International Journal of Electronic Business (14 papers in press)
Gotta buy em all? Online shopping cart abandonment among new and existing customers
by Theresa Maria Rausch, Benedikt Martin Brand
Abstract: For online retailers, sales conversions and shopping cart abandonment rates are essential measures of their success and determine their long-term performance as well as survival within the e-market. Thus, extant behavioral literature determined factors triggering online shopping cart abandonment, whereas another stream of literature explored customers online purchase behavior with real-world clickstream data. Thereby, existing research drew on different customer segmentations such as mobile versus desktop shoppers or ordinary users versus community members to identify needs of heterogeneous customer subgroups. Nevertheless, prior research still lacks a holistic understanding of online shopping cart abandonment with unbiased user generated behavior apart from prior behavioral investigations. This study hence fills a research gap by determining factors resulting in online shopping cart abandonment based on clickstream data (11,586 observations) from a leading German online retailer. Since particularly new and existing customers need to be addressed differently to be attracted, the study identifies drivers of cart abandonment separately for both segments. Like preceding research, the study uses a logit model to identify these drivers and thus, considers online shopping cart abandonment as a binary classification problem. The findings indicate that mobile shoppers exhibit a higher likelihood of abandoning their shopping cart. This relation even intensifies for new customers. For existing customers, the odds of completing the purchase decreases with every additional item in the customers shopping cart and in contrast, new customers are rather likely to abandon the shopping cart with an increasing number of shopping cart page impressions.
Keywords: online shopping cart abandonment; purchase behavior; clickstream data; customer segmentation; e-commerce; user generated behavior.
Determining the factors affecting the acceptance of social commerce in service-oriented businesses using the fuzzy Delphi method
by Nasibeh Pouti, Mohammad Taghi Taghavifard, Mohammad Reza Taghva, Mohammad Fathian
Abstract: Social commerce has emerged as a new paradigm in business and commerce for nearly a decade. The first attempt to apply this paradigm is to identify the factors affecting its acceptance studied in several research works. To achieve the purpose of the study, we conducted a systematic review of research related to the adoption and use of social media in business in the period 2010 to 2019. Based on the three stages of searching, screening and retrieving, and completing the databases, we identified 224 related studies. The confirmed factor relations in the studies were identified. By integrating synonymous factors, 228 factors were identified as influencing factors on social commerce acceptance from the users' point of view. Then, we attempted to identify the most important influential factors based on three screening stages. Finally, the experts examined the remaining factors using the fuzzy Delphi method.
Keywords: Social Commerce; Service-Based Businesses; Intention to Accept; Fuzzy Delphi.
A bibliometric review of online impulse buying behaviour
by Abu Bashar, Shalini Singh, Vivek Kumar Pathak
Abstract: Online impulse buying behaviour is one of the most rapidly growing areas of research in online consumer behaviour study. Since last two decades, it has achieved significant academic attention and developed publication opportunities. This paper presents bibliometric review of scientific literature in the field of online impulse buying behaviour. For this, 482 articles from Scopus database during 2000-2020 are considered. Three major research streams found and reviewed i.e.: a) online store characteristics; b) modelling of online impulse buying behaviour; c) factors influencing impulsive buying in online setup. Most relevant and influential authors, countries, affiliations, most cited documents, and most used keywords identified. The paper suggests certain future research agenda in online impulse buying behaviour that have been determined from bibliometric analysis. This study offers practical implications for both academicians and practioners.
Keywords: online impulse buying; bibliometric analysis; literature; biblioshiny; VOSviewer.
Impact of perceived website cues on purchase experience and e-purchase intention of online apparel buyers
by Pallavi Dua, S.M. Fatah Uddin
Abstract: The purpose of this research is to evaluate the impact of perceived website cues of apparel retailers websites on customers' purchase experience and online buying intention of apparel consumers. For this, survey data was collected with the help of a structured questionnaire using five point Likert scale from 160 working professionals within the age group of 25-60 years from Delhi/NCR region employing purposive and quota sampling. Exploratory factor analysis revealed existence of four apparel website attributes namely product information, privacy and security, customer service and navigation. Regression analysis results showed that there is a significant influence of privacy and security, customer service and navigation attributes of apparel websites on buyers purchase experience and e-purchase intention. The paper attempts to fill the void in the literature by shedding light on the influence of apparel website cues on purchase experience and e-purchase intention of Generation X and Generation Y apparel buyers.
Keywords: apparel websites; e-purchase intention; purchase experience; Generation X; Generation Y.
Consumer motives toward cross-border e-commerce: means-end chain analysis
by Md. Rakibul Hoque, Jian Mou, Ying Zhang
Abstract: Cross-border e-commerce transactions have been increasing significantly in the developing world. The benefits of entering into cross-border e-commerce are observed for various sizes of enterprises, from small and medium-sized enterprises (SMEs) to large enterprises. This study has undertaken a qualitative exploratory research method because very little is known about consumers motives in a cross-border e-commerce context. The study follows a popular means-end chain (MEC) analysis methodology, which is widely used in the marketing sector. The result shows that six core values influence consumers motives in using cross-border e-commerce platforms. These are: 1) thriftiness; 2) self-fulfilment; 3) satisfaction; 4) happiness; 5) comfort; 6) security. Furthermore, these values, along with other identified elements, are classified into three motivational patterns which are: 1) value-seeking; 2) pleasure; 3) security. Among the three motivational patterns, value-seeking and security are two utilitarian motivational patterns and pleasure is a hedonic motivational pattern.
Keywords: consumer motives; cross-border; e-commerce; means-end chain; MEC.
Examining the continuous usage intention and behaviours of music streaming subscribers
by Shih Yee Yeoh, Xavier J. P. Yuntavid, Phaik Nie Chin
Abstract: Live music streaming trends will go to the next level with an enhanced 5G technology and networks. In this study, we examined determinants on consumers continuous usage intention and their actual usage behaviours towards music streaming services using the C-TAM-TPB. Price value and legal concern were added as an extended TPB as well as moderating effect of age. A total of 235 usable data was collected through an online self-administered questionnaire across the country. We used the partial least squares structural equation modelling (PLS-SEM) for analysis of the measurement model and the structural model. The findings reveal that perceived usefulness and perceived ease of use positively affect consumers attitude towards music streaming. Attitude towards music streaming, subjective norms and price value are key determinants of consumers continuous usage intention. Consumers continuous usage intention affects their behaviours towards music streaming services.
Keywords: music streaming services; continuous usage intention; theory of planned behaviour; TPB; theory of acceptance model; actual usage behaviour.
Capturing the role of backers' psychological ownership for value-adding behaviours in reward-based crowdfunding
by Carina Hoffmann, Peter Kenning
Abstract: Backers' value-adding behaviours in crowdfunding are of great value for start-ups and significantly affect start-up success. However, despite this substantial impact, little is known about when and why backers engage in value-adding behaviours. Referring to the theory of psychological ownership, we investigate the role of backers' feelings of psychological ownership over the funded venture for their intentions to behave in an advantageous manner for that in the context of reward-based crowdfunding. Our results highlight that backers' psychological ownership has a significant and positive impact on backers' intention to engage in positive word-of-mouth and constructive feedback behaviour. According to our results, this relationship is fully mediated by backers affective commitment.
Keywords: psychological ownership; reward-based crowdfunding; post-funding behaviour; commitment research; structural equation modelling; word-of-mouth; WOM; constructive feedback.
Gaining competitive advantage through artificial intelligence adoption
by Álvaro Rosa, Teresa Bento, Leandro Pereira, Renato Lopes Da Costa, Álvaro Dias, Rui Gonçalves
Abstract: Companies are adopting artificial intelligence (AI) to be innovative, improve their strategies and differentiate themselves from competitors. This research's objective is to examine the extent of the introduction of artificial intelligence in companies located in Portugal, with focus on marketing activities. It explores the reasons and challenges companies face to introduce it, their perception of AI and whether they feel pressure to adopt this technology. This research uses a qualitative approach, the content analysis of 21 interviews with professionals familiar with the theme. This study concludes that the main challenges faced are the cost of the investment and the loss of 'the human' connection with the customer. In contrast, the principal benefit is the degree of personalisation artificial intelligence can achieve due to its ability to provide strategic information. Concerning the interviewees' perception of this technology, 95% considers it as a competitive advantage.
Keywords: artificial intelligence; AI; adoption; strategic information; customer relationship; marketing; strategic management; Portugal.
Special Issue on: Intelligent Security using Blockchain for Internet of Things
Security Framework for IoT and Deep Belief Network based Healthcare System using Blockchain Technology
by Senthil Murugan Nagarajan, Prathik Anandhan, Muthukumaran V, Uma K, Kumaran U
Abstract: Nowadays, the computerization and information systems need a very fast, easier and secure data analysis models. So, Blockchain technology and Deep learning concepts plays an important role for data security and analysis in field of healthcare applications. Blockchain technology has optimal reliability in various sectors like healthcare, security, information management, smart home etc. In this paper, Blockchain technology is used for healthcare system to provide a secure and reliability of data transmission. Furthermore, IoT based wearable devices are used to collect the data from the patients. Moreover, Deep Belief Network (DBN) is proposed to classify the obtained data in order to predict the type of disease or problems for patients. The experimental results shows that the proposed framework and classification model abruptly outperforms when compared with other existing techniques. The efficiency of the proposed framework is analysed based on the performance metrics like throughput and latency. The loss ratio for the proposed model seems obtain very less of 0.0126 when compared with other existing techniques like MLP, SVM, ANN, and CNN. The accuracy obtained for the proposed DBN classifier is above 95% for the increase in the number of patients.
Keywords: Blockchain Technology; Healthcare System; Internet of Things (IoT); Deep Belief Network (DBN); Security.
RPL enhancement with mobility aware two stage objective function for improving network lifetime in IoT
by Robin Cyriac, Saleem Durai MA
Abstract: The routing protocol for low power and lossy network (RPL) has tremendous scope in IoT, due to the fact that it can be customized as per networks domain requirement by altering Objective Function (OF). Many studies have proven that the careful crafting of OF with different metrics improve the quality of route identified by RPL. As the complexity of OF increases due to different metric combinations, the performance of RPL will start to deteriorate. We divide OF into a two stage process to solve this problem. In the first stage we keep a simple OF that considers ETX and path delay and rank parents as per RPL specification. A fixed number of best ranked parents from the first stage OF are considered for further processing in the second stage OF. Fuzzy based second stage OF considers mobility history, queue availability and remaining energy of the parents to select the preferred route. Second stage OF is run only on limited number of parents which improves performance of RPL. Performance evaluation shows that our Two Stage Objective Function (TS-OF) reduces packet loss by 28% and energy consumption by 34% compared to the state of the art RPL objective function. \r\n
Keywords: IObjective Function; RSSI; Energy consumption; Parent selection mechanism; RPL; IoT
A Markov Decision Process based Secure Consensus Framework for Leveraging Blockchain Technology in IoT Applications
by Nonita Sharma, Monika Mangla, Sachi Nandan Mohanty
Abstract: In this manuscript, we propose a secure consensus framework that implements Markov Decision Process (MDP) for blockchain technology in IoT applications. The proposed framework presents projection for the sojourn time and stationary efficiency measures for any transaction or block. Implementing MDPs provides a group of states and a collection of actions to choose from. MDP also offers instantaneous reward purpose and a probabilistic transition matrix. The proposed framework that suggest implementation of MDP in blockchain technology further escalates the security of the network. The paper demonstrates the architecture of the proposed framework.
Keywords: blockchain; bitcoin; byzantine faults; consensus; distributed ledger; smart contract; markov decision process.
Blockchain-based consensus algorithm for solving security issues in distributed internet of things
by Bhabendu Kumar Mohanta, Kalpana Samal, Debashish Jena, Somula Ramasubbareddy, Marimuthu Karuppiah
Abstract: In the last decade internet of things (IoT) emerged as one of the most promising fields of research. The services provided by the IoT have come as a big relief to human life due to the smartness and real-time monitoring without human intervention. IoT applications are widely used as it provides a high level of comfort, automation of the system, and efficiency. To make successful use of ever-growing IoT applications requires addressing the security, privacy, and trust to protect IoT devices and user privacy from attackers. In this paper, initially different security and privacy challenges are identified in an IoT application. Secondly, analysis regarding blockchain technology is done which gives the idea to solve some of the IoT security challenges. Blockchain-based consensus algorithm PBFT is used to perform secure computation in a smart transportation system. Security analysis shows
that the proposed protocol worked correctly in presence of malicious or faulty nodes.
Keywords: internet of things; IoT; security; privacy; blockchain; consensus algorithms; distributed system; trust management.
Modified handshake protocol-based secure authentication using blockchain technology in WLAN
by Manoj Diwakar, Prabhishek Singh, Achyut Shankar
Abstract: Recent years, the development of the wireless local area network (WLAN) seems to have interesting facts about the security as this technology holds high speed, wide coverage, and high capacity. Several applications are using blockchain technology as a key framework to enhance the security features for the improvement of preventing various attacks when integrating with existing authentication protocols. This paper presents a brief description of the wireless networks, their advantages over wired networks and security issues requiring immediate attention. It is then followed with blockchain feature integrated with 802.11 architecture and various services offered by it and then than the motivation for conducting the research. Thereafter, a problem statement outlining the inherent flaws in the present IEEE 802.11i standard is presented. Hence a method is proposed to overcome the denial of service using modified three way handshaking approach. Finally results are discussed and concluded.
Keywords: handshake protocol; network security; denial of service.
Special Issue on: Intelligent Virtual Networks and Applications
Smart resource scheduling by correlating discriminative quality factors to optimise resource utilisation in IAAS of cloud networks
by Bellam Ravindra Babu, Aliseri Govardhan
Abstract: The significant requirement in cloud computing is detecting the deterministic model for performing resource scheduling. Resource scheduling is crucial because of several anomalies presence and high dimensionality values shown during resource scheduling. The number of tasks envisioned in contention at resource broker of IAAS and higher dimensionality of proposed anomalies values for quality resource aspects was out of scope concerning the existing resource scheduling techniques. Therefore, the contemporary resource scheduling techniques were not prominent for optimal resource scheduling. For optimising resource scheduling in terms of earlier mentioned properties like the maximum amount of tasks and maximum dimensionality anomalies projection, an ensemble resource scheduling technique has been derived in this article under batch scheduling classification. Further, the simulation study envisioned that the projected model of this contribution is more significant and robust for delivering optimum resource scheduling when compared to other contemporary models in terms of dimensionality and volume of anomalies.
Keywords: resource scheduling; VM migration; virtual machines; VMs; QoS; cloud computing; resource management.