default search action
Electronic Commerce Research, Volume 13
Volume 13, Number 1, March 2013
- Ming-Yi Chen, Ching-I Teng:
A comprehensive model of the effects of online store image on purchase intention in an e-commerce environment. 1-23 - Tao Zhou:
An empirical examination of user adoption of location-based services. 25-39 - Nir Kshetri:
Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. 41-69 - Matej Marinc:
Banks and information technology: marketability vs. relationships. 71-101 - Marios D. Sotiriadis, Cinà van Zyl:
Electronic word-of-mouth and online reviews in tourism services: the use of twitter by tourists. 103-124
Volume 13, Number 2, May 2013
- Shiguo Lian, Xi Chen, Katina Michael:
Editorial: special issue on Service-Based Electronic Commerce Systems. 125-127 - Dimitrios Koukopoulos, Georgios D. Styliaras:
Design of trustworthy smartphone-based multimedia services in cultural environments. 129-150 - Feng Xu, Katina Michael, Xi Chen:
Factors affecting privacy disclosure on social network sites: an integrated model. 151-168 - Cheng-Hsien Yu, Shi-Jen Lin:
Fuzzy rule optimization for online auction frauds detection based on genetic algorithm. 169-182 - Björn Lantz, Klas Hjort:
Real e-customer behavioural responses to free delivery and free returns. 183-198 - Ismail Sila:
Factors affecting the adoption of B2B e-commerce technologies. 199-236
Volume 13, Number 3, September 2013
- Stefanos Gritzalis, Justin Z. Zhan, Kitae Jeong:
IT convergence and security. 237-241 - Keunwoo Rhee, Dongho Won, Sang-Woon Jang, Sooyoung Chae, Sangwoo Park:
Threat modeling of a mobile device management system for secure smart work. 243-256 - Ai Thao Nguyen Thi, Tran Khanh Dang:
Enhanced security in internet voting protocol using blind signature and dynamic ballots. 257-272 - Zan Yang, Jianxin Wang, Lin Yang, Rui-guang Yang, Bao-sheng Kou, Jie-kun Chen, Shu-Mei Yang:
The RBAC model and implementation architecture in multi-domain environment. 273-289 - Jae Hun Jang, Sam Won Kim, Yangsun Lee, Jongsung Kim:
The effects of relationship benefit on relationship quality and store loyalty from convergence environments - NPS analysis and moderating effects. 291-315 - Hangbae Chang:
The security service rating design for IT convergence services. 317-328 - Fei Shi, Weijie Liu, Dongxu Jin, JooSeok Song:
A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology. 329-345 - Sung-Min Jung, Tae-Kyung Kim, Hee Suk Seo, Seung-Jae Lee, Jin Kwak:
The prediction of network efficiency in the smart grid. 347-356 - Young-Sik Jeong, Tae-Kyu Yeom, Ji Soo Park, Jong Hyuk Park:
Efficient model of Korean graphemes based on a smartphone keyboard. 357-377 - Kyung-Soo Lim, Changhoon Lee:
A framework for unified digital evidence management in security convergence. 379-398 - Hai-Cheng Chu, Chi-Hsiang Lo, Han-Chieh Chao:
The disclosure of an Android smartphone's digital footprint respecting the Instant Messaging utilizing Skype and MSN. 399-410
Volume 13, Number 4, November 2013
- Shao-Kang Lo, Yu-Jen Chou, Ching-I Teng:
Source effect of advertised reference price influences on transaction value in online shopping environments. 411-421 - Sören Preibusch, Dorothea Kübler, Alastair R. Beresford:
Price versus privacy: an experiment into the competitive advantage of collecting less personal information. 423-455 - Lorena Blasco-Arcas, Blanca Hernández Ortega, Julio Jiménez Martínez:
Adopting television as a new channel for e-commerce. The influence of interactive technologies on consumer behavior. 457-475 - Norazah Mohd Suki:
Consumer shopping behaviour on the Internet: insights from Malaysia. 477-491 - Susan Standing, Craig Standing, Peter E. D. Love, Denise Gengatharen:
How organizing visions influence the adoption and use of reverse auctions. 493-511
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.