


default search action
Electronic Commerce Research, Volume 13
Volume 13, Number 1, March 2013
- Ming-Yi Chen

, Ching-I Teng
:
A comprehensive model of the effects of online store image on purchase intention in an e-commerce environment. 1-23 - Tao Zhou:

An empirical examination of user adoption of location-based services. 25-39 - Nir Kshetri:

Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. 41-69 - Matej Marinc

:
Banks and information technology: marketability vs. relationships. 71-101 - Marios D. Sotiriadis, Cinà van Zyl

:
Electronic word-of-mouth and online reviews in tourism services: the use of twitter by tourists. 103-124
Volume 13, Number 2, May 2013
- Shiguo Lian, Xi Chen, Katina Michael

:
Editorial: special issue on Service-Based Electronic Commerce Systems. 125-127 - Dimitrios Koukopoulos, Georgios D. Styliaras

:
Design of trustworthy smartphone-based multimedia services in cultural environments. 129-150 - Feng Xu, Katina Michael

, Xi Chen:
Factors affecting privacy disclosure on social network sites: an integrated model. 151-168 - Cheng-Hsien Yu, Shi-Jen Lin:

Fuzzy rule optimization for online auction frauds detection based on genetic algorithm. 169-182 - Björn Lantz

, Klas Hjort:
Real e-customer behavioural responses to free delivery and free returns. 183-198 - Ismail Sila:

Factors affecting the adoption of B2B e-commerce technologies. 199-236
Volume 13, Number 3, September 2013
- Stefanos Gritzalis

, Justin Z. Zhan, Kitae Jeong:
IT convergence and security. 237-241 - Keunwoo Rhee, Dongho Won, Sang-Woon Jang, Sooyoung Chae, Sangwoo Park:

Threat modeling of a mobile device management system for secure smart work. 243-256 - Ai Thao Nguyen Thi, Tran Khanh Dang

:
Enhanced security in internet voting protocol using blind signature and dynamic ballots. 257-272 - Zan Yang, Jianxin Wang, Lin Yang, Rui-guang Yang, Bao-sheng Kou, Jie-kun Chen, Shu-Mei Yang:

The RBAC model and implementation architecture in multi-domain environment. 273-289 - Jae Hun Jang, Sam Won Kim, Yangsun Lee

, Jongsung Kim:
The effects of relationship benefit on relationship quality and store loyalty from convergence environments - NPS analysis and moderating effects. 291-315 - Hangbae Chang:

The security service rating design for IT convergence services. 317-328 - Fei Shi, Weijie Liu, Dongxu Jin, JooSeok Song:

A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology. 329-345 - Sung-Min Jung, Tae-Kyung Kim, Hee Suk Seo, Seung-Jae Lee

, Jin Kwak
:
The prediction of network efficiency in the smart grid. 347-356 - Young-Sik Jeong, Tae-Kyu Yeom, Ji Soo Park, Jong Hyuk Park:

Efficient model of Korean graphemes based on a smartphone keyboard. 357-377 - Kyung-Soo Lim, Changhoon Lee

:
A framework for unified digital evidence management in security convergence. 379-398 - Hai-Cheng Chu, Chi-Hsiang Lo, Han-Chieh Chao

:
The disclosure of an Android smartphone's digital footprint respecting the Instant Messaging utilizing Skype and MSN. 399-410
Volume 13, Number 4, November 2013
- Shao-Kang Lo, Yu-Jen Chou, Ching-I Teng

:
Source effect of advertised reference price influences on transaction value in online shopping environments. 411-421 - Sören Preibusch, Dorothea Kübler, Alastair R. Beresford:

Price versus privacy: an experiment into the competitive advantage of collecting less personal information. 423-455 - Lorena Blasco-Arcas

, Blanca Hernández-Ortega
, Julio Jiménez Martínez
:
Adopting television as a new channel for e-commerce. The influence of interactive technologies on consumer behavior. 457-475 - Norazah Mohd Suki

:
Consumer shopping behaviour on the Internet: insights from Malaysia. 477-491 - Susan Standing

, Craig Standing, Peter E. D. Love, Denise Gengatharen
:
How organizing visions influence the adoption and use of reverse auctions. 493-511

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














