Next Issue
Volume 11, September
Previous Issue
Volume 11, January
 
 
Journal of Theoretical and Applied Electronic Commerce Research is published by MDPI from Volume 16 Issue 3 (2021). Previous articles were published by another publisher in Open Access under a CC-BY 3.0 licence, and they are hosted by MDPI on mdpi.com as a courtesy and upon agreement with Faculty of Engineering of the Universidad de Talca.

J. Theor. Appl. Electron. Commer. Res., Volume 11, Issue 2 (May 2016) – 6 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
277 KiB  
Article
An Approach to Modeling Web Services Datatype Descriptions
by Samer Hanna
J. Theor. Appl. Electron. Commer. Res. 2016, 11(2), 64-82; https://doi.org/10.4067/S0718-18762016000200006 - 1 May 2016
Cited by 1 | Viewed by 371
Abstract
Web services are becoming a significant part of Web applications in different fields such as e-commerce applications. A problem that is facing Web services is that the Web services datatype descriptions inside Web Services Description Language are difficult to be understood by service [...] Read more.
Web services are becoming a significant part of Web applications in different fields such as e-commerce applications. A problem that is facing Web services is that the Web services datatype descriptions inside Web Services Description Language are difficult to be understood by service providers or requesters due to many reasons; one of these reasons is the lack of expressiveness of the Schema based datatype system that is used to describe provider side datatypes inside Web Services Description Language. This problem leads to producing vague, custom and inconsistent datatype descriptions by different Web services development techniques inside the auto-generated Web Services Description Languages. This paper proposes an approach to formally model Web services datatype descriptions in order to solve the previous problem. The approach is based on mapping the datatype section inside a Web Services Description Language into a more understandable tree and models. Following the paper’s approach, service requesters can understand the datatype descriptions of the provided operations by a Web service inside Web Services Description Language and consequently this will make it easier to invoke these operations. A prototype tool has been built and it proved to be efficient in enhancing Web services understandability. Full article
2191 KiB  
Article
Allocating Sensor Network Resources Using an Auction-Based Protocol
by Jarrod Trevathan, Lee Hamilton and Wayne Read
J. Theor. Appl. Electron. Commer. Res. 2016, 11(2), 41-63; https://doi.org/10.4067/S0718-18762016000200005 - 1 May 2016
Cited by 5 | Viewed by 474
Abstract
Wireless sensor networks are being increasingly used for remote environmental monitoring. Despite advances in technology, there will always be a disparity between the number of competing sensor devices and the amount of network resources available. Auction-based strategies have been used in numerous applications [...] Read more.
Wireless sensor networks are being increasingly used for remote environmental monitoring. Despite advances in technology, there will always be a disparity between the number of competing sensor devices and the amount of network resources available. Auction-based strategies have been used in numerous applications to provide efficient/optimal solutions for determining how to fairly distribute system resources. This paper investigates the suitability of using online auctions to allow sensors to acquire preferential access to network resources. A framework is presented that allocates network priority to sensor devices based on their characteristics such as cost, precision, location, significant changes to readings, and amount of data collected. These characteristics are combined to form the value for a particular sensor’s bid in an auction. The sensor with the highest bid wins preferential access to the network. Priority can be dynamically updated over time with regard to these characteristics, changing conditions for the phenomenon under observation, and also with input from a back-end environmental model. We present an example scenario for monitoring a flood’s progress down a river to illustrate how the proposed auction-based system operates. A series of simulations were undertaken with a preliminary auction structure to examine how the system functions under different conditions. Full article
192 KiB  
Article
Tax Implications of Selling Electronic Books in the European Union
by Raquel Álamo Cerrillo and María Gabriela Lagos Rodríguez
J. Theor. Appl. Electron. Commer. Res. 2016, 11(2), 28-40; https://doi.org/10.4067/S0718-18762016000200004 - 1 May 2016
Cited by 4 | Viewed by 452
Abstract
In recent years, the publishing industry has undergone significant change related to the emergence of information technology and communication, leading to the emergence of electronic books substitutes the traditional book. This new reality has an impact on the cultural industry and requires the [...] Read more.
In recent years, the publishing industry has undergone significant change related to the emergence of information technology and communication, leading to the emergence of electronic books substitutes the traditional book. This new reality has an impact on the cultural industry and requires the adaptation of public regulations affecting the production and consumption of eBooks, avoiding situations of tax discrimination against these paper publications, which result in lower consumption thereof, as well as significant tax revenue losses. Since two substitute goods must have the same taxation not vary in response to the medium on which they are distributed. Full article
262 KiB  
Article
Path Creation, Path Dependence and Breaking Away from the Path: Re-Examining the Case of Nokia
by Jens Wang, Jonas Hedman and Virpi Kristiina Tuunainen
J. Theor. Appl. Electron. Commer. Res. 2016, 11(2), 16-27; https://doi.org/10.4067/S0718-18762016000200003 - 1 May 2016
Cited by 14 | Viewed by 1339
Abstract
The explanation of how and why firms succeed or fail is a recurrent research challenge. This is particularly important in the context of technological innovations. We focus on the role of historical events and decisions in explaining such success and failure. Using a [...] Read more.
The explanation of how and why firms succeed or fail is a recurrent research challenge. This is particularly important in the context of technological innovations. We focus on the role of historical events and decisions in explaining such success and failure. Using a case study of Nokia, we develop and extend a multi-layer path dependence framework. We identify four layers of path dependence: technical, strategic and leadership, organizational, and external collaboration. We show how path dependence at these four interdependent layers can blindfold the organization from seeing and understanding the importance of intermediate outcomes, which in the case of Nokia was the importance of software ecosystems and adaptable mobile devices. Furthermore, we show how the layers of path dependence mutually reinforce each other and become stronger. Full article
239 KiB  
Article
An Empirical Investigation of Factors that Influence Individual Behavior toward Changing Social Networking Security Settings
by C. Bryan Foltz, Henry E. Newkirk and Paul H. Schwager
J. Theor. Appl. Electron. Commer. Res. 2016, 11(2), 1-15; https://doi.org/10.4067/S0718-18762016000200002 - 1 May 2016
Cited by 18 | Viewed by 770
Abstract
While the use of social networking sites continues to rise, security continues to be an important issue. This issue often results when many users do not change their social networking security settings. Such behavior leaves vast amounts of data vulnerable to criminal activities. [...] Read more.
While the use of social networking sites continues to rise, security continues to be an important issue. This issue often results when many users do not change their social networking security settings. Such behavior leaves vast amounts of data vulnerable to criminal activities. This study utilized the Theory of Planned Behavior to examine factors that impact users’ behaviors regarding changing their social networking security settings. This research found support for six of the eight hypotheses. Results showed that Attitude (H1), Subjective Norm (H2), and Perceived Behavioral Control (H3) predicted Behavioral Intention. Behavioral Intention (H4) positively influenced Behavior. Apathy (H6) negatively predicted Attitude while Perceived Behavioral Control (H7) positively influenced Social Trust. Finally, Perceived Behavioral Control did not predict Behavior (H5) and Social Trust did not impact Behavioral Intention (H8). These findings have future implications for research and practice. Full article
415 KiB  
Editorial
Editorial: Enterprise Websites Usage in the European Union - Outlook to the Western Balkans Countries
by Ksenija Dumičić, Berislav Žmuk and Mirjana Pejić Bach
J. Theor. Appl. Electron. Commer. Res. 2016, 11(2), I-VIII; https://doi.org/10.4067/S0718-18762016000200001 - 1 May 2016
Cited by 1 | Viewed by 382
Abstract
The Internet usage by individuals and enterprises has become unavoidable in the contemporary society [...] Full article
Previous Issue
Back to TopTop