Current Search: Electronic commerce (x)
View All Items
- Title
- Factors separating winners and losers in e-business.
- Creator
- O'Leary, Bay, Florida Atlantic University, Korgaonkar, Pradeep
- Abstract/Description
-
The rapid growth and integration of the Internet as a communication and commercial medium into our society and economy has changed both in many ways. This dissertation is an exploratory study of factors deemed significant in the context of e-business success or failure. A survey instrument is used in addition to qualitative data was gathered from in-depth interviews. Drawing upon the literature from the area of new business in brick and mortar (B&M) firms, an examination of the factors that...
Show moreThe rapid growth and integration of the Internet as a communication and commercial medium into our society and economy has changed both in many ways. This dissertation is an exploratory study of factors deemed significant in the context of e-business success or failure. A survey instrument is used in addition to qualitative data was gathered from in-depth interviews. Drawing upon the literature from the area of new business in brick and mortar (B&M) firms, an examination of the factors that lead to the success or failure of new brick and mortar businesses are examined in terms of new e business companies. Also examined in this study are the business strategies that an e-commerce site should be addressing to avoid failure factors and the types of e-business models that have been employed and have proven to be successful or destructive to an e-business. In an attempt to understand the marketing and managerial implications for the success or failure of an e-business, seven factors are included in the study which have been selected from a group of factors found to be significant in several studies on the factors leading to the success or failure of small businesses in the brick and mortar world and factors which may be considered relevant to an e-business. These are; management factors, entrepreneur factors, product/service factors, marketing factors, market factors, financial factors, and Web site design and efficiency factors.
Show less - Date Issued
- 2003
- PURL
- http://purl.flvc.org/fcla/dt/12060
- Subject Headings
- Electronic Commerce, Internet Marketing, Electronic Commerce--Management, Entrepreneurship
- Format
- Document (PDF)
- Title
- Implementation of a fuzzy-logic-based trust model.
- Creator
- Zhao, Yuanhui., Florida Atlantic University, Zhuang, Hanqi, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In the last 10 years, due to the rapid developments in computers and Internet, the Electronic Commerce has advanced significantly. More and more companies have shifted their businesses activities to the Internet. However, the popular use of ecommerce has also raised serious security problems. Therefore developing security schemes has become a key issue both in the academic as well as industrial research. Since the Internet is open to the public, the associated security issue is challenging. A...
Show moreIn the last 10 years, due to the rapid developments in computers and Internet, the Electronic Commerce has advanced significantly. More and more companies have shifted their businesses activities to the Internet. However, the popular use of ecommerce has also raised serious security problems. Therefore developing security schemes has become a key issue both in the academic as well as industrial research. Since the Internet is open to the public, the associated security issue is challenging. A good security strategy should not only protect the vendors' interest, but also enhance the mutual trust between vendors and customers. As a result, the people will feel more confident in conducting e-commerce. This thesis is dedicated to develop a fuzzy-logic based trust model. In general, the ecommerce transactions need costly verification and authentication process. In some cases, it is not cost effective to verify and authenticate each transaction, especially for transactions involving only small amount of money and for customers having an excellent transaction history. In view of this, in this research a model that distinguishes potentially safe transactions from unsafe transactions is developed. Only those potentially unsafe transactions need to be verified and authenticated. The model takes a number of fuzzy variables as inputs. However, this poses problems in constructing the trust table since the number of fuzzy rules will increase exponentially as the number of fuzzy variables increase. To make the problem more trackable, the variables are divided into several groups, two for each table. Each table will produce a decision on trust. The final decision is made based on the "intersection" of all these outputs. Simulation studies have been conducted to validate the effectiveness of the proposed trust model. Therefore simulations, however, need to be tested in a real business environment using real data. Relevant limitations on the proposed model are hence discussed and future research direction is indicated.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/12812
- Subject Headings
- Fuzzy logic, Electronic commerce--Security measures
- Format
- Document (PDF)
- Title
- The impact of electronic commerce (e-commerce) on sales tax revenue.
- Creator
- Pinkowski, Jack., Florida Atlantic University, Farazmand, Ali
- Abstract/Description
-
This study deals with the impact of electronic commerce (e-commerce) on sales tax revenues in Florida. It uses econometric modeling to forecast taxable retail sales and compares two models. Based on the separation of consumer sales (durables and nondurables) from total taxable sales, changes associated with sales suitable for electronic commerce are scrutinized. Results show that only the model that focuses on consumer sales, not the model for total sales, documents a substantial difference...
Show moreThis study deals with the impact of electronic commerce (e-commerce) on sales tax revenues in Florida. It uses econometric modeling to forecast taxable retail sales and compares two models. Based on the separation of consumer sales (durables and nondurables) from total taxable sales, changes associated with sales suitable for electronic commerce are scrutinized. Results show that only the model that focuses on consumer sales, not the model for total sales, documents a substantial difference in forecast reliability. Forecasts for 1995--1999, the period of inception of electronic commerce, are compared to forecasts for 1989--1994. The errors in forecast increased three-fold both in terms of mean percentage error (M.P.E.) and mean absolute percentage error (M.A.P.E.). Forecasts for total taxable consumer sales and total taxable sales for 1995--1999 are based on data from 1964--1994. They are accurate to .2% in terms of M.P.E. during the 31 years before electronic commerce but declined to -13.7% during the e-commerce period. Modifications in the forecast model to include e-commerce variables are set forth. Potential variables for electronic commerce relate to growth in the Internet, high-tech jobs, Internet domain name registrations, college graduates, high-income households, residents 30--49, and metropolitan population. These trends are found to closely correlate with growth in the error of the sales forecast for 1995--1999 based on the earlier model. The impacts of electronic commerce on government revenues include equitable access to the Internet, inter-jurisdictional competition, fiscal disparities, public choice, globalization, proposals for a national sales tax, value added tax (VAT), use taxes, taxability of services, and the moratorium on Internet taxation. Legal issues regarding interstate commerce are included. The implications for government finance are summarized in the conclusions. A new theoretical concept, the "dual dilemma," is proposed. This is the paradox wherein the obligation of providing adequate fiscal resources, which fund programs with an equitable tax burden, is pitted against competing economic concerns. E-commerce challenges both sides. Economic development and tax expenditures policy forgo revenue to promote growth but may threaten fiscal health. The lack of favorable tax treatment may stifle growth and innovation but such policy may result in unfair competition.
Show less - Date Issued
- 2001
- PURL
- http://purl.flvc.org/fcla/dt/12660
- Subject Headings
- Electronic commerce, Use tax, Sales forecasting--Econometric models
- Format
- Document (PDF)
- Title
- Key management in mobile ad hoc networks.
- Creator
- Wu, Bing., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In...
Show moreIn mobile ad hoc networks (MANETs), providing secure communications is a big challenge due to unreliable wireless media, host mobility and lack of infrastructure. Usually, cryptographic techniques are used for secure communications in wired networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node's available resources and the dynamic nature of network topology. We proposed a secure and efficient key management framework (SEKM) for MANETs. SEKM builds a PKI by applying a secret sharing scheme and using an underlying multicast server groups. In SEKM, each server group creates a view of the certificate authority (CA) and provides certificate update service for all nodes, including the servers themselves. Motivated by the distributed key management service, we introduced k-Anycast concept and proposed three k-anycast routing schemes for MANETs. k-anycast is proposed to deliver a packet to any threshold k members of a set of hosts. Our goal is to reduce the routing control messages and network delay to reach any k servers. The first scheme is called controlled flooding. The second scheme, called component-based scheme I, is to form multiple components such that each component has at least k members. The third scheme, called component-based scheme II, in which the membership a component maintains is relaxed to be less than k. Collaborative and group-oriented applications in MANETs is an active research area. Group key management is a central building block in securing group communications in MANETs. However, group key management for large and dynamic groups in MANETs is a difficult problem. We propose a simple and efficient group key management scheme that we named SEGK for MANETs, which is based on n-party Diffie-Hellman (DH). The basic idea of our scheme is that a physical multicast tree is formed in MANETs for efficiency. To achieve fault tolerance, double multicast trees are constructed and maintained. A group coordinator computes and distributes intermediate keying materials to all members through multicast tree links. All group members take turns acting as group coordinator and distributing the workload of group rekeying during any change of group membership. Every group member computes the group key in a distributed manner.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12234
- Subject Headings
- Electronic commerce--Technological innovations, Mobile commerce--Technological innovations, Wireless communication systems--Management, Mobile communication systems--Management
- Format
- Document (PDF)
- Title
- The impact of IT security psychological climate on salient user beliefs toward IT security: an empirical study.
- Creator
- Warner, Janis A., College of Business, Information Technology and Operations Management
- Abstract/Description
-
There is a growing need to better understand what influences user behavior for developing comprehensive IT security systems. This study integrates two prominent bodies of research, the theory of planned behavior used to frame the factors influencing user behavior and individual level climate perceptions used to frame organizational environment influences, to develop a multidimensional IT security user behavior model. The model is then used as the basis for a survey based research to...
Show moreThere is a growing need to better understand what influences user behavior for developing comprehensive IT security systems. This study integrates two prominent bodies of research, the theory of planned behavior used to frame the factors influencing user behavior and individual level climate perceptions used to frame organizational environment influences, to develop a multidimensional IT security user behavior model. The model is then used as the basis for a survey based research to empirically test the hypotheses whether the perceived IT security climate of an organization significantly influences the users beliefs regarding the use of IT security. The intent of the study is to extend the theory of planned behavior and IT security literature by investigating salient IT security beliefs and environmental influences on those beliefs. First, anti-spyware was identified as an appropriate target IT security artifact, and then incorporated into a multi-phased research approach. Second, a semi-structured interview process was used to elicit salient beliefs regarding use of the IT security artifact. Third, IT security psychological climate was conceptualized based on the extant literature on organizational climate, safety climate and IT security in order to examine the organizational environment influences on these beliefs. Finally, a survey was used to collect data to validate the constructs and test the hypothesized relationships., The study found that there was a significant positive relationship between IT security psychological climate and 1) the belief that anti-spyware will protect organizational interests such as privacy and data, 2) the belief that anti-spyware will prevent disruptions to work, 3) the belief that the approval of anti-spyware use by the technical support group is important, 4) the belief that monetary resources are needed to enable the use of anti-spyware, and 5) the belief that time is a facilitating condition for the use of anti-spyware. A discussion of the findings and their implications for theory and practice is provided.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/186772
- Subject Headings
- Security (Psychology), Electronic commerce, Security measures, Web sites, Design, Consumer behavior, Mathematical models, Organizational effectiveness
- Format
- Document (PDF)
- Title
- Web log analysis: Experimental studies.
- Creator
- Yang, Zhijian., Florida Atlantic University, Zhong, Shi, Pandya, Abhijit S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With rapid growth of the World Wide Web, web performance becomes increasingly important for modern businesses, especially for e-commerce. As we all know, web server logs contain potentially useful empirical data to improve web server performance. In this thesis, we discuss some topics related to the analysis of a website's server logs for enhancing server performance, which will benefit some applications in business. Markov chain models are used and allow us to dynamically model page...
Show moreWith rapid growth of the World Wide Web, web performance becomes increasingly important for modern businesses, especially for e-commerce. As we all know, web server logs contain potentially useful empirical data to improve web server performance. In this thesis, we discuss some topics related to the analysis of a website's server logs for enhancing server performance, which will benefit some applications in business. Markov chain models are used and allow us to dynamically model page sequences extracted from server logs. My experimental studies contain three major parts. First, I present a workload characterization study of the website used for my research. Second, Markov chain models are constructed for both page request and page-visiting sequence prediction. Finally, I carefully evaluate the constructed models using an independent test data set, which is from server logs on a different day. The research results demonstrate the effectiveness of Markov chain models for characterizing page-visiting sequences.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13202
- Subject Headings
- Markov processes, Operations research, Business enterprises--Computer networks, Electronic commerce--Data processing
- Format
- Document (PDF)
- Title
- Validating the search, experience, and credence product classification framework in a model of patronage intentions.
- Creator
- Girard, Tulay., Florida Atlantic University, Korgaonkar, Pradeep
- Abstract/Description
-
Although the Internet as a shopping medium provides convenience to easily access products, the U.S. e-commerce retail sales still make up a very small percentage of the U.S. total retail sales. To better understand what influences consumers' choices to shop for products or services on the Internet versus local retail stores, this study tests the influence of antecedent factors of consumer patronage intentions for Internet and local retail stores. The study draws the antecedent factors from...
Show moreAlthough the Internet as a shopping medium provides convenience to easily access products, the U.S. e-commerce retail sales still make up a very small percentage of the U.S. total retail sales. To better understand what influences consumers' choices to shop for products or services on the Internet versus local retail stores, this study tests the influence of antecedent factors of consumer patronage intentions for Internet and local retail stores. The study draws the antecedent factors from the extant literature, which include product classes, the importance consumers place on retailer attributes, and consumer perceived risk in product classes. Because the Internet instituted a convenient shopping medium with information distribution and search capabilities, nomological validity of the search, experience, and credence (SEC) product classification framework is tested in the online shopping context. This study tests the validity of the SEC product classification framework by examining whether significant differences exist in (1) the level of importance that consumers place on retailer attributes, (2) the amount and type of risks that online shoppers perceive in product classes (search, experience, and credence), and (3) their patronage intentions for two retailer types---Internet and local retail stores---based on product classes. In the same model, the study also tests the mediating effects of perceived risk in product classes in the relationship between the importance of retailer attributes and patronage intentions for retailer types. Although the relationships between some of the antecedent factors of patronage intentions have been tested in previous studies, they have never been tested jointly in the context of Internet shopping. Data were collected in three stages. The first two stages were the pretest studies that were conducted to select products as examples to represent each product category. The hypotheses were tested using data collected from a nationwide survey of those who previously purchased products or services on the Internet. The results of the analyses support the hypotheses.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/12142
- Subject Headings
- Marketing--Planning, Consumer behavior, Retail trade--Management, Consumers' preferences--Longitudinal studies, Electronic commerce
- Format
- Document (PDF)
- Title
- The Influence of Consumers' Perspectives of Transaction Costs in Business-to-Consumer Markets, their Risk-bearing Propensity, and the Categories of Goods purchased on Consumers' Preference of Shopping Medium.
- Creator
- Byramjee, Framarz, Korgaonkar, Pradeep, Florida Atlantic University
- Abstract/Description
-
Despite increased internet usage, transactions conducted by consumers via ecommerce still constitute a very small percentage of total U.S. retail sales. To better understand what influences consumers' choices to shop for products or services on the internet versus local retail stores, this study tests the influence of consumers' transaction costs, coupled with the risk-bearing propensity of individuals (risk-taking or risk-averse attitude) in a shopping context, and the category of goods...
Show moreDespite increased internet usage, transactions conducted by consumers via ecommerce still constitute a very small percentage of total U.S. retail sales. To better understand what influences consumers' choices to shop for products or services on the internet versus local retail stores, this study tests the influence of consumers' transaction costs, coupled with the risk-bearing propensity of individuals (risk-taking or risk-averse attitude) in a shopping context, and the category of goods involved in the purchase process (such as search or experience goods), which will ultimately influence consumers' preference of shopping medium (such as online or traditional). This research study introduces the construct of consumers' transaction costs as an important predictor of consumers' preference of shopping medium, develops two segregated categories of consumers' transaction costs, namely the individual costs and the social costs, and implements a system of measurement of these costs with regard to how much they matter to individual consumers with regard to their preference of shopping medium. Several pretests were initially conducted to operationalize the variables and their measurement scales, and to validate the manipulation checks employed for the study. The data for the main study was then collected via four versions of the designed and pre-tested survey instrument, employing a between-subjects design, and subject to the appropriate statistical analyses. The results convey that individuals with higher risk-bearing propensity would prefer the online shopping medium, while individuals with lower risk-bearing propensity would prefer the traditional shopping medium. Further, search goods would have a greater tendency to be bought online, while experience goods would have a greater tendency to be bought in-store. These findings bear support to past literature wherein similar results have been found, and serve to strengthen these conjectures. With regard to the effects of consumers' transaction costs, the individual costs and the social costs tend to only influence consumers' reference of shopping medium without providing a sense of the actual choice of medium. Further, the nonsignificant interaction effects of individuals' risk-bearing propensity and goods' categories with consumers' transaction costs imply that these variables do not moderate the impact of transaction costs on consumers' preference of shopping medium. The study then discusses the analytical and theoretical reasoning pertaining to these results, along with the managerial implications which this research bears, and the limitations of this study which could warrant potential future research.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00000301
- Subject Headings
- Consumer behavior--Research, Electronic commerce, Internet marketing, Marketing--Psychological aspects, Motivation research (Marketing)
- Format
- Document (PDF)
- Title
- Progress towards push button verification for business process execution language artifacts.
- Creator
- Vargas, Augusto., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic...
Show moreWeb Service Business Process Execution Language (BPEL) has become a standard language in the world of Service Oriented Architecture (SOA) for specifying interactions between internet services. This standard frees developers from low-level concerns involving platform, implementation, and versioning. These freedoms risk development of less robust artifacts that may even become part of a mission-critical system. Model checking a BPEL artifact for correctness with respect to temporal logic properties is computationally complex, since it requires enumerating all communication and synchronization amongst various services with itself. This entails modeling BPEL features such as concurrency, hierarchy, interleaving, and non-deterministic choice. The thesis will provide rules and procedures for translating these features to a veriable model written in Promela. We will use these rules to build a program which automates the translation process, bringing us one step closer to push button verification. Finally, two BPEL artifacts will be translated, manually edited, verified, and analyzed.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/369386
- Subject Headings
- Electronic commerce, Computer programs, Computer network architectures, Expert systems (Computer science), Web servers, Management, Computer systems, Verification
- Format
- Document (PDF)
- Title
- Evolving Legacy Software Systems with a Resource and Performance-Sensitive Autonomic Interaction Manager.
- Creator
- Mulcahy, James J., Huang, Shihong, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Retaining business value in a legacy commercial enterprise resource planning system today often entails more than just maintaining the software to preserve existing functionality. This type of system tends to represent a significant capital investment that may not be easily scrapped, replaced, or re-engineered without considerable expense. A legacy system may need to be frequently extended to impart new behavior as stakeholder business goals and technical requirements evolve. Legacy ERP...
Show moreRetaining business value in a legacy commercial enterprise resource planning system today often entails more than just maintaining the software to preserve existing functionality. This type of system tends to represent a significant capital investment that may not be easily scrapped, replaced, or re-engineered without considerable expense. A legacy system may need to be frequently extended to impart new behavior as stakeholder business goals and technical requirements evolve. Legacy ERP systems are growing in prevalence and are both expensive to maintain and risky to evolve. Humans are the driving factor behind the expense, from the engineering costs associated with evolving these types of systems to the labor costs required to operate the result. Autonomic computing is one approach that addresses these challenges by imparting self-adaptive behavior into the evolved system. The contribution of this dissertation aims to add to the body of knowledge in software engineering some insight and best practices for development approaches that are normally hidden from academia by the competitive nature of the retail industry. We present a formal architectural pattern that describes an asynchronous, low-complexity, and autonomic approach. We validate the pattern with two real-world commercial case studies and a reengineering simulation to demonstrate that the pattern is repeatable and agnostic with respect to the operating system, programming language, and communication protocols.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004527, http://purl.flvc.org/fau/fd/FA00004527
- Subject Headings
- Business logistics -- Automation, Electronic commerce -- Management, Enterprise application integration (Computer systems), Information resources management, Management information systems, Software reengineering
- Format
- Document (PDF)
- Title
- Patterns for web services standards.
- Creator
- Ajaj, Ola, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Web services intend to provide an application integration technology that can be successfully used over the Internet in a secure, interoperable and trusted manner. Policies are high-level guidelines defining the way an institution conducts its activities. The WS-Policy standard describes how to apply policies of security definition, enforcement of access control, authentication and logging. WS-Trust defines a security token service and a trust engine which are used by web services to...
Show moreWeb services intend to provide an application integration technology that can be successfully used over the Internet in a secure, interoperable and trusted manner. Policies are high-level guidelines defining the way an institution conducts its activities. The WS-Policy standard describes how to apply policies of security definition, enforcement of access control, authentication and logging. WS-Trust defines a security token service and a trust engine which are used by web services to authenticate other web services. Using the functions defined in WS-Trust, applications can engage in secure communication after establishing trust. BPEL is a language for web service composition that intends to provide convenient and effective means for application integration over the Internet. We address security considerations in BPEL and how to enforce them, as well as its interactions with other web services standards such as WS-Security and WS-Policy.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927300
- Subject Headings
- Computational grids (Computer systems), Computer systems, Verification, Expert systems (Computer science), Computer network architectures, Web servers, Management, Electronic commerce, Computer programs
- Format
- Document (PDF)
- Title
- Influence of consumers' trust beliefs on intentions to transact in the online environment: An e-tail study.
- Creator
- Becerra, Enrique P., Florida Atlantic University, Korgaonkar, Pradeep
- Abstract/Description
-
With the increased importance of retailing through the Internet, or e-tailing, researchers and practitioners alike have been interested in the role that trust can play in intentions to transact online. However, influences of trust on intentions to provide personal information to complete the transaction, and influences of trust in the product category, and/or in the brand, on intentions to transact, have received little attention. This research fills the gap in the exiting literature by...
Show moreWith the increased importance of retailing through the Internet, or e-tailing, researchers and practitioners alike have been interested in the role that trust can play in intentions to transact online. However, influences of trust on intentions to provide personal information to complete the transaction, and influences of trust in the product category, and/or in the brand, on intentions to transact, have received little attention. This research fills the gap in the exiting literature by understanding the influence of product category trust, brand trust and vendor trust on intentions to transact online, a combination of intentions to purchase and intentions to provide personal information to complete the transaction. Hypotheses of the influence of the trust variables on intentions to transact were tested using a computer simulated Internet web-site and two products in a 2 (product trust) x 2 (brand trust) x 2 (vendor trust) between-subject factorial design with replication, and a sample of 422 subjects. Findings suggest that channel trust still influences online intentions to transact and that product category trust, particularly for product categories with low past experience, also influences online intentions to transact. Additionally, findings also suggest that brand trust may be as important as vendor trust in influencing online intentions to transact. Findings suggest that Internet vendors will benefit from carrying trusted brands and from increasing consumer trust towards the Internet as a shopping channel.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12204
- Subject Headings
- Electronic commerce, Retail trade--Automation, Internet marketing, Retail trade--Computer network resources, Consumer behavior, Business enterprises--Computer network resources
- Format
- Document (PDF)