreases the difficulty to use the services and increases positive attitudes toward the
services (Moreau et al., 2001). Accordingly, students familiar with the mobile communication technology are
more likely to use the university’ mobile messaging service.
H4: Existing knowledge about mobile communication positively influences students’ attitudes toward
using the university’s mobile messaging service
2.4 Information Seeking Behavior
Personal propensity to search and use information is an important construct in the analysis of consumer
behavior (Bauer et al., 2005). Although mobile messages can be personalized to individual preferences, the
personal relevance of the messages still relies on the individual propensity to search information. It has been
reported that individuals displaying a strong tendency towards information seeking behavior tend to exhibit a
high propensity to search and use new information (Raju, 1980) and it affect their attitude towards adopting
mobile marketing. Accordingly, individuals who seek information for their personal interests such as
information update and product comparison enjoy reading more informed messages via the mobile phone. It
can be inferred that students who prefer to search new information for their personal interests are more likely
to subscribe to the university’s mobile messaging service to receive university’s news update and specific
information such as exam schedule and grade release.
H5: Information seeking behavior positively influences students’ attitudes toward using the university’s
mobile messaging service.
In addition, information seeking behavior is related to individual propensity to search information for new
knowledge (Bauer et al., 2005). In relation to mobile communication, individuals having a strong information
seeking behavior have a tendency to acquire information for knowledge update about mobile communication
and, hence, enhance their knowledge about mobile communication.
H6: Information seeking behavior positively influences students’ existing knowledge about mobile
communication.
2.5 Privacy Concern
Consumer’s privacy is perceived as the main risk of mobile commerce (Mitchell, 1999). Mobile medium
enables businesses to reach consumers anytime and anywhere. This creates the potential of risk associated
with privacy concern. The recipient’s phone number might be misused by a sender such as sending unwanted
advertising messages or giving the phone numbers to others. As the mobile messaging service is new for
85
ISBN: 978-972-8939-51-9 © 2011 IADIS
university students, students lack of experience with this new service and find themselves in a situation of
high risk of privacy infringement. Using the university’s messaging service, students are aware of receiving
too many messages, unwanted messages or repeated messages from their universities or unauthorized
senders. Students therefore try to reduce these risks associated with personal privacy resulting in the tendency
to deny the university’s mobile messaging service.
H7: Privacy concern negatively influences students’ attitudes toward using the university’s mobile
messaging service.
2.6 Social Norm
Social norm refers to the normative beliefs concerning the expectation from other people (Ajzen, 1991).
Individuals are motivated by other expectations to approve or disapprove of their performing a given
behavior. In case of technology adoption, social norm associates with the motivations of individuals who
believe they should use technologies for positioning themselves in a reference group (Igbaria 1993).
Individuals, therefore, tend to adopt technology to gain acceptance from their community (Hsu and Lu,
2004). Accordingly, students are more likely to use the university’s mobile messaging service, if others in
their community (e.g. friends, instructors) perceive that the service is valuable for them.
H8: Social norm positively influences students’ attitudes toward using the university’s mobile messaging
service.
In summary, the factors affecting students’ attitudes toward the university’s mobile messaging service
and their inter-relationships can be depicted in Figure 1.
Perceived
Control
H2
Perceived
Utility
H3
Existing
Knowledge
H6
Information
Seeking
H4
H5
H1
Attitudes
toward the
university’s
MMS
H8
Privacy
Concern
H7
Social
Norm
Figure 1. The anticipated model
3. METHODOLOGY AND RESULTS
The self-administered questionnaire used as the survey instrument was developed and adapted from the
previous literatures (Jayawardhena, 2009; Bauer et al., 2005; Shimp and Kavas, 1984; Raju, 1980). It
consisted of two sections. The first section contained the statements aimed at addressing the study
hypotheses. The second section requested the respondents’ biographic details. Respondents had to indicate
their agreement with the statements using a five-point Likert scale (1=strongly disagree, 5=strongly agree).
Two hundred and sixty seven students at two universities participated in this survey but only two hundred
and fifty seven questionnaires were usable, giving a response of 96.25 %. This high response rate resulted
from the questionnaires being administered in the class rooms. The usable data at 257 were higher than a
‘critical sample size’ of 200 to provide sufficient power for data analysis using the structural equation
modeling technique (Garver and Mentzer, 1999; Barrett, 2007). Most respondents are Thai (75.5%) and their
ages are between 18 and 24 years (82%). 60 % of respondents are males and 10% of them have never
received any mobile advertising messages.
To check unidimensionality, the principal component factor analysis with varimax rotation was
performed. Items with factor loading values lower than 0.5 were abandoned from further analysis. The results
show that seven eigenvalues are greater than one, suggesting seven extractable factors. Table 1 indicates all
items load above 0.65 on their respective factors, attesting convergent and discriminant validities of each
86
IADIS International Conference e-Commerce 2011
factor (Campbell and Fiske 1959). In addition, internal consistencies (Cronbach’s alpha, α) of the factors are
above 0.75, indicating a reasonably good reliability.
Table 1. Factor loadings and reliabilities
Factors
Perceived utility (PU)
Loadings
.840
.857
.817
.811
.801
.817
.680
.854
.842
.853
.864
.849
Existing knowledge (EK)
Information seeking (IS)
Social influence (SI)
Cronbrach’s α
.895
Factors
Perceived
control (PC)
.766
Privacy
concerns (PR)
.867
Attitudes
toward using
MMS (AT)
Loadings
.816
.848
.751
Cronbrach’s α
.804
.824
.877
.797
.793
.793
.744
.807
.857
.797
The Confirmatory Factor Analysis (CFA) utilizing the Maximum Likelihool estimation method was
conducted with the AMOS (version 18) package. The results shown in Figure 2 indicate that all respective
factors excluding privacy concern and information seeking behavior provide significant effects on designated
factors (H1-4, H6 and H8 are accepted). Privacy concern on receiving the university’s mobile messages and
information seeking behavior show no significant effects on students’ attitudes toward using the mobile
messaging service from the university (H5 and H7 are rejected). Information seeking behavior, however, has
a significant effect on students’ knowledge about mobile communication.
Fit indices of the anticipated model provide a reasonable model’s fit. Goodness-of-Fit Index (GFI) is
0.869 which is slightly below the acceptable threshold at 0.9 (Graver and Mentzer, 1999). Root Mean Square
Error of Approximation (RMSEA) is .066 slightly above the acceptable threshold at 0.05 for a good model’s
fit (Hoe, 2008). In addition, Non-Normed Fit Index (NNFI), Comparative Fit Index (CFI), Incremental Fit
Index (IFI) and Minimum Discrepancy per Degree of Freedom (χ2/df) are at .910, .922, .923 and 2.114
respectively, indicating a good fit of the model (Steiger, 1990; Graver and Mentzer, 1999; Hoe, 2008).
PC1
. 80
PC2
. 83
PC3
. 66
PC1
PU 1
PC
.83
. 46**
PR1
PR2
PU 2
.87
. 68
PU
. 87
.77
PC2
PC3
PU1
.80
.83
.82
PC
.44**
.86
PU
.67
.83
.25**
.20*
PU 3
PU 4
. 28**
. 74
EK1
.74
PU4
EK2
.83
.58
PR3
.45**
.04
. 74
E K1
AT 1
. 72
E K2
. 85
E K2
. 62
EK
.23*
. 79
AT
. 81
.57 **
IS1
IS2
IS3
.12
. 86
EK2
SN
.26**
IS2
AT2
SN 2
IS3
AT3
.24**
.77
IS
.86
.43**
.88
. 85
* p<. 01, ** p < . 00 1
Figure 2. Results of the anticipated model
SN1
SN
.75
.69
AT1
.62
.63
.60**
SN 1
AT
.61
AT 3
IS1
.96
IS
AT 2
.24*
. 77
EK
PU3
.41**
.83
PR
PU2
.77
.85
SN2
* p < .01, ** p <.001
Figure 3. Results of the final model
Re-specified models were tested to find the best fit model. The final model omits the insignificant
relationships appeared in the anticipated model and adds two significant relationships; the relationships
between existing knowledge and perceived control and between information seeking behavior and social
87
ISBN: 978-972-8939-51-9 © 2011 IADIS
norm. Figure 3 shown above indicates that all causal relationships of the final model are statistically
significant.
Fit indices of the final model are improved indicating that the final model fits the empirical data better
than the anticipated model. Table 2 compares the important fit indices (GFI, NNFI, CFI, IFI, RMSEA and
χ2/df) of the final model and those of the anticipated model. It shows that all fit indices of the final model
provide a better model’s fit.
Table 2. Comparison of the model’s fit indices
Fit Indices
Goodness-of-Fit Index (GFI)
Non-Normed Fit Index (NNFI)
Comparative Fit Index (CFI)
Incremental Fit Index (IFI)
Root Mean Square Error of Approximation (RMSEA)
Minimum Discrepancy per Degree of Freedom (χ2/df)
Threshold
>.90
>.90
>.90
>.90
<.05
< 3.0
Value (anticipated
model)
.869
.910
.922
.923
.066
2.114
Value (final
model)
.922
.957
.965
.965
.050
1.641
4. DISCUSSION
According to the anticipated model, the study found that perceived utility, perceived control, knowledge of
mobile communication and social norm have statistically significant effects on students’ attitudes toward
using the university’s mobile messaging service. Perceived utility of mobile messages in terms of timely, upto-date, and customized messages is perceived by students as a key factor to use the university’s mobile
messaging service [H1]. Students have positive toward using the university’s mobile messaging service when
they perceive that they are able to control the service such as selecting the types of messages received (i.e.,
text, video message), controlling the number of messages received or cancelling the permission to send the
university’s mobile messages [H3]. When students are able to control the messaging service, they can
customize the service to fit their needs [H2]. Moreover, students having knowledge about mobile
communication have positive attitudes toward using the university’s mobile messaging service [H4]. This
knowledge is significantly influenced by their personal information seeking behavior [H6]. The study also
indicates that social norms affect students’ attitudes toward using the university’s mobile messaging service
[H7]. Students, therefore, are motivated by other persons’ expectations to support their attitudes toward using
the university’s mobile messaging service.
Importantly, this study found that privacy concern and information seeking behavior that have been tested
for user’s adoption of mobile messaging service in the business context (commercial messages) do not fully
apply to the adoption of the mobile messaging service in the education context. Students do not have
significant concerns about privacy intrusion bothering them to use the university’s messaging service [H7].
Perhaps, students believe their universities will not send unnecessary or duplicated messages through their
mobile phones. In other words, when the recipients trust the message senders, their privacy concerns about
the sender’s messages will be decreased. The results also show that information seeking behavior does not
have a significant effect on the students’ attitudes toward using the university’s mobile messaging service
[H5]. In this light, students may perceive that information of the university’s mobile messages (e.g.,
university news, student’s grade and class schedule) is also available in other communication channels
including the university’s web site, email and newsletter. It is not necessary, therefore, to use the university’s
mobile messaging service to get the same or even less information. This implies that the university’s mobile
messaging service is perceived by students as a new communication channel for the university to deliver
them information.
According to the final model, the significant associations among multiple predictors and the students’
attitudes toward using the university’s mobile messaging service provided in the anticipated model are
remained. To make a better fit of the anticipated model, two significant relationships between the existing
constructs are added. First, information seeking behavior statistically affects social norms. Students
displaying a strong tendency towards information seeking behavior tend to listen to other persons to support
their decisions. Second, existing knowledge about mobile communication statistically affects the perceived
88
IADIS International Conference e-Commerce 2011
control over the mobile services. The more the students are familiar with mobile communication technology,
the more the students want to gain control over the university’s mobile messaging service. For example,
students want to be able to select the types of messages or cancel their permissions for the universities to
send mobile messages because they know that the mobile technology capabilities can respond to their wants.
5. IMPLICATIONS AND LIMITATIONS
The study has theoretical and practical implications. This study fills the gap in literatures by providing the
model to understand factors affecting students’ attitudes toward the university’s messaging service. The
model suggests that some factors affecting consumers’ attitudes towards the mobile commercial services (in
previous studies) are not always apply to the mobile education services. For practical implications, the study
provides guidance for universities to increase students’ attitudes toward using the university’s mobile
messaging service. According to the perceived utility’s effects, universities ought to send mobile messages
perceived by students and their colleagues as useful and gratitude information. A survey may be periodically
used to examine whether students’ satisfaction with the university’s mobile messages. In terms of the
perceived control’s effects, students should be able to cancel their mobile messaging service if they do not
want to receive any future messages. The university may offer students with the opt-out method by sending a
unsubscribe message to the particular number. According to the social norm’s effect, university instructors
and staff should encourage students to use the university’s mobile messaging service as people who are
important to students have significant affect students’ attitudes toward using the services. Instructors may
encourage their students to register for the university’s mobile service to easily obtain their grades and check
their exam schedule.
Although the study empirically tests several key factors affecting students’ attitudes toward using the
university’s mobile messaging service, there are some significant limitations. The generalizability of the
findings might be questioned as the data were only collected at two universities and nonrandom samples.
Future research should reexamine the respective constructs and their inter-relationships. Some additional
factors such as culture of mobile service usage, language and the readiness of mobile messaging technology
may influence students’ attitudes toward the university’s mobile messaging service when the research model
is applied to some particular circumstances (i.e., developing vs. developed country, native- vs. multilanguage university environment). In addition, the study focused on a text messaging service that currently
dominates the mobile messaging market (Poritio research, 2010). Other mobile messaging services including
multimedia messaging service (MMS), mobile e-mail and mobile instant messaging (IM), however, will soon
be used more by students. Future research, therefore, should apply the research model to examine other
mobile messaging services.
6. CONCLUSION
The study aims to understand factors affecting students’ attitudes toward using the mobile messaging service
in the education context. It employs the structural equation modeling (SEM) technique to examine interrelationships among the study constructs derived from the previous studies in the mobile commerce area. The
results show that some factors affecting consumers’ attitudes toward using mobile commercial messages do
not affect students’ attitudes toward using the university’s mobile messages. The study model indicates that
perceived utility, perceived control, social norm and personal existing knowledge about mobile
communication have effects on students’ attitudes toward using the university’s mobile messaging service.
Privacy concern and information seeking behavior do not have direct effects on students’ attitudes toward
using the university’s mobile messaging service. The implications of this study enable universities to
understand students’ adoption of their mobile messaging services and manage their mobile messaging
services effectively.
89
ISBN: 978-972-8939-51-9 © 2011 IADIS
REFERENCES
Ajzen, I. 1991. The theory of planned behavior, Organizational Behavior and Human Decision Processes, Vol. 50, pp.
179-211.
Barrett, P. 2007. Structural Equation Modeling: Adjudging Model Fit, Personality and Individual Differences, Vol.42,
pp. 815–824.
Barutcu, S. 2007, Attitudes towards Mobile Marketing Tools: A Study of Turkish Consumers, Journal of Targeting,
Measurement and Analysis for Marketing, Vol. 16, No. 1, pp. 26-38.
Bauer, H.H., Reichardt T., Barnes S.J. and Neumann, M.M. 2005, Driving Consumer Acceptance of Mobile Marketing:
A Theoretical Framework and Empirical Study, Journal of Electronic Commerce Research, Vol. 6, No.3, pp. 181192.
Campbell, D.T. and Fiske, D.W. 1959. Convergent and Discriminant Validation by the Multitrait-Multimethod Matrix,
Psychological Bulletin, Vol. 56, pp. 81-105.
Davis, F.D. 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS
quarterly, Vol.13, pp.319-339.
Garver, M.S. and Mentzer, J.T. 1999. Logistics Research Methods: Employing Structural Equation Modeling to Test for
Construct Validity, Journal of Business Logistics, Vol. 20, No. 1, pp.33-57
Godin, S. 1999. Permission Marketing: Turning Strangers into Friends, and Friends into Customers, Simon & Schuster,
New York, USA.
Hoe, S.L. 2008. Issues and Procedures in Adopting Structural Equation Modeling Technique, Journal of Applied
Quantitative Methods, Vol. 3, No. 1, pp. 76-83.
Hsu, C.L. and Lu, H.P. 2004. Why do People Play On-line Games? An Extended TAM with Social Influences and Flow
Experience, Information & Management, Vol. 7, pp. 853-868.
Hu, P.J. Cheng, Y.K. Sheng O.L. and Tam, K.Y. 1999. Examining the Technology Acceptance Model Using Physician
Acceptance of Telemedicine, Journal of Management Information Systems, Vol. 6, pp. 91-112.
Igbaria, M. 1993. User Acceptance of Microcomputer Technology: An Empirical Test, Omega, Vol. 21, pp. 73-90.
Jayawardhena, C. Kuckertz A., Karjaluoto, H. and Kautonen, T. 2009. Antecedents to Permission Based Mobile
Marketing: An Initial Examination, European Journal of Marketing, Vol. 43, No. 3/4, pp. 473-499.
Kavassalis, P., Spyropoulou, N., Drossos, D. Mitrokostas, E., Gikas, G. and Hatzistamatiou, A. 2003. Mobile Permission
Marketing: Framing the Market Inquiry, International Journal of Electronic Commerce, Vol. 8, No. 1, pp.55-79.
Mathieson, K. 1991. “Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of
Planned Behavior,” Information Systems Research, Vol. 2, No. 3, pp. 173-191.
Mitchell, V.W. 1999. Consumer Perceived Risk: Conceptualizations and Models, Journal of Marketing, Vol. 33, No. 1,
pp.163-196.
Moreau, P.C., Lehmann, D.R. and Markman, A.B. 2001. Entrenched Knowledge Structures and Consumer Response to
New Products, Journal of Marketing Research, Vol. 38, No. 1, pp. 14-30.
Portio Research Report, 2010. Mobile Messaging Futures 2010-2014: Analysis and Growth Forecasts for Mobile
Messaging Markets Worldwide, pp. 355.
Raju, P.S. 1980. Optimum Stimulation Level: Its Relationship to Personality, Demographics, and Exploratory Behavior,
Journal of Consumer Research, Vol. 7, No. 4, pp. 272-282.
Shimp, T.A. and Kavas, A. 1984. The Theory of Reasoned Action Applied to Coupon Usage, Journal of Consumer
Research, Vol. 11, No. 3, pp. 795-809.
Steiger, J.H. 1990. Structural Model Evaluation and Modification: an Interval Estimation Approach, Multivariate
Behavioral Research, Vol. 25, pp.173-180.
Sultan, F. and Rohm, A.J. 2008. How to Market to Generation Mobile, MIT Sloan Management Review, Vol. 49, No. 4,
pp. 34-41.
Taylor, S. and Todd, P.A. 1995. Understanding Information Technology Usage: a Test of Competing Models,
Information Systems Research, Vol.6, pp. 144-174.
Wais, J.S. and Clemons, E.K. 2008. Understanding and Implementing Mobile Social Advertising, International Journal
of Mobile Marketing, Vol. 3, No. 1, pp.12-18.
Watjatrakul, B. and Barikdar, L.A. 2007. E-service in Education: The Influences of Media Richness, Social Presence,
Privacy and Technology Acceptance Model on Email Adoption. Proceedings of International Conference on eBusiness, Bangkok, pp. 34-41.
90
IADIS International Conference e-Commerce 2011
INTRODUCING MOBILE SERVICES TO DEVELOPING
COUNTRIES - A SOUTH AFRICAN PERSPECTIVE
Dr. Carolin Löffler and Michael Hettich
Institute of Information Systems
University of Erlangen-Nuremberg, Lange Gasse 20, 90403 Nuremberg, Germany
ABSTRACT
Globally acting service providers are often presented with the challenge how to evaluate a potential market for their
business. Similar models build on a general approach but fail to include the service-specific requirements of the vendor.
This study thereby creates an assessment scheme that evaluates a market for its capability to adopt a mobile service. This
scheme is based on the widely known e-readiness rankings which measure the degree to which a country is ready to
obtain benefits by using information and communication technology.
The created framework is then tested by evaluating the South African environment and whether providing a mobile
loyalty service is feasible in this country. The study also shows how the service has to be modified to raise the probability
of adoption.
Conclusions of the work are as follows: South Africa has shown to be a possible country for the introduction of mobile
services. However, certain modifications (e.g. mobile website access, SMS option) for the targeted service have been
identified as critical success factors.
KEYWORDS
Mobile services, mobile service adoption, m-readiness, mobile loyalty, South Africa
1. INTRODUCTION
Every successful service provider has to deal with the issue of developing a suitable growth strategy. This
strategy involves a qualified, long-term, global performance plan to achieve corporate objectives (Haller
2002).
Haller points out two core questions:
1. On which markets does the service provider want to compete with which services?
2. What competitive advantage distinguishes the provider from others?
In order to answer the first question, the service provider needs a way to select markets according to their
economic attractiveness. An evaluation of the market helps the key decision makers to avoid markets where
their value proposition is likely to fail.
The service lifecycle model (Figure 1) provides a comprehensive understanding of service development
in general. The model helps us to identify the important steps for the re-engineering of a service for an
international context. In order to create a strategy for the international adoption and expansion of the service,
the requirements clearly have to be reconsidered (Figure 1, A). The objective here is to create an assessment
scheme that shows the determinants that affect the adoption in the market. The collected environmental data
is then being used to redesign the service concept and adapt it to these newly found requirements (Figure 1,
B). If necessary, the service is adjusted to improve the value proposition and increase the adoption rate. This
might also imply other variants that need to be technically designed and implemented to enable the service
delivery (Figure 1, C). This article focuses on the requirements definition – the firste step of the service reengineering. There are no existing frameworks that target that specific step. All existing frameworks focus
mainly on general electronic readiness of countries (Dada 2006). But service provider still struggle at
introducing mobile services (Bouwman et al. 2009). Therefore the aim of this article is to create a framework
that enables the assessment of countries in regards to any mobile service. The developed assessment
91
ISBN: 978-972-8939-51-9 © 2011 IADIS
framework is then applied to the business environment of South Africa considering the mobile loyalty service
mBonus.
Service
re-engineering
B
Finding and
assessing ideas
Define
requirements
Design
Implementation
Service
Delivery
Replacement
C
A
Service
creation
Service
engineering
Service
management
Figure 1. Service lifecycle model
2. MOBILE LOYALTY SERVICE MBONUS
mBonus is a service for consumers to collect loyalty points at retailers using their mobile phones. After
reaching a certain amount of loyalty points (loyalty points cannot be traded between shops) the consumer
receives a bonus (e.g., one coffee for free) and the collection process starts over again. All relevant data is
accessed via the iphone and stored on a central server instead of a plastic or paper-based card. The system
especially meets the needs of small and medium-sized companies. Retailers gain a competitive advantage and
improve customer relationship management by analyzing consumer data. mBonus is strongly based on
permission marketing to foster customer acceptance. Communication with consumers is customized
according to their individual preferences. The current mBonus service is developed for the German market
(Löffler and Bodendorf 2010).
3. M-READINESS
3.1 Framework Development
When designing a mobile service for a country (or a set of countries), several requirements have to be
analyzed to indicate whether this offering can actually provide value in the given environment.
Some of these indicators provide additional input for the later phases of service design and help to adjust
the critical design issues that can mitigate the negative effects of the environment.
In order to get a more structured view of the environment, the benchmarking framework “E-Readiness”
(Electronic Readiness) was used in this study. It measures the degree to which a country, nation or economy
is ready, willing or prepared to obtain benefits by using information and communication technologies (ICTs)
(Dada 2006). These indices are used to compare countries by summarizing a broad set of characteristics for a
given nation. E-readiness assessments are conducted yearly by various organizations such as the United
Nations Public Administrations Network (UNPAN), the World Bank and the Economist Intelligence Unit1
(EIU). This study is referring to the EIU version because most of the data is publicly available.
In 2010, they renamed these “e-readiness rankings” to “digital economy rankings” to reflect the
increasing influence of ICT in economic and social progress. In fact, they claim that virtually all countries in
the report have already achieved “e-readiness” to one degree or another (Economist Intelligence Unit 2010).
Most countries that are not reflected in the report are suffering from the so-called “global digital divide”:
This humanitarian issue describes the fact that receiving, downloading and sharing information is seen as
fundamental human right such as jobs, shelter, food, healthcare and drinkable water. People that are not able
1
The “Economist Intelligence Unit” is the business information arm of “The Economist Group” which also publishes “The Economist”.
92
IADIS International Conference e-Commerce 2011
to participate in this digital experience are being hindered in their development. For example, Finland (4th in
the EIU rankings, 85% of population have internet at home) has already gone so far to pass a bill to enshrine
internet access as a human right, whereas countries such as Congo (not listed in EIU, 0.1% of population
have internet at home) are still poles apart from this state2. This situation is leads the focus of this assessment
is on the transfer of a mobile service from a developed country to an emerging or developing country.
Differences in terms of infrastructure, business opportunities and political stability tend to be negligible when
comparing two developed countries, giving minimal input to adjust the service to the market.
Table 1 shows the e-readiness criteria that are divided into six categories.
Table 1. Subcategories of e-readiness and m-readiness
2
Categories
E-readiness EUI subcategories
Modified m-readiness subcategories
Connectivity
and
technology
infrastructure
Broadband quality
Broadband affordability
Mobile phone penetration
Mobile quality
Internet user penetration
International Internet bandwidth
Internet security
Mobile phone access
Smart phone penetration
Feature phone penetration
Basic phone penetration
Mobile quality
Internet user penetration
Mobile internet user penetration
International Internet bandwidth
Business
environment
Overall political environment
Macroeconomic environment
Market opportunities
Policy towards private enterprise
Foreign investment policy
Foreign trade and exchange regimes
Tax regime
Financing
Labor market
Overall political environment
Macroeconomic environment
Market opportunities
Policy towards private enterprise
Foreign investment policy
Foreign trade and exchange regimes
Tax regime
Financing
Labor market
Social and
cultural
environment
Educational level
Internet literacy
Degree of entrepreneurship
Technical skills of workforce
Degree of innovation
Educational level
Digital literacy
Degree of entrepreneurship
Technical skills of workforce
Degree of innovation
Legal
environment
Effectiveness of traditional legal framework
Ease of registering a new business
Laws covering the Internet
Level of censorship
Electronic ID
Effectiveness of traditional legal framework
Ease of registering a new business
Laws covering the Internet
Level of censorship
Restrictions on technology standards
Government
policy and
vision
Government spending on ICT as proportion of GDP
Digital development strategy
E-Government strategy
Online procurement
Availability of public services for citizens
Availability of public services for businesses
E-Participation
Government spending on ICT as proportion of GDP
Digital development strategy
E-Government strategy
Online procurement
Availability of public services for citizens
Availability of public services for businesses
E-Participation
Consumer
and business
adoption
Consumer spending on ICT per head
Level of e-business development
Use of Internet by consumers (e-business)
Use of online public services by citizens
Use of online public services by businesses
Consumer spending on mobile services per head
Use of mobile services
Popularity of similar services
Fuchs and Horak (2008) suggest various solutions to bridge the digital divide.
93
ISBN: 978-972-8939-51-9 © 2011 IADIS
In this study each e-readiness category and its subcategories has been evaluated according to the adoption
of a mobile service. Within this process, further criteria have been introduced and others have to be removed
if they are not relevant for the adoption process3.
The result is a mobile service readiness4 assessment scheme to evaluate the readiness of a given country
to adopt a mobile service.
In our study we figured out that the importance of the categories “Business environment”, “Government
policy and vision” and other subcategories remain important for assessing the environment in order to
introduce a mobile service. Those categories were not changed in this study. Hence, this article concentrates
only on the modified and adjusted subcategories.
Connectivity and technology infrastructure: Mobile phone penetration is usually measured by the number
of subscriptions per 100 people. It is crucial to exactly define “subscriptions” in this matter: Some
measurements only use the number of (post-paid) contracts (ITU 2003) which are obtainable from cell
providers, as it is done in the EIU rankings. However, this does not include pre-paid SIM (Subscriber
Identity Module) cards which are almost exclusively used in developing countries (James and Versteeg
2006). In this environment, people also often share phones and/or SIM cards because they are not able to
afford a mobile device themselves. In least developed countries, people build even build a business model
upon this approach: They rent out mobile phones, similar to phone booths for fixed lines. This usage
behavior means that the actual penetration rate is even higher than the “subscription” value suggests (James
and Versteeg 2006). Based on these observations, mobile phone penetration is replaced with mobile phone
access in the m-readiness assessment. Another indicator within the environment that has an obvious
influence on the mobile service is the presence of various models and the functionality that come with them.
However, the number of available models on the market is extremely high and each model is able to perform
many different functions. In order to reduce this complexity for the assessment, a three-fold classification is
used in this study (partially based on Admob 2010): Smartphones, feature phones and basic phones. For
people in developing countries, mobile browsing is very often the primary way of accessing the Internet
(Rice and Katz 2003). Computers and electricity are scarce in rural areas which makes mobile phones with
long lasting batteries vital. This shows the importance of offering services for the internet as well as a mobile
version that is customized to the properties of smart phones and feature phones. To reflect this in the mreadiness assessment, the additional factor mobile internet user penetration is added which indicates how
much of the population is already using the internet on a mobile device.
Social and cultural environment: Besides using demographics as indicator for the social and cultural
environment category, assessing the level of mobile literacy requires extensive research of people and their
mobile usage patterns by using qualitative and quantitative methods (Hargittai 2005). Since more profound
research in this direction still needs to be conducted, the more general indicator “digital literacy” is used in
the m-readiness assessment. This is based on the assumption that whoever is able to use the internet, will also
be able to use a mobile phone. However, feature revisions of the mobile readiness assessment might be able
to utilize more sophisticated statistics in terms of mobile usage and then introduce a mobile literacy indicator.
Legal environment: In terms of information technology, many countries are more restrictive from the
beginning and do not allow certain technologies to be deployed which are already used in most other
countries. Egypt, for example, had banned the commercial use of the global positioning system (GPS). Many
mobile phones such as the Apple iPhone, Nokia N95 or the Blackberry Torch have built-in GPS and were not
allowed to be imported or used in this country (Elyan 2008) which slowed down the adoption of mobile
services for many years. China does not allow devices that do not support their own wireless standard
“WAPI” (Wireless Authentication and Privacy Infrastructure). This was the reason why Apple introduced the
iPhone in China as late as 2009 since they had to create a special variant that includes the WAPI protocol
(Fletcher 2010). These government restrictions can significantly impede the adoption of a mobile service and
therefore have to be investigated during the environment assessment. This is reflected in the “restrictions on
technology standards” indicator.
Consumer and business adoption: Whereas connectivity, business, social, cultural and the legal
environment indicate whether a mobile service can potentially be successful in a country, this category
3
The evaluation uses various assumptions to correlate the findings from the environment assessment with the adoption of the mobile
service. These assumptions are necessary since there is almost no research existing in this field. Further studies could look exclusively at
each of these categories and approve or disprove these assumptions.
4
After now referred to as “m-readiness”.
94
IADIS International Conference e-Commerce 2011
scrutinizes existing implementations and their adoption by people and companies. The e-readiness scores put
high emphasis on the extent to which a country’s citizens engage in the use of the internet and online
services. Similar to this approach, the m-readiness assessment aims to gather data on how much consumer
spend on mobile services. Additionally the m-readiness assessment comprises the usage of mobile services
in general and the popularity of similar mobile services in the country. If a mobile service aims to replace
or supplement an existing service, it is necessary to analyze its success and its drivers. The service design has
to take this knowledge into account and can build on the existing success but needs to create additional value
to achieve adoption of the newly designed service.
3.2 Mobile Loyalty Service Assessment for South Africa
South Africa (SA) has undergone a remarkable transition since the end of the apartheid regime in 1994.
Before that year, the country’s economy was dominated by the white minority and blacks remained without
basic political and economic freedoms. Since then, SA has gained stability and turned itself into one of the
emerging markets with the lowest risk spreads (Rodrik 2008).
After being selected to host the FIFA World Cup 2010, even more eyes were directed at the country at the
tip of the “black continent”. The following years will need to show whether SA can maintain the momentum
and generate more growth after this milestone event.
In the mobile field, South Africa has definitely already gained momentum over the last ten years.
Whereas a mere 23% of the population was listed as mobile subscribers in 2001, this number climbed to 92%
in 2009 (ITU 2010).
Another growing market can be found in loyalty programs, which is seen in a “pre-millennium stage
relative to others” (Deon 2007). Deon also mentions that the key to this market could be the increase of
mobile access within the population.
These facts underline why South Africa presents an optimal opportunity to introduce the mobile loyalty
service mBonus in a developing environment.
The following m-readiness assessment further analyzes this environment according to the structure
defined in chapter 3.1. Qualitative research in the form of semi-structured interviews was used to gather
additional data from small and micro-sized enterprises in Cape Town. In a further study this data was used to
conduct the service design and maximize economic and consumer value.
Connectivity and technology infrastructure: A recent report by the ITU (ITU 2010) states a 10.7:1 ratio of
mobile subscribers to fixed lines and a 92.67% of the population being mobile subscribers. Other data by
Teleography (Teleography) used in the article “Mobil in Afrika” (Sokolov 2008) confirms this. A factor that
is not reflected in the above figure is the number of people who neither own a cell phone nor own an active
SIM card but share a phone with someone else, for example within the family. This behavior tends to be very
common especially in poor areas of the country (Scott et al. 2005). This high mobile phone penetration in
combination with the above mentioned “culture of sharing” leads to the assumption that in South Africa a
100% penetration of mobile users can be expected. By 2014 it is expected that every mobile phone sold in
South Africa will be a smart phone (Inggs 2009), a mere 0.2% of the population owned an iPhone in June
2010 (Macforrest.com). Smart phones will become more important in this market, but they are currently only
used by a fraction of the population. In general, detailed data on handset penetration by type is rarely
available. Admob (2010) shows that although Nokia has a 23% worldwide share, they account for more than
two thirds of the devices used in Africa. Nokia’s advantage in this market is their focus on feature- and basic
phones that have shown their advantage in developing countries during the past decade (Lindholm et al.
2003). Their low-end devices (e.g. Nokia 1100, Nokia 3310, and Nokia 1600) are popular in South Africa
(Kreutzer 2009) because they are very affordable in combination with a pre-paid subscription. A good
indicator to assess the number of active feature phones in the South African market is the user number of
active MxIt users, the popular mobile communication service. The service has gathered more than 10 Million
registered users in SA (Mobile Industry Review 2009) and is rumored to have reached the 15 Million mark in
2010. Although some users are actually not aware of it, every phone that supports MxIT also supports the
mobile Internet, since it is using the mobile data network to communicate with their servers. Considering
these numbers, a mobile service needs to target the feature phone segment and offer an alternative for basic
phone users in order to reach a broad audience in this environment. A study conducted by technology
research group “world wide worx” on mobile internet penetration found out: Although 60% of users in the
95
ISBN: 978-972-8939-51-9 © 2011 IADIS
market have internet-capable phones, only 21% report that they use this form of access (World wide worx
2010). According to the study, many people either don’t know how to use it or they are not aware that they
are using it because they are only accessing it through a branded application (e.g. MxIT, Facebook). Others
seem to be too concerned of the costs (World wide worx 2010). With decreasing costs and improved usability
through technology lifecycles, the mobile internet penetration could rise to 15 Million users over the next
years making it an important target for mobile marketers as well as the mobile loyalty service provider.
Business environment: Still recovering from the apartheid regime, the distribution of income in SA is
among the most unequal in the world. The level of relative affluence is equal to any country in the developed
world but also the amount of poverty is at a point where it is usually associated with developing countries
(Economist Intelligence Unit, 2008b, p. 19). The South African Department for Trade and Industry (DTI)
praises the country for being the “economic powerhouse of the African continent” (Department of Trade and
Industry 2010). The gross domestic product (GDP) is four times that of its geographic neighbors and 30% of
the entire GDP of Africa.
Social and cultural environment: South Africa has adopted the International Computer Driving License
(ICDL) in 2007. This internationally recognized standard acts as a benchmark for digital literacy amongst all
citizens (ICDL 2010). However, no data is available on how many people already passed the test and possess
this certification. In their 2008 country profile, the EIU describes computer literacy in SA as “low” – but also
mentions that this is an area of growth (Economist Intelligence Unit 2008). With the increasing (mobile)
internet penetration throughout the last two years, digital literacy has sincerely reached a medium level.
Legal environment: No restrictions on technologies that could be utilized as part of the mobile loyalty
service could be found.
Consumer and Business Adoption: Usage prices for mobile communication are higher than in almost any
other comparable country in the world (ResearchICTafrica 2010). Consumers who are not able to afford
these prices often use methods such as “beeping ” as an alternative form of communication. However, the
Average Rate per User (ARPU) is forecasted to remain stable at around ZAR 145 over the next four years
(MarketResearch.com 2010) which is about 10% of the average monthly income of a black SA citizen. The
implications for the design of the mobile loyalty service remain vague but it can be assumed that the
additional costs for the usage of the service should not exceed an estimated 10% of the monthly ARPU
(≈ZAR 14). Numerous mobile services are already widely available in SA. A service that has been al-ready
been mentioned at various points of this paper is MxIt. A total user base of 14 Million shows how widely
adopted a mobile service can be.
The top 10 sites accessed from South African hints to other popular mobile services (Opera Software
2010): Facebook.com, Google.com, Mxit.com,
Youtube.com, Wikipedia.org, My.opera.com, Getjar.com, Zamob.com, Yahoo.com, Blinko.co.za. It can be seen that among the top 3 accessed sites, two are
social communication platforms. Facebook already is the primary way for millions of people worldwide to
stay in touch with friends and relatives (Morgan Stanley 2009). MxIT is offering similar services, but its
popularity remains restricted to the African continent. An implication for the design of the mobile service
could be to integrate social networks in order to create more value for the customer. Mobile loyalty services
offer many advantages over traditional paper or plastic loyalty cards (chapter 2). The popularity of these
traditional systems can have various implications on the adoption of the mobile loyalty service mBonus. One
example shows the complexity of this problem: If people haven’t widely adopted loyalty cards, why did
they? Did they not see the extra value offered by the loyalty schemes or were they just bothered by the cards
they had to carry? Two studies are currently looking at this issue and the willingness of customers to replace
plastic cards with a mobile loyalty system: One of them is being done for Germany; the other one represents
a comparative study in the South African environment. Both are using a quantitative research approach in
combination with the technology acceptance model to collect and analyze data. The latter study will
contribute to the lack of research on the popularity of loyalty cards in South Africa. The only source that
provides information in this area is a case study by Deon (2007) who claims that “South Africa is poised to
become a loyalty marketing gem”. He identifies a growing potential and identifies the “black diamond”
market, represented by the under-served market of the black middle class. However, his paper lacks a strong
foundation supported by relevant and up-to-date data. Personal observations in SA have shown that loyalty
cards are popular, with prominent examples such as the “vida e caffé” coffee shops or the “Kauai” fast food
restaurants.
At this point, it can only be stated that traditional loyalty programs exist in SA until further studies
evaluate their acceptance and popularity.
96
IADIS International Conference e-Commerce 2011
4. CONCLUSION AND FURTHER RESEARCH
Having applied the mobile service readiness assessment on the South African environment, one mandatory
conclusion needs to be whether this market is suitable for the introduction of a mobile loyalty service. The
answer is “Yes” – but with certain restrictions.
First of all, the targeted businesses need to possess employees with a certain skill level that is needed to
operate the mobile loyalty service mBonus and understand the benefit of it. Usability and documentation of
the service have to be aligned with the abilities of the average small business owner. Secondly, the shop itself
needs to have a permanent location and a recognizable identity or otherwise a true relation with the customer
cannot emerge.
The service itself will need to adapt its implementation by adapting the service delivery and offering
multiple variants of the application to maximize the reachable consumer base. By providing a set of variants,
the service can go along with the technology lifecycle and enable a richer experience, in case the customer
acquires or temporarily uses a newer device.
After these adjustments have been made, further studies can look at the acceptance and integrate the
customer to further tweak the offerings.
In terms of methodology, the findings showed the relevance of a framework that evaluates a given
environment for the factors affecting the adoption of a mobile service. Similar evaluation schemes do not
cater the mobile requirements enough. The created mobile readiness assessment scheme should hereby be
considered as a first explorative approach to this new field in the area of strategy planning.
Each category of the assessment hereby has the potential of being a separate study by itself: At this point,
mere assumptions of the influence of these categories to the adoption of the mobile service could be made.
What further complicated these evaluations was the incomplete data within some of the categories.
Future studies will need to rely on more exhaustive data sets to confirm or negate these hypotheses. By
then applying the methodology to multiple other countries, the substance of the mobile service readiness
assessment can eventually be demonstrated.
REFERENCES
Admob 2010. AdMob Mobile Metrics. Retrieved from http://metrics.admob.com/wp-content/uploads/2010/06/May-2010AdMob-Mobile-Metrics-Highlights.pdf.
Bouwmann, H., Carlsson C., Walden, P., Molina-Castillo, F. J. Reconsidering the actual and future use of mobile
services. Information Systems and E-Business Management, 7(3), 301-317.
Dada, D. 2006. E-Readiness for Developing Countries: Moving the focus from the Environment to the Users. The
Electronic Journal on Information Systems in Developing Countries, 27(6), 1–14.
Deon, O. 2007. South Africa poised to become a loyalty marketing gem. Journal of Consumer Marketing, 24(3), 180–
181.
Department of Trade and Industry 2010. Why Invest in South Africa? Retrieved from http://www.dti.gov.za
/investing/whyinvestinsa.htm.
Economist Intelligence Unit 2008. South Africa - Country Profile 2008.
Economist Intelligence Unit 2010. Digital economy rankings 2010.
Elyan, T. 2008. Ban on commercial use of GPS in Egypt has consumers frustrated. Retrieved from
http://www.dailystaregypt.com/article.aspx?ArticleID=16972.
Fletcher, O. 2010. Apple tweaks Wi-Fi in iPhone to use China protocol. Retrieved from http://www.pcworld.com
/article/195524/.
Fuchs, C., and Horak, E. 2008. Africa and the digital Divide. Telematics and Informatics, 25, 99–116. Retrieved from
http://fuchs.icts.sbg.ac.at/divide.pdf.
Haller, S. 2002. Dienstleistungsmanagment: Grundlagen, Konzepte, Instrumente (2. überarb. und erw. Aufl.).
Wiesbaden: Gabler.
Hargittai, E. 2005. Survey Measures of Web-Oriented Digital Literacy. Social Science Computer Review, 23(3), 371–
379. Retrieved from http://ssc.sagepub.com/content/23/3/371.full.pdf#page=1&view=FitH.
Inggs, M. 2009. South Africa - Smartphones 'Are Taking Over'. Retrieved from http://allafrica.com/stories
/200908240056.html.
97
ISBN: 978-972-8939-51-9 © 2011 IADIS
ICDL 2010. Mission and values. Retrieved from http://www.icdl.org.za/about.php?id=9.
ITU 2003. Mobile overtakes fixed: Implications for Policy and Regulation.
James, J. and Versteeg, M. 2006. Mobile phones in Africa: how much do we really know?
ITU 2010. ICT Statistics - Mobile Cellular Subscriptions. Retrieved from http://www.itu.int/ITU-D/ICTEYE/
Indicators/Indicators.aspx#.
Kreutzer, T. 2009. Generation Mobile: Online and Digital Media Usage on Mobile Phones among Low-Income Urban
Youth in South Africa (Master Thesis). University of Cape Town, Cape Town.
Lindholm, C., Keinonen, T., and Kiljander, H. 2003. Mobile usability: How Nokia changed the face of the mobile phone.
New York: McGraw-Hill. Retrieved from http://www.loc.gov/catdir/bios/mh041/2002044394.html /
Loeffler, C., and Bodendorf, F. 2010. Mobile Loyalty Services - a Retailer and Consumer Survey. Proceedings ICIME,
501–511.
MarketResearch.com 2010. South Africa Mobile Operator Forecast 2010. Retrieved from http://www.marketresearch.com/product/display.asp?productid=2794760&g=1.
Mobile Industry Review 2009. Mxit - South Africa's No. 1 Mobile Social Networking Startup. Retrieved from
http://www.mobileindustryreview.com/2009/02/mxit.html.
Morgan Stanley 2009. The Mobile Internet Report Setup. Retrieved from http://www.morganstanley.com
/institutional/techresearch/mobile_internet_report122009.html.
Opera Software 2010. State of the Mobile Web. Retrieved from http://media.opera.com/media/smw/2010
/pdf/smw062010.pdf.
ResearchICTafrica 2010. South African Sector Performance Review 2009/2010. Retrieved from http://www.researchictafrica.net/new/images/uploads/SPR20092010/SA_SPR-final-web.pdf.
Rice, R. E. and Katz, J. E. 2003. Comparing internet and mobile phone usage: digital divides of usage, adoption and
dropouts. Telecommunications Policy, 27, 597–623. Retrieved from http://www.sciencedirect.com/science?_
ob=MImg&_imagekey=B6VCC-49793G2-5-3&_cdi=5951&_user=616145&_pii=S0308596103000685&_
origin=search&_coverDate=10%2F31%2F2003&_sk=999729991&view=c&wchp=dGLbVzbzSkWA&md5=64c3a344089643b0b3a1305c8b765d4f&ie=/sdarticle.pdf.
Rodrik, T. 2008. Understanding South Africa's economic puzzles. Economics of Transition, 16(4), 769–797. Retrieved
from
http://onlinelibrary.wiley.com/store/10.1111/j.1468-0351.2008.00343.x/asset/j.1468-0351.2008.00343.x.pdf?
v=1&t=ge2u8zzz &s=c7abcd0aca2193017a111cfe68c3981e62e07ffc.
Scott, N., Batchelor, S., Ridley, J. and Jorgensen, B. 2005. The impact of mobile phones in Africa. Retrieved from
http://www.gamos.org/icts/the-impact-of-mobile-phones-in-africa.html.
Sokolov, D. A. J. 2008. Mobil in Afrika - Das Handy revolutioniert den Kontinent. c't, (21), 106–111.
World wide worx (27.05.210). The mobile Internet pinned down. Retrieved from http://www.worldwideworx.com
/2010/05/27/the-mobile-internet-pinned-down/.
98
IADIS International Conference e-Commerce 2011
THE IMPACT OF INNOVATION, STANDARDIZATION,
TECHNOLOGY MARKETING STRATEGY ON THE
PERFORMANCE IN SOFTWARE COMPANY:
COMPARATIVE STUDY ON SOFTWARE TYPE
Sung Hee Jang, Dong Man Lee and Hyun Sun Park
Business of Administration, Kyungpook National University
1370 Sankyuk-dong, Buk-gu, Daegu, 702-701, South Korea
ABSTRACT
The purpose of this study is to examine the factors influencing performance of software companies. This model tests
various theoretical research hypotheses related to innovation, standardization, technology marketing strategy and
software type. Smart PLS (Partial Least Square) 2.0 and SPSS 15.0 have been utilized for deriving the study results. The
result of hypothesis testing is as follows. First, standardization and technology marketing strategy positively influence
financial performance. Second, innovation, standardization, technology marketing strategy positively influence technical
performance. Finally, mobile and non-mobile software companies was shown that innovation, standardization, and
technology marketing strategy has different effects to financial and technical performance.
KEYWORDS
Innovation, Standardization, Technology Strategy, Performance, Software Company, Software Type
1. INTRODUCTION
In the world of globalization now in progress, while there is evolution in capital, manpower, and resources
free movement in the global world, diffusion of global sourcing and infinite economy have been intensified.
Accordingly, for the sustainable growth of our future domestic economy, service-oriented knowledge
economy’s movement is essential. Software (SW)’s role has been emphasized as the possible core-base of
knowledge and information’s accumulation · organization · utilization. In particular, SW and R&D,
manpower training and knowledge with the OECD's investment as three indicators of knowledge-based
society have established itself as key elements.
Software industry is said to be all industries involved in a series of steps of software development,
distribution, maintenance, etc. The software industry can be defined as software development · manufacture ·
production · distribution, etc. and related services, and information system operating in related industries.
According to Korea Software for Market Analysis and Forecasts Report Domestic software market in 2010,
in a scale of US$3.18 billion is expected to be among the annual growth of 7.0% over the previous year, is
also expected to grow 7.2% in the long term average to US$4.205 billion in the year of 2014. In Korea ICD,
software market recent international economic situation is recovering steadily improving the performance of
the major corporate customers and is expected to increase investment and as a result, overall domestic
demand for investment in software and the market was expected to grow steadily (Korea IDC, 2010).
Meanwhile, software companies include in the study about standardization and flexibility of software
processes and project performance (Liu et al., 2008), the software flexibility and project management control
factors that impact on performance (Wang et al., 2008), a study on the project risk and performance (Suh and
Jeong, 2002),
Studies on the effect of performance of product innovation considering the product
development process and the knowledge acquisition process (Jordan and Segelod, 2006), success factors of
software ventures (Ahn and Kim, 2002), and a study on the profile of uncertainty and project performance
(Na, 2004). There is a lack of researches regarding software company’s innovation, standardization, and
technology marketing strategy.
99
ISBN: 978-972-8939-51-9 © 2011 IADIS
The paradigm of the recent market evolved into an open market; even in mobiles for users, there is a
growing interest for the provision of a variety of applications and content to enable mobile software platform.
In the future mobile software’s dependence to wireless internet service and mobile devices, applications and
content will increase. In the mobile software market initiative to ensure competition is expected to be keen.
Therefore, there is an expected difference of the impact of software companies and mobile software
companies and non-mobile innovation, standardization, technology marketing strategy on the performance of
software companies.
The purpose of this study is to verify the factors affecting the performance of software companies’
innovation, standardization, technology marketing strategy and depending on the type of software, whether
there are differences in these factors. To achieve the research objectives, demonstration software for
companies in Korean were investigated. The result of the study that identifies the factors affecting Korean
software companies will provide the strategic implications.
2. RESEARCH MODEL AND HYPOTHESES
2.1 Innovation
Software innovation can be related to several aspects of the product, such as its features and performance
parameters, the impression of its newness according to various market actors, and the novelty of its
architectural structure (Jordan and Segelod, 2006). Garcia and Calantone (2002) provided novelty of product
innovation for customers (newness) and defined the novelty of the market and technology and market
expertise and technical know-how. Jordan and Segelod (2006) been suggested to be able to lead software
product advantage, product newness and company structural change. The software innovation project
outcomes will be improved. Thus, based on previous literature and the arguments presented above, the
followings are hypothesized:
H1-1: Innovation has a positive effect on the financial performance.
H1-2: Innovation has a positive effect on the technical performance.
2.2 Standardization
In the software development process, standardization can be said as the procedure of documenting the
development of the software or technical information. Nidumolu (1996) categorized standardization as output
controls standardization and behavior controls standardization. Because of the influence affecting software
process performance and product performance these standardized residual risks were negatively affected. Shu
and Jeong (2003) formulated the procedure regarding the development and standardization of technical
requirements and they found out that standardization improves process performance. Na (2004) studied about
the impact of standardization and requirements uncertainty to software project performance and found out
that standardization of software development reduces the risk of residual. Liu et al. (2008) software process
standardization improved project performance and found out that software flexibility was also a significant
influence. Thus, based on previous literature and the arguments presented above, the followings are
hypothesized:
H2-1: Standardization has a positive effect on the financial performance.
H2-2: Standardization has a positive effect on the technical performance.
2.3 Technology Marketing Strategy
Technology marketing strategy, while supporting the business strategy in the position to lead the business
strategy linked to each other organically, the lower companies reserve technical resources based on external
business attribute acts as the main expression. In companies developed superior software products are being
introduced to many customers and in order to be continually utilized, especially in order to ensure
insufficient sales force in normal sized enterprises technology-based strategies are important for product
sales. In marketing of software products customer-facing products is essential, distribution may depend on
100
IADIS International Conference e-Commerce 2011
the specific hardware and in virtual space, regardless of the intent of the provider you choose a product that
can have a variety of distribution channels. (Pihlava, 1996).
Ahn and Kim (2002), on the study of factors affecting performance of software ventures, technology
strategy affects performance is studied. In technology marketing strategy characteristics of technology and
software products, technology and product development strategies, technology marketing strategy was set up
as a study. Technology and product development strategy and technology marketing strategy showed the (+)
effect on company performance. Similarly, Ahn and Kim (2001) stated that the technology marketing
strategy improves performance of customer, internal processes, learning, and innovation. Thus, based on
previous literature and the arguments presented above, the followings are hypothesized:
H3-1: Technology marketing strategy has a positive effect on the financial performance.
H3-2: Technology marketing strategy has a positive effect on the technical performance.
2.4 Software Type
Recent mobile devices such as smart phones, including the tablet expands the prevalence of competition in
the mobile software market is unfolding. According to increased use of mobile devices, mobile software
industry continues to grow, mobile software companies and non-mobile software companies and innovation,
standardization, technology marketing strategy expects to influence the performance of software companies.
Thus, based on previous literature and the arguments presented above, the followings are hypothesized:
H4-1: Innovation’s impact on financial performance will differ depending on the type of software.
H4-2: Innovation’s impact on technical performance will differ depending on the type of software.
H5-1: Standardization’s impact on financial performance will differ depending on the type of software.
H5-2: Standardization’s impact on technical performance will differ depending on the type of software.
H6-1: Technology marketing strategy’s impact on financial performance will differ depending on the type
of software.
H6-2: Technology marketing strategy’s impact on technical performance will differ depending on the
type of software
The research model is presented as in Figures 1.
Figure 1. Research Model
3. RESEARCH METHODOLOGY
3.1 Operational Definition of Variables and Measurement Items
Innovation was defined as a new platform or module level than traditional software products. Standardization
has been defined as the extent standardized and documented software development process. Technology
marketing strategy was defined as the extent analysis of ideas and economic for software’s marking and
development. Financial performance was defined as software related to corporate financial and technical
performance were defined as the number of new products development and R & D budgets percentage
increase.
Measurements in previous studies were developed in order to use empirically validated metrics. Except
for the demographic variables, all variables were measured as 7-point scale. Table 1 is a summary of
measurement items.
101
ISBN: 978-972-8939-51-9 © 2011 IADIS
Table 1. Measurement Items
Variables
Innovation
Standardization
Technology
marketing
strategy
Financial
performance
Technical
performance
Measurement Item
- Feature set differences over the closest prior developed product
-New platform for an existing software product
-New modules for an existing software product
-Product performance compared to closest available competitive product in
the relevant market segment
-To what extent does the software organization use a standardized
software development process?
-To what extent does the software organization use a standardized and
documented software development process on each project?
-To what extent is a mechanism used for ensuring compliance with the
software engineering standards?
- Degree to correspondence closely to development of trade
- Degree to secure product supply chain and cooperation
-Thorough data gathering and evaluation
-Thorough analysis of feasibility
- Increase of average sales
-Increase of net profit
-Level of increment on the return on invested capital
-Improvement of cash flow
- Increase the number of degree of development of new software products
- Increase in R & D budget, and feeding rate
Indicators
Related Literature
4
Jordan and
Segelod(2006)
3
Liu et al.(2008)
4
Ahn and Kim(2002)
4
Rai et al.(2006), Yao
et al.(2007)
2
3.2 Sample and Survey Research Methods
Data for this study were collected from August 1, 2010 to October 31. After removing the unsuitable
questionnaires, a total of 100 survey data were considered to be analyzed. The statistical analysis used in this
study was Smart PLS 2.0 and SPSS 15.0. PLS (Partial Least Square) is one of the two generation structural
equation models for the analysis of the amount of multivariate. It is to use the main factor analysis, the
normal distribution, and a structural equation’s large restriction on the data collections, due to its free from
severe assumptions. The existing methods of structural equation’s goal are to estimate the relevance of the
model but independent variables indicated by the value R2 predicts better how much dependent variables
change. Research models have early stages of theory development and are an appropriate way when it hasn’t
been verified thoroughly yet (Teo et al., 2003). In previous studies of social enterprises, because of the few
studies in environmental uncertainties and related entrepreneurial spirit and achievements, PLS was utilized
as the appropriate analytical techniques in this study.
There are 89 males and 11 females. In the number of employees, there are 35 companies (35.0%) that
have the 10 to 30 employees and 26(26.0%) companies have less than 10 employees. In annual sales, 46
companies (46.0%) had less than US$10 billion and 27 companies (27.0%) have US$ 10 billion – US$50
billion. In software type, 47 companies are mobile companies and 53 companies are non-mobile companies.
Table 2 shows the characteristics of the sample data.
Table 2. Sample Characteristics
Classification
Gender
Number of Employees
Annual Sales
S/W type
102
Male
Female
Total
Less than 10
10~30
30~50
50~110
More than 110
Total
Less than US$10 billion
US$10 billion~ US$50 billion
US$50 billion~ US$110 billion
More than US$100 billion
Total
Mobile S/W company
Non-mobile S/W company
Total
Frequency
Percentage (%)
89
11
100
26
35
16
12
11
100
46
27
17
10
100
47
53
100
89.0
11.0
100.0
26.0
35.0
16.0
12.0
11.0
100.0
46.0
27.0
17.0
10.0
100.0
47.0
53.0
100.0
IADIS International Conference e-Commerce 2011
4. RESULTS AND DATA ANALYSIS
4.1 Reliability and Validity Analysis
In this study, Cronbach's α coefficient was used to verify the reliability of measurement tools. In the
reliability analysis, Cronbach's α of all variables were above 0.8. Thus, overall reliability is higher and all
configuration concepts used can be seen as reliable. In order to verify constructs between reliability and
validity, the value of the concept of reliability (ICR) and Average Variance Extracted (AVE) were calculated.
If the reliability concept is higher than 0.7 (Chin, 1998), it considers valid. Parameters and limits in this study
are exceeded and values exceed 0.5. Thus, it has reliability and validity. Table 3 shows the reliability and
validity analysis.
Table 3. Reliability and Validity Analysis
Variables
Innovation
Standardization
Technology marketing strategy
Financial performance
Technical performance
Item
Factor loading
IN1
IN2
IN3
ST1
ST2
ST3
TS1
TS2
TS3
TS4
FP1
FP2
FP3
FP4
TP1
TP2
.870
.953
.898
.934
.943
.825
.858
.863
.865
.872
.891
.946
.879
.888
.949
.950
AVE
ICR
Cronbach’s ⍺
.824
.933
.895
.814
.929
.887
.747
.922
.888
.813
.946
.924
.902
.948
.891
4.2 Correlation Analysis
Correlation analysis is an analytical technique to measure how close two variables are. Analysis is used to
verify the multi-collinearity between the independent variables put together with the analysis of multivariate
analysis. There is analyzed with the structural model since there are no multi-collinearity problems as shown
in Table 4.
Table 4 is presented on the diagonal square root of the AVE values. The square root of AVE exceeded
0.707. If the correlation coefficient exceeded its value, the validity between each component of the concept
can be secured (Yi and Davis, 2003). The AVE values for all variables’ square root showed to be bigger than
the correlation coefficient between the concepts. Since the correlation coefficient exceeded its value, it
proved the existence of discriminant validity.
Table 4. Correlation Analysis
Variables
IN
.908++
ST
Innovation
Standardization
.246
.902
Technology marketing
.514
.393
Financial performance
.154
.321
Technical performance
.487
.278
++
The values are presented on the diagonal of the square root of AVE
TS
FP
TP
.902
.411
.562
.842
.479
.954
103
ISBN: 978-972-8939-51-9 © 2011 IADIS
4.3 Hypothesis Testing
The results: First, innovation appears to have (+) positive effects on technical performance. Hypothesis 1-2
(path coefficient = 0.267, t = 8.079) was adopted. And innovation appears to influence (-) negatively on
financial performance. Hypothesis 1-1 (path coefficient =- 0.089, t = 2.458) was rejected.
Second, standardization appears to have a (+) positive effects on financial performance and technical
performance. Hypothesis 2-1 (path coefficient = 0.194, t = 6.279) and Hypothesis 2-2 (path coefficient =
0.053, t = 1.914), respectively were adopted.
Third, technology marketing strategy appears to positively influence financial performance and technical
performance. Hypothesis 3-1 (path coefficient = 0.380, t = 14.421) and Hypothesis 3-2 (path coefficient =
0.404, t = 10.281), respectively were adopted.
Table 5 is a summary on the results of hypothesis testing.
Table 5. Hypothesis Testing Results
Channel
H1-1 Innovation -> Financial performance
H1-2 Innovation -> Technical performance
H2-1 Standardization -> Financial performance
H2-2 Standardization -> Technical performance
H3-1 Technology marketing -> Financial performance
H3-2 Technology marketing -> Technical performance
Significance level: *: p<0.1 **: p<0.05 ***: p<0.01
Path Coefficient
-.089
.267
.194
.053
.380
.404
t value
2.458
8.079***
6.279***
1.914**
14.421***
10.281***
Test Results
Not-accept
Accept
Accept
Accept
Accept
Accept
4.4 Software Type
In this study, we verified whether there are differences between mobile software company (n = 47) and nonmobile software company (n = 53). In Figure 3, mobile software companies and non-mobile software
companies is a result of the structural model analysis. In mobile software companies, innovation,
standardization, technology marketing strategy appear to improve financial performance and technical
performance but for non-mobile software companies, standardization had a significant impact on financial
performance and technology marketing strategy appears to (+) positively influence financial and technical
performance.
Figure 2. Path Analysis of the Type of Software
A comparison of the difference between the path coefficients, Chin et al. (1996) proposed a formula. This
formula was applied in the studies of Keil et al. (2000), Ahuja and Thatcher (2005).
pi : i second path coefficient , ni : i second sample size
SEi : i second path, the standard error of coefficient, tij degrees of freedom : n1+n2-2
The above formula for calculating the non-mobile software, mobile software companies and enterprises
value of the path coefficients and standard errors can be found in Table 6. Using the formula above, the result
104
IADIS International Conference e-Commerce 2011
is also shown in Table 6. The results, all path coefficients and t value of the difference appeared significantly
H4-1, H4-2, H5-1, H5-2, H6-1, H6-2 and were both adopted.
Regarding technology marketing strategy and their impact on the technical performance, non-mobile
software company has higher path coefficient than mobile companies. Mobile software companies, all the
rest of the path coefficient was higher than the non-mobile software companies.
Table 6. Analysis of the Difference between the Type of Software
Hypothesis
H4-1
(Innovation
-> Financial performance)
H4-2
(Innovation
-> Technical performance)
H5-1
(Standardization
-> Financial performance)
H5-2
(Standardization
-> Technical performance)
H6-1
(Technology marketing strategy
-> Financial performance)
H6-2
(Technology marketing strategy
-> Technical performance)
Path coefficient
Standard error
Coefficient t value of
difference
Path coefficient
Standard error
Coefficient t value of
difference
Path coefficient
Standard error
Coefficient t value of
difference
Path coefficient
Standard error
Coefficient t value of
difference
Path coefficient
Standard error
Coefficient t value of
difference
Path coefficient
Standard error
Coefficient t value of
difference
Mobile
S/W
0.062
0.033
Non-mobile
S/W
-0.551
0.032
Test Results
Accept
94.215***
0.348
0.016
0.011
0.038
Accept
56.495***
0.210
0.023
0.189
0.028
Accept
4.067***
0.124
0.022
-0.069
0.026
Accept
39.796***
0.458
0.022
0.272
0.038
Accept
29.454***
0.391
0.024
0.482
0.029
Accept
16.966***
Significance level: ***: p<0.01
5. CONCLUSION
The purpose of this study is to verify the factors (innovation, standardization, technology marketing strategy)
affecting software company's performance and whether there are differences depending on the type of there
software. To achieve the research objectives an empirical study was conducted between 100 software
companies in Korea. The results of this study can be summarized as follows.
First, it was found out that innovation improves the technical performance but decreases financial
performance. Innovative software products has a significant impact on software companies’ new products,
the extent of R & D budgets but to develop innovative new software product a lot of cost and effort is needed
so it can be interpreted as a negative (-) effect on financial performance.
Second, standardization improves both financial and technical performance. Software companies to
improve the performance of the standardization process have become important. Standardization of software
has developed software developer systematic and consistent software, because improve the financial and
technical performance in software company.
Third, technology marketing strategy influences financial performance and technical performance. In
order to develop software technology, collect ideas and a feasibility analysis. To ensure cooperation and
product supply chain, technology strategy is trying to improve financial and technical performance of
software companies.
Finally, for mobile software companies and non-mobile software companies it was shown that innovation,
standardization, technology marketing strategy has different effects to financial performance and technical
performance. The mobile companies indicate that innovation and standardization improve financial and
105
ISBN: 978-972-8939-51-9 © 2011 IADIS
technical performance. Therefore, this study implies that mobile software developer importantly considers
innovation, standardization and technology marketing strategy.
This study has some limitations. First, in this study of the factors affecting software companies,
considered were only innovation, standardization and technology marketing strategy. In future research, there
is a need to consider other factors. Second, this study the performance of software companies’ financial
performance and technical performance show the only factors considered. In future researches, we may be
able to measure performance using software quality and performance of software companies using balanced
scorecard (BSC) in order to make better decision making in technology management strategy.
REFERENCES
Ahn, Y. S. and Kim H. S., 2002, “An Empirical Analysis on Factors Influencing the Performance of Software Venture
Business,” Korean Management Review, Vol. 31, No. 2, pp. 431-461.
Ahn, Y. S. and Kim, H. S., 2001, “An Empirical Analysis on the Performance Factors of Software Venture Business in
the Perspectives of BSC and Subjective Performance,” Information Systems Review, Vol. 3, No. 1, pp. 31-46.
Ahuja, M. K., and Thatcher, J. B., 2005, "Moving Beyond Intentions and Toward the Theory of Trying: Effects of Work
Environment and Gender on Post-Adoption Information Technology Use,” MIS Quarterly, Vol. 29, No. 3, pp. 427459.
Chin, W. W. et al. 1996, “A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effect:
Results from a Monte Carlo Simulation Study and Voice Mail Emotion/Adoption Study,” 17th International
Conference on Information Systems, OH, 1996, pp. 21‐41.
Chin, W. W., 1998, “The Partial Least Squares Approach to Structural Equation Modeling,” In G. A. Marcoulides(ed.),
Modern Methods for Business Research, Lawrence Erlbaum Associates, Mahwah, NJ, pp. 295-336.
Garcia, R. and Calantone, R., 2002, “A Critical Look at Technological Innovation Typology and Innovativeness
Terminology: A Literature Review,” The Journal of Product Innovation Management, Vol. 19, No. 2, pp. 110-132.
Jordan G. and Segelod, E., 2006, “Software Innovativeness: Outcomes on Project Performance, Knowledge
Enhancement, and External Linkages, ” R&D Management, Vol. 36, No. 2, pp. 127-142.
Keil, M., et al., 2000, “A Cross-Cultural Study on Escalation of Commitment Behavior in Software Projects,” MIS
Quarterly, Vol. 24, No. 2, pp. 299-325.
Korea IDC, 2010, Korea Software Market Analysis and Forecasts Report.
Liu et al., 2008, “The Impact of Software Process Standardization on Software Flexibility and Project Management
Performance: Control Theory Perspective,” Information and Software Technology, Vol. 50, No. 9-10, pp. 889-896.
Na, K. S. et al., 2004, “The Impacts of Requirement Uncertainty and Standardization on Software Project Performance: A
Comparison of Korea and USA," Journal of Information Technology Applications & Management, Vol. 11, No. 2,
pp. 15-27.
Nidumolu, S. R., 1996, “Standardization Requirements Uncertainty and Software,” Information & Management, Vol. 31,
No. 3, pp. 135-150.
Pihlava, S., 1996, A Process Improvement Experience in Small PC Software Companies, Master’s Thesis in Helsinki
Univ. of Technology.
Rai, A. et al., 2006, “Firm Performance Impacts of Digitally Enabled Supply Chain Integration Capabilities," MIS
Quarterly, Vol. 30, No. 2, pp. 225-246.
Shu, C. K. and Jeong, E. H., 2003, “The Effect of Project Risk and Risk Management on Software Development Project
Performance,” Asia Pacific Journal of Information Systems, Vol. 13, No. 2, pp. 199-217.
Teo, H. H. et al., 2003, “Predicting Intention to Adopt Interorganizational Linkage: An Institutional Perspective,” MIS
Quarterly, Vol. 27, No. 1, pp. 19-49.
Wang E. T. G. et al., 2008, “The Effects of Chang Control and Management Review on Software Flexibility and Project
Performance,” Information & Management, Vol. 45, No. 7, pp. 438-443.
Yao, Y. et al., 2007, “An Inter-organizational Perspective on the Use of Electronically-enabled Supply Chains,” Decision
Support Systems, Vol. 43, No. 3, pp. 884-896.
Yi, M. Y. and Davis, F. D., 2003, “Developing and Validating an Observational Learning Model of Computer Software
Training and Skill Acquisition,” Information Systems Research, Vol. 14, No. 2, pp. 146‐169.
106
IADIS International Conference e-Commerce 2011
E-READINESS IN JORDAN ICT SECTOR COMPANIES
Maha Al-khaffaf
Applied SciencesUniversity
Department of Management Information Systems
166 Shafa Badran 11391, Amman- Jordan
ABSTRACT
This research analyzes the current status of e-readiness by measuring the accomplished achievements that make ICT
sector companies in Jordan ready to host e-transactions (or so-called e-readiness). A questionnaire study was conducted
among 300 upper and middle management level in order to accomplish the research aim that focus on analyzing the
effect of e-readiness enablers on the stage of e-readiness in the targeted companies. The study found that Jordanian
business environment encourages e-readiness in Jordan ICT sector companies, the study recommends improving the
coordination process between public enterprises and the Ministry of Communication and Information, Management
should define the focus, direction, and scope phasing required for their e-readiness plans.
KEYWORDS
E-readiness, ICT, Business environment, Culture and Regulation.
1. INTRODUCTION
E-Readiness is defined as the degree to which a society is prepared to participate in the Digital economy, the
digital economy can help to build a better society. there are number of main areas of activities that contribute
to the overall e-Readiness of a country; Access and connectivity, training, education and public awareness,
government Leadership, business and Private Sector Initiatives and Social Development. Hence, the
equation of ICTs plus e-skilled people seems to be the formula towards e-readiness (Ozmen, 2003). Ereadiness is progressing around the world, but as it’s achieving, it is growing more complex; the connections
must be fast, secure and affordable. Likewise, governments must demonstrate their commitment to digital
development not only through broad policy, but also in practical ways, such as delivering public services to
citizens and business via electronic channels (The Economic Intelligent Agency, 2010). This research project
examines these outcomes, in order to analyze the current state of e-readiness in Jordan ICT sector companies
by documenting some of the e-readiness indicators; figures, numbers and facts as it obtained by Jordanian
public intuitions such as ministry of communication and information technology and discussing and
analyzing e-readiness enablers and studying its effect on the e-readiness stage, using an appropriate research
method; a questionnaire distributed to ICT sector companies in Jordan.
2. LITRATURE REVIEW
E-Readiness can be interpreted as a measure of the extent of the adoption of ICT as the means of interaction
between the government, citizens, and the businesses within a regulatory framework in a country (Peters,
2005). It can be used as an important indicator of its proximity to becoming an e-society. Technology
competence, firm scope and size, consumer readiness, and competitive pressure are significant adoption
drivers, while lack of trading partner readiness is a significant adoption inhibitor (Zhu & Kenneth L.
Kraemer, 2002) as electronic-business intensity increases, two environmental factors. Consumer readiness
and lack of trading partner readiness become less important. Firms are more cautious into adopting ebusiness in high electronic business intensity countries, which seems to suggest that the more informed firms
are less aggressive into adopting e-business. (Selim, 2008) attempts to explore the internal and external
107
ISBN: 978-972-8939-51-9 © 2011 IADIS
factors affecting the adoption and acceptance of e-commerce by businesses in developing countries. The
study indicated that most of the firms were either at the first or second stage on the e-commerce 5-stage
adoption ladder. This indicated that the e-commerce adoption is not matching and far less than the IT
readiness of both the firms and the country. In the (E-Readiness Rankings 2007) introduced by The
Economist Intelligence Agency, investment in technology have been seen as an essential requirement, as is
investment in human capital and the promotion of favorable business and legal conditions for online activity
to thrive. E-readiness is ultimately about giving digitally enabled people and businesses as many options as
possible to determine their own most productive path forward. However, the (e-readiness rankings in 2006)
concluded that E-readiness is rightly seen as an enabler of globalization. Yet the relationship is also
increasingly converse, as sources of digital services and supports emerge in some corners of the world that
help to increase the e-readiness of countries in others. (Yalamov, 2002) introduces e-readiness assessment as
a policy tool for development. In Bulgaria transitional context; the assessment pointed out two critical factors
- the indicator of internet usage in business and teachers' readiness for the networked world. A framework for
measuring national e-readiness introduced by (Mr. Bui, 2003) proposed algorithm provides a structured and
methodical approach, rather than relying on intuition and risky conjecture in national e-strategy decisions.
The study framework evaluates the e-readiness of a nation based on eight factors such as digital infrastructure
and macro economy. The study identifies 52 surrogate measures that can be used to quantify these factors
and describe an algorithm to calculate an overall e-readiness index for a country, by using data published by
different world organizations, measures for ten East Asian countries, the USA, and other countries. (Arce and
Hopmann, 2002) concludes that there is a huge unsatisfied demand compared to existing service which can
be covered by traditional technology. The study teaches that 20 hours of internet at home exceeds 80% for
the families; mainly for education. Transportation, communication or other household necessities are 60%,
and they have to spend more than their complete family budget for education. While the past decade Jordan
has seen notable improvements in networked readiness and e-readiness in general, many challenges
remain.(Al-Khateeb, 2001) However, personal computers are not generally affordable because of low
average incomes which remain a great impediment to the spread of Internet use. E-commerce activity is
minimal, although it has adequate e-commerce readiness requirements, but it still lacks some standards and
success factors of E-readiness (Shannak &. Al-Debei, 2006). Furthermore, Jordanian company’s application
of an e-commerce business is small. Jordan’s labor pool is well educated, and ICT education is a top national
priority; the curriculum has been revised at all levels to reflect a new ICT focus.
3. RESEARCH MODEL
Ha1
Business
environment
Ha2
Culture
Main H
Regulation
Technological
support
Ha3
Ha4
Figure 1. Research Model
108
E-readiness
IADIS International Conference e-Commerce 2011
4. RESEARCH METHODOLOGY
Cronpach alpha have been used to determine the variable reliability, the study shows a clear statistical
acceptance because (α) values are greater than accepted percent 0, 06. In which Cronpach alpha for all the 16
research questions was .905.
Factor analysis, KMO and Bartlett test multiple regression analysis and Sequential regression analysis
have been used as a statistical methods to analyze the data collected in this study. However, a literature
review was used for descriptive knowledge about E-Readiness model and the requirements of E-Readiness.
The study population is formed from ICT sector companies in Jordan, which were divided in two main
companies; the ministry of communication and information (with its all department distributed in Jordan) and
the national center for information technology.
5. MESURING THE RELATIONSHIP BETWEEN DEPENDENT AND
INDEPENDENT VARIABLE USING MULTIPLE REGRESSION
Multiple regressions have been used in this research hence it is an appropriate analysis for research question
were the relationship between two or more variables, and one dependent variable. (Malhotra, 2000) This
research have used this type of analysis in order to analyses the relationship between the independent
variables that consist 2 factors and the dependent variable.
5.1 Sub Hypothesis1 Ha
There is a direct effect of economic environment on e-readiness stage
Table 1. Multiple regression of hypothesis one
Variable
Economic
environment
Political stability
R Square
F
Sig
Internet Usage
Beta
Sig
.393
.000
.158
T
6.61
.008
2.666
.161
22.945
.000
Computer Usage
Beta
Sig
T
.697
.000
15.484
E-Readiness Stage
Beta
Sig
T
.731
.000
16.224
.082
.091
.070
1.820
.520
131.212
.000
.059
1.945
.500
120.371
.000
From the table above the multiple regressions result shows that there is a direct effect of business
environment on the e-readiness stage. Where R 2 = .500 which means that the independent variable
explained 50% of variance in e-readiness stage because (F= 120.371, p< .05) so we reject the null hypothesis
and accept the alternative which indicates the effect of business environment on e-readiness stage. To
determine which dimension effect the variable, the beta value shows that there is a direct effect of economic
environment on e-readiness stage ( Beta = .731,p<.05) but the model show there is no direct effect of political
stability on e-readiness stage in which ( Beta =.091, p>.05) .
5.2 Sub Hypothesis 2 Ha
There is a direct effect of culture on E-readiness stage.
109
ISBN: 978-972-8939-51-9 © 2011 IADIS
Table 2. Multiple regression of hypothesis two
Variable
Social
aspects
Value and
ethics
R Square
F
Sig
Internet Usage
Beta
Sig
.390
.000
T
6.131
Computer Usage
Beta
Sig
.297
.000
T
4.400
E-Readiness Stage
Beta
Sig
.492
.000
T
8.800
.059
.876
.296
4.890
.202
3.666
.380
.179
26.121
.000
.000
.258
41.500
.000
.000
.362
71.30
.000
From table (2) above the multiple regressions result shows that there is direct effect of culture on the ereadiness stage. Where R 2 =. 362 which means that the independent variable explained 36% of variance in
e-readiness stage because (F= 71.30, p< .05) so we reject the null hypothesis and accept the alternative which
indicates the effect of culture on e-readiness stage. To determine which dimension effect the variable, the
beta value shows that there is a direct effect of social aspects on e-readiness stage
(Beta = .492, p< .05) on the other hand the model shows that there is a direct effect of value and ethics on
e-readiness stage in which (Beta = .202, p > .05).
5.3 Sub Hypothesis 3 Ha
There is a direct effect of regulation on E-readiness stage.
Table 3. Multiple Regression of hypothesis three
Variable
Electronic
law
Legislation
Internet Usage
Beta
Sig
.303
.000
T
5.131
Computer Usage
Beta
Sig
.013
.819
T
.230
E-Readiness Stage
Beta
Sig
T
.334
.000
4.231
.187
3.160
.407
7.011
.355
R Square
F
Sig
.002
.139
19.014
.000
.000
.163
24.583
.000
.000
6.553
.200
39.600
.000
From table (3) above the multiple regressions result shows that there is direct effect of culture on the ereadiness stage. Where R Square = .200 which means that the independent variable explained 20% of
variance in e-readiness stage because (F= 39.000, p < .05) so we reject the null hypothesis and accept the
alternative which indicates the effect of regulation on e-readiness stage. To determine which dimension
effect the variable, the beta value shows that there is a direct effect of electronic law on e-readiness stage
(Beta = .334,p< .05) on the other hand the model shows that there is a direct effect of legislation on ereadiness stage in which (Beta = .355, p < .05).
5.4 Sub Hypothesis 4 Ha
There is a direct effect of technological support on E-readiness stage.
Table 4. Multiple regression of hypothesis four
Variable
IT
development
Spread of IT
R Square
F
Sig
110
Internet Usage
Beta
Sig
.217
.000
T
3.584
Computer Usage
Beta
Sig
.064
.254
T
1.144
E-Readiness Stage
Beta
Sig
T
.201
.040
2.088
.224
3.697
.461
8.218
.433
.000
.092
12.637
.000
.000
.219
34.972
.000
.000
223
38.393
.000
7.771
IADIS International Conference e-Commerce 2011
Table (4) shows that there is direct effect of technological support on e-readiness stage. Where R Square
= .223 which means that the independent variable explained 22% of variance in e-readiness stage because
(F= 38.393, p< .05) so we reject the null hypothesis and accept the alternative which indicates the effect of
technological support on e-readiness stage. To determine which dimension effect the variable, the beta value
shows that there is a direct effect of IT development on e-readiness stage (Beta = .201,p< .05) on the other
hand the model shows that there is a direct effect of spread of IT on e-readiness stage in which (Beta =.433,
p< .05).
5.5 Main Hypothesis Ha
There is a direct effect of (business environment, culture, regulation, technological support) on E-readiness
stage.
Table 5. Multiple regression of hypothesis five
Variable
R
R2
F
Sig
Business
environment
Culture
.789
.490
11.387
.000
.799
.553
81.234
.000
Regulations
.745
.589
60.102
.000
Technological
support
.748
.597
42.323
.000
Factor 1(BE)
Factor 2(PS)
Factor 1(SA)
Factor 2(VE)
Factor 1(EL)
Factor 2(R)
Factor 1(ITD)
Factor 2(ITS)
Beta
T
.756
.126
.390
.090
.126
.102
.206
.147
9.023
3.029
4.591
.443
3.007
.679
2.648
.903
(BE): Business Environment, (PS): Political Stability (SA): Social Aspects (VE) Values and ethics (EL):
Electronic Law (R): Regulations (ITD) information technology development. (ITS): Information Technology
Spread.
Table (5) shows that there is direct effect of e-readiness enablers (business environment, culture,
regulation and technological support on the e-readiness stage where:
1- R2 for the business environment equals .789 which means that the independent variable explained 78%
of variance in e-readiness stage because (F= 20.121, p< .05) so we reject the null hypothesis and accept the
alternative which indicates the effect of business environment on e-readiness stage. To determine which
dimension effect the variable, the beta value shows that there is a direct effect of economic environment (F1)
on e-readiness stage (Beta =. 756,p< .05) on the other hand the model shows that there is a direct effect of
political stability (F2) on e-readiness stage in which ( Beta =.126, p < .05).
2- R2 for the culture equals .799 which means that the independent variable explained 79, 9 % of variance
in e-readiness stage because (F= 781.234, p< .05) so we reject the null hypothesis and accept the alternative
which indicates the effect of culture on e-readiness stage. To determine which dimension effect the variable,
the beta value shows that there is a direct effect of social aspect (F1) on e-readiness stage
(Beta =. 390, p< .05) on the other hand the model shows that there is a direct effect of values and ethics
(F2) on e-readiness stage in which
(Beta = .090 p < .05).
3- R2 for the regulation equals .589 which means that the independent variable explained 58, 9 % of
variance in e-readiness stage because (F= 60.102, p< .05) so we reject the null hypothesis and accept the
alternative which indicates the effect of culture on e-readiness stage. To determine which dimension effect
the variable, the beta value shows that there is a direct effect of electronic law (F1) on e-readiness stage
(Beta = .126, p< .05) on the other hand the model shows that there is no direct effect of regulation (F2) on ereadiness stage in which (Beta= .062p < .05).
4- R2 for the technological support equals .597 which means that the independent variable explained 59.7
% of variance in e-readiness stage because (F= 42.323, p< .05) so we reject the null hypothesis and accept
the alternative which indicates the effect of technological support on e-readiness stage. To determine which
dimension effect the variable, the beta value shows that there is a direct effect of IT development (F1) on e-
111
ISBN: 978-972-8939-51-9 © 2011 IADIS
readiness stage (Beta = .106,p< .05) on the other hand the model shows that there is no direct effect of IT
spread (F2) on e-readiness stage in which (Beta = .147p < .05).
6. CONCLUSION
With its relatively limited natural resources, Jordan relies heavily on its educated and talented people. One of
the sectors that depend on human elements is Information Technology (IT) Therefore; Jordan’s vision is to
become an Information Technology hub for the region. Based on the research results e- readiness weakness
reasons in targeted companies were; lack of trust of the electronic services, lack of efficiency of the
regulative rules concerned in the trading operations through Internet (such as electronic signature), the high
cost needed by the internet infrastructure and The high cost of managing the web site limits the spread of the
service. This research provides an appropriate model that can be used to assess e-readiness directly by
assessing the e-readiness enablers that is required to be e-ready. It offers a transparent situation analysis
about the current state of e-readiness in Jordan ICT sector, by analyzing and discussing the problems that
face brick and mortar companies. It recommends improving the legal system concerned with the use of ebusiness in Jordan to meet the details that could face the citizen while using internet and e-business. The best
practices can be used by organizations to improve the overall quality of IT software development and support
through the life-cycle of software development projects, with particular attention to gathering and defining
requirements that meet business objectives.
REFERENCE
Al-Khateeb, F. and Al-Husaini, F (2001) The Impact of Electronic Commerce on The Strategic Position of Jordanian
Industrial Firms, Dirasat Magazine, University of Jordan, Managerial Sciences, Volume 29, pp 163- 181.
Economic Intelligence Agency (2008) e-readiness rankings Raising the bar A white paper from the Economist
Intelligence Unit.
Grigorovici, D.M., C. Constantin, K. Jayakar, R.D. Taylor & J. R. Schement, (2004) A Structural Equation Modeling
Approach To Information Indicators And “E-Readiness” Measurement, 15th Biennial Conference Of The
International Telecommunication Society Berlin, Germany September 5-7, 2004.
Kauffman, R.J., & A. Kumar (2005) A Critical Assessment of the Capabilities of Five Measures for ICT Development,
MIS Research Center, Last revised: March 18.
Kevin Zhu, Kenneth L. Kraemer and Sean Xu (2002) A Cross-Country Study of Electronic Business Adoption Using the
Technology-Organization-Environment Framework. Center for Research on Information Technology and
Organizations University of California, Irvin ICIS 2002 Best Paper: Conference Theme 93 accepted of 526 submitted
papers.
Kirkman Geoffrey S., Osorio Carlos A. and D. Sachs Jeffrey (2002) the Networked Readiness Index: Measuring the
Preparedness of Nations for the Networked World Center for International Development, Harvard University.
McConnell, (2001) Ready? Not. Go! Partnership Leading the Global Economy, McConnell International & WITSA,
USA.
Moolman, Hermanus Barend (2006) E-Readiness of warehouse workers: an
exploratory study. Doctoral Thesis
University of Pretoria. Faculty of Education.
Özmen, S. (2003) E-readiness. E-trade bridge network. Symposium Geneva, International Trade Center Network.
Retrieved November 15, 2004, from http://www.intracen.org
Selim. Hassan (2008) E-Commerce Adoption and Acceptance by Firms: Exploratory Study. International Conference on
Information Resources Management (CONF-IRM) CONF-IRM 2008 Proceedings Association for Information
Systems Year 2008
Payne, J. (2000) E-commerce Readiness for SME s in developing countries: A Guide for Development Professionals,
Academy for Educational Development, Connecticut Avenue, N.W, Washington, USA.
Peppers & Rogers Group, Chemonics International Inc (2006) the e-Readiness Assessment of the Hashemite Kingdom of
Jordan. U.S. Agency for International Development for the AMIR Program in Jordan. Ministry of Communication
and Information Technology
Peters, T (2005) E-readiness Assessment Tools Comparison, Bridges.org, 28 February.
112
IADIS International Conference e-Commerce 2011
Ruikar, Kirti (2004) Business Process Implications of E-commerce in Construction Organizations, A dissertation thesis
for the award of the Engineering Doctorate (Eng D) degree, at Southborough University..
Skran, U. (2000) Research Methods for Business, 3rd edition, Wiley & Sons, Inc. New York
Shannak .Rifat .O and. Al-Debei. Mu’taz. (2006) The Current state of E-Commerce in Jordan. Applicability and Future
Prospects.' An Empirical Study. IBMI Conference, Egypt, Cairo. 457
Todor.Yalamov (2002) E-readiness assessment as a policy tool for development: The case of Bulgaria in a transitional
context. .WIDER Conference (world institute for development economics research. The new economy in development.
Helsinki ,Finland.10-11 May
Tung X. Bui and collaborator (2003) A framework for measuring national e-readiness, Electronic Business journal, Vol.
1, No. 1, 2003 3 Inderscience Enterprises Ltd.
Turabian, Kate L. (1971) Manual Writers of Term Papers, Thesis and Dissertation. Chicago. University of Chicago
Press.
Truong, D., & Rao, S. S. (2003) Development of a contingency model for adoption of electronic commerce. Paper
presented at the Annual Meeting Proceedings of the Decision Sciences Institute.
Turban, E., King, D., Viehland, D. W., & Lee, J. (2006). Electronic Commerce: Managerial Perspective, Pearson
Education, Inc., Upper Saddle River, New Jersey, USA.
Vosloo, S. E. & Roode, D. (2006) who’s Best Practice? A Critical Analysis of the World Summit Awards, Presented at
the 14th European Conference on Information Systems, June 2006, Sweden. (Status: accepted, in press)
113
ISBN: 978-972-8939-51-9 © 2011 IADIS
PROMOTORS AND INHIBTORS OF ONLINE GROCERY
SHOPPING IN DEVELOPING COUNTRIES FROM THE
CONSUMERS’ PERSPECTIVE-JORDAN AS CASE STUDY
Mohammad Al nawayseh, Bader Al fawwaz and Prof. Wamadeva Balachandran
Brunel University / West London, UK
ABSTRACT
This study is one of the first attempts to investigate the expected consumer willingness towards online grocery shopping
in the Jordanian context as a case of the developing countries. It seeks to explore the Jordanian consumer’s general
attitude towards buying grocery on the internet with respect to promoting and inhibiting factors. This study was
conducted by formulating hypotheses. These hypotheses were investigated by designing appropriate questionnaire, the
collected data then analyzed using SPSS. The results obtained that the overall mean of the OGS promoting factors is
greater than the overall mean of the OGS inhabiting factors. From this analysis it was conducted that the Jordanian
consumer’s are willing to adopt online grocery shopping.
KEYWORDS
Online Shopping; Online Grocery Shopping (OGS); Inhibiting Factors; Promoting Factors; Jordan; Developing
Countries.
1. INTRODUCTION
In the era of globalization, the Internet has been increasingly used to facilitate online business transactions,
not only between different business entities, but also between business entities and consumers. One of the
Internet business applications that received much attention in the last few years is Online Grocery Shopping
(Belsie, 1998). Electronic grocery shopping means: ordering of groceries online; the electronic grocery stores
offer an electronic ordering interface, and the retailer takes care of packaging and delivery of the goods to the
customer. Online Grocery Shopping has many potential benefits to consumers, particularly in terms of better
prices, large selection, convenience and time-savings. In addition, the retailers will ultimately obtain
significant benefits as it will lead to more efficient use of workforces and simplification of building
infrastructure. However, groceries are one of the most difficult objects of trade for electronic commerce;
material flows are different from information flows, the number of frequent customers is large, and the
shopping basket will contain many items (Kurnia, et al., 1999). Furthermore, it is more local than global, for
example, selling digital products are easily accessible throughout the world. It is also more difficult than
electronic commerce of many other products such as books or clothing, because of low value-to-weight ratio
of groceries and shelf time limitations of perishable goods. The Delivery systems with temperature controlled
storage also causing additional difficulties to Online Grocery Shopping (Kurnia, et al., 1999). While ecommerce adoption has been concentrated in developed countries, especially online grocery commerce; there
is still doubt about the positive expectations of e-Commerce for developing countries. This could be
explained by the differences in e-Commerce readiness, business conditions and consumers’ attitudes towards
online shopping between these countries (Odera, 2003). This study would try to identify the Jordanian
consumer willingness to adopt e-grocery shopping in general, also to highlight the nature of expected
consumer attitudes towards online grocery shopping expressed by the gained benefits or the faced barriers.
The results of this study can serve as a basis for future exploration. It is also hoped to benefit grocery product
retailers, and those who are planning to invest in this new retail format in future.
114
IADIS International Conference e-Commerce 2011
2. REVIEW OF LITERATURE
Online Grocery Shopping was first offered in United States in the late 1980s (Belsie, 1998) as many of USbased retailers such as Peapod, Streamline, Netgrocer have entered the market. Since then European
countries like Switzerland, Sweden, Denmark, Finland, UK and other developed nations such as Australia,
Japan and Singapore followed the market trends and many big grocery retailers have also appeared in these
countries such as Tesco, Sainsbury, Albert Heijn and Carrefour (O'Connor, 1998). Table (1) gives examples
from the world leading grocery companies. Initially there was a lot of optimism about selling groceries online
and this industry will be among the fastest growing online businesses around the world because of the Highvolume, low-margin industry (such as food and logistics) and it will turn to the Net cost savings from
automation. However, the optimism was replaced by scepticism when Webvan (the pioneer of online grocery
business based in USA) decided to file for bankruptcy in July 2001 due to its inability to find an optimal and
sustainable business model (Jan, et al., 2000). After that various aspects of online grocery shopping have
been studied to identify the characteristics that can contribute to building a successful online grocery
business; many of these studies have compared the successful and less successful companies in this industry
and others related to the customer’s attitudes and willingness towards online grocery shopping.
Table 1. Grocery retailers
Tesco
UK
The biggest
supermarket
chain in the UK
Web van
USA
Started as a
pure e-grocer
in1999
Streamline
USA
Started as a
pure egrocer in
1992
Peapod USA
Investments
in e-grocer
development
Main
operational
mode
US $58 million
Approx US $
120 million
Approx US
$80 million
Approx US $
150 million
Industrialized
picking from the
supermarket
Highly
automated
picking in
distribution
centre (DC)
Current
status
The biggest egrocer in the
world.
Expanding its
operations
outside the UK.
Partnering with
Safeway and
Groceryworks.
Operations
ceased July
2001
Picking
from the
distribution
centre,
reception
boxes, value
adding
services
Parts of
operations
were sold to
Peapod in
September
2000. The
rest of
operations
ceased in
November
2000.
Background
Carrefour
France
The largest
hypermarket
chain in the
world in terms of
size
Approx US $ 100
million
Ito-Yokado
Japan
The largest
supermarket chain
in the Japan
Picking from
both DC and
stores
Picking from the
supermarket
Picking from the
supermarket
Bought by
global grocery
retailer Royal
Ahold. Second
biggest e-grocer
in the world.
announced that it
was “highly
likely” that it
would dispense
with its
Champion fascia,
with all stores
expected to be
rebranded under
the Carrefour
name
There are 174 ItoYokado stores
operating in Japan.
Expanded
to China, where
they formed a
joint venture
with Wangfujing
Department
Store and China
Huafu Trade &
Development
Group Corp
Started home
delivery service
before the
Internet in 1989
Approx US $ 140
million
Source: Tanskanen, Yrjola and Holmstrom, 2002.
Retail Index, siamfuture, 2010.
In the developing countries, retailers are still at the fancy stage about this kind of retailing. However , a
very few successful online grocery retailers appeared especially in china and Indonesia such as Suguo and
Carrefour as a kind of foreign and national investments (Kurnia, et al., 2004). These companies are facing
significant barriers to implement their online business models, due to poor national infrastructure, weak legal
framework, inadequate IT skills, lack of timely and reliable systems for the delivery of physical goods, low
bank account and credit card penetration, low income, and low computer and Internet penetration. On the
other hand, only a few identifiable e-grocery shopping driving forces were found such as cost reduction,
trading partner demands and telecommunication privatization (Kurnia, et al., 2004, 2006). In the Hashemite
Kingdom of Jordan as a case of the developing countries E-Commerce in general is almost not popular
115
ISBN: 978-972-8939-51-9 © 2011 IADIS
among customers and retailers and it is in a very early stage of development, As There are a few websites
that offer merchandizes that can be bought online with the use of credit cards. The following are four
examples of E-Commerce websites: http://www.zalatimosweets.com , http://www.mazaiic.com ,
http://www.jormall.com, http://www.buyfromjordan.com.
However , during the last decade, Jordan has witnessed improvements in the E-commerce sector
according to the 2007 e-readiness rankings from the (Economist Intelligence Unit) in terms of (Connectivity
technology infrastructure, Business environment, Social and cultural environment, Legal environment,
Government policy and vision, Consumer and business adoption) . These improvements were due to the
large efforts that going to improve competition and foreign investment policies also as a result of lunching
several initiatives and strategies implemented by the government and the private sector such as Reach
initiative (2000-2004) and the national strategy for electronic trade (2008-2012).
3. METHODOLOGY
The study was carried out using the survey approach. This section provides a description bout the research
instrument design, the sampling procedure and data collection technique. A specially designed questionnaire
was distributed among 200 randomly selected customers, out of which 178 were returned. Only a total of 150
responses were used for the final analysis. The others were discarded, mainly due to missing values. The
survey was carried out in three major cities in Jordan; Amman, Irbid and Karak, since they are the highly
populated areas in the Middle, North and south of Jordan respectively. In order to reduce misinterpretations,
the questionnaire was made bilingual, using Arabic and English. The original English version was translated
into Arabic using the back-to-back translation method (Zikmund, 1997). Also a pilot study was conducted
before the questionnaire was sent out. It was conducted with 10 respondents and helped in refining the
questions and the layout of the questionnaire. The questionnaire was divided into four parts; the first part was
asking about the respondents demographic variables such as gender, age, etc (table 2). The second part was
asking about the ICT skills and the internet access (how, where and how often). The third part was asking
about the traditional way of grocery shopping including the frequency of shopping, time of shopping and the
type of shops in order to analyze the respondents’ answers. The last part which is the main core of this paper
was asking about the expected benefits and barriers of online grocery shopping using the 5-point likert scale
ranging from 1 (‘strongly disagree’) to 5 (‘strongly agree’) for each item . Fourteen statements were used to
measure if the Jordanian consumers are favorable to the idea of purchasing grocery online or not. We used
the statistical analysis tool SPSS to test the validity of our main hypothesis.
Table 2. Demographic Variables of the respondents
Item
Gender
Age
Education level
Income level
Access to credit cards
Employment Status
Area of living
116
Male
Female
18-29
30-50
>50
Lower education
High school
Bachelor
Graduate
<300
300-500
>500
Yes
No
Public sector
Private sector
Not working
Rural
Suburban
urban
Frequency
91
59
79
57
14
7
22
100
21
21
100
29
112
38
105
29
16
25
58
67
Percent
60.7
39.3
52.7
38
9.3
4.7
14.7
66.7
14
14
14.7
66.7
74.7
25.3
70
19.3
10.7
16.7
38.7
44.7
IADIS International Conference e-Commerce 2011
4. RESULTS AND DISCUSSION
4.1 Benefits from Online Grocery Shopping
Online grocery customers benefit from convenience and higher quality, fresher food (T. C. Fishman) of this
kind of shopping. Online conveniences include the ability to:
(1) Add to the saved shopping list over several days.
(2) Email lists to other family members.
(3) Comment on items.
(4) Receive personalized coupons.
(5) Sort items by calorie count or nutritional information such as sodium content.
(6) Order the ingredients for “one click meals” automatically from online recipes.
(7) Help elderly and disabled customers in home shopping.
Furthermore, according to (Burke, 1997; Darian, 1987) Electronic grocery shopping saves consumers’
time; Due to less transportation time, less waiting time and less planning time and absolutely this is perfect
for busy and relatively affluent consumers who are willing to pay for delivery because of the convenience.
Another advantage of electronic grocery shopping is achieved when a large number of shops give consumers
the ability to select among them according to the brand, prices and others. online grocery store also gives
consumers the ability to carry out transactions at any time of the day (Cheah, 2001; Jan, 2002) since they are
operating 24 hours a day and seven days a week. Table (3) includes the possible benefits from adopting
online grocery shopping (OGS). From the answers of the respondents we see that the majority of them
believe that there are benefits from online grocery shopping and also shows that online shopping will save
their time get the highest average which means it is the most expected benefit from shopping online.
According to the SPSS analysis it was found that the overall Mean (4.11) is greater than mean of the scale
which is 3, this gives an indicator of a positive attitude from the respondents toward the benefits of OGS in
general. The decision here cannot determine on the Mean alone because we have to ensure that the data is not
concentrated in the neutral area. So we need first to put a hypothesis and test it:
Table 3. Benefits to adopt OGS.
Benefits
Enjoyment and fun.
Good selection, availability and quality.
Good price, deal, and comparison.
Broader supply and far shopping.
Easy to use.
Saving my time.
Reduces transport cost.
Convenient for people with specific considerations (female, elders and
physical).
All paragraphs
Mean
3.97
4.19
4.13
4.01
4.14
4.21
4.17
Std.
Deviation
1.013
0.953
0.902
1.007
0.983
0.945
0.923
4.09
0.976
4.11
0.665
4.1.1 Hypothesis One
H0: there are no expected benefits from Online Grocery Shopping according to the customer’s opinion in
Jordan. (Null Hypothesis).
HA: there are expected benefits from Online Grocery Shopping according to the customer’s opinion in
Jordan. (Alternative Hypothesis).
In order to test this hypothesis we need to use the One-Sample T-Test table (4). The decision rule here is
to accept the null hypothesis H0 if the calculated value of T is less than the tabulated one and to reject the
null hypothesis H0 if the calculated value is greater than the tabulated one. It is found here that T calculated =
39.641 is greater than T-tabulated = 1.96(confidence interval =0.95%, DF=∞). Therefore the null hypothesis
HO is rejected and the alternative hypothesis HA is accepted, because the Mean is more than 3 and the Tcalculated is more than T-tabulated (This means that the data is not concentrated on the neutral area and there
is an actual existence for the benefits from OGS) and T Sig. (0.000) is less than (0.05) (Rifat.2003)
117
ISBN: 978-972-8939-51-9 © 2011 IADIS
Table 4. Results for the first hypothesis using the one sample t-test.
H1
Test Value = 1.96
t-calculated
df
39.641
149
Sig.
tailed)
.000
(2-
4.2 Resisting Online Grocery Shopping
Consumers’ traditional shopping habits are difficult to change (T. C. Fishman) as well as they may be
reluctant to pay the delivery charge. The demand is increasing and the customer income also increasing so it
is critical for e-grocers to provide high quality products and service to gain customers loyalty. If consumers
are disappointed from their online shopping experience they may stay away and from the other side
discouraging others from trying online grocery shopping. The uncertainty of product quality is another factor
discouraging consumers from buying groceries on the internet. Some offerings need to be consumed before
the quality can be ascertained (Ward and Lee, 2000; Morganosky), since Customers desire to see and touch
products, particularly fresh products. Three specific risk factors can prevent widespread customer acceptance
of online grocery shopping:
 Perceived or actual lack of security or privacy of online transactions. This issue is the most
overwhelming barrier to purchase online (Kaur, 2005).
 There is also a great concern among consumers with regard to the delivery process of groceries
purchased online according to (Keh ; Shieh, 2001).Difficulties in making accurate and timely deliveries to
consumers, also the perceptions that online delivery services are premium services and therefore may be
more expensive than traditional grocery stores.
 Social needs in conventional purchasing this mean that many people go shopping since they can interact
with other people (Darian, 1987) and (Tauber, 1972).
Table (5) includes the possible barriers to adopt online grocery shopping (OGS). From the answers of the
respondents we can see that the majority of them believe that there are barriers to adopt online grocery
shopping.
Table 5. Barriers to adopt OGS
Barriers
The service availability.
The delivery issue.
The lack of trust and concerns about the security and privacy of personal
information issue.
The technology factors (It skills and web features) is obstacle to
shopping online.
The product selection (brand, quality, freshness and taste).
The social and cultural issues.
All paragraph
Mean
3.58
3.71
Std.Deviation
1.166
1.266
3.80
1.274
3.72
1.199
3.84
3.53
3.73
1.232
1.283
0.976
The results shows that the product selection item get the highest average which mean it is the most
expected barriers to adopt online grocery shopping. According to the SPSS analysis it was found that the
overall Mean (3.73) is greater than mean of the scale which is 3, this gives an indicator of a positive attitude
from the respondents toward the barriers of online grocery shopping OGS in general. The decision here
cannot determine on the Mean alone because we have to ensure that the data is not concentrated in the neutral
area. So we need to put another hypothesis and to test it:
4.2.1 Hypothesis Two
H0: there are no barriers for Online Grocery Shopping according to the customer’s opinion in Jordan.
HA: there are barriers for Online Grocery Shopping according to the customer’s opinion in Jordan.
In order to test this hypothesis we need to use the One-Sample T-Test, table (6). Also the decision rule
here is to accept the null hypothesis H0 if the calculated value of T is less than the tabulated one and to reject
the null hypothesis H0 if the calculated value is greater than the tabulated one. It is found here that T
118
IADIS International Conference e-Commerce 2011
calculated = 22.190 is greater than T-tabulated = 1.96 (confidence interval =0.95%, DF=∞). Therefore the
null hypothesis H0 is rejected and the alternative hypothesis HA is accepted, because the Mean is more than
3 and the T-calculated is more than T-tabulated (This means that the data is not concentrated on the neutral
area and there is an actual existence for the barriers to adopt OGS) and T Sig. (0.000) is less than (0.05)
(Rifat.2003).
Table 6. Results for the second hypothesis using the one sample t-test.
H2
Test Value = 1.96
t-calculated
df
Sig. (2-tailed)
22.190
149
.000
5. CONCLUSION
The preliminary findings from our survey suggest a number of important factors which either promote or
inhibit Internet users to participate in OGS. According to our study results, the majority of the respondents
were confident that there are benefits that promote the adoption of online grocery shopping in Jordan.
However, they also believe that there are inhibiting factors to adopt online grocery shopping. The study also
shows that the main motivation for OGS is time saving and the main inhibitor is the customers’ preference to
touch and see the product to check its characteristics before purchasing. Further research needs to be done to
explore the customer’s willingness, attitudes and behavior towards this kind of online shopping in the
developing countries .the researchers should also look to the retailer’s point of view about OGS in terms of
inhibitors, benefits and the profitable business models.
REFERENCES
Alba, J.et.al. 1997. Interactive home shopping: consumer, retailer and Manufacturer incentives to participate in electronic
grocery shopping. Journal of Marketing 6, 38, 53.
Belsie, L. (1998) A Mouse in the Bakery Aisle? The Christian Science Monitor, http://www.csmonitor.com, last accessed
July 2001.
Burke, R.R., 1997. Do you see what I see? The future of virtual shopping. Journal of the Academy of Marketing Science
25, 352,360.
Cheah, K.H. (2001) Issues Related to Internet Shopping: An Ethnic Comparison, MBA Dissertation, University of
Malaya, Kula Lumpur.
Darian, J.C., 1987. In-homeshopping: are there consumer segments? Journal of Retailing 63, 163,186.
Ezlika Ghazali et.al, 2006, exploratory study of buying fish online: are Malaysians ready to adopt online grocery
shopping?
Jan Holmström et.al. (2002), the way to profitable internet grocery retailing –six lessons learned.
Kaur, K. (2005) Consumer Protection in E-Commerce in Malaysia: An Overview.
Keh, T.K. and Shieh, E. (2001) ‘online grocery retailing: success factors and potential pitfalls’, Business Horizon, Vol.
44, No. 4, pp.73–84.
Kurnia, S. and Johnston, R.B. (1999) The Mutuality of ECR Benefits, Costs and Risks in Supply Chain Reform, The
third Collaborative Electronic Commerce Technology and Research, Wellington, New Zealand.
Meddeh, M., 2008, Startup Arabia. http://www.startuparabia.com/2008/09/jordans-internet-penetration-rategrows-to-21.
Morganosky, M.A. and Cude, B.J. (2000) ‘Consumer response to online grocery shopping’, International Journal of
Retail and Distribution Management, Vol. 28, No. 1, pp.17–26.
O'Connor, R., 1998. Europe trails U.S. in web grocery shopping. Chain Store Age 74 (6), 70, 72.
Odera-Straub, M., E-commerce and Development: Whose Development? The Electronic Journal on Information Systems
in Developing Countries, 2003. 11(2): p. 1-5.
Reach 1.0, 2000, <http://www.reach.com.jo>.
119
ISBN: 978-972-8939-51-9 © 2011 IADIS
Rifat O. Shannak, Mu’taz M. Al-Debei, 2003, the current state of e-commerce in Jordan: applicability and future
prospects. An empirical study .Internet and Information Technology in Modern Organizations: Challenges &
Answers 457.
Roberts, M., Xu, X.M. and Mettos, N. (2003) ‘Internet shopping: the supermarket model and Customer perceptions’,
Journal of Electronic Commerce in Organizations, Vol. 1, No. 2, April–June, pp.32–44.
Rochester, N.Y., 2009. Internet penetration in Jordan doubles to 36% in two years strategies. Harris Interactive, Inc
Sherah Kurnia, 2004, Identifying e-Commerce Adoption Driving Forces and Barriers: The Case of the Indonesian
Grocery Industry.
Sherah Kurnia, 2006, Exploring e-Commerce Readiness in China: The Case of the Grocery Industry.
Stephen Hawk ,2004, Comparison of B2C e-commerce in developing countries, Electronic Commerce Research 14 (3)
181.
Tauber, E.M., 1960. Discovering newproduct opportunities with problem inventory analysis. Journal of Marketing 24,
67.70.
T. C. Fishman, "Click here for tomatoes," in Money Magazine, 2005, pp. 143-146.
Ward, M.R. and Lee, M.J. (2000) ‘Internet shopping, consumer search and product branding’, Journal of Product and
Brand Management, Vol. 9, No.1, pp.6–20.
Zikmund, W.G. (1997) Business Research Methods, 5th ed., the Dryden Press, Fort Worth.
120
IADIS International Conference e-Commerce 2011
ORGANIZATIONAL CONTROL ENVIRONMENT AND
COBIT’S IT CONTROL PROCESS IMPLEMENTATION
Nader Rezaei1 and Gareth Griffiths2
1
2
Oxford Azad University, Stroud Court, Eynsham, Oxford, OX29 4DA, UK
Bangor University, Bangor Business School, Bangor, Gwynedd, LL57 2DG, UK
ABSTRACT
The implementation of IT control processes (ITCP) is affected by organizational control environment (CE). This paper
presents the results of an experimental study exploring the influence of organizational CE components (Corporate Ethical
Environment, Commitment to Component, Board of Director and Audit Committee, Management Philosophy and
Operating Style, Organization Structure, Assign Authority and Responsibility and Human Resource Policies and
Practices) based on COSO framework on four domains (Plan and Organize, Acquire and Implement, Deliver and Support
and Monitor and Evaluate) of ITCPs based on COBIT framework. One hundred and ninety eight relatively experienced
external and internal auditors and accounting managers responded to the mail survey. Results reveal the association
between CE components and ITCPs. The results of study could help auditors and managers and other practitioners in
designing and implementing IT control systems.
KEYWORDS
Internal control; Control environment; Information technology; IT control processes
1. INTRODUCTION
The pervasive use of IT has created a critical reliance on IT and exposed many organizations against new
risks (Haes and Grembergen, 2008, Abu-Musa, 2008). Management of these risks requires specific focus on
IT governance (ITG). Therefore, implementing effective ITG is necessary for organizations with expended
dependencies on IT (Bodnar, 2006). ITG involves IT risks and managing the strategies and policies for the
use of IT to support organization’s objectives. It includes leadership and organizational processes that ensure
the enterprise’s IT supports the business strategies and objectives (COBIT4.1, 2007) and aligns IT to the
business needs (Haes and Grembergen, 2008).
Business IT alignment debates have been intensified during recent years among practitioners and
academics (Larsen et al, 2006) and several ITG models have been created (Haes and Grembergen, 2008). The
Control Objectives for Information and related Technology (COBIT) has been developed as an acceptable
and applicable standard (Larsen et al, 2006) for alignment between use of IT and organizations business
objectives (Ridley et al, 2004). COBIT has been created and introduced by the Information Systems Audit
and Control Association (ISACA). It is one of the well-built and multilateral ITG frameworks that allow
bridging the gap between business risk, control needs, value creation and technical issues (Bodnar, 2006).
The preliminary step in the implementing IT control processes is the review of the organization control
environment to obtain the information required for management to make decisions on the necessary controls.
The necessity of various controls differs according to CE characteristics and organizational contingencies
(Lee and Han, 2000). CE is one of five internal control components that Internal Control Integrated
Framework issued by Committee of Sponsoring Organizations of Treadway Commission (COSO) identified
it as the foundation for all other components of internal control (D’Aquila, 1998).
Despite the apparent importance of the CE, little empirical research has been conducted to investigate the
relationship between the CE and ITCPs implementation. Therefore, this research was carried out to reveal
whether there is a relationship between CE and ITCPs implementation. Consequently, this study addresses
the major CE components affecting ITCPs implementation. The literature on CE theory as well as COBIT’s
ITCPs is reviewed and a research model is proposed. The main results of empirical survey for proposed
121
ISBN: 978-972-8939-51-9 © 2011 IADIS
model is analyzed and discussed. Finally, a summary of the findings and recommendations for ITCPs
practitioners and researchers are presented.
2. THEORICAL FRAMEWORK
Organizations employ control frameworks to establish and assess of internal controls. The Treadway
Committee suggested COSO framework as a proper base for internal control assessments. COSO is a highly
conceptual framework that most organizations employ it for the evaluation of control at a relatively general
level. It is not adequate for practical level and such electronic business environment with specific and
specialized IT processes (Tuttle et al, 2007). For this reason, ITG has emerged to control the formulation and
implementation of IT strategy and ensure the fusion of business and IT (Heas and Grembergen, 2008).
Within concentrated IT environment, COBIT as a tool for ITG is applied COSO supplemental framework
(Tuttle et al, 2007).
The COBIT is a set of best practices for IT management. It is one of the strongest practices available to
help an organization to determine whether IT supports the strategies of an organization (Marnewick, 2010).
The COBIT assists meet the several needs of management in technical issues, control needs and business
risks. It provisions good practices across domains and processes framework and presents activities in a
practicable and logical structure. The four high level domains, Planning and Organization (PO), Acquisition
and Implementation (AI), Delivery and Support (DS), and Monitoring and Evaluating (DE) comprise of 34
ITCPs with detailed control objectives (Funilkul et al, 2006).
2.1 IT Control Processes
Since IT plays an essential role in a company’s internal control system, and ITCPs have attracted board level
attention (Grant et al, 2008), most organizations have utilized ITG tools such as COBIT framework for
guidance to establish and evaluate IT controls and for compliance with new legal requirements same as the
Sarbanes–Oxley Act (SOX) (Bernroider and Ivanov, 2010). There is no framework that comprehensively
covers the total spectrum of structures and processes relevant to ITG except COBIT (Abu-Musa,
2008).COBIT provides managers, auditors, and IT users with a set of performance measures, key goal
indicators, diagnostic tools and best practices, to help them in maximizing the benefits derived through the
use of IT (COBIT 4.1, 2007,Abu-Musa, 2008).
COBIT defines IT activities in a generic process model within four domains (PO, AI, DS, and ME)
covering the IT traditional responsibility areas of plan, build, run and monitor (COBIT 4.1, 2007, Miroslavet
al, 2008). Within each domain there are definite processes that organizations should address to achieve
specific IT related control objectives (Tuttle et al, 2007). PO domain refers to strategy and tactics, and
involves in establishing the best way that IT can contribute to the accomplishment of the business objectives.
AI domain addresses the identification and providing solutions and applications that will meet business
functional requirements. In addition AI is in responding to business and IT environmental changes. DS
domain is concerned with the delivery and support of required services. It is involved in service levels and
continuity, ensuring systems security and configuration, management of performance and operation, thirdparty services, problems and help desk services, and user training. ME domain includes IT performance
management, internal control evaluation, regulatory compliance and governance to regularly assess over time
for control requirements. These four domains and 34 IT processes mainly provide comprehensive dimensions
of an organization’s IT processes performance and capability that need to be managed.
2.2 Control Environment
The topics of CE are often difficult to grasp (Sanchez et al, 2007) due to its abstract and diffused concept.
Nevertheless, the auditing standards emphasize the importance of control environment and its comprehensive
consideration has been required (e.g. SAS No. 109). The way business activities are organized, objectives
founded and risks assessed has been influenced by the CE. Many factors determine the CE and some are
discussed below. The CE questionnaires and checklists organize CE components into seven dimensions:
corporate ethical environment (CEE); commitment to competence (CC); board of directors or audit
122
IADIS International Conference e-Commerce 2011
committee (BOAD); management’s philosophy and operating style (MPOS); organizational structure (OS);
assignment of authority and responsibility (AAR); and human resource policies and practices (HRP). In this
study we use this categorization. It (independent variables in the research model) will be discussed and
hypotheses are developed as follows.
2.2.1 Corporate Ethical Environment
The company’s objectives and the way they are obtained are based on ethical values which are translated into
behavior standards (COSO, 1992). The CEE includes polices about acceptable business practices, procedures
for complying with regulations and policies regarding illegal acts. Furthermore it indicates management’s
reactions to noncompliance with ethics and regulation and governing relationships with customers, creditors,
suppliers, regulators and etc. Valentine et al (2002) explored the CEE was significantly associated with the
employees’ organizational commitment. Rae and Subramaniam (2008) demonstrated that internal controls
quality is significantly and positively related to CEE. In this study we expect that the ITCPs for control over
information and management of IT related risks are influenced by integrity and ethical values. Thus the first
hypothesis of the study is as follows:
H1. Companies with high level in CEE components are more likely to have high level implementation of
ITCPs.
2.2.2 Commitment to Competence
An organization needs to identify the required competence level for its different job tasks and to transform
those requirements into necessary levels of skill and knowledge (Moeller, 2007). In other word, the
organization should identify competencies, retain individuals with those competencies and periodically
evaluate competencies (Rittenberg et al, 2009). CC is made by placing the proper people in appropriate jobs
and providing adequate training (Moeller, 2007). Deron (2008) investigated the effects of intensification
employee competence and its impacts on improving quality performance in small-company environment.
The results demonstrated that developing competence result in enhanced quality and ultimate cost reductions.
Bassellier et al (2003) explored the concept of IT competence of business managers as a contributor to their
intention to champion IT within their organizations. This component of CE is critical for ITCPs, as people
are important assets, and governance and the ITCPs are heavily dependent on the motivation and competence
of personnel. Thus, we argue that with increasing levels of CC, the implementation of ITCPs can be
enhanced based on the preceding discussion, the second hypothesis is as follows:
H2. Companies with high level in CC components are more likely to have high level implementation of
ITCPs.
2.2.3 Board of Directors or Audit Committee
Members of the board of directors are elected by shareholders as representatives and have responsibility for
management surveillance and evaluating organization’s strategic plans (Rittenberg et al, 2009). Factors of a
capable board and audit committee include independence from management, experience of its members,
extent of its involvement of activities, and the appropriateness of its actions (COSO, 1994). Beasley (1996)
found that firms with significantly higher percentage of outside board members have fewer frauds; however
the existence of audit committee does not affect the probability of fraud. Zhang et al (2007) investigated a
relationship between audit committee quality and internal control weakness. It was stated firms are more
likely to be identified with an internal control weakness, if their audit committees have less experiences and
independence. In this manner, Li et al (2007) explained companies with more IT experienced board members
and higher level of independent board directors is less likely to have IT control material weakness. We expect
that board and audit committee characteristics are associated with IT control processes implementation
quality. Therefore, our third hypothesis is:
H3. Companies with high level in BDAC components are more likely to have high level implementation
of ITCPs.
2.2.4 Management’s Philosophy and Operating Style
The way the business is run and its risk acceptance is significantly affected by MPOS (Harrer, 2008). The
components of MPOS includes attitudes toward timely financial reporting and accurate disclosures, emphasis
on meeting financial and operation objectives, ability to adapt new roles response to changes, concerns to
123
ISBN: 978-972-8939-51-9 © 2011 IADIS
reliability and accuracy of information and accounting estimates, and concerns about internal controls and
business environment. Chiesa (1999) studied management control styles over R&D units. It is found that the
control relies on managers’ mind set and attitude and the certain types of managerial styles to be appropriate
to certain types of R&D organization structures. In this manner clearly the research activities require higher
degrees of autonomy. ITCPs should be aligned with enterprise’s management aims and directions including
expectations regarding delivery of value from IT investments and appetite for risk. The forth hypothesis
attempts to investigate the influences of MPOS on ITCPs implementation.
H4. Companies with high level in MPOS components are more likely to have high level implementation
of ITCPs.
2.2.5 Organizational Structure
The OS provides an overall framework for planning, executing, controlling, and monitoring operations for
achieving entity-wide objectives. Significant aspects relevant to OS include appropriateness of organization
size and complexity, defining important areas of authority and responsibility, segregating duties, smoothing
flows of information and creating proper lines of communicating and reporting (COSO, 1994). Ouchi (1977)
attempted to uncover the relationship between control and structure. He argued that approximately 33 percent
of the variance in the control mechanisms can be defined by company structural characteristics. Lee et al
(2000) revealed that large and complex organizations with integrated IT applications are positively correlated
with external formal controls and automated controls. For these reasons and following these studies, the
relationship between companies appropriate OS and ITCPs implementation is probed. The supposed
hypothesis is as follow:
H5. Companies with high level in OS components are more likely to have high level implementation of
IT control processes.
2.2.6 Assignment of Authority and Responsibility
Authority and responsibility are intertwined with the organization’s structure (Rittenberget al, 2009). The
company should assign limitations of authority, assign responsibility to employees and establish reporting
relationships (Harrer, 2008). Authority and responsibility for operating activities are generally assigned by
business practice polices on the delegation of authority and responsibilities, authorization hierarchies and
reporting relationships (Dauber et al, 2009). We posit that the adequacy of company’s policies regarding the
assignment of responsibility and the delegation of authority help companies improve IT related control
processes. Based on the above arguments, we produce our sixth hypothesis:
H6. Companies with high level in AAR components are more likely to have high level implementation of
IT control processes.
2.2.7 Human Resource Policies and Practices
Human resource policies and practices relate to hiring, direction, training, evaluating, advising, promoting,
rewarding and remedial actions (COSO, 1994). The organization’s HRPP should support integrity, ethical
behavior, and competence and management should encourage its employees with the appropriate tools and
training to succeed (Rittenberget al, 2009).
Choi et al (2009) examined the effect of human resource investment in internal control over financial
reporting on the existence of internal control weaknesses. They measured firm’s human resource investment
by the ratio of the number of employees involved with the internal controls implementations to the total
number of employees. It was found out that the proportion of internal control personnel is negatively
associated with the existence of internal control weaknesses. This paper aims to explore the HRPP effects on
IT control processes implementation. This concern made the basis for development of the following research
hypotheses:
H7. Companies with high level in HRPP components are more likely to have high level implementation
of IT control processes.
124
IADIS International Conference e-Commerce 2011
3. RESEARCH METHODOLOGY
3.1 Data Collection
The data for this study were collected using questionnaire designed to measure the perceived IT controls,
control environment and demographic information. Data about IT control processes implementation were
obtained using questions developed based on COBIT’s framework and organization’s control environment
data were collected using questions developed based on guidelines established by COSO (1994). Pre-testing
and piloting are important steps in the development of the questionnaire. Several useful suggestions and
comments came. These were used to refine the questionnaire in order to prepare the questionnaire for the
pilot study. A sample of 650 CPAs (including 270 external auditors, 210 internal auditors and 170 accounting
and financial managers) was randomly selected. A packet containing the questionnaire and a stamped selfaddressed envelope was mailed to each of the 650 CPAs. Only 198 questionnaires were received out of the
650 questionnaires, that 174 questioners were usable. The usable response rate for detailed analysis was
26.7%.
3.2 Measures, Measurement Reliability, and Validity
The measures were adapted from COBIT and COSO framework as explained above and a multiple 5 point
Likert scale is used to quantify measures in the questionnaire. Reliability and validity tests were conducted
for the collected data. A reliability analysis was conducted by using Cronbach’s alpha model on the collected
data. All scales exceed 0.738. The result shows that the questionnaire design is moderate to high reliable, and
the collected data are reliable and consistent (Bagozzi, 1994). In this study, the measures are pretested by
both practitioners and two academics to enhance the content validity of the instrument.
4. DATA ANALYSIS AND RESULTS
Multiple regression analysis was carried out to analyze collected data and examine the significance of the
relationship between individual variables of organizational CE and ITCPs implementation. Table 1 presents a
set of regression analysis with the four domains of ITCPs as dependent variables and the CE components as
independent variables. All the regression models deduce to have significant F ratios (p-value < .001), with
= 0.245, 0.283, 0.223, o.217).
good explanatory power (Adjusted
The results of table 1 indicate that companies with high level in CEE components are more likely to have
high implementation of PO and ME control processes. Despite the overall effects of ethical values on
employees and managers performance (Valentine et al, 2002), and it’s positively relations with internal
control quality (Rae and Subramaniam, 2008), our evidence reveals that some of ITCPs (PO and ME) are
affected by the components of CEE. For examples, the definition of strategic IT plan (PO1) is developed
based on acceptable business practices.
In this study, the obtained results for CC are similar to CEE so that, companies with high level in CC
components are related to high implementation of PO and ME. The previous studies have substantiated the
effects of employee and mangers IT competence on improving quality of performance (Deron, 2008),
championing IT (Bassellier et al, 2003) and establishing controls on specific IT system (EDI) (Lee and Han,
2000). The process of IT human resources management (PO7) entails management awareness of employee’s
required skills and knowledge and competency level. In the monitoring and evaluation processes, the
compliance with external requirements (ME3), among other necessities, implies to personnel competence and
certifications requirements.
125
ISBN: 978-972-8939-51-9 © 2011 IADIS
Table 1. Multiple Regression Results
Dependents
Plan & Organize
Independent
Constant
CEE
CC
BDAC
MPOS
OS
AAR
HRPP
Adjusted
F
Significant F
Constant
CEE
CC
BDAC
MPOS
OS
AAR
HRPP
Adjusted
F
Significant F
Beta
S.E.
Acquire &Implement
t Value
p Value
.470
.407
.172
.078
.167
.068
.255
.076
.164
.083
.081
.075
-.066
.071
.035
.075
.277
.245
8.739
.000
Delivery & Support
1.156
2.357
2.226
3.556
2.239
1.068
-.944
.495
.250
.020
.027
.000
.027
.287
.346
.621
Beta
S.E.
t Value
.723
.075
.113
.131
.177
.193
.046
.116
.256
.223
7.943
.000
.355
.070
.060
.068
.073
.066
.062
.067
2.034
1.015
1.501
1.802
2.404
2.532
.655
1.607
p
Value
.044
.312
.135
.073
.017
.012
.514
.110
Beta
S.E.
-.027
.400
.073
.078
.132
.067
.204
.076
.187
.081
.037
.073
.161
.069
.192
.074
.313
.283
10.357
.000
Monitor & Evaluate
t Value
-.068
1.011
1.815
2.897
2.604
.494
2.349
2.756
Beta
S.E.
t Value
.286
.176
.154
.176
.116
-.007
.019
.197
.250
.217
7.746
.000
.406
.079
.068
.077
.082
.074
.070
.076
.703
2.369
2.067
2.428
1.575
-.088
.271
2.739
p
Value
.946
.313
.071
.004
.010
.622
.020
.007
p
Value
.483
.019
.040
.016
.117
.930
.787
.007
The relations of BDAC domain to internal controls has been considered and investigated more than other
CE domains in the previous studies. As Zhang et al, Li et al (2007), and Hoitash et al (2009) have
authenticated the positive relationship between strong BDAC and quality of internal controls. We found that
three domains of ITCPs including PO, AI and ME are significantly supported by BDAC. Board of directors
steer the enterprise’s strategic IT plan (PO1) to extend the organization’s strategies and objectives and
satisfies the business requirement (COBIT 4.1, 2007). Moreover audit committee should monitor IT
performance (ME1) and IT’s contribution on business and evaluate to what extent planned IT objectives have
been achieved, budgeted IT resources (AI5) used, set performance IT targets met and identified IT risks
(PO9) mitigated (COBIT 4.1, 2007).
According our findings, the implementation of ITCPs domains are mostly influenced by MPOS along
with BDAC, so that, the implementation of PO, AI and DS are significantly supported by MPOS. MPOS
affects ITCPs in strategic and operational levels. Management with identification of business environment
determines business requirements for IT and expands a strategic IT plan (PO1). Responding to business IT
requirements entails change management process (AI6) and management ability to adopt new roles (COBIT
4.1, 2007).
OS fails to affect the implementation of PO, AI and ME domains. Only the DS processes implementation
is significantly supported by OS. Appropriate OS helps to manage the configuration (DS9) of IT
infrastructure, resources and capabilities. It makes smooth information flows across the organization and
optimizes data management (DS12). Organization with proper OS supports IT security systems (DS5) and
minimizes vulnerabilities. It manages physical environment (DS12) and protects computer assets business
data (COBIT 4.1, 2007).
While AI is significantly affected by AAR, the AAR fails to influence other ITCPs domains (PO, DS and
ME). AAR and OS are two least impressing CE components on ITCPs domains. Detailed description of
duties, properly delegation of control responsibilities and establishment of reporting relationships streamline
126
IADIS International Conference e-Commerce 2011
maintaining application software and automated solutions (AI2) and enable operation and use (AI4).
Adequacy assignment of responsibility and authority limit determination affect change management (AI6)
and procuring IT resources (AI5) for responding to business IT requirements in alignment with the business
strategy (COBIT 4.1, 2007).
HRPP significantly supports AI and ME domains of ITCPs but the effect of HRPP on PO and DS is not
confirmed. Organization’s human resource policies particularly training programs are critical factor of
changes management (AI6) for responding to business IT requirements in employment and maintenance of
automated solutions (AI1) and application software (AI2). Implementing and installing new or changing
solution systems (AI7) require employing new personnel or providing training and promoting programs for
current personnel. The results shows that the ME processes depend more than other CE components to
HRPP. Basically, the successful implementation of ME processes without effective HRPP is not possible.
5. CONCLUSION
This study considered the effects of control environment components on IT control process domains
implementation separately. It shows plan and organize is significantly affected by corporate ethical
environment, commitment to component, board of director and audit committee and management philosophy
and operating style. Acquire and implement processes are significantly supported by board of director and
audit committee, management philosophy and operating style, assignment authority and responsibility and
human resource policies and practices. Delivery and support is significantly influenced by management
philosophy and operating style and organization structure. And finally monitor and evaluate processes are
significantly supported by corporate ethical environment, commitment to component, board of director and
audit committee and human resource policies and practices. The results indicate board of director and audit
committee with management philosophy and operating style have the most impact on IT control processes
among others. Whereas organization structure and assignment authority and responsibility have the minimum
supports. Furthermore, there is evidence that IT control process domains except delivery and support
processes are affected by control environment components uniformly and delivery and support domain
processes are influenced less than others.
The results of this study provide some insights on control environment components that necessitate the
effective implementation of IT control process domains. The tasks of designing control systems are complex
and unstructured especially in e-commerce and IT concentrated environment. And there is not a homogenous
situation and way to implementation of control systems as accomplish by managers and auditors. Many
alternatives models of IT controls exist, and many control environment components affect the design of
controls. The results of this study may help managers and auditors analyze organizational control
environment and concentrate their limited IT resources to effectively design and implement IT control
processes. It attracts management to consider the various dimensions of control environment to appropriate
invest on IT resources for implementation IT control processes.
REFERENCES
Abu-Musa, A.A. 2008, "Exploring the importance and implementation of COBIT processes in Saudi organizations: An
empirical study", Information Management & Computer Security, vol. 17, no. 2, pp. 73-95.
Bagozzi, R. 1994, "Measurement in Marketing Research: Basic Principles of Questionnaire Design", Principle of
Marketing Research, , pp. 1-10.
Bassellier, G., Reich, B.H. & Benbasat, I. 2001, "Information Technology Competence of Business Managers:
Adefinition and Research Model", Journal of Management Information Systems, vol. 17, no. 4, pp. 159-182.
Beasley, M.S. 1996, "An empirical analysis of the relation between the board of director composition and financial
statement fraud", The Accounting Review, vol. 71, no. 4, pp. 443-465.
Bernroider, E.W.N. & Ivanov, M. 2011, "IT project management control and the Control Objectives for IT and related
Technology (CobiT) framework", International Journal of Project Management, vol. 29, no. 3, pp. 325-336.
Bondar, G. 2006, "What’s New in COBIT 4.0", Internal Auditing, vol. 21, no. 4, pp. 37-44.
127
ISBN: 978-972-8939-51-9 © 2011 IADIS
Chiesa, V. 1999, "Technology development control styles in multinational corporations: a case study", Journal of
Engineering and Technology Management, vol. 16, no. 2, pp. 191-206.
Choi, J., Choi, S., Hogan, C. & Lee, J. 2009, The Effect of Human Resource Investment in Internal Control on the
Existence of Internal Control Weaknesses and on Earnings Quality, af.polyu.edu.hk
COSO (The Committee of Sponsoring Organizations of the Treadway Commission) 1994, Internal Control - Integrated
Framework.
D'Aquilq, J.M. 1998, "Is The Control Environment Related to Financial Reporting Decisions?",Managerial Auditing
Journal, vol. 13, no. 8, pp. 472-478.
Dauber, N.A., Levine, M.H., Qureshi, A.A. & Siegel, J.G. 2009, The complete Guide to Auditing Standards and other
professional standards for accountants, John Wiley & Sons, New Jersey.
Doyle, J., Ge, W. & McVay, S. 2007, "Determinants of weaknesses in internal control over financial reporting", Journal
of Accounting and Economics, vol. 44, no. 1-2, pp. 193-223.
Grant, G.H., Miller, K.C. & Alali, F. 2008, "The effect of IT controls on financial reporting", Managerial Auditing
Journal, vol. 23, no. 8, pp. 803-823.
Haes, S.D. &Grembergen, W.V. 2008, "Practices in IT Governance and Business/IT Alignment", Information Systems
Audit and Control Association, vol. 2.
Harrer, J. 2008, Internal Control Strategies: A Mid to Small Business Guide, John Wiley & son.
Hoitash, U., Hoitash, R. & Bedard, C.J. 2009, "Corporate Governance and Internal Control over Financial Reporting: A
Comparison of Regulatory Regimes", Accounting Review, vol. 84, no. 3, pp. 839.
ISACA.2007, CobiT—4th Edition (Version 4.1), Information Systems Audit and Control Foundation, IT Governance
Institute, Rolling Meadows, USA.
Kerr, D.S. & Murthy, U.S. 2007, "The Importance of the COBIT Framework IT Processes For Effective Internal Control
over the Reliability of Financial Reporting: An International Survey", Symposium on Information Systems Assurance
University of Waterloo.
Larsen, M.H., Pederson, M.K. & Andersen, K.V. 2006, "IT Governance Tools and Analyzing the Case of Novozymes
A/S", Proceedings of the 39th Hawaii International Conference on System Science.
Lee, S. & Han, I. 2000, "The Impact of Organizational Contexts on EDI Controls", International Journal of Accounting
Information Systems, vol. 1, pp. 153-177.
Li, C., Lim, J. & Wang, Q. 2007, "Internal and external influences on IT control governance", International Journal of
Accounting Information Systems, vol. 8, no. 4, pp. 225-239.
Miroslav, M. & Zdravko, K. 2008, "Innovation through ICT-The Management View ", Central European Conference on
Information and Intelligent Systems 19th International Conference 2008 Proceedings, pp. 235.
Moeller, R.R. 2007, COSO Enterprise Risk Management: Understanding The New Integrated ERM, John Wiley & Sons,
Canada.
ouchi, W.G. 1977, "The relationship between organizational structure and organizational control", Administrative Science
Quarterly, vol. 22.
Rae, K. & Subramaniam, N. 2008, "Quality of internal control procedures: Antecedents and moderating effect on
organizational justice and employee fraud", Managerial Auditing Journal, vol. 23, no. 2, pp. 104-124.
Ridley, G., Young. Judy. & Carroll, P. 2004, "COBIT and its Utilization: A framework from the literature", Proceedings
of the 37th Hawaii International Conference on System Sciences.
Rittenberg, L.E., Johnstone, K. & Gramling, A. 2009, Auditing: A Business Risk Approach, 7th, South-Western Cengage
Learning, USA.
Sanchez, M.H., Brown, K.F. &Agoglia, C.P. 2007, "Consideration of control environment and fraud risk: A set of
instructional exercises", Journal of Accounting Education, vol. 25, no. 4, pp. 207-221.
Tuttle, B. & Vandervelde, S.D. 2007, "An empirical examination of CobiT as an internal control framework for
information technology", International Journal of Accounting Information Systems, vol. 8, no. 4, pp. 240-263.
Valentine, S., Godkin, L. & Lucero, M. 2002, "Ethical Context, Organizational Commitment, and Person-Organization
Fit", Journal of Business Ethics, vol. 41, pp. 349-360.
Zhang, Y., Zhou, J. & Zhou, N. 2007, "Audit committee quality, auditor independence, and internal control weaknesses",
Journal of Accounting and Public Policy, vol. 26, no. 3, pp. 300-327.
128
IADIS International Conference e-Commerce 2011
ACCOUNTABILITY IN SINGLE WINDOW SYSTEMS
USING AN INTERNAL CERTIFICATE AUTHORITY - A
CASE STUDY ON THAILAND’S NATIONAL SINGLE
WINDOW SYSTEM
Potchara Pruksasri1, Jan van den Berg1 and Somnuk Keretho2
1
Section of ICT, Faculty of Technology, Policy and Management
Delft University of Technology, Delft, Netherlands
2
Department of Computer Engineering, Faculty of Engineering
Kasetsart University, Bangkok, Thailand
ABSTRACT
A single window system (SWS) concerns a single-entry facility for electronic documents exchange between
governmental departments and business partners and is aimed to reduce time and costs of international cross-border trade.
Recently, the country of Thailand also started to design and implement a SWS based on modern information
technologies. This includes the set-up of a public key infrastructure (PKI) to facilitate secure e-message exchange. An
analysis of the information flows that are taking place in the prototype SWS proposed revealed us however that, next to
improvements, some basic requirements with respect to the accountability of individual back office employees are not
met. The first aim of this paper is to reveal this accountability problem. In addition we propose a possible solution for the
shortcomings discovered, which basically boils down to extending the PKI with an internal certificate authority.
KEYWORDS
Single window, accountability, non-repudiation, digital signature, PKI.
1. INTRODUCTION
Looking at worldwide international trade, one soon discovers that developing countries experience many
difficulties in keeping up with the new developments of efficient and effective settlement of goods. This also
holds for the country of Thailand that still faces basic problems with respect to the time needed and costs
involved for the cross-border import and export of commodities. Thailand’s exporting procedures simply
consume much more time and costs than, for example, countries of the European Union (EU). One of the
main reasons of the inefficiency of the import and export processes is the way customs in Thailand work. An
exporter, for example, has to pursue several quite complex procedures involving many governmental
departments. Therefore, it takes on average 14 days for getting his products exported (Worldbank, 2010).
This is much longer than the period needed in many countries of the EU, like 5 days for Denmark and 6 days
for The Netherlands.
A possible way to reduce time and costs of cross-border trading is the establishment of a modern
document exchange system for customs and other stakeholders of the port community. Such a system is
provided by a so-called Single Window System (SWS), which can take care of the electronic documents’
exchange between governmental entities (G2G) and between business and governmental organizations
(B2G). Both the SWS concept and its related guidelines have been provided by the United Nations (UN)
(UN/CEFACT, 2005). However, these recommendations concern guidelines of generic nature and should
therefore be refined and adjusted to the circumstances of individual countries. This also holds for the ways in
which secure information and communication technology should be deployed (Stijn et al., 2010).
Looking more specifically at customs’ procedures, it is very common that, in order to facilitate the proper
import and export of goods, many documents have to be exchanged between several governmental
departments. During this information exchange, all kinds of data processing activities are executed. In the
129
ISBN: 978-972-8939-51-9 © 2011 IADIS
less developed countries including Thailand, this data processing is usually still paper-based. In such a
business process, an employee, having finalized a specific verification, registration or other data processing
activity, has to put a signature in a specific box on the relevant document. In this way, accountability is
implemented meaning that each mutation in any document can be unambiguously linked to the person who
made the mutation. For easy-to-understand reasons related to the identification of (possible) fraud, smuggle,
and other safety and security incidents, the preservation of accountability is essential, and should therefore be
guaranteed when adopting a modern SWS.
The Royal Thai government and industries, being aware of their backlog in the speed of executing import
and export processes, have decided in 2004 to also adopt a national SWS. This circumstance motivated us to
use the ‘Thailand National SWS’ project as a case study for understanding the way accountability can be
guaranteed in a SWS implementation. The Thailand case can actually be considered as an important
prototypical case since other countries in the region (and even the rest of the world) have also expressed their
interest in the soon adoption of a SWS in order to further improve global trade procedure (Phuaphanthong et
al., 2010). A further motivation for this research is found in the fact that a short literature review soon
revealed that, despite the availability of many papers around the (general) notion of accountability (Lin et al.,
2010) (Nakahara and Ishimoto, 2010), specific analyses of accountability in the environment of SWSs around
import and export processes of goods were not available.
To summarize, this paper aims to analyze accountability in the import and export processes of goods (as a
sub-activity in the global supply chains), to come up with solution requirements, to analyze to what extent a
prototypical current SWS specification takes these requirements into account, and to propose solutions for
the imperfections detected. To do so, we structured the rest of this paper as follows. Section 2 is devoted to
the background underlying SWSs and PKI. In section 3, we look at accountability (as part of information
security) requirements inside SWS environments, hereby identifying certain upcoming problems. Using the
PKI-based techniques introduced in section 2, we propose in section 4 a generic solution for these problems.
Finally, in section 5, we present our conclusions and outlook.
2. BACKGROUND
2.1 Single Window Systems in General
There is no single definition for the concept of SWS. In case of using it in a trading environment, a SWS is a
facility that allows trade and transport partners to lodge standardized information with just one single entry
point in order to fulfill all import, export, and transit-related regulatory requirements (UN/CEFACT, 2005).
In 2005, the Association of South East Asian Nations (ASEAN) signed an agreement (ASEAN, 2005) to
establish and implement a new information & communication system that aims to accelerate customs
clearance of goods and, more generally, to improve efficiency of trading activities in and between the
countries of south-east Asia. This system is often denoted as the ‘ASEAN Single Window’. By the
agreement, each participating country promised to build their national SWS such that it facilitates
information exchange between governmental organizations, traders and other stakeholders inside each
country in the first place and later on, cross border communication between international supply chain
partners.
2.2 The Thailand National Single Window System
One of the countries that signed the 2005-ASEAN agreement was Thailand. Its national SWS under
development aims to support both Government-to-Government (G2G), and Business-to-Government (B2G),
and Business-to-Business (B2B) communication (UN/CEFACT, 2005).
Looking at the information exchange architecture of Thailand’s national SWS, four principal sub-steps of
data flow between traders/business partners and governmental departments can be identified:
• Step 1 – Submitting a Declaration. To start, traders or similar business partners contact one of the
Gateway Services Providers (GSPs) to submit a set of customs declaration documents related to the
130
IADIS International Conference e-Commerce 2011
import/export of their goods by using software provided by the one of Value-Added Service Companies
(VAS) (Keretho, 2008a). In all cases, the data elements of several request forms, permits and certificates are
transformed into XML format (W3C, 2008)and submitted by VAS software according to some certain
legitimate (business process) steps. Second, a digital signature of the submitter is added based on the user’s
private key as made available by the existing Public Key Infrastructure (PKI).
Figure 1. The Thailand National Single Window Model (adapted from (Keretho, 2008b)).
• Step 2 - Forwarding a Message to the national SWS. In the second step, a GSP connects to the national
SWS using the so-called ‘Single Entry’ point in the private Government Information Network (GIN). After
SWS receipt of the different user’s declaration messages, the data are standardized and harmonized into a
basic set of data elements.
• Step 3 - Message Flows inside the national SWS. The messages inside the national SWS flow around
based on the ebMS message services protocol (OASIS, 2002b) (and its related components CollaborationProtocol Profile (CPP) and the Collaboration-Protocol Profile Agreement (CPA)) (OASIS, 2002a). To secure
messages exchange inside the SWS, a secured communication channel such as Secure Socket Layer (SSL)
(IETF, 2008)is applied as well.
• Step 4 – Responding incoming Messages. After receipt of the electronic messages at the destination
computer, the incoming data are processed and a response message is composed. The latter is sent back as a
reply to the GSP the incoming message originated from. On behalf of the submitting exporter, the submitter’s
VAS software will check at regular time intervals whether the replied message has already been arrived and,
if so, will report that to the exporter.
2.3 Public Key Infrastructure and Digital Signatures
The National SWS concerns an information communication network system that applies several technologies
and standards. Information Security (IS) is one of major topics of concern in SWS design. The key security
characteristics of IS, namely, Confidentiality, Integrity, Availability (CIA Triad model (Johnson, 2010)) and
Accountability (Barbar, 2001) should all be dealt with in SWSs. As has been motivated in the introduction,
we here especially take a look at the security requirement of accountability. As enforced by the law, evidence
is usually required with respect to the fulfillment of the IS requirements, especially that of accountability.
The usual technologies that implement the IS requirements make use of a Public Key Infrastructure (PKI)
(Haidar and Abdallah, 2009). A PKI is an IS supporting architecture that usually applies a combination of
private and public key cryptography (Diffie and Hellman, 1976). A standard PKI implementation includes
Digital Certificates and Digital Signatures to provide evidence for the fulfillment of accountability. To
guarantee that a genuine public key is used (i.e., that the public key truly belongs to the intended person),
digital certificates are used. A specific trusted third party named a Certificate Authority (CA) is the
organization issuing digital certificates, usually based on the X.509-v3 standard (ITU, 1997). A digital
certificate contains, among others, a version number, name of algorithm used, issuer name, user ID, user’s
public key, period of validity, and a signature created by the CA. The CA signature concerns a generated
hash code of the unsigned certificate encrypted by the private key of the CA. To prove authenticity of the
public key of a certain user, the hash code of his unsigned certificate is first calculated. Next, the CA
signature on the certificate is decrypted using the public key of the CA (that is supposed to be known to
everybody), the resulting value of which is compared to the obtained hash code. If they are equal, the verifier
131
ISBN: 978-972-8939-51-9 © 2011 IADIS
can be sure that the user’s certificate is genuine indeed, including the user’s public key value. In the same
way CAs can sign digital certificates, users can sign messages that are sent to e-counterparts. Using such a
scheme, non-repudiation can be implemented. If, for example, recipient receives a message from sender
signed by sender with (s)he private key, the recipient can always prove later on that the received message
must have been created by sender (provided her private key was not been stolen). It should be clear that, in
this way, accountability can be implemented as well: by enforcing that each employee digitally signs a
message containing data (s)he has prepared, the receiver of that message can always prove that the signing
employee was the originator of the message. In other words, the data in the message and the signing
employee are unambiguously linked to each other.
3. ACCOUNTABILITY ANALYSIS
To analyze possible problems related to the accountability requirements of future SWSs, we performed a case
study. We first discuss security issues in the classical, paper-based systems. Next we analyze the same issues
in the SWS to be used in Thailand.
3.1 Accountability in Classical, Paper-Based Systems
As a prototypical example of exporting a good, we focus in the case study on the information flow related to
an export permit request of sugar. If the documents’ exchange is paper-based, the process starts when the
sugar exporter prepares the documents for the permit request: the set of required documents includes a
request form, a purchasing contract, a declaration form, and one or more financial documents (Keretho,
2010). These documents are next sent to the Centre of Production Management (1st department) for doing
some checks. If the checking yields a positive outcome, the competent officer will provide the permit on
behalf of the department (s)he is working in: to do so, (s)he personally signs the documents. Then, the sugar
exporter has to return (physically) to the 1st department to collect the permit. In the next step, (s)he has to
contact the Office of the Cane and Sugar Board (OCSB, 2nd department) by sending the request form, the
received permit, and other related documents. The OCSB checks the documents on completeness and
correctness, and provides, in case of approval, a permit document to the exporter. Again, the sugar exporter
has to return physically to the OCSB to collect the new permit. While executing these activities, the exporter
also has to prepare documents for the Office of Atoms for Peace (3rd department). This is needed in this case,
since a so-called ‘radio certificate’ is required for the export of sugar. Again, the exporter has to send the
request, to wait some time (some days), and finally has to collect the certificate.
Based on the above-given scenario, we can identify certain problems related the manual document flow.
A first observation is that the described process typically takes ten days for document processing, waiting and
collecting (Keretho, 2010). Secondly, if certain actors in the document intentionally work together to fool the
authorities, this is possible. For example, in the step of sending the documents to the OCSB (2nd department),
the exporter must hand over an export permit from the Centre of Production Management (1st department) to
the OCSB. If the exporter creates an illegal export permit based on a counterfeited signature that he next
sends to the OCSB, that OCSB might validate that document. The incorrect validation activity by the OCSB
might not be detected because the OCSB cannot check each single permit in such careful manner that all
forging activities are discovered.
The above-described problems are serious ones. Therefore, the minimal requirements for the future
electronic exchange of documents in the proposed SWS in Thailand include reduction of execution time and
improvement of the secure communication between governmental organizations.
3.2 Information Flow in the National SWS of Thailand
The case study of exporting sugar can also be used to describe the prototypical document flow in the
designed national SWS of Thailand. By introducing this new IT-based system, the information exchange
between most stakeholders will change. To illustrate, we again describe the document flow (figure 2). To
start, the exporter now submits the request just one time by sending it to the governmental departments.
When the first department has completed the data processing activities needed, the officer in the first
132
IADIS International Conference e-Commerce 2011
department directly forwards the relevant documents to the second department. So, the exporter does not
need to (physically) collect and forward the documents him(her) self. On the one hand, this shorter process is
assumed to reduce cost for the exporter, and on the other hand, it does not give the exporter an opportunity to
create a forged document. So we immediately observe that the proposed system has some promising
properties related to cost reduction and prevention of counterfeiting activities. We now continue our analysis
to investigate whether we can also identify certain drawbacks of the new system.
Figure 2. The electronic document flow.
3.3 Governmental Message Exchange in the Future
Thailand’s national SWS is currently in its first phase of development. In the remainder, we focus on the
paperless message exchange between two governmental entities (Keretho, 2008a) (see also Figure 3):
• Step 1: The officer who works in the first back office of 1st department (system A) logs on into the
system. At regular moments in time, the officer receives a request message related the export of a certain
good like, e.g., sugar. The officer needs to process the data. After having finished his (her) administrative
activities, (s)he should send a message to one of the other government agencies in the back office.
• Step 2: In order to send information to any other organization via the national SWS, the officer has to
prepare the document by, first, transforming the data into an ‘ebXML document’ and, second, put a digital
signature on the ebXML document: to sign, the officer uses the departmental private key.
• Step 3: After having finished all necessary work, the relevant data are sent to the national SWS using
specific ebMS Gateway communication software. The governmental department can access directly to the
national SWS via the private network of government (GIN). Therefore, the ebMS Gateway of the department
can be considered as the middle tier between the back office system and the SWS. The communication
software establishes the connection to the Gateway server using a security protocol such as Secure Socket
Layer (SSL). The electronic documents are sent in the format of digital signed XML.
• Step 4: The ebMS Gateway is usually located in a high-stable and secure network system. One side of
this server is connected to the network system of the gateway and the other side to the National SWS (NSW)
on the private network. The electronic messages from gateway are next sent to the NSW network and then
flow inside the NSW to the destination server as specified in the message header.
133
ISBN: 978-972-8939-51-9 © 2011 IADIS
• Step 5: After message arrival at the destination server (sometimes it is on the same gateway network), it
is stored on that server. There the message is stored until the software from the destination back office system
(system B) pulls it out. In this step, the back office system B sweeps the message back based on the message
header information which defines the destination to this back office over the secure network in a way as was
already described in step 3.
• Step 6: Here, the electronic message with digital signature and digital certificate arrives at the
destination server that also is located on the private network. The destination server first verifies the digital
signature at the Digital Certificate and next checks authenticity and accountability according the principles as
explained in section 3. At this stage, the message has arrived at the destination back office system, and it is
ready for being similarly processed in the next step of the message exchange process.
Figure 3. The Information flow inside the Single Window System.
3.4 Accountability Problems in the SWS
In the paper-based information exchange system, a responsible officer has to sign a document for approval
before sending it to the next actor in the process. It means that the officer who signed the documents is truly
accountable for the data contained in documents. In case of any fault, the officer can be held responsible for
the identified errors, whatever their character might be, intentional of unintentional. The same accountability
requirement should, of course, be met in the NSW, when all kinds of electronic documents are flowing
around between different governmental entities. The important detail here is that any officer, before sending
a message, signs it by using the departmental private key. This way of working may cause a severe
accountability problem with respect to information that is being exchanged: If a certain IS problem (related to
correctness, completeness, confidentiality, etc.) is found in the data of an electronic document caused by the
incorrect information supply of a certain officer, such an incorrectness can, in the current set-up, not be
traced back to its creator. The back-checking procedure that is usually started after detection of the IS
problem in order to find the person who (un)intentionally made the error, is doomed to fail, simply because
the digital signatures in use are at departmental level and are not personalized signatures. In short, we may
say that a current omission discovered in the designed national SWS in Thailand concerns the guarantee of
accountability at departmental level while, in practice, accountability at a personalized level is truly required.
In Thailand, the companies acting as CA service provider are in their start-up phase. Related to that one
soon discovers that the prices for deploying digital certificates are still quite high while the governmental
departments have limited budgets. In practice, it may not be possible to buy a digital certificate for every
officer who works on an electronic system related to the NSW system. Therefore, we decided to look for an
alternative solution, the design of which is shown in the next section.
4. PROPOSED SOLUTION
According to Thailand’s Electronic Transaction Act (No.2) 2008 (the Electronic Transaction Law), a digital
signature can be used in a similar way as a physical signature when signing documents. The key idea behind
the solution for the described accountability problem is based on a so-called Internal Certificate Authority
(ICA) system. An ICA system can be considered as a natural extension of the well-known PKIs. The
components of an ICA-based system consists of the ‘internal registration unit’, a set of ‘digital signatures’, a
134
IADIS International Conference e-Commerce 2011
set of ‘internal digital certificates’, an ‘internal verification process’ and an ‘extended trust model’. The
internal registration unit is a unit to manage user-related data in the ICA system of each department. The
main responsibilities of this unit are to create, record, revoke and control digital certificates. A new user of
the back office system must register to the internal registration unit to get his personal keys (private and
public). The system generates a key pair and a digital certificate for the new user after recording the user
information in the system. The private key and digital certificate can be stored and distributed in several
formats with protected by password at least, for example, in a smart card or USB stick. The digital
certificates are also stored on the ICA server to allow Internal Certificate Authorities’ inspection and
verification from the back office. The digital signature is set when an officer wants to send an electronic
document to another employee. (S)he can create a digital signature by means of the private key. The back
office system must support the proper creation of a digital signature for signing approved electronic
documents. When signed documents arrive at their (internal) destination, the process to verify the origin of
the message is executed. First, the digital certificate is verified based on the digital signature of the ICA. If
the digital certificate has shown to be genuine, the digital signature of the signed document is checked using
the public key found in the certificate. In this way, the link between the document and its creator is verified.
The receiving officer further processes the document and may send it, in the same way, to another internal
employee until the document is sent to the NSW in the last step.
Figure 4. The Internal Certificate Authority.
Figure 5. Thailand Trust Model.
As long as the processes are properly working, it is not necessary to perform an extra internal verification.
If an error is detected however, an internal verification step is needed to discover the error source.
Verification starts by checking the digital signature of the: First, the system can simply request the ICA
server for the digital certificate of the officer who signed the document. It is then used to decrypt the
signature’s hash value and compared to the hash value of the received message and if they are not equal, an
accountability error has been found in this step. The efficiency of the proof could be increased by working
with log files where time stamps of documents and log files are being compared. In Thailand, the trust model
related to the used PKI is prescribed by the Government: see figure 5. The Ministry of ICT operates as
Nation Root Certification Authority of Thailand (NRCA). In order to create an ICA in the back office
system, the current trust model in part of government CA should be extended to governmental department
level. The CA server should be placed into the back-end system of every department in order to control the
use of internal digital certificate. It should further interoperate with the governmental CA in order to
complete the full ‘chain of trust’ needed in this environment.
5. CONCLUSIONS
The development of the Single Window System (SWS) in Thailand is still in its starting phase of design and
implementation. From our, on information security focusing case study we learned that the safeguarding of
accountability concerns a serious problem in the currently proposed prototypes. More precisely, we
discovered that the SWS prototype to be used to exchange electronic documents between governmental
agencies has certain vulnerabilities: in case of an (intentional of unintentional) error made by a certain
officer, it might be difficult of even impossible to trace back to the source of the mistake. This thwarts the
possibility to make employees truly responsible and liable for their activities. The underlying reason relates
to the use of certificates and digital signatures at departmental level instead of at personalized level because
of the limited budget. To solve the problem, we propose an internal PKI at department level, based on
135
ISBN: 978-972-8939-51-9 © 2011 IADIS
Internal Certificate Authorities (ICAs), which can be linked to the existing governmental PKI infrastructure
with the national root CA. Future research will focus on the implementation of this idea of introducing
departmental PKIs. Modern IT technologies including web services are supposed to be very helpful here.
REFERENCES
Asean. 2005. Agreement to Establish and Implement the ASEAN Single Window , 9 December 2005 [Online]. Kuala
Lumpur. Available: http://www.aseansec.org/18005.htm [Accessed 21 December 2010].
Barbar, R. 2001. InfoSec Basics and Models — Part 1 Computer Fraud & Security 2001, 17-19.
Diffie, W. & Hellman, M. 1976. New directions in cryptography. Information Theory, IEEE Transactions on, 22, 644654.
Haidar, A. N. & Abdallah, A. E. 2009. Formal Modelling of PKI Based Authentication Electronic Notes in Theoretical
Computer Science, 235, 55-70.
Ietf, 2008. The Transport Layer Security (TLS) Protocol Version 1.2, The Internet Engineering Task Force
Itu, 1997. Information technology – Open systems interconnection – The Directory: Public-key and attribute certificate
frameworks International Telecommunication Union.
Johnson, B. C. 2010. Information Security Basics. Information Systems Security Association (ISSA Journal), 8, 28-34.
Keretho, S. 2008a. Thailand Data Harmonization Project for National Single Window and Regional Integration.
UNESCAP-UNECE Seminar on Single Window and Data Harmonization in Central Asia. Baku, Azerbaijan.
Keretho, S. 2008b. Thailand Single-Window e-Logistics for Trade Facilitation Enhancement. UNESCAP-UNECE
Seminar on Single Window and Data Harmonization in Central Asia. Baku, Azerbaijan.
Keretho, S., 2010. The Procedures Analysis of Thailand Sugar Exporting Bangkok, Thailand.
Lin, K. J., Zou, J. & Yan, W. Year. Accountability Computing for E-society. In: Advanced Information Networking and
Applications (AINA), 2010 24th IEEE International Conference on, 20-23 April 2010 2010. 34-41.
Nakahara, S. & Ishimoto, H. Year. A study on the requirements of accountable cloud services and log management. In:
Information and Telecommunication Technologies (APSITT), 2010 8th Asia-Pacific Symposium on, 15-18 June
2010 2010. 1-6.
Oasis, 2002a. Collaboration-Protocol Profile and Agreement Specification Version 2.0, The Organization for the
Advancement of Structured Information Standards.
Oasis, 2002b. Message Service Specification Version 2.0, The Organization for the Advancement of Structured
Information Standards.
Phuaphanthong, T., Bui, T. & Keretho, S. 2010. Harnessing Interagency Collaboration in Inter-Organizational Systems
Development: Lessons Learned from an E-government Project for Trade and Transport Facilitation International
Journal of Electronic Government Research (IJEGR), 6, 42-56.
Stijn, E. V., Phuaphanthong, T., Keretho, S., Pikart, M., Hofman, W. & Tan, Y.-H. 2010. An Implementation Framework
for e-Solutions for Trade Facilitation. Accelerating Global Supply Chains with IT-Innovation ITAIDE Tools and
Methods. 1 ed.: Springer.
Un/Cefact, 2005. Recommendation and Guidelines on establishing a Single Window to enhance the efficient exchange of
information between trade and government (Recommendation No. 33),
W3c, 2008. Extensible Markup Language (XML) 1.0 (Fifth Edition), The World Wide Web Consortium
Worldbank, 2010. Doing Business 2010 : Comparing Regulation in 183 Economies Washington, DC, MACMILLAN.
136
IADIS International Conference e-Commerce 2011
VIRTUAL RECOMMENDATION DIFFUSION AND
CO-SHOPPING INFLUENCE: THE ROLE OF DYADIC
NETWORK-BASED INTERACTIONS
Ana Torres and Francisco Martins
Faculty of Economics - University of Porto
Rua Dr. Roberto Frias, 4200-464 Porto - Portugal
ABSTRACT
In this paper we examine how the virtual recommendation may influence co-shopping behavior specifically associated
with “match dyad” within online social networks. Drawing on better match theory in economics and social network
literature, we develop and propose a conceptual model describing how different antecedents of customer’s
recommendation influence their intentions and leads to positive outcomes, such as recommendation behavior and coshopping influence. We also describe which consumer and network characteristics accentuate this influence examining
the moderator effect of customers’ incentives, network structure and interactivity. The study contributes to propose that
“match dyad” in small social network provide high-quality valuable information that will improve the match between the
product and the potential customer and, matched online social connections, act as a proxy for information about the
potential market that is difficult and expensive to measure or observe directly such as customer needs, and to access. The
paper concludes with a consideration of the implications of predictions for marketing practice.
KEYWORDS
Virtual recommendation, co-shopping, digital networks interactions.
1. INTRODUCTION
The attraction and stability of a social network depends on the willingness of members to actively
participate by sharing information and offering personal opinions or recommendations and influence others
to co-shop. Online social networks provide the structural route for social interactions and reciprocating
behaviors which encourages virtual recommendation diffusion and co-shopping response. While Internet
users may also spread electronic content by posting URLs in chat rooms or personal blogs in social
networking sites, these actions are more similar to broadcasting to many audiences comprised of individuals
who the senders may not know or intend to target (Ho and Dempsey, 2010). Research consistently
demonstrates that informal market assistance, in the form of information and recommendations, has a strong
impact on consumer preferences and choices: they receive inspiration for how to act, what to choose, and
which new items to try (Wikström et al., 2002). Moreover, fellow community members offer credible sources
of information and motivate others to co-shop (Chan and Li, 2010, Nelson and Otnes, 2005). Likewise a
“matchmaker” the Internet shopper has the knowledge of better sites to shop, product novelty or promotions
to recommend their peers with similar consumption needs. Online communities and social networks have
received much attention, both from academics and business; however the economic leverage of peer-to-peer
interactions in personal networks of influence for market potential attraction has been neglected. Despite the
power of online social networks for social contagium and information diffusion (Rezabakhsh et al., 2006,
Cole, 2007) less research, however, has explored the role of match dyads in close electronic networks of
relations on matched recommendation diffusion and social influence on co-shopping behavior. Whereas ebusinesses look for adequate answer for virtual collaborative recommendation diffusion and how to target
those people with the highest network value, we should also ask what drives consumers sharing market
information, offering personal opinions and give free and voluntary market recommendation through their
network of connections.
137
ISBN: 978-972-8939-51-9 © 2011 IADIS
In light of this, we aim to study and to propose a conceptual model (Fig. 1) describing how different
antecedents of customer’s recommendation influence their intentions and leads to positive outcomes, such as
recommendation behavior and co-shopping influence. We describe how the customer’s e-satisfaction and
switching costs precede and contribute to his/her recommendation intention. We also describe how
recommendation intention leads to positive outcomes, such as recommendation behavior and co-shopping
influence and the reciprocal interplay among these three constructs and their effects on future behavior. We
also describe which consumer and network characteristics accentuate this influence examining the moderator
effects of customers’ incentives, network structure and interactivity. Building on the central prediction of the
“better match” theory in economics (Castilla, 2005, Simon and Warner, 1992), the proposition here is that if
individual similarities and close ties in small networks help to determine better-matched recommendations;
and, to determine whether “match dyads” help to explain better recommendation diffusion and co-shopping
influence. To the best of our knowledge no other study have sought to determine whether customer’
recommendation made through online social contacts are better matched than those made through other
channels, none have focused specifically on the performance implications of customer virtual
recommendation diffusion on future sales or co-shopping influence by using current customers’ online
connections. One way to make progress on this subject is to directly examine the relationship between
personal networks, recommendation behavior and co-shopping influence via customer’s referrals as
indicators of preexisting matched social connections. Theoretically, this study contributes to propose that
“match dyad” social network ties provide high-quality valuable information that will improve the match
between the product and the potential customer and better match referrals act as a proxy for information
about the potential market that is difficult and expensive to measure or observe directly such as customer
needs, and to access. Both these characteristics and behaviors are not only relevant from a measurement
imperative in the sense of being unobservable but also managerially significant in the sense that they provide
specific guidance to managers on targeting more effective referral customers.
2. CONCEPTUAL FRAMEWORK AND HYPOTHESIS
Figure 1 depicts the hypothesized relationships between the key constructs in our conceptual framework their
antecedents and moderator factors. This section provides a theoretical rationale for the expected relationships
and proposes research hypothesis.
e-Satisfaction
H1
Recommendation
intention
Switching costs
H3
Recommendation
behaviour
Co-shopping
influence
H2
Network size and
interactivity
Note:
H4
Hypothesized effect
Voluntary collaboration
and incentive seeking
moderator effect
Figure 1.Conceptual Model
2.1 Drivers of Customer Recommendation
Satisfaction and switching costs are referred in the IS literature as the main drivers of customer retention and
loyalty. First, regarding e-satisfaction extent research find that customer satisfaction is a key construct which
influence commitment-base loyalty outcomes, repurchase intentions and word-of-mouth (Oliver, 1999,
Srinivasan et al., 2002). We define customer e-satisfaction as an affective-based commitment, which refers to
favorable feelings toward an e-tail provider that currently offers some benefits and satisfactory experiences
with complete online purchase. According to the model proposed in this study, e-satisfaction serve as the
basis for the formation of customer recommendation which represents the dedication-commitment (e.g.
138
IADIS International Conference e-Commerce 2011
authentic loyalty) to the online provider. The rationale behind this proposition is that (1) a customer considers
satisfactory online purchase experiences as a cue from which to infer the future value to favor a long-term
relationship with the online provider, and (2) highly satisfied consumer is more likely to take on behavioral
intentions such as repurchase intention and recommendation. Such a dedication leads to behavioral outcomes
oriented toward supporting and strengthening the relational bond with the incumbent provider (Reichheld and
Schefter, 2000). Similarly, Oliver’s (1999) attitude-based framework offers a theoretical explanation of the
causal link between customer satisfaction and loyalty outcomes. In particular, Oliver posits that advocacy
behavior (e.g., providing referrals to others) is one of the most distinctive dedication-based outcomes. The
reason behind this argue is that the very act of referring a friend puts the actor’s social image at risk, and thus
word-of-mouth would not occur without the person’s faithful dedication, or loyalty. Consistent with these
arguments, much research demonstrates that the greater the degree of dedication a customer has to an online
service, the more likely he or she is to say positive things about the service to others (Anderson and
Srinivasan, 2003, Reichheld and Schefter, 2000, Srinivasan et al., 2002). In essence satisfaction is a
necessary condition for loyalty, yet loyalty may occur without satisfaction due to the effect of switching
costs. A basic premise of this reasoning is that consumers start to feel dependent on a provider because of
economic, social or psychological investments that would be useless in other provider. Hence, switching
costs by definition are sunk costs means the potential losses that could result from terminating the existence
relationship with an incumbent provider and establish a new one which ultimately leads to behavioral
outcomes that are performed reluctantly just to avoid the termination of a relationship (Burnham et al., 2003,
Jones et al., 2000, Lam et al., 2004). Indeed, in the IS literature switching costs and loyalty have seldom been
examined simultaneously and the key concepts in past research were treated as constraint-based loyalty
outcomes, such as use intentions, inattentiveness to alternatives and willingness to pay more (Kim and Son,
2009). However, such a constraint-based commitment is more prevalent in a contractual service context due
to initial monetary investments that leads to customer lock-in effect (Zauberman, 2003).
In this study switching costs are conceptualized as an affective-level construct arise because of one´s
perceptions about the investments devoted to a certain provider and future benefits loss from ongoing
interactions that are not easily transferable to other provider. A basic premise for this reasoning is that online
retailers are currently offered to customers highly personalized services (e.g. e.mail messages with
personalized offers, customized settings) and loyalty rewards (e.g. rewarding customers for repeated
purchase). In this sense, personalization costs, resulting from the customer recognition the benefits loss of
personal profile accumulated in the website and the effort to set up once again personal information, and
loyalty rewards loss costs resulting entirely from firm´s actions affect switching costs. But people tend to
expect that a similar amount of time and effort will be required to switch to a new web retailer, affecting both
overall switching costs. Thus, personalization and loyalty rewards affect switching costs in the sense that are
non-transferable customer-specific investments that relate to one’s history of interacting with an online
retailer over time. In such case, the customer may need to stick the current provider not because of
constraints but because of dedication. To the best of our knowledge, this study is a first attempt to show the
influence of switching costs on true dedication-commitment behavior, e.g. customer recommendation. The
rationale behind this proposition is that as consumers perceived future benefits loss of accumulated customer
investments that are not transferable, it is reasonable to expect that through this mechanism online customers
with higher switching costs will consider defecting to another e.tail provider less attractive and they tend to
repeat purchases because they believe their ongoing interactions with the online provider will be beneficial in
the long run. Thus, it is reasonable to expect they will eventually tell others the benefits on maintaining
ongoing relationship with the provider which positively influences recommendation behavioral intentions.
Taken together we expect that only truly satisfied customers perceiving the future benefits on maintaining
an ongoing relationship with the current provider will recommend the online retailer repeatedly or say
positive things about the service based on a rational faith that the online retailer will continue to offer
ongoing benefits and an excellent value. Therefore we propose the following: e-satisfaction (H1) and
switching costs (H2) will be positively related to recommendation intention.
2.2 Virtual Recommendation and Co-Shopping Influence
Social interactions and reciprocating behaviors in electronic networks provide the structural route for virtual
recommendation and co-shopping response. The rationale behind this premise is that consumers seek others’
advices to solve consumption-related problems and they forward online content giving opinions and
139
ISBN: 978-972-8939-51-9 © 2011 IADIS
suggestions about purchase opportunities (Ho and Dempsey, 2010). Likewise market mavens (Price et al.,
1995) internet shopper has the knowledge of better sites to shop, product novelty or promotions to
recommend their acquaintances and network peers with similar consumption needs. Meanwhile members
reciprocate the support they receive by those matched valuable resources. Research provides evidence that
social interactions, including reciprocating behaviors, reflect processes of receiving and giving various
resources. The helper who provides resources, such as information or social support, receives reciprocal
expressions of gratitude, and admiration or recognition from the helped. Moreover, reciprocity as a collective
behavior, pertains to the value dimension of reciprocity, a generalized moral norm that states people should
reciprocate by repaying those who provide direct help (Hars and Qu, 2002). In this context, resource
exchange theory (Foa, 1971) posit that individuals share information as a valuable resource and social
systems facilitate the exchange of various types of resources by matching available resources with needs.
However, whether a resource exchange occurs depends on the appropriateness of the environment and the
exchangers' capability and motivation to give and receive. In this sense, we claim that Internet facilities, such
as interactivity, rich media and communication tools of higher addressability (e.g. e.mail, blogs, message
board in social networks) allow consumers to interact and enable convenient and efficient resource
exchanges. These features reflect the central components that help generate efficient, useful and rich
information resources for consumers in matched needs and thus motivate them to engage in reciprocal
interactions. However, the impact of consumers' reciprocal interactions on consumption behavior remains
largely absent from research, but reciprocity should provide community members with a stable and safe
social context (Wikström et al., 2002) in which they exchange resources and shop together.
In this study, we define co-shopping influence as a response of matched recommendations influence on
others peers joint consumption action. In our conceptualization, co-shopping “influence” is a feedback
mechanism sustained on network peers’ reciprocal interactions giving response of “better matched”
recommendation influence in joint consumption action. We note here that such joint action may not
necessarily be contemporaneous; members can perform their respective parts at different times (Bagozzi and
Dholakia, 2004:247). Few researchers have conceptually examined the co-shopping construct in depth. In
general, the findings of such studies are quite mixed. For example Bagozzi and Dholakia (2004) find the coshopping phenomenon as “we-intentions” defined as a commitment of an individual to engage in joint action
and involves an implicit or explicit agreement between the participants to engage in that joint action; (Chan
and Li, 2010) found that are more related to motivations and benefits of community group-based
consumption behavior, e.g. “Let's buy this product together to get bigger discounts” and, (Mangleburg et al.,
2004) found that were more likely a phenomenon of teenagers' shopping with friends, related to peer
influence and enjoyment of shopping with pals. By extending better match theory, in our perspective coshopping influence as a response or feedback mechanism of the influence of matched recommendations on
joint purchase action is supported by social interactions and dyadic reciprocating behaviors.
Another aspect of virtual recommendation that has not been investigated relates to expectations that an
individual's collective efforts will be reciprocated in form of co-shopping response enhancing ongoing
recommendations. Broadly speaking we suggest the role of reciprocating behavior as a response of coshopping influence 1) is a substantiation of “better matched” recommendations and 2) a self-reinforcing
mechanism ensuring ongoing recommendations. The rationale behind this proposition is that prior research
indicates the role of reciprocity may be relevant to ensure ongoing contributions to electronic networks.
When there is a strong norm of reciprocity in the collective, individuals trust that their knowledge
contribution efforts will be reciprocated by peer recognition thereby rewarding individual efforts as future
returns to maintain ongoing contributions (Hars and Qu, 2002, Wasko and Faraj, 2005). According, social
exchange theory sustains all interactions as exchanges of rewards and the valuation of rewards varies by
persons reflecting their own preferences, e.g. which arise from the feeling of being rewarded just by being in
a relationship (Blau, 1964). Moreover, feedback as always has positive effect in that it shows consumers
referrals that people are using their recommendations individuals who receive expressions of gratitude and
recognition from others peers are more motivated to engage in ongoing recommendations. Hence, coshopping influence providing feedback of “better matched” recommendations is a self-reinforcing
mechanism for it encourages the referral to expend additional effort and ongoing recommendations.
Therefore, we propose the following: (H3) Recommendation intention and behavior will be positively related
and, (H4) Recommendation behavior and co-shopping influence will be reciprocally related.
140
IADIS International Conference e-Commerce 2011
2.3 Network Size and Interactivity – The Role of Match Dyads
Online social networks of influence provide the structural route for social interactions and reciprocating
behaviors which encourages virtual recommendation diffusion and co-shopping response. The rationale
behind this proposition is supported by social networks literature, which refers the “small worlds” are
structured on close social bounds and “match dyads” are more exposed to social contagium. Networks of this
kind have received little attention, yet they appear to have an enormous potential for information diffusion
and social influence (Duncan, 1999; Van Den Bulte and Wuyts, 2007).
First, we consider network size influence on recommendation behavior and co-shopping influence.
Broadly speaking, we predict that customer recommendations made through personal contacts are better
matched than those made through other channels, sustained on individual’s similarities and match dyads in
small networks which are more likely to impact recommendation behavior and co-shopping influence. Here,
we use a direct measurement of what constitutes “match dyads”: an objective measure of network size and
ties to test a “better match” proposition, that is, if match dyads in close networks helps to increase the
prediction accuracy of recommendation diffusion on co-shopping influence. Research provides evidence that
smaller networks (those with fewer than 50 members “everybody knows everybody else”) are characterized
by strong relational ties, rather than weak ties which result in stronger and multifaceted interpersonal
relationships between consumers influencing sharing behavior “I am willing to share personal information
and experiences with close friends, not with anonymous people” (Algesheimer et al., 2005); strong feelings
of social identity, shared history, individuals have similar needs, shared interests and consumption tendencies
“other Network members and I have close friendship ties and share the same objectives and
interests”(Bagozzi and Dholakia, 2006, Dholakia et al., 2004). Small world contact networks are structures
with startlingly efficient process performance is premised on the existence of shortcuts, are a potential
structural basis of reliable flows of information, influence, material like a simple model of disease
transmission (Friedkin, 2011) When these networks of relations form a closed network, individuals’
asymmetries are pooled and information transmission is faster (Lippert and Spagnolo, 2008). A network of
interpersonal influence, actors are structurally equivalent i.e. the social positions and opinions of actors and
any dissimilarity is reduced by the social influence process, and structurally equivalent actors will adopt an
innovation at approximately the same time (Friedkin and Johnsen, 1997). Based on previous research and
“better match” theory we suggest that social bonds and strong ties in close network of connections enhances
the likelihood of “better matched” recommendations, based on individuals’ similarities, shared needs and
previous awareness of consumption behavior tendencies, which in turn are more likely to positively influence
co-shopping.
Second, we consider how social interactions level in electronic networks of connections influence
recommendation intentions and behavior. Individuals are increasingly interacting in the cyberspace and they
successfully use e-mail, blogs, virtual communities, social sites for networking (Cole, 2007). We assume
these exponentials electronic communications provide a base for linking resources and speed information
diffusion to potential market. Forward online content requires low effort as it can be either directly attached
to electronic communication channels like emails/instant messaging or be stored at specific URLs, which are
shown in the body of electronic communications (Ho and Dempsey, 2010). Moreover, they also
communicate extensively with one another online (e.g. through e.mail, social network sites and other
interactive communications) and often keep offline social relationships. This relational capital provides a
base for enduring ties (Cole, 2007) and requires intensive interaction and close social bounds which is crucial
for social exchange and influence in establishing a basis for trustworthy recommendation for economic
exchange (Balasubramanian and Mahajan, 2001).
Researchers agree that interactivity is a key Internet feature which facilitates peer-to-peer reciprocal
interactions. Furthermore, we also suggest the strong effect of social bonds in close networks encourages
individuals’ reciprocal interactions which also encourage resource sharing, voluntary collaboration, and
cooperation, which are critical for recommendation diffusion and co-shopping influence. In line with this
rationale, Chan and Li (2010) find the strength of social bounds that consumers established in the community
positively influences the consumer´s reciprocating behaviors which in turn induce co-shopping intentions.
This finding give support to our rationale that dyadic network-based reciprocal interactions rather than
generalized provides the structural route for virtual recommendation contribution For example, researchers
have noted that higher participation levels lead to higher levels of involvement in the communities. These
findings imply that individual level of interactions in social networks will contribute to sharing market
141
ISBN: 978-972-8939-51-9 © 2011 IADIS
information and recommendation diffusion in the network. In our perspective this “e-linking value” is
supported by “match dyad” in close networks that people who connect to more others likely sustain their
contributions to the network through reciprocal interactions sharing and speed market information. Hence,
we suggest that networked-based peer-to-peer interactions level is likely to positively impact the strength of
recommendation behavioral intentions and co-shopping influence.
Taken together we propose the following: the positive impact of consumers' recommendation behavioral
intentions on co-shopping influence is stronger for members of small networks than for members of large
social networks and for network members with higher interactions level than for members with lower
interactions.
2.4 Voluntary Collaboration and Incentive Seeking
There exist some unobserved individual characteristics that lead to higher recommendation level. This
assumption is consistent with sociological and psychological theories which posit what drives sharing market
information is a combination of intrinsic and extrinsic individual motivations. We discuss here two individual
dimensions that prior research indicates may be relevant to explain recommendation diffusion and coshopping influence in social networks of connections: “voluntary collaboration” and “incentive seeking”.
First, consider the customers’ reasons to give free and voluntary market information and personal
recommendations. By voluntary collaboration we mean what induce people to engage in spontaneous sharing
behavior to give free and voluntary market or product recommendation into the Network of connections. The
construct receives theoretical support both from previous research on market helping behavior (Price et al.,
1995) and group-based consumer interactions (Dholakia et al., 2004, Hars and Qu, 2002, Wasko and Faraj,
2005) and altruism literature on arousal of “match dyad” empathy and reciprocity.
Extensive research provides evidence what drives consumers to engage in voluntary collaboration sharing
resources, offering personal opinions and give free and voluntary market information, answering other’s
questions, influencing peer consumers, helping them making good purchase decisions, and even validating
their past decisions and behaviors encompasses individual’s altruistic characteristics (Hars and Qu, 2002; Ho
and Dempsey, 2010) and helping market behavior defined as acts performed in the marketplace that benefit
others in their purchases and consumption (Price et al. 1995). As Nelson and Otnes (2005) note in their
netnography study, online social connections initiate helping behaviors and feelings of moral obligation to
help, which sustain commitments to the community. For exemple, Hars and Qu (2002) measure altruism as “I
don’t care about money”, “Recognition from others is my greatest reward”, “Community members should
help each other out”, or “I deeply enjoy helping others—even if I have to make sacrifices” to explain
motivations to engage in virtual collaboration in open source online communities.
Moreover, the relationship with altruism and sharing market information appears particularly salient in
close networks: the role of empathic emotions and caring responses gained from strong relational ties boost
altruistic motivations. This rationale is also supported by social exchange theory which posits all interactions
as exchanges of rewards and, distinguishes between extrinsic and intrinsic rewards that arise from the feeling
of being rewarded just by being in a relationship which valuation varies by persons reflecting their own
preferences (Blau, 1964). On the basis of prior research we expect the greater the consumers' level of
altruism the more likely they are to engage in spontaneous sharing behavior to give free and voluntary market
or product recommendation into the network of connections with matched needs.
Secondly, consider the “incentive seeking”. The emergence of the incentive motive suggests that
consumers use brand communities to obtain rewards and incentives in exchange for their community
participation. In certain cases, brand communities and e.tail sites tend to provide monetary and nonmonetary
incentives such sales promotions as community events, contests, sweepstakes, and coupons as rewards for
member’s participation and recommendation diffusion. This suggests that consumers are already aware of the
fact that a number of e.retailers offer a variety of promotions and future rewards therefore, they may join
such communities mainly for reasons associated with the incentives offered there. Evidence from this belief
is provided by few empirical studies that find monetary compensations and future rewards (e.g. “I receive
some form of explicit compensation, salary, contract for participating in the project”, “Participating in the
project makes me more marketable”) are more significant predictor of community contribution than intrinsic
or altruistic motivations (Hars and Qu, 2002, Sung et al., 2010). An explanation for this behavioral
motivation is that a surprisingly large number of participants were paid for their open-source efforts which in
some way poisoned the voluntary collaboration engagement. These findings suggest that such monetary
142
IADIS International Conference e-Commerce 2011
incentives play a significant role in motivating consumers less altruistic and less motivated to process and
sharing market information for free in large networks. In certain cases, while members of small networks
may hope their recommendation behavior is interpreted by the sender as altruistic, what they are really
seeking is some sort of incentive. Furthermore, in some cases e-retailers offer such monetary incentives on
the base of referrals effectiveness, which mean new customers’ first purchases. From a marketing standpoint,
rewarding individual efforts and ensuring ongoing recommendations, managers cannot only generate positive
word-of-mouth among consumers, which in turn can reinforce the consumer–brand relationship but also
drive customers to engage in more purchase-related behaviors and co-shopping influence. Such possibilities
imply that such monetary incentives may play a significant role in motivating consumers to engage in
ongoing recommendations into the network on a regular basis. This process is consistent with social
exchange theory in the sense that "incentive seeking" helps explain when members choose to participate and
contribute in a manner that maximizes their total social-interaction utility.
Taken together we propose the following: The positive relationship between recommendation intentions
and behavior is stronger for customers engaged in voluntary collaboration. And, the positive and reciprocal
relationship between recommendation behavior and co-shopping influence is stronger for customers seeking
a monetary incentive.
3. CONCLUSION
By extending better match theory this study propose that “match dyad” in small networks of connections
provide high-quality valuable information that will improve the match between the product and the potential
customer. Under this assumption, online social connections, act as a proxy for information about the potential
market that is difficult and expensive to measure or observe directly such as customer needs, and to access.
As we discuss earlier, close networks are characterized by strong relational ties, rather than weak ties, due to
a shared history and social identity, individuals shared needs and consumption tendencies. Therefore, we
deduce this networked consumer likewise a “matchmaker” will provide better matched connections that leads
to “better matched recommendation” diffusion which are more likely to influence co-shopping. In this sense
they provide e-business “better matched” resources as a prime tool to attract new customers more efficiently
and speed to market product novelty or business information that will leverage the economic value of social
network of influence. From a marketing standpoint these networked-based social interactions are crucial to
disseminate and speed to market product recommendation, to target viral consumers to create an effective
customer referral program and benefit from network externalities. Such benefits imply that social contagium
gained from online social networks is both cost effective and powerful which leverage their economic value
for potential market attraction (Balasubramanian and Mahajan, 2001).
This study contributes to a new research stream on networked customers to better understand e-consumer
traits, behavioral intentions and potential influence so they could be effectively profiled as a Match-NetPromoter to be involved in the collaborative recommendation process in the Network, turning dyadic-intotriadic relationships. Besides, for firms there is a lot of interest in increasing market share by targeting and
making marketing alliances with those most likely to influence others. Linking bridges with unconnected
individuals, through customers’ networks, joining people by similarity capturing resources from different
Networks in a constructive fashion: looking for synergy and combinational customer needs and preferences.
This matched dyads synergies introduce customers as an information resource and a co-developer of firm
value-creation. So, the study also contributes in the sense that provides specific guidance to managers on
actions they can take: targeting networked e-influential’ customers to develop efficient customer’ referral
programs and “croudsourcing” strategy. Using “better matched” resources as a prime “tool” for capturing
new customers to create an entire referral chain shows the importance of using the best customers like a
valuable asset, as an alternative to resource based view.
ACKNOWLEDGEMENT
Research for this paper was supported by PhD grant from the Portuguese Science Foundation.
143
ISBN: 978-972-8939-51-9 © 2011 IADIS
REFERENCES
Blau, P.M. 1964. Exchange and Power in Social Life. New York: Wiley.
Van Den Bulte, C. and S. Wuyts. 2007. Social Networks and Marketing, Cambridge, Mass: Marketing Science Institute.
Algesheimer, R. et al. 2005. The Social Influence of Brand Community: Evidence from European Car Clubs. Journal of
Marketing, 69, 19-34.
Anderson, R. E. and Srinivasan, S. S. 2003. E-Satisfaction and E-Loyalty: A Contingency Framework. Psychology &
Marketing, 20, 123-138.
Bagozzi, R. P. and Dholakia, U. M. 2006. Antecedents and purchase consequences of customer participation in small
group brand communities. International Journal of Research in Marketing, 23, 45-61.
Balasubramanian, S. and Mahajan, V. 2001. The Economic Leverage of the Virtual Community. International Journal of
Electronic Commerce, 5, 103-138.
Burnham, T. et al. 2003. Consumer switching costs: A typology, antecedents, and consequences. Journal of the Academy
of Marketing Science, 31, 109-126.
Castilla, E. J. 2005. Social Networks and Employee Performance in a Call Center. American Journal of Sociology, 110,
1243-1283.
Chan, K. W. and Li, S. Y. 2010. Understanding consumer-to-consumer interactions in virtual communities: The salience
of reciprocity. Journal of Business Research, 63, 1033-1040.
Cole, M. 2007. The networked consumer: a critical review and assessment. Journal of Customer Behaviour, 6, 5-18.
Dholakia, U. M. et al. 2004. A social influence model of consumer participation in network- and small-group-based
virtual communities. International Journal of Research in Marketing, 21, 241-263.
Duncan, J. W. 1999. Networks, Dynamics, and the Small-World Phenomenon1. The American Journal of Sociology, 105,
493-527.
Foa, U. G. 1971. Interpersonal and economic resources. Science, 29, 345-51.
Friedkin, N. E. 2011. Spine segments in small world networks. Social Networks, 33, 88-97.
Friedkin, N. E. and Johnsen, E. C. 1997. Social positions in influence networks. Social Networks, 19, 209-222.
Hars, A. and Qu, S. 2002. Working for Free? Motivations for Participating in Open-Source Projects. International
Journal of Electronic Commerce, 6, 25.
Ho, J. Y. C. and Dempsey, M. 2010. Viral marketing: Motivations to forward online content. Journal of Business
Research, 63, 1000-1006.
Jones, M. A. et al. 2000. Switching barriers and repurchase intentions in services. Journal of Retailing, 76, 259-274.
Lam, S. Y. et al. 2004. Customer Value, Satisfaction, Loyalty, and Switching Costs: An Illustration From a Business-toBusiness Service Context. Journal of the Academy of Marketing Science, 32, 293-311.
Lippert, S. and Spagnolo, G. 2008. Internet peering as a network of relations. Telecommunications Policy, 32, 33-49.
Mangleburg, T. F. et al. 2004. Shopping with friends and teens' susceptibility to peer influence. Journal of Retailing, 80,
101-116.
Nelson, M. R. and Otnes, C. C. 2005. Exploring cross-cultural ambivalence: a netnography of intercultural wedding
message boards. Journal of Business Research, 58, 89-95.
Oliver, R. L. 1999. Whence Consumer Loyalty? Journal of Marketing, 63, 33-44.
Price, L. L. et al. 1995. Everyday Market Helping Behavior. Journal of Public Policy & Marketing, 14, 255-266.
Reichheld, F. F. and Schefter, P. 2000. E-Loyalty. Harvard Business Review, 78, 105-113.
Rezabakhsh, B. et al. 2006. Consumer Power: A Comparison of the Old Economy and the Internet Economy. Journal of
Consumer Policy, 29, 3-36.
Simon, C. J. and Warner, J. T. 1992. Matchmaker, Matchmaker: The Effect of Old Boy Networks on Job Match Quality,
Earnings, and Tenure. Journal of Labor Economics, 10, 306-330.
Srinivasan, S. S. et al. 2002. Customer loyalty in e-commerce: an exploration of its antecedents and consequences.
Journal of Retailing, 78, 41-50.
Sung, Y. et al. 2010. An Explorative Study of Korean Consumer Participation in Virtual Brand Communities in Social
Network Sites. Journal of Global Marketing, 23, 430 - 445.
Wasko, M. M. and Faraj, S. 2005. Why should I share? Examining social capital and knowledge contribution in
electronic networks of practice. MIS Quarterly, 29, 35-57.
Wikström, S., et al. 2002. From real world to mirror world representation. Journal of Business Research, 55, 647-654.
Zauberman, G. 2003. The Intertemporal Dynamics of Consumer Lock-In. Journal of Consumer Research, 30, 405.
144
IADIS International Conference e-Commerce 2011
WHY DO BIDDERS BID ONLINE? THE VIEW OF
CUSTOMER’S VALUE
Chiahui Yen1, Chun-ming Chang2, Chih-chin Yang3, Lu-jui Chen1 and Ming-Chang Chiang4
1
Department of International Business, Ming Chuan University,
250 Zhong Shan N. Rd., Sec. 5, Taipei 111, Taiwan
2
Department of Tourism Information, Aletheia University,
No.32, Chen-Li St., Tamsui, Taipei County, 251, Taiwan
3
Department of Information and Electronic Commerce, Kainan University,
No. 1 Kainan Road, Luchu, Taoyuan County 33857, Taiwan
4
Graduate Institute of Biotechnology, Chinese Culture University,
55 Hwa-Kang Road, Yang-Ming-Shan, Taipei 111, Taiwan
ABSTRACT
The success of online auction is founded on bidders enjoying shopping benefits and creating customer value in online
auction. This study investigates the importance of bidder’s perceived value along with the cost and benefit aspects.
Therefore, this study proposed an integrated transaction cost economics (TCE) and expectancy confirmation theory
(ECT) to understand the determinants of bidder’s perceived value. We collected data from survey questionnaire, and total
594 valid questionnaires were analyzed. A structural equation modeling (SEM) is used to assess the relationships of the
research model. The findings show that satisfaction has significant influence on bidder’s perceived customer value, while
transaction cost is negatively associated with customer value. Bidder’s satisfaction is determined by trust and
confirmation, as well as e-service quality of auctioneer and seller. Moreover, auctioneer’s asset specificity and product
uncertainty are positively associated with bidder’s perceived transaction cost. Bidder’s interaction frequency between
bidder and seller is negatively associated with their transaction cost.
KEYWORDS
Customer Value, Satisfaction, Online Auction, Transaction Cost Economics (TCE), Expectancy Confirmation Theory
(ECT)
1. INTRODUCTION
Consumer-to-consumer (C2C) commerce has become a popular e-commerce application of the Internet. With
their low cost of operation, flexible operating time, low barriers to entry, completeness of services offered,
and media coverage of the operations of successful online auction sellers, the success of online auctions has
inspired numerous new market entrants, making them the most popular emerging business sector (Yang and
Huang 2011). The supreme example of C2C is online auction which is unique in the realm of e-commerce
and one of the most successful business innovations on the web. With the popularity of online auctions, how
to increase customer value is crucial for online auctioneer and seller. Customer value is created when the
benefits to the customer associated with a product or a service exceed the offering's costs to the bidder.
Benefits are made tangible for the bidder through increased margins, while cost refers to transaction cost.
Therefore, how to reduce transaction cost and increase benefit are pivotal to achieve bidder’s perceived
value.
From the buyers who shop for practical needs or for fun to the sellers who do business as a source of
income, the nature of online auctions is transaction. Rooted in economic theory, TCE theoretically explains
the buyer-supplier relationship in management and marketing empirical studies (Ghoshal and Moran 1996;
Rindfleisch and Heide 1997).TCE assert that the total cost incurred by a party can be grouped largely into
transaction costs and production costs. Transaction costs are well defined as the costs of all the information
processing necessary to coordinate the work of people and machines that perform the primary processes (Son,
Narasimhan et al. 2005). A number of studies indicate that consumers’ willingness to buy online is negatively
145
ISBN: 978-972-8939-51-9 © 2011 IADIS
associated with their perceived transaction cost (Liang and Huang 1988; Devaraj, Fan et al. 2002; Teo and
Yu 2005). Accordingly, this study examines the bidder’s perceived customer value from the economic aspect
by drawing on TCE.
Oliver (1980) originally developed his expectation confirmation theory (ECT) to explain and predict
consumer satisfaction and loyalty intention, and proposed that consumers’ post-purchase satisfaction is
jointly determined by pre-purchase expectation and confirmation. Satisfaction, in turn, is believed to
influence post-purchase intention to repurchase a product or reuse a service (Hsu, Yen et al. 2006). In the
past decade, most studies have confused users’ continuance with acceptance decisions. Those studies
implicitly considered continuance as an extension of acceptance behaviors. Recently, many studies have
provided evidence that user behavior has different features over the adoption stage and post-adoption
(Khalifa and Liu 2003; Hsu, Yen et al. 2006). Hence, ECT is adopted in this study because it is suitable for
gaining a more comprehensive understanding of the online bidder’s post-adoption behavior.
The research purposes of this study are as follows: to examine how the economic dimension based on
TCE constructs has an impact on their behavior, and, to investigate how the bidder’s behavior dimension
based on ECT constructs has influence on their perceived customer value.
2. LITERATURE REVIEW
2.1 Transaction Cost Economics
TCE were originally proposed by Coase (1973), which theoretically explains why a transaction subject
chooses a particular form of transaction instead of others (Williamson 1975). There are two assumptions
underlying the choice between market and hierarchy, i.e., bounded rationality and opportunism. Bounded
rationality refers to the fact that people have limited memories and limited cognitive processing power.
People cannot digest all the information they have and cannot accurately work out the consequences of the
information opportunism states that people will act to further their own self-interest. That is, some people
may not be entirely honest and truthful about their intentions some of the time (Williamson 1981; Teo and
Yu 2005). Moreover, TCE are constituted by three situational conditions, i.e., asset specificity, uncertainty,
and frequency (Williamson 1975).
TCE have attracted considerable attention in IS research in analyzing transaction efficiency and its effect
on IS usage. Some studies divided TCE constructs into several sub-dimensions. For instance, Liang and
Huang (1988) propose that the transaction cost of a product on the web is determined by the uncertainty and
asset specificity. They operate cost constructs as comparison cost, examination cost, negotiation cost,
payment cost and delivery cost, and divide uncertainty construct into product uncertainty and process
uncertainty. Four specificities are proposed as physical asset specificity, human asset specificity, brand name
specificity, and temporal specificity. Similarly, Teo and Yu (2005) and Teo et al. (2004) also examine TCE
sub-constructs in the online shopping context. Devaraj et al. (2006) analyze the economic aspects of
consumer transactions through incurred costs and the social aspects through patterns of behavior. Devaraj et
al. (2002) take the view that TCE explains the external cost and TAM represents internal cost-benefit, which
captures consumers’ perception in an e-commerce environment. Expanding Devaraj et al.’s (2002) work,
Jones and Leonard (2007) adapt their framework in C2C e-commerce. The findings indicate that TAM, TCE,
and SERVQIAL all have an impact on satisfaction in C2C e-commerce. Consequently, the TCE framework
alone is inadequate for fully explaining the outcome of e-commerce (Bunduchi 2005).
2.2 Expectancy Confirmation Theory
In order to help gain a thorough understanding of the underlying phenomena, the ECT is presented for the
evaluation of continued usage. ECT is adopted here because it has been widely used in the marketing field of
consumer behavior to study post-purchase phenomena, including consumer satisfaction, repurchase
intentions and complaining behaviors. The ECT model originally developed by Oliver (1980) theorizes that
consumers’ post-purchase satisfaction is jointly determined by pre-purchase expectation and disconfirmation.
Satisfaction, in turn, is believed to influence post-purchase intention to repurchase a product or reuse a
146
IADIS International Conference e-Commerce 2011
service. Recently, ECT has been used to understand individuals’ intentions in the e-commerce context. Some
studies asserted that confirmation had a significant effect on satisfaction, which in turn had a positive
influence on IT continuance usage
It is noticeable that some researchers conduct a longitudinal study to understand the adoption and postadoption user behavior over different stages. Bhattacherjee and Premkumar (2004) explored how users’
beliefs and attitudes change during the course of IT usage. Similarly, Khalifa and Liu (2003) validated the
role of satisfaction at different adoption stages. Their results both show that confirmation and performance
are important factors in explaining post-adoption satisfaction. Hsu et al. (2006) proposed an extended model
of TPB by incorporating constructs drawn from ECT and to examine the antecedents of users’ intention to
continue using online shopping. They conducted a longitudinal study to validate that confirmation plays an
important role in shaping the user’s belief during the pre-usage and usage stages.
3. RESEARCH MODEL AND HYPOTHESES
In this study, we develop research model integrated TCE and ECT to investigate bidder’s perceived customer
value. Research model and hypotheses is shown as Figure 1.
According to TCE, it comes from three variables that are employed to characterize any transaction—
frequency, uncertainty, and asset specificity. First, Uncertainty refers to the degree to which the future states
of the environment cannot be accurately anticipated or predicted due to imperfect information (Pfeffer and
Salancik 1978). In buyer–seller relationships, perceived uncertainty is defined as the degree to which the
outcome of a transaction cannot be accurately predicted by the buyer due to seller and product related factors
(Pavlou, Liang et al. 2007). Second, asset specificity refers to the lack of ease with which the human capital,
physical assets, and facilities specifically tied to the manufacturing of an item can be used by alternative
users or put to alternative uses. As asset specificity increases, due to transactors’ fear of opportunism, more
complex governance structures are required to eliminate or attenuate costly bargaining over profits from
specialized assets. Thus, transaction costs are presumed to increase with an increase in asset specificity
(Williamson 1981; Teo and Yu 2005). Third, frequency refers to the recurring nature of the transactions
(Devaraj, Fan et al. 2002). The effect of frequency on transaction cost is strong. In Internet environment,
buying frequency has an influence on consumers’ perceived transaction cost and their willingness to buy
online (Teo and Yu 2005). C2C e-commerce highlights the interpersonal communication through interaction
between bidders and sellers. Therefore, these lead to the following hypotheses:
H1: Bidders’ perceive product uncertainty is positively associated with their transaction cost of online
auction.
H2: Bidders’ perceive auctioneer’s asset specificity is positively associated with their transaction cost of
online auction.
H3: Bidders’ interaction frequency with seller and auctioneer is negatively associated with their
transaction cost of online auction.
Kotler (1980) indicated that creating customer value means meeting target customers’ needs and
increasing customers’ purchasing intentions. Perceived value represents a tradeoff between two variables:
transaction cost and satisfaction. Transaction cost describes what must pay to perform a certain behavior, e.g.
bidding in online auction. In contrast, satisfaction can be described as the bidder having a positive emotional
state resulting from purchasing through an auctioneer or from transacting with the seller. Therefore,
H4: Bidders’ transaction cost of online auction is negatively associated with their perceived customer
value.
H5: Bidders’ satisfaction of online auction is positively associated with their perceived customer value.
According to ECT, confirmation can be described as bidders’ subjective judgments resulting from
comparing their expectations and their perceptions of performance received. Therefore, confirmation is
determined by the combination of expectation and perceived performance. In this study, we assume that
overall e-service quality could be viewed as auctioneer’s and sellers’ performance. Besides, customers form a
feeling of satisfaction or dissatisfaction based on their confirmation level. A moderate satisfaction level will
be maintained by confirmation, enhanced by the delight of positive confirmation, and decreased by the
disappointment of negative confirmation. Many studies (Mckinney, Yoon et al. 2002; Khalifa and Liu 2003)
found that there is a strong link between confirmation and satisfaction and concluded that confirmation plays
147
ISBN: 978-972-8939-51-9 © 2011 IADIS
a dominant role in satisfaction. Moreover, in online auction environment, where bidders rely on IT-mediated
interactions, successful transaction depends on trust. Many studies highlight the role of trust in forming
customer’s satisfaction. Therefore,
H6: Bidders’ confirmation of online auction is positively associated with their satisfaction.
H7: Overall e-service quality of online auction is positively associated with bidders’ confirmation.
H8: Overall e-service quality of online auction is positively associated with bidders’ satisfaction.
H9: Bidders’ trust in online auction is positively associated with their satisfaction.
4. METHODOLOGY AND DATA ANALYSIS
4.1 Instrument Development and Research Design
Measure items for the research constructs were compiled from validated instruments to represent each
construct, and wording was modified to fit the context of an online auction. All transaction cost constructs
were based on economics literature and derived from prior e-commerce studies. Items for measuring product
uncertainty and asset specificity were adapted from Liang and Huang (1988) as well as Devaraj et al.(2002).
Items for measuring interaction frequency were developed following Teo and Yu (2005) and modified to fit
the online auction context. Items for measuring transaction cost were based on Liang and Huang (1988) as
well as Teo and Yu (2005). Moreover, items for measuring perceived customer value were developed
following Parasuraman et al.’s (2005) perceived value as well as DeLone and McLean’s (2003) net benefits.
Scale items for satisfaction were adapted from Oliver’s (1980) as well as Bhattacherjee and Premkumar’s
(2004). Items for measuring confirmation were adapted from Bhattacherjee (2001a) (2001b) as well as
Bhattacherjee and Premkumar (2004). Items for measuring overall e-service quality were based on
Parasuraman et al.’s (2005) definition and modified to fit the online auction context. Trust was based on
Mayer et al.’s (1995) definition and adapted form Gefen et al. (2003).
Except for demographic questions, most items were measured using a five-point Likert scale with anchors
ranging from strongly disagree (1) to strongly agree (5). In order to avoid response bias in the form of
acquiescence or affirmation (Netemeyer, Bearden et al. 2003), items of product uncertainty are negative
statements. As opposed to Teo and Yu’s (2005) as well as Liang and Huang’s (1988) scale, items of
transaction cost are used negative worded instead of positive sentences. As to items of asset specificity, we
use subjective sentences to capture respondents’ perception rather than subtractive worded. Thus, items of
asset specificity and transaction cost are required reverse coding.
In order to target buyers of online marketplace, a web-based survey was employed. This study was
supported by Yahoo! Kimo and the survey questionnaire was put at the head of the forum to promote this
survey. The questionnaire consisted of an instruction page that opened a separate web browser window
containing the items to be assessed. All the buyers who had a reputation record in Yahoo! Kimo auction were
welcomed to participate in this survey, while some prizes were offered to improve the number of high quality
responses. Because we are interested in the repurchase intention of buyers, we only considered respondents
who completed a bidding procedure to ensure that they had sufficient online auction experience, including
browsing, gathering product information, evaluating the bidding price, making bidding decisions, and
completing a transaction by offering payment and address information. By the time this survey was closed,
594 valid questionnaires had been received and were analyzed. There was no missing data in the sample
because participants could not submit their response unless it was complete.
4.2 Reliability and Validity of Research Constructs
The research was analyzed using structural equation model (SEM), supported by LISREL 8.54. The
adequacy of the measurement model was evaluated on the criteria of reliability, convergent validity, and
discriminant validity. First, reliability is the extent to which varying approaches to construct measurement
yield the same results (Campbell and Fiske 1959) and is examined using the composite reliability values. As
shown in Table 2, the values of composite reliability ranged form 0.81 to 0.91, which well above the
recommended level of 0.70 and indicating adequate reliability. Second, convergent validity is adequate when
148
IADIS International Conference e-Commerce 2011
constructs have an average variance extracted (AVE) of at least 0.5 (Fornell and Larcker 1981). All AVEs
ranged from 0.50 to 0.65, which suggesting the principal constructs capture higher construct-related variance
than error variance. Third, for satisfactory discriminant validity, the square root of the AVE should exceed
the correlation shared between the construct and other constructs in the model (Fornell and Larcker 1981).
The correlations among all constructs are all well below the 0.90 threshold, suggesting that all constructs are
distinct from each other (Hair, Black et al. 2006). Comparison of construct correlation and the square root of
the AVE was shown in Table 2. Off-diagonal elements are the correlations among constructs, which ranged
form -0.04 to 0.72. Diagonal elements are the square root of the AVE, and all these values exceed the interconstruct correlations.
Table 1. Results of reliability and convergent validity
Construct
Items and Factor loading
Composite
reliability
Perceived customer value (CV)
Confirmation (CON)
Transaction cost (TC)
CV1=0.80 CV2=0.85 CV3=0.78 CV4=0.78
CON1=0.78 CON2=0.88 CON3=0.87 CON4=0.84
TC1=0.57 TC2=0.71 TC3=0.63 TC4=0.82
TC5=0.77
SAT1=0.77 SAT2=0.82 SAT3=0.78 SAT4=0.80
TFR1=0.89 TFR2=0.89 TFR3=0.58 TFR4=0.50
TAS1=0.80 TAS2=0.80 TAS3=0.69
TUN1=0.71 TUN2=0.88 TUN3=0.88 TUN4=0.69
SQ1=0.71 SQ2=0.84 SQ3=0.86 SQ4=0.81
TR1=0.66 TR2=0.87 TR3=0.85 TR4=0.84
0.88
0.91
0.83
Average
variance
extracted
0.65
0.71
0.50
0.87
0.82
0.81
0.87
0.88
0.88
0.63
0.55
0.58
0.63
0.65
0.65
Satisfaction (SAT)
Interaction Frequency (TFR)
Asset specificity (TAS)
Product uncertainty (TUN)
Overall e-service quality (SQ)
Trust (TR)
Table 2. Results of discriminant validity
Perceived customer value (CV)
Satisfaction (SAT)
Confirmation (CON)
Transaction cost (TC)
Interaction Frequency (TFR)
Asset specificity (TAS)
Product uncertainty (TUN)
Trust (TR)
Overall e-service quality (SQ)
CV
0.81
0.72
0.58
-0.46
0.41
-0.41
-0.06
0.54
0.47
SAT
CON
TC
TFR
TAS
TUN
TR
SQ
0.79
0.69
-0.47
0.31
-0.38
-0.09
0.64
0.54
0.84
-0.42
0.27
-0.32
-0.16
0.69
0.55
0.71
-0.29
0.30
0.10
-0.44
-0.36
0.74
-0.44
-0.04
0.27
0.20
0.76
-0.05
-0.30
-0.35
0.79
-0.14
-0.05
0.81
0.49
0.81
Off-diagonal elements are the correlations among constructs. Diagonal elements (in bold) are the square root of the AVE, and these
values should exceed the inter-construct correlations for adequate discriminant validity
4.3 Model Testing Results
The overall fit of model was tested to evaluate the correspondence of the actual or observed input matrix with
that predicted from our proposed model. The summary of the overall fit indices was shown in Figure 1. For
models with good fit, the ratio of chi-square to the degree of freedom (χ2/d.f.) should be less than 3.0
(Carmines and McIver 1981), and RMSEA should be lower than 0.06 (Hu and Bentler 1999). GFI, and CFI,
should exceed 0.9 (Hair, Black et al. 2006) and so should NNFI (Bentler 1988). The value of χ2/d.f. is 2.8,
NFI is 0.96, CFI is 0.98, and RMSEA is 0.055.
The SEM approach was also used to test the hypothesized relationships in the research model. Figure 1
illustrates the estimated coefficients and their significance in the structural model, where all relationships
were statistically significant. Product uncertainty, asset specificity, and interaction frequency all had
significant effects on transaction cost (β= 0.13, 0.32, -0.13 ; t= 2.95, 5.26, -2.42, respectively). Thus, H1,
H2, and H3 were supported. Perceived customer value was strongly predicted by transaction cost and
satisfaction (β= -0.13, 0.80 ; t= 3.92, 15.78, respectively), as well as H4 and H5 were supported. The path
between overall e-service quality and confirmation was significant ( β= 0.64; t= 12.87), and H7 was
supported. Confirmation, overall e-service quality, and trust positively influenced satisfaction (β= 0.47,
0.20, 0.31; t= 9.82, 3.86, 7.00, respectively), as well as H6, H8, and H9 were supported.
149
ISBN: 978-972-8939-51-9 © 2011 IADIS
H1
0.13**
Product
uncertainty
H2
Transaction cost
Asset specificity 0.32***
In the
Interaction
Frequency
H4
-0.13***
H3
-0.13*
Perceived
customer value
Overall e-service
quality
In the
H8
0.20***
H5
0.80***
H7
0.64***
Confirmation
H6
0.47***
Satisfaction
In the
Trust
H9
0.31***
Significance level:
*p value<0.05,
**p value<0.01,
***p value<0.001
Figure 1. Research model and path analysis
5. CONCLUSION
The relationship of findings presented to the research questions will be discussed in this section. First, this
study examines TCE to evaluate the transaction cost in online auction environment. Auctioneer’s asset
specificity and product uncertainty are positively associated with bidder’s perceived transaction cost.
Bidder’s interaction frequency between bidder and seller is negatively associated with their transaction cost.
Second, our findings validate ECT to show that bidders’ confirmation is positively associated with their
satisfaction, and their satisfaction is positively associated with customer value. Bidder’s satisfaction is
determined by trust and confirmation, as well as e-service quality of auctioneer and seller. Finally, the
findings show that satisfaction has significant influence on bidder’s perceived customer value, while
transaction cost is negatively associated with customer value.
By synthesizing the above conclusion and discussion, several implications can be drawn from this
research. First, from the bidder’s perspective, the strength of the relationship between satisfaction and
customer value has been found to vary significantly. How to create customer value becomes the most
important issue in the online auction marketplace. Second, auctioneers’ performance (i.e. e-service quality) is
important to influence bidder’s perceived value. Auctioneer should construct a legal and safe infrastructure,
to establish an efficient environment, and to facilitate trading activities. Finally, expanded from buyer-seller
relationships in B2C, C2C not only has bidder-seller relationships, but also has a bidder-auctioneer (i.e. buyer
150
IADIS International Conference e-Commerce 2011
toward website) connection. Online auctioneers play as intermediaries to connect bidders and sellers. Further,
anyone with an Internet connection can easily become a bidder or seller, and this highlights the importance of
establishing self-regulating trust mechanisms to allow transactions to take place smoothly between
geographically separated strangers.
REFERENCES
Bentler, P. M., 1988. Theory and Implementation of EQS: A structural equations program. Newbury Park, CA, Sage.
Bhattacherjee, A., 2001a. "An empirical analysis of the antecedents of electronic commerce service continuance."
Decision Support Systems 32: 201-214.
Bhattacherjee, A., 2001b. "Understanding information systems continuance: an expectation-confirmation model." MIS
Quarterly 25(3): 351-370.
Bhattacherjee, A. and G. Premkumar, 2004. "Understanding changes in belief and attitude toward information technology
usage: a theoretical model and longitudinal test." MIS Quarterly 28(2): 229-254.
Bunduchi, R., 2005. "Business relationships in internet-based electronic markets: the role of goodwill trust and
transaction costs." Information Systems Journal 15: 321-341.
Campbell, D. T. and D. W. Fiske, 1959. "Convergent and discriminant validation by the multitrait-multimethod matrix."
Psychological Bulletin 56(2): 81-105.
Carmines, E. and J. McIver, 1981. Analyzing Models with Unobserved Variables: Analysis of Covariance Structures.
Social measurement: Current Issues. G. Bohmstedt and E. Borgatta. Beverly Hills, Calif, Sage.
Coase, R. H., 1973. "The nature of the firm." Economica 4: 386.
DeLone, W. H. and E. R. McLean, 2003. "The DeLone and McLean model of information systems success: a ten-year
update." Journal of Management Information Systems 19(4): 9-30.
Devaraj, S., M. Fan, et al., 2002. "Antecedents of B2C channel satisfaction and preference: validating e-commerce
metrics." Information Systems Research 13(3): 316-333.
Devaraj, S., M. Fan, et al., 2006. "Examination of online channel preference: using the structure-conduct-outcome
framework." Decision Support Systems 42: 1089-1103.
Fornell, C. and D. F. Larcker, 1981. "Evaluating structural equation models with unobserv¬ables and measurement
error." Journal of Marketing Research 18(1): 39-50.
Gefen, D., E. Karahanna, et al., 2003. "Trust and TAM in online shopping: an integrated model." MIS Quarterly 27: 5190.
Ghoshal, S. and P. Moran, 1996. "Bad for practice: a critique of the transaction cost theory." The Academy of
Management Review 21(1): 13-47.
Hair, J. F., Jr., W. C. Black, et al., 2006. Multivariate Data Analysis. Upper Saddle River, NJ, Prentice Hall.
Hsu, M. H., C. H. Yen, et al., 2006. "A longitudinal investigation of continued online shopping behavior: an extension of
the theory of planned behavior." International Journal of Human-Computer Studies 64(9): 889-904.
Hu, L. and P. M. Bentler, 1999. "Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria
versus new alternatives." Structure Equation Modeling 16(1): 1-55.
Jones, K. and L. N. K. Leonard, 2007. "Consumer-to-consumer electronic commerce: a distinct research stream." Journal
of Electronic Commerce in Organizations 5(4): 39-54.
Khalifa, M. and V. Liu, 2003. "Determinants of satisfaction at different adoption stages of Internet-based services."
Journal of the Association for Information Systems 4(5): 206-232.
Liang, T. P. and J. Huang, 1988. "An empirical study on consumer acceptance of products in electronic markets: a
transaction cost model." Decision Support Systems 24(1): 29-43.
Mayer, R. C., J. H. Davis, et al., 1995. "An integrative model of organizational trust." Academy of Management Review
20: 709-734.
Mckinney, V., K. Yoon, et al., 2002. "The measurement of web-customer satisfaction: an expectation and
disconfirmation approach." Information Systems Research 13(3): 296-315.
Netemeyer, G., W. O. Bearden, et al., 2003. Scaling Procedures: issues and applications, SAGE publications.
Oliver, R. L., 1980. "A cognitive model of the antecedents and consequences of satisfaction decisions." Journal of
Marketing Research 17: 460-469.
Parasurman, A., V. A. Zeithaml, et al., 2005. "E-S-QUAL: a multiple-item scale for assessing electronic service quality."
Journal of Service Research 7(3): 213-233.
151
ISBN: 978-972-8939-51-9 © 2011 IADIS
Pavlou, P. A., H. Liang, et al., 2007. "Understanding and mitigating uncertainty in online exchange relationships: a
principal-agent perspective." MIS Quarterly 31(1): 105-136.
Pfeffer, J. and G. Salancik, 1978. The External Control of Organizations: A Resource Dependence Perspective. New
York, Harper Row.
Rindfleisch, A. and J. B. Heide, 1997. "Transaction cost analysis: past, present, and future applications." Journal of
Marketing 61(4): 30-54.
Son, J. Y., S. Narasimhan, et al., 2005. "Effects of relational factors and channel climate on edi usage in the customersupplier relationship." Journal of Management Information Systems 22(1): 321-353.
Teo, T. S. H., P. Wang, et al., 2004. "Understanding online shopping behaviour using a transaction cost economics
approach." International Journal Internet Marketing and Advertising 1(1): 62-84.
Teo, T. S. H. and Y. Yu, 2005. "Online buying behavior: a transaction cost economics perspective." Omega: The
International Journal of Management Science 33: 451-465.
Williamson, O. E., 1975. Markets and Hierarchies: Analysis and Antitrust Implications. New York, Free Press.
Williamson, O. E., 1981. "The economics of organization: the transaction cost approach." The American Journal of
Sociology 87(3): 548-577.
Yang, C.-L. and R.-H. Huang, 2011. "Key success factors for online auctions: Analysis of auctions of fashion clothing."
Expert Systems with Applications 38(6): 7774-7783.
152
IADIS International Conference e-Commerce 2011
FACTORS INFLUENCING SAUDI CUSTOMERS’
DECISIONS TO PURCHASE FROM ONLINE RETAILERS
IN SAUDI ARABIA: A QUANTITATIVE ANALYSIS
Rayed AlGhamdi, Ann Nguyen, Jeremy Nguyen and Steve Drew
School of ICT, Griffith University
ABSTRACT
This paper presents the preliminary findings of a study researching the diffusion and the adoption of online retailing in
Saudi Arabia. It reports new research that identifies and explores the key issues that positively and negatively influence
the decision of Saudi customers to buy from online retailers in Saudi Arabia. Although Saudi Arabia has the largest and
fastest growth of ICT marketplaces in the Arab region, e-commerce activities are not progressing at the same speed.
While the overall research project involves exploratory research using mixed methods, the focus of this paper is on a
quantitative analysis of responses obtained from a survey of Saudi customers, with the design of the questionnaire
instrument being based on the findings of a qualitative analysis reported in a previous paper. The main findings of the
current analysis include a list of key factors that affect Saudi customers' purchase from Saudi online retailers, and
quantitative indications of the relative strengths of the various relationships.
KEYWORDS
E-commerce, Online retail, Online customers, Saudi Arabia, Quantitative analysis, Factors
1. INTRODUCTION
The revolution of electronic commerce (e-commerce) has started in the 90s in the developed world. Many
commercial organizations around the world have introduced e-commerce models in their businesses, seeking
the many benefits that the online channel can provide (Laudon and Traver 2007). Basically, e-commerce is
commerce enabled by Internet technologies, including pre-sale and post-sale activities (Whiteley 2000;
Chaffey 2004) and online retailing is a model of business to customer (B2C) e-commence which is online
version of traditional retail (To & Ngai 2006). Since 2000, e-commerce's rapid growth is obvious in the
developed world. Global e-commerce spending has currently reached US$10 trillion and was US$0.27
trillion in 2000 (Kamaruzaman, Handrich & Sullivan 2010). The United States, followed by Europe,
constitutes the largest share with about 79% of the global e-commerce revenue (Kamaruzaman, Handrich &
Sullivan 2010). However, the African and Middle East regions have the smallest share with about 3% of the
global e-commerce revenue (Kamaruzaman, Handrich & Sullivan 2010).
Regarding Saudi Arabia, the world's largest oil producer (CIA 2009), e-commerce is still underdeveloped.
Although Saudi Arabia has the largest and fastest growth of ICT marketplaces in the Arab region (Saudi
Ministry of Commerce 2001; Alotaibi and Alzahrani 2003; U.S. Commercial Services 2008; Alfuraih 2008),
e-commerce activities are not progressing at the same speed (Albadr 2003; Aladwani 2003; CITC 2007).
Only 9% of Saudi commercial organizations, mostly medium and large companies from the manufacturing
sector, are involved in e-commerce (CITC 2007). This paper is part of a research project studying the
diffusion of online retailing in Saudi Arabia. The focus of this paper is on the investigation of factors that
affect Saudi customers’ decisions to purchase from online retailers in Saudi Arabia.
153
ISBN: 978-972-8939-51-9 © 2011 IADIS
2. LITERATURE REVIEW
Information and Communication Technology (ICT) plays a significant role in the countries’ economies. Over
the last decade, the Saudi government has concentrated on this field to become the largest and fastest
growing ICT marketplace in the Arab region (Saudi Ministry of Commerce 2001; Alotaibi and Alzahrani
2003; U.S. Commercial Services 2008; Alfuraih 2008). The Saudi government has introduced policies to
encourage public and private organizations to adopt ICTs (Al-Tawil, Sait and Hussain 2003). In Saudi
Arabia, so far, the effort towards e-commerce development have not reached its originally stated aspirations;
neither what it sees as the world’s expectations of a country of the level of importance and weight in the
global economy like Saudi Arabia. The government support for e-commerce development seems to be
missing which represents a key for online retail growth in Saudi Arabia (AlGhamdi & Drew 2011and
AlGhamdi, Drew & Alkhalaf, 2011). Official/government information/documents about e-commerce in
Saudi Arabia are not sophisticated. The official discussion to introduce e-commerce in Saudi Arabia started
in 2001. In that year, Saudi Ministry of Commerce established a permanent technical committee for ecommerce including members from the Ministries of Commerce, Communication and Information
Technology and Finance. It also includes members from the Saudi Arabian Monetary Authority (SAMA) and
King Abdulaziz City for Science and Technology (KACST) (Saudi Ministry of Commerce 2001). The roles
of this committee are to follow the developments in the field of e-commerce and take the necessary steps to
keep pace with them. However, this committee does no longer exist. The role of e-commerce supervision in
the country has been transferred to the Ministry of Communications and Information Technology since 2005.
So far, the efforts of e-commerce support by Ministry of ICT are hapless. A phone call made to Ministry of
ICT followed by e-mail on April 2011 seeking further information about e-commerce support and
development. The answer was that the Ministry of ICT in Saudi Arabia is still in its early stages of studying
e-commerce. Currently, they are conducting a survey on e-commerce in Saudi Arabia and a report may be
published in May/June 2011.
According to EUI (2010) report which assessed the quality of 70 countries’ ICT infrastructure and the
ability of their government, businesses and people to use ICT, Saudi Arabia ranked 52 in e-readiness. The
extent of Internet access in Saudi Arabia indicates its e-commerce readiness (Sait, Altawil, and Hussain
2004). The Internet was introduced in Saudi Arabia in 1997 (Alzoman 2002). Only King Abdulaziz City for
Science and Technology (KACST) provides Internet access; therefore, all Internet users in Saudi Arabia go
through KACST (Algedhi 2002; Saudi Internet 2007b). The Internet users increased from one million (5% of
the population) in 2001 to 11.2 million (41%) in 2010 (MCIT 2010). “Broadband subscriptions have grown
from 64,000 in 2005 to over 3.2 million at the end of Q3 2010” (MCIT 2010). However, broadband
subscriptions remain very low compared to the developed nations.
The Arab Advisor Group carried out an extensive survey in mid-2006, targeting Internet users in four
Arab countries (Saudi Arabia, UAE, Kuwait and Lebanon). The survey covered Internet usage and, ecommerce activities in these countries. While UAE ranked first in the rate of annual spending on e-commerce
per capita, Saudi Arabia ranked first in the overall money spent on e-commerce activities. As for the
prevalence of e-commerce activities among the population, UAE ranked first at 25.1%, Saudi Arabia second
at 14.3%, Kuwait third at 10.7% and Lebanon last at 1.6% (AAG 2008). A recent survey of Saudi Arabia’s
Internet users found that around 3.1 million Saudis have purchased online. Airline tickets and hotels
bookings take the largest percentage of these purchases (ACG 2009, AAG 2011). Although the youth are the
majority population of the six Gulf countries (GCC: KSA, UAE, Kuwait, Oman, Qatar and Bahrain),
increasingly using the latest technologies, online shopping remains under-developed, mainly because of “the
relatively low levels of internet usage and low credit card penetration” (ACG 2009). Approximately 45% of
GCC populations have purchased online.
Several studies have been conducted to discover the reasons behind the slow e-commerce developments
in the Arab world in general and Saudi Arabia in particular. The reasons were mainly involved ICT
infrastructure, trust and privacy issues, cultural issues, and the absence of clear regulations, legislation, rules
and procedures on how to protect the rights of all involved parties (Albadr 2003; Aladwani 2003; Al-Solbi
and Mayhew 2005; CITC 2006; Alfuraih 2008; Alraw; Sabry 2009 and Alghaith, Sanzogni and Sandhu,
2010). Although Saudi Arabia contributes to the efforts of UNCITRAL (United Nations Commission into
International Trade Laws) (Saudi Ministry of Commerce 2001), there is a need to have major development in
154
IADIS International Conference e-Commerce 2011
terms of e-commerce regulations, legislations and rules to protect the rights of all parties involved in ecommerce transactions (Albadr 2003; Al-Solbi and Mayhew 2005).
Other challenges involve the mailing system (Alfuraih 2008). Before Saudi Post was established in 2005,
individuals had no home addresses (Saudi Post 2008); therefore, to receive mail, individuals had to subscribe
to have a mailbox in the post office (Alfuraih 2008). In 2005, the postal delivery to homes and buildings was
approved by Saudi Post (Alfuraih 2008; Saudi Post 2008). While this service is still relatively new, Saudi
Arabia is very late in providing individual addresses. Problems with adopting this service might be the
citizens' lack of awareness of this service or the importance of mailboxes, their ignorance of the direct
addresses for their houses with numbers and streets names, or their mistrust of receiving their mail in this
way. Consequently, more efforts are needed to motivate the citizens owning house mailboxes and solve the
problems that they face.
At the end of 2010, Saudi Post launched an electronic mall, “the first online marketplace in Arabic and
English” (E-mall 2010), giving Saudi retailers the chance to sell their products online and benefit from cheap
delivery fees. In March 2011, e-mall administrators revealed that to date, there are 50 sellers, 50,000 buyers,
which is a 10% increase in buyers and sellers. 2,000 deals have taken place, totalling 2 million KSR, with the
preferred payment method being SADAD (Al-Mohamed 2011). It seems Saudi Post adopting online mall to
encourage more citizens subscribe in their services including having a home mailbox.
The culture of people to buy in Saudi Arabia is still a key factor influences retailers to adopt online sale
channel. The difficulty to attract customers buying online is the first answer that you get when you ask a
retail decision maker in Saudi Arabia why you do not adopt and use online retail channel. There is an
emphasis on this factor making it a key concept for deterring the diffusion of e-retail systems in Saudi Arabia
(AlGhamdi, Drew & Al-Ghaith 2011). However, the spending of online retailing in Saudi Arabia is growing.
Online retail sector size estimated to about SAR 3 billion (US$1= SAR 3.75). This figure represents 20% of
the total Electronic Trading in Saudi Arabia. The average value of what a customer pays for each online
purchase is about SAR400 (Hamid 2011). This spending of growing community of online customers vs the
slowness of retailers to introduce online sale channel in Saudi Arabia is an indicator that retailers in Saudi
Arabia are not realizing the importance of online retail yet.
Up to date, no single study has been founded studding customers behaviours, drivers and inhibitors to
purchase online from retailers in Saudi Arabia. As stated by retailers, the major concerns for them that the
customers’ behaviour to buy online is frustrated and that is what discourages them introducing online sales
channel (AlGhamdi, Drew & Al-Ghaith 2011). In contrast, Internet customers in Saudi Arabia are growing
and a number of their online spending goes overseas. For this reason, this research explores the factors
influencing Saudi customers’ decisions to purchase from online retailers in Saudi Arabia. The study, firstly,
used qualitative approach to explore the issues. The purpose of this paper is to follow up the qualitative study
in order to test the findings in a wider sample.
The qualitative study by AlGhamdi, Drew & AlFaraj (2011) established a list of factors that inhibit
customers to purchase online from an e-retailer in the KSA. These inhibitors are (1) lack of home mailbox,
(2) feeling uncomfortable paying online with a credit card, (3) do not know e-retailers in Saudi Arabia, (4)
lack of experience in buying online, (5) not having easy and fast access to the Internet, (6) lack of physical
inspection of a product, (7) personal information (name, mobile number, e-mail etc) privacy, (8) lack of clear
regulations and legislation for e-commerce in the KSA, (9) lack of the language understanding if the website
or part of it is in English, (10) not trusting e-retailers in Saudi Arabia. The qualitative study also established a
list of incentives that may encourage customers to purchase online from e-retailers in the KSA. These
enablers are (1) competitive prices, (2) owning a home mailbox, (3) easy access and fast speed of the
Internet, (4) provision of educational programs, (5) local banks make it easy to own a credit card, (6)
professional and easy to understand design of the e-retailer’s website, including showing complete
specifications with photos of the products, (7) existence of a physical shop besides the online shop (Brick and
click), (8) existence of online payment options other than credit cards, (9) existence of government support,
supervision and control. So, the purpose of this paper is to establish numerically the relative strengths of
these inhibiting and enabling factors.
155
ISBN: 978-972-8939-51-9 © 2011 IADIS
3. RESEARCH METHODOLOGY
The whole project studying online retail in Saudi Arabia is built on the combination of qualitative and
quantitative approaches. Qualitative study conducted first for exploration purpose and followed by
quantitative approach based on qualitative findings for testing purpose. This type of approach is called
exploratory mixed methods design (Creswell 2008, p. 561) which is done “to explore a phenomenon, and
then [collect] quantitative data to explain relationships found in the qualitative results” (Creswell 2008, p.
561). The mixed methods approach helps to provide an in-depth investigation of the research problem (Morse
2003; Johnson & Onwuegbuzie 2004; Greene 2007; Alise and Teddlie 2010; Feilzer 2010).
While the qualitative study was conducted in a separate research (AlGhamdi, Drew & AlFaraj 2011), the
focus of this paper is on quantitative analysis based on the qualitative findings. In the qualitative study
(AlGhamdi, Drew & AlFaraj 2011), interviews were conducted with 16 Saudi participants (eight males and
eight females) aged from 16 to 45 years. A qualitative content analysis was used to identify the factors that
positively and negatively influence customers’ decision to purchase from online retailers in Saudi Arabia.
In this paper, a questionnaire survey based on the qualitative study’s findings is used to gain more
information about the relative strengths of these factors (for the survey questionnaire, please contact the main
author). Typically a question that asks for information about the participant’s background and attributes
would provide a set of choices, plus an open answer (e.g., “other”) where the participant could insert
additional information if he or she wishes. The two key questions are “What factors inhibit or discourage you
from buying online from e-retailers in Saudi Arabia?” and “What would enable you to buy online from eretailers in Saudi Arabia?” The participants would be given a list of 11 options to select from for the former
question, and 10 options for the latter (in each case, the last option is “other reasons”). Respondents may
select as many of the available options as they wish, including the open answer. The survey questions are in
Arabic.
Two forms were distributed. Paper and online surveys were collected, with 50% for each form. The aim is
to collect answers from 700 participants which are still ongoing; however, up-to-date the total number of
participants reported in this paper reached 412. They were selected randomly with consideration to represent
50% of each gender, cover different age groups, and come from different cities in Saudi Arabia.
4. RESULTS AND DATA ANALYSIS
This section presents a summary and analysis of the responses collected to date from 412 participants. Male
respondents account for 50% of the sample, and female respondents 50%. Respondents aged 15-25 represent
27.2% of the sample, compared with 49.0% for those aged 26-35 and 23.8% for those aged 36 and over.
About 28.6% of the sample are residents of the capital city (Riyadh), compared with 26.0% for Jeddah,
11.7% for Al-Baha, 28.2% for residents of smaller cities, and the remaining 5.8% for residents of smaller
urban centres.
Table 1 reports our findings with respect to the relative importance of factors that inhibit Saudi customers
from making online purchases from Saudi e-retailers. In this table, the inhibitors are listed in the order in
which they are presented to the respondents. Figure 1 illustrates the same information, but with each
inhibitor being ranked according to its relative weight, from being most frequently selected to least.
Table 1. Inhibitors of online purchases by Saudi customers from Saudi vendors
Identifier
IN1
IN2
IN3
IN4
IN5
IN6
IN7
IN8
IN9
IN10
IN11
156
Inhibitor
Lack of experience in buying online
Not trusting e-retailers in Saudi Arabia
Not having easy and fast access to the Internet
Cannot inspect product, worry about quality
Lack of mailbox for home
Do not know e-retailers in Saudi Arabia
Not comfortable paying online using credit card
Do not understand if website (or part) is in English
No clear regulations & legislations for EC in KSA
Don't trust that personal info. will remain private
Others
Selected by % of respondents
40.8
38.6
7.3
58.0
31.8
38.6
27.7
20.9
53.4
44.7
6.1
Rank
4
5
10
1
7
6
8
9
2
3
11
IADIS International Conference e-Commerce 2011
Physical inspection
Regulations and legislation
Personal information privacy
Lack of experience
Not trusting e-retailers
Do not know e-retailers in KSA
Lack of home mailbox
Uncomfortable using credit card
Website language
60%
40%
20%
0%
Figure 1. Factors inhibiting online purchases by Saudi customers from Saudi e-retailers
From Table 1 and Figure 1, it can be seen clearly that the most serious inhibitors tend to be related to a
lack of trust and/or experience with online purchasing. For example, Inhibitor IN4 (Customers cannot
inspect product and worry about product quality) is ranked 1, being cited by 58.0% of the respondents.
Similarly, IN10 (Customers do not trust that their personal information, such as name, mobile phone number,
etc, will remain private) is selected by 44.7% of respondents (ranked 3). IN2 (Customers do not trust eretailers in Saudi Arabia) which refers directly to a lack of trust in Saudi e-retailers, is cited by 38.6% of
respondents (rank 5). In the same vein, 40.8% of the respondents indicate that lack of experience in buying
online (IN1) is a major inhibitor in their case (ranked 4), and 38.6% indicate that they don’t know Saudi eretailers well (IN6, ranked 6). It appears that in the minds of many Saudi customers, a lack of clear
government regulations and legislations on e-commerce may have been a key contributor to this general lack
of trust and experience: IN9 is chosen by 53.4% of respondents (ranked 2).
Interestingly, while a lack of a home mailbox (IN5, ranked 7) or being uncomfortable with using a credit
card to make online payments (IN7, ranked 8) may deter significant percentages of the people in the sample
(31.8% and 27.7%, respectively), numerically these are clearly less important than the trust/experience
issues. It is rather re-assuring to find that lack of a command of English (IN8) is a relatively minor issue
(20.9%, ranked 9). In view of recent IT infrastructure developments in Saudi Arabia it is not surprising that
lack of ready access to fast Internet connections (IN3) is largely a non-issue (7.3%, ranked 10).
Table 2 and Figure 2 present basic survey results with regard to factors that would tend to enable or
encourage customers to purchase online from Saudi e-retailers.
Table 2. Enablers of online purchases by Saudi customers from Saudi vendors
Identifier
EN1
EN2
EN3
EN4
EN5
EN6
EN7
EN8
EN9
EN10
Enabler
Owning house mailbox
Easy access & fast Internet speed
Competitive prices
Local banks make owning credit cards easier
Provision of educational programs
Government support, supervision & control
Well-designed retailer websites (photos of products)
Physical shop as well as online shop
Trustworthy payment options other than credit cards
Others
80%
60%
40%
20%
0%
Selected by % of respondents
37
33
57
21
29
58
37
65
45
7
Rank
5
7
3
9
8
2
6
1
4
10
Brick and Click
Government support
Competitive prices
Online payment options
Owning home mailbox
Professional website design
Easy access and fast Internet
Educational programs
Easy of owning a credit card
Others
Figure 2. Factors facilitating online purchases by Saudi customers from Saudi e-retailers
157
ISBN: 978-972-8939-51-9 © 2011 IADIS
The top two enablers of Saudi online purchases are both measures with the potential to alleviate the
trust/experience issues identified above as key inhibitors: EN8 (the presence of a physical shop as well as an
online shopfront) is selected by 65% of the respondents (ranked 1) and EN6 (government support,
supervision and control of e-commerce) is selected by 58% (ranked 2). Similarly, EN5 (provision of
educational programs) is seen by 29% of respondents as an enabler (ranked 8).
Other enablers that can be readily anticipated by the above analysis of inhibitors are EN9 (development of
trustworthy and secure payment options other than credit cards) which is cited by 45% of the respondents
(ranked 4), EN4 (local banks making it easier for customers to own credit cards) which is selected by 21%
of the respondents (ranked 9), and EN1 (owning a home mailbox), chosen by 37 % (ranked 5).
A very important enabler (57%, ranked 3) that is not directly anticipated by the inhibitors analysis is EN3
(e-retailers being able to offer competitive prices). Similarly, EN7 (professional and easy-to-understand
retailer websites, including product photos and complete specifications) is seen by 37% of the respondents as
an enabler (ranked 6). Both of these results point to the type of features or attractions that Saudi e-retailers
will need to provide to succeed.
A result that seems slightly anomalous, given other existing information about Internet access in Saudi
Arabia, is that EN2 (easy access and fast Internet speed) is nominated as an enabler by a significant
percentage of the respondents (33%, ranked 7).
Delving more deeply into the details of the individual responses allows us to gain further insights into key
inhibitors of the demand for goods and services provided by the Saudi e-retail sector. Table 3 presents data
relating to the interactions between inhibitors and customer attributes.
Table 3. Inhibitors of purchases from Saudi e-retailers and attributes of potential Saudi customers
All respondent customers
Males
Females
Age 15-25
Age 26-35
Age 36 and over
Main city residents
Small city residents
Very small city residents
Have no mailbox
Mailbox at agency
House mailbox
Have credit card
No credit card
Home access to internet
No home access to Internet
Have bought online
Have not bought online
Bought online from KSA
Bought from foreigners only
Inhibitors and Attributes of Customers
Percentage of respondents selecting
% of
IN1
IN2
IN3
IN4
IN5
IN6
IN7
IN8
sample
100.0
40.8
38.6
7.3
58.0
31.8
38.6
27.7
20.9
50.0
33.0
43.2
7.8
51.0
32.5
41.3
28.2
16.5
50.0
48.5
34.0
6.8
65.0
31.1
35.9
27.2
25.2
27.2
50.0
44.6
8.9
58.9
34.8
42.0
24.1
27.7
49.0
34.7
37.6
7.9
56.9
32.2
38.6
24.3
17.3
23.8
42.9
33.7
4.1
59.2
27.6
34.7
38.8
20.4
66.0
37.9
36.0
4.4
59.2
27.2
38.2
29.0
17.3
28.2
46.6
48.3
13.8
56.9
43.1
38.8
25.0
27.6
5.8
45.8
20.8
8.3
50.0
29.2
41.7
25.0
29.2
49.5
51.5
34.3
6.9
55.9
40.7
35.3
23.5
22.5
37.4
30.5
42.2
8.4
59.7
27.9
40.9
29.2
18.8
13.1
29.6
44.4
5.6
61.1
9.3
44.4
38.9
20.4
42.0
23.1
43.9
6.4
53.8
28.3
42.2
31.2
12.7
57.3
54.2
35.2
8.1
61.9
34.7
36.4
25.4
27.1
90.3
40.9
38.7
3.5
58.6
30.4
38.2
27.2
21.0
9.7
40.0
37.5
42.5
52.5
45.0
42.5
32.5
20.0
41.5
15.2
45.0
7.0
48.5
25.1
43.9
23.4
12.9
58.5
58.9
34.0
7.5
64.7
36.5
34.9
29.9
26.6
14.1
24.1
36.2
3.4
56.9
19.0
39.7
27.6
22.4
27.4
10.6
49.6
8.8
44.2
28.3
46.0
23.0
8.0
IN9
IN10
53.4
64.1
42.7
48.2
56.9
52.0
53.7
55.2
41.7
47.1
64.3
46.3
66.5
44.5
54.6
42.5
63.2
46.5
55.2
67.3
44.7
46.6
42.7
42.9
46.0
43.9
42.3
49.1
50.0
45.1
45.5
40.7
49.7
41.5
44.4
47.5
45.6
44.0
41.4
47.8
Data presented in Table 3 suggest that despite recent efforts to encourage Saudi residents to acquire
mailboxes, many still have no access to mailboxes (49.5% of our sample) and only a small minority have
home mailboxes (13.1%). Inevitably this would have a negative influence on the feasibility of conducting eretail purchases. Another interesting statistic is that more than one-half (57.3%) of the respondents don’t
have a credit card. To some extent this is related to a cultural issue over the question of credit and interest
rates, and points to the desirability for alternative online payment arrangements that are secure and effective.
Our analysis thus far has been based on the entire sample of respondents. Additional useful insights can
be gained by focusing on a subset of this sample, namely the respondents who have already made some
online purchases in the past. As can be seen from Table 3, 41.5% of the participants report having done so.
There is a strong association between owning a credit card and having bought online: Of the 173 respondents
who own a credit card, 116 say that they have bought online, a much higher percentage (67.05%) than for the
sample as a whole.
158
IADIS International Conference e-Commerce 2011
Of the 171 respondents who have made online purchases, a majority have bought from overseas eretailers only: they represent 27.4% of the whole sample, compared with 14.1% for those who have bought
from vendors in Saudi Arabia (most, if not all, of the latter buyers have also bought from overseas vendors).
From interviews for the previous qualitative analysis and from follow-up enquiries as part of the current
analysis, it would appear that this (approximate) 2:1 imbalance is attributable largely to the reputation of
global online retailers such as Amazon.com, eBay, Dell, etc. and the major airlines and hotel operators.
Positive recommendations from relatives and friends tend to reinforce this pattern. In view of the above
discussion about trust issues, it is relevant to note that e-retailers that could follow eBay’s example and use
customer feedback to substantiate the seller’s trustworthiness would be able to alleviate Saudi buyers’
customary lack of trust. Similarly, the use of PayPal for online payments can help build customer trust,
because it acts as a third party between the seller and the buyer, thus helping to resolve problems that might
arise.
Examination of the bottom rows of Table 3 reveals interesting contrasts and similarities between
respondents with and without online purchase experiences. For example, it can be seen clearly that whilst
IN1 (lack of experience in buying online) is a major inhibitor to respondents who have not bought online (it
is selected by 59.0% of them, ranked 2) it is of little relevance to respondents who have done so, especially to
those who have bought from overseas vendors only (10.6%). Yet as far as the issues of trust in Saudi eretailers (IN2, IN4, IN6, and IN10) and the missing presence of government regulations and supervision
(IN9) the various categories of respondents give very similar ratings. These similarities serve to reinforce a
general conclusion that has emerged from our analysis: trust in Saudi e-retailers (or the lack of it) is probably
the most important factor affecting current and potential Saudi customers. From this, it is reasonable to draw
the implication that the government can play, if it so wishes, a key role in regulating, supervising, and
facilitating e-retail in Saudi Arabia. The critical question, then, becomes whether there are valid justifications
for the government to take such an interventionist role in normal commerce, as opposed to the cases of egovernment and e-learning which involve public services or “social” goods. Such a question must be left to
future research.
5. CONCLUSION
This paper has investigated the issues that positively and negatively influence customers to purchase from
online retailers in Saudi Arabia. The study comes up with a list of factors that influence the decision of Saudi
customers to purchase from online retailers in Saudi Arabia ranked according their rating. The main finding
of this study clearly demonstrates that the most serious inhibitor tend to be related to a lack of trust. It also
appears that in the minds of many Saudi customers, a lack of clear government regulations and legislations
on e-commerce may have been a key contributor to this general lack of trust and experience (chosen by
53.4% of respondents, ranked 2). On the other hand, the top two enablers of Saudi online purchases are both
measures with the potential to alleviate the trust/experience issues identified above as key inhibitors: EN8
(the presence of a physical shop as well as an online shopfront) is selected by 65% of the respondents (ranked
1) and EN6 (government support, supervision and control of e-commerce) is selected by 58% (ranked 2).
In conclusion, trust in Saudi e-retailers (or the lack of it) is probably the most important factor affecting
current and potential Saudi customers. From this, it is reasonable to draw the implication that the government
can play, if it so wishes, a key role in regulating, supervising, and facilitating e-retail in Saudi Arabia. The
critical question, then, becomes whether there are valid justifications for the government to take such an
interventionist role in normal commerce, as opposed to the cases of e-government and e-learning which
involve public services or “social” goods. Such a question must be left to future research.
This study is limited in terms of the sample size. However, the data collection still ongoing and by the end
of the study the sample is expected to reach 700 participants. This study is still in progress. We will, in due
course, be able to report all the factors that positively and negatively affect e-retailing growth in Saudi Arabia
and gaining the information from all involved parties (i.e. retailers, customers and government) in this field
in order to contribute to e-commerce development in general and the diffusion of online retailing in particular
in Saudi Arabia.
159
ISBN: 978-972-8939-51-9 © 2011 IADIS
REFERENCES
AAG (Arab Advisor Group) 2008, The volume of electronic commerce for individuals in Saudi Arabia and United Arab
Emirates, Kuwait, Lebanon Exceeded 4.87 billion U.S. dollars during the year 2007, Arab Advisor Group, viewed 22
Nov 2009, <http://www.arabadvisors.com/arabic/Pressers/presser-040208.htm>.
AAG (Arab Advisor Group) 2011, Saudi Arabia’s Internet users spent around US$ 3 billion in 2010 on buying products
and
services
through
e-commerce,
Arab
Advisor
Group,
viewed
1
April
2011,
<http://www.arabadvisors.com/Pressers/presser-170211.htm>.
ACG (Alpen Capital Group) 2009, GCC Retail Industry, Alpen Capital Group.
Aladwani, AM 2003, 'Key Internet characteristics and e-commerce issues in Arab countries', Information and
Management, vol. 16, no. 1, pp. 9-20.
Albadr, BH 2003, 'E-commerce', Science and Technology, no. 65, pp. 14-9
Alfuraih, S 2008, 'E-commerce and E-commerce Fraud in Saudi Arabia: A Case Study', in 2nd International Conference
on Information Security and Assurance Busan, Korea, pp. 176-80.
Algedhi, MA 2002, 'Internet filtering', Science and Technology, no. 64, pp. 46-50
Alghaith, W, Sanzogni, L, & Sandhu, K (2010). ‘Factors Influencing the Adoption and Usage of Online Services in Saudi
Arabia’, Electronic Journal of Information Systems in Developing Countries (EJISDC), vol. 40, no. 1, pp 1-32.
AlGhamdi, R & Drew, S 2011, 'Seven Key Drivers to Online Retailing in KSA', in P Kommers & P Isaías (eds),
Proceedings of the IADIS International Conference on e-Society 2011, Avila, Spain, pp. 237-44.
AlGhamdi, R, Drew, S & AlFaraj, O, 2011, ‘Issues influencing Saudi customers’ decisions to purchase from online
retailers in the KSA: a qualitative analysis’, European Journal of Scientific Research, vol. 55, no. 4, (in press).
AlGhamdi, R, Drew, S & Al-Ghaith, W, 2011, ‘Factors Influencing Retailers in Saudi Arabia to Adoption of Online
Sales Systems: a qualitative analysis’, Electronic Journal of Information System in Developing Countries (EJISDC),
vol. 47, no. 7, (in press).
AlGhamdi, R, Drew, S & Alkhalaf, S, 2011, ‘Government Initiatives: The Missing Key for E-commerce Growth in
KSA’, ICCBS 2011 (International Conference on e-Commerce, e-Business and e-Service), France, Paris, (in press).
Alise, MA & Teddlie, C 2010, 'A Continuation of the Paradigm Wars? Prevalence Rates of Methodological Approaches
Across the Social/Behavioral Sciences', Journal of Mixed Methods Research, vol. 4, no. 2, pp. 103-26.
Al-Mohamed, K 2011, Information about e-mall for research use, E-mail communication edn, Riyadh
Alrawi, KW & Sabry, KA 2009, 'E-commerce evolution: a Gulf region review', Int. J. Business Information Systems, vol.
4, no. 5, pp. 509-26.
Al-Solbi, A & Mayhew, PJ 2005, 'Measuring E-Readiness Assessment in Saudi Organisations Preliminary Results From
A Survey Study', in I Kushchu & MH Kuscu (eds), From e-government to m-government, Mobile Government
Consortium International LLC, Brighton, UK, pp. 467-75.
Al-Tawil, K, Sait, S & Hussain, S 2003, 'Use and Effect of Internet in Saudi Arabia', in the 6th World Multi-Conference
on Systemic, Cybernetics and Informatics, Orlamdo, Florida, USA
Alzoman, AA 2002 a, Internet Guid book King Abdulaziz City for Science and Technology: Internet Services Unit,
Riyadh
Chaffey, D 2004, E-Business and E-Commerce Management 2edn, Pearson Education Limited, Harlow
CIA (Central Inelegance Agency) 2009, The World Fact Book: Saudi Arabia, viewed 20 Oct 2010,
<https://www.cia.gov/library/publications/the-world-factbook/geos/sa.html>.
CITC (Communications and Information Technology Commission) 2006, Marketplace of Telecommunications and
Information Technology in KSA Communications and Information Technology Commission, Riyadh
CITC (Communications and Information Technology Commission) 2007, Internet Usage Study in the Kingdom of Saudi
Arabia Communications and Information Technology Commission, Riyadh
Creswell, JW 2008, 'Mixed Methods Designs', in Educational Research: Planning, Conducting, And Evaluating
Quantitative And Qualitative Research, 3rd edn, Pearson Education, New Jersey, pp. 551-75.
EIU (Economist Intelligence Unit) 2010, Digital economy rankings 2010: Beyond e-readiness, The Economist
Intelligence Unit.
E-Mall 2010, About E-mall, viewed 2 April 2011, <http://www.e-mall.com.sa/English/Pages/AboutUs.aspx>.
Feilzer, MY 2010, 'Doing Mixed Methods Research Pragmatically: Implications for the Rediscovery of Pragmatism as a
Research Paradigm', Journal of Mixed Methods Research, vol. 4, no. 1, pp. 6-16.
Gibbs, J, Kraemer, KL & Dedrick, J 2003, 'Environment and policy factors shaping global e-commerce diffusion: A
cross-country comparison', The Information Society, vol. 19, no. 1, pp. 5-18.
160
IADIS International Conference e-Commerce 2011
Global Technology Forum 2007, South Korea: Overview of e-commerce, Economist Intelligence Unit, viewed 1 Jun
2011,
<http://www.ebusinessforum.com/index.asp?layout=rich_story&doc_id=11157&title=South+Korea%3A+Overview+
of+e-commerce&categoryid=30&channelid=4>.
Greene, JC 2007, Mixed methods in social inquiry, Jossey Bass, San Francisco.
Hamid, M 2011, Souq.com is dedicating e-commerce techniques, Arabian Business, viewed 1 Jun 2011,
<http://www.arabianbusiness.com/arabic/602742?start=1>.
Johnson, RB & Onwuegbuzie, AJ 2004, 'Mixed Methods Research: A Research Paradigm Whose Time Has Come',
Educational Researcher, vol. 33, no. 7, pp. 14-26.
Kamaruzaman, KN, Handrich, YM & Sullivan, F 2010, 'e-Commerce Adoption in Malaysia: Trends, Issues and
Opportunities', in R Ramasamy & S Ng (eds), ICT Strategic Review 2010/11 E-commerce for Global Reach PIKOM
(The National ICT Association of Malaysia), Putrajaya, Malaysia, pp. 89-134.
Kraemer, KL, Dedrick, J, Melville, N & Zhu, K 2006, Global e-commerce: impacts of national environment and policy,
Cambridge Univ Press, New York.
Laudon, KC & Traver, CG 2007, E-commerce: business, technology, society, 3 edn, Pearson Prentice Hall, New Jersey.
MCIT (Saudi Ministry of Communication and Information Technology) 2010, ICT indicators in K.S.A (Q3-2010),
viewed 1 April 2011, <http://www.mcit.gov.sa/english/Development/SectorIndices/>.
Morse, JM 2003, 'Principles of Mixed Methods and Multimethod Research', in A Tashakkori & C Teddlie (eds),
Handbook of Mixed Methods in Social and Behavioral Research, Sage Publications, Thousand Oaks, California, pp.
189-208.
Nair, M 2010, 'The E-commerce Ecology: Leapfrogging Strategies for Malaysia', in R Ramasamy & S Ng (eds), ICT
Strategic Review 2010/11 E-commerce for Global Reach PIKOM (The National ICT Association of Malaysia),
Putrajaya, Malaysia, pp. 89-134.
Nielsen 2008, Trends in Online Shopping A Global Nielsen Consumer Report, New York.
Sait, SM, Al-Tawil, KM & Hussain, SA 2004, 'E-commerce in Saudi Arabia: Adoption and Perspectives', Australasian
Journal of Information Systems, vol. 12, no. 1, pp. 54-74.
Saudi Internet 2007 b, Content filtering in Saudi Arabia, Communications and Information Technology Commission,
viewed
20
Nov
2009,
<http://www.internet.gov.sa/learn-the-web/guides/content-filtering-in-saudiarabia/view?set_language=en>.
Saudi Ministry of Commerce 2001, E-commerce in the kingdom: Breakthrough for the future, Saudi Ministry of
Commerce, Riyadh.
Saudi Post 2008, Saudi Post: Establishment and Development, Saudi Post, viewed 21 Nov 2009,
<http://www.sp.com.sa/Arabic/SaudiPost/aboutus/Pages/establishmentanddevelopment.aspx>.
To, ML & Ngai, E 2006, 'Predicting the organisational adoption of B2C e-commerce: an empirical study', Industrial
Management & Data Systems, vol. 106, no. 8, pp. 1133-47.
U.S. Department of Commerce 2008, Doing Business In Saudi Arabia: A Country Commercial Guide for U.S.
Companies, U.S. & Foreign Commercial Service and U.S. Department of State.
Whiteley, D 2000, E-commerce: strategies, technologies and applications, The McGRAW-Hill publishing company,
London.
161
Short Papers
IADIS International Conference e-Commerce 2011
THE DETERMINANTS OF ONLINE HOTEL
RESERVATION
Hulisi Öğüt
Department of Business Administration,
TOBB University of Economics and Technology, Ankara, Turkey
ABSTRACT
In this paper, we identify the determinant of online hotel reservation using data from one of the biggest online hotel
booking website. We find that online customer rating significantly affects the hotel reservation while the star rating does
not increase popularity of the hotels. Furthermore, increase in prices leads to decrease in sales as we expected. Regression
result allows us to quantify the relationship between these variables and online reservation as well. The managerial
implication of these results is that hotels should strive to please customer as their future revenue depends on the
satisfaction of past users. This study also guides hotel management to forecast their sales based on online rating and other
features of hotel.
KEYWORDS
Internet Customer Reviews and Ratings; Online Hotel Booking; Online Hotel Price; Service Quality Metrics
1. INTRODUCTION
Consumers increasingly use e-commerce sites for purchasing many products and services and internet
becomes preferred sales channel for many industries. Travel industry is one of the first and successful
industries to use Internet for this purpose and studies show that online travel sales keep growing. With a 16%
share, hotel accommodation is the second largest sales item after air travel among online travel sales and
revenue generated through online hotel booking increases (Marcussen 2007). Recent studies show that travel
reviews are increasingly becoming an important factor in hotel selection by travelers. As indicated by Milan
(2007), millions of travelers log on daily to Travel websites like Tripadvisor.com and experience web content
through hotel generated photos, written text and hotel reviews by past customers. Milan (2007) indicates that
84% of people visiting a Travel website hosting consumer generated content have their hotel choices affected
by what they see and online hotel shoppers find reviews and hotel and room photos much more convincing
than other features of hotels.
The studies mentioned above show that online hotel shopping and online reviews are becoming
increasingly important for both hotel consumers and hotel management. However, researcher analyzed the
different aspect of online reviews in particular sectors, the impact of online reviews are not fully explored in
online hotel booking setting. One exception to this is the study of Öğüt and Taş (2011). In their paper, they
modeled and estimated the effect of online customer rating and other features of hotel on the demand and
price of hotel rooms. However, one of the limitations of their study is the unavailability of hotel reservation
data. For this purpose, they use the number of reviews as a proxy for sales data. Thus, the validity of the price
elasticity and other coefficient of their model in their study are subject to further verification since coefficient
calculation are not based on real sales data. Recently, this website publishes the online booking data in real
data in the form of last reserved booking hotels in real time. Thus, we collected these data and investigate
how online review and other features of hotels affects the hotel’s online reservation based on real sales data
in this paper. By controlling hotel star, our analysis shows that hotels increase (decrease) their sales if they
have higher (lower) online review scores. However, increase in star rating does not increase the online
booking of hotels. We also find that price increase leads to decreases in sales as it is expected. Regression
result allows us to quantify the relationship between these variables and sales data as well. We also compare
165
ISBN: 978-972-8939-51-9 © 2011 IADIS
the research of Öğüt and Taş (2011) and our paper and find that the use of the number of reviews as a proxy
for sales data overestimate the coefficient of customer rating and elasticity of prices
The remainder of the paper is organized as following. In section 2, relevant studies in hotels and online
customer reviews literatures are summarized. We describe our data in Section 3 and model is analyzed in
Section 4. The paper is concluded in Section 5.
2. LITERATURE REVIEW
Online reviews are extensively studied in many of the e-commerce application and the results of these papers
find that information asymmetry between seller and buyer has been mitigated by online customer reviews.
This observation is valid especially for experience goods as their assessment of quality are difficult prior to
purchase. Among these studies, Chevaliear and Mayzlin (2006) examine the effect of consumer reviews on
relative sales of books on Amazon.com and BarnesandNoble.com and they show that customer
communication on the internet has an important impact on customer behavior. They find that an
improvement in a book's reviews leads to an increase in relative sales at that site. Duan et al. (2008) and Liu
(2006) find that sales performance and review volume in the movie industry are positive correlated. Pavlou
and Dimoka(2006) show that seller who received higher rating can sell their product with a higher price in
the online auction sites.
Recently, researchers investigate the impact of online reviews on consumer’s hotel selection decision.
Among them, Vermeulen and Seeger (2009) conduct an experimental study and conclude that exposure to
online reviews increases hotel consideration in consumers. By using survey methodology, Dickinger and
Mazanec (2008) show that recommendations of friends and online reviews are the most two important
drivers of online hotel booking. Our paper is different from these papers in two respects. First, while these
researches analyze mainly how customer’s hotel selection decision is affected by online reviews, we quantify
the impact of online reviews on the sales of hotel rooms. Another difference is that while other two studies
use experimental and survey data, we used real historic data extracted from an online hotel booking website
in real time.
3. BACKGROUND
The price of hotel is one of the most important criteria for the selection of hotels as it represents the actual
cost to customer. This is especially true when two hotels have the same features except their price. Thus, we
expected that the low price is preferred high price if everything is being equal. Consequently, we hypothesize
that
H1: All else being constant, hotels with higher price have lower sales.
The offering of hotels to the customer can be classified as service delivery. Some of the characteristic of
service delivery are that customer contact is high, output is intangible and evaluation of the service can be
done only after delivery of service (Stevenson, 2007). Thus, customer takes into account many features of the
hotel in order to decreases risk of hotel decision. As the most frequently mentioned quality features, star
rating of the hotel plays important role in the customer decision and studies show that every one out of two
customer consider star the most important attribute in the selection process (Callan, 1998). Therefore, we
expect that
H2: All else being constant, hotels with higher star have higher sales.
However, star attribute did not measure some subjective quality dimensions such as how nice hotel staff,
cleanness of hotel room and value for money. For this reason, most people choose hotels based on
recommendation of friend and earlier studies shows that word of mouth is one of the important factors in
hotel selection process (Dickinger and Mazanec 2008). Online reviews is considered as the counterpart of the
word of mouth in the cyber world and recent studies found that online reviews play important role in the
customer decision process (Dickinger and Mazanec 2008, Vermeulen and Seeger 2009). As a quality
measure, online reviews complement star features and higher online reviews can increases popularity of the
hotel. For these reasons, we expect that hotels with higher online reviews charge premium over other hotels
and we hypothesize that,
166
IADIS International Conference e-Commerce 2011
H3: All else being equal, hotels with higher online rating score have higher sales.
4. DATA
Our data come from is one of the biggest online hotel booking sites. After customers enter the location,
check-in and check-out date, available hotels are listed in this website. In these listing, it is possible to obtain
information about price, star, address, map and average customer review score of the hotels. If specific
hotel’s web site is clicked, customer can get further information about pictures, facilities, hotel policies and
individual review scores and comments of previous customers. Individual review score is calculated in the
following way. First, customers rate hotel quality in terms of hotel staff, services/facilities, cleanness of hotel
room, comfort and value for money. The score in these dimensions can be poor, fair, good or excellent and
counts for 1, 2, 3 and 4 points respectively. All these points are added and divided by 2 for the final
individual score. Information about hotels’ region in Paris and London is obtained from web site’s
classification. Since some hotels do not have price for single room, we used the price of standard double
room as the dependent variable. Data collection period lasts almost two and a half months in 2010. Table I
shows the descriptive statistics of the variables used in our study.
Table 1. Descriptive Statistics.
Mean
Median
Minimum
Maximum
Standard
Deviation
Number of
Observation
Paris
Number of Hotel
Booking
182.32
131
1
1331
167.01
970
Room Price Per Night
150.5
139
43
600
63.039
970
Hotel Star
2.8876
3
1
5
0.76207
970
Number of Rooms
58.508
39
9
1025
82.649
970
Customer Rating
7.5174
7.6
5.3
9.4
0.68947
970
London
Number of Hotel
Booking
268.44
174
6
5114
341.19
668
Room Price Per Night
116.97
99.99
38
581.62
59.289
668
Hotel Star
3.0853
3
0
5
1.2367
668
Number of Rooms
103.85
54
3
1054
132.95
668
Customer Rating
7.2921
7.4
4.2
9.3
0.95144
668
5. EMPRICAL MODELS AND ESTIMATION RESULTS
We used following model to find the relationship between the demand for hotels and their components:
N-1
ln(Sales)i = β0+β11ln(Price)i +β21Customer Ratingi + β31Star+
∑βk,DRegionDummyi +εi (1)
i β41ln(Size)+
i
k=1
We use log transformation of sales and price rather than sales and price levels for two reasons. First, it is
possible for us to compute elasticity of independent variables with respect to sales per room. Second, when
we use log transformation of sales and price, the relationship is closer to linear. Since we expect that hotels
with higher number of rooms have higher number of sales, we control size effect by including the number of
hotel room as an independent variable.
167
ISBN: 978-972-8939-51-9 © 2011 IADIS
Table 2. The regression result of the determinants of online hotel reservations in London.
Explanatory
Variable
constant
(1)
(2)
(3)
(4)
8.857**
(0.3598)
-1.189**
(0.08484)
8.732**
(0.3595)
-1.391**
(0.1054)
0.1586**
(0.04970)
0.4314**
(0.03704)
0.4090**
(0.03745)
8.836**
(0.4549)
-1.417**
(0.1249)
0.1552**
(0.05056)
0.01626
(0.04351)
0.4058**
(0.03841)
Number of
Observation
668
668
668
9.643**
(0.5555)
-1.5953**
(0.1361)
0.2224**
(0.05253)
0.02347
(0.04441)
0.4237**
(0.04000)
15 out of 42
dummies are
significant
668
Adjusted R2
0.2599
0.2700
0.2690
0.3131
log(Price)
Rating
Star
log(Rooms)
Regional
Dummies
Table 3. The regression result of the determinant of online hotel reservations in Paris.
Explanatory
Variable
Constant
log(Price)
(1)
(2)
(3)
(4)
7.326**
(0.3823)
-0.7583**
(0.07396)
6.813**
(0.3944)
-1.001**
(0.09020)
5.717**
(0.5103)
-0.7060**
(0.1256)
6.2055**
(0.5707)
-0.7145**
(0.1377)
0.2329**
(0.05055)
0.2418**
(0.05035)
0.2357**
(0.0516)
0.3175**
(0.04463)
-0.2051**
(0.06104)
0.3611**
(0.04624)
-0.2076**
(0.06198)
0.3386**
(0.04843)
Rating
Star
log(Size)
0.3277**
(0.04503)
Regional
Dummies
Number of
Observation
971
971
971
10 out of 20
dummies are
significant
971
Adjusted R2
0.1249
0.1428
0.1518
0.1708
We estimate the coefficients of the regression equation using OLS and Table II and III display the
regression results of equation (1) when the dependent variable is the demand for London and Paris hotels
respectively. Robust standard errors are displayed in parentheses below the coefficient estimates. One star
next to the standard errors denotes that the coefficient is significant at 5%. Two stars denote that the
coefficient is significant at 1%.
The significance of the coefficient of price variable tests the hypothesis 1. Table II and III show that, for
all of the regression specifications with different sets of explanatory variables, the coefficient of price
variable is significant at 1% and the sign of the coefficient is negative. The coefficient of price variable can
be interpreted as price elasticity as both the dependent variable(sales) and independent variable is in the log
168
IADIS International Conference e-Commerce 2011
form. For this reason, 1% increase in the price level decreases the sales ranging from 1.18% to 1.59% in
London and ranging from 1.18% to 1.59% in Paris. Thus, the regression results validate our first hypothesis
by showing that as the price of the hotel increases, the sales of that hotel decreases.
We have also found that the coefficient of star rating is not statistically different than zero for London
hotels while the coefficient of star rating is significant at 1% significance level with a negative sign for Paris
hotels. Thus, increase in the star rating does not increase the sales of hotel rooms even after price variable is
controlled. For this reason, our second hypothesis is not supported.
Our third hypothesis asks the question of “Does increase in review scores increase the sales of hotel
rooms?” In order to confirm this hypothesis, we have to find that the coefficient of online customer rating
should be significant and sign of the coefficient should be positive. As our regression results show, our third
hypothesis for both London and Paris hotels are also supported.
6. CONCLUSION
In this paper, we collected online booking data and investigate how online review and other features of hotels
affects the hotel’s online reservation based on real sales data in this paper. By controlling hotel star price and
location information, our analysis shows that hotels increase (decrease) their sales if they have higher (lower)
online review scores. However, increase in star rating does not increase the online booking of hotels.
Furthermore, increase in price leads to decreases in online reservation. We also quantify the relationship
between independent variables (price, customer rating and star) and dependent variable (sales data) using
OLS regression method. In addition, we compare the study of Öğüt and Taş (2011) and our paper and find
that the use of the number of reviews rather than real sales data overestimate the coefficient of customer
rating and elasticity of price. The managerial implication of these results is that hotels should strive to please
customer as their future revenue depends on the satisfaction of past users. This study also guides hotel
management to forecast their sales based on online rating, price and other features of hotel.
REFERENCES
Callan R.(1998).Attributional Analysis of Customer’s hotel Selection Criteria by U.K. Grading Scheme Theories.
Journal of Travel Reseach, 36(3), 20-34.
Chevalier, J. A., & Mayzlin, D. (2006). The effect of word of mouth on sales: online book reviews. Journal of Marketing
Research, 43(3), 345–354.
Dickinger, A. & Mazanec, J. (2008): Consumers’ Preferred Criteria for Hotel Online Booking. In: Information and
Communication Technologies in Tourism, O’Connor, Höpken, Gretzel (Eds.), 244-254.
Duan, W., Gu B. & Whinston A.B. (2008). Do online reviews matter? — An empirical investigation of panel data,
Decision Support Systems, 45 (4), 1007-1016.
Liu, Y. (2006). Word-of-mouth for movies: Its dynamics and impact on box office receipts?, Journal of Marketing,
70(3), 74–89.
Marcussen C. (2008), Trends in European Internet Distribution - of Travel and Tourism Services. <
http://www.crt.dk/UK/staff/chm/trends.htm >. Accessed 23.01.2011.
Milan, R. (2007), Travel reviews - consumers are changing your brand and reputation online.
<http://www.travelindustrywire.com/article29359>. Accessed 23.01.2011.
Öğüt, H. & Taş B.K.O. (2011). The Influence of Internet Customer Reviews on the Online Sales and Prices in Hotel
Industry,Service Industries Journal, in press.
Pavlou, P. A. & Dimoka A. (2006). The Nature and Role of Feedback Text Comments in Online Marketplaces:
Implications for Trust Building, Price Premiums, and Seller Differentiation. Information Systems Research, 17(4),
391-412.
Stefansky W. (1972). Rejecting Outliers in Factorial Designs, Technometrics, 14, 469-479.
Stevenson W. J.(2007). Operations Management(9th edition). McGraw-Hill.
Vermeulen, I. E. & Seegers D.(2009). Tried and tested: The impact of online hotel reviews on consumer consideration.
Tourism Management, 30, 23-127.
169
ISBN: 978-972-8939-51-9 © 2011 IADIS
CONSUMER BEHAVIORS IN REVENUE MANAGEMENT
W.R.T AUCTION THEORY
Mariam Shafqat1 and Zeeshan Khawar Malik2
1
MBIT - Final Year
Assistant Professor
Institute of Business & Information Technology
University of the Punjab, Lahore, Pakistan
2
ABSTRACT
In this research, the effects of consumer behaviors, are implied on the auction business model for the optimal utilization
of revenues and ultimately to seeks consumer satisfaction. The research identifies the significant factors that pose a strong
impact on the auction mechanism and thus increases the consumer satisfaction. With the advancement of technology and
infrastructure, the Online Auction plays an important role in the terms of diversity of auctioning services, pricing
strategies and defining bidding rules. The research is descriptive in nature as various statistical analyses were performed
to study the effects of consumer behaviors in terms of managing their revenues effectively. The research also highlights
the current scenario of auctioning mechanism in the public and private companies indicating the growth rate of the
auction business. There are several Online Auction Portals providing C2C and B2B business opportunities to conduct eauctions. However these portals need effective improvement in terms of security and overall mechanism. Online auction
model is an effective strategy to rejuvenate the current scenario of Auction Business trends in the market.
KEYWORDS
Auction, Consumer Behaviors, Revenue Management, Bidding, Procurement, PPRA
1. INTRODUCTION
Consumer theory invokes the study of human behaviors in term of psychological and economical patterns
that drives the demand in the market. The Consumer behavior models seeks to identity the variables that
effects the decision making in terms of pricing, purchasing power, personal preferences and various
psychological needs. In the recent years, Business analysts have formulate the techniques to channelize the
consumer behavior models to forecast the market trends in order to improve the decision capabilities to set
the prices and as well as managing the revenues. Researchers go beyond the traditional theories and analysis
to seek out the variables that are difficult to measure such as heuristic as of cognitive biases as well as market
inefficiencies as the non traditional forms of behaviors. In the modern era, online auctioning has become
more widespread than ever. This generates even more exciting challenges for the researchers to understand
the consumer behaviors in auction markets. Auction theory is rich in modeling bidding and seller behaviors
in terms of revenue management. Online auctioning sites such as “Ebay, Amazon, eBid, UBid, CQ, Google
GBuy, Adword, Bidder Network, USAuctions” etc. are some of the examples of market leaders in electronic
auctioning. Auctioning sites such as “Ebay” allows customer to choose between two different methods of
bidding i.e. Single Item Auction shares both characteristic of English Auctions and a hybrid combination of
First Price and Second Price Bid Auctions.
1.1 Procurement System in Pakistan
Auction falls under the category of procurement process. Procurement system is an electronic system refers
to e-procurement, is used to manage purchasing and selling activities of the business backed by ERP system
or accountancy software. The main objective of procurement system is the advance planning and scheduling
for buying/selling of goods and services in a cost effective way. Similarly an online procurement is the
170
IADIS International Conference e-Commerce 2011
platform for buyers to access the supplier’s offerings. For many years before the advent of the standardized
procedures and regulations for procurement, there was no check and balance for providing these services in
the public sector. As a result “PPRA” Ordinance was passed by the Govt. in 2002, and formed Public
Procurement Authority in 2004 to regulate the procedure of tendering system in Pakistan. The aim for
developing such system was to introduce the standardize procedures, rules for biding and a transparent
procurement system for the public sector organizations. These rules are applied to all procurement agencies
at federal and providential level. “PPRA” provides the services of managing, improving, governing,
transparency, accountability and quality system for public procurement. “PPRA” has the set of pre-defined
set of rules and regulations for the effective bidding mechanism for both tendering and auctioning of the
goods and services in Public sector.
Figure1. Conventional Mechanism of Auction System in Public Sector of Pakistan
1.2 Internet Auctions
Besides the manual system of auctioning in Pakistan, there are some online portals based upon B2B, B2C
and C2C business models. The web portals like “PakistanAuctions, Neelamghar.pk, Bidspk.com,
TenderServiceOnline.com, hafeezcenter.pk, cmall.com, Apnicari.com, and ShopHive” etc. are some of the
current existing examples in Pakistan. However, despite the presence on online auction, there is low % of
participants available on these systems. This is due to negative impression on the security and transparency
of the system, neither these portals provide the proper bidding rules/strategies. Online auction technology
provides several benefits as compared to the traditional auction. Internet auctions provide convenience to
break free from geographical boundaries to place their bids electronically.
The portal doesn’t only provide the flexibility to the buyer, but it also facilitates the seller, as it will be a
lot easier to find the potential buyers. The major problem is regarding the security of the online portal, since
currently the websites are not secured enough for the bidders to place their bids. The websites doesn’t
facilitate the participants to pay for the bidding items; instead the dialog box appears to contact the seller/
buyer via message. However users have negative impression on such websites as there are heavily chances of
frauds, so usually hesitate to provide their personal information on the websites regarding their credit card
information. Evidentially this is a fact that internet frauds are a common practice especially in Pakistan.
However, to mitigate such frauds; websites do subscribe third party services.
2. HYPOTHESIS
H0: There is no relationship between the variables i.e. consumer behavior, revenue management and
consumer satisfaction.
171
ISBN: 978-972-8939-51-9 © 2011 IADIS
H1: Modeling Consumer Behaviors in Auction theory will help managing revenues effectively and thus
leads to consumer satisfaction.
The main purpose of the research is to identify the key factors that affect consumer behaviors while
managing their revenues in an auction platform. Consumer behaviors play important role to identity key
elements to manage the revenues effectively while keeping the high satisfaction in an e-auction business
model. Despite the advancement of technologies and infrastructure, the auction business lacks attention and
awareness to improve the current system. There is the huge investment opportunity to the investors to
provide effective online portals to flourish trade activities in the country such as e-Bay and Amazon. So, the
research techniques and methodologies are designed and structured in a way to seek the objectivity of the
hypothesis.
3. LITERATURE REVIEW
Traditionally, auction has been used a B2B medium for selling of old scrap in the public sector, now-a-days,
B2C trend has diversified the auctioning model and trend of selling products in the consumer market.
However electronic exchanges and advancement of information technology has revived the trend of trading
items (Bajri, Hortascsu, Ghose, & Telang, 2004). Sometimes, it may happen that consumers may resale their
products rapidly with the best researched prices either at the highest prices or the best least price (Halstead &
Becherer, 2003). There is a huge impact of one resale of goods on the selling of secondary items. That is
why in US, annual sales through reselling of items have been doubled as compared to traditional selling of
items. (Dykema &hermann, 1999). Past researches have shown that consumer resale behavior may found in
different phases, it may be termed as consumer disposition behavior (Hanson & Harrlyland, 1980). However
various studies struggle to prove the true measures of auction items, whereas, in the recent researchers has
emphasized on the literature of the online auctioned items. (Ariely & Simonson, 2003). In 1982, researchers
formulated a general model in which each bidders response acts as a confidential signal to some specific
object’s value, i.e. it may be in the form of some appraisal, that may be accessible to the seller but not for the
respective bidders. (Milegrom & Weber, 1982).
Internet auction has provoked the new dimensions to review the bidding mechanism and how customers
behave in the particular bidding strategies. Amazon and e-Bay offers the customer the second price auctions
where bidders submit their reservation price and the maximum price to bid for them by proxy. The trend of
trading products using second price auction has lead rise to a tremendous growth in the revenues of
auctioneers from the last minute bidding snipping. (Roth & Ockenfels, 2000). The transaction cost, pricing
etc. effects consumer’s motives in buying and selling products from internet via auction. The interactive
bidding behaviors of the consumers are often determinants of their perceptions and attitudes toward the
products. (Lai, Shih, Chiang, & Chen, 2010). The implementation of secured online auction application
requires the system to be backed by an ERP system, which a secured authenticated user access, software
applications to make the system effective. Various auction methods should be placed to promote the online
auctioning of products and services. (Kumar & Fledman, Internet Auctions).
4. RESEARCH METHODOLOGY
The purpose of the research is to determine the consumer behavior
patterns in managing the revenues with respect to auction theory.
Since auctioning is maintained at micro level in Pakistan, there is
no as such platform for electronic auctioning. Reason thereby is
the lack of standardize system with proper platform for customer
to engage in such activity neither the available systems are secured
enough for the consumers to take an effective decision that helps
in optimizing their revenues. In relevance to such problems this
research is conducted to gather the relevant pool of data for further
analysis. The research methodology is descriptive in nature so data
is collected via Questionnaire technique, Survey will be conducted
172
Figure 2. Sample Segmentation
IADIS International Conference e-Commerce 2011
from the targeted audience that includes people from different private & public sector organizations and
consumers of auction system. This research is based upon cross sectional studies, due to the time constraint
this is method is selected. The unit of analysis for designing the survey questionnaire was segmented in two
sets i.e. the middle level managers from the purchase or procurement department of the organization and the
consumers. One is the service provider and other is user of the auction system. The data was collected in a
conventional way and with the use of online survey tool i.e. “Questionpro.com”. In the convectional way; the
Questionnaire was personally handed over to the respondents, as the speed of data collection is moderate and
respondents can fill out without any ambiguity. Close ended questions are mostly selected. The segmentation
is as follows in the figure
5. RESEARCH FINDING
The research finding illustrates the data being statistically tested for the significance of the hypothesis;
various tests were applied to measure the significance, in order to find the significance between the
relationships the Pearson Correlation test was applied. The results with statistical evidence will signify the
hypothesis and the interpretation to support the association of relations. The hypothesis is based upon trivariate as the main objective of the hypothesis is to determine the relationship among three variables i.e.
consumer behaviors, revenue management, and consumer satisfaction. H0= r =0.00: There is no relationship,
association and magnitude among the variables i.e. Consumer Behaviors, Revenue Management and
Consumer Satisfaction.H1 ≠ r = 0.00: There exists a positive relationship among the variables i.e. Consumer
Behaviors, Revenue Management and Consumer Satisfaction. With the increase impact of Consumer
behaviors the revenue management increase and thus Consumer Satisfaction increases as well.
Figure 3. Correlation Matrix
Figure 4. Scatter Plotting
The above correlation matrix shows that there is strong positive relationship between CB and RM by
+.480 correlation, weak positive relationship between RM and CS by +.311correlation and very weak
positive relationship between CB and CS by +.198correlation among variables significant at 0.01 level. This
shows the dependency pattern among the variables CB>RM>CS as shown below:
CB has a strong impact on RM as compared to CS
RM has strong impact on CS as compared to CB
CB and CS are less likely poses an impact on each other
6. CONCLUSION
Online auction is one of the industry’s business models that are widely represented via online portal. With the
advancement in the technology and infrastructure, auction business is revived and various initiatives are
already taken to improve the current scenario. The slight modification in the auction business rules has a
strong impact on the consumer behaviors and thus in the expected revenues and overall satisfaction of the
consumers. Therefore business logics should be designed in accordance consumer behavior patterns for
attaining the optimum revenues at both sides (seller and bidder).
173
ISBN: 978-972-8939-51-9 © 2011 IADIS
Figure 5. Current e-Auction Mechanism
Figure 6. Business Integration
Figure 7. Recommended Model
The effective auction business model should be constructed in such a way that it reduces the gap between
seller and buyers on a single platform linked by networks of suppliers and retailers, secured by ESCROW
services, engaged with TCS services for tracking and for authenticity website should be linked with NADRA
(detecting NIC from DB) and PTA (detecting mobile numbers) to provide regulatory assistance. For the ease
of services, Consumers participated in online portals should be provided with the support applications on
their mobile sets such as ibid an application developed by “Mobilink” for its Blackberry users. The
awareness of such portals should be created in order to get a better response from the consumers.
The Reverse auction is very favorable business strategy in the industry, various telecommunication
companies such as “Mobilink”, Telenor and even Radio one “fm91” has used such strategy to earn revenues.
This strategy should be adopted on the online auction business model, both seller and website upon agreed
ratio can earn commission and generating more pool of customers. This highlights that, consumer behaviors
should be taken into account while developing the effective online auction model to attain the prospect
consumers for the optimization of revenues and to revitalize the emerging trends of auction business in the
market.
REFERENCES
Ariely, D., & Simonson, I. (2003). Buying, Bidding, Playing or Competition? Value Assesment and Decision Dynamics
in Online Journals . Journal of Consumer Psychology , 113-123.
Bajri, Hortascsu, Ghose, & Telang. (2004). Economic Insite from Internet Auction.
Dykema, & hermann. (1999). Impact of Internet Auctions on C2C.
Halstead, D., & Becherer, R. C. (2003). Internet Auction Seller: Does Size Really Matters? Internet Research. Electronic
Netwoking Applications and Policy , 183- 194.
Hanson, & Harrlyland. (1980). Impact on Consumer Behaviours in Reselling.
Lai, C. Y., Shih, D. H., Chiang, H. S., & Chen, C. C. (2010). A study of Interactive Qualitative at Online Shopping
Behaviour. WSEAS Trasactions on Information Science and Applications , 10.
Milegrom, R. R., & Weber, R. J. (1982). A thoery of competitive Auctions and Bidding. The Econometric Society ,
1089-1122.
Nowlis, S. M., & Simoson, I. (1997). Attribute Task Compatibility as a Determinant of Consumer Preception Rversals.
Journal of Marketing Research , 205-218.
Roth, A. E., & Ockenfels, A. (2000). Last Minute Bidding and Rules for Ending Second Price Auction. Evidence from Ebay and Amazon Auction on Internet , 11.
Adomavicius, G., Curley, S. P., & Gupta, A. (n.d.). User Preceptions in Continuous Combinatorial Auction. Effect of
Information Feedback, 20.
Ariely, D., & Simonson, I. (2003). Buying, Bidding, Playing or Competition? Value Assesment and Decision Dynamics
in Online Journals .
Beam, Segev, & Reiley, L. (1999). The future of e-markets:Multi-Dimensional market mechanism. Journals of
Economics, 142.
Becherer, R. C., & Halestead, D. (2004). Charcteristics and internet marketing strategiesog online auction sellers. Internet
Marketing and Advertisment.
Bhattachriya, A. (2009). Using 'Smart' Pricing to increase prices and the Consumer Satisfaction.
174
IADIS International Conference e-Commerce 2011
IMPACT OF VALUE PROPOSITION OF E-COMMERCE BY
FIRMS ON CUSTOMERS’ ADOPTABILITY
Aitzaz Ali1 and Zeeshan Khawar Malik2
1
MBIT Student, 2Assistant Professor
Institute of Business & Information Technology, University of the Punjab
Lahore, Pakistan
ABSTRACT
This document covers different aspects of perception about E-commerce in Pakistan in the current scenario. The research
involves the assessment of perceptions of working professional in various organizations regarding E-commerce value
propositions and also the perceptions and attitude of general public to adopt E-commerce practices in Pakistan. Different
statistical approaches are used to measure the potential of E-commerce implementation and adoption in Pakistan and it is
inferred from the findings that, E-commerce value propositions with respect to different dimensions can increase the
adoptability of E-commerce and online trading by their customers. There are few concerns at both ends, which can hinder
the common practice of online trading. The plausible implications and challenges are identified and recommendations are
made accordingly.
KEYWORDS
E-commerce, Electronic Commerce, Adoption, Pakistan
1. INTRODUCTION
The rapid increase of information technology and blending of various communication technologies has
virtually created an impact on business processes. E-commerce represents an innovative mode of conducting
business transactions, that may include buying & selling, or exchange of products, services, and information
between different parties through information exchange networks like the Internet, intranet, and extranet.
According to Dou & Chou (2002), “E-commerce provides the business world with functions like electronic
delivery of information, products, services, or payments; automation of business transactions and workflow;
reduction in service costs while improving the quality of goods and increasing the speed of service delivery;
and the use of online services. Furthermore, E-commerce is rapidly reshaping the marketing domain and
many of its traditional practices, such as business-to-business transactions.”
In today’s world of hard-hitting competition, technology-driven firms are looking to engage a successful
E-commerce strategy that can make people to adopt the online mode of buying. According to Chatterjee,
Grewal & Sambamurthy (2002), “The potential of the Internet and web technologies is globally
acknowledged. While some firms have benefited by adopting E-commerce, others have not been successful.”
Organizations always look to create value for themselves in terms of high profits, perpetual growth and
unprecedented market share. E-commerce can play an integral part in this regard.
E-commerce is altering the business processes and consequently it is shifting the organizational structure.
E-commerce is becoming the only option for many organizations, as businesses become more fascinated in
expanding their operations online. In doing so, they need to assess whether E-commerce can bring drastic
change in their business processes. How can this change bring out value for themselves in terms of growth,
revenue, flexibility, cost-effectiveness and most important of all, how will their customers perceive it.
According to Litter and Hudson (2004), “The development of e-commerce requires a series of essential
activities in technical infrastructure, legal and regulatory issues, awareness, training and education, private
sector protection, and government supports to provide conditions for economic players such as consumers
and businesses to play a key role in the application of E-commerce.” Revenue generation through this
175
ISBN: 978-972-8939-51-9 © 2011 IADIS
effective sales channel, Cost savings, Flexibility and increased business process efficiencies are other
considerable potential impacts of E-commerce which have been recognized by main industry players.
This kind of research work has been done in the past but has never been done in perspective of Pakistan.
The reason for choosing this topic is to assess the perception of the working professionals regarding Ecommerce being beneficial for a company and also to assess the perception of consumers about their
adoption of E-commerce. The idea is to see whether if a company is proposing value of E-commerce for
itself to devise a successful E-commerce strategy, then how much it can pursue the customer to adopt it.
In a research by Abbasi (2007), “Popularity of using the ICT tools in economy is appropriate to business
environment such as political stability, tax regulations and openness to trade and investment. Another
prerequisite for the expansion of e-commerce is traders and consumers' adoption along with social and
cultural infrastructure such as high-skilled labor and electronic literacy. Legal and political environment
including the Internet regulations, new businesses, facilitating, protecting private and intellectual properties,
investment and government support of technology infrastructure are all essential for development and
promotion of e-commerce.”
In developed countries, organizations have developed successful E-commerce strategies to attract
customers. However, most of the under-developed countries have been unable to create awareness among
organizations regarding E-commerce. According to Swami and Seleka (2005), “Developing countries face
the lack of infrastructure, economic and social-political framework for the development of e-commerce.
However, some developing countries have initiated strategies to achieve an appropriate level of E-commerce
development.”
Pakistan has been facing the same problem in this regard. According to a research by Kemal (1998) on Ecommerce implementations by exporters for international trade, “One of the major reasons for stagnation of
Pakistani exports has been the failure to explore new markets and to diversify their exports. E-commerce, by
providing easy access to product specification and prices can be instrumental to increasing their share in
international trade. While the electronic commerce is on the rise in the world and it provides vast
opportunities to Pakistan to diversify its export products and destinations, it has made very little use of the
electronic commerce. Therefore, the financial, legal, and market issues still unresolved in this regard need to
be addressed on an urgent basis.”
Another reason for Organizations hesitancy to implement E-commerce is the lack of knowledge and trust
of the management. In a research by Mirchandani and Motwani (2001), “Their findings reveal that the
relevant adoption included enthusiasm of the top management, compatibility of the e-commerce with the
work of the company, perception about the relative advantage being gained from the e-commerce, and
knowledge of the computers by the employees.”
According to Wong (2003), “The most common of the perceived barriers for not adopting e-commerce
were security and cost, followed by lack of readiness on customer's as well as supplier's end.” “Researchers
(Ho & Wu, 1999; Liang & Huang, 1998; Lohse & Spiller, 1998; Kim et al., 2001; Muthitacharoen, 1999)
tested different service factors concerning online shopping attitudes and behavior, including customer
communication channels, ease of vendor contact, response to customer needs, accessibility of sales people,
reliability of the purchasing process, timeliness of orders, availability of personalized services, ease of return
and refunds, fraud, delivery (speed and tracking), transaction costs, peripheral costs, and promotion.”
2. RESEARCH FINDINGS
2.1 Research Methodology
The purpose of my research was to assess the perception of working professionals about E-commerce
implementation and what do they think about its value proposition dimensions. Also to get an insight of
educated people, who know how to use internet, about the impact that firms creates when it offers Ecommerce services and if it makes them go for online trading.
For this purpose, I decided to take 2 surveys. First, survey was taken from professionals working in
different firms in Pakistan to check their perception regarding E-commerce value propositions and secondly,
from the general public to assess their preferences regarding adoption of E-commerce.
176
IADIS International Conference e-Commerce 2011
After preparing questionnaires, I made contacts with 100 working professionals from various
organizations in Lahore to get the questionnaires for Value proposition filled.. The concentration was to have
responses from Top level as well as Middle level management in 50-50 ratio.
Then, Questionnaire for Adoption of E-commerce was also distributed to people. These respondents
included students and working professionals. Surveys were distributed according to 50-50 ratio of gender.
2.2 Research Findings
The research findings demonstrate the data being statistically tested for the significance of the hypothesis.
Various tests were applied in order to find the significance between the two variables. Pearson Correlation
Test and Regression Analysis were applied. The results with statistical evidence will signify the hypothesis
and the interpretation to support the association of relations.
H0 = There is no relationship between Value proposition of E-commerce and adoptability by customers.
H1 = There is relationship between Value proposition of E-commerce and adoptability by customers.
Table 1. Correlation between Variables
Value Proposition
of E-commerce
Adoption
by Customers
1
.264**
Value Proposition of
E-commerce
Pearson Correlation
N
100
100
Adoption by Customers
Pearson Correlation
.264**
1
Sig. (2-tailed)
.008
N
100
Sig. (2-tailed)
.008
100
** Correlation is significant at the 0.01 level (2-tailed).
The relationship is significant but its intensity is somewhat weak. From the value in the Table 1, it is seen
that Value proposition of E-commerce by firms is moderately related to the adoption by Customers. Thus, H1
is accepted i.e. there is relationship between Value proposition of E-commerce and adoptability by
customers.
The dimensions of E-commerce value propositions like revenue generation, flexibility, convenience,
proper implementation of security modules for data safety and integrity, awareness programs for marketing
of its E-commerce website can somewhat impact of the adoptability of this unique mode of online buying
and selling.
To check the intensity of this impact, Regression analysis of the two variables has been done.
Linear Regression Equation:
Y= a + b (X)
Y=Dependent Variable= Adoptability by Customer
a = intercept = 2.544
b = slope = 0.331
X = Independent Variable = Mean of Value proposition of E-commerce by Firms
Calculation:
Y = a + b(X)
Y = 2.544 + 0.331 (3.94)
Y = 3.84
Regression Equation gives out a value of 3.84 Adoptability by Customers (Dependent Variable) with
respect to certain Standard Deviation. It shows that, as far as Adoption of E-commerce by customers is
concerned, Value proposition of E-commerce by firms keeps a weak hold on the adoption by customers and
the results are inclined towards an agreeable opinion.
The scatter plot in the Figure 1 below shows that there is a positive relationship between the two
variables. It can be inferred that these variables have a weak positive relation as there are many outliers but
the curve line has enough dots adjacent to it to be recognized as weak positive relation.
177
ISBN: 978-972-8939-51-9 © 2011 IADIS
Figure 1. Scatter Plot between variables
3. CONCLUSION
The sample which was used in the Executives survey included companies mostly from the Lahore region and
a few from Islamabad. This might lead to an unclear view about the whole population and this sample cannot
be a suitable representative of the whole country.
It was a difficult task to contact professionals in different organizations and make sure that they fill out
the questionnaire for the purpose of research. Executives were approached formally and through professional
social networking site, LinkedIn. In both samples, for Executives and for General Public, some people who
knew Internet usage but did not have knowledge of E-commerce and its importance, so I had to elaborate for
them as well before they could fill out the questionnaire.
The Internet and the global information infrastructure are fast gaining worldwide prominence because the
private sector is driving it. E-commerce is somewhat neglected in Pakistan by the companies. The decision
makers in the companies do not perceive it as a necessity and they might just not think of it as important.
However a lot of top level employees consider E-commerce a very good strategy in terms of business.
The study concluded that there is a tendency for E-commerce to flourish and grow in Pakistan.
Companies deem it as a prospective domain in terms of growth. Employees consider website existence
valuable for a company. It can become an effective sales channel to capture market share as well as identify
unexplored markets. The value E-commerce offer to the business can be perpetual provided that adoptions to
technology changes are kept intact. This might entail revenue generation through a cost cutting and time
efficient sales channel. The flexibility it offers in terms of positive infrastructure change through bridging
communication gaps between the key stakeholders, i.e. customers, business partners, etc.
As people are more inclined towards the use of technology now-a-days, businesses can greatly benefit
from it. The survey from customers implied that people find the online mode of trading very convenient in
terms of time and effort saving. This convenience can be in terms of ubiquity, easy access to information,
availability of the products or services on one click, variety for consumers, price transparency, etc. Also its
time-effectiveness, through rapid search of products and services and ordering and shipment through one
click, it surely can be one of the most time saving modes of shopping.
It is also observed from the study that Companies are somewhat concerned about factors regarding Ecommerce that were identified as hindrance in implementing E-commerce. It was found that technology
illiteracy is a big block in E-commerce. It will take a lot of time in increasing the literacy rate of the country
178
IADIS International Conference e-Commerce 2011
and more time will be required to give awareness to the people about the E-Commerce. Also that the
companies and customers are pretty much concerned about the security of the transactional data, the personal
information of the customers and bank or credit card details, low PC and internet penetration, people prefer
to use traditional ways of business enjoying personal contacts and mode of payments. Another major
concern is government’s support regarding E-commerce practices. Apart from that, customers also keep in
mind the market reputation and trustworthiness of the E-commerce portals of the companies. The
Government should provide a safe and secure environment; both businesses and consumers must be assured
of security and safety in cyberspace transactions. For this purpose, proper implementation of cyber laws must
be done. There should be a legal framework devised for its growth and proper implementation.
It can be inferred from the research findings that, people in Pakistan are slowly getting aware of the fact
that business on the internet is less costly and are more beneficial. It can be said that as long as companies
and businesses are implementing E-commerce and proposing value for themselves through E-commerce, it
can also make the people to go for this electronic mode of payments. People will embrace E-commerce by
desire or by force as more and more companies are looking to propose value through E-commerce.
REFERENCES
Abbasi, A (2007), E-Commerce Development in Iran, Information Technology Policy Program, College of Engineering,
Seoul National University, Seoul, Korea, Retrieved from http://www.webology.ir/2007/v4n4/a49.html
Chatterjee, D., Grewal, R., & Sambamurthy, V. (2002). "Shaping up for E-Commerce: Institutional Enablers of the
Organizational Assimilation of Web Technologies." MIS Quarterly, 26(2), 65-89.
Ho, C., & Wu, W. (1999), Antecedents of consumer satisfaction on the Internet: an empirical study of online shopping,.
Proceedings of the 32nd Hawaii International Conference on System Sciencesm,
Iqbal, A. (2009), Future of E-commerce in Pakistan, EzineArticles.com Expert Author, Retrieved from
http://ezinearticles.com/?Future-of-E-Commerce-in-Pakistan&id=1974082.
Kemal, A. R., (1998) Electronic commerce and international trade of Pakistan, Retrieved from
http://findarticles.com/p/articles/mi_6788/is_4_37/ai_n28724652/
Kim, D., Song, Y., Braynov, S., & Rao, H. (2001). A B-to-C trust model for on-line exchange. In Proceedings of
Americas Conference on Information Systems, paper 153
Littler, K. & Hudson, R.. (2004), The impact of depolarization on e-commerce development in the distribution of
regulated financial products. International Journal of Information Management, 24(4), 283-293
Liang, T., & Huang, J. (1998). An empirical study on consumer acceptance of products in electronic markets: a
transaction cost model. Decision Support Systems, 24(4), 29-43.
Lohse, G. L., & Spiller, P. (1998). Electronic shopping,. Communications of ACM 41(7), 81-87.
Mirchandani, A. A., Motwani, J., (2001) Understanding small business electronic commerce adoption: an empirical
analysis. Journal of Computer Information Systems, 70-73
Ranganathan, C & Ganapathy, S. (2002). Key dimensions of business-to-consumer web sites. Information &
Management 39, 465-475.
Swami, B. & Seleka, G.G. (2005), Problems, prospects and development of e-commerce- case study of South African
development communities, IADIS International Conference E-Commerce, 379-384.
Wong, P. (2003), Global and National factors affecting e-commerce diffusion in Singapore. The Information Society, 19,
19-32,
179
ISBN: 978-972-8939-51-9 © 2011 IADIS
CYBERCRIMES AND THE BRAZILILIAN ATTEMPT TO
DEVELOP LEGISLATION
Maria Eugênia Finkelstein
Bachelor of Law at the University of São Paulo; Master in Commercial Law at Pontifícia Universidade Católica de São
Paulo; PHD in Commercial Law at the Law School of the University of São Paulo, Professor at the Law School of
Pontifícia Universidade Católica de São Paulo and FAAP, Coordinator of the Post-Graduation specialization course in
Corporate Law at Fundação Getúlio Vargas. Visiting Professor at Instituto de Empresa de Madrid
ABSTRACT
The purpose of this text is to briefly analyze the impact of the commercial exploitation of the internet and the
development of a new way to perpetrate crimes, usually denominated cybercimes. It considers the importance of the
development of specific legal texts as well as analyses the development of such matter in Brazil.
KEYWORDS
Internet, cybercrimes, legislation, Brazil
1. INTRODUCTION
It can be said, without doubt, that e-commerce is in full expansion worldwide. According to Internet World
Statsi there are currently 1,966,514,816 Internet users worldwide, and every one of them is a potential
consumer of products and services offered therein. It is estimated that in Brazil, there are approximately 70
million users, a fact that certainly deserves attention from legislators, jurists, and judges. Of course not only
the Internet has developed. Sectors such as media and manufacturing have also experienced an amazing
development and caused impact on society. The essential differences between information technology and
the other areas of knowledge are contemporaneity, transnationality, dynamics of the computer revolution, and
socialization of informationii. However, due to the novelty of this issue, there is a notorious lacking of
satisfactory regulation, which in simple terms means that the cyber phenomenon has an influence on the
mind of man, but man is not sure how to solve many of the conflicts that may arise from its use.
Thus, the digital era represents a revolution in society. The economic activity, as we know it today, is
known to have begun with the so-called Industrial Revolution (Huberman, L.,1986, p. 55), occurred in the
18th century in England. This boom in economic activity brought about some negative consequences, as the
result of the lack of regulation to stop the disordered growth. Now, it seems clear that man was not prepared
to identify the consequences of the growth and development of industrial activity, and it is also seems clear
that man currently cannot notice all changes generated by the digital era and electronic culture. We might be
experiencing a true information technology revolution, or a post-industrial revolution.
Despite the fact that a new way to perpetrate crime was being developed by the usage of computer
technology, it has to be stressed that property was still being physically stolen, individuals were still at risk of
personal assault and sexual harassments were still happening. However, it cannot be denied that the Internet
has created new means of committing crimes, which started to be denominated by the media as cybercrimes,
an expression that although is highly accepted by the public in general, does not always encounters a
correspondence at the legal texts.
Several countries began to regulate these new fields of Law, and other fields need to be resized, such as
Criminal Law, which began to regulate, for example, consumer crimes, crimes against economic activity,
crimes against the economic system, etc. Similarly, Brazil has regulated such areas, but with a certain delay
in relation to social expectations. Now, however, with this new digital revolution, Brazil faces new needs for
urgent changes.
180
IADIS International Conference e-Commerce 2011
Any way, it is uncontroversial that the new phenomenon of cybercrimes need to be studied by the entire
academic community. And so this is true that many congresses, seminars, workshops and journals are
dedicated to the study of such a theme. After all, a criminal, hidden by the anonymity the Web provides, may
feel even more encouraged to commit crimes of this kind. Although it is believed that the personal computer
virus first appeared in the 80’s, it is to be mentioned that the world community only notice their existence
after the famous case of the Melissa virus, which, in 1999, infected millions of computersiii. However, after
2001, it is to be noticed that the conduct of cybercriminals changed dramatically. In 2001 the United States
Department of Justice defined computer crimes as “any violation of criminal law that involved the knowledge
of computer technology for its perpetration, investigation or prosecution”. So, cybercrimes apply for the
following conducts: digital piracy, cyberstalking, e.mail piracy, theft of digital information (which leads to
identity theft and bank fraud) and many other conducts some of them yet to be created.
Absolutely nobody is free from this new kind of crime. Microsoft itself, one of the world’s largest
companies, has suffered criminal cyberattacksiv.
2. THE NEED FOR REGULATION
The commercial use of the Internet, in 1993, gave rise to criminal practices, using means previously
unknown. Even nowadays, tracking the agents that use the Internet is very hard and need specific trainings.
It is a fact, however, that Cybercrimes “require the adoption of new, cybercrime specific laws because the
conduct involved in the commission of and/or the ‘ harms’ inflicted by target cybercrimes do not fit into
traditional criminal law” (BRENNER, S., 2010, p. 73). A 2001 case perfectly illustrates this claim. In such
year the computers of two casinos were accessed by hackers and the poker and video slot machine were
altered. For just a few hours, gamers at those casinos gained almost 2 million dollars. The firs impediment
for the characterization of such conduct as theft was the fact that they did not profit with their conduct. The
second, obviously, was the fact that this conduct was not theft, since the hackers did not took possession of
the casino machinery. The same applies to fraud, since there was no benefit for the hackers. So, if not theft
or fraud, what would this conduct characterize? The answer is that the hackers shall be prosecuted under the
federal computer crime statute. However, it is to be mentioned that such hackers were never identified. This
simple example demonstrates that sometimes, the conduct perpetrated by the usage of computers in any case
cannot be considered as a regular crime known before the internet (BRENNER, S., 2010, p. 73). Spams are
another example for the necessity of the creation of specific legislation.
3. THE BRAZILIAN SITUATION
Brazil is considered one of the leading country in electronic criminal activityv. Unfortunately, however, as it
will be seen further on, there are not even specific laws to inhibit such practice. On top of that, the police is
not sufficiently equipped yetvi. Many are the types of attack reported on a daily basisvii.
The possibility of third parties accessing personal passwords or electronic signatures may be disastrous.
The attempt to regulate electronic signatures through Presidential Order No. 2.200/01 is an indication of the
awareness that the disordered growth of e-commerce leads to conflicts, which have already been settled by
many Courts in Brazil. Undoubtedly there is an increasing concern with making data transmission on the
Internet safer, for example by using the encryption technique. However, legal principles such as “nullen
crimen sine legeviii” have benefited hackers, who, living in a lawless environment, hide in the anonymity
and commit crimes (such as intellectual property infringement) without suffering any penalties.
The issue of the need for regulation on cybercrimes is controversial, since there are two different
positions regarding the regulation of the Internet. On one hand, some consider the cyberspace as a separate
territory calling for a separate jurisdiction. This is the point of view supported by Lorenzetti (2000, p. 227), a
member of the Argentinean Supreme Court. Others (L. Bochurberg, 1999, p. 221) believe the Internet should
be self-regulated in the way it is designed.
In the Brazilian legal system, laws are based on territorial principles, which conflicts with the
transnational character of the Internet. There are already domestic laws, though none of them of a penal
181
ISBN: 978-972-8939-51-9 © 2011 IADIS
nature, regarding the Internet, but their effects are limited to the jurisdiction covered by the Brazilian
sovereignty only. In a global context, it is necessary that Law and Information Technology facilitate
negotiations between the nations, based on cross-cultural standards which are adequate to juridical
rationalism.
Thus, the global character of the Internet and the international possibilities of cybercrimes are points to be
considered. Due to this character, any legislative change should be implemented by several countries,
alternatively international efforts designed to harmonize practices should be promoted. The greatest mistake
we could make would be to attempt to solve problems created by the Internet thinking individually and
regionally, without considering an international context. After all, the Internet is not an issue of purely local
scope, but globalix, due to the transnational nature of the Internet. For this reason, it is once more clear that
law will have to adapt to the new social digital context of the world-wide computer network to face the
challenge of the transnationality of cyberspace.
Accordingly, the first steps seem to be have been taken by means of the standardization of laws supported
by international institutions such as UNCITRAL, OECD, and the European Communityx. These
international attempts end up being felt nationallyxi. Many countries regulated this issue nationallyxii. Let us
take Brazil as an example. There are various legislative bills on cybercrimes in progressxiii. Some of them
are based on laws of other countries.
4. CYBER CRIMES
The difficulty in studying computer crimes begins with defining them (LICKS, O. B.; ARAÚJO JR, J. M.,
1994, pp 90-95).However, we believe that, in almost all definitions we have found, the Internet is put as the
means of consecution, and not itself as a new conduct (MARTÍN, R. M. M., 2001, p. 22). Notwithstanding,
new laws designed to prevent judges from resorting to extensive methods of interpretation to convict a
criminal act are welcome. Besides, this is the position adopted by the United Nations Organizations
(GOODMAN, M. and BRENNER, S., 2004).
We are contrary to those who believe that the computer society brought about new legal assets that need
new criminal concepts to protect them (SERRA, C. and STRANO, M., 1997, p. 21). What would those new
assets be? Information was already protected, as well as privacy. Property and financial damages caused by
digital attacks are the same as those protected from traditional attacks. Illegal copies of software have always
been protectedxiv. Information too, through copyrights.
It is true that society has changed a lot in its form of relationship. In the past, those who did not have any
criminal tendency can now hide behind the anonymity offered by the Web and attempt criminal conducts,
which undoubtedly is a very serious issue. It is evident that the Web makes it easier for potential offenders to
violate the law without major conscience crises. The growth in the occurrences of cybercrimes evidences
such statement, such as the conducts of Cybertrespass (WALL, D., 2004, p. 3) or hackering/cracking, Cyber
deception/ thefts (WALL, D., 2004, p. 4) and Cyberpiracy (WALL, D., 2004, p. 5). Only concerning fraud, a
crime that exploded in the cyberspace, many specific types deserve mention.
Notwithstanding, the fact that the Web facilitates the occurrence of criminal conducts alonexv deserves
special attention from legislators because the Internet is world-famous as a lawless land, and unfortunately
impunity occurs more often with virtual crimes, among other reasons, because of the difficulty of tracking
their perpetrators.
Thus, our view is that the criminal legislation does not really need to be changed, but the same cannot be
said of the procedural legislation, the creation of a more specialized and prepared police force, or the need for
acceptance of electronic documents as evidence. Impunity must be fought! And if new laws facilitate
punishment, then we are totally favorable to them.
REFERENCES
BOCHURBERG, L., Internet et Commerce Électronique, Paris: Dalloz, 1999.
BRENNER, Susan W., Cybercrime: criminal threats from cyberspace. California: Greenwood, 2010.
GHOSH, Sumit; TURRINI, Elliot. Cybercrimes: A Multidisciplinary Analysis, Berlin-Heildelberg: Springer, 2010.
182
IADIS International Conference e-Commerce 2011
GOODMAN, M. and BRENNER, S. The Emerging Consensus on Criminal Conduct in Cyberspace at
http://www.lawtechjournal.com on February 3, 2004.
HUBERMAN, L. História da riqueza do homem. 21st ed. Rio de Janeiro: Guanabara, 1986.
LICKS, O. B.; ARAÚJO JR, J. M., Aspectos Penais dos Crimes Informáticos no Brasil, Revista do Ministério Público
do Rio Grande do Sul, Porto Alegre, N. 33, 1994
LORENZETTI, R. L. Comercio Electrónico, Buenos Aires: Abeledo Perrot, 2000.
MARTÍN, R. M. M. Delicuencia Informatica y Derecho Penal, Madrid: Edisofer, 2001.
SERRA, C. and STRANO, M. Nuove Frontier della Criminalitá – La Criminalitá Tecnologica – Milano: Giuffrè, 1997.
WALL, D. Crime and the internet: Cybercrimes and Cyberfears, New York: Routledge, 2004.
i
Internet World Stats 2010, http://www.internet worldstats.com/stats.htm in March, 2011.
Interview with Umberto Eco in the magazine Veja Digital of December 2000, page 11. “For the first time, mankind has an enormous
amount of information available to him at a low cost. In the past, this information was costly, involved buying books, exploring
libraries. Now, from the middle of Africa, if you are connected, you may have access to Latin philosophical texts. It is quite a change.”
iii
The main difficulty in such investigation was to define the amount of damages caused, as, by that time, the penalty was somewhat
correlate to damage caused or intended. So, the damage was amounted between 77 million dollars and 350 million dollars. By the end
of the investigation and due to the plea of guilty provided by the criminal himself the damage was amounted in 80 million dollars and
David Smith, the creator of the Melissa virus was sentenced to 20-month imprisonment. GHOSH, Sumit; TURRINI, Elliot.
Cybercrimes: A Multidisciplinary Analysis, Berlin-Heildelberg: Springer, 2010, p. 3
iv
Employee Richard Gregg was arrested on the charge of unlawfully marketing 5,436 programs from the company, with a total property
loss of US$ 17 million.
v
To see a graphic, please consult http://www.cert.br/stats/incidentes/
vi
the Attorney General’s Office of the State of Rio de Janeiro has the so-called Electronic Investigation coordinated by attorney Romero
Lyra. In the same state, there is also a Police Office specialized in Computer Crime Enforcement.
vii
to see a graphic, please consult http://www.cert.br/stats/incidentes/.
ii
x
The European Union set a directive recommending how the authorities should act in case of computer crimes. The project website is
www.ctose.org.
xi
European Community - Convention on Cybercrime on November 23, 2001, in Budapest, set guidelines recommending that evidence
of the occurrence of cybercrimes should be accepted in court to increase punishment of this type of crime
Argentina - Argentina has approved the so called “The Data Protection Act” which includes punishment to specific kinds of
unauthorized access (hacking); Australia- There is a Federal Legislation called The Cybercrime Act 2001, which amends the law
relating to computer offences, and for other purposes. The following offences are set forth: unauthorized modification of data to cause
impairment; unauthorized impairment of data held in a computer disk and other means of data storage; possession or control of data
with intent to commit a computer offence; and producing, supplying or obtaining data with intent to commit a computer offence.;
Austria - There is a specific law called Strafrechtsanderungsgesetz, approved in 2002; Belgium - In November 2000 the Belgian
Parliament adopted new articles in the Criminal Code on computer crime, in effect as from February 13, 2001. The four main problems
of computer forgery, computer fraud, hacking and sabotage were henceforth considered criminal offences; Botswana - The Government
Computer Bureau has been assigned to formulate the National ICT policy. Together with the ICT policy it has been agreed that the ICT
legislation issues should be addressed; Canada - The Canadian Criminal Code suffered amendments to foreseen cybercrimes in 2003;
Chile – Chile has Law Nr. 19.223 on Automated Data Processing Crimes, published on June 7, 1993; China - In 1997 many
Cybercrime issues are covered in laws and regulations that refers to Internet related crimes. The penalties foreseen varies from three to
five years of imprisonment. It is important to stress that only 10% of the telephone lines in China have full Internet access. However,
there is an extensive legislation on this regard. Hong Kong has different regulations regarding cybercrimes conducts, which are dealt by
the Telecommunication Ordinance; Denmark - A Bill on Information Technology crimes was presented to the Danish Parliament on
November 5, 2003. However, some provisions of the current penal Code may be applicable to cybercrimes; France - The Penal Code, in
effect since March 1, 1993 sets forth that attacks on systems for automated data processing are classified as crimes. Penalties vary from
one to three years of imprisonment and fines; Germany - The German Penal Code foresees the crime of data espionage, alteration of
data and computer sabotage. Penalties vary from two to three years of imprisonment and fines. The attempt of the last crime shall be
punished; Greece - Law Nr. 1805/1988 applies to cybercrimes. This law has reformed some dispositions of the Penal Code with regard
to cybercrimes and supplemented others; Hungary - The Hungarian Penal Code foresees the criminal conduct for breaching computer
systems and computer data, compromising or defrauding the integrity of the computer protection system or device; Iceland - The Penal
Code of Iceland foresees that penalties shall apply to persons who unlawfully obtain access to data or programs stored as data; Republic
of Ireland - The Criminal Justice (Theft and Fraud Offences) Act 2001 foresees the Unlawful use of computers as offence. The Criminal
Damages Act 1991 foresee as an offence the unauthorized accessing of data; Israel - Israel approved the Computers Law of 1995..
Penalties vary from three to five years of imprisonmen; Italy - The Italian Penal Code foresees the following as crimes: the unauthorized
access into a computer or telecommunication systems, the illegal possession and diffusion of access codes to computer or
telecommunication systems, the diffusion of programs aimed to damage or to interrupt a computer system. Penalties vary from one to
five years of imprisonment and fines; Japan - In effect from February 3, 2000, the Japanese Law Nr. 128 of 1999 has extensive
provisions regarding cybercrimes such as prohibition of acts of unauthorized computer access, prohibition of acts of facilitating
unauthorized computer access, damage to Documents in Public Use and Damage to Documents in Private Use. Maximum penalty is
five years of imprisonment; Korea - Korea has some dispositions in its Law concerning cybercrimes, such as invalidity of public
documents, destruction of public goods, false preparation or alteration of public electromagnetic records, falsification or alteration of
183
ISBN: 978-972-8939-51-9 © 2011 IADIS
private electromagnetic records, violation of secrecy, fraud by the use of computer, etc and destruction and damage of property). Also,
in Korea, the Act on Promotion of Information and Communications Network Utilization and Information;
Malaysia - Malaysia has the Computer Crimes Act of 1997, which specifically deal with cybercrimes; Mexico - The Mexican Penal
Code contains specific dispositions concerning cybercrimes; Netherlands - The Criminal Code of the Netherlands applies to
cybercrimes; Peru - The Penal Code of Peru has a section with provisions regarding cybercrimes; Poland - The Penal Code of Poland
contains dispositions specifically applicable to cybercrimes. The maximum penalty is eight years of imprisonment; Portugal - Since
1991 Portugal has a law designed to inhibit the practice of cybercrimes. It is the so-called Computer Crime Law; Singapore Singapore has a Computer Misuse Act, which foresees the following offences: unauthorized access to computer material, access with
intent to commit or facilitate commission of offence, unauthorized modification of computer material, unauthorized use or interception
of computer service, unauthorized obstruction of use of computer, unauthorized disclosure of access code and enhanced punishment for
offences involving protected computers. The maximum penalty is 20 years of imprisonment; South Africa - South Africa has approved
the Electronic Communications and Transactions Act of July 31 2002 (Act No. 25, 2002) related to cybercrimes, such as unauthorized
access to, interception of or interference with data. The maximum penalty is 5 years of imprisonment; Sweden - The Penal Code of
Sweden has specific dispositions which apply to cybercrimes; Switzerland - The Penal Code of Switzerland foresees the following
offences: unauthorized access to data processing systems and damage to data. The maximum penalty is five years of imprisonment;
United Kingdom - The United Kingdom has the Computer Misuse Act of 1990, which foresees the unauthorized access to computer
material as a criminal offence. The maximum penalty is five years of imprisonment; United States - After the terrorist attacks of
September 11, 2001, the United States began to be seriously concerned about the occurrence of cybercrimes, since the press widely
broadcast that the terrorists used electronic means to plan the terrorist attacks that shocked the world; Thus, the United States is
undoubtedly the country that has stood out the most in passing laws to fight cybercrimes. Remarkable statutes include: - USAPA – USA
Patriotic Act – a statute passed in late 2001 that intends to expedite the arrest and prosecution of those responsible for electronic
invasions. This statute provides that some hacker invasions are treated as terrorist acts and those responsible are subject to extremely
serious penalties. Punishable conducts include the publication of information that could harm the United States and technical
information that could lead to terrorism and even the transmission of other people’s personal information. - FISA – Foreign Intelligence
Surveillance Act – provides the monitoring of special foreign agents acting in the United States and facilitates the intervention of U.S.
authorities in international cases; CSEA – Cybersecurity Enhancement Act – which imposes 10 years of imprisonment as the minimum
sentence for electronic crimes and immediate punishment on anyone who accesses information without permission to do so.
xii
This principle is a basis of the Brazilian criminal law and means that in case there is no specific law, there is no crime.
xiii
Bill No. 4833/98 by Representative Paulo Paim, defines the crime of broadcasting information that induces or promote discrimination
or prejudice on the basis of race, color, ethnics, religion, or national origin on the Internet or other public access networks; Bill No.
84/99 by Representative Luiz Piauhylino, deals with crimes relating to information technology, applicable penalties, and other
provisions; Bill No. 76/00 by Senator Renan Calheiros, defines and classifies computer crimes; Bill No. 1070/95 by Representative
Ildemar Kussler, deals with crimes relating to the distribution of pornographic material by means of computers; Bill No. 101/99 by
Representative Maria Elvira, deals with child and adolescent sexual exploitation, and imposes four to ten years of imprisonment on the
establishment and user committing sexual exploitation.
xiv
xv
Article 184 of the Brazilian Penal Code, as amended by Law No. 8.635 and the Brazilian Software Law.
And the increasing number of pedophilia cases is no doubt the best example.
184
IADIS International Conference e-Commerce 2011
MULTICHANNEL RETAILING STRATEGIES IN THE
JAPANESE-STYLE DISTRIBUTION SYSTEM: THE CASE
OF KINOKUNIYA’S MULTICHANNEL STRATEGIES
Hyemi Bang
Doctoral Student, Graduate School of Business, Osaka City University, JAPAN
Sugimoto 3-3-138, Sumiyoshi Osaka, 558-8585, Japan
ABSTRACT
The world of retailing in 2010 is a very different place compared with 1999.The advent of the Internet has added another
dimension to the way that merchandise reaches consumers. Integrating this technology with traditional retailing methods
has become the dominant retail model that students of retailing should all be aware of Multi-Channel Retailing identifies
and explains the underlying principles of e-retailing and its relationship with conventional retail methods. Most important,
retailers’wares must be accessible by whatever means customers want – in a retail store, by phone, in a mail order catalog,
from handheld devices, or on the Web. Indeed, a growing segment of shoppers now expects to reach a single retailer
through all possible channels.
The purpose of this paper is to give an overview of what it is about, covering the drivers, benefits, challenges and
organizational changes needed to get there in the Japanese-style distribution system.
KEYWORDS
Multichannel retailing, Japanese-style distribution system, multichannel shopping
1. INTRODUCTION
Multichannel retailing is the set of activities involved in selling merchandise or services to consumers
through more than one channel. Multichannel retailers dominate today’s retail landscape. While there are
many benefits of operating multiple channels, these retailers also face many challenges. Multichannel
retailing is the set of activities involved in selling merchandise or services to consumers through more than
one channel (Levy and Weitz 2009). The adoption of Multichannel Retailing presents numerous implications
to the marketing context, enlarging the complexity of marketing decisions. Retail organizations are facing
many new challenges and opportunities in the multichannel retailing environment. There are also many
questions to be answered by marketing researchers and industry practitioners. If this complexity in making
decisions is proven, will there be advantages in adopting multichannel retailing? The most appealing
approach found in the studies exploits exactly the factors which took the retailers to implement a
multichannel strategy: cost reduction in transactions, reduced growth of demand, competitive strategy and
differentiation, changing in the consumer’s behavior, increase of efficiency in distribution, concentration of
supply e convergence of channels roles (Lason2001;Stone ,Hobbs and Khaleeli2002;Souza and
Serrentino2002;). Especially, There are some special features in the Japanese distribution system. One of the
important features is that to have a multi-stage structure where two or more parties from manufacturer to
retailers are connected vertically. When we consider more specifically the integration among channels, we
discover that there are a still few empiric studies that exploit its synergies in the adoption of a multichannel
retailing strategy (Simons, Steinfield and Bouwman 2002).
As the distribution industry would be influenced the most by the electronic commerce, the impact of
electronic commerce on the distribution industry has been analyzed. The objectives of the research are as
follows; 1) an analysis of impact of electronic commerce on the structure of the distribution industry and on
the transaction pattern, 2) development of competitive strategies to improve the global competitiveness of the
domestic (JAPAN) distribution industry.
185
ISBN: 978-972-8939-51-9 © 2011 IADIS
2. CONCEPTUAL BACKGROUND
2.1 Definition of Multichannel Retail Concept
Multichannel retailing can be defined as an opportunity given to the consumer to obtain the same product
from the same retailer by multiple purchase channels. The multichannel marketing strategies attempt to foster
the consumers' behavior to be multichannel (Nicholson, Clarke and Blakemore 2002). Although some authors
identify up to ten kinds of channels (Stone, Hobbs and Khaleeli 2002;), the greatest part of the studies is
focused basically on physical stores, printed catalogues and commercial websites on the internet. To
Eastingwood and Coelho (2003) those companies that obtain part of their sales from 2 different channels, are
classified as having adopted the multichannel system, while those with 100% of sales proceeding from one
channel, adopt the only one channel model
2.2 Motivations for Retailers to Operate Multiple Channels
Ultimately, the search for improved financial performance motivates traditional singlechannel
retailers—store based, catalog, TV home shopping, or Internet-based retailers—to evolve into multichannel
operators. While the decision to sell through additional channels prompts concerns about cannibalization and
negative spillover (Deleersnyder et al. 2002; Falk et al. 2007), research indicates that operating multiple
channels can have a positive effect on financial performance (Geyskens, Gielens, and Dekimpe 2002). Some
sources of the improved financial performance for multichannel retailers are: (1) low-cost access to new
markets, (2)increased customer satisfaction and loyalty, and (3) creation of a strategic advantage.
2.3 Constraints for Expanding to Multichannel
While many retailers have become multichannel operators, some have intentionally shunned this strategy so
far (e.g. Amazon.com). There are three key reasons that have kept these retailers from pursuing multichannel:
(1) consumer access to broadband Internet service, (2) operational difficulties of integration, and (3) costs of
multichannel offering (Zhang et al 2009).
3. RESEARCH METHODOLOGY
3.1 Focus
All the research will be based on bookstores in Japan. The analysis unit will be centered on Japanese
companies of the retail sector that have their business focused on the "books" category and that have
introduced multichannel strategies, which means to say that they use at least two channels for consumers to
acquire their products.
3.2 Contents and Scope of the Research
The analysis has been done based on the classification of electronic commerce as business-to-business,
business-to-consumer and internal electronic commerce within an organization. The empirical investigation
has been limited to the retailers which seem to be influenced most by the wide spread of the electronic
commerce. The contents of the research are as follows;(1)investigation of the current status and issues of the
JAPANESE distribution industry(2)development of architectural framework of electronic commerce by
which the distribution industry may be able to utilize to develop electronic commerce
opportunities(3)analysis of the impact of electronic commerce on the distribution industry influenced by the
electronic market(4)the competitors in the distribution industry through the analysis of the industry structure,
and its implications.
186
IADIS International Conference e-Commerce 2011
3.3 Japanese-style Distribution System
There are some special features in the Japanese distribution system. One of the important features is that to
have a multi-stage structure where two or more parties from manufacturer to retailers are connected
vertically.
3.3.1 Retailers
In Japan, there are a large number of retailers, though the majority of them are doing small scale business.
One possible reason is that consumers tend to go shopping frequently but buy little at a time. They not only
live in a small house without enough storage space but also prioritize freshness of products. In response to
this consumers’ behavior, the retailer, too, want to avoid having a large stock. They themselves do not want
expensive inventory cost either. Thus, they place small orders frequently(Tajima and Harada 1997).
3.3.2 Wholesalers
Japan has far more wholesalers than foreign countries have. Since manufacturers were often small scale
producers, each of them was involved in just a part of production process, and the wholesalers bridged many
parts of the process. This is why there are many wholesalers (ESRI 1991). The situation where a large
number of various wholesalers exist suits Japanese small scale retail. Under restrictions of the management
ability of dealings, the wholesalers reduce the number of dealings in distribution process and save dealing
costs (Tajima and Harada 1997).
3.3.3 Policy
The price control system is one of the business practices in which manufacturers determine their products’
retail price. A manufacturer set the resale price by topping up profits each party earns in the process of
distribution. In other words, manufacturers decide how much margin to be paid to wholesale stores or even
retail stores. On this basis, they negotiate for the delivery price to retailers and wholesalers (Miwa &
Nishimura 1991). Although this price setting system can be also found in many countries, what makes
Japanese one unique is that it is practiced extensively. Not only it brings successful branding, which results in
monopolization in market but also it defines the highest price as suggested retail price and the lowest price,
with the returned-goods system and the rebate system. Since the dealings on the basis of this price were used
to be observed, it became a factor of enhancement of resale price maintenance system.
In Japan, the returned-goods system is widely observed from an apparel industry to that of fiber, books,
and medical supplies. For instance, in the United States, goods are hardly returned to manufacturers only
because they remained unsold. But in Japan, the business practice where each contractor conducts continuous
dealings is considered important, and thus the returned-goods system can serve to share a risk of dead stock.
Because of minimization of the risk, retailers such as department stores may take advantage of
returned-goods system to reduce dead stock, and as a result, the system works as sales promotion (Ishihara
and Yahagi 2004).
3.4 Empiric Research
Documents – among the various documents mentioned to collect evidence, newspaper clippings and other
articles published in mass media will be used, including the websites of selected bookstores. The catalogue
will also be added when the company uses it to sell products.
Interviews –is one of the most important sources of case study information. Although it is also the survey
method, the interviews are essential sources of case study information.
The two methods of data collecting (sites and interviews), with the addition of information in newspapers,
magazines and catalogues, will be revised and analyzed together, in a way that the findings of the case study
will be based on the convergence of information derived from different sources, and not from quantitative or
qualitative data separately.
187
ISBN: 978-972-8939-51-9 © 2011 IADIS
4. DISCUSSION & CONCLUSIONS
It is generally thought that research on multi-channel retailing needs to be developed more substantially. Like
I have pointed out in this paper, even just the discussion on “multichannel retailing”is difficult to treat as a
simple concept. It is already being discussed by dividing it into several types, but nonetheless because
multi-channel retailing still remains a complicated issue, disseminating it into several patterns will be a
indispensable topic within its related discussions.
Of course, as I have shown, there is a steady emerging amount of research on dividing multi-channel
retailing into several patterns but apparently it is necessary that the current situation of multi-channel
strategies of large scale retailing and small and midsize retailing businesses should be elaborated upon further
using a new framework on how the multi-channel retailing can be properly divided into certain patterns.
Moreover, the biggest issue relating to the multi-channel retailing matter pertains to how we can increase
the synergy between channels and it is in this area that the current amount of literature is still lacking. It is
research on the multi-channel shoppers. I have shown in this paper that the focus on research of
multi-channel retailing has currently shifted from the retailing of providers to the client consumers. In order
to elaborate on the strategies of multi-channel retailing it is absolutely necessary to analyze the consumers
who are the clients and in a way this change can be regarded as a natural course.
REFERENCES
Barsh, Joanna; Crawford Chris,and Grosso(2000). “How e-tailing can rise from the ashes”. McKinsey Quarterly; 3, 98-12
Deleersnyder, Barbara, Inge Geyskens, Katrijn Gielens, and Marnik G. Dekimpe (2002), “How Cannibalistic Is the
Internet Channel? A Study of the Newspaper Industry in the United Kingdom and The Netherlands,” International
Journal of Research in Marketing, 19(December), 337-348.
Doherty, N.F. Ellis-Chadwick, F, and HART, C.A(1999) “Cyber retailing in the UK: the potential of the Internet as a
Retail channel”. International Journal of Retail and Distribution Management, 27(1) 22-39
Falk, Tomas, Jeroen Schepers, Maik Hammerschmidt, and Hans Bauer (2007), “IdentifyingCross-Channel Dissynergies
for Multichannel Service Providers,” Journal of ServiceResearch, 10 (November), 143-160.
Geyskens, Inge, Katrijn Gielens, and Marnik G. Dekimpe (2002), “The Market Valuation ofInternet Channel Additions,”
Journal of Marketing, 66 (2), 102–119.
Levy, Michael and Barton A. Weitz (2009), Retailing Management, 7th Edition. New York,N.Y.: ThMcGraw-Hills/Irwin
Companies, Inc.
Simons,Luuk P.A.; Luuk P.A.; Steinfield,Charles(2002) “Strategic positioning of the Web in a multi-channel market
approach.” Internet Research: Electronic Networking Applications and Policy, 12(4) 339-347
Steinfield C, Bouwman H and Adelaar T (2002b) “The dynamics of click and mortar e-commerce: Opportunities and
management strategies” International Journal of Electronic Commerce, 7(1): 93-119
Stone, M., et al. (2002), “Multichannel customer management: The benefits and challenges.” Journal of Database of
Marketing 10(1): 39-52.
Zhang, Jie and Michel Wedel (2009), “The Effectiveness of Customized Promotions in Onlineand Offline Stores,”
Journal of Marketing Research, 46 (2), 190-206.
Ishihara, T and Yahagi,T(2004.) Nihon no ryutsu 100 nen (100 years ofJapanese distribution), Yuhikaku.
Tajima, Y and Harada,H.(1997) Zeminaru ryutsu nyumon (seminars on the introduction to distribution problem), Nihon
Keizai Shinbun Sha.
Yahagi, T (1996) Gendai ryutsu (Modern distribution), Yuhikaku aruma.
Yahagi, T (2003) Chugoku ajia no kouri (Retail innovation in China and Asia), Nihon Keizai Shinbun Sha.
Yamaoka, Y (1990). Keshohin gyokai (Cosmetic industry), Kyoikusha sinsho.
188
IADIS International Conference e-Commerce 2011
DEVELOPING COMMUNICATION PRACTICES BY
COMPUTER AND VIDEO-CONFERENCING SYSTEMS: A
CASE STUDY OF A FINNISH RETAIL BANK
Johanna Ahola and Helena Ahola
University of Oulu, Department of Anthropology and Art Studies, Cultural Anthropology, Pentti Kaiteran katu 1, Oulu,
Finland, Oulu University of Applied Sciences, School of Business and Information Management, Teuvo Pakkalan katu
19, Oulu, Finland
ABSTRACT
Retail banks are on the way towards real-time online banking independent of time and place enabled by the Internet. The
purpose of this paper is to get more understanding on online communication within e-retail banking contexts on issues
such as how to develop communication practices by using computer and video-conferencing systems, and the challenges
met when applying these kinds of tools for internal use in a bank. Insights based on online communication research, and a
case study of the experiences from a bank’s internal project are provided. Computer and video-conferencing systems
offer opportunities to banking business, because online collaborations save time, money and cause less environmental
impact than that of face-to-face meetings. In the case project the challenges were related to communication culture,
network capacity, technologies, and support. The project was, however, well planned and organized to meet these
challenges. Results of the project were encouraging. Although this project was to develop the bank’s internal processes, it
was also a first step in a process towards online real-time retail banking. This case of banking was successful, but it
showed that launching new media needs planning, training and support, and finally it may change culture. More research
is suggested on cultural changes, social media’s role in business use, and also semiotics viewpoints.
KEYWORDS
e-retail banking, online communication, computer and video-conferencing systems, media richness, media syncronicity
1. INTRODUCTION
Retail banks are on the way towards real-time online banking independent of time and place enabled by the
Internet. It is a challenge to provide excellent service and at the same time save costs in a very competitive
situation as retail banks are nowadays. In addition, internal efficiency of the organization is a prerequisite for
success. The purpose of this paper is to get more understanding on online communication within e-retail
banking contexts. In this paper the research questions are the following:
• How a retail bank can develop its communication practices by using computer and video-conferencing
systems?
• What kind of challenges are expected and met when applying these kinds of tools for internal use in a
bank?
These research questions are answered by providing insights based on online communication research,
and an exploratory, authentic case study of the experiences from a bank’s internal project of online
communications. The case is based on data obtained through participant observations and documents during
the year of 2010, when one of the authors was involved in this kind of a project as a development manager in
the bank.
In the research context of retail banking it is vital that communication practices can be developed without
sacrificing service quality and customer satisfaction. Using the internet for banking and customer relationship
management cannot substitute other service channels (Durkin et al. 2008). Multichannel business model for
serving customers has been largely adopted within banking business. Practically all the bank's customers
(97%) display some form of multi-channel behavior according to Cortiñas and Villanueva (2009). When
building trust in e-banking traditional service quality in branches is a necessary condition for the promotion
189
ISBN: 978-972-8939-51-9 © 2011 IADIS
of e-banking (Yap, Wong, Loh and Bak 2010).Thus offline and online banking support each other. Internet
banking service quality factors have been discovered in various studies. For example, Rod, Ashill, Shao and
Carruthers (2009) found that even in the absence of face-to-face interactions, reliability, responsiveness,
tangibles and empathy are still important to customers. Also Loonam and O’Loughlin (2008) found that due
to the remote form of the online encounter, many traditional service quality attributes were found to be
important. Despite all efforts to rationalize banking business, still human interaction is crucial in service
business (Herington and Weaven 2009). Also social perspectives have been found important for establishing
and maintaining desired relationships with customers (Park, Chung and Rutherford, 2011).
2. LITERATURE REVIEW
Media differ from each other in their characteristics (see Media Richness Theory by Daft and Lengel, 1986,
and Media Synchronicity Theory by Dennis and Valacich, 1999). Media richness is based on feedback
capability, the communication channels utilized, language variety, and personal focus. The more a medium
incorporates these characteristics, the richer it is (Daft and Lengel, 1986). Generally the richness level is
higher in oral than in written media and in synchronous rather than in asynchronous media. Dennis and
Valacich (1999) suggest that to successfully utilize media to accomplish a task, the most effective media
choices must consider the mix of two basic communication processes required for performing any type of
task. These processes focus on information transmission (conveying information) and information processing
(convergence on shared meaning). For example, face-to-face communications are highly synchronous,
whereas e-mail and e-bulletin-boards are of low synchronicity.
Concerning channels strategy recent research emphasizes the differences in various target groups and
situations. Danaher and Rossiter (2009) compare the traditional channels of television, radio and mail, as well
as the new digital channels of the Internet (e-mail) and cellular phones (SMS). They found that, although email is well established and widely used, the traditional channels of television, radio, newspapers and direct
mail retain their attributes of trust and reliability of information that make them still preferred by consumers.
Business receivers are more accepting of e-mail marketing communications than are consumers.
Nevertheless, face-to-face communication (discussions, seminars, visits to productions sites ) is still often
found to be the best way to communicate within business context (see e.g. Karjaluoto 2010).
Based on experiences of online collaborations in facilitating transdisciplinary sustainable development
research teams through online collaboration Dale, Newman, and Ling (2010) found out that in order for
online collaboration to be successful the employees must be very organized and have strong facilitation
skills. The geographical location of team members is not important, and participation costs are lower, and the
elimination of travel time is significant. In addition, electronic communications technologies can give
marginalized people a voice.
The influence of organizational context (competitive versus cooperative) and introductory meeting
communication medium (face-to-face versus electronic) on the development of trust and collaborative
behaviors of dyads communicating electronically introductory face-to-face interaction plays a more
important role in facilitating the development of trust and collaboration in a computer-mediated environment
when the context is competitive (see Hill, Bartol, Tesluk and Langa 2009). This has to be taken into account
in planning electronic communication.
Management’s role and culture is crucial in launching electronic channels into organizations. Digital
communication methods have changed how employees communicate and interact with their managers.
Mackenzie (2010) argues that traditionally the ways and behaviors of managers had developed and thrived
within face-to-face work environments, but as computer-mediated technologies continue to change the
boundaries of the business community, permit alternative worksites to increase, and the traditional workday
to disappear, the role of the manager has changed. Jackson and Philip (2010) suggest that an
incremental/evolutionary approach with ad-hoc improvisation made to culture and technology over time and
space makes for an effective techno-change solution. In general, worklife is going towards “anytime,
anywhere”. For example, homeworkers are inclined to remain connected to work at “anytime, anywhere” via
mobile phones” irrespective of time or location (Lal and Dwivedi 2010).
190
IADIS International Conference e-Commerce 2011
3. A CASE STUDY OF USING COMPUTER AND VIDEOCONFERENCING SYSTEMS
The context for studying online communication tools was a Finnish retail bank. New communication tools
for internal use, such as project work, management and coaching, and sales support, were taken into use in
2010. The central unit of the focal bank offered technical solutions, and acted as a service center for its local
member banks. The bank’s organization is very scattered throughout Finland in terms of their branch offices
and headquarters. Distances between regions, and even distances within a city like Helsinki are fairly long.
The central bank’s service development group launched computer and video-conferencing systems during
the year of 2010. Technology used in this operation consisted of 47 video-conferencing systems for training
and educational purposes, about 670 SharePoint-workspaces for projects and other purposes. Altogether,
about 10000 Ms Office Communicator Server users were involved (messages, voip calls, webinars etc).
The purpose of this project was to improve productivity of knowledge work by making the use of
information, and the ways of interaction more efficient. This was expected to bring immediate cost savings
and more efficient use of knowhow and expertise.
Activities of the project were planned professionally. Interaction and cooperation was promoted by using
new communication tools. Also a new communication strategy was created together by the Information
Management and the Sales Support. Some principles were agreed upon. For example, it was necessary to
make sure that the capacity of data networks for increasing use was sufficient. People were asked to
communicate by their own names (a cultural principle). As to travelling the main principle was that the first
meetings were held face-to-face and the rest online. Microphones and webcams were installed, and bigger
meeting rooms were equipped with computer and video-conferencing systems. Network files were replaced
by virtual workspaces. Further, everyone was to be reachable by instant messenging systems, and internal
calls were made by computers. Recommendations were given concerning the channel for different
communication situations (See Table 1).
Table 1. Recommendations for communication channels
Media/tool
Richness/synchronicity
To be used in
Messinging/ Ms Office
Communicator
Net meeting/Ms Office
Communicator
Video negotiation/HP
and Tandberg
equipment
Virtual workspace/Ms
Sharepoint
Intranet of the bank
low richness/ medium
synchronicity
high richness/ high
synchronicity
high richness/ high
synchronicity
group discussions
Webcasting/
service
from GoodMood
medium richness/ low
synchronicity
medium richness/ low
synchronicity
medium richness/ low
synchronicity
meetings (2-20
persons)
seminars, events
(20-60 persons)
project and group
work
internal
communication
seminars, events,
conferences (over
100 persons)
Support
from
internal
team
internal
team
external
support
internal
team
internal
team
external
support
Instead of
phone call, text message, email
travelling, phone call, text
message
travelling
network disk
e-mail, travelling
e-mail, printed media
travelling
Challenges were expected, one of them being the corporate culture. Management needs understanding of
the nature of knowledge work and the possibilities provided by new technology. There were also many other
issues to discuss on, such as confidence to open communication by one’s own name, network capacity,
installations, tools, and applications. Also previous experiences might reduce the interest in a new way of
working. Adequate support for the way of working online was a critical issue. The tools, training and support
were launched, the principles were put into practice, and technical things were made to work. It was
important to raise the users’ awareness, to motivate them, and to add their enthusiasm at the new way of
working. Information was offered in internal journals. A special day for launching these tools was organized.
Continuous visibility was arranged by posters, and a video trailer was made to raise interest. Support was
available.
Results of the project were encouraging. One example, “Management update event” in spring, 2010,
gathered over 550 participants from 20 districts via computer and video-conferencing systems. The whole
191
ISBN: 978-972-8939-51-9 © 2011 IADIS
concept of the event changed due to the new technology. It was possible to have local hosts for the event.
Votes were possible by text messages. Webcasts had been made just in case everything does not work.
Another big national event was “Management forum online” in summer, 2010. In this forum, the central bank
and the managers of the biggest cooperative banks met each other online from their own workplace or
conference room. This forum was very quickly organized, but well planned. Authentic feedback of the forum
was “a good way to bring up current and important issues, cost efficient and easy, adds opportunities to meet
each other more often”. These tools also offered an online meeting place for discussions, materials, and a
communication channel for supporting the organizational change of the central bank. The experiences from
this project made us also think that not only travelling costs can be reduced but also the characteristics of new
media can change communication culture and improve the quality of communication, and thus service
quality.
4. CONCLUSIONS AND DISCUSSION
Based on previous research and literature we can make some conclusions concerning banking business and
online communication. In developing communication practices a retail bank has to take into account the
realities of banking business, the service quality required and keeping its customers satisfied. Using the
internet for banking and customer relationship management cannot substitute other marketing channels.
Human interactions as well as social perspectives have been found important for establishing and maintaining
desired relationships with customers. Face-to-face communication and human interaction play a key role in
building trust.
Another viewpoint is the trend in communication tools and practices, which offer opportunities and
challenges also to banking business. Online collaborations save time, money and cause less environmental
impact than that of face-to-face meetings. They require organizing and strong facilitation skills. The
geographical location is not important, and participation costs are lower, and the elimination of travel time is
significant. Organizational context has to be taken into account in planning electronic communication to
develop of trust and collaborative behaviors. Management’s role and culture is crucial in launching electronic
channels into organizations. Digital communication methods have changed how employees communicate and
interact with their managers.
In the project of online communications tools the challenges were related to communication culture,
network capacity, technologies, and support. The project was well planned and organized to meet these
challenges. Results and experiences of the project were encouraging. The whole concept of the management
event organized has changed due to the new technology. Although this project was to develop the bank’s
internal processes, it was also a first step in a process towards online real-time retail banking. The next step
would be business customers, and finally consumers. Then it would be a key issue to develop communication
practices online without sacrificing service quality and customer satisfaction.
Theories of media richness and media synchronicity suggest that some media are richer and more
efficient than others and preferred by different target groups. Each medium has its advantages, but when to
use it depends on situations and contexts. This case of banking was successful, but showed that launching
new media needs planning, training and support. It may at the end change management culture. Managers are
encouraged to use online tools, but they have to believe in these tools and technologies to be able to sell these
ideas to their organization and finally to their customers.
This paper offered an illustrative example of one bank’s first steps towards virtual working. More
research is needed on cultural changes which may have started to develop and the consequences it has on the
bank’s operations. From communication perspective, besides media richness and synchronicity, it would be
worth studying emerging social media’s role in business use. It would also be useful to study cultural sign
processes, analogy, metaphor, signs and symbols (semiotics) to get more understanding of the new online
communication media.
192
IADIS International Conference e-Commerce 2011
REFERENCES
Cortiñas, R. C. & Villanueva, M. L. 2009. Understanding multi-channel banking customers, J Bus Res (2009),
doi:10.1016/j.jbusres.2009.10.020.
Daft,R. L. & Lengel, R. H. 1986. Organizational information requirements, media richness and structural design,
Management Science 32(5), 1986, pp. 554-571.
Dale,A., Newman,L. & Ling,C. 2010. Facilitating transdisciplinary sustainable development research teams through
online collaboration. International Journal of Sustainability in Higher Education Vol. 11 No. 1, 2010 pp. 36-48.
Danaher, P. J. & Rossiter, J. R. 2009. Comparing Perceptions of Marketing Communication Channels. Emerald
Publishing Ltd.
Dennis, A. and Valacich, J.S. 1999. Rethinking media richness: towards a theory of media synchronicity”, Proceedings of
the 32nd Annual Hawaii International Conference on System Sciences, Maui, HI, IEEE, Los Alamitos, CA, pp. 1-10.
Durkin, M., Jennings, D., Mulholland, G. & Worthington, S. 2008. Key influencers and inhibitors on adoption of the
Internet for banking. Journal of Retailing and Consumer Services 15 (2008) 348–357.
Herington, C. & Weaven, S. 2009. E-retailing by banks: e-service quality and its importance to customer satisfaction.
European Journal of Marketing Vol. 43 No. 9/10, 2009 pp. 1220-1231.
Hill, N. S., Bartol, K. M., Tesluk, P. E. &, Langa, G. A. 2009. Organizational context and face-to-face interaction:
Influences on the development of trust and collaborative behaviors in computer-mediated groups. Organizational
Behavior and Human Decision Processes 108 (2009) 187–201).
Jackson, S. &, Philip, G. 2010. A techno-cultural emergence perspective on the management of techno-change.
International Journal of Information Management 30 (2010) 445–456).
Karjaluoto, H. 2010. Digitaalinen markkinointiviestintä: Esimerkkejä parhaista käytännöistä yritys- ja
kuluttajamarkkinointiin. Helsinki: WSOYpro.
Lal, B. & Dwivedi,Y. K. 2010. Investigating homeworkers’ inclination to remain connected to work at “anytime,
anywhere” via mobile phones. Journal of Enterprise Information Management Vol. 23 No. 6, 2010 pp. 759-774.
Loonam, M. & O’Loughlin, D. 2008. Exploring e-service quality: a study of Irish online banking. Marketing Intelligence
& Planning, Vol. 26 No. 7, 2008, pp. 759-780.
Mackenzie, M. L. 2010. Manager communication and workplace trust: Understanding manager and employee
perceptions in the e-world. International Journal of Information Management 30 (2010) 529–541).
Park, J., Chung, H. & Rutherford, B. 2011. Social perspectives of e-contact center for loyalty building. Journal of
Business Research 64 (2011) 34–38).
Rod, M., Ashill, N. J., Shao, J. & Carruthers, J. 2009. An examination of the relationship between service quality
dimensions, overall internet banking service quality and customer satisfaction A New Zealand study. Marketing
Intelligence & Planning Vol. 27 No. 1, 2009 pp. 103-126.
Yap,K. B., Wong, D. H., Loh, C. & Bak, R. 2010. Offline and online banking –where to draw the line when building
trust in e-banking? International Journal of Bank Marketing Vol. 28 No. 1, 2010 pp. 27-46.
193
ISBN: 978-972-8939-51-9 © 2011 IADIS
A CHOREOGRAPHY LANGUAGE FOR BUSINESS
COLLABORATION: FROM ELECTRONIC
CONTRACTING TO INTER-ORGANIZATIONAL
ENACTMENT
Alex Norta
University of Helsinki, Department of Computer Science
Gustaf Hällströmin katu 2b, FI-00014, Helsinki, Finland
ABSTRACT
Automating business collaboration with means of service-oriented and cloud computing, promises significant efficiency
and effectiveness increases. The development of available choreography languages for automating inter-organizationally
connected business processes, is typically technology driven and focuses less on suitability for business collaboration. A
choreography describes the observable collaboration behavior between two or many business partners. Suitability means
that choreography languages comprise concepts to allow the formulation of real-world business-collaboration scenarios
in many perspectives. On the other hand, a choreography language must be expressive for automated setup and
enactment. Expressiveness means, the constructs of a choreography language have semantic clarity for ensuring uniform
enactment behavior by application systems. To address the gap, the paper applies a method for choreography-language
development with high suitability and expressiveness features for which we use a running example. The presented
choreography language has been applied in case studies with industry, may be totally or partially adopted for
choreographing business collaboration, and the language development approach is replicable for exploring strengths and
weaknesses of other existing choreography languages.
KEYWORDS
Choreography language, inter-organizational, B2B, eSourcing, business process, suitability, expressiveness.
1. INTRODUCTION
With the emergence of new automation paradigms such as service-oriented computing (SOC) and cloud
computing (CC), the way companies collaborate with each other experiences significant changes. SOC
(Allen et al., 2006) comprises the creation of automation logic in the form of web services. In CC
(Antonopoulos and Gillam, 2010), the Internet is used to access web-based applications, web services, and IT
infrastructure as a service. Web services (Alonso et al., 2004) are an important vehicle for enabling
organizations to cooperate with each other by inter-organizationally linking business processes (Norta and
Eshuis, 2010) with choreography languages for the purpose of electronic outsourcing.
With respect to existing choreography languages, the most notable are versions of the Business Process
Execution Language such as AbstractBPEL (Jordan et al., 2007a) and BPEL4Chor (Decker et al., 2007),Web
Services Choreography Description Language (WS-CDL) (Jordan et al., 2007b), Business Process Modeling
Notation (BPMN) (Decker and Barros, 2008; White et al., 2006) Let’s Dance (Zaha et al., 2006), ebXML
BPSS (ebXML Technical Architecture Project Team, 2001) and more recently, the Business Choreography
Language (BCL) (Motal et al., 2009). However, not only existing choreography languages but also other
XML-based languages for SOC have not been adopted by industry as expected. A reason is the approach for
language development that is often driven by politics and technical concerns resulting in suitability and
expressiveness deficiencies. This paper fills this gap with answering the question how to design a
choreography language that comprises concepts and properties relevant for enabling electronic business
collaboration.
194
IADIS International Conference e-Commerce 2011
The structure of the paper simultaneously reveals the method we use for the development of eSML and is
as follows. Section 2 presents a business-collaboration model that evolves from case studies in the research
project called CrossWork (Grefen et al., 2009;Mehandjiev and Grefen, 2010), namely eSourcing (Norta,
2007; Norta and Eshuis, 2010; Norta and Grefen, 2007a). In Section 3, the collaboration model is further
explored in a pattern-based way (Norta, 2007; Norta and Grefen, 2007b) with the objective of generating the
essential concepts needed for eSML to gain a high degree of business-collaboration suitability. Next,
assuming the control-flow perspective is dominant for automating business collaborations, we present in
Section 4 how high expressiveness is achieved in eSML, which is essential for, e.g., business-collaboration
verification, or consistent enactment behavior of different application systems. Section 5 presents the highlevel structure and concepts contained in eSML. Finally, Section 6 concludes this paper and discusses future
work.
2. BUSINESS COLLABORATION MODEL
In the EU research project CrossWork (Grefen et al., 2009), observing business collaborations of industry
partners reveals characteristic features. An original equipment manufacturer (OEM) organizes the creation of
value in an in-house business process that is decomposable into different perspectives, e.g., control flow of
tasks, information flow, personnel management, allocation of production resources, and so on.
(a)
(b)
Figure 1. (a) eSourcing in three-level business-process. (b) An overview of an eSML instantiation
Figure 1(a) depicts conceptually a three-level model as part of an eSourcing example (Norta, 2007; Norta
and Eshuis, 2010; Norta and Grefen, 2007a). The three-level model is instrumental for not forcing
collaborating parties into connecting their information infrastructure directly. The processes in Figure 1(a)
depict the control-flow perspective of the eSourcing concept that focuses on structurally harmonizing on an
external level the intra-organizational business processes of a service consuming and one or many service
providing organizations into a business collaboration. Important elements of eSourcing are the support of
195
ISBN: 978-972-8939-51-9 © 2011 IADIS
different visibility levels of corporate process details for the collaborating counterpart and flexible
mechanisms for service monitoring and information exchange.
The very top and bottom of Figure 1(a), show the internal levels of the service consumer and provider
where processes are directly enactable by legacy systems, e.g., by workflow management systems. Using
internal levels caters towards a heterogeneous system environment. Furthermore, processes on a conceptual
level are independent from infrastructure and collaboration specifics. In the center of Figure 1(a), the external
level stretches across the respective domains of eSourcing parties where structural process matching takes
place and for which eSML is applicable. Either collaborating counterparties project only interfaces, or parts,
or all of the respective conceptual-level processes to the external level for performing business-process
matching (Norta and Eshuis, 2010). A contractual consensus between collaborating parties comes into
existence when the projected processes are matched externally, i.e., when they are equal. Not projected
process parts remain opaque to the collaborating counterpart. The dashed monitoring arcs (Norta and Grefen,
2007a) in Figure 1(a) that connect the conceptual business processes via the external level into a
configuration, depict monitorability constructs that allow a flexible observation of service-provision progress
for the service consumer.
3. SUITABILITY EXPLORATION
For ensuring that eSML comprises concepts to allow the formulation of real-world business-collaboration in
relevant perspectives like control-flow, data-flow, resources and so on, the case-study findings culminating in
the eSourcing model of Figure 1(a), require more exploration. Contracts are the basis for business
collaboration between organizations and thus, taking pre-existing work about contract automation (Angelov,
2006) into account for the eSML suitability exploration, we pursue a pattern-based method.
In response to Section 2, the foundation of eSML is the XML-based language ECML (Electronic
Contracting Markup Language) (Angelov, 2006). A contract is a legally enforceable agreement, in which two
or more parties commit to certain obligations in return for certain rights (Reinecke et al., 1989). Contracts are
instruments for organizing business collaborations. Electronic contracting aims at using information
technologies to significantly improve the efficiency and effectiveness of paper contracting, allowing
companies to support newly emerging business paradigms, while still being legally protected.
Although ECML permits business-process definitions, it lacks a clear collaboration-model support as
proposed by eSourcing, which we resolve with an extension into eSML. Inheriting concepts from ECML, at
the highest abstraction, a contract in eSML answers three conceptual questions i.e., the Who, Where, and
What question (Angelov, 2006). The Who-answer concerns the actors that participate in the contract
establishment and enactment. The Where-answer specifies the context of a contract, e.g., the legal context,
business context. The What-answer models the exchanged values, rules, and the exchange processes.
The chosen approach for suitability exploration uses an established perspective taxonomy from which we
extract a set of conceptually formulated patterns (Norta, 2007). The patterns are the basis for deducing the
constructs that become part of a suitable choreography language. The pattern summaries below are due to
page limitation but we refer to (Norta and Grefen, 2007a) for detailed pattern specifications and to (Norta,
2007) for collaborating counterparty-interaction patterns during setup.
4. EXPRESSIVENESS EXPLORATION
Semantic clarity for choreography-language constructs, ensures that different application systems create
uniform enactment behavior. For eSML, we consider control-flow in business collaborations as the best
explored perspective based on which the expressiveness may be expanded for other perspectives. We adopt
XRL (eXchangable Routing Language) (Aalst and Kumar, 2003) for realizing semantically clear controlflow, which is contained in the schema definition (Norta, 2007) of eSML for the purpose of specifying the
contractual spheres of a service provider and one or many service consumers.
XRL is an instance-based workflow language that uses XML for the representation of process definitions
and Petri nets for its semantics. The definition of XRL (Aalst and Kumar, 2003) contains as routing elements
a catalog of formalized control-flow patterns (Aalst et al., 2000; Kiepuszewski et al., 2003) that result in
196
IADIS International Conference e-Commerce 2011
strong control-flow expressiveness. These routing elements are equipped with Petri-net semantics (Aalst et
al., 2001), namely, every routing element stands for an equivalent workflow net (WF-net) (Aalst, 1997; Aalst,
1998; Ellis and Nutt, 1993) that can be connected with other routing elements into a bigger WF-net. The
syntax of XRL is completely specified in a DTD and schema definition (Aalst and Kumar, 2003; Norta,
2007).
5. REALIZATION IN ESML
After explaining the approach for developing eSML through exploring methodologically the suitability and
expressiveness prerequisites, we show the high-level structure of the business-collaboration language. As
explained earlier, eSML uses parts of the ECML-schema (Angelov, 2006) as a foundation. Figure 1(b)
reflects this fact by considering an entire eSML instance as a contract between collaborating parties and by
structuring the eSML content into the blocks Who, Where, and What, as explained in Section 3. We refer to
(Norta, 2007) for elaborate code examples and detailed models.
The bold typed eSML-definitions in Figure 1(b) are extensions and modifications that are not part of the
ECML foundation. In the Who-block, extensions for eSML are the resource definition and the data definition.
In the What-block, the XRL adoption permits the use of control-flow patterns for business-process definitions
that have semantic clarity. However, extensions have taken place for adopting the conjoinment nodes and for
linking to the resource- and data-definition sections of eSML that are both based on respective pattern
collections (Russell et al., 2004a; Russell et al., 2004b).
The life-cycle-mapping block is for specifying semantic equivalence between, firstly, the lifecycles stages
of the inter-organizationally harmonized business processes, and secondly, for the life-cycle stages of tasks
from the opposing domains. To establish a semantic equivalence relationship, the second part of the mapping
block focuses on the mapping of task labels in the active_node_label_mapping tag. The
monitorability section of Figure 1(b) influences how much of the enactment phase is perceived by the service
consumer. For the complete eSML-schema, examples and evaluations, we refer to a CrossWork case study
(Mehandjiev and Grefen, 2010, Norta, 2007.
6. CONCLUSION
This paper applies a method for developing a choreography language for electronic business collaboration.
eSML results from this method where case study-based suitability and expressiveness exploration ensures the
language comprises essential collaboration concepts with a foundation for semantic clarity. We use a subset
of ECML as a base language for eSML. Assuming that the control-flow perspective in a business
collaboration is best explored, the expressiveness in eSML we address by adopting WF-net based semantics,
which is verifiable with tool support. In an application with industry, eSML demonstrates its ability to
specify elaborate business collaborations better than other industry standards. Limitations for eSML result
from mapping from an external collaboration level with eSML to inhouse conceptual business-process levels
using industry standards.
For future work, we plan to carry out case studies with eSML in research projects about designing cloudcomputing infrastructures for mobile business collaboration. In those studies, we want to address
expressiveness extensions into more business-collaboration perspectives than control-flow and make eSML
suitable for mobile business services.
REFERENCES
Aalst,W. (1997). Verification ofWorkflow Nets. In Az´ema, P. and Balbo, G., editors, Application and Theory of Petri
Nets 1997, volume 1248 of Lecture Notes in Computer Science, pages 407–426. Springer-Verlag, Berlin.
Aalst,W. (1998). The Application of PetriNets toWorkflow Management. The Journal of Circuits, Systems and
Computers, 8(1):21–66.
197
ISBN: 978-972-8939-51-9 © 2011 IADIS
Aalst, W., Hofstede, A., Kiepuszewski, B., and Barros, A. Workflow Patterns Home Page.
http://www.workflowpatterns.com.
Aalst, W., Hofstede, A., Kiepuszewski, B., and Barros, A. (2000). Advanced Workflow Patterns. In Etzion, O. and
Scheuermann, P., editors, 7th International Conference on Cooperative Information Systems (CoopIS 2000), volume
1901 of Lecture Notes in Computer Science, pages 18–29. Springer-Verlag, Berlin.
Aalst, W. and Kumar, A. (2003). XML Based Schema Definition for Support of Inter-organizational Workflow.
Information Systems Research, 14(1):23–47.
Aalst, W., Verbeek, H., and Kumar, A. (2001). XRL/-Woflan: Verification of an XML/Petri-net based language for interorganizational workflows (Best paper award). In Altinkemer, K. and Chari, K., editors, Proceedings of the 6th
Informs Conference on Information Systems and Technology (CIST-2001), pages 30–45. Informs, Linthicum, MD.
Allen, P., Higgins, S., McRae, P., and Schlamann, H., editors (2006). Service Orientation: Winning Strategies and Best
Practices. CAMBRIDGE UNIVERSITY PRESS.
Antonopoulos, N. and Gillam, L., editors (2010). Cloud Computing: Principles, Systems and Application. Springer.
Alonso, G., Casati, F., Kuno, H., and Machiraju., V. (2004). Web Services: Concepts, Architectures and Applications.
Springer-Verlag Berlin Heidelberg.
Angelov, S. (2006). Foundations of B2B Electronic Contracting. Dissertation, Technology University Eindhoven,
Faculty of Technology Management, Information Systems Department.
Decker, G. and Barros, A. (2008). Interaction modeling using BPMN. In BPM’07: Proceedings of the 2007 international
conference on Business process management, pages 208–219, Berlin, Heidelberg. Springer-Verlag.
Decker, G., Kopp, O., Leymann, F., and Weske, M. (2007). BPEL4Chor: Extending BPEL for Modeling Choreographies.
In PROCEEDINGS INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), pages 296–303. IEEE
Computer Society.
ebXML Technical Architecture Project Team (2001). ebxml technical architecture specification.
Ellis, C. and Nutt, G. (1993). Modelling and Enactment of Workflow Systems. In Marsan, M. A., editor, Application and
Theory of Petri Nets 1993, volume 691 of Lecture Notes in Computer Science, pages 1–16. Springer-Verlag, Berlin.
Grefen, P., Eshuis, R.,Mehandjiev, N., Kouvas, G., andWeichhart, G. (2009). Internet-based support for processoriented
instant virtual enterprises. IEEE Internet Computing, 13(6):65–73.
Jordan, D., Evdemon, J., Alves, A., and Arkin, A. (2007a). Business Process Execution Language for Web-Services 2.0.
http://www.oasisopen.org/committees/download.php/10347/ wsbpelspecification-draft-120204.htm.
Jordan, D., Evdemon, J., Alves, A., and Arkin, A. (2007b). Web Services Choreography Description Language 1.0.
http://www.w3.org/TR/2004/ WD-ws-cdl-10-20041217/.
Kiepuszewski, B., Hofstede, A., and Aalst,W. (2003). Fundamentals of Control Flow in Workflows. Acta Informatica,
39(3):143–209.
Mehandjiev, N. and Grefen, P., editors (2010). Dynamic Business Process Formation for Instant Virtual Enterprises.
Springer.
Motal, T., Zapletal, M., and Werthner, H. (2009). The Business Choreography Language (BCL) - A Domain- Specific
Language for Global Choreographies. In SERVICES-2 ’09: Proceedings of the 2009 World Conference on Services II, pages 150–159, Washington, DC, USA. IEEE Computer Society.
Norta, A. (2007). Exploring Dynamic Inter-Organizational Business Process Collaboration. PhD thesis, Technology
University Eindhoven, Department of Information Systems.
Norta, A. and Eshuis, R. (2010). Specification and verification of harmonized business-process collaborations.
Information Systems Frontiers, 12:457–479. 10.1007/s10796-009-9164-1.
Norta, A. and Grefen, P. (2007a). Discovering Patterns for Inter-Organizational Business Collaboration. International
Journal of Cooperative Information Systems (IJCIS), 16:507 – 544.
Norta, A. and Grefen, P. (2007b). Discovering Patterns for Inter-Organizational Business Collaboration. International
Journal of Cooperative Information Systems, 16(3/4):507–544.
Reinecke, J., Dessler, G., and Schoell, W. (1989). Introduction to Business - A Contemporary View. Allyn and Bacon.
Russell, N., Hofstede, A., Edmond, D., and Aalst, W. (2004a). Workflow Data Patterns. QUT Technical report, (FIT-TR2004-01).
Russell, N., Hofstede, A., Edmond, D., and Aalst, W. (2004b). Workflow Resource Patterns. BETA Working Paper
Series, WP 127, Eindhoven University of Technology, Eindhoven.
Zaha, J., Barros, A., Dumas, M., and ter Hofstede, A. H. (2006). Let’s dance: A language for service behavior modeling.
In Meersman, R. and Tari, Z., editors, On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, and
ODBASE, volume 4276 of Lecture Notes in Computer Science, Montpellier, France. LNCS Springer.
198
IADIS International Conference e-Commerce 2011
CHANGES IN CONSUMER ACCEPTANCE OF DIRECT
BANKING IN GERMANY FOLLOWING THE FINANCIAL
CRISES
Dirk Braun1, Jan Kaehler1 and Jürgen Karla2
RWTH Aachen University,Templergraben 64, 52062 Aachen, Germany
1
Chair of Decision Theory and Financial Services
2
Chair of Business Information Systems and Operations Research
ABSTRACT
The traditional foundation of “trust” on which stable and successful business relations are built has been severely
damaged – particularly in the finance industry. Many investors have lost confidence in the individual competence and
integrity of their financial advisors as well as losing their trust in the institution “bank” in general, and are thus seeking
new paths to follow with regard to their financial transactions or their investments. Alternative distribution channels – in
particular that of direct internet banking – have profited from this behaviour. Banks record an increased use of online
banking services, since these allow clients and investors do autonomously implement their banking activities, without the
need of advisors, and potentially in a private environment. This leads to a change in private customer behaviour in the
domain of direct banking.
KEYWORDS
Direct Banking, Trust in financial consultants, investment advisory services, lack of confidence
1. INTRODUCTION
The forces which were unleashed during the global financial crisis have dealt the financial markets heavy
blows – the final economic outcomes of which cannot yet be foreseen. In addition, fundamental social changes with regard to consumer behaviour, values, and relationships between individuals have been precipitated
(Shiller 2008, p. 20). Owing to profound experiences arising from the impact of the financial crisis, long-term
and stable customer relationships are (again) playing an increasingly important role for companies in all the
different areas of the economy. Business relationships tend to be based on substantial trust between the
individuals involved. Yet it is precisely this traditional foundation of “trust” on which stable and successful
relationships are built that has been severely damaged – particularly in the finance industry. Many investors
have lost confidence in the individual competence and integrity of their financial advisors as well as losing
their trust in the institution “bank” in general, and are thus seeking new paths to follow with regard to their
financial transactions or their investments (Sattler 2009, p. 25ff.).
Here, we present the key findings of a study which has examined potential consequences of the observed
changes in the behaviour of private investors. Since many customers have turned away from traditional banking advisory services, we could expect alternative distribution channels – in particular that of direct internet
banking – to have profited from this behaviour. A credible development would thus be an increased use of
online and direct banking services, since these allow clients and investors do autonomously implement their
banking activities, without the need of advisors, and potentially in a private environment, because customers
have lost faith in the expertise of banking experts. Previous publications (up to the end of 2010) on the topic
of the financial crisis have paid little attention to the change in private customer behaviour in the domain of
direct banking. Almost all of the publications which deal with customer behaviour in direct banking appeared
before the financial crisis and thus fail to deal with these specific problems. In order to identify and analyze
the changes in customer relationships, we shall first examine their great significance for the finance industry
(Section 2). In addition, we identify some basic information about the concept of direct banking as a substi-
199
ISBN: 978-972-8939-51-9 © 2011 IADIS
tute for traditional banking advisory services (Section 3). Then we present the design and the key results of
the study (Section 4). Finally, we analyze the expected significance for the development of direct banking
and what people expect from their banks (Section 5).
2. THE RELATION BETWEEN CLIENT AND ADVISOR
The literature on the analysis of the client-advisor relationship offers two main frameworks. From Sniezek
and Buckley we have the term “judge-advisor system (JAS)”, which differentiates between the very different
roles of client (judge) and the advisor. The decision process entails three steps: (1) the initial decision by the
client, (2) the advisor providing the recommendation and finally (3) the final decision by the client
(Sniezek/Buckley 1995, p. 159ff.). An alternative approach is that of Jungermann, who provided the “advice
giving and taking” model – known as AG&T. Here, we have a dyadic decision situation, i.e. client and
advisor are both in a decision-making process involving a mutual sharing of information (Jungermann 1999
and Belting 2008, p. 21). The advisor’s recommendation depends decisively on the client’s initial action and
information provision. The client then has to choose whether to accept the advisor’s recommendation or
reject it. The problem in this situation is the double knowledge asymmetry. Since the advisor knows only a
few details of the problem at the onset, at the end of the advisory session, the client is at a disadvantage with
regard to a competent assessment of the quality of the recommendation. The client can only depend on the
advisor’s references or trustworthiness: the risk involved with regard to the outcome of the decision remains
(Currall/Judge 1995, p. 153). Trust is, then, the central aspect for acceptance by a client.
The question arises as to why – in the first place – a client should make an initial decision in favour of
acquiring advice for a later advisory service by sacrificing free time and – in some cases – money, if she or
he is not going to be in a position to assess the quality of the resulting recommendation. The motives for
acquiring advice are complex, so that at this point we can only discuss a few of them which are relevant for
explaining the changes in client attitudes in the wake of the financial crisis. The main aspect is certainly that
of the wish to compensate for a lack of knowhow with the acquisition of advice, or at least to be able to take
other arguments and reasoning into consideration, which would be otherwise overlooked in the decision
making process. Sometimes an advisory service (only) leads to an increased subjective feeling of security. In
addition, people like to consult an advisory service if they are themselves not in a situation to make the
decision – be it due to time, capacity or complexity reasons. Advisors usually specialize in one area and are
methodologically trained so that they can find a problem solution much more quickly and efficiently than
someone who is faced only once with a specific problem. A last but no less important aspect is that people
like to share responsibility in order to avoid having blame apportioned to them later or having to come to
terms with their own wrong decisions (Belting 1998, p. 23 ff. and Heath/Gonzales 1995, p. 305).
Until now, the above mentioned arguments have led to a continuous increase in the call for advisory
services in the finance industry because the relevant topics have become increasingly complex due to the
legal and fiscal frameworks and an expanding range of financial products. Customers, on the other hand,
have less time to address these issues with the required intensity. Banks and their financial advisors enjoyed
for their part a high status in society. All of these conditions, however, were shaken to the core by the
financial crisis, as were the belief in the competence and quality of the advisors and the general confidence in
banks and in the financial system. Apart from real-life experiences, this attitude is linked to negative future
expectations (Akerlof/Shiller 2009, p. 31ff.). Many clients have come to the conclusion that financial
advisory services cannot offer them a reliable return because banks are looking after their own interests first
and the advisors are no more competent than they themselves are. On account of a lack of confidence,
customers do not make use of advisory services and prefer to rely on their own decisions (only).
3. DIRECT BANKING AS POSSIBLE SUBSTITUTE FOR TRADITIONAL
FINANCIAL ADVISORY SERVICES
The term “direct banking” (DB) covers all systematic activities involved in the provision of banking services
via direct communication channels without any intermediaries. The main medium used is modern telecommunications (internet, telephone/mobile phone, fax etc.) DB belongs, then, to the domain of e-commerce, and
200
IADIS International Conference e-Commerce 2011
primarily targets private households. Its distribution channels are regarded as independent channels for specific market development and as fully fledged alternatives rather than as supplementary means of communication that support traditional distribution channels. Customer and bank communicate with each other by utilizing impersonal media. The direct selling of banking products and services is foremost. Since DB disposes
with intermediate selling or in-house stages, it can be seen as a “puristic” form of banking. When clients
make use of a product or service, they are not on a banking institution’s premises and exploit – to a much
greater degree than with branch-banking – the temporal and spatial availability of products and services. The
customer is always the one who takes the initiative.
The distribution channel “direct banking” has three main properties which distinguish it from traditional
banking: (1) it is cheaper, because the bank rewards its clients for their deliberate foregoing of their right to
intensive, personal advisory services. (2) it is fast because pro-cessing time is – on account of the direct
distribution channel – quicker than with traditional banking. (3) it is simple, so that customers can manage
their own banking activities with little problem (Raabe 2008, p. 9).
We will not provide a detailed differentiation between the individual direct banking products and services
with regard to their distribution or range. Instead, we shall only provide a basic differentiation between tradition banking products, such as account-managing, payments and simple product deals (e.g. fixed- interest
investments). It should also be noted here that the amount of products on offer has increased considerably,
and will presumably continue to increase on account of the increasing demand, so that DB will be used in
more and more areas. DB products and services have met with increased consumer acceptance in broad areas
of the population on account of the daily use of modern media in people’s professional and private lives, and
also a reduction of customer loyalty coupled with a willingness to switch banks in the wake of changes in
public opinion stemming from the scandals, misselling and financial crises of the last 15 years (Jung 2005, p.
68, Raabe 2008, p. 19ff. and Schmeisser/Fuchs 2008, p. 133ff.).
4. CHANGINGS IN THE USEAGE AND ACCEPTANCE OF DIRECT
BANKING FOLLOWING THE FINANCIAL CRISIS
In the above, we have already identified general changes in the framework conditions and customer requirements with regard to the expected development of DB. We have also observed that confidence and trust are
key for the acceptance of financial advisory services by private customers, and that traditional banking
advisory services are (at least currently) losing their importance and many customers are searching for new
paths for procuring information and investing their money. In the following, we will look at the design of our
survey and its results, which provide information on the concrete impacts of the financial crisis on the
behaviour of private DB customers in Germany.
4.1 Design of the Survey
In the summer of 2010, 458 persons aged between 18 and 60 received an online questionnaire asking them
about their current individual banking behaviour in comparison to their behaviour in 2007, (i.e. before the
outbreak of the financial crisis). 67% of the respondents were men, 33% women. Most of them were aged
between 18 and 25 (60%) and 26 to 35 (33%). Most of them were students (60%) and employed/self
employed (30%). Their customer relationships with German banks correspond roughly with the market
shares of the institutions in the German retail banking segment. Although the share of males, students and
young customers is above average with regard to the German population as a whole, the sample can still be
seen as valid because it corresponds closely to the average figures of DB users on the one hand. On the other
hand, when we examine the results of the individual groups, only the group of employed/self-employed
diverges from the total group, and this group is presented and elucidated separately here.
In particular, our questions targeted the following aspects (in 2007 and in 2010, respectively):
• General usage of banking products and services (regardless of type of distribution channel)
• Specific usage of banking products and services via direct banking (differentiating between banking and
brokerage) and changes in the intensity of usage
• Reasons for using banking products and services via direct banking
201
ISBN: 978-972-8939-51-9 © 2011 IADIS
In addition, there were also questions regarding the impact of the financial crisis on bank relationships
with regard to:
• Loss of confidence in banks
• Changes in the belief in advisor competence
• Customer loyalty and willingness to switch banks
• Changes in the procuring of information and in decision making processes.
4.2 Essential Findings
First, we present the results with regard to changes in consumer behaviour during the financial crisis, before
looking at the reasons. We can see various differences in the consumer behaviour of the respondents. Whilst
telephone banking is still used by 13% of them, online banking and direct brokerage have grown considerably by 5% and 6%, respectively. The general usage of direct banking products and services has increased by
6%: 90% of the respondents use DB products and services.
before the financial crisis
currently
13%
13%
Telephone banking
83%
88%
Internet banking
8%
Direct brokerage
14%
16%
None of these
10%
Figure 1. Consumer behaviour with regard to direct banking (complete sample)
However, these results do not enable us to ascertain whether the changes over the last few years were
caused by the financial crisis, or at least influenced by it. In order to be able to evaluate the results in more
detail, the respondents were required to state their reasons for direct banking both before and after the
financial crisis.
before the financial crisis
Financial crisis-related
3%
11%
33%
Cost saving
40%
44%
49%
55%
Control
Other
85%
89%
83%
86%
Time saving
Disaffection with advisory services
currently
4%
9%
18%
12%
complete sample
63%
47%
58%
4%
19%
16%
10%
employees/self employed
Figure 2. Reasons behind the usage of direct banking
One important result is that dissatisfaction with advisory services and the status of “control” has risen by
5%, respectively, as figure 2 shows. However, it would appear that more general trends – such as saving time
and costs – have just as much influence if not more as the financial crisis. The group of employees/self
employed focuses more on the aspects of “control” and “time saving”. With regard to “costs”, this can be
explained – in contrast with the students – by the fact that students can normally make use of free or greatly
reduced offers and tariffs, which banks do not make available to people who are employed/self employed.
With regard to the greater importance of “control”, the reason behind this already provides a clue to later
results. 11% of the employed/self employed group stated that the financial crisis had an impact on their usage
of direct banking.
202
IADIS International Conference e-Commerce 2011
Also, questions were formulated which would reveal a potential loss of client confidence in their house
bank and a potential lost of confidence in the competence of the banking advisors stemming from the
financial crisis. The results of these questions show big differences between the groups of students and
employed/self employed. This can be explained by the fact that only about 20% of the surveyed students had
their own financial advisor at their bank and that as they also had less money available for investment, they
were not likely to encounter a loss of trust or confidence in a bank or financial advisor. With regard to the
concrete impact of the financial crisis on consumer behaviour in direct banking, the group of employed/self
employed respondents is, then, more suitable for analysis. In the following figure 3, we show the results of
those questions regarding a general loss of confidence and trust during the course of the financial crisis and
the consequences which the respondents have drawn from it all. About a third of them state that they have
lost confidence in their house banks. This figure reflects the deep impact of the financial crisis on private
investors: 13% of respondents who have lost confidence switched to other banks. A further 29% became
customers of another bank in addition to their house bank.
yes
no
29%
Lack of confidence arising from financial crisis
Switching of another bank owing to lack of confidence
customer at additional bank
71%
13%
58%
29%
Figure 3. Lack of confidence and consequences arising from the financial crisis (employees/self employed)
The lost of confidence in advisors is particularly visible in the securities business, which is very adviceintensive, particularly as big changes have been made to the classic process of securities orders in branches
and per direct brokerage. The amount of employed and self-employed private customers taking advantage of
fee-free advice services has dropped by almost a third, and advisory services in branch banks, which are –
unlike direct brokerage – not free of charge – have dropped by almost a half. The percentage of users of
direct brokerage, on the other hand, has almost doubled. These figures reflect the changed consumer
behaviour with the wish to have control and to save costs, on the one hand, and the impression that advisory
services are not likely to be of much use, on the other.
before the financial crisis
12%
Implementing transactions in securities via direct brokerage
Usage of advisory services via direct banking
Implementation of transactions in securities via branch bank
Usage of advisory services in branch bank
5%
current
26%
9%
39%
20%
30%
42%
Figure 4. Impact of the financial crisis to the usage of securities advisory services and direct brokerage (e./s. e.)
5. CONCLUSION
The financial crisis has had a positive impact on the usage of direct banking. The evaluation of the empirical
survey, taking all participants into consideration, the largest group of which was that of students (ca. 60% of
458 respondents), did not immediately lead to a decisive correlation between the outbreak of the financial
crisis and the increased usage of direct banking. In contrast, the differentiated evaluation of the group of
employed/self employed (approx. 30% of the respondents) confirmed the positive impact of the financial
crisis on direct banking. The financial crisis has led to a loss of confidence of a lot of customers in the
advisory actors and the banks themselves. 11% of the surveyed employed/self employed stated that the
financial crisis had led to their increased usage of direct banking. The assumption, on which this survey was
based, that is, that there could be a correlation between the financial crisis and the increased usage of direct
203
ISBN: 978-972-8939-51-9 © 2011 IADIS
banking, was confirmed. Apart from general reasons, such as cost savings, in particular a greater desire for
control and a lower estimation or a loss of confidence in the advisory services of banks can be mentioned.
The framework conditions of the financial industry have been permanently and unquestionably changed.
A lot of customers and investors feel let down by their banks and the actors there. Classical values, such as a
feeling of responsibility and trust, have come back into the focus of a lot of investors following the outbreak
of the crisis. Furthermore, the banking market is becoming more transparent and competition is increasing.
The binding of a customer to a house bank and its network of branches or individual advisors continues to
diminish because the range of products and services is so extensive and hard to distinguish between for most
private customers, and alternatives such as direct banking are becoming increasingly competitive. These
changed framework conditions have led to a general change in consumer demand for products and services.
Additionally, the increasing development of the internet as a distribution channel will allow direct banking in
e-commerce to increase in the future. For example, 28% of all the persons surveyed said that they intended in
future to only use direct brokerage. There is, of course, also the opportunity of using mobile banking for banking transactions. Web-enabled mobile phones, such as Apple’s iPhone, allow customers unlimited temporal
and spatial access to the online banking portals of the respective banks. Any further developing of this
technology can consequently have a positive impact on the usage of direct banking. A core area of banking –
investment advisory services – came under great criticism from the media and from experts. This empirical
survey has shown that a lot of customers are dissatisfied with the advisory services available and are seeking
alternatives. The banks are responding to the drop in the call for their advisory services by focusing on
quality again. The greatest challenge to the banks will – in the future – be that of binding customers to them.
The results of this study have shown that this can only happen if the ranges of products and services become
very transparent with regard to the reasons for their being recommended and to the costs involved – quite
independent of the distribution channel – thus meeting the increased consumer need for “control”.
REFERENCES
Akerlof, G. A., Shiller, R. J., 2009. Animal Spirits. How human psychology drives the economy and why it matters for
global capitalism. Princeton University Press, Princeton, New Jersey, USA.
Belting, J., 2008. Kontrolle ist gut, Vertrauen ist besser: die Bedeutung von Vertrauen in Beratungssituationen am
Beispiel der Anlageberatung. VDM Verlag Dr. Müller, Saarbrücken, Germany.
Currall, S.C., Judge, T.A., 1995. Measuring trust between organizational boundary role persons. In: Organizational
Behavior and Human Decision Processes, 64, pp 151-170.
Heath, C., Gonzalez, R., 1995. Interaction with others increases decision confidence but not decision quality: Evidence
against information collection views of interactive decision making. In: Organizational Behavior and Human
Decision Processes, 61, pp 305-326.
Jung, C., 2005. Online Banking: Der Zuwachs ist ungebrochen. In: Die Bank, Vol. 11, p 68.
Jungermann, H., 1999, Advice giving and taking. Proceedings of the 32nd Hawaii International Conference on System
Sciences. Maui, Hawaii: Institute of Electrical and Electronics Engineers, Inc. (IEEE).
Raabe, M., 2008. Innovatives Bankmarketing – Erfolgsstrategien im Direct Banking, Universität Kassel, Germany.
Sattler, N. C., 2009. Finanzkrise – Ihre Entstehung und bisherige Folgen sowie mögliche weitere Auswirkungen und
Zukunftsperspektiven für den deutschen Finanzmarkt, AVM Verlag, München, Germany.
Schmeisser, W., Fuchs, C., 2008. Zum Wandel der Finanzdienstleistungsbranche durch innovative Dienstleistungen von
Non- und Nearbanks. In: Zum Wandel der Finanzdienstleistungsmärkte – dargestellt anhand ausgewählter
Bankinstrumente und Finanzdienstleistungsinnovationen, Rainer Hampp Verlag, München, Germany.
Shiller, R. J., 2008. The Subprime Solution: How Today's Global Financial Crisis Happened, and What to Do about It.
Princeton University Press, Princeton, New Jersey, USA.
Sniezek, J.A., Buckley, T., 1995. Cueing and cognitive conflict in judge-advisor decision making. In: Organizational
Behavior and Human Decision Processes, 62, pp 159-174.
204
Reflection Papers
IADIS International Conference e-Commerce 2011
IMPACT OF E-GOVERNMENT ON THE PRIVATE
SECTOR AND THE ROLE OF PRIVATE SECTOR IN THE
E-GOVERNMENT INITIATIVES
Hussain Kassem Wasly1 and Dr. Ali AlSoufi2
1
Asia e University, Saudi Arabia, Jubail
2
University of Bahrain, Bahrain
ABSTRACT
Recently, there have been large investments in the field of e-Government (e-Gov) in all parts of the world including and
specifically in GCC countries. However, little is known about the impact of investments in e-Gov, due in part to the lack
of guidance evaluation, and the absence of appropriate measurement tool for the impact of e-Gov on the private sector, as
well as the lack of effective management to resolve or eliminate the barriers to e-Gov which led to the failure or delay of
many projects, especially in developing countries and third world countries. This paper is primarily concerned in
determining the impact of e-Gov on the private sector (PS) in Saudi Arabia (SA) and the role of PS in supporting,
promoting and consuming e-Gov services. The paper takes SA as a case study due to a huge investment on its e-Gov
program that named Yasser to identify the challenges, barriers and opportunities of implementing the G2B services.
Despite such investments, SA PS is still in its early adoption of e-Gov services and resistance to it is very much
noticeable. A combination of Modified Technology Acceptance Model (TAM) and DeLone and McLean's of IS success
will be utilized as a research model, and e-Gov Economics Project (eGEP) measurement framework to measure “net
benefits” for G2B services. The result will help Yasser decision makers to recognize the critical factors that are
responsible for G2B success. On the other hand, it will enable them to measure the impact for e-Gov on the private
sector. Furthermore, it will benefit the private sector to better utilize the e-Gov services while positively contributing to
improvement and enhancement of e-Gov program.
KEYWORDS
E-Government, G2B, eGEP Measurement Framework, TAM
1.
INTRODUCTION
The financial and economic crisis beginning in 2008 has forced government and private sector as well to
focus on how to maximize saving costs and providing good services. Countries spend millions and even
billions on IT and e-Gov programs, for example in 2009; the US government is expected to spend more than
$71 billion on IT, with an estimated 10 percent of it related to e-Gov which means around 7.1 billion for eGov. E-Government (e-Gov) refers to the use of information and communication technologies, particularly
the Internet, to deliver government information and services (ANOA, 2006). E-Gov can create significant
benefits for citizens, businesses, and governments around the world. Nowadays, countries spend millions and
even billions on IT and e-Gov programs, for example in 2009; the US government is expected to spend more
than $71 billion on IT, with an estimated 10 percent of it related to e-Gov which means around 7.1 billion for
e-Gov. (2009 Federal IT Budget; Federal Enterprise Architecture taxonomy for 2008 budget; McKinsey
Estimates). In 2010; the SA government spends more than $3 billion on ICT. $800 million for e-Gov
program. According to Yasser the vision for Saudi Arabia's e-Gov initiative was detailed by determining ten
objectives to be achieved by the end of 2010. Those objectives are as the following: 1) Provide the top
priority services (150) at world class level of quality electronically.2) Deliver services in a seamless and user
friendly way and at highest standards of security. 3) Make services available to everyone in the Kingdom
and allow 24/7 access from cities as well as countryside and even outside the country. 4) Realize 75%
adoption rate with respect to the number of users. 6) Ensure 80% user satisfaction rating for all services
provided electronically. 6) Deliver all possible official intra-governmental communication in a paperless
207
ISBN: 978-972-8939-51-9 © 2011 IADIS
way. 7) Ensure accessibility of all information needed across government agencies and storage of
information with as little redundancy as possible. 8) Purchase all goods and services above a reasonable
value threshold thought e-procurement. 9) Contribute to establishment of information society in the Kingdom
thought spreading information, knowledge and use of e-services. 10) Help improve use of country’s assets
and resources by increasing society's productivity in private, business and public sector. So, there have been
large investments in the field of IT and e-Gov in all parts of the world. However, little is known about the
impact of investments in e-Gov, due to lack of guidance evaluation, and the absence of appropriate
measurement tool for the impact of e-Gov on the private sector, as well as the lack of effective management
to resolve or eliminate the barriers to e-Gov which led to the failure or delay of many projects, especially in
developing countries and third world countries. Many government projects are failing for various reasons.
These include unclear business cases, misaligned accountability and incentive structure, insufficient
management or technical expertise by external service providers, poor project management discipline,
inadequate performance management practices and tracking systems, ineffective governance, and uncertain
budget environments (Gartner, 2006). According to the UN's 2010 e-Gov readiness index, SA got 58 which
doesn’t reflect the huge investment and Yasser initiatives.
Government to business (G2B) impacts many areas like satisfaction / willingness to remain using, time
saving / cost reduction, integration with the existing business processes, trust, security, expenditure & labor
invested (Huang & Chu & Hsiao, 2009). e-Gov investments could easily be recovered if Governments are
able to do impact assessments from first stage and measuring the impact their e-Gov services. According to
Chang-hak Choi Korea (2010) South Korea invested $80 million to implement e-Procurement, as a result it
was able to do savings in 2009 amount of $3.2 billion, which means South Korea recovered the cost in 10
days. Many factors affect positive G2B impact and one of them is e-Gov barriers. The barriers to e-Gov
project team have identified seven key categories of barriers that can block or constrain progress on e-Gov as
the following: 1) Leadership failures 2) Financial inhibitors 3) Digital divides & choices 4) Poor coordination
5) Workplace and organizational inflexibility 6) Lack of trust and 7) Poor technical design. These were
derived from a wide review of relevant literature and research relating to e-Gov, augmented by an analysis of
the experience and knowledge of the project's partners, including growing feedback from stakeholders
obtained from the expert group and project workshops (European Commission’s eEurope, 2005). Also no
clear or good measurement framework is another factor that affects positive G2B impact. Therefore, many
countries have a national measurement Frameworks to identify the benefits and returns of investments of eGov services, each one measuring from different angles. Heeks (2006) mentions some of the well known
national measurements methodologies, and one of them is eGEP measurement framework developed by the
European Commission (2006) on the basis of a review of MAREVA (A Method of Analysis and Value
Enhancement) developed by the French.
2.
RESEARCH OBJECTIVES
Since the study is primarily concerned in determining the impact of e-Gov on the private sector of SA, the
focus will be on finding out the success of implementing and measuring e-Gov services in the country, in
meeting the demands of the business and economic development. The following research objectives will be
recognized by this study to identify the impacts behind e-Gov on the Private sector:
1. To find out ways in which e-Gov services (G2B) benefits can be realized and increased.
2. To identify the challenges and barriers that hander PS benefits for e-Gov services.
3. To identify PS role in supporting e-Gov initiatives.
4. To determine private sector awareness about e-Gov benefits.
5. To study and find gaps/issues in the policies of the SA government on their e-Gov programs.
6. To measuring success and net benefits of G2B services.
3.
RESEARCH METHODOLOGY AND MEASURMENT FRAMWORK.
Impact assessment (IA) is a set of logical steps which helps the Commission to do this. It is a process that
prepares evidence for political decision-makers on the advantages and disadvantages of possible policy
208
IADIS International Conference e-Commerce 2011
options by assessing their potential impact (European commission, 2011). IA will be carried out before any
political initiatives are taken to an advanced stage for coming SA G2B initiatives. The case study strategy
will adopt for this study because it allows for an analysis of the impact of G2B on PS and what is the role of
business sectors to support the e-Gov initiatives. A case study approach enables better exploration of the
organizational context and processes through the use of interviews, surveys, document review and
observations. This is an applied research that will employ the descriptive approach to gather information
about the present existing condition. The purpose of employing this method is to describe the nature of a
situation, as it exists at the time of the study and to explore the causes of particular phenomena. The research
will be in two phases:
• Qualitative methods permitted a flexible and iterative approach.
• Quantitative research method will be used since this research intends to find sound evidence. And from
this type of research a survey instrument will be used in the form of interviews and questionnaires.
In order to provide a general and comprehensive definition of IS success that covers different perspectives
of evaluating information systems. Motivated by DeLone and McLean’s call for further development and
validation of their model, many researchers have attempted to extend the original model. Ten years after the
publication of their first model and based on the evaluation of the many contributions to it, DeLone and
McLean proposed an updated IS success model (DeLone & McLean 2002, 2003). TAM has been widely
used in research and empirically proven to be suitable for testing acceptance of any technology by various
user groups in different organizations (Liu, & Chen, 2009). The research uses an extension of DeLone and
McLean's model of IS success, TAM by including efficiency, governance / democracy, and effectiveness
from eGEP and the output for them is Net Benefits / Organizational Impact / Industrial Impact. Figure 1
shows a research model to measuring e-Gov success and its impact on PS.
Figure 1. Research Model to Measuring e-Government Success and Impacts
Figure 2. Adapted from eGovernment Economics Project, Measurement Framework Final Version, May 2006
eGEP framework is the selected tool to measuring net benefits. Figure 2 shows eGEP model that built
around the three value drivers of efficiency, democracy -good governance-, and effectiveness and elaborated
209
ISBN: 978-972-8939-51-9 © 2011 IADIS
in such a way as to produce a multidimensional assessment of the public value potentially generated by eGov, not limited to just the strictly quantitative financial impact, but also fully including more qualitative
impacts (RSO SPA and Luiss Management, 2006).
4.
CONCLUSION
The study research will find out and measure the impact of e-Gov on PS and the role of private sector in
supporting and using e-Gov services in Saudi Arabia. Additionally, it will illustrate the problems and
obstacles facing e-Gov and their impact on the parties. The study is extremely significant to the government
and organizations in SA, since they are looking for increased productivity and reduced costs by implementing
e-Gov programs. Needless to say here those both of Saudi government and private sector are doing huge
investment in acquiring the latest technology. This study will be most helpful to the government officials, IT
experts, economist and businesses in Saudi Arabia. The result of the study will provide information regarding
the current situation of e-Gov in SA. The findings of this particular research endeavor will likewise promote
awareness among government and PS. A secondary benefit of the study could be that having identified the
role of private sector in supporting and improving e-Gov services. This study will be in SA only and won’t
cover all G2B services regionally or at international levels.
REFERENCES
Australian National Audit Office (ANAO), 2006. Measuring the Efficiency and Effectiveness of E-Government. Audit
Report No. 26 2004-2005, Canberra.
Chang-hak Choi, 2010. How to Cooperate with Korea in e-Government, Retrieved Jan 10, 2010 from
http://www.consulmatica.com/cumbre/archivos/Chang-hak%20Choi%20Corea.ppt.
DeLone, W.H., and McLean, E.R. 2004. Measuring E-Commerce Success: Applying the DeLone & McLean Information
Systems Success Model, International Journal of Electronic Commerce (9:1), Fall, pp 31-47.
European commission, 2011. Impact Assessment, Retrieved Jan 25, 2011 from
http://ec.europa.eu/governance/impact/index_en.htm.
European commission, 2005. Breaking Barriers to eGovernment, Retrieved Feb 12, 2011 from
http://www.egovbarriers.org/?view=inventory
Gartner Report (2006). What every government IT professional should know about earned value management, Retrieved
April 11, 2011 from http://www.gartner.com/resources/136900/136921/what_every_government_it_pr
o_136921.pdf
Heeks, R., 2006. Understanding and measuring eGovernment: International benchmarking studies. Manchester, UK:
University
of
Manchester.
Retrieved
February
15,
2010
from
http://unpan1.un.org/intradoc/groups/public/documents/UN/UNPAN023686.pdf
Huang & Chu & Hsiao, 2009. E-Governance Impact – Framework and Assessment G2B, Retrieved Feb 12, 2011 from
http://www.teg.org.tw/common/dl.jsp?f=%2Fseminar%2F42%2FPanel+3_Panelist_Dr.+Nai-Yi+Hsiao.pdf.
Jason Baumgarten & Michael Chui, 2009. E-government 2.0, Retrieved February 23, 2010, from
http://www.mckinsey.com/clientservice/publicsector/pdf/TG_MoG_Issue4_egov.pdf
Liu, H., & Chen, L., 2009. Are travel agents in Taiwan ready for computer technology?. International Journal of
Organizational Innovation (Online), 2(2), 222-231. Retrieved December 28, 2010, from ABI/INFORM Global.
Document ID: 1923289821.
Mark Saunders, Adrian Thornhill, and Philip Lewis, 2003. Research Methods for Business Students, Pearson Education
Limited , Harlow, England.
Ministry of Management Services (MoMS), 2004. Annual Service Plan report, British Columbia, Retrieved Sep, 10,2009
from http://www.bcbudget.gov.bc.ca/Annual_Reports/2004_2005/mser/mser.pdf
RSO SPA and Luiss Management for the eGovernment Unit, 2006. Project (eGEP) Measurement Framework Final
Version, General Directorate Information Society and Media of the European Commission, eGovernment
Economics., Retrieved Feb 10,2011 from http://ec.europa.eu/governance/impact/index_en.htm.
Yasser Program for eGovernment, 2011. SA eGovernment initiatives, Retrieved Feb 10, 2011 from
http://www.yesser.gov.sa/en/Pages/default.aspx
210
IADIS International Conference e-Commerce 2011
REFLECTIONS ON PRIVACY IN NEW LOCATION BASED
SERVICES IN SOCIAL NETWORKS
A. Paniza-Fullana, M. Payeras-Capellà, M. Mut-Puigserver and A. Isern-Deyà
University of the Balearic Islands, Carretera de Valldemossa Km. 7, 5 07122 Palma, Spain
ABSTRACT
The paper presents a reflection about the concerns related with privacy that arise in the use of location based services.
The harvesting of location data can be very useful in e-commerce operations, as in advertising, and recently the use of
location data has been extended to social networks. However, the management of simple or aggregated location data
arises several problems related with privacy. In this paper we focus on the problems that can appear when location data is
used in social networks and we present a list with all the problems we have detected. The legislation related with privacy
are explained and applied to each of the detected problems.
KEYWORDS
Location Based Services, Privacy, Legislation, Social networks, Advertising
1. INTRODUCTION TO LOCATION BASED SERVICES
The brand new mobile devices are capable to access data networks and they are also able to execute complex
applications. Furthermore, these devices implement location systems like GPS or others based on location
techniques like GSM or Wi-Fi. The combination of both capabilities can be useful to build new ubiquitous
applications based on user location. These applications provide to service customers valuable information
related to their location.
Location-based services (LBS) are a kind of service offered to the users of mobile devices that provide
added value information related to the context where the users are located. LBS include different kinds of ecommerce applications, like touristic services offering information about the surrounding area of the user,
general social networks like Twitter, mobile social networks like Foursquare or some Google applications.
These applications gather private information of the user. With the aim to use properly (according to the
legislation) this sensible information, the applications often include a question to the user: “Does he allow the
use by the application of his location data?” However, if the user does not allow the use of the location data
then the service will be disabled. It would be interesting to include to the LBS the mechanisms that will allow
both the protection of the user privacy and the use of the applications.
These applications can use both the momentary location of the user and the trail or itinerary of all his
locations that could be used to generate a location profile of the user in order to know his usual movements.
The applications that use the trail of the users have more privacy requirements.
2. PRIVACY IN LOCATION BASED SERVICES
From the security viewpoint, it is clear that the use of private data opens many debates related to users
security because either providers or observers should not have access to both user identity and his location.
For this reason, techniques to ensure the secure use of these applications are required.
Location Based Services can be classified in three types, depending of the anonymity requirements [Liu]:
• Anonymous. The user can be fully anonymous, because the service does not need any type of
identification nor pseudonym. An example could be a service of meteorological alerts for the city where the
user is located.
211
ISBN: 978-972-8939-51-9 © 2011 IADIS
• Identified. It only can work if the user provides his true identity. An example could be an application to
alert about a broken protective order by an assailant.
• Pseudonym based. The user does not show his true identity but he only shows a pseudonym. For
example, a dating application, where it is not mandatory to show the real identity although other personal
data could be shared, like age or sex.
Several protocols designed to access to LBS are focused in the protection of the privacy of both users and
queries. Some of them use obfuscation algorithms to hide the exact user location [Gedik, Gruteser], while
others try to allow private requests using a technique called PIR [Ghinita].
3. LEGISLATION ON PRIVACY AND LOCATION-BASED SERVICES
Location data are regulated in the article 9 of the Directive 2002/58/EC of the European Parliament and of
the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the
electronic communications sector (Directive on privacy and electronic communications). The Whereas 35 of
this Directive establishes about that question that: “…digital mobile networks may have the capacity to
process location data which are more precise than is necessary for the transmission of communications and
which are used for the provision of value added services… The processing of such data should only be
allowed where subscribers have given their consent. Even in cases where subscribers have given their
consent, they should have a simple means to temporarily deny the processing of location data”.
The requirements to use the location data by the service provider are:
• Location data relating to users or subscribers of public communications networks or publicly available
electronic communications services can be processed when they are anonymous or with the consent of the
users or subscribers.
• This data can only be processed to the extent and for the duration necessary for the provision of a value
added service.
• Service providers must inform the users or subscribers, prior to obtaining their consent, of the type of
location data other than traffic data which will be processed, of the purposes and duration of processing and
whether the data will be transmitted to a third party for the purpose of providing the value added service.
• Besides, users or subscribers shall be given the possibility to withdraw their consent for the processing
of location data other than traffic data at any time.
• The user or subscriber must continue to have the possibility, using simple means and free of charge, of
temporarily refusing the processing of such data for each connection to the network or for each transmission
of a communication.
In the same way the Spanish Telecommunications Act (Act 32/2003, November 3rd) in the article 38.3 says:
location data can only be processed when it is anonymous or if the provider has the consent of the user or
subscriber. Location data can only be processed to the extent and for the duration necessary for the provision
of a value added service and with prior information about the purposes and duration of processing and for the
added value service that will be provided1.
In the guide of “Best Practices and Guidelines for Location-Based Services” of the wireless association2
we can find some guidelines in the same way as the European or Spanish regulation:
• LBS providers must inform users about how their location data will be used, disclosed and protected so
that a user can make an informed decision whether or not to use the LBS or authorize disclosure.
• Once a user has chosen to use a LBS, or authorized the disclosure of location information, he should be
able to choose when or whether location information can be disclosed to third parties and should have the
ability to revoke such authorization.
• LBS providers must inform users about how their location data will be used, disclosed and protected.
• LBS Providers may use written, electronic or oral notice so long as LBS users have an opportunity to be
fully informed of the LBS Provider’s information practices. Any notice must be provided in plain language
and be understandable. It must not be misleading, and if combined with other terms or conditions, the LBS
portion must be conspicuous.
1
2
Vid. Spanish Agency of Protection Data Act 160/2004 about safety measures of data location files.
http://files.ctia.org/pdf/CTIA_LBS_BestPracticesandGuidelines_04_08.p
212
IADIS International Conference e-Commerce 2011
4. DETECTED PROBLEMS IN NEW LBS: SOCIAL NETWORKS
Recently, new LBS have appeared. Among them there are services that include location data in social
networks. As a result the location data is not only revealed to a service provider but to a set of people that
usually include contacts in the social network. Facebook Places, Foursquare, Yelp , Google Latitude and
Gowalla are examples of social networks using location. These services enable users to ‘check into’ locations
they visit using a mobile device. Then the users can share their current location and/or the places they have
checked into. The following are concerns or problems related to privacy when these services are used:
1. A first concern is related with who will be able to see this information. Almost all services include
privacy configuration tools to set who has access to the location information. Social networks allow users to
classify other users as friends or contacts. Usually users use this tag to mark real friends and also to mark
other kind of users, as colleagues, neighbors and even unknown people who share with them some kind of
hobby. It is usual that the default configuration of the service allows the access to the location information to
all the contacts of the user, so a lot of people will share this sensible information. This default parameter must
be discussed.
Some legal problems can be debated: essentially the fact that the configuration of the service is not
equivalent to the consent of the users. In the case of the configuration of the browser, the Opinion 1/2009 on
the proposals amending Directive 2002/58/EC on privacy and electronic communications (e-Privacy
Directive) establishes that: “Most browsers use default settings that do not allow the users to be informed
about any tentative storage or access to their terminal equipment. Therefore, default browser settings should
be “privacy friendly” but cannot be a means to collect free, specific and informed consent of the users, as
required in Article 2 (h) of the Data Protection Directive”. As in the browsers, the default configuration of
social networks services should be protective of the user’s privacy.
2. Location information can be used for advertising purposes. As an example, Facebook Places Deals [1]
it’s a service in where a commerce offers promotions or gifts to users if they check into their places. If a user
disables the option to share his location he will lose the access to these opportunities and he will not have
access to any promotions offered by a business if their promotions are based on group offers. As a result,
users are coerced to share their location data. From a legal point of view some questions arise: is it an abusive
term of the contract? It is the same that sometimes occurs with the cookies, if you reject the cookies
sometimes you cannot entry in a web page.
3. Some social networks also allow friends to check another user into a place. This feature can be enabled
and disabled but the configuration tool must be easy and has to have enough options. Enabling this feature
means that friends can tag you and ‘check’ you into a Place. After that, the checked user will get a
notification to say a friend has tagged him. The user will be able to remove the tag just as he can with other
kind of tags like photo tags, but a user will appear placed, or falsely placed, until he removes the tag. From
the legal point of view, the form of the consent is very important. Prior of this consent the user should be
informed of the type of location data other than traffic data which will be processed, of the purposes and
duration of processing and whether the data will be transmitted to a third party for the purpose of providing
the service. It is necessary too in the case where the consent is in the ‘general terms’ of the contract. In this
case some legal aspects arise: is it enough the consent of the user in a “general terms” of a contract?3
The revocation of consent is also important: LBS providers must allow the users to revoke their prior
consent to disclose location information to all or specified third parties. Special legal problem appears with
the consent of minors. A lot of users of social networks are minors and cannot give their consent to the
service provider to use their location data, but in practice it is very difficult to control and stop.
4. If an account is compromised (e.g. as a result of phishing) not only his own location but also the
location of his friends will be compromised including the actual location and the historial of visited places.
Moreover, providers are able to keep records of location data and even share them, so this concern can be
related with the cession of data by the social network providers to third parties.
Some legal problems arise: Who can use this location data? What happen if a third person (e.g. “a friend
of a friend” in the social networks) uses my location data? Service providers need the consent of the users to
send the location data to third parties (e.g. for marketing purposes)
3
As an example, in the Privacy Policy of Gowalla: “In order to use the mobile features of the Gowalla Service, you must consent to: (a)
the use of your phone’s location to provide Gowalla to you, including the display and disclosure of that location information to your
Gowalla friends and within your geo-tagged messages and content… ».
213
ISBN: 978-972-8939-51-9 © 2011 IADIS
5. If somebody can know your location he also knows where you are not. That is, you let everyone know
you’re gone, you’re not home, but similarly everyone can know you are not at the office or at the school.
6. There are a lot of applications, websites, games… that use location data as a parameter. Normally the
applications ask users its permission to use location data, but a negative answer will lead to the impossibility
to use them. In some social networks, the access from the applications to location data is defined by the
privacy profile. It is important to know which is the default setting for this kind of access.
7. A lot of people state that they are concerned about the exposure of their location data (see
internet2go.net for statistics). Do these people really know and understand that they are sharing location
information? Do they know who can access this information or how to change the privacy profile? An opt-in
approach would be better? Really the rules establish an opt-in system to use location data: it can only be used
in the case where this data is used in an anonymous way or with the consent of the user. Without this consent
it is not possible to use the location data in a legal form (article 9 Directive on privacy and electronic
communications, Spain, article 38 General Telecommunications Act)4. A wrong way to use location data is
the case of Apple: two people present a claim in U.S.A. against Apple because it seems that they use software
included in the Apple operating system file that sent to the creators location data of the mobile devices of the
users without their knowledge of it [mundo]. At the moment, we don’t know which use of these location data
is doing Apple. Similarly, Android has been also criticized for the harvesting of location data.
8. The inclusion of places like home, friend’s home and so on can be dangerous not only for user’s
privacy but also for personal safety.
5. CONCLUSION
As a result of the application of the legislation related with privacy to a new location based service (social
networks) some conclusions can be listed. There are several points where the services fail to fulfill the
legislation, or, at least, its fulfillment is arguable. The most conflictive points are the default configuration of
the social networks service, the use and cession of collected data, the role of minor users, the use of data by
applications and the personal safety. Also, the applications ask for the users' permission to use their location
or they offer possibility to disable the option of sharing the location. However, if a user doesn't share her
location, the service is denied to the user instead of offering the service with some restrictions (e.g. timerestrictions). This kind of politic tends to break the user's privacy. Once the problems are detected the next
step is how to deal with these problems. Future directions of our work will be to develop a framework for
evaluating social networks services in terms of privacy and propose mechanisms to protect privacy.
REFERENCES
B. Gedik and L. Liu. A Customizable k-Anonymity Model for Protecting Location Privacy. In ICDCS, p. 620–629, 2004.
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services:
anonymizers are not necessary. Proceedings of the 2008 ACM SIGMOD int. conf. on Management of data, pages
121–132, 2008. ACM.
M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking.
In MobiSys ’03: Proceedings of the 1st int. conf. on Mobile systems, applications and services, p. 31–42, 2003. ACM.
L. Liu. Privacy and location anonymization in Location-Based Services. SIGSPATIAL, Vol 1, Issue 2, p. 15-22, 2009.
El
Mundo.
Denuncian
a
Apple
por
el
sistema
de
rastreo
en
sus
dispositivos.
http://www.elmundo.es/elmundo/2011/04/26/navegante/1303783744.html
4
In USA, Telecommunications Act of 1996 includes protections for “Customer Proprietary Network Information,” (CPNI) a complex
term used to encompass calling records, including the numbers called, numbers received, and new types of information collection, such
as location of the user. The Federal Communications Commission recently restricted disclosure of CPNI; carriers must now obtain opt-in
consent from customers (Comparative Study on different approaches on to new privacy challenges in particular in the light of
technological developments. Editor Douwe Korff; United States of America by Chris Hoofnagle. May, 2010).
214
Posters
IADIS International Conference e-Commerce 2011
UTILIZING THE COMMUNICATION-TECHNOLOGY TO
MINIMIZE THE FINANCIAL NEGATIVE INFLUENCE IN
THE SUPPLY CHAIN
Ming-Yaun Hsieh1, Wen-Yaun Wu2, Chaang-Yuan Kung3 and Ya-Ling Wu1
1
2
Assistant Professor, Department of International Business, National of Taichung of Education
Associated Professor, Department of Distribution Management, National Chin-Yu University of Technology
3
Professor, Department of International Business, National of Taichung of Education
ABSTRACT
In the modern economic era of lower profits, financial risk has been in the supply chain management for quite some time;
however, only a few assessable measurements of financial negative influence are considered. Hence, in order to
comprehensively cross-analyze the influence of multiple financial criteria for minimizing the financial risk in supply
chain, the Analytical Network Process (ANP) model is utilizing to improve the selection of best potential supplier in
supply chain management from financial consideration perspective by selecting and evaluating key financial assessment
criteria through brainstorming, focus group, the Delphi method and nominal group technique. Subsequently, the specific
characteristics of the Analytical Network Process (ANP) model is not only to establish pairwise compared matrix but also
to further calculate the priority vector weights (eigenvector) of each assessable characteristic, criteria and attribute.
Additionally, in the content, the analytical hierarchical relations are definitely expressed in four levels including between
each characteristic of supply chain, criterion and attribute. Moreover, based on the empirical analysis, the enterprises are
able to choose the best potential suppliers through this research in order to minimize financial negative influence from a
financial perspective. Finally, some suggestions for managers and researchers are inductively formed to further the best
development of operation strategy of supply chain management by utilizing the development of the communicationtechnology to diminish financial negative influence and risk.
KEYWORDS
Supply Chain Management (SCM), Communication-technology (CT), Analytical Network Process (ANP)
1. INTRODUCTION
Essentially, there are two significant ideas in Supply Chain Management (“SCM”). One is “The Supply
Chain (“SC”) encompasses all activities associated with the flow and transformation of goods from the raw
materials stage (extraction), through to the end user, as well as the associated information flows. Material and
information flow both up and down the SC.” (Chen et al, 2004) and another one is that SCM is the systemic,
strategic coordination of the traditional business functions and the tactics across these business functions
within a particular company and across businesses within the SC, for the purposes of improving the longterm performance of the individual companies and the SC as a whole. However, the fundamental ideal of
SCM depends on compressing the total cost of manufacture, inventory and delivery in order to reach the best
profits for the enterprises after the orders has been given to the enterprises. SCM is not able to effectively
handle two crucial problems for enterprises: cash-flow stress without orders and account receivable stress
with slow client-payment. In the boom period between the 1990 and 2008, the global economy has been in a
rapid growing status due to the steady development of the economy of Mainland China. Taiwan’s proximity
to Mainland China has resulted in Taiwan being depended on the expose processing and international-trade
to develop its economy. In the last 20 years, more and more of Taiwan’s enterprises have started to invest in
China which has caused a high depended relationship between enterprises in Taiwan and China. The purpose
of this research is to utilize the hierarchically analytical approach and the analytical network process
(“ANP”) approach in order to measure the key elements and assessable criteria for reducing financial
negative influence under SCM for the enterprises to minimize the finance and managerial negative influence.
217
ISBN: 978-972-8939-51-9 © 2011 IADIS
2. BODY OF PAPER
Saaty (1996) addressed the most major different point between AHP and ANP is that, based on the original
assumption, AHP is not able to directly evaluate each assessable criterion by hierarchical relations but that,
on the contrary, ANP can be utilized to dispose of direct interdependence relationships and inter-influence
between each criteria and criteria at the same or different level through conducting the “supermatrix”. (1)
Financial Evaluation: revenue growth (“RG”) and gross margin ROI (GM-ROI). (2) Sale Review: sale
forecast accuracy (“SFA”) and days of inventory sales (“DOIS”). (3) Inventory System: inventory turns
(“IT”), obsolete inventory (“OI”) and inventory accuracy (“IA”). (4) Delivery Status: warehouse operations
cost as a percentage of sales (“WOCSP”) and outbound freight cost as a percentage of sales (“OFCOSP”) in
this criterion. (5) Customer Service: on time shipment (“OTS”), percentage of returned good (“PRG”) and
order fill rate (“OFR”). (6) Suppliers’ offer: percentage of on time supplier delivery (“POTSD”), percentage
of supplier delivered material defects (“PSDMD”), percentage of total direct material that do not require
inspection (“PTDMDNRI”), percentage of total material value purchased using a web-based system
(“PTDMVP-W”), percentage of total material value purchases using a EDI transactions (“PTDMVP-EDI”)
and percentage of total material inventory managed by suppliers (“PTMIMS”).
2.1 Figures and Tables
The selection of suppliers with best potential communication-technology in supply chain
Attributes of
each subcriterion
Enterprise’s high-speed operation demand
Financial Evaluation
Criteria of
assessment
Selected
Candidate of
Suppliers
RG
GM-ROI
Value-adding transformation
Supply information channel
Sale Review
Inventory System
Delivery Status
Customer’s Service
SFA
DOIS
IT
OI
IA
WOCSP
OFCOSP
OTS
PRG
OFR
Supplier 1 (without enterprise’s
domain.) (SWTED)
Suppliers 2 with the enterprise’s internal
domain and social networking (SWEIDSN)
Suppliers’ offer
POTSD
PSDMD
PTDMDNRI
PTDMVP-W
PTDMVP-EDI
PTMIMS
Suppliers 3 (with the enterprise’s internal and
external domain and social networking)
(SWEIEDSN)
Figure 1. Relationship for characteristic, criteria, sub-criteria and selected candidates
Table 1. Strategic comparative index of the three measurements
(Financial Evaluation/ Sale Review/ Inventory System/
Delivery Status/ Suppliers’ offer/ Customer Service)
Accounting comparative index
Supplier 1 (SWTED) Suppliers 2 (SWEIDSN) Suppliers 3 (SWEIEDSN)
0.137
0.6414
0.2749
3. CONCLUSION
There are a plethora of researches in SCM surrounded the major fundamental idea of the cost-down under the
development of the communication-techology. However, the measurement and diminishment of financial
negative influence of selection suppliers in SCM is not discussed in detail in the research field. The reason is
the relationship between enterprise and suppliers overall emphasize on the high-speed establishment of
internal domain during the enterprises selects the cooperative suppliers because suppliers growing will
definitely assist the enterprise to grow. Consequently, the highest result of the evaluated score of comparative
index of 0.6414 is Suppliers 2 (SWEIDSN). The ANP model is used not only to clearly establish
218
IADIS International Conference e-Commerce 2011
comprehensively hierarchical relations between each assessable criterion but also to assist the decision-maker
to select the best potential supplier 2 with the enterprise’s internal domain and social networking
(“SWEIDSN”) with low financial negative influence through the academic Delphi method and expert’s
survey. In the content, there are six main assessable criteria including three financial assessable factors
(financial evaluation, sale review and inventory system), two SCM assessable factors (delivery status and
suppliers’ offer) and one customer-service assessable factors (customer service).
REFERENCES
Davis, T. 1993. Effective Supply chain management,” Sloan Management Review. vol. 34 no. 4, pp.35-46.
Harland, C. M. 2006. Supply Chain Management: Relationship, Chains, Networks. British Journal of Management, vol.
7, Special Issue, pp.63-S80.
Lambert, Douglas M., and Martha C. Cooper. 2002. Issues in Supply Chain Management. Industrial Marketing
Management, vol.29, pp.65-83.
Li Xiao Cheng. 2009. Gong Ying Lian Feng Xian De Cai Wu Guan Dian. Accounting Research Monthly, vol. 285, pp.6667.
Education: Analytical network Process Approach,” International Journal of Manpower, vol.25 no.7, pp.643-655.
219
ISBN: 978-972-8939-51-9 © 2011 IADIS
INFRASTRUCTURE MODEL FOR ASSURANCE OF
AUTHENTICATION DATA EXCHANGE FORMAT
Ahmed Tallat1, Hiroshi Yasuda1 and Kilho Shin2
1
Tokyo Denki University
2
University of Hyogo
ABSTRACT
Conventionally service providers have to manage their own authentication systems individually and independently
without interoperation among them. Lack of the interoperability causes serious problems. By clarifying the requirements
for the interoperability, we propose an authentication infrastructure model, where independent players made up of a
service provider, identity provider and authentication agent cooperate and communicate with one another.
KEYWORDS
Authentication, interoperability, identity provider, password.
1. INTRODUCTION
Authentication is building block for security. Conventionally Service Providers (SPs) provided authentication
functionality independently without any interoperability among them and it caused serious problems to SPs
and users alike; SPs have to duplicate financial investment for registration and authentication system, and
users have to repeat authentication steps in order to access services. To address these problems PKI and SSO
were created to meet the needs of SPs and users alike. However, they aim at different things; SSO
authenticates users whose results can be shared among variety of SPs, and PKI realizes interoperability of
authentication in open environment where SPs can evaluate authentication results from even unknown
entities.
Thus as solution for combining both merits of SSO and PKI, in order to share authentication results in
open environment (like a variety of media, the Internet, diverse operating systems, mobile systems and
smartcard etc.), we propose an authentication infrastructure model, where an identity provider (IdP),
authentication agent (AA) and service provider (SP) cooperate and communicate with each other.
2. RELATED WORK AND EVALUATIONS
PKI [1] [2] works on a basis of Certificate issued and signed by a Certificate Authority (CA) in order to bind
a public key to a subject. The subject creates Certificate Signing Request (CSR) signed by a private key and
submits it with the corresponding public key to CA that creates digitally signed certificate after validating the
subject. The CA also issues certification revocation list and status checking services. Once the certificate is
verified by the CA`s self-signed certificate, others believe that public key belongs to the subject because of
trustworthiness of CA. The trustworthy level of CA depends on its certification policy (CP) and certification
practice statement (CPS), which specifies how certificate services are provided.
In conventional SSO, to access a service server (SS), first users` ID/password are managed by centralized
authentication server (AS) that establishes secure communication channel with other multiple SSs in order to
share the users’ authentication results. Once users authenticate themselves to the AS and access to other
services, behind the scene their data is transferred from the AS to SSs. From the users’ perspective, they get
directly accessed to other services without being prompted for authentication at each of them. Thus, SSO
220
IADIS International Conference e-Commerce 2011
improves security by eliminating phishing and identity theft opportunities as well as reducing the risk of
individual identity management. Kerberos [5], SAML2.0 [4] etc realize SSO functionality.
However, PKI, unlike SSO, requires individual authentication, not aimed at sharing authentication results
among SPs, whereas SSO works on Circle of Trust that cannot be assumed in open environment where SPs
may receive authentication results issued from unknown entities.
We assume authentication infrastructure from the points of Sharing authentication result, Open
Environment, Player Independence functions views.
Table 1. Evaluation of selected frameworks and protocols
Conditions
Sharing authenticated result
Open Environment
Player Independence
No
Yes
Yes
Yes
No
No
Yes(partly)
Yes(partly)
Yes(partly)
frameworks
PKI
Kerberos
SAML
1. Sharing authentication result reduces multiple authentication procedures and it is most preferred
function for users and SPs alike.
2. Reaching out Open Environment necessitates the need of evaluating authentication result even issued
from unknown entities.
3. Gaining independence of players is beneficial of economic and security perspectives, because players
concentrate on particular investments, and it limits specific tasks of processing users’ data.
3. AUTHENTICATION INFRASTRUCTURE MODEL
In response to the limitations of PKI and SSO, we propose a model that provides the merits of SSO and PKI
simultaneously and it consists of registration phase, authentication phase and authorization phase (Figure 1).
Figure 1. Authentication infrastructure model
3.1 Protocol
An independent enterprise playing the role AA`s functionality is most crucial of creating authentication
infrastructure in open environment. To relieve the duplicated investments made by SPs individually, AA
bears a huge financial investment of distributing unified interface to authenticate users by means of token,
which can be private key, password, smartcard, fingerprint etc. Currently the main reason for a lack of
authentication infrastructure is that SPs maintain their authentication systems by themselves, which
constitutes significant financial burdens. We can realize AA`s functionality from the ATMs example, which
are found in convenience stores run by an independent entity bridging between multiple SPs and users.
• Registration phase
In the phase, IdP performs registration procedures of users applying for identities based on its policy and it
results in activation of Token and reference data (e.g. fingerprint & templates, private key & public key etc).
Generally IdP does this via the following steps.
Identification: during which the IdP verifies the real-world identity of the applicant.
Custody: during which the IdP stores the verified applicant information safely against environmental,
physical and cryptographic threats so that the repudiation of user registration can be prevented.
Activation: during which the IdP by creating references activates token to be bound to the applicant.
• Authentication phase
221
ISBN: 978-972-8939-51-9 © 2011 IADIS
In this phase, users access AA’s interface and creates proof data from their token. Upon receiving proof
data (e.g. password, digital signature, biometrics scanned image etc), AA verifies it by reference data received
from IdP or sends it to IdP for verification. As the result, Endorsement is created as authentication results
covering all necessary information involved of its generation. Furthermore, AA digitally signs Endorsement
with its private key and issues it to authenticated users with certificate that contains corresponding public key.
• Authorization phase
In authorization phase, users present Endorsement and certificate to SPs who verify them in terms of
security and trust levels before providing requested service; SPs at least confirm the trustworthiness of
issuers, whether the alleged security levels of the Endorsement meet SPs` requirements which also includes
the data is fresh and is not a target of any tempering.
3.2 The Solutions by this Research
In the following we describe how the conditions in section 2 are met by our proposed infrastructure model.
• To meet the 1st condition
In our model, IdP and AA cooperate with each other to perform user registration and authentication,
whose results called Endorsement is shared among a large indefinite number of SPs. SPs evaluate the
Endorsement in order to provide users with requested services. Thus SPs must be provided with sufficient
information involved in creation of the Endorsement for its evaluation. Therefore, we have clarified both
threats and counter-measures for phases defined in our model and retrieved necessary information to be
included in the Endorsement. Upon receiving it, SPs verify its security levels [3] and decide its acceptance by
referring to SPs` security policy. We have also defined XML schema [6] to encode the data.
• To meet the 2nd condition
Security level of endorsement alone cannot make the assurance of authentication data exchange possible in
the open environment, unless SPs have reasons to believe that IdPs and AAs are trustworthy. Thus, we deploy
auditing scheme by taking advantage PKI and digital signature scheme with some extensions, where a Trusted
Third Party not only binds public key to AA but also guarantees the trustworthiness of IdP/AA by auditing
them in terms of practicability of their alleged policies.
• To meet the 3rd condition
Unlike conventional framework, PKI enables SPs to entrust registration to CA, whereas SSO enables SPs
to entrust registration and authentication to IdP. But SPs still independently maintain authentication systems
that require big financial investment to distribute and operate them (e.g. biometric authentication). Thus, in
our model IdP, AA and SP work independently, and SPs can determine the acceptance of Endorsement by
entrusting registration and authentication to independent players, the IdP and AA respectively.
4. CONCLUSION
We outlined problems from both users and providers` perspectives in conventional authentication systems
implemented independently without interoperability. Further, we analyzed PKI and SSO aimed at addressing
these problems, and found their interoperability is limited in scope. Thus by clarifying the requirements for
the interoperability, we proposed authentication infrastructural model. Next we plan to develop prototypes of
the SP, IdP and AA systems that cooperate with each other based on the XML-encoded data.
REFERENCES
[1] “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, RFC 5280.
[2] “ Internet X.509 Public Key Infrastructure: Certification Path Building”, RFC 4158.
[3] NIST, Electronic Authentication Guideline, NIST Special Publication 800-63 Version 1.0.2.
[4] OASIS, Security Assertion Markup Language (SAML) V2.0, 2007.
[5] RFC: 4120 The Kerberos Network Authentication Service (V5).
[6] XML Schema Part 0: Primer Second Edition, W3C Recommendation.
222
IADIS International Conference e-Commerce 2011
RESEARCH ON USING E-TECHNOLOGY AND
E-ACTIVITIES WITHIN BUSINESSES
Roman Malo
Department of Informatics, Faculty of Business and Economics, Mendel University in Brno
Zemědělská 1, 613 00 Brno, Czech Republic
ABSTRACT
The research on e-technology, e-activities and their impact to business innovations is a one of the part of our research
activities that are being solved. E-technology and its expansion create a basic platform for using e-activities in various
businesses, but a lot of problem should be considered.
In fact, there are crucial problems with e-activities and e-technology benefits recognizing and with simple measuring etechnology maturity within business. That is why our research activities are focused on determining general models of etechnology and e-activities utilization within various types of businesses above all.
We guess, this is the possible way how to support business progress and how to enable the comparison of individual
businesses if we need to analyze their e-technology level.
This poster paper summarizes context, outlets and the last state of our work-in-progress in described domain.
KEYWORDS
E-technology, e-activities, research on e-technology, businesses
1. INTRODUCTION
1.1 E-technology
A comprehensive and generally accepted definitions of the term e-technology (or e-technologies) and the
term e-activities are not available. However, various authors understand both terms in a different way. We
agree with the claim of Tassabehji, Wallace and Cornelius (2007) and thus e-technology in our research is
understood as a new and continuously evolving platform from that an organization can exploit new
opportunities. This is also usually accepted claim.
In fact, e-technology can be viewed as a complex of technical and communication means together with
software applications enabling support of the electronic services and activities especially on the web and
mobile platform. In this way e-technology creates necessary technical environment for implementing eactivities within business.
E-technology must be today considered as dominant actors forming a current state of business
applications mostly based upon the web platform. The main moment of e-technology application is already
traceable for a long time, its utilization helps to communication, business support or supply/demand
relationship management.
1.2 E-activities
E-activities are electronic activities more or less substituting traditional activities. We formally define eactivity as a triple C, S, E where C is content matter, S subject supported by e-activity and E is e-technology.
For an example:
• E-commerce as the important e-activity enables buying and selling products online (usually through
Internet),
• a group of potential customers represents main subject of e-commerce and
223
ISBN: 978-972-8939-51-9 © 2011 IADIS
• a platform (e-technology) is usually any kind of e-shop software. (Malo, 2010)
The relation between e-activities and e-technology is quite strong. With respect of massive expansion of
activities as e-commerce, e-payments and others, the e-technology implementation represents a progressive
way of business innovations and new platform for increasing the business effectiveness and competitiveness.
An optimal selection of e-activities within individual business subjects in the enterprise environment is
basic precondition for enterprise progress from e-technology utilization’s point of view and a warranty of
effective applying electronic tools.
2. OUTLETS OF THE RESEARCH
As Piccinelli and Stammers (2001) state – the distance between business models and information technology
(IT) is shortening and aggressive business models impose new requirements on IT. Conversely, absorbing
new technology opens new challenges that request a redefinition of current business models and their
periodical changes in cycles according to businesses changes, market progress or new opportunities
(Osterwalder, 2004).
In fact, there are relations within business models, e-technology and e-activities. A lot of enterprise
business models include common and also less common e-activities. We would like to formalize how various
businesses implement new technology to be able to operate selected e-activities responding to their business
model.
That is why our work, which is still in progress, is focused on problems of e-technology implementation
within businesses, expansion of e-activities and their influence to the business model. We would like to
prepare a complex overview of e-technology used within various types of businesses and analyze and define
typical models of using e-activities. We presupposed that results should help to clearly detect advantages of
various types of businesses and eliminate common barriers of adoption.
Our research consists of two related phases (Malo, 2010):
1. Analysis of current state within the area of e-technology implementation in businesses. This analysis is
used as an outlet for a definition of typical models of using e-technology and e-activities and their support. A
set of pieces of knowledge coming from survey involves:
• the identification of basic problems of e-technology implementation and
• the classification of typical e-activities used and supported by various types (groups) of businesses.
2. The second phase covers a qualitative study of gained results from the phase one. All activities are
addressed to finding relevant criteria for comparing the state of e-technology using in various businesses and
defining basic methodic approach for support e-technology and accepting e-activities as a part of business
model.
3. CURRENT AND FUTURE WORK
The main e-activities covered by our research are e-commerce (including e-procurement), e-marketing, elearning, e-management and e-government and very interesting facts and questions could be in given
domains.
We have surveyed various businesses and first results show us innovative thinking of the most of them.
We can for example state that e-marketing is considered to be the most important e-activity or e-learning is
understood as a tool for increasing productivity.
On the other hand there are factors affecting positive possibilities. The most important factors are an
ignorance and low acquaintance of enterprise subjects with opportunities and possible benefits offered by etechnology; relatively high variance in e-technology possibilities and their utilization; an insufficient
methodic apparatus to quantify benefits and high level of heterogeneity of available software systems and
components. In fact, it is not clear for businesses how to recognize a potential for progress support hidden in
the using e-technology and e-activities. Simply, managements, that usually make a decision about etechnology implementation, have only ambiguous, low-determined and inexact ideas and knowledge about
possibilities. The process of implementing e-technology suffers from entire lack of suitable sources of
information and model case studies.
224
IADIS International Conference e-Commerce 2011
Thus, we are preparing recommendations how to compare the level of using e-technology and e-activities
within various types of businesses and clearly answer a few questions as how is it possible to measure and
compare level of using e-technology or e-activities or when is it possible to claim that business has optimal
level of used e-technology or any deficiencies existing in this context.
Because a lot of various types of businesses with a different level of using e-technology and e-activity
support can be found in the business environment, there are also differences in characteristics of these
businesses as size, sector, organization and many others. That is why the comparison based upon simple eactivities or e-technology matching is not relevant, results would be misleading.
Described fact is the main reason why we are working on preparing a group of general models for various
types of businesses (micro, small, medium and large) from various lines and branches. These models are
being defined according to our surveys and in future each business will be able to process self-comparison
with relevant general model.
The web application that is being developed within our research activities too will represent the special
tool for base automated comparison and the source for information about business e-technology. We hope
this application would help businesses to recognize the importance of e-technology and e-activities and their
support.
4. CONCLUSIONS
One of current priorities within businesses is an effort to increase efficiency and expand own business
territories. E-technology and e-activities are understood by specialists as one of alternatives how to support it.
There are various barriers to e-technology adoption and also various needs from different types of businesses.
Our research focuses this state and tries to support and improve given situation.
We guess our research and final results will be available at the end of 2011. Although our work is
primarily limited to Czech Republic, we expect that result will be applicable also to other comparable
countries taking current state and historical consequences into account.
Our work is a kind of contribution to exploring the current state and the importance of economic
informatics and its impact to business efficiency and progress. That is why results of the research are and will
be also applied as a part of special courses at our faculty aiming e-technology domain.
ACKNOWLEDGEMENT
This research is supported by Czech Science Foundation, project 402/09/P271.
REFERENCES
Malo, R.: E-activities Based Business Model: The Case for E-technology Implementation. In Proceedings of the IADIS
International Conference on e-Commerce. Freiburg: IADIS Press, 2010, p. 173–176. ISBN 978-972-8939-24-3.
Osterwalder, A.: The Business Model Ontology – A Proposition in a Design Science Approach [online]. Lausanne:
Licencié en Sciences Politiques de l'Université de Lausanne, 2004. [cited 2010-03-28]. Available from
<http://www.hec.unil.ch/aosterwa/PhD/Osterwalder_PhD_BM_Ontology.pdf>.
Piccinelli, G. Stammers, E. From E-Processes to E-Networks: an E-Service-oriented aproach [online]. 2001, [cit. 201101-24]. Dostupné z <http://www.research.ibm.com/people/b/bth/OOWS2001/piccinelli.pdf>.
Tassabehji, R. et al. 2007. E-technology and the emergent e-environment: Implications for organizational form and
function. The Journal of High Technology Management Research, Volume 18, Issue 1, p. 15–30.
225
AUTHOR INDEX
Ahola, H. ........................................................189
Ahola, J...........................................................189
Aïmeur, E. ........................................................59
Al fawwaz, B..................................................114
Al nawayseh, M..............................................114
AlGhamdi, R. .................................................153
Ali, A..............................................................175
Al-khaffaf, M..................................................107
AlQifari, R........................................................19
AlSoufi, A. ............................................... 11, 207
Balachandran, W. ...........................................114
Bang, H...........................................................185
Berg, J.............................................................129
Braun, D. ........................................................199
Carrillo, J..........................................................35
Chang, C.........................................................145
Chen, L. ..........................................................145
Chiang, M. .....................................................145
Colbaugh, R................................................51, 67
Delgado, B........................................................35
Dolák, R. ............................................................3
Drew, S...........................................................153
Fan, Q. ..............................................................27
Finkelstein, M. ...............................................180
Garbarino, H.....................................................35
Glass, K. .....................................................51, 67
Griffiths, G. ....................................................121
He, T.................................................................75
Hettich, M.........................................................91
Hsieh, M. ........................................................217
Isern-Deyà, A. ................................................211
Jang, S. .............................................................99
Kaehler, J........................................................199
Karla, J. ..........................................................199
Keretho, S.......................................................129
Kung, C. .........................................................217
Lee, D. ..............................................................99
Lin, H. ........................................................43, 75
Löffler, C..........................................................91
Malik, Z.................................................. 170, 175
Malo, R. .........................................................223
Martins, F. ......................................................137
Mut-Puigserver, M. ........................................211
Nguyen, A. .....................................................153
Nguyen, J........................................................153
Norta, A.......................................................... 194
Öğüt, H........................................................... 165
Paniza-Fullana, A........................................... 211
Park, H. ............................................................ 99
Payeras-Capellà, M. ....................................... 211
Pruksasri, P. ................................................... 129
Rezaei, N........................................................ 121
Shafqat, M...................................................... 170
Shin, K. .......................................................... 220
Slaninová, K....................................................... 3
Sowaileh, A...................................................... 11
Suchánek, P........................................................ 3
Tallat, A. ........................................................ 220
Torres, A. ....................................................... 137
Touré, F............................................................ 59
Wang, Y.M....................................................... 75
Wang, Y.S........................................................ 75
Wasly, H. ....................................................... 207
Watjatrakul, B. ................................................. 83
Wu, S................................................................ 75
Wu, W. ........................................................... 217
Wu, Y............................................................. 217
Yang, C. ......................................................... 145
Yasuda, H....................................................... 220
Yen, C. ........................................................... 145
Ykhlef, M......................................................... 19