Forthcoming articles


International Journal of Electronic Business


These articles have been peer-reviewed and accepted for publication in IJEB, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJEB are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Electronic Business (8 papers in press)


Regular Issues


  • Bring Your Own Device (BYOD): a Survey of Threats and Security Management Models.   Order a copy of this article
    by Fabricio R. Rivadeneira Zambrano, Glen D. Rodriguez Rafael 
    Abstract: Bring Your Own Device (BYOD) is used by many organizations for the benefits offered by allowing the use of mobile devices to perform business tasks, but the following questions should be analyzed if any organization want to adopt a BYOD environment: What threats do currently face mobile devices that are being used in BYOD environments? What are the characteristics of the security models proposed until now in order to manage BYOD? Are there integral security models with the minimum requirements in order to take full advantage of BYOD? What are the basic controls that should be taken into account for designing security policies in a business with a BYOD environment? What are the main differences between security on BYOD environments vs. security on corporate owned mobile device environments, regarding how easy is to meet security needs? By giving answers to these questions, we will be able to have a clear vision of what it takes to adopt BYOD in an organization, its advantages, disadvantages and the changes that the organization needs to make in order to eliminate security problems that come along with BYOD. The employees have absolute control of the use and installation/uninstallation of applications on the mobile device; in security matters the human factor is still the weakest link, and in the majority of the companies it is barely given attention; but in BYOD environments the employees must be the main firewall in order to avoid security problems.
    Keywords: BYOD; Security Risk; Security Policies; Security Management Models; Social Engineering; Mobile Security.

  • Scale-Based Secured Sensitive Data Storage for Banking Services in Cloud   Order a copy of this article
    by Sumathi .M, Sangeetha S 
    Abstract: The proposed Scale-based Secure Sensitive Data (SSSD) storage technique provides a personalized level of security to user data through privacy score. SSSD overcomes the classification issues in traditional methods like K-Nearest Neighbor (K-NN) based classification models. The employment of the Likert Scale-based (LS) assignment and Dichotomous Response Matrix (DRM) generation reduces the sensitive and non-sensitive data classification complexity. Computation of privacy score through matrix coefficients satisfy individual and class level needs of data to store them in the cloud. The sensitivity differs from user to user; privacy score identifies the common sensitive attributes for an entire user and association rule mining is used to find the related sensitive attributes for individual users. Simultaneous prediction and encryption of sensitive attributes through the SSSD minimizes the space occupation and encryption time consumption effectively. The comparison between the proposed SSSD with the existing KNN model regarding occupational size and encryption time of sensitive and non-sensitive data assures the effectiveness of SSSD. Besides, this paper investigates the amount of transaction restored with an increase of rule size to extend the applicability of the proposed system in cloud storage applications.
    Keywords: Sensitivity; Visibility; Privacy Score; Association Rule Mining; Confidence; Sensitive Attributes.

  • Sentiment analysis of social commerce: A harbinger of online reputation management   Order a copy of this article
    by Sunday Adewale Olaleye, Ismaila Temitayo Sanusi, Jari Salo 
    Abstract: Social media, a combination of socialization and media is diffusing and impacting different business sectors, and non-governmental organization globally. Social media coalesce traditional print and electronic media, and it is advancing the marketing mix most especially the communication marketing mix. Online reputation management is an extension of public relations, a long-time practice of organization image laundering through print and online media. This study argues that sentiment analysis of product or service evaluation is an antecedent of online reputation management. This study applies the hybrid technique to sort out social commerce customers reviews, appraise the quality of the extracted data and identify the opinion that transpired between online retailing merchants and online customers. The framework proposed in this study will serve as a foundation and precedent for an effective online reputation management and stands to improve customer service. This study offers some managerial implications and indicates future research.
    Keywords: Facebook; Social Media; Sentiment; Mobile Commerce; Review; Appraisal; Online Reputation Management.

  • Website Quality and Evaluation: A Perspective of Iranian Airline Industry   Order a copy of this article
    by Reza Abbasi, Nafiseh Rezaei, Saeideh Esmaili, Zahra Abbasi 
    Abstract: Due to the blooming of internet and the use of online booking systems around the world, most airlines try to change the taste of costumers to shift from traditional distribution channels to the online ones, although not all of them are successful. Therefore, website quality is now considered as an inseparable component in attracting customers' attention. The current research aimed at evaluating the function of five top Iranian airlines website, according to an airline website evaluating model of fuzzy TOPSIS. The study also provided some suggestions in order to enhance the quality of the website.
    Keywords: Airline Industry; Website Quality; Website Design; Website Evaluation; Analytic Hierarchy Process; Fuzzy TOPSIS; Multiple Criteria Decision Making; Iran.

  • Converting Music Streaming Free Users to Paid Subscribers: Social Influence or Hedonic Performance   Order a copy of this article
    by Charlie Chen, Steven Leon, Makoto Nakayama 
    Abstract: In order to increase revenues and sustain business, the music industry is directing efforts into increasing paid subscription by converting free listeners into paid subscribers. This study compares and contrasts the two different purchase motivations of consumers: social influence and hedonic performance expectancy. A survey was conducted with 243 users of on-demand music streaming services. Our data analysis shows that social influence impacts consumer attitudes towards music streaming, which in turn drives purchase intention. On the other hand, continuance intention of paid music streaming is driven by hedonic performance expectancy of consumers, not consumer attitude. These results imply that the music industry needs to differentiate its approach to prospective and current customers of music streaming services.
    Keywords: Music streaming service; critical mass; social influence; hedonic expectation; purchase intention; continuance intention.

  • An Empirical Investigation of Factors that Influence Commitment and Active Participation in In-House Affiliate Marketing Network   Order a copy of this article
    by Ladislav Beranek 
    Abstract: At present, affiliate marketing has become a standard tool for organizations and companies that have business activities on the Internet. It can take the form of a third-party service or can be directly managed by a merchant (in-house). In this study, we deal with in-house affiliate marketing. It is taken as a fact that affiliates are driven by economic bonuses. Our study confirms that a long-term relationship with affiliates is advantageous for the merchant, especially with those affiliates who are active and lead more customers to the merchant. In these relationships, economic bonuses are the primary motivation, but as our study shows, there are other factors that affect affiliates' commitment and their active participation within affiliate marketing. We explain how economic benefits, communication and its quality, merchant's brands and reputation, interdependence and quality of services impact affiliates' commitment and active participation. Results of this study support hypotheses that economic benefits and communication (including its quality) critically impact affiliate marketing performance. The interpretations and implications of the findings as well as future research directions are discussed.
    Keywords: Affiliate marketing; Commitment; Active participation; E -commerce; Relationship management.

    by Urvashi Tandon, Ravi Kiran 
    Abstract: The purpose of this paper is to examine different drivers of online shopping and their impact on behavioral intention. The study also examines how cash-on-delivery mode of payment acts as mediator to improve online shopping intention. Based on UTAUT2 (Venkatesh et al., 2012), the drivers of online shopping were identified. Security and privacy and ease of ordering were also added to develop the construct of online shopping drivers. The mediating effect of cash-on-delivery mode of payment on behavioral intention has been empirically validated by structural equation modelling using a sample of 500 online shoppers. Results reveal that performance expectancy, effort expectancy, social influence, hedonic motivation, price value, security and privacy and ease of ordering are the drivers of online shopping but price value and facilitating conditions dont have significant impact on behavioral intention. Further, cash-on-delivery mode of payment emerged as a key construct to improve online shopping intention.
    Keywords: Online shopping; UTAUT2; Behavioral intention; Security and privacy; Cash-on-delivery mode of payment; India.

  • The impact of viral marketing on successful development of new financial services in life insurance   Order a copy of this article
    by Mehran Rezvani, Marziyeh Rezamand Parsaei, Zeinab Fathollahzadeh 
    Abstract: This study, for the first time, attempts to measure the impact of viral marketing on the success of developing new financial service. Based on the past studies, a model has been developed to measure the impact of viral marketing indicators, including the number and valence of online comments, specialty of responder and visual features, on the success of the new financial service. To do this, a standard questionnaire was designed based on the Likert scale and tested by 224 employees of insurance companies providing life insurance in Tehran. The data were analyzed through structural equation modeling (SEM) and using SPSS and SmartPLS software. According to the results, viral marketing indicators, including the number and valence of online comments, as well as visual features and the specialty of the responders, have a positive and significant impact on the success of the new financial service.
    Keywords: Viral Marketing; New Financial Service Success; New Service Development; Insurance Industry.