eFutures


 


Task 1: Mode of Enquiry


When listening to the radio, watching the television or reading a daily newspaper it is difficult to avoid the term “research” and “enquiry”.  The results of “research” are all around us.  A debate about the findings of a recent poll of people’s opinions inevitably includes a discussion of “enquiry”, normally referring to the way in which the data were collected. Politicians often justify their policy decisions on the basis of “enquiry”. Documentary programmes tells us about “research findings”, and advertisers may highlight the “results of research” to encourage you to buy a particular product or brand.  However, we believe that what these examples really emphasize is the wide range of meaning given to the term “research” in everyday speech. 


In connection to this, this paper aims to provide creative evaluation with regards to different modes of enquiry or how to do research.  Virtually, all enquiry and researches will involve some numerical data or contain data that could usefully be quantified to help the researcher answer the given questions and to meet the objectives.  The following table will illustrate the different mode of enquiries available for research such as analytic, deductive, systems thinking, and inductive-consensual. The purpose, limitations and advantages of these modes of enquiry are illustrated in the table.


 


 


Table 1. Mode of Enquiry


Mode of Enquiry


Purpose


Limitations


Advantages


Analytic


The purpose of this type of enquiry is to critically evaluate the gathered information.  This will enable the researcher to examine and explain relationships between variables, in particular cause-and effect relationships.


As for limitation, this enquiry will only provide the researcher with limited information about the effects if the variables under study. 


One of the advantages that this method offers is that it has preferred by most investigations.  Meaning this enquiry is the only approach advisable to use in practical situation.


Deductive


This mode of enquiry uses deductive inference in order to test the truth.  This will help in expanding the implied consequences of the abductive hypothesis. For this purpose, the inquirer needs to think of other things that would follow from the consequence of his precipitate explanation.


As for limitation, mathematical formulas are not as flexible when applied to different issues or problems in various fields, such as within the business sector. It is difficult to find the right formula for specific issues; thus, deductive method may not be used as effectively in other cases. Moreover, the accuracy and correctness of the conclusion derived from the computation is dependent of the efficiency of the person who solved it.


This mode of enquiry is less subjective as figures or values are used to analyze the problem, making the derivation of the conclusion easier as well as more objective. An analysis supported by figures is easier as well as more credible. Through the use of a mathematical formula, the decision-maker or the problem solver could presume the preciseness and correctness of the answer or conclusion.


Systems Thinking


Systems Thinking enable the decision-maker to be involved in all disciplines and context to come up with the most appropriate actions, solutions or conclusions.  


With regards to its limitation, Systems Thinking has a tendency to allow an established standard to slip.  There are also some instances that growth slows over time


and partners for growth become adversaries.


As for its advantages, this mode of enquiry the decision-maker to choose what would be the most effective and appropriate enquiry system to utilize for a certain issue. The decision-maker is not restricted to constraints to a certain idea; rather, he or she can provide infinite factors and issues about the given data. 


Inductive- Consensual


The purpose of Inductive- Consensual mode of enquiry is to have an outcome based on a limited set of observations. With these formulated observations, only one conclusion must be considered.


As for its limitation, the observations are limited only to the decision-maker perceptions; other factors might not be included to be assessed or evaluated.  Hence, this can be seen as one of the failure of inductive-consensual approach.  In addition, another disadvantage of using this mode of enquiry is that, the decision-maker may have a tendency to choose a certain observation without any justifications.


Inductive-consensual may be useful in many ways.  It enables the decision maker to determine a concise observations relevant to the given situation or problems. Inductive-consensual is also a tool which can easily be used because of its simple approach for decision-making process. With this, the most effective solution or observation can easily be noticed and the management can decide easily.


 


Task 2.  Impact of Podcasting


The Internet is a worldwide system of interconnected networks; it is the transport vehicle for the information stored in files or documents on another computer; it can be compared to an international communications utility servicing computers, and the Internet itself does not contain information (Southern Illinois University Carbondale, 2001). The concept of the Internet began in the early 1970s, when applications running under different network protocols needed to communicate with one another (SIUC, 2001).[1] A protocol is a set of conventions that communicating entities use to structure their information exchanges (University of Kansas, 2002). Computers connected to the Internet use protocols from a large collection of such protocols called the Transmission Control Protocol/Internet Protocol (TCP/IP) suite (University of Kansas, 2002).


There are currently three major divisions of the Internet–commercial, governmental, and educational—which appear in a full network host name as com, gov, and edu (University of Kansas, 2002).


On the other hand, the World Wide Web (WWW) incorporates all of the Internet services above and much more (UC Berkeley Library, 2002). One can retrieve documents, view images, animation, and video, listen to sound files, speak and hear voice, and view programs that run on practically any software in the world, providing that the computer has the hardware and software to do these things (UC Berkeley Library, 2002).


Basically, Donthu, N. & Garcia, A. (1999) stated that other popular services of the Internet were not created this way, but were originally based on proprietary systems. These include IRC, ICQ, AIM, CDDB, and Gnutella. Moreover, there have been many analyses of the Internet and its structure. For example, it has been determined that the Internet IP routing structure and hypertext links of the World Wide Web are examples of scale-free networks.  From these discussions, the development of information technology particularly the Internet was shown expressive changes. And this change includes the development of podcast technology.


            For this part of the paper, we will be discussing the impact of podcasting to an individual/society. With this, the Systems Thinking will be considered since it seems to be the best among the modes of enquiry since it considers all the elements that can possibly affect the output. Using Systems Thinking will provide more valid building blocks of knowledge since there are many possible sources of knowledge concerning podcasting. However, Systems Thinking requires in-depth analysis elements affecting the system and as the term systems thinking implies, this mode of enquiry looks at the system as a whole that is the interrelatedness of the elements comprising the system.


            The following sections use the Systems Thinking mode of enquiry to discuss impact of podcasting to an individual/society. This mode of enquiry is used because the podcasting is now the trend in the new society wherein the strategies are driven primarily by technologies.


From the creation of Apple’s iPod as the main source in the world of digital music technology, lots of people have become aware of the possibilities to acquire various types of media through the internet.  With regards to the development of the information technology, the Internet became a vast realm of resources in which music is one of the files that can be downloaded.  Even though the iPod was made to transfer digital music as needed in the current society, the transferring of digital files has already been occurring for many years.  Actually, in the late 1990s, a website called Napster was created.  It is a peer to peer file sharing software in which many people around the globe notice the new way of downloading music. With this development and popularity of Napster, numerous ideas of ways to make file transferring easier were being programmed and tested.  And one of the outcomes of this endeavor was the creation of podcasting.


            What exactly a podcast is?  Podcast is actually a way of obtaining digital files from the internet or World Wide Web. Digital files are in different forms. It could be in music, videos, multimedia or even in text. With regards to the development of new technology in the millennium era, podcasting popularity also sky rocketed.


            Basically, files in the podcast can be downloaded through RSS or Really Simply Syndication or Rich Sit Summary.  RSS has the capability to include more information than an mp3 file.  Within RSS files, the name, publish dates and descriptions are available along with the file.  There is an aspect in RSS known as the aggregator which allows detection of new files on the internet.  RSS updates automatically. RSS is sometimes known as a podcatcher that makes the aggregator searches the internet even while offline and upon finding an update to a web feed. And since the podcast updates automatically, the user can easily download the media file automatically with less hassles.  The podcasting process is formed to make life for the user easier and less demanding.


            Conceivably what makes the entire procedure possible is not only the RSS technology, but also the scheme of web syndication which has been offered to users for a long time prior to the adoption of podcasting.  Syndication refers to the ability for people to post their ideas or opinions on a webpage for everyone or subscribers to see. Without this technology and the original web logs, podcasting would not have been possible or may not have been invented at all.  In general, podcasted media files are files that enclose more information than an mp3 and also consist of the technology allowing for automatic updates, keeping the user up to date with music, current news and talk shows.    It is the ease surrounding podcasts that has made it a channel for not only well well-known news and talk shows, has also for usual people bored at home.


            The creation of podcast are now playing important role in the society especially in the blogging world. Blogging is the ability to record yourself on the computer and save it has evolved from a simple entertaining hobby into for some people, a new job.    Aside from regular people creating fame over the internet, many well-established individuals in society have begun to use podcasts as a way to converse with the public.  There are some people in politics adopting the podcating practice to gain more popularity. Actually, John Edwards became the first politician to incorporate podcasts.  In March of 2005, John Edward recorded his shows consisting of interviews, news and general banter and put it in a podcast to disseminate it all over the internet.  In the summer of 2005, the White House finally attached the technological world by making podcasts available of President Bush’s weekly radio addresses.  With this changes in the information world, it shows how powerful podcasting is in a very short amount of time.


            In accordance to the popularity of podcast, some may argue that because of this development, users of FM and AM stations or even TV series fanatics are declining.  In one click of the podcast in the computer, podcast can now deliver your favorite music or entertainment that you are looking for.  Well it cannot be completely confirmed but research done by eMarketer.com.  However, their research tells that many people are starting to try podcasts.


 


Figure 1. Podcast Usage



 


From this presentation, it is evident that the popularity of podcasting is growing and expected to grow.  This was verified by Google itself in which the search queries of “podcast” doubled each day for awhile in 2004 and 2005. And as of today, podcasting continuously explode.[2] This means that many listeners of the radio are obviously using podcast for conviniece.  Bloggers also uses this to maintaining daily updates.


            Aside from making daily updates for music lovers and entertainment easier for its user, Podcasting also brought help to businesses.  Similar to any new idea, there must be a way to benefit from the innovation of the podcast.  With a closer and in depth look into potential, the podcast can extend a very sensible business model both for profit for a company and within a company.


            Taking advantage of an innovation like podcasting can be very beneficial for a company or business.  Just as it is with many developing ideas and inventions, profit is inevitable or at least possible.  The success of podcast in the last few years makes profit potential enticing and possible. The podcast is seen by some people as a new form of communication, however, it can also be viewed as a communication enhancer.  One aspect that podcasts can become useful is within a company in the form of internal communication.  Many corporations can establish their personal podcasts that can be used for various purposes to communicate with their employees.  Purposes can range from updates for specific business duties to training or education on new products.  A podcasts is much more personal instead of the usual memos passed around in emails and phone calls.  The podcasts has the potential to make a business much more united and efficient.


 


TASK 3: Podcasts impact to Businesses


            When a company decides to integrate podcasts as part of their business strategy, the next important thing to consider is to have a strategic. The podcasts designing process can have an effect on the application of a certain system. In this manner, consequences may follow which should be given attention by the management.  In this section, the focus will be on the possible problems related to podcasts application (Khirallah, 2000). The effect of these problems on business processes and the possible negative impact of the consequences will be identified.


 


Consequence Analysis Table:


In this report, the quality sources of reference will be used to analyze the impacts of podcast to organization. Through the quality sources of reference, diverse positions over a common issue can facilitate the decision-making of organization, in terms of applying the podcast for example. The quality sources of reference basically use the conflict factor so as to bring a new truth to the surface. By witnessing two polarized views on podcast, business operators can effectively weigh their options as well as help them foresee possible results or effects caused by the application of podcasting to their organization. Below is a table analyzing issues by means of the quality sources of reference.


  


Table 2. Consequence Analysis


ISSUES ON IS


CONVENTIONAL PERSPECTIVES


CONTRADICTING PERSPECTIVES


1. How does podcasting affect an organization?


IT may provide multiple benefits for the  hospital industry, which includes but are not limited to customer relations, increased profitability and enhanced customer relations


The use of podcasting in organizations can provide a number challenges including the costs of installation, system breakdown and depreciation, professional expertise assistance and the universal business requirements effectively apply podcasting.


2. What are the Requirements needed to apply podcasting?


Information System and Technology can be used to ensure the successful application of the podcasting.


There is a need for the integration of different strategies in order to utilize podcasting successfully in some organizations. These include training, monitoring and constant evaluation of the implementation.


3. What skills are needed to implement podcasting?


Technical and professional skills are the important abilities for the implementation of podcasting.


Management, operating and monitoring skills are vital to implement podcasting effectively. All these skills must be supported by training activities.


4. What are the bases of implementing podcasting?


The need to adapt to the changing customer trends is the sole basis for applying the  podcasting into their organizations operations.


Changes in the economy encouraged organizations to develop strategies that will promote good customer relation and to develop a group of fixed clientele.


5. What is the role of podcasting in business organizations?


Podcasting is vital in ensuring that the services adhere to the needs of the target market.


podcasting is applied for the purpose of enhancing good customer relations and give updated information.


6. What role do hospital workers have on utilizing the IT as a strategy?


Workers with podcasting background or skills are very important in the application. They can play the role of operators and evaluators of the strategy.


All accountabilities for IT application must involve the hospital employees and staffs. Hospital personnel with no IT background must be trained to optimize the impact of the IT strategy. Role distribution is important to maximize the employee’s IT capabilities.


 


            When an organization decides to integrate podcasting as part of their strategy, the next important thing to consider is to have a strategic plan. The podcasting process can have an effect on the application of a certain system. In this manner, consequences may follow which should be given attention by the management.  In this section, the focus will be on the possible problems related to podcasting application. The effect of these problems on podcasting processes and the possible negative impact of the consequences will be identified.


            To be able to efficiently initiate such podcasting integration activity, it is important that organization should establish a strategic planning.


Although the podcasting development acquired by an organization can greatly influence the business’s success in providing updated information that would help them to be recognized, this may also provide different risk.  This enters the importance of risk management, which is accordingly progressively becoming an integral part of governmental and political and business thinking in societies nowadays.


The course of action undertaken to analyze and address risk is known as risk management, which has three major procedures: assessment, the phase wherein risks are analyzed for their potential impact on objectives; the mitigation phase, which creates action plans to reduce risk; and contingency, or plans that arise in order to counteract or compensate for the consequences of failure of the risk mitigation plans (McGrew & Bilotta, 2000). Risk, on the other hand, is when an outcome may or may not occur, but where its probability of occurring is known.


In line with the development in terms of podcasting in organizations, it is important that they would be able to know the possible risks that they may encounter and utilize risk management properly so that they may not encounter failure for the podcasting that they implement.  It cannot be denied that changes, particularly in relation to podcasting attract different risks before, during and after its implementation. These risks are attributed as the main reason why changes can be successful or just a failure.  These will lead into failure if the management of an organization does not employ solutions to avoid or totally prevent such risks and it will lead to success if such risks will be given enough attention and proper solution. Thus, the managers need to have the necessary abilities not only in detecting what risks to be prevented but also how to totally manage such risks effectively. The development of podcasting have been implemented for making the flow of information run smoothly, and to make sustainable the competitive advantage of the organization. With the development and project management process implemented by organization, there are certain risks that the organization might encounter.


One of the consequences of using this approach is that the decision-maker may use factors which may be irrelevant to the issue given. In this manner, problems in having more conflicting issues may provide difficulties for the decision maker to efficiently decide on the problem or issues. In addition, with too many options developed with this system, the decision-maker will not be able to critically analyze each which may affect the decision to be made.


 


Task 4: Ethical Issues


As mentioned, the only constant in this world is change, and information technology development is the one which are more affected by these changes. In the next five years, the emerging information system and technology like podcasts that may affect the application of information system in any organization may include internet applications and virtual teaming. The increasing competition among global organization forces businesses to develop new technology and tools to help them to stay competitive or even survive in the market and to serve the changing demand of their customers.  Internet with respect to podcasting is an example of the latest significant technology, considered a revolution in organizations.


With the increase in usage of the podcasting features, certain concerns about security arise. Privacy violations, copyright infringement, digital files theft, pornography, transaction security breaches, unsolicited e-mail and other questionable or illegal activities being conducted online like podcasting have become hotly debated issues. Some see regulation as the only answer to protection from unwelcome intrusion; but due to the universal nature of the Internet, regulation will be extremely difficult, if not impossible (Peeples, 2002).


According to a survey conducted by Udo (2001), security concerns are a major reason that users give for not shopping online. Many consumer organizations and government agencies provide tips on how to transact safely on the Internet by providing key information such as its return policy and privacy practices (Udo, 2001). In theory, consumers could choose not to patronize sites that fail to provide key information, but in practice, consumers do not search for this information, if at all, until after they have spent considerable time investigating a site’s product offerings (Udo, 2001).


The purpose of Udo’s (2001) study was to investigate the privacy and security concerns of online IT users in order to establish a consensus among them. The survey data used in this study came from 158 participants. As indicated by the study findings, the majority of the online IT users today have serious concerns about their privacy and security while shopping on the Internet. They are also concerned about the safety and confidentiality of their e-mails. IT users do not only lose confidence in the technology but they also have very little hope that the government is capable of significantly reducing their concerns in the near future.


The majority of the online IT users who participated in Udo’s (2001) study believed that the advancements in such technology as encryption and other security features are not sufficient to reduce their privacy and security concerns. Based on the responses of those who took part in the study, an overwhelming majority of employees prefer the organization to have policies for e-mail and Internet use and to also notify the employees of the policies.


Consumer privacy issues are not new (Rubin, 1995). Consumers have worried for years about how personal data are used by the government and, more recently, by businesses (Rubin, 1995). The consumer privacy issue is taking on greater magnitude, as the number of people accessing the Internet’s information resources grows exponentially and the public becomes more technologically savvy (Rubin, 1995). According to a 1999 report from the USA Federal Trade Commission (1999), information is gathered on the Internet both directly and indirectly. When a user enters a chat room discussion, leaves a message on a bulletin board, registers with a commercial site, enters a contest, or orders a product, he/she directly and knowingly sends information into cyberspace, The report further states that data can be gathered indirectly, without the user’s knowledge (Udo, 2001).


Individuals are now using e-mail as a major means of transacting businesses. Like other technological developments, e-mail has both advantages and disadvantages, along with controversy. Despite new developments in encryption and despite new legislation, e-mail privacy has proved to be of major concern to the users (Udo, 2001).


Although much of the publicity about Internet security has focused on the potential risks to consumers who use credit cards to make purchases electronically, payment fraud is also a major threat to Internet-based merchants (Murphy, 1998). Security threats not only consist of break-ins and technology disturbance, but also stalking, impersonation, and identity theft are serious issues that everyone should be concerned about (Janal, 1998). According to Udo (2001), computer hacking is another serious problem; it can be either a benign or a malicious activity. Moreover, fraudulent or non-creditworthy orders account for as much as one-sixth of all attempted purchases on the Internet (Udo, 2001).


The computer’s ability to gather and sort vast amounts of data and the Internet’ s ability to distribute it globally has magnified the concern of privacy and anonymity on the Web. Once an individual has ventured into cyberspace, it is hard to remain anonymous (Udo, 2001). According to the Electronic Frontier Foundation (1999), maintaining privacy is partly the responsibility of the user. EFF (1999) also provides ways to protect the user’s privacy online: do not reveal personal information inadvertently; turn on cookie notices in the Web browser; keep a “clean’’ e-mail address; do not reveal personal details to strangers or just-met “friends’’; realize one may be monitored at work, avoid sending highly personal e-mail to mailing lists, and keep sensitive files on the home computer; do not reply to spammers, for anything; be conscious of Web security; be conscious of home computer security; examine privacy policies and seals; remember that you decide what information about yourself to reveal, when, why, and to whom; and use encryption.


Until recently customers were generally unaware that Internet sites could collect information on their surfing and buying habits via “cookies.” The fact that this information is collected and sold to interested parties without the customer’s knowledge and permission raises real ethical concerns (Peeples, 2002). In addition, unsolicited e-mail from e-marketers has become a problem for many. Mailboxes full of junk mall often have the effect of visually obscuring important business or personal messages. Productive time may be lost in the process of attempting to sort out the wheat from the chaff.


Generally accepted guides to ethical behavior are being developed and adopted by professional organizations. These guidelines often have common themes such as customer consent to the dissemination of their private information (Peeples, 2002).


            Reducing the cost of information gathering represents perhaps the most obvious and immediate benefit of the Internet. However, we argue below that transactional integrity in online markets is undermined by difficulties in evaluating information gathered online–difficulties that are inherent to online markets, originating as they do in fundamental information asymmetries exacerbated by low entry and exit costs.


            Information problems impede the efficient execution of many transactions in the economy because information is often asymmetrically distributed between buyer and seller. Information asymmetry is heightened further in e-commerce markets, encompassing not only the “usual” problem of private information regarding product attributes but also potential uncertainty about the very identity of one’s trading partner.  Fundamentally, all one needs to enter e-commerce is a website. This lowering of entry barriers is often touted as one of the great promises of e-commerce; ease of entry and exit reduces market power and can bring lower prices. But minimal barriers to entry are not an unequivocal plus. When firms can effectively change identity at a moment’s notice, traditional forms of fraud become easier and entirely new dimensions of fraud appear.


            One novel type of Internet fraud involves “page-jacking”–misdirecting web surfers to false copies of legitimate businesses and tricking them into revealing passwords and personal identification numbers, or diverting them from seemingly benign sites to online pornography sites from which they cannot escape (Biersdorfer, 1999). In a twist on the old international pay-per-call scam, America Online subscribers recently received an e-mail apparently confirming an order for unspecified goods, and notifying them that their credit card would be billed for the amount due (over 0). Since no return e-mail was given, thousands of subscribers called the customer service phone number listed–which was actually a number in Dominica, West Indies, connected to an X-rated recording-and were charged or more for the call (Washington Post, 1999),


            Even for legitimate businesses, Web technology makes it simple to change the name and appearance of the company, in order to shake off a bad reputation or escape the consequences of unethical behavior. Thus “entry” and “exit” take on quite different meanings than in traditional product markets; a disreputable company may exit the business and reenter with a different identity at very low cost, with no perceptible break in activity. This magnifies information asymmetries. Information is easier to gather, but its quality and reliability suffer.


            The global reach of e-commerce is also double-edged in its impact on consumers. While e-commerce can bring far-flung and highly competitive suppliers to the buyer’s doorstep, this may be at the cost of uncertain recourse in the event of a dispute. Tracking down a delinquent trading partner and pursuing litigation in a different state or a foreign country may be prohibitively costly, particularly if the value of the transaction is relatively low. Digital River–a U.S.-based online wholesaler selling software and music worldwide-has resorted to using software that tracks the national origin of prospective customers, in order to evaluate the potential for fraud. CIO Randy Womack reported that the system thwarted more than million in attempted fraud in 1999, by identifying and giving extra scrutiny to potential buyers from countries that are responsible for a high proportion of online scams (Dalton, 1999).


            Moreover, the discussion in this paper illustrates how the characteristics of the Internet can exacerbate the hazards facing transactors in e-commerce. One might expect these elevated hazards to stifle the growth of online markets, but this does not appear to have happened. One explanation lies perhaps with the emergence of new organizations–primarily specialized e-commerce intermediaries–that increase the credibility of information delivered over the Internet and promote satisfactory performance of online transactions (Morck, Oxley and Yeung, 1999).


            There is general consensus that government intervention in e-commerce should only be undertaken as a “last resort,” and that e-commerce companies and other intermediaries can be effective in mitigating the hazards raised by online markets. However, we should not discount the role of public institutions in supporting the development of e-commerce. Researchers in the New Institutional Economics (NIE) emphasize the critical role governments play in creating an environment that fosters private investment. Indeed there is little doubt that consumers’ confidence in the integrity of e-commerce transactions would be greatly diminished were it not for a generally supportive national legal environment. It is precisely because consumers (and producers) believe that the courts can handle serious cases of fraud that new intermediaries are effective in creating confidence in e-commerce. Below, we look more closely at relevant features of the institutional environment supporting transactional integrity in online markets, and develop a more general analytical framework for a cross-country comparative analysis of e-commerce “readiness.”


            According to Davis and North (1971, pp. 6-7), the institutional environment is set of fundamental political, social and legal ground rules that establishes the basis for production, exchange and distribution. Rules governing elections, property rights and the right of contract are examples.” There is now an established tradition of research within NIE connecting characteristics of the institutional environment to the extent and nature of private investment. Some of this work has examined the impact of general characteristics of the nation-state (e.g., Murtha & Lenway 1994, Levy & Spiller 1996 and Henisz & Zelner, 1999), while others have focused on specific aspects of the legal or regulatory environment (e.g., Oxley, 1999).


            The discussion of the trading hazards in markets above points us towards two key features: (1) the overall integrity of the nation’s trading system, related to the degree to which the economy is governed by the rule of law, and (2) the credibility of payment channels available to e-commerce participants, which in turn is a function of the country’s financial institutions and regulations.


 


References:


Biersdorfer, J.D. (1999). Trapped in the Web Without an Exit, New York Times, October 7: G1.


 


Dalton, Gregory. (1999). Overseas Fraud Finder, Information week, September 27: 382-83.


 


Davis, L. E., & Douglass C. North. (1971). Institutional Change and American Economic Growth. Cambridge, UK: Cambridge University Press.


 


Donthu, N. & Garcia, A. (1999). The Internet shopper. Journal of Advertising Research. 39 (3), 52-58.


 


Electronic Frontier Foundation (1999) Top 12 ways to protect your privacy. Available at [www.eff.org]. Accessed on [03/31/09].


 


Henisz, Witold J., & Bennet A. Zelner. (1999). The Institutional Environment for Telecommunications Investment. Published manuscript, Wharton School, University of Pennsylvania, Philadelphia, PA.


 


Khirallah, K. (2000). Customer Relationship Management: How to Measure Success. Bank Accounting and Finance.


 


Levy, Brian & Pablo Spiller (1994). The Institutional Foundations of Regulatory Commitment,” Journal of Law, Economics and Organization, 9: 201-46.


 


McGrew, J.F. & Bilotta, J.G. (2000). The effectiveness of risk management: measuring. What didn’t happen? Management Decision, 38(4)


 


Morck, Randall, Joanne E. Oxley & Bernard Yeung (1999). Emerging Institutions: Transactional Integrity in E-Commerce. Working Paper #99-030, University of Michigan, Ann Arbor, MI.


 


Murphy, P. (1998). New programs help counter Internet payment fraud. Stores, January p.60.


 


Oxley, Joanne E. (1999). Institutional Environment and the Mechanisms of Governance: The Impact of Intellectual Property Protection on the Structure of Inter-firm Alliances, Journal of Economic Behavior and Organization, 38: 283-309.


 


Peeples, D. (2002) Instilling consumer confidence in e-commerce. SAM Advanced Management Journal, Vol. 67.


 


Rubin, M. R. (1995). Private rights, public wrongs: The computer and personal privacy. New York: John Wiley & Sons.


 


UC Berkeley Library (2002). What is the Internet, World Wide Web and Netscape? Available at [www.lib.berkeley.edu].


 


Udo, G.J., (2001) Privacy and security concerns as major barriers for e-commerce: a survey study. College of business administration, University of Texas (USA)


 


United States Department of Commerce (1998). The emerging digital economy. Available at [http://www.ecommerce.gov/danintro.htm]. Accessed [03/31/09].


 


University of Kansas (2002). The Internet: Overview academic computing services. Available at [www.ku.edu]


 


Washington Post. (1999). Online Scam Made to Order, May 19: C04.


 


 



 

[1] http://www.studentsreview.com/IL/SIUC.html


[2] From http://www.podcastingnews.com/tag/podcasting-statistics/



Credit:ivythesis.typepad.com



0 comments:

Post a Comment

 
Top