1. Introduction
The rapid expansion of e-business has fundamentally transformed international trade, creating new opportunities and challenges, particularly in the interactions between developed and emerging economies. As a global leader in digital infrastructure and technology, China has leveraged its vast consumer base, advanced logistics, and innovative platforms to dominate the global digital economy [
1]. In parallel, West Africa, led by Ghana’s emergence as a digital hub, has become an increasingly attractive market for e-business growth. Ghana’s strategic location, youthful population, and proactive digital policies position it as a gateway for international digital commerce in the region [
2]. Two major initiatives underscore the relevance of this partnership: the African Continental Free Trade Area (AfCFTA) and China’s Belt and Road Initiative (BRI). The AfCFTA, headquartered in Ghana, aims to establish a unified market for goods and services across Africa, promoting economic integration and facilitating cross-border trade, particularly in the digital and e-commerce sectors [
3]. The BRI, meanwhile, promotes infrastructural and digital connectivity, offering Chinese businesses a platform for expanding their digital services throughout Africa.
Together, these initiatives are reshaping the landscape of China–West Africa e-business cooperation, promising mutual economic growth, technological advancement, and increased market access. However, despite these promising prospects, the partnership faces significant and multifaceted risks. Technological vulnerabilities, such as cybersecurity threats and digital infrastructure gaps, expose businesses to data breaches and operational disruptions. Regulatory inadequacies, including inconsistent digital transaction frameworks and weak data governance, create uncertainty for cross-border transactions. Legal uncertainties, particularly around data protection, privacy, and intellectual property, further complicate business operations. Sociocultural differences, such as language barriers, divergent consumer behaviours, and cultural misalignments in digital platforms, add further complexity to cross-border e-business [
4]. These risks are not merely theoretical; they have tangible impacts on the efficiency, trust, and sustainability of e-business collaborations. They increase transaction costs, deter investment, and limit the potential for innovation and growth. For Chinese businesses operating in Ghana and the broader West African market, these challenges can result in competitive disadvantages, stalled projects, and missed opportunities for both sides. While previous research has explored various aspects of e-business and digital trade, a critical gap remains: there is no comprehensive, systematic framework for identifying, categorizing, and prioritizing the specific risks associated with China–West Africa e-business cooperation.
Existing studies address these risks in isolation or focus on broader economic or technological factors, without integrating them into a cohesive risk management model tailored to this unique context. This absence of a holistic risk assessment limits the ability of policymakers, business leaders, and investors to develop targeted strategies that can effectively mitigate risks and foster sustainable cross-border e-business growth. While this study is grounded primarily in Transaction Cost Theory (TCT), which explains how various risks elevate transaction costs in cross-border e-business, it also draws on the Technology Acceptance Model (TAM) and Commitment–Trust Theory to capture the behavioural and relational dimensions of risk in digital trade. This integrated framework enables a more comprehensive understanding of how institutional, technological, sociocultural, and legal risks interact to shape e-business outcomes between China and West Africa [
5]. By applying this integrated framework with TCT as its anchor, this research provides a robust theoretical lens for understanding how institutional, technological, sociocultural, and legal risks translate into increased transaction costs and how these can be managed for more efficient and sustainable cooperation. From a practical perspective, this study responds to the urgent need for actionable insights in risk management. As digital trade between China and Ghana accelerates, public and private sector stakeholders require evidence-based tools to identify, prioritize, and address the most pressing risks. This is essential not only for protecting investments and ensuring compliance but also for building trust, enhancing competitiveness, and supporting the long-term sustainability of e-business partnerships.
The structure of this paper is as follows.
Section 2 presents a review of the literature. In
Section 3, the methodology of the study is presented.
Section 4 presents the results.
Section 5 concludes the research.
3. Methodology
This study investigates e-business risks in China–West Africa cooperation, focusing on Ghana as a case study due to its status as one of the most digitally advanced countries in the region. This research targeted e-business managers, practitioners, and stakeholders across four key sectors: consumer electronics, telecommunications, digital payment, and online retail. A total of 40 participants were included in the final analysis. These respondents were selected for their direct involvement in e-business operations and decision making, ensuring that the data reflected expert perspectives on risk management in the Ghanaian digital economy. We follow a sample procedure from the work of Liu et al. [
23] and Rezaei [
24] to establish a decision framework for the expert evaluation of the various risks for the e-business supply chain between China and West Africa and based on certain functional underlying assumptions in modelling the relationships between the criteria [
25].
Table 1 presents the demographic characteristics of the 40 expert respondents. The sample consists of both male (70%) and female (30%) participants, with the age distribution ranging from 20 to 59 years. The largest proportion (37.5%) falls within the 30–39 age bracket, followed by those aged 40–49 (27.5%), indicating that the majority of the respondents are mid-career professionals with substantial industry experience. The sectoral distribution highlights key domains in Ghana’s digital economy—telecommunications (35%), consumer electronics (30%), online retail (20%), and digital payment (15%)—ensuring diverse and relevant insights into e-business operations.
Critically, the inclusion of functional roles reveals that 22.5% of the participants (n = 9) hold positions directly related to supply chain and logistics management, such as logistics coordination, inventory control, and distribution. An additional 20% (n = 8) serve as operations or procurement officers, further reinforcing the supply chain relevance of the sample. Other roles include IT/digital platform management (27.5%), policy/regulatory advisory (12.5%), and various support functions (17.5%). This functional breakdown confirms that key supply chain actors are represented in the sample, enhancing the validity of the risk assessment from a supply chain cooperation perspective.
However, while the current sample includes professionals engaged in critical supply chain functions, future studies could benefit from explicitly stratifying sampling by role to ensure the comprehensive representation of suppliers, third-party logistics providers, customs brokers, and last-mile delivery operators, actors essential to end-to-end e-business supply chains in cross-border trade.
3.1. Sampling Strategy
A purposive sampling strategy ensured that only knowledgeable and experienced individuals participated. This approach is justified in multi-criteria decision-making (MCDM) and BWM literature, where the quality of expert input is prioritized over random sampling. The sample size of 40 was determined based on recommendations from BWM studies, which suggest that 20–50 expert participants are sufficient for reliable and consistent results in risk prioritization and decision analysis. Participants were identified through professional networks, industry associations, and referrals within the targeted sectors. Initial contact was made via email and LinkedIn, followed by a screening process to confirm their expertise and willingness to participate.
It is acknowledged that the sample size of 40, while consistent with best practices in MCDM and BWM-based studies, limits statistical generalizability across the broader West African region. The purposive sampling approach prioritizes expert quality over population representativeness, which is appropriate for qualitative and decision-theoretic research. Future studies should expand the geographic scope to include other West African countries to enhance regional representativeness.
3.2. Data Collection Procedure
A structured and systematic data collection process was employed to ensure the reliability and validity of the findings on e-business risks in China–West Africa cooperation, with Ghana as a focal case. The study was conducted between January and March 2025, during which Ghana’s digital sector was experiencing significant growth and transformation. The choice of this timeframe was strategic, as it allowed the research to capture current perspectives from industry practitioners actively engaged in cross-border e-business operations. The data collection process began with the identification and recruitment of suitable participants. A purposive sampling strategy was adopted to target e-business managers, practitioners, and stakeholders from key consumer electronics, telecommunications, digital payment, and online retail sectors with direct experience and decision-making authority in digital trade and risk management. This approach aligns with best practices in multi-criteria decision-making research, where expert input is critical for robust risk assessment. A total of 55 invitations were sent to potential participants. Each invitation included a detailed cover letter outlining the study’s objectives, the importance of their participation, and assurances regarding confidentiality and voluntary involvement. The cover letter also explained how the data would be used exclusively for academic research and that all responses would be anonymized to protect participants’ identities and business interests.
The primary data collection instrument was a structured online questionnaire, designed and administered through the Qualtrics platform. This choice was motivated by several factors: it enabled efficient data management, provided respondents with flexible access, and supported high-quality data collection from busy professionals across different locations in Ghana. The questionnaire was divided into three sections: (1) sociodemographic information; (2) risk assessment items covering institutional, technological, sociocultural, and legal domains; and (3) a Hesitant Fuzzy and Best–Worst Method (BWM) preference elicitation section, where participants ranked and rated the relative importance of each risk category. Out of the 55 invitations sent, 43 completed questionnaires were received, resulting in a strong response rate of 78.2%. This high participation rate underscores the relevance of the research topic to the targeted professional community. Upon receipt, the responses underwent a rigorous quality control process to ensure completeness and consistency. Three responses were excluded due to incomplete answers or inconsistencies in the BWM ranking process, leading to a final sample of 40 valid and reliable responses. This final sample size is consistent with recommendations in the BWM and decision-making literature, which emphasize the importance of expert input over sheer numbers for risk prioritization studies. Ethical considerations were strictly observed throughout the data collection process. The Institutional Review Board (IRB) of the University of Electronic Science and Technology of China reviewed and approved the study protocol, ensuring compliance with international research ethics standards. All participants provided informed consent electronically before beginning the questionnaire, confirming their understanding of the study’s aims, their rights as participants, and the voluntary nature of their involvement.
3.3. Measures
This study utilized a carefully structured questionnaire to comprehensively assess the risks associated with e-business cooperation between China and West Africa. The measures were chosen to ensure both breadth and depth of coverage, drawing on established literature and tailored to the unique challenges faced by Chinese e-businesses operating in Ghana. The questionnaire consisted of three main sections: sociodemographic information, risk assessment items, and Hesitant-Fuzzy-Best–Worst Method (BWM) preference elicitation. Each section contributed to the robust identification and prioritization of risk domains central to the study’s objectives.
3.4. Risk Assessment Items
The core of the questionnaire focused on four principal risk domains—institutional, technological, sociocultural, and legal—which were identified as critical to cross-border e-business operations in the literature and through preliminary interviews. Each domain was measured using multiple items adapted from validated scales, with participants rating their level of concern for each risk on a 9-point Likert scale (1 = least concern, 9 = most significant concern). This scale aligns with the requirements of the Best–Worst Method and allows for nuanced differentiation between risk perceptions.
3.5. Institutional Risk Concerns (IRCs)
Institutional risks reflect the challenges arising from the regulatory, policy, and governance environment. These risks are particularly salient in emerging markets like Ghana, where regulatory frameworks for e-business are still evolving. The IRC scale comprised four items, each capturing a distinct aspect of institutional vulnerability [
26]. Absence of coherent e-business policies: A participant might rate this item highly if their company has struggled to comply with unclear or constantly changing government regulations. Absence of digital transaction regulations: This assesses the lack of standardized rules for digital payments and online contracts, which can create uncertainty for businesses and consumers. Limited data governance: This refers to insufficient rules or oversight regarding the collection, storage, and use of digital data, raising concerns about privacy and security. Weak e-government support for digital trade: A respondent may score this item highly if they feel that government agencies do not provide adequate digital infrastructure or support for e-business initiatives. This study found institutional risks to be the most significant, with a global weight of 0.363, highlighting the critical need for regulatory reform and improved governance in Ghana’s digital economy.
3.6. Technological Risk Concerns (TRCs)
Technological risks encompass the challenges related to digital technology adoption, implementation, and security. The TRC scale included four items [
27]. Lack of information technology expertise among staff: For example, a company may face difficulties maintaining or upgrading its e-commerce platform due to a shortage of skilled IT professionals. Cybersecurity risks and vulnerability to data breaches: This item captures concerns about hacking, malware, and unauthorized access to sensitive business or customer data. Digital infrastructure deficiencies (e.g., unreliable internet or payment systems): Participants might rate this highly if frequent internet outages or payment failures disrupt business operations. Limited access to advanced e-business tools and platforms: This refers to challenges in adopting the latest digital solutions due to cost, availability, or compatibility issues. The global weight for technological risks in this study was 0.286, reflecting their substantial impact on the success and sustainability of e-business operations in Ghana.
3.7. Sociocultural Risk Concerns (SRCs)
Sociocultural risks pertain to cultural, behavioural, and societal factors influencing e-business activities. This domain was assessed using seven items, reflecting the diversity and complexity of Ghana’s social landscape [
28]. Language barriers and communication challenges: For example, a Chinese business might struggle to communicate effectively with Ghanaian partners or customers due to differences in language or communication styles. Differences in consumer behaviour and digital literacy: This item captures the challenges of adapting marketing strategies and user interfaces to local preferences and levels of digital familiarity. Cultural misalignment in User Experience (UX) design of digital platforms: For instance, a platform designed for Chinese users may not resonate with Ghanaian consumers, leading to low adoption rates. Resistance to online payments due to trust or cultural factors: Some respondents reported that their customers prefer cash transactions, fearing fraud or privacy breaches in digital payments. Perceptions of digital neo-colonialism or foreign dominance: This item assesses concerns that Chinese e-businesses may be viewed with suspicion or resentment, affecting trust and cooperation. Social media-induced cultural conflicts: For example, misunderstandings or negative publicity on social media can escalate quickly in cross-cultural contexts. Adaptation to local festivals, holidays, and customs: Businesses may face operational challenges if they do not align their digital marketing or service delivery with local cultural events. The global weight for sociocultural risks was 0.177, underscoring their importance in shaping user acceptance and business relationships.
3.8. Legal Risk Concerns (LRCs)
Legal risks address the adequacy and consistency of the legal environment governing e-business [
17]. The LRC scale included four items. Weak cybercrime legislation and enforcement: A participant might rate this item highly if their business has experienced cyberattacks with little recourse for legal action. Challenges in protecting intellectual property rights: This item reflects concerns about the risk of imitation, piracy, or unauthorized use of proprietary technology or content. Differences in legal culture and dispute resolution practices: For instance, a Chinese firm may find Ghanaian legal procedures unfamiliar or unpredictable, complicating contract enforcement. Uncertainty regarding cross-border digital contracts: Respondents might score this highly if they have faced difficulties drafting or enforcing contracts with international partners. Legal risks received a global weight of 0.174 in this study, indicating their significant but somewhat lower impact than institutional and technological risks. For BWM requirements, all items were rated on a 9-point Likert scale (1 = least concern, 9 = most significant concern).
3.8.1. Hesitant Fuzzy Best–Worst Method (Hesitant-Fuzzy-BWM) Steps
Define the Criteria and Alternatives
Let there be n criteria and m alternatives to be evaluated based on these criteria.
Establish Pairwise Comparisons Using Hesitant Fuzzy Numbers
In the Hesitant Fuzzy-BWM, each comparison between criteria is represented by a set of hesitant fuzzy numbers instead of a single fuzzy number. Let the hesitant fuzzy number for pairwise comparison be
, where
are the lower, most likely, and upper values of the first fuzzy number in the set, and similar applies for the other fuzzy numbers.
For each criterion , we compare it with the best criterion and the worst criterion , expressing hesitation through a set of fuzzy numbers.
Defuzzification of Hesitant Fuzzy Numbers
To obtain crisp values from the hesitant fuzzy numbers, we perform defuzzification. The defuzzification method is based on the Center of Gravity (CoG) method, which for a set of hesitant fuzzy numbers is defined as:
where
k is the number of fuzzy numbers in the hesitant fuzzy set, and
are the lower, most likely, and upper values for the
k-th fuzzy number.
This formula gives a defuzzified value for each comparison in the hesitant fuzzy set.
Calculate the Weights for the Criteria
The weights of the criteria are calculated by solving a system of equations derived from the hesitant fuzzy comparisons. We have
where
is the weight of the best criterion.
The weight of each criterion can be calculated using the following formula, assuming that the best criterion has a weight of
:
where the sum over
k reflects the multiple fuzzy comparisons in the hesitant fuzzy set.
Ranking the Alternatives
After obtaining the weights for each criterion, we evaluate the alternatives based on these criteria. A hesitant fuzzy pairwise comparison matrix is created for each alternative and defuzzified. Then, the weighted sum of each alternative’s score is calculated by multiplying the hesitant fuzzy comparison values by the weights of the criteria. The final score for alternative
is computed as
where
represents the hesitant fuzzy comparison of alternative
with criterion
.
Defuzzify the Results
Finally, the hesitant fuzzy scores of the alternatives are defuzzified using the same formula for each alternative:
where
,
, and
are the lower, most likely, and upper bounds of the hesitant fuzzy score for alternative
, respectively, and
k is the number of hesitant fuzzy numbers.
3.9. Application of the Fuzzy-BWM in Risk Assessment
The Hesitant Fuzzy Set (HFS) was selected over other fuzzy approaches, especially the Delphi, Pythagorean, and Neutrosophic fuzzy approaches, due to its ability to capture the hesitation and ambiguity in expert judgments when comparing complex, interdependent risks in cross-border e-business. Unlike traditional fuzzy sets that require a single membership value, the HFS allows decision makers to express multiple possible values for a preference, reflecting real-world uncertainty. This is particularly relevant in a context involving institutional, technological, and sociocultural risks where precise comparisons are challenging. While other fuzzy methods like Neutrosophic for indeterminacy and Pythagorean for dual membership are valuable, the HFS offers a balanced trade-off between expressiveness and computational feasibility, especially in expert-driven, single-round decision models like BWM.
3.9.1. Hesitant Fuzzy Best–Worst Method (HF-BWM) Steps
Define Hesitant Fuzzy Linguistic Scale
In this method, decision makers express their preferences as hesitant fuzzy numbers. Each preference comparison between criteria is represented as a set of possible fuzzy numbers, defined as intervals. For instance, the hesitant fuzzy linguistic scale is defined as follows:
Here, each preference is expressed as a set of fuzzy numbers, indicating the uncertainty or hesitation in the judgment.
Expert Hesitant Fuzzy Judgments (BO and OW)
For the Best-to-Others (BO) and Others-to-Worst (OW) comparisons, decision makers provide hesitant fuzzy numbers. These fuzzy numbers represent a set of possible values for each criterion. Here are the hypothetical judgments for the BO and OW comparisons:
Defuzzify Hesitant Fuzzy Numbers Using Interval-Based Defuzzification
To defuzzify hesitant fuzzy numbers, we take the average of the lower bounds, most likely values, and upper bounds of the hesitant fuzzy numbers for each comparison. The defuzzification formula is as follows:
This defuzzification is applied to each fuzzy number in the BO and OW judgments.
Considering the hesitant fuzzy judgment
, the defuzzified value is
For more complex judgments, we take the average for each fuzzy number set.
Normalize Defuzzified Weights
After defuzzifying the hesitant fuzzy numbers, the normalized weights are calculated by dividing each defuzzified weight by the total sum of all defuzzified weights. The total sum is
The normalized weight for each criterion is calculated as
Considering that the defuzzified weights are as follows:
The normalized weights are
Define Sub-Risk Local Weights
Sub-risk local weights for each main risk domain are provided. For instance, for the Institutional risk domain, the sub-risks and their local weights are as follows:
Institutional Sub-Risks = Digital Transaction Regulation: 0.25; Data Governance: 0.30; Policy Absence: 0.20; E-Gov Support: 0.25.
Similar sub-risks and local weights are provided for other domains such as Technological, Sociocultural, and Legal.
Compute Global Weights
The global weights for each sub-risk are computed by multiplying the normalized weight of each main risk by the local weight of the sub-risk. The formula for calculating the global weight is
Considering that the normalized weight of the
Institutional main risk is
, and the local weight for Digital Transaction Regulation is
, the global weight for this sub-risk is
This calculation is repeated for all sub-risks under each main risk domain.
5. Conclusions
This study offers a thorough framework for E-business risk assessment for commerce between China and West Africa, with a particular emphasis on Ghana as a pivotal digital commerce centre. This research utilises the Hesitant Fuzzy Best–Worst Method (HF-BWM) to identify and prioritise institutional, technological, sociocultural, and legal issues affecting cross-border e-business operations. The research amalgamates three theoretical frameworks, Transaction Cost Theory (TCT), the Technology Acceptance Model (TAM), and Commitment–Trust Theory, to provide a comprehensive understanding of the interaction between these risks, which elevate transaction costs and influence company sustainability.
This study’s findings underscore the paramount significance of institutional risks, including deficient digital transaction legislation and weak data governance. These elements are recognised as the primary obstacles, resulting in ambiguity and increased transaction costs. This corresponds with TCT, which underscores that institutional deficiencies compel organisations to allocate extra resources towards due diligence, compliance, and risk reduction. Likewise, technological hazards, including cybersecurity threats and deficiencies in digital infrastructure, substantially exacerbate operational uncertainty. The TAM framework elucidates how technological factors, such as IT proficiency and cybersecurity challenges, influence the perceived ease of use and perceived usefulness of digital platforms, hence impeding general adoption.
Additionally, sociocultural risks, including language limitations, cultural discrepancies, and opposition to digital payments, present substantial obstacles to cross-border collaboration. These characteristics elevate transaction costs, as enterprises must allocate resources for adaptation to local consumer preferences and cultural norms. The research highlights that legal concerns, such as inadequate cybercrime laws and insufficient intellectual property safeguards, generate an unstable legal framework that complicates international operations and escalates compliance expenses. The necessity of legal reforms and the harmonisation of digital transaction legislation is crucial for cultivating a secure environment for e-business activities.
This research presents an innovative, theory-based approach that synthesizes Transaction Cost Theory (TCT), the Technology Acceptance Model (TAM), and Commitment–Trust Theory, facilitating a more thorough examination of hazards in China–West Africa e-business collaboration. The HF-BWM framework assists governments, corporate leaders, and investors in comprehending the risk picture and prioritizing initiatives to mitigate institutional, technological, sociocultural, and legal risks.
Limitations, Future Research Directions, and Practical Implications
This study offers significant insights into the risks associated with e-business collaboration between China and West Africa, although numerous limitations require attention. The sample size of 40 experts, while adequate for this study, may not fully represent the various perspectives within the West African region; thus, expanding the sample to encompass more nations might improve the generalizability of the results. The cross-sectional nature of this study limits our ability to track the temporal dynamics of e-business risks. For example, institutional risks such as regulatory inconsistency can decrease following the implementation of the African Union’s Digital Transformation Strategy (2020–2030), while technological risks like cybersecurity threats can escalate with increased digital adoption. A longitudinal study tracking the same or similar expert cohorts over time would provide valuable insights into the effectiveness of risk mitigation interventions and the emergence of new risks, such as those related to artificial intelligence or digital taxation. Future research should consider panel-based designs to capture these dynamic processes.
Ghana, while a regional digital leader, exhibits a more developed e-business infrastructure and regulatory environment compared to many of its neighbours. For instance, Nigeria and Côte d’Ivoire have larger digital markets but face greater challenges in internet penetration and digital literacy, while Senegal and Benin are emerging hubs with evolving e-commerce policies. Therefore, the dominance of institutional risks (global weight: 0.363) identified in this study may be less pronounced in countries with weaker digital governance, where technological or legal risks could play a more critical role. Future research should adopt a multi-country comparative design to assess the variability of risk prioritization across West Africa and develop regionally adaptable risk mitigation strategies.
The study offers pragmatic insights for players in the China–West Africa e-business ecosystem. Policymakers must prioritize institutional reforms to enhance digital transaction rules, data governance, and policy harmonization between China and Ghana, thereby fostering a more predictable and secure environment for cross-border transactions. Business executives are urged to invest in cybersecurity, enhance IT capabilities, and localize digital platforms to tackle the technological and sociocultural difficulties mentioned in the report. Investors ought to implement risk-informed strategies that emphasize the mitigation of institutional and technological risks, while also taking into account sociocultural and legal considerations. The results indicate that enterprises ought to proactively collaborate with regulators, allocate resources to cybersecurity, and cultivate digital competencies to guarantee the viability of e-business alliances. Future studies should investigate long-term risk management techniques and assess the efficacy of interventions over time, thereby establishing a more comprehensive framework for decision making in cross-border digital trade.