Annotated Bibliography – Synthesizing

Fruhling, A. & Digman, L. (2000).The impact of electronic commerce on business-level strategies. Journal of electronic commerce research, 1 (1), 1-10.

The purpose of the study was to examine the impact of electronic commerce on business-level strategies. Key findings are that business level strategies include differentiation, benefit, cost-leadership, growth, and focus. The research concluded that E-Commerce has important impacts in areas of business-level strategies. A key implication of literature reviewed in this article was Electronic commerce from intra-business perspective, business-to-business E.C., business-to-consumer E.C., and value/supply chain management.

(Fruhling & Digman) used a theoretical approach as the basis for this study. The framework identified that proliferation of electronic commerce in business organizations has great effects in business strategies. In addition competition rules are re-written and re-defined as revolution of technology continues. There are remarkable commerce projections through the internet. Electronic commerce has changed from high-tech marvel to a corporate initiative. The study methodology was qualitative. The study records that in the five years time most companies will be e-business companies, internet will be used in rewriting rules of the business. Firms that will quickly embrace e-commerce technology will have many opportunities at their disposal and those that fail will become irrelevant.

Strebinger, A., & Treiblmaier, H. (2006).The impact of business to consumer E-Commerce on organizational structure, brand architecture, IT structure, and their interrelations. Sbr 58, 81-113.

The purpose of this study was to identify the impact of business to consumer E-commerce on organizational structure, brand architecture, IT structure, and their interrelations. Key findings included mixed results for the identified hypothesis that high importance of B2C e-commerce strengthens dependence of IT structure that is related to marketing in brand architecture changes. The conclusion was increase in change in three structural elements increases according to the importance attached to the growth in Business to consumer e-commerce (Strebinger& Treiblmaier, 2006).

A key implication of the literature reviewed in this article, identifies that change in brand architecture, organizational structure and IT architecture are associated with each other after controlling the importance of Business to consumer e-commerce. (Strebinger & Treiblmaier) used a theoretical framework as basis for this study.

Theoretical framework included transaction cost theory .the study methodology was quantitative. Data was collected through telephone interviews. Study participants included 49 chief marketing officers (CMOs) and 49 chief information officers (CIOs). These were64 from 100 consumer brand companies that was very important in Australia. The data was analyzed using stepwise regression analyses method to get means and correlations of variables. Additional methods used include ordinary least squares(OLS) tests, weighted least squares(WLS) tests that would handle different variances of errors among companies that had two informants, and ordered logit estimates to manage non-interval scale of dependent variables that dealt with small sample sizes. (Strebinger & Treiblmaier) suggests that further research may be done in this area. Longitudinal research can give clear results on whether organizational structures and brand architectures react slowly or take more time to internal and external transaction structures altered by e-commerce than IT structures related to marketing.

Chen, L., & Holsapple, C. (2013).E-Business adoption research: state of the art. Journal of electronic commerce research, 3(14), 1-26.

            The purpose of this study was to identify the rate of adoption research as a state of art. Findings indicate 618 articles appearing in 342 journals that cover diverse disciplines. Each journal is found to publish 1.8 e-business adoption research articles from 2006 and 2011. Among 342 journals, 231(67.5%) published one article while 61(17.8) published two articles. Most frequent journals are journal of internet banking and Commerce (16), Communications of the IBIMA (international Business Information Management Association) 10, International Journal of Bank Marketing (10), and of Electronic Commerce in Organizations (10). Macro Level analysis among countries and regions indicates five articles in countries and one article in regions having e-commerce adoption related articles. At micro level, analysis business organizations had 219 articles, non-profit organizations had 58 articles, academic organizations had 30 articles, healthcare sector had 11 articles, governments had four articles, and others like church, and library had 13 articles. Individual’s household consumers had nine articles while individual consumers had 326 articles bringing 326 articles.

The key Implication of the literature reviewed in this article emphasized the importance of classifying analysis units in e-business adoption. (Chen& Holsapple) used a technology-organisation-environment framework, which is appropriate for adoption of e-business in organizations as TAM can be used for individuals and organizations. The study methodology included a key word approach where data was extracted from Google Scholar database. Study participants included journal articles. The data was analyzed using keyword approach. (Chen & Holapple) suggests the findings could be applied in reliability pertinent according to content coding, stability and accuracy among comparison studies. Further research options for the future might include survey, archival data, experiment, website review, meta-analysis, simulation, and modeling.

Kaur, K. & Ashutosh. (2015) E-Commerce privacy and security system.

The purpose of the study was to know how to increase security and prevent threats in the future. It was found that most people who use ranks are confident with protocols of security offered. The research concluded that most participants did not trust the intentions of the study. (Kaur,K.& Ashutosh).A key implication of the literature reviewed in this article revealed that improvement of security apparatus leads to an improvement in e-marketing thus increasing net banking. (Kaur & Ashutosh) used a theoretical and conceptual framework as the basis for the study. This framework included online security in ecommerce dynamic in nature. Maintenance of new and update of security intelligent ensures consistency in flexibility and efficiency working of ecommerce. The study methodology was quantitative online data mining. Data was collected via online data mining. Study participants were 50.the data was analyzed through answering two questions whereby variable were dependent on a 0.5 probability ratio. (Kaur & Ashutosh) suggests the findings could be applied Future research might include internet security; trust in e-payment system, electronic commerce research and applications.

Issa, N. (2014).Ranking of the E-Trust factors in Electronic Transactions in the context of B2C E-Commerce.

            The purpose of this study was to collect data from 10 e-commerce sites with special concern about reviews and perspectives of customers and rank them according to their trust factor. Key findings were that the perceptions of customers on electronic trust depend on privacy, policy, e-security, and marketing factors (Issa, 2014). A key implication of the literature reviewed in this article indicates that trust has grown with online business transaction.(Issa) used a theoretical framework to explain that priority of electronic security trust depends on e-security, privacy policy and mixed marketing factors. The study methodology was quantitative, where data was collected via Friedman’s ranking method. Study participants included 10 e-commerce websites. Data analysis was done through Friedman’s Ranking method. (Issa) suggests future research should be done on internet security.

Alekhya, P. & Basha, M. (2015). Protecting E-commerce systems from Online Fraud.

            The purpose of this study was to offer ultimate solution to modern cyber threats. The researchers found that there were many approaches that would limit fraud in credit cards and concluded that users have to be vigilant because fraudsters often change their tactics. The study methodology was genetic programming, sequence alignment, machine learning, Fuzzy logic, data mining, and artificial intelligence to improve threat of security. The study used a qualitative framework approach. Data was collected via computer software programs. Study participants included different software programs. The data was analyzed using qualitative methods.

Papp, J. (2015). A medium of exchange for an internet Age:  How to regulate Bitcoin for the Growth of E-commerce.

            The purpose of this study was to describe obstacles faced by Bitcoin in its acceptance by mainstream commercial market places. Key findings and conclusions indicates a need for governments to exercise an economic reality test on products to negotiate on use of technology and regulatory policies. A key implication of the literature reviewed in this article indicated a need for governments to add technology benefits to improve commerce. (Papp) used a theoretical framework as the basis for this study. It argued that future governments should introduce direct legislation that allows Bitcoin system to be usable for growth and development of business globally. Study methodology was qualitative. Researchers argue that E-Commerce is prone to cyber crime. The limitation included disparities in registration.

Tirkar, A. (2015).Trend of E-commerce Technology and its security issues.

The purpose of this study was to introduce advanced methods in electronic commerce, security concerns, and new ideas in technology that ensures security and reliability E-Commerce transactions. The study found that E-Commerce has the opportunity to thrive as new technologies are appraising reliability and security. A key implication of the literature reviewed in this article identified a need for continuous research toward continuously appraising security concerning e-commerce.(Tirkar) used a theoretical framework which indicated that internet is a critical and integral aspect of today’s life. As observed through modern business. The study methodology was qualitative. The study was faced with limitations in resources to use in practical applications.

Part 2 synthesizing the scholarly literature

The above articles draw various conclusions using a theoretical approach.

E-Commerce has important impacts in areas of business-level strategies

There is a need for governments to exercise economic reality test on various products to discuss uses of technology and regulatory policies.

High importance of Business to Consumer e-commerce strengthens IT structure dependence related to marketing brand architecture. In addition, it increases growth in business to consumer e-commerce.

E-business adoption has increased with many articles published in journals.

Improvement of security apparatus leads to an improvement in e-marketing thus increasing net banking. It increases security and prevents threats in the future. Most people who use ranks are confident with protocols of security offered. Perceptions of customers on electronic trust depend on privacy, policy, e-security, and marketing factors whereby trust has grown with online business transaction.

A solution to modern cyber threats such as credit cards fraud includes vigilance among users since fraudsters change their tactics often. There is a need for governments to exercise an economic reality test on products to negotiate on use of technology and regulatory policy to add technology benefits that would improve commerce. E-Commerce opportunity will thrive since new technologies are appraising reliability and security of e-commerce transactions.

 

References

Alekhya, P. & Basha, M. (2015). Protecting E-commerce systems from Online Fraud.

Chen, L., & Holsapple, C. (2013).E-Business adoption research: state of the art. Journal of electronic commerce research, 3(14), 1-26.

Fruhling, A. & Digman, L. (2000).The impact of electronic commerce on business-level strategies. Journal of electronic commerce research, 1 (1), 1-10.

Issa, N. (2014).Ranking of the E-Trust factors in Electronic Transactions in the context of B2C E-Commerce.

Kaur, K. & Ashutosh. (2015). E-Commerce privacy and security system.

Papp, J. (2015). A medium of exchange for an internet Age:  How to regulate Bitcoin for the Growth of E-commerce.

Strebinger, A., & Treiblmaier, H. (2006).The impact of business to consumer E-Commerce on organizational structure, brand architecture, IT structure, and their interrelations. Sbr 58, 81-113.

Tirkar, A. (2015).Trend of E-commerce Technology and its security issues.

 

 

 

 

 

 

 

All Rights Reserved, Essaysland.com
Disclaimer: