scispace - formally typeset
Search or ask a question

Showing papers in "The e-Business Studies in 2011"


Journal ArticleDOI
TL;DR: This work refers to the purchase motivation of mobile applications among experienced users who have bought paid applications and suggests four categories of applications (productivity, entertainment, information, and social networking) and classify the purchase intentions on each category based on the ground theory.
Abstract: The ability of offering various and abundant mobile applications has emerged as the knowledge of the smartphone has grown in the smartphone market. The mobile application market has emerged as a competitive new market with enormous potential. Although many users download paid or free mobile applications through the app markets such as the Appstore, there is no significant research regarding customer`s application purchase yet. Hence, we refer to the purchase motivation of mobile applications among experienced users who have bought paid applications. We conducted the interview with 30 users and suggest four categories of applications (productivity, entertainment, information, and social networking) and also classify the purchase intentions on each category based on the ground theory. The comparison analysis of the interview provides us what factors affect the application purchase. This framework may advance effective mobile application business model development, implicate the strategy for boosting mobile application market.

20 citations


Journal ArticleDOI
TL;DR: (opinion mining) 혹은 감성 분석(sentiment analysis) 그 의견이 통해 제공하고 있다.
Abstract: 초 록전자 상거래 사이트의 상품 리뷰는 구매 예정자들에게 유용한 정보로 활용될 수 있지만, 방대한 양으로 인해 사용자가 모든 리뷰를 읽는 것은 불가능에 가깝다. 이를 보완하고자 전자 상거래 사이트들은 상품이나 그 특징에 대한 별점 통계, 유용한 리뷰 분류 등을 사용자의 참여나 수작업을 통해 제공하고 있다. 오피니언 마이닝(opinion mining) 혹은 감성 분석(sentiment analysis)은 이러한 일련의 과정을 자동화하는 연구로서, 상품 리뷰의 사용자 의견을 대상으로 그 의견이 긍정적인지, 부정적인지 판단한 후 요약하여 제공한다. 하지만 기존의 감성 분석은 구매예정자에게 유용한 정보, 즉 상품평의 극성을 판별하거나, 상품 특징별 평가 요약 등에만 초점을 맞추고 있어, 상대적으로 의견 정보의 활용도가 낮아지는 문제가 있다. 실제 상품 리뷰에는 상품의 평가 외에도 제품이 가지고 있는 문제점, 고객의 불만 등이 제시되어 있으며, 이를 관리자가 효과적으로 분석하여 의사 결정에 지원에 활용하고자 하는 요구가 늘어나고 있다. 이에 본 논문은 다양한 종류의 의견 정보를 파악하여 데이터 웨어하우스에 저장한 후, 의견 정보를 온라인에서 동적으로 분석하고 통합 처리하는 모델링 방안을 제시한다. 또한 이를 활용하여 실제 전자 상거래 사이트의 한 종류인 어플리케이션 판매 사이트의 리뷰에 대한 분석을 수행하였다.ABSTRACTProduct reviews in online shopping sites can serve as a useful guideline to buying decisions of customers. However, due to the massive amount of such reviews, it is almost impossible for users to read all the product reviews. For this reason, e-commerce sites provide users with useful reviews or statistics of ratings on products that are manually chosen or calculated. Opinion mining or sentiment analysis is a study on automating above process that involves firstly analyzing users’ reviews on a product to tell if a review contains positive or negative feedback, and secondly, providing a summarized report of users’

17 citations


Journal ArticleDOI
TL;DR: This study suggests a method which calculate not only the costs of damage from firms` perspective but also those from individual and social perspectives, and tries to make a new model by using new methods and verifying it with theories and methods from econometrics, cost accounting and theory of producer.
Abstract: Damage caused by private information breach causes serious problems and huge social losses. In order to make a better policy that prevents society from suffering from the damage, we have to know about the actual size of damage. So it is needed to develop a quantitative model of private information breach that helps catching the more accurate size of damage. In our study, we suggest a method which calculate not only the costs of damage from firms` perspective but also those from individual and social perspectives. In this process, we refer to methods adopted by JNSA(Japan Network Security Association) and Ponemon Research Institue and modify it with considering our current situation. Also we try to make a new model by using new methods(web traffic analysis, survey, indirect comparison, etc.) and verify it with theories and methods from econometrics, cost accounting and theory of producer.

14 citations


Journal ArticleDOI
TL;DR: The main findings are that, for a site to rank well, it must use a combination of increasingly sophisticated techniques and tools, and not to rely on outdated methods such as Meta tags (especially the keywords).
Abstract: Internet is fast becoming critically important to commerce, industry and individuals. Perhaps the most important single component of this communication network is the Search Engine (SE). Successful Websites rank high in SEs hits, whereas unsuccessful Websites may not rank at all. In an effort to increase the ranking of Sultan Qaboos University (SQU) amongst international universities, it was recommended to apply “Webometrics” measures. Hence, it was necessary to enhance the university's Website ranking. Therefore, the primary aim of this research is to explore the factors and techniques that contribute to a page ranking highly in a Search Engine Results Page (SERP). The research is divided into two parts. The first part is a descriptive/interpretive analysis aiming to provide an outline of the current and relevant literature with regard to Search Engine Optimization (SEO). It covers how SEs work, and explores the guidelines that are available for Web designers to optimize Web pages, thereby increasing their visibility and ranking. Furthermore, it provides a short history of the most important SEs, differentiates between them, and reviews the approaches they use to crawl, index, and display search results. It also provides an account of the different factors/methods impacting Website ranking. The second part documents an action research project undertaken to enhance the visibility and ranking of the SQU Website. The main findings are that, for a site to rank well, it must use a combination of increasingly sophisticated techniques and tools, and not to rely on outdated methods such as Meta tags (especially the keywords). Fortunately, there are many online tools which can assist in tuning a site to work better, as well as other freely available good pieces of advice.

13 citations


Journal ArticleDOI
TL;DR: An efficient storage technique that can minimize data redundancy compared to the existing techniques by splitting relation information and data information from triple formatted RDF data and enhance query processing speed is designed and implemented.
Abstract: We design and implement an efficient storage technique to improve query processing for a large RDF data set. The proposed techniques can minimize data redundancy compared to the existing techniques by splitting relation information and data information from triple formatted RDF data. Also, we can enhance query processing speed separating and connecting the entire query steps by relation and data based on the proposed storage technique. The proposed technique can be applied to the areas, such as e-Commerce, semantic web, and KMS to store and retrieve a large RDF data set.

10 citations



Journal ArticleDOI
TL;DR: ROMS (Realtime Online Marketing System) which supports tools to improve conversion ratio of e-commerce sites, ROMS gathers behavioral data of visitors and analyzes it in realtime and supports live chats, visitor profiling, context analysis, event detection, and live marketing.
Abstract: The rapid growth of e-business market makes new online companies to start and existing offline companies to join in this area. As the number of players of this market grows rapidly, the competition among them is very intense. Many companies invest huge resources to online marketing including search advertisement, email advertisement and banner advertisement. Because these traditional online marketing activities mainly focus on how to invite visitors to their web sites, ROI of these marketing activities are getting lower. Many companies are looking for a new marketing method to escape this situation. In this paper, we propose ROMS (Realtime Online Marketing System) which supports tools to improve conversion ratio of e-commerce sites, ROMS gathers behavioral data of visitors and analyzes it in realtime. ROMS supports live chats, visitor profiling, context analysis, event detection, and live marketing. With ROMS, personalized offers based on visitors` realtime context can be made for each visitor.

9 citations


Journal ArticleDOI
TL;DR: In this paper, the authors proposed a method to solve the problem of the lack of resources in the South Korean market by using the concept of a "social network" for the purpose of improving the performance of the social network.
Abstract: 본 연구는 중화이론, 계획된 행동이론, 보호동기이론에 기반하여 조직원들의 정보보안 정책 준수에 영향을 미치는 요인들을 도출하고 이들 요인들의 관계에 관한 연구모형 및 가설을 설정하였다. 연구모형 및 가설에 대한 실증분석을 위해 웹 서베이를 통해 자료를 수집하였고 총 207개의 설문 중 194개 설문이 사용가능하였다. 통계분석은 PLS 방법에 의하였고 신뢰도, 타당도, 모형의 적합도가 모두 적정한 것으로 나타났으며, 가설검증 결과는 총 8개의 가설 중 7개의 가설이 모두 지지되는 것으로 나타났다. 본 연구의 이론적인 시사점은 첫째, 조직원들의 정보보안 정책 준수에 대한 향후 연구들의 초석이 될 것으로 기대된다. 둘째, 심리학에서 근거한 요인을 접목하여 IS 연구와 심리학 연구의 고찰을 통해 정보보안연구의 학제 간 접근을 시도한 것과 마지막으로 이론적 고찰을 통해 정보보안 정책 준수에 관한 요인들에 대한 조작적 정의를 구체화시켜 제시하였다는 점이다. 아울러 실무적 시사점은 첫째, 조직에서 정보보안 정책의 성공적인 실행을 위한 전략방안을 수립할 때 본 연구결과에 근거한 가이드라인을 제공할 수 있다는 점이며, 둘째, 조직원들의 정보보안 정책 위반에 대한 중화심리를 억제시키기 위해 조직구성원들에 대한 의식교육 및 훈련 프로그램 실시에 대한 필요성을 부각시켰다는 점이다.

9 citations


Journal ArticleDOI
TL;DR: A set of usability principles for application development and usability evaluation is introduced by analyzing characteristic of augmented reality applications, and expert evaluation is conducted on three augmented Reality applications primarily used by smart phone users.
Abstract: Augmented reality applications offering location based service on smart phone require attention to users and new usability evaluation methods. The aim of this paper is to introduce new usability principles for application development and usability evaluation, and conduct expert evaluation on the augmented reality applications. We created a set of usability principles by analyzing characteristic of augmented reality applications, and conducted expert evaluation on three augmented reality applications primarily used by smart phone users. In expert evaluation and filtering procedure, we identified six usability problems that three applications have in common and the improvement guideline for the usability problems. The results of expert evaluation was verified by user test with a prototype that was developed using the guidelines. It is expect that the results of this study can be presented usability principles of the augmented reality application and a method of usability evaluation in the middle of new technology development process.

9 citations


Journal ArticleDOI
TL;DR: In this article, the authors examine factors affecting an individual's acceptance of mobile banking, which is a typical example of smartphone based self-service, and derive three personal traits (positive technology readiness, negative technology readiness and individual's expertise) as antecedent variables that affect intention to use mobile banking from previous studies.
Abstract: The purpose of this study is to examine factors affecting an individual`s acceptance of mobile banking, which is a typical example of smartphone based self-service. We derive three personal traits(positive technology readiness, negative technology readiness and individual`s expertise) as antecedent variables that affect intention to use mobile banking from previous studies, and adopt a technology readiness and acceptance model(TRAM) to investigate factors that determine an individual`s intention to use mobile banking. TRAM, which integrates technology readiness index(TRI) into the technology acceptance model (TAM) in the context of consumer adoption of e-service systems, is adopted to examine personal traits influencing on the factors forming the attitude of mobile banking. The new findings of this study are as follows. First, individual`s expertise and positive technology readiness(ptr) have significant effect on both perceived usefulness and perceived easy of use. However, negative technology readiness(ntr) has significant effect on only perceived easy of use.

8 citations


Journal ArticleDOI
TL;DR: In this paper, the authors analyzed the factors that determine the helpfulness of online consumer reviews and how the factors affecting the effectiveness of an online consumer review differ according to the product price.
Abstract: For the success of an online retail market, it is important to allow consumers to get more helpful reviews by figuring out the factors determining the helpfulness of online reviews. On the basis of elaboration likelihood model, this study analyzes which factors determine the helpfulness of reviews and how the factors affecting the helpfulness of an online consumer review differ for product price. For this study, 75,226 online consumer reviews were collected from Amazon.com. Furthermore, additional information on review messages was also gathered by carrying out a content analysis on the review messages. This study shows that both of peripheral cues such as review rating and reviewer`s credibility and central cues such as word count of review message and the proportion of negative words influence the helpfulness of review. In addition, the result of this study reveals that each consumer focuses on different information sources of reviews depending on the product price.

Journal ArticleDOI
TL;DR: This study extracted and categorized the information assets considering characteristics of small organization`s size and business process through qualitative observation method and validated the classified information assets by utilizing statistical method.
Abstract: Small IT service organizations operate their business with limited resources and workforce in comparison with large enterprises, and they could be categorized in various types based on the method of value creation. But the recent studies on information security have been conducted and they were focused on the construction of general information security countermeasure, without considering size of the business and characteristic. Hence we have undergone the process of classifying information assets. Then we extracted and categorized the information assets considering characteristics of small organization`s size and business process. Specifically we have classified the information assets according to business scenario design through qualitative observation method. Then we have validated the classified information assets by utilizing statistical method. We may anticipate that this study results could be basic data for developing the differentiated information security countermeasures for small IT service organization.



Journal ArticleDOI
TL;DR: “극히 드물다”, “�“방형 협업을 통한 화두로 떠오르고 그 수요가 학계와 증�ai하�
Abstract: 초 록신서비스 개발이 업계와 학계의 화두로 떠오르고 그 수요가 날로 증가하고 있음에 비해 신서비스 개발을 위한 방법론에 관한 연구는 아직 초기단계에 머무르고 있다. 특히, 외부자원을 이용한 개방형 협업에 관한 관심이 커지고 있음에도 불구하고 외부자원을 이용한 신서비스 개발 방법론에 관한 연구는 극히 드물다. 본 연구는 인터넷과 모바일 등의 정보통신기술 발달을 바탕으로 외부자원을 내부자원과 결합하여 신서비스 개발 아이디어를 창출하고 신서비스 기반의 비즈니스 모델을 개발하기 위한 새로운 방법론을 제안한다. 본 논문에서 제안하는 이른바 “개방형 협업을 통한 혁신 방법론”은 최근 주목 받고 있는 개방형 혁신 모델의 이론과 사회심리학에서의 인간의 협력 의지에 관한 연구에 이론적 근거를 둔다. 이 방법론을 통해 서비스 개발의 목적에 따라 적정한 외부 참여자를 식별하여 동기를 부여하고 통제 및 모니터링 할 수 있는 시스템을 디자인하여 신서비스 모델을 창출해 나가는 과정을 제안한다. 끝으로 우리는 사례를 통하여 어떻게 이 모델이 실제 비즈니스에 적용될 수 있는지를 보여준다. 본 연구를 통하여 신사업을 기획하는 기업에 실제적인 도움을 주는 동시에, 집단지성, 웹 2.0, 크라우드소싱 등으로 나타나고 있는 개방형 협업 모델에 관한 이해를 제고하는 데 기여할 수 있을 것으로 기대한다. ABSTRACTWhile new service development has become one of the most popular topics among practitioners and academics, methodologies development for new service development is only in its infancy. Especially, despite the growing interests in open innovations that effectively utilize external resources for R&D, existing research on new service develop-ment methodology designed to use external resources is scant. This article proposes a new methodology to generate new service business models that utilize massive external resources in combination with internal resources using ICT. The “Open Collaboration Innovation Methodology (OCIM)” is built based upon the theory of open innovation model and social psychology theories on behavioral motivation for cooperation. The model begins with the procedures to identify external resources that meet service objectives and requirements, and suggests motivation, control and monitoring mechanisms to implement

Journal ArticleDOI
TL;DR: This study suggests positive effects of cloud computing for collaboration by proving perceived fit and performance in initial cloud computing.
Abstract: There are expectations about future internet technology with IT development by end-users. Cloud computing is attracted to satisfy those demands. However, adoption of cloud computing is not active that much. Therefore, this study verified how cloud computing environment affects performance of team project. We conducted empirical study on performance of team project with cloud computing as technology tool focusing on Task-Technology Fit Model. We collected samples that were undergraduate and graduate school students and had experience on initial cloud computing such as Google-Docs and Webhard when they conducted team project for assignment. We focused on accessibility and reliability as task-technology fit and those variables treated as first order factor. Result showed that cloud computing is suitable technology tool for team project. This study suggests positive effects of cloud computing for collaboration by proving perceived fit and performance in initial cloud computing.


Journal ArticleDOI
TL;DR: The present study examines the impact of eWom on consumer decision making process by viewing eWOM as the product information supplier using the concept of information entropy which was proposed in the information theory to explain different consumer responses to various types of product information in e WOM.
Abstract: The present study examines the impact of eWOM on consumer decision making process by viewing eWOM as the product information supplier. We employ the concept of information entropy which was proposed in the information theory to explain different consumer responses to various types of product information in eWOM. Information entropy is the degree of uncertainty associated with the information in the message. In eWOM, a variety of information with different levels of entropy is available, and these different entropy levels result in different impacts on consumer behavior. The preliminary hypotheses are formulated to examine the impact of eWOM on consumer behavior, at the product attribute level and the purchase action level separately. An experiment was conducted to online shopping mall users and the analysis gives valuable insights into our future research.

Journal ArticleDOI
TL;DR: In this paper, the authors explore causality of autonomy, competence, relatedness and relatedness which are major variables of self-determination theory that studied factors effecting intrinsic motivation influencing flow and satisfaction.
Abstract: The smartphone is simply beyond the means of communication equipment, to line up the turning point of mobile convergence, is recognized as a service tool of new concept the camera, game, multimedia function, digital multimedia broadcasting, mobile internet etc, that use of smartphone is working toward developed a variety and new business models. The study is empirically studied casualties that self-determination influences flow and satisfaction which is intrinsic motivation of smartphone. There are many studies on flow, is intrinsic motivation, influencing satisfaction and Loyalty, but there are little studies which variables influences flow. this study is explore causality of autonomy, competence, relatedness which are major variables of self-determination theory that studied factors effecting intrinsic motivation influencing flow and satisfaction. This study developed a research model to explain the use of smartphone, and collected 670 survey responses from the office workers of seoul S company who had experiences with such smartphone. To prove the validity of the proposed research model, SEM analysis is applied with valid 670 questionnaires. The results, firstly, autonomy positively influences flow. secondly, competence significantly influences flow. thirdly, relatedness significantly influenced flow. also, upper above results shows that flow influences satisfaction.

Journal ArticleDOI
TL;DR: In this paper, the authors adopted IS continuance and habit theory to study smart phones' use behavior and found that perceived usefulness and perceived ease of use, satisfaction of smart phone usage, continuous use, and habit showed the causes and effects relationships.
Abstract: Smart phones play a significant part in the evolution IT industry. In domestic market, smart phones have grown rapidly. However, until today, precedent studies on smart phones, particularly about the reason why consumers use smart phones are uncommon. Thus, in this study we adopted IS continuance and habit theory to study smart phones` use behavior. The results reveal that perceived usefulness and perceived ease of use, satisfaction of smart phone usage, continuous use, and habit showed the causes and effects relationships. The results indicated that perceived usefulness and perceived ease of use had a positive effect on smart phone user satisfaction. Moreover, smart phone user satisfaction had a positive effect on the smart phone habits and explorative use. However, smart phone user satisfaction showed insignificant effect toward exploitive use. That is, satisfied users regularly use the smart phone but need to formulate habit of use, and then influence exploitive use. Habit showed a positive effect on both exploitive use and explorative use, Finally, we found that users are likely to pay more attention on new features of smart phones while they are using the devices.


Journal ArticleDOI
TL;DR: The results of this study show that the CEO`s support is able to elevate the level of information security governance.
Abstract: To solidate information security, Korea government introduces information security governance. The public institutions and agencies in korea have begun to recognize the importance of information security governance. For solidating information security governance, the government has tried to establish and solidate an information security policy and information security systems. This study suggests factors affecting the level of information security governance in the public agencies and institutions through the factor analysis and the linear regression analysis. The results of this study show that the CEO`s support is able to elevate the level of information security governance. The level of information security governance has relation with the number of the staff in information departments, and the budget in the public agencies and the institutions. This study provides directions for the public agencies and the institution for elevating the levels of information security governance.

Journal ArticleDOI
TL;DR: In this paper, the authors investigated the trend of price changes in e-commerce and identified the critical factors in the increase of maximum price are number of sellers and the time span after a product was released.
Abstract: With the advancement of Internet, electronic commerce has rapidly expanded and considered as a major retail channel. In the early days of the Internet, many studies compared offline and online stores on their price level and dispersion. Since e-commerce is considered matured, we need to see price change behavior in e-commerce rather than comparing it with traditional channels. Thus, this study investigated the trend of price changes in e-commerce. The data that was gathered from a price comparison site also contained six product categories. The decrease in minimum and average price was identified and the increase in maximum price was also identified. The critical factors in the increase of maximum price are number of sellers (positive effect) and the time span after a product was released (negative effect). The differences in price changes between product categories were also investigated.

Journal Article
한창희, 채승완, 유병준, 안대환, 박채희 
TL;DR: In this article, the authors proposed a method to solve the problem of the lack of a suitable solution to the problem by using the concept of "social media" and "social networks".
Abstract: 정보화의 빠른 진전과 더불어 정보화의 역기능 역시 비례하여 확산되고 있으며 그 피해는 막대한 것으로 추정되고 있다. 하지만 현재까지 개인정보 유출의 피해규모에 대한 연구와 자료가 미흡한 실정이기 때문에 이로 인한 국가적 피해규모를 계량화하는 작업에 많은 현실적 어려움이 존재하고 있다. 만약 피해액의 규모를 제대로 산출하여 보안정책 수립에 참고한다면 경제적으로나 사회적으로 미치는 사고 영향의 심각성을 정확히 파악할 수 있으며, 결과적으로 유출사고 대응에 필요한 기업 그리고 정부의 노력과 비용의 크기에 대한 의사결정을 할 수 있기 때문에 체계적인 경제적 피해규모를 파악하는 일은 매우 필요한 과제라고 판단된다. 이에 본 연구는 일본 네트워크 보안협회 등 해외 유수 연구들의 방법론과 새로운 접근법들을 참고하여, 개인정보 유출사고의 피해실태를 파악하기 위한 정보의 수집과 이의 정량적 분석의 개념적 틀을 제시하고자 한다. 또한 비교적 데이터가 부족한 국내의 환경에서도 정책적 지표로서 의미 있는 피해액을 측정함으로써 개인정보 유출 피해를 막기 위한 다양한 정책기획의 기반자료로 활용될 수 있기를 기대한다.

Journal ArticleDOI
TL;DR: In this article, the authors investigated the impact of the 2007 Electronic Financial Transaction Act (EFTA) on information security activities of financial institutions and services providers and concluded that a liability and compliance law is likely to contribute to a certain degree to the achievement of sustainable development of cyber security.
Abstract: Many governments have tried to develop a liability and compliance law that can improve cyber security in a sustainable way. This paper explores whether a liability and compliance law is effective in motivating firms` information security activities. In particular, I empirically investigate the impact of the 2007 Electronic Financial Transaction Act (EFTA), a liability and compliance law in Korea, on the information security activities of financial institutions and services providers. In spite of various criticisms of the effectiveness of EFTA, the empirical findings of this study clearly show that EFTA is having a positive impact on information security activities. From these findings, this article concludes that a liability and compliance law is likely to contribute to a certain degree to the achievement of sustainable development of cyber security.


Journal ArticleDOI
TL;DR: This research found associations among the components from various definitions applying market-basketanalysis, redefining interoperability, and can contribute to a unified viewpoint on the definition, level, and evaluation items of interoperability.
Abstract: Lately, developing systems fully interoperable with others is considered an essential element for successful projects, as not only do e-commerce becomes ubiquitous but also distributed systems` paradigm spreads. However, since definitions of interoperability vary by viewpoints, it is still difficult to have the same understanding and evaluation criteria on interoperability. For instance, various interoperability parties in military use different definitions of interoperability, and its T&E is not conducted according to the definition, but only to levels of information exchange. In this paper, we proposed a new definition of interoperability as followsm First of all, we collected existing and various interoperability definitions, extracting key components in each of them. Second, we statistically analyzed those components and applied the association rules discovery in data mining. We compared existing interoperability definitions to ours. From this research, we found associations among the components from various definitions applying market-basketanalysis, redefining interoperability. Key findings of this research can contribute to a unified viewpoint on the definition, level, and evaluation items of interoperability.

Journal ArticleDOI
TL;DR: According to the results of the study, Korea government is able to change the maintenance policy in information security and the domestic companies get a theoretical ground for improving the rates of maintenance costs in informationSecurity systems and are able to allot the resources effectively.
Abstract: The maintenance prices in information security industry between Korean companies and foreign companies have been a big difference. Korea Information Security SW maintenance standards were not adequate for the rate, and there was disagreement between domestic companies and governments. This research, therefore, surveyed a standard of information SW and the status of maintenance payment rates. The study suggests an estimation method and verifies the method and an appropriate maintenance cost rate. According to the results of the study, the current maintenance cost should be increased or decreased independent with a kind of information security systems. Based on the study, Korea government is able to change the maintenance policy in information security. And the domestic companies get a theoretical ground for improving the rates of maintenance costs in information security systems and are able to allot the resources effectively.


Journal ArticleDOI
TL;DR: In this paper, the authors examined the level of B2B collaboration and the use of IT systems for each business area in small and medium-sized collaborative enterprise which are classified into shipbuilding, automobile, and electronic industry.
Abstract: In modern industrial society, the importance of inter enterprise collaboration is more emphasizing for the survival of companies and strengthening its competitiveness. The studies using IT systems effect on inter-enterprise collaboration are already taken several times. However, there is not much systematic research to evaluate the informatization level of B2B collaboration. In this paper, we examined the level of B2B collaboration and the use of IT systems for each business area in small and medium-sized collaborative enterprise which are classified into shipbuilding, automobile, and electronic industry. We verified that the level of collaboration between companies are significant to the level of IT use for each business area by regression analysis. The conclusion of this study is that the level of B2B collaboration and the use of IT systems for each business area are different.