You are on page 1of 274

call for papers

IADIS MULTI CONFERENCE ON COMPUTER SCIENCE


AND INFORMATION SYSTEMS

19-21 June
Algarve, Portugal

Proceedings
of
e-COMMERCE 2009

Edited by:
Sandeep Krishnamurthy

international association for development of the information society


IADIS INTERNATIONAL CONFERENCE

E-COMMERCE 2009

part of the

IADIS MULTI CONFERENCE ON COMPUTER SCIENCE AND

INFORMATION SYSTEMS 2009


ii
PROCEEDINGS OF THE
IADIS INTERNATIONAL CONFERENCE
E-COMMERCE 2009

part of the
IADIS MULTI CONFERENCE ON COMPUTER SCIENCE AND

INFORMATION SYSTEMS 2009

Algarve, Portugal

JUNE 19 - 21, 2009

Organised by
IADIS
International Association for Development of the Information Society

iii
Copyright 2009
IADIS Press
All rights reserved
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is
concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Permission for
use must always be obtained from IADIS Press. Please contact secretariat@iadis.org

e-Commerce Volume Editor:


Sandeep Krishnamurthy

Computer Science and Information Systems Series Editors:


Piet Kommers, Pedro Isaías and Nian-Shing Chen

Associate Editors: Luís Rodrigues and Patrícia Barbosa

ISBN: 978-972-8924-89-8

SUPPORTED BY

iv
TABLE OF CONTENTS

FOREWORD ix
PROGRAM COMMITTEE xi
KEYNOTE LECTURE xv

FULL PAPERS

BARRIERS OF ONLINE SHOPPING IN DEVELOPING COUNTRIES: CASE 3


STUDY IRAN
Omid Bigdeli, Sanam Afaghzadeh, Amir Albadvi and Neda Abdolvand
FACTORS AFFECTING CONSUMERS ADOPTION OF ECOMMERCE IN 11
SAUDI ARABIA FROM A CONSUMERS’ PERSPECTIVE
Fahad Aleid, Simon Rogerson and Ben Fairweather
DOES FIT B2B E-COMMERCE FOR AGRIBUSINESS? A FIRST APPROACH 19
FOR TRUST EVALUATION ISSUES IN SPANISH AGRIFOOD SECTOR
Mª Cristina Fernández, Isabel de Felipe, Julián Briz
STRATEGIC ALIGNMENT AS A WAY OF ADDRESSING THE BARRIERS TO 27
E-BUSINESS ADOPTION
Eduardo Escofet, María José Rodríguez, José Luis Garrido and Lawrence Chung
ECUSTOMS CASE STUDY: MECHANISMS BEHIND CO-OPERATION 35
PLANNING
María Laura Ponisio, Pascal van Eck and Lourens Riemens
FINDING TREND LEADERS FROM MARKETING TRANSACTION DATA 45
Masakazu Takahashi, Kazuhiko Tsuda and Takao Terano
ADDING VALUE TO ENTERPRISEWIDE SYSTEM INTEGRATION: A NEW 53
THEORETICAL FRAMEWORK FOR ASSESSING TECHNOLOGY ADOPTION
OUTCOMES
Linda Wilkins, Paula M.C. Swatman and Duncan Holt
IEBS: A MODEL FOR INTELLIGENT E-BIDDING 61
Pedro Brandão Neto, Sofiane Labidi, Rafael de Souza Cunha and
Rafael Soares Cruz
AN APROACH FOR SEMANTIC-BASED EC MIDDLEWARE 69
Ejub Kajan and Leonid Stoimenov

v
SMART SHOPPING SPACES: CONNECTING MERCHANTS AND 77
CONSUMERS BY INNOVATIVE ONLINE MARKETPLACES
Peter Leitner and Thomas Grechenig
FROM A RETAIL-BASED E-MICROPAYMENT PROGRAM TO A MULTI- 89
PURPOSE PROGRAM: WHICH CRITICAL FACTORS ARE NEEDED FOR
SUCH A TRANSFORMATION?
Wee Kheng-Tan and Yu-Jie Tan
SITE PERSONALIZATION PROCESS BASED ON NAVIGATIONAL 97
BEHAVIOR AND FUZZY ONTOLOGY
Juliano Z. Blanco, Antonio Francisco do Prado
A CONTENT ANALYSIS OF WEB-SITE QUALITY OF ON-LINE AUCTION 105
SELLERS
Fen-Hui Lin and Chiu-Chu Hwang
GUIDELINES TO THE DEVELOPMENT OF AN E-COMMERCE PLATFORM 113
FOR CUSTOMIZED GARMENTS
Liliana Ribeiro, Paulo Duarte and Rui Miguel
TIME AND SPACE CONTEXTUAL INFORMATION IMPROVES CLICK 123
QUALITY ESTIMATION
Mehmed Kantardzic, Brent Wenerstrom, Chamila Walgampaya, Oleksandr Lozitskiy,
Sean Higgins, Darren King
THE BRAZILIAN MOBILE DIGITAL CONTENT MARKET: AN OVERVIEW 131
Marcelo Cortimiglia, Filippo Renga and Andrea Rangone
BUYER’S MINDSET ABOUT ONLINE PURCHASE AND AUCTION, AND ITS 139
EFFECT ON PAYMENT CHOICE
Wee Kheng Tan and Yung Lun Chung
IMPROVING DIVERSITY AND RELEVANCY OF E-COMMERCE 147
RECOMMENDER SYSTEMS THROUGH NLP TECHNIQUES
Andriy Shepitsen and Noriko Tomuro
FACTORS AFFECTING ONLINE APPLICATION OF INSURANCE PRODUCTS 155
AND ITS IMPLICATIONS
Wee Kheng-Tan and Yu-Jie Tan
THE CONFLICTING ROLE OF ONLINE SWITCHING COSTS: THE MAIN 163
AND INTERACTION EFFECTS ON CUSTOMER RETENTION
Ana Isabel Torres and Francisco Vitorino Martins
RECOGNITION OF EMOTIONS IN E-COMMERCE-SETTINGS 171
Susanne Robra-Bissantz

vi
SHORT PAPERS

E-PROCUREMENT ADOPTION BY SUPPLIERS: A RESEARCH PROPOSAL 183


Paulo Andrade and Bráulio Alturas
MEASURING VIRTUAL KNOWLEDGE MANAGEMENT IMPACT IN FIRM’S 188
PERFORMANCE
Flávio Gomes Borges Tiago, Maria Teresa Borges Tiago and João Pedro Almeida Couto
MODERN ARCHITECTURAL REASONING FOR COMPLEX WEB 193
COMMERCE APPLICATIONS
Thomas Lehrner, Birgit Pohn, Markus Schranz
A NEGOTIATION MECHANISM USING ARGUMENT-BASED METHODS 199
AND PERIPHERAL ISSUES IN MULTI-AGENT SYSTEMS WITH
INCOMPLETE INFORMATION Nathalie Hrycej and Azita Darooei, Mohammad-Reza
Khayyambashi
SELF-PRODUCT CONGRUENCE: IMAGE-PERCEPTIONS OF POSTMODERN 205
OUTDOOR-APPAREL CONSUMERS IN E-COMMUNITIES
Jan Breitsohl and Marwan Khammash
EXTERNALIZATION OF VIRTUAL PROTOTYPES AS AN E-COMMERCE 210
SERVICE IN THE FASHION INDUSTRY
Carolin Löffler
BUILDING FINANCIAL CAPABILITY VIA THE INTERNET 215
Tanai Khiaonarong
A CUSTOMER FOCUSED E-COMMERCE APPROACH USING PURCHASING 219
WEB PATTERNS
Markus Weinmann and Yvonne Gaedke
ASSESSING THE CONTRIBUTION OF SCM ON E-BUSINESS 224
PERFORMANCE
Maria Teresa Borges Tiago, João Pedro Couto and Flávio Tiago

INTERORGANIZATIONAL BUSINESS PROCESSES MODELING: 229


CASE OF AN E-PROCUREMENT SYSTEM
Khoutir Bouchbout and Zaia Alimazighi

POSTERS

WEB AND INFORMATION TECHNOLOGY AS CRITICAL THEMES IN THE 237


CONSUMER BEHAVIOR BASED RESEARCH: A STUDY WITH THEMATIC
NETWORKS
María Isabel Viedma-del-Jesus, Antonio Gabriel López-Herrera, Juan Sánchez-Fernández
and Francisco Muñoz-Leiva

vii
THE ANTECEDENTS OF USEFULNESS IN EXPERIENCED USERS OF 239
WEB-BASED LEARNING MANAGEMENT SYSTEMS
Francisco Muñoz Leiva, Juan Sánchez-Fernández, María Isabel Viedma-del-Jesús,
Antonio Gabriel López-Herrera
APPLICATION OF TERNARY AHP 242
Sylvia Encheva

DOCTORAL CONSORTIUM

FLOW AND ONLINE CONSUMER BEHAVIOUR: AN EMPIRICAL ANALYSIS 247


OF E-LEARNING EXPERIENCES
Irene Esteban-Millat, Inma Rodríguez-Ardura and Antoni Meseguer

THE IMPACT OF CULTURAL ADAPTATION ON THE EFFECTIVENESS OF 251


E-COMMERCE WEBSITES
Femke Vyncke, Malaika Brengman and Olga De Troyer

AUTHOR INDEX

viii
FOREWORD
These proceedings contain the papers of the IADIS International Conference on e-
Commerce 2009, which was organised by the International Association for Development of the
Information Society in Algarve, Portugal, 19 – 21 June, 2009. This conference is part of the
Multi Conference on Computer Science and Information Systems 2009, 17 - 23 June 2009,
which had a total of 1131 submissions.

IADIS e-Commerce 2009 conference is a major international event for researchers, academics,
industry specialists, practitioners & students interested in the advances in, and applications of, e-
Commerce. The participants will have an opportunity to present and observe the latest research
results, and ideas in these areas. This conference aims to cover both technological as well as
non-technological issues related to this new business paradigm.

The Conference invites proposals from the introductory through advanced level on all topics
related to e-Commerce. Proposals which address the theory, research and applications as well as
describe innovative projects are encouraged.

The following five main areas have been the object of paper and poster submissions within specific
topics:
- e-Commerce Technology;
- Global e-Commerce;
- Online Management;
- Online Business Models;
- Regulatory/Policy Issues.

The IADIS e-Commerce 2009 received 92 submissions from more than 26 countries. Each
submission has been anonymously reviewed by an average of four independent reviewers, to
ensure that accepted submissions were of a high standard. Consequently only 21 full papers
were approved which means an acceptance rate below 23 %. A few more papers were accepted
as short papers, reflection papers, doctoral consortium and posters. An extended version of the
best papers will be published in the IADIS International Journal on WWW/Internet (1645-
7641), IADIS International Journal on Computer Science and Information Systems (ISSN:
1646-3692), in a special issue of the DMIJ - Direct Marketing: An International Journal (ISSN:
1750-5933) and also in other selected journals, including journals from Inderscience.

Besides the presentation of full papers, short papers, reflection papers, doctoral consortium and
posters, the conference also included one keynote presentation from an internationally
distinguished researcher. We would therefore like to express our gratitude to Dr. Shintaro
Okazaki, Autonomous University of Madrid, Spain.

As we all know, organising a conference requires the effort of many individuals. We would like
to thank all members of the Program Committee, for their hard work in reviewing and selecting
the papers that appear in the proceedings.

ix
This volume has taken shape as a result of the contributions from a number of individuals. We
are grateful to all authors who have submitted their papers to enrich the conference proceedings.
We wish to thank all members of the organizing committee, delegates, invitees and guests
whose contribution and involvement are crucial for the success of the conference.
Last but not the least, we hope that everybody will have a good time in Algarve, and we invite
all participants for the next year edition of the IADIS International Conference on e-
Commerce 2010, that will be held in Freiburg, Germany.
Sandeep Krishnamurthy,
Program Chair
University of Washington, USA
e-Commerce 2009 Conference Program Chair

Piet Kommers, University of Twente, The Netherlands


Pedro Isaías, Universidade Aberta (Portuguese Open University), Portugal
Nian-Shing Chen, National Sun Yat-sen University, Taiwan
MCCSIS 2009 General Conference Co-Chairs

Algarve, Portugal
June 2009

x
PROGRAM COMMITTEE

E-COMMERCE CONFERENCE PROGRAM CHAIR


Sandeep Krishnamurthy, University of Washington, USA

MCCSIS GENERAL CONFERENCE CO-CHAIRS


Piet Kommers, University of Twente, The Netherlands
Pedro Isaías, Universidade Aberta (Portuguese Open University), Portugal
Nian-Shing Chen, National Sun Yat-sen University, Taiwan

E-COMMERCE CONFERENCE COMMITTEE MEMBERS


Adam Vrechopoulos, Athens University of Economics and Business, Greece
Adina Magda Florea, Politehnica University of Bucharest, Romania
Agnes Koschmider, University Karlsruhe, Germany
Alex Norta, University of Helsinki, Finland
Andrea Carignani, University of Milan, Italy
Andreas Ekelhart, Security Research, Austria
Andrew Byde, HP Labs Bristol, UK
Andy Phippen, University of Plymouth, UK
Antoni Meseguer-Artola, Universitat Oberta de Catalunya, Spain
Antonio López Herrera, University of Granada, Spain
Aristogiannis Garmpis, Technological Educational Institution of Messolonghi, Greece
Arthur Csetenyi, Budapest Corvinus University, Hungary
Blanca Hernández, Universidad de Zaragoza, Spain
Borislav Josanov, Novi Sad Business School, Serbia
Božo Matic, Faculty of Economics and Business, Croatia
Carla Ruiz Mafe, University of Valencia, Spain
Christian Schloegl, University of Graz, Austria
Christos Xenakis, University of Piraeus, Greece
Costas Lambrinoudakis, University of the Aegean, Greece
Costin Badica, University of Craiova, Romania
Damminda Alahakoon, Monash University, Australia
Daniel Perez-Gonzalez, University of Cantabria, Spain
Dennis Tachiki, Tamagawa University, Japan
Dimitris Geneiatakis, University of the Aegean, Greece
Dimitris Kanellopoulos, University of Patras, Greece
Dimitris Rigas, University of Bradford, United Kingdom
Eduard Cristóbal, Universitat de Lleida, Spain

xi
Eduardo Peis, University of Granada, Spain
Ejub Kajan, High School of Applied Sudies, Serbia
Eliana Rocío Rocha, Universidad de Cantabria, Spain
Emmanouel Varvarigos, University of Patras, Greece
Emulija Vuksanovic, Faculty For Economics, Kragujevac, Serbia
Enrique Bigné, Universidad de Valencia, Spain
Enrique Herrera Viedma, University of Granada, Spain
Euripidis Loukis, University of the Aegean, Greece
Eva Rimbau Gilabert, Oberta University of Catalonia, Spain
Fotis Lazarinis, Technological Educational Institute of Mesolonghi, Greece
Francisco J. Martínez-López, University of Granada, Spain
Franz Lehner, Universität Passau, Germany
George Dafoulas, Middlesex University, United Kingdom
George Kambourakis, University of the Aegean, Greece
Gerard Ryan, Universitat Rovira i Virgili, Spain
Hana Horak, Faculty of Economics and Business, Croatia
Heiko Pfeffer, Fraunhofer Institut FOKUS, Germany
Hiroaki Fukuda, Keio University, Japan
Inma Rodríguez-Ardura, Universitat Oberta de Catalunya, Spain
Isabel de Felipe, Universidad Politécnica de Madrid, Spain
Isabella Mader, IMAC Information & Management Consulting, Germany
Ivan Strugar, Universitiy of Zagreb, Croatia
Jacob Carsten, Fraunhofer Institut FOKUS, Germany
Jemal H. Abawajy, Deakin University, Australia
Jens Fromm, Fraunhofer FOKUS, Germany
Jeroen Doumen, Irdeto, The Netherlands
Jose Manuel Morales del Castillo, Universidad de Granada, Spain
Josef Herget, Danube University Krems, Austria
Joseph Heili, Chambery School of Business, France
Julián Briz, Universidad Politécnica de Madrid, Spain
Jun Suzuki, University of Massachusetts, USA
Jurica Pavicic, University of Zagreb, Croatia
Kamel Rouibah, College of Business Administration, Kuwait
Krassie Petrova, Auckland University of Technology, New Zealand
Luisa Andreu, Universitat de València, Spain
Mar Pàmies, Universitat Rovira i Virgili, Spain
Marc Esteva, IIIA-CSIC, Spain
Marco Furini, University of Piemonte Orientale, Italy
Marco Mevius, FZI, Research Center for Information Technologies, Germany
Margarita Alonso, Universidad de Cantabria, Spain
Maria Papadaki, University of Plymouth, UK
Mario Spremic, University of Zagreb, Croatia
Markus Schranz, Vienna University of Technology, Austria
Martin Smits, Tilburg University, The Netherlands
Mary Tate, Victoria University of Wellington, New Zealand
Masitah Ghazali, Universiti Putra Malaysia, Malaysia
Masrah Azrifah Azmi Murad, Universiti Putra Malaysia, Malaysia

xii
Matjaz Gams, Jozef Stefan Institute, Slovenia
Michael Merz, Ponton Consulting, Germany
Michelangelo Ceci, University of Bari, Italy
Minseok Song, Eindhoven University of Technology, The Netherlands
Nahed Azab, Middlesex University, United Kingdom
Nineta Polemi, University of Piraeus, Greece
Noor Akma Mohd Salleh, University Malaya, Malaysia
Nordin bin Zakaria, Universiti Teknologi Petronas, Malaysia
Oshadi Alahakoon, Monash University, Australia
Ota Novotny, University of Economics, Czech Republic
Pedro Solana González, Universidad de Cantabria, Spain
Pedro Soto-Acosta, Universidad de Múrcia, Spain
Pere Tumbas, Faculty of Economics University of Novi Sad, Serbia
Peter Weiß, University of Karlsruhe, Germany
Petra Hoepner, Fraunhofer Institut FOKUS, Germany
Rainer Schmidt, Aalen University, Germany
Rajendra Akerkar, Technomathematics Research Foundation, India
Rodrigo Roman, University of Malaga, Spain
Said Assar,Institut TELECOM Sud Paris, France
Shoba Tegginmath, Auckland University of Technology, New Zealand
Shukor Abd Razak, Universiti Teknologi Malaysia, Malaysia
Sokratis K. Katsikas, University of Piraeus, Greece
Spiros Sirmakessis, University of Patras, Greece
Spyros Kokolakis, University of the Aegean, Greece
Steven Furnell, University of Plymouth, UK
Susanne Robra-Bissantz, University of Braunschweig, Germany
Tadashi Nakano, University of California, USA
Thanassis Tiropanis, University of Southampton, UK
Tihomir Vraneševic, Faculty of Economics and Business, Croatia
Tokuro Matsuo, Yamagata University, Japan
Yannis Charalabidis, National Technical University of Athens, Greece
Yanwei Pang, Tianjin University, China
Yingjie Yang, De Montfort University, United Kingdom
Zeljko Panian, University of Zagreb, Croatia

xiii
xiv
KEYNOTE LECTURE
ELECTRONIC WORD-OF-MOUTH ON WIRED VERSUS
WIRELESS INTERNET: HOW CAN WE UNDERSTAND
SOCIAL INFLUENCE THEORY IN MOBILE COMMERCE?

Dr. Shintaro Okazaki


Department of Finance & Marketing Research
College of Economics & Business Administration
Universidad Autónoma de Madrid
Spain

This presentation addresses a phenomenon of electronic word-of-mouth in two different contexts: PC


Internet and mobile Internet. Compared with laptop or desktop computer, mobile device offers greater
flexibility in time and space, thus enabling consumers to be connected online more continually. In
addition, small size, portability, and ease of use with location-based capabilities facilitate sending and
receiving timely information in the right place. Drawing upon a social influence model proposed by
Dholakia et al. (2004), I propose a causal model for consumer participation in electronic word-of-mouth
(eWOM), and compare the effects of PC-based and mobile-based eWOM (hereafter pcWOM and
mWOM, respectively).

I posit social identity, motivations (purposive value, social enhancement, and intrinsic enjoyment),
inherent novelty seeking, and opinion leadership as antecedents affecting desire (individual-level driver)
and social intention (group-level driver) to engage in eWOM. I collected 271 survey responses from
consumers in Japan. The proposed model fits the data reasonably well; all hypotheses are supported. Our
results reveal that desire only partially mediates the effects on social intention of social identity.
Compared with pcWOM participants, mWOM participants exhibit significantly higher perceptions on
social intention, intrinsic enjoyment, and cognitive social identity.

In general, the perceived levels of constructs were found to be higher in mWOM than in pcWOM, with
regard to social intention, desire, purposive value, intrinsic enjoyment, cognitive social identity, and
affective social identity. Statistically, the difference was most striking in social intention, intrinsic
enjoyment, and cognitive social identity, all of which are likely to be perceived more favorably by
participants in mWOM than by participants in pcWOM. One possible explanation for this may be that
consumers who exchange information through mobile device tend to be more conscious, and more
intentional, than those who exchange information through PC. After all, a mobile device is a ‘telephone’,
the primary objective of which is message transmission, while a PC is a ‘processor’, with the primary
objective of data transmission. Taken together, the mobile is indeed a better communication medium
than the PC, and this motivates consumers to be more active in WOM. This is probably one of the most
important differences between mWOM and pcWOM.

xv
xvi
Full Papers
IADIS International Conference e-Commerce 2009

BARRIERS OF ONLINE SHOPPING IN DEVELOPING


COUNTRIES: CASE STUDY IRAN

Omid Bigdeli; Sanam Afaghzadeh; Amir Albadvi; Neda Abdolvand


IE Dept., Engineering Faculty, Tarbiat Modares University

ABSTRACT
While a large number of customers in the USA, Canada and European countries shop on the Internet over and over again,
online shopping in developing countries is in the infancy stage. Therefore, in this research we want to explore the reasons
that shoppers do not intend to purchase online in developing countries. By applying the Theory of Planned Behavior
(TPB) we want to scrutinize the impediments of Internet shopping in general and Internet grocery shopping in particular.
We pin point the factors that affect online grocery shopping by analyzing the data. We notice that among the 10 factors
that influence Internet grocery shopping; social, technical, confidence, trust and affection are of main importance for
customers in developing countries such as Iran.

KEYWORDS
Online shopping, Internet, Theory of Planned Behavior (TPB), grocery shopping, electronic commerce

1. INTRODUCTION
By the accretion of Internet accessibility, it is estimated that in future huge amount of transactions in all over
the world will be done through the Web. This probability will bolster when people deliberate about the nuts
and bolts of online shopping. By considering a number of advantages like time saving, avoidance of driving,
picking and packing processes willy-nilly the economy tends to explicit from these benefits. On this ground,
Chan et al. (2002) rest on the belief that while electronic commerce still constitutes a diminutive amount of
many countries' economies, it is seen as an opportunity to decrease cost and improve efficiency in other
countries (Chanand Al-Hawamdeh 2002). Despite the fact that online shopping has lots of advantages, when
companies decide to establish it, they have some problems in their business like employee’s resistance,
eliminating some departments and changing some structures. Of course, these are not all difficulties. After
taking away of all the company’s inhibitors, people resist to do shopping online.
Two of the most widely used psychological theories which concentrate on the link between attitude and
behavior are Technology Acceptance Model (TAM) proposed by Davis (1989) and Theory of Planned
Behavior (TPB) offered by Icek Ajzen (1991). These two models have both been adapted from Fishbein and
Ajzen's (1980) Theory of Reasoned Action (TRA). TAM explains and predicts individual's acceptance of a
technology. On the other hand, TPB is one of the most predictive persuasion theories being applied to
discover the relations among beliefs, attitudes, behavioral intentions and behaviors in various fields (Ramus
and Nielsen 2005). This theory has been widely used in analyzing consumer behavior (East 1993, Conner
1993, Taylor and Todd 1995, Dennison and Shepherd 1995, Thompson and Thompson 1996, Bredahl and
Grunert 1997, Povey and Conner 2000, Bredahl 2001, Scholderer and Grunert 2001). Since TPB is a link
between attitude and behavior, it is a more promising theoretical framework for an in depth exploration of
beliefs and barriers held by consumers' Internet grocery shopping in Iran.
By studying the literature we ascertain the factors which affect customers’ decision to purchase online
compared with conventional grocery shopping in terms of convenience, product range, price, the risk of
receiving inferior quality groceries and the loss of the recreational aspect of grocery shopping.
This conceptual paper tends to decipher what parameters explain consumers’ willingness to buy groceries
on the Internet. It starts with an introduction, continued with a brief explanation about the theory of planned
behavior and then followed by the obstructions. In the third section, the methodology of this research has

3
ISBN: 978-972-8924-89-8 © 2009 IADIS

been illustrated. It continues by analysis of the data and at the end of this study, we express momentous hints
which explicit from our data.
A variety of studies have attempted to profile Internet shoppers, mainly with regard to demographic and,
to a lesser extent, psychographic criteria which is given in the table1.
Table 1. The aim of the research in literature review in brief

Aim of Research Authors


E-commerce in Ogawara S., Chen J.C.H. et al. 2003; Kshetri, 2005; Molla A. and Licker P.S.,
developing countries 2005; Lin H.F.,2007; Moon J., Chadee D., et al. , 2008
Characterize internet Bellman et al., 1999; Weber and Roehl, 1999; Choi J. and Leung K. 2003;
shoppers Colley A. and Maltby J., 2008; Childers T.L. and Scarborough C.K., 2008
Factors Effecting George, 2004; Choi J. and Geistfeld L, 2004; Garbarino E. and Strahilevitz M.,
customers’ decision 2004; Chen Y.H. and Barnes S. 2007; Connolly R. and Bannister F. 2008; Ha
making S. and Stoel L., 2008
Consumers attitude Monsuwe´ et al., 2004; Ramus and Nielsen, 2005; Hansen T. 2005; May So
toward online shopping W.C., Danny Wong T.N. et al. 2005; Bridges E. and Florsheim r., 2008
Shoppers intention to Donthu and Garcia, 1999; Morganosky and Cude, 2000; Raijas and Tuunainen,
purchase online 2001; Jayawardhena, 2004; Huang Y. and Oppewal H., 2006

2. A REVIEW ON THEORY OF PLANNED BEHAVIOR (TPB)


One of the most widely used social psychology theories about the way in which perceptions influence actions
is Ajzen’s Theory of Planned Behavior (Ajzen 1991, East 1993, Conner 1993, Taylor and Todd 1995,
Dennison and Shepherd 1995, Thompson and Thompson 1996, Bredahl and Grunert 1997, Povey and Conner
2000, Limayem and Khalifa 2000, Bredahl 2001, Scholderer and Grunert 2001). As mentioned before in
psychology, this theory is concerning the link between attitudes and behavior. Figure 1 is an illustration of
TPB.

Figure 1. Theory of Planned Behavior


The three determinants of TPB are: Outcome Beliefs (Attitude), Normative Beliefs (Subjective Norms)
and Control Beliefs (Perceived Control).
The valence of the action for the potential actor can be referred as attitude, which is determined by
outcome beliefs (person’s beliefs about the expected outcome of a given behavior). Perceived social pressure,
to either perform an action or not, is known as subjective or social norms determined by normative beliefs.
One of the factors important in formation of intention is ease of use; this can be specified by perceived
behavioral control. Beliefs about factors that facilitate or impede the performance of the behavior, control
beliefs, are ascertaining perceived behavioral control (Kotler 2002, Ramus and Nielsen 2005, Shih 2008,
Vermeir and Verbeke 2008).
In this exploratory study of consumers’ perceptions about Internet grocery shopping, the TPB provides a
systematic, comprehensive account of psychological factors with a potential power to explain why people use
or what do they abstain from using the Internet for shopping groceries. The factors are as below:
• Convenience of shopping:

4
IADIS International Conference e-Commerce 2009

Over the history of online shopping, convenience is the most critical parameter in the mind of customers
(GVU 1998, Wolhandler 1999, Wolfinbarger and Gilly 2001, Berry and Seiders 2002, Grewal and Iyer 2002,
Raijas 2002, Forsythe and Shi 2003, Monsuwe and Dellaert 2004, Huang and Oppewal 2006)
• Enjoyment and fun of shopping:
Shopping enjoyment is the pleasure one gains from the buying procedure (Beatty and Ferrell 1998). It
returns to the differences between hedonic and utilitarian. As the same time as utilitarian behave shopping as
a work, hedonic people strive to gain fun and entertainment in shopping process (Babin and Darden 1994).
Meanwhile Childers et al. (2001) found “enjoyment” to be a consistent and strong predictor of attitude
toward online shopping. If consumers get pleasure from online shopping experience, they have a more
positive attitude toward online shopping (Childers and Carr 2001).
• Technical system and web design:
By considering the nuts and bolts of online shopping, it would not be wrong to conclude that this kind of
shopping has some difficulties. As a case in point, many households can not apply the Internet for the
shopping process and also do not access to qualified Internet connection (Hammond 2001, ONS 2002,Huang
and Oppewal 2006). Moreover, there exists some websites requiring long time to upload (GVU 1998,
Forsythe and Shi 2003).

Figure 2. Obstructions in Online Shopping

• Range of available products:


By considering the recent surveys it can be revealed by utilizing online shopping, purchasers have access
to wider range of store and products (GVU 1998, Huang and Oppewal 2006, Shih 2008).
• Price, bargains, costs:
Online shoppers can easily evaluate the products specifications and prices more efficiently and effectively
than offline stores (Monsuwe and Dellaert 2004).
Meanwhile you should keep in mind that consumers assume that delivery fee is an additional cost
(Hammond 2001, Ramus and Nielsen 2005).
• Social aspect of shopping:
Many researchers hold on the opinion that social interaction is a missing parameter in online shopping
(Ramus and Nielsen 2005).
• Personal service
Many people rest on the belief that lack of personal customer service in online shopping leads them to a
great concern. They prefer to get some information and assistance about products at a physical location
(Ramus and Nielsen 2005).
• Confidence in company logistics:
By considering the pros and cons of Internet shopping it can be concluded that in category of some
standardized products like books, CDs, DVDs and etc. people have great positive intention to purchase them
via the Internet, in contrary; they abstain from buying some products like vegetable, fruits, meats and
perfumes inasmuch as they desire to see, feel, touch and smell them (Watson and Berthon 2000, Hammond
2001, Raijas 2002, Forsythe and Shi 2003, Monsuwe and Dellaert 2004, Ramus and Nielsen 2005).
Although because of the separation of purchase and delivery process there is less assurance in receiving
the products on time (Hammond 2001, Ramus and Nielsen 2005).

5
ISBN: 978-972-8924-89-8 © 2009 IADIS

• General trust in company:


One of the most significant reasons not to purchase via Internet is trust. The level of security and privacy
has influenced on the online shoppers, it means that high level of security has a great positive effort on
consumers' attitude toward Internet shopping (Rotter 1971, Jacobs 1997, Lee and Turban 2001, McKnight
and Chervany 2001-2002, Grewal and Iyer 2002, Forsythe and Shi 2003, Choi and Leung 2003, Monsuwe
and Dellaert 2004, Hammond 2001).
• Influence of colleagues, family and friends:
According to the research conducted by Ramus and Nielsen (2005), a large number of people recommend
to actuate family, friends or colleagues to take up Internet shopping.
• Exposure to advertisements and accidental browsing across interesting commercial web sites:
According to the research conducted by Ramus and Nielsen (2005), they mentioned that these two recent
factors affect on consumers' intention toward online shopping.

3. METHODOLOGY
In order to figuring out the impediments and their importance, in accord with our model, we designed a 54
item questionnaire. Then, we test the questionnaire among 12 people and since the Cronbach’s alpha was
greater than 0.7, it is valid for distribution. The questionnaire contains some personal questions about gender,
age; marital status and the rest of the questions were categorized in 10 groups each representing a factor of
the model. We have distributed the questionnaire among 307 persons through the e-mail and face to face. We
received 275 completed questionnaires; it was about 89 percent return back rate.

4. ANALYSIS
We analyze the questionnaires and run a descriptive analysis on the answers. Results are depicted in table 2.

Table 2. Discriptive Analysis

Disagreed Neutral Agreed


Social 12.36 11.73 75.91
Technical 5.42 15.49 79.09
Confidence 4.36 27.09 68.55
Trust 15.45 3.82 80.73
Affection 8.73 18 73.27
• Social
We found that the social factors are important for the participants. In retrospect and over the previous
literature we can found that lack of interaction is an important hurdle for online shopping (Steenkamp et
al.1999, Rosen and Howard 2000, Grewal and Iyer 2002, Choi and Leung
2003, Arnold and Reynolds 2003, Ramus and Nielsen 2005, Huang and
Oppewal 2006). As you can see in table 2, 75.91 percent of people rest on
the opinion that Internet grocery shopping lacks social aspects in
comparison with conventional purchasing. In eastern countries like Iran,
many people go shopping since they can interact with other people.
Figure 3. Social

6
IADIS International Conference e-Commerce 2009

• Technical
The speed of Internet connection is vital for the users (http://
www.pressroom.com/~screenager/broadband/Intro.html, Kshetri 2007). Since
most of people use dial up connection in Iran, so page loading is time
consuming; on the other hand many participants mentioned that WebPages are
befuddling and confusing. Therefore, Iranian people do not sense the usefulness
of Internet shopping.
Figure 4. Technical

• Confidence
Confidence of shopping returns to some issues like: logistics, delivering on time and intact products. It
was mentioned through the history of online shopping researches and there exists both in developing
countries and developed countries (Ramus and Nielsen 2005, Huang and Oppewal 2006, Vermeir and
Verbeke 2008). As a case in point, Tesco.com in England removes this matter
by applying IT systems and trained staffs as pickers; every picker cover a
distinct area in the store, they have a PDA and the items have sent to their PDA
electronically and the pickers collect the items through the shelves attentively
and they check the quality and expire dates as if they are shopping for
themselves (Jelassi and Enders 2005).
Figure 5. Confidence

• Trust
Trust is one of the most significant problems in e-commerce (Lee and
Turban 2001, Grewal and Iyer 2002, O’Cass and Fenech 2003, Monsuwe and
Dellaert 2004, Ramus and Nielsen 2005, Kshetri 2007). Over the history,
eastern people used to transact face to face (Kshetri 2007), but recently by the
growth of electronic banking in Iran and benefiting from its advantages, people
tend to utilize it. Figure 6. Trust
• Affection
Based on individualism-collectivism axiom (Choi and Leung 2003) it was
unsurprising that 73.28 percent of people said that they are affected by their
friends, colleagues and family. In fact, Iranian people used to counsel about
their activities by their friends and since the general overview is negative to
online shopping, people are not eager to use it.
Figure 7. Affection

5. DISCUSSION AND CONCLUSION


As we cited in the introduction, since the online shopping in developing countries like Iran is in formative
years and the customers are not professional yet; it can be said that managers in these countries have easier
mission to absorb the potential customers to shop online in comparison with the customers in developed
countries.
By perusing the previous literature in the field of electronic commerce, online shopping, Internet grocery
shopping and the results of this research; we could develop the aforementioned model about the inhibitor
factors of online grocery shopping. According to our results the entire parameters break down to three
clusters and each group has a number of sub-factors. Some of these barriers such as social interaction,
technical problems, security and trust have been mentioned over and over again through the literature.
Social, technical and affection problems are environmental factors which companies cannot affect
robustly on them, but companies can improve logistics and trust issues by innovative use of IT and by co-
operating with other eminent organizations and banks. Seeing that we have some failed cases in online
shopping in Iran, it seems that new companies should consider the previous cases to remove the former

7
ISBN: 978-972-8924-89-8 © 2009 IADIS

errors. As an illustration, the companies' websites were not updated and also most of them have some
problems about the delivering process. Also, customers suffer from incomplete menu of the products. For
instance, in most cases the websites merely offer a special brand and buyers cannot access to their favorite
brands; also the products of the offered brand are not complete and the customers only access to inadequate
number of goods.
Generally, it can be said that by considering some environmental issues such as terrible traffic jam in
Tehran and restricting use of petrol and on the other hand by the accretion of using Internet among Iranian
people; Internet grocery shopping willy-nilly will be utilized and pioneers can benefit from investing in this
market.

REFERENCES
Ajzen I. (1991). "The theory of planned behavior: Some unresolved issues." Organizational Behavior and Human
Decision Processes, 50: 179–211.
Arnold M.J., Reynolds k.E., (2003), “Hedonic shopping motivations”, Journal of retailing, 79, 77-95
Babin B. J., Darden W.R. (1994). "Work and/or fun: measuring hedonic and utilitarian shopping value." Journal of
Consumer Research 20(4): 644–656.
Beatty S.E. and Ferrell M.E. (1998). "Impulse buying: modeling its precursors." Journal of Retailing 74(2): 169-91.
Bellman S., Lohse G.L. (1999). "Predictors of online buying behavior." Communications of the ACM 42(12): 32-8.
Berry L. and Seiders K. (2002). "Understanding Service Convenience." The Journal of Marketing 66(3): 1-17.
Bredahl L. (2001). "Determinants of consumer attitudes and purchase intentions with regard to genetically modified
foods: results of a cross-national survey." Journal of Consumer Policy 24: 23-61.
Bredahl L. and Grunert K.G. (1997). "Determinants of the consumption of fish and shellfish in Denmark: an application
of the theory of planned behavior." Seafood from Producer to Consumer: Integrated Approach to Quality, Elsevier,
Amsterdam: 21-30.
Bridges E. and Florsheim r. (2008). "Hedonic and utilitarian shopping goals: The online experience." Journal of Business
Research 61: 309–314.
Chan B. and Al-Hawamdeh S. (2002). "The development of e-commerce in Singapore, The impact of government
initiaives." Business Process Management Journal, 8(3): 278-288
Chen Y.H. and Barnes S. (2007). "Initial trust and online buyer behavior." Industrial Management & Data Systems
107(1): 21-36.
Childers T.L. and Scarborough C.K. (2008). "Expanding opportunities for online shoppers with disabilities." Journal of
Business Research(doi:10.1016/j.jbusres.2008.06.017).
Childers T.L., Carr C.L. (2001). "Hedonic and utilitarian motivations for online retail shopping behavior." Journal of
Retailing 77(4): 511-35.
Choi J. and Geistfeld L. (2004). "A cross-cultural investigation of consumer e-shopping adoption." Journal of Economic
Psychology 25: 821–838.
Choi J. and Leung K. (2003). "Risk perceptin and e-shopping: a cross-cultural study." Journal of Fashion Marketing and
Management 7(1): 49-64.
Colley A. and Maltby J. (2008). "Impact of the Internet on our lives: Male and female personal perspectives." Computers
in Human Behavior 24: 2005-2013.
Conner M.T. (1993). "Understanding determinants of food choice." British Food Journal 95(9): 27-31.
Connolly R. and Bannister F. (2008). "Factors influencing Irish consumers’ trust in internet shopping." Management
Research News 31(5): 339-358.
Dennison C.M. and Shepherd R. (1995). "Adolescent food choice: an application of the theory of planned behavior."
Journal of Human Nutrition and Dietetics 8(9-23).
Donthu N. and Garcia A. (1999). "The internet shopper." Journal of Advertising Research 39(3): 52–8.
Forsythe S.M. and Shi B. (2003). "Consumer patronage and risk perceptions in Internet shopping." Journal of Business
Research 56: 867– 875.
Frontline.net, Broadband in the Developing World, 2001. http:// www.pressroom.com/~screenager/broadband/Intro.html
(retrieved 21.04.01
Garbarinoa E. and Strahilevitz M. (2004). "Gender differences in the perceived risk of buying online and the effects of
receiving a site recommendation." Journal of Business Research 57: 768– 775.

8
IADIS International Conference e-Commerce 2009

George J.F. (2004). "The theory of planned behavior and internet purchasing." Journal of Internet Research 14(3): 198-
212.
Grewal D., Iyer G.R. (2002). "Internet retailing: enablers, limiters and market consequences." Journal of Business
Research.
GVU’s 9th. (April–May 1998.). WWW User Surveys.
Ha S. and Stoel L. (2008). "Consumer e-shopping acceptance: Antecedents in a technology acceptance model." Journal of
Business Research (In Press).
Hammond A. (2001). "Digitally Empowered Development." Foreign Affairs 80(2): 96-106.
Hammond K. (2001). "B2C e-commerce 2000-2010: what expert predict." Business Strategy Review 12(43-50).
Hansen T. (2005). "Consumer adoption of online grocery buying: a discriminate analysis." International Journal of Retail
& Distribution Management 33(2): 101-121.
Huang Y. and Oppewal H. (2006). "Why consumers hesitate to shop online An experimental choice analysis of grocery
shopping and the role of delivery fees." International Journal of Retail & Distribution Management 34(4/5): 334-353.
J. R. East, (1993) “Investment decisions and the theory of planning behavior,” J. Econ. Psych., vol. 14, pp. 337–375.
Jacobs P. (1997) Privacy: what you need to know. InfoWorld; 19(44):111 – 2.
Jayawardhena C. (2004). "Personal values’ influence on e-shopping attitude and behavior." Internet Research 14(2): 127-
38
Jelassi T. and Enders A. (2005). “Strategies for e-business”, Prentice Hall, ISBN: 0 273 688405
Kotler. P (2002). Marketing Management. Boston, Prentice-Hall, Inc.
Kshetri, N. (2007). "Barriers to e-commerce and competitive business models in developing countries: A case study."
Electronic Commerce Research and Applications.
Lee M.K.O. and Turban E. (2001). "A trust model for consumer internet shopping." International Journal of Electronic
Commerce 6(1): 75-91.
Limayem, M., M. Khalifa (2000). "What makes consumers buy from the internet? A longitudinal study of online
shopping." Systems and Humans 30(4): 421-32.
Lin H.F. (2007). "Predicting consumer intentions to shop online: An empirical test of competing theories." Electronic
Commerce Research and Applications 6: 433-442.
May So W.C., Danny Wong T.N. (2005). "Factors affecting intentions to purchase via the internet." Industrial
Management & Data Systems 105(9): 1225-1244.
McKnight D.H., and Chervany N.L., (2001-2002)., “What trust means in e-commerce customer relationships: an
interdisciplinary conceptual typology”, International Journal of Electronic Commerce, Vol. 6 No. 2, pp. 35-59.
Molla A., Licker P.S., (2005) Perceived e-readiness factors in ecommerce adoption: an empirical investigation in a
developing country, International Journal of Electronic Commerce 10 (1): 83–110.
Monsuwe T. and Dellaert B. (2004). "What drives consumers to shop online? A literature review." International Journal
of Service Industry Management 15(1): 102-121.
Moon J., Chadee D. (2008). "Culture, product type, and price influences on consumer purchase intention to buy
personalized products online." Journal of Business Research 61: 31-39.
Morganosky M.A. and Cude B.J. (2000). "Consumer response to online grocery shopping." International Journal of
Retail Distribution Management 28(1): 17-26.
O’Cass A., Fenech T., (2003),”Webretailing adoption: exploring the nature of internet users Webretailing behavior “,
Journal of retailing and consumer services, 10, 81-94
Ogawara S., Chen J.C.H. (2003). "Internet grocery business in Japan: Current business models and future trends."
Industrial Management & Data Systems 103(9): 727-735.
ONS (2002). "Internet access: household and individuals." Office for National Statistics, London.
Povey R.and Conner M. (2000). "Application of the theory of planned behaviour to two dietary behaviors: roles of
perceived control and self-efficacy." Journal of Health Psychology 5: 121-39.
Raijas A. (2002). "The consumer benefits and problems in the electronic grocery store." Journal of Retailing and
Consumer Services 9: 107–113.
Ramus K. and Nielsen N. A. (2005). "Online grocery retailing: what do consumers think?" Internet Research 15(3): 335-
352.
Rosen, K. T., & Howard, A. L. (2000). “E-retail: gold rush or fool’s gold?”, California Management Review, 42 (Spring),
72–100.
Rotter, J.B. (1971), “Generalized expectancies for interpersonal trust”, American Psychologist, Vol. 26 No. 5, pp. 443-52
Scholderer J. and Grunert K.G. (2001). "Does generic advertising work? A systematic evaluation of the Danish campaign
for fresh fish Aquaculture." Economics and Management 5(5/6): 253-72.

9
ISBN: 978-972-8924-89-8 © 2009 IADIS

Shih H.P. (2008). "Using a cognition-motivation-control view to assess the adoption intention for Web-based learning."
Computers & Education 50: 327–337.
Steenkamp, J. E. M., Hofstede, F., & Wedel, M. (1999). A cross-national investigation into the individual and national
cultural antecedents of consumer innovativeness. Journal of Marketing, 63, 55–69
Taylor S. and Todd P.A. (1995). "Understanding information technology usage: a test of competing models." Information
Systems Research 6(2): 144-176.
Thompson N.J. and Thompson K.E. (1996). "Reasoned action theory: an application to alcohol-free beer." Journal of
Marketing Practice 2(2): 35-48.
Vermeir I. and Verbeke W. (2008). "Sustainable food consumption among young adults in Belgium: Theory of planned
behaviour and the role of confidence and values." Ecological Economics 64: 542-553.
Watson R.T., Berthon P. (2000). Electronic Commerce, Mike Roche.
Weber K. and Roehl W.S. (1999). "Profiling people searching for and purchasing travel products on the world wide
web." Journal of Travel Research 37: 291-8.
Wolfinbarger M. and Gilly M.C. (2001). "Shopping online for freedom, control, and fun." California Management
Review 43(2): 34-55.
Wolhandler HC. (May 1999.). Real numbers behind ’Net Profits 1999 (6th annual survey of online commerce).

10
IADIS International Conference e-Commerce 2009

FACTORS AFFECTING CONSUMERS ADOPTION OF


ECOMMERCE IN SAUDI ARABIA FROM A CONSUMERS’
PERSPECTIVE

Fahad Aleid, Simon Rogerson and Ben Fairweather


Faculty of Technology
De Montfort University
Leicester, UK

ABSTRACT
This paper presents a literature review on the global barriers to consumers’ adoption of ecommerce. It also shows the
state of ecommerce in Saudi Arabia and goes on to identify the factors that affect consumers’ adoption of ecommerce in
Saudi Arabia from their perspective.

KEYWORDS
Ecommerce, adoption, qualitative research, grounded theory.

1. INTRODUCTION
Ecommerce related to consumers has grown enormously (Ranganathan and Ganapathy, 2002). However,
while ecommerce has grown significantly in the first world, it lags in developing countries. Research using
surveys and the Theory of Planned Behaviour (TPB) mention that consumers' attitudes are one of the barriers
to ecommerce growth (Molla and Licker, 2005 and Sait et al. 2004). Moreover, research indicates that
businesses in developing countries will face more risks than those in developed ones (Molla and Licker, 2005
and Molla and Licker, 2005a). The study of ecommerce systems differ from country to country according to
culture, human behaviour and national infra-structure (Barbonis and Laspita, 2005) and other issues that will
become evident from this study. Saudi Arabia is one of these developing countries. It has shown an interest in
adopting all aspects of technology for its economic activities by building appropriate infra-structures for
egovernment and ecommerce (Sait et al., 2004 and Al-Shehry et al., 2006). However, are consumers satisfied
with ecommerce in Saudi Arabia and will they adopt this new technology? Few studies relate to ecommerce
in developing countries and Saudi Arabia in particular. Those studies that exist indicate that consumer
attitude is likely to be one of the main barriers that restrict ecommerce growth. However, these studies did
not investigate the factors that affect its adoption or the barriers that prevent consumers from adopting it
(Molla and Licker, 2005, Sait et al., 2004, Molla and Licker, 2005a and Al-Shehry et al., 2006). Therefore,
this study addresses this gap regarding ecommerce in Saudi Arabia in general and the consumer’s acceptance
of ecommerce in particular. This study will give insights into consumer acceptance of ecommerce in Saudi
Arabia.

2. ECOMMERCE STAGE IN SAUDI ARABIA


Saudi Arabia’s population is 24 million spread over an area of 2.25 million square kilometres (World Bank,
2006). According to Internetworldstats.com, Saudi Arabia have 6.2 million Internet users as of March 2008.
Still Saudi Arabia has no national plan for ecommerce. Companies in Saudi Arabia can be divided into four
different categories according to their stage in ecommerce. The first category is the large companies such as
airlines, the banking sector and telecommunication companies. These companies have their own websites and
they sell, serve, advertise and deliver online. For example, airlines in Saudi Arabia allow the consumers to

11
ISBN: 978-972-8924-89-8 © 2009 IADIS

buy e-tickets, pay online by credit cards and then send the e-tickets to the consumers’ email.
Telecommunication companies’ websites allow their customers to check their statements and to pay online.
However, consumers collect their purchased items at a shop. The bank sector also gives their consumers full
online account services, such as, online statements, transferring money, selling and buying stocks etc. and
then sends the monthly statements through the Saudi Post. The majority of Saudi banks request from their
customers to collect their debit or credit cards at branches or at a private shipping company branches. This is
because of the lack of clarity about home addresses in Saudi Arabia. The second category is shops that have
an online website offering information, addresses and catalogues with prices. This group offers no online
transactions. A good example is Jarir Bookstore (jarirbookstore.com) which has approximately 20 bookstores
over Saudi Arabia. The Third category is shops that just have a basic website that offers information such as
addresses, locations and contacts such as Extra shops (extra1.com), which has branches across the Kingdom.
The fourth category, the most common do not have websites. Therefore, in Saudi Arabia, there is a variety of
ecommerce stages. Some companies are at an advanced stage while others are not involved in ecommerce
with no plans for future involvement.

3. LITERATURE REVIEW
In the literature, there are reports of barriers to consumer adoption of ecommerce that are globally
recognised. The reader can then compare these global barriers with barriers in Saudi Arabia that relate to the
consumers’ perspectives. Barbonis and Laspita (2005, p31) stated that lack of trust is one of the barriers to
ecommerce adoption. Karakaya and Charlton (2001, p49) declared that bandwidth (high-speed Internet),
privacy and security of transactions are key barriers for consumers. Moreover, they mentioned that product
delivery and return are also barriers. Farhoomand et al (2000, p27) stated in their research findings that there
are six barriers to global ecommerce. These are the legal barrier (which includes user privacy, copyright
laws, legitimacy of electronic signatures, ISPs’ responsibilities, cryptography and public key encryption).
Second is the technical barrier (which includes security, infrastructure, and the integration of old systems and
the availability of applications that can support local languages). The third is the economic barrier (which
includes income, literacy level, social infrastructure, currency and the cost of buying technologies). The
fourth is the cultural barrier (which includes ethnicity, religion and language). The fifth is the organizational
barrier (which includes negative attitudes, lack of knowledge, resistance to change and lack of top
management commitment). The sixth is the barrier of political issues, such as, government attitudes and
inter-agency coordination. Vatanasakdakul et al. (2004, p10) found that language is a very serious problem.
Moreover, Vatanasakdakul et al. (2004, p7) found that many managers prefer to use a “wait and see” strategy
and they are forced into ecommerce by foreign partners or by company image. Finally, they find that most of
the managers are old and there is a gap between the superiors and their subordinates. Del Aguila-Obra and
Padilla-Melendez (2006, p108) stated that organization is an ecommerce barrier that affects Internet
technology adoption. Chirch and Kauffman (2000, p66) defined conversion barriers that are found in
converting from the old system to the new one and include resource, knowledge and usage barriers.
Barboonis and Laspita (2005, p31) mentioned security, privacy, the state of anonymity of the Internet,
restricted ways of payment and lack of personal communication as barriers to the adoption of ecommerce.
Siala et al (2004, p7) declared that, “religion influences consumer purchase decisions”. Chau et al (2002,
p139) found that culture influences consumers’ attitudes towards ecommerce. Similarly, Barbonis and
Laspita (2005, p33) stated that cultural factors, personal characteristics (attitudes to trust and risk) and
demographic factors are some of the factors that influence adoption in Greece.

4. RESEARCH METHODOLOGY
The research uses grounded theory (GT) to carry out qualitative research following Strauss and Corbin’s
(1990) approach. Strauss and Corbin (1990, p24) explained the use of literature in grounded theory and
pointed out that a literature review is a good background and can be used in the research. However, they
pointed out that the researcher does not need to review all the literature about his study. In the field, semi-
structured interviews were conducted. Subsequently questions were developed after each interview based on

12
IADIS International Conference e-Commerce 2009

the interviewees’ answers. The researcher continued to conduct interviews until the stage when interviewees
were unable to elicit any further useful information. Twenty-two interviews were conducted with
interviewees selected according to gender, age, income, education and geographical area. Table 1 shows the
distribution in detail.
Table 1. Demographic Spread of the Interviewees Conducted
Saudi Arabian regions
North South Middle East West
Number of interviewees 4 4 6 4 4

Gender Male 2 2 4 2 2
Female 2 2 2 2 2

Age 15-24 1 1 1 1
25-34 2 2 3 3 2
35-54 1 2 1 1
>=55 1

Education Low 1 1
Medium 1 1 2 1 1
High 3 2 4 3 2

Income <4000 2 1 1 1 1
4000-7999 2 1 1 1 1
8000-12000 1 3 2 1
>12000 1 1 1

Living in Village 1 1 1 1
Town 1 1 1 1
City 2 2 5 3 2

Employment status Unemployed 1


Government employee 1 2 3 1 1
Private sector employee 1 1 2 1 1
Retired 1
Self employed 1 1
Student 1 1 1 1

5. RESEARCH FINDINGS
After transcribing and analyzing the interviews, the following factors were found to affect consumer adoption
of ecommerce in Saudi Arabia from consumers’ perspectives:

5.1 The Internet Infrastructure


5.1.1 The Availability of Broadband
Internet infrastructure has improved in most Saudi cities and DSL has come to be a good alternative for most
citizens. However, villages and small towns in Saudi Arabia are still at a disadvantage with only dial up
Internet connections. One of the interviewees from the northern region of Saudi Arabia said, “Most villages
in the northern region don’t have the internet infrastructure. They do not have broadband. They are still using
dial up”. In addition, an interviewee from a small town in the middle of the country said, “There are no DSL
services in our town. We are still surfing the Internet using dial up”. However, people in the main cities are
still suffering from the Internet disconnecting from time to time. According to an interviewee who has
broadband and is living in a main city “Sometimes, the Internet is disconnected for hours or even for a whole

13
ISBN: 978-972-8924-89-8 © 2009 IADIS

day”. In addition, there is a waiting list for broadband in some of the main cities: “You have to wait for a
long time to get a broadband connection”.
5.1.2 The Internet Cost
People who live in the main cities on high incomes said that the monthly charge for the Internet is fair. In
addition, they stated that Internet prices have reduced. However, people who are living in cities on low
incomes, small towns and villages stated that Internet prices were still expensive. For example, an
interviewee from the northern region said, “The Internet price is still expensive. I do not think that my
parents are able to pay the broadband’s monthly cost”. However, two citizens from one of the main cities in
Saudi Arabia said, “The Internet cost is cheaper than before” and “However, comparing with other countries,
it is really expensive”. Table 2 shows Saudi consumers and their point view. It also indicates that Internet
prices in Saudi Arabia and some developing countries are still expensive in comparison to the UK.
Table 2. Internet Service Prices in January 2009
Sources (Amf.org.ae, dol.gov, du.ae, etisalat.ae, orange.jo)
Country Internet Speed Gross Domestic
Product Per Capita
128KB 256KB 512KB 1 MB 2 MB 8 MB 16 MB
£=5.3SR
KSA £19 £27 £36 £54 £83 £152 £174 £9,900
UAE N/A £27 £34 £45 £63 £109 N/A £26,000
Jordan £16 N/A £20 £28 £37 £56 N/A £1,700
Egypt N/A £11 £18 £31 £50 £105 £186 £1,000
UK N/A N/A N/A N/A £4.5 or free £4.5 £10 £21,000

5.1.3 Internet Speeds


The Internet speed in Saudi Arabia reaches 20MB but unfortunately, not everyone can get the speed they
require because of the high price of Internet subscriptions. Consumers may not get the speed for which they
subscribed due to the proxy limitations in Saudi Arabia. According to an interviewee who lives in a city in
the eastern region, “The Internet speed is slow even if you order a high speed connection. We feel that there
is a high load on the Internet”. The slow speed of the Internet makes surfing boring and this will make
consumers reluctant to purchase through the Internet. An interviewee from the eastern region stated that,
“Sometimes, I cannot work on the Internet and I turn off my computer because the Internet is slow and I feel
bored to death”.

5.2 The Official Postal Carrier, Delivery and Return Process


The official carrier in Saudi Arabia is the Saudi Post. However, most of the interviewees stated that there is a
lack of trust in the services. An interviewee from the eastern region stated that, “Saudi Post is not doing its
job that well; however, other private post companies are covering the gap for much more money”. Another
one from the northern region stated, “My family and other families are sharing the same post box. One
member of one of the other family brings our post every two or three weeks. So I cannot order private items
through this post box”. Another interviewee from the southern region stated, “The material might be late, lost
or damaged” and “If I am not satisfied with the purchased item, how to return it back, especially if it’s from
outside my city. I cannot trust the main post carrier and I am not sure that the shop will accept the returned
item”.

5.3 The Lack of Co-operation between Online Shops and the Postal Carriers
and the Lack of Knowledge about the Terms and Conditions
According to some of the interviewees, the Saudi Post does not check the item’s status before delivery. They
deliver the item even if it is broken, without mentioning this to the consumer. Furthermore, there is a lack of
knowledge of the terms and conditions of the Saudi Post. There is no link to the terms and conditions in their
website. Consumers and shops in Saudi Arabia have no idea about the main carrier’s responsibilities. Two

14
IADIS International Conference e-Commerce 2009

citizens from the eastern region stated these issues by saying, “So what will happen if you order online and
receive a broken item. The Saudi Post and the online shop will not return it back and no one will be in
charge. I prefer to see the item myself and check its status”.

5.4 The Absence of the Postal Addresses Systems for Homes and Shops in
Saudi Arabia
Saudi Arabia does not have clear addresses for homes and shops. This makes the delivery process more
complicated. Designing a postal addresses system in Saudi Arabia would help to expand ecommerce and
business since business organizations face difficulties in locating homes and consumers face difficulties in
mapping their addresses. Figure 1 shows the missing links in the ecommerce process in Saudi Arabia.
  Fail
Get the costumer’s order Authorize the card payment Order refused

Accept
Create the consumer’s order Send items to customer’s address Send a confirmation email

Figure 1. Simple Workflow for the Missing Link (Postal Address) in the Ecommerce Process in Saudi Arabia

5.5 Security, Risks, Privacy and Fraud Issues


Some of the interviewees raised another barrier to ecommerce adoption. This barrier is related to the
companies’ websites, which is the inability to distinguish between real and fake companies. An interviewee
from the middle region of the country stated, “Customers in Saudi Arabia do not know about most of the
Saudi websites if it’s real or fake”. In addition, an interviewee from the eastern region raised this issue,
“There are many fake companies even in Saudi Arabia. These fake companies advertise and get the
consumer’s money then disappear”. She continued, “Most people in Saudi Arabia had a bad experience with
fake companies. So they will not trust any ecommerce website”. One of the interviewees raised a privacy
issue, stating, “I think there is no law in Saudi Arabia to force firms to maintain the confidentiality of
information. I cannot pass my information with no protection.” Moreover, some of the interviewees stated
that there is no online protection for credit cards from having their details stolen. For example, “If my credit
card is stolen, no one will protect me.” and “From my experience, Saudi banks do not protect their consumers
in the online transactions”.

5.6 Ecommerce Laws, Consumer Protection Enforcement and Responsibility


In 2007, the Communications and Information Technology Commission in Saudi Arabia published the E-
crimes and E-transaction Acts on the website internet.gov.sa. However, these acts seem too general and do
not cover all possible e-crimes, e-transaction cases and their associated penalties. According to the
interviews, consumers stated that ecommerce law is one of the main barriers to its progress. Citizens in Saudi
Arabia lack knowledge of legal issues. Saudi consumers do not know whether there is an ecommerce law to
protect them. According to one of the consumers who live in the northern region, “I have no idea. I have not
heard about an electronic trading law in Saudi Arabia”. According to an interviewee from the middle region
of the country, “There is no ecommerce law in Saudi Arabia”. Moreover, most of the interviewees do not
know who should be responsible for issuing this kind of law and where to go if they experience a problem
related to their online purchases. According to one of the interviewees in the middle region of the country, “If
I face a problem with my online purchase, and the online shop did not solve the problem, I may not go to
complain because I have no idea where to go”.

15
ISBN: 978-972-8924-89-8 © 2009 IADIS

5.7 Returns and Exchange Policies


Shops in Saudi Arabia can be divided into three groups according to their returns and exchange policies. The
first group and the most common are the shops that have no returns policy. The second group is the shops
that represent the global brands that came from outside the country and have universal returns and exchange
policies. The third group is the shops with exchange policy only. According to an interviewee from the
middle region of the country, “I tried to return the purchased item back but they refused to return it back”.
Another one said, “It is very difficult to return purchased items because; we do not have a returns policy”.
From the interviews, it appears that there is no standard policy for the returns and exchange in Saudi Arabia.
In addition, to the previous responses the reader can understand that most interviewees were afraid that they
cannot return or exchange the online purchased items and this is a barrier to ecommerce consumers adopting
in Saudi Arabia.

5.8 Private Business Responsibilities


Saudi Arabia is suffering from a small number of online shops. According to an interviewee from the
southern region, “There are some online shops. However, they are few. This is because traders were still
dealing with trade the old way and do not want to change” and “This is because most of the companies are
still family businesses”. The private sector has not yet taken the initiative. This is because of the old business
mentality, the lack of IT professionals, a ‘wait and see’ strategy and the lack of competition. Another
interviewee stated that, “This is because there is no real competition between them yet”. Therefore,
customers face lack of diversity and online shops competition.

5.9 Lack of Specialized IT Companies and Professionals


The Information technology field in Saudi Arabia suffers from a scarcity of IT companies and professionals.
For this reason, firms are unable to meet their technical obligations in the field of electronic commerce.
According to an interviewee from the south region, “Companies have not developed their systems since ages.
This is because of the lack of IT professionals in Saudi Arabia”. The availability of IT companies and
professionals help businesses to expand in the area of electronic commerce. It also helps to reduce the cost of
designing and managing online shops.

5.10 Lack of Interest in Educating People and Society on Electronic Commerce


People should be made aware of the new technology, its benefits and the best way to negotiate it.
Interviewees stated that citizens should be educated about ecommerce. This can help to overcome barriers
between citizens and the new technology. In addition, it gives customers greater confidence in electronic
shopping and helps them to adapt to it. An interviewee from the eastern region stated that, “There is a need to
educate citizens about ecommerce”. Another interviewee from the middle region of the country said, “People
suffer from the lack of ecommerce knowledge. They should read and learn more about ecommerce to feel
confidence when purchasing items online”. According to interviewees that Saudi media, schools and other
related ministries has not taken the initiative to educate people about the ecommerce advantages and
disadvantages. Therefore, there will be a lack of knowledge about the ecommerce field in Saudi Arabia.

5.11 Government Responsibility


The Saudi government has taken the initiative over its government programme. There is a five year plan for
its development with a budget of three billion Saudi Riyals. In 2010, there should be a complete electronic
government service. However, the Saudi government has not taken the initiative for electronic commerce.
According to an interviewee from the middle region of the country the “Saudi government is concerned right
now about egovernment, but they did not take the initiative in the ecommerce field”.

16
IADIS International Conference e-Commerce 2009

5.12 Credit and Debit Cards


Most Saudi Banks promote Islamic credit cards and facilitate the process of ordering credit cards. According
to our interviewees, obtaining and ordering a credit card is easy “You can order a credit card easily from the
Saudi banks with a limited amount of money for example SR 2000”. However, most Saudi people prefer not
to pay by credit card. An interviewee stated that this is because they are aware of the methods that credit card
companies use. The majority of our interviewees prefer to pay by debit cards. They do not like credit cards,
as credit card does not withdraw the payment from their bank account at the time of purchase; it combines
the payments together and then withdraws the total amount from their bank account after a period of 45 days.
An interviewee from the western region stated that, “I do not like to pay by credit cards because it does not
withdraw the payment directly from my bank account; it withdraws the total amount in the next month. This
makes me confused about my monthly expenses”.
On the other hand, Saudi debit cards do not work on the Internet. According to an interviewee from the
western region, “I cannot purchase products online by my debit card. It does not work online”. Figure 2
shows the missing link in the ecommerce process in Saudi Arabia that relates to debit cards.

  Fail
Get the consumer’s order Authorize the card payment Order refused

Create the costumer’s order Accept Send a confirmation email

Figure 2. Simple Workflow for the Missing Link (Debit Card) in the Ecommerce Process in Saudi Arabia

5.13 Culture
5.13.1 Language
Some online stores in Saudi Arabia have both Arabic and English versions, such as, Saudi Airlines. Others
have the Arabic version only. In addition, none of the interviewees stated that language is a barrier. However,
one of the interviewees stated, “All the online shops that I know in Saudi Arabia have the Arabic language as
the default language. However, the consumer can change to the English version if he wants to”. The reader
can understand that the language issue is not a barrier in the ecommerce consumers’ adoption in Saudi
Arabia.
5.13.2 Religion
Previous literature stated that religion might be a barrier to ecommerce. However, this research found that
religion is no longer a barrier. None of the interviewees stated that religion is an ecommerce barrier. They
stated that most of the Saudi banks are capable of issuing Islamic credit cards. According to an interviewee
from the middle region of the country, “Alrajhi, Albilad and now Alinma Banks have setup Islamic credit
cards”. This means that there is no interest on their payments. Interviewees stated that Islam religion is not a
barrier to the adoption of ecommerce by consumers. They pointed out that paying interest is the only barrier.
Many of the Saudis banks have solved this problem by introducing Islamic credit cards with no interest.
According to Alrajhi Bank website “We have introduced a new Islamic credit card called ‘Qassit’” and “all
of Alrajhi Bank’s products are fully Islamic...there are no interest charges, no late fees for delayed payments,
and no hidden charges. The only charges that are applicable are the annual fees and the cash withdrawal
fees”. At the present time, many Islamic scholars authorized these Islamic credit cards. They are working
with the Saudi Banks to make sure they follow the Islamic process.

17
ISBN: 978-972-8924-89-8 © 2009 IADIS

6. CONCLUSION
This paper has pointed out the many barriers that deter consumers from using ecommerce. These barriers
have been stated from the consumers’ perspective. Some of these barriers have previously appeared in the
litrature and some of them have not. There are more barriers in villages and towns than in cities. People over
55 years are less adapted to ecommerce and less interested in dealing with new technology, such as,
computers. There are no differences between women and men in terms of technological trends and in terms
of barriers. Religon is no more a barrier to ecommecrce adoption. The internet providers and the Saudi post
should work hard to satisfy Saudi consumers. There should be more work on educating consumers about
advantages, disavantages and the best way in dealing with ecommerce. However, more work should be done
on how to overcome barriers to facilatate consumers in Saudi Arabia to adopt ecommerce.

REFERENCES
Alrajhi Bank.2008. Alrajhi Bank Credit Cards. Retrieved 21 Dec 2008. from <alrajhibank.com.sa/ Individual/Solutions
/Credit Cards/Pages/cards.aspx>
Al-Shehry, A. et al., 2006. The Motivations for Change towards e-government adoption: Saudi Arabia as a case study.
eGovernment Workshop 06 (egov06). Brunel University, UK.
AMF.2008.Broadband prices. Retrieved 20 Dec 2008. from
<amf.org.ae/pages/XlsToHtmlViewer.aspx?filename=uploads
/Docs/ECONOMICDEPT/Eco_Ind/INDFRM03.xls&xlsType=3>
Barbonis, P.A. and Laspita, S, 2005. Some factors influencing adoption of e-commerce in Greece. Engineering
Management Conference. Proceedings. 2005 IEEE International.
Chau, P. et al., 2002. Cultural differences in the online behaviour of consumers. Communications of the ACM. 45(10), pp
138-143
Chirch, A. and Kauffman, R, 2000. Limits to value in electronic commerce-related IT investments. Journal of
Management Information Systems. 17(2), pp 59-8
Del Aguila-Obra, A. R. and Padilla-Melendez, A., 2006. Organizational factors affecting Internet technology adoption.
Internet research. 16(1), pp 94-110
Du .2008. Broadband prices. [online] Available at: www.du.ae [Accessed 28 December 2008].
Etisalat.2008. Broadband prices. [online] Available at: www.etisalat.ae [Accessed 28 December 2008].
Farhoomand, A. et al., 2000. Barriers to global electronic commerce: a cross-country study of Hong Kong and Finland.
Journal of organizational computing and electronic commerce. 10(1), pp 23-48
Internetworldstats. 2009. Middle East Internet usage. [Online] Available at:
http://www.internetworldstats.com/middle.htm [Accessed 28 December 2008].
Karakaya, F. and Charlton, E. T., 2001. Electronic commerce current and future practices. Managerial Finance. 27(7), pp
42-53
Molla, A. and Licker, P. S., 2005a. Perceived e-readiness factors in e-commerce adoption: an empirical investigation in a
developing country." International Journal of Electronic Commerce. 10(1): 83-110.
Molla, A., and Licker, P. S., 2005. E-commerce adoption in developing countries: A model and instrument." Information
& Management. 42(6): 877-899.
Orange.2008. Broadband prices. [online] Available at: orange.jo/adsl.php [Accessed 28 December 2008].
Ranganathan, C., Ganapathy S., 2002. Key dimensions of business-to-consumer web sites. .Information & Management.
39: 457.
Sait, S. et al., 2004. E-commerce in Saudi Arabia: Adoption and perspectives. Australasian Journal of Information
Systems 12(1): 54-74.
Siala, H. et al., 2004. The impact of religious affiliation on trust in the context of electronic commerce. Interacting with
computers. 16(1), pp 7-27
Strauss, A. and Corbin, J., 1990. Basics of qualitative research grounded theory procedures and techniques. USA: sage
publications.
US Department of Labor. 2008. US department of labor in the 21 century. [Online] Available at:
dol.gov/asp/media/reports/chartbook/2006-06/ section1_txt.htm [Accessed 28 December 2008].
Vatanasakdakul, S. et al., 2004. What prevent B2B ecommece adoption in Developing countries? A socio-Cultural
perspective. Proceedings of the 17th Bled eCommerce Conference on eGlobal, Slovenia, 2004
World Bank Group (2006), Saudi Arabia Data Profile, World Devlopment Indicators Database, Pittsburgh, PA.

18
IADIS International Conference e-Commerce 2009

DOES FIT B2B E-COMMERCE FOR AGRIBUSINESS? A


FIRST APPROACH FOR TRUST EVALUATION ISSUES IN
SPANISH AGRIFOOD SECTOR

Fernández Mª Cristina, Research Student. PhD Candidate*


De Felipe, Isabel. Prof.*
Briz Julián, Prof.*
Agricultural Economics Department. E.T.S.I. Agrónomos. Universidad Politécnica de Madrid.
SPAIN

Work in progress in the frame of the specific support action of the 6th European Framework Program named
“E-Trust” (FOOD-CT-2006-043056).

ABSTRACT
The lack of information about trust issues in agricultural and food sector follow the authors to explore about this topic. A
qualitative study is carried out in two phases in order to find out evidences for later hypothesis development about the
performance of trust in the agricultural and food sector. This paper goes a step further in a previous one presented in e-
commerce IADIS conference in 2008. Firstly this paper shows and initial reflection of the barriers related with trust in the
adoption of B2B strategies and technological tools in agricultural and food in Spain. In order to explore this topic nine
qualitative interviews where conducted. The result of this first stage is a list of qualitative results related with concerns
and barriers in the e-business agricultural sector. The second phase consists on nineteen qualitative interviews using the
Analytical Hierarchy Process (AHP) to evaluate a developed theoretical topology of trust. Finally the results are
expressed and resume in the form of hypothesis to be study in forthcoming phases of the study. The results will be useful
for the approach and implementation of trust in different supply chains in different agrifood sectors.

KEYWORDS
Trust, AHP, Agribusiness B2B.

1. INTRODUCTION
The Agricultural, Food and Beverage sector which collect the activities related with production and
transformation from raw products to human consumption, is one the most important industrial branches in
Europe and Spain. In 2004, the EU-25 food and beverage industry as a whole had a turnover of 815 billion
euros, transforming over 70% of EU’s agricultural raw materials and employing about 3.9 million people, of
whom the majority works in SMEs. France, Germany, Italy, the UK and Spain are the largest EU-25
producers with more than 70% of total EU turnover. However, this key sector presents a low rate of Internet
and Communication Technologies (ICT) adoption than other sectors and less development of Business-to-
Business strategies. (European Commission, 2006-2007).
The low adoption rate adoption of ICT although the theoretical benefits are stated in terms of promotion
of information flow, transparency market and prices, reduction or elimination of transaction costs and the
increase in online cooperative (Ferentinos, K. et al. 2006) leads to a reflection of e-commerce adoption in
agricultural and food sector.
Many characteristics of food products may only be analyzed after use (experience characteristics); others
even cannot be examined at all (credence characteristics). Furthermore, the lack of physical inspection of the
product and contact between transaction partners make e-commerce too anonymous for agrifood sector
transactions also may cause a lack of trust, which could be responsible of the low adoption in the sector.
(Fritz et al. 2007)

19
ISBN: 978-972-8924-89-8 © 2009 IADIS

In terms of the communication technology adoption there are lots of debates around the application of
Information Technologies in the Supply Chain Management but a very few literature survey article that deals
ICT with Supply Chain Management (Gunasekaran, Ngai, 2004) with Information Technologies aimed to e-
business and focused in agricultural and food sector.
This report shows a preliminary approach in a qualitative way to explore how the communication,
networks and B2B relationships works in the agricultural and food sector.

2. BACKGROUND OF THE QUALITATIVE STUDY

2.1 Trust and E-business Activities in the Agrifood Sector. Theoretical


Framework
The Electronic Commerce environment is an environment with risk, simply because commerce in general
involves risk (Tan and Thoen, 2001), the agrifood sector deals with products and activities where a large
amount of information asymmetry exists between transaction partners (Fritz M. 2007) and the adoption of E-
Business transaction support by businesses is low, in particular by small and medium sized enterprises
(SMEs) in food networks (European Commission, 2006-2007). Tan and Thoen (2001) argue in their “Generic
Trust Model” that the agent’s trust in a transaction with another party is the combination of the trust in the
other party and the trust in the mechanism for the successful performance of the transaction. Fritz M,
Hausen. T. and Cannavari M. advanced going further towards a “Trust Model for Electronic Commerce in
the agrifood sector” based on Tan and Thoen. The level of trust in a transaction is depending of elements
which generate trust such as other party and control mechanism. Thus, the level of trust in a transaction is
depending of the situation where the transaction is being carried out. The potential gain and risk of
transaction the risk attitude of the individual who perform the transaction determine the situation where the
level of trust is set.

determined determined by determined


by scenario scenario; by individual
dynamic
interrelation with
trust generation

Figure 1. Trust Model for Electronic Commerce in the Agrifood sector based on Tan and Thoen (2001) developed by
Fritz, Hausen and Cannavari (2007)

2.2 Barriers to the B2B Adoption


Barriers to the adoption of in B2B environments are mentioned in different reports and studies. The European
Business report 2006-07, shows the following barriers not focused on agricultural and food sector: company
too small, technology too expensive and complicated, incompatibility systems, legal issues and lack of
reliable IT suppliers. Other Spanish National studies carried out by AECE (AECE, 2001) and the E-
Commerce Observatory of Madrid Chamber of Commerce (Cámara de Madrid, 2003) added to the previous
some more specific to Agricultural and Food sector like: lack of standardized product and knowledge
(specific human resources formation), company culture (culture endurance and narrow minded), some

20
IADIS International Conference e-Commerce 2009

companies prefer to continue with old strategies, the ratio cost/benefit does not justify the investment. Other
barriers related with an e-business environment are [E-Thematic, 2003] deal with the organization
(uncertainty about business models, the agrifood sector should deal with specific business models according
to the food sector characteristics), the company operations (operational changing procedures, lack of
technological and human skills and fragmentation in the software market) and legal and jurisdictional issues
(difficulty to understand how the law is applied to e-commerce because in some areas such as digital
signatures, tax laws, customs tariffs, the confusing in disputing resolutions and infrastructure and security
issues.
External related factor like trust, security, successful relationship, internet affordable access and customer
acceptance are considered external critical B2B success factors (Riyad. E, Myfanwy T, Abdel. M, 2002). The
role of trust in the agricultural and food sector is not mentioned explicitly in previous studies but it is
suspected that the lack of trust may be considered a threat for developing e-business strategies and it is
considered that the lack of trust it is not enough explored in agrifood sector. This the start point in the
research.

2.3 The Trust Typology


It seems to be a fact that a barrier for the electronic transactions of the e-business in the agricultural sector is
the difficulty to test and to examine the product. There is also a perceived reluctance in the sector to perform
transactions and relationships via e-commerce. In the frame of “E-trust” project a theoretical typology
developed by Hofstede G. J et al (2007) provides a basis to test the dimensions of trust with acultural point of
view. The main characteristic of the trust typology is the wide view of “trust” (including “control” o it), it is
focused on food quality and safety attributes, it is focus on early stages of relationship, it is taken the
perspective of the buyer, it is based on state-of-the-art, its structure it is inspire for AHP method use, it is
flexible across sectors and elements are included to light potential sources of cross-cultural differences. The
1st hierarchy level consists of the main goal of the typology, trust from the perspective of a buyer who is in
the early stage of a new purchase relationship. The 2nd level consists of the objects of trust (product, seller,
market environment). This level is expected to be cultural sensitive; the importance of control institutions is
expected to be strongly associated with product characteristics, as well as culture. The 3rd and 4th level
contain the dimensions of trust.

Objective Objects of Dimensions of the objects of trust


trust
Buyer's trust in 1. Product 1.1 Reputation
transaction 1.2 Specification
1.3 Inspection
1.4 Certification
1.5 Price / performance ratio
2. Seller 2.1 Capability
2.2 Relationship 2.2.A Relationship between
individuals
2.2.B Relationship between
companies
2.3 Reliability 2.3.An adequate
communication
2.3.B Deliveries
2.3.C Financial situation
2.4 Reputation
3. Market 3.1 Control institutions
environment 3.2 Informal institutions
3.3 Legal institutions
3.4 Reputation

Table 1. Basic Structure of the Trust Typology (Source: Oosterkamp and Hofstede, 2007)

21
ISBN: 978-972-8924-89-8 © 2009 IADIS

2.4 AHP
The Analytic Hierarchic Process (AHP) is a widely used method to solve complex decision problems, for
scientific as well as for business applications The AHP was introduced by Saaty (1980) in order to structure
and solve complex decision problems. However, it may also be used to derive priorities for hierarchical
elements which cannot be deducted from evaluator’s experience. The application of the AHP is more or less
independent from branches and business fields and is used continuously for decision problems in agriculture.
(Amedeser, Haas, Meixner 2008).
The AHP promotes to divide the problem into smaller elements which are incorporated in a predefine
structure such a in a hierarchy tree (Amedeser et al 2008). The elements of the hierarchy tree are based of the
structure of the typology. The objects of trust and the dimensions of the typology are used to be weighted by
“pairwaise comparisons”. The comparisons of element according to an established scale allow to join the
qualitative information with quantitative one. The final result is a numerical value expressed in percentage
which presents the most weighted option of the hierarchy.

3. METHODOLOGY
The methodology to study B2B relationships in agrifood sector in Spain followed two separated ways. On the
one hand the scarce study about the performance of trust in Spanish agribusiness followed to make an
exploratory study to know about the concern and worries about the implementation of business to business
strategies. In the other hand questionnaire using the AHP were carried in order to check which were the most
important attributes and values developed previously in the typology and link them with the exploratory
qualitative interviews.

3.1 Qualitative Interviews


In order to develop a qualitative approach towards trust in e-commerce in agrifood sector framed in the
“Trust Model for Electronic Commerce in the Agrifood sector”, ten interviews were conducted with
representatives and professional of ICT technologies of the sector in Spain. The purpose is to know how e-
business and trust is performed to have a broad overview on the main problems faced in adopting e-
commerce, interviewed were convenience chosen. The questionnaire consists on a short list of twelve open
questions (see table 3). The main issues asked to the interviewees where related with the need, opportunities,
the preconditions for e-business adoption and the suitability of e-commerce for the agrifood sector. The types
of representatives interviewed are listed in the table 2. The interviews were transferred to an extended
summary. The results obtained by the interviews make up a previous and qualitative scenario for later
quantitative studies.
Table 2. List of Conducted Interviews
SPAIN
Sector Stage Sector Stage
Meat Convenience Manager of Sales Fruit cooperative sociedy E-business manager and cooperative
Products member

Food Consortium Responsible for trade Grain Snack Transformer Quality Manager
marketing
Olive Oil Brand Marketing Manager
Academic University Business teacher
Expert (focus: computer
Computer consulting consulting) Strategic ICT Consulting Manager of Consulting Company

22
IADIS International Conference e-Commerce 2009

Table 3. Questionnaire for the Qualitative Interviews


1. Do you use E-commerce in your business transactions? If YES, 1.1 When did you start? a) Less than 1 year ago b)
Between 2 and 5 years c) More than 5 year 1.2 Which proportion of your business account e-commerce? (%) 1.3 Do you
expect to increase e-commerce in your company? 1.4 Do you have a web page? 1.5 Others.
If NOT, Which are the main reasons? 1.6 No interested in new technologies. 1.7 Difficult to understand
1.8 Do not suit my product- service requirements. 1.9 Difficult to operate. 1.10 Very expensive 1.11 Others
2. Please, identify the main elements which give you: Trust in e-business (What elements do you aim to trust in e-business?
(I.e. Brand reputation, certification, legal control, on time deliveries). Distrust in e-business. (What elements do you aim to do not
trust in e-business?)(I.e. Brand reputation, certification, legal control, on time deliveries).
3. What measures/technical elements give/would (if e-processes are not used) give you trust in your e-processes? (Web cameras,
microphones, videoconference…etc.).
4. What elements/procedures do you miss/need in your e-processes which would give your more trust in them?
5. How do you create/perceive a “trusted market environment” for selling/buying your products) (Keep in mind typology 3. market
environment: control institutions, informal institutions, legal institutions, reputation)
6 Describe which are the main factors to select your suppliers/customers to trust in them (Quality, price, location, confidence,
reputation…)
7 In your opinion which are the main obstacles to use Internet and trust in the transactions (High cost and tariffs, lack of personnel
expertise, lack of tangible, benefits…)
8 .In what business activities do you use e-commerce? In what activities do you think that e-transactions does not work related to
trust? (Request of goods and services, to carry out payments, electronic reception of good and services…)
9 What barriers do you find for buying by e-commerce related with trust? (Difficulties for some products and services, small number
of suppliers, cost of delivery, logistic problems, payment and contracts uncertainty…)
8 What advantages do you find when buying-selling by e-commerce? (Cost saving, speed of the processes, simplification of the
tasks, greater number of suppliers…)
9 How do you sell or develop activities by e-commerce? What do you show your partners to trust in you?
(Through the web page and/or e-market place, description of product and services, certification, stamps)
10 Which are the activities developed by firms selling through e-commerce (information of products, services and prices, get orders
and payments, deliver goods and services…)
11 What problems do you find in firms selling through e-commerce? (Lack of potential clients, payment uncertainty, contracts
uncertainty, logistic problem, maintenance cost of the system, high priority of traditional channel…)
12 What are the advantages for selling through e-commerce? (Cost reduction, get new clients, market geographic expansion, better
quality of the service, higher speed of the process, simplification of tasks, to avoid to yield quota market to companies already
operating in e-commerce…)

3.2 AHP Assessments


The Trust typology was tested by 19 interviews assessment using a software tool. Although it exists specific
software designed for multicriteria choice decision it was decided to developed the AHP questionnaire by the
excel tool. Excel is very common software, available in most of the computers and it allows to the
respondents to answer easily by email. In this excel file the different object of trust typology were evaluated,
pondered and weighted by the chosen respondents (see table 4) by using the excel tool. The excel tool
provides interaction to the interviewed person because the pondering is very intuitive moving and locating
the cursor in the right way. Interviewees also provided some extra information during the evaluation by face-
to-face or telephone conversation. The excel tool provides interaction to the interviewed person because the
pondering is very intuitive moving and locating the cursor in the right way.The scale for the evaluation
process is a standardized AHP scale confirming Saaty (1980) with verbal description of the data points
(from 1 = equal importance to 9 = absolute dominating and the associated reciprocal values for reversal
evaluations).

Figure 2. Evaluation of Trust


Typology
(Via Excel)

23
ISBN: 978-972-8924-89-8 © 2009 IADIS

Table 4. Conducted AHP Assessment

S Type of Company Level in Function of the S Type of Company Level in Function of


e Company size (number value chain respondent e Company size (number value chain the
c of employees) c of employees) respondent
t t
o o
r r
Grower- 2 national Wholesaler Dairy More than national Directive and
Wholesaler Product 1000 Consulter
Transformer
*
Transformer More than 500 National- ICT manager Cooperative 29 growers international Cooperative

Fruit & vegetable


international +technical member
staff
Transformer 2 local Owner/manager Family 2 national Manager
Grain

Retailer enterprise-
Grower
Grower- 9 local- Manager Wholesaler Around 20 national Manager
buyer regional
national
Transformer- 87 national Quality Manager Transformer Around 100 national- Purchase
wholesaler (depending international Manager
season)
Bottler National Technical Director Growers- 5 regional Veterinary
Quartering
Olive oil

Grower- More than 500 National Marketing Manager Transformer 5500 Regional Key Account
Bottler International international Manager
Meat

2nd grade 20 National Sales Manager Transformer -- national Quality


cooperative +cooperatives international Manager
COAG National Sector Managers Wholesaler 20 National Director
UPA

4. RESULTS DISCUSSION

4.1 First Phase


Regarding to the requirements for not adopting the ICT tools in agricultural and food B2B sector some
explanations appeared. B2B is not aimed for all products in food sector. It suits for those products not
perishable with high added value and with low distribution cost in relation with the product price (i.e., wine,
high quality olive oil, traditional products…). In order to supply the raw inputs the e-relations becomes more
complicated in terms of trust to assure the organoleptical attributes of the raw products (quality, freshness,
taste…). The degree of differentiation of some agrifood products makes the e-transactions very difficult, and
when the business relationship concerns with not standardized products e-commerce does not work easily.
Other important characteristic that influences the adoption of B2B is the intrinsic and social
characteristics of agricultural and food sector. The traditional way of transacting (knowledge by acquaintance
and physical approaches) seems to be the most guaranteed and proofed one. Moreover, if there is not a
common intention and a strict request (by clients) to accesses to a new way of transacting, no concrete
advantages seem to come from accessing e-commerce. Operators underlined also the need for “signals” in e-
commerce, in order to be assured (institutional, legal, financial signals). Information and communication are
key factors which can help the development of e-commerce, but reputation of business operators and their
position in traditional markets seem to be still considered very relevant in the decision to access e-
marketplaces and e-environments. However, under the “umbrella” of e-business a lot of administrative
transactions are carried out specially exchange of information, search of new suppliers and data exchange.
Within the interviews some preconditions for e-business adoption were able to be found out. One of the
preconditions is getting standardized products with enough quality attributes. The less suitable products to e-
business are those food products less processed and with less long life time.

24
IADIS International Conference e-Commerce 2009

The interviewed persons have a special concern about trust issues. They showed themselves worried
about how and where complaining and the necessity of physical documents to complain. Moreover, there are
worries about the ignorance of the players who take part in the business process, the possibility of phishing
and the possibility of spying or intromission in key company data.

4.2 Second Phase


The main conclusion found it after the nineteen interviews carried out is that major weighted objects of trust
depend on the place that the company is located throughout the supply chain and it does not depend on the
sector. Therefore the most important object of trust typology is the product, considering in most of the cases
raw material, for transformer companies which import raw materials and for growers is the reputation,
reliability and the ability to get the money of the purchase at time.
Concerning the three levels of the assessment in Spain the results can be synthesized as follows:
- At first level of the assessments the major pondered objet were the product, in second place the
“company” and in the third last place the “market environment”.
- At second level of the assessments the main mentioned object of trust where: “reputation” and
“price-performance” for grain sector, “inspection” and “price performance” in fruit sector, “inspection”,
“reputation” and “specification” in meat sector and finally “price performance” and “specification” in the
olive oil sector.
- At third level the major pondered trust objects are the “relations between individuals” and the
“deliveries”:
- Regarding the evaluation between public institutions and private institutions the
major weight belongs to the public ones. However, some of interviews pointed out that for
specific product some private ones work much better.

5. CONCLUSIONS AND FURTHER RESEARCH


Interviews show that e-commerce needs some more time to be culturally accepted in agricultural sector. The
interference with traditional ways of doing business is seen as a real problem, together with the lack of the
perception of virtual environment as a business tool. Institutional guarantees are seen as important, but
reputation seems to play a key role in this environment, together with marketing and business players’
decisions. Technological aspects need to be improved in order to better satisfy each products’ needs.
Regarding to the suitable agricultural products the interviews show that entrepreneurs are reluctant in
adopting new technologies, especially in fresh products because it is a big challenge to make perceptible the
freshness quality attributes of the products to the potential customers. E-commerce is more suitable for those
products with high added value and with possibility to be easily stored.
Regarding the virtual environment, it is mentioned a special worry about the publicity of the personal
data, business partners, etc and to be vulnerable to “electronic mistakes”. A legal environment where the
rules of the game where establish is very important. It is very important as well to have “evidence” and
proves just in case to complain.
Physical contact still remains as a very important issue. An important way to make business is starting
from a traditional way and continue with this partner in an “e-business way”.
The dimension of the typology “Product” is the main weighted object of trust for the interviewed using
the AHP assessment excel file. It is especially important for those companies that use products as raw
material. There are no very high differences between the different sectors, the difference appears between
those companies which are considered as transformers and demand a high quality product those considered
as growers which demand a correct price at an agreed time. However, the company plays an important role of
adding value in the same sold product. Finally, in general terms the market regulations developed by public
bodies are considering more trusted institutions than private institutions.
This research present the progress in the field of the application of information and communication
technologies and the performance of trust in e-commerce in the agricultural and food sector.

25
ISBN: 978-972-8924-89-8 © 2009 IADIS

For future research several hypotheses should be proposed in order to develop a further quantitative study
focused in a specific sector.
H1: B2B e-commerce is aimed for agricultural standardized added value food products.
H2: Agricultural and food sector B2B relationships starts with a traditional way of making business
where physical contact is still important.
H3: “Product” is the core tangible term which provides trust in B2B agrifood sector transactions.
H4 : “ Reputation” in the core intangible term which provide trust in B2B agrifood sector transactions.
The hypothesis represents a basis to go deeper in the task of indicators that provide trust in the
transactions along the supply chain and the attributes of the products that can be traded by e-commerce.

REFERENCES
AECE, 2001. Resumen sobre Comercio Electrónico B2B.Observatorio del Comercio electrónico. España Cámara de
Madrid. Comunidad de Madrid. España.
Amedeser, C. et al. 2008. Measurement of the importance of trust elements in B2B AgriFood Chains, an Application of
the Analytic Hierarchic Process. Journal on Chain and Network Science; 8(2) pp 153-160
Briz,J. Schieffer; G. Fritz. 2008 Report on use of B2B trust elements in e-commerce Unpublished report, EU FP6-
project: “e-trust”, contract number FP6-CT-2006-043056
Cámara de madrid, 2003. Comercio Electrónico en la Industria Alimentaria de Madrid.Observatorio del Comercio
electrónico. España.Cámara de Madrid. Comunidad de Madrid. España.
European Commission, 2007 The European e-Business Report Available on http://ebusiness-
watch.org/key_reports/synthesis_reports.htm ISBN 92-79-02038-2, pp20-34
European Commission, 2006 ICT and e-Business in the Food and Beverages Industry. Available on http://ebusiness-
watch.org/links/sectors/food.htm e-business W@tch, European Commission; Databank S.p.ASector report Nº 1/2006
E-Thematic, 2003.State-of-art report on e-fulfillment. Thematic Network
Ferentinos, K. et al. 2006. Internet Use in Agriculture, Remote Service and Maintenance: E-Commerce, E-Business, E-
Consulting, E-Support. Handbook of Agricultural Engineering Chapter 7 pp 453-464.
Fritz, M. Hausen, T. Cannavari M. 2007. Trust and e-commerce in the agrifood industry: Configuration of a trust
environment for e-commerce activities. In: Theuvsen L et al. (eds) Quality Management in Food Chain. Wageningen
Academic Publishers, Wageningen.
Gunasekaran A, Ngai E.W.T (2004). Information System in Supply Chain Integration and Management. European
Journal of Operational Research 159 269-295.
Ho W. Integrated analytic hierarchy process and its Applications – A literature review.
European Journal of Operational Research 186 (2008) 211–228
Oosterkamp, E. and Hofstede, G. J. 2007. Report on B2B trust elements and their typology. Unpublished report, EU FP6-
project: “e-trust”, contract number FP6-CT-2006-043056.
Riyad E., Myfanwy T. and Abdel M. 2002. Across Industry Review of B2B Review of Critical Succes Factors.
Electronic Networking Applications and Policy Volume 12 . Number 2 . 2002 . pp. 110±123 ISSN 1066-2243
Saaty, T. L, 1980. The analytic hierarchy process: planning, priority setting, resource allocation. New York, NY,
McGraw-Hill.
Tan, Y.-H. and Thoen, W (2001). Toward a Generic Model of Trust for Electronic commerce. International Journal of
electronic Commerce 5 (2): 61-74

26
IADIS International Conference e-Commerce 2009

STRATEGIC ALIGNMENT AS A WAY OF ADDRESSING


THE BARRIERS TO E-BUSINESS ADOPTION

Eduardo Escofet
Department of Information Technology, University of Holguín
Ave. XX Aniversario s/n, Holguín, Cuba

María José Rodríguez, José Luis Garrido


Department of Computer Languages and Systems, University of Granada
ETSIIT, c/ Pdte. Saucedo Aranda s/n, 18071 Granada, Spain

Lawrence Chung
Department of Computer Science, University of Texas at Dallas
Richardson, Texas 75083, USA

ABSTRACT
IT managers are key human resources in E-Business, as strategic thinking blocks in E-Business adoption at IT levels.
Despite the critical role IT managers play, there has been inadequate support for aligning E-Business with IT. Although
some tools and techniques have been proposed in literature to find and evaluate Business and IT Strategic alignment, they
suffer from lack of objectivity and integration. In this paper, we propose a four-step interview-based method that permits
us to align E-Business with IT strategies and to obtain investment priorities per software development process and area,
towards improvements on service quality. This method incorporates the Delphi Method, the Goal Modeling formalism,
Venkatraman´s Strategic Alignment Model and the QFD technique to avoid inconsistencies and to increase confidence in
compiled data and modeling results.

KEYWORDS
E-Business / IT alignment, adoption barriers.

1. INTRODUCTION
While adopting E-Business technologies, we face a clearly identifiable barrier: lack of strategic thinking.
This barrier is present at all business levels, in particular at the IT level. Aligning E-Business and IT
strategies is a way of addressing this barrier and also to positively impact other barriers such as troubles with
developing an E-Business roadmap and the lack of management commitment.
The E-Business/IT strategic alignment is an essential step for architectural, structural and new
technological adoption decisions. Several problems emerge in this process:
1. Interviews to business and IT managers have a high level of incoherence, due to poor skills on
new technologies and raw knowledge of on-line business models.
2. Applied questionnaires contribute with a high level of subjectivity to the alignment process.
3. IT investment priorities are not clear; this is a key element for the success of the E-Business
adoption.
We can find several studies about the E-Business/business/IT alignment subject in [Al-Hakim 2009],
[Baina 2008], [Becker 2008], [Henderson 1999], [Pierre 2008], but they show lack of integration, obviate
priorities on investment and specific features of E-Business model, or usually forget the human-subjective
aspect of each alignment process. We propose a four-step, interview-based method, starting with the
preparation of the interview questionnaires, and then applying the Delphi method [Linstone 2002]. This is a
method used to reduce incoherence in the interviewing process, to improve consolidation results and to reach
consensus.

27
ISBN: 978-972-8924-89-8 © 2009 IADIS

Next, we apply the goal modeling formalism and the Strategic Alignment Model (SAM) relationship
identification by comparison to reduce subjectivity on the compiled information and to guarantee strategic E-
Business/IT alignment.
Last, we relate identified goals with processes and process areas (for example, identified from a CMMI
application) using Quality Function Deployment (QFD) to align strategic goals and IT processes in an
organization [Becker 2008], and to determine investment priorities in IT processes and process areas. To
clear concepts and steps we use an example through our method unfolding.

2. UNFOLDING THE METHOD


The proposal of this method, oriented to facilitate the alignment between E-Business and IT strategies, is
illustrated using an example, the fictitious case of ebooks2go.ws portal, similar to other portals like
freebookspot.org or knowfree.net. It receives thousands of hits everyday and permits to search for e-books
and e-zines from Internet content providers such as megaupload.com or rapidshare.com. Its web site offers
well known typical basic services for this kind of business: simple searching and scrolling features,
registration and authentication forms, content descriptors, external content links, and front page pictures
when available. Its main business is based on advertisement links, usually from Google Ads or sites alike,
with all of these attributes organized across a plain web interface.

2.1 Step 1 – Interviewing and Consolidating


Our proposal is interview-based and model-oriented, so the first thing to ensure is the accuracy of the
questionnaires and the reliability of the resulting data. We would reach this previous achievement if experts
in questionnaires and interviews focus their attention on objectives through the whole interviewing process. It
is of paramount importance to count on this in the following refinement process for strategic goal modeling.
The interviewing process should involve business managers, IT managers, stakeholders and end users, in
order to have a whole understanding of the needs and capacities.
A deeper discussion on this subject is beyond the scope of this paper, but we encourage people interested
in gathering methods to study other materials about questionnaire preparation and interview planning
[Esposito 2002] [Frary 1996]. It is important to notice that we need other methods to reduce incoherence and
to reach consensus. We recommend a study on elicitation techniques adequacy [Carrizo 2008] to better grip
effectiveness of these methods.
While applying Rappa´s [Rappa 2004] [Afuah 2003] and Weill & Vitale´s [Weill 2001] E-Business
model taxonomies, we have found that this E-Business model should be classified into the Advertising and
the Intermediary groups, thus clarifying some of its features and attributes. It is important to identify E-
Business models in order to increase the accuracy of the proposed method and to consider the specifics of
each model in the processes of questionnaires preparation, interviewing and information consolidation.
A thorough analysis of the answers to the questionnaires should be done in order to attain a better
understanding of real E-Business needs, end users and stakeholders preoccupations, business managers
opportunities outlook and IT managers identified IT capacities..

2.2 Step 2 – Applying the Delphi Method


Applying questionnaires and interviews usually produces heterogeneous and inexact data that should de
compared and verified to increase information accuracy. The Delphi method is intended to reduce
incoherence, increment objectivity on subjects and data stability, and help attain consensus. Before applying
this method, it is essential to determine the objectives to obtain, to ensure the questions in the questionnaires
conform to the objectives, to monitor the way surveys and interviews emerge. Here, the whole process has be
to be centered around the strategies of E-Business and IT. We suggest this summarized steps be applied with
the Delphi method in an interview-based process: Conformation of a Delphi team to supervise the entire
project, selection and clustering of the informants (usually informants are experts in the research area), first
round of Delphi´s questionnaires application, test questionnaires for proper terminology, transmission of the
first round questionnaires to the jury members, analysis of the first round answers, preparation of the second

28
IADIS International Conference e-Commerce 2009

round of questionnaires, transmission of the second round of questionnaires to jury members, analysis of the
second round answers (iterate through the three previous steps, including this one, to increase results
stability), and preparation of a conclusion report by the analysis team.
A deeper discussion on the Delphi method, especially on its associated statistical techniques, is beyond
the scope of this paper, but we encourage the reader to take a look at some theoretical and practical studies
[Linstone 2002], [Hsu 2007], [Yousuf 2007], [Rayens 2000], [Paul 2008] used in our research. It is important
to reduce interviewing noise in consideration of E-Business model features and attributes.
As a result of this step, we detected and eliminated most of the incoherence, inferred new requirements
and relationships between requirements, and obtained a filtered subset of features, in particular, useful
requirements for subsequent modeling.

2.3 Step 3 – Modeling and Aligning


In this step, we use visually-oritend goal modeling, to reduce subjectivity in the compiled information and to
enhance strategic E-Business and IT alignment [Baina 2008], [Bleistein 2004], [Lamsweerde 2001]. After
that, it is essential to establish the relationship between the goal model and the relationships in
Venkatraman´s Strategic Alignment Model by comparison. Four perspectives can be identified in SAM as
follows:
1. Strategy Execution: This perspective corresponds to the classical, hierarchical view of strategic
management. It considers the business strategy as the driver of both organizational design choices and the
logic of the IT infrastructure. Top Management formulates the strategy; IT Management is only considered as
strategy implementer.
2. Technology Potential: This perspective also views the business strategy as the driver. However it
involves the formulation of an IT strategy to support the chosen business strategy and the corresponding
specification of the required IT infrastructure and processes. The top management should provide the
technology vision to articulate the logic and choices pertaining to IT strategy that would best support the
chosen business strategy. The role of the IT manager should be that of the technology architect. He designs
and implements efficiently and effectively the required IT infrastructure that is consistent with the external
component of IT strategy.
3. Competitive Potential: This alignment perspective is concerned with the exploitation of
emerging IT capabilities to: impact new products and services, influence the key attributes of strategy, as
well as develop new forms of relationships. Unlike the two previous perspectives, which considered business
strategy as given, this perspective allows the modification of business strategy via emerging IT capabilities.
4. Service Level: This alignment perspective focuses on how to build world class IT organization
within an organization. In this perspective, the role of business strategy is indirect. This perspective is often
viewed as being necessary, but not being sufficient, to ensure the effective use of IT resources and to be
responsive to the growing and fast changing demands of the end-user population.
Note that businesses with a large and dominant presence of the first perspective also have several barriers
to E-Business adoption. Businesses with a dominant presence of the fourth perspective are usually
technology-driven, hardly meeting user needs. A reasonable combination of perspectives with a large
presence of the second and third perspectives is greatly recommended; otherwise some alignment and
adoption problems exist and must be addressed.
In this case, to reduce subjectivity on the interview/Delphi process, to model goals and to align E-
Business and IT strategies, we partially used the proposal of Baina [Baina 2008]. It permits to establish an
adequate formalization of both strategies alignment with the difference that we start from consistent
information resulting from the application of data elicitation techniques. It permits us more accuracy in
modeling and to determine actual perspectives in the strategic alignment model [Henderson 1999].
Increasing accuracy in modeling E-Business/IT strategies is not easy if managers and experts don´t follw
standards, so we use Weill & Vitale´s and Rappa´s taxonomies to classify the E-Business model of the
organization; beginning with this classification it is easier to identify fundamental features and attributes of
E-Business models.
Goal modeling is an important part of the requirements engineering, we encourage to dig notation and
formalisms foundations in several studies about goal modeling and goal-oriented requirements engineering
(GORE) [Pierre 2008] [Lamsweerde 2001] [Anwer 2006] [Lamsweerde 2004] [Chung 2000] used in our

29
ISBN: 978-972-8924-89-8 © 2009 IADIS

research. The following two subsections address the specific activities to formalize and model compiled
interview results looking for the desired strategic alignment.
2.3.1 Goal and Business Modeling
In this step, we started from the compiled interview results after the Delphi method application and
extrapolated E-Business and IT strategies to goal modeling.
As a result of the compiled information obtained from steps 2.1 and 2.2, we established that the main
business goal is to increase profits through the growth of its user base (cloud in Figure 1). Because
ebooks2go.ws revenue comes from the advertisement it shows, the main concerns according to interviewing
results are increasing on-line ad number is related to clicks on ads by visiting users, the time of those users
spent on searching for e-books and e-zines, and the site registered user base increment, as shown at the
second level in Figure 1.
An important E-Business gauge is the report from content provider businesses, which includes important
data about the origin of a downloading, service level agreement (SLA) satisfaction and current content
indexing levels of the site.
After these steps, we have our goal models, as in Figure 1 with E-Business strategy and in Figure 2 with
IT strategy. These models show relationships, dependencies and refinements of E-Business and IT objectives,
using one of the prominent goal modeling methodologies [Lamsweerde 2001, 2004].

Increase profits

+
Increase
pay-per-click ads
+ +
Increase clicks
on ads
+ +
+
Increase registered Increase permanence
Increase visits
users time

Info update Increase quality Get higher site


customization and Amount of visibility
indexed materials
Fig. 1. E-Business Strategy

In Figure 2 we can see some of the identified IT goals, most of them with a cause-effect relation with E-
Business goals, and also important technology-related goals such as: Automatic Customer Service and
Efficient and effective indexing mechanism, both at the second level in Figure 2, which assure the
appropriateness of the IT infrastructure to properly achieve high level strategic goals.

30
IADIS International Conference e-Commerce 2009

E-Business
support

+
+

Automatic Efficient and effective


Customer Service indexing mechanism

Search engine
optimization
Secure authentication
mechanism
Content provider
Bulletin subscription
Powering IT booking
mechanism
capacities

Fig. 2. IT Strategy

2.3.2 Aligning by Comparison


After obtaining the goal models, we establish a comparison between the identifiable elements in order to
build the strategic alignment model (SAM). This stage is largely based on the modeler´s skills and expertise,
using the reviewed technical literature and our own experience, and some best practices recommended. This
stage establishes semantic relations between all pairs of elements (E-Business element, IT element), while
classifying relationships according to Venkatraman´s perspectives taxonomy and determining cause-effect
relations where you can easily find orientation by examining element precedence in the compiled results of
the interviewing process.
Table 1. Comparison of the E-Business/IT Strategies

IT Element Orientation Business Element


a E-Business support ← Increase profits
b Automatic customer service → Increase registered users
c Efficient and effective indexing mechanism → Increase permanence time
d Efficient and effective indexing mechanism → Increase visits

At this moment the Strategic Alignment Model can be implemented. Three types of alignments are
identified according to Venkatraman´s perspectives taxonomy:
a) The main soft-goal of Increase profits will demand constant support from IT managers, developers and
technologies.
b) The creation of an Automatic customer service defines a publish/subscribe customer relationship
management (CRM) style, incrementing the possibility of the creation of a faithful users base.
c, d) An efficient and effective indexing mechanism permeates all systems but specifically help to
increase user permanence time and visits, improving E-Business services without big E-Business strategy
changes.
From Table 1, we derive a Henderson & Venkatraman´s model, as shown in figure 3.

31
ISBN: 978-972-8924-89-8 © 2009 IADIS

a
b

Business Strategy IT Strategy


c, d

Business Infraestructure IT Infraestructure


Fig. 3. Strategic Alignment Model

2.4 Step 4 – Quality Function Deployment


From the previous step, we obtained the strategic E-Business and IT alignment. To further increase the
quality of this process and results, we apply QFD. This is a tool to implement quality improvement processes
in heterogeneous production and services environments. We used it to establish priorities in investment
decisions.
We take the House of Quality matrix (HoQ) to relate E-Business goals with the necessary IT elements.
Then an initial weight is assigned to each E-Business and IT element, where weights are obtained from the
compiled information from informants, in steps 2.1 and 2.2 [Becker 2008] [Jayaswal 2006] [Denney 2005].
The same process is repeated to assign weights and initial priorities to HoQ, as well as relation levels
between E-Business elements and IT elements, usually between 0 and 9. The first HoQ is in Figure 4. To
adjust priorities we calculate new adjusted priorities using the formula:
Adjusted Priority = E-Business Goal Initial Priority * IT Element Initial Priority * ∑ Perceived Weights
This is a columnar calculus and, for every column, we obtain real investment priority for IT elements and
actions in order to better fulfill E-Business goals and increase return on investment (ROI).

IT Elements(actions)
Initial priority

Efficient and

mechanism
Automatic
Customer

Indexing
effective
Service

Initial priority 35 50
E-Business

Increase registered users 5 9 3


Goals

Increase permanence time 4,5 1 3


Increase visits 8 3 9
Adjusted priority 2572,5 5025

Fig 4. House of Quality

The same process is applied in a second HoQ to relate tactical E-Business goals with problem causes, and
in a third HoQ to relate tactical E-Business goals and the IT process areas attained from a level 2 Capability
Maturity Model Integration (CMMI) process.

32
IADIS International Conference e-Commerce 2009

As a result of these calculations and adjustments, we obtained important numbers, for example, in Figure
4, in the first column of numbers: 5, 4.5 and 8 are the weights indicating initial priorities of E-Business goals
for business managers, end users and stakeholders (directly from the interviewing process); and in the first
row of numbers: 35 and 50 are the initial priorities of IT actions or elements according to IT managers
replies. Numbers in the center of the matrix: 9, 1, 3, 3, 3, 9 express the expected cause-effect relation
between IT actions and E-Business goals as shown in Table 1. Finally, in the last row, we attained the results
of the application of the preceding formula expressing the adjusted priorities for IT actions. From this step of
our method ,some improvements related to prioritization are obtained:
1. Best accuracy in IT actions priorities.
2. Secure a better ROI according to main E-Business goals.
3. Prioritize some processes and IT process areas.

3. CONCLUSION
In this paper, we described a four-step, interview-based method, using simple yet useful techniques and
procedures, while deploying some best practices. This method is intended to help with aligning high level
business concerns with IT strategic concerns, utilizing goal modeling refinement and comparison.
The application of this method is intended to consolidate more accurate and useful information, through
the strategic E-Business and IT alignment, and to reduce the interviewing process subjectivity, through goal
modeling and SAM visual formalisms. Additionally, we obtained a sketch of prioritization for IT elements
and actions in order to increase ROI and to fulfill E-Business goals and end user needs. The visual definition
of the method as a whole using Unified Modeling Language (UML) activity diagrams has been already built,
although not described in the paper due to space limitations.
Future work includes assessing, and improving, the effectiveness of the interviews, in relation to other
elicitation techniques, in particular goal-oriented techniques. Another line of future research concerns a more
systematic application of the Delphi method. More studies for other contexts, as well as for widespread and
complex examples, are also to be undertaken.

ACKNOWLEDGEMENT
This work has been done thanks to cooperation of the Ministry of Foreign Affairs of Spain (AECID) and project
TIN2008-05995/TSI of the Ministry of Education and Science of Spain.

REFERENCES
Afuah, A. and Tucci, C.L., 2003. Internet Business Models and Strategies Second Edition. McGraw Hill, New York, NY.
Al-Hakim, L. and Memmola, M. (eds.), 2009. Business Web Strategy: Design, Alignment, and Application. Information
Science Reference, Hershey, PA.
Anwer, S. and Ikram, N., 2006. Goal Oriented Requirement Engineering: A Critical Study of Techniques. XIII Asia
Pacific Software Engineering Conference (APSEC'06). IEEE Computer Society, Bangalore, India, pp. 121-130.
Baina, S. et al, 2008. Petit, M., Castiaux, A.: Strategic Business/IT Alignment using Goal Models. In: Johannesson, P.
(ed.): Third International Workshop on Business/IT Alignment and Interoperability, BUSITAL'08, Vol. 336. CEUR-
WS.org, Montpellier, France, pp. 31-43.
Becker, A.L. et al, 2008. Strategic Alignment of Software Process Improvement Programs Using QFD. BIPI’08. ACM,
Leipzig, Germany, pp. 9-13.
Bleistein, S.J. et al, 2004. Strategy-Oriented Alignment in Requirements Engineering: Linking Business Strategy to
Requirements of E-Business Systems using the SOARE Approach. Journal of Research and Practice in Information
Technology, Vol. 36, No. 4, pp. 259-276.
Carrizo, D. et al, 2008. Study of Elicitation Techniques Adequacy. 11th Workshop on Requirement Engineering,
Barcelona, Spain, pp. 104-114.

33
ISBN: 978-972-8924-89-8 © 2009 IADIS

Chung, L. et al, 2000. Non-functional requirements in Software Engineering. Kluwer Academic Publishers, Norwell,
MA.
Denney, R., 2005. Succeeding with Use Cases Working Smart to Deliver Quality. Addison Wesley Professional, Upper
Saddle River, NJ.
Esposito, J.L., 2002. A Framework Relating Questionnaire Design and Evaluation Processes to Sources of Measurement
Error. International Conference on Questionnaire Development, Evaluation, and Testing Methods, Charleston, SC.
Frary, R.B., 1996. A Brief Guide to Questionnaire Development. ERICAE Clearinghouse on Assessment and Evaluation,
Washington, DC.
Henderson, J.C., Venkatraman, N., 1999. Strategic Alignment: Leveraging Information Technology for Transforming
Organizations. IBM Systems Journal, Vol. 38, No. 2, pp. 472-484.
Hsu, C.-C. and Sandford, B.A., 2007. The Delphi Technique: Making Sense Of Consensus. Practical Assessment,
Research & Evaluation, Vol. 12, No. 10, pp. 1-8.
Jayaswal, B.K. and Patton, P.C., 2006. Design for Trustworthy Software: Tools, Techniques, and Methodology of
Developing Robust Software. Prentice Hall, Upper Saddle River, NJ.
Lamsweerde, A.v., 2001. Goal-Oriented Requirements Engineering: A Guided Tour. 5th IEEE International Symposium
on Requirements Engineering. Toronto, Canada, pp. 249-263.
Lamsweerde, A.v., 2004. Goal-Oriented Requirements Engineering: A Roundtrip from Research to Practice. 12th IEEE
International Requirements Engineering Conference. Kyoto, Japan, pp. 4-7.
Linstone, H.A., Turoff, M., 2002. The Delphi Method Techniques and Applications. Addison Wesley, Reading, MA.
Paul, C.L., 2008. A Modified Delphi Approach to a New Card Sorting Methodology. Journal of Usability Studies, Vol. 4,
No. 1, pp. 7-30.
Pierre, H. et al, 2008. A Method to Support the Alignment of Business Models and Goal models. In: Johannesson, P.
(ed.): Third International Workshop on Business/IT Alignment and Interoperability, BUSITAL'08, Vol. 336.
Montpellier, France, pp. 120-134.
Rappa, M.A., 2004. The utility business model and the future of computing services. IBM Systems Journal, Vol. 43, No.
1, pp. 32-42.
Rayens, M.K. and Hahn, E.J., 2000: Building Consensus Using the Policy Delphi Method. Policy, Politics, & Nursing
Practice, Vol. 1, No. 4, pp. 308-315.
Weill, P. and Vitale, M.R., 2001: Place to Space: Migrating to Ebusiness Models. Harvard Business School Press,
Boston, MA.
Yousuf, M.I., 2007: Using Experts’ Opinions Through Delphi Technique. Practical Assessment, Research & Evaluation,
Vol. 12, No. 4, pp. 1-8.

34
IADIS International Conference e-Commerce 2009

ECUSTOMS CASE STUDY: MECHANISMS BEHIND CO-


OPERATION PLANNING

María Laura Ponisio1, Pascal van Eck1, Lourens Riemens2


1
Department of Computer Science, University of Twente
P.O. Box 217, 7500 AE Enschede, The Netherlands

2
Dutch Tax and Customs Administration
Apeldoorn, The Netherlands

ABSTRACT
Members of existing e-commerce trading networks constantly assess their network to identify opportunities for increased
co-operation and integration of e-commerce IT systems. Failing to identify the mechanisms involved in co-operation
compromises correct investment decisions. In this paper, we use Systems Thinking as a reasoning model that helps deci-
sion makers to uncover such mechanisms. We use Systems Thinking to analyse a real-world case called eCustoms, an
inter-organisational network of customs organisations. The resulting model explains the mechanism of planning co-
operation in terms of a feedback loop that comprises political support, operational potential, and information flow. This
mechanism also explains why it is important to select potential partners for closer co-operation as early as possible, the
importance of willingness to participate, and the gain or loss of decision power that joining a network implies.

KEYWORDS
Systems Thinking, Systems Dynamics, Inter-organisational networks, management practices.

1. INTRODUCTION
Business-to-business e-commerce is supported by inter-organisational networks. These networks consist of
information technology (IT) systems that support co-operation between trading partners, for instance in long-
term strategic supply partnerships. Therefore, in e-commerce, understanding how co-operation works is es-
sential to make correct investment decisions.
Members of an established trading network constantly assess their network to identify partners with
whom to increase co-operation, for instance to further integrate their e-commerce systems. Part of the prob-
lem is to identify other members that may be interested in closer co-operation early in the network formation
process. There are several challenges in planning this co-operation process (Ponisio, Sikkel, Riemens and van
Eck, 2007, 2008): possibilities for opportunistic behaviour (Williamson, 1993) have to be mitigated, potential
partners must be assessed considering multiple perspectives, attention has to be paid to distribution of power
in the network, the IT development process has to be planned, and sustainable gains have to be measured.
The importance of such challenges is illustrated for instance in the well-known case of Covisint (Gerst and
Bunduchi, 2005, 2007), where sub-optimal attention for power issues resulted in near-total failure. However,
current systems development theories in e-commerce insufficiently address these challenges. An undesired
consequence is that in practice, co-operation planning is done ad-hoc.
Decision makers, therefore, ask for techniques that help them to uncover the mechanisms that determine
successful co-operation. Uncovering such mechanisms should help experts to understand the forces and ten-
sions involved, which should improve planning co-operation. For instance, which network partners to choose
for further integration, on which topic to co-operate, and which additional systems to integrate first with ex-
isting partners?
This paper presents a study of eCustoms (Section 3): a real-world case of an established inter-
organisational network in which customs organisations of the European Union (EU) co-operate electronically
to improve ensuring safety of the EU external borders, and to facilitate trade. Members states of the EU form

35
ISBN: 978-972-8924-89-8 © 2009 IADIS

bilateral or multilateral relations within the boundaries of this network in which IT systems are integrated.
All these relations together shape the eCustoms network. Each relation is constantly evolving, having their
supporting IT systems (and their architectures) evolving too.
In this paper, we use Systems Thinking (Section 2) as a reasoning tool to explain the mechanisms behind
co-operation planning. In particular, we are interested in uncovering the mechanisms that influence the
choice of partners for intensified co-operation. Systems Thinking is a holistic problem solving method in
which system behaviour emerges from the interaction of system components. Recent research proved the
potential of using the Systems Thinking approach to explain mechanisms behind IT outsourcing projects (van
Eck and Ponisio, 2008). This paper extends our earlier studies of electronic customs (Ponisio, Sikkel, Rie-
mens and van Eck, 2007, 2008; Ponisio, van Eck and Riemens, 2008).
Being able to reason in terms of such dynamics helps project managers to plan co-operation in inter-
organisational networks. The contribution of this paper is a Systems Thinking model that enabled us to iden-
tify causal loops in the mechanisms that play a role in co-operation planning (Section 4). We show how ap-
plying Systems Thinking helps the e-commerce network stakeholders to explain the rationale behind plan-
ning co-operation in inter-organisational networks. A better understanding of the dynamics enables decision
makers to avoid surprises and instead predict the consequences of the planning actions they take. For in-
stance, the Systems Thinking approach uncovered the need to anticipate exit strategies by adding an exit
clause to the contract.
In the case study, our findings indicate the importance of willingness (supported by, e.g., matching goals
and matching needs), the importance of entering (or leaving) the co-operation network early, and that joining
a closely co-operating group has – in addition to the benefits of working as a group – the potential to, in prac-
tice, lose decision power (because participants need to account for others in their decisions). We explain this
using a concrete example of partner selection in eCustoms. We validate our findings via interviews with ex-
perts and conclude by presenting implications for research and practice.

2. SYSTEMS THINKING: BACKGROUND


Systems Thinking (Midgley, 2003) analyses a system by modelling the relations between the components of
the system and studying the behaviour that is jointly created by the interactions between these components.
This creates a holistic view of the problem that helps to identify the dynamics of the system that results from
interactions between its components. These dynamics would remain hidden in an analytic approach in which
system components are studied in isolation.
In previous work (van Eck and Ponisio, 2008), we have applied Systems Thinking in the domain of IT
outsourcing projects. In that work, we observed that project outcome is not determined at a single moment in
time only, e.g., at the end of the project, but by a process consisting of multiple interactions with members of
the customer organization during the entire project. We developed a causal model (Figure 1) that explains the
dynamics of project outcome. Outsourcing creates a relation between two economically independent actors
(the outsourcer and the insourcer). The fact that the two actors are economically independent creates forces
and tensions between them that in turn influence delivery quality as depicted in the model (words in italics
refer to variables in Figure 1). During the project, both employ information flows to coordinate their activi-
ties. This information exchange, however, is influenced by the trust that they have in each other, which in
turn is influenced by the perception of the outsourcer of the extent to which the insourcer is capable of deliv-
ery. As both actors are economically independent, we have to assume that each is self-interested and not un-
willing to act in a way that advances its own interest in a way that is detrimental to the other (possibilities for
opportunistic behaviour).
The dynamic model shows that in outsourcing, there are at least two positive, or reinforcing, feedback
loops which explains why outsourcing projects have a tendency to get out of control: for instance, if trust
erodes, parties become less open in their communication, which affects delivery, which in turn further erodes
trust, and so on. Of course, the feedback loop can also work in the opposite direction: if trust increases (for
instance, by decreasing opportunism), eventually delivery quality will increase, which in turn increases trust
further. The point is that the feedback loops make the dynamic aspects of the project explicit. This is the pri-
mary benefit of applying the Systems Thinking perspective.

36
IADIS International Conference e-Commerce 2009

The model depicted in Figure 1 follows the so-called qualitative Systems Dynamics paradigm (Ster-
man, 2000). Like all Systems Thinking paradigms, Systems Dynamics models a system as the interplay be-
tween its parts (holism). Systems Dynamics (pioneered by Forrester (1989) and rooted in general mathemati-
cal systems theory) focuses on modelling feedback loops consisting of cause-and-effect relations between
system components. In qualitative Systems Dynamics, this model is then validated via expert review. In
quantitative Systems Dynamics, computer simulations are used to study system dynamics and validate the
model. Systems Dynamics primarily deals with quantitative models, but as early as 1983 qualitative ap-
proaches have been proposed (Wolstenholme and Coyle, 1983; Wolstenholme, 1983).

Figure 1. Operational Success of Outsourcing: Causal Model (van Eck and Ponisio, 2008). A ‘+’ Indicates that an In-
crease in One Variable Causes an Increase in the Other. A ‘-’ Indicates that an Increase in One Variable Causes a De-
crease in the Other. Two ‘Reinforcing’ (Letter ‘R’) Feedback Loops are Indicated
Both quantitative as well as qualitative Systems Dynamics are what Pollack (2007) calls ‘hard’ ap-
proaches to systems thinking: the systems model is seen as an objective, true representation of the real world,
and stakeholders agree on a “clear and single dimensional (single objective)” problem definition (Maani and
Cavana, 2000). In ‘soft’ approaches (of which Peter Checkland’s Soft Systems Methodology (Checkland,
1981) is probably the best-known example), the dynamic model is not seen as an objective representation of
the real world, but as “a way of generating debate and insight about the real world” (Maani and Cavana,
2000). A ‘soft’ approach has been used by Johnstone et al. (2006) to develop a holistic framework of conflict
and conflict resolution in IT projects.

3. PLANNING CO-OPERATION IN INTER-ORGANISATIONAL


NETWORKS
In this paper we use Systems Thinking to understand inter-organisational networks. In particular, to plan
closer co-operation among members of an established inter-organisational network: one formed by customs
organisations of the EU. Specifically, network participants need to connect their supporting information sys-
tems to improve information flow and to efficiently automatise security checks and paperwork through their
borders. Part of the problem is to find ways to help experts (a) find other members that might be interested to
co-operate and (b) learn on what topic it is better to collaborate.

37
ISBN: 978-972-8924-89-8 © 2009 IADIS

3.1 Defining Inter-Organisational Networks


We define an inter-organisational network as a network of organisations which jointly support value-creating
processes (Ponisio, Sikkel, Riemens and van Eck, 2007, 2008). Information flows between the participating
organisations. The goal of the network is some result of that flow of information.
Each organisation in the network uses a set of information systems (i.e., computer hardware, application
software, datasets and possibly manual procedures) to process the information flows mentioned. This set of
information systems (the IT portfolio of the organisation) includes both organisation-specific information
systems as well as general IT infrastructure components (e.g., email servers).

3.2 eCustoms: an Example of an Inter-organisational Network


eCustoms is a representative example of an inter-organisational network as defined in this paper. eCustoms is
a network of customs organisations of the 27 member states of the European Union (EU). The network was
created in reply to the EU’s aim to facilitate trade and improve ensuring safety of the external borders of the
union. Customs organisations of all 27 member states of the European Union have to act as if they form one
virtual customs. The network has been in place for many years, but new demands make it necessary for
members to co-operate in order to fulfil these demands.

3.3 Existing Approaches to Plan eCustoms


The Dutch Tax and Customs Administration conducted between January 2005 and October 2005 a study that
compared current organisational context, business processes, systems and future ambitions of ten member
states (Netherlands Tax and Customs Administration, 2005). This sample of ten member states is a good one
for this paper because it is heterogeneous, representing both large and small countries. This study – called
“Benchmarking Customs IT Architecture” – showed the customs networking profiles of each country, pro-
viding high-quality data suited to analyse opportunities for co-operation. In fact, this study solved the prob-
lem of lack of information required to find opportunities for co-operation.
We have read the benchmarking report and used its data as one of the sources of our data collection. The
benchmarking study performed by the Dutch Tax and Customs Administration provided a wealth of quantita-
tive data about potential co-operation partners, the analysis of ‘with whom to co-operate’ was performed on
an ad hoc basis. To facilitate understanding, in an earlier paper we developed an approach that combines two
types of graphical snapshots of the member customs’ relevant properties (Ponisio, Sikkel, Riemens and van
Eck, 2008). The result was a visualisation model based on quantitative data that increased understanding of
opportunities and challenges in IT integration.
A further attempt to optimise planning in eCustoms consisted of using critical problem solving (Ponisio,
van Eck and Riemens, 2008). The goal was to present a systematic approach to plan co-operation between
customs organisations and the approach was called e-Planning. It consisted in an action plan for customs IT
decision makers to decide how to order the steps in the process. e-Planning follows the engineering cycle
(Wieringa, 2007) to discover questions that are relevant in a particular scenario. e-planning provided an ap-
proach to systematically detect significant co-operation issues, but did not uncover the mechanisms that help
decision makers explain the rationale behind their decisions.

3.4 Our Approach: Using Systems Thinking to Extend the Benchmarking


Study
The previous approaches to improve planning in eCustoms offered solutions to the problem in terms of
measuring, visualising and planning, but did not uncover the dynamic mechanisms that explain why some
partners are preferred over others. To mitigate this, in this paper we use Systems Thinking to emphasise the
dynamics existing in developing inter-organisational networks. This means that we view the eCustoms net-
work as a system, consisting of a number of member states of the EU, their internal organisation, decision
making procedures, and supporting information systems. These are the components that interact to create the
overall behaviour of the system. In the Systems Thinking approach, we identify properties of these compo-

38
IADIS International Conference e-Commerce 2009

nents as well as relations between these properties. To the best of our understanding our approach is novel: to
use Systems Thinking to planning co-operation in inter-organisational networks (specifically in eCustoms)
has never been tried before.
Specifically, in this paper we use an interpretive case study approach (Klein and Myers, 1999) guided by
Systems Thinking. We interpreted the data provided by the benchmarking case study, other documents and
interviews with customs experts in terms of the dynamic model presented in Figure 1. We studied the out-
come of the benchmarking case study and the other studies looking for similar feedback loops as depicted in
the dynamic model, addressing the following two questions:
1. Which data present in the eCustoms case study are causally related to co-operation success potential?
This data represents the properties of the underlying system that are of interest. The value of these properties
are represented by variables that potentially are part of any feedback loops.
2. What exactly are the causal relations between the variables that we thus uncover?
The next section gives an account of how we applied the Systems Thinking view in eCustoms to answer
these questions.

4. A CAUSAL MODEL OF PLANNING CO-ORDINATION IN ECUSTOMS


In the case study, we applied Systems Thinking to the data collected (e.g., the data provided by “Benchmark-
ing Customs IT Architecture” and the interviews with experts). We reasoned about co-operation planning in
a systematic way: we re-interpreted the general causal model (Figure 1) for outsourcing in the context of the
eCustoms case study.
From this analysis we selected variables to include in the systems thinking model. A variable is included
in the model if (i) the variable is involved in an important causal relation and (ii) the variable can be con-
trolled by project managers in real-world situations. The resulting variables and relations together form the
eCustoms dynamic model. This model may contain one or more feedback loops, but these feedback loops
need not be the same ones as depicted in Figure 1. To the contrary, as the model of Figure 1 is for a situation
(software development in outsourcing) that is not the same as in eCustoms, most likely the dynamic model
for eCustoms will not be exactly the same. However, the kind of mechanism depicted by the model for out-
sourcing served as a blueprint for the kind of mechanism that we wanted to uncover in the eCustoms case.
The resulting causal model is depicted in Figure 2. The model represents the properties of a potential co-
operation between two countries in the eCustoms network. These properties are used to analyse the benefits
of co-operation. The properties are case dependent; they are the variables that we derived from documents
describing a specific co-operation planning case.
In line with Systems Thinking, we view this co-operation as a system. Components of this system are the
two participating countries, their goals and needs, their IT systems and data exchange infrastructure, etc.
These components have properties that are represented in the model. In the interest of readability, our dia-
grams have clusters and global arrows. A cluster groups related variables. Our shorthand for having an arrow
to or from all the variables in a cluster is to have one arrow to the cluster of variables.
The next subsections systematically describe the variables in the model as well as the relations between
them. We conclude by explaining concrete examples in terms of the feedback loops in the model.

39
ISBN: 978-972-8924-89-8 © 2009 IADIS

Figure 2. Systems Thinking Model to Reason about Opportunities and Potential Problems in Planning Co-Operation
within the Ecustoms Network

4.1 Cluster 1: Political Support


Cluster 1, called ‘Political Support’, consists of three variables that are roughly equivalent to two variables in
the general outsourcing model (Figure 1) ‘Trust of O in I’ (top) and ‘Trust of I in O’ (centre).
• Matching goals: extent to which the goals in the area of the co-operation topic of the two countries
match.
• Matching needs: extent to which the needs in the area of the co-operation topic of the two countries are
matching (e.g., similar, or complementary)
• Image to the world: the extent to which the two countries are able to expose a modern image to the
world that shows that they are oriented toward supporting co-operation.
These variables are dimensions of the extent to which and decision makers at the political level of the two
potential trading partners provide support for the co-operation in terms of allocating resources. They can be
interpreted as the ‘willingness’ to co-operate. Thus, political support is broader than just trust.

4.2 Cluster 2: Information Flow


Cluster 2, called ‘Information Flow’, consists of two variables that play a similar role in eCustoms as ‘deliv-
ery quality perceived by O’ (far right hand side of Figure 1) and ‘Effective coordination’ (just left of ‘deliv-
ery quality perceived by O’) in the general outsourcing model. In the eCustoms case study, we focus on qual-
ity of information exchange, not on the more general concept of an outsourcer’s perception of project out-
come (quality delivered by the insourcer). Therefore, the variables in this cluster in the eCustoms case are
more specific:
• Member dependence: extent to which the two customs organisations depend on one another (e.g., re-
sponsibilities of one are impossible to fulfil without information from the other).
• Peer2peer link quality: quality of the information exchange between the two partners.

40
IADIS International Conference e-Commerce 2009

An increase in member dependence and/or link quality causes an increase in political support: increased
dependence and link quality represent an investment (sunk cost) that partners want to protect and exploit,
which is reflected in matching needs and goals.

4.3 Cluster 3: Operational Potential


Cluster 3, called ‘Operational Potential’, contains the remaining six variables of the model that together de-
scribe the extent to which necessary assets and procedures are in place at both partners to support close co-
operation.
• Logistics maturity: Countries differ in how advanced logistics (e.g., transport of goods and import and
export procedures) are. This variable represents the difference of logistic maturity of two potential partners.
• Architectural knowledge: The difference of architectural knowledge that each country has of its own
systems.
• Stakeholder commitment: difference in degree of commitment of the stakeholders of each of the two
countries to make the link. The stakeholders are the ones mentioned in Ponisio, van Eck and Riemens (2008),
i.e., architects, etc.
• Stakeholder understanding: difference of the extent of stakeholder understanding of the issues of the
system in the other country.
• Matching architectures: difference in the extent to which the relevant parts of the IT architecture of
each of the two countries is standardised. The potential to match two architectures of the supporting systems
of two peer countries (this is at operational level).
• Data transfer safety: difference in the extent to which each of the two trading partners ensures safe data
transfer and processing.
All six variables in this cluster are what we call ‘delta variables’: they represent the difference in quanti-
ties of the two potential trading partners, not the quantities for either of them. For all six variables, it holds
that an increase in any variable of political support causes a decrease in these differences: the extra resources
allocated to the co-operation are used to further standardise IT architectures, implement data security mecha-
nisms, make each potential partner more committed, etc. Moreover, a decrease in this difference causes more
and better information flow.

4.4 Examples of Feedback Loops

4.4.1 Dynamics of Political Support


As can be seen in Figure 2, the model explains the dynamics of co-operation planning in terms of one balanc-
ing feedback loop that comprises all variables in the model. In summary, a decrease in the difference of two
countries in terms of operational potential (as represented by the six variables in the cluster with that name)
causes better information flow between the partners, which causes an increase in political support. This in-
crease in political support, in turn, decreases the differences between the two countries (additional opera-
tional potential), which closes the loop. This process can continue until the delta variables of cluster Opera-
tional Potential balance close to zero. Or, if there is an unsolvable mismatch, customs can choose not to co-
operate. Making this kind of reasoning early in the planning process is crucial to correct investment decisions
because once the co-operation process started and the contracts are signed, it is difficult to leave and to enter
the co-operating group.
4.4.2 Example of Late Join-or-quit Feedback Loop
As an example of how this feedback loop operates in practice, The Netherlands customs actually did a co-
operation with 4 member states on the support and maintenance of NCTS, a software program used to sup-
port Transit movements of goods within Europe. Transit movement information systems of individual mem-
ber states have to comply with the specification of NCTS, but member states are free to choose an implemen-
tation. Initially, the Commission provided and supported an implementation of NCTS. About 7 member
states (including The Netherlands) used this implementation. In 2007, the Commission announced that they
would stop the support of this implementation and member states had to take over.

41
ISBN: 978-972-8924-89-8 © 2009 IADIS

Having, thus, a matching need, namely, to support their NCTS system at reduced cost, five member states
(including The Netherlands) started a joint project to select a common supplier for the support and mainte-
nance. One member state decided not to continue with the others. The remaining participants decided to
make one Request for Proposal to select one common supplier. This was possible because political support
and operational potential of this group of four member states was high: they wanted to save cost and there
was little difference in architecture, knowledge of each other, etc. After the contract was granted, the four
member states started a joint Change Board to discuss changes and future needs with the supplier (informa-
tion flow). At the end, they replaced the European Commission as a supplier with a commercial vendor. In
the contract, they now have more influence on changes than before. The four co-operating member states
now have an interest in continuing their co-operation (matching goals), which closes the feedback loop.
4.4.3 Lessons Learnt
The dynamics can be explained in terms of the topic of co-operation, the properties of member states that are
interested and that actually participate, and the way participants work together over time.
The feedback loop in this example suggest the importance of matching goals and needs in the area of
the topic of co-operation: if there is not enough benefit in the co-operation (because of the member states
properties are changing so there is no match anymore in goals, needs, etc.) a member state can decide not to
participate. The example tells us that it is easy to step out in the beginning. Stepping out after the contracts
have been signed (exit strategy) has contractual implications, as the contract had exit clauses. In our example,
one member could exit easily because the contract included a clause to help in that event. One possible ex-
planation is that the member could have experienced a loss of decision power, because the decisions on a
member’s system are constrained by the needs of the group. In our example, participating customs had to
agree with others. Similar to leaving a co-operation, it is easier to join in the beginning than after the co-
operation has been established, as e.g., important decisions have already been made by other members. In the
case of the NCTS example, no member state joined the initial group of four after the contract had been
granted.

4.5 Results
The results suggest the usefulness of Systems Thinking to plan co-operation in inter-organisational networks.
They suggest that Systems Thinking could help decision makers to improve success in finding good partners
for closer co-operation, making the search more systematic and serving as a reasoning tool to analyse the
underlying mechanisms.
The results were discussed with customs experts. The experts found that our approach has potential to
help them explain decisions related to choosing the best partner for co-operation. Moreover, according to the
experts, applying Systems Thinking (i.e., our approach) can potentially optimise the process of finding good
partners for closer co-operation because it systematises the search; which is beneficial compared to the cur-
rent ad-hoc analysis of with whom to co operate). Furthermore, our approach facilitates reasoning about po-
tential consequences of choosing a given partner early in the process; which happens to be crucial in eCus-
toms.
Regarding internal validity, according to the experts, the method led to the right conclusions (though they
would have thought of other variables); which means that the internal validity criterion is met. Our example
shows how System Thinking helps stakeholders to reason about the situation and explain the rationale behind
decisions. In particular, our model (Figure 2) revealed a feedback loop that (we found later) matched an ac-
tual example that occurred in eCustoms.
Moreover, applying Systems Thinking to the problem of ‘what should be done first’ in planning co-
operation in an inter-organisational network could be generalised to other cases. In fact, the experts could
relate to our findings and expressed that our approach helps them in their need to explore new theories that
can be used as basis for reasoning, and that foster systematic solutions. Thus, external validity is met.
With respect to existing theory, our results are in-line with existing work in the area of co-operation in in-
ter-organisational networks (Finnegan et al., 2001). Specifically, our results concur with the insights of Fin-
negan et al.: (a) “Inter-organisational systems are based more on the strategies of individual organisations
rather than on a network strategy”, and (b) “Planning is a continuous decision activity shared by business and
IT”. Moreover, our method remains consistent with previous work in the area of power relationships in net-

42
IADIS International Conference e-Commerce 2009

works (Emerson, 1962). In particular, our approach reveals power dependence relations. For instance, the
concrete real-life example we present shows that participants ended having more influence on the changes (to
their common system) than before.
In addition to being in-line with existing research, our approach goes a step further than just explanation
by providing a holistic solution to a concrete and complex problem.
4.5.1 Future Work
Possible extensions to the model include adding more variables. The literature of eCustoms provides numer-
ous suggestions; see (Netherlands Tax and Customs Administration, 2005) for qualitative and quantitative
data supporting reasoning about potential clusters in eCustoms. In this line of reasoning, candidate properties
are organisational autonomy, properties of the current IT architecture portfolio and transaction volumes.
Another type of extension is related to our definition of success: our model focuses on operational success
in the event of making two customs’ systems co-operate (short term). However, collaboration success is re-
lated to the way network participants work together not only in the short-term, but also in the long run.
Whether it is possible to extend the model with consideration to explicit evolution is a topic for future re-
search.
In a different line of reasoning, the validation of our approach suggests a new path for future research.
Specifically, systems thinking does not provide a systematic way to find the variables of a dynamic model.
Textbooks on systems thinking only advise to organise a brainstorming session with subject matter experts.
A possible direction for future work is to investigate whether automatic techniques empowered by visualisa-
tion prove to be efficacious to discover the variables.

5. CONCLUSION
In this paper, we applied a Systems Thinking approach to study the problem of selecting partners for closer
co-operation in e-commerce. We uncovered a feedback loop that explains how an increase in political sup-
port for a potential partner (thanks to e.g., matching needs and goals) causes (via the creation of more opera-
tional potential) an increase in information flow, which in itself increases political support. The feedback
loop can also operate in a downward way: a decrease in operational potential causes (via a decrease in infor-
mation flow) a decrease in political support, which in turn further decreases operational potential.
The results suggest the usefulness of Systems Thinking to plan co-operation in inter-organisational net-
works. The mechanism uncovered was confirmed by experts and by a concrete example. The practical impli-
cation of uncovering this mechanism is that it enables stakeholders to improve the partner selection process,
supporting understanding of the forces and tensions that govern partner selection. The mechanism also ex-
plains why it is important to select potential partners for closer co-operation as early as possible, the impor-
tance of willingness to participate, and the gain or loss of decision power that joining a network implies.

ACKNOWLEDGMENTS
We gratefully acknowledge the financial support of the Netherlands Organisation for Scientific Research
(Dutch Jacquard program) for the project 638.004.609 (QuadRead).

REFERENCES
Checkland, P. (1981), Systems Thinking, Systems Practice, John Wiley & Sons Ltd.
Emerson, R. M. (1962), “Power-dependence relations”, American Sociological Review, Vol. 27, pp. 31–41.
Finnegan, P., Galliers, R. D. and Powell, P. (2001), “Operationalising guidelines for inter-organisational systems planing:
Exploring a learning model [research in progress]”, in 9th European Conference on Information Systems, Bled, Slo-
venia, June 27-29.

43
ISBN: 978-972-8924-89-8 © 2009 IADIS

Forrester, J. W. (1989), The beginning of system dynamics, Working paper D-4165-1,


http://sysdyn.clexchange.org/sdep/papers/D-4165-1.pdf Sloan School of Management, Massachusetts Institute of
Technology.
Gerst, M. and Bunduchi, R. (2005), “Shaping IT standardization in the automotive industry – the role of power in driving
portal standardization”, Electronic Markets, Vol. 15 No. 4, pp. 335–343.
Gerst, M. and Bunduchi, R. (2007), “Intraorganisational power and the adoption of interorganisational IT innovations:
the inside story of Covisint”, International Journal of Technology Intelligence and Planning, Vol. 3 No. 1, pp. 57–74.
Johnstone, D., Huff, S. and Hope, B. (2006), “IT projects: Conflict, governance, and systems thinking”, in Proc. 39th
Annual Hawaii International Conference on System Sciences HICSS ’06, Vol. 8, pp. 197b–197b. DOI:
10.1109/HICSS.2006.235
Klein, H. K. and Myers, M. D. (1999), “A set of principles for conducting and evaluating interpretive field studies in
information systems”, MIS Quarterly, Vol. 23 No. 1, pp. 67–93.
Maani, K. E. and Cavana, R. Y. (2000), Systems Thinking and Modelling: Understanding Change and Complexity, Pren-
tice Hall, Auckland, New Zealand. http://books.google.com/books?id=IF-YAAAACAAJ
Midgley, G. editor (2003), Systems Thinking, SAGE,. http://books.google.com/books?id=nCp7HQAACAAJ
Netherlands Tax and Customs Administration (2005), “Benchmarking customs IT architecture. exploit commonality,
manage variability”.
Pollack, J. (2007), “The changing paradigms of project management”, International Journal of Project Management, Vol.
25 No. 3, pp. 266–274. DOI: 10.1016/j.ijproman.2006.08.002
Ponisio, M. L., Sikkel, K., Riemens, L. and van Eck, P. (2007), “Understanding Cooperation in Inter-Organisational Sys-
tems”. In: Proceedings of the International Association for Development of the Information Society (IADIS) Interna-
tional Conference e-Commerce 2007, 7-9 December 2007, Algarve, Portugal. pp. 163-174. IADIS Press.
Ponisio, M. L., Sikkel, K., Riemens, L. and van Eck, P. (2008), “Combining visualisation techniques to understand co-
operation in inter-organisational systems”, Journal of Systems and Information Technology, Vol. 10 No. 2, pp. 159–
179. DOI: 10.1108/13287260810897774
Ponisio, M. L., van Eck, P. and Riemens, L. (2008), “Using critical problem solving to plan inter-organisational coopera-
tion in e-customs”, in Proceedings of the International Association for Development of the Information Society
(IADIS) International Conference e-Commerce 2008, Amsterdam, The Netherlands, IADIS Press, pp. 28–39.
Sterman, J. D. (2000), Business dynamics: systems thinking and modeling for a complex world. Irwin/McGraw-Hill.
van Eck, P. and Ponisio, M. L. (2008), “IT project management from a systems thinking perspective: A position paper”,
in Proceedings of the 3rd International Research Workshop on IT Project Management (IRWITPM 2008) part of the
International Conference on Information Systems (ICIS 08).
Wieringa, R. (2007), Research and design methodology for software and information engineers.
www.cs.utwente.nl/~roelw Internal report.
Williamson, O. E. (1993), “Opportunism and its critics”, Managerial and Decision Economics, Vol. 14 No. 2, pp. 97–
107.
Wolstenholme, E. F. (1983), “Modelling national development programmes – an exercise in system description and
qualitative analysis using system dynamics”, The Journal of the Operational Research Society, Vol. 34 No. 12, pp.
1133–1148. http://www.jstor.org/stable/2581837
Wolstenholme, E. F. and Coyle, R. G. (1983), “The development of system dynamics as a methodology for system de-
scription and qualitative analysis”, The Journal of the Operational Research Society, Vol. 34 No. 7, pp. 569–581.
http://www.jstor.org/stable/2581770

44
IADIS International Conference e-Commerce 2009

FINDING TREND LEADERS FROM MARKETING


TRANSACTION DATA

Masakazu Takahashi, Kazuhiko Tsuda


Graduate School of Business Sciences
University of Tsukuba
3-29-1, Otsuka, Bunkyo, Tokyo 112-0012, Japan

Takao Terano
Dept. Computational Intelligence and Systems Science
Tokyo Institute of Technology
4259-J2-52 Nagatsuda, Midori-ku, Yokohama 226-8502, Japan

ABSTRACT
This paper presents a new recommendation method in marketing retails from the transaction data, which may contain
frequent customers’ consumption activities. Contrary to conventional popular engines, which generates recommendation
the results from the information by major customers such as among such as e-Bay does, we have formulated indices of
trend leaders with the criteria for the purchased date and the number of sales in order to get the good-to-sale items, which
will increase the number of the sales in the future. We have confirmed that it is possible to make appropriate
recommendations to the other customers from the transitions of preferences of trend leaders in the following senses: 1)
the effect of the recommendation with the trend leaders’ preferences, 2) the extraction of good-to-sale marketing items
from the frequent customers’ transactions, and 3) the early purchase effects on the short best-before and the long best-
before date items.

KEYWORDS
Recommendation Systems, Collaborative Filtering System, Customer Preferences, Data Analyses

1. INTRODUCTION
The inefficiency of retail store operations is caused by several reasons, but mainly the misunderstandings of
the timing of customers’ needs and the preferences. If the marketing items, which a certain customer prefers
to, were out of stock, it would be nonsense to generate recommendations for them. It is important to know
customers’ latent needs and preferences. The issue would affect the whole retail industry including
manufacturers of sales items. We need to properly and automatically obtain the both the preferences and the
timings for the customers. Concerning to the understanding for the customers’ preferences, a collaborative
filtering system is commonly used among the B2B or the B2C industries [Netperceptions2000]. Whereas,
their systems often only utilize the following information: purchasing dates, name of the items, customer
IDs , number of the sold items, and the price of them. These attributes are stored in the retail POS (Point-Of-
Sales) systems with the reward point cards, which will identify the customer and the transactional machines,
and the purchased items. Although POS systems are widely adapted even to the small retail stores in Japan,
there have been few attempts to integrate these data to understanding consumer behaviors.
Based on the background, in this paper, we present a new a new recommendation method in marketing
retails from the transaction data, which may contain frequent customers’ consumption activities. The rest of
the paper is organized as follows: Section 2 discusses the related work and weak points of the state-of-the-art
recommendation systems; Section 3 describes how we extract important information from retail transaction
data; Section 4 evaluates the proposed method, and finally Section 5 gives some concluding remarks and our
future work.

45
ISBN: 978-972-8924-89-8 © 2009 IADIS

2. RELATED WORK
Although recommendation systems are in common among the B2B or B2C businesses [Hijikata2007]
[Linden2003] [Orma2006], the conventional recommendation engines only provide the proper results for
commonly sold items and typical customers. They will show the weakness for both newly developed items
and new comers, when we would apply the methods to the retail industry. The customers of the retail
industry should be categorized such divergent points as their preferences, incomes, and the number of family,
and so on. We must care the recommendation information taking account of both the properties and their
diversity.

2.1 Understanding for the Customer Preferences


Collaborative filtering is one of the tools to understand the customer preferences and has the characteristics
with easiness to application and the affordability for the huge data. On the other hand, the system with
collaborative filtering is often influenced by the majority answers of the items and the customers
[Adomavicius2005] [Bruke2002] [Herlocker2004]. Therefore, collaborative filtering requires a large amount
of information related to items and consumers: a large amount of the information about the items and the
users must be categorized into appropriate segments. The feature comes from the method to group the
customer preference with the similarity [Netperceptions2000] [Schafer2001].
The steps for generating the recommendation information are summarized as follows; (1) correct many
purchase history data from customers, (2) make appropriate customer groups, which purchased the same or
similar items, when a certain customer purchased the item, and (3) generate the recommendation information
based on the item groups among the same group of customers. In collaborative filtering, they do not analyze
the contents of items at all. Therefore, it restricts the recommendation objects only purchased ones, and it
generates customer's community only from the purchase information without the analysis of contents of the
item.
Such shortcomings of the collaborative filtering systems are described in [Denning2006] [Herlocker2004].
Denning, et al. noted that the collaborative filtering system is required both the large number of customers
and the amount of contents. Therefore, the same recommendation results will be generated if the items to be
recommended are little. Moreover, the existing items only are recommended. This is a critical defect when
we must sell new release items. As for the forecasting the number of sales of new items, Nakamura has
evaluated and classified the characteristics of the new items with the market reflection data such as from the
POS data with customer IDs [Nakamura2001]. The conventional evaluation methods such as the trial repeat
model only indicate the characteristics for the items which will be purchased repeatedly, but are insufficient
for the customer classification or the recommendation from the ID-POS data classification [Abe2005].

3. METHOD TO PROCESS TRANSACTION DATA


One of the conventional methods for the timing understanding on the customer needs is the time-series data
analyses with the quantitative data such as the POS data. The method is good for the inventory controlling
such as the stable demands items from the customers needs, because of the sufficient time-series data and
able to mark high score ratio for the demand forecasting. On the other hand, it is hard to forecast the demands
on such as the new items or the items that demand rapidly stood up, because of the insufficient of the
forecasting based data. This section proposes the algorithm to efficiently detect the timing of the item needs
from the ID-POS data. Especially, to understand the timing of the item needs, we make use of the concept of
the trend leaders to forecast the demand of new items.

3.1 Acquiring ID-POS Data


The ID-POS system is commonly used in the Japanese retail industry, even they are so small. We have
corrected ID-POS data from a local grocery store located at Shimane prefecture in Japan between from May
to December in 2007 in order to find items to be sold in the future. Table.1 summarizes transaction

46
IADIS International Conference e-Commerce 2009

information acquired from the gathered data. They have about 10,000 customers visited with about 70,000
transactions during the observation period. There are about 20,000 items registered in the POS system with
the variety of the conventional items, the seasonal items, and new released items.
Table 1. Summary of the Number of Transaction Information
May Jun Jul Aug Sep Oct Nov Dec
Transactions 69,106 69,681 68,853 69,275 69,294 71,403 67,182 71,192
Customers 9,766 9,970 9,791 9,832 10,021 9,980 9,872 10,279
Purchased Items 689,592 689,686 658,716 674,667 680,102 690,444 651,723 705,600

Table.2 describes the number of the new registered items during the period. There are the 1,922 items
registered. Among them, the 1,738 items were sold at least one piece after the release and among the 1008
items have been increased the sales number from the release to 28 days later. Those who purchased the 1,008
items amount the 9,141 customers.
Table 2. Transaction Attributes

Items in POS New Registered Purchased Items Increased Items ActiveCustomers


18,091 1,922 1,738 1,008 9,141

Table. 3 shows the relation between the number of items of the new registered-, the purchased-, and the
increased-items. The table also shows the percentage of the purchased items and the sales increased items.
From the figure, about 50% of the new registered items could not increase the sales number. As for
September, the 425 items has registered because of the seasonal change from summer to fall.
Table 3. Number of Items for the Registered, the Purchased, and the Sales Increased

May Jun Jul Aug Sep Oct Nov Dec


Number of Registered 192 250 226 215 425 284 191 139
Purchased Items 161 230 198 195 376 256 183 139
Include Increased 91 123 99 119 284 130 100 62

3.2 Extraction Algorithm


To extract the items to be sold, we have found the indices of trend leaders who bought the items at the initial
stage. They are expected to maximize the sales amount in the future. We would like to observe the activities
of those customers. To measure the indices of the trend leaders for each item, we determine the following
criteria: 1) How first they have purchased the items from the release points, and 2) how many purchased
items would increase the sales number after the period.
The procedure to find the items to be sold from the ID-POS data is summarized in the following steps:
1. Item based calculation
Step1 Count the date for the release
Step2 Count amount of sales for 28days from the release
Step3 Count amount of sales for 35days from the release
Step4 Subtract the result of Step3 from the result of Step2
Step5 Extract the items of Step 4 > 0
Extraction with high support items from the customers from the amount of the sales
2. Customer based calculation
Step6 Count the number of the sales
Step7 Correct the purchased date for each item
Step8 Subtract the date for start selling from the purchased date for each item
Calculate the index of the early purchase
Step9 Summation for the reciprocals of the early purchase date
For the calculation of the early purchase function
Step10 Count the items of the step5 among the step 6

47
ISBN: 978-972-8924-89-8 © 2009 IADIS

Step11 Calculate Step9 / step6


Table.4 indicates the demographic information of the indices of the trend leaders (ITL) based on the
above procedure. From the table, the maximum of the ITL was 6.91, and minimum ITL was 0.00. 8,707
among 9,141 customers show 1.00 or less for the index. The customers exceeded 6.00 or more were only 3
persons.
Table 4. Demographic Information of the Indices of Trend Leaders

Index ~1 ~2 ~3 ~4 ~5 ~6 ~7 total
Customer 8,707 360 45 20 4 2 3 9,141
Percentage 95.25% 3.94% 0.49% 0.22% 0.04% 0.02% 0.03% 100%
Fig.1 shows the relation between the number of the purchased items and the index of the trend leaders.
Most of the customer purchased less than 50 items and scored the low index of the trend leader. Otherwise,
not always scored high index of the trend leader but purchased lot. For example, those who scored more than
4.00, the number of the purchased items varied wide.

y = 1E‐07x3 ‐ 8E‐06x2 + 0.0264x + 0.0189


6 R² = 0.7425

5
Index of the Trend Leader

0
0 20 40 60 80 100 120 140 160 180 200

Number of the Purchased  items

Figure 1. Number of the Purchased Items and the ITL


The figure suggests that, if we set the temporary threshold of the trend leader scored more than two, then
we can understand the following phenomena: 1)Except the exceeded score for the trend leader, those who
scored high index usually locates the near the store. 2) Almost all the locations have the trend leader. From
the relation between the demography of the ITL and the other attribute, depending on the threshold for the
trend leader, we can use the criteria as the key index for the recommendation based on the preference and the
timing for the needs.

4. RECOMMENDATION ENGINE EVALUATIONS


The index of the trend leaders is one of the reference values, therefore, it is necessary to set the threshold of
the index properly according to characteristics of the region, items, customer attributes, and sales policy.
Then, index of more than 2 is assumed to be a threshold, both to extract the trend leader and to recommend
the items. As for the recommendation engine, in this paper, we took the Taste; open source software based on
JAVA [Taste]. This engine is originally used the correlation coefficient for the similarity calculation method,
to hold many indexes of the similarity, the similarity method was changed to the cosign distance in this thesis.

48
IADIS International Conference e-Commerce 2009

It is difficult to detect the ability with the trend leader of the item selection that foreseen the fashion in
advance from the numerical data such as the ID-POS transactional data. Moreover, the candidates for the
trend leader include the customer only with short span curiosity, so that an efficient selection method of
detecting the trend leader is required.

4.1 Evaluation for the System with the Short Best-before Date Item
This section, we evaluate the recommendation performance with the item of new released milk that obtains
the short best-before date at least one week or so. This item is labeled number for 4902081205724 based on
the JAN (Japanese Article Number) regulation. This unique code is issued by each company and searched by
the GEPIR (the Global Electronic Party Information Register) site [GEPIR]. This unique number is
composed of the following attributes in case of 13 digits; 1) country code for 2 digits, 2) company code 7
digits, 3) item code for 3 digits, and 4) chick digit for 1 digit. For this unique identification number enable us
to identify the transaction of the item. For example, applying to this classification to the item of the
simulation, 49 for the country code of Japan, 02008120 for the company code, 572 for the item code, and 4
is for the check digit respectively. With the 74 customers scored more than 2 of the index of the trend leader,
we obtain the following results with the 10-fold cross-validation. Fig.2 indicates the relation between the
increase ratio for the item and the index of the trend leader. This indicates the performances of the proposed
index. From the graph, we obtained that the more scored of the index of the trend leader, the more scored
high increase ratio for the gross sales number except the around scored 5. This result of the exception comes
from the preferences of the each customer. This result obtains the slightly different performances with the
customer preferences and shows the diversity for the preference of the customers.

2.0 

1.8 
Increase ratio for the Gross Sales  Number(%)

1.6 

1.4 

1.2 

1.0 

0.8 

0.6 

0.4 

0.2 

0.0 
2.0  2.5  3.0  3.5  4.0  4.5  5.0  5.5  6.0  6.5  7.0 

Index of the Trend Leader

Jun Jul Aug Sep Oct Nov Dec

Figure 2. Increase Ratio for the Sales Number (Short Best-before Date Item)
Fig.3 indicates the relation between the early purchase effect and the index of the trend leader. This also
indicates the performances of the proposed index with the early purchase effect. From the graph, we obtained
the following issue; the more scored of the index of the trend leader, the more scored earlier. This also
obtains the slightly different performances with the customer preferences. This means the diversities for the
preferences of the customers.

49
ISBN: 978-972-8924-89-8 © 2009 IADIS

7.0 

6.0 

5.0 

Early Purchase  Date
4.0 

3.0 

2.0 

1.0 

0.0 
2.0  2.5  3.0  3.5  4.0  4.5  5.0  5.5  6.0  6.5  7.0 

Index of the Trend Leader

Jun Jul Aug Sep Oct Nov Dec

Figure 3. Early Purchase Effect (Short Best-before Date Item)


Table.5 and Table.6 indicates the recommendation results of the item with the proposed index. As for the
increased ratio for the item sales number scored between 0.13% and 1.60% rise wit the average of 0.44% and
the early purchase effect marked between 0.62 day and 6.61 days with the average of 1.71 days earlier than
the default. The recommendation information from the trend leaders with high score made increase the sales
number and early purchased days. We found out the items that will become the high potential for the
increasing sales number in the future both the proposed index and the short best-before date item.
Table 5. Recommendation Results for the Increase Ratio (%) (Short Best-before Date Item)

Max Min Average Standard Deviation


1.60 0.13 0.44 0.23

Table 6. Recommendation Results for the Early Purchase Effect (Days) (Short Best-before Date Item)

Max Min Average Standard Deviation


6.61 0.62 1.71 0.84

4.2 Evaluation for the System with the Long Best-before Date Item
Next, for the performance evaluation of the system, we took the item of new released pops that obtains the
long best-before date at least over month labeled number for 4902179011725 with the same conditions. Fig.4
indicates the relation between the increase ratio for the item and the index of the trend leader with the long
best-before date item. From the figure, we found out the item with the long best-before date item could not
affect the sales increase. Fig.5 also indicates the relation between the early purchase effect and the index of
the trend leader with the long best-before date item. From the both graph, we obtained from the simulation
that the more scored of the index of the trend leader, the more scored early purchase effect and the low effect
for the increase ratio for the item with the long best-before date item.

50
IADIS International Conference e-Commerce 2009

2.0 

1.8 

Increase ratio for the Gross Sales  Number(%)
1.6 

1.4 

1.2 

1.0 

0.8 

0.6 

0.4 

0.2 

0.0 
2.0 2.5 3.0 3.5 4.0 4.5 5.0 5.5 6.0 6.5 7.0

Index of the Trend Leader

Jun Jul Aug Sep Oct Nov Dec

Figure 4. Increase Ratio for the Sales Number (Long Best-before Date Item)

8.0 

7.0 

6.0 
Early Purchase  Date

5.0 

4.0 

3.0 

2.0 

1.0 

0.0 
2.0 2.5 3.0 3.5 4.0 4.5 5.0 5.5 6.0 6.5 7.0

Index of the Trend Leader

Jun Jul Aug Sep Oct Nov Dec

Figure 5. Early Purchase Effect (Long Best-before Date Item)


Table.7 and Table.8 indicates the recommendation results of the item with the proposed index. As for the
increased ratio for the item sales number scored between 0.09% and 0.82% rise wit the average of 0.29% and
the early purchase effect marked between 0.74 day and 7.44 days with the average of 2.03 days earlier than
the default. The recommendation information from the trend leaders with high score made early purchased
days effect. We found out the items that will become the high potential for the early purchase effect with both
the proposed indexes and the long best-before date item.
Table 7. Recommendation Results for the Increase Ratio (%) (Long Best-before Date Item)

Max Min Average Standard Deviation


0.82 0.09 0.29 0.14

Table 8. Recommendation Results for the Early Purchase Effect (Days) (Long Best-before Date Item)

Max Min Average Standard Deviation


7.44 0.74 2.03 1.01

51
ISBN: 978-972-8924-89-8 © 2009 IADIS

As the benefits for the recommendation with the proposed indexes, we have succeeded detect the items
that will increase sales number in the future, and extract the customer groups that became the trend leaders’
candidates especially to good for the short best-before date items.

5. CONCLUDING REMARKS
In this paper, we have described a new method to analyze the ID-POS transactional data. From the
experiments, we have found out a formula to extract the trend leaders among the customers. We have
confirmed that 1) we are able to make appropriate recommendations to the other group members based on the
transitions of the trend leaders' preferences, 2) from the trend leaders among the customers, we are able to
make appropriate recommendations to the other group members based on the transitions of the trend leaders'
preferences, and 3) the effect of the recommendation with the trend leaders’ preferences. Using the results,
we will make detailed decisions in the following three points: 1) to make appropriate recommendations to the
other group members based on the transitions of the trend leaders' preferences; 2) to evaluate the effects of
the recommendations with the trend leaders’ preferences; and 3) to improve the retail such management
processes as prevention from the out of stock phenomena, sales promotion for early purchase effects, and the
increase of the numbers of sales. Furthermore, to make use of the indices, we will evaluate items from both
of the long best-before date and the short best-before date, in order to find out the short best-before date item
is good for sales expansion.
This research is supported in part by a local super market in Japan. We express appreciation to those
involved.

REFERENCES
[Abe2005]Abe, M., and Kondo, F., 2005, Science of Marketing, POS Data Analysis, Asakura Publishing, Tokyo,
Japan (Japanese)
[Adomavicius2005]Adomavicius, G., and Tuzhilin, A., 2005, Toward the Next Generation of Recommender
Systems: A Survey of the State-of-the-Art and Possible Extensions, IEEE Trans. on
Knowledge and Data Engineering, Vol.17, No.6, pp.734-749
[Bruke2002]Burke, R., 2002, Hybrid Recommender Systems: Survey and Experiments, User Modeling and User-
Adapted Interaction, Vol.12, pp.331-370
[Denning2006]Denning, P.J., and Dunham, R., 2006, The Missing Customer, Communications of the ACM, Vol.50,
No.4, pp.19-23
[GEPIR]http://www.gepir.jp
[Herlocker2004]Herlocker, J. et al, 2004, Evaluating Collaborative Filtering Recommender Systems, ACM Transactions
on Information Systems, Vol.22, No.1, pp.5-53
[Hijikata2007]Hijikata, Y., 2007, Techniques of Preference Extraction for Information Recommendation, Journal of
Information Processing Society of Japan, Vol.48, No.9, pp. 957-965
[Linden2003]Linden, G. et al, 2003, Amazon.com Recommendations; Item-to-Item Collaborative Filtering, IEEE
INTERNET COMPUTING, Jan-Feb, pp.73-80
[Orma2006]Orma, L.V., 2006, Consumer Support Systems, Communications of the ACM, Vol.50, No.4, pp.49-54
[Nakamura2001]Nakamura, H., 2001, Marketing of the New Products, Chuokeizai, Tokyo, Japan (Japanese)
[Netperceptions2000]NetPerceptions, Recommendation Engine White Paper, 2000
http://www.netperceptions.com/literature/content/recommendation.pdf
[Schafer2001]Schafer, J.B. et al, 2001, E-Commerce Recommendation Applications, Data Mining and
Knowledge Discovery, Vol.5, pp.115–153 [Taste]http://taste.sourceforge.net

52
IADIS International Conference e-Commerce 2009

ADDING VALUE TO ENTERPRISEWIDE SYSTEM


INTEGRATION: A NEW THEORETICAL FRAMEWORK
FOR ASSESSING TECHNOLOGY ADOPTION OUTCOMES

Linda Wilkins
RMIT University, Melbourne, Australia

Paula M.C. Swatman


University of South Australia

Duncan Holt
Raytheon Australia

ABSTRACT
The concept of an enterprise wide information system (EWS) strategy is often invoked as a means of repositioning an
organisation to do what it does best. Streamlining processes and integrating systems in key organisational areas such as
records management is fundamental to such a strategy and has led to growing uptake of Electronic Document and
Records Management Systems (EDRMS). During the implementation, a project manager will need an enterprise model
or framework that accurately captures the reality of the organisation and its operational tasks and assists monitoring of
the project to minimise risk. However in the IS field no single theoretical framework or model has gained widespread
acceptance. In this paper we draw on Evolutionary Diffusion of Innovation Theory (EDT) and TAM/TAM2/UTAUT to
evaluate their effectiveness as predictors for a successful EDRMS implementation in a local government context. We
report on modifications to these two frameworks that enabled the development of a technology implementation and
acceptance (TIAM) model. The new model enables improved measurement and monitoring of EWS implementations as
they occur.

KEYWORDS
Diffusion theory; Technology Acceptance Model; case study; SMEs

1. THEORETICAL FRAMEWORKS FOR TECHNOLOGY ADOPTION


IS implementation studies are in need of a widely accepted theoretical framework satisfactorily explaining
how complex and networked technologies diffuse. Paradigms applied to implementation studies in the IS
field frequently draw on two bodies of theory or constructs – Diffusion of Innovation (DoI) and the
Technology Acceptance Model (TAM). We begin with an outline of the elements of each theory or construct,
consider the benefits of applying these to studies of IS process innovations and conclude with some findings
on the limitations of each theory’s explanatory power.

1.1 Diffusion of Innovation/Evolutionary Diffusion Theory


Diffusion of innovation theory attempts to explain how an innovation is spread and why it is adopted.
Evolutionary Diffusion Theory (EDT) deals with the differentiations, complexities and uncertainties existing
in the overall economic structure (Lambooy and Boschma, 2001; Lissoni and Metcalfe, 1994). EDT seeks to
explain the factors that often lead to sub-optimal behaviour in the real world – particularly where decision-
making is complex and the decision-making environment contains multiple interdependencies (Arthur 1994).
Key features of EDT include: rejection of optimisation or the feasibility of determining one ‘best’ policy; the
role of government as policy maker; the acceptance of human intervention in economic processes; and a

53
ISBN: 978-972-8924-89-8 © 2009 IADIS

focus on systems and markets rather than individual firms. The first three of these EDT axioms (described
below) can be applied to analyses at both sectoral and organisational levels.
Rejection of Optimisation: EDT rejects the idea of optimisation or implementing one ‘best’ policy
(Metcalfe, 1994). Successful innovations represent the outcome of multiple and contingent variables and do
not always have to be the best ones (Saviotti and Metcalfe, 1991). Models based on Evolutionary Diffusion
theory thus stress the gradualism of internal adoption.
Government as Policy Maker: The role policy intervention can play and the institutional pressure
government can exert to stimulate innovative technology uptake were explored by Lissoni and Metcalfe
(1994); and later extended to understanding the role of government as policy maker by Lambooy and
Boschma (2001), who emphasise the need for technology solutions to be context-specific and sensitive to
local path dependencies.
Human Intervention in Economic Processes: Implicit in Evolutionary Diffusion Theory is the
assumption that intervention in the process of technology development is possible and that the selection of a
theory can influence policy design. Once the soft components of technology innovation are recognised, actors
are clearly capable of consciously attempting to change their environment (Nelson 1995). As a theoretical
framework, EDT extends the explanatory power of diffusion theory and offers a basis for understanding
many of the complex and interrelated issues applying to instances of e-business uptake.
Application: Evolutionary Diffusion Theory moves on from a focus on the innovation itself to
integrating the actors involved, the firm and the social environment. As complementary theories, they
provide considerable explanatory strength for studies of process innovation. As a theoretical framework EDT
should be applicable to all stages of a technology implementation.
Limitations: Evolutionary Diffusion Theory is focused on systems and markets rather than individual
firms. Its orientation towards inter-organisational studies of industry sectors and markets may make it less
applicable to studies of single organisation implementations.

1.2 Technology Acceptance Model (TAM)


Davis, Bagozzi and Warshaw’s (1989) Technology Acceptance Model (TAM) is one of the most influential
theories in IT/IS adoption behaviour, adapting Ajzen and Fishbein’s (1980) Theory of Reasoned Action
(TRA) to explain why users accept and use technology, as well as the influence factors involved in these
processes. The limited association between a system's acceptance and its usage intensity was the main driver
for the development of TAM, which was designed to create a foundation for research into the impact and
influence of external variables on internal beliefs, attitudes and intentions towards technology acceptance
(Davis et al., 1989).
Elements: Perceived usefulness and perceived ease of use determine an individual's intention to use a
system, with ‘intention to use’ serving as a mediator of actual system use. Perceived ease of use influences
perceptions of usefulness, though Davis (1986) found usefulness was far more strongly linked to usage than
ease of use. TAM assumes intention to use an IS is free of other individual, organisational and environmental
constraints (Bagozzi et al., 1992). The theory utilised a set of external variables (e.g. individual abilities,
tasks, or types of system) by which a user could determine the implications of using an IS (the Subjective
Norm), informing his/her beliefs about perceived usefulness and ease of use of the system, creating the user’s
attitudes towards this particular IS – which, in turn, would drive his/her behavioural intention towards actual
system use (Burton-Jones and Hubona, 2005; Davis et al., 1989). The limitations of the original TAM led
Venkatesh and Davis (2000) to develop TAM2, an extension which simplified the originally complex chain
of IS user logic by eliminating the Attitude Toward Using variable and clarifying ‘Perceived Usefulness’ and
‘Intention To Use’ via the provision of two new groups of influences (Social Influence Processes and
Cognitive Instrumental Processes) clarifying the user’s motivation(s) for using the system.
Venkatesh and Davis (2000) identified three separate Social Influence processes – Voluntariness,
Subjective Norm and Image.
• Voluntariness describes the degree to which potential users understand the adoption decision to be
non-compulsory (Agarwal and Prasad, 1997). Usage intention towards an introduced IS is likely to vary
depending on whether use of the system is voluntary or mandatory. An individual’s willingness or
unwillingness to comply with such mandates affect intention to use the system (Venkatesh and Davis, 2000).

54
IADIS International Conference e-Commerce 2009

• The Subjective Norm represents ‘a person’s perception that most people who are important to him
think he should or should not perform the behaviour in question’ {Fishbein and Ajzen, 1975, p302}, and
directly influences intention to use the system.
• TAM2 uses Moore and Benbasat’s (1991) definition of Image as 'the degree to which use of an
innovation is perceived to enhance one’s…status in one’s social system' (p.195) and proposes a direct
correlation between Image and Perceived Usefulness.
Experience is another important factor in TAM2, although Venkatesh and Davis (2000) did not categorise
experience as a social influence process, instead keeping this variable separate – but relating it to the Social
Influence group of processes. The Subjective Norm directly influences Intention to Use in the early stages of
a mandatory system’s implementation within an organisation – but the influence of the Subjective Norm on
Intention to Use will decrease over time and will instead be replaced by Experience of using the system
(Venkatesh and Davis, 2000).
The group of Cognitive Instrumental Processes in TAM2 includes four variables: Job Relevance, Output
Quality, Result Demonstrability and Perceived Ease of Use, with the first three directly affecting Perceived
Usefulness:
• Job Relevance relies on the user's judgment on the extent to which an IS is applicable to his/her own
work;
• Output Quality represents a system’s performance in relation to its given tasks and affects Perceived
Usefulness (see Davis et al., 1989)
• TAM2 utilises Moore and Benbasat’s (1991) definition of Result Demonstrability as the ‘tangibility
of the results of using the innovation’ (p. 203);
• Perceived Ease of Use is equal to Perceived Usefulness and Intention to Use in terms of its
importance as an influence on a user’s decision to utilise the IS.
Application: As a general purpose model of IT adoption, the TAM/TAM2 models provide significantly
improved insight. These models are particularly applicable where evaluation of the usefulness of an
innovative ISD process is required.
Limitations: Both TAM and TAM2 assume that intention to act implies limitless freedom. In practice,
however, constraints such as limited ability, time, environmental or organisational limits, and unconscious
habits will limit this freedom. Constructs based on TAM also focus on perceived personal benefits of the
innovation but fail to consider organisational benefits (Hardgrave and Johnson 2003 p.326). It is widely
acknowledged that TAM (unlike EDT) does not explain why performance beliefs often disagree with
objective reality (Davis et al, 1989, p.335). More recent studies have also found that ‘certain cultures are
especially sensitive to user perceptions, and practitioners should not assume that perceptions of ease of use
and usefulness are universal’ – a limitation likely to have some impact on IT out-sourcing decisions (McCoy
et al 2007:p.89).

1.3 UTAUT (Unified Theory of Acceptance and Use of Technology)


The UTAUT model developed by Venkatesh et al. (2003) – which, like TAM/TAM2, is focused on the
description and explanation of organisational acceptance of a technology (Carlsson 2006) – is based on a
review of 8 prominent models1 in user acceptance research. It provides insight into both the intentions of
potential adopters to use an IS, as well as their usage behaviour. The UTAUT model has its four key
constructs: performance expectancy, effort expectancy, social influence and facilitating conditions which
directly influence behavioural intention and use behaviour. Gender, age, experience and voluntariness of use
are key moderators for the impact each construct has on behavioural intention and use behaviour.
These comparatively brief introductions to Evolutionary Diffusion Theory and the Technology
Acceptance Model body of work which culminated in UTAUT illustrate the very different perspectives these
theories provide on technology innovation uptake: EDT is essentially focused on the organisation itself rather
than on determining individual attitudes towards IS use, while TAM/TAM2 and UTAUT are largely focused
on individual attitudes towards IS adoption rather than organisational influences/impacts on individual
attitudes to IS innovation. Clearly, both approaches have a role to play in forecasting the likely success of any

1
Theory of Reasoned Action (TRA), Technology Acceptance (TAM, TAM2), Motivational Model (MM), Theory of Planned Behaviour
(TPB), Model of PC Utilization (MPCU), Combined TAM-TPB, Innovation Diffusion Theory (IDT), Social Cognitive Theory (SCT)

55
ISBN: 978-972-8924-89-8 © 2009 IADIS

specific IS implementation. Table 1 compares the basic assumptions of these three theories, their strengths
and limitations.
Table 1. Comparative Assessment of EDT, TAM/TAM2 and UTAUT

Theoretical Basic Assumptions Strengths Limitations


Foundation
Evolutionary Stresses the gradualism of Recognises the possibility of More applicable to inter-
Diffusion internal adoption changes in an innovation during organisational studies and
Theory the adoption and implementation markets than single
Presents adoption of single process organisation studies
innovations as part of a greater
process of change affecting Provide guidance as to how to
organisations and their culture accelerate the rate of adoption
and predict outcomes
TAM/TAM2 Recognises that actual usage may Replaces multiple attitude Does not consider the
not be a direct or immediate measures with two validated benefits to the organisation
consequence of attitudes and technology acceptance
intentions measures— ease of use, and Ignore the organisational/
usefulness. personal perspective
UTAUT Focuses on the way in which Unified but parsimonious model Does not consider
determinants of intention which, building on eight previous significant user
and behaviour evolve over time models, potentially offers the determinants such as
benefits of all ‘intrinsic motivation’ or
Highlights the role and ‘attitude toward behaviour’
importance of contextual analysis Refines the body of work which
when developing culminated in TAM Does not consider the
strategies for organisational impact of attitudes to using
technology implementations a particular technology
innovation
In the next section of this paper we review an EDRMS implementation in a local government authority.
We then apply EDT, TAM/TAM2 and UTAUT to the case study and assess the relative explanatory strength
and/or limitations of each of these approaches.

2. A LOCAL GOVERNMENT EDRMS IMPLEMENTATION


An EDRMS implementation with fully scanned records is a technology change affecting all users in an
organisation, taking them from a manual self managed style of work to an organisational systems approach
with limited personal customisation. Corporate governance requirements and growing pressures for
legislative compliance have stimulated public sector uptake of content management systems that can mirror
internal corporate approval processes, store information and retrieve it in an accurate and timely manner
(Government Exchange, 2004). These external pressures, together with the availability of funding and
support for systems underpinning open and accountable government, have resulted in local government
instrumentalities becoming fertile ground for full EDRMS implementations.
Local government in Australia is made up of 629 Councils and 100 community governments. One of the
largest of these is the City of Charles Sturt (CCS). CCS employs just over 400 full time equivalent staff in 10
business portfolios. Seven records staff members register over 300,000 records annually. In 2002 the process
of replacing the Council’s paper records system began with a series of staff workshops designed to examine
staff issues in moving from paper to electronic documentation. They found the paper system limited staff
ability to track and share documentation; and the speed at which information could travel through the
organisation. The increasing volume and use of email added to these problems. The discussion from this

56
IADIS International Conference e-Commerce 2009

series of workshops culminated in the creation of a Records Management Strategic Directions document that
clearly established the need for an Electronic Document and Records Management System (EDRMS).
The selection project began by establishing a project team with the responsibility ‘to replace the records
section of the GEAC TCS and other localised manual and indexed systems used for the same purpose’. The
initial document set out six objectives: system replacement within a set budget, a time frame for
implementing the replacement system, process and efficiency gains, minimised need for new hardware/
operating systems, minimised changeover effects on running the business; and compliance with the Records
Management Strategy. At this stage the size and budget of the project still had to be determined.
In October 2002, the request for tender was advertised and in June 2003, contracts were signed with
Tower Software for TRIM, the preferred product. Around two thirds of the CCS workforce (280 staff
members) would be directly involved with TRIM usage. The implementation team consequently decided to
institute an analysis of all council business processes touching records. The documentation of business
process workflows at CCS began by identifying each of the 191 business units/processes; and
recording/ranking interest in specific conversion processes within individual business units. The consultation
process was valuable, as the rankings were helpful to management when it came to selecting ‘champions’ to
promote uptake within business units. Some 10-15 of the business processes identified as conversion
candidates were implemented at start-up.
Vendor training had to take place on the TRIM system and be delivered as a one day mandatory session
for all computer users. To ensure that all staff understood the meaning of a record, management invested in
extended training time to cover Records Management procedures Groups of ten staff members were trained
each day over a 7.5 week period. Three months after TRIM went live, a staff survey found staff members
appreciated that so much more of their work could be done from the desktop. They were confident in the
security of documents on the system and enjoyed the fact that it was now possible for multiple users to be on
the system at the same time. The review also gave positive feedback on such issues as meeting the Go Live
date, the high quality of training for TRIM Context, excellent change management and enhancement of the
TRIM Context Workflow module through CCS staff suggestions.
All records have been on TRIM since 8th March 2004. Familiarity with the EDRMS has increased staff
confidence in using electronic records systems – transferable skills increasingly valued on the job market.
There are still some issues with low compliance in areas such as email where decisions to ‘TRIM’ (add to
records) and the time required entering each item have not yet been resolved.
The success of systems integration at CCS, achieved for a project budget of $150,000, was a notable
feature of the EDRMS implementation. Although not part of the original project, the TRIM Document
Assembly process is now widely used for internal forms and document templates. Most importantly, the
integration between TRIM, Proclaim One and GIS means that all these systems can now be viewed at desk
level. For some employees the fact that there is a new baseline for business as normal continues to be a
demanding concept. Organisational integration of an EWS ultimately means finding ways to maintain the
impetus for cultural change (Laeven 2005).

3. THE TECHNOLOGY IMPLEMENTATION AND ACCEPTANCE


MODEL (TIAM)
In Section Two of this paper we concluded that IS implementation studies lack a widely accepted theoretical
framework to satisfactorily explain how complex and networked technologies diffuse in practice. We found
that in attempting to apply EDT and the TAM/TAM2/UTAUT approaches to the technology adoption
described in the EDRMS case study, the theoretical models were either not directly applicable, or did not
fulfil all these requirements. EDT was useful to address many of the consultative and expectation-setting
project activities. Actions such as workshops to discover what organisational staff thought of existing paper-
based processes, as well as where they wanted their organisation to be in the future, were very powerful tools
for driving change. The initial support at CEO level provided leverage that helped to shape the attitude of
many staff. It obliged them to try the new system for themselves and provided a “kick start” for those not
truly individual innovators or early adopters in technology innovation diffusion.
An initial organisational directive removed inconsistency between possible technological solutions and
mandated the technology for the organisation. This explains how initial attitudes and intent were shaped in

57
ISBN: 978-972-8924-89-8 © 2009 IADIS

practice. In contrast to TAM/TAM2/UTAUT, the case study shows that positive experiences after mandating
the technology proved more influential than the initial mandated selection. These experiences formed a basis
for building positive user support resulting in diffusion and adoption of the technology. The
TAM/TAM2/UTAUT models offer a clear link between the individual’s perception of ease of use and
usefulness which shapes their initial behaviour.
The case study also serves to highlight the key role of timing and quality of information dissemination in
ensuring perceptions are built at the right time and reinforced by practical application. In this instance, the
users of the new technology were not “over-sold” on the potential benefits, but were informed of the benefits
that were directly related to their originally-stated needs. While promoting additional benefits is often seen
as a way of increasing an individual’s desire to adopt a new system, it can also increase perceived complexity
of use. Careful and gradual release of information for any new system is vital to incremental adoption of the
new technology.

3.1 Review of the Theories


While both EDT and TAM/UTAUT provide insight into how a technology implementation unfolds, there are
some specific limitations which are not addressed by the two theoretical frameworks. Although EDT
addresses many of the factors that an organisation must deal with when facing technological change, such as
understanding how choices are made between systems (and even whether to choose a system at all), the
primary focus of this paper is on selecting the theory or model that can best assist following the decision to
implement. We found that EDT provides an excellent explanation for why the organisation chose a
particular path, whereas TAM/TAM2 and UTAUT offer a stronger theoretical framework once the decision
to implement has been made.
The success of an EWIS requires input across both all technology adopters, from early adopters to
laggards (Rogers 1994). TAM/TAM2 and UTAUT offer significant insight into likely user reaction to the
introduction of new technology. Less apparent in this model, however, is a demonstration of the feedback
process between perception and action. The EDRMS case study clearly shows that technology
implementation is an iterative process, with many factors shaping initial expectations, perceptions and,
ultimately, attitudes to using the technology. Once individuals have used the new technology or received
feedback from others, their perceptions evolve and diffuse through the organisation. This process can
become a positive or negative reinforcement loop.

3.2 A Composite Theory Proposal


The IS literature does not provide a widely-accepted model for EWIS uptake. Where existing theories or
models may not fit the needs of a study individually, their union can provide a better explanation (Hardgrave
and Johnson, 2003). Our case study findings were consistent with each of the proposed theoretical
frameworks but did not offer the analytical strength of our proposed model: TIAM (Technology
Implementation and Acceptance Model), where we have synthesised existing constructs and addressed
limitations through the addition of other elements. We believe TIAM (see Figure 1) is a closer approximation
to the reality of technology adoption and a more potent model for the introduction and diffusion of EWIS.

Figure 1. Technology Implementation and Acceptance Model (TIAM)

58
IADIS International Conference e-Commerce 2009

The first panel represents one-off factors which can shape initial attitudes before the technology is
experienced in a business context. Two such factors appear only in this section of the model. The initial
individual subjective factors (I) are shaped by people’s impressions of: what the innovation means to them,
their previous experience with technology innovation, what they think happened in other organisations; and
their overall expectations of this implementation. The second factor is the initial organisational influence (O).
This reflects the pressure, or expectations, placed on potential users of the technology to adopt. In general,
one would hope that this is a positive pressure from a senior level of an organisation.
Both I and O are very important but short term, influencing factors, which provide a “kick start” to a
process that will last some time for every technological introduction. Once these factors have been used,
they cannot really be reused. The CEO at Council promoted use of the new system when introduced,
encouraging initially positive attitudes toward use. If the system does not deliver on these expectations,
however, resistance to the system will ultimately result in its failure.
The centre panel of the TIAM model represents an evolution of TAM/TAM2/UTAUT, modified to show
that for organisational success it is the sum of all individuals which makes up the collective U, E, A, BI and,
eventually, adoption – or, in EDT terminology, diffusion. The U and E factors are shapers of initial attitude,
but are also part of a feedback loop. The sum of the entire organisation’s attitude toward use and behavioural
intent is not equally spread across all users: some will have far more influence than others. For the greatest
chance of success, those with the most influence should be targeted to raise their BI component as part of the
organisation. This issue is especially important in the case of an EWIS, where one section of an organisation
can block the diffusion of a technology innovation and thus prevent uptake by the entire organisation.
The central section of the TIAM model has a feedback loop, where actual usage experience changes the U
and E factors over time. If system usage fulfils or exceeds expectations, U is increased. If the technology is
easier to use than expected, E will increase. The feedback loops in the TIAM model are critical to reflect
reality: the two extremes of the spectrum are the first time it is used and the last time it is used before
replacement or retirement. Successful diffusion lies somewhere between these two extremes and can only
truly be determined by the organisation managing the technology adoption process. Organisational adoption
shifts over time: what might be seen as excellent levels of use and very positive results in week 1 of a new
software system is less than the adoption and usage required to sustain it long term. Similarly, if the
feedback loops are not well maintained over time with new related innovation, training and positive
organisational attitude, a slow drift to a more negative organisation position with less usage and lower
infusion can occur.
We argue that positive reinforcement is the desired result of a successful technology innovation
implementation – and this takes time. If the system does not live up to expectations, reinforcement will be
negative, often quite fast and preventing infusion of the technology. If failure occurs then providing
sufficient new input to the cycle via inputs such as I and O is extremely difficult. The third panel of the
TIAM model shows the two possible outcomes from this process. The two results are success or failure, the
measures of which are subjective to the individual organisation, ranging across a wide spectrum of
definitions. The figure refers to a ‘break over point’ – one at which failure of a project, once reached, is
almost impossible to undo.

4. CONCLUSION AND FUTURE WORK


This paper has investigated two groups of theoretical models often applied to IS research studies, to
determine their value as predictors of technology implementations. Imported from the increasingly cross-
disciplinary field of innovation research, Diffusion of Innovation Theory (EDT) plus the Technology
Acceptance Model (TAM/ TAM2) and Unified Theory of Acceptance and Use of Technology (UTAUT) are
all well accepted in IS research. Together they provide an enhanced explanatory framework for uptake of
new technology. Following adaptation of key features of the two frameworks to our Technology
Implementation and Acceptance Model (TIAM) we showed how TIAM can be applied to a real-world
implementation of an EDRMS.
We found that TIAM provides a theoretical framework highly applicable to IS practice in both private
and public sector contexts, particularly for technology adoption in local councils and small to medium sized
enterprise (SMEs). The TIAM composite model is structured in an easily understood and interpretable format

59
ISBN: 978-972-8924-89-8 © 2009 IADIS

and is directed at use internally by the implementing organization. Practitioners can apply the model to
provide increased clarity and simplicity and to enable more effective collaboration across the organisation.
TIAM enables communication of key signs to parties not versed in project management and technology
implementation indicating how the process is likely to unfold and why and where decisions need to be made.
Although our initial findings on the applicability of TIAM were extremely favourable, we are aware that
further testing is needed to verify the usefulness of the framework, to establish whether the model can change
behaviour and provide useful insight to project managers enabling them to evaluate projects prior to failure.
In future work, the authors therefore propose to further test and validate TIAM as a theoretical framework
that can effectively underpin IS project management by applying it to a series of case studies from different
industries.

REFERENCES
Agarwal R. and Prasad, J. (1997) “The role of innovation characteristics and perceived voluntariness in the acceptance of
information technologies” Decision Sciences, Vol. 28, 3 pp.557–582.
Ajzen, I. and Fishbein, M. (1980) “Understanding Attitudes and Predicting Social Behavior” Englewood Cliffs, NJ:
Prentice-Hall,Inc.
Arthur, W. B. (1994) “Increasing Returns and Path Dependency in the Economy” Univ of Michigan Press, Ann Arbor.
Bagozzi, R. P., Davis, F. D. and Warshaw, P. R. (1992) “Development and test of a theory of technological learning and
usage” Human Relations, Vol. 45, 7, pp.660-686.
Burton-Jones, A. and Hubona, G.S. (2005) "Individual Differences and Usage Behavior: Revisiting a Technology
Acceptance Model Assumption," The DATABASE for Advances in Information Systems, Vol 36, 2 pp. 58-77.
Bijker, W. B. and Law, J. (1992) “Shaping Technology/Building Society: Studies in Sociotechnical Change” in Bijker,
W,Carslon, W.B. & Pinch T. (eds.) Inside Technology MIT Press Cambridge, Mass.: MIT Press, pp.205-240.
Carlsson, C., Carlsson, J., Hyvonen, K., Puhakainen, J. and Walden, P. (2006) “Adoption of Mobile Devices/Services —
Searching for Answers with the UTAUT” Proceedings 39th Hawaii International Conference on System Sciences,
Volume 6, 04-07, pp.132a - 132a
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989) “User acceptance of computer technology: A comparison of two
theoretical models”. Management Science, Vol.35(8), pp.982-1003.
Government Exchange (2004) “Electronic Documents and Records Management for the Public Sector”
http://www.iqpc.co.uk/binary-data/IQPC_CONFEVENT/pdf_file/5799.pdf (retrieved Feb 28th, 2008).
Hardgrave B.C. and Johnson, R.A. (2003) “Towards an information systems development acceptance model: the case of
object-oriented systems development”. IEEE Transactions on Engineering Management Vol.50, 3, pp.322-336.
Laeven T (2005) Competencies – the asset that counts most: on developing human talents as a prerequisite for successful
EDRM changes pp 129 -148 in Hare C and McLeod J., Managing Electronic Records Facet Publishing UK.
Lissoni, F. and Metcalfe, J. S. (1994), “Diffusion of Innovation Ancient and Modern: A Review of the Main Themes” in
Dodgson M and Rothwell R (eds) Handbook of Industrial Innovation, Edward Elgar Publishing Limited, Cheltenham
pp. 106-144.
McCoy, S., Galletta, D.F. and King, W.R. (2007)"Applying TAM across cultures: the need for caution," European
Journal of Information Systems Vol. 16, 1, pp. 81-90.
Moore, G. C. and I. Benbasat (1991) “Development of an instrument to measure the perceptions of adopting an
information technology innovation” Information Systems Research Vol 2, 3, pp 173-191.
Nelson, R. R. (1995) “Recent Evolutionary Theorizing about Economic Change” Journal of Economic
Literature, Vol.33, pp.48-90.
Saviotti, P. P. and Metcalfe, J. S. (1991) “Evolutionary Theories of Economic and Technological Change: Present Status
and Future Prospects”, Harwood Academic Publishers.
Venkatesh V and Davis F D (2000) “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal
Field Studies”, Management Science Vol. 46, 2, pp.186-204
Venkatesh V, Morris M G, Davis G B and Davis F D (2003) “User acceptance of information technology: toward a
unified view”. MIS Quarterly 27, 3, pp.425–478

60
IADIS International Conference e-Commerce 2009

IEBS: A MODEL FOR INTELLIGENT E-BIDDING

Pedro Brandão Neto, Sofiane Labidi, Rafael de Souza Cunha and Rafael Soares Cruz
Intelligent System Lab.
Federal University of Maranhao
Campus of Bacanga
65080-040 Sao Luis –MA, Brazil

ABSTRACT
The interest in e-bidding systems development has increased in recent years. The e-bidding systems are focused in the
crier’s role that monitors and manages the whole e-bidding process. In addition, every process is based upon laws, on an
edict and on the suppliers’ database. Thus, the crier plays a main role in an e-bidding process. This paper presents a
model of Intelligent E-Bidding System (IEBS) for automating all the steps of e-bidding transactions and also aims at
automating the crier’s decision making role increasing, that way, the system’s autonomy.

KEYWORDS
Electronic Bidding; Public Administration; e-Government; Intelligent Agent.

1. INTRODUCTION
With the boom of Internet, the electronic business transactions became an unavoidable trend. The E-
Commerce (EC) represents a significant piece of the global market and does justice to the investments made
until now. If there is an area that deserves studies and efforts towards being improved, this is such area.
Going through this point of view, the use of Intelligent Commerce System (ICS) and Intelligent E-Bidding
System (IEBS) could represent a big profit for the improvement of web based buying & selling services.
Researchers as Fonseca et al. (2003), Tomaz et al. (2004), Labidi and Martins (2007) and Cunha (2009)
demonstrate the relevance of the ICS and IEBS.
Statistics show that the E-Commerce in Brazil has increased exponentially (ARAÚJO, 2007). There was,
in the first half of 2008, compared to 2007, a growth of 45% in revenues from companies that trade through
the Internet. The total was 3.8 billion Reais, coming close to 4.4 billion Reais billed during the whole year of
2006. This phenomenon can be understood by the increase in the number of users and the expansion of the
Internet all over the country. Brazil stands out among the first in number of people that use this vehicle of
dissemination of information and communication (E-COMMERCE, 2008).
The development of an E-Commerce system through new paradigms can affect several business areas of
the companies that possibly want to adopt it. Thus, it can reduce costs of logistic, negotiation, marketing,
generation of contracts and more. Thus, the need companies have to always improve and increase their
capacity to interact in a more efficient way with other organizations reducing costs and increasing the profits.
is very worthy.
Despite the singular evolution of E-Commerce, with impressive numbers, and of its worldwide expansion
that allows the breaking of boundaries, the competitiveness advancement requires that the companies search
for new systems capable of increasing even more the efficiency and overcoming the technological limitations
of the current software.
With the emergence of more robust applications and the need to assist the human decision-making came
the possibility of creating more sophisticated software systems capable of improving the business processes
and to solve general scope problems. In order to create a system capable of increasing the business capacity
between enterprises through a B2B relationship, the ICS (Intelligent Commerce System) aims at automating
the negotiation process and the decreasing of existing costs by increasing the efficiency in relation to the
current e-commerce systems,

61
ISBN: 978-972-8924-89-8 © 2009 IADIS

ICS joins the characteristics of open systems such as the Internet, with an architecture that facilitates the
search for trading partners, the negotiation, contracts conclusion and monitoring of contracts. All these steps
are currently monitored by a human operator (TRINTA, 2007).
With this in view, the ICS aims at, using the concepts of AI (Artificial Intelligence) through entities
known as Software Agents and E-Commerce, creating a complete business environment for the exchange of
products and services in order to provide greater efficiency in the costly process of finding business partners
and also provide an reasonable way of negotiation between sellers and buyers (LABIDI at al. 2003).
This paper presents a model for developing a system, called IEBS, which was designed based on the ICS
in order to promote negotiations via Internet between companies and government known as E-Bidding
(MEIRELLES 2005 and FÜCHTER, 2004). So, on that principle, we envisage significant company gains for
businesses and government costs decrease due to automation of accomplished negotiations. Thus, it also
contributes by adding the use of computers systems in the administration as an important feature for gain in
business managing procedures. The extra knowledge generated by this study can contribute to researches on
systems that cover other fields of administration, as well.
Currently, the whole procedure realized in an E-Bidding System is intrinsically tied to laws and a legal
edict. And this, respectively, dictates how the E-Bidding will be conducted according to the legal process and
sometimes transcribing, fully, on its content, the text of the laws. Thus, the crier exercises a leading role in an
E-Bidding. Therefore, the E-Bidding System depends on the current "presence" of the crier and his team
support in all stages of a session.
Therefore, the Management E-Bidding Systems today allow the crier to monitor and manage Proposals,
Bids and Bidders, among other activities. Obviously, the crier acts with a team support, but the final decision
comes from him. Anyway, in all stages of the competition the crier will be there to intervene when necessary.
It is important to notice the differences between Proposals and Bids. The first one is the preparative stage in
which Bidders make shots containing the value of their services or products. The second one is a competitive
stage, after the Proposal Stage, in which Bidders make successive bids competing at lowest prices with other
Bidders.
Notice that the crier, even with a Management E-Bidding Systems is still the "master" and, therefore, has
several tasks during the E-Bidding advancement. The higher the number of Bidders the more overloaded is
the crier.
This work will develop a model of Intelligent E-Bidding System (IEBS) in order to automate the E-
Bidding System and, especially the role of decision-maker exercised by the crier, providing, therefore,
greater autonomy to the E-Bidding to operate more efficiently and speedily, and with greater transparency in
the process.
The IEBS is based on techniques of Artificial Intelligence, in the paradigm of intelligent agents, i.e., it is
oriented to intelligent agents. The main intelligent agents of IEBS are Crier Agent and Bidder Agent. These
agents have a knowledge base containing the rules (knowledge of the Crier and Bidder) for the
implementation of an E-Bidding.

2. INTELLIGENT E-BIDDING SYSTEM (IEBS)


This section depicts the model of the Intelligent E-Bidding System (IEBS), which was developed to automate
the steps of the current model of E-Bidding Systems.
As a summary, the execution of an E-Bidding involves the task of a Crier that follows all the stages (or
life cycle) of the E-Bidding, where the Human Crier needs to observe, examine and manually judge all
Proposals and Bids offered by the Bidder (the user that represents the company). All knowledge of the steps
required in the conducting of an E-Bidding is based on laws of this type of Bidding. Essentially, the edict
provides rules and conditions for Bidders participation, on how to make Proposals and Bids - what is in the
laws - judgment of proposals, qualification, attachments (with objective description of the objects of Bidding,
and the spreadsheet cost when required), statements required to participate in the process and the term of
reference.
The IEBS is a new proposed model of E-Bidding based on a Multi-Agent Society that performs the goals
of the system. The overall goals of the system were divided into stages that represent the specific objectives
of the agents. The Intelligent Agents, that are leading the steps of proposals and bids for an E-Bidding, use

62
IADIS International Conference e-Commerce 2009

their own knowledge stored in their knowledge bases to achieve their goals. So, with the development of this
new model, the E-Bidding System may have greater autonomy, without any human intervention, except
during the feeding of the knowledge bases, i.e., the transfer of knowledge of how to conduct a session for the
Crier and Bidder Artificial Agents.
However, modeling the knowledge needed to perform an E-Bidding is not trivial. One way to qualify
Crier Agent and Bidder Agent with the knowledge to conduct an E-Bidding is to extract information from the
edict carefully and also get the knowledge of an E-Bidding human expert.
Below is detailed the Multi-Agent Society that makes up the IEBS.

2.1 Multi-Agent Society of IEBS


The Society of Intelligent Agents to perform the steps of IEBS is composed of three types of agents, two
cognitive (Crier and Bidder) and a reactive (Knowledge Acquisition Agent). Each intelligent agent of the
IEBS fulfills his work through the definition of Behavior. Below are defined the roles of the following
agents: Bidder, Crier and Acquisition of Knowledge.
• The Bidder Agent (BA) represents companies that participate in the Electronic Bidding. Its tasks are:
9 Request registration to the Crier in each Bidding.
9 Submit Proposals with reference values for the items it want to compete.
9 Submit Bids during the public session.
• The Crier Agent (CA) represents the Crier (government) in the negotiation, in order to:
9 Manage the registrations in the Bidding, keeping record of all agents interested in participating
of the Bidding.
9 Receive and store the Proposals of each Bidder.
9 Receive, analyze and store, in the shared database, the bids offered by agents Bidders.
• Announce and formalize, at the end of the public Bidding session, the official winner.
• The Knowledge Acquisition Agent (KAA):
9 It will be constantly waiting for messages from the environment with the intermediation of the
jadeGateway agent. The content of the message are the rules and standards of the session that was provided
by the crier or bidder.
9 It will convert the contents of a message, received from the Gateway Agent, to knowledge in
the JESS and then send a message representing the knowledge in JESS to the Crier Agent or Bidder Agent.
For the IEBS modeling, the following use cases were defined in the topics bellow:

2.1.1 Opening of the Edict – Feeding of the Knowledge Base


In the current model of E-Bidding the composition and elaboration of the edict is essential. This is because it
is a document that formalizes and sets rules and standards of an E-Bidding and describes the object that will
be negotiated.
However, in this new model of the E-bidding, the edict needs special care in its preparation, since in the
IEBS, the intelligent agents rely on knowledge established in the edict for the E-Bidding conduction.
After approval of the edict, the Crier and his team provide to the system the rules (knowledge) of how the
session will be conducted. Subsequently, the Crier Agent and the Knowledge Acquisition Agent are
instantiated. So, declared the opening of edict, the Bidders Companies interested to participate in the E-
Bidding can already sign up.
As explained earlier, the edict contains all the knowledge required to perform an E-Bidding. Therefore,
for each Crier Agent, there will be knowledge base "supply".
The definition and opening of the edict is one of the most important use cases of IEBS, representing the
first stage of the life cycle of E-Bidding.
This use case is also the only human intervention (referring to the Crier Agent) during the process. After
the implementation there is a Crier Agent for that session, which will lead the whole process of autonomous
E-Bidding.
It is important to note that all interaction between users and the system is mediated by KAA. This agent
captures the data provided by the user in the graphical interface, through an intermediary agent and inserts

63
ISBN: 978-972-8924-89-8 © 2009 IADIS

them in the knowledge base of the Crier Agent. Therefore, there is a need for two interfaces agents, one into
which the user feeds the knowledge base and the other is the interface mediator agent.
2.1.2 E-Bidding Registration
In the moment of system execution the Bidder Agents are instantiated and associated/registered in a session.
Its knowledge base is "fueled" by the representatives of the company and will be composed of the necessary
knowledge to help the agent to decide (or assist in the decision of the company) the best Bid to be offered.
After the confirmation of registration in the E-Bidding, Bidders Agents are instantiated in the system and
belong exclusively to the E-Bidding they have been registered to. In the next stage of IEBS implementation,
when the whole process of E-Bidding (since the edict until the contract) is conducted by autonomous agents
with minimal human intervention, the process of associating the Bidder Agents to the specific E-Bidding is
done automatically: the own, driven by corporate interests they represent, require registration in the Bidding.
Such E-Biddings, when registered in the system, will be available through a service similar to yellow pages,
to all the agents who compose the society.
It is also characterized as an auxiliary use case for the IEBS (Proposals and Bids Evaluation) module
projected to be implemented, once in the complete system, the stage of registration of Bidder Agent will be
given at the time of the company's registration in the system, and the inclusion of this agent in any E-Bidding
occurs autonomously and at different times of the process. This is not the only human intervention on the
performance of this agent, as its base of knowledge will possibly update (according to the changes in the
interests of the company).
2.1.3 Proposals Making
Is the use case that represents the second moment of execution of the agents (the first time the Bidder Agents
are registered in the E-Bidding) in which Bidder Agents (following the Proposals Negotiation Protocol to be
explained next) send messages containing the data of its Proposal to the Crier Agent. Therefore, the
Proposals aim at legitimizing the E-Bidding process and encouraging lower prices from the beginning,
increasing competition. Thus, the intention is actually preparing the framework for the main part which is the
stage of Bids. After the Bidder’s registration in the E-Bidding, the initial Proposals related to E-Bidding
items the agent wishes to participate in are sent by the own.
2.1.4 Proposals Evaluation
The Crier Agent receives the proposals sent by the participants, then, analyzes (or judges) its acceptability.
To review the acceptability of the Proposals, the Crier Agent consults its knowledge base in search of the
trial requirements stipulated in the edict.
2.1.5 Bids Making
Is the use case that emerges in the third time agents execution (third step of the Bids and Proposals
Evaluation Stage), which contains the main interaction between agents. At this stage the Bidder Agents may
offer Bid for a period of time, previously specified in the edict. After this period there is a winner of the
session (the one who proposed the lowest bid).
All bids are evaluated by the Crier Agent based on criteria defined in the law or edict. The following sub-
item describes such use case.
2.1.6 Bids Evaluation
The Crier Agent will manage the Bids and make available to all, through a shared database, information
about the offered Bids: Bid and reference to the Bidder that offered it. The reference is a method of ensuring
that the process occurs in a transparent way, in which the name of the company is not disclosed until the
event is finished. Finally, the Crier Agent officially announces the winner of the event.

3. IEBS PROTOTYPE
This chapter describes the IEBS implementation, emphasizing how the Intelligent Agents operate in E-
Bidding steps. Thus, in the agents development the JADE (Java Agent Development Framework) platform

64
IADIS International Conference e-Commerce 2009

(JADE, 2008) and the Jess inference engine (Java Expert System Shell) (JESS, 2008) were used. JADE
provides ready libraries, the environment, implementation and graphical tools for managing the agent
society; thus facilitating the development of these agents. The JESS enables the agents with the capacity to
infer, because it defines a set of rules that act on a Knowledge Base. Intelligent Agents operate in IEBS using
negotiation protocols.
The architecture of the IEBS, as shown in Figure 1, is composed by the Crier Agent (CA), Bidder Agent
(BA) - with their knowledge bases - and Knowledge Acquisition Agent (KAA), which appears as an
auxiliary agent, being responsible for the construction knowledge base of the Crier Agents and Bidder
Agents, capturing the knowledge provided via web interface. In this society there is a shared database (with
information about the Bids offered in the edict), to which all agents will have access (will be able to read),
but only the Crier Agent will be able to edit.

Figure 1. IEBS Architecture


The Crier and the Bidder have a web interface to supply the knowledge base. It was necessary to use a
Proxy Agent, here called JadeGateway (agent whose implementation is provided with the JADE framework),
to establish communication between the external environment (web interface) and the Agents Society. This
integration was necessary to establish communication with the Agent Society, because IEBS is a Web-Based
E-Bidding System. Then, the data provided in the web interface are captured by the Proxy Agent who then
sends to KAA. It gets the message and converts the information into JESS rules and encapsulates them into
an object and finally sends it to the Crier Agent or Bidder Agent that inserts it in their knowledge base
invoking its method. The Database (DB) is a table of the system that is shared by all users. Its goal is to
record every Bid.
In this prototype, project details of foreign agent systems, such as the user interfaces, integration with
other systems, are separated from its implementation, focusing to limit the IEBS implementation to the
agents operations and interactions, etc.

3.1 Interaction Protocols between the Agents


IEBS agents will exchange messages to achieve their goals. The negotiation protocol will be used. In this
case, the problem of tasks assignment will be solved by induction of the coordinator and the actors to follow
a sequence of messages, where the initiator is the coordinator and the participant is the actor. This message
sequence is known as a negotiation protocol.
Several common situations can be conducted by the adoption of pattern interaction protocols, such as
auction, registration to receive notifications, negotiations and so on. Such protocols are specified by FIPA
(Foundation for Intelligent Physical Agents) and JADE (Java Agent Development Framework, used in the
project of Multi-Agent Society) implements them offering classes that easy the programmer’s work by
reducing the overload caused by the need for checking the flow of messages when two or more agents
interact following an interaction protocol. These classes provide return methods that should be redefined by
the programmer through the insertion of logic associated to the specific domain.

65
ISBN: 978-972-8924-89-8 © 2009 IADIS

3.2 IEBS Utilized Protocols


Among the protocols specified by FIPA and implemented by JADE, three are compatible and adaptable
Among the protocols specified by FIPA and implemented by JADE, three are compatible and adaptable to
the reality of E-Bidding and the implementation of Proposals and Bids Evaluation Stage. They are called
adaptive because its methods can be overwritten with the required logic. These methods are implemented
according to the occurrence of events (events like the arrival, deadline timeout etc). The protocols are the
following:
3.2.1 Registration Protocols
Adapted from FIPA-Request protocol (implemented in the AchieveREInitiator and ArchieveREResponder
classes).
In this protocol, the interaction between actors is initiated by the Bidder Agent, responsible for sending
messages to the Crier Agent, telling of his participation in the E-Bidding. Another message is returned by the
Crier Agent informing the refusal of registration and its justification. The absence of a return message is
treated as success in the application. A new interaction between the agents is started in case the Bidder Agent
wants to try again to inform the Crier Agent about his registration. More details about the flow of messages
are given in the figure 2 below:

Figure 2. Messages Flow

3.2.2 Proposal Protocol


Adapted from protocol FIPA-Propose (ProposeInitiator and ProposeResponder classes implemented in the
framework JADE).
For the Proposals Evaluation was implemented the Proposals Protocol, used by the Bidder Agent which is
responsible for the interaction initiation, by sending message with details of the Proposal to the Crier Agent.
In response, the Crier Agent can return a message denying the Proposal (and the reasons for refusal) or not
return any message, which indicates the acceptance of the Proposal, as seen in the figure 3 below:

66
IADIS International Conference e-Commerce 2009

Figure 3. Messages Flow

3.2.3 Bid Protocol


Adapted from FIPA-Contract-Net protocol (implemented in the ContractNetInitiator and
ContractNetResponder classes, present in the JADE framework).
In the third moment of agent performance, in which occurs the transmission and evaluation of Bids and
when the Bid Protocol is used, the Crier Agent is responsible for initiating the protocol by sending messages
to all Bidders Agents able to participate in public session. These messages are of CFP (call for Proposals or
request for Proposals) type and indicate the opening of E-Bidding Bids. The following messages from the
Bidder Agents, still in the same protocol, will be composed by Bids offered by each one. When receiving the
Bids, the Crier Agent evaluates and returns a message in case of refusal (justifying it) or returns none, what
will be understood as the acceptance of Bid. More details are given in figure 4 below:

Figure 4. Messages Flow

4. CONCLUSION
In the current E-Bidding Systems panorama there is still overload in Human Crier work . Therefore, the main
contribution of this work was the development of a model called IEBS system as to automate the stages of
the E-Bidding.
The IEBS has the following advantages: i) simple architecture, easy understanding and implementation,
ii) knowledge of the Crier will be separated and represented with production rules in its Knowledge Base, iii)
ability to infer; iv) interaction protocols were defined for the Proposals and Bids stage.
Therefore, this system will facilitate the task of the Crier in conducting and monitoring all E-Bidding and
thus reduce the Crier’s overload of activities.

67
ISBN: 978-972-8924-89-8 © 2009 IADIS

It is extremely difficult and delicate to define the Knowledge Base of the Human Crier because there is no
standard model of edict to be followed. However, the knowledge for the accomplishment of a session is tied
to the edict and laws.
The IEBS can still be improved working specifically on the Knowledge Base of Crier Agents and Bidder
Agents. In the future, it will be possible to turn them more independent so that they may lead all stages of the
process, even independently of the entities they represent.

REFERENCES
ARAÚJO, Antonio da Silva. 2007. Economia das Compras governamentais em decorrência do pregão Eletrônico - uma
abordagem econométrica. Dissertação (Mestrado em Economia) – Universidade Federal do Ceará. Fortaleza.
BECK, K. and Ralph, J. 1994. Patterns Generates Architectures. Proceedings of European Conference of Object-
Oriented Programming. Bologna, Italy, pp. 139-149.
CUNHA, Rafael S. 2009. Proposta de Desenvolvimento de um Sistema Inteligente de Pregão Eletrônico Baseado no
Sistema ICS de Comércio Eletrônico: Uma abordagem descritiva. Monografia - Universidade Estadual do Maranhão,
São luis, Brasil.
ESTATÍSTICAS DE COMÉRCIO ELETRÔNICO NO BRASIL. Disponível em: http://e-commerce.org.br/stats.php
Acesso em: 23/12/2008.
FONSECA, Luis Carlos et al. 2003 ICS – An Agent Mediated E-Commerce System: Ontology Usage. In: International
Conference on Enterprise Information Systems. Angers. Proceedings of the 5th International Conference on
Enterprise Information Systems.
FONSECA, Luís Carlos Costa. 2003. Sistemas Multiagentes para Negociação no Ambiente ICS de Comércio Eletrônico.
Dissertação (Mestrado em Ciência da Computação) – Curso de Pós-Graduação em Engenharia de Eletricidade,
Universidade Federal do Maranhão, São Luís, Brasil.
JADE – Java Agent Development Framework. Disponível em: < http://jade.tilab.com/ >. Acessado em 14 nov. 2009.
JESS – Java Expert Shell System. Disponível em: < http://jade.tilab.com/ >. Acessado em 6 out. 2009.
LABIDI, Sofiane et al. 2007. Negotiation Model of the ICS Enviroment. In: Third International Workshop on Data
Engineering Issues in E-Commerce and Services, 2007, San Diego, CA. DEECS.
MEIRELLES, Hely Lopes. 2005. Direito Administrativo Brasileir., 30. ed. São Paulo: Malheiros Editores.
NOLETO, Walter D. C. 2007. Pregão Presencial e Eletrônico: Análise do Instituto com enfoque em alguns Pontos
Polêmicos. Monografia – Curso de Pós-graduação Lato Sensu em Direito Uniplac. Brasilia.
FÜCHTER, Simone Keller. 2004. Adaptive Fuzzy Approach to Estimate Supplier’s Competitiveness in Open e-Bidding.
In: IEEE International Conference on Ecommerce, Beijing, China.
TOMAZ, Ricardo et al. 2004. Composition of Web Services in the ICS Architecture. In: 6 th International Conference on
Enterprise Information Systems, Porto. ICEIS-2004 Proceedings.
TRINTA, Valeska Rogéria Vieira. 2007. Modelagem do Agente de Contrato Eletrônico da Fase de Formação de
Contratos no Sistema de Comércio Inteligente (ICS) Considerando a Lei Modelo sobre Comércio Eletrônico.
Dissertação (Mestrado em Ciência da Computação) – Curso de Pós-Graduação em Engenharia de Eletricidade,
Universidade Federal do Maranhão, São Luis, Brasil.

68
IADIS International Conference e-Commerce 2009

AN APROACH FOR SEMANTIC-BASED EC


MIDDLEWARE

Ejub Kajan
High School of Applied Studies
Filipa Filipovica 20, Vranje, Serbia

Leonid Stoimenov
Faculty of Electronic Engineering
Beogradska 14, Nis, Serbia

ABSTRACT
In this paper we are introducing an advanced architectural framework for open interactions between e-business
applications. After short analysis of the requirements there is an overview of the related work elsewhere. Finally, our
approach, named as B2BOOM, is described. Concluding remarks emphasize the importance of such semantic based
approach and give future directions.

KEYWORDS
Electronic commerce, interoperability, middleware, ontologies.

1. INTRODUCTION
The idea to build a distributed open network capable of exchanging business data was born in the middle
1980s. Despite good reasons, this initiative, known as EDI (Electronic Data Interchange), failed due to its
robust specification, expensive implementation and therefore limited number of participants. Next attempt,
known as dotcom era, has also failed because too many companies stayed out again (e.g. most of SMEs).
After disillusionment and failure analysis, new expansion of EC (Electronic Commerce) is taking place,
especially in the form of B2B (Business-to Business).
There are huge number of difficulties and barriers in achieving full potential of EC. Many of them are
caused by a big heterogeneity between business processes, supported applications and associated data at one
side and different hardware, operating systems, database systems, network infrastructure, etc. at the other
side (Ng et al., 2000; Dogac and Cingil, 2001; Omelayenko and Fensel, 2001; Medjahed et al., 2003; Kajan,
2004; Kajan and Stoimenov, 2005; Hepp, 2006). This heterogeneity is the source of syntactic and semantic
conflicts at all interoperability layers (Stoimenov et al., 2006) and especially on data and process layers
(Kajan 2004). The general approach for solving heterogeneity problems is to define a common template, a
framework, here a B2B framework capable to solve B2B heterogeneity in order to achieve business processes
communication on demand despite of applications and technologies used by business entities (here and after
be).
This paper deals with semantic conflicts in B2B communications and it is organized as follows. The
second section analyses common and specific causes of semantic conflicts. The section three is dedicated to
related work in the area of solving these conflicts. Section four gives a general overview of the proposed
B2BOOM middleware architecture and detailed description of approach applied to solve semantic
heterogeneity on the data and process layer of business process communications.

69
ISBN: 978-972-8924-89-8 © 2009 IADIS

2. CONFLICTS ARE EVERYWHERE


If two business entities are going to establish a business relationship on demand they will be faced with one
or more (that is more likely to occur) of the following possible conflicts:
• Data conflicts - in data itself and/or data schemas,
• Document conflicts - in document names, organization of their contents, etc,
• Conflicts between their business protocols – in different structure, timing and scenario of a protocol.
Data conflicts are not particularly specific for EC field only. They appear as the main obstacle in any area
where interoperability between two peers is required and they are on the research focus for years (Kim and
Seo, 1991; Shet and Kashyap, 1992; Goh et al, 1999; Wache et al, 2001). At the data level, the different
representation and interpretation of the same or similar data (e.g. expressions, units and precision) are very
common (Kim and Seo, 1991). At the schema level various conflicts such those between names, entity
identifiers, schema isomorphism, or many other schema discrepancies may be found (Sheth and Kashyap,
1992).
Two types of naming conflicts are widely recognized, synonyms and homonyms, both coming from
inconsistent assigning names to schema elements. When the same concepts such are entity relations or their
attributes are described by different names it goes to appearance of synonyms. For example, if there are few
business entities whose databases use different names for clients, e.g. customer, buyer, consumer, etc. the
data interoperability between each of them may be very difficult, and may lead to the “Tower of Babel”.
Homonyms appear when two schemas use the same name for two different concepts. For example one
database may use the name “Name” for business partners, whilst in the other database it is assigned for
merchandise.
Entity identifiers cause conflicts when different primary keys are assigned to the same concepts in
different data bases. For example, one data base may use an unique tax identifier as a primary key for a
“Buyer”, whilst the other data base it may be organized as an attribute pair (e.g., Buyer name, address). When
the same concepts are described by different set of attributes they arise to schema isomorphism conflicts.
When the same real object has represented by two different concepts in two schemas then type conflicts
appear, e.g. a bank account may be assigned in one schema as an entity type, whilst in another schema it may
appear as attribute. Cardinality conflicts arise by different rules used by different business entities, thus the
relationships between objects may have different extreme values.
The common semantic conflicts described above appear in business data also, but there are also specific
conflicts that may occur between business data. There are several reasons for this including, but not limited
to, different document names, different document structure, document elements and their representation, etc.
(Guo, 2006). But these conflicts are not yield to the end of the interoperability problems. As we moving to
the upper layer of a business communication where business processes try to establish a business scenario,
the number of conflicts is unpredictable. At this layer there is not standardized business terminology, there
are not common acceptable grammar as well as dialog protocols. An analytical research (Zhao, 2005) gives
an overview of such heterogeneity between four frameworks on a simple business process “Order”. This
simple example shows too much discrepancy between these “orders” in their atomic transactions, including
but not limited to their names, number, sequencing, etc. In reality, there are more then four frameworks in
use and much more business processes. These differences make business entities unable to establish
collaboration between their business processes.

3. RELATED WORK
On the way from a single computer to a distributed global network, computers were going to be more and
more loose and distant. With the growth of loosely-coupled computers, the desire for data integration as well
as for process interoperability has also grown. At the same time the required semantic that may satisfy
integration requirements has getting stronger, as shown in Table 1.

70
IADIS International Conference e-Commerce 2009

Table 1. Relationships between required semantics and coupling with enabling technologies and frameworks.
Computing environment Coupling Required semantics Enabling technologies Frameworks
Single system Very high Very low Any commercial DBMS Appropriate for a
or file system system
LAN High Low Same DBMS Appropriate for
LAN
Business entity Medium-low Medium-high FDBMS, DW, Datamarts, RPC-based,
RPC, XML, WS,… CORBA, EJB,
DCOM, MOM,
Workflows, .WS-
based.
Not yet completely
solved
B2B community Low-very low High-very high XML, WS,… ebXML, RosettaNet,
Integrated vendor
solutions (.NET,
SuneOne, etc…)
Not yet completely
solved
The whole Internet Extremely low Extremely high XML, WS, RDF, RDFS, SESA
OWL, OWL-S, agents, Under development
future Intelligent Web
technologies

At the first sight it looks like that some standard document and data format may be used to solve these
interoperability problems. During the years many middleware technologies and standard frameworks were
developed in order to meet interoperability inside business entities and between them, as shown in table 1.
An overview of these technologies, their strengths and weaknesses, and comparative analysis can be found
elsewhere (Dogac and Cingil, 2001; Medjahed et al, 2003; Kajan and Stoimenov, 2005). Table 1 shows
which of these technologies and frameworks may be used to solve interoperability requirements in different
computing environments (in terms of coupling and semantic).
In the meantime many “standardized” product catalogs have been proposed and deployed (Schmitz et al,
2005). These standards make additional interoperability problems as well as many classification schemas in
use (Hepp et al, 2005). At the process layer situation is similar, where more than thirty reference process
models exist (Fettke, et al, 2005), resulting with a number of mutually incompatible “Orders” as described in
previous section.
Business processes interoperability is one of the hot research topics today. It is focused around two axes;
one is based on Web services (Austin et al, 2004) and the other on the Semantic Web technologies. These
include analysis of potential of service technologies (Kreger, 2003; Petrie and Bussler, 2003; Kajan, 2004;
Bui and Gachet, 2005; Kajan and Stoimenov, 2005; Papazoglou and den Heuvel, 2007), semantically enabled
service-oriented architectures (SESA) (Patil et al, 2004; Haselwanter et al, 2006; Shafiq et al, 2007; Vitvar et
al, 2007), and modeling of choreography components for business processes harmonization according to their
structure and timing (Papazoglou, 2003; Staab, 2003; Cimpian and Mocan 2005; Svirkas et al, 2006; Ye et al,
2006).
There are also several research prototypes of ontology-based general-purpose middleware. Examples
include, but not limited to: BUSTER (Viser, 2004), CREAM (Park and Ram, 2004), OBSERVER (Mena et
al, 2000), ORHIDEA (Stoimenov et al, 2006), etc. None of them do address either Web services or the
problems of process choreography. The most completed effort to define an ontology-based middleware
which takes care about above issues is WSMX (W3C, 2005).
WSMX (Web Services Modeling Execution Environment) allows discovering, selection, mediation,
invocation and mutual work of semantic Web services. The WSMX consists of a number of pairs
(wrapper/interface) each of which is specialized for a specific task. These tasks include communications,
resources, discovering and selection of Web services, data mediation, process mediation, and finally Web
services choreography and orchestration. In order to solve semantic conflicts mentioned in section two,
WSMX uses four types of mediators (OO, GG, WG, and WW), where O, G and W stands for ontology, goals
and Web services, respectively.

71
ISBN: 978-972-8924-89-8 © 2009 IADIS

4. B2BOOM FRAMEWORK
This section briefly described the B2BOOM (Business-to-Business Ontology-Oriented Middleware)
architecture that is based on semantic brokers that use hybrid mediation in order to solve semantic conflicts
between business data and processes.

4.1 Architectural Overview


B2BOOM consists of several loosely-coupled software components with well-defined interfaces, the heart of
which is pair of semantic brokers (data and process mediators), as shown in Fig.1.

Figure1. The simplified view of B2BOOM architecture

Table 2. Core components of B2BOOM framework.


B2BOOM component Role
Business entities be B2B applications that belong to autonomous companies and or applications
that act inside a B2B community.
Domain-oriented data sources Business databases or their parts publicly available inside the community.
They include both, data and public parts of business processes.
B2B ProcessWrappers Transform local data about processes and their schemas into the process
model used by ProcessBrokers.
B2B ProcessBrokers Semantic mediators used to integrate a number of independent processes
bridging semantic differences among them and to arrange appropriate
choreography between their atomic public transactions.
B2B DataWrappers Transform local data and their schemas into the data model used by
DataBrokers.
B2B DataBrokers Semantic data mediators used to integrate a number of independent
information sources bridging semantic differences among them.
B2B Shared server Common server that consist meta-knowledge of the B2B community and
that also serves as security and administration server for the community.

The core components of B2BOOM mediation at the content layer are DataBrokers. Basically, B2B
DataBroker is an ORHIDEA mediator (Stoimenov et al, 2006) extended with P2P connection with relevant
process broker and by WSMO (a part of WSMX repository) listener. Instead of relevant data broker, the
relevant B2B ProcessBroker is responsible for B2B DataBroker initialization. Therefore, the broker register

72
IADIS International Conference e-Commerce 2009

holds data about B2B ProcessBrokers in a community. There is ability to update this register statically or
dynamically.
DBM (DataBroker Manager) is a key component responsible for all communications inside the Broker
and with relevant ProcessBrokers and DataWrappers. Using the Data Translator, DBM fetches data from
B2B ProcessBroker and calls the Wrapper Finder to find which of the DataWrappers is responsible for local
data source.
The Wrapper Register is a table consisting of data about available DataWrappers, their identification and
access mechanisms. It is loaded and updated either by system administrator or, on case of that Data Wrappers
are publicized as Web services, via UDDI. Data Translator is responsible for communication with B2B
ProcessBrokers. It fetches semantically conflict data from ProcessBrokers and after semantic processing
returns these data to relevant business process via the same ProcessBroker. Information about ProcessBrokers
in a B2B community (identification, address, access protocols, etc.) is hold by the ProcessBroker Register.
This register, initially empty, is dynamically loaded by events. Data about all B2B ProcessBrokers in a B2B
community is available in a special UDDI register.
Semantic conflicts are solving by Rule Manger and Ontology Manager. Both components use the
Knowledge Base consisting of dictionary, thesaurus, and semantic rules as well as metadata about reference
model. Rule Manager communicates with Ontology Manager and Knowledge Base and also has a decision
mechanism used for rules interpretation from Knowledge Base. In case that rules are not precisely as required
or in case that they are not obvious, Rule Manager have an access mechanism for the domain expert who has
the possibility to fine tune the rules or, if necessary, to add new rules.
B2B Data Manager correlates between ontologies and reference model. It allows access to metadata and
makes mappings between concepts from ontologies and classes from reference model.
Finally, WSMO listener is listening to WSMO objects via WSMX resource manager (RM) component,
and in relevance to its DataBroker needs, fetches the links to any of the required WSMO objects regardless
that are Web services, goals, ontologies or mediators. And vice versa, WSMX RM may register into WSMO
mediators a B2BOOM DataBroker. In that way B2BOOM may be an autonomous part of some WSMX
cluster.
The architecture of the semantic part of B2B ProcessBroker is similar. The main difference is the
reference process model instead of data model.
Choreography module of the B2B ProcessBroker is strictly limited to six possible scenarios as follows:
(0) there are not choreography conflicts, skip it; (1) divide process into two sub-processes; (2) concatenate
two processes into one; (3) exchange the order between two; (4) cancel one of the processes for a moment;
(5) mediation impossible, cancel all, reset to initial state.
Choreographies of all public processes are stored in a dedicated registry on shared server together with
conversation id that is used to assign business entities with their public processes. That id is later used by
choreography module to choose the most appropriate scenario, as mentioned before, for a given conversation.

4.2 Solving Semantic Conflicts


Hybrid ontology approach (see Fig. 2a) uses three types of semantic mappings between concepts from two
local ontologies: (1) direct semantic relationships between two ontologies: (2) indirect semantic relationships
across top-level ontology; and (3) semantic mappings across reference common model.
At the process layer, at the moment, step 3 has skipped, because we have not defined any appropriate
reference ontology yet. At the data layer we used BMECat (Schmitz et al, 2004) as the reference ontology, a
part of which is shown in Fig. 2b.
Such approach implicates several prerequisites for the functionality of B2B community, especially that
local data ontologies and local process ontologies for every process used by business entities should exist. If
business entities are not bring them the B2B shared server engages the relevant broker to find missing
ontologies somewhere else (e.g. in the WSMX repository of ontologies). The second request is an agreement
between business entities that are participating in the community on shared components, data and public
processes.

73
ISBN: 978-972-8924-89-8 © 2009 IADIS

Figure 2a. Hybrid ontology approach Figure 2b. A part of BMEcat reference ontology
Semantic mediation is taking place as shown in Fig. 3. All coordination is upon the ProcessBroker. It
takes ontological instance from ben, extracts relevant data and sends them, if necessary, to DataBroker for
semantic alignment. After data are semantically adjusted, ProcessBroker solves semantic conflicts between
process data and makes necessary choreography steps (as explained in section 4.1) for particular ontological
instance. Such a “micro-message” is then sending to bek together with the address of ben, that is retransmit it
to ben. The loop is repeated until all ontological instances residing in the public process do not pass. If any of
the mediators failed on any step, the error message is generated, sent to both business entities,
communication is ending, while business processes in both entities are going to be reset in the initial state.

Figure 3. Semantic mediation in B2BOOM

74
IADIS International Conference e-Commerce 2009

5. CONCLUSION
The goal of the proposed open architecture is to develop reference architecture for any B2B community and
any business entity for use, refine and later implement regardless of any kind of business, business model or
number of participants.
The concept shown is not completely tested in real environment. The core components of data mediation
have been implemented and deployed; the others are still under development and must be tested in both,
experimental and real environments. At the moment three important components are under investigation, the
reference process model, user interface for domain expert, and choreography module testing.
There are also the other milestone activities that should be done in order to fully deployment of such
complex architecture. These include the development and deployment of the security plane.

ACKNOWLEDGEMENT
A part of this research has been supported by the Ministry of Science of the Republic of Serbia.

REFERENCES
Austin, D. et al. (Eds). 2004. Web Services Architecture Requirements. http://www.w3.org/TR/2004/NOTE-wsa-reqs-
20040211
Bui T. and Gachet A. 2005. Web services for negotiation and bargaining in electronic markets: Design requirements and
implementation framework. In Proceedings of 38th HICSS, Hawaii.
Cimpian E. and Mocan A. WSMX Process Mediation Based on Choreographies, 1st Int’l WS on Web Services
Choreography and Orchestration for BPM, Nancy, France,
Dogac A. and Cingil I. 2001. A survey and comparison of business-to-business E-commerce frameworks“, ACM
SIGecom Exchanges, vol. 2, no. 2, pp. 16-27.
Fettke P. et al. 2005. Business Process Reference Models: Survey and Classification. Proceedings of the BPRM
Workshop, Nancy, France, pp. 469–483.
Goh C. et al, 1999. Context Interchange: New Features and Formalism for Intelligent Information Integration. ACM
Transactions of Information Systems. Vol. 17, No. 3, pp. 270–293.
Haselwanter T. et al. 2006. Dynamic B2B Integration on the Semantic Web Services. In SWS Challenge Phase 2, Budva,
Montenegro.
Hepp M. et al, 2005. A Quantitative Analysis of ECl@ss, UNSPSC, eOTD, and RNTD: Content, Coverage and
Maintenance. Proceedings of IEEE ICEBE, Beijing, China, pp. 527–581.
Hepp M. 2006. The True Complexity of Product Representation in the Semantic Web. Proceedings of ECIS’06,
Gothenburg, Sweden.
Kajan E. 2004. The Maturity of Open Systems for B2B“, ACM SIGecom Exchanges, vol. 5, no. 2, 2004, pp. 34-44.
Kajan E. Stoimenov L. Toward an ontology-driven architectural framework for B2B. Communications of the ACM, vol.
48, No. 12, 2005, pp. 60-66.
Kim W. and Seo J. 1991. Classifying Schematic and Data Heterogeneity in Multidatabase Systems. , IEEE Computer,
vol. 24, No. 12, pp. 12-18.
Kreger H. 2003. Fulfilling the Web Services Promise. Communication of the ACM, Vol. 48, No 6, pp. 29–34.
Medjahed B. et al. 2003.Business-to-business interactions and enabling technologies, The VLDB journal, Vol. 12, pp. 59-
85.
Mena E. et al. 2000. OBSERVER: An Approach for Query Processing in Global Information Systems based on
Interoperation Across Pre-existing Ontologies. Distributed and Parallel Databases, Vol. 8, No. 2, pp. 223-272.
Omelayenko B. and Fensel D. 2001. An Analysis of B2B Catalogue Integration Problem: Content and Document
Integration, Proceedings of ICEIS’01, Setubal, Portugal.
Papazoglou M. 2003. Web Services and Business Transactions. World Wide Web: Internet and Web Information Systems.
6, pp. 49–91.
Papazoglou M. and den Heuvel W-J. 2007. Service oriented architectures: approaches, technologies and research issues.
The VLDB Journal, 16, pp. 389–415.

75
ISBN: 978-972-8924-89-8 © 2009 IADIS

Park J and Ram S. 2004. Information Systems Interoperability: What lies beneath? ACM Transactions on Information
Systems, Vol. 22, No. 4. pp. 9-21.
Patil A., Oundakar S., Sheth A. and Verma K. 2004. METEOR-S Web Service Annotation Framework. Proceeding of
ACM WWW’2004. New York, NY, pp. 553–562.
Petrie C. and Bussler C. 2003. Service Agents and Virtual Enterprises: A survey. IEEE Intelligent Systems, July/August
2003, pp. 68-78.
Schmitz, V, et al. 2004. XML-Based Data Exchange of Product Model in E-Procumerent and E-Sales: The case of
BMEcat 2.0. Proceedings of PETE04, Copenhagen, Denmark, pp. 97-107.
Schmitz V. et al. 2005 Do e-catalog standards support advanced processes in B2B e-commerce? Findings from the
CEN/ISSS workshop eCAT. Proceedings of the 38th HICSS, Hawaii, pp. 1–10.
Shafiq O. Zaremba M. and Fensel D. 2007. On communication and coordination issues of Semantic Web Services.
Proceedings of ICWIS 2007.
Sheth A. and Kashyap V. 1992. So far (schematically), yet so near (semantically). Proceedings of IFIP WG2.6 Database
Semantics Conference on Interoperable Database Systems, Lorne, Australia, pp. 283-312.
Staab S. 2003. Web Services: Been There, Done That? IEEE Intelligent Systems. January/February 2003. pp. 72–85.
Stoimenov L., Kajan E. and Djordjevic-Kajan S. 2006. Ontology-Driven Semantic Interoperability. International Review
of Computers and Software, Vol. 1, No. 2. pp. 132-136.
Svirkas A., Roberts B. and Vilson M. 2006. Peer-to-Peer Business Communities: Mapping Public Coreography Protocols
to Individual Implementation Mechanisms. Proceedings of IADIS E-commerce, Barcelona, Spain, pp. 226-233.
Visser U. 2004. General Approach of Buster, LNCS 3159, Springer-Verlag.
Vitvar T. et al. 2007. Semantic SOA to Promote Integration of Heterogeneous B2B Services., Proceedings of IEEE CEC-
EEEE 2007.
Wache H. et al, 2001. Ontology-Based Integration of Information — A Survey of Existing Approaches. Proceedings of
IJCAI-01 Workshop. Seattle, WA, pp. 108–117.
Ye C., Cheung S. and Chan W. 2006. Publishing and composition of Atomicity-equivalent Services for B2B
Collaboration. Proceedings of ACM ISCE, Shanghai, China, pp. 351–360.
W3C, 2005. http://www.w3.org/Submission/WSMX/
W.K. Ng W.K. Yan K.G and Lim E. 2000. Heterogeneous Product Description in Electronic Commerce. ACM SIGecom
Exchanges, Vol. 1, No. 1, pp. 7-13.
Zhao Y. 2005. Develop the Ontology for Internet Commerce by Reusing Existing Standards. Proceedings of SWAFT’05,
Nara, Japan, pp. 51-57.

76
IADIS International Conference e-Commerce 2009

SMART SHOPPING SPACES: CONNECTING MERCHANTS


AND CONSUMERS BY INNOVATIVE ONLINE
MARKETPLACES

Peter Leitner and Thomas Grechenig


Research Group for Industrial Software
Vienna University of Technology
Wiedner Hauptstraße 76, 1040 Vienna, Austria

ABSTRACT
Accelerated by the big success of leading social web services like Facebook, Flickr, Twitter or YouTube and the request
of exciting features through the web community, a new genre of innovative online marketplaces has evolved over the last
years. Smart Shopping Spaces provide a unique shopping experience characterized by strong collaboration and social
interaction between merchants and consumers. Conventional online shops are gradually updated with innovative
shopping features or become fully substituted by new e-shopping concepts, like Fruugo, MyDeco, Threadless or Vente
Privée. This paper presents a trendsetting model for Smart Shopping Spaces based on analyzed best practice elements,
functionalities and interactions. The designed model combines components of social networking, online shopping and
social commerce services. An extended research on 300 individual services out of these three categories was performed
to achieve a broad overview. Relevant research results, significant showcases as well as the creation process and an
explanation of the model are presented. The framework illustrated in the final part serves as basis for both researchers and
developers of future Smart Shopping Spaces.

KEYWORDS
Smart Shopping Space, Innovative Online Marketplace, Merchant, Consumer, Social Commerce.

1. INTRODUCTION
In the age of social web masses of users collaborate, communicate and interact online using innovative
services and platforms. Driven by new concepts, technologies and features the web has become more social
and interconnected. Social networks like Facebook, social media services like Flickr or YouTube and micro
blogging services like Twitter are popular examples of this genre, which strongly changed the web. O`Reilly
(2005) summed it up by the buzzword “Web 2.0” and many other wrote about the phenomenon of social web
and the wisdom of crowds (Surowiecki, 2004; Howe, 2006). Nowadays every user is an active part of that
sphere and can easily become an author, publisher or media distributor (McLure Wasko and Faraj, 2000).
Reasons for that phenomenon beside technological innovations and new concepts are the strong increase of
internet population worldwide, higher internet bandwidths and the rapid distribution of electronic user
devices and gadgets like mobile phones or digital cameras. For example actual data of Facebook show that it
currently has about 200 million active users with about 850 million photos and 8 million uploaded videos
each month. An average user has 120 friends on the site and about the half of all users log on to Facebook at
least once each day.
Accelerated by the big success of leading social web services like Facebook, Flickr, Twitter or YouTube
and the request of exciting features through the web community a new genre of innovative online
marketplaces evolved over the last years. In consequence of social networks’ market power and their mass of
potential customers, new B2C and C2C shopping concepts (Schubert and Ginsburg, 2000; Füller et al., 2006)
are being developed. Also the request of the web community and consumers for more participation and
transparency is a driving factor of these new concepts. Literature (Buskens, 2002, Koivumäki et al., 2002;
Kim and Srivastava, 2007) and specific user surveys (Lorenzo et al., 2007; The Nielsen Company, 2007)
clearly outline that potential customers of a product attach more importance to recommendations and ratings

77
ISBN: 978-972-8924-89-8 © 2009 IADIS

of other users than to classical product descriptions and advertisements. Smart Shopping Spaces are
providing such a unique shopping experience characterized by strong collaboration and social interaction
between merchants and consumers. Conventional online shops are gradually updated with innovative
shopping features or become fully substituted by new e-shopping concepts, like Fruugo, a promising
Scandinavian startup which launched its social shopping platform a few weeks ago in the second quarter of
2009. MyDeco, an already successful startup founded 2007 in the UK, is a collaborative interior design
network where rooms can be styled in 3D, designs can be shared with other users, and finally they can buy
the products and furniture over included home stores. Currently MyDeco has about 770 home stores with
more than 3.8 million items. Also Threadless is a pioneer with a Smart Shopping Space concept and changed
the t-shirt print business in an impressive way. The basic idea of Threadless is crowdsourcing, as it counters
on the increasing heterogeneity of needs by putting the consumers actively into the value added chain. Every
user can submit his own print design, the community decides and finally provide product photos through the
platform. Another interesting online clothing store concept is Vente Privée, a company founded in France
with several spin-offs in other countries. Vente Privée is the pioneer of online shopping clubs, where only
exclusive members can buy cheap designer fashion and other products after an invitation of another member.
Currently Vente Privée has about 7 million members in Europe and sold 28 million products with revenue of
510 million Euro in 2008. Only in France there are over 50 copycats of that successful business model. These
examples exemplify the rise and success of Smart Shopping Spaces, even though we are just on the
beginning of this era of new online shopping concepts. As a consequence, the time of monotony in online
retail is a thing of the past. More and more merchants and service developers are launching such new
shopping models, and smart shopping features will become a must-have for every shop owner in near future
(Burt and Sparks, 2003; Machado, 2005). To enable next generation shopping, new social software service
models are necessary to meet the demands of innovative merchants and contemporary consumers.
This paper presents a trendsetting model for Smart Shopping Spaces based on analyzed best practice
interactions, functions and components. The designed model combines elements of social networking, online
shopping and social commerce services. An extended research on 300 individual services out of these three
categories was done to gain fundamental insights. The following section provides related work, mostly
concentrating on academic research and basic literature. Section 3 outlines the methodological approach we
defined for our work. In section 4 we present relevant research results and significant showcases of our
analyses. Section 5 shows the creation process and an explanation of the Smart Shopping Space model. We
finally present a conclusion in section 6 and outline future directions of research in the final section.

2. RELATED WORK
Basic literature about Web 2.0 (O'Reilly, 2005; Mikroyannidis, 2007; Chi, 2008) and innovative social web
services (Abel et al., 2007; Ankolekar et al., 2008) as well as special publications pointing out sociological
and critical aspects (Dron and Bhattacharya, 2007; Riedl, 2008; Yesilada and Harper, 2008) provide an
overview on current internet evolutions. Especially Surowiecki (2004) analyzed the wisdom of crowds, an
aggregation of information in groups, resulting in decisions that are often better than any decision of a single
member of the group. Also crowdsourcing is a neologism, which was defined by Howe (2006) and describes,
contrary to outsourcing, the outsourcing to the intelligence and the manpower of voluntary staff on the
internet. The phenomenon of social networking and its driving are topic of related literature (Backstrom et
al., 2006; Kumar et al., 2006). Particularly Boyd and Ellison (2007) illustrated the global history and impact
of social networks.
Despite of significant interest in academic circles, as represented in various blog posts (Tedeschi, 2006;
Rubel, 2006; Beisel, 2006), little academic research has been done in the field of future Smart Shopping
Spaces to date. Work we published recently introduces social commerce (Leitner and Grechenig, 2007) and
includes earlier research on social shopping services (Leitner and Grechenig, 2009). To create our Smart
Shopping Space model, we discussed different related work in the field of electronic commerce (Treese and
Stewart, 2002; Meng et al., 2004; Moreno et al., 2004; Yang and Mamadou, 2006), community design
(Sanderson, 1997; O'Day et al. 1998; Pipek, 1999; Kim, 2000; Andrews, 2002; Krieger and Müller, 2003;
Breslin et al., 2005) and specific social features and interactive web elements (Yamamoto et al., 2005;
Michaelides and Kehoe, 2007; Miyoshi et al. 2007; Szomszor et al., 2008).

78
IADIS International Conference e-Commerce 2009

3. METHODOLOGICAL APPROACH
Subsequent to fundamental review of related literature and work we defined a structured methodological
approach (Figure 1) to design an innovative model for Smart Shopping Spaces connecting merchants and
consumers. Based on a conceptual knowledge of social software services, especially for social commerce, we
concretized the main research question to have a strong focus during the different stages of our work. Beside
the question on recent components, functionalities and interactions of a modern Smart Shopping Space, we
were also interested in future trends and used revenue models in the field of social shopping in general.

Figure 1. Structured Methodological Approach

3.1 Selection and Classification


To gather insights into relevant components, functionalities and interactions for the Smart Shopping Space
model, we categorized related services. Additionally we identified three basic genres of services which are
significant for the design of our model. As described in the introduction, a Smart Shopping Space combines
the advantages of social networks and online shops under consideration of interactive social commerce
features. Thus, we targeted conventional social networking services and online shopping services, as well as
social commerce services to conduct our survey.
For every of the three service categories we selected 100 services to start extended analyses. The process
of selection was performed in an analogous manner for all of the three categories. We collected services from
all around the world from well known online resources and web lists like Crunchbase.com, Mashable.com, or
Web2List.com. Sorting out services in an early beta stage from our initial list, criteria for the selection were
technological maturity, a critical mass of users and a minimum of complexity of the services. Out of the rest
we took a random sample of 100 services. So we got a new list of 300 different services which changed
partially to an initial list of previous research (Leitner and Grechenig, 2009) and separated them into three
different categories to conduct next steps of research.

79
ISBN: 978-972-8924-89-8 © 2009 IADIS

3.2 Evaluation and Summaries


To evaluate selected services, a structured spreadsheet (Figure 1) for each service category was created.
Based on a specified metric, every service was analyzed, rated and described. Beside some comparable meta
data (e.g. year of foundation, location, market orientation, multilingualism etc.), standardized qualitative
assessment criteria (e.g. actuality, content, design, functionality, usability) and several feature-related criteria
(e.g. profiles, blogs, groups etc.) were defined for each of the three different categories. Qualitative criteria
were rated with numbers ranging from 1 to 5, whereas a 5 was the best. Feature-related criteria have been
considered with “yes” or “no”. Concrete criteria and results are presented in the analyses section in this
paper. After the definition of the metric, services were screened and evaluated. To give a better presentation,
we transferred the results of the performed evaluation to a standardized case summary collection, including
one page for every analyzed service. Additionally we included a short written description and two
screenshots of every observed service on each page. A case book with 300 pages divided in three categories
including all services was the result of these steps and built the base for future research and development.

3.3 Analysis and Insights


After evaluation of all services and summarization of gathered data in case summaries, we started a detailed
analysis (Figure 1) by creating rankings and charts. Main goal was the indication of applicable components
and functionalities of each different service category and their concrete percentage of usage. Furthermore we
analyzed the interactions between the components and external applications or third party services as well as
qualitative criteria. In a final step we documented all results and interpreted rankings and charts to provide an
informative basis for the following stages of development. Especially the frequency of usage in percent of
distinct components, functionalities and interactions was a significant source for the design process beside
other fundamental research on social software service concepts and functionalities, described in the related
work section of this paper.

3.4 Entities and Design


Before we started with the creation of the smart shopping space model, we grouped all identified components
and functionalities into three different parts, similar to the aforementioned service categories. Additionally
we defined a centric entity (consumers, products, merchants) for each part of our Smart Shopping Space
model. Based on every main entity, we started to build related sub entities, components and functionalities,
and finally we connected all elements trough interaction paths. The modular design of our shopping
community was an initial condition to assure its scalability and flexibility to integrate it into already existing
conventional e-shops or communities.

4. ANALYSES, RESULTS AND SHOWCASES


Three analyses of the initially identified service categories, social networking, online shopping and social
commerce, were done simultaneously in a similar way. The following part of this paper presents the analysis
design, the selected services and results focused on the top ten components and functionalities for each
investigated category by their percentage of usage. Additionally one significant showcase for each genre is
described to demonstrate relevant components and functions.

4.1 Analysis of Social Networking Services


Out of all collected conventional community and social networking services we took a random sample of 100
services (Figure 2) for a standardized evaluation. Beside elements (components, functionalities) and
qualitative criteria (actuality, content, design, features, usability) shown in the next section, analyzed criteria
were basic data like the year of foundation, market orientation, used revenue models, and multilingualism.

80
IADIS International Conference e-Commerce 2009

Figure 2. Elements and Qualitative Criteria of all Social Networking Services (n=100)
Results show that 34% of all social networks have multilingual services, 94% have a global orientation
and 24% are closed networks, meaning that a user needs an invitation from another person to join a social
networking service.
Elements and Qualitative Criteria: The analysis of 100 conventional social networks and communities
(Figure 2) outlines that all services (100%) are using customizable user profiles followed by photos (86%)
and groups (63%). 56% of all services are using blogs and 52% have integrated forums. 50% of all services
have integrated an event calendar and nearly the half video features (48%). About one third of all
investigated services are using widgets (31%). Music (17%) and application programming interfaces (10%)
to integrate external applications are not very commonly used. In general, most of the analyzed services offer
a standard setup with user profiles, photo galleries and forums or groups for communication. Qualitative
criteria show high actuality with an average value from 4.54 out of 5 and also values in a high range for
content (4.01), design (3.89), features (3.75) and usability (3.94).
Shwocase Xing.com: Xing is a business social networking service with more than 7 million registered
members worldwide. It was founded in August 2003, launched in November 2003. Xing offers the system as
well for closed communities, i.e. private clubs, academic clubs or corporate clubs with own access paths and
own interface designs. The platform serves as infrastructure for corporate groups, including Accenture, IBM,
McKinsey, and others. Premium groups are available for major global communities, from university and
corporate alumni groups to leading business magazines and multinational organizations. Xing is a competitor
of the American platform LinkedIn for social networking among businesses. The platform offers personal
profiles, groups, discussion forums, event coordination, and other common social community features. Users
can build their own profile and make business contacts or connections to other members. There is the
possibility to search for other users and to find new contacts or connections. Extended features are available
for premium members, who pay a monthly fee. Beside that membership fees Xing generates revenue from
onsite advertising.

4.2 Analysis of Online Shopping Services


To run an evaluation on conventional online shopping services, we selected 100 services (Figure 3) by a
random sample out of a large list of collected sites. The selected services belong to different market segments
like fashion, lifestyle, electronics or sports. We focused on components as well as functions and found out
that 29% of the selected objects have multilingual services, whereas only 27% have a global market. 21% of
all services are certified online shops.

81
ISBN: 978-972-8924-89-8 © 2009 IADIS

Figure 3. Elements and Qualitative Criteria of all Online Shopping Services (n=100)
Elements and Qualitative Criteria: Figure 3 shows the distribution of relevant elements of all 100
analyzed classic online shopping services. The analysis of selected online shops and B2C e-commerce
platforms (Figure 3) shows that almost all services (99%) are using photo features, followed by user logins
(94%) and onsite search functions (87%). 69% of all services integrated a newsletter feature. User-oriented
tools like product viewers and rating tools are implemented within 36% of all services. Blogs are integrated
on 20% of all services, 17% have implemented videos or multimedia components. Less than 10% of all
investigated shops are using forums (9%) and widgets (7%) for communication and syndication. Qualitative
criteria are between 3.12 and 4.49 out of maximum of 5, with high actuality and some feature optimization
potential.
Showcase Endless.com: Amazon launched Endless.com in response to customers' desires to shop a
destination dedicated to shoes and handbags in the year 2007. The Endless e-shop provides an enhanced
browsing experience for consumers. Shop visitors may search by category, color, size, brand, or price and
alternative views and innovative zoom technology allow a virtually touch of new shoes and handbags.
Consumers can navigate easily and quickly to make their choice. For example, if a shopper navigates to black
sandals, and chooses a product within that category, similar shoes are displayed above the product he is
looking at. Furthermore a customer is only one click away from details of the product which is a great time
saver. An exciting tool is the sliding price chooser. As opposed to selecting shoes from a predetermined price
range, consumers can actually set their own price points, by just sliding a bar on the product overview. The
modern and light design features are realized with innovative technologies and concepts like AJAX. Services
like free overnight shipping, free return shipping, price guarantee, and 365-day returns window are offered.
Another interesting point is that existing Amazon customers can sign-in using their Amazon.com account.
Within the web community there were many positive reactions based on the new shopping experience. Many
other new online shops were inspired by the core components, functions and views of Endless.com.

4.3 Analysis of Social Commerce Services


Similar to the previous analyses, we took a random sample of 100 social commerce services (Figure 4) for
our third evaluation. Beside core elements and qualitative criteria, we investigated the year of foundation,
market orientation, used revenue streams, and multilingualism. Results show that only 13% of all social
commerce services are multilingual, and 68% have a global market orientation.
Elements and Qualitative Criteria: The investigation of 100 innovative social commerce services
(Figure 4) outlines that the most used elements are member profiles (96%), photos (64%) and blogs (63%).

82
IADIS International Conference e-Commerce 2009

Figure 4. Elements and Qualitative Criteria of all Social Commerce Services (n=100)
Tags for marking products are used in 33% of all analyzed services. Useful collaboration and
communication elements like forums (31%) and groups (25%) are integrated as well as widgets (19%),
application programming interfaces (14%), videos (10%) and events (8%) within the analyzed services.
Qualitative criteria are all in the same range between 3.38 (actuality) and 3.72 (design) out of 5, much more
above the ones from conventional online shopping services.
Showcase MyDeco.com: is a collaborative interior design network where rooms can be styled in 3D and
the designs can be shared with other users. MyDeco was founded in February 2007, in London. Currently
there are about 40 employees. The user can directly access to resources of over 770 vendors and more than
3,8 million products. Users can build a 3D view of their flat via drag and drop, to visualize potential
purchases and views from different angles in advance. Besides a selection of furniture and accessories, which
can be bought as well, there is the possibility to select different colors, wallpapers and floors. To offer an
easier shopping experience, there is also the possibility to choose a complete configured adjustment including
the whole shopping list and a budget check. Personal designs can be saved and rated from the community
members. MyDeco offers some common community features like an own profile, personal data, blogs,
groups and the possibility to communicate with other members. MyDeco is not directly selling any of the
furniture, but instead works as an intermediary, taking a cut from every sale the site generates for its retail
partners. Furthermore the revenue is done by selling advertisement spaces on the website. And MyDeco has
an additional micro-affiliate model. Any small interior design business or an individual can upload a room
design. If someone takes a design of another member and purchases the items, the designer gets a provision.

5. MODEL FOR SMART SHOPPING SPACES

The model for Smart Shopping Spaces (Figure 5) was designed based on our research on components,
functions and interactions of all analyzed services, presented in the section before. Also relevant related third
party research regarding social networks (e.g. Backstrom et al., 2006; Kumar et al., 2006; Safar and Bin
Ghaith, 2006; Srivastava, 2006; Boyd and Ellison, 2007), community design (e.g. Sanderson, 1997; O'Day et
al. 1998; Pipek, 1999; Kim, 2000; Andrews, 2002; Krieger and Müller, 2003; Breslin et al., 2005; Skok,
2005), electronic commerce features (e.g. Treese and Stewart, 2002; Meng et al., 2004; Moreno et al., 2004;
Yang and Mamadou, 2006), as well as innovative social web elements (e.g. Yamamoto et al., 2005; Mor
Naaman et al., 2006; Bao et al., 2007; Michaelides and Kehoe, 2007; Miyoshi et al. 2007; Heymann et al.,

83
ISBN: 978-972-8924-89-8 © 2009 IADIS

2008; Szomszor et al., 2008) was considered during the design process. Smart in that context relates to the
generation of a new shopping experience for all consumers within a generic framework which can be either

Figure 5. Designed Model for Smart Shopping Spaces


used to build completely new services or to expand already existing projects, like conventional social
networks or online shops. Merchants and service developers should choose their combination of components,
functions and interactions with different complexity and granularity based on case-specific requirements.
Furthermore the model should be seen as a fundament to generate derivates or as an inspiration for new
concept designs. Describing the main business process of a Smart Shopping Space – consumers buy products
from merchants –, we defined the following three different main entities (Figure 5) for our model:
Consumers: Consumers are the centric entity of the social network part. It is similar to a user in a
conventional social network or community. After joining a Smart Shopping Space, the main consumer goals
are to interact and collaborate with others in a social way. That means to get advice from trusted individuals,
discuss about products, provide related media and probably find new friends online. Beside social interaction,
consumers use these platforms to find and finally purchase appropriate products.
Products: The products are the second main entity of our framework. In a fully integrated social
shopping community it connects the two other main entities by using modern social commerce components
and functions. Products have to be clearly categorized and sorted to allow fast access from both directions.
The application of tagging, rating and ranking concepts allows user-driven categorization and includes the
power of the whole community within one platform.

84
IADIS International Conference e-Commerce 2009

Merchants: Main goals of merchants, the third main entity of the model, within a Smart Shopping Space
are to address potential consumers with marketing campaigns and finally sell his products. The merchant,
being the central entity of the online shop part, is also responsible for delivering informative content about
products and to set them into the right context. To be successful, the vendor has to integrate himself within
the whole community like a conventional member. In an optimal way the merchant should collaborate and
interact continuously with other consumers to be an active participant.
After definition of the three main entities we clustered all identified components and functions of the
three analyses done before and positioned relevant ones as sub entities around the three main entities. Besides
integrating our own results, we tried to consider important research and aspects presented in the related work
section of this paper. The outcome was a simplistic model structure (Figure 5) with three main parts. Around
the consumer we built a social networking part, because of its similarity to classic social networks. The
online shopping part around the merchant includes main e-shop components and functions. And finally the
connecting part between the two other parts is the social commerce part, which is the most innovative part of
the model because of an integration of many social web features. Finally we connected all elements with
interaction paths to demonstrate their relation. This interaction model clearly shows the complexity of a fully
integrated social shopping community. Essential elements of each part are described below.

5.1 Social Networking Part


Consumers will join a Smart Shopping Space due to campaigns, the invitation of a friend, a search result of a
price comparison engine. After joining the consumer can customize his own profile, run a blog or create his
own product wish lists, which are shared with other members on the platform. Users of Smart Shopping
Spaces arrange themselves in different groups and find friends or other users with similar interests. All
members of a group have the possibility to discuss on products or other related topics. Most of the
components and functions are similar to a conventional social network. It is also possible to include premium
features for special user groups.

5.2 Online Shopping Part


The components and functions of the online shopping part allow merchants to start marketing campaigns to
target potential customers, use specific promotion tools and communicate newsletters. All products of a
vendor are part of his repository which can be managed and categorized over the backend. Furthermore a
merchant has a direct interface for his suppliers to update relevant product information and to provide a direct
link between a product and a supplier for consumers. A merchant may have a corporate blog to inform
consumers about relevant news.

5.3 Social Commerce Part


The social commerce part, connecting the social network and the online shopping part, includes the most
innovative components and functions of all parts. Consumers and merchants can use these product-related
features to collaborate and interact in a new way. Products can be tagged by members of the shopping
community to allow a user generated categorization. Consumers write recommendations or comments on
products, rate them and create rankings to show others their preferred products. Social media like interactive
photos or videos can be included by consumers or merchants. Question and answers about products or
shopping-related topics can be run consecutively between consumers and merchants. The whole collaborative
interaction cycle should be seen as a continuous process. After buying a specific product, the user will
recommend it within the community, share information with other users, and perhaps they will put it on their
wish list. For the whole framework an external connection with the system can be established via several
interfaces. Thus, the designed model can be opened for third party applications and as a consequence,
communication within the global web sphere is possible. For example, integrated Feeds which are driven by
RSS or Atom can be tracked in real time, or interactive product lists can be searched over product search
engines and other social web services. Integrated application programming interfaces should provide data
interchange with mashups (Leitner and Grechenig, 2008) and syndication with leading social web services.

85
ISBN: 978-972-8924-89-8 © 2009 IADIS

6. CONCLUSION
In the era of social web masses of users communicate, collaborate and interact online using innovative
services and platforms. Driven by new concepts, technologies and features the web has become more social
and interconnected. Forced by the huge success of leading social web services like Facebook, Flickr, Twitter
or YouTube and the request of exciting features through the consumer community, a new genre of innovative
online marketplaces has evolved over the last years. Such Smart Shopping Spaces provide a unique shopping
experience characterized by strong collaboration and social interaction between merchants and consumers.
Conventional online shops are gradually updated with innovative shopping features or become fully
substituted by new e-shopping concepts, like Fruugo, MyDeco, Threadless or Vente Privée. As outlined in
the introduction of this paper, consumers demand recommendations by other users and a direct conversation
and interaction with others. Smart Shopping Spaces are combining many of these new demands in one place,
allowing consumers to collaborate online, get advice from trusted individuals, find products and then
purchase them. Building a successful shopping platform requires a perfect combination of different elements
to meet the demands of merchants and consumers.
The illustrated Smart Shopping Space model in this paper was designed under consideration of best
practice functions, components and interactions of already existing web services. Structured research on
social networking, online shopping and social commerce services built a basic framework for the
development process of our model. For each of the three categories we took a random sample of 100 services
to gather significant information on the usage of distinct components, functions and interactions. The results
of each analysis led us to an illuminative ranking of all relevant elements. Results show that the distribution
of elements for social networking services is similar to the one of social commerce services, but clearly show
some significant differences like the intensified implementation of tags within the second group. Qualitative
criteria for actuality, content, design, features and usability show that social networking services have the
best average values, followed by social commerce services and conventional online shopping services. There
were also significant differences relating to the grade of global orientation and multilingualism between the
three different genres of analyzed web services.
By grouping all identified elements around three core entities (consumers, products and merchants) and
the inclusion of relevant third party research on community design, electronic commerce and social web
features, the three-part model was built. Subsequently we connected all entities, sub-entities and components
through interaction channels to demonstrate the coherences. The presented model can be used to build
innovative shopping concepts and services from two directions with different granularity. One scenario is to
upgrade an already existing conventional social network or online shop with smart features. Another scenario
is to create completely new shopping services or platforms up from scratch. Our general framework should
serve as fundamental basis for researchers, merchants and service developers of trendsetting marketplaces.

7. FUTURE WORK
As previously outlined, little academic research has been done on Smart Shopping Spaces and its usage up to
date. Future work should cover several important areas relating to such services. One essential research area
will be the impact of smart shopping features on consumer’s behavior, especially the influence on revenue of
a shop. So there have to be implemented tools and processes on existing e-shops and platforms to measure
the impacts. Another interesting area of research will be consumer experience tests on specific features and
mass user behavior to get better insights into usability issues of innovative shopping features and concepts.
On the technical side there is much potential for the optimization and integration of functionalities,
components and tools within the whole web sphere. For example there are currently no standards for the
syndication of product data, prices and other shop related data in a bigger context. That means it would be
interesting to design possible interfaces and information standards for better communication of different
platforms and global distribution of data. Our own future work will be to create different types of Smart
Shopping Spaces out of free open source online shop frameworks in combination with our designed model to
find the best set of features. In another research project we will cooperate with a leading online merchant to
optimize the existing platform by tracking usage data and user behavior.

86
IADIS International Conference e-Commerce 2009

REFERENCES
Abel, F., Frank, M., Henze, N., Krause, D., Plappert, D. and Siehndel, P., 2007. GroupMe! - Where Semantic Web Meets
Web 2.0. Proceedings of the 6th International Semantic Web Conference, 2nd Asian Semantic Web Conference,
ISWC 2007 + ASWC 2007, Busan, Korea, LNCS 4825, Springer, Berlin, pp. 871-878.
Andrews, D. C., 2002. Audience-specific online community design. Communications of the ACM, Volume 45, Issue 4,
ACM, New York, pp. 64-68.
Ankolekar, A., Krötzsch, M., Tran, T. and Vrandečić, D., 2008. The two cultures: Mashing up Web 2.0 and the Semantic
Web. Journal of Web Semantics: Science, Services and Agents on the World Wide Web, Volume 6, Issue 1, pp.70-75.
Backstrom, L., Huttenlocher, D., Kleinberg, J. and Lan, X., 2006. Group formation in large social networks:
Membership, growth, and evolution. Proceedings of 12th International Conference on Knowledge Discovery in Data
Mining, ACM Press, New York, pp. 44-54.
Bao, S., Xue, G., Wu, X., Yu, Y. and Su, Z., 2007. Optimizing Web Research Using Social Annotations. Proceedings of
the 16th International Conference on World Wide Web, Alberta, Canada, ACM Press, New York, pp. 501-510.
Beisel, D., 2006. The Emerging Field of Social Commerce and Social Shopping, http://www.genuinevc.com/archives/
2006/11/the_meaning_of_2.htm
Boyd, D. M. and Ellison, N. B., 2007. Social network sites: Definition, history, and scholarship. Journal of Computer-
Mediated Communication, 13(1), article 11. http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html
Breslin, J., Decker, S. and Harth, A., 2005. An Approach to connect Web Based Communities. Proceedings of IADIS
International Conference Web Based Communities 2005, Algarve, Portugal, pp. 272-275.
Burt, S. and Sparks, L., 2003. E-commerce and the retail process: a review. Journal of Retailing and Consumer Services,
Vol. 10, pp. 275-286.
Buskens, V., 2002. Social Networks and Trust, Springer, Berlin, Germany.
Chi, E. H., 2008. The Social Web: Research and Opportunities. Computer Journal, Volume 41, Issue 9, Palo Alto: IEEE
Computer Society, pp. 88-91.
Dron, J. and Bhattacharya, M., 2007. Lost in the Web 2.0 Jungle. Proceedings of the Seventh IEEE International
Conference on Advanced Learning Technologies 2007, Niigata, Japan, IEEE Computer Society, pp. 895-896.
Füller, J., Bartl, M., Ernst, H. and Mühlbacher H., 2006. Community based innovation: How to integrate members of
virtual communities into new product development. Electronic Commerce Research, Volume 6, No. 1, pp. 57-73.
Heymann, P., Ramage, D. and Garcia-Molina, H., 2008. Social Tag Prediction. Proceedings of the 31st annual
International ACM SIGIR Conference on Research and Development in Information Retrieval, Singapore, ACM
Press, New York, pp. 531-538.
Howe, J., 2006. The Rise of Crowdsouring, Wired Mag., USA, http://www.wired.com/wired/archive/14.06/crowds.html
Kim, A., 2000. Community Building on the Web: Secret Strategies for Successful Online Communities. Peachpit Press,
Berkeley, USA.
Kim, Y. A. and Srivastava, J., 2007. Impact of Social Influence in E-Commerce Decision Making. Proceedings of the
Ninth International Conference on Electronic Commerce, Minneapolis, MN, USA, August 19 - 22, 2007, ACM
Press, New York, pp. 293-302.
Koivumäki, T., Svento, R., Perttunen, J. and Oinas-Kukkonen, H., 2002. Consumer Choice Behavior and Electronic
Shopping Systems: A Theoretical Note. NETNOMICS Journal, Vol. 4, No. 2, pp. 131-144.
Krieger, B. L. and Müller, P. S., 2003. Making Internet Communites Work : Reflections on an Unusual Business Model.
ACM SIGMIS Database Journal, Volume 34, Issue 2, ACM Press, New York, pp. 50-59.
Kumar, R, Novak, J. and Tomkins, A., 2006. Structure and evolution of online social networks. Proceedings of 12th
International Conference on Knowledge Discovery in Data Mining, ACM Press, New York, pp. 611-617.
Leitner, P. and Grechenig, T., 2007. Next Generation Shopping: Case Study Research on Future E-Commerce Models,
Proceedings of the IADIS International Conference E-Commerce 2007, Algarve, Portugal, pp. 312-316.
Leitner, P. and Grechenig, T., 2008. Electronic Commerce Mashups: Combining Applications to Useful Services for
Shoppers. Proceedings of IADIS International Conference E-Commerce 2008, Amsterdam, Netherlands, pp. 260-264.
Leitner, P. and Grechenig, T., 2009. Scalable Social Software Services: Towards a Shopping Community Model Based
on Analyses of Established Web Service Components and Functions. Proceedings of the 42nd Annual Hawaii
International Conference on System Sciences 2009, Big Island, Hawaii, USA, p. 45, CD-ROM 10 pages.
Lorenzo, C., Constantinides, E., Geurts, P. and Gómez, M. A., 2007. Impact of Web Experience on E-Consumer
Responses. Proceedings of the 8th International Conference EC-Web 2007, LNCS 4655, Regensburg, Germany,
Springer, Berlin, pp. 191-200.
Machado, A., 2005. Drivers of Shopping Online: A Literature Review. Proceedings of IADIS International Conference e
Commerce 2005, Porto, Portugal, pp. 236-242.

87
ISBN: 978-972-8924-89-8 © 2009 IADIS

McLure Wasko, M. and Faraj, S., 2000. “It is what one does”: Why people participate and help others in electronic
communities in practice. Journal of Strategic Information Systems, No. 9, pp. 155-173.
Meng, B., Zhang, H. and Xiong, Q., 2004. Design and Implementation of a Business to Customer Electronic Commerce
System applying Web Technologies. Proceedings of IADIS International Conference e-Commerce 2004, Lisbon,
Portugal, pp. 527-532.
Michaelides, R. and Kehoe, D., 2007. Internet Communities and Open Innovation: an Information System Design
Methodology. Proceedings of the 6th IEEE/ACIS International Conference on Computer and Information Science
2007, Melbourne, Australia., IEEE Computer Society, pp. 769-775.
Mikroyannidis, A, 2007. Toward a Social Semantic Web. Computer Journal. Volume 40, Issue 11, IEEE Computer
Society, Leeds, pp. 113-115.
Miyoshi, Y. Kanenishi, K., Matsuura, K., Ide, R. and Yano, Y, 2007. A Proposal to extend Folksonomy based on Tags
and Links. Proceedings of the IADIS International Conference Web Based Communities 2007, Salamanca, Spain, pp.
389-392.
Mor Naaman, M., Boyd, D. and Davis, M., 2006. HT06, Tagging Paper, Taxonomy, Flickr, Academic Article, ToRead.
Proceedings of Hypertext 2006, ACM Press, New York, pp. 31-40.
Moreno Chaustre, J., Naranjo Cuervo, R., Sierra Martinez, L. and Mendoza Becerra, M., 2004. Building a Virtual E-
Commerce Community. Proceedings of IADIS International Conference e-Commerce 2004, Lisbon, Portugal, pp.
495-500.
O'Day, V. L., Bobrow, D. G. and Shirley, M., 1998. Network Community Design: A Social-Technical Design Circle.
Computer Supported Cooperative Work (CSCW) Journal, Volume 7, Numbers 3-4, Springer, pp. 315-337.
O'Reilly, T., 2005. What Is Web 2.0. Design Patterns and Business Models for the Next Generation of Software.
http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html
Pipek, V., 1999. Enabling for mass communication in community design. ACM SIGGROUP Bulletin, Volume 20, Issue
2, ACM Press, New York, pp. 13-15.
Riedl, J., 2008. Altruism, Selfishness, and Destructiveness on the Social Web. Proceedings of the 5th International
Conference AH 2008, LNCS 5149, Hannover, Germany, Springer, Berlin, pp. 9-11.
Rubel, S., 2006. Trends to Watch Part II: Social Commerce, http://www.micropersuasion.com/2005/12/2006_trends
_to_.html/
Safar, M. and Bin Ghaith, H., 2006. Friends Network. Proceedings of IADIS International Conference WWW/Internet
2006, Murcia, Spain, pp. 143-146.
Sanderson, D., 1997. Virtual communities, design metaphors, and systems to support community groups. ACM
SIGGROUP Bulletin, Volume 18, Issue 1, ACM Press, New York, pp. 44-46.
Schubert, P. and Ginsburg, M., 2000. Virtual Communities of Transaction: The Role of Personalization in Electronic
Commerce. Electronic Markets Journal, Volume 10, Number 1, pp. 45-55.
Skog, D., 2005. Social interaction in virtual communities: The significance of technology. International Journal of Web
Based Communities, 1 (4), pp. 464-474.
Srivastava, K., 2006. Communication-Based Social Networks. Proceedings of IADIS International Conference
WWW/Internet 2006, Murcia, Spain, pp. 273-280.
Surowiecki, J., 2004. The Wisdom of Crowds. Doubleday Publishing, New York, USA.
Szomszor, M., Cantador, I. and Alani, H., 2008. Correlating User Profiles from Multiple Folksonomies. Proceedings of
the Nineteenth ACM Conference on Hypertext and Hypermedia, Pittsburgh, USA, ACM Press, New York, pp. 33-42.
Tedeschi, B., 2006. Like Shopping? Social Networking? Try Social Shopping. New York Times E-Commerce Report,
published on September 11, 2006, http://www.nytimes.com/2006/09/11/technology/11ecom.html
The Nielsen Company, 2007. Nielsen Online Global Consumer Study April 2007, http://www.nielsenmedia.com/nc/
portal/site/Public/menuitem.55dc65b4a7d5adff3f65936147a062a0/?vgnextoid=e7cb07dd40b55110VgnVCM100000a
c0a260aRCRD
Treese, W. and Stewart, L., 2002. Designing Systems for Internet Commerce. 2nd ed. Addison-Wesley Professional,
Boston, USA.
Yamamoto, H., Ishida, K. and Ohta, T., 2005. Temptation and Contribution in C2C Transactions: Implications for
Designing Reputation Management Systems. Trusting Agents for Trusting Electronic Societies - Theory and
Applications in HCI and E-Commerce, LNCS 3577, Springer, Berlin, pp. 218-234.
Yang, K. and Mamadou, T., 2006. A Conceptual Framework for Semantic Web-Based eCommerce. Proceedings of
IADIS International Conference e-Commerce 2006, Barcelona, Spain, pp. 287-291.
Yesilada, Y., and Harper, S., 2008. Web 2.0 and the Semantic Web: Hindrance or Opportunity?. SIGACCESS
Accessibility and Computing Journal, Issue 90, ACM Press, New York, pp. 19-31.

88
IADIS International Conference e-Commerce 2009

FROM A RETAIL-BASED E-MICROPAYMENT PROGRAM


TO A MULTI-PURPOSE PROGRAM: WHICH CRITICAL
FACTORS ARE NEEDED FOR SUCH A
TRANSFORMATION?

Wee Kheng-Tan
Assistant Professor, Department of Information & Electronic Commerce,
Kainan University, No. 1, Kainan Road, Luchu, Taoyuan County, Taiwan

Yu-Jie Tan
Department of Information & Electronic Commerce, Kainan University, Kainan University,
No. 1, Kainan Road, Luchu, Taoyuan County, Taiwan

ABSTRACT
Micropayment is common in retail outlets and public transport system. Numerous electronic micropayment programs
have been introduced to reduce the need for users to carry cash. However, many such programs are not successful. Hence
there is a need to understand the critical factors which contribute to the success of e-micropayment programs. This study
used i-cash; an electronic wallet introduced and used in 7-Eleven, the largest convenience store chain in Taiwan, for such
an investigation. Furthermore, i-cash was used for an additional reason. With the recent regulatory relaxation; it is now
possible for i-cash to be transformed from a single purpose, retail-based e-micropayment to a multi-purpose one. Through
the Decision Making Trial and Evaluation Laboratory (DEMATEL) method, this study shows that network effect plays a
very important role in the success of e-micropayment system and is also instrumental in the transformation of a single-
purpose e-micropayment program to a multi-purpose one. The factors influencing the development of e-micropayment
programs are highly inter-related and in fact, re-enforce one another, leading to positive feedback and bandwagon effect.
It is found that factors such as reliability, more value-add locations, acceptance by merchants and users not only increase
the popularity of the system, they also affects and re-enforces other factors through a positive feedback loop.

KEYWORDS
i-cash; network effect; DEMATEL.

1. INTRODUCTION
Micropayment transaction is common in retail outlets and public transport system. The Bank for International
Settlements (2001) defines micropayment as a small payment which is uneconomical to process through
traditional payment such as credit card as the latter processing charge could exceed the value of the
micropayment itself. In order to make such payment, consumers need to use coins and cash, hence causing
inconvenience to them. Anticipating business opportunity, operators have introduced a number of smart-card
based e-micropayment programs around the world. However, with the exception of a few, such as the
Octopus Card of Hong Kong, many such programs are not successful. Hence, from the viewpoint of
academic researchers and practitioners, it is useful to determine the factors leading to the successful adoption
and diffusion of such programs.
i-cash, a popular contactless smart-card electronic wallet system for payment at the 7-Eleven convenience
store, is the subject of investigation in this paper. i-cash was launched in 2004 by the convenience store
operator to lock-in customer’s loyalty and to increase its sales volume since based on Japan's experience with
electronic card, cardholders would spend 10 percent to 15 percent more each time when using the card (Taipei
Times, 2007). Users of i-cash are given discount and bonus points when they use i-cash for their purchase.

89
ISBN: 978-972-8924-89-8 © 2009 IADIS

Operator of convenience store entering the e-micropayment business reflects the reality of the retail
structure of Taiwan. Taiwan has the highest density of convenience stores in the world (CENS.com, 2007a).
The island, with an area of 36,000 sq km, has 9,100 convenience stores in 2009 for a population of 23 million
(CENS.com, 2009a). 7-Eleven chain dominates with 4,900 stores (53.8%) and its operator, Uni-President
Group, is a major conglomerate in Taiwan and operates pharmacy chain store, bakery shops, Starbuck etc.
With most of the transactions in convenience stores being micropayment, it is not surprising that this major
convenience store chain joins the e-micropayment business. With close to five-million i-cash cards being in
use, it is Taiwan second-largest e-wallet product after EasyCard (Taipei Times, 2005; CENS.com, 2007b).
EasyCard, a contactless smart-card ticketing system for metro, buses and car parks in Taipei City and Taipei
County of Taiwan is widely used by the metro and public bus commuters in Taipei City and its neighborhood.
More than 15 million EasyCard have been issued (CENS.com, 2009b) and card users enjoy 20 per cent
discount on each metro trip.
Until recently, i-cash is a single-purpose e-micropayment program. It can only be used for retail-based
payment and extension of i-cash to include other non-retail micropayment transactions e.g. payments for
public transport, is restricted by Taiwan’s Banking Act. According to the Act, only banks are allowed to issue
cash storage cards with multiple functionalities (Taipei Times, 2006). Furthermore, given that it is introduced
by the operator of 7-Eleven, i-cash is predominantly used in 7-Eleven and some of the related retail outlets
owned or run by Uni-President. In January 2009, this regulatory restriction was relaxed and approved non-
financial institutions could now issue stored-value cards with multi-functionalities (Taipei Times, 2009).
This relaxation has now opened a window of opportunity for i-cash to broaden its scope of applications to
include other non-retail based micropayment transactions, i.e. transforming into a multi-purpose e-
micropayment program. However, it needs the blessing of consumers to be successful.
Given the success of i-cash, it is therefore a suitable candidate to study the critical factors that contribute to
the successful development of e-micropayment program. In addition, with i-cash now on the verge of
transforming into a multi-purpose program, it may be insightful to examine what are some of the factors which
can aid and speed up such a transformation. These factors could be inter-related and influenced one another,
hence this research used the Decision Making Trial and Evaluation Laboratory (DEMATEL) method to study
which factors are more important than the others and also to examine their inter-relationship. Furthermore, we
believe that even though we used i-cash as the subject of investigation, the results could be generalized to
other e-micropayment programs.

2. LITERATURE REVIEW
Smart Card Alliance named speed, convenience, able to track spending, security and benefits to consumers as
drivers of electronic payment system (Vanderhoof, 2007). Madhoushi and Mohebi (2004) listed security,
acceptability, convenience, cost, anonymity, control, traceability and control of encryption methods as
requirements of electronic payment. Researchers e.g. Linck, Pousttchi and Wiedemann (2006) were also
interested with security issues such as encryption and double spending. Hence, whether the electronic wallet
is reliable is of concern to everybody.
Coase (1937) initiated the idea of transaction cost which covered all the costs arising from conducting a
transaction (Williamson, 1985). From the viewpoint of transaction cost, Papaefstathiou and Manifavas (2004)
explained that since micropayment systems were used to purchase inexpensive items, it was vital to keep the
cost of individual transactions low. Time spent was also a component of transaction cost. Discount could
lower the overall cost of acquiring the service or good related to the payment.
Convenience is definitely important. Slawsky and Zafar (2005) mentioned that the primary causes for
failure of Mondex and other similar schemes were linked to its inability to offer the same level of
convenience that payment cards offered for mid-value transactions. Convenience could come in various
forms such as placing add-value kiosks in more locations for convenient adding of credit to the e-wallet;
allow cash, ATM transfer etc. to add credit to the e-wallet, easy to carry the e-wallet around not just in the
form of a card but also as part of accessory such as watch and mobile phone.
Technology Acceptance Model (TAM), including the extended forms (Davis, 1989; Davis, Bagozzi and
Warshaw, 1989; Venkatesh and Davis, 2000) is widely used to explore why users adopt various systems and
applications. One of the major measures of TAM is ease of use which is defined as "the degree to which a

90
IADIS International Conference e-Commerce 2009

person believes that using a particular system would be free from effort" (Davis, 1989).
Success of e-micropayment program depends to a large extent on the presence of network effect (also
called network externality). Network externality is defined as an increase in value of a product as the number
of users of that product increases (Katz and Shapiro, 1985). Associated with this concept is the idea of
networked goods. Networked goods have characteristics such as complementarities, switching cost, lock-in,
and economies of scale (Shy, 2001). Electronic payment program is an example of a networked good
(Baddeley, 2004) with its market being a two-sided market, both consumers and merchants subjecting to
network effects and facing the chicken and egg dilemma (See-To, Jaisingh and Tam, 2007).
One key characteristic which can contribute to network effect is the presence of a captive audience that
drives critical mass (Chakravorti, 2004). A program which is frequently used by the consumers will bring
about high transaction volume leading to economics of scale (Rochet and Tirole, 2003). Public transport
system is one good choice for e-micropayment program as it has the required captive audience. If these
consumers are concentrated in a small geographical region, chance of success will be even higher (Van Hove,
2004).
Launched in 1997, Hong Kong’s Octopus card has many of the above characteristics. The card has out-
performed other e-micropayment programs backed by international financial organizations (Westland et al.,
1997). Octopus card has the support of key transport companies (Poon and Chau, 2001). With more than 70
percent of Hong Kong residents using public transport everyday and concentrating in a small geographical
region, it has the captive market to achieve critical mass. Using contactless smart card, it is reliable and
completes transactions faster than cash as well as offers an automatic reload feature. It also offers
convenience and benefits to its users. Over 400 product and service providers (e.g. F&B and recreational
outlets, supermarket, and convenience stores), accept Octopus card.

3. RESEARCH METHOD - DEMATEL


Developed by the Battelle Memorial Institute of Geneva, Decision Making Trial and Evaluation Laboratory
(DEMATEL) is used to analyze the management problems of complex and inter-related relationship. It can
also convert the relationship between the causes and effects of factors into an intelligible structural model of
the system (Hung, Chou and Tzeng, 2006; Tzeng, Chiang and Li., 2007). DEMATEL method can be
summarized in the following steps:
Step 1: Find the average matrix. Suppose there are n factors to consider and there are H respondents in
this study. Each respondent is asked to state the degree he or she believes a factor i affects factor j through a
score ranging from 0 to 4, with 0 indicating ‘no influence’ and 4 indicating ‘very high influence’. We will get
H answer matrix where each answer matrix is an n x n matrix Xk with 1 ≤ k ≤ H. The initial direct relation
matrix A is obtained as below:
H
1
∑x
k
a ij = ij
(1)
H k =1
Step 2: Calculate the normalized initial direct-relation matrix D. The matrix D is obtained by normalizing
initial direct relation matrix A:
A
D= (2)
s
where
⎛ n n ⎞
s = max ⎜ max
⎜ 1≤i ≤ n ∑ a ij , max
1≤ j ≤ n
∑ a ij ⎟⎟ (3)
⎝ j =1 i =1 ⎠
Step 3: Calculate the total relation matrix T. A continuous decrease of the indrect effects of problem
along the powers of matrix D, e.g. D2, D3, ... , D∞ guarantees convergent solutions to the matrix inversion
similiar to an absorbing Markov chain matrix. The total relation matrix T is a n x n matrix and is defined as
follows:
T = D + D2 + … + Dm = D(I -D)-1 (4)

91
ISBN: 978-972-8924-89-8 © 2009 IADIS

as m → ∞ and I is a n x n identity matrix. The sum of rows r and the sum of columns c of the total
relation matrix T is obtained as follow:
⎛ n ⎞
r = [ri]nx1 = ⎜
⎜ ∑ t ij ⎟
⎟ (5)
⎝ j =1 ⎠ nx1
'
⎛ n ⎞
= ⎜ ∑ t ij ⎟
'
c= [cj] 1xn (6)
⎝ i =1 ⎠1xn
The sum ri + ci gives an index representing the total effects both given and received by factor i. The
difference ri-ci shows the net effect factor i contributes to the problem. If the difference ri-ci is positive,
factor i is a net causer, and when ri-ci is negative, factor i is a net receiver.
Step 4: Set the threshold value and draw the influence map.

4. SURVEY AND ANALYSIS


In order to find out the suitable factors for analysis, this research conducted literature review, interviewed
experts and the users of i-cash. Eleven factors were identified and chosen for DEMATEL analysis. They are:
- F1: low transaction cost;
- F2: discount;
- F3: ease of use;
- F4: appear in forms other than card format;
- F5: many value-add locations and methods;
- F6: reliable;
- F7: accepted by many transport-based companies;
- F8: accepted by many retail outlets;
- F9: accepted by many well-known, large scale corporations and organizations;
- F10: usable island-wide; and lastly
- F11: broad user base.
Survey method was used to solicit the opinion of users of i-cash in two areas. Firstly, they were asked to
write down the importance of each factor and also for each factor, the scope for improvement through a score
ranging from 1 to 5 with 1 indicating ‘little’ and 5 indicating ‘very’. Secondly, each respondent was asked to
state the degree he or she believed an factor i affects factor j through a score ranging from 0 to 4 with 0
indicating ‘no influence’ and 4 indicating ‘very high influence’.
The survey lasted for 1.5 month starting from January 15, 2009. A total of 63 valid returns were received,
37 (58.7%) of them were male and 44 (69.8%) were in the main age group of 20-30 year old. In addition, 45
(71.4%) of them received college and university education.

4.1 Importance and Scope for Improvement


The average importance score and the average score of scope for improvement of the 11 factors were 4.20
and 3.58 respectively (Figure. 1).
Five factors: discount, many value-add locations and methods, accepted by many retail outlets, usable
island-wide and lastly broad user base had importance and scope for improvement which were above or equal
to their respective average score. Two factors: accepted by many transport-based companies and lastly,
accepted by many well-known, large scale corporations and organizations had importance which was below
average in importance but with scope for improvement greater than its average score for scope for
improvement. Appear in forms other than card format had the lowest importance score and ease of use had
the lowest score of scope for improvement.

92
IADIS International Conference e-Commerce 2009

Figure 1. Score of Scope for Improvement Versus Importance Score

4.2 Relationship between Factors


The initial direct relation matrix A was first obtained and normalized to obtain the normalized initial direct-
relation matrix D. Total relation matrix T was obtained using (4). The sum of rows r and sum of columns c of
matrix T were then obtained, afterwhich the sum ri + ci and the difference ri-ci were calculated using (5) and
(6) with result as in Table 1.
Table 1. Sum of Rows (r), Sum of Columns (c), Sum (r + c) and Difference (r-c) of Matrix T
Factor r c r+ c r-c
F1: Low transaction cost 5.17 4.94 10.12 0.23
F2: Discount 4.83 4.90 9.73 -0.07
F3: Ease of use 5.31 5.44 10.75 -0.13
F4: Appear in forms other than card format 4.82 4.39 9.21 0.43
F5: Many value-add locations and methods 5.53 5.67 11.20 -0.14
F6: Reliable 5.21 5.50 10.71 -0.29
F7: Accepted by many transport-based companies 5.55 5.38 10.93 0.17
F8: Accepted by many retail outlets 5.47 5.28 10.75 0.20
F9: Accepted by many well-known, large scale corporations & organizations 5.46 5.31 10.77 0.15
F10: Usable island-wide 5.96 6.11 12.07 -0.14
F11: Broad user base 5.90 6.31 12.20 -0.41
It could be observed that the three factors with the highest ri+ci value: broad user base, usable island-wide
and lastly, many value-add locations and methods were all intimately related to the concept of network effect
and they also affected the causation relationship between the different factors. These 3 factors were also net
receivers with ri-ci being negative value. The top 3 net causer factors were appear in forms other than card
format, low transaction cost and accepted by many retail outlets. The top 4 net receiver were broad user base,
reliable, usable island-wide and lastly, many value-add locations and methods. Using 0.49, the average value
of the elements of matrix T, as the threshold value, the influence map was shown in Figure. 2.

93
ISBN: 978-972-8924-89-8 © 2009 IADIS

Figure 2. The Influence Map

4.3 Discussion
Viewing the above in totality and using i-cash as an illustration, e-micropayment system as a networked good
is evident. Furthermore, the opinion of the users at this juncture of i-cash’s transformation into a multi-
purpose card also provides many useful insights pertaining to the impact of some of these factors to the
transformation and their contribution to network effects.
When the influence map is examined in greater detail, we observe that many of the eleven factors
examined are inter-related and they re-enforce one another. As an example, getting more retail outlets to
accept i-cash is not an end itself, it also acts as an impetus and pushes more transport-related companies as
well as large-scale corporations and organizations to accept i-cash, which in turn their acceptance encourages
even more retail outlets and others to accept i-cash and so on. More users will be drawn in, and over time,
positive network effects can create bandwagon effect as the network becomes more valuable and causing
even more users to use i-cash, leading to a positive feedback loop. Furthermore, many of these factors, either
indirectly or directly, point ultimately towards two factors, usable island-wide and broad user base, which in
turn point back to many of these factors. This observation clearly shows that these factors re-enforce one
another, as more users and merchants fall within the ambit of i-cash, it will make the system stronger over
time. The five factors which the users feel are very important and need lot of improvement: discount, many
value-add locations and methods, accepted by many retail outlets, usable island-wide and lastly broad user
base are also intimately related to network effects.
The starting point and the initial purpose of the e-micropayment system will affect the perception of users
for some time to come. It also affects its transformation into a multi-purpose program. In this case, i-cash
starts off as a retail-related e-micropayment card. Even though there is a recent regulatory liberalization,
users still hold on to their perception that i-cash is meant for retail-related usage. Hence, the outcome where
users are of the opinion that acceptance by many retail outlets is more important than being accepted by
many transport-based companies arises. In addition, acceptance by retail outlets is also one of the top 3
causers (with the largest positive ri-ci value). However, acceptance by many transport-based companies,
well-known, large scale corporations and organizations having importance which are below average in
importance but with scope for improvement greater than its average score for scope for improvement serves
as an important and useful reminder for i-cash operator i.e. for i-cash to undergo a successful transformation
from a retail-based e-micropayment scheme to a multi-purpose scheme (like the Octopus Card of Hong
Kong), the operators must also get non-retail merchants and organizations to accept and endorse i-cash.

94
IADIS International Conference e-Commerce 2009

As expected, starting as a retail-related e-micropayment card, offering discount and bonus point when
using i-cash are important if not the only deciding critical factor of success. Enjoying discount and bonus
point when using i-cash sweeten the deals for users. However, the discount offered is often not given by the
card issuers but by the merchants themselves. Hence, the merchants must see good value in this e-wallet
whereby i-cash can bring in more customers and deals which otherwise may not be so forthcoming if the
merchants don’t accept i-cash. A big pool of i-cash users will thus be important and an incentive for
merchants to be aggressive in offering discount. One important point from this study and the influence map is
clear, i.e. discount will definitely contribute to the growth of user base and participating merchants.
Another factor which can contribute to the expansion of e-micropayment program is proof of being
reliable and is a well-tested system. Currently, i-cash is only used in 7-Eleven convenience stores and some
of the Uni-President’s related enterprises. It is not yet used in a scale which can closely match its closest rival,
EasyCard. Hence, from the analysis and influence map, it can be observed that i-cash needs to spend some
effort to prove it is very reliable. Besides expanding to more retail outlets and transport-related companies,
one important move is to get big and well-known companies and organizations, e.g. government departments,
to accept and endorse i-cash. Such acceptance will be read by the public that i-cash is very reliable, hence
allowing network effects to play the role it is supposed to do, leading to acceptance by more organizations,
being used island-wide and broadening its user base.
What are the lessons for the operator of i-cash? Users are of the opinion that the operator need to increase
the number of value-add locations and methods of value-add, offer discount, and attract more retail,
transport-related, and large corporations to accept i-cash. As indicated by the influence map, these factors re-
enforce one another, hence we may say it is a chicken and egg situation. The operator will have no choice but
to adopt a multi-pronged approach to tackle this issue so that it will achieve the ultimate objectives: broad
user base and island-wide usage. Having an existing captive market and good application with captive
audience property do help i-cash in its early stage of development. However, it needs to do much more to
have a successful transformation and earn the reputation that it is a very reliable system applicable to a wide
range of usage. A way to do so will be to attract large and well-known corporations and government
organizations to accept and endorse i-cash. It must also work out a deal with participating merchants so that
users will see financial benefits e.g. discount and bonus points when using i-cash to make payment and lower
the transaction cost of users as much as possible. Last but not least, the operator will have to launch a
marketing campaign to alter the perception of users and merchants that i-cash is only a retail-related e-
micropayment system if it wants to expand into other non retail-related functions quickly.

5. CONCLUSION
Through the DEMATEL method, this study shows that the factors influencing the development of e-
micropayment programs are highly inter-related and in fact, re-enforce one another, leading to network effect.
Through using i-cash as an illustration, an electronic wallet introduced and used in 7-Eleven, the largest
convenience store chain in Taiwan, we observe that factors such as reliability, more value-add locations,
acceptance by merchants and users not only increases the popularity of the system, it also affects and re-
enforce other factors through a positive feedback loop.

REFERENCES
Baddeley M., 2004. Using e-Cash in the New Economy: An Economic Analysis of Micropayment Systems. In Journal of
Electronic Commerce Research, Vol. 5, No. 4, pp. 239-253.
Bank for International Settlements, 2001. Electronic Finance: A New Perspective and Challenges. BIS Papers No 7.
CENS.com, 2007a. Taiwan’s Leading Convenience Chains Slow Down Expansion. Viewed 30 April, 2007,
<http://cens.com/cens/html/en/news/news_inner_18976.html>.
CENS.com, 2007b. E-wallet Catching on at Domestic Convenience Stores. Viewed 2 September, 2007,
<http://cens.com/cens/html/en/news/news_inner_20356.html>.
CENS.com, 2009a. Growth Slows for Taiwan Convenience Stores. Viewed 6 January, 2009,
<http://www.cens.com/cens/html/en/news/news_inner_25813.html>.

95
ISBN: 978-972-8924-89-8 © 2009 IADIS

CENS.com, 2009b. New Law Allows Issuance of E-Wallets by Non-Financial Institutions. Viewed 14 January, 2009,
<http://www.cens.com/cens/html/en/news/news_inner_26031.html>.
Chakravorti S., 2004. Why has Stored-value Not Caught On? In Journal of Financial Transformation, Vol. 12
(December), pp. 39-48.
Coase R., 1937. The Nature of the Firm. In Economica, Vol. 4, No. 16, pp. 386-405.
Davis F. D., 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. In
MIS Quarterly, Vol. 13, No. 3, pp. 319-340.
Davis F. D., Bagozzi R. P. and Warshaw P. R., 1989. User Acceptance of Computer Technology: A Comparison of Two
Theoretical Models. In Management Science, Vol. 35, No. 8, pp. 982-1003.
Hung Y. H., Chou S. C. T. and Tzeng G. H., 2006. Using a Fuzzy Group Decision Approach-knowledge Management
Adoption. APRU DLI 2006 Conference. University of Tokyo, Japan, 8–10 November.
Katz M. and Shapiro C., 1985. Network Externalities, Competition and Compatibility. In American Economic Review,
Vol. 75, No. 3, pp. 424-440.
Linck K., Pousttchi K. and Wiedemann D. G., 2006. Security Issues in Mobile Payment from the Customer Viewpoint.
Proceedings of the 14th European Conference on Information Systems (ECIS). Göteborg, Schweden, pp. 1-11.
Madhoushi M. and Mohebi E., 2004. Multi-analyses Electronic Payment System in Human Perspectives. In Internet
Society: Culture, Psychology and Gender, K. Morgan, C. A. Brebbia, J. Sanchez and A. Voiskounsky, Eds. WIT
Press, Southampton.
Papaefstathiou I. and Manifavas C., 2004. Evaluation of Micropayment Transaction Costs. In Journal of Electronic
Commerce Research, Vol. 5, No. 2, pp. 99-114.
Poon S. and Chau P., 2001. Octopus: The Growing e-payment System in Hong Kong. In Electronic Markets, Vol. 11,
No. 2, pp. 97–106.
Rochet J-C. and Tirole J., 2003. An Economic Analysis of the Determination of Interchange Fees in Payment Card
Systems. In Review of Network Economics, Vol. 2, No. 2, pp. 69–79.
See-To E., Jaisingh J. and Tam K. Y., 2007. Analysis of Electronic Micro-payment Market. In Journal of Electronic
Commerce Research, Vol. 8, No. 1, pp. 63-83.
Shy O., 2001. The Economics of Network Industries. Cambridge University Press, Cambridge, UK.
Slawsky J. and Zafar S., 2005. Developing and Managing a Successful Payment Cards Business. Gower, Hampshire.
Taipei Times, 2005. ‘President Chain to Expand icash Cards’, 8 Aug.
Taipei Times, 2006. ‘Announcing 3-in-1 EasyCard’, 18 July.
Taipei Times, 2007. ‘FamilyMart Puts Faith in e-wallet’, 5 Mar.
Taipei Times, 2009. ‘Expanded Use of Electronic Cards Gets Green Light’, 14 January.
Tzeng G. H., Chiang C. H. and Li C. W., 2007. Evaluating Intertwined Effects in e-learning Programs: A Novel Hybrid
MCDM Model Based on Factor Analysis and DEMATEL. In Expert Systems with Applications, Vol. 32, No. 4, pp.
1028–1044.
Van Hove L., 2004. Electronic Purses in Euroland: Why Do Penetration and Usage Rates Differ? In SUERF Studies, B.
Morten, Ed, Société Universitaire Européenne de Recherches Financières, Vienna, Austria.
Vanderhoof R., 2007. Contactless Payments: Delivering Merchant and Consumer Benefits. EPRG Contactless Forum,
Federal Reserve Bank of Boston.
Venkatesh V. and Davis F. D., 2000. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal
Field Studies. In Management Science, Vol. 46, No. 2, pp. 186–204.
Westland C., Kwok M., Shu T., Kwok T. and Ho H., 1997. Electronic Cash in Hong Kong. In Electronic Markets, Vol. 7,
No. 2, pp. 3-6.
Williamson O. E., 1985. The Economic Institutions of Capitalism: Firms, Markets, Relational Contracting. Free Press,
New York.

96
IADIS International Conference e-Commerce 2009

SITE PERSONALIZATION PROCESS BASED ON


NAVIGATIONAL BEHAVIOR AND FUZZY ONTOLOGY

Juliano Z. Blanco, Antonio Francisco do Prado


Computer Science Department – Federal University of São Carlos
Via Washington Luis, km 235, 13565-905- São Carlos

ABSTRACT
This article presents a process that uses the implicit information from navigational behavior and fuzzy ontology for sites
personalization according to the preferences of the users. These preferences are organized into profiles and provide the
basis of the personalization process, aiming the improvement of the services for the users. In this process not only the
history of navigation and preferences detected or expressed by the user are considered for personalization but also the
types of devices and networks used for communication, and even the content presented. The process stands out for
directing the architecture of the site to provide personalized services.

KEYWORDS
Personalization Site, User Navigational Behavior, Fuzzy Ontology, Profiles, Content Adaptation.

1. INTRODUCTION
The increase and diversification of content available on many sites and the strategies to deliver this content
more adequately contribute to the emergence of new personalization processes. These procedures aim to
improve the interaction of the user with the web content, favoring the access to the information of his
interest. Procedures of personalization provide to the site competitive advantage in relation with its
concurrents, creating new business opportunities through the recommendations of its content. In a market
where the search for excellence in service is increasingly growing, the obtainment of important information
about your customers, such as area of interest and how they do business, can be a key factor for the success
of the site.
Today, the use of cell phones, personal digital assistant, smart phones and other devices has increased
significantly and must be considered by the companies that offer their products and services on the sites.
Motivated by these ideas, this article presents a process to improve service for sites users, building their
architectures driven by content personalization. This process obtains the site architecture with a focus on
personalization of its content as the users’ preferences, their access and navigation devices, features of the
networks, and other information such as regional variations. For site architecture to be driven by
personalization, the process of building and updating the architecture must consider the continuous changes
on the preferences of their users, the devices, the access networks and the content of the site.

2. FUZZY ONTOLOGY AND PROFILES


This section provides an overview of the fuzzy ontology, used for knowledge elicitation and site domain
representation. It is also presented the profiles used to contextualize the personalization and the adaptation of
content, and applied in the process of personalization exposed.

97
ISBN: 978-972-8924-89-8 © 2009 IADIS

2.1 Fuzzy Ontology


According to Gruber (1993) [Gruber, 1993], an ontology is a specification of a conceptualization. Ontology
refers to an explicit description of concepts and relations of an domain application. There are several
languages to model ontology in the Semantic Web [Berners-Lee et al., 2001]. In this work it is used OWL-
DL because it has the assurance that its inferences are computable.
However, these ontologies only capture accurate or complete information. In personalization of sites there
are relationships between their users and contents that are not accurate, requiring mechanisms that allow the
representation of the degree in which these relationships occur (pertinence degree μ, between 0 and 1) for an
appropriate recommendation of these contents. In the SADP process it is used the Fuzzy Meta-Ontology for
representation of imprecise information available on the site and an Inference Module on Fuzzy Ontology
[Yaguinuma et al., 2007], called in this work as IMFO. The IMFO retrieves from the fuzzy ontology
information about the pertinence degree of the relationships between the contents, enabling the extent of the
recommendations to the users, according to their preferences.

2.2 Profiles
In personalized sites it shall be considered the differences between users, devices and access networks, to
enable the appropriately customization of contents. These differences are obtained analyzing the information
collected from the user access on the site, and are represented in profiles of: users; devices; access networks;
and content.
The User Profile is built based on fuzzy ontology models of the site and on the information collected
from users' navigation on the site. In SADP process, the main information collected to develop the profile of
the user are: date and time of access, user IP address, content accessed, total access time, number of
returnings to the same content and clicks made on the pages (clickstream).
The Device Profile defines the hardware and software features of the device used for access. It is created
from the identification of the browser used to access the sites. Thus, it is possible to collect the following
information from the device profile: brand, model, features of the device screen, memory capacity, and
formats of contents that can be displayed on this device.
For the Network Profile, the calculating time of sending a package to a user’s machine is used to identify
the network latency and the information of the Uniform Resource Locator (URL) to obtain the protocol used.
The Content Profile contains the features of the content request, expressed in the URL, as the format of
the content in WML, XML, HTML, among others.

3. SADP PROCESS COMPUTATIONAL SUPPORT


Two frameworks and three tools automatize a large part of the SADP process.
The UBICK framework [Santana et al., 2007] supports the activities of the content adaptation directed
to PCs to be displayed on mobile devices like cell phones, PDAs and others. This framework intercepts the
requests from users and makes the adjustments based on the device profiles, network and content.
The Jena framework [Carroll et al., 2004] supports the use of ontologies in OWL-DL with the rules
reasoning (Jena’s Rules). The inferences on the ontology are made by an inference machine (reasoner) of this
framework. In the SADP process this framework is used for consultations on the fuzzy ontology of the site.
The Tool Obtain Information of Site Access (TOISA) aims at obtaining implicitly information on the
user's access, without the perception or even the spent of time of the user. These information are used to
update the profiles. The Tool Treat Profiles (TTP) creates and updates the user profiles, device, network
and content, from information collected by TOISA. The Tool Personalize Site (TPS) is responsible for
personalizing and adapting the contents based on the profiles.

98
IADIS International Conference e-Commerce 2009

4. SADP PROCESS
The SADP process is divided into four activities: Develop Fuzzy Ontology, Obtain Information of Site
Access, Treat Profiles and Personalize Site. Figure 1 shows, in the Structured Analysis and Design Technique
(SADT) notation [Ross, 1977], the first activity of the process. In this activity the software engineer starts
from the information about the site domain, stored in the site database, and others information such as sales
reports and site access. Guided by fuzzy meta-ontology OWL-DL it develops a fuzzy ontology that
represents the site knowledge formalization based on fuzzy logic.
Site information are obtained from the data models of the products available on the site. Sales and access
to the site reports, for example, are also sources of information that can be used in the construction of
ontology. These and other details, such as the pertinence degrees of the relationships between the products,
are analyzed by a software engineer on the fuzzy ontology modeling. The OWL-DL orients the software
engineer in the modeling of products and their fuzzy relationships.

Fuzzy
Site domain Site Meta-Ontology 0.5 0.75
Information Database OWL-DL 0.8
0.3

Develop Fuzzy Ontology 0.95


Site Domain
Site sales and Fuzzy Ontology
access reports Soft. Eng.

Figure 1. SADP Process – Part 1


With the development of Fuzzy Ontology it is explicited and specified the following information from the
site products: product repurchase potential (RepurchasePotential), amount of information that a user must
know and consider before buying a product (ProductComplexity) and the fuzzy relationships between
products (pertinence degree). After the site fuzzy ontology was built, the process SADP continues with the
Obtain Information of Site Access, Treat Profiles and Personalize Site activities, as shown in Figure 2. These
activities are repeated in a cycle in each access of the user to the site.
In Activity Obtain Information of Site Access, first the software engineer installs TOISA on the site. A
reference to a remote script that uses the AJAX technology is added to the pages of the site [Garrett; James,
2005]. The TOISA uses this script to obtain implicit information of user’s access. When a user accesses the
site for the first time, it is assigned a unique identification (UserId) randomly created based on the
millisecond of the moment of his access. This identification is stored in a cookie (file stored on the user's
machine, which contains information exchanged between the server and the web browser) and in a database
for use in subsequent accesses. In case the cookie option is not released in the user's browser, the
identification is performed by IP address.

Figure 2. SADP Process – Part 2


Through the UserId it can be executed the recovery and persistence of the user access information. Figure
3 presents an example of information collected from a user access to the site.

99
ISBN: 978-972-8924-89-8 © 2009 IADIS

Figure 3. Information of the User Access to the Site


In Activity Treat Profiles, the profiles are built based on information collected by TOISA. These profiles
are stored in the database for queries and updates during the SADP process.
For the user profile, the TTP first processes the information persisted by TOISA to determine the user's
navigational behavior. This navigational behavior includes the following information: number of times the
user accessed a particular product (NumberAccessProduct), total access time (TotalAccessTime), purchase
execution (PurchaseExecution) and geographical location (city and state). These information are used to
define a score for the content accessed (AccessScore) and bought by the user (PurchaseScore). This score is
processed by the combination of the navigational behavior with the product complexity (ProductComplexity)
and repurchase potential (RepurchasePotential). Figure 4 shows the algorithm used to generate scores from
the user’s Registry of Access Information (RAI). The variables T1, T2, T3, T4 and T5 represent the access
time, in seconds, to site products. These times can be set according to the portage and nature of the site
contents.

Obtain UserId;
Create ProductList and initiate the variable with empty;
For each RAI do
If CodProduct is associated with UserId and CodProduct is not at ProductList then
Add CodProduct in ProductList;
EndIf
EndFor
For each CodProduct in ProductList do
Retrieve ProductComplexity and RepurchasePotential of the product of the Fuzzy Ontology of the site
Assign variables AccessScore=0 and PurchaseScore=0;
For each RAI with CodProduct associated with UserId do
If ProductList.CodProduct = RAI.CodProduct then
Add 5 score to AccessScore;
Retrieve TotalAccessTime and PurchaseExecution in RAI;
If PurchaseExecution = 1 then Add 1 to PurchaseScore EndIf
If ProductComplexity = 1 then
Case: T1 < TotalAccessTime < T2 : Add 2 scores to AccessScore;
T2 <= TotalAccessTime < T3 : Add 3 scores to AccessScore;
TotalAccessTime >= T3 : Add 4 scores to AccessScore;
EndCase
EndIf
If ProductComplexity = 2 then
Case: T1 < TotalAccessTime < T2 : Add 1 score to AccessScore;
T2 <= TotalAccessTime < T3 : Add 2 scores to AccessScore;
T3 <= TotalAccessTime < T4 : Add 3 scores to AccessScore;
TotalAccessTime >= T4 : Add 4 scores to AccessScore;
EndCase
EndIf
If ProductComplexity = 3 then
Case: T2 <= TotalAccessTime < T3 : Add 2 scores to AccessScore;
T3 <= TotalAccessTime < T4 : Add 3 scores to AccessScore;
T4 <= TotalAccessTime < T5 : Add 4 scores to AccessScore;
TotalAccessTime >= T5 : Add 5 scores to AccessScore;
EndCase
EndIf
EndIf
EndFor
Associate RepurchasePotential, AccessScore and PurchaseScore to CodProduct;
EndFor
Return ProductList.
Figure 4. Algorithm for Score Attribution to the User Interests on the Site Products

100
IADIS International Conference e-Commerce 2009

Continuing in activity Treat Profiles, it is added new products to the user profile as the algorithm shown
in Figure 5. From a product Pi of preference of a User U, new products recommendations are obtained by
consulting the fuzzy ontology (OWL-DL), through the Inference Module on Fuzzy Ontology (IMFO) and the
Jena framework. The fuzzy ontology already provides for the Related Products (Pr) their pertinence degrees μ
and RepurchasePotential. The AccessScore of Pr is obtained by multiplying the AccessScore of Pi by
pertinence degree μ of the relationship between Pi and Pr.
The other profiles are created considering the features of each device category, network and content.
These profiles are related to the user profile to define the personalization and adaptation of the different
architectures according to each content type, device or network access.
Once constructed, the profiles are persisted in a database using the Adaptive Object-Model architecture
[Yoder et al., 2001]. The Adaptive Object-Model architecture uses the ObjectType pattern, which separates
an entity of its type of entity and property of its type of property. The Adaptive Object-Model architecture
turns flexible the dynamic inclusion of new features, following the continuing evolution of the profiles.
Obtain User U and CodProduct Pi do
Retrieve of Fuzzy Ontology the products related to CodProduct Pi, along with their pertinence degree μ and
RepurchasePotential;
Create ProductsRelatedList;
For each Product Related Pr do
AccessScore of Pr = AccessScore of Pi * µ;
Add Pr in ProductsRelatedList;
EndFor
Return ListProductsRelated;
Figure 5. Algorithm for Products Addiction in the User Profile
In the Activity Personalize Site in the SADP process, from the profiles and user site access the Tool
Personalize Site (TPS) customize a page architecture with products of the site and display it to the user. To
do this, once a user is identified, the products that will compose the personalized page are determined. The
priorities for recommended products selection are based on the scores defined in the profile of each user,
according to his preferences. First it is recommended products with higher PurchaseScore which
PurchaseScore are high and medium, followed by products with higher AccessScore.
Once defined the products and their priorities for the composition of the page, the TPS uses the device
profiles, network and content, and the framework UBICK, to adapt the content and send this adapted content
to the user's device. For better understanding of the SADP process, it is presented next a case study that
illustrates each step of this SAPD process.

5. CASE STUDY
The SADP process has been evaluated in a site called MalibuFestas, with public access of its users. This is a
site that sells products for parties in general, with access through the url: http://www.malibufestas.com.br.
In the Activity Develop fuzzy ontology of the site domain, the fuzzy ontology was built from the
information on the site contents stored in database and in other requirements to be attended with the
personalization. It is shown in Figure 6 a passage of the MalibuFestas site fuzzy ontology modeling, with the
fuzzy relationships between its contents.

ISA
isAdditional Sixties Glasses-
isSimilar Ice
Drinks SNACKS_ FLASHING_BIG_GLASS
TROPICAL_DRINK_MIXER TAGGER
0.8
0.85 FLASHING_BEER_GLASS
LUXURIOUS_DRINK_MIXER 0.9 CHALICE

Figure 6. Fuzzy Ontology Model of the MalibuFestas Site Contents

101
ISBN: 978-972-8924-89-8 © 2009 IADIS

In this model, the classes Drinks and Glasses-Ice, Sixties subclasses, represent a product category of the
site that has instances representing its products. The properties isSimilar and isAdditional are used to define
the relationships between instances. For these fuzzy relationships, meta-tags of the Fuzzy Meta-Ontology
("fuz" prefix) are added to the OWL-DL. Figure 7 shows the specification in OWL-DL of the Figure 6
ontology, using these meta-tags. In (A), there are the information RepurchasePontential and
ProductComplexity of the product Chalice, and their relationships defined by the isAddicional property. In
(B), the isAddicional property is used to specify the pertinence degrees of these relationships, as between
Chalice and Luxurious Drink Mixer (0.9).

Figure 7. OWL-DL Fuzzy Ontology


In the Activity Obtain Information of Site Access, once installed, the Tool Obtain Information of Site
Access (TOISA) will collect the information from the user’s access to the site that will be used in developing
profiles. As an example, the following information were obtained for a particular user: UserId
1225823398758, date and access time 02/25/2009 - 15:32, IP adress 192.168.0.169, an access to the home
page with 32 seconds of total access time and two accesses to the product Chalice (code 854) with total
access time of 55 seconds.
Following, in the Activity Treat Profiles, the TTP processes the information of the site access, based on
Figure 4 algorithm, to generate the scores of the user's preferences. For example, for UserId 1225823398758,
8 preference points were generated for the product Chalice. To obtain this score in the algorithm of Figure 4,
two variables refering to the user's navigational behavior were considered: NumberAccessProduct and
TotalAccessTime. The process was applied from January 28 to February 28 of 2009. Figure 8 shows these
variables for 16 users and 4 products of the site.
Numbe r Total Purchase Product Luxurious Numbe r Total Purchase
Product C halice Acce ss Acce ss Exe cution Drink Mixe r Acce ss Acce ss Exe cution
Product Time Product Time
User 1225823398758 2 19 Yes User 1234890385395 4 11 Yes
User 1234392127621 6 12 Yes User 1234390076463 3 14 Yes
User 1235745241193 3 14 No User 1233742720626 4 13 Yes
User 1234390157538 1 10 Yes User 1235175547377 2 18 No
User 1235666910334 1 22 No User 1234829252612 2 22 No
User 1235174501321 1 9 No User 1232654602442 1 8 No
Product Snacks Numbe r Total Purchase Product Flashing Numbe r Total Purchase
Tagge r Acce ss Acce ss Exe cution Small Glass Acce ss Acce ss Exe cution
Product Time Product Time
User 1234373845964 4 13 Yes User 1234373845133 4 39 Yes
User 1233687178811 3 17 Yes User 1233687174123 2 16 Yes
User 1234523633210 1 13 No User 1234524633998 2 22 No
User 1233667736583 1 18 No User 1233667737789 1 18 No

Figure 8. Users Navigational Behavior of the Site MalibuFestas


Analyzing these behaviors, it was verified that the users that accessed a product more often had a greater
interest in it, accomplishing their purchases. The users that accessed only once the products had 16% of
purchase accomplishment. Users that accessed twice the same product had 40% of purchase execution, and
users that accessed three or more times the same products had 85% purchase execution. The purchase
accomplishments were higher for larger numbers of access. Another fact is that not always the greatest time

102
IADIS International Conference e-Commerce 2009

of access to certain product corresponded to the accomplishment of the purchase. Thus, the information about
NumberAccessProduct has greater relevance in the calculation of the scores of the user's interests.
Exceptionally, in some cases where the user is already a customer of the site, as the user 1234390157538, the
purchase can occur with low total access time and with little number of accesses to the product.
Once defined the access score for the Chalice product, the TTP consults the site fuzzy ontology and
retrieves products related to these products. Then, as the Figure 5 algorithm, the list of related products is
produced. In this case, this list has the Luxurious Drink Mixer (μ = 0.9 in relation to the Chalice), which has
the AcessScore of 7.2 (0.9 * 8 points) and the Snacks Tagger (μ = 0.8 in relation to the Chalice), which score
is equal to 6.4 (0.8 * 5 points). Besides the user profile, the device, network and content profiles are
developed based on information of user access.
Finally, In the Activity Personalize Site, a list of the most relevant contents to the user is produced
(RecommendationList) and, dynamically, the architecture of the page to be sent to the user is built. For the
page construction, the other profiles, device, network and content related to the user are consulted, for the
adaptation of the contents. Based on the profiles, the UBICK framework makes the adaptation of the custom
content. Thus, the architecture of the site is built dynamically according to the profiles. For example, Figure 9
shows the architecture of the page built for the user with their recommendation.

Figure 9. Recommendation List of the MalibuFestas Site

6. EVALUATION OF THE SADP PROCESS


The evaluation has been done for the results of the SADP process aiming to calculate the rate of hits of its
recommendations. This rate was calculated based on the users who received recommendations and performed
purchases at the MalibuFestas site.
Based on the user’s scores about the products, obtained by the algorithm of Figure 4, an analization of the
users was made from March 03 to March 31 of 2009. The calculus of the recommendation rate of hits
considers the purchases made and the products recommended to the user.
Table 1 lists the products recommended and purchase accomplishment for some of the users examined.
Table 1. Relationship between Recommended Products and their Execution Purchasing
User Total Products Recommended Purchases of Recommendation
1225823398758 12 6
1237981758035 12 1
1237940820384 12 10
1237825898480 12 3
1237212314641 12 0
1237826763230 12 4
... ... ...

Based on this analyse, it was shown that 85% of the products bought were present on the list of products
recommended by SADP. Only 15% of the purchases were not included in the users profiles recommended by
the SADP. It was also verified that 90% of the products of the profiles of users that were purchased received
scores higher than products not purchased. Thus, with the analysis it can be concluded that the
personalization process offered presents satisfactory results, with increase in the sales of MalibuFesta site.

103
ISBN: 978-972-8924-89-8 © 2009 IADIS

7. RELATED WORK
Some works about content personalization make use of semantic information (Ontologies) to build the
profiles or the personalized pages, such as Mobasher (2005) and Palazzo et al. (2006). Unlike those, in the
SADP process the fuzzy ontology is used to define information with an uncertainty degree, as the pertinence
degree, making more accurately the priorities of the recommendations. In Gotardo (2008) works the
discovery of the user preferences is based on the visited contents, but organized in groups. In the SADP
process the profiles allow the treatment of each user with his specific preferences. Other works, based on data
mining, as in Aroyo (2006), use the similarity relationship between the site contents to recommend new
products to the user. However, these similarities consider only the complete relations between the products.
Another point to note related to the correlated works presented is that on SADP process the page
architecture is driven by personalization, considering the content adaptation to access devices. In the process,
the profiles are kept updated at each new user's access, keeping up with the continuous preferences changes.

8. CONCLUSION
This paper presented a process of content personalization (SADP), which examines aspects of the user's
navigational behavior and extends his preferences based on fuzzy relationships between products modeled
with fuzzy ontology. The SADP process also considers the adaptation of the content of the site to the access
device. The user, device, network and content profiles, along with a framework for adaptation of content, are
used to construct dynamically the architecture of the site.
It was presented a case study that illustrates how the site architecture can be directed by personalization,
presenting to the user the site content personalized and adapted to his device and access network.
The project continues with new studies that include more detailed analysis on the effectiveness of the
process and a study on the relevance of the user's navigational behavior in the execution of purchases.
Another work in progress aim at improving the way of scoring the user preferences.

REFERENCES
Aroyo, L. et al, 2006. Ontology-based personalization in user adaptive systems. 2nd International Workshop on Web
Personalization, Recommender Systems and Intelligent User Interfaces. Dublin, Ireland.
Berners-Lee. et al, 2001. The Semantic Web. Scientific American. USA. pp. 284(5) : 34–43.
Carroll, J. et al, 2004. Implementing the semantic web recommendations. In International World Wide Web Conference.
New York, NY, USA, pp 74–83
Garrett, and Jesse James. 2005. AJAX: A New Approach to Web Applications. Adaptive Path. San Francisco, USA.
Gotardo, R. et al, 2008. An Approach to Recommender System Applying Usage Mining to Predict Users Interests. 15th
International Conference on Systems, Signals and Image Processing. Bratislava-Slovak Republic, v. 1. p. 1-4.
Gruber T. 1993. A Translation Approach to Portable Ontology Specifications. Knowledge Acquisition. Boston. v. 5, n. 2,
pp. 199-220, 1993.
Mobascher B. and Daí, H., 2005. Integrating Semantic Knowledge with Web Usage Mining for Personalization. In Web
Mining: Applications and Techniques. San Jose, California.
Palazzo J.M. and Rigo S.J., 2006. Aquisição automática de classes de usuários integrando mineração de uso da Web e
ontologias. Workshop em Algoritmos e Aplicações de Mineração de Dados. Florianópolis, SC, Brazil.
Ross, D., 1977. Structured Analysis: A Language for Communicating Ideas. IEEE Transactions on Software
Engineering 3(1), Special Issue on Requirements Analysis. pp 16-34.
Santana, L. H. Z. et al, 2007. Adaptação de Páginas Web para Dispositivos Móveis. Simpósio Brasileiro de Sistemas
Multimídia e Web. Gramado, RS, Brazil. v. 1. p. 1-8.
Yaguinuma, C. et al, 2007. Meta-ontologia Difusa para representação de Informações Imprecisas em Ontologias. In: II
Worshop on Ontologies and Metamodeling in Software and Data Engineering. João Pessoa, PB. v. 1. p. 57-67.
Yoder, J. et al, 2001. Architecture and Design of Adaptive Object-Models. Proceedings of the ACM SIGPLAN
Conference on Object Oriented Programming, Systems, Languages and Applications (OOPSLA 2001). Tampa,
Florida, USA.

104
IADIS International Conference e-Commerce 2009

A CONTENT ANALYSIS OF WEB-SITE QUALITY OF ON-


LINE AUCTION SELLERS

Fen-Hui Lin and Chiu-Chu Hwang


National Sun, Yat-sen University
60, Lien-Hai Rd., Kaohsiung, Taiwan

ABSTRACT
Maintaining good web-site quality is essential to gain the trust of Internet potential customers. Thus, it is of great interest
to examine how the highly successful e-auction sellers present their products and project their credibility through their
web-site design and layout. This study seeks to investigate the web-site quality of successful e-auction sellers in Taiwan.
We have chosen the e-auction sellers with the highest customer ratings on Yahoo!Kimo on-line auction in Taiwan and we
have performed a content analysis on a sample of 392 chosen sellers based on fourcriteria: graphics, structure, content
and social-cue design. The web-site design, mostly graphics and pictures are used. However, the quality of the pictures
are not as good and refined as those of the other on-line stores. In their structural design, most of the web-sites presented
all the necessary information. In the content, more than 80% of the web-sites displayed their special logos to re-enforce
their company identity. The most listed product information includes prices, components, characteristics, quarantee,
quality, etc. For the social-cue design, most of the web-sites listed their phone numbers or Internet addresses. In addition,
about half of the web-sites provided the street addresses of the physical stores and their operating hours.

KEYWORDS
On-Line Auction, Web-Site Quality, Trust, Content Analysis.

1. INTRODUCTION
The e-auction selling system has created a booming C-to-C Internet business model. Because of the low
initial investments needed in order to enter the business, e-auction has attracted many small business start-ups
to sell on-line. There is no need to maintain any physical stores. There is no store space rental or sales
personnel to pay for. There is likewise little need to maintain a huge stocks inventory. All these have resulted
in the following phenomena:
z Small business start-ups have developed into small or medium scale enterprises or even
international business undertakings, such as ”Tokyo Fashion 1 ” that was started in 2004 by a junior
undergraduate student named ”Mayuki.” (This is the username displayed on the Yahoo!Kimo e-auction
account). In two years’ time , Tokyo Fashion had realized the highest revenues and received the highest
postive auction ratings among more than seventeen hundred women’s clothing e-auction sellers on
Yahoo!Kimo. Since then, it has maintained its place on the top of the ratings. Its annual revenues has
amounted to more than four million dollars. Tokyo Fashion has also started another e-auction business on the
taobao.com2 in China (Newsweek, 2007).
z Even individuals such as single parents, home-bound entrepreneurs or indigenous people, can
sell handmade arts and crafts through the Internet. The e-auction system provides a convenient and low cost
platform for these people to promote and sell their products in order to increase their earnings. Moreover, it
also helps the indigenous people to preserve and promote their particular culture and heritage by providing an
outlet for their arts and crafts.
However, because of the popularity of the e-auction system, more and more sellers now crowd the
Internet and offer an enormous choice of merchandise. To grab the attention of Internet shoppers and entice

1
http://tw.user.bid.yahoo.com/tw/booth/mayki0920
2
http://www.taobao.com

105
ISBN: 978-972-8924-89-8 © 2009 IADIS

them to purchase a certain product, it has become very critical for e-auction sellers to be highly competitive
in the Internet business environment. Because of the fast speed and great convenience involved in an Internet
search, the task of searching for information and comparing prices for particular items has also become
easier. It has been proved that the primary reason why people purchase merchandise on the Internet is
because of the lower prices of items when compared with buying them from a physical store. A general
perception among buyers of prevailing lower prices on the Internet also causes Internet sellers to further
lower their prices so that their profit margin is further squeezed. However, although the e-auction Internet
business is highly competitive and only has low profit margins, many e-auction sellers achieve high volumes
of sales and revenues. Therefore, discovering the operating characteristics of successful e-auction sellers can
only help other sellers to improve their own business efficiency and performance. This study aims to
investigate the more successful e-auction sellers based on the quality of their web-sites by using the content
analysis methodology.
For a good number of e-auction sellers, the trust issue is an important consideration for on-line buyers
when making their purchases. (Gefen, Benbasat and Pavlou, 2008). The web-page has been the most
essential communication channel between sellers and potential buyers. The layout of a web-page is the
primary vehicle where a seller can earn the trust of potential buyers and entice them to buy. (Lowry, Vance,
Moody, Beckman and Read, 2008; Cyr, 2008). The Internet shoppers put a lot of importance on web-site
brand and credibility. The sellers have to minimize any suggestions of a transaction risk for potential
customers by coming out with well-designed web-pages. Wang and Emurian (2005) suggested a scheme with
four web-site design dimensions in order to gain the trust of potential Internet customers: graphic design,
structural design, content design and social-cue design.

1.1 The Graphic Design Dimension


Web-site graphics dictate the first image that Internet shoppers get about a product. The overall composition
of the graphics and web-page colors also affect the feeling of trustworthiness of a web-site (Kim and Moon,
1998). Moreover, a sense of quality and professionalism would likewise further raise the degree of trust by
the customers. Basso, Goldberg, Greenspan and Weomer (2001) point out that attractive graphics quickly
grab the prospective buyer’s attention as well as demonstrate the capability and professionalism of the on-
line sellers. The pictures used should be of high quality and be carefully chosen. As much as possible, line
drawings should not be used. In order to achieve a good visual effect, the web-page design should integrate
the layout, text fonts and colors, presenting an almost true to life picure of the product. All these efforts can
only improve the credibility of the web-site, in general, and the product, in particular.

1.2 The Structure Design Dimension


Wang and Emurian (2005) suggested that the web-site’s structure can also be examined from two aspects of
information presentation: overall organization and accessibility. The overall organization indicates the ease
of use and easy readability of the web-page inter-face and structure. A web-site presented with simplicity
and consistency can effectively raise the feeling of trust with the customers. (Neilsen, 1998; p 107).
Accessibility is another important factor which includes the proper arrangement of the hypertext and figures,
the sequence of the web pages. The use of white space, or groupings can further improve readability and
overall credibility (Zhang, von Dran, Small and Barcello, 1999).

1.3 The Content Design Structure


Content design is about how the web-site presents itself overall. In order to enhance the perception of trust,
four aspects should be considered. The first is the brand image of the web-site that includes the company
logo, business background, the range of operations and contact details, Egger (2001) suggested that a
conspicuous logo with slogans together with a strong emphasis on the company merchandise can very well
strengthen the company image and encourage inquiries from customers.
The second aspect is customer relationship management. The web-site should contain the following
information: the company capability, provisions for security and privacy, finance and legal responsibility,
etc. Many customers are usually very concerned about security and privacy policies, the tracking of

106
IADIS International Conference e-Commerce 2009

merchandise delivery, packaging and delivery services, the refund policy and contract limitations and so on.
Such information should be prominently displayed on the web-page (Cheskin, and Sapient, 1999; Egger,
2001; Neilsen, 1999).
The third is to demonstrate the accountability of the company through the web-site. The company logo or
text descriptions can effectively demonstrate the professionalism of the e-commerce web-site. Hu, Lin and
Zhang (2001) suggested five approaches that can underscore the company’s stability: protection of customer
privacy, guarantee of the transaction’s security, testimonies of customer satisfaction, statement of of
credibility and product or transaction warranty.
The fourth aspect is to provide full product information accurately and in a timely fashion. Embedding
the brand name or company name in the web-site address also increases the feeling of trust by customers
(Egger, 2001; Nielsen, 1990). This is similar to the advertising effect that is brought about when providing
delicate and useful information in advertisements that can provide assurance to the customers (Hunt, 1976).
Therefore, a given brand can further differentiate itself from other competitors so that it becomes more
attractive and the customers’ understanding of the product can be enhanced.
For the surface content of the web-site, there are two essential parts, the first is title and the second is the
provision of product information. Beltramini and Blasko (1986) categorized six types of titles shown on
traditional advertisements. These include familiar sayings, contrasting statements, news/information, shock
effect, questions and arousing reader’s curiosity. After studying award-winning advertisements in the United
States, they found that 55.9% belonged to the first two categories (familiar sayings and contrasting
statements).
Considering the product information presentation, Resnik and Stern (1977) generated fourteen product
characteristics making use of criteria that have been adopted by several other researchers for their own
researches (Abernethy and Franke, 1996). Many researches had proved that when sufficient and applicable
information are placed within the advertisements, the better the customers are able to make purchasing
decisions. It has also been shown that the advertisements for durable and expensive products contain richer
product information. Comparatively, the advertisements for food, household goods and appliances, personal
hygiene products, etc. contain lesser amount of information (Resnik and Stern, 1977; Stern, Krugman, and
Resnik, 1981).

1.4 The Social-cue Design Dimension


The social-cue design in a web-site can make use of various communication media to reflect the current
social milieu or to improve on the face-to-face interaction. Riegelsberger and Sasse (2002) suggested that the
lack of inter-personal contacts on the Internet can create a gap between customers and retailers so that the
customers’ trust for a product may wane. To overcome this problem, the web-site can use pictures of
company operations to display its operating details. Steinbruck, Schaumburg, Duda, and Kruger (2002)
performed an experiment and found that projection and connection with customers can be generated via a
social-cue design. Posting pictures or photos that show company workers is a simple and effective way to
further strengthen customers’ trust. Basso et al (2001) found that the media interface that uses a more
interactive design can indirectly influence customers to share information about the company and its product
or to purchase again. Generally, customers spend an average of five minutes on a web-site. Providing
facilities for simultaneous communications, such as instant messenger or Internet telephone connections
allow customers reach sellers easily, thus, minimizing any misunderstandings in the process. This also builds
a good impression for the products and services provided through the website starting with the customer’s
first visit This is an exploratory research using content analysis to find out more about web-site design of
those e-auction sellers who received the highest rankings based on the four dimensions of Design. The
following section is a description of the content analysis research methodology while the third section
presents the empirical results. The fourth section presents the discussions and managerial implications; and
finally, the conclusions of this research.

107
ISBN: 978-972-8924-89-8 © 2009 IADIS

2. THE CONTENT ANALYSIS RESEARCH METHODOLOGY


Based on the criteria identified for the e-auction web pages, we conducted a content analysis to investigate
the most successful e-auction sellers on Yahoo!Kimo in Taiwan, i.e., web-page design, lay-outs and contents.
Content analysis has been deemed to be a proper approach when examining the messages contained in the
texts or graphics with systematic, objective and quantitative characteristics (Kerlinger and Lee, 2000).

2.1 Research Subjects and Sampling


Because Yahoo!Kimo has the highest Internet traffic portal in Taiwan and has the highest transaction volume
for e-auctions when compared with other e-auction platforms, the research subjects chosen are those e-
auction sellers of that have been in the business for a given period of time and who have reached the highest
ratings/values in its merchandise category in Yahoo!Kimo’s twenty merchandise categories. The auction
accounts were chosen for content analysis according to the following three criteria:
z eighty percent of the merchandises displayed by the auction account belongs to the same
category;
z the auction account is on the top twenty-five of the reputation ratings in the category that it
belongs to; and
z the reputation rating is higher than 1000.
For each e-auction account, four types of web pages were collected, including (1) the virtual store
layout, (2) ”about me,” (3) reputation ratings and comments, and (4) merchandise descriptions and pictures.
Except for the fourth type that can number from one web page to more than ten web pages, the other three
types each can be contained in only one web page. For the forth type of web page, we chose the first listed
merchandise shown on the first page of the auction account that is linked to a web page that has photos of the
merchandise associated with the introductory texts or item series numbers. The sample collection was
performed from 2007, January2007 to February 2008. Finally, a sample of size 392 was obtained from
eighteen categories of Yahoo!Kimo. The categories, “automobiles” and “travel, estate and service” were not
included because none of their auction accounts garnered a rating value higher than 1000.
Table 1 lists the positive ratings, negative ratings and ratios of positive ratings to negative ratings for the
eighteen categories. The average positive rating is 6281.5 (the bottom row of Table 3). The top three positive
ratings are “Women’s clothings and accessories” (rating = 25251.5), “Health and personal care” (rating =
11026.7), and “Women’s handbags and shoes” (rating = 10804.8). For the negative ratings, the average is
10.7, while the top three categories are in the same in the order as the positive ratings. The average ratio is
99.89% with half of the categories having higher ratios. Moreover, the top three categories in terms of ratio
value are “Food and regional specialties,” “Mom and Baby” and “Sports and outdoors.” In general, the
negative ratings are relatively small when compared with the positive ratings. Moreover, for the two handling
approaches of the negative ratings, the total numbers for “benevolence and concern” and “inappropriate
responses” are 593 and 563, respectively. The average numbers are 1.51 and 1.44.

2.2 Pretest, Reliability and Coding


After forming the first draft of the coding scheme, a pre-test was performed by, the author and two MBA
graduate students. A sample of thirty auction accounts included in the research sample were chosen to test the
drafted coding scheme. After some minor modifications after the pretest, the final coding sheet for the formal
analysis was obtained.
The formal coding process (Krippendorff, 2004; Son, Tu and Benbasat, 2007) was then done. The authors
held a training session to guide the coders to fully understand the definitions and boundaries of eachcriterion.
Then, one pilot test was performed to test the consistency among three coders. One hundred and twenty
accounts were drawn from the full sample of 392. The three coders performed the coding procedure
separately for these 120 accounts. The reliabilities computed using Holsti’s formula (Holsti, 1969) for each
criteria that is above 0.9 (Wimmer and Dominick, 1994). The formal coding period was made in May, 2007.

108
IADIS International Conference e-Commerce 2009

Table 1. The Positive Ratings, Negative Ratings and Ratios for Various Product Categories

Mean of positive Mean of negative


Merchandise Categories
ratings ratings
(sample size)
(P) (N)

Art collections (15) 2140.3 1.87


Books and magazines (17) 2966.6 1.41
Cell Phones (23) 3533.4 3.57
Computers (25) 5914.9 4.52
Digital cameras, video cameras and web cams (18) 4733.3 4
Electronics (25) 2762.9 2.1
Food and Regional specialties (22) 1968.0 0.8
Health and Personal Care (25) 11026.7 17.3
Home and Garden (25) 3751.7 4.6
Jewelry and watches (25) 4241.8 2
Men’s clothing and accessories (25) 8002.6 5.2
Mom and baby (25) 4490.7 1.9
Music and DVDs (13) 3843.3 2.9
Office (10) 2545.2 2.5
Sports and outdoors (24) 4498.5 2.0
Toys and games (25) 3219.1 2.7
Women’s clothing and accessories (25) 25251.5 97.2
Women’s handbags and shoes (25) 10804.8 16.8
Average (total sample size = 392) 6281.5 10.7

3. RESEARCH FINDINGS AND RESULTS

3.1 Graphic Design Dimension


There were only two web sites that did not use any graphics. Table 2 summarizes the empirical data on the
graphic quality and graphic content. For the graphic quality, over 60% of the web sites show graphics with
amateurish image processing. However, there are 34% (about one-third) of the web-sites posting graphics
with professional quality. These can be expected to attract customers’ attention and enhance the sellers’
image as to their professionalism and competence.
As to the graphic content, about 90% of the web-sites show pictures containing only one product with
only two or three lines of graphics. Only very few of the web-sites show pictures containing several products.
It could be because this would fail to focus on product characteristics. According to Table 2, there are 40%
of web-sites showing ”moving” pictures.

3.2 Structural Design


Table 3 lists the counts of the three approaches. Seventy-eight per cent of the web-sites have satisfactory
accessibility of information. Fifty-nine per cent of the web-sites have the proper page design, such as
appropriate white spaces and margins, groupings and visual density. A third of the web-sites provide
functions for navigation reinforcement, such as prompts, guides, tutorials and instructions for transactions.

109
ISBN: 978-972-8924-89-8 © 2009 IADIS

Table 2. Summary of the Graphic Design Dimension


Graphic Quality Frequency Graphic Content Frequency ”Moving” Frequency
(Percentage) (Percentage) Picture (Percentage)
Amateurish quality 241 (61%) Picture of Product 270 (69%) Yes 156 (40%)
only
Professional quality 135 (34%) Product picture with 81 (21%) No 236 (60%)
product information
Combination 14 (4%) Multiple-product 19 (5%)
picture
No graphics 2 (.5%) Multiple product 11 (3%)
pictures with
product information
None pictures 2 (1%)
Total 392 Total 392 Total 392
Table 3. Summary of the Structural Design Dimension
Structural design Frequency(F) Web site average(= F / 392)
Information accessibility 307 78%
Page design 235 59%
Navigation reinforcement 124 32%
Total counts (TC) 666

3.3 Content Design Dimension


There are three measures of web site contents: logos, product titles and product information. The empirical
results are summarized in Table 4. For the first item as logo posting, most of the web-sites do show their
unique logos for 83% of the sample size. For the second item, auction title, on the top two lists are
“informativeness” and “benefits” with almost 90% of the sample. This indicates that a direct description of
the product, providing its benefits, still are the most used strategy by sellers to promote their merchandise.
For product information, the total count is 1290. With the s392 ample size,, the average information
provided by each web-site is 3.3 items. The top three on the list are “price and value,” “components and
contents” and “product characteristics,” representing almost 70% of the total. The three items are direct
descriptions of the merchandise. This indicates that product information is the most important information
provided by the e-auction sellers.

3.4 Social-cue Design


This criterion is used to record the contact methods provided on the web-site. The empirical results of the
three items are listed in Table 5. Most of the web-sites provide phone numbers or Internet contact
information for the customers to use to communicate with the seller. These include mobile phone numbers,
customer service phone numbers, email address, or other synchronous communication media such as MSN,
Yahoo!Messenger, ICQ, etc. Half of the web- sites provide their operating times when the sellers or its
operators are on-line and are able to deal with on-line business-related activities or answer customer
questions. For the third item, 27% of the web sites show a map and the street address of the store location
that would imply that these e-auction sellers also run a physical store or own a company.

110
IADIS International Conference e-Commerce 2009

Table 4. Summary of the Content Design Dimension

Logos frequency percentage Product frequency percentage


information
Yes 325 83% Price and value 392 100%
No 67 17% Component and 269 69%
content
Total 392 Characteristics 225 57%
Auction title frequency percentage Guarantee and 139 35%
service
Informativeness 232 59% Quality 121 31%
Benefits 116 30% Promotion 60 15%
activities
Surprise 25 6% Taste 42 11%
Curiosity 18 5% Safety and security 22 6%
Questioning 1 .03% Novelty 14 4%
Others 0 Independent study 6 2%
Total 392 Total 1290
Table 5. Summary of Social-cue Design Dimension
Contact information Frequency (F) Percentage (F/392)
Phone number or Internet communication 359 91%
media
Operating time 195 50%
Map and address of store location 106 27%
Total 560

4. CONCLUSIONS
This study aims to investigate the web-site quality of successful e-auction sellers in Taiwan. The samples in
this study are the sellers with the highest ratings in the Yahoo!Kimo on-line auction. They are long term
auction sellers. The research results show that these web-sites have their own particular styles and images.
All sought to create a professional image so to enhance the trust of potential customers.
The graphic design, graphics and pictures were used to display the merchandise. However, the quality of
some of the pictures was not as good and refined as those of the other on-line stores. This might be because
most of the e-auction sellers are small businesses or a one-person business, without the special skills for
photography or did not have the funds needed for the extra investment for this purpose. For the structure
design, most of the web-sites included made it easy to access additional information The second focus would
be the web-page layout with consistent styles to integrate the pictures and text. For the content design, more
than 80% of the web-sites show their company logos to re-enforce their company identity. The auction titles
are used mainly for infomation or product benefits. The most listed product information contains prices,
product components, characteristics, wuarantee, quality, etc. For the social-cue design, 91% of the web-sites
list the phone numbers or Internet address. In addition, about half of the web-sites provide the address of the
physical store and its operating hours in order to create the image that Internet customers can trust their
businesses. The sellers make sure to answer the phone during their business hours.

ACKNOWLEDGEMENT
The authors would like to thank the national science council of Taiwan (NSC 97-2410-H-110-030) for the
support of this study.

111
ISBN: 978-972-8924-89-8 © 2009 IADIS

REFERENCES
Abernethy, A.M. and Franke, G.R., 1996. The information content of advertising: A Meta-Analysis. Journal of
Advertising Research, Vol. 25, No. 2, pp 1-17.
Basso, A., Goldberg, D., Greenspan, S. and Weimer, D., 2001. First impressions: Emotional and cognitive factors
underlying judgments of trust e-commerce. In Proceedings of the 3rd ACM Conference on Electronic Commerce, pp
137-143. Tampa, FL, USA.
Beltramini, R.F., and Blasko, V.J., 1998. An Analysis of Award-winning Advertising Headlines. Journal of Advertising
Research, Vol. 26, No. 2, pp 48-52.
Cheskin Research and Studio Archetype/Sapient., 1999. Ecommerce trust study. Retrieved November 7, 2006. Available:
http://www.cheskin.com/p/ar.asp?mlid=7andarid=40andart=0.
Cyr, D., 2008. Modeling Web Site Design Across Cultures: Relationships to Trust, Satisfaction, and E-Loyalty, Journal
of Management Information Systems, Vol. 24, No.4, pp 47-72.
Day, R., 1980. Research Perspectives on Consumer Complaining Behavior, Chicago: American Marketing Association.
Egger, F.N., 2001. Affective design of e-commerce user interface: How to maximize perceived trustworthiness. In
Proceedings of the International Conference on Affective Human Factors Design. London: Asean Academic Press.
Gefen, D., Benbasat, I. and Pavlou, P.A., 2008. A Research Agenda for Trust in Online Environment, Journal of
Management Information Systems, Vol. 24, No. 4, pp 275-286.
Hosti, O., 1969. Content Analysis for the Social Sciences and Humanities. Addison-Wesley, Reading, MA.
Hu, X., Lin, Z., and Zhang, H., 2001. Myth or reality: Effect of trust-promoting seals in electronic markets. Presented at
WITS 2001. New Orleans, LA, USA.
Hunt, S.D., 1976. Informational vs. Persuasive Advertising: An Appraisal. Journal of Advertising, Vol. 5, pp 5-8.
Kerlinger, F.N. and Lee, H.B., 2000. Foundations of Behavioral Research, Fourth edition. Orlando, FL: Harcourt College
Publishers.
Kim, J. and Moon, J.Y., 1998. Designing towards emotional usability in customer interfaces - trustworthiness of cyber-
banking system interfaces. Interacting with Computers, Vol. 2, No. 1, pp 1-29.
Krippendorff, K., 2004. Content Analysis: An Introduction to Its Methodology. Thousand Oaks, CA: SAGE Publications.
Lowry, P.B., Vance, A., Moody, G., Beckman B., and Read A., 2008. Explaining and Predicting the Impact of Branding
Alliances and Web Site Quality on Intial Consumer Trust of E-Commerce Web Sites, Journal of Management
Information Systems, Vol. 24, No. 4, pp 199-224.
McKnight, H.D., Choudhury, V. and Kacmar, C., 2002. Developing and Validating Trust Measures for e-Commerce: An
Integrative Typology, Information Systems Research, Vol. 13, No. 3, pp 334-359.
Neilsen, J., 1999. Trust or bust: Communicating trustworthiness in web design. Jacob Nielsen’s Alertbox. Available:
http://www.useit.com/alertbox/990307.html.
Resnik, A. and Stern, B.L., 1977. An Analysis of Information Content in Television Advertising. Journal of Marketing,
Vol. 41, No. 1, pp 50-53.
Riegelsberger, J. and Sasse, M.A., 2001. Trustbuilders and trustbusters: The role of trust cues in interfaces to e-commerce
applications. 1st IFIP Conference on E-commerce, E-business, E-government.Available:
http://www.cs.ucl.ac.uk/staff/J.Riegelsberger/trustbuilders_and_trustbusters.htm.
Taylor, R. E., 1999. A Six-Segment Message Strategy Wheel. Journal of Advertising Research, Vol. 39, No. 6, pp 7-17.
Son, J.Y., Tu, L. and Benbasat I., 2006. A Descriptive Content Analysis of Trust-Building Measures in B2B Electronic
Marketplaces, Communications of the Association for Information Systems, Vol. 18, No. 99-128.
Steinbruck, U., Schaumburg, H., Duda, S. and Kruger, T., 2002. A picture says more than a thousand words –
photographs as trust builders in e-commerce websites. In Conference Extended Abstracts on Human Factors in
Computer Systems. Minneapolis, MN, USA.
Stern, B.L., Kurgman, D.M. and Resnik, A., 1981. Magazine advertising: an analysis of its information content. Journal
of Advertising Research, Vol. 21, No. 2, pp 39-44.
Tokyo Fashion, Newsweek, Vol. 1009, March 2007. (assessed at Nov. 26, 2008)
http://www.businessweekly.com.tw/webfineprint.php?id=28196.
Wang, Y.D. and Emurian, H.H., 2005. An overview of online trust: Concepts, elements, and implications. Computers in
Human Behavior, Vol. 21, No. 1, pp 105-125.
Wimmer, R.D., 1994. Mass media research: an introduction. 4th ed. Belmont, California: Wadsworth.
Zhang, P., von Dran, G.M., Small, R.V. and Barcellos, S., 1999. Websites that satisfy users: A theoretical framework for
web user interface design and evaluation. IEEE Proceedings of the 32nd Hawaii International Conference on System
Sciences, 1-8. Available: http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=16782andisYear=1999

112
IADIS International Conference e-Commerce 2009

GUIDELINES TO THE DEVELOPMENT OF AN


E-COMMERCE PLATFORM FOR CUSTOMIZED
GARMENTS

Ribeiro, L.
Master in Fashion Design, Textile Science and Technology Department, University of Beira Interior
Pólo I – Rua Marquês d'Ávila e Bolama, 6201-001 Covilhã, Portugal
Tel: +351275319700, Fax: +351275319768

Duarte, P.
Management and Economics Department, Unit Research NECE, University of Beira Interior
Pólo IV – Edifício Ernesto Cruz, 6200-209 Covilhã, Portugal
Tel: +351275319600, Fax: +351275319601

Miguel, R.
Textile Science and Technology Department, Textile & Paper Materials Research Unit, University of Beira Interior
Pólo I – Rua Marquês d'Ávila e Bolama, 6201-001 Covilhã, Portugal
Tel: +351275319700, Fax: +351275319768

ABSTRACT
The world is changing and consumer behaviour with it. Today’s consumers expect to buy high quality customized
products at low prices with fast delivery. This can be accomplished with Internet technology. Fashion design industry
should understand the desires of these new consumers and develop e-commerce solutions in order to give a better
response to the e-consumer needs and demand. Customization emerges as a form of cyber couture, the industry response
to consumer desire to personalize their style. This paper aims to present the theoretical basis for a consumer oriented e-
commerce platform, based on market research study. A web-based survey was conducted to understand online consumer
buyer behaviour for customized fashion products. The results reinforce previous findings on the willingness of consumers
to participate in the creation of personalized products and further extend literature knowledge on online consumer's
behaviour in the fashion market. The result is a set of guidelines for the development and implementation of an e-
commerce platform for customized fashion products.

KEYWORDS
E-commerce, Mass Customization, Fashion design, Consumer behaviour.

1. INTRODUCTION

1.1 Customization
Current economy is highly competitive and competition increases continuously grounded in the globalization
of markets. The changes and technological innovations are faster than ever before, providing a broad variety
of consumption alternatives and stimulate news demands. This new “technological consumer” demands from
fashion industry more quality, variety, exclusiveness and personalization. In the long run it is expected that
mass production in textiles products will evolve for mass personalization – mass customization, where the
consumer takes an active role is the process of fashion and garments development.
The consumer needs to make a difference, the desire to distinguish oneself from others, the need to
acquire unique products, with specific characteristics, that reflect its personality or lifestyle precedes the need
of customization. One possible way to answer customer’s expectations is providing customized products by

113
ISBN: 978-972-8924-89-8 © 2009 IADIS

the consumer himself, or at least give him the opportunity to play an active part in the definition of the final
characteristics of a piece of clothing.
Current customization applications are limited to a selection of some attributes, such as: shape, size,
colours and components. Thus, the next level of mass customization should rely on technologic tools such as
patterns visualization and the application of those in a 3D model to provide the consumer with the freedom
and liberty to create their own clothes.
The terms “customization” and “mass customization” lacks a precise definition since several authors
focus different points of interest, and are still unknown for the majority of the population. The introduction in
the European market is still recent and a little diffused (Piller, 2004). Sometimes is mixed-up with the
concept of personalization, with some authors mixing the concept of personalization inside customization
(Bae, May-Plumlee, 2005).

1.2 Customized Clothing and Online Commerce


In the universe of customization consumers should be regarded as partners in the creation of value, which
implies a new model of relationship between consumers and companies, based on mutual understanding.
Some authors (Pine, Gilmore, 1999; Anderson et al., 2002; Piller, 2004) recognize the consumer’s
disappointment with the products available in common stores, nevertheless they don’t want to just have a lot
of choice, but the ability to choose among products that they really like.
Looking into online customization of products it is necessary to be aware that it benefits with the use of
technologies to incorporate images and videos to allow consumers to choose colours, shapes and styles
desired, and combine them to create the desired product. Even though, the offer of those attributes should be
addressed careful, because having them all available leads to consumer confusion and incapacity of choose
and combine. So it is important to define a platform model that allows consumers to choose the preferred
style of product and look at images of the final product. This way the consumer can have a more clear
perception of the product. The adoption of a support system with these characteristics, provide the consumer
with the ability to compare, choose and obtaining the best combination according to their selections from
virtual images. In addition, the composition of images allows the consumer to see several combinations and
avoid time waste choosing among a huge number of options (Lyengar, Lepper, 2000; Li. et al. 2000; Ma et
al., 2007).
The majority of the consumers don’t feel secure buying online and one of the main causes is the
impossibility of trying the pieces and evaluating its fit (Apeagyei and Otieno 2007). The consumers enjoy
the comfort that Internet shopping provides, but there will always remain some doubts about the appropriate
fit of the pieces. Fan et al. (2004), refer some factors related with problems associated to the fit and
performance of the pieces, like the gaps in standardization; problems with the sizes and rules of grading;
faults in the development of patterns; conflicts of manufacture and the perception of the body by the
consumer itself.
To surpass this obstacle some companies have incorporate 3D simulation technology on their website,
where the consumer can visualize a virtual model, and be able to choose with a greater level of confidence.
This enhances the consumer or buyer to be near to the finished product and its real appearance, implying a
decrease in devolutions and in an increasing of the level of satisfaction.
The use of these systems raises the importance of the virtual try-out and the customer relationship
management, since it provides the companies with an opportunity to increase sales as in physical stores
(Apeagyei and Otieno 2007) and (Speer, 2002). In a market where the consumer can’t feel the touch of the
pieces and its comfort, a more accurate description of fabrics provided by this type of applications with
specific report and real images could lead the consumer to correlate with past tactile experiences.
Nowadays, a pioneering company having singular products with the possibility to compete in price,
quality, flexibility and delivery, can enter in the global market using the Internet (Kotler et al., 1999; Kumar
2004). With a small investment and a limited amount time to publish a web site on the Internet, a company
can break barriers of entrance in the market with just a fraction of the resources needed to build an off-line
store. However, to efficiently compete on the Internet, companies need to invest in the main areas previously
referred and also guarantee the high quality services to the consumer (Kumar, 2004).

114
IADIS International Conference e-Commerce 2009

1.3 The Platform Interface for Customized e-Commerce


Having developed an interface to virtual markets supported on information technology a company ends up
having more freedom in space organization and design, namely in products presentation and the tools used to
promote the interaction and choice. All alternative decisions must be accounted for, as they will have a direct
influence in the way consumers will interact with the website. Space distribution, structure, colours, usability
and accessibility will be reflected in the consumers’ response. For Bellman et al. (2006) the response will be
positive if users can easily search and find information about the product they desire, and find no special
difficulties to make a choice from the extensive range of services associated (evaluation of prices,
independent opinions, more information about the product).
In this process of developing an interface for the mass customization e-commerce platform the company
can also involve the consumer in other levels, which goes beyond the mix of parts to make clothes,
specifically sharing ideas, proposing new designs, materials or even ways of displaying the product. This
process is not difficult, if the consumer feels that his cooperation can provide some added value and some
prize could be earned. Some websites give money prizes and copyrights to the best designs and innovations,
to the most voted proposals (Piller, 2008).

2. METHOD

2.1 Research Design and Data Collection


Having as main purpose the development of the theoretical bases for the definition and implementation of an
online e-commerce platform for customized clothing products, a study was conducted in order to analyze
consumers’ behaviour in the electronic commerce of clothing, and their attitude regarding the design and
fashionable trends through an online survey. The survey was made to gather information on three main
topics: the purchase behaviour, e-commerce adoption/use and fashion trends (Ribeiro, 2008). This paper will
exclusively address the consumer’s behaviour and e-commerce components, as they are the crucial ones for
our current objective.
The decision to develop this survey was due to the need to identify and define a profile of the proper
market segments that could be successfully targeted by a customized clothing sales platform on the Internet.
The survey focused online consumers, i.e., those who have already made purchases in online stores, and
those who intended to do it. The initial questions were formulated in order to select and include only
consumers that match the desired profile. Two groups of questions were included, one related to purchase
behaviour and another to electronic commerce. The majority of the questions were multiple choice questions
with one open answer option.
The survey was created and distributed in digital format, through e-mail distribution and Google docs
form utility. For e-mail distribution a written cover letter was prepared to stimulate the filling and diffusion
Word file attached. Data collection began on May, 7, 2008 and ended on May, 31, 2008. After collection,
data was coded and analyzed with SPSS 16 statistical package.

2.2 Results and Discussion


From the initial sample of 366 answers, only 197 were retained for analysis, specifically those who have
already made purchases of clothes over the Internet and those intended to do it in the future. As can be seen
46.17% of the respondents do not perform online purchases of clothes.
From the 197 subjects that have already performed purchases and those that have never performed but
intend to buy, 34.4% where between 24 and 28 years, followed by the group of 18 to 23 years with 23.4%,
and from 29 to 33 years with 18.2%, being the remaining distributed among the other intervals. This result is
in consonance with the National Inquiry of Consumption of the Families of the Acxiom (2007), where it is
revealed that 40 percent of the entire number of purchases on the Internet was made by the age group of 18 to
35 years.

115
ISBN: 978-972-8924-89-8 © 2009 IADIS

The majority of respondents were female (73%) and students (34.7%). Looking at 2007 conjoint report
from INE and UMIC 2007, the majority of Internet users are high school students or hold a university degree.
The Cetelem (2008) study shows that most of the Internet users maintain administrative, scientific, and
intellectual professions, a tendency that was confirmed in the present investigation.
The evaluation of consumers’ shopping habits reveal that 51% buy clothes at least every month, but an
expressive majority (94% - 184 respondents ) indicate that they prefer to buy in traditional brick-and-mortar
shops and just 4 respondents say that prefer to do it over e-commerce sites. The main reasons to visit clothing
websites are presented in Table 1.
Table 1. Reasons for Visit Brand Clothing Websites
Reasons Responses (%)
Check up the news 41
Analyze the trends 23
Look out for information about pieces of clothing 20
Buy on-line 10
Find contacts and store addresses 6
Consumers that had visited sites of clothes (54%), indicate that the main reason of the visit was to check
up news and trends, and only 10% refer the specific intention of buying. This result clearly points to the
advantage that could arise from the improvement of e-commerce platforms make them more user-friendly
and promote the buying.
The search for information seems to be the main motivation to use the Internet (see Table 2). This results
stresses the importance of having a good online description with detailed information about the products, its
characteristics and a good presentation, a fact that has been mentioned in studies of consumer‘s behaviour in
virtual markets (Li et al., 2000).
Table 2. Consumers and Buying Clothing in Internet
Answers Incidence (%)
Uses Internet to find more information about the characteristics of the pieces to buy 43
Uses Internet to find stores where he can find the pieces wanted 31
Uses Internet to shop on-line 26
In our study, the majority of the consumers do not perform purchases of clothing in electronic markets
(69%), but a part of those (38%) is willing to start to buy if a set of conditions is present. This study reflect
the general results of Portuguese consumer’s behaviour (INE and UMIC, 2007; Anacom, 2008; Cetelem,
2008) pointing that e-commerce still has a great potential to grow. Women seem to be more confident in
buying clothes from e-commerce platforms, which is good for the development of mass customization
business on Internet (see Figure 1). This can be justified by the relationship that females have with clothes
and fashion in general. Women understand the fashion language more easily and show a personal
relationship with clothes, which leads them to be more interested in a mass customization e-commerce
interactive platform.

Figure 1. e-Commerce Shoppers Versus Gender (%)


We found that the main factors that encouraged consumers to use clothes e-commerce websites were: the
possibility of choice without time waste with others products out of interest, the level of information

116
IADIS International Conference e-Commerce 2009

provided by websites compared with traditional printed catalogues, and the possibility to find pieces that are
not available in traditional shops. The main reasons identified in our study are concordant with the
tendencies of consumption of mass customized products stated by several authors (Pine and Gilmore, 1999;
Anderson et al., 2002; Piller, 2004). Consumer feels somehow dissatisfied with the current offerings but they
have a clear perception of their desires. On the other hand we can’t forget that there are still obstacles to
complete adoption of fashion and clothes e-commerce that are mainly related with the need of a sensory
experience in the purchase of clothing, i.e., the touch, the need to feel and determine performance of the
clothes (Li, Daughrty, Biocca 2001).
A list of prominent parameters and conditions that would promote e-commerce acceptance for fashion
industry was compiled (see Table 3). These results suggest that the industry should pay attention to a set of
parameters since the answers were almost equally distributed by the several factors. This implies that all of
these parameters are important to attract consumers. However, some parameters stand out from the set, those
related with return policies and process, and the existence of explicit and real images of the product to sell,
namely the aspect of the fabrics and their performance. These answers show the lack of confidence of the
consumer regarding the trueness of the pieces presented on e-commerce platforms. So it’s crucial to ensure
the guarantees, namely for the return policies and the veracity of the products presented, in order to transmit
security of the purchase experience in all aspects, obtaining higher levels of satisfaction (Fan et al. 2004).
Table 3. Conditions that Would Promote the Acceptance of e-Commerce
Conditions Incidence %
Easy return process and without complication 93 12,2
Real images, showing fabric details and performance 86 11,3
Different clothing from the stores 78 10,2
Quality guarantee 76 10,0
True made to measure clothing (on-line measures in a virtual model) 75 9,8
Security payment 74 9,7
The website have partnerships with official entities that can guarantee the existence of the business 64 8,4
Let the consumer make part of design process by choosing colors, functionality and others 60 8,0
True information 60 8,0
Post-sale service 51 6,7
On-line service to control the selling service 46 6,0
Total 763 100

3. THE E-COMMERCE PLATFORM GUIDELINES


As it has been referred in this study the electronic commerce is growing and will, in the future, hold an
important position in the commercialization of all kind of products and services. Thus, it is important to think
about taking part on this distribution channel and develop ways of attracting, retaining and satisfying
consumers’ needs and desires, which can be accomplished with a structured construction of e-commerce
platforms and its adequacy to product or service characteristics.
With the survey, we get together a set of information’s with the purpose of developing a proposal for an
online commerce platform of clothing and fashionable accessories based on mass customization with the
necessary characteristics to succeed. It was possible to identify some key points to attract consumers to
online market and e-commerce platforms. The main points revealed by this study, about the desired
characteristics to include in an e-commerce platform of customized clothing were structured in four groups:
1) General Characteristics; 2) Customization; 3) Products; 4) Purchase experience.

3.1 General Characteristics


General characteristics include navigation and client services issues. The navigation is one of the most
important aspects in an e-commerce websites, for clothes or any other product. The consumer has to
understand how the whole process works, starting with the search and choice of the pieces and ending in the
purchase (Bae, May-Plumlee, 2005). From the analysis of several platforms of electronic commerce
(Ribeiro, 2008), some factors related to navigation were identified, namely what should exist in a website to

117
ISBN: 978-972-8924-89-8 © 2009 IADIS

assure its success, such as: short loading times; Information and comprehensible steps to follow; Absence of
errors and incompatibilities with different browsers; to be accessible to all kinds of persons.
Some services are essential to guarantee the success of the buying process and the maximum satisfaction
of the client, such as: the change of idiom; loyalty - client account or loyalty card; a detailed guide explaining
how to take measures in order to achieve the best fit, whether manually or with the help of 3D scanners; an
assistant to guide and help in the first visit; a search option; a shopping basket; sales support and after-sales
service; several payment options and security certificates; clear return policies and procedures; order
tracking; clothes maintenance tips; the possibility of require piece transformation after purchase; trends
shows; the possibility of see and buy models built by others consumers; voting for the designs; newsletter;
blog; suggestions related with fashion and cultural events and finally on-site music.

3.2 Mass Customization


Customization is about small prices and pieces that suit to the consumers’ desires of individuality,
modularity, co-design and body fit (Prahalad and Ramaswamy, 2004; Piller 2004). The consumer wants more
and more unique products, personalized to his needs. By this reason, investing in the development of an e-
commerce platform of mass customization makes all the sense.
The number of consumers that visit clothing websites use them especially to find information about
existing pieces in brick-and-mortar shops, and consequently the sales volume of those websites tends to be
low, which justifies that if a company starts operating in the electronic market it should offer customized
products in order to avoid competing with their own physical stores. Internet, as distribution channel fits
perfectly to this new strategy of production that requires the interaction between technology, products,
consumers and processes. This idea is therefore reinforced by the answers to this study where consumers
justify the use of this type of shops by the possibility of choosing only the products they desire and those they
can’t find in traditional shops.
3.2.1 Customization Integrated in an On-line Website
In existing websites where the consumer has the ability to build his own pieces and personalize them (ex:
http://www.styleshake.com/, see Figure 2), the process of customization follows several steps since the
creation of a database with relevant information’s (measures), piece definition, the part list to build it, and
afterwards the choice of colours, woven, and decorative details. Some elements related with the product are
key points to the success of implementation of mass customization websites, such as modularity, co-design
and the fit to consumer’s body.
3.2.2 Modularity
Those are products whose output process has modules as a base, in this case adaptable moulds to different
types of pieces and ensure the multi functionality and the combination of different items to change the aspect
of the piece, such as transform pieces according to the season. Modularity is also a fundamental element to
give the consumer the opportunity to build clothes mixing different modules. To the company, modularity
permits the costs control of the final piece, therefore those modules are normally mass produced, just being
necessary its adaptation.
3.2.3 Co-design
With co-design consumer can integrate the development of its pieces at early stages, either in the design or in
the choice of modules already developed. In our sample almost the totality of respondents considers that an
exclusive and unique design increases value of clothing and when questioned about the opportunity of having
an active role in the creation the majority answered affirmatively (Ribeiro, 2008). In a more advanced level
of co-design, the consumer shares ideas and new designs with the company, helping with the creation
development of pieces to his taste and desires , but that can also satisfy others clients.
3.2.4 The Body of Consumer
With 3D scanners technology is possible to provide this service which enables the manufacture of pieces
entirely customized, that fit perfectly and as a result turning the purchase process more realistic and viable.
This is crucial in this process where the distance between the consumer and the company decreases and

118
IADIS International Conference e-Commerce 2009

where the company is committed to offer customized and personalized products, to address issues of how the
pieces will fit the consumer’s body.

Figure 2. Style Shake (http://www.styleshake.com/)

3.3 Items to Include in the Customization Process


The pieces chosen as possible options for implementation in an e-commerce platform for customized
products comes from the questionnaire carried out and from several other sources such as design projects,
and website analysis (Ribeiro, 2008) (see Figure 3).

Public Feminine
Style Casual and urban
Type of Accessories, jackets dresses, Separated parts that can be mixed together
Product pieces tops, shirts, trousers, skirts) – 2 and be as 2 or more pieces of clothing - 20
Profile to 7 options to 50 options
Fabrics 5 to 8 options
Colours 10 to 15 option
Decorative Applications and printings – 10
elements to 15 options
Figure 3. Characteristics of Products
One important aspect in an electronic commerce platform is the quantity of products available. As Wind,
Rangaswamy (1999) and Haugtvedt et al. (2005) referred, the bigger the quantity of products and options of
choice the bigger the consumer becomes confused and frustrated, making it impossible for him to finish the
buying process. Consequently the number of options were chosen according to the analysis made to
customized online platforms, and are expected to be a reasonable number of choices that permits a wide
range of combinations and pieces diversity but simultaneously don’t encourage the consumer to give up and
leave.

119
ISBN: 978-972-8924-89-8 © 2009 IADIS

3.3.1 Clothing
The type of clothing to sell on this kind of platform would have to target the female segment, because in the
survey carried out we found a bigger enthusiasm from this segment in accordance with previous studies
(Bakewell et al., 2006). The urban, alternative clothing, nightwear and casual appear as the ones that would
be bought more easily. According to our survey these are the categories of clothing identified by the majority
of consumers. Consequently, urban and casual clothing are, in our opinion, the right choice to be sold on an
e-commerce platform for customized products, which is reinforced by the observation made of several
websites.
The pieces developed should follow principles of modularity, which necessarily incurs in multifunctional
options. According to the consumers inquired, the most desired multifunctional options are the existence of
separated parts that can be conjugated (ex: change of sleeves) and fulfil the function of two or more items of
clothing (ex: dressed and skirt; trousers and bag). The accessories and the coats are the pieces consumers
prefer to be multifunctional, namely by its capacity of transformation and inherent adaptation to diverse
situations and seasons.
3.3.2 Fabrics, Colours and Decorative Elements
Denim and other similar structures in cotton are the fabrics chosen especially by the knowledge of
performance, the price, and by the type of platform and target defined. The composition of these fabrics will
vary between cotton, biological cotton, wool, linen, bamboo, hemp and recycled polyester, in an average of 5
to 8 fabrics, varying with the nature of piece to produce.
The colours go from brown to beige, but being available other neutral colours following the fashion
tendencies. An average of 10 to 15 colour options will be available, that like the fabrics it can vary according
to the nature of fabric.
The consumers also show interest and desire to add extra elements, as sequins, decorative buttons, and
embroideries, with the objective of personalize and differentiate an item of clothing, increasing its personal
value. A set of elements are proposed, varying between 10 and 15 options, unfolding afterwards in diverse
colours.

3.4 Buying Experience


In the purchase experience field it is essential to try to match the virtual experience with the real one.
Because of that the presentation of the products, should have real images with possibility of several levels of
zoom and 3D rotation, and 3D simulation environments with virtual models and videos. The process should
be straightforward, user friendly and fast.
3.4.1 Equalize Real Experience
During the study one of the most important points was the consumer’s behaviour on virtual purchase
environments. In the survey the majority of the consumers stated they preference for buying in real brick-
and-mortar shops and revealed a small preference for electronic environments, for perform clothing
purchases. This could be justified mainly by the need to have direct contact with the product, try it and
evaluate its performance (Apeagyei and Otileno, 2007). It is crucial try to match the sensorial experience of
clothing purchase (Li, Daughrty and Biocca 2001), to give the feeling of pleasure and satisfaction that can
occur in traditional shopping experience (Fan et al., 2004), but also give the consumer the security in all of
the aspects of the process. With current technological evolution and level it is already possible to surpass
these obstacles and turn the purchase experience more enjoyable.
3.4.2 Products Presentation
The majority of the sites present the products on a traditional way in individual windows, with flat
photographs of the pieces or on a mannequin. Zoom functionality is generally associated to the images, but
rarely rotation and lively viewing. Presentation deficiencies are perhaps one of the main causes for the weak
number of on-line purchases, because they aren’t attractive enough to persuade the consumer. Therefore, the
existence of real images (photographs) and other forms of interactivity as the 3D rotation and by 3D
simulation environments, virtual models, with the possibility of introduction of measures and physical

120
IADIS International Conference e-Commerce 2009

characteristics of the consumer are crucial to the success of the platform (Fan et al. 2004). The existence of
small videos that allow the consumer to see the pieces in movement is also an important element to help
perceiving the fit of the piece.
3.4.3 Products Functionalities
Other functionalities associated to the presentation of the product, should be evident. Among those
functionalities we found: the availability of information about the piece; colour and/or fabric options; the
number of options to use simultaneously; size; price; the possibility to check stocks; suggestions of pieces to
mix; the possibility to have recommendations; and to write an opinion about the product.
With this description we intend to identify the main elements that should be applied on an on-line
commerce platform of customized clothing in order to enhance its success. The choice and availability of all
or just a part of the functionalities depends on the company resources and capabilities, trying to provide the
best purchase experience with quality and security, but still profitable.

4. CONCLUSION
With this analysis of consumer’s behaviour towards customized products purchase we can conclude that
consumers are interested and give importance to elements associated with clothing customization: They
desire individuality and unique products more congruent with their taste, personality and auto-image. Among
those elements the multi functionality, the co-design and the fit to the body stands out. Besides that, price
appears to be the main factor influencing the purchase decision.
Customization as an integration of traditional mass production objectives with personalization potentiates
the development of cheaper individualized fashion products is a good bet to achieve customers’ satisfaction
and companies’ success.
The majority of clothing e-commerce websites have an incomplete service, that can’t enchant consumers
in the right way. This study identifies some areas and elements that are critical to mass customization e-
commerce websites. The presentation of the product and the need to apply news technologies, such as 3D
scanners and the virtual simulation are essential to guarantee a good consumer purchase experience, the
nearest to the real one in traditional stores.
This study and content proposal to an e-commerce platform of customized products suggests key points in
diverse areas where more profound investigation and work for the implementation of this type of platform is
going to be necessary, because, consumers still show some fear toward electronic markets. It is evident that
in order to implement a project of this nature it is imperative to proceed carefully and with a deeper and
detailed evaluation of market conditions and expected profits.
Future investigations must be carried out to extend the knowledge on consumer’s behaviour for
customized products in electronic markets trying to improve the relationship on between the company and
the consumer; the development of alternative production systems that integrate mass production with
customization and finally, contributions are necessary to wipe off some cost problems associated to the
essential software and hardware.

REFERENCES
Anderson-Connell, Lenda Jo et al, 2002. A consumer-driven model for mass customization in the apparel market. Journal
of Fashion Marketing and Management, Vol. 6, No. 3.
Apeagyei, R. and Otieno, Rose, 2007. Usability of pattern customizing technology in the achievement and testing of fit
for mass customization. Journal of Fashion Marketing and Management, Vol. 11, No. 3.
Autoridade nacional de comunicações (Anacom), 2008. Informação estatística do serviço de acesso à Internet, 1º
trimestre de 2008.
Bae, JiHyun and May-plumlee, Tracci, 2005. Customer focused textile and apparel manufacturing systems toward an
effective e-commerce model. Journal of textile and apparel, technology and management, Volume 4, issue 4.
Bakewell, Cathy et al, 2006. UK generation Y male fashion consciousness. Journal of Fashion Marketing and
Management, Vol. 10, No. 2.

121
ISBN: 978-972-8924-89-8 © 2009 IADIS

Bellman, Steven et al, 2006. Designing marketplaces of the artificial with consumer mind: four approaches to
understanding consumer behaviour in electronic environments. Journal of Interactive Marketing, Vol. 20.
Cetelem, 2008. Dossier de Imprensa – O observador cetelem.
Fan, Jintu et al, 2004. Clothing appearance and fit: science and technology. The Textile Institute, Woodhead Publishing
Limited.
Haugtvedt, Curtis P. et al, 2005. Online consumer psychology: understanding and influencing consumer behaviour in the
virtual world. Lawrence Erlbaum Associates Publishers, London.
Instituto nacional de estatística (INE), Agência para a sociedade do conhecimento (UMIC), 2007. A sociedade da
informação em 2007.
Kotler, Philip et al, 1999. Principles of Marketing, Second European Edition. Prentice Hall Inc.
Kumar, Ashor, 2004. Mass customization: metrics and modularity. The International Journal of Flexible Manufacturing
Systems, Vol. 16.
Li, Hairon et al, 2001. Characteristics of virtual experience in electronic commerce: a protocol. Journal of Interactive
Marketing, Vol..15.
Lyengar, S. and Lepper, R., 2000. When choice is demotivating: can one desire too much of a good thing? Journal of
Personality and Social Psychology, Vol. 79(6).
Ma, Min-Yuan et al, 2007. A design decision-making support model for customized product colour combination.
Computers in Industry, Vol. 58.
Piller, Frank, 2004. Mass customization: reflections on the state of the concept. The International Journal of Flexible
Manufacturing Systems, Vol. 16.
Piller, Frank, 2008. Interactive value creation with users and customers.
Pine ii, Joseph and Gilmore, H, 1999. The experience economy. Harvard Business School Press, Boston, Massachusetts.
Prahalad, C. K. and Ramaswamy, 2004. Co-creation experiences: the next practice in value creation. Journal of
Interactive Marketing, Vol 18.
Ribeiro, Liliana, 2008. O co-design e a “mass customization” no desenvolvimento de uma plataforma on-line de
comercialização de vestuário. Fashion Design Master Thesis, University of Beira Interior, Covilhã, Portugal.
Wind, Jerry and Rangaswamy, Arvind, 1999. Customerization: the second revolution in mass customization. eBusiness
research centre working paper.

122
IADIS International Conference e-Commerce 2009

TIME AND SPACE CONTEXTUAL INFORMATION


IMPROVES CLICK QUALITY ESTIMATION

Mehmed Kantardzic, Brent Wenerstrom, Chamila Walgampaya


University of Louisville CECS Department
J.B. Speed Building - Room 123
University of Louisville
Louisville, KY 40292

Oleksandr Lozitskiy
Microsoft Corporation
1020 102nd Ave NE
Bellevue, WA 98004

Sean Higgins, Darren King


Hosting.com
462 South Fourth Street
Louisville, KY 40202

ABSTRACT
Click fraud is a type of internet crime that occurs in pay per click online advertising when a person, automated script, or
computer program imitates a legitimate user clicking on an ad, for the purpose of generating a charge per click without
having actual interest in the ad’s content. We propose Collaborative Click Fraud Detection and Prevention system
(CCFDP) V1.0, which integrates client and server side data to score the quality of incoming clicks. In this paper we detail
the outlier detection module which describes clicks in terms of space and time context. This module compares past data
with the current context as a preprocessing step. Our system will then combine the additional time and space
characteristics with the characteristics of a click to score the quality of incoming clicks. We believe that no other
commercial or research system for click fraud detection analyze comprehensively time and space context of each click
for better estimation of click traffic quality. Some commercial solutions give only partial solutions expressed through
their rules and triggers. We found 34.6% of clicks in an application to real data had outlying attribute-values in time and
space.

KEYWORDS
Click Fraud, Click Fraud Prevention, Click Traffic Quality, Web Analytics.

1. INTRODUCTION
A Web search is a fundamental technology for navigating the Internet and it provides information access to
millions of users per day. Internet search engine companies, such as Google, Yahoo and MSN, have
revolutionized not only the use of the Internet by individuals but also the way businesses advertise to
consumers (Wang, Lee et al. 1998; Immorlica, Jain et al. 2005; Mahdian 2006). Typical search engine
queries are short and reveal a great deal of information about user preferences. This gives search engine
companies a unique opportunity to display highly targeted ads to their users. Many services such as Google,
Yahoo and MSN generate advertising revenue by charging advertisers per click on advertisements shown.
This business model is known as the pay-per-click model.
In the pay-per-click business model, content providers are paid by the traffic they drive to a company’s
website through online ads. There is an incentive for dishonest service providers to inflate the number of
clicks their sites generate. In addition, dishonest advertisers tend to simulate clicks on the advertisements of
their competitors to deplete their advertising budgets (Metwally, Agrawal et al. 2005). This fraudulent

123
ISBN: 978-972-8924-89-8 © 2009 IADIS

behavior results in bad reputations and often extra costs. Generation of such invalid clicks either by humans
or software with the intension to make money or deplete competitor’s budget is known as click fraud.
There is no globally accepted mechanism to detect click fraud. Therefore, most of the search marketing
industries optimize traffic using their own binary paradigms, dividing clicks into two categories, valid and
invalid clicks, according to their own metrics (Clicklab LLC). These solutions are still not mature. The
bottom line is, with the exception of a small percentage of obviously genuine or robot clicks, the vast
majority of clicks simply cannot be classified to be either valid or invalid. Clicks could more accurately be
scored by quality depending on available information.
Neither commercial solutions for click fraud detection (usually based only on client side data) nor search
engine solutions (mainly using server data) offer a complete solution (Ge, Kantardzic et al. 2005; Ge,
Kantardzic et al. 2005). We initiated our work on the CCFDP system with an assumption that more data
about each click collected from different sources will result in a better estimation of the click quality. The
preprocessing phase of this system involves two main modules: a rule-based module and an outlier detection
module. The rule-based module uses both a set of handcrafted rules and a database of bad data sources to
produce a set of characteristic scores for an incoming clicks. The outlier detection module compares current
clicks with a much larger aggregation of clicks to determine deviations from normal activity. Deviations are
given a score by the outlier detection module. These scores are added to the click record to describe how a
click may be suspicious in their time and space context. Dynamic advertising profiles use the aggregated
scores from traffic sources to block future advertisements to particularly low quality sources of traffic.
Countless dollars are saved by the advertiser through eliminating the lowest quality sources of traffic.
We expect that clicks made during click fraud attacks will display detectable patterns (Daswani and
Stoppelman 2007). Our outlier detection methodology uses attribute-value pair level aggregations so that we
may detect repeats in attribute-value pairs such as user-agents, IPs, referrers and more. We maintain counts
of all attribute-value pairs through the history of advertising campaigns to determine “normal” activity for
each attribute-value pair. We then compare the aggregations of previous data with an aggregation of a current
window of context.
Our approach differs from most outlier detection methods that instead of outlier detection being the focus,
we use outlier detection to extend the description of each click with time and space context. Using our outlier
detection module we were able to score real-world click data for Hosting.com. Experimental data show a
promising separation of high-quality and low-quality clicks.
This paper is organized as follows: In section 2 an introduction to the pay-per-click model and click fraud
categories are given. In section 3 a detailed discussion about the creation of baselines is given followed by
our scoring mechanism in section 4. Section 5 discusses available solutions to detect click fraud in
advertising. Section 6 discusses data analysis and results. Conclusions and future work are given in section 7.

2. PAY-PER-CLICK MODEL
In a typical Internet traffic model, a Web user will first request a web page on the publisher’s site. The
requested page is loaded along with the advertisement on the Web user’s browser. If the Web user clicks on
an advertisement hypertext link (for example a banner ad or logo) on that page, the publisher redirects the
Web user request to the commissioner’s server. The commissioner is an independent entity that has
agreements with both the advertiser and the publisher and could be a search engine or other advertising agent.
The commissioner logs the click for accounting purposes. The commissioner then redirects the Web user’s
browser to the advertiser’s site. The publishers are paid based on the click traffic they drive to the
advertiser’s web site. The commissioner earns a percentage of this revenue. Sometimes these payments are
based on number of sales generated in the advertiser’s website, rather than the volume of traffic drives by the
publisher (Ge 2008).
Click fraud may occur in one of three ways (Kantardzic, Walgampaya et al. 2008). First, it could come
from one or more human users. For example in developing countries a number of individuals may be hired
for a nominal rate to simply click and reclick advertisements. Second, clicks may come from a robot actively
perpetrating fraud on one or more advertisements. Thirdly, fraud may occur as a background process. For
example, a user may inadvertently download some program which will cause clicks to be registered from that
machine, without the users consent or knowledge (Daswani and Stoppelman 2007).

124
IADIS International Conference e-Commerce 2009

3. DYNAMIC BASELINES
A number of definitions have been given to the term “outlier” depending upon the task at hand. For example
Hawkins (Hawkins 1980) defines outliers by the following: “an outlier is an observation that deviates so
much from other observations as to arouse suspicions that it was generated by a different mechanism.” This
description points out two important points for our task. First, that an outlier should be considered suspicious.
The deviation from “normal” data gives rise to suspicion, suspicion that some unusual mechanism has
generated this data point. Second, what is considered normal must be modeled in such a way that points that
deviate from what is considered normal can be detected and separated from the rest of the data. This section
will describe how we model normal data, or in our case normal click traffic.
Each click record is made up of a number of attributes such as browser, operating system, IP, referrer, etc.
We model each attribute separately. We will determine normal behavior for referrer separate from all other
attributes and browser separate from other attributes and so on. For each attribute we create histograms which
maintain counts for the most common values in each attribute. These histograms are called baselines. An
example of such a histogram can be seen in Figure 1 (left). In Figure 1 (left) one can see the number of clicks
for each of four values of the referrer attribute. These histograms are then used to calculate the percentages
for each value.
In addition to absolute counts being maintained in the baseline, we also measure variance. Over time
certain values were found to vary greatly in the percentage of traffic with a given value. For example traffic
with Google as the referrer varied through out time from nearly 100% to less than 50% of traffic in a given
day. This variance made comparisons with the baseline difficult. Variance is calculated using the formula to
follow.

This formulation of variance takes into consideration time periods varying in number of clicks. In the
above formula each time period within the baseline is given by i. The xi is the count within that time period
for the attribute-value pair. The ci is the total number of clicks within the time period. The value μ is the
percentage of clicks for the current attribute-value pair throughout the entire baseline. Lastly, pi gives the
percentage of clicks in the baseline from the current time period.
Our baselines are used to identify outliers in incoming traffic among the attributes. Since we are
identifying outliers based on context, we must necessarily accumulate clicks for a comparison of short term
context with past context. These short term accumulations of clicks are called aggregated windows. An
aggregated window is also treated as a histogram. An example of the comparison of an aggregated window to
a baseline can be seen in Figure 1 (left and center).

Figure 1. (Left) Global Baseline for Four Referrers as of 1/22/08. (Center) Aggregated Window for 1/22/08. (Right)
Counts and Thresholds for Referrer on 1/22/08. Thresholds are Dark Gray and Counts in Light Gray
We assume that percentages for a given attribute-value pair are distributed normally through time. An
outlier is detected when a count for an attribute-value pair in an aggregated window is found in the upper 5%
tail of the normal distribution, or is 1.645 standard deviations above the mean. We calculate the threshold in
terms of number of clicks using the following formula to ensure whole number thresholds:

125
ISBN: 978-972-8924-89-8 © 2009 IADIS

where is the percentage of the baseline made up by the attribute-value pair and σ is the standard
deviation of that percentage in the baseline. Additionally, windowsize refers to the number of clicks in the
current aggregated window. If the number of clicks in the aggregated window for a particular attribute-value
pair is greater than the threshold, then it is considered an outlier. An example of calculated thresholds for can
be seen in Figure 1 (right).
Outliers are detected for each attribute in a given aggregated window. The results are then applied to the
following context fields for each record: referrer, browser, operating system, country, ISP, and IP. If a record
has an outlying referrer for the current aggregated window, it is reflected in the referrer context field. An
example of an extended record can be seen in Table 1. Baselines are then recalculated adding in the current
aggregated window to keep baselines up to date and for comparison to future aggregated windows.
Table 1. Example Record after Outlier Detection Preprocessing. Record now Contains Server Side Data, Client Side Data
and Context Based on a Number of Attributes
Click Data Context Fields
Server Side Client Side Referrer Browser OS Country ISP IP
2 3 4 0 1 1 2 1 0.18 0.12 0.03 0.13 0.02 0

4. CONTEXT-BASED ATTRIBUTE SCORING


The CCFDP system scores each incoming click. The score will be a value in the range [0,1], where a zero
represents no evidence of fraudulent behavior, and a one represents 100% confidence in the click being
fraudulent. Within the CCFDP system, the outlier detection module provides relevant context to each
attribute for scoring each click. Each click is provided a partial score for each attribute based on the variation
of that click within the current context from normal behavior. Zero signifies that no evidence was found of
suspicious activity for the given attribute-value pair in the current context.
We will discuss two approaches for scoring an attribute-value pair when the count exceeds the calculated
threshold. The first approach to scoring attaches a context score to a click record which conveys the extent to
which a count has exceeded its threshold or the degree of suspicion for that particular count. Take for
example referrer X. In the case where referrer X’s calculated threshold is 2, it would seem logical to give a
higher partial context score if the actual count were 38 compared to 3. A different partial score is given to
counts that far exceed their threshold, compared to counts that barely exceed their threshold. This provides
more information to the overall scoring algorithm. This could allow for more refined overall scoring by
providing a range of values for suspicious activity.
This approach to scoring uses the difference between the attribute-value pair count in an aggregated
window and the corresponding threshold. Then take that as a percentage of the total number of clicks in the
aggregated window. A score in this first approach is given by the following formula:

This type of scoring will be referred to as “variable scoring” by later sections. The closer to one the score
gets, the more certainty given by the outlier detection system that something suspicious is happening. When
the score is close to zero, then little evidence for suspicion is available.
The second approach is to simply give a constant score to all attribute-value pairs exceeding their
thresholds. Click fraud is perpetrated in a large number of ways, some approaches (Daswani and Stoppelman
2007) expect that a large number of clicks over a short period of time raises suspicions, and attempt a “low-
noise click fraud attack”.

5. RELATED WORKS
Several commercial solutions (Clicklab LLC ; Web Traffic Intelligence Inc. ; Tuzhilin 2006) and academic
solutions (Immorlica, Jain et al. 2005; Metwally, Agrawal et al. 2007) exist for the problem of click fraud.
None of the commercial solutions combine data from both the client and server side. Generally, the academic

126
IADIS International Conference e-Commerce 2009

solutions are incomplete and generally focus on one specific fraudulent attack. We propose a new system for
grading the quality of clicks incorporating both client and server side data.
Several approaches to the outlier detection problem have been proposed for a variety of purposes. Some
of these approaches include statistical profiling using histograms (Javitz, Valdes et al. 1991), statistical
modeling (Yamanishi, Takeuchi et al. 2000), and clustering (Eskin, Arnold et al. 2002).
Some similar approaches to our baseline approach come from the intrusion detection research. For
example Javits et al. (Javitz, Valdes et al. 1991) discuss a real-time intrusion detection system which
produces a score per attribute, where attributes could be categorical or numerical. Rare categorical events
were given high scores or were more likely to be considered outliers. Anderson et al. (Anderson, Frivold et
al. 1995) explain at a high level a system combining both rules and anomaly detection for detecting network
security violations. Denning (Denning 1987) describes a real-time intrusion detection system which detects
large variations based on audit data. Endler (Endler 1998) detects intrusions using a histogram classifier
trained on labeled data. Ali and Scarr (Ali and Scarr 2007) developed a robust model to detect outliers and
robots based on their number of clicks from the home page. Qu et al. (Qu, Vetter et al.) devised a multi-step
process for intrusion detection. First the rates are determined per event. Then the deviation of their scoring
routine is calculated and finally a threshold value is determined for the entire process.
Overall, these papers (Qu, Vetter et al. ; Denning 1987; Javitz, Valdes et al. 1991; Anderson, Frivold et al.
1995; Endler 1998; Yamanishi, Takeuchi et al. 2000; Eskin, Arnold et al. 2002; Ramadas, Ostermann et al.
2003) show that a number of approaches have been shown to be effective in determining outliers using
frequency counts. These are stand alone outlier detection systems. Our outlier detection system is a data
preprocessing step which enables an enhanced description of clicks.

6. EXPERIMENTAL RESULTS
The data which will be used for the experiments to follow comes from the paid traffic of two very different
websites. All of our experiments use click data from Hosting.com’s website. Hosting.com is a global
company which provides hosting solutions to “business critical data assets” as explained on their website. We
also created thebestmusicsites.org, a single webpage only displaying advertisements. It was created to attract
fraudulent traffic.
Currently we have data for Aug. 2007 to June 2008 for Hosting.com and Jan. 2007 to Aug. 2007 for
thebestmusicsites.org. Traffic was filtered before being run through the outlier detection module. First, only
paid traffic is being monitored. This includes ads run on search results and network partners of Google,
Yahoo, MSN and Miva. Next, we removed all known robots from the traffic. A known robot is a robot that
declares itself in the user agent field. Known robots are generally removed from paid traffic before an
account is charged. Lastly, to prevent the distortion of baselines, repeat clicks from the same visitor (defined
by IP and user agent together) during the current window were removed. Large numbers of repeat clicks by
the same user would falsely inflate all attribute-value pairs causing false alarms and distorting normal
behavior. After filtering Hosting.com’s click data, 9,252 clicks remained of the original 1,083,037 clicks. A
majority of the original clicks recorded are not coming through paid sources.
Experiments were conducted by taking the click data that we had and simulating the progression of days.
For each available date in the data a baseline would be composed of all data previous to that date and the
current date would be used as the current window in which outliers would be detected. Unique values per
attribute per window is the level of granularity at which outliers are detected. Each click receives a score per
attribute and the scores are combined to make up a partial score for the outlier detection module to later be
combined with scores from other modules for each click. In these experiments values not found to be outliers
are given a score of zero.
The effectiveness of each experiment was based on how well traffic with known user activity was divided
between the clicks with outlying values and clicks without outlying values. Clicks with user activity are more
likely to be made by human users and therefore are more likely to be valid paid clicks. User activity is
recorded through JavaScript functionality which recorded when users used the keyboard or moved their
mouse. As an example, consider paid traffic from known robots compared to the rest of the paid traffic. Only
0.7% of traffic generated by known robots had recorded user activity, while 24% of the rest of the paid traffic

127
ISBN: 978-972-8924-89-8 © 2009 IADIS

had some form of user activity recorded. Thus we would expect traffic from known robots is of lower quality
than traffic not from known robots.
Table 2. Parameter List for the Outlier Detection Module
Parameter Description
Aggregated window length What defines the start and end of the aggregated window?
Global baseline history length How long of a time period is encapsulated by the global baseline?
Minimum global baseline rate What is the minimum allowable baseline rate to be stored in the database?
Method of scoring How will each outlier be scored?
The user defined parameters for the proposed algorithm can be seen in Table 2. For the experiments
explained here we have set the “aggregated window length” to 24 hours. The global baseline history length
will be set to a year. The “minimum global baseline rate” used is 0.5%. In our experiments to follow we will
compare two proposed methods of context scoring. Lastly, we will test the module with the parameters tuned
by previous testing on all of Hosting.com’s paid clicks to determine the usefulness of our approach.

6.1 Scoring Method for Outliers in Aggregated Windows


When an outlier is found, there are a number of ways to determine what score to attach to that attribute-value
pair. We have mentioned two scoring approaches in Section 4. The first was to use a constant for the score,
and we will call this method “constant scoring”. The second approach was to determine the degree to which
the count exceeded the threshold, will be referred to as “variable scoring”.
We now add two additional rules to the variable scoring technique, (1) that if the window size was less
than 20, that a value of 20 be used for the window size, and (2) that scores that exceed the score of 0.2 be
reduced to 0.2. We found that when the window size is only 3 or 4 clicks, large scores could result merely
due to the window size. Putting a maximum value on the score made very little difference in the outcome, but
prevented the rare case of a single attribute-value pair receiving extreme values such as 0.6 which would
have a large impact on an overall score. These rules serve as a saturation function to prevent any single
attached partial score from having too much influence on the final score of a click.

Figure 2. Comparison of Scoring Methods by User Activity Rates. Constant Scoring is on the Left and Variable Scoring
is on the Right

Table 3. Break Down of User Activity Percentages for Scoring Table 4. Outlier Detection Performance
Techniques by Scoring Bins (Another View of Figure 2)
Outlying
Context Score Constant Scoring Variable Scoring Column Count Percentage
0 1625 / 6052 (26.9%) 1625 / 6052 (26.9%) referrer 1,714 18.5%
(0, 0.05] - 295 / 1319 (22.4%) ISP 924 10.0%
(0.05, 0.1] - 139 / 757 (18.4%) browser 922 10.0%
(0.1, 0.15] - 44 / 318 (13.8%) OS 834 9.0%
(0.15, 0.2] 591 / 3200 (18.5%) 113 / 693 (16.3%) country 504 5.4%
total 2216 / 9252 (23.9%) 2216 / 9252 (23.9%) IP 84 0.9%
total 3,200 34.6%
Constant scoring used the score of 0.2. The value 0.2 was only used for testing this system.

128
IADIS International Conference e-Commerce 2009

A comparison of the two scoring methods by user activity rates can be seen in Figure 2 and Table 3.
Figure 2 depicts two mosaic plots showing user activity percentages according to context score. Constant
scoring had two score levels 0 and 0.2. The variable scoring provided a large number of maximum scores.
We split the scores above zero into four levels. As can be seen from the graph and table, as the score
increases the percentage of clicks with user activity decreases, except for the range (0.1, 0.15]. This general
trend of decreasing user activity rates by maximum context score shows that the variable scoring approach
provides more useful information than constant scoring.

6.2 Overall Performance of the Outlier Detection Module


In this section we show the results of the tuned outlier detection module on the Hosting.com data. The goal of
this research was to create a preprocessing step which would add context in time and space to each new click.
The previous experiment suggests that context scoring provides better separation of low and high quality
clicks, where quality is judged by user activity rates.
In Table 4 we show the percentage of each attribute found to be an outlier. Overall we see 34.6% of paid
clicks on Hosting.com had an outlier in one or more attributes. The attribute with the most number of outliers
is referrer. IP had the fewest number of outliers. This should be the case, because we find the most number of
unique values in IP. This is why country and ISP are necessary to group IPs geographically.

Figure 3. (Left) Timeline of Hosting.com Clicks from January 2008 through June 2008. (Right) Clicks with Outlying
Attribute(s) from May 27 through June 20, Showing the Two most Prevalent Referrers during this Period
To gain additional insight into our traffic source, we plot click counts over time in Figure 3 (left). Clicks
which have one or more outlying attributes are labeled as “outliers”. From these two graphs we can see that a
large number of outliers occurred during the end of May and the start of June. During this period there were a
number of factors that would contribute to outlying scores. First, there was a major shift in keywords
selected. Next there was a spike in traffic over a short period of time. This could reflect a natural burst in
traffic or could be the result of click fraud. Upon further review 45% of the clicks with non-zero, partial
context scores during late May, early June came from two, never before seen referrers, see Figure 3 (right).
These two referrers were more common than any referrer except Google and an empty referrer, which is
suspicious. More information is required to determine the level of suspicion.
From these results we see that the outlier detection module is able to add new context-based information.
This new information provides a better description of the clicks than is currently available through
commercial and non-commercial means. This added information will aid the CCFDP system in better scoring
the quality of clicks.

7. CONCLUSION
In this paper we outline a methodology for preprocessing paid clicks for the extraction of additional context-
based information (in time and space). The improved description of incoming clicks will improve the
analysis and estimation of click quality. We tested this module on a years worth of advertisement click data

129
ISBN: 978-972-8924-89-8 © 2009 IADIS

for Hosting.com and found outliers in one or more attributes of 34.6% of clicks. These clicks show evidence
of suspicious behavior, but will require the entire scoring process to determine the quality of the click.
We are continually collecting data from different websites to test our CCFDP system and we plan on
testing the entire integrated system with this new data. We plan on comparing our system to a number of
commercial solutions. This will enable a more accurate understanding of the improvements that we are
proposing in our CCFDP system.

ACKNOWLEDGMENT
This research has been partially funded by National Science Foundation (NSF) under grant #0637563 and
Kentucky Science and Technology Corp. (KSTC) under grant #KSTC-144-401-07-018.

REFERENCES
Ali, K. and M. Scarr, 2007. Robust methodologies for modeling web click distributions. WWW, ACM Press New York,
NY,USA.
Anderson, D., T. Frivold, et al., 1995. Next-generation Intrusion Detection Expert System (NIDES): A Summary, SRI
International, Computer Science Laboratory.
Clicklab LLC. from http://www.ClickLab.com.
Daswani, N. and M. Stoppelman, 2007. The anatomy of Clickbot. A. Proceedings of the first conference on First
Workshop on Hot Topics in Understanding Botnets table of contents.
Denning, D. E., 1987. An Intrusion-Detection Model. IEEE Transactions on Software Engineering 13(2): 222-232.
Endler, D., 1998. Intrusion Detection Applying Machine Learning to Solaris Audit Data. Proceedings of the 14th Annual
Computer Security Applications Conference, IEEE Computer Society.
Eskin, E., A. Arnold, et al., 2002. A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in
Unlabeled Data. Applications of Data Mining in Computer Security, Kluwer.
Ge, L., 2008. CCFDP V. 1.0: Final report for STTR-NSF project #0637563.
Ge, L., M. Kantardzic, et al., 2005. CCFDP: Collaborative Click Fraud Detection and Prevention System. International
Conference on Computer Application in Industry and Engineering. Honolulu.
Ge, L., M. Kantardzic, et al., 2005. Collaborative Click Fraud Detection and Prevention System (CCFDP) Discovers
Software-Based Click Fraud. IADIS e-Commerce. Porto, Portugal.
Hawkins, D. M., 1980. Identification of outliers. London, England, Chapman and Hall.
Immorlica, N., K. Jain, et al., 2005. Click Fraud Resistant Methods for Learning Click-Through Rates. Workshop on
Internet and Network Economics (WINE), Hong Kong.
Javitz, H. S., A. Valdes, et al., 1991. The SRI IDES statistical anomaly detector. Research in Security and Privacy, 1991.
Proceedings., 1991 IEEE Computer Society Symposium on: 316-326.
Kantardzic, M., C. Walgampaya, et al., 2008. Improving Click Fraud Detection by Real Time Data Fusion. IEEE
International Symposium on Signal Processing and Information Technology, Sarajevo.
Mahdian, M., 2006. Theoretical challenges in the design of advertisement auctions, The Capital Area Theory Symposia,
University of Maryland.
Metwally, A., D. Agrawal, et al., 2005. Duplicate Detection in Click Streams. Proceedings of the 14th WWW
International World Wide Web Conference: 12-21.
Metwally, A., D. Agrawal, et al., 2007. Detectives: detecting coalition hit inflation attacks in advertising networks
streams. Proceedings of the 16th international conference on World Wide Web: 241-250.
Qu, D., B. M. Vetter, et al., Statistical Anomaly Detection for Link-State Routing Protocols. contract 30602(96-C): 0325.
Tuzhilin, A., 2006. The Lane’s Gifts v. Google Report.
Wang, H., M. K. O. Lee, et al., 1998. Consumer privacy concerns about Internet marketing. Communications of the ACM
41(3): 63-70.
Web Traffic Intelligence Inc. from www.clickalyzer.com.
Yamanishi, K., J. Takeuchi, et al., 2000. On-Line Unsupervised Outlier Detection Using Finite Mixtures with
Discounting Learning Algorithms. KDD.

130
IADIS International Conference e-Commerce 2009

THE BRAZILIAN MOBILE DIGITAL CONTENT MARKET:


AN OVERVIEW

Marcelo Cortimiglia, Filippo Renga and Andrea Rangone


Politecnico di Milano - Department of Management, Economics and Industrial Engineering
Via Giuseppe Colombo, 40 – 20133, Milan, Italy

ABSTRACT
Mobile telephony is one of the most important segments of the global telecommunications industry. As a result of
subscription saturation in some markets and intense competition for market share in others, voice revenues stagnate and
mobile telephony network operators (MNO) find themselves increasingly dependent on data revenues, such as those
derived from the creation, distribution and use of digital content. This reality is especially true in emergent countries like
Brazil, China, Russia and India, which are frequently referred to as the mobile battleground for the next decades.
Furthermore, there is a lack of empirical academic studies about specific mobile data services, such as the mobile content
segment, which could expand the understanding of subtleties in topics such as value networks (at firm level) and service
adoption (at individual level). In this context, this paper presents the results of an empirical study to analyse the offering
of mobile digital content in Brazil. A two-phase mixed methods exploratory research was conducted, consisting of a
quantitative web and WAP-based survey of 3,678 mobile content services complemented by a deep case study on the
Brazilian Mobile Content Value Network based on 39 semi-structured interviews with key market experts.

KEYWORDS
Mobile Commerce, Emerging Countries, Digital Content.

1. INTRODUCTION
Telecommunications is one of the most important businesses today. Estimated 2008 worldwide revenues
accounted for circa U$ 1.7 trillion, a number expected to grow to U$ 2.7 trillion by 2013 (The Insight
Research Corporation, 2007). Of special interest is the mobile telephony segment. According to the GSM
Association, there are currently more than 4 billion mobile connections worldwide, reaching 6 billion by
2013 (Mika, 2009).
However, there is a global trend for stagnant or even decreasing voice revenues, leaving data revenues to
fuel the growth of the industry. While this was already pointed out at the beginning of the 2000s by Maitland
et al. (2006), it is an even more strong proposition today, as the mobile industry suffers in the wake of global
economic recession (Richtel, 2009). A natural response is that of heightened interest in data business, an
umbrella term that encompasses segments such as mobile marketing, mobile content, mobile payment,
mobile search, and mobile services (Dunnewijk & Hultén, 2007, Kallio et al., 2006). Among these, mobile
digital content is one of the most promising. In 2007, mobile music worldwide was worth U$ 9.3 billion, and
mobile games over U$ 5 billion (Netsize, 2007). Holden (2008b) expects that the global mobile content
market will be worth U$ 167 billion by 2013.
Evidence of the same trends can be found in emerging countries, especially in the so-called BRIC
(acronym for Brazil, Russia, India and China). The combined telecommunications market for these countries
was worth U$ 256.1 billion in 2007, with more than 1 billion mobile subscribers, and voice average revenue
per user (ARPU) will decrease from U$ 8.05 in 2008 to U$ 5.90 in 2013, while data ARPU will increase
from U$ 1.94 to U$ 2.49 in the same period (Kitson, 2008). Particularly in Brazil, evidence for these trends
can already be seen: network operators' gross data revenues for the 3rd quarter of 2008 accounted on average
9.6% of gross service revenues, up 2 p.p. year-over-year (Teleco, 2009d). Similarly, Frost & Sullivan (2008)
highlights the importance of mobile content in Brazil by estimating at 37.7% the number of mobile

131
ISBN: 978-972-8924-89-8 © 2009 IADIS

subscribers that used at least one mobile content service during 2007, while forecasting a 34.9% compound
annual growth rate between 2007 and 2013.
Mobile Content is also relevant from an academic point of view, as there are intriguing unresolved academic
issues in the field of business strategy applied to the mobile digital content industry. In the context of a changing
mobile phone landscape characterized by a large number of firms establishing increasingly complex
relationships between them, there have been discussions about a product- or service-focused value network
structure replacing the simpler firm-focused value chain structure (Peppard & Rylander, 2006; Funk, 2009). In
this context, characteristics of value networks become highly dependent on the type of product or service being
considered. This is a further motivation for studying in detail a particular type of mobile data service, such as
the mobile content segment. Moreover, at the individual level of analysis, it seems that the topic of mobile
services adoption is still lacking a substantial empirical base. In particular, Bouwman et al. (2008) highlighted
the importance of taking into account the specific characteristics and user values involved with different types
of mobile data services when investigating its adoption. This kind of problem is even more pressing when
considering the impact of local economic, legislative, technological and cultural realities in mobile data industry
segments (Funk, 2006, 2007; Lu et al., 2007; O'Donnel et al., 2007; Bouwman et al., 2008).
Although it is clear the business and academic relevance of the mobile content industry, especially in
emerging countries, up to now there are no systematic studies about the topic in such countries. In light of
these considerations, the objective of this paper is to present a descriptive overview of the Brazilian mobile
content business environment, with special focus on the mobile content offering.

2. LITERATURE OVERVIEW
In this section, it is presented an overview of published research on the topics of mobile business and commerce
and mobile digital content, as well as an overview of the Brazilian mobile telecommunications sector.

2.1 Mobile Business and Commerce


In many sources, the expressions mobile business and mobile commerce are used quite interchangeably.
However, some argue that mobile business is focused on the impact of mobility on organizational structures,
strategies and processes (Scornavacca et al., 2006, Barnes & Scornavacca, 2007). It is, evidently, the realm of
business to business (B2b) and business to employee (B2e) applications, outside the scope of this paper.
In literature, mobile commerce is usually referred to as a subset – or an extension – of electronic
commerce. A classical definition of mobile commerce was provided by Barnes (2002): “any transaction with
a monetary value – either direct or indirect – that is conducted over a wireless telecommunication network”.
It includes but does not limit mobile commerce to the purchase of goods or services, opening up the case for
applications such as mobile payment and advertisement. It is still a wide definition, but much more rooted in
B2C. There are, however, even narrower definitions, like the one by Maitland et al. (2006): “buying and
selling of goods and services through wireless hand-held devices”. It is this narrower definition, particularly
adequate to the purpose of researching mobile content, which will be adopted here.

2.2 Mobile Digital Content


A practical concept for digital content is proposed by Loebbecke and Huyskens, 2007, who define it as data,
information or knowledge products traded exclusively through online networks and characterized by
indestructibility, transmutability, reproducibility, intangibility (understood specifically as immateriality, or
absence of any tangible components), and by the fact that usually product quality can be learned only by
actually using the good. This definition of digital content is valid independently of the technological platform
for content distribution and use. Therefore, to define mobile digital content as a particular subset of digital
content it is enough to limit its creation, distribution and use to that technology.
In light of these considerations, the definition of mobile digital content adopted in this paper is that of
Feijóo et al., 2009: “mobile content refers to the creation-production, distribution-access and consumption-
use-interaction of content, be it creative or processed information, on a mobile platform, consisting at least of
a mobile device and/or a mobile network”. Consequently, person-to-person messaging services, payment

132
IADIS International Conference e-Commerce 2009

services, marketing and promotion services, customer relationship management services, and mobile
commerce for physical products are not included in the definition of mobile content adopted in this research.
It is also important to highlight how specific attributes of mobility relate to the concept of mobile digital
content. Clarke (2001) mentions four mobile value proposition attributes: ubiquity, convenience, localization
and personalization. By ubiquity, the author indicates the fact that most mobile devices are constantly
connected to the network and, as such, are constantly capable of sending and receiving data, virtually
meaning availability at any time and everywhere. Similarly, convenience means that mobile users are not
restricted by usual time and place constraints, while the localization attribute indicates the ability to easily
locate and identify the mobile user. The combined effect of these attributes is that of enabling both proactive
pushing and enrichment of mobile content by adding real-time and/or location-enhanced characteristics.
Finally, by personalization Clarke (2001) means the fact that mobile phones are extremely personal
devices, usually directly linked to only one user, reflecting his own preferences and desires for self-
expression. A possible effect of the personalization attribute is an increased importance of mobile content
that can be used to turn the device into a tool for expressing the user's personality and lifestyle. At the same
time, it may open up opportunities for enriching informational content by tailoring it to each user own
personal characteristics and interests.
Considering the particularities of mobile content, it can be concluded that mobile content types are
extremely varied and diverse. In fact, many mobile content taxonomies were already proposed (Steinbock,
2005; Netsize, 2007; Netsize, 2008; Holden, 2008a, 2008b, 2008c). Most can be narrowed down to the
following types of content, based on the creative or informative value of the content itself (Feijóo et al.,
2009): Mobile Television (referring to broadcasting delivery mode) and Video (on-demand delivery); Mobile
Music (ringtones and fulltracks); Mobile Gaming; Mobile Adult; Mobile Personalization (wallpapers and
images); Mobile User-Generated Content; Mobile Publishing; Mobile Advertising; and Mobile Gambling.
It is clear that there is significant overlapping among categories in this taxonomy. For instance, an image
may be classified both as Personalization and Adult, while a ringtone may be classified as both Music and
Personalization, and User-Generated Content can be classified as almost any other content type. In order to
avoid this kind of pitfall, another possibility would be to classify mobile content according to the perceived
value for the users (or the value proposed by the offerer) instead of the intrinsic content or informational
value itself. This is the approach adopted in this paper, where the following content types are considered:
• Infotainment: includes both information-based and entertainment-based content. Examples of
information-based content are news accessible through WAP sites or delivered through text alerts, while
examples of entertainment-based content include music and videos, both downloaded and streamed, and
television broadcasted to mobile phones.
• Communication & Community (C&C): content focusing on or enabling interaction, interactivity
and/or collaborative content generation by users, such as chat, social networks and forums.
• Customization: content designed to customize the device in order to make it reflect the user's own
personality and lifestyle. Examples of customization are ringtones, wallpapers and screensavers.
• Betting: content related to gambling, such as lotteries and reverse auctions. The content component
of these services is mainly the feedback the user gets when placing the bet or bid, or updates during the
course of the game.
• Gaming: content based on or enabling interaction with a gaming application, either embedded or
accessed through the wireless connection.

2.3 Mobile Telecommunications in Brazil


Brazil is the largest and most populous country in South America, with circa 192 million population
(International Monetary Fund, 2008a). The country has a strong industrial base and well developed
commerce and service sectors, being the largest economy in Latin America. Estimations for 2008 indicate a
GDP of U$ 1.66 trillion at current prices (a 5.2% growth) and 5.7% annual inflation (International Monetary
Fund, 2008a, 2008b). ICT are relatively pervasive: 98% of the households have access to TV, 89% to radio,
74% to mobile phone, 45% to fixed phone and 24% to desktop computer (Balboni, 2008). Brazil has a high
Internet diffusion rate when compared to other developing countries: 17% of the households have Internet
access (circa half of those broadband), with Internet users reaching 45% of the population (Balboni, 2008).

133
ISBN: 978-972-8924-89-8 © 2009 IADIS

At the end of 2008, mobile telephony coverage reached circa 93% of the population, mobile subscribers
amounted to 150.6 million, a 24.5% year-over-year increase, and mobile penetration was 78.11% (Teleco,
2009a). These numbers make the country the 5th largest global mobile market by number of subscribers.
Moreover, Balboni (2008) found that in 2007 the percentage of the population that owned a mobile phone
was 51% (a 9 p.p. increase over 2006), while 66% of the population had used a mobile phone (up from 61%
in 2006). National average ARPU was U$ 16.4 at the end of third quarter 2008 (Teleco, 2009c), while the
combined gross revenues for the top four MNOs for 2007 was estimated at U$ 31.1 billion (Teleco, 2009b).
Subscriber base at the end of 2008 was 80.6% pre-paid, network technology mainly 2G and 2,5G (88.9%
GSM; 8.45% CDMA; 0.77% TDMA; 0.01% AMPS), while only 1.87% of the subscribers used 3G
technologies (Teleco, 2009a), as it has been commercially introduced only in the course of 2008.
Brazil followed the consolidation trend that characterized most mobile markets in the late 90s and early
2000s. As a comparison, while in 2001 circa 40 MNOs operated in Brazil, presently there are only seven,
four of them having national coverage (Vivo, Claro, TIM and Oi), while the remaining three (Sercomtel,
CTBC and Unicel) having only local coverage. There are no MVNO, as regulation regarding the issue has
not yet been defined. It may be argued that MNO are still focused on improving market share, concentrating
on new customer acquisition and price competition for voice services. In December 2008, Vivo was the
market leader (29.84% market share) followed by Claro and Tim (25.71% and 24.17%, respectively) and Oi
(19.91%). Other MNO's market shares are marginal (less than 0.5% combined) (Teleco, 2009c).

3. METHODOLOGY
The research is of an exploratory and descriptive nature, as it aims to present a first investigative approach to
a complex and contemporary subject. The empirical study had two sequential phases. The first one was
quantitative, having as main data collection procedure a Web and WAP-based survey of the mobile content
offering in Brazil. A qualitative phase followed in the form of a deep case study (Yin, 2003) on the Brazilian
Mobile Content value network involving the interview of 39 market experts, including executives from major
mobile content producers, aggregators and retailers. Secondary qualitative data sources, such as journal
articles, conference papers, industry-related news, reports and books complemented both phases.
The research was conducted in collaboration with the Politecnico di Milano (Italy). Three researchers
were involved in the first phase and two in the second. Research design contemplated two distinct stages for
the quantitative phase. The first was conducted at distance, using web search engines and web-based WAP
emulators, and took place from August to early September 2008. The second stage, during late September
2008, was conducted in loco with mobile phones. During this second stage, researchers also surveyed mobile
content advertisement in traditional media. Even if the survey cannot be said to be throughly complete, it can
be assumed that it is representative enough for a valid analysis. The fact that survey results where cross-
checked by interviewees renders the assumption even more plausible.
For the survey, services were categorized according to type of content, technology platform for content
delivery or use, and revenue model. The content types were already mentioned in section 2.2: Infotainment,
C&C, Customization, Betting, and Gaming. Technology platforms include SMS, MMS, Download,
Streaming, Client-Server Application, Browsing, and Digital TV Broadcast. Finally, revenue model include
single-buy, subscription, both single-buy and subscription, and free. When possible, information about the
content creator, aggregator and retailer, pricing and number of single items offered were collected.
A first sample of 56 potential subjects for the interviews was identified during the survey, consisting of
top managers for companies considered medially or highly relevant for the market. Criteria for inclusion in
this sample were mainly subjective, involving the number of services offered or supplied by the company,
media presence and perceived brand strength (both nationally and internationally), and convenience for
procuring the interview. Other than managers, this potential sample included a number of market analysts,
academia and media experts on the topic in hand. Again, the selection criteria were subjective, a combination
of self-declared experience dealing with the market (for media experts and market analysts) and academic
relevance measured by number of published papers (for academics). Of these, 25 semi-structured interviews
were conducted between October 2008 and January 2009. Additionally, 23 new subjects were considered
following a snowball sampling (Coleman, 1958) after the first round of interviews was finalized. Of these, 14
new interviews were conducted during the months of January and February 2009.

134
IADIS International Conference e-Commerce 2009

4. RESULTS
A total of 3,678 services from 291 retailers were surveyed, and 39 semi-structured interviews with executives
and market experts were conducted.

4.1 Type of Content


The most common mobile content type in Brazil is Infotainment (79%), but Customization is also relevant
(11%). Interviewees hinted that the high proportion of Infotainment is related to a strong presence of media
and web companies playing the role of content retailers and providers. On the other hand, the relatively small
presence of companies focusing purely on mobile content retailing may contribute to the lesser role of
Customization, which is traditionally the mainstay of this type of player. Moreover, experts mentioned that
Customization content suffers from competition with free content available in the Internet.
Gaming and C&C represent lesser segments (5% and 4%, respectively). However, they deserve praise for
content quality and variety. Diverse propositions of gaming content were found, from prize quizzes promoted
by media companies available through Browsing and SMS platforms to downloadable games offered mainly
by pure content retailers, even if faced by contrary market structural issues such as high prices for data
transmission and low diffusion of sophisticated mobile devices. Interviewees mentioned that games are
considerably profitable, being fairly resistant to competition with illegal free content. Additionally, a
common perception among experts is that C&C is still underdeveloped, but is expected to see a substantial
increase in both offer and demand in the near future, as 3G networks are rolled out and more subscribers
adopt the new technology.
Finally, Betting content amounts to only 1% of the offering, but is deemed by market experts to represent
a substantial part of the overall revenues. This is so because of the reverse auction format, publicized by large
media companies with national coverage and later adopted by MNOs and other players, and considered to be
extremely profitable. However, reverse auctions are under government scrutiny, as some argue that it does
not abide to the current legislation for gambling.

4.2 Technological Platform


The leading technological platform for mobile content in Brazil is Browsing, accounting for 40% of the
analyzed offering. SMS and Download can also be considered very relevant, representing 32% and 23% of
the offering, respectively. Streamed mobile content is incipient, as only 4% of the offering was available
through Streaming. Other technological platforms, such as Client/Server Applications (0,3%), MMS (0,5%)
and Digital TV Broadcast (1%) are marginal.
The overall picture for technological platforms indicates a strong tendency for content delivery through
unsophisticated technologies, mainly text messaging. This can be explained by the wide diffusion of
technologically limited devices and users being familiar with the SMS technology because of its ample use as
alternative to voice calls for personal communication. Interviewees confirmed that although it is not the most
prevalent in terms of offering quantity, SMS is the platform that generates most revenues.
The limited role of Download may be related to confusing pricing policies and high prices charged by
MNOs for data transmission. These barriers, according to the interviewees, are also holding back the
expansion of more sophisticated technological platforms, such as MMS and Digital TV Broadcast. The later,
besides, mirrors the situation of the general Digital TV technology in Brazil, introduced recently and lacking
overall diffusion even in the pure TV format.
At the same time, however, the high prices and confusing pricing policies for data transmission may seem
to contrast with the significant Browsing offer. Interviews with market experts helped clarify this apparent
paradox. According to their perception, mobile users in Brazil either do not access WAP at all or are
moderately heavy users. Although a decisive minority (estimates vary from 3 to 5 million), these heavy users
are highly profitable, as they usually own high-end mobile devices, know beforehand what kind of content
they want and how to obtain it, and make use of discounted data plans. Moreover, experts believe that heavy
WAP users tend to be experienced Internet users, and expect a comparable level of content quality in the
WAP platform. Interviewees also indicated that some content offerers prefer the WAP instead of the Web as
retail channel in order to avoid direct competition with illegal content sources, which in their perception tend

135
ISBN: 978-972-8924-89-8 © 2009 IADIS

to be sought after by Brazilian web users. Finally, some market experts pointed out the fact that MNO
invested heavily in the WAP platform in the early 2000s, expecting substantial returns in the form of data
revenues and favoring Infotainment WAP sites open to consultation without premium charges. Indeed, 90%
of the Browsing offer is composed by Infotainment.

4.3 Revenue Model


Premium mobile content in Brazil comprises 58% of the surveyed offering. It is important to notice the
relevance of the subscription revenue model, as more than half of the premium mobile content can be
subscribed (47% requires subscription, while 11% can be acquired either by subscription or single buy).
Interviews indicated that content retailers are presently changing their single-buy offer to subscription-based
revenue models, in order to stabilize a demand that otherwise can be very unpredictable. Market experts
interviewed were convinced that single buy revenue model will markedly decrease in the near future.
The complementary free content (42% of the overall offering) mostly represents Infotainment available
through Browsing. Indeed, 89% of this free content was classified as Infotainment, and included WAP sites
with rich and relevant content offered by renowned players from traditional media and web sectors. Experts
pointed out a revenue model where MNOs and content provider share revenues from data traffic in content
provider's WAP site as an important driver for this type of offering.

4.4 Transversal Issues


Besides providing clarification about the offering, interviews highlighted transversal issues related to
structural aspects of the market. A first issue is that of the high prices for data transmission, already
mentioned before. Coupled with the usual complex and confusing pricing policies for data transmission, this
is deemed by market experts as an important barrier to mobile content diffusion in Brazil. It is believed that
MNOs should address this barrier in the near future in order to stimulate market development.
A second issue unanimously cited as one of the main barriers for market growth is that of the high taxes.
Interviewees complain that effective taxes can reach as much as 35% of the gross revenues. Moreover, they
pointed out the fact that some taxes are collected at each level of the value network, resulting in multiple
taxation for the same transaction.
A third issue mentioned was the lack of market regulation by the government, and players themselves
have not reached a consensus for auto-regulation. In the meanwhile, a growing number of consumer post
complains regarding bad market practices, such as confusing and misleading subscription models.
Finally, a fourth transversal issue relates to the relationship between MNOs and the rest of the value
network. Having ownership over the end customer, MNOs have the strongest bargaining power in the whole
value network. As a result, revenue share agreements may not generate enough remuneration to the middle
and upper tiers. In fact, some market experts suggested that the current share of revenue retained by most
MNOs, circa 50% of the gross revenue, can be a significant barrier to further development of the mobile
content market, as it obviates experimental retail models or value propositions that do not rely on large
volumes of sales. On the other hand, MNOs' stronger bargaining power also means that they may impose
harsh conditions for new entrants, or even for incumbents that wish to launch new services or experiment
with new revenue and value proposition formats. Finally, some experts pointed out that MNOs do not see
mobile data as strategically important, as there is still much competition going on for market share in the
voice market. As a result, experts mentioned that investments in data infrastructure by the MNOs lagged in
the past. Although this is rapidly changing with the advent of the 3G networks, some experts still believe
MNOs' data resources to be inefficient, particularly the billing systems. This, combined with low ARPU,
results in extremely high billing failure levels, which further discourages investments in mobile content.

5. CONCLUSIONS
In the light of the growing importance of data services in mobile telecommunications, this study presented an
overview of the Brazilian mobile content market. A two-phase mixed methods exploratory research was
conducted. The first phase consisted of a web and WAP-based census of 3678 mobile content services. It was

136
IADIS International Conference e-Commerce 2009

complemented by a second, qualitative phase made up by a deep case study about the Brazilian Mobile
Content value network consisting of 39 semi-structured interviews with key executives and experts.
Results indicate that mobile content in Brazil is extremely rich and diverse, although technologically
restricted by the fact that most mobile devices in the market have limited technological capabilities and 3G
networks are recent. Infotainment is the predominant offering, while Customization lags behind. Gaming and
C&C content, although not much representative, are considered to have remarkable quality. In particular,
C&C is believed to have high growth potential in the near future. Similarly, SMS and Browsing platforms
were found to be especially relevant. While SMS is popular because of its simplicity and low cost, quality
WAP sites are a direct result of investments by the MNOs in the early days of WAP combined with a
perceived profitability related to WAP users and a remuneration model that shares data transmission
revenues between MNO and content provider. Low average ARPU, high taxes, high prices charged by MNO
for data traffic and confusing pricing policies were identified as significant barriers for the further
development of the mobile content market in Brazil.
A number of limitations to the study must be highlighted. First of all, the mobile content market is a new
and dynamic business environment, subject to constant and rapid change. This, coupled with limitations
derived from a few methodological choices, make it so that the offering mapped cannot be said to fully
represent the complete mobile content offer in Brazil. Even so, it can be argued to be sufficiently
representative of that particular instant, and sufficient for the analysis desired. Furthermore, the lack of
comparative data renders impossible to establish an evolutionary profile for the market. Finally, a third
limitation may be established by the nature of the research itself. As an exploratory and mainly descriptive
study, the present research is somewhat limited in its power to point out eventual correlation effects and draw
explanatory conclusions. These should be the object of further investigations, which may build up on the
initial overview provided by this paper.

REFERENCES
Balboni, M., 2008. Survey on the use of Information and Communication Technologies in Brazil: ICT Households and
ICT Enterprises 2007. Comitê Gestor da Internet no Brasil, São Paulo, Brasil.
Barnes, S.J., 2002. The mobile commerce value chain: analysis and future developments. International Journal of
Information Management, Vol. 22, No. 2, pp. 91-108.
Barnes, S.J. & Scornavacca, E., 2007. The emergence of mobile commerce. In S.J. Barnes (editor), E-Commerce and V-
Business: Digital Enterprise in the Twenty-First Century, 2nd edition. Butterworth-Heinemann, Oxford, UK.
Bouwman, H. et al., 2008. Trends in mobile services in Finland 2004-2006: from ringtones to mobile Internet. Info, Vol.
10, No. 2, pp. 75-93.
Clarke, I., 2001. Emerging value propositions for m-commerce. Journal of Business Strategies, Vol. 18, No. 2, pp. 133-
148.
Coleman, J.S., 1958. Relational Analysis: The Study of Social Organization with Survey Methods. Human Organization,
Vol. 17, No. 4, pp. 28-36.
Dunnewijk, T. & Hultén, S., 2007. A brief history of mobile communication in Europe. Telematics and Informatics, Vol.
24, No. 3, pp. 164-179.
Feijóo, C. et al., 2009. Exploring a heterogeneous and fragmented digital ecosystem: Mobile content. Telematics and
Informatics, Vol. 26, No. 3, pp. 282;292.
Frost & Sullivan, 2008. Latin American Mobile Content Markets, retrieved February 2, 2009 from
http://www.researchandmarkets.com/reports/612484.
Funk, J.L., 2006. The future of mobile phone-based Internet applications: A view from Japan. Technovation, Vol. 26, No.
12, pp. 1337-1346.
Funk, J.L., 2007. Solving the startup problem in Western mobile Internet markets. Telecommunications Policy, Vol. 31,
No. 1, pp. 14-30.
Funk, J.L., 2009. The emerging value network in the mobile phone industry: The case of Japan and its implications for
the rest of the world. Telecommunications Policy, Vol. 33, No. 1-2, pp. 4-18.
Holden, W., 2008a. Mobile Entertainment Markets – Opportunities & Forecasts 2007-2012. Juniper Research Limited,
Hampshire, England, 2008a.
Holden, W., 2008b. Mobile Content Strategies & Business Models – Scenarios & Forecasts 2008-2013. Juniper Research
Limited, Hampshire, England.

137
ISBN: 978-972-8924-89-8 © 2009 IADIS

Holden, W., 2008c. Mobile Gambling: Casinos, Lotteries & Betting 2008-2013, 5th Edition. Juniper Research Limited,
Hampshire, England.
International Monetary Fund, 2008a. World Economic Outlook Database, October 2008, retrieved February 1, 2009 from
http://www.imf.org/external/pubs/ft/weo/2008/02/weodata/index.aspx.
International Monetary Fund, 2008b. World Economic Outlook. International Monetary Fund, Washington, DC, USA.
Kallio, J. et al., 2006. An international comparison of operator-driven business models. Business Process Management
Journal, Vol. 12, No. 3, pp. 281-298.
Kitson, A., 2008. BRIC Mobile Opportunities – Markets & Forecasts 2008-2013, Juniper Research Limited, Hampshire,
England.
Loebbecke, C. & Huyskens, C., 2007. Online delivered content: concept and business potential. In S.J. Barnes (editor), E-
Commerce and V-Business: Digital Enterprise in the Twenty-First Century, 2nd edition. Butterworth-Heinemann,
Oxford, UK.
Lu, Y. et al., 2007. The mobile business value chain in China: a case study. International Journal of Electronic Business,
Vol. 5, No. 5, pp. 460-477.
Maitland, C.F. et al., 2002. The European market for mobile data: evolving value chains and industry structures.
Telecommunications Policy, Vol. 26, No. 9, pp. 485-504.
Michael, A. & Salter, B., 2006. Mobile Marketing: Achieving Competitive Advantage Through Wireless Technology.
Butterworth-Heinemann, Oxford, UK, 2006.
Mika, N., 2009. Mobile connections surpass 4 billion mark worldwide. Reuters Technology, retrieved February 9, 2009
from http://www.reuters.com/article/technologyNews/idUSTRE51A2I820090211.
Netsize, 2007. The Netsize Guide – Convergence: Everything is going mobile. Netsize, Paris, France.
Netsize, 2008. The Netsize Guide – Mobile 2.0, you are in control. Netsize, Paris, France.
O'Donnel, J. et al., 2007. Australian Case Studies in Mobile Commerce. Electronic Commerce Research, Vol. 2, No. 2,
pp. 1-18.
Peppard, J. & Rylander, A., 2006. From Value Chain to Value Networks: Insights for Mobile Operators. European
Management Journal, Vol. 24, No. 2-3, pp. 128-141.
Richtel, M., 2009. Can the Cellphone Industry Keep Growing? The New York Times, retrieved 5 February, 2009 from
http://www.nytimes.com/2009/02/04/technology/companies/04cell.html.
Scornavacca, E. et al., 2006. Mobile business research published in 2000-2004: emergence, current status, and future
opportunities, Communications of the Association for Information Systems, Vol. 17, pp. 635-646.
Steinbock, D., 2005. The Mobile Revolution – The Making of Mobile Services Worldwide. Kogan-Page, London.
Teleco, 2009a. Estatísticas de Celular no Brasil, retrieved February 5 2009 from http://www.teleco.com.br/ncel.asp.
Teleco, 2009b. Operadoras de Celular no Brasil: Econômico Financeiro, retrieved February 5 2009 from
http://www.teleco.com.br/opcelular.asp.
Teleco, 2009c. Operadoras de Celular no Brasil: Operacional, retrieved February 5, 2009 from
http://www.teleco.com.br/opcelular.asp.
Teleco, 2009d. Operadoras de Celular no Brasil: Receita de Dados, retrieved February 5 2009 from
http://www.teleco.com.br/opcelular_dados.asp.
The Insight Research Corporation, 2007. The 2008 Telecommunications Industry Review – An Anthology of Market Facts
and Forecasts. The Insight Research Company, Boonton, New Jersey.
Yin, R., 2003. Case study research: Design and methods. Sage Publishing: Thousand Oaks, CA, USA.

138
IADIS International Conference e-Commerce 2009

BUYER’S MINDSET ABOUT ONLINE PURCHASE AND


AUCTION, AND ITS EFFECT ON PAYMENT CHOICE

Wee Kheng Tan


Assistant Professor, Department of Information & Electronic Commerce,
Kainan University, No. 1, Kainan Road, Luchu, Taoyuan County, Taiwan

Yung Lun Chung


Department of Information & Electronic Commerce, Kainan University, Kainan University,
No. 1, Kainan Road, Luchu, Taoyuan County, Taiwan

ABSTRACT
Payment is an inborn part in any e-transaction. Accompanied with any e-transaction is the idea of risk. This risk is more
prevalent in e-auction than e-purchasing because for the former, the transaction parties are individuals and e-auction
fraud is often being heard of. Different payment methods are in used or developed to address such fear. Cash, credit card
and ATM transfer are some of the payment method used by online buyers. Another major trend is the intertwining of
cash and material flow, usually with payment being made at the same place and time the buyer gets the product. This
research uses two types of online shopping, e-purchase (B2C) and e-auction (C2C) as the subjects of investigation. A set
of criteria is also derived to account for the fact that buyers will consider many criteria to reach a decision on using which
payment method. Since no single criteria can adequately explain the choice of buyers, Analytical Hierarchy Process
(AHP) method is used for analysis. This research shows that buyers’ decision on the method of payment is a multi-
criteria consideration and the relative importance of the criteria reflects the nature of the transaction. From the buyer’s
perspective, making payment always involve the risk of not receiving the product or the product is not as expected.
Furthermore, the risk associated with online auction is more than online purchasing. As a result, buyers hope to lower the
risk of the transaction by choosing payment method that safeguards their interest. Hence, risk-related criteria such as
secure payment method and product’s price level are top on the list of importance and such consideration is regardless of
the nature of transaction. However, such concern is moderated if the payment method is already widely used by buyers.

KEYWORDS
e-Purchase, e-Auction, Payment Method, AHP Method.

1. INTRODUCTION
As more and more Taiwanese are attracted by the lower prices and abundant product choices in online
shopping sites, online shopping is getting increasingly popular in Taiwan. According to Market Intelligence
and Consulting Institute, online sales in Taiwan was estimated to be NT$243 (US$7.32) billion in 2008 with
B2C (online auction) transactions and C2C transactions accounting for NT$136 (US$4.10) billion and
NT$107 (US$3.22) billion respectively (Taipei Times, 2009).
Associated with any e-transaction are material flow, cash flow and information flow with payment being
an inborn part in any e-transaction (Tsiakis and Sthephanides, 2005). Accompanied with e-transaction is the
idea of risk. The buyers are concerned that after payment has been made, the product ordered never arrived or
is not according to specification. For the sellers, they are worried that payment never arrived even though the
product has been delivered. The fear is even more prevalent for e-auction than for e-purchasing because for
the former, the transaction parties are individuals that can be hidden being the anonymity of Internet and e-
auction fraud is often heard of. Different payment methods are being used or developed, though with various
extent, to address such risk and fear.
Cash payment, credit card payment and ATM transfer are some of the traditional payment methods used
by buyers of online purchase and auction website. PayPal, a form of C2C intermediary payment service,
provides a secure payment environment for payment. Another major trend is the intertwining of cash and

139
ISBN: 978-972-8924-89-8 © 2009 IADIS

material flow, usually with payment being made at the same time the buyers get their products. In Taiwan, e-
merchants co-operate with convenience store operators to allow their buyers to collect the merchandises at
the convenience stores specified by the buyers and to collect payment from the buyers. In the past few years,
Taiwan has also seen rapid growth in courier companies offering delivery service for B2C and C2C sellers.
They may also collect payment on behalf of the sellers.
In view of the above, this research used two types of online shopping, e-purchase (B2C) and e-auction
(C2C) as the subjects of investigation and for comparison purpose. These two types of e-shopping have
different perceived risk level. Using the payment methods chosen through literature review and advices from
experts, buyers and sellers, we investigated how the concern for risk would affect the choice of payment
method. We also devised a set of criteria to account for the fact that buyers would consider many criteria
before reaching a decision on using which payment method. Since these criteria were not necessarily of equal
importance and no single criteria could adequately explain the choice of buyers, Analytical Hierarchy
Process (AHP) method was used for analysis. This research attempted to answer the following questions:
were there significant differences in consideration when buyers of e-purchase and e-auction considered
which payment method to use and how these differences ultimately affected their choice of payment method.

2. RESEARCH METHOD
Analytic Hierarchy Process (AHP) was first proposed by Thomas L. Saaty (Saaty, 1980) and its main
characteristic is based on pair-wise comparison judgments. It is often used to analyze complex multi-criteria
decision-making problem and applied to a wide range of problems and applications. The problem
investigated is set up as a sequential step-up hierarchy structure with different measures being integrated into
a single overall score for ranking decision alternatives.
When using AHP, the problem’s step-up hierarchy structure need to be developed. A hierarchy is a
specific type of system, based on the assumption that the entities can be grouped into disjoint sets, with the
entities of one group influencing those of other groups (Saaty, 1980). Pair-wise comparison matrix forms an
important component of AHP. Two criteria are compared using a nine-point scale, where ‘1’ denotes ‘equal’
importance, ‘3’ represents ‘slightly’ importance, ‘5’ indicates ‘clearly’ superiority, ‘7’ is ‘very’ important and
‘9’ denotes ‘extremely’ important, with the even numbers being used to indicate intermediate values if
necessary. If there are n criteria to consider, n(n-1)/2 pair-wise comparisons would need to be made.
Afterwhich, reciprocal n x n matrix are constructed and weightings are then obtained.
The consistency of the pair-wise comparison matrix needs to be verified and the following two indexes
can be used: Consistency Index (C.I.) and Consistency Ratio (C.R.). They are defined as in equation (1) and
(2) with λmax being the largest eigenvalue and R.I. (Random Index) is as shown in Table 1. For consistency,
C.I and C.R. should be less than 0.1 for the AHP analysis to be acceptable.
C.I. = ( λmax – n ) / ( n – 1) (1)
C.R. = C.I. / R.I. (2)
Table 1. Random Index (R.I.)
n 1 2 3 4 5 6 7 8 9 10
R.I. 0 0 0.58 0.90 1.12 1.24 1.32 1.41 1.45 1.49

3. RESEARCH FRAMEWORK
The relevant literature was used as a starting point to identify the key criteria suitable for this research.
Instead of just focusing on issues relevant to the payment method itself, we believe that selection of payment
method will also depend on the characteristics of the buyers themselves as well as the nature of the products
they are buying. Discussions with researchers, buyers at purchase website and auction website were then
made to refine the criteria. Two four-tiered hierarchical structures, one each for purchase website and auction
website were obtained and as shown in Figure 1 and 2.

140
IADIS International Conference e-Commerce 2009

Figure 1. The Hierarchical Structure for Purchase Website

Figure 2. The Hierarchical Structure for Auction Website


The second tier for both purchase and auction website comprises three aspects, which are firstly, buyer’s
characteristics, secondly, characteristics of payment methods and thirdly, product characteristics. For the
structure that depicts e-purchase, the third tier comprises 9 criteria and for the structure that depicts e-auction,
there are 8 criteria. The payment methods investigated for purchase website are ATM transfer, online credit
card payment, payment through courier service and payment at the convenience store. As for the auction
website, the payment methods investigated are ATM transfer, cash payment when meeting face-to-face,
payment through courier service and payment through PayPal-type of service.
There are two criteria under the aspect of buyer’s characteristics: past experience of e-purchase/e-auction
and payment method which buyer is already used to. According to Schmid (1994), buyers could be classified
based on the number of time they patronize i.e. first-time buyers, second-time buyers and multi-buyers or
advocates. As first-time buyers, they are at the exploratory stage and confirming or de-confirming their
expectation so that they could decide whether to re-patronize i.e. became second time buyers. Furthermore,
Dawson, Bloch and Ridgway (1990) showed that transient emotions influenced shoppers’ satisfaction and
future shopping intentions. Habit can also affect the preference of buyers over the payment method they are
using. Habit is the “learned sequences of acts that become automatic responses to specific situations which
may be functional in obtaining certain goals or end states” (Verplanken et al., 1998) and the action requires
little conscious attention and only minimal mental effort (Ouelette and Wood, 1998).
As for e-purchase, the four criteria under the aspect of characteristics of payment method are payment
method which is acceptable to e-merchant, easy and simple to use procedure and user interface, secure

141
ISBN: 978-972-8924-89-8 © 2009 IADIS

payment procedure, and lastly bonus, discount and other financial benefits. As for e-auction, the e-merchant
of the first criteria is replaced by seller and the last criterion for e-purchase is not applicable. The popularity
of a product or service is dependent on whether it is easy to use i.e. ease of use. An important measure of the
Technology Acceptance Model (TAM), ease of use is defined as ‘the degree to which a person believes that
using a particular system would be free from effort’ (Davis, 1989). This research applied ease of use to the
payment mechanism. Risk may be defined as uncertainty concerning the occurrence of a loss (Rejda, 2008).
It is closely related to the degree a particular product or service is being adopted; the higher the risk, the
greater the reluctance for one to adopt the product (Pamela and John, 1998). Transaction via Internet is
accompanied by its own set of risks, some of them are applicable to all types of transactions, whether online
or offline, while some are specific to the online environment. However, if the buyers want to purchase an
item online, they must accept the presence of such risk and if wanted to, use other mechanisms to moderate it.
Careful selection of payment method is one of the methods. On the other hand, payment methods themselves
also introduce their own set of risk e.g. credit card fraud and malicious tapping of personal information.
Hence security of the payment mechanism is a major aspect that buyers need to consider.
The last three criteria are related to product’s characteristics: price level, whether attributes of products
are easy to ascertain and whether the product is in digital form. In the computer-mediated environment, it is
difficult for buyers to examine the product before purchasing. Hence the risk of buying misrepresented
products is increased. As a result, buyers often have to factor in the attributes of the products prior to
purchasing and it may have an impact on the payment method. Products may be classified in different ways.
Degeratu et al. (2000) proposed two categories: sensory products and non-sensory products. Lal and Sarvary
(1999) defined two types of product attributes: digital attributes, which can be easily communicated on the
Internet, and non-digital attributes. Figueiredo (2000) suggested an e-commerce product continuum in which
products are characterized as commodity products (e.g., oil, shares), quasi-commodity products (e.g., books,
new cars), look and feel products (e.g., cosmetics, homes), and look and feel products with variable quality
(e.g. works of art, used cars). The quality of commodity products is the easiest to ascertain, hence buyers are
most confidence of their quality. On the other hand, the quality of the look and feel products with variable
quality is the most difficult to ascertain and buyers are least confidence of their quality prior to consuming
them. For some of the buyers, a higher price may indicate high quality. However, from the perspective of
cash flow, a higher price will also imply a higher risk in the transaction, resulting in more careful
consideration of the payment method to lower the risk of the transaction.

4. RESULT AND DISCUSSION


As it was not an easy task to fill up the AHP questionnaire, face-to-face survey was arranged to increase the
accuracy of the returns. The survey lasted for 2.5 months starting from December 1, 2008. A total of 57 valid
returns were received from buyers of purchase websites and 63 valid returns were obtained from buyers of
auction websites. Their profile is as shown in Table 2.
Table 2. Profile of Survey Respondents
e-Purchase e-Auction
No Percent No Percent
Gender Male 33 57.9 34 54.0
Female 24 42.1 29 46.0
Age < 35 year old 46 80.7 50 79.4
≥ 35 year old 11 19.3 13 20.6
Monthly Income < NT$30,000 44 77.2 43 68.3
≥ NT$30,000 13 22.8 20 31.7
Engage in e-Purchase/e-Auction < 18 months 22 38.6 25 39.7
Activity ≥ 18 months 35 61.4 38 60.3

4.1 Purchase Website


As observed from Table 3, buyers considered characteristics of payment method (0.3890) to be the most
important, then product’s characteristics (0.3387). The least considered is buyer’s characteristics (0.2723).

142
IADIS International Conference e-Commerce 2009

For the criteria under buyer’s characteristics, past experience of e-purchase (0.5582) was ranked first,
followed by payment method which buyer is already used to (0.4418). For characteristics of payment
method, secure payment procedure (0.4445) was top on the list of importance and its weighting was way
ahead of the other criteria under the same aspect. Security being top on the list was not surprising. For
product’s characteristics, price level (0.4585) came in first, whether attributes of products are easy to
ascertain (0.3162) second. These two criteria indicated the degree of uncertainty and risk of the purchase
which would ultimately influenced the chosen payment method. Through the overall ranking analysis, it was
observed that the top 5 important criteria were all related to buyer’s perception of risk and response so that
buyer’s interest would be most safeguarded. These 5 risk-related criteria were secure payment procedure,
price level, past experience of e-purchase, payment method which buyer is already used to, and lastly
whether attributes of the product are easy to ascertain. Secure payment procedure was top in the mind of
buyers. This result confirmed past research which found security to be very important to the success of
payment method. Price level of the product was the second most important. Past experience of e-purchase
was more important than payment method which buyer is already used to. A major reason was the seller was
not individual but merchant and usually they would offer a range of payment options, hence the former
criterion was more important. After the risk and associated responses were taken into account, bonus,
discount and other financial benefits (ranked 6th), easy and simple to use procedure and user interface
(ranked 8th) began to appear.
Table 3. Weightings of e-Purchase
Aspects and Criteria Weighting (Ranking)
Aspect Criteria Overall
A. Buyer’s Characteristics 0.2723 (3)
A1. Past Experience of e-Purchase 0.5582 (1) 0.1520 (3)
A2. Payment Method Which Buyer is Already Used To 0.4418 (2) 0.1203 (4)
For Criteria related to Buyer’s Characteristics : C.I. = 0.000;C.R. = 0.000
B. Characteristics of Payment Method 0.3890 (1)
B1. Payment Method Which is Acceptable to e-Merchant 0.1004 (4) 0.0391 (9)
B2. Easy and Simple to Use Procedure and User Interface 0.1896 (3) 0.0738 (8)
B3. Secure Payment Procedure 0.4445 (1) 0.1729 (1)
B4. Bonus, Discount and Other Financial Benefits 0.2655 (2) 0.1033 (6)
For Criteria related to Characteristics of Payment Method: C.I. = 0.022;C.R. = 0.024
C. Product’s Characteristics 0.3387 (2)
C1.Price Level 0.4585 (1) 0.1553 (2)
C2.Whether Attributes of Products are Easy to Ascertain 0.3162 (2) 0.1071 (5)
C3.Whether the Product is in Digital Form 0.2253 (3) 0.0762 (7)
For Criteria related to Product’s Characteristics: C.I. = 0.001;C.R. = 0.001
For Aspect: C.I. = 0.003;C.R. = 0.005

As shown in Table 4, payment at convenience store (0.2687) was the most preferred method of payment
for the e-purchase buyers. This outcome was a combination of various reasons. Firstly, the buyer could gain
immediate possession of the product when payment was made, hence removing the concern about making
payment but not receiving the product. The analysis revealed that this method had very high weighting for
risk-related criteria, especially secure payment procedure and price level. Secondly, this payment method was
already a familiar and popular method among existing buyers, as evidenced by the high weighting of
payment method which buyer was already used. Its familiarity was only lower than online credit card
payment. This reason was a result of the shopping habit and retail structure of Taiwan. Many Taiwanese were
very used to making purchase at the convenience stores and patronizing these outlets was almost a daily
affair event for them. Taiwan had the highest density of convenience stores in the world with 9,100
convenience stores in 2009 for an island, with an area of 36,000 sq km and a population of about 23 million
(CENS.com, 2009). Hence, payment at convenience store offered the most ‘peace of mind’ option. Online
credit card payment (0.2662) was the next favored payment method. Online credit card payment was ranked
as the second payment method which buyer was already most used to and first in past experience of e-
purchase. Taiwan had a high credit card penetration rate with 19.89 million effective credit cards in use in
September, 2008 (CENS.com, 2008). Many Taiwanese were used to paying through credit card though there
were on-and-off complaints about credit card fraud. Credit card fared well in security. Familiarity with credit

143
ISBN: 978-972-8924-89-8 © 2009 IADIS

card did help and it was also an endorsement by buyers of the efforts made by merchants and credit card
issuers to provide a secure environment. The post-payment method also contributed to its popularity and the
discount and rebates further sweetened the deal. Making payment when courier delivered the product
(0.2831) offered almost the same ‘peace of mind’ to the buyers as making payment at convenience store,
however, it performed poorer in most other criteria when compared to payment at convenience store and
online credit card payment. ATM transfer (0.2270) came in last because it offered the least protection to the
buyers.
Table 4. Weightings of Methods of Payment for e-Purchasing
Payment Method Weighting (Ranking)
Payment at Convenience Store 0.2687 (1)
Online Credit Card Payment 0.2662 (2)
Payment through Courier Service 0.2381 (3)
ATM Transfer 0.2270 (4)

4.2 Auction Website


As observed from Table 5, buyers considered product’s characteristics (0.3974) to be the most important
aspect, followed by characteristics of payment method (0.3243). The least considered was buyer’s
characteristics (0.2783). For the criteria under buyer’s characteristics, payment method which buyer is
already used to (0.5757) was ranked first, followed by past experience of e-purchase (0.4243). For
characteristics of payment method, secure payment procedure (0.5723) was top on the list of importance and
its weighting was way ahead of the rest of the criteria under the same aspect. For the criteria under product’s
characteristics, price level (0.4672) came in first, followed by whether attributes of products are easy to
ascertain (0.3604). These two criteria indicated the high degree of uncertainty and risk of e-auction which
would ultimately affected the choice of payment method. The overall ranking analysis revealed that the top 5
important criteria were all related to buyer’s perception of risk and response so that buyer’s interest would be
most safeguarded. Price level (0.1857) was top in the mind of buyers. Secure payment procedure (0.1856)
was the second most important. Payment method which buyer is already used to (0.1602) came in third,
reflecting the careful and conservative nature of buyers. The other two top 5 important criteria were whether
attributes of products are easy to ascertain (ranked 4th) and past experience of e-auction (ranked 5th). After
the risk and associated responses were taken into account, easy and simple to use procedure and user
interface (ranked 6th), whether the product is in digital form (ranked 7th) and payment method which is
acceptable to seller (ranked 8th) began to appear.
Table 5. Weightings of e-Auction
Aspects and Criteria Weighting (Ranking)
Aspect Criteria Overall
A. Buyer’s Characteristics 0.2783 (3)
A1. Past Experience of e-Auction 0.4243 (2) 0.1181 (5)
A2. Payment Method Which Buyer is Already Used To 0.5757 (1) 0.1602 (3)
For Criteria related to Buyer’s Characteristics : C.I. = 0.000;C.R. = 0.000
B. Characteristics of Payment Method 0.3243 (2)
B1. Payment Method Which is Acceptable to Seller 0.1606 (3) 0.0521 (8)
B2. Easy and Simple to Use Procedure and User Interface 0.2671 (2) 0.0866 (6)
B3. Secure Payment Procedure 0.5723 (1) 0.1856 (2)
For Criteria related to Characteristics of Payment Method: C.I. = 0.007;C.R. = 0.013
C. Product’s Characteristics 0.3974 (1)
C1.Price Level 0.4672 (1) 0.1857 (1)
C2.Whether Attributes of Products are Easy to Ascertain 0.3604 (2) 0.1432 (4)
C3.Whether the Product is in Digital Form 0.1724 (3) 0.0685 (7)
For Criteria related to Product’s Characteristics: C.I. = 0.003;C.R .= 0.004
For Aspect: C.I. = 0.013;C.R. = 0.023

As shown in Table 6, payment through courier service (0.2964) presented the best option for buyers
because it offered the best combination of lowest risk and convenience when compared to other two top-three

144
IADIS International Conference e-Commerce 2009

payment methods: ATM transfer and cash payment when meeting face-to-face. Payment through courier
service allowed buyers to pay only when they received the product at a location specified by them. It was
evidenced by the highest weighting for secure payment procedure and price level. It also performed very well
for other risk-related criteria. Preference for ATM transfer was a result of its popularity as a payment method.
ATM transfer performed very well for past experience of e-auction and especially for payment method which
buyer was already used to. It reflected a compromise between the concern of the buyers and sellers. It was
hence not surprising for ATM transfer to be top in the weighting for method which was acceptable to seller.
Even though ATM transfer might be seen to favor the seller slightly more, however given its popularity, the
comfort level and the ‘peace of mind’ level perceived by the buyers might not be as low as one might think.
Cash payment when meeting face-to-face guaranteed ‘peace of mind’ for both buyers and sellers,
nevertheless both parties needed to arrange a place and time to meet, which might be troublesome for some.
As for PayPal-type of service (0.1575), the ranking was the lowest, indicating the conservative nature of the
buyers and in addition, once certain payment method was well established and accepted, introducing new
payment method and changing the mind of the users would not be that easy. Seller not asking for this kind of
payment method was also one of the contributory reasons.
Table 6. Weightings of Methods of Payment for e-Auction
Payment Method Weighting (Ranking)
Payment through Courier Service 0.2964 (1)
ATM Transfer 0.2872 (2)
Cash Payment when Meeting Face-to-face 0.2589 (3)
Payment through PayPal-type of Service 0.1575 (4)

4.3 Overall Discussion


Even though it is not possible to compare the weighing of e-purchase and e-auction directly because of the
presence of one additional criterion for e-purchase, this research is still able to obtain some insights of the
buyer’s mindset and the consequent effect on their choice of payment method.
Buyers already have some pre-conceived idea about e-purchase and e-auction. This mindset exists
because of the difference in the nature of e-purchase and e-auction. As a form of C2C e-commerce, both the
buyer and seller of e-auction website are individuals. With Internet auction fraud being a common feature,
coupled with lack of face-to-face interaction and difficulty in ascertaining the identity of both parties,
concern about fraud is high. Even though the monetary amount per e-auction transaction may be low, it does
not lower such concern since the transaction parties are individuals. For online purchase website, the seller is
now a business entity. The risk perceived by e-purchase buyer will be lower but not eliminated as there is still
concern of bogus merchant (which can be lowered further by buying from reputable merchants) and products
which do not meet expectation. Such kind of mindset is clearly manifested through the weightings obtained.
The top 5 criteria in the overall ranking for e-purchase and e-auction are all related to buyers’ perception
of the risk and their response. The two criteria from buyer’s characteristics are past experience of e-
purchase/e-auction and payment method which buyer is already used to. The next two criteria, price level and
whether attributes of products are easy to ascertain are from product characteristics. The only criterion from
characteristics of payment method is secure payment procedure. It is only after these risk-related criteria are
considered, other criteria less related to risk such as ease of use, whether product is in digital form and
acceptable to seller surface. Hence, this research concludes that risks associated with the transaction and
payment method is paramount to all parties when deciding on the payment method.
At the level of aspects, e-auction buyers are concerned firstly about product’s characteristics, followed by
characteristics of payment method. However, for e-purchase buyers, it is the other way round. The key
criteria under product’s characteristics which are of concern to all parties are price level and whether
attributes of products are easy to ascertain. As for characteristics of payment method, it is secure payment
procedure. This outcome indicates that e-auction buyers are more concerned than e-purchase buyers about
the risk associated with the product itself.
The difference in emphasis on product’s characteristics and characteristics of payment method coupled
with buyer’s characteristics has a major impact on the option of payment method. Buyers of e-auction
website prefer payment through courier service, followed by ATM transfer, cash payment when meeting
face-to-face and lastly payment through PayPal-type of service. Buyers of e-purchase website prefer payment

145
ISBN: 978-972-8924-89-8 © 2009 IADIS

at convenience store, online credit card payment, payment through courier service and lastly ATM transfer.
Given the risk involved, both types of buyers clearly show preference for payment method which offers them
the greatest degree of security, i.e. payment through courier service for e-auction buyers and payment at
convenience store for e-purchase buyers. These two methods allow buyers to receive their products and make
payment simultaneously. However, maximizing their security is not a hard and fast rule. Buyers, when
needed to, do take into account payment methods which are already popular among the buyers, such as credit
card and ATM transfer. As a proverb says ‘old habit dies hard’, even though ATM transfer offers higher risk
for e-auction buyers, it is still the second most popular method. ATM transfer is a common method and old
habit and familiarity breed greater degree of comfort among the buyers.

5. CONCLUSION
This research shows that buyers’ decision on using which payment method is a multi-criteria consideration
and the relative importance of the criteria reflects the nature of the transaction. From the buyer’s perspective,
making payment always involve the risk of not receiving the product or the product is not as expected.
Furthermore, the risk associated with online auction is more than online purchasing. As a result, buyers hope
to lower the risk of the transaction through choosing payment method that best safeguards their interest.
Hence, regardless of the nature of transaction, risk-related criteria such as secure payment method and
product’s price level are top on the list of importance. However, such concern is moderated if the payment
method is already widely used among the buyers. This research also shows that payment at convenience store
is a good example of cash flow and material flow being closely intertwined and this payment method also has
high popularity in Taiwan. A follow-up would be to conduct a multi-country research to find out whether
there is a difference in mindset of the online buyers among different countries.

REFERENCES
CENS.com, 2008. Taiwan’s Credit Card Market Gaining Strength. Viewed 1 December, 2008,
<http://www.cens.com/cens/html/en/news/news_inner_25325.html>.
CENS.com, 2009. Growth Slows for Taiwan Convenience Stores. Viewed 6 January, 2009,
<http://www.cens.com/cens/html/en/news/news_inner_25813.html>.
Davis F. D., 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. In
MIS Quarterly, Vol. 13, No. 3, pp. 319-340.
Dawson S., Bloch P. H. and Ridgway N. M., 1990. Shopping Motives, Emotional States, and Retail Outcomes. In
Journal of Retailing, Vol. 60(Winter), pp. 408–427.
Degeratu A., Rangaswamy A. and Wu J., 2000. Consumer Choice Behavior in Online and Traditional Supermarkets: The
Effects of Brand Name, Price, and Other Search Attributes. In International Journal of Research in Marketing, Vol.
17, pp. 55-78.
Figueiredo J., 2000. Finding Sustainable Profitability in Electronic Commerce. In Sloan Management Review, pp.41-51.
Lal R. and Sarvary M., 1999. When and How is the Internet Likely to Decrease Price Competition?, In Marketing
Science, Vol. 18, No. 4, pp. 485–503.
Ouellette J. A. and Wood W., 1998. Habit and Intention in Everyday Life: The Multiple Processes by which Past
Behavior Predicts Future Behavior. In Psychological Bulletin, Vol. 124, No. 1, pp. 54-74.
Pamela D. and John H. R., 1998. Matching Electronic Distribution Channels to Product Characteristics: The Role of
Congruence in Consideration Set Formation. In Journal of Business Research, Vol. 41, No. 3, pp. 223-229.
Rejda G., 2008. Principles of Risk Management and Insurance 10th Edition, Addison Wesley, Boston, USA.
Saaty T. L., 1980. The Analytic Hierarchy Process. McGraw-Hill, New York, USA.
Schmid S., 1994. Building Loyal Buyers, In Catalog Age, Vol. 11, No. 10, pp. 141-144.
Taipei Times, 2009. Brisk Outlook for Online Shopping: Poll. 30 January.
Tsiakis T. and Sthephanides G., 2005. The Concept of Security and Trust in Electronic Payments. In Computers &
Security, Vol. 24, pp. 10-15.
Verplanken B., Aarts H., van Knippenberg A. and Moonen A., 1998. Habit Versus Planned Behavior: A Field
Experiment. In British Journal of Social Psychology, Vol. 37, pp. 111–128.

146
IADIS International Conference e-Commerce 2009

IMPROVING DIVERSITY AND RELEVANCY OF E-


COMMERCE RECOMMENDER SYSTEMS THROUGH NLP
TECHNIQUES

Andriy Shepitsen, Noriko Tomuro


College of Computing and Digital Media
DePaul University, Chicago, IL U.S.A.

ABSTRACT
Emerging Web 2.0 technologies offer abundance of opportunities for e-commerce systems to improve the effectiveness of
recommendation. For example, many e-commerce sites allow users to enter reviews together with ratings in order to
obtain more feedback on their products and services. In this paper we present an approach which considers user reviews
in generating personalized recommendations in e-commerce recommender systems. Our approach is novel in that the
system incorporates user reviews as an additional dimension in representing the inter-relations between items and user
preferences. By utilizing user reviews as the fourth dimension in addition to the traditional three dimensions of items,
users and ratings, our system can generate recommendations which are more relevant to users’ interests. To analyze user
reviews we utilize techniques from Natural Language Processing (NLP), a sub-field in Artificial Intelligence (AI). We
extract terms/words from user reviews and analyze their parts-of-speech (POS). Then we use nouns and adjectives (only)
to represent a user review, and develop a new recommendation model, which we call RecRank, that utilizes all four
dimensions. We also incorporate the notion of authority – items which are frequently mentioned in other items’ reviews
are considered popular and authoritative, thus should be ranked higher in the recommendations. We run several
experiments on a real e-commerce data (Amazon books) and compare results with other standard recommendation
approaches, namely item- and collaborative-based filtering and association rule mining algorithm. The results showed
that user reviews were effective in increasing the diversity as well as relevancy of the recommended items.

KEYWORDS
Recommender Systems, E-Business Application, Reviews, NLP, Knowledge Discovery

1. INTRODUCTION

In our highly competitive market it is very important for companies to obtain information about who their
customers are, what their preferences are and how they are evaluating their existing products. The trends in
customer preferences and requirements should be the main factors in navigating the company success
strategy. User studies are an effective way to get information about customers preferences. However, user
studies are costly and involve careful planning.
With the advent of Web 2.0, many e-commerce sites encourage users to leave on-line feedback and share
their opinions about the products they bought, such as Amazon (www.amazon.com) and e-bay (www.e-
bay.com). Users post their overall explicit ratings of the items together with reviews to explain their ratings.
There are a lot of studies in e-business and psychology concerning the people’s motivation to post their
reviews [1, 2]. Those studies are beyond the scope of this paper, but their general finding is that users often
read reviews of others to make their own decisions about purchasing, and want to pay back and help other
customers. Therefore, user reviews are a very valuable source of information for on-line e-commerce
applications, such as recommender systems.
Recommender Systems use information about a customer’s previous purchases, ratings and profile to
predict which products he or she might be interested in buying next. There are two main technical approaches
in e-commerce recommender systems: content-based and collaborative-based. In the content-based
approach, recommendations are selected based on the similarity of items measured by various item features
such as user ratings, author, producer, publisher, etc. In the collaborative-based approach on the other hand,

147
ISBN: 978-972-8924-89-8 © 2009 IADIS

recommendations are selected based on the similarity of users and the ratings those like-minded users had
entered. However, both approaches along with other hybrids suffer from the problem of “cold start”: new
items cannot be found because they have only limited historical data [3, 4]. There is also another type of
approach called Association Rule Mining (or the Apriori algorithm) [5]. This approach generates
recommendations based on the items which often appeared together in customer transactions. Although
previous research [6] has shown that the Apriori algorithm usually generates recommendations faster than
other two approaches, it has difficulties with coverage: some items cannot be recommended at all.
In this paper, we present a new approach which considers user reviews in addition to item similarity and
user similarity in generating recommendations. We first extract terms/words from user reviews and obtain
their parts-of-speech (POS). Then we use nouns and adjectives (only) as item features to enhance the content-
based approach. For instance, if terms such as “pawn”, “bishop”, ”defense” and “strategy” appeared in the
review of a book, then probably it is a chess book and all other books that are reviewed using the same terms
are good candidates to be associated with that book. This way, our approach can alleviate the cold start as
well as the poor coverage problems. Moreover, terms in user reviews can help find other books which are
related to logic and calculations, which in turn increases the diversity of the recommendations for the chess
fans. Using terms in reviews can also help find like-minded users in collaborative approach. Previous
psychological studies have shown that vocabulary is an expressive indicator which reveals information about
the user interests, culture and personality [7]. Our hypothesis is that, if users have the same vocabulary, they
probably have similar interests, of similar age, belong to similar social groups etc., thus may enjoy similar
recommendations. By utilizing user reviews as the fourth dimension in addition to the traditional three
dimensions of items, users and ratings, our system can generate recommendations which are more
personalized to users' interests.
We also introduce the notion of authoritative items. The intuition behind this notion is that, if an item was
frequently mentioned by reviews of other items, it is most likely a popular item and serving as a reference
point/item. Furthermore, we develop a new algorithm called RecRank which utilizes all four dimensions to
better personalize the recommendation list.
Finally, we report the results of running several experiments on a real e-commerce data (Amazon books).
The results showed that our system outperformed other standard recommendation approaches.

2. RELATED WORK

There are several works which tackled the problem of diversity and relevancy of the recommendations in e-
commerce recommender systems. The problem of (poor) diversity in recommendations was first raised in
Ziegler et al. [8]. They reported that the standard recommender systems failed to contribute to sales of the
company as the systems only generated recommendations for the items which the users have already
purchased. Then they introduced a new measure called Intra-List Similarity for recommendation generation.
This metric indicates how similar the items in a given list of recommendation are to each other, thus
essentially represents the degree of diversity of the recommendation list. They claimed that, although the
diversity hindered the recall/precision standard metrics, it helped inform the users about new products and
increased the company sales volume in a long term. MgGinty and Smyth [9] developed an algorithm called
adaptive selection, which adds one item at a time in the recommendation list. They used customers feedback
to determine if the next candidate item should be included in the list. They also reported that diversity helped
create better recommendation lists which are more preferable for the users.
To improve the relevancy of item- and collaborative-based systems, many researchers used various item
features in addition to user ratings to measure the similarity between items [10]. Although those item features
can improve item clustering and thematic recommendations, their information is static and narrowly scoped,
and cannot take advantage of the user models, in particular the collective user efforts, expressed in user
reviews.
There are a few works which made an attempt to use user reviews in recommender systems. In particular,
Aciar et. al [11] used consumer product reviews to improve recommendations. They first defined (manually)
an ontology of product features (in the digital-camera domain), then mapped the user reviews to the ontology.
They used NLP tools to analyze user reviews and categorized each sentence in a review into one of the three
classes: good, bad or quality. Then the product feature mentioned in a given sentence is associated with the

148
IADIS International Conference e-Commerce 2009

sentence’s category and the node in the ontology for the feature is annotated with the category. In the
recommendation generation phase, they extracted keywords from a request made by a specific user, mapped
the keywords to the ontology, then generated a recommendation list customized for that user. However, they
did not compare their results with other standard approaches, therefore the effectiveness of their approach is
not empirically validated.

3. USING REVIEWS IN RECOMMENDATION GENERATION


In this paper, we use the following notation to define relations in the dataset. A recommendation dataset D is
denoted as a four-tuple:
D = U , I ,T , R (1)
where U is a set of users, I is a set of Items, T is a set of terms and R is a set of ratings.

3.1 Improving Similarity Measure and Association Rules in Recommendation


Algorithms
Recommendations in item-based recommender systems are determined based on item similarity. In
particular, for a given user a recommendation list is formulated by selecting the items similar to the ones that
the user had rated highly. In this work, we used the cosine measure to compute the similarity between two
items, modified to include the similarity between the terms that appeared in the reviews in the following
formula:

cos(i, j ) = a
∑ u∈U
(ru ,i * ru , j )
+ (1 − a )
∑ t∈T
f (t , i ) * f (t , j )
(2)

u∈U
(ru ,i ) *
2
∑ (ru , j ) 2
∑ t∈T
f (t , i ) 2 * ∑ t∈T
f (t , j ) 2
u∈U
where cos(i,j) is the cosine between the items i and j, ru,i is the rating score which a given user u gave to
the item i, f(t,i) is a value for the term t in i that was obtained after applying the Principal Component
Analysis (PCA) to the items/terms matrix (see below), and is a tuning coefficient which determines the
distribution of weights between ratings and term features.
For the item/term matrix, we first applied PCA to reduce the dimensionality of the matrix. There were a
lot of synonyms, spelling variations and ambiguous terms in the user reviews in our dataset. Therefore, we
had to take a measure to automatically find hidden connections between the items and the terms which were
not explicitly stated in the original term frequency matrix.
For the collaborative algorithm, we used the similar formula to compute the similarity between two users:

cos(u1 , u2 ) = β
∑ i∈I
(ru1 ,i * ru2 ,i )
+ (1 − β )
∑ t∈T
f (u1 , t ) * f (u2 , t )
(3)
∑ ∑ ∑ ∑
2 2 2 2
i∈I
(ru1 ,i ) * i∈I
(ru2 ,i ) t∈T
f (u1 , t ) * t∈T
f (u2 , t )
Where cos(u1, u2) is the cosine between the users u1 and u2, ru1 ,i is the rating score which the user u1
gave to the item i, f(u1,t) is a value for the term t which the user u1 used that was obtained after applying PCA
to the users/terms matrix, and is a tuning coefficient which determines the distribution of weights between
ratings and term features.
Finally for the Apriori algorithm, we modified the association rule slightly. In the standard association
rule, an implication X ⇒ Ij means to add Ij in X, where X is a set of some items in I and Ij is a single item in I
that is not present in X. We modified this rule to treat the terms in the reviews as transactions for finding
additional lists of frequent item-sets. We also computed another frequent item set by treating the users as
transactions. Then we merged the two lists to generate the candidate items to be added in the set of
recommendations. Thus, our modified algorithm can alleviate the coverage problem with which the standard
Apriori algorithm is known to have difficulties.

149
ISBN: 978-972-8924-89-8 © 2009 IADIS

3.2 Using Reviews in Recommendation Personalization

For each of the three approaches described in the previous section, an initial list of recommended items is
obtained. The next step is to re-rank them to better personalize the list to reflect the user’s interests. To this
goal, we apply two methods: weighting by item popularity (or authority) and Artificial Neural Network
(ANN).
The idea of item popularity is inspired by the observation that items mentioned frequently in the reviews
of other items are those that are well-known to the general public and serving as reference points. For
instance, “...this textbook is slightly easier to read than Streetwise eCommerce.” - the customer mentioned
the item in the review written to another item, thus he indirectly showed the authority of the referenced one.
Therefore we can consider frequently referenced items authoritative. So if a recommendation list contained
an authoritative item (but the user hasn’t purchased one yet), this item should be ranked higher than others
(e.g. a “must-read” book).
To compute the popularity scores of items, we represented all items in the dataset in a graph where a
node/item is connected to another node/item if the first item referred to the second item in the reviews. Then
we applied the Google PageRank algorithm [12] on the graph to derive the rank scores, or popularity scores,
of the items. We normalized the rank scores at every iteration in the algorithm, so the scores were kept in the
range between 0 and 1. We ran the algorithm iterations until the total change in the scores became less than a
predefined threshold. Finally using the popularity scores obtained, we computed the final re-ranked score for
each item in the recommendation list as the multiplication of its initial score by its popularity score.

Output (Books’) Layer

Hidden Layer2

Hidden Layer1

Intput (Review terms’) Layer

Figure 1. The Artificial Neural Network Topology used for re-ranking recommended items
Another method we used to re-rank the initial list of recommendations is a multi-layered ANN. We first
constructed a network with two hidden layers, where the nodes in the input layer are the terms that appeared
in all user reviews, and the nodes the output layer are the items (or books in our Amazon dataset). The
schematic picture of the network is shown in Figure 1. We chose two hidden layers (instead of one) because
the numbers of input and output nodes were quite large for our dataset (4,864 input and 15,930 output nodes),
thus requiring a network which could model complex interactions between the input and output. As for the
numbers of hidden nodes (43 and 181), we approximated by running PCA on user/item and item/term ratings
matrices and observed the number of principal components which covered a large portion of the variability in
the dataset. Then we trained the network with all items in the data using the ANN’s backpropagation
algorithm. We continued the algorithm iterations for a predefined number of iterations (rather than until
convergence) in order to avoid overfitting. The trained network is essentially a classifier which maps a set of
terms used in the reviews of an item to the item itself. Finally we presented each item in the recommendation
list to the network’s input layer and obtained the value of the output node which corresponded to the item.
Then we used that value (between 0 and 1, produced by the sigmoid/logistic function applied at the output
node) to multiply the initial score of the item and obtained the final re-ranked score of the item.

3.3 The RecRank Algorithm


In addition to item authority and ANN, we also developed a new model for generating personalized
recommendations which incorporates user reviews. In this work, there are four interconnected factors which
influence user preferences in recommender systems: users, rating scores, items and review terms. We
represent those information in a large matrix M of size n n where n=|U|+|I|+|R|+|T|. In other words, M is a

150
IADIS International Conference e-Commerce 2009

heterogeneous (and square) matrix where, for every user/rating/item/term, its associations with all other
users/ratings/items/terms are recorded.
The matrix M is symmetric, except for the sub-matrix which indicates item-to-item associations. In this
sub-matrix, each entry is the number of references made in one item’s reviews to another item. Notice also
that M represents the associations between rating scores and review terms quite conveniently. For example,
in a row ’rating=1’, the entry for the column ’term=bad’ indicates the number of times the word “bad”
appeared in all of the user reviews which gave the rating score of 1.
In addition to the matrix M, we also set up another vector, which we call a personalization vector, to

personalize recommendations for a specific user. This vector p , is of size n (=|U|+|I|+|R|+|T|), and the values
are binary – 1 in the slot of the user himself/herself and the slots of the items for which he/she rated highly
(above his/her average rating) as well as the slots of the terms which he/she used in the reviews frequently,

and all other slots have zeros. Then by using M and p of a given user, we wish to find weights on the items
– then those weights will be used to re-rank the items selected in the initial recommendation list (see below).
To that goal, we defined the following formula and obtained the weights through an iterative process.
→ → → →
w1 ← α * d w1 + β * w1 * M + (1 − d )γ * p (4)
where w1 is the weighting vector of size n (=|U|+|I|+|R|+|T|), initialized with a random numbers between 0

and 1, d is the damping factor (which helps avoid the “trap of local maximum” during iteration), p , is the
personalization vector for the given user, and , , are tuning coefficients which distribute the importance
of three factors influencing the weighting vector. The values of , , were determined during the

preliminary run with the training dataset. Figure 2 shows an example of M, a weight vector (W) and p .
Name Rating Item Review Terms

John 5 book 1 good math book

John 1 book 2 bad math book book 1 book 3


Name Rating Item Review Terms

Mary 5 good philology book


book 3
book 2 book 4
Mary 1 book 4 bad philology book

Matrix M
John Mary 1 2 3 4 5 book 1 book 2 book 3 book 4 good bad book math philology

John 1 2 2 5 1
Mary 1 2 2 5 1
1 2 2 1 1 1 2 2 1 1
2 1
3 1
4 1
5 2 2 1 1 1 2 2 1 1
book 1 5 1 1 1 1 1 1 1
book 2 1 1 1 1 1 1
book 3 5 1 1 1 1 1 1 1
book 4 1 1 1 1 1 1 1
good 2 1 1 1
bad 2 1 1 1
book 2 2 1 1 1 1 1
math 1 1 1 1 1
philology 1 1 1 1 1

16 dimensions 16 dimensions
{
{

W<weighted vector>[0.234234234,0.23443...... , 0.85763522] P<John’s personalization vector>[1, 0, 1, 0, 0, 0, 1, 1, 1, 0, 0, 0, 0, 1, 1, 0 ]


p value = 50% (we include 50% of John's most frequent terms)

Figure 2. Matrix M, a Weight Vector and a Personalization Vector


The RecRank algorithm is listed in Algorithm1. We ran this algorithm twice, with and without using the
preference vector. The final re-ranking weights for the recommended items are obtained by the formula

151
ISBN: 978-972-8924-89-8 © 2009 IADIS

→ → → →
( w p − w) , where w p and w are the weighting vectors derived by the algorithm with and without using the
personalization vector respectively. Such approach helps to cancel popular items in D which are not
personalized for the target user, similar to FolkRank algorithm [13].

Input: Set of items i ∋ I, users u ∋ U, terms t ∋ T, p the personalization vector over <U,I,R,T>; simthr - a threshhold
which specifies the smallest in the cosine similarity between iterations; n - maximum number of iterations
Output: Weighting vector w1 over <U,I,R,T>
Initialize w1 with random numbers between 0 and 1.
→ →
w0 = w1
while (n>0) do
→ → → →
w1 = α * d w1 + β * w1 * M − (1 − γ ) * p
→ → →
Normalize( w1 ) ; if (Cosine( w0 , w1 ) > simthr ) then BREAK;
→ →
w0 = w1 ;
n = n - 1;
End

Algorithm 1. The RecRank Algorithm

4. EXPERIMENTAL EVALUATION

We evaluated our approaches on the Amazon Book recommendation dataset (www.amazon.com/books). A


Web crawler was used to extract data in February of 2009. The data contained 2,987 users and 15,930 books.
For every user we extracted a full profile consisting of ratings and reviews he/she has posted so far. As for
user reviews, we used a NLP tool called Stanford Log-linear Part-Of-Speech Tagger
(http://nlp.stanford.edu/software/tagger.shtml) to identify the part of speech for each word/term, and took
only nouns and adjectives and discarded all other words. We focused on nouns and adjectives because we
thought those are the most semantically meaningful features. Then we we applied the Porter Stemmer
algorithm [14] to further reduce the number of terms. In all, there were a total of 4,864 terms in the dataset.
For evaluation metrics we used F-Score ⎛⎜ 2 * precision * recall ⎞⎟ and Intra-list Similarity (ILS)[8]. F-
⎜ precision + recall ⎟
⎝ ⎠
Score is defined by precision and recall, thus measures the relevancy of the recommendations, while ILS
indicates the diversity of the recommendations in the recommended list, as described previously in section
Erro! A origem da referência não foi encontrada.. By plotting F-Scores against ILS, we can observe the
trade-off between the relevancy and the diversity. So with this setup, results which achieved high F-Scores at
high ILS values are more desirable. ILS is computed as:
2 * ∑k∈l ∑e∈l ( sim(ik , ie )) (5)
ILS (l ) = 1 −
n( n − 1)
where l is a recommendation list, ik, ie, re items in l and n is a size of l, as per [8]. Values of both F-score and
ILS are in the range between 0 and 1 where 1 is the highest (i.e., the most relevant for F-Score and the most
diverse for ILS).
Note that in the evaluations, we considered only the items which the user rated highly (i.e., higher than
his/her average rating), as mentioned in the previous section with regard to the personalization vector. We
hypothesize that we should recommend only items which the user would like. Also note that we used 5-fold
cross validation for all experiments reported below.

152
IADIS International Conference e-Commerce 2009

0,6
Basic AR
AR with adjectives and nouns
0,5
AR with nouns

0,4 Basic CF
CF with adjectives and nouns

F-score
0,3 CF with nouns

Basic IBF
0,2
IBF with adjectives and nouns
IBF with nouns
0,1

0
0 0,1 0,2 0,3 0,4
ILS
Figure 3. Relevancy and Diversity using Review Terms in Association Rules (AR), Collaborative Filtering (CF) and
Item-based Collaborated Filtering (IBF)
We first evaluated the contribution of review terms in the three standard recommendation approaches
(Association Rules (AR), Collaborative Filtering (CF) and Item-based Collaborated Filtering (IBF)). Figure 3
shows the F-Score vs. ILS curves. As you can see, for all approaches the inclusion of the review terms,
especially nouns (only), helped improve the results (i.e., relevancy and diversity of the recommendations)
over the basic versions.
0,6
Basic CF
0,5 CF re-ranked by ANN trained
with adjectives and nouns
0,4 CF re-ranked by Popularity
CF re-ranked by ANN trained
F-score

0,3 with adjectives

0,2 Basic IBF


IBF re-ranked by ANN trained
with adjectives and nouns
0,1
IBF re-ranked by Popularity
0 IBF re-ranked by ANN trained
0 0,1 0,2 0,3 0,4 with adjectives

ILS

Figure 4. Re-ranking Recommendation Lists Using Popularity and ANN


Next we evaluated our recommendation re-ranking methods, as they are applied in CF and IBF. Figure 4.
shows the results. There you can see that popularity (or authority) helped improve the result over the basic
versions, especially for IBF. As for ANN, it seems the best improvement was achieved when the network
was trained with adjectives (only). Comparing with results from the previous evaluation above, where
adjectives didn’t contribute significantly in finding ’good’ initial recommendations, they seem to help in re-
ranking. It’s probably because a “good” and “perfect” anthropology book is not an excellent candidate for
recommendation to math lovers who reviewed math books using terms such as “good’’ and “excellent’’. But
once an initial recommendation list is formed with books related to anthropology, adjectives such as
“awesome” and “excellent” may be effective in re-ranking the initial list.
0,6
Basic CF
0,5 Basic IBF
RecRank with adjectives
0,4 RecRank with nouns and
adjectives
F-score

0,3 RecRank with nouns

0,2

0,1

0
0 0,1 0,2 0,3 0,4
ILS
Figure 5. Formulating Recommendation Lists Using RecRank Algorithm
Finally we evaluated the RecRank algorithm. Figure5 shows the results by RecRank with nouns and/or
adjectives. There you see that RecRank was only relatively effective as compared to CF and IBF – although

153
ISBN: 978-972-8924-89-8 © 2009 IADIS

RecRank with nouns significantly outperformed CF, it was comparable to IBF, which shows its great
potential.

5. CONCLUSION

In this paper we presented the results of incorporating user reviews in e-commerce recommendation systems.
User reviews are free-form texts, and we used NLP techniques to analyze them, in particular to obtain the
parts-of-speech of the terms. Our experimental results showed that reviews are an important source of
information about the user preferences and interconnections among items, and including reviews in the
recommendation generation process does improve the relevance and diversity of the recommended items. As
for recommendation re-ranking methods, popularity and ANN can also improve the quality of an already
formulated recommendation list. We also proposed a new RecRank algorithm which covers all factors and
their interactions and interconnections.
Our future work will focus on the further improvement of the RecRank algorithm. In particular, we are
interested in using other NLP techniques (in addition to POS tagging) to find terms which will influence the
user preferences and item interconnections the most.
We believe that, if there is a possibility of further improving the recommendations’ relevancy and
diversity through reviews, it would be possible in the proposed RecRank algorithm.

REFERENCES
[1] P. Tallon, K. Kraemer, V. Gurbaxani, Executives’perceptions of the business value of information technology: a
process-oriented approach, Journal of Management Information Systems 16 (4) (2000) 145–174.
[2] M. Von Zedtwitz, Organizational learning through postproject reviews in RD, D Management 32 (3) (2002) 255–268.
[3] A. Schein, A. Popescul, L. Ungar, D. Pennock, Methods and metrics for cold-start recommendations, in: Proceedings
of the 25th annual international ACM SIGIR conference on Research and development in information retrieval,
ACM New York, NY, USA, 2002, pp. 253–260.
[4] X. N. Lam, T. Vu, T. D. Le, A. D. Duong, Addressing cold-start problem in recommendation systems, in: ICUIMC
’08: Proceedings of the 2nd international conference on Ubiquitous information management and communication,
ACM, New York, NY, USA, 2008, pp. 208–211.
[5] R. Agrawal, R. Srikant, I. Center, C. San Jose, Mining sequential patterns, in: Data Engineering, 1995. Proceedings of
the Eleventh International Conference on, 1995, pp. 3–14.
[6] Y. Cho, J. Kim, S. Kim, A personalized recommender system based on web usage mining and decision tree induction,
Expert Systems with Applications 23 (3) (2002) 329–342.
[7] I. Nation, D. Nation, Teaching and learning vocabulary, Heinle & Heinle, 1990.
[8] C. Ziegler, S. McNee, J. Konstan, G. Lausen, Improving recommendation lists through topic diversification, in:
Proceedings of the 14th international conference on World Wide Web, ACM New York, NY, USA, 2005, pp. 22–32.
[9] L. McGinty, B. Smyth, On the role of diversity in conversational recommender systems, Lecture notes in computer
science (2003) 276–290.
[10] J. Wang, A. De Vries, M. Reinders, Unifying user-based and item-based collaborative filtering approaches by
similarity fusion, in: Proceedings of the 29th annual international ACM SIGIR conference on Research and
development in information retrieval, ACM New York, NY, USA, 2006, pp. 501–508.
[11] S. Aciar, D. Zhang, S. Simoff, J. Debenham, Informed recommender: Basing recommendations on consumer
product reviews, Intelligent Systems, IEEE 22 (3) (2007) 39–47.
[12] S. Brin, L. Page, The anatomy of a large-scale hypertextual Web search engine, Computer networks and ISDN
systems 30 (1-7) (1998) 107–117.
[13] A. Hotho, R. Jaschke, C. Schmitz, G. Stumme, Folkrank: A Ranking Algorithm for Folksonomies, in: Proceedings
of the FGIR, 2006.
[14] C. Van Rijsbergen, S. Robertson, M. Porter, British Library Research and Development Dept, U. of Cambridge.
Computer Laboratory, New models in probabilistic information retrieval, Computer Laboratory, University of
Cambridge, 1980.

154
IADIS International Conference e-Commerce 2009

FACTORS AFFECTING ONLINE APPLICATION OF


INSURANCE PRODUCTS AND ITS IMPLICATIONS

Wee Kheng-Tan
Assistant Professor, Department of Information & Electronic Commerce,
Kainan University, No. 1, Kainan Road, Luchu, Taoyuan County, Taiwan

Yu-Jie Tan
Department of Information & Electronic Commerce, Kainan University, Kainan University,
No. 1, Kainan Road, Luchu, Taoyuan County, Taiwan

ABSTRACT
Insurance sales agents play a very important role in the insurance industry. As the first point of contact with customers,
they are instrumental in promoting insurance products of the insurance company. Popularity of electronic commerce has
pushed many insurance companies to offer their customers the option of buying insurance products online. Consumers
can now purchase insurance products independent of direct service employee involvement, hence creating an impact on
the traditional one-to-one marketing employed by insurance sales agents. In addition, it is also known that electronic
commerce is not necessarily suitable for all types of products. Given the complicated nature of insurance products, it may
be unlikely for Internet to replace insurance sales agents. Furthermore, online mode introduces a new set of online-related
criteria which customers need to factor into their decision when they apply online. Since the criteria considered by
customers when applying online might not be of equal importance, this research used the Analytic Hierarchy Process to
study the impact of the inclusion of these online-related criteria. In addition, this research used the more simple travel
insurance and the much more complicated individual life insurance for comparison purpose. This research observed that
reasonable premium remained the most important criteria and was applicable to the above two types of insurance.
Online-related criteria featured more prominently when customers applied for travel insurance online than for individual
life insurance. Insurance sales agents were slowed to appreciate the importance of online-related criteria when customers
applied for travel insurance online. On the other hand, the impacts of online-related criteria when customers applied life
insurance were less important, resulting in greater agreement between customers and insurance sales agents.

KEYWORDS
Travel Insurance, Life Insurance, Online Application.

1. INTRODUCTION
Risk may be defined as uncertainty concerning the occurrence of a loss (Rejda, 2008). Insurance involves the
transfer of risks to insurers who agree to indemnify insureds for such loss in exchange for a premium.
Insurance is popular among the Taiwanese. In term of global ranking, Taiwan was ranked 14th in
premium income, 1st in insurance penetration (ratio of insurance premium to GDP) and 19th in insurance
density (average insurance expense per capita) in 2007 (Swiss Re, 2008). Based on the number of business
licenses issued, Taiwan has 61 insurance institutions in 2008 (Taiwan Insurance Institute, 2009) and is an
indication of the liberalization of the insurance industry and the tough competition faced by industry players.
As a form of service, insurance sales agents play a very important role. Traditionally, insurance sales
agents are often the first point of contact for those who intend to buy insurance policies. Through
introducing, explaining, processing and notifying the approval of insurance policies, insurance sales agents
help customers to have a better understand of the insurance product and generate income for the insurance
company. Furthermore, insurance sales agents can also help to build enduring customer relationship. In
return, insurance company offers them competitive commission to spur them on. As a result, insurance
industry often gives outsiders the impression of being a high-contact service.

155
ISBN: 978-972-8924-89-8 © 2009 IADIS

Popularity of electronic commerce has pushed many insurance companies to offer customers the option of
buying insurance products online. This online option can be viewed as an additional mean of service delivery
and a form of self-service technology facility. (Meuter et al., 2000). Customers can now purchase insurance
products independent of direct service employee involvement. This move will definitely have an impact on
the traditional one-to-one relationship-based marketing employed by insurance sales agents. From the
customers’ perspective, customers also need to take into account some of the online-related issues such as
user interface and security when they intend to purchase insurance product online. Online option may drive a
wedge between insurance sales agents and customers. Since the former are supposed to understand the
customer best, it is interesting to understand whether online application has resulted in insurance sales agents
having a poorer understanding of their customers.
It is also known that electronic commerce is not always suitable for all types of products; often the more
complicated the product, the less it can do well in the cyberworld. Some researchers e.g. Rogers (2001) felt
that given the complicated nature of insurance products, it was unlikely for Internet to replace traditional
insurance sales agents. Careful observation reveals that insurance products are not uniform in complexity. As
an example, travel insurance, which covers medical expenses, financial and other losses incurred while
traveling, is a relatively simple product. However, individual life insurance is much more complicated.
Besides the basic life insurance policy, it is common for endorsements and riders to be added to the policy.
In view of the above, this research used two types of insurance products: the simple travel insurance and
the much more complicated individual life insurance for investigation and comparison purpose. They could
be viewed as two products at two opposite point of the spectrum in term of the need for service contact. We
noticed that customer consider many criteria when deciding whether to purchase the insurance product. We
added a set of online-related criteria to find out whether there were important differences in customers’
consideration when they applied online for these two types of products. As these criteria were not necessarily
of equal importance, Analytical Hierarchy Process (AHP) method was used. This research also tries to find
out whether insurance sales agents understood their customers well enough in the online environment.

2. LITERATURE REVIEW
Service encounter is one of the three stages of service consumption where customer interacts with the service
provider. It can range from high contact services such as hotel to low contact services such as filling the car
with petrol (Curran et al., 2003). Service encounter generates the most powerful perception of service
(Sweeney and Wade, 2000), affects customer’s perceived service quality (Meuter et al., 2000) which may
contribute to satisfaction (Churchill and Carol, 1982) and re-purchase intention (Taylor and Baker, 1994).
As mentioned earlier, insurance industry is often perceived as a relatively high contact service with
insurance sales agents playing a key role. However, we also note that different insurance products needs
different level of contact service. Nevertheless, it is important for insurance company to be concerned about
the types of service they offered and the associated quality. Service offered could include the insurance sales
agents themselves, call centers, overseas rescue and emergency services.
Customer loyalty is viewed as the strength of the relationship between an individual’s relative attitude
and repeat patronage (Dick and Kunal, 1994). Loyalty helps guarantee future earnings of an organization
(Sharp and Sharp, 1997). Besides repeat business, insurance company also hopes that existing customers will
also purchase other products offered by the same company.
Corporate reputation is a result of the past actions of a firm and serves to communicate to its target groups
information regarding the quality of its products or services in comparison with those of its competitors
(Yoon et al., 1993). It is also built through its credible actions (Nguyen and Leblanc, 2001) and a symbol that
it is worthy to believe (Gupta and Cooper, 1992). Facing asymmetric information or product attributes which
are different to evaluate prior to purchase, corporate reputation serves as a useful signal for the consumer. As
a financial instrument and sometimes with a long effective duration and maturity period, the reputation of
insurance company is thus important.
The online option offered by insurance company usually includes insurance product information, online
application and approval as well as allowing customer to make the necessary payment. Hence when deciding
whether to buy a policy online, besides considering price, coverage, compensation when the undesirable
happened, services etc., customer will also need take into account some of the online-related issues such as

156
IADIS International Conference e-Commerce 2009

user interface, online approval, secured handling of personal data as well as able to make payment online.
Related to the user interface is the concept of ease of use. An important measure of the Technology
Acceptance Model (TAM), ease of use is defined as ‘the degree to which a person believes that using a
particular system would be free from effort’ (Davis, 1989). TAM is widely used to explore why users adopt
various systems and applications.

3. RESEARCH METHOD
The Analytic Hierarchy Process (AHP) was first proposed by Thomas L. Saaty (Saaty 1977) and its main
characteristic is based on pairwise comparison judgments. It is often used to analyze complex multi-criteria
decision-making problem and applied to a wide range of problems and applications. The problem
investigated is set up as a sequential step-up hierarchy structure with different measures being integrated into
a single overall score for ranking decision alternatives.
When using AHP, the problem’s step-up hierarchy structure need to be developed. A hierarchy is a
specific type of system, based on the assumption that the entities can be grouped into disjoint sets, with the
entities of one group influencing those of other groups (Ananda and Herath, 2002).
Pairwise comparison matrix forms an important component of AHP. Two criteria are compared using a
nine-point scale, where ‘1’ denotes ‘equal’ importance, ‘3’ represents ‘slightly’ importance, ‘5’ indicates
‘clearly’ superiority, ‘7’ is ‘very’ important and ‘9’ denotes ‘extremely’ important, with the even numbers
being used to indicate intermediate values if necessary. If there are n criteria to consider, n(n-1)/2 pairwise
comparisons would need to be made. Afterwhich, reciprocal n x n matrix are constructed and weightings are
then obtained.
The consistency of the pairwise comparison matrix needs to be verified and the following two indexes
can be used: Consistency Index (C.I.) and Consistency Ratio (C.R.). They are defined as follows:
C.I. = ( λmax – n ) / ( n – 1) (1)

C.R. = C.I. / R.I. (2)

where λmax is the largest eigenvalue and R.I. (Random Index) is as shown in Table 1. For consistency, C.I
and C.R. should be less than 0.1 for the AHP analysis to be acceptable.
Table 1. Random Index (R.I.)
N 1 2 3 4 5 6 7 8 9 10
R.I. 0 0 0.58 0.90 1.12 1.24 1.32 1.41 1.45 1.49

4. RESEARCH FRAMEWORK, RESULT AND DISCUSSION


The relevant literature was used as a starting point to identify the key criteria suitable for this research.
Discussions with insurance sales agents and customers were then made to refine the criteria. A tri-tiered
hierarchical structure as shown in Figure 1 was obtained. The second tier comprises three aspects which are
firstly, operation of insurance company, secondly, key elements of insurance policy and thirdly, online
application and processing. The third tier comprises 11 criteria.
As the AHP questionnaire was not easy to fill up, face-to-face survey was conducted to increase the
accuracy of the returns. The survey lasted for 2 months starting from December 5, 2008. A total of 44 valid
returns were received from insurance sales agents and 102 valid returns were obtained from customers. Fifty-
one valid returns were obtained for online application of travel insurance and another 51 valid returns for
online application of individual life insurance. Eighty percent of the insurance agents were male, 65% of
them were in the age group of 19-25, and 64% received college and university education. In addition, 86% of
them were full-time insurance sales agents. For the customers, 63% of them were male and 92% were in the
main age group of 19-35 year old. In addition, 51% of them received college and university education.

157
ISBN: 978-972-8924-89-8 © 2009 IADIS

Figure 1. The Hierarchical Structure

4.1 Online Travel Insurance


As observed from Table 2, customers considered online application and processing (0.386) to be the most
important aspect, followed by key elements of insurance policy (0.325). They are least concerned about
operation of insurance company (0.289).
Table 2. Weighting of Online Travel Insurance Application (Customer)
Aspects and Criteria Weighting
Aspect Criteria Overall
A. Operation of Insurance Company 0.289 (3)
A1. Reputation of Insurance Company 0.291 (2) 0.084 (7)
A2. Customer Service Offered by Insurance Company 0.338 (1) 0.097 (6)
A3. Existing Customer of Insurance Company 0.099 (4) 0.029 (11)
A4. Overseas Service Offered by Insurance Company 0.272 (3) 0.079 (8)
B. Key Elements of Insurance Policy 0.325 (2)
B1. Reasonable Premium 0.461 (1) 0.150 (1)
B2. Flexible Range of Risks Covered by the Insurance Policy 0.193 (3) 0.063 (9)
B3. Reasonable Compensation 0.346 (2) 0.112 (4)
C. Online Application and Processing 0.386 (1)
C1. Easy to Use Interface 0.303 (2) 0.117 (3)
C2. Simple Approval Process 0.273 (3) 0.105 (5)
C3. Many Payment Options 0.110 (4) 0.043 (10)
C4. Security 0.314 (1) 0.121 (2)
Note: Consistency Index (C.I.) and Consistency Ratio (C.R.) < 0.1

However, as shown in Table 3, insurance sales agents were of the opinion that their customers would be
most concerned with key elements of insurance policy (0.379), followed by operation of insurance company
(0.344). The aspect which customers were most concerned with, online application and processing, was
ranked by the insurance sales agent as the least important and with a weighting of 0.277. This outcome
reflected a fundamental difference between the understanding of customers and insurance sales agents.

158
IADIS International Conference e-Commerce 2009

Table 3: Weighting of Online Travel Insurance Application (Insurance Sales Agent)


Aspects and Criteria Weighting
Aspect Criteria Overall
A. Operation of Insurance Company 0.344 (2)
A1. Reputation of Insurance Company 0.330 (2) 0.113 (5)
A2. Customer Service Offered by Insurance Company 0.352 (1) 0.121 (3)
A3. Existing Customer of Insurance Company 0.115 (4) 0.039 (10)
A4. Overseas Service Offered by Insurance Company 0.203 (3) 0.070 (7)
B. Key Elements of Insurance Policy 0.379 (1)
B1. Reasonable Premium 0.465 (1) 0.176 (1)
B2. Flexible Range of Risks Covered by the Insurance Policy 0.200 (3) 0.076 (6)
B3. Reasonable Compensation 0.335 (2) 0.127 (2)
C. Online Application and Processing 0.277 (3)
C1. Easy to Use Interface 0.247 (2) 0.069 (8)
C2. Simple Approval Process 0.188 (3) 0.052 (9)
C3. Many Payment Options 0.133 (4) 0.037 (11)
C4. Security 0.432 (1) 0.120 (4)
Note: Consistency Index (C.I.) and Consistency Ratio (C.R.) < 0.1
As for the criteria under operation of insurance company, rankings given by customers and insurance
sales agents were identical. Customer service offered by insurance company was the most important,
followed by reputation of insurance company, overseas service offered by insurance company and lastly
existing customer of insurance company. This result showed that loyalty of existing customers was not
important. For key elements of insurance policy, criteria which insurance sales agents felt customers would
be most concerned with and what customers really felt, i.e. reasonable premium, was identical. The rankings
given by both parties for reasonable compensation and flexible range of risks covered by the insurance policy
were identical and ranked second and third respectively. For criteria under online application and processing,
rankings given by customers and insurance sales agents were identical but the weighting revealed interesting
messages. Security emerged as the first. However, the weighting given by insurance sales agent for security
(0.432) was much higher than the weighting given by customers for security (0.314). Easy to use was ranked
second by both parties, however, it was valued more by customers (0.303) than insurance sales agents
(0.247).
Through the overall ranking analysis, it was observed that reasonable premium was top in the mind of
both customers and insurance sales agents. Security and easy to use interface were also important to
customers. However, insurance sales agents generally under-estimated the importance of online-related
criteria to the customers. Security, easy to use interface and simple approval process were ranked second,
third and fifth in importance by the customers. However, insurance sales agents thought that their customers
would ranked them only as fourth, eight and ninth respectively.

4.2 Online Individual Life Insurance


As shown in Table 4, customers considered operation of insurance company (0.417) to be the most
important, then key elements of insurance policy (0.361). They were least concerned about online application
and processing. Insurance sales agents (Table 5) also felt that customers would rank online application and
processing (0.257) last. However, insurance sales agents felt that their customers would instead be most
concerned about elements of insurance policy (0.444), followed by operation of insurance company (0.299).
For the criteria of operation of insurance company, customers valued reputation of insurance company
most, followed by the customer service offered by insurance company. However, insurance sales agents
thought that customers would value customer service most, followed by reputation. Existing customer of
insurance company was ranked last by both parties, reflecting the consensus that it was not that important.
For key elements of insurance policy, the criteria which insurance sales agents felt customers would be most
concerned with and what customers really felt was identical, i.e. reasonable premium. However, insurance
sales agents under-estimated the importance of reasonable premium, customers gave a high weighting of
0.505 while agents gave a weighting of 0.385. Rankings given by both parties for reasonable compensation
and flexible range of risks covered by the insurance policy were identical, i.e. ranked second and third
respectively. For online application and processing, customers considered security as the most important,

159
ISBN: 978-972-8924-89-8 © 2009 IADIS

followed by easy to use interface and simple approval process. However, insurance sales agents thought that
customers would value simple approval process most, followed by security and easy to use interface.
Table 4. Weighting of Online Individual Life Insurance Application (Customer)
Aspects and Criteria Weighting
Aspect Criteria Overall
A. Operation of Insurance Company 0.417 (1)
A1. Reputation of Insurance Company 0.339 (1) 0.141 (2)
A2. Customer Service Offered by Insurance Company 0.318 (2) 0.133 (3)
A3. Existing Customer of Insurance Company 0.109 (4) 0.045 (10)
A4. Overseas Service Offered by Insurance Company 0.234 (3) 0.098 (5)
B. Key Elements of Insurance Policy 0.361 (2)
B1. Reasonable Premium 0.505 (1) 0.182 (1)
B2. Flexible Range of Risks Covered by the Insurance Policy 0.168 (3) 0.061 (8)
B3. Reasonable Compensation 0.327 (2) 0.118 (4)
C. Online Application and Processing 0.222 (3)
C1. Easy to Use Interface 0.297 (2) 0.066 (7)
C2. Simple Approval Process 0.206 (3) 0.046 (9)
C3. Many Payment Options 0.121 (4) 0.027 (11)
C4. Security 0.376 (1) 0.083 (6)
Note: Consistency Index (C.I.) and Consistency Ratio (C.R.) < 0.1
Table 5. Weighting of Online Individual Life Insurance Application (Insurance Sales Agent)
Aspects and Criteria Weighting
Aspect Criteria Overall
A. Operation of Insurance Company 0.299 (2)
A1. Reputation of Insurance Company 0.289 (2) 0.086 (5)
A2. Customer Service Offered by Insurance Company 0.331 (1) 0.099 (4)
A3. Existing Customer of Insurance Company 0.153 (4) 0.046 (10)
A4. Overseas Service Offered by Insurance Company 0.227 (3) 0.068 (8)
B. Key Elements of Insurance Policy 0.444 (1)
B1. Reasonable Premium 0.385 (1) 0.171 (1)
B2. Flexible Range of Risks Covered by the Insurance Policy 0.272 (3) 0.121 (3)
B3. Reasonable Compensation 0.343 (2) 0.152 (2)
C. Online Application and Processing 0.257 (3)
C1. Easy to Use Interface 0.215 (3) 0.056 (9)
C2. Simple Approval Process 0.335 (1) 0.086 (5)
C3. Many Payment Options 0.168 (4) 0.043 (11)
C4. Security 0.282 (2) 0.072 (7)
Note: Consistency Index (C.I.) and Consistency Ratio (C.R.) < 0.1
The overall ranking analysis revealed that reasonable premium was top for both customers and insurance
sales agents with customers giving this criteria a higher overall weighting (0.182) than insurance sales agents
(0.171). Reputation of insurance company came in second (0.141) which insurance sales agents under-
estimated (0.086). Among the criteria which insurance sales agents over-estimated their importance, flexible
range of risks covered by the insurance policy and simple approval process were the most over-estimated.

4.3 Comparison of Online Travel Insurance and Individual Life Insurance


When the three aspects of the two insurance products are compared, customers considered online application
and processing (0.386) as the most important for online travel insurance but operation of insurance company
(0.417) was the most important for online individual life insurance. However, the insurance sales agents
thought that, regardless of the type of insurance, customers would rank key elements of insurance policy as
the most important, followed by operation of insurance company and lastly online application and
processing. This observation suggested that insurance sales agents might have the same mindset when they
faced different types of insurance even though this was not so for the customers themselves.
For the operation of insurance company, customers felt that reputation of insurance company and
customer service offered by insurance company were the top two criteria even though customers placed

160
IADIS International Conference e-Commerce 2009

higher emphasis on reputation when purchasing online individual life insurance. As for the insurance sales
agents, they thought that customers would, again regardless of the type of insurance, placed top emphasis on
customer service offered by insurance company followed by reputation of insurance company. As for key
elements of insurance policy, all parties considered reasonable premium as the most important, followed by
reasonable compensation. Regardless of the type of insurance, customers valued security and easy to use
interface most. For all the parties, many options for payment was not an important criteria.

4.4 Overall Discussion


Viewing the above in totality, one can draw the conclusion that the nature of the insurance product affects
customers’ consideration. Even though travel insurance and individual life insurance are insurance products,
the former is much simpler, structured, cheaper and of shorter maturity period. However, the latter is
complicated, less structured, expensive and with maturity period stretching maybe over many years. Hence,
when purchasing individual life insurance, customers will definitely be more cautious, spend more time to
consider and prefer the guidance and assistance of insurance sales agents. It is a product that needs higher
contact service than travel insurance. The ranking in importance given by the customers for both types of
insurance products reflect the effects of such product’s nature.
Reasonable premium is top on the list of importance, hence pricing constitutes a very critical part of
customers’ decision. The overall reasonable premium weighting of individual life insurance (0.182) is higher
than travel insurance (0.150), reflecting the effect of the more expensive individual life insurance. Even
though customers are very concerned of the amount they are paying, they are less concerned with what they
will get in return (i.e. compensation). For both types of insurance, customers have only ranked reasonable
compensation fourth in overall importance, which is lower than the second ranking given by insurance sales
agents. Such outcome is obtained because compensation is received only upon some undesirable happenings
and of course, many would prefer such events never to happen to them. Furthermore, many customers buy
insurance policies more to get the value derived from the ‘peace of mind’ than the hope for high actual claim.
The similarity of these two types of insurance products ends at reasonable premium. For the online travel
insurance, the immediate set of criteria of high importance are mostly related to online application and
processing: security (ranking: 2), easy to use interface (ranking: 3) and simple approval process (ranking: 5),
follows by the next set of criteria which are more related to the insurance company and service offered:
customer service offered by insurance company (ranking: 6) and overseas service offered by insurance
company (ranking: 8). Given the simple and structured feature of travel insurance, there is no real need for
active involvement of insurance sales agents, thereby making online application a truly viable option.
Furthermore, online application offers convenience for buyers anywhere and anytime which is often needed
because customers tend to buy travel insurance at the last moment. Hence, criteria related to online
application and processing are predominant.
On the other hand, for the case of individual life insurance, reputation of insurance company is ranked
second, then follows by a set of criteria related to services offered: customer service (ranking: 3) and
overseas services (ranking: 5) offered by insurance company. Online-related criteria come later: security
(ranking: 6), easy to use interface (ranking: 7) and simple approval process (ranking: 9). Customers are very
concerned about the reputation of insurance company because life insurance is more expensive with long
maturity period, hence the need for a reputable insurance company to better protect their interest. This is even
more important now because of the ongoing financial crisis. Due to the fact that individual life insurance is
much more complicated, often with riders attached to a standard life insurance policy, the need for
personalized service and professional advice offered by the insurance sales agent is obvious here.
Furthermore, the complexity of this product makes full automation and self-service impossible. Application
may be made online but insurance sales agent often need to pick up the lead and do the necessary contact
with the applicant, follow-up and processing. It thus causes online-related criteria to be less critical than
online travel insurance.
Loyalty and many options for payment are at the tail-end of the list of overall importance. With premium
as the customer’s key concern and faces with many competitive options offered by other insurance
companies, customer’s loyalty to the insurance company is low. It is also common for customers to diversify
their risk and buy policies from more than one insurance company. Payment is slightly important for online
travel insurance application (ranked 10) because of the need to make online payment.

161
ISBN: 978-972-8924-89-8 © 2009 IADIS

The main difference in viewpoint of customers and insurance sales agents is due to the online travel
insurance and specifically contribute by the online-related criteria. Insurance sales agents are slowed to
appreciate the suitability of e-commerce for travel insurance and hence the importance of online-related
criteria when customers applied for travel insurance online. Insurance company will need to establish other
feedback mechanism to receive customers’ feedback on the online options, especially for insurance products
which are easier to automate online instead of relying on insurance sales agents for feedback and suggestions.

5. CONCLUSION
This research showed that the importance of criteria differed according to the complexity of the insurance
product. Through the AHP method, this research observed that reasonable premium was the most important
criteria. Online-related criteria featured more prominently for customers when they applied for the much
simpler travel insurance online than for the more complicated individual life insurance. Furthermore,
insurance sales agents were slowed to appreciate the importance of online-related criteria when customers
applied for travel insurance online. On the other hand, the impacts of online-related criteria on customers
when they applied for individual life insurance were much less important, resulting in greater agreement
between customers and insurance sales agents.

REFERENCES
Ananda J. and Herath G., 2002. Assessment of Wilderness Quality Using the Analytic Hierarchy Process. In Tourism
Economics, Vol. 8, No. 2, pp. 162–182.
Churchill G. A. Jr. and Carol S., 1982. An Investigation into the Determinants of Customer Satisfaction. In Journal of
Marketing Research, Vol. 19(November), pp. 491-504.
Curran J. M., Meuter, M. L. and Suprenant C. F., 2003. Intentions to Use Self-service Technologies: A Confluence of
Multiple Attitudes. In Journal of Service Research, Vol. 5, No. 3, pp. 209–224.
Davis F. D., 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. In
MIS Quarterly, Vol. 13, No. 3, pp. 319-340.
Dick A. S. and Kunal B., 1994. Customer Loyalty: Toward an Integrated Conceptual Framework. In Journal of the
Academy of Marketing Science, Vol. 22, No. 2, pp. 99-113.
Gupta S. and Cooper L. G., 1992. The Discounting of Discounts and Promotion Thresholds. In Journal of Consumer
Research, Vol. 19(December), pp. 401–411.
Meuter M. L., Ostrom A. L., Roundtree R. I. and Bitner M .J., 2000. Self-service Technologies: Understanding Customer
Satisfaction with Technology-based Service Encounters. In Journal of Marketing, Vol. 64(July), pp. 50-64.
Nguyen N. and Leblanc G., 2001. Corporate Image and Corporate Reputation in Customers' Retention Decisions in
Services. In Journal of Retailing and Consumer Services, Vol. 8, pp. 227-236.
Rejda G., 2008. Principles of Risk Management and Insurance 10th Edition, Addison Wesley, Boston, USA.
Rogers J., 2001. Six Keys to B2C E-commerce Success. In Insurance & Technology, July, pp. 49-55.
Saaty T. L., 1977. A Scaling Method for Priorities in Hierarchical Structures. In Journal of Mathematical Psychology,
Vol. 15, pp. 234-281.
Sharp B. and Sharp A., 1997. Loyalty Programs and Their Impact on Repeat-purchase Loyalty Patterns. In International
Journal of Research in Marketing, Vol. 14, No. 5, pp. 473-486.
Sweeney J. C. and Lapp W., 2000. High Quality and Low Quality Internet Service Encounters. ANZMAC 2000 Visionary
Marketing for the 21st Century: Facing the Challenge, pp. 1229-1233.
Swiss Re, 2008. World insurance in 2007: Emerging Markets Leading the Way. Sigma No. 3/2008.
Taiwan Insurance Institute, 2009. The Important Indexes of Insurance Industry. Taiwan, February.
Taylor S. A. and Baker T. L., 1994. Assessment of the Relationship Between Service Quality and Customer Satisfaction
in the Formation of Consumers’ Purchase Intentions. In Journal of Retailing, Vol. 70, No. 2, pp. 163–178.
Yoon K. Y. and Im K. S., 2005. An Evaluating System for IT Outsourcing Customer Satisfaction Using the Analytic
Hierarchy Process. In Journal of Global Information Management, Vol. 13, No. 4, pp. 55–78.
Yoon E., Guffey H. G. and Kijewski V., 1993. The Effects of Information and Company Reputation on Intentions to Buy
a Business Service. In Journal of Business Research, Vol. 27, pp. 215-28.

162
IADIS International Conference e-Commerce 2009

THE CONFLICTING ROLE OF ONLINE SWITCHING


COSTS: THE MAIN AND INTERACTION EFFECTS ON
CUSTOMER RETENTION

Ana Isabel Torres, Francisco Vitorino Martins


Faculty of Economics - University of Porto
Rua Dr. Roberto Frias, 4200-464 Porto - Portugal

ABSTRACT
In this paper we examine prior research, which has been studying the effects of switching costs on customer retention,
within online and offline markets. The empirical studies in the area reveal contrasting results: (1) switching costs are a
stronger predictor of customer retention than customer satisfaction alone; (2) the main effect of switching costs moderates
the relationship between satisfaction and customer retention; (3) conversely, the lack of main effects reflects the
interaction effects indicating that switching costs have an even greater impact on customer retention than under
satisfaction variation levels. These power asymmetries reveal a conflicting role of switching costs across industry and
marketplaces. We also observe a significant bias in favor of service industries with high switching costs. Based on this
meta-analytical research we propose a theoretical base to support the path structural relationship between the constructs
providing a nomological framework to future research. Finally we draw some conclusions, suggest future research
directions and make managerial recommendations.

KEYWORDS
Switching Costs, Customer Retention, Electronic Markets.

1. INTRODUCTION
Online switching costs are a relevant and challenging research subject due to the intense competition in the
electronic markets, high customer acquisition costs and the perceived ease with which customers can switch
between online suppliers. Typically, assumptions are made to confirm switching costs as important
antecedents of customer retention or loyalty, and within an online environment this relationship is of critical
importance. However, this relationship is perceived at different levels resulting in a lack of significant
association with repurchase intentions.
It is generally accepted that customer satisfaction is thought to be one of the most important determinants
of customer loyalty and this relationship can be reciprocal (Oliver, 1999, Szymanski and Henard, 2001; East
et al. 2008). Accordingly, Shankar et al. (2003, one of the most downloaded articles cited by Scopus) found
that loyalty and satisfaction have a reciprocal relationship such that each positively reinforces the other, and
this relationship is further strengthened online, meaning that loyalty to the service provider is higher when
the service is chosen online than offline. Additionally, a large body of evidence from e-commerce studies,
supports that higher levels of customer satisfaction reduces perceived benefits of switching behaviour and
generates higher levels of loyalty (Chiou, 2004; Anderson and Srinivasan, 2003; Devaraj et al., 2002).
Although the relationship between satisfaction and loyalty can be non-linear and only after satisfaction
increases above a critical level does loyalty increase (Dick & Basu, 1994). In fact, the asymmetrical
relationship between satisfaction and loyalty may be an indicator of the presence of moderating variables
(e.g., switching barriers, purchase involvement) or where there is a priori reason for expecting moderating
effects. Consistent with these findings Oliver (1999) has suggested that satisfaction is a necessary step in
loyalty formation but becomes less significant as loyalty is achieved through other mechanisms. As the
primary driver for explaining customer retention, customer satisfaction has received unflagging attention in
the marketing literature. While evidence accumulates that satisfaction influences repeat purchase behavior, it
typically explains only a quarter of the variance in behavioral intentions (see the meta-analysis by Szymanski

163
ISBN: 978-972-8924-89-8 © 2009 IADIS

and Henard, 2001 for an extent review). In addition, satisfaction in predicting future behavior has been
examined, and is shown to be only a weak predictor of behavioral loyalty, especially when there were high
switching costs (Balabanis et al., 2006).
Moreover, the relationship between satisfaction and loyalty is now recognized as more complex than
originally proposed (Oliver, 1999; Mittal and Kamakura, 2001). Customers can be satisfied, yet they might
not be loyal to a retailer, due to individuals’ idiosyncrasies and market contingencies. Yet, firms appear to be
stuck in a “satisfaction trap” a myopic belief that customer satisfaction and service quality are the only tools
for managing customer retention (Reichheld and Schefter, 2000).
The relevant interest of studying switching costs, in a managerial perspective, is the premise that these
costs impede customer switching and hence improve customer retention. While a large extent of literature
explores this relationship, empirical evidence is not consensual about the different roles of switching costs on
customer retention and satisfaction. Actually, researchers have recently called for devoting more efforts to
understanding customer behavior on online services (Yang and Peterson, 2004; Zeithaml et al., 2002).
Given the dramatically reduced set up and search costs in the Internet, and the perceived ease with which
customers can switch between online suppliers, what are the main drivers of customer e-loyalty? What is the
role of switching costs in the satisfaction-loyalty relationship? What are the main and moderating effects of
switching costs in this relationship? To answer these questions, this research attempts to examine the
consistency of the strength and direction of the main effects of switching costs on customer retention and the
interaction effects on the relationship between satisfaction and customer retention. Regarding the argument
that perceptions of switching costs may vary due to different industry characteristics (Burnham et al., 2003;
Jones et al., 2002) we examine the switching costs effects across-industry-context online and offline.
We use a meta-analysis as a literature synthesis, to observe and combine results from multiple
experiments to arrive at a clear understanding of some effect of interest. We collected the relevant consumer
switching cost literature from the leading academic journals and databases, over the last decade. We selected
the studies, which have empirically investigated switching costs as a measured variable and satisfaction or
customer retention as dependent variables, using Structural Equations Model (SEM), or another adequate
method, to assess and test the nomologigal validity of constructs’ relationships. We retain about ten studies
that more fully explain the full range of different effects of switching costs.
Helpfully, we intend to contribute to a more comprehensive understanding of the importance and role of
switching costs on customer retention, clarifying more complex customer behavior. Also, giving strength to
the nomological framework validity, we aim to provide a theoretical base to the structural model
development.
Following this, we will discuss exactly what is meant by consumer switching costs, satisfaction and
loyalty. Next, we will analyze the magnitude, direction and strength of different effects of switching costs on
structural relationships between satisfaction and customer loyalty and we present the final conclusions.

2. THE ROLE OF SWITCHING COSTS: THE RELATIONSHIP


BETWEEN SATISFACTION AND CUSTOMER RETENTION
Switching costs are defined as the one-time costs that customers associate with the process of switching from
one provider to another. While switching costs must be associated with the switching process, they need not
be incurred immediately upon switching. Furthermore, switching costs need not be limited to objective,
"economic" costs. Switching costs may perceive impediments ranging from "search costs, transaction costs,
learning costs, loyal customer discounts, customer habit, emotional costs and cognitive effort, linked to
financial, social and psychological risk on the part of the buyer" (Fornell et al., 1996:10).
Drawing on the economic cost concept (Besanko and Braeutigam, 2005:223) switching costs can be
understood as the opportunity cost of an alternative and includes all of the explicit and implicit costs (which
involve and do not involve outlays of cash, respectively) associated with that alternative. Put simply,
switching costs measure the full amount of sacrifices made at the moment the decision of switching provider
is taken. Burnham et al. (2003) found evidence for several distinct switching costs organized in three-order
switching cost types:

164
IADIS International Conference e-Commerce 2009

“Procedural switching costs” consisting of economic risk, evaluation, learning and setup costs, primarily
involving the expenditure of time and effort when an individual intends to begin a relationship with a new
provider, also described by Jones et al. (2002) as pre-switching costs and uncertainty costs.
“Financial switching costs” consisting of benefit-loss and financial-loss-costs involving the loss of
contractual benefits for staying with an incumbent firm (e.g. discounts, points) and onetime financial outlays
incurred in switching providers (e.g. deposits, initiation fees)
“Relational switching costs” consisting of personal-relationship loss and brand-relationship-loss costs,
this type of switching costs involves psychological or emotional discomfort due to the loss of identity and
breaking of bonds when individuals switch providers.
Switching barriers are similar to switching costs and are defined as the degree to which customers
experience a sense of being "locked into" a relationship based on the economic, social, or psychological costs
associated with leaving a particular service provider. Actually, both constructs have been used
simultaneously to predict customer retention (Shin and Kim, 2007; Tsai and Huang, 2007; Tsai et al. 2006;
Balabanis et al. 2006; Ranaweera and Prabhu, 2004; Jones et al. 2000).
Customer loyalty is defined as a buyer’s overall attachment or deep commitment to a product, service,
brand or organization (Oliver, 1999). The loyalty concept manifests itself in a variety of behaviours: repeated
purchases (e.g. behavioral loyalty) and commitment (e.g. attitudinal loyalty) and both measures are
important. Attitudinal loyalty includes different levels varying from repurchase intentions, recommending a
service provider to other customers, repeatedly patronizing the provider, willingness to pay more and
ultimate loyalty (i.e. resistance to others). Several studies use both measures as loyalty indicators.
Satisfaction or overall satisfaction has often been used to measure e-business success. Theoretically,
overall satisfaction can be considered an affective-based construct and is generally defined as a positive
affective state resulting from a global evaluation of performance based on past purchasing and consumption
experience (Oliver, 1999; Fornell et al. 1996; Lam et al. 2004; Szymanski and Henard, 2001).

2.1 The Conflicting Role of Switching Costs


There is empirical evidence of switching costs directly influencing customer loyalty both on a business-to-
consumer offline and online context (Burnham et al. 2003, Ranaweera and Prabhu, 2004; Jones et al. 2000;
Yang and Peterson, 2004; Balabanis et al. 2006;). Moreover, it has been claimed that switching costs can
explain more powerfully customer loyalty, and in an online environment this relationship is enhanced
(Balabanis et al. 2006; Shankar et al. 2003). Despite this main effect, we have found across recent empirical
studies, more complex and different effects in the satisfaction-loyalty relationship, under the interaction of
switching costs. Research findings reporting both online and offline studies are summarized in Table 1.
2.1.1 Asymmetrical Effect between Satisfaction and Switching Costs
Researchers have suggested that switching costs and satisfaction may negatively interact with each other in
driving customer intentions. As switching cost rise, the influence of satisfaction on intentions to stay with a
provider may decrease (and vice versa). In a leading study, using a global measure of switching cost in
surveying different samples of bank and hairstylist clients, Jones et al. (2000) found evidence of this negative
interaction effect. They found that the influence of core-service satisfaction on repurchase intentions
decreases under conditions of high switching barriers.
Contrarily to Jones and colleagues, Burnham et al. (2003) based on interviews of business consumers of a
credit car firm did not find support for the negative interaction between satisfaction and switching costs.
They found that satisfaction alone explains only 16% of the variance on customer retention, well within the
bounds reported as typical by Szymanski and Henard´s (2001) meta-analysis of satisfaction studies. They
also found that switching costs have an even stronger effect on customer retention, explaining 30% of the

165
ISBN: 978-972-8924-89-8 © 2009 IADIS

Table 1. Empirical Research Findings of Switching Cost Effects Across Studies

Study Antecedents / Outcome Method / Data Conclusions


Moderator*
Online Context:
Tsai and Huang, Community building Repurchase SEM / PLS Both switching barriers and overall
2007 Overall Satisfaction Intentions N= 463 customers satisfaction had an equivalent
Switching Barriers from online retail positive direct effect on repurchase
Customization store in Taiwan. intentions. Community building had
a dominant effect over other factors.
Tsai et al., 2006 Experience value sharing Repurchase SEM Switching barriers are a stronger
Perceived switching costs Intentions N= 526 online predictor of repurchase intentions
Community building store consumers than satisfaction and community
Perceived Service Quality building is the stronger antecedent.
Perceived trust
Switching Barriers
Satisfaction
Relational Orientation*
Balabanis et al., Satisfaction e-Loyalty Hierarchic Main effect and asymmetric
2006 Purchase Involvement Regression interaction effect – the impact of
Internet Experience N= 192 Internet switching barriers on e-store loyalty
Switching Barriers* shoppers of most is greater when e-store satisfaction
frequent site. is low.
Yang and Peterson, Perceived Value Loyalty SEM Main effect switching costs were
2004 Customer Satisfaction: N= 235 consumers insignificant.
Switching Costs* of online banking Asymmetric effect of switching
costs on loyalty is significant when
customer satisfaction is above level.
Chen and Hitt, 2002 Web site quality Switching Logistic Switching behaviour is negatively
Product breadth Behaviour Regression correlated with high volume of web
Cost N= 2,257 online site usage, quality and breadth of
Personalization consumers offerings.
Web site ease of use brokerage Industry
Minimum deposit
Offline context:
Shin and Kim, 2008 Price increase Switching SEM Moderating effects of switching
Service quality Intention N= 520 barriers between customer
Switching cost Customers US satisfaction and switching
Customer lock-in Mobile Phone intentions.
Satisfaction Company
Switching Barriers*
Lam et al., 2004 Customer value Loyalty SEM Interaction effect between customer
Switching costs N= 268 B2B satisfaction and switching costs on
Satisfaction* customers of a customer loyalty.
courier service
Ranaweera and Satisfaction Customer Hierarchic Moderating effect of switching
Prabhu, 2004 Trust retention Regression barriers between satisfaction and
Switching Barriers N= 432 customers customer retention.
US telephone firm
Burnham et al., 2003 Proced. Switching Costs Intention SEM Main effect - switching costs have a
Financial Switching Costs Stay N=287 credit car greater significant positive impact
Relation Switching Costs consumers and on customer retention than does
Satisfaction 288 long-distance satisfaction.
consumers.
Jones et al., 2000 Core-service satisfaction Repurchase MRA Main effects of switching costs
Switching barriers: Intentions N= 228 Bank were insignificant. Asymmetrical
Interpersonal relations clients interaction effect - switching
Switching costs N= 206 hairstylist barriers only have a significant
Attractiveness of clients positive impact on repurchase
alternatives intentions when satisfaction is low.

166
IADIS International Conference e-Commerce 2009

variance in consumers' intentions to stay with a current provider. This finding gives support to the
theoretical assumption that switching costs are a stronger predictor of customer retention and this main effect
is probably generated by market heterogeneity and product or service complexity.
Provider heterogeneity is defined as the extent to which the providers in a market are seen as different or
non-substitutable, increasing the uncertainty and the learning cost associated with switching providers
(Burnham et al. 2003). Finally, when products or services are perceived as more complex (e.g. bank, credit
services) or having higher purchase risk involvement (e.g. hairstylist) consumers are likely to perceive higher
risks leading to uncertainty in product performance thus increasing the perceived economic cost. Finally,
intangibility perceptions in the service industry imply higher risks and switching costs. Thus, consumers may
rely more on relationships both with brands and with people to ensure that they receive a quality product and
to simplify choices.
2.1.2 Main Effect of Switching Costs
Consistent with Burnham et al. (2003) the main effect of switching costs explaining customer retention was
again found by several researchers. Balabanis et al. (2006) surveying Internet shoppers of most frequent
website, demonstrate that switching barriers explain more the variation in repurchase behavior than does
satisfaction. Tsai et al. (2006) also found that perceived switching barriers from online stores are a stronger
predictor of customer’s repurchase intention (.59) and the effect of satisfaction (.36) was again found to be
much weaker than that of switching barriers.
In a later study Tsai and Huang (2007) found that switching barriers were positively related to repurchase
intentions from a particular e-retailer, and even had a direct effect that was equivalent to overall satisfaction.
This result partially disagrees from previous studies. Actually, they found that overall satisfaction is
positively related with switching barriers. This interrelationship between the constructs is supported by prior
research and customer behaviour theory, which posit overall customer satisfaction with retailer's core-service
or product performance increases customer dependence on a particular retailer and thus serves as an exit
barrier. However, if a customer is not satisfied with the relationship with a provider, switching costs are
generated. Furthermore, when a customer is satisfied with the relationship, the customer lacks motivation to
seek alternatives.
The lack of a main effect of switching costs observed may be due to other explanatory variables.
According to Tsai and Huang (2007) community building has a dominant effect on repurchase intentions
over other factors. Interestingly, the main effects of the switching costs were not significant on customer
retention in several previous studies (Yang and Peterson, 2004; Jones et al., 2000). Also, these findings give
support to the argument that switching costs are perceived to be lower in online environments.
It is claimed that the lack of significant main effects for switching barriers do not, however, reduce their
theoretical and practical importance because the interactions involving the barriers were significant (Baron
and Kenny, 1986). In fact, Jones et al. (2000) found significant interactions indicating that there were effects
of the switching barriers, but these effects only emerged as consumers became less satisfied with the core-
service offering. They argue that the absence of main effects only serves to reinforce their core thesis that a
main effects approach is not sufficient to capture the complex processes underlying customer retention.
2.1.3 Moderating and Interaction Effects of Switching Costs
Shin and Kim (2008) forecasting customer’s switching intention in mobile phone service, show that both
satisfaction and switching barriers have a direct effect on switching intentions and also found the moderating
effect of perceived switching barriers on the relationships between customer satisfaction and switching
intentions. These results are consistent with previous studies, in a similar service industry. Ranaweera and
Prabhu (2004) examining the influence of satisfaction, trust and switching barriers on customer retention,
from a UK telephone company found that switching barriers have both a significant positive effect on
customer retention as well as a moderating effect on the relationship between satisfaction and retention.
Lam et al. (2004) in a B2B service context (corporate customers of courier service) examine the
relationships and different strengths of satisfaction, value, switching costs and customer loyalty and find a
positive interaction effect between customer satisfaction and switching costs on customer loyalty.
An interaction effect (also know as an interactive effect) is similar to the moderator effect, and is the
effect in which a third independent variable (the moderator variable) causes the relationship between a

167
ISBN: 978-972-8924-89-8 © 2009 IADIS

dependent/independent variable pair to change, depending on the value of the moderator variable (Hair et al.
2006:172).
In an online setting, Yang and Peterson (2004) on the basis of the aggregate sample found switching costs
do not impose a significant direct or moderating effect on the association of customer loyalty with customer
satisfaction and perceived value. Occasionally, a lower explanatory power of a variable may occur because of
the large variation across individual observations when examining the aggregate sample (Pindyck and
Rubinfeld, 1991). In fact, when examining sub-group analysis, Yang and Peterson’s study indicates an
asymmetric interaction effect of switching costs. They observe that the moderating effect of switching costs
only exists when customer satisfaction or perceived value level is above average. This finding is partially
conflicting with theory, which posits that consumers only start to face switching costs when satisfaction with
the provider starts to decrease.
Regarding the interaction effect of switching costs, Balabanis et al. (2006) found the influence of
perceived switching barriers on e-store loyalty is greater when e-store satisfaction is low. Contrarily to Yang
and Peterson (2004) this finding is consistent with the interaction effects and the lack of main effects in
Jones’s (2000) study, who concludes that only when satisfaction falls below a certain level do consumers
begin to consider or be affected by the existence of switching barriers.
This asymmetrical interaction effect under satisfaction level variation might be influenced by the extent to
which switching costs are perceived in different service settings. Giving consistency to this finding, Jones et
al (2002) conclude that the industry differences emerged across the switching costs dimensions. Specifically,
the mean level of “pre-switching” search costs, evaluation costs, setup costs and perceived uncertainty were
higher for hairstylists than banks, presumably due to their greater heterogeneity and intangibility. There is
empirical evidence that the strength of switching costs on customer retention varies across industry (Burnham
et al. 2003; Chen and Hitt, 2003) and is related to provider heterogeneity and intangibility.
Moreover, the asymmetrical interaction effects found in Balabani’s study suggest a potential sample bias
because more frequent customers might have higher perceived switching costs and this strength is enhanced
online. Also, this may uncover a measurement error of satisfaction (e.g. use only one item) affecting the
predictive power of the variable and model identification (Hair et al. 2006).

3. CONCLUSION
We found conflicting results across empirical studies concerning the main effects as well as asymmetrical,
moderating and interaction effects of switching costs between satisfaction and the loyalty relationship.
The prevailing lack of main effects of switching costs on customer retention suggests that both satisfaction
and switching costs have equal importance on determining customer retention (Tsai and Huang, 2007) and
also reflects the strength of the interaction effect when satisfaction is above level (Yang and Peterson, 2004)
or below level (Balabanis et al. 2006; Jones et al. 2000).
These conflicting findings across studies deserve further investigation. The asymmetrical interaction
effect subordinate to different satisfaction level variation on customer retention suggests that switching costs
should be investigated under different satisfaction levels.
While the studies analyzed provide strong support for the interaction effects of satisfaction and switching
barriers on customer retention, they probably produce some biased results: Jones et al. (2000) analyze
switching barriers and retention in a long-term contractual relationship with telephone service providers (the
telephone industry has historically been closed to new entrants, making the industry a near monopoly) and
besides, more frequent customers might have higher perceived switching costs (Balabanis et al., 2006).
Apparently, the conflicting results concerning the effects of switching costs seem to be contingent to market
and product heterogeneity or individual idiosyncrasies. In the service context there are higher switching costs
(e.g. bank, telephone, credit car, insurance) due to service providers’ heterogeneity and customization.
Moreover, the power asymmetries of switching costs, under satisfaction level variation on customer
retention, apparently may uncover industry differences within an online setting (e.g.e-tail and online bank)
and between an online versus offline bank service (Balabanis et al., 2006; Yang and Peterson, 2004; Jones et
al., 2000).
Further empirical validation of these effects in multiple settings would help shed further light on these
and related phenomena of vital importance to different firms and marketplaces. It might be relevant to

168
IADIS International Conference e-Commerce 2009

investigate the effects of switching costs within a more competitive environment, such as the online retail
sector, where the product’s standard, customer lower purchase involvement and almost zero search costs,
decrease switching barriers. Future research should take this in consideration in order to avoid potential
biased effects. Also, there is evidence that switching costs vary across industries: some researches found
large firm-level variation in switching behaviour (Chen and Hitt, 2003). However, in an online context they
are not deeply explored, especially in an online environment where switching costs are claimed to be lower
(Balabanis et al., 2006).
Furthermore, the mixed findings concerning the conflicting role of switching costs across studies may be
due to a different measurement criterion. We claim that a more balanced set of measures is needed, allowing
to reflect the multidimensionality of the construct which potentially increases its explanatory power. As
switching costs have instrumental value to predict customer loyalty it is of paramount relevance to analyze
how switching costs are measured and assess the effect sizes across studies. Conducting a Meta-Analysis of
the reported findings is particularly desirable to identify the best measures for the switching costs construct
and must be encouraged in future research.
Finally, the present research can be extended in several ways. Other potential interaction effects between
switching costs and relevant antecedents of satisfaction should be investigated, such as customer value and
trust or community building, which potentially increases customer retention, specially towards an online
retailer (Yang and Peterson, 2004; Tsai et al., 2006; Tsai and Huang, 2007).
From a managerial standpoint, the interaction effects between switching costs and satisfaction on
customer retention indicates that building both customer satisfaction and switching costs is a superior
strategy rather to a focus on satisfaction alone to enhance customer retention and loyalty. Moreover, it is
important to examine the implications of asymmetric interactions on investment decisions about switching
costs or satisfaction.
A strategy for firms to prevent customers switching is to create positive switching barriers that provide
intrinsic benefits and create value for the customer (e.g. customer service, product offers, technology
incentives). Actually, the strategic increase of artificial switching cost may boost unsatisfied customers and
mask true loyalty. As customer retention is critical for a firm’s profitability in a competitive online market,
managers should give top priority to develop strategies that both increase customer satisfaction and
simultaneously switching costs to maintain customers in a long-term relationship. There is empirical
evidence that switching barriers increase customer retention when satisfaction is low (Jones et al., 2000;
Balabanis et al., 2006). However managers should be careful when creating switching barriers in lieu of
satisfaction; this seems destined to failure in the long run particularly when (1) dissatisfaction is ongoing
rather than temporary, and (2) the nature of the switching barriers are such that customers feel entrapped.
Furthermore, as most of e-retailers are both “brick and click-and-mortar”, a clearer comparison between
offline and online switching costs effects will help managers to strategically decide how to retain customers
considering different retail formats.

ACKNOWLEDGEMENT
The authors thank the three Marketing Science Institute anonymous referees for helpful comments and
suggestions provided which greatly improved the focus and clarity of this research. Ana Torres gratefully
acknowledges the Ph.D grant from the Portuguese Foundation of Science and Technology.

REFERENCES
Book
Besanko, David and Ronald Braeutigam, 2005. Microeconomics. John Wiley and Sons, Inc. Second Edition.
East, Robert et al., 2008. Consumer Behaviour, Applications in Marketing. Kingston University, HEC Scholl of
Management, University of South Australia.
Hair, Joseph F. et al., 2006. Multivariate Data Analysis, Prentice Hall, 6/e, New Jersey, USA.
Pindyck, Robert S. and Daniel L. Rubinfeld, 1991. Econometric Models and Economic Forecasts. McGraw-Hill
International Editions, Economic Series, 4th Edition, Singapore.

169
ISBN: 978-972-8924-89-8 © 2009 IADIS

Journal
Anderson, Rolph E. and Srinivasan, Srini S., 2003. E-satisfaction and E-loyalty: A Contingency Framework. Psychology
and Marketing, Vol. 20, Nº 2, pp. 99–121.
Balabanis, George et al, 2006. Bases of e-Store Loyalty: Perceived Switching Barriers and Satisfaction. Journal of
Business Research, Vol. 59, (February), pp. 214-224
Baron R. and Kenny, D. A., 1986. The Moderator-Mediator Variable Distinction in Social Psychological Research:
Conceptual, Strategic, and Statistical Considerations. Journal of Personality and Social Psychology, Vol. 51, Nº 6,
pp. 1173-1182.
Burnham, A. et al, 2003. Consumer Switching Costs: A Typology, Antecedents and Consequences. Journal of the
Academy of Marketing Science, Vol. 31, Nº 2, pp. 109–126.
Chen, P., and Hitt. L., 2002. Measuring Switching Costs and the Determinants of Customer Retention in Internet-Enabled
Businesses: A Study of the Online Brokerage Industry. Information Systems Research, Vol. 13, Nº 3, pp. 255–275.
Chiou, J. S. 2004. The Antecedents of Consumers’ Loyalty toward Internet Service Providers. Information &
Management, Vol. 41, pp. 685–695.
Devaraj S. et al, 2002. Antecedents of B2C Channel Satisfaction and Preference: Validating e-Commerce Metrics.
Information Systems Research, Vol. 13, Nº 3, pp. 316-333.
Dick, Alan S. and Basu, K., 1994. Customer Loyalty: Toward an Integrated Conceptual Framework. Journal of the
Academy of Marketing Science, Vol. 22, (Winter), pp. 99-113.
Fornell, C. et al., 1996. The American Customer Satisfaction Index: Nature, Purpose, and Findings. Journal of
Marketing, Vol. 60, pp. 7–18
Jones, M. A. et al, 2000. Switching Barriers and Repurchase Intentions in Services. Journal of Retailing, Vol.76, Nº 2,
pp. 259–274.
Jones, M. A. et al, 2002. Why Customers Stay: Measuring the Underlying Dimensions of Services Switching Costs and
Managing their Differential Strategic Outcomes. Journal of Business Research, Vol. 55, pp. 441-450.
Klemperer, P., 1987. Markets with Consumer Switching Costs. Quarterly Journal of Economics, Vol.102, Nº 2, pp. 375-
394.
Lam, S. Y. et al., 2004. Customer Value, Satisfaction, Loyalty, and Switching Costs: An Illustration from a Business-to-
Business Service Context. Journal of the Academy of Marketing Science, Vol. 32, Nº 3, pp. 293–311.
Mittal, Vikas and Kamakura, W. A., 2001. Satisfaction, Repurchase Intent, and Repurchase Behavior: Investigating the
Moderating Effect of Customer Characteristics. Journal of Marketing Research, Vol. 39, (February), pp. 131–42.
Oliver, Richard L., 1999. Whence Consumer Loyalty? Journal of Marketing, Vol. 63, pp. 33–44.
Ranaweera, C. and Prabhu, J., 2004. The Influence of Satisfaction, Trust and Switching Barriers on Customer Retention
in a Continuous Purchasing Setting. International Journal of Service Industry Management, Vol. 14, Nº 4, pp. 374-
395.
Reichheld, Frederick F. and Schefter, P., 2000. E-loyalty: Your Secret Weapon on the Web. Harvard Business Review,
July–August, pp. 105–113.
Shankar, Venkatesh et al., 2003. Customer Satisfaction and Loyalty in Online and Offline Environments. International
Journal of Research in Marketing, Vol. 20, pp. 153–175.
Shin, D-H and Kim, W-Y., 2008. Forecasting Customer Switching Intention in Mobile Service: An Exploratory Study of
Predictive Factors in Mobile Number Portability. Technological Forecasting & Social Change, Vol.75, Nº 6, pp. 854-
874.
Srinivasan, S., R. et al., 2002. Customer Loyalty in e-Commerce: An Exploration of its Antecedents and Consequences.
Journal of Retailing, Vol.78, pp. 41–50.
Szymanski, D. M. and Henard, D. H, 2001. Customer Satisfaction: A Meta-Analysis of the Empirical Evidence. Journal
of the Academy of Marketing Science, Vol. 29, Nº 1, pp. 16-35.
Tsai, Hsien-Tung and Huang, Heng-Chiang, 2007. Determinants of Repurchase Intentions: An Integrative Model of
Quadruple Retention Drivers. Information and Management, Vol. 44, pp. 231-239.
Tsai, Hsien-Tung, et al., 2006. Why On-line Customers Remain with a Particular E-Retailer: An Integrative Model and
Empirical Evidence. Psychology and Marketing, Vol. 23, Nº 5, pp. 447-464.
Yang, Z. and Peterson, R. T., 2004. Customer Perceived Value, Satisfaction, and Loyalty: The Role of Switching Costs.
Psychology and Marketing, Vol. 21, Nº 10, pp. 799-822.
Zeithaml, V. A. et al., 2002. Service Quality Delivery Through Web Sites: A Critical Review of Extant Knowledge.
Journal of the Academy of Marketing Science. Vol. 30, Nº 4, pp. 362–375.

170
IADIS International Conference e-Commerce 2009

RECOGNITION OF EMOTIONS IN
E-COMMERCE-SETTINGS

Prof. Dr. Susanne Robra-Bissantz


Technische Universität Carolo-Wilhelmina zu Braunschweig, Institut für Wirtschaftsinformatik, Abteilung
Informationsmanagement

ABSTRACT
If the recognition of emotions in e-Commerce-Settings was possible, webshops could respond to customers’ emotions
just like a personal seller. This would potentially increase the share of fully completed shopping processes. The following
contribution introduces concepts, experiments and first results of recognition of customers’ emotions in e-Commerce.

KEYWORDS
E-Commerce, Emotion Recognition, Experiment, Individualisation, Biometrical Sensors

1. MOTIVATION, IDEA AND OBJECTIVE


In traditional shopping processes the personal seller responds intuitively and individually to his customer.
This also refers to the customer’s emotions, such as anger or joy, when he is offered a product. Although e-
Commerce should be seen as an electronic interactive selling process, the consideration of customers’
emotions is missing. This leads to the situation that an angry customer quits his shopping basket or a helpless
customer leaves the shop after an unsuccessful search for a product. If it was possible to automatically record
customers’ emotions in e-Commerce and to react to these automatically as well, the number of fully
completed shopping processes would most probably increase (Robra-Bissantz and Zabel, 2005: 168–175).
The basic idea of this contribution is, that emotions can be recognized by the help of biometrical data of
human beings like pulse or blood volume pressure, that are intelligently processed. The measuring of
biometrical data needs sensors that may be integrated in a computer mouse or a mobile phone. Still for the
use case of e-Commerce no intelligent and reusable tool for processing emotions from biometrical data
exists. Therefore the first steps towards recognition of emotions in e-Commerce are experiments that enable
the implementation of such a tool.
The following article introduces a set of experiments that lead to an IC-System which may recognize
emotions from biometrical data. It starts with a short overview of the findings of Affective Computing, which
deals with the consideration of emotions in IC-Systems. Affective Computing is the basis of recognition of
emotions in e-Commerce. Afterwards the psychological construct of emotion will be introduced. This leads
to different possibilities of how to measure it. The usage of biometrical data in order to measure emotions is
the one possibility that can be used in e-Commerce, respectively over a distance. Other possibilities to
measure emotions are applicable in our experiments in order to validate emotions. Then Neural Networks and
Fuzzy Systems are introduced as means of an intelligent processing of biometrical data to emotions.
Different possibilities to validate emotions in experiments and different ways to process biometrical data
lead to different experimental settings. The following execution of experiments shows their advantages and
disadvantages as well as first results concerning the performance of machine aided emotion recognition.

2. EFFECTIVE COMPUTING
Human beings react to computers very emotionally and also expect them to be emotional as well (Reeves and
Nass, 1996: 253). Today’s computers however are not able to deal with emotions. They only use single

171
ISBN: 978-972-8924-89-8 © 2009 IADIS

aspects of the possibilities of human thinking. The so called trilogy of mind comprises of cognition,
motivation and emotion (Buck, 1988: 3). Only parts of cognition are implemented in computers. Motivation
and emotion are hardly considered, although it is obvious, that human thinking strongly depends on emotions
as well (Picard, 2000: 11; Goleman, 1998: 75).
Approaches that try to solve this problem are summed up by the term „Affective Computing“ (Picard,
2000). It deals with the recognition of emotions as well as with the notion of enabling computers for
emotional reactions. The overall objective of Affective Computing is the integration of emotions into the
information processing of computers, which is supposed to lead to better computerized decisions (Picard et
al., 2001: 1175- 1191). For this purpose the computer reproduces internal, affective processes of human
beings. Like human attention it senses emotional and cognitive signals (signal input). Via decoding and
processing an impression and reactions emerge. In this process cognitive and affective dispositions (like
knowledge, experiences or attitudes) play an important role. Reactions are coded into a signal output that
corresponds to human behavior.
With computers these processes do not work automatically, but they have to be implemented step by step:
• Signal Input (Emotion Measurement): the problem in measuring emotions is that input channels of a
computer are normally restricted to keyboard and mouse. Human beings are able to sense more information
than just the content of a message, e. g. from the inflection, the gestures or the facial expression of the sender.
Affective Computing has therefore developed different additional input channels, such as Affective
Tangibles, that may perceive physical reactions. Furthermore biometrical data are measured, speech,
inflection or facial expressions are analyzed (Ark et al., 1999: 818–823).
• Decoding (Emotion Recognition): In order to decode input data from different channels, Affective
Computing mainly uses stochastic methods that lead to the most likely emotion (Burleson and Picard, 2004).
• Processing and Signal Output: A computer uses models about human behavior in order to work out
an emotional reaction. These models are kept in a database, just like the human inherently memorizes his
dispositions. As today’s main areas of Affective Computing are learning or social issues, like drug
counseling, the main theoretical models used up to now are out of hese areas, like learning models (D'Mello
et al., 2005: 7-13). For emotional reactions Affective Computing uses avatars or robots that use different
facial expressions or gestures in order to express emotions.
In part Emotion Recognition in e-Commerce may use the findings of Affective Computing. But there are
a couple of differences: First of all, it is no objective in e-Commerce that computers are really able to be
emotional. Therefore research is primarily restricted to the recognition of emotions. Secondly, in general the
requirements in e-Commerce are lower in terms of correctness of the interpretation of sensed emotions. At
first it would be enough to roughly detect striking emotions. Therefore the innovative software solution of
soft computing will be used instead of stochastic methods. Thirdly, in e-Commerce it must be possible to
measure emotional signals over a distance and electronic networks. Therefore biometrical data and
corresponding sensors that may be integrated in a mouse or a mobile phone are applied for input purposes.

3. EMOTIONS

3.1 Psychological Construct


Emotion is a manifold phenomenon (Desmet, 2003: 112), with no final and successful explanation model yet.
In times of behaviorism it was even doubted that emotion existed as an independent concept (Holzer, 1987).
The complexity of emotion results from the „indescribably complex” interlacing of simple basic emotions
(Minsky, 1986: 328).
From today’s standpoint of psychology emotion possesses four dimensions (Kroeber-Riel and Weinberg,
2003: 105). These are arousal, valence, quality and consciousness. The first two dimensions describe
intensity and assessment (positive or negative) of a feeling. The third dimension, quality, expresses personal
perception and evaluation of an emotion. It is highly subjective and differs strongly between different human
beings. Quality makes it very hard to measure emotions in general. The fourth dimension, consciousness,
leads to emotions that are only figuratively but not verbally conscious (Kroeber-Riel and Weinberg, 2003:
106). This dimension complicates questioning as a measurement method of emotions (Plutchik, 1991: 22).

172
IADIS International Conference e-Commerce 2009

Human beings comprise of at least six innate primary emotions, independently from their culture or
language: joy, surprise, fear, sadness, anger and disgust (Plutchik, 1991:61; Izard, 1992: 561–565; Camras et
al., 1997: 301; Ortony and Turner, 1990: 315–323). During adolescence cognitive emotion processing arises,
that increasingly covers primary emotions.
Primary emotions may be arranged like a chromatic circle (Plutchik, 1991: 109). Similar emotions are
placed close to each other and their mixture leads to so called secondary emotions. Like this the whole
spectrum of emotions can be depicted (Plutchik, 1991: 115 et seq.).

3.2 Emotion Recognition – Measuring Methods


There are different approaches of emotion measurement with different advantages and disadvantages.
Basically they can be classified into methods of self report and methods of direct observation of spontaneous
bodily reactions. Self report always runs the risk of cognitive tampering, e. g. for reasons of social
desirability (Kroeber-Riel and Weinberg, 2003: 104). Observations feature the disadvantage that the
connections between bodily reaction and emotion have to be learnt at first (Darwin, 1964; Grings and
Dawson, 1978: 3).
3.2.1 Self Report
Self report works for example with a questionnaire that raises emotions after their cognition, with verbal
annotations during emotion perception as well as with slide controls or turning knobs, which can be used to
sort of tune in emotion while it is sensed. Self report during perception has the advantage that emotions are
expressed more spontaneously during their perception than afterwards. But a Self report with an additional
gadget features the disadvantage that it disturbs the proband’s concentration. More often than not gadgets are
also much too complicated to be handled while an emotion arises. A useful and only little disturbing gadget
is a turning knob that only characterizes emotions by their valence and arousal (Cowie et al., 2000). These
dimensions are tuned in by turning the knob more or less (arousal) to the right or left (valence: positive or
negative).
3.2.2 Spontaneous Bodily Reaction
Bodily reactions that enable the recognition of emotions are changes of facial expressions or of biometrical
features such as pulse or skin resistance.
Table 1. FACS Coding

emotion FACS action units


surprise eyebrows lifted, eyes wide open, jaw dropped
fear eyebrows lifted and knitted, eyes wide open, but lower lid drawn upwards, mouth open
disgust nose wrinkled up, eyebrows drawn downwards, upper lip drawn upwards, lower lip
against upper lip or downwards and forward, cheeks drawn upwards
anger eyebrows drawn downwards and knitted, eyes knitted and fixed, mouth closed and lips
pressed together
joy corners of the mouth drawn up- and backwards, mouth closed or open or even visible
teeth, cheeks drawn upwards
sadness eyebrows knitted upwards, lower lid drawn upwards, glaze downwards, corners of the
mouth drawn downwards

An analysis of emotions from facial expressions is complicated, as facial muscles are not only used for
the expression of emotions but also for conscious reactions (Bänninger-Huber, 1985: 36 et seq.). FACS
(Facial Affect Scoring Technique) is a technique that supports this analysis and is itself supported by fitting
software (Ekman and Friesen, 1984). FACS divides up facial expressions in smallest atomic activities of
facial muscles (action units). These action units can be combined to patterns for different emotions
(Bänninger-Huber, 1985: 49; Kroeber-Riel and Weinberg, 2003: 113). With FACS a mimic is firstly
described by a combination of action units. Only afterwards it is interpreted as an emotion with FACSAID

173
ISBN: 978-972-8924-89-8 © 2009 IADIS

(Ekman and Rosenberg, 1997), a database that assigns emotions to patterns of action units. Table 1 shows,
how primary emotions show up as a mimic (Ekman, 1999: 13).
Table 2. Recognition of Emotion from Biometrical Data

biometrical feature / emotion


measurement
pulse: EKG little increase: joy, disgust, surprise, strong increase: anger, fear,
decrease: sadness
blood pressure: mmHg increase: fear, anger, sadness
blood volume pressure change: surprise, fear
skin conductance: mircromho decrease: disgust, increase: fear, surprise, arousal (joy: no change)
muscle potential: EMG (head) short and strong increase: surprise, increase: joy, anger, fear, arousal
temperature: °C at the finger increase: anger, surprise, quick changes: arousal, (joy: no change)
breathing: frequency and depth little increase: joy, anger, surprise, sadness, fear

For the recognition of emotions from biometrical data a mature technique, such as FACS, does not exist.
But at least devices are available, that use biometrical data for a so called Biofeedback, the feedback of
physical functions (e. g. SOFTmed Physio-System, Insight Instruments (Insight Instruments, n.d.)). Suitable
for the measurement of emotions are pulse, blood pressure, blood volume pressure, skin resistance (skin
conductance), body temperature, breathing and muscle potential. The latter two features are controlled by the
central nervous system and are therefore more often consciously formed than the others (Grings and Dawson,
1978: 12). Table 2 shows biometrical features, their measurement as well as first indicators for emotions,
drawn from literature (Grings and Dawson, 1978: 12).
Measuring biometrical data is an approach that seems to be suitable for e-Commerce. All necessary data
can be identified, automatically, noninvasively and only almost nonrestrictively. Sensors for most biometrical
data may be integrated into a mouse (Grings and Dawson, 1978: 12; Holzer, 1987; Baltissen, 1983; Muthny,
1984: 49; Carlson and Hatfield, 1991: 240; Schandry, 1989; McNaughton, 1989). The analysis of facial
expressions as well as different forms of self reports is suitable for an experimental setting, where an IC-
system shall be designed, that recognizes emotions from biometrical data.

3.3 Emotion Recognition – Processing Methods


Intuitively, a Neural Network appears suitable if emotions are to be calculated, as Neural Networks are
designed to imitate human information processing. Additionally another Softcomputing approach is tested:
Fuzzy Logic. Both approaches will use biometrical data as input vector in an IC-System for emotion
recognition. From biometrical data the IC-System will calculate the emotion of the human being.
Both Softcomputing methods cannot be programmed. They learn the relationship between input and
output through learning with existing data vectors. Therefore experiments are needed, that produce an input
vector consisting of biometrical data as well as the corresponding output vector consisting of emotions. These
emotions will be measured by the means of self report or analysis of facial expressions. Neural Networks and
Fuzzy Systems will be trained until they are able to calculate emotions from input vectors with unknown
output vectors.
3.3.1 Neural Networks
A Neural Network (NN) is a computational model based on biological neural networks. It consists of an
interconnected group of artificial neurons (simple processing units) and processes information from an input
layer through hidden layers to an output layer. Configuration and functions of a neural network have to be
adapted to the task by the trainer. For emotion recognition the engineering platform „Stuttgart Neural
Network Simulator” is used (Zell, 1996). This tool requires a couple of decisions.
• Network topology: The topology of the neural network is responsible for the propagation of signals
between neuron layers and within. The well known Feedforward networks only forward signals upstream
from layer to layer. This topology does not stipulate timely dependencies of the input vectors. As emotions
do not emerge independently from former emotions, the so called Elman topology is used. Elman networks

174
IADIS International Conference e-Commerce 2009

implement additional context neurons into Feedforward networks that introduce the output of the previous
cycle as additional input for the next cycle (Elman, 1990: 179-211).
• Input vector: It has to be avoided, that the neural network can approximate training data perfectly
but is not able to work with new input data (over fit). Therefore data from experiments is divided up into
training data and validation data. Additionally Neural Networks with many input data are often less
generizable. Therefore only those biometrical data are used, that show a significant explanatory contribution
(Rojas, 1996: 144).
• Output vector: In e-Commerce settings it is possible to reduce the output vector to lesser emotions
(e. g. valence / arousal), if the neural network is not able to approximate all primary emotions exactly
enough.
• Number of hidden layers and their neurons: Neurons in hidden layers use an activation function in
order to transform the input vector into the output vector. The number of hidden layers and their neurons has
to be simulated (Sarle, 2002: 3). As activation function the neurons use Tangens Hyperbolicus, which
converges faster than a Sigmoid function (Bishop, 1995: 127).
• Learning paradigm: Neural networks learn by adapting the weights of the connections between
neurons of different layers. During learning the well known backpropagation algorithm shows a couple of
problems (Zell, 1996). Only a very little learning rate may avoid, that this algorithm is stuck in local optima
of the error area. But a higher learning rate may oversee global optima. Therefore a so called momentum is
introduced. It increases the learning rate if the algorithm works on a plateau of errors and decreases it, if the
error changes rapidly. The resulting learning method uses a Backpropagation-Momentum approach with
simulations along different learning rates and momentums.
3.3.2 Fuzzy-System
Fuzzy logic approaches may be used for basically all mathematical functions. Here a Fuzzy Expert System
for Emotion Recognition is implemented with XFuzzy, an Open Source Fuzzy Shell (Fuzzy Logic Design
Tool XFuzzy 3.0, n.d.). In a Fuzzy Expert System a membership function, with fuzzy sets that range between
0 and 1 transforms sharp input and output variables into rather approximate linguistic variables. A rule base
consists of rules that transform these input variables into the output variables. Membership functions with
different parameters as well as the rule base have to be built by the trainer. First membership functions use
well known forms. First rules are derived from former findings about the correlation between biometric data
and emotions (see table 1). All parameters of the membership functions and rules are improved with the input
and output vectors from the experiments in different simulations.
• In- and output variables: In- and output variables have to be reduced significantly, compared to the
Neural Network, as the whole rule base has to be built manually. In e-Commerce settings it might e. g. be
reasonable, to choose only the one emotion anger. For input variables those four are chosen, that correlate
strongest with the output variable. They are at first coded as linguistic variables with five values and with
triangular membership functions (cf. Table 3).
Table 3. Fuzzy Sets – Limits (u. lim. : upper limit, l. lim. : lower limit)

fuzzy set very high high medium low very low


variable u. lim. l. lim. u. lim. l. lim. u. lim. l. lim. u. lim. l. lim. u. lim. l. lim.
EMG 1 155.26 6.18 6.18 4.58 4.58 3.74 3.74 3.14 3.14 2.11
pulse amplitude 158.50 70.17 70.17 35.18 35.18 19.68 19.68 10.32 10.32 0.00
skin conductancy 5.52 2.53 2.53 2.31 2.31 2.06 2.06 1.11 1.11 0.81
temperature 32.59 31.95 31.95 31.42 31.42 30.25 30.25 27.50 27.50 25.01
anger 2.0 1.6 1.6 1.2 1.2 0.8 0.8 0.4 0.4 0.0
0 0 0 0 0 0 0 0 0 0

• Improvement in XFuzzy: In first simulations different gaps in the rule base are identified and filled
with additional rules. A further improvement works with simulations of form and position of membership
fuzzy sets and with operators within as well as between the rules.
Learning at work: With an own developed Tool (FuzzyEmotion) the trainer may change single input-
output-correlations via drag&drop-operations also after the training. He may, for example, assign another

175
ISBN: 978-972-8924-89-8 © 2009 IADIS

value for the variable anger to specific input values, according to new experiments. This new output value
initiates another automatic improvement of the whole Fuzzy System.

4. EXPERIMENTS
A couple of experiments with similar settings reveal biometric data as well as statements about really sensed
emotions that are as objective as possible. They serve as input and output vectors for the training of the
Neural Network and the Fuzzy System. For these experiments a measurement device for biometrical features
with different sensors (Biofeedback-System, see chapter 2) and a setting for self reports or the recognition of
facial expressions is needed. Additionally, the experiment works with different stimuli that provoke the
emotions of the probands (see Figure 1.).
Emotion
Measurement
Emotion
Biometrics Recognition
Stimulus Emotion Training with Input
(Emotion Measure-
Emotion ment) and Output
Validation (Emotion Validation)
Facial Recognition
Self Report

Figure 1. Experiments for Emotion Recognition


Stimuli are meant to provoke emotions of probands. For experiments with primary emotions the best
stimuli, according to psychological studies, are short samples of well known movies or videos. They lead to
stronger emotions than pictures and also than commercials. In order to provoke the emotion anger, a
manipulated computer game (Tetris) can be used (Holzer, 1987; Niemann, 2004). A break down of the game
provokes the strongest emotions. The stimulus “webshop” takes into account that the planned application
area of emotion recognition is meant to be e-Commerce. During experiments it either breaks down, like the
Tetris play or the proband is faced with a complex up to impossible shopping task. In order to spot position
and behaviour of the proband in the webshop, an IC-System was developed (E3Blogger). It registers all his
keyboard and mouse movements. For self reports the experimental setting either uses a turning knob or a
questioning of the proband after the experiment. The only problem is, that then he is often unable to
remember his emotions in single situations, e. g. during the shopping process. Therefore a split screen is
used, where the proband can see a video of his face during the experiment and at the same time a video of the
stimuli, e. g. of his website usage. The video of the proband’s face can also be used for the recognition of his
facial expressions.
Table 4 shows the experimental settings of four different experiments for emotion recognition.
Table 4. Experiments - Overview

experiment stimulus validation processing output


E1: „ambitioned“ film, Tetris facial expressions, Neural Network primary emotions
questionaire
E2: „anger“ Tetris E3Blogger Fuzzy System anger
E3: „e-Commerce“ Webshop E3Blogger, questioning, Fuzzy System anger / joy
split screen
E4: „optimized“ film samples turning knob Neural Network valence, arousal

4.1 Specialities and Results


The group of experiments shows first results but also the learning process of the conductor. Planned settings
sometimes had to be changed because of completely unexpected problems.
4.1.1 Experiment E1: „ambitioned“
E1uses the original experimental setting, derived from literature on Affective Computing and from
psychological experiments. The probands (32 Persons of different age and gender) were connected to
biometrical sensors and shown different film samples that seemed suitable to provoke different primary

176
IADIS International Conference e-Commerce 2009

emotions (e.g. Lord of the Rings). These were validated during the experiment with a little questionnaire:
„please tick the emotion, felt during the film“. Additionally the facial expression of the proband was filmed
during the experiment and later analyzed with the FACS System. More than 14.000 data sets resulted, that
assign biometrical input data to „objective” emotion. With these data sets a Neural Network was trained as
this experiment comprises too many variables for a fuzzy system.
A first result was that especially male probands hardly show any changes of facial expressions. The
reason is probably that the camera, positioned well seen, worked as a social control that prevented obvious
emotions. Therefore only the intended emotions of the film samples and the results of the questioning are
available as output variables for the training of the Neural Network.
Simulations lead to the best results with Neural Networks with two hidden layers, with the Elman
algorithm and small learning rates. Here the MSE (Mean Square Error) between the output values from the
experiment and the calculated output values is in the interval [0.15, 0.53]. But still a reference value, the
MSE of a network with constant input could not be achieved. This is probably because the Elman network
literally learns values from former training cycles by heart.
Therefore different simulations with two or only one output (valence and arousal or anger) were run with
feedforward networks. Here the results are quite encouraging, as the outputs can be learnt almost faultless.
But still only in some configurations the MSE is below its reference value.
The first experiments of emotion recognition therefore proof the method to be principally suitable. But
the approach of measuring eight primary emotions seems to be too ambitious. Also the stimulus film samples
and the validation only with a questioning of emotions does not lead to the hoped for success. The emotions
that were felt by the probands could not be measured exactly enough. Additionally biometrical data were
measured during the whole film sample whereas the emotions most probably only arise in short sequences.
Valid data are therefore probably falsified by the load of inaccurate datasets.
4.1.2 Experiment E2: „anger“
With the experiences from E1, the second experiment only tries to recognize the emotion anger. Additionally
the stimulus was changed from film samples to the computer game Tetris that was manipulated and crashed
by the conductor. 28 persons of different age and gender were asked to play Tetris while being connected to
the biometric sensors. Their keystrokes were recorded as well as their face and the Tetris screen. This setting
is suitable for a training with a Fuzzy System. Simulations show that this Softcomputing method even leads
to better results for this experiment. The rules of the Fuzzy System are shown in Table 5. They result from
the assumptions from chapter 3.2 and from a regression of the input and output values from the experiment.
In different trainings data are aggregated or processed individually, rules are derived from a linear or
polynomial regression and “and-“ or “or-“ operators are used for the conjunction of rules.
Table 5. Rules of Fuzzy-Systems

skin conductance EMG temperature pulse amplitude anger


very high very high very low, very high very high very high
very high, medium, medium, low, low very high, high, high
low very low medium
high, medium, low high, medium low high, medium, medium
very low
medium, low high high high low
very low very high medium high very low

In discussions after the experiment single probands had the possibility to improve the fuzzy system by
adapting the calculated output value to the really felt emotions with the System FuzzyEmotion.
As result the simulations with learning data reach a MSE of 0.02 to 0.05. The MSE with validation data
lies between 0.07 and 0.10. The total variance of the variable anger (interval [0, 2]) is 0.15. A learning MSE
of 0.035 therefore means a not declared variance of 23.3%. With validation data and its MSE of 0.07 the
mean deviation from the real output value is 0.26. Best results could be reached with a system that is based
on a linear regression between in- and output and, quite significantly, when the rule base is adapted by
probands. The results of this experiment seem better as the ones from E1. Reasons are potentially the
reduction of the output to one single variable “anger”, a better stimulus and the use of a Fuzzy System with a
manual aggregation of the results to a rule base.

177
ISBN: 978-972-8924-89-8 © 2009 IADIS

4.1.3 Experiment E3: „e-Commerce“


In a next experiment the emotion anger is provoked with a complex task in a webshop. In order to make the
probands feel unobserved, cameras are hidden and the conductor leaves the room. After the experiment the
probands are questioned about their emotion with the split-screen setting. For this questioning the conductor
picks situations, where the biometric data and their processing with the Fuzzy System of E2 show the
emotion anger (Kammerer, 2005). Experiments with 20 probands of different gender and age lead to 97 of
these situations. 54 of these situations really resulted from anger or, more generally, negative emotions.
Another 31 situations however resulted from positive emotions. Thus probands did really feel an emotion in
most detected situations. Contrary the probands claimed, that they in sum only remembered another two
situations, where they felt anger that was not noticed by the biometrical data. In sum the results of E3 show
that the Fuzzy System does register the arousal of probands. The valence of an emotion (positive or negative)
however cannot be interpreted exactly enough.
4.1.4 Experiment E4: „optimized“
E4 uses the experiences from all other experiments. It uses a smaller number of output variables, better
stimuli and a new way of validation of emotions. Still it tries to come to recognition of quasi all emotions by
using valence and arousal. Stimuli are much shorter sequences (20 to 30 seconds) of daily news, quiz- and
game shows or short films. The proband expresses his emotions during the experiment with the turning knob.
As Softcomputing system the Neural Network is used, according to the experiences from E3. Simulations
are carried out with data from 22 probands of different age and gender (more than 12.000 data sets).
Best results can be achieved with Feedforward networks with four layers and a relatively high number of
neurons in the hidden layers. While increasing the number of these neurons stepwise up to 50 the learning
mistake declines until a MSE of 0.05. As the total variance of the output is 0.5, this means a not declared
variance of 10%. The validation error reaches its minimum with Neural Networks with 25 neurons in the
hidden layers (MSE = 0.19, not declared variance 37%).

5. CONCLUSION
The recognition of emotions in e-Commerce-Setting is an ambitious goal. Still first results from experiments
lead to the conclusion that it is definitely possible. But there is a long way to go until hardware, like an
emotion-mouse, is broadly available and until a recognition system exists, that can be easily used for every
webshop and that leads to appropriate reactions on human emotions. In closer future the recognition of
emotions can nevertheless be used for the test of websites. This leads to new findings during website
evaluation and additionally, quasi as a side effect, to new testing and training data for an improvement of the
emotion recognition system. Therefore a flexible platform was implemented, that makes it easier to carry out
experiments and also website tests. It allows the management of experiments and single tests and offers
import and export interfaces to different systems (e. g. the presentation of the stimulus, the turning knob, the
biofeedback system, the Neural Network and the Fuzzy System). All data are integrated in records with time
stamps (Hausmann, 2006).

REFERENCES
Ark, W. S. et al, 1999. The Emotion Mouse. In Proceedings of the 8th HCI International on Human-Computer
Interaction. Lawrence Erlbaum Associates, Mahwah, pp 818–823.
Baltissen, R., 1983. Psychische und somatische Reaktionen auf affektive visuelle Reize bei jungen und alten Personen.
dissertation, University of Düsseldorf.
Bänninger-Huber, E., 1985. FACS (Facial Action Coding System) als Instrument zur Erfassung therapeutischer
Veränderungen. dissertation, Zürich.
Bishop, C. M., 1995. Neural Networks for Pattern Recognition. Oxford University Press, Oxford.
Buck, R., 1988. Human Motivation and Emotion. John Wiley & Sons Inc, New York.
Burleson, W. and Picard, R. W., 2004. Affective Agents: Sustaining Motivation to Learn Through Failure and a State of
Stuck [online]. Available at: http://affect.media.mit.edu/pdfs/04.burleson-picard.pdf [Accessed 9th August 2007].

178
IADIS International Conference e-Commerce 2009

Camras, L. A. et al, 1997. Japanese and American Infants’ Responses to Arm Restraint, In Ekman, P. and Rosenberg, E.
(ed.), What the Face Reveals. Oxford University Press, New York, pp 289–301.
Carlson, J. G., Hatfield, E., 1991. Psychology of Emotion. Harcourt Brace College Publisher, Philadelphia.
Cowie, R. et al, 2000. ‘FeelTrace’, an instrument for recording perceived emotion in real time [online]. Available at:
http://www.dfki.de/~schroed/articles/cowieetal2000.pdf [Accessed 28th December 2007].
D'Mello, S. K. et al, 2005. Integrating Affect Sensors in an Intelligent Tutoring System. In Proceedings of the Affective
Interactions: The Computer in the Affective Loop Workshop at 2005 International conference on Intelligent User
Interfaces, ACM, New York, pp 7-13.
Darwin, C., 1964. Der Ausdruck der Gefühle bei Mensch und Tier. Rau, Düsseldorf.
Desmet, P., 2003. Measuring Emotions: Development and Application of an Instrument to Measure Emotional Responses
to Products. In Blythe, M. A. et al. (ed.), Funology: From Usability to Enjoyment. Springer, Dordrecht, p 111-123.
Ekman, P., 1999. Facial Expressions. In Dalgleish, T. and Power, M. (ed.): Handbook of Cognition and Emotion. Wiley,
Sussex, p 13.
Ekman, P. and Friesen, W. E., 1984. Unmasking the Face. Malor Books, Palo Alto.
Ekman, P. and Rosenberg, E. (ed.), 1997. What the Face Reveals. Oxford University Press, New York.
Elman, J. L. 1990. Finding Structure in Time. In Cognitive Science No. 14, pp 179–211. Available at:
http://homepages.inf.ed.ac.uk/keller/teaching/connectionism/CogSci90-Elman.pdf [Accessed 21st September 2007].
Fuzzy Logic Design Tools XFuzzy 3.0 [online]. Available at:
http://www.imse.cnm.es/Xfuzzy/Xfuzzy_3.0/Xfuzzy3.0_en.pdf [Accessed 1st November 2004].
Goleman, D., 1998. Emotionale Intelligenz. Dtv, München.
Grings, W. W. and Dawson, M. E., 1978. Emotions And Bodily Responses – A Psychopsychological Approach. Academic
Press, New York.
Hausmann, S., 2006. E3-Studio: Eine Experimentierumgebung zur Erkennung von Emotionen im E-Business. student
research project, University of Nürnberg.
Holzer, H., 1987. Psychophysiologische Analyse emotionaler Situationen. dissertation, University of Ulm.
Insight Instruments: SOFTmed Physio-System [online]. Available at: http://www.insight.co.at [Accessed 1st June 2007].
Izard, C. E., 1992. Basic Emotions, Relations Among Emotions and Emotion–Cognition Relations. In Psychology Review
Vol. 99, No. 3, pp 561–565.
Kammerer, S., 2005. Konzeption und Validierung von Regeln zur Erkennung von Emotionen aus dem Klickverhalten
eines Internetnutzers. student research project, University of Nürnberg.
Kroeber-Riel W. and Weinberg, P., 2003. Konsumentenverhalten. Vahlen, München.
McNaughton, N., 1989. Biology and Emotion. Camebridge University Press, Cambridge.
Minsky, M. L., 1986. The Society of Mind. Simon & Schuster, Touchstone.
Muthny A. F., 1984. Elektrodermale Aktivität und palmare Schwitzaktivität als Biosignale der Haut in der
psychophysiologischen Grundlagenforschung. dissertation, University of Freiburg, Freiburg.
Niemann, C., 2004. Konzeption und Realisierung der Komponente zum Emotionsmonitoring eines
Effizienzevaluationsplatzes für E-Business-Anwendungen (E3). dissertation, University of Nürnberg.
Ortony, A. and Turner, T. J., 1990. What’s Basic About Basic Emotions?. In Psychological Review Vol. 97, No. 3, pp
315–323.
Picard, R. W., 2000. Affective Computing. The MIT Press, Cambridge.
Picard, R. W. et al, 2001. Toward Machine Emotional Intelligence: Analysis of Affective Physiological State. In IEEE
Transactions Pattern Analysis and Machine Intelligence, Vol. 23, No. 10, pp 1175- 1191
Plutchik, R., 1991. The Emotions. University Press of America, Lanham.
Reeves, B. and Nass, C., 1996. The Media Equation. Cambridge University Press, Stanford.
Robra-Bissantz, S. and Zabel, A., 2005. Push Concepts to Control Interactions in E-Commerce. In CEC IEEE 2005:
Seventh IEEE International Conference on E-Commerce-Technology. IEEE Computer Society Press, Los Alami, pp
168–175.
Rojas, R., 1996. Neural Networks – A Systematic Introduction. Springer, Berlin.
Sarle, W. S., 2002. Neural Network FAQ.. [online]. Available at: ftp://ftp.sas.com/pub/neural/FAQ.html [Accessed 21th
September 2007].
Schandry, R., 1989. Lehrbuch der Psychophysiologie: Körperliche Indikatoren psychischen Geschehens. BeltzPVU,
München.
Zell, A., 1996. Simulation Neuronaler Netze. Oldenbourg, Bonn.

179
Short Papers
IADIS International Conference e-Commerce 2009

E-PROCUREMENT ADOPTION BY SUPPLIERS: A


RESEARCH PROPOSAL

Paulo Andrade
ISCTE – Lisbon University Institute
Av. das Forças Armadas, 1600-082 LISBOA – Portugal

Bráulio Alturas
ADETTI/ISCTE
ISCTE – Lisbon University Institute
Av. das Forças Armadas, 1600-082 LISBOA – Portugal

ABSTRACT
This paper presents a current research with the aim to identify the enablers, barriers and possible solutions to e-
procurement adoption by suppliers in Portugal. The literature relating to e-procurement implementation and operation is
reviewed, with focus on the barriers and enablers already identified in the literature. A research methodology is proposed
to study the problem, and this work will contribute to better address the issues faced by suppliers on e-procurement
implementations.

KEYWORDS
E-Procurement, Collaboration, E-Commerce, B2B, Supply Chain Management.

1. INTRODUCTION
E-procurement is the generic term applied to the use of integrated database systems and wide area
(commonly web-based) network communication systems in part or all of the purchasing process (Croom &
Brando-Jones, 2005). E-procurement allows buyers to automate transactions and focus on more strategic
activities. E-procurement solutions also contribute to a better organizational performance, allowing
reductions in cost and time when ordering from suppliers, and helping to achieve a well-integrated supply
chain. Although there are many benefits in e-procurement solutions, there also appears to be some barriers to
their successful implementation. Former research shows that many companies still prefer the traditional
methods to communicate and exchange with business partners. Companies need to understand better how to
implement e-procurement solutions on an efficient and effective manner. Any successful e-procurement
system needs suppliers that are willing and able to trade electronically and their co-operation is crucial to the
project's success. This degree of openness and transparency is new to most organizations, and it requires
relevant cultural changes and high levels of trust between the participants (Harris & Dennis, 2004).
This paper presents issues related to supply chain management, e-commerce, e-procurement and the
barriers and enablers for supplier adoption of e-procurement. Then a research methodology is proposed to
study the problem, and this work will contribute to better address the issues faced by suppliers on e-
procurement implementations. We plan to apply a quantitative approach to identify the enablers and the
barriers that influence Portuguese companies to adopt e-procurement solutions.

183
ISBN: 978-972-8924-89-8 © 2009 IADIS

2. LITERATURE REVIEW

2.1 Supply Chain Management and Collaboration


Supply chain management includes the planning and management of all activities included at the sourcing
and acquisition process. According to the Council of Supply Chain Management Professionals (CSCMP,
2008), supply chain management encompasses the planning and management of all activities involved in
sourcing and procurement, conversion, and all logistics management activities. It also includes coordination
and collaboration with channel partners, which can be suppliers, intermediaries, third party service providers,
and customers. In essence, supply chain management integrates supply and demand management within and
across companies.
E-business and e-commerce has a significant impact on level of analysis issues in management research,
specifically broadening the perspective to analysis of supply chains and networks (Cromm, 2005). The Web
and associated technologies enable collaboration and sharing of information among companies. Collaboration
may range from intra-organizational to inter-organizational and across the boundaries of the organization.
The procurement is an integral component of an organization’s supplier relationship management strategy,
and often is the first major step towards trading partner collaboration (Gilbert, 2000). Collaboration between
supply chain members also requires the exchange of sensitive information. Teo & Ranganathan (2004)
argued that the heart of B2B e-commerce was in inter-organizational collaboration and it required a
fundamental shift in the organizational mindset to collaborate and engage in effective B2B e-commerce.

2.2 E-commerce
E-commerce is the process to buy, sell or exchange products or services by the internet. Different models of
e-commerce have been presented in order to describe the nature of these transactions. Electronic
marketplaces allow collaboration and data sharing within or across industries. It´s possible to classifie the e-
marketplaces with base on their degree of openess. E-marketplaces with a high degree of openness are those
that are publicly accessible to any company. At the other end of the spectrum, e-marketplaces with a low
degree of openness are accessible only upon invitation. Based on this distinction, Hoffman, Keedy & Roberts
(2002) recognized three main types of e-marketplaces: public e-marketplaces, consortia and private
exchanges.

Figure 1. Main Types of E-marketplaces


The role of procurement and the emerging use of large information systems to conduct e-procurement
was analyzed by Hawking and colleagues (Hawking et al, 2004) and presented with the results of a survey of
38 major Australian organizations. The main results show that direct procurement is heavily dependent upon
traditional practices while indirect procurement is more likely to use "e" practices. Dedrick (2008) also found
that the use of electronic procurement is associated with buying from more suppliers for custom goods but
from fewer suppliers for commodity goods. In an efficiently functioning transparent market, few suppliers
are sufficient for commodity goods, whereas for custom goods the need for protection from opportunistic
vendor leads to the use of more suppliers.

184
IADIS International Conference e-Commerce 2009

2.3 E-procurement Adoption


Companies are approaching e-procurement adoption with different strategies. Davila and colleagues (2003)
identified two main types of companies. The first type is moving aggressively to adopt e-procurement
technologies, frequently experimenting with various solutions. The second type adopts a more conservative
strategy by selectively experimenting, typically with one technology. (Davila, Gupta & Palmer, 2003). Also
an increasing number of public institutions identified electronic purchasing as a priority to e-government.
Many implemented or are implementing e-procurement systems. The adoption of e-procurement in public
administration has a huge impact since governments spent large amounts in acquiring materials and services.
(Pereira & Alturas, 2007).
For the Portuguese government electronic procurement has gained a strategic significance, and some
evidences showed that importance. A considerable number of private exchanges and consortia have appeared
in the last years. The number of internet transactions has also increased, and the government has deployed
some initiatives for public electronic purchasing. The Portuguese government considered e-procurement
fundamental for renovation of processes in the public administration (Amaral, Teixeira & Oliveira, 2003). An
important step for e-procurement in Portugal was taken by the government with the Decree-Law n. º
104/2002 who allows electronic purchasing by public administration.

2.4 Enablers for Supplier Adoption


By understanding the main enablers that influence the supplier adoption of e-procurement, companies can
develop strategies to leverage the supplier adoption on an e-procurement implementation. The organization
who is implementing an e-procurement solution should assess the impact of the system on suppliers and their
technological promptness to implement the system at their end, and should provide the services necessary for
the system to succeed. It is also necessary to put together a supplier adoption team, train the suppliers, and
get them synchronized with the organization’s implementation (Rajkumar, 2001). Suppliers need to gain
conscience of the benefits resulting from their adoption of e-procurement. For suppliers, the adoption of e-
procurement may be an opportunity to expand their market. According to Sharifi, Kehoe & Hopkins (2006)
they will find e-procurement attractive because they could easily and cost effectively reaches new customers,
improving their sales. (Berlak & Weber, 2004).
The integration between the buyer and the seller systems allows exchanging information automatically.
Therefore, it is possible for the buyer to make an order more quickly. This will also reduce the chance of
occurring errors that are common when an order is dependent on paper. (Berlak & Weber, 2004). By linking
to a customer directly and collaborating to ensure accurate and on-time delivery provides better service and
lower overall procurement costs to the customer, and can result in much more collaborative buyer-seller
relationships. (Neef, 2001).
Carayannis & Popescu (2005) analyzed and evaluated the electronic procurement projects carried out by
European Commission. They concluded that the transparency of EU public procurement market was
improved by a systematic use of electronic tendering. The improve on the transparency allow the involved
stakeholders to know how the system is intended to work, and all potential suppliers have the same
information about procurement opportunities, award criteria, and decisions.
In considering how e-procurement will impact buyer-seller relationships Ellram & Zsidisin (2002) argue
that close buyer–supplier relationships have a strong positive impact on the adoption of e-procurement.
Therefore, while e-procurement may not deliver improved levels of trust, it has been found that e-
procurement transactions are more likely to be established first between partners in high trust relationships.
In addressing this issue, both Croom (2001) and Kumar & Qian (2006) support the view that increased use of
e-procurement and inter-organizational systems enhance opportunities tend to create more effective
customer–supplier relationships over time.

2.5 Barriers for Supplier Adoption


Cooperation with suppliers also requires them to meet the business criteria that organizations have set to
accept them in their networks. Since some of the business models associated with e-procurement
technologies clearly envision the use of suppliers with whom the buyer has not previously transacted

185
ISBN: 978-972-8924-89-8 © 2009 IADIS

business, companies need to develop mechanisms that provide the buyer with assurances that the supplier
meets or exceeds recognizable and industry enforced standards (Davila, Gupta & Palmer, 2003).
According to Davila, Gupta & Palmer (2003) providing suppliers with Internet or Intranet access to
company internal data, or integrating suppliers applications with company information systems, both key to
supply chain management, is still unusual. This observation reinforces the prudence that companies must
demonstrate on integrating e-procurement technologies into existing systems and relationships.
A study conducted in the Swiss market revealed that the lack of supplier involvement and infrastructure
to optimize B2B processes was a hindrance to integrate the B2B solution scenarios. Integration solutions are
not always offered appropriate to suppliers and the majority of companies agree that the position of the
suppliers is insufficiently considered (Tanner et al, 2008).
Buyers are concerned that e-procurement technologies will push prices down to the point where suppliers
cannot invest in new technology or product development, upgrade facilities, or add additional productive
capacity. Additional price pressures can even push suppliers with a poor understanding of their cost structure
out of business (Davila, Gupta & Palmer 2003). Supplier need to know how low they can bid, and still
observe an acceptable return. (Moser, 2002).
The majority of the companies believe that barriers include insufficient financial support, lack of
interoperability and standards with traditional communication. Developing standards and systems for
facilitating effective interoperability with traditional communication systems will help the adoption of e-
procurement fairly well with minimum investment and changes to the business processes through
reengineering (Hawking et al, 2004).

Enablers Barriers
Market Growth Intranet access
Less Operational Cost Integration
Transparency Price pressures
Longer buyer-seller relationships Lack of standards

Table 1. Enablers and Barriers for e-Procurement Adoption by Suppliers

3. RESEARCH QUESTIONS AND METHODOLOGY


This research will provide a better understanding of issues affecting the suppliers within an e-procurement
implementation. The research questions formulated were based on the enablers and barriers felt by suppliers
when confronted with the e-procurement adoption. The following research questions will be answered:
• What are the major perceived barriers to the adoption of e-procurement in Portugal by suppliers, and
how can they be addressed?
• What are the major perceived enablers to the adoption of e-procurement in Portugal by suppliers,
and how can companies explore it?
This effort started by reviewing the background to the application of e-procurement, which was then
followed by various dentitions of e-procurement. Subsequently, we made a review of the literature available
on the adoption of e-procurement by suppliers with the objective of developing a theoretical framework for
determining the barriers against, enablers and possible solutions for the successful supplier adoption of e-
procurement. The questionnaire will be pilot tested by e-procurement consultants and academics, before
being sent out. The proposed framework will be validated with the help of empirical data collected from
Portuguese companies. Finally, based on the empirical results and analysis, we will develop a framework for
the supplier adoption of e-procurement.

4. DISCUSSION
Based on the database that we hope to collect, we plan to apply a quantitative approach to identify the
enablers and the barriers that influence Portuguese companies to adopt e-procurement solutions. Besides,

186
IADIS International Conference e-Commerce 2009

these empirical evidences could be relevant for managers of companies who seek better understanding and
predict the procurement of their products. We hope that companies could leverage their e-procurement
implementations by engaging the maximum number of suppliers, and to successfully collaborate on a win to
win basis.

REFERENCES
Amaral, L. A.; Teixeira, C. and Oliveira, J. N., 2003. E-procurement: Uma reflexão sobre a situação actual em Portugal.
Minho: APDSI.
Berlak, Joachim and Weber, Volker, 2004. How to make e-Procurement viable for SME suppliers. Production Planning
& Control, Vol. 15, No. 7, pp. 671-677.
Carayannis, Elias G. and Popescu, Denisa, 2005. Profiling a methodology for economic growth and convergence:
learning from the EU e-procurement experience for central and eastern European countries. Technovation, Vol. 25,
No. 1, pp. 1-14.
Croom, Simon R., 2001. Restructuring supply chains through information channel innovation. International Journal of
Operations and Production Management, Vol. 21, No. 4, pp. 504-527.
Croom, Simon R., 2005. The impact of e-business on supply chain management: An empirical study of key
developments. International Journal of Operations & Production Management, Vol. 25, No. 1; pp. 55-73.
Crom, Simon R. and Brandon-Jones, Alistair, 2005. Key issues in e-procurement: Procurement implementation and
operation in the public sector. Journal of Public Procurement, Vol. 5, No. 3, pp 367-387.
CSCMP, 2008. Retrieved 1 25, 2009, from Council of Supply Chain Management Professionals (CSCMP):
http://cscmp.org/
Davila, Antonio; Gupta, Mahendra and Palmer, Richard, 2003. Moving procurement systems to the internet: the adoption
and use of e-procurement technology models. European Management Journal, Vol. 21, No. 1, pp. 11-23.
Dedrick, Jason, 2008. How Does Information Technology Shape Supply-Chain Structure? Evidence on the Number of
Suppliers. Journal of Management Information Systems, Vol. 25, No. 2, pp. 41-72.
Ellram, Lisa M., and Zsidisin, George A., 2002. Factors that drive purchasing and supply management’s use of
information technology. IEEE Transactions on Engineering Management, Vol. 49, No. 3, pp. 269-281.
Gilbert, Alorie, 2000. E-procurement: problems behind the promise. InformationWeek, November 20, pp. 48-55.
Harris, Lisa, and Dennis, Charles, 2004. Marketing the e-business. USA: Taylor & Francis.
Hawking, Paul; Stein, Andrew; Wyld, David C. and Foster, Susan, 2004. E-Procurement: Is the Ugly Duckling Actually
a Swan Down Under. Asia Pacific Journal of Marketing and Logistics, Vol. 16, No. 1, pp. 3-26.
Hoffman, William; Keedy, Jennifer and Roberts, Karl, 2002. The unexpected return of B2B. McKinsey Quarterly, Vol. 3,
pp. 97-105.
Kumar, Nanda and Qian, Peng, 2006. Strategic alliances in e-government procurement. International Journal of
Electronic Business, Vol. 4, No. 2, pp. 136-145.
Moser, Edward P., 2002. E-Procurement--Reverse Auctions and the Supplier's Perspective. Pharmaceutical Technology,
Vol. 26, No. 5, pp. 82-85.
Neef, Dale, 2001. e-Procurement - From Strategy to Implementation. USA: Prentice Hall.
Pereira, Paulo and Alturas, Bráulio, 2007. Factores Críticos da Adesão das PME´S Nacionais, Fornecedoras de Materiais
de Escrítorio ao Procedimento Aquisitivo Público em Portugal: Uma Proposta de Investigação. Conferência IADIS
Ibero – Americana. Vila Real.
Rajkumar, T. M., 2001. E-procurement: Business and Technical Issues. Information Systems Management, Vol. 18, No.
4, pp. 52-60.
Sharifi, H., Kehoe, D. and Hopkins, J., 2006. A classification and selection model of e-marketplaces for better alignment
of supply chains. Journal of Enterprise Information Management, Vol. 19, No. 5, pp. 483-503.
Tanner, Christian; Wolfle, Ralf; Schubert, Petra and Quade, Michael, 2008. Current Trends and Challenges in Electronic
Procurement: An Empirical Study. Electronic Markets, Vol 18, No. 1, pp. 6-18.
Teo, Thompson S. H. and Ranganathan, C., 2004. Adopters and non-adopters of business-to-business electronic
commerce in Singapore. Information & Management, Vol. 42, No. 1, pp. 89-102.

187
ISBN: 978-972-8924-89-8 © 2009 IADIS

MEASURING VIRTUAL KNOWLEDGE MANAGEMENT


IMPACT IN FIRM’S PERFORMANCE

Flávio Gomes Borges Tiago, Maria Teresa Borges Tiago, João Pedro Almeida Couto
Universidade dos Açores

ABSTRACT
Knowledge Management (KM) is one tool that seams to gain a more relevant role, especially as managing knowledge has
become increasingly important to all companies. Appropriate KM practices within organisations can be seen as one of the
prerequisites to the enhancement of continuous performance improvement in the interne-based context. Thus, our aim is
to develop a conceptual framework related to KM practices in a virtual context and to identify the nature of the
relationship existing in those knowledge-driven elements and performance achievements. This paper aims to bridge the
gap between the KM and e-business performance-related literatures by establishing a model tested in European
companies using a structural equation modelling analysis. The results show that KM has a positive impact on the
maximization of e-business performance and that some elements individually have a positive influence on e-business
performance. The present study advances knowledge on the nature of the relative importance of different components of
Internet-based KM as drivers of e-business performance and reinforces its importance as an integrated e-business tool.

KEYWORDS
Knowledge Management, e-Business, Performance.

1. INTRODUCTION
In today's digital economy, rapid access to knowledge is critical to the success of many organizations (Liao,
2003). One of the major challenges that firms face is managing competitive advantage through the
development of strong relationships with all stakeholders. In this context, Knowledge Management (KM)
becomes an important part of the global solution. However, as noted by Takahashi and Vandenbrink (2004)
and Zhang and Zhao (2006), KM needs to be regarded as more than simple information gathering in order to
take advantage of its competitive potential. Despite the academic research and organizational practices
developed around this concept, there is still a lack of conceptual basis necessary to develop the measures of
KM contribution in business success, especially regarding its contribution to Internet-based environments.
The objective of this paper is to gain a clearer understanding of the fundamental issues related to this topic. In
this line of research, the present paper discusses the results of an exploratory survey conducted among a large
sample of European companies. Using a structural equation analysis, we explore the relationship between e-
business performance and KM initiatives, trying to identify the main drivers of virtual KM.

2. THE VIRTUAL KNOWLEDGE MANAGEMENT


Many claim that knowledge is a major factor driving business-level capabilities and an important source of
competitive advantage (Nonaka & Takeuchi, 1995). Awad and Ghaziri (2004) stated that information and
knowledge are critical to companies’ performance. However, these authors suggested that capturing and
transferring best practices is not enough to achieve success, especially in an Internet-based context. The
expansion of Internet and e-commerce technology allows firms to establish new forms of creation
knowledge, and provides them opportunities to improve their capability to manage and use knowledge (Siau,
2000). Through the Internet, vast amounts of information concerning customers, suppliers, markets, and
supply chains can be effortlessly gathered, while information about company processes, products, and
services can be easily disseminated to the public.

188
IADIS International Conference e-Commerce 2009

Takahashi and Vandenbrink (2004) suggested that the problem facing top decision-makers in the
ubiquitous information society will be how best to organize the knowledge cycle. One of the challenges is to
share the knowledge with inside entities who value it, and to do so organizations must create and deploy
knowledge management systems (KMS).
KM is one of the leading strategic areas being explored and adopted by companies (Schwartz et al., 2000;
Grossman, 2006), especially by those who have invested in the Internet as a new channel and marketplace.
According to Stojanovic and Handschuh (2002), the main function of a KM system is to capture and
disseminate new sources of information. From this point of view, the Internet is a font of information. By
using the Internet, companies implement a knowledge-acquisition and knowledge-sharing system, one that
meets the requirements and specifications of unique and complex systems. It will match customer
requirements to product characteristics (Ratchev et al., 2003) and allow the acquisition and maintaining of
competitive advantages. Furthermore, in this digital society, corporations need to adapt both knowledge
management systems and business strategy in order to use digital information effectively and to take
advantage of Internet possibilities (Takahashi & Vandenbrink, 2004).
Like many other information system implementations, KM is strongly linked in the literature to a sales
and marketing perspective (Zhang & Zhao, 2006). For this research, we will consider KM as a combination
of marketing tactics, knowledge-sharing, methods and technology. It can be used to gain and maintain
competitive advantages in a global marketplace such as the Internet and simultaneously cut down
organizational layers.
As Malhotra (2000) suggested, the traditional KM model emphasizes convergence and compliance to
achieved pre-specified organizational goals. On the other hand and according to several authors, virtual KM
emerged from the Internet, and web technology facilities are used to implement KM solutions. Nevertheless,
the concept of use of information technology as the key enabler of KM is not a new idea.
From the literature review performed, we consider virtual KM as an Internet-based business strategy
integrating every area that touches the data gathering. These areas include sales and support services, the
overall consideration of enhancing performance of people and processes with major contributions from new
electronic technology (Internet, email, chat rooms, e-forums), and data transformation into information, i.e.,
extranet and other internal process and knowledge-sharing (intranet, extranet, LAN, WAN, VPN).
In this context, online companies are embracing knowledge management as a major element of corporate
strategy. Online technological applications allow a rapid and low-cost access to data, faster and easier
processing of the information and, above all, a greater level of knowledge sharing. However, the adoption of
KM systems by online organisations implies a complex restructuring of all organisational elements and
processes, in order to achieve the competitive advantages through the use of virtual KM systems. The virtual
KM can be define has the incorporation of online technologies in the cycle of knowledge in order to enhance
the KM processes.

3. EVALUATION FRAMEWORK AND HYPOTHESES


Following the literature reviewed in the previous section, we developed a research model. It proposes virtual
KM that will be positively associated with a set of intermediate outcomes that we call “KM practices”, and
will be positively associated with online organizational performance. For that purpose we use a structural
equation model with latent variables. This model consists of two sub-models: the measurement model and
the structural equation model. The primary research questions to consider are these: What is the degree to
which an organization engages virtual KM — in particular, technological KM practices — has a positive
impact in online organizational performance? And is virtual KM, in turn, positively related to online
organizational performance? Besides measuring the convergence of a technological approach with a
business value approach, our aim is to discover the direct nature of the relationship between KM practices
and online organizational performance.
The validation of the measurement model is done by using Confirmatory Factor Analysis (CFA). We will
see later that the observable variables (indicators) we selected are measures of three latent variables (factors).
We assume that these three KM practice factors each have a direct effect on the virtual KM and upon online
corporation performance. Therefore, we assume that the online corporation performance is explained not

189
ISBN: 978-972-8924-89-8 © 2009 IADIS

only by the virtual KM, but also by a general KM practices factor that is concerned with the gathering of data,
information process and knowledge-sharing.
Therefore, it is postulated that the considered indicators measure three different and positively correlated
latent variables or factors (hypothesis H1). Each factor is supposed to contribute directly to the determination
of the online corporation’s performance (hypotheses H2 and H3). Besides these direct effects, it is also
assumed that there is an indirect effect via virtual KM (H4). In sum, the four research hypotheses are the
following:
H1: The indicators considered define three positively correlated factors;
H2: The KM practices factor positively and significantly determines the online corporation performance;
H3: The factor concerned with KM practices positively and significantly determines the virtual KM;
H4: The KM practices influence online corporation performance through virtual KM application.
Awad and Ghaziri (2004) pointed out that KM awareness benefits the entire organization and that it relies
on developing a KM environment inside and outside the firm — one that permits a generation of new
knowledge, i.e. the transfer of existing knowledge and its application to new products, services and process.
Davenport and Prussak (1998) considers that KM focuses on processes and mechanisms for locating and
sharing knowledge possessed by an organization or its external stakeholders. Based on this, we define KM
practices as the group of technological efforts carried out by the organization in three different dimensions:
data gathering, information process and knowledge-sharing. In total, we identified twelve KM practices.
Each has been suggested elsewhere as being important for effective virtual KM (Gold et al, 2001; Malhotra,
2000; Awad and Ghaziri, 2004; Schwartz et al., 2000; Tiago et al, 2007; among others).
In Internet-based practices, most traditional financial and accounting methods of evaluation are not
suitable as the only forms of performance measurement. This is due to the fact that there are some intangible,
indirect and even strategic benefits that need to be considered. From the literature review, it is found that KM
has been linked positively to non-financial performance measures such as quality (Mukherjee et al., 1998;
Tiago et al., 2007), innovation (Francisco & Guadamillas, 2002), productivity (Lapre & Wassenhove, 2001),
and sales (Tiago et al., 2007). In fact, the expected results are that KM simultaneously influences many
different aspects of organizational performance. The work of Gold et al. (2001) presents a combination of
two dimensions as enablers of effective performance improvements: knowledge infrastructure and
knowledge-processing capacity. Other frameworks have been presented, but the specific interface between
virtual KM and e-business has not been addressed from the organisational point of view. So we will follow in
the last authors’ steps, using as performance measures elements of both infrastructure and processing
dimensions. By identifying KM practices as antecedents to virtual KM and online organizational
performance, we attempted to include factors that have been previously tested by others authors (see for
example, Gold et al., 2001).

4. METHODOLOGY AND RESULTS


The data used to test our research model comes from the e-Business W@tch annual survey (2005). This data
was collected in a large survey about e-business in European enterprises. Considering that this study
examines the status of adaptation of virtual KM by companies, the original sample was limited to firms
having e-business activities and companies adopting KM practices. So, our work sample of 5.216 cases
constitutes a heterogeneous sample of companies in terms of industries, fields, size, business model and
country. The data covers 7 European countries (Czech Republic, France, Germany, Italy, Poland, Spain and
the U.K.). Distribution of firm size, measured by the number of employees, shows that almost half of the
firms are micro- and small-size firms (around 50.7%). The industry distribution of the responding sample is
approximately similar to the original sample. The two less heavily represented sectors in the sample are the
aerospace industry and manufacture of pharmaceuticals, with 3.1% and 10.2% respectively, closely followed
by all the others.
The model was estimated by the Maximum Likelihood method in the AMOS package. The model
goodness of fit may be considered acceptable according to the values of some goodness-of-fit index, although
the chi-square test statistic (χ2 = 626,4; df =117; p-value = 0,000) is significant, implying a bad fit. However,
as is well known, this test has serious limitations — namely its dependence on the sample size and on the
number of indicators. In general, for large sample sizes the chi-square statistic is significant, and in the

190
IADIS International Conference e-Commerce 2009

present case the sample size is very large (n = 5,216). For that reason, it is usual to evaluate the goodness of
the fit by a set of index, also presented in Figure 1. After global model fit has been assessed, the numerical
results were evaluated in order to test their support of the research question.
The numerical results can be obtained directly from the path coefficients of the structural model. We refer
to standardised coefficients that account for scale effects and serve as indicators of the relative importance of
the variables. The measures for global model fit included in Figure 1 suggest that our model fits the
underlying data well. All the paths were statistically significant. The three dimensions used to compose the
KM practices are all significant and highly correlated to the KM practices construct. As a result, hypothesis
H1 is not rejected. Nevertheless, a reference needs to be made regarding the relative lower value achieved in
terms of knowledge-sharing.
The results show that KM practices competencies explain only 11 percent of the variance in online
corporations’ performance. Thus, this finding gives no empirical support to the concept that online
performance can be improved by the use of the three basic components of KM traditional practices: data
gathering; information process and knowledge-sharing. With this consideration in mind, hypothesis H2 is
rejected. The results also show that virtual KM explains 51 percent of an online corporation’s performance,
implying that our hypothesis H3 is not rejected. The data gathering, information processing and knowledge-
sharing combined are not significantly important for the direct determination of an online corporation’s
performance. However, these items have an indirect effect on the performance via their positive influence on
the virtual KM. So, hypothesis H4 is not rejected. KM practices and virtual KM are only part of the equation;
the construct of online corporation performance must also be measured. All of the non-financial factors used
show a positive and significant relationship. This provides empirical support for the theoretical views that
state that online performance needs to be measured using new criteria, and not exclusively finance-based
criteria.
Data
Gathering 1,00
***

*** 0,11 # Online


1,00
Information
KM practices Corporations
Process
performance
***
# 0,51
0,55
***
Knowledge 0,31
Virtual KM
sharing

Measure Value Suggested


Key for significance measures:
RMSEA 0.033 < 0.05
*: α >0.10 NFI 0.900 >0.9
**: α >0.05
IFI 0.913 >0.9
***: α >0.01
#: for model identifiably, this path CFI 0.913 >0.9
coefficient was set to 1 in the unstandardized case.

Figure 1. Structural Equation Model and Estimation Results

5. DISCUSSION AND CONCLUSIONS


Knowledge Management has presented several difficulties in the traditional IT environment, basically related
to the constrained form of sharing the knowledge. In the present ubiquitous information context, KM seems
to be an easier and promising tool, especially when used in its global version. As the literature review
showed, there have been only a few works examining KM practices and virtual KM contributions to online
performance from a corporate perspective. Moreover, the majority of these works were confined to specific
industries and confined to small data samples. The goal of the current study was therefore to answer the
following questions: What is the degree to which an organization engages virtual KM — in particular,
technological KM practices — has a positive impact in online organizational performance? And is virtual
KM, in turn, positively related to online organizational performance? With this study, we attempt to
contribute to bridging the existing research gaps. We do so by presenting results from an empirical
investigation based on a cross-industry survey, which covers seven European countries. The findings shown
above, as reported by respondents in the case companies, demonstrate the kinds of applications they really
need or value, how KM practices are used and valued, and the ways in which virtual KM can help to achieve
higher levels of online performance, considering a new set of non-financials measurements.
Considering the results, we can find evidence to confirm most of the hypotheses that we formulated
regarding the impact of virtual KM in online corporations’ performance. First, the data supports our

191
ISBN: 978-972-8924-89-8 © 2009 IADIS

conceptualisation for the KM practices construct: data gathering, information process and knowledge-
sharing. Within this, all elements have a positive impact on the maximisation of KM practices.
Secondly, the findings allow us to conclude that virtual KM has a positive impact on online performance,
which was expected considering the existing literature on this matter. According to these results, the concept
of virtual KM as an important e-business tool is reinforced. Thus, the relationship between virtual KM and
online performance follows the positive relationship found in some earlier studies. One of the managerial
contributions of this work is the discovery that managers should consider the use of virtual KM to improve
everyday online processes — and should also be aware that the simple use of the KM practices is not enough
to achieved higher performance levels. However, a cost–benefit analysis should be made to assess the return
on the investments made in KM, since we only considered the upside of this initiative. Until KM becomes an
ingrained and standard tool of e-business, the need to define measurement criteria will continue in order to
support the corporate implementation and maintenance of such systems. Further work is clearly needed to
examine the interaction between virtual KM and online performance over time or in small sets of the sample.
Doing so would allow us to find out if the relationship is equally strong in all countries and which contextual
factors affect this relationship. This research produces some useful insights, leaving still a number of issues
for future research. One of these issues is related to the possibility of extending the study in order to consider
the impact of other elements of virtual KM, such as technological readiness and management support.
Similarly, this study could be expanded through the application of a panel data methodology that would
determine the evolution of virtual KM contribution to online performance among European companies.

REFERENCES
Awad, E. and Ghaziri, H. (2004) Knowledge Management. New Jersey: Pearson Education.
Davenport, T. and Prussak, L. (1998) Working knowledge: how organizations manage what they know. Boston: Harvard
Business School Press.
Francisco, J. and Guadamillas, F. (2002), A case study on the implementation of a knowledge management strategy
oriented to innovation. Knowledge and Process Management. 9(3): p. 162-171.
Gold, A., Malhotra, A. and Segars, A. (2001) Knowledge management: An organizational capabilities perspective.
Journal of Management Information Systems. 18(1), 185-214.
Grossman, M. (2006) An overview of knowledge management assessment approaches, Journal of American Academy of
Business. 8(2), 242-247.
Lapre, M. and Wassenhove, L. (2001) Creating and Transferring Knowledge for Productivity Improvement in Factories.
Management Science. 47(10).
Liao, S. H. (2003) Knowledge management technologies and applications - literature review from 1995 to 2002. Expert
Systems with Applications. 25 (2), 155-164.
Malhotra, Y. (2000); Knowledge Management for E-Business Performance: Advancing Information Strategy to ‘Internet
Time’, Information Strategy: The Executive's Journal. 16(4), 5-16.
Mukherjee, A., Lapre,M. and Wassenhove, L. (1998) Knowledge Driven Quality Improvement. Management Science.
44(11), S35-S49.
Nonaka, I. and H. Takeushi (1995) The Knowledge-Creating Company, Oxford: Oxford University Press.
Ratchev S., Urwin E., Muller D., Pawar K.S. and Moulek I. (2003) Knowledge based requirement engineering for one-
of-a-kind complex systems. Knowledge-Based Systems. 16 (1),1-5.
Schwartz D. G., Divitini, M. And Brasethvik, T. (2000) Internet-Based Organizational Memory and Knowledge
Managemen. Hershey: Idea Group Publishing.
Siau, K. (2000) Knowledge discovery as an aid to organizational creativity. Journal of Creative Behavior. 34(4), 248–
258.
Stojanovic, L.Stojanovic, N. and Handschuh, S. (2002) Evolution of the Metadata in the Ontology-based Knowledge
Management Systems. German Workshop on Experience Management.
Takahashi, T. and Vandenbrink, D. (2004). Formative knowledge: from knowledge dichotomy to knowledge geography –
knowledge management transform by the ubiquitous information society. Journal of Knowledge Management. 8(1),
64.
Tiago, M., Couto, J., Tiago, F. and Vieira, A. (2007) Knowledge management :An overview of European reality.
Management Research News. 30(2), 100-114.
Zhang, D. and Zhao L. (2006) Knowledge Management in Organizations. Journal of Database Management. 17(1), i-viii

192
IADIS International Conference e-Commerce 2009

MODERN ARCHITECTURAL REASONING FOR


COMPLEX WEB COMMERCE APPLICATIONS

Thomas Lehrner
Culturall Handelsges.m.bH.
1040 Vienna, Austria

Birgit Pohn
University of Applied Sciences Technikum Wien
1200 Vienna, Austria

Markus Schranz
Vienna University of Technology
1040 Vienna, Austria

ABSTRACT
Within the Information Age, commerce has found a channel of distribution which has gained a new boost through the
Web 2.0 phenomenon. Rich User Applications coupled with the spread of the Internet and WWW has spanned a global
mesh of communication and online services which does not depend on any temporal or local factors. Simplicity and
ubiquitousness of modern web applications have become the pedestals of spreading e-business systems all over the
world. This ease of access and use for customers poses a challenge to service-providers. Designing and developing web
2.0 software depends on the one hand on the discussion of architectural concepts for distributed systems and on the other
hand on appropriate frameworks which allow building up complex web-applications e.g. the well-known web-
application-framework MASON. This article deals with topics like concepts of implementing business processes as web-
services, desktop-like user interfaces and persistent mass transactions in comparison to each other. We propose an up-to-
date object-oriented approach to the development of modern e-commerce applications based on MASON and provide
profound theoretical and practical results based on an industry e-commerce-solution.

KEYWORDS
e-Commerce Systems, Web Publishing, Web Application Architectures, Web 2.0, Mason.

1. INTRODUCTION
Through the start of the WWW 15 years ago, the world has undergone one of its most drastic steps towards
globalisation. As a medium that reaches the whole world, the Web is the logical continuation for setting up
business-processes.
On its way from static information sites in the mid 90s to user created contents, sharing the knowledge of
the masses and providing easy access to the long tail in applications of the Web 2.0 (O’Reilly, 2005) the Web
has traversed through various technical stages. Multiple approaches, concepts and architectural designs have
been developed in order to create and maintain user-oriented comfort and technical simplicity for viewers
and end customers while accessing extensive Web services. Technicians, IT and content architects, marketing
experts and sales professionals invented Web services and applications in the area of information supply,
news networks (Dustdar, 2006), content management, cultural resources (Schranz, 2005), etc.
With increasing volume and complexity of modern Web applications the technical challenges demanded
sophisticated software engineering skills (Ghezzi, 2002) and highly developed tools, evaluated by research
methodologies (Kirda, 2001; Kappel, 2006) for providing and sustaining successful services. Especially the
ambitious entrance of commerce to the Web has introduces requirements to multiple disciplines such as
security, performance, service performance and software architecture. In this paper we discuss technologies
and approaches to copy with the challenges of complex Web services and propose appropriate architectural
elements to implement and maintain modern commercial information applications on the WWW.

193
ISBN: 978-972-8924-89-8 © 2009 IADIS

The article is structured as follows: in section 2 we refer to basic definitions, widely applied and
researched technologies and related concepts. Section 3 focuses on Web Commerce and the challenges in
combining traditional commercial transactions with modern distributed software architectures in high volume
contexts. Section 4 proposes a component-based object-oriented approach to complex web architectures and
section 5 explains our research experiences based on industry applications recently implemented following
our approach. The summary provides our conclusion and future steps to optimize future assembling of
appropriate architecture components for successful web commerce applications.

2. BASIC TECHNOLOGIES AND ARCHITECTURE UTILIZED IN WEB


APPLICATION ENGINEERING
In order to provide and maintain (commercial) web applications, a set of basic technologies are utilized on
various platforms, thus creating a manageable family of web architecture components. On top of the basic
technologies and concepts modern Web applications require data persistency, (a)synchronous information
exchange (concerning rich user experience) and modern communication and service decomposition
approaches for flexible and manageable architectures.

2.1 The Hibernate Persistency Framework


Data persistency frameworks such as the open-source Java Framework Hibernate (Elliott, 2008) have been
developed to reach data persistence by storing and reloading complete objects including their dependencies in
relational databases by mapping them to database-tables. Working with Hibernate facilitates accessing data
from any database since there's no need to build up any database-connections or set up SQL-statements to
guarantee data persistency whereby development time is reduced.

Diag. 1. Session-per-conversation-pattern (a) Vs. Session-per-request Pattern (b)


An essential benefit of Hibernate is the architecture of “communication”. Within one conversation (a
complete user-dialog, e.g. buying a ticket) the Hibernate Session holds any data, state information and
manages several database transactions to broaden the scope of the actual session for further processing
simulating a continuous database-connection1. Basically two communication approaches are distinguished in
Hibernate: transaction-spanning-conversations and the session-per request-pattern (see diagram 1).

2.2 AJAX – Asynchronous JavaScript and XML


AJAX enables asynchronous communication between client and web server. In contrast to conventional web-
applications, modern web-applications using AJAX can exchange data independently from user-generated
HTTP-requests. The main idea of using AJAX is providing faster and more interactive services which behave
almost like desktop-programs and don't keep the user waiting. AJAX allows loading information belatedly
and reacting to user-actions and behaviour autonomously.

2.3 SOA – Service Oriented Architecture


A principle concept of modern application architecture is the Service-Oriented-Architecture (SOA). Core of
this approach is structuring services, which can be derived from splitting up complete business processes into

1 Hibernate source at www.hibernate.org/42.html, accessed on July 15, 2008

194
IADIS International Conference e-Commerce 2009

logical atomic entities, and provide them as independent modules within a distributed system for reuse.
Together with isolated use of a service it is also possible to combine different modules for realising a
certain process – the coordination of those elements is called service-orchestration. Service-orientation means
customer-orientation as well – by providing single services and tailored orchestrations delivered data can be
exactly adapted to specific demands.

3. TRADITIONAL/MODERN CONCEPTS FOR WEB APPLICATIONS


Ever since the Internet pioneers like Tim Berners-Lee, Marc Andreesen and many others have provided the
necessary basics to web communication and interactive distributed applications, research and the information
industry have been utilizing the merits of their achievements.
The technical basics in HTTP as a protocol, HTML as simple yet powerful markup language and URL as
a unique addressing recommendation are standardized by the W3C. Due to the simplicity of the protocol, the
number of web applications provided have raised from a few hundreds in the early 90ies to more than 170
million sites2 in June 2008. From early static information services the application categories (cf. Kappel,
2006) provided at the Web have expanded to interactive, transaction oriented, user-centered and ubiquitous
Web products with similar user experience as locally installed software and transporting semantically related
information networks to the target users.

3.1 Challenges in Combining Commerce and Web Applications


The analogy to face-to-face shopping misleads the users to the assumption that a commercial web service is
solely provided for their comfort. Commercial terms such as “one-to-one marketing” emphasize this illusion,
but commercial providers in contrast create maximum financial benefits from top frequencies and multiple
parallel requests, which have to be managed by modern service architectures, to the product servers.
Modern Web applications support database concepts such as atomicity, concurrency, isolation and
durability for commercial transactions. In contrast to locally installed applications, where direct and
permanent access to the main database host can be provided and guaranteed, web applications are
immanently distributed. The client/server architecture, which came with appealing simplicity to spread the
network all over the world, has tremendous drawbacks, when it comes to multi-request transactions. Due to
the distributed hosts involved in the transaction there is at no time a guarantee, that the conversation can be
continued. A disconnected might happen at any time during the commercial transaction, leaving the
commercial application in a problematic state.

3.2 Persistency and Commerce


To manage the challenges of commercial transactions in a distributed service environment, software and Web
architects have invented different approaches and technical concepts. Similar to the solutions provided in
modern database technology (cf. the two-phase commit protocols or the ACID-attributes of local transact
ions), distributed conversations have to overcome network insufficiencies with reliably persistency models.
For such distributed data and transaction management various persistency frameworks have evolved: e.g. the
Hibernate-Framework for Java Applications (section 2.3.1.) and the Apache::Session Module for LAMPP
(Linux/Apache/MySQL/Perl/PHP) architectures.

3.3 Software Architectures for Modern Web Commerce Applications


Since modern Web applications have soon outgrown the stage of single page monolithic software scripts, the
creation and maintenance of current services need to be managed by appropriate processes and tools (cf.
Kirda, 2001). Independent of concrete middleware, application services or programming languages, most
web applications share commonly identifiable software and architecture patterns.

2 Source: news.netcraft.com/archives/web_server_survey.html visited at July 15, 2008

195
ISBN: 978-972-8924-89-8 © 2009 IADIS

In order to guarantee maintainability and quality, an appropriate distribution of concerns have to be


established. An approach in software development, recently adapted to the needs of Web applications (cf.
Ping, 2003) is the MVC (model-view-controller) pattern, which forces the separation of business logic, user
interface or represented data. Modern frameworks following the MVC pattern include Ruby on Rails, Jifty,
MasonX::MiniMVC and many others. These frameworks usually simplify the web application development
by providing automatically generated software components within the MVC pattern, to be extended and
finished by the programmers.

4. ARCHITECTURE ELEMENTS FROM A COMPONENT-BASED


OBJECT-ORIENTED APPROACH TO WEB ENGINEERING
Based on modern concepts in designing and developing complex Web commerce applications we have
identified and compared software components that are appropriate to creating modern and successful
services. Our selection is based on the web application service framework Mason (Rolsky, 2002). Mason has
been designed to build, organize and maintain large dynamic web sites – all based on combining its atomic
units: components. It encourages thinking in structural terms and architectural dimensions rather than
procedural scripts or modules. We describe selected architecture elements and their representation in Mason
in the following:

4.1 Component Inheritance and Wrapping Chain


Components are related to each other in arbitrary hierarchical order. Mason components can inherit from
other components, like classes and objects in an object-oriented system. Normally, each component will
inherit form a single component called the autohandler, or it may specify a particular parent or declare no
parent. The default parent for an autohandler is an autohandler in the upper directory within the scope of the
document root of the web server. The autohandler implements general behaviour for components, like the
web site structure.
Mason processes a request by building a wrapping chain and executing each component in that chain
from the topmost parent to the bottommost child. The requested component is always at the bottom of the
chain. Inside the wrapping chain all components could call other components or methods thereof.
After each execution of a component, Mason could filter the output. This feature offers additionally to the
wrapping chain construct a component dependent output adaptation.

4.2 Persistent Session and Data Handling


Persistent session handling is required to maintain user specific data spanning several requests. This
behaviour is not implemented directly in Mason, thus giving developers total control over session handling,
such as session id communication or any arbitrary data structure identified uniquely by the session id (based
on cookies or URLs). The storage and locking mechanism to guarantee mutual exclusion on the access to the
session data can be chosen to support consistency and security of the data in the most performing way.
Complex web applications often greedily require resource intense calculations and database queries,
where results typically remain unchanged for a specified time period. To save system resources, entire
components may be cached for that reason by the Mason data caching interface to improve performance.
Each component has its own persistent data cache and each cached value is set to expire after a specified time
period.

4.3 Persistent Database Handles


Utilizing the most popular web server Apache, and one of its most powerful extension mod_perl, Mason is
employed as modern component in a powerful architecture.
CGI is the most widely used protocol for building database interfaces, implemented in Apache's mod_cgi
and its equivalents. The main limitation is the lack of persistent connections to the database. Normally, for

196
IADIS International Conference e-Commerce 2009

every HTTP request, a process has to connect to the database, and on request completion the connection will
be closed. Depending on the database, the time to instantiate a connection may vary significantly.
Apache::DBI (Descartes, 2000) was written for this purpose. Used with mod_perl, the DB connection
persists for the entire lifetime of an apache process. That is possible, because a child process of apache does
not quit when a request has been processed. When mod_perl code needs to use the DB, Apache::DBI
immediately provides a valid connection since it is cached in the apache process - if it was already
established earlier - and the Mason resp. Perl code can be processed further.

4.4 Transactions per Request Model


A single session typically has a bigger scope than a single database transaction. This implementation pattern
includes all transaction benefits and might span several database transactions, but without excessing of the
request boundaries. The Transactions per request model shows the logical idea of a conversation and how it
can be setup to map a process. The session is held persistently in disconnected state and does not require a
permanent open database connection, during user inactivity. The Apache-Mason session maintains all user-
specific data between requests. Diagram 1 in section 2.3 shows the idea of this pattern.

4.5 Rich Internet Applications with AJAX


Rich Internet Applications (RIAs) are web applications that show features and functionality of traditional
desktop applications. Typically, RIAs run in a web browser and are platform-independent. A major
difference between traditional web applications and Web 2.0 is performance - realized by outsourcing parts
of the application to the client. The consequence is a major saving of process resources and bandwidth,
because only requested components have to be computed and therefore less bandwidth is used to transfer
them, which increases the reaction time of a web application.

4.6 Integrating Mason Features by the MVC Pattern


The model-view-controller (MVC) architectural pattern, as described in section 3.4, isolates business logic
from user interface aspects. Our approach prescribes specific coding standards that enforce the MVC pattern.
Consequently we separate software components on order to more easily modify complex web applications,
so that one layer does not effect the other. Mason makes no attempt to enforce any sort of discipline in the
design. Instead, this is the responsibility of the developers and application designer.
Mason is at its core a text templating tool, which is realized with the wrapping chain(cf. section 4.2. All
chain components can call all outside components. This functionality perfectly represents the view logic of
the MVC architecture pattern.

5. ARCHITECTURAL RESULTS AND EXPERIENCE IN COMMERCIAL


SERVICES
In combining the architecture components and concepts described above, we identified and implemented a
set of appropriate concepts, software patterns, and tools to comfortably and sustainably realize an e-
commerce solution. Exactly the above-mentioned architectural elements have been supporting our research
and development work to design, monitor and maintain a successful commercial application:

5.1 Culturall Opera & Theatre E-Ticketing Service


Most recent deployment of the research results is available at the commercial website of the Culturall
HandelsgesmbH, Vienna, Austria. Ticket sales are managed directly via box offices at operas, theatres,
museums, ticket agencies and via the Web. Culturall faces a major difference to standard internet sales, like
Amazon or other Internet stores, since the Culturall distributed system requires real-time information of
tickets. A seat, which is selected by a customer in the internet, cannot be sold over another distribution
channel at the same time (mutual exclusion).

197
ISBN: 978-972-8924-89-8 © 2009 IADIS

These real-time requirements have to be implemented in a performing and resource saving way. The Web
platform is developed with Mason web application framework, thus guaranteeing these features. Mason
components are easily reused and caching minimizes database access and reduces response time.
Additionally, AJAX is used to improve user experience, interactivity and “invisible” server requests e.g.
loading real-time parameters for performance schedules.

6. CONCLUSION
In this paper we have discussed basic concepts of Web technology and provided services and combined
modern architectural elements to a successful set of concepts and tools in order to design, implement and
maintain modern web commerce applications. MVC-pattern based architectures and SW-concepts integrated
in the Mason Web application server framework are the core of our architecture. The successful
implementation of the Culturall E-Ticketing service underlines the viability of our approach. Optimization in
the utilization of the MVC pattern and improvements in the testability of asynchronously generated AJAX
site components are important next steps in our research work.

ACKNOWLEDGEMENT
This research work has been conducted with support of Culturall Handelsges.m.b.H., Vienna, Austria. The
authors express their gratitude to Dr. Helmut Rainel for providing access to software components and
commercial contents that allowed thorough research on the discussed field studies.

REFERENCES
Bekman, S. & Cholet, E. 2003. Practical mod_perl. UK: O'Reilly
Descartes, A. & Bunce, T. 2000. Programming the Perl DBI. UK: O’Reilly
Dustdar, S. & Schranz, M.W. 2006. Multimedia News Systems, in Encyclopedia on Multimedia. USA: Springer, pp435-
441
Elliott, J., Fowler, R., & O'Brien, T. 2008. Harnessing Hibernate. UK: O'Reilly
Ghezzi, C., Jazayeri, M., & Mandrioli, D. 2002. Fundamentals of Software Engineering. USA: Prentical Hall
Kappel, G., Pröll, B., Reich, S. 2006. Web Engineering. The Discipline of Systematic Development of Web Applications.
UK: Wiley & Sons
Kirda, E., Jazajeri, M., Kehrer, C. & Schranz, M.W. 2001. Experiences in Engineering Complex Web Services. IEEE
Multimedia V8(1), pp58-65
O'Reilly, T. 2005. What Is Web 2.0?. O'Reilly Network, http://www.oreillynet.com/pub/a/oreilly/tim/
news/2005/09/30/what-is-web-20.html, last download 14-jul-2008
Ping, Y., Kontogiannis, K., and Lau, T. 2003. Transforming Legacy Web Applications to the MVC Architecture.
Proceedings of the Eleventh Annual International Workshop on Software Technology and Engineering
Practice,STEP. Amsterdam, Netherlands, pp133-142
Pohn, B. 2007. Buzzword Web 2.0 -Ideen und Technologien der zweiten Version des WorldWideWeb. University of
Applied Sciences Burgenland, Master Thesis
Rolsky, D. & Williams, K. 2002. Embedding Perl in HTML with Mason. UK: O’Reilly
Schranz, M.W. 2007. Cultural Content Management at a New Level: Publishing Theater and Opera Details by Means of
Open Technologies from the Web 2.0. Proceedings of the ICCC 11th International Conference on Electronic
Publishing – ELPUB 2007. Vienna, Austria, pp 444-450
Schranz, M.W. 2005. Semantically connecting Business News in Europe. Proceedings of the SEMANTICS 2005
Conference. Vienna, Austria, pp 48-56
Thomas, D., Hansson, D., Breedt, L, & Clark, M., Davidson, J.D., Getland, J., & Schwarz, ª 2006. Agile Web
Development with Rails. USA: Pragmatic Pookshelf Verlag.

198
IADIS International Conference e-Commerce 2009

A NEGOTIATION MECHANISM USING ARGUMENT-


BASED METHODS AND PERIPHERAL ISSUES IN MULTI-
AGENT SYSTEMS WITH INCOMPLETE INFORMATION

Azita Darooei
Computer Department , Faculty of Engineering , University of Sheikh-bahaee , Isfahan , Iran

Mohammad-Reza Khayyambashi
Computer Department , Faculty of Engineering , University of Isfahan , Isfahan , Iran

ABSTRACT
In this paper a model of negotiation in multi-agent systems is represented. Overall aim of the model is to increase the
speed of agents’ agreements in a way that causes an improvement in obtained utility in some cases (in comparison with
ordinary methods). Based on the proposed method, each agent as one side of a negotiation, can use its peripheral issues
(issues which are available in its optimal agenda, but are not discussed in the other agents’ optimal agendas) to reach
agreement in a shorter time. In this model which is a competitive-cooperative one indeed, each agent accepts to concede a
privilege to its competitor (cooperative), and in return receive another privilege from the competitor (competitive). This
operation is done in a way that not only brings about no utility loss, but also increases utility in some cases. The reason is
that the probable loss will be compensated through the received privilege. We aim to provide these privileges by using
peripheral issues and argument-based methods.

KEYWORDS
Negotiation , e-commerce , agent , argument-based method , peripheral issues , incomplete information.

1. INTRODUCTION
Electronic commerce is one of the most important ways of trading especially because of its easy, rapid, and
global nature. Briefly, e-commerce consists of the buying and selling of products or services over electronic
systems such as the Internet and other computer networks [11]. Nowadays automation of electronic trades is
one of the most vital issues in e-commerce areas, and intelligent agents are utilized for gaining this purpose
[7]. Negotiation is a way of interaction between these agents in e-commerce contexts and multi-agent
systems [1].The main reason of this matter could be found in differences between agents preferences and
their attempt to reach faster agreements [2,10]. Obviously, the source of these differences stem from self-
interested nature of agents and their final intention of gaining the maximum utility for their selves.
Negotiation is used as a means of regulating these differences, and afterwards the agents can operate
together.
Another problem is the existence of time limitations and predefined deadlines for negotiations. Since,
two sides of a trade try their best to reach an agreement before negotiation time ends. Achieving this goal in
multi-agent systems with complete knowledge (which each side of negotiation knows about the limitations or
preferences of the other side) is so easy. However, despite all the efforts in this domain, achieving this goal in
multi-agent systems with incomplete knowledge still is a big problem.
On the other hand , as the time passes usually agent’s utility decreases and in fact its curve has a
descending shape. We call this utility decrease “concession rate”. Concession rate is another reason of
agents’ motivation toward quicker agreements [8]. Based on concession rate principal , if agent a gives offer
Si at time t and offer Si+1 at time t+1 , with maximum probability the utility gained through offer Si is more
than Si+1 (e.g. if U is utility function for agent a: Ua(Si)≥Ua(Si+1) ).
Another subject that has fundamental effects on negotiation outcomes is method and the model of

199
ISBN: 978-972-8924-89-8 © 2009 IADIS

negotiation between negotiators. As we know, different models of negotiation are represented but each
one suffers from some limitations. One class of negotiation models are argument-based models [2, 4, 6, 10].
In this class of models, in addition to offers giving to the competitor, each agent can exchange extra pieces of
information which are called “arguments”. Then, main pieces of information plus these arguments are sent to
the competitor to assess. These transferred arguments by the agent could be useful for changing the
competitor’s beliefs, goals, and even can give him encouragement to accept the given offer. This act is done
in a way that decreases the process time. Although this class of models has some complexities like the others,
it is practical in limited information situations [5].
Considering the concepts of concession rate and time limitations, and according to the fact that two sides
of the negotiation are unaware of one another’s deadlines, in this paper we deal with an argument-based
model of negotiation for multi-agent systems with incomplete information.
The paper consists of following parts:
In section 2 concepts of one-issue and multi-issues negotiation and optimal agenda are discussed. Section
3 is dedicated to introducing the proposed model for multi-issue negotiations, and eventually conclusions and
future works are discussed in section 4.

2. ONE-ISSUE AND MULTI-ISSUES NEGOTIATION AND OPTIMAL


AGENDA
Multi-agent negotiations are based on one or multi issues [9]. Most researches in this field are dedicated to
negotiations with only one issue (for example: price). However, in the real world most of negotiations and
trades are multi-issues. In recent years, there have been few researches in this new field which have led to the
formation of two fundamental concepts as follow [3,9]:
a) Negotiation procedure: which clarifies the issues to be negotiated as a package simultaneously, or
separately and in different times
b) Agenda: which identifies the set of issues under negotiation (we call it common agenda sometimes).
There is a common question among different researches on agenda which refers to defining the best
candidates for each agent. In other words, it evaluates which candidate provides more utility for each
agent and will be located in its optimal agenda? The answer is available in [9] and helps agents to select the
proper issues in a negotiation. Based on this research, for each issue in the agenda the participating agents in
a negotiation may have or have not a zone of agreement.
• Note: In [9] , the optimal agendas for two negotiating agents and , in a situation where two
issues A and B are candidate to be negotiated, are shown by and , respectively. Because of existence
of two candidates issues for negotiation , four negotiation scenario are possible:
o S1: both issues have a zone of agreement.
o S2: only issue A has a zone of agreement.
o S3: only issue B has a zone of agreement.
o S4: neither issue A nor issue B has a zone of agreement.
It is clear that among these four scenarios, in scenario S1 and S4, agents’ optimal agendas are the same,
and they consist of either issues or none of them. But, for two other agents in scenarios S2 and S3 negotiating
is useful only about one issue (A or B) for both sides, and optimal agendas are different. Optimal agendas of
two agents for two different cases in scenario S2 are shown below (In figure 1 and 2 which are related to part
a and b of this scenario , the utility boundaries for issues A and B are called and respectively and
horizontal axis show agent ’s utility and vertical axis shows agents ‘s utility for these two issues).
a) As it is clear in figure 1, issue B has positive utility for none of the agents (is placed in quadrant Q3).
Apparently, none of the agents accepts negotiating about B in this case and optimal agendas of two agents
just consist of issue {A}. 
b) Another case is that Issue B has positive utility for one of the agents (is placed in quadrant Q2 or
Q4). It is predictable that in this case, only the agent that receives positive utility from negotiating on B , adds
it to its optimal agenda. Therefore the optimal agendas will be in one of these two forms :  

200
IADIS International Conference e-Commerce 2009

Figure 1. Agents Utilities in Scenario S2 (Part a) Figure 2. Agents Utilities in Scenario S2 (Part b)
For example in figure 2 , only agent gains a positive utility from negotiating on issue B and the optimal
agendas are:

Definition: two agents optimal agendas in the above sample are {A,B} and {A} respectively, and the
common available issue in both agents optimal agendas is {A}, and we call {B} the peripheral issue of the
negotiation.
According to the mentioned definition, two agents in scenarios such as S4 have no common issue, and all
the issues in the agenda are peripheral issues. On the other hand, our proposed model of negotiation is mainly
based on applying common issues (we will see it later); therefore, it is useable for all the cases except
scenario S4. We should note that situations such as S4 are so rare–because most of the times at least one issue
(such as price which is a common issue for both agents) exists in the e-commerce negotiations. As a result,
this limitation of proposed model is not an important one, and traditional methods could be utilized if it was
necessary.

3. THE PROPOSED MODEL


Proposed model of this paper consists of five main steps which are discussed in this part and are traceable
using figure 3.
Step 1) At first existence of any issue in common agenda is assessed by the beginner. If no issue exists,
this negotiation is related to scenario S4 and is out of the scope of this paper. As a result, the negotiation will
be accomplished by using the old techniques if it is possible. Otherwise, if such issues exist , one side of the
negotiation which we call it I ( beginner ) , will choose one of these common issues (maybe the one which
can bring him more utility) and by giving his offer about the common issue to his competitor (J) , starts the
negotiation (bold arrow in figure 4).
Step 2) If J accepts the offer, negotiation will end successfully, otherwise J will compute its peripheral
issues utilities and analyzes whether there are one or more peripheral issues available in his optimal agenda,
that their entrance to the negotiation process, not only will compensate utility loss came through acceptance
of I’s offer about the common issue, but also will be the best possible case (competitive) .Then, relation 1
should be validated.
U total (t) ≥ u(t+1), u(t+2),…

In relation 1, U total(t) Is the total utility of agent j for issues that are under negotiation at time t (common+
peripheral issues) and u(t+1), u(t+2),… are next cases utilities gained through negotiation about the common
issue (our model is based on using common issues) at following times .The reason for this question is that
agents will never accept utility loss. Therefore, they must be assured that it is not possible to gain more utility
in future. On the other hand, due to concession rate principal, relation 2 is satisfied:
(2) u(t+1) ≥u(t+2) , u(t+3),…

201
ISBN: 978-972-8924-89-8 © 2009 IADIS

Considering relation 1 and 2, it is enough to compare the total utility with the utility gained through the
negotiation about common issue in the next time of negotiation and relation 3 be validated.

U total(t) ≥ u(t+1) )3(


And based on definition of U total(t) relation 4 forms:
(4) U total(t) = f pjj(t) +u(t)
Relation 3 and 4 result in formation of relation 5 :
(5) f pjj(t) + u(t) ≥ u(t+1)

Figure 3. Flowchart of the Model


Again, consider figure 4. In relations 4 and 5, fpjj(t) is sum of utilities, agent J ( first j in statement)
gained through its own peripheral issues (second j in statement) at time t . u(t) is the utility that agent J gains
through agent I’s offer about common issue ( I is proposer agent ). In all above relations, u(t+1) is the utility
that J gains through its own offer about common issue at the next time of the negotiation; since, it is his turn
to offer common issue at time t+1 . By considering uxy(t) as the utility, agent x gains through agent y’s offer
about common issue at time t, relation 5 converts to relation 6:
fpjj(t) + uji(t) ≥ ujj(t+1)
Then, it is enough to evaluate correctness of relation 6 in step 2.
Step 3) If peripheral issues that make relation 6 valid do not exist, by jumping to step 1 , agent J presents
its counter offer to I (figure 3 simplifies the model trace by name exchanging of I and J). Otherwise if such
issues exist, all possible sets of these issues will be sent from J to I at time t+1 (see figure 5). Then using an
argument-based method, agent J announces I , that it will accept his offer about common issue (cooperative)
If agent I agrees at least to one of the sent sets. Simultaneously, J will announce I , what would be his next
counter offer about common issue, if I does not accept his offer about common issue.

202
IADIS International Conference e-Commerce 2009

Figure 4. Negotiation Process Up to the Second Step Figure 5. Negotiation Process in Steps 3 and 4
Step 4) At first competitor agent (I) assesses J’s counter offer about common issue. If accepts it, after
Elimination of common issue from agenda, the negotiation will end successfully (This elimination is
essential for preventing of repetitive negotiation for the same issue in future negotiations). Otherwise, J’s
offers about peripheral issues are assessed and it is analyzed if the utility loss resulted from accepting J’s
offers plus the utility that J accepts to concede I about common issue, is equal or less than best next case (the
case that I’s next offer is accepted). Therefore relation 7 should be validated for agent I (figure 5) .
fpij(t) + uii(t) ≥ uii(t+2)
The reason for usage of uii(t) in the above formula is that ,when J at time t+1 announces accepting I’s
offer under conditions, he means I’s offer at time t (because relation 6 was assessed in that time) and
condition is that I accept one set of J’s offers about peripheral issues in that time too (fpij(t)) . Figure 5 shows
what is happening in this step and how relation 7 is analyzed. In this figure, bold arrow is where we are now
(time t+1) and shows the offer sent from J to I.
Step 5) If relation 7 is not satisfied, again two agents’ roles will replace and algorithm jumps to step 1.
But, if relation 1 is valid , ( after removing common issue and peripheral issues from agendas) the
negotiation will end successfully.
• Note: New negotiation processes may start by applying other common or peripheral issues.
It seems that where in relation 7, n>0 ( some peripheral issues exist) and utility loss of the common issue
between time t and t+2 , is greater than overall utility of peripheral issues at time t , the problem converges to
the solution quickly ; The reason of this matter will be analyzed in the following part .
At first , consider relation 7:
fpij(t) ≥ uii(t+2)- uii(t)
Then, based on the concession rate principal, right part of the above relation is negative and the left part is
too; because utility of I’s peripheral issues are negative for J to a certainty. Therefore, relation 8 comes from
relation 7:
(8) | fpij(t)| ≤ |uii(t+2)- uii(t)|

Figure 6. Final Task and Successful End of Negotiation


Figure 6, demonstrates relation 8 operation and optimal negotiation process. In this figure , symbol | |
shows passing some period of time which two agents didn’t reach agreement . Utility gained for agent I
through negotiation about common issue at time t and t+2 are represented by black circles and Uii(t) and

203
ISBN: 978-972-8924-89-8 © 2009 IADIS

Uii(t+2) symbols respectively. Utility gained through negotiation about peripheral issues at time t, is
represented by white circle and fpij(t) symbol. As it is illustrated In spite of negative utilities of J’s
peripheral issues for agent I (white circle), summation of these issues utilities (represented by Celtic cross)
plus common issue utility at time t is greater than utility gained through negotiation about common issue at
time t+2(Uii(t+2) ) . As a result, agent I accepts J’s offer about peripheral issues and negotiation ends
successfully and in a shorter time ( As it is clear , in situation except the above case, the negotiation process
continues) in addition to gaining higher utilities.

4. CONCLUSION
As we know, by considering the concept of concession rate and time limitations for two negotiators and
because of the fact that two sides of negotiation are usually unaware of each other deadlines, reaching
quicker agreement is discussed as a fundamental problem and is the focus of lots of researches. Therefore, in
this paper by applying peripheral issues and argument-based methods, a model of negotiation is presented
which is used for reaching faster agreement and gaining more utility in some occasions. By applying such a
competitive-cooperative method, this model uses the benefits of both competitive models (to increase utility)
and cooperative ones (to reach quicker agreements).
The proposed model can be improved in several main directions:
At first, the limitations of the proposed model can be analyzed in more details.
Secondly, the trust problem and the way of achieving it through the proposed model and how the agents
should evaluate their competitor’s trustworthy about peripheral issues can be analyzed in more details.
Thirdly, computational load of the proposed model can be assessed, specifically in situations where
various and huge amounts of offers about peripheral issues are proposed from one agent side to the other, and
the other has to figure out the utility of these issues in order to decide to refuse them totally or accept one at
least.

REFERENCES
[1] sabyasachi S. et al , 2005 . a bayes net approach to argumentation based negotiation. springer publication
argumentation in Multi-agent systems ، pp. 111-129.
[2] C. Sierra .et al , 1998 . a framework for argumentation-based negotiation . springer publication , intelligent agent IV:
4th international workshop on Agent theories , architectures and languages (ATAL-1997) , pp.177-192.
[3] S. Fatima .et al , 2004 . An agenda based framework for multi-issue negotiation . Artificial Intelligence Journal,
152(1):1–45 .
[4] N.C. Karunatillake1 .et al , 2005 . Argument-Based Negotiation in a Social Context . Proceedings of the four
international joint conference on Autonomous agents and multi-agent systems , pp.1331-1332.
[5] N.R. Jennings .et al , 2001 . automated negotiation: prospect, methods and challenges . international journal of
group decision and negotiation ,10(2):199.215.
[6] L. Amgoud and C. Cayrol , 2002 . a reasoning model based on the production of acceptable arguments. annals of
mathematics and artificial intelligence.
[7] A. Pirvanescu .et al , 2005. DEVELOPING A JADE-BASED MULTI-AGENT E-COMMERCE ENVIRONMENT.
Proceedings IADIS AC’05, International Conference on Applied Computing . Algarve, Portugal, pp. 425-432.
[8] S. Buffett and B. Spencer , 2005 , Learning Opponents' Preferences in Multi-Object Automated Negotiation , In
Proc. of the 7th International Conference on Electronic Commerce (ICEC'05), Xi’an , China , pp. 300-305.
[9] S. Fatima .et al , 2004 . Optimal Negotiation of Multiple Issues in Incomplete Information Setting . Proceedings of the
Third International Joint Conference on Autonomous Agents and Multi-agent Systems , vol. 3 , pp. 1080-1087.
[10] Rahwan I. et al , 2003 . Towards Interest-Based Negotiation . International Conference on Autonomous Agents
Proceedings of the second international joint conference on Autonomous agents and multi-agent systems , pp. 773-
780
[11] http://en.wikipedia.org/wiki/E-commerce

204
IADIS International Conference e-Commerce 2009

SELF-PRODUCT CONGRUENCE: IMAGE-PERCEPTIONS


OF POSTMODERN OUTDOOR-APPAREL CONSUMERS IN
E-COMMUNITIES

Jan Breitsohl
Bangor University

Marwan Khammash
Bangor University

ABSTRACT
The purpose of this paper is to revise the self-product congruence paradigm from a postmodern perspective. Self-product
congruity (SPC) has been studied in various contexts, yet its theoretical foundation (i.e. the actual and ideal self-image)
has not been challenged for the last decade, despite the widely-noticed transformation of global consumerism in
consumer behavior literature. Looking at outdoor-apparel consumption in e-communities, this paper aims to explore the
postmodern role of actual- and ideal self-product congruence theory. It is hypothesized that the actual SPC of those
engaged in outdoor activities (here named ‘enthusiasts’) is more closely related to performance attributes whereas their
ideal SPC relates stronger to fashion-appeals. For those fashion-conscious consumers not active in the outdoors (here
called ‘Fashionists’), the vice versa is expected. Findings may contribute to the current academic debate on viewing self-
product-congruence as a holistic (i.e. stereotyping) rather than multidimensional concept. Expected relevant results for
online/offline marketing practitioners are the necessary transformation of the current fashion-performance dichotomy in
outdoor apparel segmentation and positioning strategies. Additional managerial implications of postmodern consumption
behavior in e-communities are discussed.

KEYWORDS
Self-Product Congruence, Postmodern Consumption, Consumer Behavior, e-Communities, Outdoor-Apparel.

1. INTRODUCTION
Since it was first brought to the attention of consumer behavior analysts almost half a century ago (e.g.
Birdwell 1964), self-product congruence (SPC) has experienced an ongoing academic discourse.
At its core, SPC describes the match between a product’s image and a consumer’s self-image. Product
image is often used synonymously with brand personality or brand-image and describes a set of personality
attributes associated with a product (Aaker 1997). Self-image may simply be defined as the perception’s one
has about himself (Sirgy 1982), commonly equated with the term self-image. Whereas early studies focused
on a one-dimensional SPC paradigm, later research (e.g. Ross 1971) applied the established distinction
between one’s actual- (the way we see ourselves) and ideal self-image (the way we would like to be). Despite
a continuous expansion of the paradigm– proposing malleable, multiple or social self-images – the original
two-dimensional SPC framework has not been revised alongside the increasing depth of postmodern
marketing research (see Firat & Schultz 2001). Contemporary, postmodernist school of thought proposes a
fragmentation of one’s self within a pluralist society where self-images are dynamic, individualized and
under constant pressure to be expressed and communicated via ones consumption patterns. Thus, the multi-
dimensional conflict between one’s actual-and ideal self (Belk 1988) can be expected to have changed the
stereotypical perception of a product-user image as basis of comparison for self-product congruence.
In the context of the analyzed outdoor-apparel industry, this phenomenon is expected to occur for the two
industry segments currently served by outdoor-apparel companies: Outdoor- Enthusiasts who engage in
nature-activities and Fashion-consumers (Fashionists) who mainly wear the apparel in an urban environment.
Enthusiasts’ actual SPC can be expected to be based on physical activity and adventures in the outdoors,

205
ISBN: 978-972-8924-89-8 © 2009 IADIS

whereas Fashionists may rather focus on hedonistic and aesthetic appeals. However, the postmodern
environment may see Enthusiasts aspiring to be fashionable and hence to be integrated in urban aesthetics,
whereas a Fashionist’s ideal may revolve around escaping consumption pressures and seeking for authentic
nature experiences. Consequently, online marketers will be well-advised to revise their contemporary
segmentation profile- and positioning strategies.

2. PROBLEM STATEMENT
A dominant number of SPC scholars equate product-image with product user image, hence linking the
concept to ‘typical users’ or ‘prototypes’ (see for example Sirgy 1982; Sirgy et al. 1997). With regards to the
aforementioned potential transformation of the two-dimensional self-image paradigm, this stereotyping may
be a sign of marketing myopia, i.e. being short-sighted in terms of customer-orientation. The current
targeting strategies cultivate outdoor-apparel branding in a dominantly adventurous, extreme-sports context
or, more recently, with a fashion conscious, urban focus. Yet, the validity of such prototyping has not been
verified with regards to postmodern SPC considerations and may therefore necessitate a revision of the
current theoretical construct.

3. HYPOTHESIS
The central objective of this study is to analyze the validity of using stereotypical product user-images for
two dimensions (actual and ideal) of the SPC-model.
The outdoor apparel industry currently proposes two stereotypes: Performance-oriented nature
enthusiasts, who actually engage in outdoor activities (such as hiking, climbing etc.) and fashion-concerned
urban consumers who are not interested in product performance as they do not actively pursue those
activities. To analyze the strength of this typifying assumption, the following hypothesis is proposed:
H1: The relation between the Enthusiasts’ actual SPC and product-image attributes is stronger than the
relation between the Fashionists’ SPC and product-image attributes
Yet, these suppositions may only offer a fragmented picture of the multidimensional self-images these
two industry segments experience. Contemporary consumptions cultures are pluralistic and demand constant
symbolic interactionism in different contexts. Henceforth, an aspiration for ‘symbolic integration’ as much as
a perceived need for ‘authentic utilitarianism’ may result in ideal self-images that significantly divert from
actual self-images. Marketers’ linear assumptions of extreme adventures and fashion trends as ideal images
may require a revision that is encapsulated in the following hypotheses:
H2: The relation between the Enthusiast’s ideal SPC and product-image attributes is weaker than the
relation between the Fashionist’s ideal SPC and product-image attributes.

4. RESEARCH IMPORTANCE
The dilemma postmodern consumerism represents for marketers is to develop dynamic segmentation
strategies that coherently sketch increasingly heterogeneous target groups. The fragmentation of the self and
hyper-realities (e.g. conflicting role expectations or virtual worlds) in e-communities have made stereotyping
consumer clusters with clearly definable product images a highly complex, if not misguided task.
Investigating SPC from a postmodern perspective is expected to reveal that consumers are more self-
aware (Hogg et al 2000) and therefore clearly distinguish between the two SPC dimensions (actual and
ideal).This will further highlight the relevance of marketing approaches such as self-esteem advertising,
positioning strategies and celebrity endorsement precision
Equally important, scholars have found that SPC positively impacts on marketing variables such as brand
loyalty (Kressmann 2006), purchase intentions (Sirgy 1982) and brand preference (Aaker 1999).The psycho-
analytical nature of the SPC paradigm can be meaningfully related to any marketing factors and hence a

206
IADIS International Conference e-Commerce 2009

revision of its underlying principles – as is done in this paper with regards to actual and ideal SPC- paves the
way for valid future research projects.
In case of results contrary to the expected, this study may still indicate the importance of further research:
If a stereotypical segmentation for both actual and ideal SPC is supported, the investigation of whether
multiple selves equally hold for this conclusion will be of insightful use for scholars and marketers. Outdoor
apparel marketers will acquire a theoretical verification for their current targeting strategies which have
received little academic attention so far.

5. RESEARCH METHODS

5.1 Product Stimulus


The chosen product category is outdoor apparel, which will here be defined as functional clothing and
footwear for the nature-activities hiking, climbing, mountaineering, mountain biking and cross-country
running.

5.2 Sampling
This paper will use an online-survey research strategy. A brief introductory note regarding purpose, length
and significance of the survey together with a web-link to the survey will be placed in 2 e-communities:
Outdoorsmagic.com: (an Online forum focusing on outdoor activities - 20,000 members) and Xing.com:
Group ‘Outdoor’ (8,800 members interested in outdoor sports / activities)
Around 300 replies are anticipated of which 200 are hoped to be complete and usable. In case the respondent
rate is lower than expected, further online surveys will be conducted with a convenience sample of university
students. Online surveys are commonly used in SCP research and have generally produced sufficient sample
sizes in comparable studies (e.g. Krohmer 2007). No further demographic segmentation will be made.

5.3 Data Collection


Data will be gathered using questionnaires created with the survey-tool ‘Surveymonkey’ (see
surveymonkey.com). Participants will be asked to complete the questionnaire with regards to their own
outdoor apparel. The possession of outdoor apparel will also function as a required pre-selection condition
for the inclusion of a respondent in the data analysis.

5.4 Questionnaire Design


This paper will adopt Kressmann et al.’s (2006) SPC-questionnaire. The structure will, after a brief
introduction (purpose, structure, duration), run as follows:
Section 1 – Screening basic information regarding participants’ outdoor apparel consumption.
Section 2 – Personality attributes ‘How important is it for you that a person is.....?’ Participants are
required to indicate the personal importance put on 15 given personality facets (e.g. tough, up-to-date,
honest).
Section 3 – Actual self-image ‘To what extent do the following personality attributes apply to you? :’
Section 4 – Ideal self-image ‘Imagine how you would like to be. To what extent do the following
personality attributes apply to how you would like to be?’
Section 5 – Product image ‘Image your brand of outdoor apparel (e.g. The North Face) as a person.
Indicate the extent to which the following personality attributes apply to the typical user of the brand.’
This question originally read ’apply to the brand or the typical user of the brand’. Due to the
aforementioned doubts regarding the validity of equating product-image with the image of typical product-
users, ‘...the brand or...’ was excluded from the question. Answers may therefore only represent a common,
stereotyped product-user image and not individualistic perceptions of a desired (ideal) product image.

207
ISBN: 978-972-8924-89-8 © 2009 IADIS

The 15 items will be based on Aaker’s (1997) brand personality measure and used continuously for
section 2-5. Some items will be modified to reflect the postmodern outdoor apparel paradigm of this paper.
Answers will be measured using a 7-point-Likert-scale (from ‘completely unimportant’ (1) to ‘very
important’ (7).
Section 6 – Demographic information (asked at the end to avoid fatigue bias).
The questionnaire design approaches SPC by investigating self-image and product image separately for a
subsequent mathematical combination, a method long established in the SPC literature.

5.5 Data Analysis


Data will be analyzed using SPSS statistical analysis software. Self-product congruity scores (Dk) will be
measured using absolute differences scores between each brand personality rating and its correspondent self-
image ratings (actual and ideal) and will then be averaged across all personality attributes for each respondent
(Sirgy, 1982; Sirgy et al., 1991,1997):

n number of personality attributes (n=15), i personality attribute i (i=1...n), BPik brand rating along
personality attribute i for respondent k, SIik self-image (actual or ideal) rating along personality attribute i for
respondent k.
To separately investigate both actual and ideal self-congruity, this formula will be further operationalised
into the two indices. In addition, the personal importance of each brand personality item will be integrated
into each of the indices and the index multiplied with -1 so that the larger values would indicate high self-
congruity and vice versa (Kressmann 2006):

Wik importance rating of personality attribute i for respondent k; ASCik actual self-congruity (average
weighted congruity between brand personality and actual self-image) for respondent k; ISCik ideal self-
congruity (average weighted congruity between brand personality and ideal self-image) for respondent k;
ASIik actual self-image rating of personality attribute i for respondent k; ISCik ideal self-image rating of
attribute i for respondent k.

6. CONCLUSION & LIMITATIONS


Findings may contribute to the current academic debate on viewing self-product-congruence as a holistic (i.e.
stereotyping) rather than multidimensional concept. Expected relevant results for online/offline marketing
practitioners are the necessary transformation of the current fashion-performance dichotomy in outdoor
apparel segmentation and positioning strategies. However, cultural differences which may lead to different
SPC relationships (Quester 2000) are not taken into account. In addition, multiple selves beyond the used
two-dimensional SPC construct are also not taken into consideration. Finally, functional congruity, which is
shown to be dominated by SPC, (Sirgy 1991) is not included but may be a relevant area for further research
with regards to the performance attributes of outdoor apparel.

208
IADIS International Conference e-Commerce 2009

REFERENCES
Aaker, JL 1997, ‘Dimensions of brand personality’, Journal of Marketing Research, vol. 34, no. 3, pp. 347-356.
Aaker, JL 1999, ‘The malleable self: the role of self-expression in persuasion’, Journal of Marketing Research, vol. 36,
pp. 45-57.
Belk, RW 1988, ‘Possessions and the extended self’, Journal of Consumer Research, vol. 15, no. 2, pp. 139-168.
Birdwell, AL E 1968, ‘A study of the influence of image congruence on consumer choice’, The Journal of Business, vol.
41, no. 1, pp. 17-88.
Firat, Fuat A & Clifford J Shultz 2001, “Preliminary Metric. Investigations into the Postmodern Consumer,” Marketing.
Letters, vol. 12, no. 2, pp. 189- 203.
Hogg, MK, Cox, AJ, & Kneeling, K 2000, ‘The impact of self-monitoring on image congruence and product/brand
evaluation’, European Journal of Marketing, vol. 34, no. 5/6, pp. 641-666.
Kressmann, F, Sirgy, MJ, Herrmann, A, Huber, F, Huber, S, & Lee, DJ 2006, ‘Direct and indirect effects of self-image
congruence on brand loyalty’, Journal of Business Research, vol. 59, pp. 955-964.
Krohmer, H, Malaer, L & Nyffenegger, B 2007, ‘The fit between brand personality and consumer self: the importance of
actual versus ideal self for brand performance’, Proceedings of the AMA Winter Educators’ Conference Brand
Identity Communications, San Diego, USA, pp. 1-20.
Quester, PG, Karunaratna, A, & Goh LK 2000, ’Self-congruity and product evaluation: across-cultural study’, Journal of
Consumer Marketing, vol. 17, no. 6, pp. 525-537.
Ross, I 1971, Self-concept and brand preference’, Journal of business, vol. 44, no. 1, pp. 38- 50.
Sirgy, MJ 1982, ‘Self-concept in consumer behaviour: a critical review’, Journal of Consumer Research, vol. 9, no. 3, pp.
287-300.
Sirgy, MJ, Johar, JS, Samli, AC, & Caliborine 1991, ‘Self-congruity versus functional congruity: predictors of consumer
behavior’, Journal of the Academy of Marketing Science, vol. 19, no. 4, pp. 363-375.
Sirgy, MJ, Grewal, D, Mangleburg, Park, JO, Chon, KS, Claiborne, CB, Johar, JS, & Berkman 1997, ‘Assessing the
predictive validity of two methods of measuring self-image congruence’, Journal of the Academy of Marketing
Science, vol. 25, no. 3, pp. 229-241.

209
ISBN: 978-972-8924-89-8 © 2009 IADIS

EXTERNALIZATION OF VIRTUAL PROTOTYPES AS AN


E-COMMERCE SERVICE IN THE FASHION INDUSTRY

Carolin Löffler
Institute for Information Systems II,
University of Erlangen-Nuremberg, Lange Gasse 20, 90403 Nuremberg, Germany

ABSTRACT
Due to a lack of expertise on how to design appropriate support of product lifecycle processes more efficiently,
companies increasingly have difficulties identifying and using potentials for optimization.
This research project aims at the development of a new concept that generates added services for customers, suppliers
and partners and – at the same time – supports the product lifecycle management of a company. This approach is
illustrated by an action research project in the fashion industry.

KEYWORDS
E-Commerce, virtual prototyping, service management, product lifecycle management, added services.

1. INTRODUCTION
In today’s global business the big challenge for international companies is to generate a competitive
advantage and growth potential. Many markets are nearly saturated and for reasons of economy products are
standardized and similar in quality and technology between the competitors [Welge and Holtbrügge 2006].
Due to the intensive competition on international markets, it is getting more and more difficult for companies
to distinguish themselves with their core products and to safeguard market share in the long run [Piller 2000].
Product-supporting services – so called „added services“ – help companies to differentiate their product
range from the competitor´s and to reach a secure market position by offering integral product packages
[Cassack 2005]. Despite this knowledge there is no strategic development of product-supported services.
Most added services are developed only on customer inquiry [Storey and Kelly 2001]. The customer-oriented
approach deals with the client’s expectations and individual conveniences. First the customer’s special
requirements are identified and then the single elements of service on a customer-specific basis are
developed. Bruhn (2001) states, that this is the best way to gain business success. However, many added
service rollouts fail despite the knowledge that they would generate a competitive advantage and customer
loyalty [Hemetsberger and Füller 2006]. The crucial point is that for the decision maker in a company, the
organizational efficiency is more important than customer-oriented development of services. When it turns
out, that a new customer-oriented added service is too costly, there is less to gain for the company
[Holtgrewe and Kerst 2002].
This research project “service externalization” focuses on the development of new added services for e-
commerce based on IT-driven services within the product lifecycle management.

2. CURRENT STATE OF RESEARCH


The term “service externalization” is used by Meyer and Noch in 1992: „With externalization you can create
an external service out of an internal one“ [Meyer and Noch 1992, Noch 1995]. In later publications Meyer is
talking about externalization only as transfer of manpower from the service producer to the consumer [Meyer
2004]. Lorenz-Meyer (2004) picked up on the primary idea of service externalization in terms of Meyer and

210
IADIS International Conference e-Commerce 2009

Noch and distanced himself from Corsten´s approach1. But he does not address to how an externalization
works and which aspects should be considered. He simply gives the hint, that services applied in human
resources and finance should be examined focusing costs and competences and to what extent the services
are appropriate for an external offering [Lorenz-Meyer 2004].
The topic service externalization as a new approach to develop services is only analyzed shortly in the
literature. This research project helps to close the identified research gap by analyzing the approach more
precisely with the help of an action research project in the fashion industry.

3. SERVICE EXTERNALIZATION
Service Externalization (ServEx) is a concept within service management. It marks a systematic approach to
identify high potential internal services within the product lifecycle of a company and to offer those services
also to other departments, to customers and suppliers of a company.
Compared to the traditional customer-oriented view the concept of service externalization describes a
completely different approach: Instead of an outside-in process (starting from the customer) we talk about an
inside-out process, which can be distinguished in an internal (within the company) and an external (to the
partners of the company) externalization process (Figure 1):

Figure 1. Service Externalization


Internal externalization process: In service externalization within the company, new services based on an
internal one are developed. There is the possibility to modify the original service into different specifications.
It can be either partly or entirely changed, modified into a new service and be either appointed for the same
or a different function. Apart for the previous internal users, the service can be used in other parts of the
company as well. The application of the new service is therefore only limited to the company.
External externalization process: Analog to service externalization within the company - service
externalization can also be applied to the partners of the company. The result of this procedure is a new
service for customers, suppliers or partners.

1
Corsten´s approach of service externalization means the integration of an external factor (the customer) into the service compilation
process. This procedure aims at saving costs with customer integration. Customer integration in these terms means transferring parts of
the goods and services process to the consumer [Corsten 2000].

211
ISBN: 978-972-8924-89-8 © 2009 IADIS

4. VIRTUAL PROTOTYPES AS A SERVICE IN THE FASHION


INDUSTRY
Virtual prototypes as an internal service are mainly used for product development in the fields of industrial
engineering. Experts hope to reduce the product development time [Niesing and Miller 2001]. In a previous
project we introduced virtual prototypes as a service also to the product development process of a fashion
manufacturing company.
In the following action research project we first take a look at virtual prototypes in the product
development processes in the fashion industry and figure out, if virtual prototype services can be applied to
other departments of the fashion manufacturing company. In the second step we take a look at the
externalization potential of virtual prototype services towards the partners of the company.

4.1 Research Method


The study reported here was designed to identify whether virtual prototyping can be integrated successfully
in the product development process in the fashion industry. Furthermore it shows how to integrate virtual
prototypes into other departments of the company and finally how to externalize parts of the solution as
added services to customer, supplier or partner.
The chosen research methodology is action research. A team of researchers worked for one year together
with the IT innovation team of the fashion manufacturing company.
The chosen company operates in the sporting goods manufacturing industry, has about 30.000 employees,
and a 10 billion € turnover. For the study 15 managers and experts were interviewed and we took part in 8
workshops about 3D technologies.

4.2 Virtual Prototypes


A virtual prototype is a computer based illustration of a future product [Cassack 2006]. The conventional
designs on paper are the basis for likewise two dimensional computer based CAD drawings or technical
designs. On this foundation the perspective is expanded to the third dimension that makes a 3D
demonstration possible and let object seem real.

4.3 Application in the Product Development Process


On this basis LaBat and Sokolowski (1999) summed up the product development process as following: At
the start of the product development is the “problem definition and research” phase. After the target group for
the range has been decided upon, the new properties and requirements for functions and design are defined
and determined. Thereafter follows the “creative exploration” phase. This includes the idea generation and
the conceptual design, design changes, prototype development and the rating of ideas and prototypes. From
the existing product ideas, those are selected that eventually should hit the market in the “implementation
phase”. Among others the production costs and the sequence of production is determined as well as a last fine
tuning of the product is carried out.
Through the application of virtual models, the development process can be speeded up, because physical
samples are omitted. For the creation of virtual prototypes new internal costs emerge, which can be offset
through the rationalization potential of 3D models.
In the first design examination meeting, virtual models allow for a better visualization of the designed
products. Coloring, material properties and cut can be illustrated more realistically than a print out or sketch
by the designer. That way design aberrations that normally are only discovered with physical samples in later
phases can be discovered. A further advantage is that changes can be directly made to the 3D model.
Therefore new physical samples for the verification are no longer needed and sample rounds are reduced.
The waiting time of up to 3 weeks that result through the production and shipment of the samples is omitted.
Within a short time the designer can create many variations directly on the 3D model and receive a new
visual impression in real time.

212
IADIS International Conference e-Commerce 2009

4.4 Service Externalization


Company Services
Sales representatives usually sell their products to retail using a product catalog and the help of physical
samples. This process takes places around six to eight weeks prior to the official launch of a new range.
Large sports goods producers such as adidas AG or Nike INC have two main catalogs per year in which
several thousand products are presented.
Large fashion companies partly have more than 30.000 pieces of clothes in their selection. When creating
pictures for the pieces of clothes there are generally four different approaches:
Either the collection is photographed using with models or two dimensional sketches are made. The
photography allows for a realistic illustration of the range (e.g. fitting) and ensures a consistent
demonstration format in the catalog. For this method a physical sample is needed for every piece of clothing.
Because of the time intensive production of the samples and the photography of the range a delay in the
catalog time table is possible. The catalog sketches that are created on the basis of the product description
and the preliminary designs can already be produced without a physical sample. These pictures only
communicate an incomplete impression of what the product will look like later. Material properties and the
surface can only be illustrated in a limited manner.
On the base of 3D models it is possible to generate virtual product photos. Therefore the catalog’s picture
requirements (angle, shadows, file format) need to be precisely specified. These settings are managed in the
software and with the press of a button or fully automatically catalog pictures can be created. This procedure
combines the advantages of sketch and photography. High quality catalog pictures can be created without the
time intensive use of physical samples.
Customer Services
The sale of fashion items is almost exclusively transacted through business customers. These business
customers can for example be sports item dealers (e. g. Footlocker) or large department stores (Marcy´s,
Wal-Mart). Usually these create the range illustrations for their own catalogs. This is normally because
suppliers prefer an individual illustration style and use these for advertising reasons, e.g. in catalogs.
Therefore the arrangement of the products, perspectives and background can vary. The in-house catalog
created is cost and time intensive and product can party only be advertised and sold with a delay.
Company can offer its B2B customers individualized product pictures for their catalogues, therefore only
a specification of the customer’s requests concerning the illustration style of the products in the catalog and
its implementation into the system is necessary. If the customer is furthermore offered an interface, the
settings of every product can be individually changed. The creation of private avatars with pre defined
measures is also conceivable. The business customer can from then on separately configure the type of
illustration (e.g. with or without avatar) for every item.
Supplier Services
Virtual prototypes can be used for material and supply planning. The suppliers can in an early product
development phase be informed in detail about the later product, so these can ideally order, select and adjust
their materials. When creating the samples it is often the case that these don’t match the planned products.
This can have different reasons: The supplier for example adopts a wrong fit or the product description isn’t
precise enough. If a virtual model is available at an early stage these mistakes can be reduced because the
manufacturer gets a clear picture of the future product.
Partner Services
Normally the external partner’s salesman takes all the available items of a product in all available colors
with him during a customer call (e.g. sports item dealer, department stores). If instead the salesman is
additionally equipped with virtual prototypes, the so called virtual sales man samples, the number of physical
samples is considerably reduced. It is sufficient to take on only a single physical exemplar. With the help of a
note book and a high-grade projector all models in their available color combinations can be presented to the
customer. A physical sample is though still need, because the haptic cognition still plays an important role in
the sales process.

213
ISBN: 978-972-8924-89-8 © 2009 IADIS

5. CONCLUSION AND FURTHER RESEARCH


This research project has illustrated a procedure that shows that virtual prototype services in the fashion
industry can be successfully applied in the product development process. Through externalization virtual
prototyping can create additional value adds to the original intended use.
In the further research, acceptance analyses were performed and a change management concept
developed that prepares all parties concerned for the introduction of virtual prototypes. Likewise the
transferability to other companies is analyzed and an ‘externalization road map’ of virtual prototype services
developed.

REFERENCES
Bruhn, M., 2001. Relationship Marketing. Das Management der Kundenbeziehungen. München, Vahlen.
Cassack, I., 2006. Prototypengestützte Kosten- und Erlösplanung für produktbegleitende Dienstleistungen. Wiesbaden,
Gabler.
Corsten, H., 2000. Der Integrationsgrad des externen Faktors als Gestaltungsparamenter in Dienstleistungsunternehmen.
Voraussetzungen und Möglichkeiten der Externalisierung und Internalisierung. In M. Bruhn and B. Stauss,
Dienstleistungsqualität. Konzepte - Methoden – Erfahrungen. Wiesbaden, Gabler, pp. 145-168.
Hemetsberger, A. and Füller, J., 2006. Qual der Wahl - Welche Methode führt zu kundenorientierten Innovationen? In H.
H. Hinterhuber and K. Matzler, Kundenorientierte Unternehmensführung, Kundenorientierung -
Kundenzufriedenheit – Kundenbindung. Wiesbaden, Gabler, pp. 399-433.
Hotgrewe, U. and Kerst, C., 2002. Zwischen Kundenorientierung und organisatorischer Effizienz - Callcenter als
Grenzstellen. Soziale Welt, Vol 53/2, pp. 141-160.
LaBat, K. L. and Sokolowski, S. L., 1998. A three-stage design process applied to an industry university textile product
design project. Clothing and Textiles Research Journal. Vol. 17/1, pp. 11-20.
Lorenz-Meyer, D., 2004. Management industrieller Dienstleistungen. Ein Leitfaden zur effizienten Gestaltung von
industriellen Dienstleistungsangeboten. Wiesbaden, Gabler.
Meyer, A., 2004. Dienstleistungsmarketing. Impulse für Forschung und Management. Wiesbaden, Gabler.
Meyer, A. and Noch, R., 1992. Dienstleistungen im Investitionsgütermarketing. Das Wirtschaftsstudium, Vol 12, pp.
954-961.
Niesing, B. and Franz, M., 2001. Schneller, schneller, Virtual Prototyping. Retrieved 07 29, 2008, from Fraunhofer
Institut: http://www.fraunhofer.de/archiv/magazin/pflege.zv.fhg.de/german/publications/df/df2001/mag3-2001
_42.pdf
Noch, R., 1995. Dienstleistungen im Investitionsgüter-Marketing. Strategien und Umsetzung. München, FGM-Verlag.
Piller, F., 2000. Mass Customization. Ein wettbewerbsstrategisches Konzept im Informationszeitalter. Wiesbaden,
Gabler.
Storey, C. and Kelly, D., 2001. Measuring Performance of New Service Development Activities. The Service Industries
Journal, Vol 21/2, pp. 71-90.
Welge, M. K. and Holtbrügge, D., 2006. Internationales Management - Theorien, Funktionen, Fallstudien. Stuttgart,
Poeschel.

214
IADIS International Conference e-Commerce 2009

BUILDING FINANCIAL CAPABILITY VIA THE INTERNET

Tanai Khiaonarong
Westminster Business School, University of Westminster
35 Marylebone Road, London NW1 5LS, United Kingdom

ABSTRACT
This paper introduces a nodality framework to help assess financial capability building websites. First, it outlines the
major driving forces behind financial capability building and reviews the use of electronic delivery channels. An
analytical framework based on nodality as a tool in delivering e-government services is presented. We then present an
illustrative case of the Financial Services Authority which leads the national strategy for financial capability building in
the United Kingdom. We conclude by identifying some research issues.

KEYWORDS
Financial capability, Internet, e-government, nodality.

1. INTRODUCTION
Financial capability development (also known as financial literacy and financial education) has been a major
challenge faced by many countries around the world. Financial services have brought with them both
opportunities and risks for a wide range of stakeholders including, international organisations, governments,
central banks, financial regulators, financial institutions, non-profit organisations, consumers, and taxpayers.
This challenge has become more immediate after the US sub-prime mortgage crisis where the lack of
understanding in opaque financial instruments and their inherent risks led to a global credit crisis.
The need to improve financial capability has therefore been of paramount importance and this has been
driven by three major forces (OECD, 2005a, 2005b; Braunstein and Welch, 2002). First, financial products
and services have become more complex and varied in number, which could pose risks to consumers,
financial institutions, and above all, financial stability if not well understood or managed. While financial and
technological innovation has accelerated with financial liberalization and deregulation, there remains a
regulatory catch-up challenge in many countries where adequate risk management and consumer
understanding of financial issues could be compromised. Second, aging societies, through the retirement of
the baby boom generation and increases in life expectancy, would put pressure on public retirement
programs. In this connection, the trend of changing pension arrangements from defined benefits to defined
contributions has shifted risks from the provider to the worker as retirement income is no longer guaranteed
but based on contribution rates and investment decisions made by a worker during his working life. And
third, financial understanding among consumers was found to be low in a review of financial literacy surveys
in twelve OECD countries.
The range of educational facilities and services to support financial capability building can be varied as
found in a recent study of central bank economic and financial literacy programs (Gnan, et al., 2007; Fluch,
2007). This includes money museums, open house programs, visitor centers, guided tours, training facilities,
special seminars, competitions, fund raising events, and e-education resources. In this paper, we focus on the
use of e-education resources, particularly the use of the Internet. For example, this has included the
following: a global clearinghouse on financial education information, data, resources, research, programs and
news around the world (OECD, 1999); e-government services (Australian Government, 2009; FSA, 2009;
U.S. Financial Literacy and Education Commission, 2009); on-line study sites on monetary and financial
matters with an interactive monetary policy game (Bank of Finland, 2009); and financial education material
posted on video sharing websites like www.youtube.com (European Central Bank, 2009).

215
ISBN: 978-972-8924-89-8 © 2009 IADIS

This paper aims to develop a framework for the analysis and assessment of financial capability building
websites in the following section. We provide an illustrative case of the United Kingdom where one of the
world’s largest international financial center is located and where a National Strategy for Financial Capability
is led by the Financial Services Authority (FSA, 2004; 2006a; 2006b). We conclude with a discussion of
further research issues, particularly on the use of structural and user metric analyses.

2. NODALITY FRAMEWORK
We adopt the concept of nodality – the property of being at the centre of social and informational networks -
as a tool for assessing financial capability building on the Internet. Nodality has been a concept used in the
study of governments and has more recently been applied to the analysis of e-government (Hood, 1983;
Hood and Margetts, 2006; Escher et al., 2006; National Audit Office, 2007). In their study of the nodality of
digital government focused on three foreign office websites (Australia, UK and US), Escher et al. (2006) note
five dimensions where nodality can be measured as follows: 1) Visibility (likelihood of an organization being
found from a search engine); 2) Accessibility (ease of obtaining information); 3) Navigability (ease of
moving around site and finding related content); 4) Extroversion (number of other sites and sources of
information to which users are directed once they are there); and 5) Competitiveness (competing against
other sites which provide similar information). They found high accessibility and competitiveness for the
Australian website, and also high visibility, extroversion and navigability for the UK website.
To quantify the above dimensions, we develop some structural metrics (measure properties such as the
average distance between two random pages and the interconnectedness of sites) to help assess the property
of financial capability building websites, while a possible data collection method would be through web
crawling (eg Nutch program). Table 1 outlines the nodality framework.
Table 1. Nodality Framework
Name Description Interpretation Nodality Indicator
Inlink analysis How many links are there into High numbers of in-links will raise Visibility
the site? site’s visibility on search engine
Which types of domain are listings – making the site more
linking to the sites – visible to users of external search
governmental, commercial or engines
voluntary and from which
countries?
Inlink analysis Are the links generic (to home ‘Deep links’ returned by search Accessibility
page) or specific (to particular engines tend to be more useful – as
topic on site) – ‘deep’ links take users directly to information
required rather than depositing
them at home page where they
must navigate to find what they
want – but note deep links more
likely to break
Directed average distance Average length of all shortest Indicator of how easy it is to Navigability
path navigate the site. Smaller values
indicate it is easier to reach other
relevant pages
Outlink analysis How many links to external High numbers of external links Extroversion
sites are there? Which type of indicate an ‘extroverted’ rather than
domains (governmental, ‘introverted’ site which leads
commercial or voluntary) do citizens to a wide range of further
sites link? information, enriching the
interaction
Comparative analysis How does the website Possible indicator of reliability of Competitiveness
compare with other similar information and reputability of
websites? service provider
Source: Adapted from Escher et al. (2006, pp. 10-11)

216
IADIS International Conference e-Commerce 2009

3. CASE STUDY: FINANCIAL SERVICES AUTHORITY


The Financial Services Authority (FSA) is the United Kingdom’s financial regulator and acts as an
independent non-governmental body, given statutory powers by the Financial Services and Markets Act
2000. It forms part of the broader tripartite framework with Her Majesty’s (HM) Treasury and the Bank of
England in the oversight of financial stability in the UK (Bank of England, 2009). The FSA leads the national
strategy for financial capability building and works to improve the public’s understanding of personal
finance. As of December 2008, the FSA has reached 5.6 million people out of its target of 10 million. A
major part of this strategy is the use of the Internet to help disseminate electronic materials on financial
education.
This study builds on earlier exploratory, baseline, financial education evaluation, and behavioral
economic studies (FSA, 2005; 2006c; 2008a; 2008b). In particular, it seeks to evaluate the effectiveness of
on-line tools in financial capability building programs in line with follow-up action plans by the UK
government (HM Treasury and FSA, 2008a), financial capability intermediate targets (2008-9) and overall
targets (2006-11) (FSA, 2008c).
We aim to apply the nodality framework to assess the on-line presence of the FSA website
(www.fsa.gov.uk). Through structural metric analysis using a web crawling tool (eg. Nutch), we seek to
analyze the website in terms of its visibility, accessibility, navigability and extroversion. Moreover, we aim
to assess the on-line presence of similar financial capability building websites elsewhere to explain the fifth
dimension – competitiveness. Table 2 outlines the country, departments and corresponding websites where
there is a financial capability building program. Although each country program is unique, it helps illustrate
progress towards financial capability building within the OECD group of countries.
Table 2. Financial Capability Building Websites
Country Department Domains
Australia Financial Literacy Foundation, Department of Treasury http://www.understandingmoney.gov.au/
Canada Consumer Education Program and the Financial Literacy http://www.themoneybelt.gc.ca/
Initiative, The Financial Consumer Agency of Canada
United States Financial Literacy Education Commission, US Treasury http://www.mymoney.gov/
Office of Financial Education

4. CONCLUSION AND FURTHER RESEARCH


Going forward, we seek to crawl the FSA website using the Nutch program to analyse it structural metrics.
We also plan to conduct a similar analysis of similar government websites in Australia, Canada and the
United States. This would help assess practices in countries that have well established financial capability
building programs, which may be further support the international principles and practices for promoting
financial education and awareness (OECD, 2005a, 2005b). Lessons learned from this research may also
contribute towards work on financial inclusion and international development. Although this research may be
limited to government websites, financial capability building websites extend beyond that, and may include
websites provided by the private sector and civil society. Thus, it would also be interesting to analyse how
the nodality framework, which has the property of being at the centre of social and informational networks,
could be applied in a non-governmental context. Nevertheless, the study does have limitations as it focuses
on outreach via the Internet. Other deliver channels, particularly partnership programs with various
stakeholders such as schools, young adults, new parents, higher educations and workplaces, do exist and can
be very effective. This is noted in the study where applicable to provide an overall view of financial
capability building.

217
ISBN: 978-972-8924-89-8 © 2009 IADIS

REFERENCES
Australian Government (2009) Welcome to the Understanding Money Website. Available from:
http://www.understandingmoney.gov.au/ [Accessed date: 22 January 2009].
Bank of England (2009) Memorandum of Understanding between HM Treasury, the Bank of England and the Financial
Services Authority. Available from: http://www.bankofengland.co.uk/financialstability/mou.pdf [Accessed date: 22
January 2009].
Bank of Finland (2009) Bank of Finland On-line Learning Package. Available from: http://www.euro.fi/e/index.html
[Accessed date: 22 January 2009].
Braunstein, S., and Welch, C. (2002) Financial Literacy: An Overview of Practice, Research, and Policy. Federal Reserve
Bulletin, November, 445-457.
Escher, T., Margetts, H., Petricek, V., and Cox, I. (2006) Governing from the Centre? Comparing the Nodality of Digital
Governments, Prepared for delivery at the 2006 Annual Meeting of the American Political Science Association,
August 31 - September 4, 2006.
European Central Bank (2009) European Central Bank Educational Video. Available from:
http://uk.youtube.com/watch?v=7sjQ7ly2NDU [Accessed date: 22 January 2009].
Financial Services Authority (FSA) (2004) Building Financial Capability in the UK: the Role of Advice, July.
_____ (2005) Measuring Financial Capability: An Exploratory Study, Consumer Research 37, Prepared for the Financial
Services Authority by Personal Finance Research Centre, University of Bristol, June.
_____ (2006a) Financial Capability in the UK: Delivering Change, March.
_____ (2006b) Financial Capability in the UK: Establishing a Baseline, March.
_____ (2006c) Levels of Financial Capability in the UK: Results of a Baseline Survey, Consumer Research 47, Prepared
for the Financial Services Authority by Personal Finance Research Centre, University of Bristol, March.
_____ (2008a) Evidence of Impact: An Overview of Financial Education Evaluations, Consumer Research 68, Prepared
for the Financial Services Authority by Personal Finance Research Centre, University of Bristol, July.
_____ (2008b) Financial Capability: A Behavioural Economics Perspective, Consumer Research 69, Prepared for the
Financial Services Authority by the London School of Economics, July.
_____ (2008c) Business Plan 2008/9, February.
_____ (2009) Building Financial Capability in the UK. Available from: http://www.fsa.gov.uk/financial_capability/
[Accessed date: 22 January 2009].
Fluch, M. (2007) Selected Central Banks’ Economic and Financial Literacy Programs. In: Monetary Policy & the
Economy Q3/07, 85-103, Oesterreichische Nationalbank, Vienna.
Gnan, E., Silgoner, M.A., and Weber, B. (2007) Economic and Financial Education: Concepts, Goals and Measurement.
In: Monetary Policy & the Economy Q3/07, 28-49, Oesterreichische Nationalbank, Vienna.
HM Treasury and Financial Services Authority (FSA) (2008) Helping you make the most of your money: a joint action
plan for financial capability, July.
Hood, C. (1983) The Tools of Government. Macmillan, London.
Hood, C, and Margetts (2006) The Tools of Government in the Digital Age. Palgrave, London.
National Audit Office (2007) Government on the Internet: Progress in Delivering Information and Services Online,
Report by the Comptroller and Auditor General, July 13.
Organisation for Economic Co-operation and Development (OECD) (2005a) Recommendation on Principles and Good
Practices for Financial Education and Awareness. Recommendation of the Council., July, Paris.
_____ (2005b) Improving Financial Literacy: Analysis of Issues and Policies, Paris.
_____ (2009) International Gateway for Financial Education. Available from:
http://www.oecd.org/pages/0,3417,en_39665975_39666038_1_1_1_1_1,00.html [Accessed date: 22 January 2009].
U.S. Financial Literacy and Education Commission (2009) MyMoney.gov. Available from: http://www.mymoney.gov/
[Accessed date: 22 January 2009].

218
IADIS International Conference e-Commerce 2009

A CUSTOMER FOCUSED E-COMMERCE APPROACH


USING PURCHASING WEB PATTERNS

Markus Weinmann, Yvonne Gaedke


Technische Universität Carolo-Wilhelmina zu Braunschweig, Institut für Wirtschaftsinformatik, Abteilung
Informationsmanagement, Mühlenpfordtstrasse. 23, 38106 Braunschweig

ABSTRACT
Why do some users leave web shops during their buying process - and others do not? In this paper, it is assumed that this
behaviour depends on the "electronic readiness" of people and on specific situations of customers during the buying
process. This paper will describe the approach to analyse barriers to e-commerce adoption by clustering customers
according to their e-commerce readiness and by taking into consideration individual situations. The idea is to develop
purchasing web patterns to support customers during the e-commerce process.

KEYWORDS
e-commerce readiness, psychology, web pattern, purchase process, customer focused, situation

1. MOTIVATION
The e-commerce revenue in Germany of the year 2008 is 19 % higher than in the year 2007. The study in
2008 with the GFK WebScope-panel shows that online consumers differ within their online buying
behaviour [GFK 2009]. What could be done to keep potential customers from getting lost during a buying
process? Support is missing and the reusability of support systems is not secured. People differ in their
readiness to use the web. There are different aspects and individual situations which influence the
unwillingness to buy online. One possibility might be to standardize the e-commerce process. But is this
possible? In order to understand the fact that people are leaving the website during a buying process, it is
necessary to identify the media behaviour and the situations that occur during that process. Consequentially it
will be possible to develop purchasing web patterns which could be customized for the different types of
potential customers.

2. E-COMMERCE READINESS INDEX (ECRI)


The technology provided for e-commerce processes is already developed - but are the people ready for
e-commerce? The first step in this project should be to find an index which explains the level of people’s
electronic-commerce readiness. For software engineering it is already common sense to distinguish between
experienced and less experienced users. Non experienced users need more assistance, however the
professional users are more function orientated [Löffler 1989]. A study of Forrester (2007) among 4000 US
citizens regarding the readiness of people to use web 2.0 tools classified the more experienced users in five
types: the "viewers", who participate passively and do not create content; the "participators", this group uses
social networks; the "assemblers" use RSS and social bookmarks; the "detractors" commentate and write
product descriptions; the "makers" create the content. According to Charlene Li (2007), it is possible to
motivate people to get into the next user category [quoted by Ecin 2007]. So it is important to understand
how people will change their user behaviour and make them ready for e-commerce.

219
ISBN: 978-972-8924-89-8 © 2009 IADIS

2.1 Literature Review


Although most of the acceptance and behavioural theories are focused on one specific application or
innovation (e.g. mobile banking), for the e-commerce readiness research it is assumed that these models are
also alienable to e-commerce processes in general. The e-commerce process is understood as a new
technology although it is not an innovation.
Before being able to define an index describing the level of users’ readiness to purchase online, it is
important to review existing literature. Molla and Licker (2005) summarized the literature and introduced
five dominant perspectives relevant to the e-readiness research: the technological imperative perspective, the
managerial imperative perspective, the organizational imperative perspective, the environmental imperative
perspective and the interactionism perspective. The technological imperative models, such as the diffusion of
innovation (DOI), the technology acceptance model (TAM) and the unified theory of acceptance and use of
technology model (UTAUT) meditate the complexity, compatibility, relative advantage, task conformity,
trust, experiences, self-efficacy, ease of use and usefulness as key variables to adopt a special innovation
[Molla and Licker 2005, Venkatesh et al. 2003]. The managerial imperative model examines the innovation
adoption by the management, it looks at the innovativeness, the commitment and the IT background of
managers. The organizational imperative models survey the structure of a company. There might be different
behaviours and attitudes due to functional differentiation, risks, innovativeness or the like. Environmental
imperative models take into consideration external influences, which cannot be changed and are important to
decision makers. Why some innovations are successful within a certain company and some are not could be
explained by the interactionism model, which provides the base for the perceived e-readiness model (PERM).
Hereby the key indicators are the perceived organizational e-readiness (POER) and the perceived external
e-readiness (PEER), which determine the e-commerce adoption [Molla and Licker 2005]. Lai et al. (2008)
found four key constructs to measure the employee readiness for e-business (EREB). These are: benefit,
security, collaboration and certainty [Lai et al. 2008]. The literature review shows that there are several
different influence factors for adopting new technology and using the technology. This project’s aim is to
classify user groups by their e-commerce readiness level and then to develop a model explaining e-commerce
adoption and to find the e-commerce readiness index (ECRI) of people. It is assumed that the ECRI is in the
online context an additional variable which influences the intention to buy online and the actual purchasing
behaviour as it has the perceived control in the theory of planned behaviour [Ajzen 1991]. It is assumed that
people with a low ECRI have a low intention to buy online, whereas people with a high ECRI should have a
strong intention to purchase online. To proof this coherency it is important to find a valid ECRI. As the ECRI
should apply to everyone and not only to employees as the EREB does, it will be modified by further factors
taken from the five dominant perspectives. In addition to these factors the personal motivation and self-
efficacy are also expected to have an influence on the ECRI. It is supposed that there will be three ECRI
clusters: the professionals who have the highest ECRI, the advanced users and the beginners with the lowest
ECRI (see Fig. 1).

ECRI: Pro

ECRI: Advanced

ECRI: Beginner

Figure 1. Clustering Customers Due to their E-commerce Readiness Index (ECRI)

2.2 Approach and Methods


To identify relevant factors for this study, a focus group including university professors, PhD students,
students and experts will be interviewed and asked to modify the proposed item list. According to that
modified list a questionnaire will be developed. To guarantee representative results the sample N>300 is
aspired. The survey will be sent both online and offline. This decision is based on advantages and
disadvantages of an online questionnaire mentioned by several researchers [Sarodnick and Brau 2006].

220
IADIS International Conference e-Commerce 2009

The advantages of an online questionnaire are cost-efficiency, a lower error ratio, the wider group of
potential participants and anonymity. One of the most relevant disadvantages is that computer experienced
people are more familiar with an online survey than less experienced. This might have an impact on the
results as the risk to reach only experienced people, which might be e-readier than others, is high. Therefore
there will be also the possibility to answer the questions offline. A cluster analysis will be conducted to
classify people according to their ECRI. To verify that the ECRI has an influence on the intention to buy and
on the actual online purchase behaviour, potential users will be asked to complete a short questionnaire to
define their cluster affiliation and then they will be confronted with a real online purchasing situation in a
usability laboratory. It is supposed that there are more factors which have an influence on the actual online
buying behaviour. Thus based on the behavioural and acceptance models, a causal model will be developed
which can explain the factors that have an influence on purchasing online. One of the factors will be the
ECRI. But even if people are familiar with the internet and e-commerce, it can happen that they quit the
purchasing process. Users might be in a bad mood or in a hurry or stressed by something that deters them
from finishing the purchasing process. So in chapter 3 other factors such as emotional conditions and
situations of people will be taken into consideration and a possibility to support people during the
e-commerce process will be introduced.

3. PURCHASING WEB PATTERNS


To assure that the right reasons why people interrupt the purchasing process will be identified, the customers’
emotional conditions and situations have to be characterized [Belk 1975]. Once they are characterized, it is
possible to classify people’s behaviour in different situations. With this information it should be possible to
help and support customers during different buying stages. The aim is to detect certain behaviour patterns of
people during a purchasing process or to classify them according to their behaviour in order to be able to
introduce "purchasing web patterns". These patterns identify the customer’s situation during the purchasing
process and support him with the perfect pattern depending on his individual current situation. The main
issue of the purchasing web patterns is the reusability and standardization.

3.1 Literature Review


Before defining purchasing web patterns, it is important to know the customer’s needs, his choice behaviour
and his current situation in order to place them at the right time [Ho et al. 2008, Maslow 1943]. Situations
can vary in the different buying stages, which can be adopted form different models like AIDA or DAGMAR
(see Fig. 2). These models have to be modified for e-commerce [Colley 1961, Howard and Seth 1961, Strong
1925]. As Woodworth mentioned in his Stimulus-Organism-Response-Model, people are reflecting a
stimulus like a situation and react in different ways [Woodworth 1928]. To get the customer involved and to
understand his reaction in the different buying stages, it is important to identify the customer’s situation, to
give him the right information and to prevent making him dissonant [Berlyne 1975, Bost 1987, Festinger
1957]. Therefore it is necessary to know the actions (response) the customer has to do during the buying
process in order to get him to the next step. The action “using the searchmask” may correspond with the
situation “being confused”. That means if the response is clearly defined (doing some action) it is
fundamental to find the stimulus (situation) which leads to the response.

A I D A

Situations

Figure 2. Situations in Buying Stages


The IT system’s task is to observe the customers behaviour in each situation, to interpret it and to help
him get to the next action in the buying process if he does not know how to go on. At this point the
purchasing web pattern shall be used to bridge situations between two actions. For example if the system

221
ISBN: 978-972-8924-89-8 © 2009 IADIS

recognises the users’ situation “being confused”, a purchasing web pattern will be pushed which leads him to
the search mask. This support shall be automated by using standardized purchasing web patterns which can
be used in similar situations.

3.2 Approach and Methods


To develop a model for purchasing web patterns, several steps need to be done. (1) First of all, it is important
to identify the different purchase stages in e-commerce context. Therefore a literature review will be made to
get an overview over the different models like AIDA and DAGMAR. These models are the starting point to
define the purchase stages in e-commerce. (2) The next step is to define tasks within the different purchasing
stages. This will also be done with a literature review. (3) Once the tasks in the purchasing process are
defined, it is possible to analyse the customer’s situation. That means: Is he able to get to the next task? What
are the barriers to achieve the next steps? Therefore an observation in a usability laboratory should be made
combined with a self report by the customers. (4) One barrier is assumed to be the purchase pattern of the
different customers. A broad literature review combined with self report methods as well as observation in
the usability laboratory will be used to get the results. (5) Finally, the customers’ behaviour in different
situations during the purchasing process will be analysed and clustered in order to build purchasing web
patterns. To improve the capability of the patterns, soft computing techniques such as artificial neural
networks and fuzzy logic systems shall be used.

4. COMBINATION AND FORECAST


The idea of this customer focused e-commerce research is to help and support him during the buying process.
To make sure not to lose the customer during his e-commerce activities the IT system’s task is to prevent him
from leaving. The different factors presented in chapter 2 and 3 (a lack of e-readiness, specific situations and
emotional conditions of customers) which can stop the buying process will be integrated in one model. The
idea is to define in a first step the users’ e-commerce readiness levels and to cluster them into different
e-readiness layers in order to get a first indicator how to deal with the customer in certain situations within
the whole e-commerce process. In a next step the purchasing web pattern will be defined. It is assumed that
besides the e-commerce readiness level the situation and individual emotional state of customers is important
during the buying process. So there might be some situations that are always the same in every layer like
"start searching" (see Fig. 3 dark points). Some situations might occur only on some levels (see Fig. 3 white
points). To help the customer with purchasing web patterns it is necessary to know his e-readiness in order to
interpret the right situations. If these factors are known, the customer can be supported during the buying
process with the right purchasing web pattern. Not versed customers might need much more support in a lot
of different situations then pro users.

A I D A

ECRI: Pro

ECRI: Advanced

ECRI: Beginner

Figure 3. ECRI-Web-Pattern-Model: Situations in E-commerce-Ready-Index- (ECRI-) Layer During E-commerce Stages


A correlation between psychology, people’s situations and the ECRI of people is assumed. To find all
causal analytical coherencies, a causal model will be developed and then verified in a usability test situation.
During the usability test, test persons are confronted with different purchasing web patterns in different
situation during the buying process. The aim of this final usability test is to develop purchasing web patterns,

222
IADIS International Conference e-Commerce 2009

which are able to reduce the abort rate during the whole e-commerce process in order to secure that people do
not get lost during the e-commerce process.
The ECRI-Web-Pattern-Model is a first step to support customers in the buying process in order not to
lose them. But it is not yet completed. There shall be proven whether there are more factors which influence
stopping of customers in the e-commerce process. Then the model should be enlarged with these factors. In
order to assure that the developed purchasing web patterns support the e-commerce process, they will be
proofed continuously in the usability laboratory.

REFERENCES
Ajzen, I., 1991. The Theory of Planned Behavior. In Behavior and human decision processes, Vol. 50, pp. 179-211.
Belk, R 1975. Situational variables and consumer behavior. In Journal of Consumer Research, Vol. 2, pp. 157-164.
Berlyne, D.E., 1971. Aesthetics and psychobiology. Meredith Corporation, New York.
Bost, E.,1987.Ladenathmosphäre und Konsumverhalten. Physica, Heidelberg.
Bandura, A.,1979. Self-efficacy: The exercise of control. Freeman, New York.
Colley, R., 1961. Defining Advertising Goals for Measured Advertising Results. Association of National Advertisers,
New York.
Davis, F.D.,1989. Perceived usefulness, perceived ease of use, and end user acceptance of information technology. In
MIS Quaterly. Vol. 13, pp. 310-339.
Ecin, 2007. Sechs Sprossen auf der Web 2.0 Leiter. Available at http://www.ecin.de/news/2007/04/26/10663/index.html,
accessed on 6.04.2009.
Festinger, L, 1957. A theory of cognitive dissonance. Stanford University Press, Stanford, CA.
GFK. Without Author, 2009. E-commerce Umsatz wächst weiter. Aktuelle Ergebnisse aus dem GfK WebScope zum
Kaufverhalten der Deutschen im Internet.
Available at http://www.gfk.com/group/press_information/press_releases/003717/index.de.html, accessed on
6.04.2009.
Ho, S.Y., Davern, M.J. and Tam, K.Y., 2008. Personalization and Choice Behavior: The Role of Personality Traits. In
The DATA BASE for Advances in Information Systems, Vol. 39, No. 4.
Howard, J. A. and Sheth, J. N.,1969. The Theory of Buyer Behavior. Wiley, New York.
Lai, J.-Y., Ong, C.-S., Yang, C.-C. and Wang, C.-T., 2008. Assessing and managing employee readiness for embracing e-
business. In ACM , pp. 79-87.
Löffler, L.,1989. Adaptierbare und adaptive Benutzerschnittstellen - Konzeption und exemplarische Realisierung im
Bereich der Produktionstechnik. Universität Karlsruhe, Dissertation.
Maslow A.H, 1943. A Theory of Human Motivation. In Psychological Review. Vol. 50, pp. 370-396.
Molla, A. and Licker, P.S., 2005. eCommerce adoption in developing countries: a model and instrument. In Information
and Management. Vol. 42, pp. 877-899.
Richard, J., 2008. Internetrecht – Internetkauf. Available at http://www.internetrecht-rostock.de/internetkauf.htm,
accessed on 6.04.2009.
Sarodnick S. and Brau, H., 2006. Methoden der Usability Evaluation. Wissenschaftliche Grundlagen und praktische
Anwendung. Verlag Hans Huber,Bern.
Strong, E.K., 1925. Theories of Selling. In Journal of Applied Psychology. Vol. 9, pp. 75-86.
Venkatesh, V., Morris, M.G., Davis, G.B. and Davis, F.D., 2003. User acceptance of information technology: Toward a
unified view. In MIS Quarterly. Vol. 27, pp. 425-478.
Woodworth, R.S., 1928. Dynamic psychology. In Murchison, C. (Ed.): Psychologies of 1925. Clark University Press,
Worcester, MA, pp. 111-126.

223
ISBN: 978-972-8924-89-8 © 2009 IADIS

ASSESSING THE CONTRIBUTION OF SCM ON


E-BUSINESS PERFORMANCE

Maria Teresa Borges Tiago, João Pedro Couto and Flávio Tiago
University of the Azores, Rua da Mãe de Deus, Ponta Delgada

ABSTRACT
Supply Chain Management (SCM) continues to gain popularity among companies and has been broadly studied by
academic researchers, especially since the last two decades. However, with the development of the digital economy, a
new paradigm has emerged in this arena due to the modification occur in supply chain management. Thus, this paper
establishes a new model, considering the results of SCM adoption in digital environments on e-business performance,
which has been tested in European companies. For that purpose, we used a structural equation modelling (SEM) analysis.

KEYWORDS
Supply Chain Management, Digital Environments, Performance.

1. INTRODUCTION
In the last decades, organizations have begun to realize the importance of closely managing activities of the
supply chain in order to create additional value, which can be grounds for significant competitive advantages.
Although marketing researchers and information system investigators have studied supply chain management
to some extent; there are still few conceptual bases available, necessary to assessing supply chain
management’s (SCM) contribution to business success. When analyzed, the on-line performance of the
companies and the implications of virtual SCM application, these assessment weakness assume a major role.
This paper examines an exploratory survey conducted among a sample of e-business European
companies. Using a structural equation analysis, this study explores the relationship between e-business
success and SCM initiatives, measured by the internal resources of a company and internal competencies in
SCM, and intrinsic success measures, including: sales volume, number of customers, sales area and customer
service quality. This work is organized as follows: Section 2 presents the definition and benefits associated
with SCM, including virtual supply chain management. An evaluation framework is developed in Section 3
and Section 4 presents the methodology and the achieved results. In the last section, we conclude our study,
reiterate major points and suggest avenues for further investigation.

2. LITERATURE REVIEW
Traditional supply chain management (SCM) has been widely studied by academics (Oliver & Webber,
1992; Snowdon, 1988). Since the nineties, driven by academic research and organizational practices
developed around the concept of e-business, SCM has gained a new dimension and importance. Much
research has emerged from the logistics/ distribution and marketing fields as a result, complemented by
studies carried out in the information technology field (Nagurney et al., 2002). In light of mounting research,
SCM has now acquired the status of a generic management concept that comprised the systemic
implementation of processes allowing the development of competitive advantages and profitability of firms
through an integrated management of distribution channels (Svensson, 2003).
According to the recent research of Wu and Chen (2006), successful supply chain management requires
choosing a type of relationship suitable to product and market conditions as well as the adoption of
management practices to it. Rapid growth of the Internet as a means for business seems fundamental to

224
IADIS International Conference e-Commerce 2009

reshaping business structure, allowing firms to embrace unprecedented opportunities. In this context, the
concept of SCM can be modified into the virtual supply chain management (Apostolou et al., 1999; Gan et
al., 2000). While the original value chain model treats information as a supporting element, in a digital era,
information itself can be a critical source of value. The introduction of on-line practices has created new
opportunities for both suppliers and consumers: (i) firms began to have an open access to larger numbers of
suppliers and consumers; and (ii) physical boundaries to consumers were removed (Nagurney et al., 2002;
Gabbott & Colgate, 1999). One of the attractive features of Internet is related to the existing three main
stages of value-adding informational processes: (1) visibility (improve the ability to track physical operations
more effectively); (2) mirroring capability (substitute virtual activities for physical ones and parallel value
chain in market spaces); and (3) create new customer relationships (use information matrix to deliver value to
customers in new ways).
Turner (2000) suggests the classification of virtual supply chain management according to the traditional
concept of supply chain management. In this perspective, all the activities of e-business affect differently
both the supply and demand side of the value chain. Despite the methodology used to classify different SCM
models, academia and managers seem to agree that on-line systems can be used to augment the performance
of SCM (Watson et al, 2000; Turner, 2000). In this context, web pages can be considered collaborative tools
between stakeholders (Hamel & Sampler, 1998).

3. EVALUATION FRAMEWORK AND HYPOTHESES


From the literature review emerges that research developed on supply chain management field focuses
mostly on SCM in a physical context, its influence on general business performance and in specific
industries. Although academic researchers and practitioners alike praised virtual supply chain adoption
(Cooper et al., 1997; Menzer et al., 2001), there remains a lack of empirical evidence as to its effects on e-
business success. Accordingly, our aim is to establish a measurement framework that helps to fill the current
gap in research and provides a better understanding of the critical elements of the virtual supply chain.
The framework identifies metrics that can be used to evaluate the impact of the virtual supply chain
management on business performance. The proposed research model tests three hypotheses: the first one
related to the impact of the virtual supply chain management in firms’ performance and the others regarding
the impact of two dimensions in virtual SCM. As our aim is to consider virtual supply chain management
effects on e-business performance, we will consider tactical elements. Thus, virtual supply chain
management performance will be indirectly measured in this model through two dimensions: communication
and integration of partners and planning and control systems. According to the literature, these components
profoundly affect the way companies behave in terms of SCM. In terms of e-business performance
measurement, the concept in this research is limited to three dimensions (Amit & Zott, 2001): hard factors,
soft factors and innovation. The first is an indicator of economic performance, namely number of customers.
The second dimension refers to a company’s improvement in customer relationships, measured in our model
by the quality of customer service. The last dimension reflects the company’s achievements in terms of its
competitive position, given by the sub dimension sales area.
Having as reference the achievements of Tan (2002), which noted that all of the significant supply chain
management practices have a positive impact on a firm’s performance, hypothesis one is written as: The
greater the supply chain management competencies and implementation, the higher a company’s e-business
performance on markets.
The interactive nature of the Internet allows establishment of this closer relationship, especially by
improving the communication among users (Hoffman & Novak, 1996; Watson et al., 2000) and enlarges
access to new suppliers and customers (Nagurney et al., 2002). As Eloranta and Hameri (1991) noted,
inbound and outbound logistics tend to be separated in research, so in our study we consider them together.
Based on this notion the second hypothesis is postulated as: The better communication and integration
processes of a firm, the improved performance level of its supply chain management in digital markets.
While the Internet is simplifying the nature of communication with and integration of consumers and
suppliers, it is also challenging suppliers to find new methods of cost reduction, combined with just-in-time
practices (Chopra & Meindl, 2001). As pointed out by Bowersox and Daugherty (1995), Lewis and
Talalayevsky (1997) and Van Hoek et al. (1998), the use of technologies of information and communication

225
ISBN: 978-972-8924-89-8 © 2009 IADIS

can improve traditional planning and control systems. This leads to the following hypothesis: The better the
planning and control systems, the greater the performance level of supply chain management in digital
markets.

4. METHODOLOGY AND RESULTS


Data from 25 European countries collected by e-Business W@tch annual survey was used to test our three
hypotheses. As this study examines primarily the adoption status of virtual supply chain management by
companies, it is important to mention that only 360 of the 9,264 total responses were included in this
analysis. Distribution of firm size, measured by the number of employees, shows that most cases are small
and medium size (around 60% of the firms). The distribution of responding sample is approximately similar
to the original sample. The two most heavily represented sectors in the sample are food, beverages and
tobacco and transport equipment, with 11.4% and 9.7% respectively, closely followed by all the others.
The casual structure proposed in the theoretical framework was examined using a structural equation
model. After global model fit had been assessed, numerical results were evaluated in order to test their
support of the research hypotheses. The numerical results for our model can be obtained directly from the
path coefficients of the structural model presented in Figure 1. We refer to standardized coefficients, which
account for scale effects and serve as indicators of the relative importance of the variables. Several goodness-
of-fit tests were conducted to assess whether the empirical model could explain the observed data, which
suggest that our model fits the underlying data quite well. The hypotheses’ paths were all statistically
significant.

Figure 1. Structural Equation Model Estimation


Our findings generally support the conceptual framework presented, even though some of the relationships
found were weaker than expected. With regard to H1, results show that virtual supply chain management
implementation contributed 34% to the e-business performance construct. This finding empirically supports
the concept that e-business performance can be improved by investment in virtual supply chain management
systems. Similarly, communication and integration in SCM context and planning and control of inbound and
outbound activities contributes 63% and 96% to virtual supply chain management competencies construct.
The results demonstrate a higher relative importance to planning and control than would be expected from
literature review, because most of the research in this field emphasizes communication and integration
elements. With respect to H2 and H3, the results achieved in the model support these hypotheses.

226
IADIS International Conference e-Commerce 2009

5. DISCUSSION AND CONCLUSIONS


As literature review demonstrated, there has been little study that examines virtual supply chain management
contributions to e-business performance. However, those works developed to study virtual SCM and e-
business performance were largely confined to specific industries. With this study, we attempt to fill existing
research gaps, presenting results from an empirical investigation based on a cross industry survey. The goal
of the current study was twofold: (1) to determine whether the implementation of tactical dimensions
(communication & integration and planning & control) is positively linked to virtual supply chain
management competencies and (2) to identify the nature of the relationship between virtual supply chain
management and e-business performance. The results of this effort have generated some interesting findings.
First, the data supports our conceptualization for the virtual SCM construct. Within it, both tactical elements
have a positive impact on the maximization of virtual supply chain management implementation. Second,
these findings allow us to conclude that implementation of a virtual supply chain management system has a
positive impact on e-business performance. According to these results, the concept of virtual SCM as an
integrated e-business tool that allows a more profitable relation with customers and suppliers is reinforced as
is the need for a daily based planning and control emphasized.
This study and its findings will be useful for firms intending to emulate the application of virtual supply
chain management, giving insights to managers about the influence of different components of virtual SCM
in e-business performance. Some useful preliminary insights are produce, leaving however a considerable
number of issues for future research, including the possibility of extending the investigation in order to
consider the impact of the virtual supply chain management in terms of competitive strategy and operational
effectiveness. Similarly, this study could be expanded to compare firm performance in e-business versus non-
virtual business activities.

ACKNOWLEDGEMENT
This paper is based on data provided by the European Commission and the e-Business W@tch and funding
for this work is granted by FCT – CEEApla, Research Center for Applied Economics.

REFERENCES
Amit, R. and Zott, C. (2001). Value Creation in E-Business, Strategic Management Journal, 22(6), pp.493-520.
Apostolou, D., Sakkas, N. and Mentzas, G. (1999). Knowledge Networking in Supply Chains: A Case Study in the
Wood/Furniture Sector, Information Knowledge Systems Management, 1 (3-4) (Autumn/Winter), pp. 267-281.
Bowersox, D. and Daugherty, P. (1995). Logistics paradigms: the impact of information technology, Journal of Business
Logistics, 16 (1), pp. 65–80.
Chopra, S. and Meindl, P. (2001). Supply chain management: strategy, planning, and operation, Prentice-Hall: Upper
Saddle River, NJ.
Cooper, M., Ellram, L., Gardner, J. and Hanks, A. (1997). Meshing multiple alliances, Journal of Business Logistics, 18
(1), pp. 67–89.
Eloranta, E. and Hameri, J. (1991). Experiences of different approaches to logistics, Journal of Engineering Cost and
Production Economics, 21, pp. 155–169.
Gabbott, M. and Colgate, M. (1999). Information technology and relationship marketing: advances, incompatibilities and
opportunity, Australasian Marketing Journal, 7 (1), pp. 102-108.
Gan, B., Liu, L., Jain, S., Turner, S., Cai, W. and Hsu, W. (2000). Manufacturing supply chain management: distributed
supply chain simulation across enterprise boundaries, in Proceedings of the 32nd Conference on Winter Simulation
(Orlando, Florida, December 10 - 13, 2000).
Hamel, G. and Sampler, J. (1998). The e-corporation: more than just web-based, it's building a new industrial order,
Fortune, 23 (December) pp. 80-92.
Hoffman, D. and Novak, T. (1996). Marketing in hypermedia computer-mediated environments: conceptual foundations,
Journal of Marketing, 60, pp. 50-68.

227
ISBN: 978-972-8924-89-8 © 2009 IADIS

Lewis, I. and Talalayevsky, A. (1997). Logistics and information technology: a coordination perspective, Journal of
Business Logistics, 18 (1), pp. 141-57.
Oliver, K. and Webber, M. (1982). Supply chain management: logistics catches up with strategy, in Logistics: the
strategic issues, edited by Christopher, M. (1992), Chapman & Hall: London, pp.63-75.
Snowdon, M. (1988). Moving towards a single market, International Journal of Technology Management, 3(6), pp. 643-
55.
Svensson, G. (2003). Holistic and cross-disciplinary deficiencies in the theory generation of supply chain management,
Supply Chain Management: An International Journal, 8 (4), pp. 303-316.
Tan, K. (2002). Supply chain management: practices, concerns, and performance issues, The Journal of Supply Chain
Management, 38 (1), pp. 42-53.
Van Hoek, R., Commandeur, H. and Voss, B. (1998). Reconfiguring logistics systems through postponement strategies,
Journal of Business Logistics, 19 (1), pp.33–54.
Wu, I. and Chen, Y. (2006). A model for exploring the impact of purchasing strategies on user requirements
determination of e-SRM, Information & Management, 43 (4) (June), pp. 411-422.

228
IADIS International Conference e-Commerce 2009

INTERORGANIZATIONAL BUSINESS PROCESSES


MODELING: CASE OF AN E-PROCUREMENT SYSTEM

Khoutir Bouchbout, Zaia Alimazighi


Computer Science Department, USTHB, Algiers, Algeria

ABSTRACT
Modeling and managing business processes that span multiple organizations involves new challenges, mainly regarding
the ability to cope with change, decentralization, and the required support for interoperability. A key to maintain
competitiveness is the ability of an enterprise to describe, standardize, and adapt the way it interacts with suppliers,
partners, competitors, and customers. In the context of process orientation, enterprises today describe these procedures
and interactions in terms of business processes, and invest huge efforts to describe and standardize these processes.
The main objective of this paper is to contribute to the understanding of the Business Process Modelling field focusing on
the definition of the Inter-Organizational Business Processes (IOBP) from a high-level modelling perspective. In order to
clarify all the fundamental concepts that surround this field in an e-procurement system, we investigate commonly used
business process languages on their suitability to model IOBP.

KEYWORDS
Inter-organizational Business Processes, BPMN, UML Activity Diagrams, e-Procurement

1. INTRODUCTION
The fast and increasing development of networked business environments brings new ways of interaction
among the enterprises, which eliminated the time and space gap between business partners. Inter-
organizational systems are a new organizational structure that accomplishes the requirements of dynamism
and agility that electronic commerce entails. In order to overcome the shortcomings of the traditional
document-centric focus, a lot of research has been undertaken to move towards process-centric B2B
approaches. Business process models capture the business information that is required in each step of an
IOBP. A business process is defined as an organized group of related activities that together create customer
value [7]. IOBP is a special type of a business process that involves two or more partners.
In this work we examine the concept of IOBP. Then, we analyzed the particularities of and the
requirements for IOBP modeling. We focused on recent studies with more intensive forms of IOBP modeling
in an e-procurement system. It is therefore important to consider the relevant requirements of IOS and
understand the related influences when we model their business processes. The remainder of the paper is
structured as follows. First, we present a development method for designing an e-procurement system.
Section 3 investigates the field of IOBP modeling approaches and techniques. Finally, section 4 summarized
the main ideas of this work and gives an overview of future work.

2. THE E-PROCUREMENT SYSTEM DEVELOPMENT METHOD


e-Procurement system in essence, mirror the procurement process through the provision of two distinct, but
connected infrastructures, internal processing (corporate intranet) and external communication processing
(Internet based platforms). e-Procurement also enlarges customer base, broadens the search for raw materials
to lower its production cost. Purchasing goods and services in an organization can be viewed as two
processes: supplier selection and the ongoing purchase of materials. The supplier selection process comprises
defining the requirements for the purchased items, identifying potential suppliers, requesting supplier quotes,
evaluating bids, and ultimately selecting suppliers based on expected performance as well as price. Once

229
ISBN: 978-972-8924-89-8 © 2009 IADIS

suppliers are selected, the purchase of materials typically includes computing material requirements on an
ongoing basis and then placing orders [4].
Automating the exchange of business information between business partners exists for a while. The
business processes between two different organizations participating in a IOBP must be defined. For this
purpose a commonly accepted methodology is needed based on the Open-EDI reference model [13]. What is
needed are end-to-end, strategy-to-code methods for designing and deploying e-procurement initiatives as
illustrated in figure 1. The business strategy phase of e-procurement development identifies “what” to do.
The business process engineering phase addresses the “how.” The task at hand is the mapping and
engineering of the IOBP. IOBP may be loosely coupled as in the case of open markets. Or they may be
tightly coupled as in the case of a supply chain management (e-procurement) where process handoffs are
made electronically.
The technical layer (technology standards and infrastructure) corresponds to the Functional Service View
(FSV) of the Open-EDI model which separates the “what” in the Business operational View (BOV) from the
“how” in the FSV, refined into the deployment artifacts layer and the software environments layer.
Deployment artifacts comprise business process specifications, workflow descriptions or document schemes
in a machine-processable language. The software environments layer corresponds to concrete
implementations of information systems. Software environments consume deployment artifacts in order to
execute or participate in a certain process.

e-procurement business strategy


Business Layer
Strenghts, weaknesses, opportunities, threats
GOALS, REQUIREMENTS, CONSTRAINTS

Interorganizational business processes


Process Layer
Internal and external
BUSINESS PROCESS MODELS
(EPC, UML, BPMN, UMM)

Technology standard & infrastructure


Technical Layer
Web Services, Workflows, BPEL, XML, RosettaNet, ebXML

Figure 1. e-Procurement Systems Development Method

3. INTERORGANIZATIONAL BUSINESS PROCESSES MODELING


Over the last years, a lot of methodologies for modeling business processes have been developed. Some of
them are based on special notations often defined by standardization bodies. Others customize the UML for
business process modeling needs. Traditionally, business process modeling focuses on modeling business
processes internal to an organization fulfilling customer needs. More recent approaches also take IOBP into
account. Another criteria for distinguishing business process modeling approaches is its binding to the
supporting IT infrastructure. Some approaches are mainly used in the requirements specification phase to
support the communication with business domain experts. Resulting models usually hide implementation
complexity and are on a rather abstract level. Other approaches are more implementation oriented and rather
provide a graphical interface for workflow languages or Web Service orchestrations/choreographies.

230
IADIS International Conference e-Commerce 2009

3.1 Requirements for Interorganizational Business Process Modeling


The defining characteristic of an IOBP is that two or more autonomous organizations jointly execute a
process with the purpose of creating a certain output. Usually, organizational boundaries are associated with
a lack of transparency, redundancies (e.g. the manual re-entry of data) and time lags, thereby delaying the
process flow. Although most of these inefficiencies are also present in the case of cross-functional
coordination, some specific challenges exist at the boundaries of organizations which necessitate deduction
of requirements for their representation in future process architectures (see Table I).
Table 1. Challenges and Requirements of IOBP Modeling

Challenges & requirements Contributions from BPM and Workflow


Management
External processes as “black box” [8] • Graphical representation of inter-organizational
¾ Representation of inter organizational business process
business process • Introduction of artefacts related to organization / roles,
messages /business documents
Lacking clarification of responsibilities at • Graphical representation using swimlanes, pools or
company boundaries ([1], [8]) domains
¾ Allocation of tasks to actors • Organizational / role model to include external parties
Different process logic and terminology ([6], [8]) • Data dictionary, glossary
¾ Alignment of semantics underlying the • Information modeling
business process
Process autonomy ([2], [8], [11], [18]) • View concepts
¾ Decoupling of internal and external • Differentiation between public (or external) business
processes processes and private (or internal) business processes
Confidentiality [11] • Abstraction concepts
¾ (Selective) visibility of internal processes to • Partner-specific views
external partners
Contractual relationships [8] • Specification of messages (information flow)
¾ Formal specification of process interfaces • Interface descriptions

Complexity of bilateral agreements([14],[8]) • Modeling / graphical representation of IO process


¾ Support for alignment with multiple partners • Reference processes

3.2 Interorganizational Business Process Modelling Architecture


To achieve seamless business processes across enterprise borders the heterogeneity of different terminologies
and modelling notations used within the organizations have to be overcome. However, autonomy of the
different business partners has to be taken into account meaning that an organization should be able to
flexibly participate in business relations. In order to make IOBP work, each involved enterprise has to
implement not only its internal processes (private processes), but also its external behavior (public
processes). A public process is the definition and execution of a formal message exchange so that messages
can be exchanged with other enterprises in a pre-defined sequence and with pre-defined message formats
over networks [9]. A public process defines an external message exchange of an organization with its
partners according to a message exchange protocol such as EDI and RosettaNet [19]. A private process
describes internal executable activities that support the activities of public processes. The public processes of
two companies have to match in order to allow IOBP to work. For example, if one company sends a purchase
order (PO) then the other company must be able to receive the PO in the format sent over the same network.
As depicted in Figure 2, these approaches distinguish between the internal process (private process) and
the interorganizational process (collaborative). On private process level, organizations model their internal
business processes according to a modelling approach or notation that is most suitable for internal demands
independently of the modelling methodologies used by the business partners [18].

231
ISBN: 978-972-8924-89-8 © 2009 IADIS

Inter-organizational business process


e.g. BPMN

Company A Company B

Public business process Public business process

Private business process Private business process


e.g. EPC e.g. UML AD

e.g. BPEL Workflow


Workflow

Figure 2. Inter-Organizational Business Process Architecture Modelling Layers


One possible language for modelling IOBP could be the Business Process Modeling Notation (BPMN)
which consolidates ideas from divergent notations into a single standard notation. Examples of notations or
methodologies are: UML Activity Diagram ([16],[17]), UMM [21], ebXML Business Process Specification
Scheme (BPSS) [12], and EPC [15].

3.3 Interorganizational Business Process Modeling Languages


The origins of process modeling languages are quite diverse, although two dominant approaches can be
observed; one based on graphical models, and the other based on rule specifications. The main standards
addressing business process modeling considered in this work are outlined below.
• EPC – Event-Driven Process Chains (EPCs) are a process-oriented modeling technique proposed by
Keller et al. [15]. EPC is a business process modeling language, focusing on control flow dependencies of
activities in a business process. It is utilized in the ARchitecture of Integrated Information Systems (ARIS)
by Scheer [15] as the central method for the conceptual integration of the functional, organizational, data, and
output perspective in information systems design. ARIS is a tool set that supports besides other modeling
approaches the EPC approach and is continuously extended to support recent developments in the IT-world.
The modeling approach is based on a sequence of events and functions (activities) that constitute a business
process. Logical connectors (logical AND, OR and XOR) enable the description of branching actions and
conditions for the execution of parallel activities. Extended event-driven process chains support the modeling
of resources, data objects, organizational units and services. Further, the linkage between processes is
supported. EPCs are considered as a method to be used very easily by domain experts to specify business
processes.
• UML – The Unified Modeling Language is an object-oriented modelling language from the OMG.
It specifies and visualizes models of software systems. It has become the generic modelling standard
applicable to any software development project, and knowledge of UML is widespread. Its extensive use has
raised numerous application and implementation issues by modelers and vendors. UML 2 was produced to
address many of these issues — including business process modeling [17]. In order to describe the behavior
of a business process, UML activity diagrams might be used. For specifying interactions between participants
on a lower level, one might also utilize sequence diagrams. Many UML approaches studied ([5], [8]) offer
means to model collaborations between entities and to derive deployment artifacts thereof.
• BPMN – The Business Process Modelling Notation is an open graphical notation standard for
business process modelling that was developed by BPMI, now merged with OMG [3]. It is based on well-
known flowcharting notations and thus intuitive for business analysts. The objective is to support process
management by both technical users and business users by providing a notation that is intuitive to business
users yet able to represent complex process semantics. BPMN defines Business Process Diagrams (BPD) [3]
to capture a business process. A BPD describes the flow of a process using flowchart techniques. The
modeled process might be either internal to a company (private process) or collaborative if executed between
two or more participants (public process). Furthermore, BPMN allows modeling the interface that a private

232
IADIS International Conference e-Commerce 2009

process exposes to its outside world. The interface of such a process defines what message exchanges are
required in order to interact with it. Process interfaces are called abstract processes.
• UMM – UMM has been developed by UN/CEFACT to analyze and design B2B business processes
and to concentrate on business semantics [21]. UMM is a UML based methodology for capturing the
requirements in an IOBP. It is independent of the underlying transfer syntax. The overall goal of the UMM
methodology is to create a global choreography of the business process. If two business partners interacting
with each other each defined their own choreography for the business process the resulting choreographies
are unlikely to match. UMM pursues a top down approach by first defining the global choreography from
which the local choreographies are derived. Hence it is ensured, that both choreographies are complementary.
UMM is built upon the UML meta model and defined as a UML profile [21] e.g. a set of stereotypes, tagged
values and OCL constraints.
UMM’s modeling of business processes pursues a three-level top-down approach. In the Business
Domain View (BDV), inter-organizational and internal business processes are described as high-level use
case diagrams. Business partner types are defined as participants in a business process. Processes are
complemented by activities, business entities and messages. Finally, the Business Transaction View (BTV)
defines the choreography of information exchanges and delineates most of the artifacts specific to inter-
organizational business process modeling.

3.4 Comparative Study


These IOBP languages were compared based on their expressive power, status and support. Expressive
power refers to the language’s ability to present different kinds of process constructs, patterns and situations
that appear in business processes. UML, EPC, BPMN, and UMM are recommended for e-business
modelling. This is no contradiction as each language has its own merits, its own tool support and its own
environment, in which it can best be used. A comparison addressing the heterogeneity of business process
models can be found in [10].
Since BPMN is defined from scratch as a business process modeling notation, it has a definite business
centric approach. While BPMN has a focus on business processes, UML has a focus on software design and
therefore the two are not competing notations but are different views on systems. We conclude that the
differences in the expressive powers of BPMN and UML AD are not significant. In some situations, BPMN
provides better expressive power than UML AD, however. It should also be noted that for both modeling
languages, the specification is in some cases too vague and it is thus unclear whether certain patterns can be
expressed. Another factor considered was thus tool support: very few tools for generating executable
business process code from UML Activity Diagrams were available. The original organization responsible of
BPMN also stated that UML has a different viewpoint on business processes, i.e., it focuses more on
software design. Although this statement must be taken with caution because it was given by the developers
of another standard, we do think that BPMN is more easily accessible for both business and IT users.
BPMN is able to present private processes, public processes and collaboration processes. Most BPMN
elements can be mapped to execution but some are used purely for informative purposes. BPMN specifies
mappings to BPEL only for internal processes, but defines no complementary generation of BPEL artifacts
for collaborative processes. According to the BPMN specification, BPSS is considered as a target language
for collaborative BPD’s. One of the shortcomings of BPMN is that it lacks formal semantics, and the
specifications for certain elements can also be considered inadequate for execution purposes. Additionally,
the specification does not include an XML interchange format for BPMN diagrams. For this purpose, OMG
has subsequently introduced the Business Process Definition Meta-model (BPDM) specification.
Since UMM is defined as a UML profile, a business analyst may use any UML tool to model UMM
business collaboration models. As we outlined in the beginning, UMM artifacts are based on a specific subset
of UML to capture complex business collaborations. Between these artifacts, a number of dependencies and
constraints exist. If a regular UML tool is used for UMM, these rules are not enforced.

4. CONCLUSION
The IOBP modeling approaches investigated introduce a representation of the IOBP, which uses either an
existing modeling notation or its extensions. Specific artifacts are necessary for describing IOBP, among

233
ISBN: 978-972-8924-89-8 © 2009 IADIS

them external organizations, roles or partner types as well as messages, business documents and channels.
The most important contribution of existing approaches relates to the decoupling of internal and external
business processes. They introduce different views on business processes and distinguish between public (or
external) processes and private (or internal) processes. Whereas public processes appear to provide stable
interfaces with external partners, private business processes might be subject to change more frequently.
Research on specifying, modeling, testing and validating, framework for IOBP for an e-procurement
systems is where intensive work is needed. Moreover, for e-procurement to scale to the Internet there is a
need for efficient integration with all relevant partners, established a priori or on demand. The need for
interoperability in B2B is more pronounced than usual partly because of the way businesses operate, the
systems they have, and the difficulties created by systems’ autonomy and heterogeneity. It typically requires
the intimate knowledge of the underlying communication protocols, data formats and access interfaces.

REFERENCES
[1] Aalst, W. M. P. v. d. (2000) Loosly coupled interorganizational workflows: modeling and analyzing workflows
crossing organizational boundaries. Information & Management, 37 (2), 67-75.
[2] Bergholtz M., Jayaweera P., Johannesson P., and Wohed P. (2002), Process Models and Business Models - A Unified
Framework, in Proceedings of ER (Workshops) Springer, Lecture Notes in Computer Science, pp. 364–377.
[3] BPMN (2006), Business Process Modeling Notation specification, OMG Final Adopted Specification, OMG,
February 2006, URL: http://www.bpmn.org/Documents/OMGFinalAdoptedBPMNl-0Spec2006-02-01.pdf.
[4] Chen, M., Meixell M.J. (2003), Web Services enabled procurement in the extended enterprise. Journal of Electronic
Commerce Research, Vol. 4, No.4. PP.140-155.
[5] Dorn J., Grün C., Werthner H., and Zapletal M. (2007), A Survey of B2B Methodologies and Technologies: From
Business Models towards Deployment Artifacts. Proceedings of the 40th Annual Hawaii International Conference on
System Sciences (HICSS’07). IEEE Computer Society.
[6] Gopal, G. and McMillian, E. (2005) Synchronization: A Cure for Bad Data. Supply Chain Management Review , 9
(4), 58-62.
[7] Huemer C., Liegl P., Schuster R., Werthner H., and Zapletal M. (2008), Inter-organizational Systems: From Business
Values over Business Processes to Deployment. Proceedings of the 2nd International IEEE Conference on Digital
Ecosystems and Technologies (DEST2008). IEEE Computer Society.
[8] Legner, C. and Wende, K. (2006) Towards an Excellence Framework for Business Interoperability. Proceedings of
19th Bled eConference eValues.
[9] Medjahed, B., Benatallah, B., Bouguettaya, A., Ngu, A., Elmagarmid, A. (2003), Business-to-business interactions
issues. The VLDB Journal, Vol. 12: 59–85 pp. 59–85.
[10] Mendling, J., Nüttgens, M. and Neumann, G. (2004), A Comparison of XML Interchange Formats for Business
Process Modelling. In F. Feltz, A. Oberweis and B. Otjacques, editors, Proceedings of EMISA 2004, LNI 56, pages
129–140.
[11] Norta, A. (2007), Exploring Dynamic Inter-Organizational Business Process Collaboration. Dissertation, Technische
Universiteit Eindhoven, Eindhoven, Netherlands.
[12] OASIS (2006), ebXML Business Process Specification Schema Technical Specification v2.0.4. OASIS Open.
[13] Open-edi Reference Model, ISO, 2004, ISO/IEC JTC 1/SC30 ISO Standard 14662, Second Edition.
[14] Österle, H. (2004), The Networked Enterprise. In Realtime - A Tribute to Hasso Plattner (Kagermann, H., Ed), pp
151-172, Wiley, Indianapolis.
[15] Scheer A.-W., Jost W., Hess H. (2006), Corporate performance management. ARIS in Practice. Springer,
Heidelberg.
[16] Unified Modeling Language Specification, Object Management Group (OMG), version 1.4.2. http://www.omg.org.
[17] Unified Modeling Language Specification, Object Management Group (OMG), version .2.0. http://www.omg.org.
[18] Volker Hoyer, Eva Bucherer, Florian Schnabel (2008), collaborative e-business process modeling. Business Process
Management Workshops, pp. 185-196.
[19] http://www.rosettanet.org
[20] http://www.ebxml.org
[21] http://www.unece.org/cefact/

234
Posters
IADIS International Conference e-Commerce 2009

WEB AND INFORMATION TECHNOLOGY AS CRITICAL


THEMES IN THE CONSUMER BEHAVIOR BASED
RESEARCH: A STUDY WITH THEMATIC NETWORKS

María Isabel Viedma-del-Jesus, Juan Sánchez-Fernández, Francisco Muñoz-Leiva


Department of Marketing and Market Research
University of Granada

Antonio Gabriel López-Herrera


Department of Computer Science and Artificial Intelligence
University of Granada

ABSTRACT
In this paper, a bibliometric and visual study of the research on consumer behavior is presented. A bibliometric map
showing the associations between the main concepts in the field are provided from 2004 to 2008. This map provides
insight into the structure of the consumer behavior based research, visualize the division of the field into several
subfields, and indicate the relationships between these subfields. The results show that some important themes were
INTERNET, WEB and INFORMATION-TECHNOLOGY. Experts can use this map to forecast emerging trends in the
consumer behavior field and they also enable the novice to become familiar with the field.

KEYWORDS
Consumer Behavior Research, Information Technology, Web, Thematic Networks, Bibliometric maps, Co-word analysis.

1. INTRODUCTION
Consumer behavior has been discussed in depth from the perspective of different fields and investigation
areas (such as Cost-Reducing Theory, Psychology, Sociology…), using numerous ideas and concepts,
constructions, theories and models. Therefore, because of the interdisciplinary nature of the study on
consumer behavior, studies which review publications that directly or indirectly influence the consumer
behavior are very necessary. In this sense, the purpose of this investigation is to offer an expeditious
perspective of the study of consumer behavior during the period 2004-2008, studying and forecasting the
current themes.
In order to reach this objective, we will study the last five years of consumer behavior based research
using the concept of bibliometric map. It show the associations between the main concepts studied in the
field and provide insight into the structure of the consumer behavior field. The map also shows the division
of the field into several subfields and indicate the relationships between these subfields.

2. METHODOLOGY
The bibliometric map is created by the co-word analysis (Callon et al., 1983; Coulter et al., 1998; Whittaker,
1989). Co-word analysis is a powerful technique for discovering and describing the interactions between
different fields in scientific research (Bailon-Moreno et al., 2006). Co-word analysis reduces a space of
descriptors (or keywords) to a set of network graphs that effectively illustrate the strongest associations
between descriptors.
In this study, the process of constructing maps was divided into the six steps proposed by Börner et al.
(2003), where 942 papers from ISI Web of Science where downloaded on 10th December 2008 with query:

237
ISBN: 978-972-8924-89-8 © 2009 IADIS

TS= ("consumer behavior") OR TS= ("consumer behaviour"),


where TS field is a search based on the “Topic”. The papers were studied using CoPalRed (EC3 2006)
computer program, which visualizes the networks in a strategic diagram. In a strategic diagram, the abscissa
axis is centrality, or the external cohesion index. It represents the most or least central position within the
overall network. The ordinate axis is density, or the index of internal cohesion. It represents the conceptual
development of the theme. So, quadrant I groups the motor-themes of the discipline, given that it presents
strong centrality and high density. The themes of the quadrant II (upper-left) are very specialized, but
peripheral in character, while those of the lower-left (quadrant III), with low density and little centrality,
mainly represent either emerging or disappearing themes. The themes of the lower-right quadrant (quadrant
IV) are the most general basic themes, although with internal development not as high as those of quadrant I.

3. STRATEGIC DIAGRAMS FOR THE PERIOD 2004-2008


To analyze the evolution of the consumer behavior field over the last five years, a strategic diagram for the
period 2004-2008 is shown in Figures. The volume of the spheres is proportional to the number of documents
corresponding to each theme (a number is used to indicate the papers per theme).
In the last five years (2004-2008), the principal themes, in number of papers, were CONSUMER-
BEHAVIOR (218 papers), WEB (42 papers) and INFORMATION-TECHNOLOGY (20 papers). All of
them were located in the upper-right quadrant (with high density and centrality) of the strategic diagram, i.e,
they were related externally to concepts applicable to other themes (see Figure 1).
The theme WEB appears in the period studied (2004-2008) as an important theme in the consumer
behavior based research community. It has become one of the most studied themes. This theme is associated
(see Figure 2) to keywords such as online and e-commerce, technology, user-interface and usability. The
theme INFORMATION-TECHNOLOGY was other motor-theme (upper-right quadrant) in 2004-2008.

Figure 1. Strategic Diagram Figure 2. Associated Keywords to WEB Theme

REFERENCES
Bailon-Moreno R. et al., (2006). The scientific network of surfactants: Structural analysis. Journal of the American
Society for Information Science and Technology, 57(7), 949–60.
Börner K. et al., (2003). Visualizing knowledge domains. Annual Review of Information Science and Technology, 37,
179–255.
Callon M. et al., (1983). From translations to problematic networks - an introduction to co-word analysis, Social Science
Information Sur Les Sciences Socials, 22(2), 191–235.
Coulter N. et al., (1998). Software engineering as seen through its research literature: A study in co-word analysis.
Journal of the American Society for Information Science, 49(13), 1206–23.
EC3: Research Group “Evaluación de la Ciencia y la Comunicación Científica” (2006). CoPalRed (v. 1.0) [Software].
Granada: University of Granada. Available in [http://ec3.ugr.es/].
Whittaker J. (1989). Creativity and conformity in science: Titles, keywords, and co-word analysis. Social Science in
Science, 19, 473–96.

238
IADIS International Conference e-Commerce 2009

THE ANTECEDENTS OF USEFULNESS IN EXPERIENCED


USERS OF WEB-BASED LEARNING MANAGEMENT
SYSTEMS

Francisco Muñoz Leiva, Juan Sánchez-Fernández, María Isabel Viedma-del-Jesús,


Antonio Gabriel López-Herrera
Universidad de Granada

ABSTRACT
Several researches have focused on the adoption stage of a technological innovation from the users’ viewpoint, obtaining
theories or models of behavioural decision, traditionally applied in Social Science. Under the principles of the
Technology Acceptance Model (TAM) and its different extensions, this study empirically assesses the main antecedents
of perceived usefulness. Data was gathered from 132 experienced users of web-based learning management systems. The
findings show that the effect the trust and compatibility with learning style are the two strongest determinants of using a
web-based learning management system.

KEYWORDS
Web-based Learning Management Systems, Determinats, Perceived Usefulness, Compatibility, Trust.

1. THE MAIN ANTECEDENTS OF USEFULNESS OF A SYSTEM


Perceived usefulness is defined as “the prospective user’s subjective probability that using a specific
application system will increase his or her job performance within an organizational context” (Davis, 1989, p.
985). This belief is a subjective measurement as far as the user is concerned and represents the degree to
which the system can be useful when seeking a specific objective. More specifically, this is a
multidimensional concept related to increased speed of work, the manner work is done, increased
productivity and effectiveness as well as other practical aspects (Featherman and Pavlou, 2003). A particular
emphasis have been on the construct perceived usefulness by Davis (1989), Hwang and Yi (2002), Moon and
Kim (2001), and Saade and Bahli (2005) among others.
Considerable research has been done on the acceptance of new information technology (IT) or systems (IS)
but less attention has been paid to the assessment of the factors determining perceived usefulness, despite the
fact that this belief has been one of the most important factors in the acceptance of web sites (Moon and Kim,
2001; Chen et al., 2002; Pavlou, 2002; Kourfaris, 2002; Featherman and Pavlou; 2003; Bhattacherjee and
Premkumar, 2004; Sánchez-Franco and Rondán, 2005). Furthermore, the present study is based on the
hypothesis that perceived usefulness will increase intentions to reuse a web-based content management
system supporting learning tasks. The outcomes enable an explanation of the usefulness of these systems as
from its antecedents trust, compatibility with learning style, risk to privacy, quality of content and ease of
use. The findings allow a web designer or IT specialist to design actions aimed at influencing the acceptance
and use of the learning technologies by manipulating controllable external factors, such as the structure and
contents or other visual characteristics.

239
ISBN: 978-972-8924-89-8 © 2009 IADIS

2. METHODOLOGY: SAMPLING CHARACTERISTICS AND


MEASUREMENT SCALES
Given the massive use of innovative web-based systems in support of learning or distance learning (Moodle,
Lotus LearningSpace, Illias, WebCT,...), the usefulness of some is questioned and there is a need to
understand what the main causes are that determine the success of their adoption.
This study is based on a web system specifically developed for students and teachers in a marketing
department of a southern European university (WebCiM, available at http://marketing.ugr.es). In the teaching
dimension, this system combines contact hours with a made-to-measure design. More specifically, the
students registered in any of the departmental subjects are provided with (identified) access to a range of
teaching material, information and teacher-student communication, news,.... Using a web-based structured
questionnaire, we measured the antecedents of acceptance of this innovative web-based teaching
management system after eight weeks of training and familiarization with all the options of the WebCiM
platform (December 2005).
Table 1. Technical Data of Study (Under Simple Random Sampling Conditions)
Population Students registered at the Faculty of Economic and Business Science
Sample size 132 valid cases
Trust level 95%
Accepted error for estimate of
± 8.53%
proportions, for P=Q=0.5*
Field work December 9 - 29, 2005
Type of interview Web-based questionnaire
*For 95% confidence, assuming a simple random sample

The measurement model was first evaluated and “fixed” following the generally accepted
recommendations (Anderson and Gerbing, 1988; Burt, 1976; McCallum, 1986) before estimation of the
structural model. The constructs showed suitable psychometric properties and a certain degree of validity.

3. MAIN FINDINGS
To measure the influence of the main antecedents on perceived usefulness, the structural equation model
(SEM) of formation of usefulness proposed in section 3 was validated. The software used was LISREL 8.7
and the estimation method, Robust Maximum Likelihood (RML), useful for samples not following normal
distribution. The figure 1 shows acceptable overall fit, with the most of statistics inside the values
recommended by the literature (Hair et al., 1998).

Indicator Value
Compatibility Content quality Satorra chi-squared 263.97 (P = 0.0019)
RMSEA (90% RMSEA) 0.053 (0.033 ; 0.070)
0,32 -0,04 (n.s.) ECVI (90% ECVI) 3.29 (2.95 ; 3.70)
GFI 0.70
Ease of use 0,13*
Perceived RGFI 0.82
usefulness NFI 0.95
R2 = 0,21 R2 = 0,57 NNFI 0.99
0,46 0,55 0,12 (n.s.)
IFI 0.99
RFI 0.94
-0,31 Privacy risk
Trust CFI 0.99
R2 = 0,094
AGFI 0.62
RAGFI 0.75
*quasi-significant loadings

Figure 1. Model Obtained (Standardized Parameters) and Fit Indicators


The result of the t test for the parameters obtained by the structural model warns that, for a significance
level of 99%, only trust and compatibility give a strong explanation of the usefulness dependent variable.

240
IADIS International Conference e-Commerce 2009

Content quality, risk and ease of use fail to present a significant effect on usefulness, although the last can
be considered quasi-significant (with a trust level of 90%), just as the theory suggested. Although not
significant, the effect of risk on usefulness was positive, despite what was initially thought. An explanation
for this could be that the students had a priori knowledge that the teacher could access their personal data for
sending messages (grades, news,...) via intranet or e-mail and the higher the infiltration in these data, slightly
higher is perceived usefulness (although not significant). Therefore, for learning management systems, this
risk is not an inhibitor of their usefulness.

4. CONCLUSIONS AND RECOMMENDATIONS


Analysis of the literature on technological innovations shows some of the effects and antecedents of
perceived usefulness delimiting a model of usefulness of a b-learning web innovation. The success of this
type of web technology in terms of an increase in perceived usefulness depends on the attributes of the web
system controllable by the organization responsible for its use or distribution and, obviously, their
intervention in the explanation of the usefulness.
This research suggests the need for greater effort in generating trust in the use of this type of platform.
The reason for this higher effect of trust is that experienced users perceive that part of the guarantee to be
obtained from the usefulness of the web-interface depends on the people behind the platform and their offer,
mainly in more routine situations with less uncertainty in Administration to Consumer (A2C) exchanges.
The results imply that the way to increase perceived usefulness in a new web site should be by seeking
arguments that basically refer to the compatibility with the student’s learning style. Other result shows the
low effect of risk of privacy loss on usefulness, unlike what was originally thought. This type of b-learning
web systems inherently involves a review of the students’ private and personal data, mainly for contact
purposes. This will have a slight non-inhibiting effect on the usefulness of the web system.

REFERENCES
Bhattacherjee, A., & Premkumar, G. P., 2004. Understanding Changes in Belief and Attitude Toward Information
Technology Usage: A Theoretical Model and Longitudinal Test, MIS Quarterly 28(2), 229-254.
Burt, R. S., 1976. Interpretational confounding of unobserved variables in structural equation models, Sociological
Methods & Research, 5, 3-52.
Chen, L., Gillenson, M. L., & Sherrell, D. L., 2002. Enticing online consumers: an extended technology acceptance
perspective, Information & Management, 39, 705-719.
Davis, F., 1989. Perceived usefulness, perceived ease of use, and user acceptance of Information Technology, MIS
Quarterly, 13 (3), 319-340.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R., 1989. User Acceptance of Computer Technology: A Comparison of Two
Theoretical Models, Management Science 35 (8), 982-1003.
Featherman, M. S., & Pavlou, P. A., 2003. Predicting e-services adoption: A perceived risk facets perspective,
International Journal of Human-Computer Studies 59, 451-474.
Hair, J.F., Anderson, R. E., Tatham, R. L., & Black, W. C., 1998. Multivariate Data Analysis, (Upper Saddle River, NJ :
Prentice Hall).
Moon, J.W., & Kim, Y.G., 2001. Extending the TAM for a World-Wide-Web context, Information and Management, 38
(4), 217– 230.
Pavlou, P.A., 2002. What Drives Electronic Commerce? A Theory of Planned Behavior Perspective, Academy of
Management Annual Meeting, Denver, Colorado.
Saade, R., & Bahli, B., 2005. The impact of cognitive absorption on perceived usefulness and perceived use of use in on-
line learning: An extension of the Technology Acceptance Model, Information and Management, 42, 317-327.
Sánchez-Franco, M. J., & Rondán, J. L., 2005. Web acceptance and usage model: A comparison between goal-directed
and experiential web users, Internet Research 15(1), 21-48.

241
ISBN: 978-972-8924-89-8 © 2009 IADIS

APPLICATION OF TERNARY AHP

Sylvia Encheva
Stord/Haugesund University College
Faculty of Technology, Business and Maritime Sciences
Bjørnsonsg. 45, 5528 Haugesund, Norway

ABSTRACT
This work is devoted to application of ternary Analytic Hierarchy Process in the process of choosing the most suitable
organization for hosting a computer based system. Several alternatives are considered with respect to a predetermined
number of criteria.

KEYWORDS
Fuzzy logic, decisions, multi-criteria.

1. INTRODUCTION
The ternary Analytic Hierarchy Process (AHP), [6] facilitates development of a hierarchical structure of a
complex evaluation problem. Subjective judgment errors can be avoided and an increase of the likelihood for
obtaining reliable results can be achieved by application of the AHP.
The ternary AHP is sufficient with respect to sport games [1]. We propose use of ternary AHP in a
different aria. We believe that certain decision processes (definitely not all) can benefit from a simpler rating
scale. This will contribute to a higher level of consistency and will save both time and efforts for the decision
makers.
Decision makers find AHP to be a very useful tool. However, an increase of the number of alternatives
and criteria results in a larger amount of pair wise comparisons. The latter is time consuming and thus
increases the loads of the decision makers. Binary and ternary AHP have been proposed for solving problems
that do not require a larger scale of values representing the intensities of judgments [2] and [11].
The rest of the paper is organized as follows. Related work and supporting theory may be found in
Section 2. The decision process is presented in Section 3. The paper ends with a conclusion in Section 4.

2. BACKGROUND
AHP [6] employs paired comparisons in order to obtain ratio scales. Both actual measurements and
subjective opinions can be used in the process. The decision makers make pairwise comparison of
independent alternatives with respect to each criterion and among the involved criteria. The elements aij, i, j
= 1,2, ..., n in the obtained matrices satisfy the conditions aij > 0, aij = a-1ji, , aij =1 i, j = 1,2, ..., n.
The AHP steps are:
The number of levels in an AHP hierarchy can vary greatly according to the need of a particular decision
situation. Alternatives carry information of either a quantitative nature or a qualitative nature. For n
n( n − 1)
alternatives only paired comparisons needed be elicited since reciprocal response data is assumed.
2
The relative importance of criteria and preferences among the alternatives is stated based on pairwise
comparisons. The standard rating system employs 9-point scale where equal importance is denoted by 1 and
extreme importance is denoted by 9. The upper bound is a result of research in psychology indicating

242
IADIS International Conference e-Commerce 2009

humans' inability to consistently repeat their expressed gradations of preference finer than seven plus or
minus two.
A priority weight vector for the criteria is obtained via a synthesis process based on the preference scores
[7].
Final weights representing the priority ordering of the alternatives are calculated.

3. DECISIONS
Decision makers' judgements are consistent if ajk = aik, i, j, k = 1,2, ..., n. In this content consistency means
that if a basic amount of row data is available than all other data can be logically deduced from it.
Application of eigenvectors leads to a very useful consistency measure called consistency index CI, [6].
λ max − n
It is defined as CI = where n is the order of the comparison matrix and λ max is its maximum
n −1
eigen value. CI measures the transitivity of a preference that is a part of the pair wise comparisons.
A random index RI is the mean CI value of random generated matrices of size n, [6]. A consistency ratio
CI
CR is defined as CR = and is a measure of comparison between a given matrix and a random generated
RI
matrix in terms of consistency indexes. The upper bound for an acceptable CR is 0.1. A revision of
judgements is required if larger values are obtained.
Addition or deletion of alternatives can lead to possible rank reversal [9], [10], and [12]. According to
[13] change of local priorities can cause rank reversal before and after an alternative is added or deleted.
The distributive mode normalizes alternative scores under each criterion so that they sum to one. This
creates a dependency on how well all other alternatives perform and hence the potential for rank reversal. In
contrast, the ideal mode preserves rank by dividing the score of each alternative only by the score of the best
alternative under each criterion, [5].
Educational institutions are jointed in a collaborative network across organizational boundaries. One of
their current tasks is to choose the most suitable institution for hosting new computer based system that will
be used by all member institutions. A committee formed by members of the four institutions is making all the
decisions needed in the application of the AHP.

Figure 1. Sensitivity Analysis


Stability of priority ranking is often tested applying sensitivity analysis. The importance of the cost for
technical support criterion can be seen in Fig 1.

243
ISBN: 978-972-8924-89-8 © 2009 IADIS

Figure 2. Head-to-head Sensitivity Analysis


A head-to-head sensitivity analysis between two alternatives shows the relative magnitude of the
alternatives compare with respect to the involved criteria, Fig. 2.
Both Fig. 1 and Fig. 2 are obtained via the AHPproject - Free Web-Based Decision Support Tool [4].

4. CONCLUSION
The alternative H turns out to be the best choice for a host organization. It is worth noticing that both the
distributive mode and the ideal mode show that alternative H has received the highest ranking. The head-to-
head analysis was performed for all alternatives but we choose to present graphically a comparison between
the first two alternatives only.

REFERENCES
[1] C. Genest, F. Lapointe, and W. Drury, On a proposal of Jensen for the analysis of ordinal pairwise preferences using
Saaty's eigenvector scaling method, Journal of mathematical psychology, 37(4), 1993, pp. 575-610.
[2] R. E. Jensen, Comparison of consensus methods for priority ranking problems, Decision Sciences, 17, 1986, pp. 195-
211
[3] S. Hill and C. Zammet, Identification of community values for regional land use planning and management.
International Society of Ecological Economists Congress, Canberra, Australia, 26, 2000.
[4] http://www.ahpproject.com/
[5] I. Milleta and T. L. Saaty, On the relativity of relative measures accommodating both rank preservation and rank
reversals in the AHP, European Journal of Operational Research, 121(1), 2000, pp. 205-212.
[6] T. L. Saaty, The Analytic Hierarchy Process, McGrawHill, NewYork, 1980.
[7] T. L. Saaty, Fundamentals of Decision Making and Priority Theory with the Analytic Hierarchy Process, 6, RWS
Publications, Pittsburgh, PA, 2000.
[8] T. L. Saaty, The Analytic Network Process, RWS Publications, 2001.
[9] T. L. Saaty and L. G. Vargas, Experiments on rank preservation and reversal in relative measurement, Mathematical
and Computer Modelling, 17(4-5), 1993, pp. 13-18.
[10] S. Schenkerman, Avoiding rank reversal in AHP decision-support models, European Journal of Operational
Research, 74, 1994, pp. 407-419.
[11] I. Takahashi, AHP Applied to Binary and Ternary Comparisons, Journal of Operations Research Society of Japan,
33(3), 1990, pp. 199-206.
[12] E. Triantaphyllou, Two new cases of rank reversals when the AHP and some of its additive variants are used that do
not occur with the multiplicative AHP, Journal of Multi-Criteria Decision Analysis, 10, 2001, pp. 11-25.
[13] J. Wang, Multi-criteria decision-making approach with incomplete certain information based on ternary AHP,
Journal of Systems Engineering and Electronics, 17(1), 2000, pp. 109-114.

244
Doctoral
Consortium
IADIS International Conference e-Commerce 2009

FLOW AND ONLINE CONSUMER BEHAVIOUR: AN


EMPIRICAL ANALYSIS OF E-LEARNING EXPERIENCES

Irene Esteban-Millat
Written under the supervision of
Dr Inma Rodríguez-Ardura and Dr Antoni Meseguer
Universitat Oberta de Catalunya
Doctoral Programme on Information and Knowledge Society-2009

ABSTRACT
This research project proposes to advance in the comprehension of online learning experiences in general and, in
particular, of the states of flow that emerge in the consumption of higher-education training products in virtual
environments. To this purpose, we propose to develop and test empirically a flow model. This initiative aims to clarify
the ambiguities and inconsistencies existing in the literature regarding the conceptualisation and operationalisation of
flow in general websurfing and consumption contexts, and in turn to characterise the learning process in virtual learning
environments.

KEYWORDS
Flow; learning behaviour; e-commerce; training/learning environments, training products, structural equation modelling.

1. INTRODUCTION
In their drive to understand online learning behaviours, researchers have often turned to the approaches
habitually used in analysing behaviour in the conventional media, but they have also considered new
elements, like flow, which are especially applicable in virtual environments. In spite of the efforts made by
scientific research in this line, the literature presents serious discrepancies and inconsistencies regarding the
conceptualisation and operationalisation of the concept of flow. In order to shed some light on these issues,
various authors have recommended, among other measures, studying them in specific areas of learning.
One area of special interest is the consumption of online higher-education training products because of
the significant and growing importance acquired in recent years by virtual learning environments in the range
of services offered by educational centres. However, little attention has been paid to this, and the results
presented by the studies on flow carried out in this field cannot be considered conclusive.

2. REVIEW OF THE LITERATURE


Flow (Csikszentmihalyi, 1975) is described as a pleasurable and fulfilling experience in itself (Pierce, 2005).
It is considered a complex concept because it is related to a large number of elements of a fundamentally
subjective or affective nature (such as the balance between challenges and skills, perception of control,
focalised attention, involvement, perception of enjoyment, telepresence, time distortion and interactivity).
The concept of flow has been adapted and increasingly used in computer-mediated environments to
explain consumers' behaviour when they surf the Net (Hoffman and Novak, 1996; Chen et al., 2000; Novak
et al., 2000).2000). The fact is that providing optimal websurfing and online shopping experiences,
characteristic of a state of flow, can give rise to desirable results in consumers' consumption behaviour
(Novak et al., 2003), such as a favourable attitude towards the brand or a longer duration of the visit to the
website, among others. In addition, other positive effects of flow have been confirmed, such as learning
(Ghani, 1995) and positive subjective experiences (Hoffman et al., 1996; Novak et al., 2000; Shin, 2006).

247
ISBN: 978-972-8924-89-8 © 2009 IADIS

Moreover, and in view of the growing importance of the Net in the sphere of university education, the
study of the concept of flow is especially interesting in the specific context of the consumption of higher-
education training products. Furthermore, since these institutions are coming under increasing pressure from
market forces and other factors of the environment, which leads them to adopt principles and strategic
orientations that focus the organisation's efforts on the satisfaction of the user or consumer (in this case, the
student) and the establishment of close, prolonged and mutually beneficial relationships (Daradoumis et al.,
2008). As a result, detailed study of the behaviour of their end consumers takes on special importance.
To date, approaches in this field via the concept of flow have been based mainly on the identification
and/or analysis of some of the factors that facilitate the flow experience (Pearce, 2005; Pearce et al., 2005;
Shin, 2006; O'Broin and Clarke, 2006; and Choi et al., 2007). However, there is a shortage of consistent flow
models that can be applied to training environments and that will help to respond to many questions for
which we do not yet have definitive answers (Pierce, 2005).

3. RESEARCH QUESTIONS AND OBJECTIVES


Realising the importance of more extensive knowledge of online learning experiences via the concept of flow
and its application in higher-education e-learning environments, we propose a research task with the following
primary objectives:
PRIMARY OBJECTIVE 1: To confirm the existence of forms of flow in e-learning experiences.
In spite of the scarcity of research work carried out in the sphere of consumption of online training
products and the fact that the results obtained by them cannot be considered conclusive (they are based on
small-sized or convenience samples, etc.), they do indicate the existence of flow sensations in e-learning
experiences. It is therefore proposed to contribute empirical evidence that will confirm the existence of flow
phenomena during websurfing in virtual learning environments and online consumption of training products.
Consequently, we put forward the following research questions:
Research Question 1.1: Do forms of flow exist in the sphere of e-learning?
PRIMARY OBJECTIVE 2: To identify the flow antecedents and the interaction between them.
Although there is a certain degree of consensus among researchers regarding the definition of flow, there
seems to be some disagreement, or at least a certain ambiguity, in specifying what elements are its
antecedents (see Novak et al., 2000; and Chen et al., 2000; among others).
In addition, it would be useful to analyse the relationship of other variables, not customarily contemplated
by the literature on flow, with this concept. For instance, it would be helpful to test what elements of website
design (user interface, surfing structures, etc.) facilitate flow experiences, and how they do so. It would also
be useful to consider the relationship of flow with individual differences (psychological, demographic and
socio-economic) between consumers, their experience in the Net, situational factors and the connection
quality of the line, among others. To this purpose, an answer is sought to the following research question:
Research Question 2.1: What are the flow antecedents in e-learning environments?
Likewise, there does not appear to be a consensus among researchers concerning the interactions existing
between certain antecedents of the concept of flow. And, although the model developed by Novak et al.
(2000) to explain some of these interactions is notable for its exhaustiveness and importance, it seems
necessary to study these aspects in greater detail, both to identify new relationships and to detect the causal
links between them. For this reason, the following research question is posed:
Research Question 2.2: What are the interactions between flow antecedents in e-learning environments?
PRIMARY OBJECTIVE 3: To identify the main consequences of the state of flow.
In the literature, various consequences of the state of flow are proposed, most notably, due to being the
most frequently mentioned, an increase in the duration and repetition of visits (Webster et al., 1993; Shih,
1998; and Koufaris, 2002). However, it has only been possible to validate some of them, such as positive
subjective experiences and learning of websurfing techniques, as direct consequences of the state of flow.
Hence the interest in testing empirically some of the attitudinal and behavioural consequences of flow
proposed by previous studies. Accordingly, the following research question is posed:
Research Question 3.1: What are the main consequences deriving from the flow experience in e-learning
environments?
In the specific field of e-learning, it would be interesting to probe more deeply into the specific study of
one of the possible consequences of flow, namely learning. Several works suggest a positive relationship

248
IADIS International Conference e-Commerce 2009

between flow and learning (Csikszentmihalyi, 1989; Ghani et al., 1991; Webster et al., 1993). It should be
taken into account, however, that the relationship between the two elements is not simple, and neither are the
measurement of flow nor the specification of the nature of the learning process (Pearce et al., 2005). In this
way, it is proposed to answer the following research question:
Research Question 3.2: How do learning processes deriving from the state of flow in e-learning
environments develop?
PRIMARY OBJECTIVE 4: To determine the relationship between flow and learning behaviours.
The literature presents contradictory results on the type of orientation in websurfing that best facilitates
the state of flow: whether it is the type whereby the consumer aims to satisfy clear consumption goals, guided
by rational impulses that lead him/her to search for the best option; or another more spontaneous and
exploratory type that manifests itself in the search for pleasant consumption experiences. While some studies
(Novak et al., 2003) show that websurfing strategies oriented to achieving particular consumption goals are
those that best facilitate the state of flow, others (Hoffman and Novak, 1996; and Novak et al., 2000), in
contrast, indicate that the adoption of a hedonic strategy better facilitates the emergence of flow experiences.
This makes it necessary to conduct further research to provide clarifying answers. This is the motive
underlying the following research question:
Research Question 4.1: What is the relationship between flow and the orientations of online behaviour
in e-learning environments?
In accordance with the proposal formulated by some authors (Novak et al., 2003; among others) to shed
light on this question, this study proposes to confirm the existence of two differentiated forms of flow, each
one of which would be predominantly linked to a specific websurfing strategy or orientation. In this way, the
aim is to affirm the existence of possible differences in determining the state of flow according to the type of
websurfing (oriented to clear consumption or hedonic goals) carried out by the consumer.
The study will also seek to evaluate, for each defined form of flow, the antecedents that determine its
emergence and also the perceptions, attitudes and behaviours that are specific consequences of it. In addition,
it would be interesting to identify what type of flow best facilitates the development of desirable consumption
behaviours for companies (such as favourable attitudes towards the brand and the online supply, longer
duration of visits or intention of repeating the visit in the future). This could be the basis for an answer to the
following questions:
Research Question 4.1: Are there e-learning behaviours that occur predominantly in certain forms of
flow?
Research Question 4.2: What form of flow best facilitates desirable e-learning behaviours for the
organisation?
In the event of confirming the existence of two forms of flow, each linked to a specific websurfing
orientation, it could also be verified whether these can occur at the same time in one and the same learning
experience. In addition, and in the event that two forms of flow can indeed occur in the same learning
experience or situation, it will be useful to determine whether one of the two dominates over the other and
contributes more to the learning experience. In this way, the study seeks to answer the following research
question:
Research Question 4.3: Does one form of flow dominate over another in the online learning experience?

4. METHODOLOGY
In view of the lack of consensus on many constructs related to flow and the scarcity of research into this
phenomenon in e-learning environments, it was considered advisable to carry out an initial qualitative analysis
on the basis of two group dynamics. The expectation is that the results deriving from this analysis, along with
the evidence provided by the literature, will make it possible to draw up a proposal of flow-related elements in
e-learning experiences.
The next step consists in defining the items which are to measure each of the elements proposed by means
of Likert (multi-item) scales.Preceded by exploratory factor analysis, the structure of the scales will be
assessed for reliability through a SEM-Lisrel application.
After configuring a complete analytical flow model in the field of online training products, it will be
empirically tested by applying the following steps:
- Summary of key features of the conceptual flow model.

249
ISBN: 978-972-8924-89-8 © 2009 IADIS

- Definitions and operationalisation of constructs (application of measurement scales).


- Formulation of hypotheses to be tested empirically, deriving from the research questions.
- Development of a quantitative survey instrument (preceded by a pilot test in order to check its coherence
and assess the validity and reliability of the measurement scales of the constructs included).
- Data collection. The population will consist of students of the Open University of Catalonia (UOC) with
experience in e-learning, from which a minimum sample of 400 individuals will be selected. The instrument
will be administered in an electronic format, via an email message including a link giving direct access to the
website questionnaire.
- Analysis of results. Through the use of a structural modelling approach we will test the conceptual
model: firstly by purifying the measurement model and secondly by fitting the base model.

5. WORK DONE SO FAR


Review of the literature in the following topics or lines of research:
- consumers' behaviour and its determining factors,
- online consumption motivations and behaviour,
- online flow experiences,
- marketing-education interface,
- state of flow in e-learning.

REFERENCES
Chen, H. et al., 2000. “Exploring web users’ optimal flow experiences”, Information Technology & People, Vol. 3 (4),
pp. 263-281.
Choi, D.H. et al., 2007. “ERP training with a web-based electronic learning system: the flow theory perspective”,
International Journal of Human-Computer Studies, Vol. 65 (3), pp. 223-243.
Csikszentmihalyi, M., 1990. Flow: the psychology of optimal experience. New York: Harper and Row.
Daradoumis, T. et al. (Forthcoming). “CRM and higher education: developing a monitoring system to improve
relationships in e-learning environments”, International Journal of Services Technology and Management.
Ghani, J.A. et al., 1991. “The experience of flow in computer-mediated and in face-to-face groups”, in J.I. Degross; I.
Benbasat; G. Desanctis; C.M. Beath (eds.), Proceedings of the Twelfth International Conference on Information
Systems, pp. 229-237. New York: ICIS.
Hoffman, D.L.; Novak, T.P., 1996. “Marketing in hypermedia computer mediated environments: conceptual
foundations”, Journal of Marketing, Vol. 60 (3), pp. 50-68.
Koufaris, M., 2002. “Applying the technology acceptance model and flow theory to online consumer behaviour”,
Information Systems Research, Vol. 3 (2), pp. 205-223.
Neville, K. et al., 2002. “Mentoring distance learners: an action research study”, in X European Conference on
Information Systems. Gdañsk (Poland): Universität Trier.
Novak, T.P. et al., 2003. “The influence of goal directed and experiential activities on online flow experiences”, Journal
of Consumer Psychology, Vol. 3 (1/2), pp. 3-16.
Novak, T. P. et al., 2000. “Measuring the customer experience in online environments: a structural modeling approach”,
Marketing Science, Vol. 19 (1), pp. 22-42.
Pearce, J. et al., 2005. “The ebb and flow of online learning”, Computers in Human Behavior, Vol. 21 (5), pp. 745-771.
Pearce, J., 2005. “Engaging the learner: how can the flow experience support e-learning?”, in G. Richards (ed.),
Proceedings of World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, pp.
2.288-2.295. Chesapeake (Virginia): AACE.
Rodríguez-Ardura, I., 2008. Marketing.com y comercio electrónico en la sociedad de la información (3ª. ed.). Madrid:
Ediciones Pirámide and ESIC Editorial.
Shin, N., 2006. “Online learner’s flow experience: an empirical study”, British Journal of Educational Technology, Vol.
37 (5), pp. 705-720.
Webster, J. et al., 1993. “The dimensionality and correlates of flow in human computer interactions”, Computers in
Human Behavior, Vol. 9 (4), pp. 411 -426.

250
IADIS International Conference e-Commerce 2009

THE IMPACT OF CULTURAL ADAPTATION ON THE


EFFECTIVENESS OF E-COMMERCE WEBSITES

Femke Vyncke, Malaika Brengman, Olga De Troyer


Vrije Universiteit Brussel
Pleinlaan 2, 1050 Brussels, Belgium

ABSTRACT
In an online business context, cultural adaptation (Singh and Matsuo, 2004) or localization (Cyr and Trevor-Smith, 2004;
Okazaki, 2004) is the intensive process of designing or adapting a website to accommodate the culture-specific needs of
online customers in host markets. The current doctoral research aims to investigate whether cultural adaptation improves
the effectiveness of e-commerce websites and which website features are important in this matter. This study, as such,
aspires to (1) deliver a substantial contribution to the standardization/adaptation debate following the recommendations
made by Taylor (2005) and (2) meet the need for systematic cross-cultural studies on the effectiveness of website design
aspects appealed for by Cyr (2008).

KEYWORDS
Culture, website design, effectiveness.

1. PROBLEM STATEMENT AND RESEARCH OBJECTIVE


The main problem statement of this research tackles the question of whether e-commerce websites need to be
localized in order to attract and retain international clients and, if this is the case, which website features
would require localization.
Localization, in an online context, is the intensive process of adapting a website to a particular language,
cultural expectations, and desired local “look-and-feel” (Cyr and Trevor-Smith, 2004; Singh and Baack,
2004; Okazaki, 2004; Steenkamp and Geyskens, 2006). It entails creating country-specific, culturally
congruent websites. In localizing a website such details as local terminology, tone of the text, time zones,
currency, country specific symbols, local color sensitivities, navigational preferences, gender roles, and
geographic examples must all be considered. Localization is also referred to as cultural adaptation (Singh and
Matsuo, 2004) or local adaptation (Taylor, 2005).
To investigate how cultural adaptation impacts the effectiveness of transaction-oriented e-commerce
websites, a comprehensive experimental design will be set up. In this experiment, a systematic refined
approach will be applied, in which internet users from different EU countries will be confronted with
fictional websites that will be adjusted to several cultural dimensions on different domains (different website
features) and at various levels (low or high reflection of a certain cultural value or dimension). The
effectiveness of the different websites will be measured using an extensive online survey. This way the
dissertation aims to find out to which extent cultural adaptation is desired and to which degree localization
has an impact on the different effectiveness measures.

2. STANDARDIZATION OR ADAPTATION?
Whether companies should implement global marketing strategies, and especially how, has turned out to be a
complex matter that has yet to be solved in the academic world (Usunier and Lee, 2005). The standardization
vs. adaptation debate, in which it is investigated whether marketing stimuli need to be adapted to cultural
differences between countries, has been taking place for a while for offline marketing communication (i.e.

251
ISBN: 978-972-8924-89-8 © 2009 IADIS

print and television advertising, please refer to Theodosiou and Leonidou, 2003; De Mooij, 2004 and Taylor,
2005) but has only just taken off in the domain of online communication (Okazaki, 2004; Steenkamp and
Geyskens, 2006; Brengman, 2006; Baack and Singh, 2007; Cyr, 2008). Two main characteristics of the
World Wide Web are of interest in this debate. On the one hand the internet is a medium of mass
communication, accessible to everyone, which speaks in favor of standardization. On the other hand it is a
very interactive medium, which enables companies to retrieve information on internet segments on the basis
of which a high level of adaptation to the user can be introduced.
Within the ‘bricks-and-mortar’ retailing context it has been noticed that whereas standardization
strategies have successfully been implemented in the past 25 years, the necessity to adapt to local needs and
wishes (= localization) has come forth recently (Rigby and Vishwanath, 2006). The question is then whether,
within a ‘bricks-and-clicks’ or ‘pure’ e-tailing context, localization or standardization is desirable and for
which cultural dimensions this needs to be done.

3. CULTURE AND CULTURAL SENSITIVITY OF WEBSITES


According to social-scientific approach, culture can be defined as a predisposition in attitude and behavior
that is kept in place and transmitted through social upbringing and social intercourse. It is a collective
phenomenon of which the core is formed by positive and negative values which, according to Hall (1976),
Hofstede (2001) and Schwartz (1994) can be summarized into a limited number of underlying cultural
dimensions as can be seen in Table 1.
Table 1. Important Cultural Frameworks
Author Cultural dimensions
Hall (1976) High-context culture vs. low-context culture
Hofstede (2001) Masculinity vs. femininity, High vs. low uncertainty avoidance, High vs. low power
distance, Collectivism vs. individualism and Long-term vs. short-term orientation
Schwartz (1994) Conservatism vs. autonomy (intellectual and affective), Hierarchy vs. egalitarianism and
Mastery vs. harmony

Since the Internet is a global communication and transaction medium (Steenkamp and Geyskens, 2006),
technically one central website of an organization should be sufficient to reach all consumers, everywhere in
the world, 24/7. However, looking at online reality suggests that websites are a culturally sensitive medium.
Many internationally active organizations operate not one, but several websites, each aimed at a different
target country or group of countries (= a different national culture). To illustrate this: on January 14, 2009,
Swatch operated websites for 35 different countries, Unicef operated 110 websites and Coca-Cola even as
much as 125 websites. A mere glimpse at these websites already reveals differences in type of visuals, menu
layouts, etc.
The recent academic research that aimed itself at investigating the influence of culture on website design
and the need for localization or standardization ended up delivering contradicting results. Several content
analysis studies have been carried out in order to investigate whether existing websites on the web are
culturally congruent with the country they are targeting (i.e. quantification and scientific exploration of the
insight explained in the previous paragraph). Some of these studies conclude that websites are culturally
neutral (= standardized) marketing stimuli (Callahan, 2005; De Troyer et al, 2006) whereas others conclude
that cultural adaptation indeed takes place in websites (Okazaki and Rivas, 2002; Robbins and Stylianou,
2003; Cyr and Trevor-Smith, 2004; Singh and Matsuo, 2004; Singh et al, 2005; Brengman, 2006). Several
studies also investigated the impact of a culturally sensitive website design on website effectiveness
(although only very few apply a true experimental design). Here again two groups of results can be
distinguished. Some researchers believe that cultural factors have no impact on perceptions of websites and
recommend a standardized approach (Hermans and Shanahan, 2002; Dou et al, 2003; Liu et al, 2004). Other
studies by Fink and Laupase (2000), Luna et al (2002), Warden et al (2002), Singh et al (2004), Singh et al
(2006), and Cyr (2008) confirm, however, that the internet is not a culturally neutral medium and that
culturally sensitive design indeed improves websites’ effectiveness. They show that there are intercultural
differences in the perceptions and the expectations of website content and emphasize that values, look and
feel, themes and symbols in websites need to be adapted to local cultures.

252
IADIS International Conference e-Commerce 2009

4. FILLING THE SCIENTIFIC GAP


From the previous paragraph it may be concluded that no conclusive answer to the
standardization/localization question with regard to websites can be provided. Additionally, it must be noted
that studies so far focused to a large extent on the practice of localization by making comparisons of existing
websites across different nations through content analyses (etic approach). Attempts have also been made to
study the impact of cultural adaptation on effectiveness by measuring reactions on existing potentially
culturally congruent websites (emic approach). Effectiveness studies using true experimental designs are
however scarce and those that exist mostly focus on a narrow range of website features (Warden et al, 2002
for example only focus on language). In the proposed study the aim is to examine, in an experimental design,
reactions to self-developed and systematically manipulated websites adapted along different cultural
dimensions, in order to investigate the level at which cultural adaptation is desirable and the impact the
different degrees of localization can have on effectiveness measures.

5. RESEARCH PLAN

5.1 Completed Work


First of all a comprehensive conceptual framework had to be developed focusing on the standardization
and adaptation of websites and the effectiveness of websites:
• The development of this framework has been based on a thorough literature study that has brought a
better notion of (1) the effectiveness of communication in an intercultural context and in the
adaptation/standardization debate, (2) the influence of cultural values on consumer behavior, more
specifically in relation to the use of the internet and specific internet needs, and (3) the ‘localization’ or
‘(inter)cultural adaptation’ of websites and the impact on the website user and the effectiveness of websites.
o TIMING: Literature study finished, 1 paper finished but not yet published (‘What do
content analytic studies reveal regarding the cultural sensitivity of websites? An overview of empirical
evidence according to a vote-counting method’ by Vyncke, Brengman and de Troyer) and completion of a
second paper foreseen by end of 2009.
• Essential insights were also drawn from explorative research of the practice of adapting websites
and the effectiveness of intercultural adaptation versus standardization based on expert opinions and analysis
of ‘best practices’
o TIMING: Explorative research has already started (case study within Honda, based on
interviews and internal guideline documents concerning international website design), completion foreseen
by end of 2009).

5.2 Next Steps


For the empirical section of this study the focus will be on the European Union. Creating an overview of the
cultural and institutional differences and similarities between countries and regions within the European
Union will enable us to identify regions (clusters) between which the desirability of adaptation of e-
commerce websites can be examined. Besides cultural differences, national context factors will also be taken
into account (e.g., political regime, legal framework, tax climate, specific retail situations and e-readiness,
with, amongst others, aspects such as the internet penetration and the internet use)
TIMING: Foreseen for first half of 2010.
Finally various experiments will be set up to investigate whether Europeans, due to their cultural and/or
institutional differences, indeed react differently to websites that reflect different cultural values. The goal is
to do this for a number of e-commerce websites, across different sectors. The cultural adaptation of these
different experimental websites will be done on the basis of different layers per cultural dimension, so that a
full-factorial experimental design can be set up (e.g., high versus low ‘reflected Power distance’ x high
versus low ‘reflected Uncertainty avoidance’ x high versus low ‘reflected Masculinity’, etc.). Experimental

253
ISBN: 978-972-8924-89-8 © 2009 IADIS

subjects from various European clusters that score specifically low or high for the respective cultural
dimensions will be confronted to websites that may or may not be adapted along these cultural dimensions
(monadic experiment: 40 respondents per experimental condition, recruited through an internet panel). An
online survey will then be used to question their attitude towards the website, their satisfaction, their trust in
the source, etc. (using amongst others the WebQual instrument developed by Loiacono et al, 2007), as well
as their attitude towards the products/services for sale on the site and their intentions to purchase these items.
Additionally, the respondents’ true cultural values will be measured, in order to keep into account the
moderating impact of individual and regional differences within the national population (e.g., Schwartz,
1994). The experimental data will be processed and analyzed in SPSS, using multivariate analysis techniques
and structural comparison methods (AMOS, Lisrel), in order to give an answer to the question of whether the
development of different websites should be done taking into account the cultural differences between
regions within the EU and which cultural dimensions are the most important in the process of localization.
TIMING: Mid 2010 till beginning of 2011: set up of experiments and website designs. Till mid 2011:
execution of experiments. Till beginning 2012: processing of results. Mid 2012: final reporting and doctoral
defense.

REFERENCES
Baack, D. and Singh, N., 2007. Culture and Web Communications. Journal of Business Research, Vol. 60, No. 3, pp.
181-188.
Brengman, M., 2006. Culturele Communicatie via het Internet. Een Vergelijking tussen Belgische en Nederlandse
Websites, in Duyck, R. and Van Tilborgh, C. (ed.) Management Jaarboek. PIMMS en Vlaamse Management
Associatie, Wetteren, Belgium.
Callahan, E., 2005. Cultural Similarities and Differences in the Design of University Websites. Journal of Computer-
Mediated Communication, Vol. 11, No. 1.
Cyr, D., 2008. Modeling Website Design across Cultures. Relationships to Trust, Satisfaction and E-loyalty. Journal of
Management Information Systems, Vol. 24, No. 4, pp. 47-72.
Cyr, D. and Trevor-Smith, H., 2004. Localization of Web Design. An Empirical Comparison of German, Japanese, and
United States Web Site Characteristics. Journal of the American Society for Information Science and Technology,
Vol. 55, No. 13, pp. 1199–1208.
De Mooij, M., 2004. Consumer Behavior and Culture. Consequences for Global Marketing and Advertising. Sage,
Thousand Oaks, California.
De Troyer, O. et al, 2006. On Cultural Differences in Local Web Interfaces. Journal of Web Engineering, Vol. 5, No. 3,
pp. 246-265.
Dou, W. et al, 2003. Consumer Patronage of Ethnic Portals. International Marketing Review, Vol. 20, No. 6, pp. 661-
677.
Fink, D. and Laupase, R., 2000. Perceptions of Web Site Design Characteristics. A Malaysian/Australian Comparison.
Internet Research, Vol. 10, No. 1, pp. 44-55.
Hall, E., 1976. Beyond Culture. Doubleday and Company, Garden City, New York.
Hermans, M. and Shanahan, K., 2002. The Reification of Levitt. Advertising Preferences for Mexican and American
Online Consumers. Developments in Marketing Science, Vol. 25, pp. 147.
Hofstede, G., 2001. Culture’s Consequences. Comparing Values, Behaviors, Institutions and Organizations across
Nations, 2nd edition. Sage, Thousand Oaks, California.
Liu, C. et al, 2004. American and Taiwanese Perceptions Concerning Privacy, Trust, and Behavioral Intentions in
Electronic Commerce. Journal of Global Information Management, Vol. 12, No. 1, pp. 18-40.
Loiacono, A. et al, 2007. WebQual. An Instrument for Consumer Evaluation of Web Sites. International Journal of
Electronic Commerce, Vol. 11, No. 3, pp. 51-87.
Luna, D. et al, 2002. Cross-Cultural and Cognitive Aspects of Web Site Navigation. Journal of the Academy of
Marketing Science, Vol. 30, No. 4, pp. 397-410.
Okazaki, S., 2004. Do Multinationals Standardise or Localise? The Cross-Cultural Dimensionality of Product-Based Web
Sites. Internet Research, Vol. 14, No. 1, pp. 81-94.
Okazaki, S. and Rivas, J., 2002. A Content-Analysis of Multinationals’ Web Communication Strategies. Cross-Cultural
Research Framework and Pre-testing. Internet Research, Vol. 12, No. 5, pp. 380-390.

254
IADIS International Conference e-Commerce 2009

Rigby, D. and Vishwanath, V. 2006. Localization. The Revolution in Consumer Markets. Harvard Business Review, Vol.
84, No. 4, pp. 82-93.
Robbins, S. and Stylianou, A., 2003. Global Corporate Web Sites. An Empirical Investigation of Content and Design.
Information and Management, Vol. 40, No. 3, pp. 205-212.
Schwartz, S., 1994. Beyond Individualism/Collectivism. New Cultural Dimensions of Values, in Kim, U. et al (ed.)
Individualism and collectivism. Theory, Method, and Applications. Sage, Thousand Oaks, California.
Singh, N. and Baack, D., 2004. Web Site Adaptation. A Cross-Cultural Comparison of U.S. and Mexican Web Sites.
Journal of Computer-Mediated Communication, Vol. 9, No. 4.
Singh, N. and Matsuo, H., 2004. Measuring Cultural Adaptation on the Web. A Content Analytic Study of U.S. and
Japanese Web Sites. Journal of Business Research, Vol. 57, No. 8, pp. 864-872.
Singh, N. et al, 2004. To Localize or to Standardize on the Web. Empirical Evidence from Italy, India, Netherlands,
Spain, and Switzerland. Multinational Business Review, Vol. 12, No. 1, pp. 69-87.
Singh, N. et al, 2005. Adaptation of Cultural Content. Evidence from B2C E-commerce Firms. European Journal of
Marketing, Vol. 39, No. 1/2, pp.71-86.
Singh, N. et al, 2006. Understanding International Web Site Usage. A Cross-National Study of German, Brazilian, and
Taiwanese Online Consumers. International Marketing Review, Vol. 23, No. 1, pp. 83-97.
Steenkamp, J.-P. and Geyskens, I., 2006. How Country Characteristics Affect the Perceived Value of Web Sites. Journal
of Marketing, Vol. 70, No. July, pp. 136-150.
Taylor, C., 2005. Moving International Advertising Research Forward. Journal of Advertising, Vol. 34, No. 1, pp. 7-16.
Theodosiou, M. and Leonidou, L., 2003. Standardization versus Adaptation of International Marketing Strategy. An
Integrative Assessment of the Empirical Research. International Business Review, Vol. 2, No. 2, pp. 141-171.
Usunier, J.-C. and Lee, J., 2005. Marketing Across Cultures. Pearson Education, Harlow, England
Warden, C. et al, 2002. How Worldwide Is Marketing Communication on the World Wide Web? Journal of Advertising
Research, Vol. 42, No. 5, pp. 72-84.

255
ISBN: 978-972-8924-89-8 © 2009 IADIS

256
AUTHOR INDEX
Abdolvand, N. ....................................................3 Lin, F.............................................................. 105
Afaghzadeh, S. ...................................................3 Löffler, C........................................................ 210
Albadvi, A. .........................................................3 López-Herrera, A. ................................. 237, 239
Aleid, F.............................................................11 Lozitskiy, O.................................................... 123
Alimazighi, Z. ................................................229 Martins, F....................................................... 163
Alturas, B. ......................................................183 Meseguer, A. .................................................. 247
Andrade, P......................................................183 Miguel, R. ...................................................... 113
Bigdeli, O. ..........................................................3 Muñoz-Leiva, F...................................... 237, 239
Blanco, J. ..........................................................97 Neto, P.............................................................. 61
Bouchbout , K.................................................229 Pohn, B........................................................... 193
Breitsohl, J......................................................205 Ponisio, M. ....................................................... 35
Brengman, M..................................................251 Rangone, A. ................................................... 131
Briz, J. ..............................................................19 Renga, F. ........................................................ 131
Chung, L...........................................................27 Ribeiro, L. ...................................................... 113
Chung, Y. .......................................................139 Riemens, L. ...................................................... 35
Cortimiglia, M. ...............................................131 Robra-Bissantz, S........................................... 171
Couto, J................................................... 188, 224 Rodríguez, M. .................................................. 27
Cruz, R. ............................................................61 Rodríguez-Ardura, I. ...................................... 247
Cunha, R...........................................................61 Rogerson, S. ..................................................... 11
Darooei, A. .....................................................199 Sánchez-Fernández, J............................ 237, 239
de Felipe, I........................................................19 Schranz, M. .................................................... 193
de Troyer, O. ..................................................251 Shepitsen, A. .................................................. 147
do Prado, A.......................................................97 Stoimenov, L.................................................... 69
Duarte, P. .......................................................113 Swatman, P. .................................................... 53
Eck, P. ..............................................................35 Takahashi, M.................................................... 45
Encheva, S......................................................242 Tan , W............................................. 89, 139, 155
Escofet, E. ........................................................27 Tan, Y. ..................................................... 89, 155
Esteban-Millat, I.............................................247 Terano, T.......................................................... 45
Fairweather, B. .................................................11 Tiago, F. ................................................. 188, 224
Fernández, M....................................................19 Tiago, M................................................. 188, 224
Gaedke, Y.......................................................219 Tomuro, N...................................................... 147
Garrido, J..........................................................27 Torres, A. ....................................................... 163
Grechenig, T.....................................................77 Tsuda, K........................................................... 45
Higgins, S. ......................................................123 Viedma-del-Jesus, M.............................. 237, 239
Holt, D..............................................................53 Vyncke, F....................................................... 251
Hwang, C........................................................105 Walgampaya, C.............................................. 123
Kajan, E. ..........................................................69 Weinmann, M................................................. 219
Kantardzic, M.................................................123 Wenerstrom, B. ............................................. 123
Khammash, M. ...............................................205 Wilkins, L. ....................................................... 53
Khayyambashi, M. .........................................199
Khiaonarong.T................................................215
King, D. ..........................................................123
Labidi, S. ..........................................................61
Lehrner, T.......................................................193
Leitner, P. .........................................................77

You might also like