1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

Electronic Business: Concepts, Methodologies, Tools, and Applications (4-Volumes) P196 docx

10 238 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Nội dung

1884 Analysis of Business Process Models in Enterprise Web Services will not cause suboptimization of processes. On the contrary, organization can use standard forms of software, and still create unique solutions at user/task level. Similarly, ideas to improve opera- tions can be implemented. WfMSs can be used to help both managers and end-user understand the business process better. It also helps manag- HUVWRFRQWURODQGGHOHJDWHWDVNVPRUHHI¿FLHQWO\ and effectively. The management of the new information based company is the entrepreneurial spirit through user computing. Exchanging and distributing knowledge allow people at the line levels more aggressively setting their own direction and ob- jectives. Individual managers feel more control and satisfaction with the end product to resolve issues on their own. Mentoring opens wider communications between the systems personnel and levels of employees closest to operations, customers, and their associated problems. Such strategy continues to encourage the creativity and team cooperation in the business functions of the company and ultimately the systems achieve us- ability from the people who design and develop themselves, the users. Although WfMSs provide us a promising solu- tion to help understand and control processes and motivate communications among different levels of personnel in an organization, current commer- cial WfMSs still have limitations in supporting ÀH[LELOLW\DQGDGDSWDWLRQDQGODFNRILQWHURSHU- DELOLW\WRVXSSRUW%%ZRUNÀRZFRQWURO$VWKH gap between academic and industry standards reduces, the above weakness can be overcome. This article aims to address a guide to practi- WLRQHUVWKURXJKDVHULHVRIZHOOGH¿QHGVWUXFWXUDO steps necessary to make informed, consistent DQGHI¿FLHQWFKDQJHVWREXVLQHVVSURFHVVHV7KH research has also contributed to the new knowl- edge in Web-based services with the collabora- WLYHZRUNÀRZDSSOLFDWLRQV7KHPHFKDQLVPVRI LQWHURUJDQL]DWLRQDOZRUNÀRZVFRXSOHGZLWKWKH performance incentives of the process framework enable the users to integrate enterprise applica- tions in a distributed environment. In order to gain a sustainable competitive advantage in the wide VSHFWUXP RI HVHUYLFHV ZRUNÀRZWHFKQRORJLHV coupled with cross-functional business processes offer fully automated coordination support. Future debates include the standardization to bridge be- tween systems with an organizational boundary, where the internal systems meet the external Web systems and other ways of using value-oriented patterns to improve performances. REFERENCES Adams, M., Edmond, D., & Hofstede, A. H. M. (2003). The application of activity theory WR G\QDPLF ZRUNÀRZ DGDSWDWLRQ LVVXHV Paper SUHVHQWHGDWWKHWK3DFL¿F$VLD&RQIHUHQFHRQ Information Systems, Adelaide, South Australia. Adner, R., & Helfat, C. (2003). Corporate effects and dynamic managerial capabilities, Strategic Management Journal, 24, 1011-1025. Agostini, A., & de Michelis, G. (2000). A light ZRUNÀRZPDQDJHPHQWV\VWHPXVLQJVLPSOHSUR- cess models. Computer Supported Cooperative Work: The Journal of Collaborative Computing, 9(3-4), 335-363. Aissi, S., Malu, P., & Srinivasan. (2002). E-busi- ness process modeling: The next big step. IEEE Computer, 35(5), 55-62. Alavi, M., & Leidner, D.E. (2001). Review: Knowledge management and knowledge man- agement systems: Conceptual foundations and research issues. MIS Quarterly, 25(1), 107-136. Alavi, M., & Weiss, I. R. (1986). Managing the risks associated with end-user computing. Journal of Management Information Systems, 2(3), 5-20. Atluri, V., & Huang, W. K. (1996). An authoriza- WLRQPRGHOIRUZRUNÀRZV,Q+.(%HUWLQR* Martella, & E. Montolivo (Eds.), Computer secu- rity - ESORICS (pp. 44-64). Springer-Verlag. 1885 Analysis of Business Process Models in Enterprise Web Services Atluri, V., & Huang, W. K. (1997). An extended SHWUL QHW PRGHO IRU VXSSRUWLQJ ZRUNÀRZ LQ D multilevel secure environment. In P. S. Sandhu &. R. S. Sandhu (Eds.), Database security X: Status and prospects. Chapman and Hall. Andreescu, F. (2006). Organisational challenges of implementing e-business in the public services: The case of Britain’s national mapping agency. International Journal of E-business Research, 2(4), 39-60. Basu, A., & Blanning, R. B. (2000). A formal ap- SURDFKWRZRUNÀRZDQDO\VLVInformation Systems Research, 11(1), 17-36. Basu, A., & Kumar, A. (2002). Research commen- WDU\:RUNÀRZPDQDJHPHQWLVVXHVLQHEXVLQHVV Information Systems Research, 13(1), 1-14. Bergeron, F., & Berube, C. (1990, December). End-users talk computer policy. Journal of Systems Management, 14-16. Biazzo, S. (1998). A critical examination of the business process re-engineering phenomenon, International Journal of Operations and Produc- tion Management, 18 (9/10), 1000-1016. %LFKOHU 3 3UHXQHU *  6FKUHÀ 0  :RUNÀRZWUDQVSDUHQF\. In Paper presented at the 9th International Conference for Advanced Information Systems Engineering (CAiSE’97), Barcelona, Spain. Bolton, C., & Davies, J. (2000). Activity graphs and processes. In W. Grieskamp, T. Santen, & B. Stoddart (Eds.), Proceedings Integrated Formal Methods 2000, LNCS 1945, Springer. Borgida, A., & Murata, T. (1999, February). 7ROHUDWLQJ H[FHSWLRQV LQ ZRUNÀRZV$ XQL¿HG framework for data and processes. In D. Geor- gakopoulos, W. Prinz, & A.L. Wolf (Eds.), Pro- ceedings of the International Joint Conference on Work Activities Coordination and Collaboration, WACC 99, ACM Press, (pp. 59-68). Boynton, A.C., Zmud, R.W., & Jacobs, G.C. 6HSWHPEHU7KHLQÀXHQFHRI,7PDQDJH- ment practice on IT use in large organizations. MIS Quarterly, 299-318. Brancheau, J. C., & Brown, C. V. (1993). The management of end-user computing: Status and directions. ACM Computing Surveys, 25(4), 450-482. Cardoso, J., & Sheth, A. (2003). Semantic e-work- ÀRZFRPSRVLWLRQJournal of Integrated Design and Process Science, 21(3), 191-225. Casati, F., Ceri, B., Pernici, B., & Pozz, G. (1995). &RQFHSWXDO PRGHOOLQJ RI ZRUNÀRZV. In Paper presented at the Object-oriented and Entity-Re- lationship Conference, Australia. Casati, F., & Pozzi, G. (1999). Modeling excep- WLRQDOEHKDYLRXUVLQFRPPHUFLDOZRUNÀRZPDQ- agement systems. In Paper presented at the 1999 IFCIS International Conference on Cooperative Information Systems, Edinburgh, Scotland. Childe, S.J., Maull, R.S., & Bennett, J. (1994). Frameworks for understanding business process re-engineering, International Journal of Op- erations and Production Management, 14(2), 22-34. Chiu, D. K. W., Cheung, S. C., Till, S., Karlapalem, ./L4.DIH]D(:RUNÀRZYLHZ driven cross-organizational interoperability in a Web service environment. Information Technology and Management, 5, 221-250. CIM-OSA. (1989). CIM-OSA Reference Archi- tecture. CIM-OSA Standards Committee, AMICE ESPRIT. Cimatti, A., Clarke, E., Giunchiglia, F., & Rov- eri, M. (2000). NUSMV: A new symbolic model checker. International Journal on Software Tools for Technology Transfer, 2(4), 410-425. Compeau, D., Higgins, C.A., & Huff, S. (1999, June). Social cognitive theory and individual 1886 Analysis of Business Process Models in Enterprise Web Services reactions to computing technology: A longitudinal study. MIS Quarterly, 145-158. Cook, J.E., & Wolf, A.L. (1999). Software pro- cess validation: Quantitatively measuring the correspondence of a process to a model. ACM Transactions on Software Engineering and Meth- odology, 8(2), 147-176. Cox, D., & Kreger, H. (2005). Management of the service-oriented-architecture life cycle. IBM Systems Journal, 44, 709-726. Davenport, T. (1993). Process innovation–reen- gineering work through information technology. Boston: Harvard Business School Press. Davis, G. B. (1988). The hidden costs of end- user computing. Accounting Horizons, 2(4), 103-106. DeLone, W. H., & McLean, E. R. (1992). Informa- tion systems success: The quest for the dependent variables. Information Systems Research, 3(1), 60-95. Divitini, M., & Simone, C. (2000). Supporting GLIIHUHQWGLPHQVLRQVRIDGDSWDELOLW\LQZRUNÀRZ modeling. Computer Supported Cooperative Work: The Journal of Collaborative Computing, 9(3-4), 365-397. )DXVWPDQQ* &RQ¿JXUDWLRQIRUDGDS- WDWLRQ²D KXPDQFHQWHUHG DSSURDFK WR ÀH[LEOH ZRUNÀRZHQDFWPHQW Computer Supported Co- operative Work: The Journal of Collaborative Computing, 9(3-4), 413-434. Fischer, L. (Ed.). (2001). :RUNÀRZ KDQGERRN  :RUNÀRZ PDQDJHPHQW FRDOLWLRQ IXWXUH strategies. Lighthouse Point, Florida. Fischer, G., Giaccardi, E., Ye, Y., Sutcliffe, A. G., & Mehandjiev, N. (2004). Meta-design: A mani- festo for end-user development. Communications of the ACM, 47(9), 33-37. Fowler, M., & Scott, K. (1997). UML distilled. New York: Addison-Wesley. Galletta, D. F., & Hufnagel, E. M. (1992). A model of end-user computing policy: Context, process, content and compliance. Information and Management, 22, 1-18. Grigori, D., Casati, F., Dayal, U., & Shan, M.C. (2001). Improving business process quality through exception understanding, prediction, and prevention. In P. Apers, P. Atzeni, S. Ceri, S. Paraboschi, K. Ramamohanarao, & R. Snodgrass (Eds.), Proceedings of the 27 th International Con- ference on Very Large Data Bases, VLDB01, (pp. 159-168). Morgan Kauffman. Gudes, E., Olivier, M. S., & van der Riet, R. P. (1999). Modeling, specifying and implement- LQJZRUNÀRZVHFXULW\LQF\EHUVSDFHJournal of Computer Security, 7(4), 287-315. Gudes, E., & Tubman, A. (2002). AutoWF: A VHFXUH:HEZRUNÀRZV\VWHPXVLQJDXWRQRPRXV objects. Data and Knowledge Engineering, 43(1), 1-27. Guimaraes, T., Gupta, Y.P., & Rainer, R.K. (1999, Spring). Empirically testing the relationship between end-user computing problems and infor- mation center success factors. Decision Sciences, 393-413. Hacker, M. E., & Brotherton, P. A. (1998). Designing and installing effective performance measurement systems. Industrial Engineering Solutions, 18-23. Hagen, C., & Alonso, G. (2000). Exception han- GOLQJ LQ ZRUNÀRZ PDQDJHPHQW V\VWHPV IEEE Transactions on Software Engineering, 26(10), 943-958. Hammer , M. (1996). Beyond reengineering. New York: HarperBusiness. Harrington, J., Esseling, E., & Van Nimwegen, H. (1997). Business process improvement workbook. New York: McGraw-Hill. Harris, R. W. (2000). Schools of thought in research 1887 Analysis of Business Process Models in Enterprise Web Services into end-user computing success. Journal of End User Computing, 12(1), 24-34. Heinl, P., Horn, S., Jablonski, S., Need, J., Stein, K., & Teschke, M. (1999). A comprehensive ap- SURDFK WR ÀH[LELOLW\ LQ ZRUNÀRZ PDQDJHPHQW systems. In Paper presented at the WACC’99, San Francisco, CA. Helfat, C., & Peteraf, M.A. (2003). The dynamic resource-based view: Capability lifecycles. Stra- tegic Management Journal, 24, 997-1010. Hevner, A., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, 28(1), 75-105. Herbst, J., & Karagiannis, D. (2000). Integrating PDFKLQHOHDUQLQJDQGZRUNÀRZPDQDJHPHQWWR VXSSRUWDFTXLVLWLRQDQGDGDSWDWLRQRIZRUNÀRZ models. International Journal of Intelligent Sys- tems in Accounting, Finance and Management, 9(1), 67-92. Hitt, L., & Brynjolfsson, E. (1997). Information WHFKQRORJ\ DQG LQWHUQDO ¿UP RUJDQL]DWLRQ$Q exploratory analysis. Journal of Management Information Systems, 14(2), 81-101. Keen, G., & Knapp, M. (1996). Every manager’s guide to business processes: A glossary of key terms and concepts for today’s business leader. Boston: Harvard Business School Press. Klarmann, J. (2001). A comprehensive support IRUFKDQJHVLQRUJDQL]DWLRQDOPRGHOVRIZRUNÀRZ management systems. In Paper presented at the 4th International Conference on Information Systems Modeling ({ISM} ‘01). Klein, M., & Dellarocas, C. (2000). A knowledge- based approach to handling exceptions in work- ÀRZV\VWHPVComputer Supported Cooperative Work: The Journal of Collaborative Computing, 9(3-4), 399-412. Kon, F., Costa, F., Blair, G., & Campbell, R.H. (2002). The case for relective middleware. Com- munications of the ACM, 45(6), 33-38. .XPDU$:DLQHU-0HWDZRUNÀRZV as a control and coordination mechanism for ex- FHSWLRQKDQGOLQJLQZRUNÀRZV\VWHPVDecision Support System, 40(1), 89-105. Kumar, A., van der Aalst, W.M.P., & Verbeek, H.M.W. (2002). Dynamic work distribution in ZRUNÀRZPDQDJHPHQWV\VWHPV+RZWREDODQFH quality and performance?. Journal of Management Information Systems, 18(3), 157-193. Kumar, A., & Zhao, J. L. (1999). Dynamic routing DQGRSHUDWLRQDOFRQWUROVLQZRUNÀRZPDQDJHPHQW systems. Management Science, 45(2), 253-272. Leymann, H., & Roller, D. (2000). Production ZRUNÀRZ &RQFHSWV DQG WHFKQLTXHV: Prentice Hall. Livari, J., & Livari, N. (2006). Varieties of user- centeredness. In Paper presented at the 39th An- nual Hawaii International Conference on System Sciences, Hawaii. McKendrick, J. (2006, March 2). Will there be a ³'HOO´RIVRIWZDUH"ZDNet, 559. Melville, M., Kraemer, K., & Gurbaxani, V. (2004). Information technology and organizational performance: An integrative model of IT business value. MIS Quarterly, 28(2), 283-322. Muehlen, M. Z. (2004). Organizational man- DJHPHQW LQ ZRUNÀRZ DSSOLFDWLRQV²LVVXHV DQG Perspectives. Information Technology and Man- agement, 5, 271-291. O’Donnell, D., & March, S. (1987). End user FRPSXWLQJ HQYLURQPHQWV²¿QGLQJ D EDODQFH between productivity and control. Information and Management, 13(1), 77-84. Powell, A., & Moore, J. E. (2002). The focus of research in end user computing: Where have we come since the 1980s? Journal of End User Computing, 14(1), 3-22. Raghu, T. S., Jayaraman, B., & Rao, H. R. (2004). Towards an integration of agent and activity-cen- 1888 Analysis of Business Process Models in Enterprise Web Services tric approaches in organization process modeling: Incorporating incentive mechanisms. Information Systems Research, 15(4), 316-335. Robinson, R. (2004). Understand enterprise service bus scenarios and solutions in service- oriented architecture. IBM developerWorks. Retrieved November 19, 2007, from http://www- 106.ibm.com/developerworks/webservices/li- brary/ws-esbscen/ Rummler, G., & Brache, A. (1995). Managing the white space on the organizational chart. Supervi- sion, 52(5), 6-12. Sadtler, C., Cotignola, D., Crabtree, B., & Mi- chel, P. (2004). Patterns: Broker interactions for intra- and inter-enterprise. IBM Redbooks, SG24-6075. Retrieved November 19, 2007, from http://www.redbooks.ibm.com/redbooks.nsf/ 2da15c6c85256d6d6d0046192e?openDocument Schmidt, M.T., Hutchison, B., Lambros, P., & Phippen, R. (2005). The enterprise service bus: Making service-oriented architecture real. IBM Systems Journal, 44, 727-744. Schmidt, M.T., & Kalyana, S. (2004). The on demand operating environment – architectural overview. IBM developerWorks. Retrieved No- vember 19, 2007, from http://www-106.ibm. com/developerworks/ibm/library/i-odoe1/ 6HGGRQ3%$UHVSHFL¿FDWLRQDQGH[- tension of the DeLone and McLean model of IS success. Information Systems Research, 8(3), 240-253. Sewing, J., Rosemann, M., & Dumas, M. (2006). Process-oriented assessment of Web services. International Journal of E-Business Research, 2(1), 19-44. Shah, S.K. (2001). Improving information system performance through client value assessment: A case study. Review of Business, Spring, 37-42. Singh, R., & Salam, A. F. (2006). Semantic infor- mation assurance for secure distributed knowledge management: A business process perspective. IEEE Transactions on System, Man and Cyber- netics, 36(3), 472-486. 6WRKU($=KDR-/:RUNÀRZDXWR- mation: Overview and research issues. Information Systems Frontiers, 3(3), 281-296. Strassmann, P.A. (1997). The squandered com- puter: Evaluating the business alignment of in- formation technologies. New York: Information Press. Sutcliffe, A., & Mehandjiev, N. (2004). End-user development: Introduction. Communications of the ACM, 47(9), 31-32. 7DJJ5:RUNÀRZLQGLIIHUHQWVW\OHVRI virtual enterprise. In Proceedings of the Workshop in Information Technology for Virtual Enterprises, (pp. 21-28). Tallon, P. P., Kraemer, K., & Gurbaxani, V. (2000). Executives’ perception of the business value of informaiton technology: A process-oriented approach. Journal of Management Information Systems, 16(4), 145-173. Talon, P.P., Kraemer, K.L., & Gurbaxani, V. (2000). Executives’ perceptions of the business value of information technology: A process-oriented approach. Journal of Management Information Systems, Spring, 145-173. Tan, J. C., & Harker, P. T. (1999). Designing workflow coordination: Centralized versus market-based mechanisms. Information Systems Research, 10(4), 328-342. Thomas, M., Redmond, R., Yoon, V., & Singh, R. (2005). A semantic approach to monitor busi- ness process performance. Communications of the ACM, 48(12), 55-59. van der Aalst, W. M. P. (1999). Generic work- ÀRZ PRGHOV +RZ WR KDQGOH G\QDPLF FKDQJH and capture management information. In Paper presented at the the Fourth IFCIS International 1889 Analysis of Business Process Models in Enterprise Web Services Conference on Cooperative Information Systems (CoopIS’99), Edinburgh, Scotland. van der Aalst, W. M. P. (1999). Process-oriented Architectures for Electronic Commerce and In- WHURUJDQL]DWLRQDO:RUNÀRZInformation Systems, 24(8), 639-671. van der Aalst, W.M.P., Desel, J., & Oberweis, A. (Eds.). (2000). Business process management. Models, techniques, and empirical studies. Lecture notes in computer science (Vol. 1806). Berlin: Springer-Verlag. van der Aalst, W.M.P., & Jablonski, S. (2000). 'HDOLQJ ZLWK ZRUNÀRZ FKDQJH ,GHQWL¿FDWLRQ of issues and solutions. International Journal of Computer Systems, Science, and Engineering, 15(5), 267-276. van der Aalst, W. M. P., & Kumar, A. (2003). ;0/EDVHGVFKHPDGH¿QLWLRQIRUVXSSRUWRILQ- WHURUJDQL]DWLRQDOZRUNÀRZInformation Systems Research, 14(1), 23-46. van der Aalst, W.M.P., ter Hofstede, A.H.M., Kiepuszewski, B., & Barros, A. P. (2003). Work- ÀRZSDWWHUQVDistributed and Parallel Databases, 14(3), 5-51. van der Aalst, W.M.P., & van Dongen, B.F. (2002). 'LVFRYHULQJZRUNÀRZSHUIRUPDQFHPRGHOVIURP timed logs. In Y. Han, S. Tai, & D. Wikarski (Eds.), International Conference on Engineering and Deployment of Cooperative Information Systems, EDCIS2002, Lecture Notes in Computer Science (Vol. 2480). Berlin: Springer-Verlag. van der Aalst, W.M.P., & van Hee, K.M. (2002). :RUNÀRZPDQDJHPHQW 0RGHOV PHWKRGV DQG systems. Cambridge, MA: MIT Press. van der Aalst, W. M. P., Weske, M., & Grunbauer, D. (2005). Case handling: A new paradigm for business process support. Data and Knowledge Engineering, 53, 129-162. van der Aalst, W. M. P., Weske, M., & Wirtz, G. $GYDQFHG WRSLFV LQ ZRUNÀRZ PDQDJH- ment: Issues, requirements, and solutions. Journal of Integrated Design and Process Science, 7(3), 49-77. Verbeek, H.M.W., Basten, T., & van der Aalst, :03'LDJQRVLQJZRUNÀRZSURFHVVHV XVLQJ :RÀDQ The Computer Journal, 44(4), 246-279. Wainer, J., Barthelmess, P., & Kumar, A. (2003). :5%&²D ZRUNÀRZ VHFXULW\ PRGHO LQFRUSR- rating controlled overriding of constraints. In- ternational Journal of Cooperative Information Systems, 12(4), 455-485. Wang, M., & Wang, H. (2006). From process logic to business logic—a cognitive approach to business process management. Information and Management, 43, 179-193. Weiss, M., & Amyot, D. (2005). Business process modeling with URN. International Journal of E- Business Research, 1(3), 63-90. :RUNÀRZ 0DQDJHPHQW &RDOLWLRQ  5H- trieved November 19, 2007, from http://www. HZRUNÀRZRUJVWDQGDUGVLQGH[KWP Zhang, D. (2005). Web services composition for process management in e-business. Journal of Computer Information Systems, XLV(2), 83-91. Zhao, J.L. (2002). ,QWHURUJDQL]DWLRQDOZRUNÀRZ and e-commerce applications. Presentation at HICSS-35. Retrieved November 19, 2007, from http://attila.stevens-tech.edu/sigpam/publica- tions/tutorial/HICSS-35/Interorganizational_ :RUNÀRZSGI This work was previously published in International Journal of E-Business Research, Vol. 4, Issue 2, edited by I. Lee, pp. 69-87, copyright 2008 by IGI Publishing (an imprint of IGI Global). 1890 Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited. Chapter 6.11 Doing International Business Online for the Small and Medium Enterprise Sam Edwards Nagoya University, USA and Japan ABSTRACT 7KLVFKDSWHUDGGUHVVHVWKHSULPDU\GLI¿FXOWLHV that small and medium enterprises face when doing business online with international partners. The guidance provided in this chapter is primar- ily for owners of small and medium enterprises rather than legal for professionals. The two main problems inhibiting online transactions are a lack of trust between the parties and the risk inherent in the exchange. This chapter analyzes ways to address these problems. Many of the practical suggestions in this chapter are inspired not by million dollar deals but by playground transactions between children. Often the simple solutions are the best ones. INTRODUCTION Scene One You run a small shop that specializes in imported art from native artisans. Although you do not have the budget to travel to every place that might have interesting items, you still want to offer a variety RIJRRGV:KLOHVXU¿QJWKH,QWHUQHW\RXORFDWH a site that shows items that look to be perfect but the seller appears to be located in Kenya. How can you do business with someone you will never meet face-to-face? From the small digital pictures and limited descriptions, how can you be sure the goods will be as portrayed? How can you protect 1891 Doing International Business Online for the Small and Medium Enterprise yourself from all of the scams you hear about on the net? If you decide to buy, how can you resolve any disputes that might arise? Scene Two Your uncle produces hand-carved wooden statues and sells them in his small stall in a Nairobi mar- ket. Since the statues have proven popular with foreign tourists, he has asked you to help expand his business. Being a computer savvy student, you quickly put together a Web page with pictures of his works in hopes of exporting them. After a few months, despite having an ever-growing page hit count, you have not received any orders. What can you do to improve the chances of selling? How can you protect yourself from all the scams that exist in the wilds of the Internet? Increasingly small and medium businesses are expanding to do business on the Internet. This is nothing new, however, as more people gain ac- cess to the Internet, international transactions for these smaller businesses will increase. For a large company, experienced teams handle international transactions. These teams normally travel and meet their counterparts face-to-face. Smaller enterprises do not have the resources and must rely on remote com municat ions if t hey w ish to do international business. Can the same Internet that IDFLOLWDWHV¿QGLQJSRWHQWLDOWUDGHSDUWQHUVKHOSWR solve some of these problems with international transactions and disputes? This chapter focuses two aspects of online commerce: 1. how the various e-commerce sys- tems can increase trust and reduce risk, and 2. should a dispute arise, how online dispute resolu- WLRQFDQHI¿FLHQWO\UHVROYHSUREOHPV In addition to direct business-to-business transactions, this chapter will examine private marketplaces such as eBay. With eBay recently signing up its 200,000,000 th member, eBay has EHFRPHE\SRSXODWLRQWKH¿IWKODUJHVW³FRXQWU\´ in the world(Whitman, 2006). Given eBay’s domi- nance, this chapter will examine the practices that help mitigate risk in international transactions. Moreover, eBay’s acquisition of Skype, a voice over IP telephony service, opens up the potential for much more interesting features to help bring buyers and sellers closer in spirit, if not space. This chapter will conclude with recommenda- tions for small and medium businesses looking to engage in international business through the Internet. TWO BASIC PROBLEMS INHIBITING ONLINE TRANSACTIONS In our examples, the two biggest problems facing our parties are: trust and risk. First, neither party trusts the other. Moreover, there is a general dis- trust of Internet based businesses. Second, there are substantial risks when dealing online. The combination of low trust and high risk creates substantial barriers. Using a variety of techniques and resources, the parties can eliminate or at least reduce these two fundamental concerns. BUILDING TRUST BEFORE THE EXCHANGE \HDUVDJR7XVVHUVDJHO\REVHUYHG³>D@IRRO and his [or her] money are soon parted” (1557). This sage advice is no less true today. In fact, one can become parted from one’s e-money in a single, careless click on the Internet. Just how can one trust someone in cyberspace? Know Thy Partner Who exactly is the person at the other end of the transaction? Knowing someone is part of building trust. In a face-to-face exchange just JHWWLQJWR³ORRNVRPHRQHLQWKHLUH\HV´FDQKHOS build trust. Online this can be accomplished in a variety of ways. 1892 Doing International Business Online for the Small and Medium Enterprise Communication The more communication between the parties the easier it is to build trust. Communication falls into two broad categories: synchronous and asynchronous. The primary difference is that in synchronous communication the parties communicate in real time. In asynchronous com- munication the message is sent and later received by the other party. Synchronous communication includes: text chat, voice chat, video chat, and any other real time communication. Asynchronous communication includes: e-mail, voice mail, video mail, and any other communication that does not link the parties in real time. Synchronous communication can be more affective in building trust since it allows more information to pass between the parties. For example, if the seller hesitates when asked if her carvings are real ebony wood, the buyer might question the seller’s claims. While synchronous communication is preferable, asynchronous com- munication can be more convenient given the time differences when dealing with global transactions. Moreover, parties operating in their second (or more) language are often more comfortable with asynchronous communication. There are also other advantages to text-based communication. Epstein (2001) suggests that par- ties are less likely to lie when their comments are ³RQWKHUHFRUG´LQZULWLQJ(SVWHLQZDVGLVFXVV- ing attorneys in negotiations but the principle remains the same; having a permanent record of all communications can be an effective deterrent to parties engaging in untruths. For example, a seller can build trust with po- tential buyers by offering several methods of com- PXQLFDWLRQVXFKDVOLYHWH[WFKDWD³92,3PH´ 1 button on their Web site, and e-mail. Regardless of the method, prompt responses to all inquires are important in building trust. An e-mail that goes unanswered for weeks would dissuade the most interested buyer. Further, the more personal the communication, the better it will help build trust. For example, a personal e-mail rather than an automatically generated response from the seller generates much more trust. In addition to personalized responses, the content of the communication is also important in building trust. For example, in asynchronous ZULWWHQ FRPPXQLFDWLRQ LW LV GLI¿FXOW WR MXGJH the feelings of the author since the reader only has the sterile words. In fact there is evidence that even the wording of something as simple DVWKHFORVLQJ³6LQFHUHO\%HVW&KHHUV´FDQVLJ- QL¿FDQWO\DIIHFWWKHWHQRURIWKHFRPPXQLFDWLRQ (Ogunnaike, 2006). Judge a Person by Their Past By looking to someone’s history you can learn ZKDWWRH[SHFWIURPWKHP,I\RX¿QGRXWWKDWD local seller has a reputation for good quality you are more likely to trust them. Use the Internet to research the history of a seller or buyer. Private auction sites such as eBay incorporate history of users into their site. With a quick glance you can easily learn someone’s reputation. A seller with a long history of good comments IURPVDWLV¿HGEX\HUVZLOOKDYHDKLJKHUOHYHORI trust and will be able to sell goods at a higher price than a seller with a poor or no reputation. Even if a seller is selling directly to consum- ers she can offer a list of past clients (with their permission of course). A customer testimonial section on the seller’s Web site or even a public forum where members can voice their satisfaction can help to build trust. However, none of these measures of trust are foolproof. Reputation can EHIDOVL¿HGXVLQJVKHOODFFRXQWV0RUHRYHUZKR LVWRVD\WKDWDFRPPHQWE\DVDWLV¿HG³FXVWRPHU´ was real? &HUWL¿FDWLRQE\7KLUG3DUWLHV 0DQ\RUJDQL]DWLRQVRIIHUFHUWL¿FDWLRQVIRUPHU- FKDQWV7KHVHFHUWL¿FDWLRQVDUHGHVLJQHGLQSDUW 1893 Doing International Business Online for the Small and Medium Enterprise to build trust for consumers by showing that the merchant meets certain standards. Online, simi- ODUDQGRIWHQWKHVDPHFHUWL¿FDWLRQVH[LVW)RU H[DPSOHRUJDQL]DWLRQVRIIHULQJFHUWL¿FDWLRQIRU online businesses include: the Better Business Bu- reau Online, 2 Webassured, 3 and SquareTrade. 4 7KHUHDUHDOVRVSHFLDOL]HGFHUWL¿FDWLRQRUJD- nizations that address areas such as Web security and protection of user privacy. 5 7RJHWFHUWL¿FDWLRQE\RQHRIWKHVHLQGHSHQ- dent groups, a seller must meet certain standards. Knowing a seller has met these standards can help build trust for buyers. 8QIRUWXQDWHO\ HYHQ FHUWL¿FDWLRQ E\ D WKLUG party is not a sure sign that there is no risk. Edel- man’s (2006) recent empirical research suggests WKDWRUJDQL]DWLRQVRIIHULQJWKLUGSDUW\FHUWL¿FDWLRQ DUHRIWHQOD[DQG³>WKHLU@DSSURDFKJLYHVULVHWR adverse selection: The sites that seek and obtain WUXVWFHUWL¿FDWLRQVDUHDFWXDOO\VLJQL¿FDQWO\OHVV WUXVWZRUWK\WKDQWKRVHWKDWIRUHJRFHUWL¿FDWLRQ´ Edelman found that certifying cites had a revoked YHU\IHZFHUWL¿FDWLRQVDQGUHODWHGWKLVWRWKH ¿QDQFLDOLQFHQWLYHVWRNHHSVLWHVSD\LQJIRUDQ- QXDOFHUWL¿FDWLRQ Thus, in order to build trust there are several steps one can take before entering into a trans- action. None of these suggestions are new but there are some new twists particular to the online environment. Even if the parties are able to build some level of trust, once the parties decide to engage in an exchange, how can they reduce risk? REDUCING RISK DURING THE EXCHANGE Rather than a complicated legal analysis of the exchange of goods in trade, this section will ap- proach things from the perspective of children. We can learn a lot by watching how children interact as their world is one mostly without enforceable ODZV:LWKRXWDQ HDV\ZD\ WR HQIRUFH³ULJKWV´ children have developed their own methods to reduce risk. The Law of the Playground: Simultaneous Exchange If you have ever watched children engaging in a trade of prized items such as a toy, you will notice that they are often very distrusting of their ³WUDGHSDUWQHUV´:LWKRXWDQ\EXVLQHVVRUOHJDO WUDLQLQJFKLOGUHQKDYHGHYHORSHGD¿QHPHWKRG of overcoming this distrust. The children will face each other, toy in hand, and simultaneously grab the toy offered by their partners. Only once both VLGHVKDYHD¿UPJUDVSRQWKHRWKHU¶VWR\ZLOOWKH\ release their toy and complete the transaction. This simultaneous exchange protects both par- ties to the transaction. The parties can size up the item offered in exchange and eliminate the risk of not receiving the toy in exchange since they only release their toy once they have the other ¿UPO\LQWKHLUJUDVS )RULWHPVVXFKDV³YLUWXDOJRRGV´WKDWFDQEH exchanged simultaneously online, one can follow the rule of the playground. For example, for virtual goods in online environments such as Second Life, 6 the parties to a transaction can see exactly what is offered for exchange before clicking the ³,DFFHSWEXWWRQ´2QFHERWKSDUWLHVDFFHSWWKH transaction automatically occurs. Although this method can work for some online transactions, simultaneous exchange is normally impractical for transactions involving non-virtual goods. Moreover, part of the attraction of online transactions is the fact that you do not have to meet anyone in person. This means that our online parties must seek out other methods to reduce their risks. . LQ D multilevel secure environment. In P. S. Sandhu &. R. S. Sandhu (Eds.), Database security X: Status and prospects. Chapman and Hall. Andreescu, F. (2006). Organisational challenges. company and ultimately the systems achieve us- ability from the people who design and develop themselves, the users. Although WfMSs provide us a promising solu- tion to help understand and control. between the systems personnel and levels of employees closest to operations, customers, and their associated problems. Such strategy continues to encourage the creativity and team cooperation in

Ngày đăng: 07/07/2014, 10:20