Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Business

2003

Institution
Keyword
Publication
Publication Type

Articles 1 - 21 of 21

Full-Text Articles in Entire DC Network

An Investigation Of Consumer Online Trust And Purchase-Repurchase Intentions, Dan J. Kim, Donald Ferrin, Raghav Rao Dec 2003

An Investigation Of Consumer Online Trust And Purchase-Repurchase Intentions, Dan J. Kim, Donald Ferrin, Raghav Rao

Research Collection Lee Kong Chian School Of Business

There is little research on trust and satisfaction in the electronic commerce from a longitudinal (pre- and postpurchase) perspective. Based on previous frameworks and theories, this study developed a combined model of consumer trust and satisfaction in the context of Internet shopping. From the valance framework and expectation-confirmation theory, several prepurchase and post-purchase factors such as risk, benefit, consumer trust, expectation, confirmation, and satisfaction are investigated as research variables affecting consumer repurchase intention.

The results of the study show that trust is the strongest predictor of the consumer’s purchase intention. In addition, as in traditional consumer satisfaction studies, it holds …


Business Faculty Opinions Of Teaching Methods And Resources, Gundars Kaupins, Malcolm Coco Oct 2003

Business Faculty Opinions Of Teaching Methods And Resources, Gundars Kaupins, Malcolm Coco

Mountain Plains Journal of Business and Technology

About two hundred and eighty business professors compared seventeen teaching methods and resources based on four objectives. Interactive, hands-on teaching methods such as internships were rated first and less interactive teaching resources such as radio were rated last. Web courses that included more interaction such as chats were rated higher than Web courses with audio, typed lectures, and videos. However, all four types of Web courses investigated were rated in the bottom half of the teaching methods and resources. Results correspond to major principles of andragogy theory.


Infotech Update, Volume 11, Number 5, September/October 2003, American Institute Of Certified Public Accountants. Information Technology Section Sep 2003

Infotech Update, Volume 11, Number 5, September/October 2003, American Institute Of Certified Public Accountants. Information Technology Section

Newsletters

No abstract provided.


Antecedents Of Consumer Trust In B-To-C Electronic Commerce, Dan J. Kim, Donald L. Ferrin, H. Raghav Rao Aug 2003

Antecedents Of Consumer Trust In B-To-C Electronic Commerce, Dan J. Kim, Donald L. Ferrin, H. Raghav Rao

Research Collection Lee Kong Chian School Of Business

Despite the importance of trust in electronic commerce, there is insufficient theory and evidence concerning the determinants of consumer trust about an Internet vendor’s trustworthiness, and the influence of consumer trust on the consumer’s purchasing intention. The purpose of this study is to: i) develop a theoretical framework identifying the antecedents of a consumer’s trust and purchase intention, ii) test the proposed model using Structural Equation Modeling, analyzing Internet consumer behavior data collected via a Web survey, and iii) provide theoretical and managerial implications. The results of the study show that consumers’ disposition to trust, privacy protection, security protection, consumers’ …


Infotech Update, Volume 11, Number 4, July/August 2003, American Institute Of Certified Public Accountants. Information Technology Section Jul 2003

Infotech Update, Volume 11, Number 4, July/August 2003, American Institute Of Certified Public Accountants. Information Technology Section

Newsletters

No abstract provided.


Infotech Update, Volume 11, Number 3, May/June 2003, American Institute Of Certified Public Accountants. Information Technology Section May 2003

Infotech Update, Volume 11, Number 3, May/June 2003, American Institute Of Certified Public Accountants. Information Technology Section

Newsletters

No abstract provided.


International Advertising And The Use Of The Sex Appeal: Acceptance Of Sex Appeal In China, Katie Hunt Apr 2003

International Advertising And The Use Of The Sex Appeal: Acceptance Of Sex Appeal In China, Katie Hunt

Theses and Dissertations

Modern American culture reflects equality between men and women. Modern Chinese culture reflects a growing equality between men and women.


Information Sharing And Interoperability In Law Enforcement: An Investigation Of Federal Criminal Justice Information Systems Use By State/Local Law Enforcement Organizations, David R. Dethlefs Mar 2003

Information Sharing And Interoperability In Law Enforcement: An Investigation Of Federal Criminal Justice Information Systems Use By State/Local Law Enforcement Organizations, David R. Dethlefs

Theses and Dissertations

This thesis investigates the frequency of use and perceptions of usefulness of federal criminal justice information systems among state and local law enforcement personnel and certain IS environmental factors that affect usage. The study is predicated by a demonstrated need for increased information sharing, interoperability, and collaboration among the three tiers of law enforcement as public safety threats within U.S. borders increase in complexity; e.g., the Murrah Federal Building bombing, Columbine High School shooting, 9/11 terrorist attacks, and D.C. sniper case. The results of this research indicate high usage and perceived usefulness of the National Crime Information Center Network (NCIC …


Survey Of Technology Use In El Paso County, Mathew Mcelroy, Dennis L. Soden Feb 2003

Survey Of Technology Use In El Paso County, Mathew Mcelroy, Dennis L. Soden

IPED Technical Reports

No abstract provided.


Employer And Employee Rights And Responsibilities In A Networked Office, Ronald Tidd, Nancy Graber Pigeon Jan 2003

Employer And Employee Rights And Responsibilities In A Networked Office, Ronald Tidd, Nancy Graber Pigeon

All Faculty Scholarship for the College of Business

Internet-connectivity is having a profound impact on the workplace. Employees use it to access data and information from global sources, communicate with others instantaneously regardless of physical proximity, work anytime, anywhere, so long as they have a digital device connected to the Internet. Alternatively, the technology can be used to subject coworkers to objectionable material, violate workers' privacy, and convey the appearance of working when actually abusing Internet resources. This article discusses the existing laws regarding employee usage of an employer's Internet resources and employer monitoring of that usage. Thus, it provides a foundation for understanding a body of law …


Website Performance: Hong Kong Hotels, Rob Law, Tony Chung Jan 2003

Website Performance: Hong Kong Hotels, Rob Law, Tony Chung

Hospitality Review

This research examines the performance of Hong Kong hotel websites in terms of information quality, and compares the performance among different hotel categories. Different from exsisting theoretical studies analyzing hotel websites, this research incorporates the perceptions of hotel guests and practitioners in the evaluation development process. Empirical results reveal that significant differences exist in the performance scores of luxury, mid-priced, and economy hotels. The authors also discuss implications for hotel industry practitioners and policymakers.


A Study Of .Net Framework, Sml Wev Services And Supply Chain Management, Huei Lee, Vance Etnyre, Kuo Lane Chen Jan 2003

A Study Of .Net Framework, Sml Wev Services And Supply Chain Management, Huei Lee, Vance Etnyre, Kuo Lane Chen

Journal of International Information Management

The. primary purpose of this paper is to explore Microsoft's platform - .Net, Web services, and XML for supply chain management. The following topics are studied: 1) The development of scripting languages for a supply chain management application; 2) The use of XML to enhance compatibility of the scripted applications; and 3) The implementation issues of Microsoft .Net platform. To answer the research questions, a technique similar to content analysis is used in this study. Seventeen case studies regarding the implementation of the .Net Web Services are examined.


Tam: The Moderating Effect Of Gender On Online Shopping, Xiaoni Zhang, Victor R. Prybutok Jan 2003

Tam: The Moderating Effect Of Gender On Online Shopping, Xiaoni Zhang, Victor R. Prybutok

Journal of International Information Management

In this study we applied Technology Acceptance Model (TAM) to address consumers' online purchasing intentions and examine the effect of gender as a moderating variable on purchase intention. Six hypotheses were proposed based on our research model. We validate TAM in an ecommerce environment using two split data sets one containing females and the other males. Structural equation modelling and t tests were performed to test the hypotheses. The results show that gender is an important moderating variable in online commerce. Understanding the differences between males and females provides practitioners with better understanding of the behaviour of consumers on the …


Building Literacy For Knowledge Economies: Reading And Writing About Trends And Issues In Business Week, Clive Muir Jan 2003

Building Literacy For Knowledge Economies: Reading And Writing About Trends And Issues In Business Week, Clive Muir

Faculty Publications

Knowledge economies require highly skilled workers to perform complex, information-based tasks with minimum supervision. Yet, studies in Canada and the United States show that even college educated workers often lack the information literacy skills necessary to perform their jobs. In this session, we will discuss how reading and writing about business trends and issues can help to improve business students’ analytical and critical thinking abilities.


How To Handle The Threat Of Catastrophe, Carol M. Sanchez, Stephen R. Goldberg Jan 2003

How To Handle The Threat Of Catastrophe, Carol M. Sanchez, Stephen R. Goldberg

Peer Reviewed Articles

One of the principal jobs of chief executives is to minimize risk and vulnerability to catastrophic events. Analyzing risk has become more complex since September 11, 2001. In addition to terrorism, other catastrophes can change the course of life as we know it including cyber crime, biological attacks, and the spread of diseases such as SARS. Companies must realign corporate priorities and put the security issue at the forefront, as many companies have done since the 9/11 attacks. Risk management has dealt traditionally with two types of events: known risk and unknown risk. Known risks are events you know exist, …


An Examination Of Employees' Understanding And Implementation Of The Information Security Program At Xyz Engineering Center, Dale J. Mancini Jan 2003

An Examination Of Employees' Understanding And Implementation Of The Information Security Program At Xyz Engineering Center, Dale J. Mancini

Dissertations

Purpose of Study. Due to an increase in global competition and employee dishonesty, the need for information security is on the rise. Consequently the XYZ Engineering Center faces an ever-increasing threat of industrial espionage and information theft. Employees of the Center have been given the product-security policy and have been encouraged to secure confidential information. Therefore, this study was designed to determine the level at which employees at the XYZ Engineering Center understand, value, and practice information security. Additionally, the study also examined employee views on physical safety while at work.

Methodology. The study used analysis of variance and a …


Data Mining Of Forensic Association Rules, James V. Hansen, Paul Benjamin Lowry, Rayman D. Meservy Jan 2003

Data Mining Of Forensic Association Rules, James V. Hansen, Paul Benjamin Lowry, Rayman D. Meservy

Faculty Publications

Data mining offers a potentially powerful method for analyzing the large data sets that are typically found in forensic computing (FC) investigations to discover useful and previously unknown patterns within the data. The contribution of this paper is an innovative and rigorous data mining methodology that enables effective search of large volumes of complex data to discover offender profiles. These profiles are based on association rules, which are computationally sound, flexible, easily interpreted, and provide a ready set of data for refinement via predictive models. Methodology incorporates link analysis and creation of predictive models based on association rule input.


Who’S Riding The Wave? An Investigation Into Demographic And Psychographic Characteristics Of Surf Tourists, Sara Dolnicar, M. Fluker Jan 2003

Who’S Riding The Wave? An Investigation Into Demographic And Psychographic Characteristics Of Surf Tourists, Sara Dolnicar, M. Fluker

Faculty of Commerce - Papers (Archive)

Surfing has grown from its beginnings as a western civilisation sport in the early 1900’s to a stage where it is now an industry worth an estimated $8 billion dollars and involves surfers travelling to both domestic and international destinations as surf tourists. However, there is a dearth of empirical academic research that has been conducted into this segment of the sports tourism market. This study makes a contribution towards understanding surf tourism behaviour by analysing the demographic and psychographic characteristics of 430 surf tourists. The most lucrative segments of the five identified, from the tour operators perspective, are the …


Determinants Of Internet Banking Adoption In Thailand, Bussakorn Jaruwachirathanakul Jan 2003

Determinants Of Internet Banking Adoption In Thailand, Bussakorn Jaruwachirathanakul

Theses: Doctorates and Masters

Increasingly competition in the financial services sector is forcing service providers to develop and utilise alternative delivery channels (Daniel, 1999). Within the sector, banking has always been a highly service intensive activity that relies heavily on technology to acquire, process, and deliver services and information to consumers (Tan & Teo, 2000). The emergence of the Internet has provided a way for banks to improve the efficiency of their service delivery and to gain a competitive advantage by reducing the number of brick-and-mortar branches. The study investigated the adoption of lnternet banking services in Thailand and is based on the premise …


Non-Business Use Of The World Wide Web : A Study Of Selected Western Australian Organisations, Craig Valli Jan 2003

Non-Business Use Of The World Wide Web : A Study Of Selected Western Australian Organisations, Craig Valli

Theses: Doctorates and Masters

Employees undertake a wide range of activities when they use the World Wide Web in the work place. Some of these activities may leave the modem Internet connected organisation vulnerable to undue or unknown risk, potential productivity losses and expense us a result of misuse or abuse or the Internet provision. Much of the existing literature on this subject points to a purported epidemic of misuse in the workplace. If this practice is so prevalent and widespread, what can modem Internet connected organisations do to identify the abuse and reduce the risks and losses that these abuses represent? To what …


Technological Achievement And Human Development: A View From The United Nations Development Programme, Kathy K. Dhanda, Ronald Hill Dec 2002

Technological Achievement And Human Development: A View From The United Nations Development Programme, Kathy K. Dhanda, Ronald Hill

Kathy K Dhanda

No abstract provided.