簡易檢索 / 詳目顯示

研究生: Ivan Leonard Setiawan
Ivan - Leonard Setiawan
論文名稱: Developing an Effective Electronic Commerce System for Higher Education: A Case Study of MiTT
Developing an Effective Electronic Commerce System for Higher Education: A Case Study of MiTT
指導教授: 周子銓
Tzu-Chuan Chou
口試委員: 李國光
Guo-Guang Lee
陳昭蓉
Jau-Rong Chen
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2015
畢業學年度: 103
語文別: 英文
論文頁數: 71
外文關鍵詞: Electronic commerce system, Strategic information system alignment, Design science research methodology
相關次數: 點閱:272下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報


The evolution of internet technology has provided a new initiative in electronic commerce or known as e-commerce. Electronic commerce is the one application that used the combination of internet and information system or information technology. The combination between information technology or information systems with internet is a technology that used acquire and processed information to support the organizations (higher education) in achieving its objective. However, every organizations (higher education) who want to develop and implement the electronic commerce needs to design information system. Information systems need to be linked with organizations strategy because if it is not controlled and lined up with the organizations strategy, it will disable the organizational ability in the competitive advantage. This study aims to propose a design science research methodology which refers to the four main phases of information technology artifacts (constructs, models, methods and instantiations) to design an effective electronic commerce information system. Moreover, the implementation of design science research methodology also to be guideline to analysis the strategic information system alignment between the organizations strategy with information system planning. Through case study of Taiwan Tech in developing the security of electronic commerce system, this study conclude that design science research methodology is a very effective, efficient and easy to understand for the Taiwan Tech as a Higher Education in order to development an electronic commerce system.

ABSTRACT i ACKNOWLEDGMENT ii CONTENTS iii FIGURES v TABLES vi CHAPTER 1 INTRODUCTION 1 1.1 Research Background 1 1.2 Research Motives and Objectives 3 1.3 Research Procedure 5 CHAPTER 2 THEORITICAL BACKGROUND AND LITERATURE REVIEW 7 2.1 Electronic Commerce System 7 2.1.1 Mobile Commerce System 8 2.1.2 The Process of Electronic (Mobile) Commerce System 9 2.1.3 The Architecture of Electronic (Mobile) Commerce System 10 2.2 Strategic Information System Alignment 12 2.3 Design Science Research Methodology 14 2.4 System Development Methodology 17 2.4.1 Waterfall Model 18 CHAPTER 3 RESEARCH METHODOLOGY 23 3.1 Research Methodology 23 3.2 Research Subjects 26 3.3 Data Collection and Analysis 27 3.3.1 Data Collection 27 3.3.2 Data Analysis 30 CHAPTER 4 CASE DESCRIPTION AND ANALYSIS 32 4.1 Case Description 32 4.1.1 Case Company Profile 32 4.1.2 Case Background Description 33 4.2 Information Technology Artifacts Analysis 34 4.2.1 Construct Development Phase 34 4.2.2 Model Development Phase 40 4.2.3 Method Development Phase 44 4.2.4 Instantiation Development Phase 47 CHAPTER 5 CONCLUSIONS AND FURTHER RESEARCH 52 5.1 Conclusions 52 5.2 Further Research 53 REFERENCES 55

REFERENCES
[1] Pather, S., "E-commerce information systems (ECIS) Success: A South African study," 2006, Cape Peninsula University of Technology.
[2] Delone, W.H. and E.R. Mclean, "Measuring e-commerce success: Applying the DeLone & McLean information systems success model," in International Journal of Electronic Commerce, 2004. p. 31-47.
[3] Kearns, G. and A.L. Lederer, "The effect of strategic alignment on the use of IS-based resources for competitive advantage," in The Journal of Strategic Information Systems, 2000. p. 265-293.
[4] Hansen, R. and T. Tambo, "Branding and Channel Issues in E-Commerce from an Information System's Perspective," in Information Systems Research Seminar in Scandinavia, IRIS 2011, 2011. p. 200-215.
[5] Chan, Y.E. and B.H. Reich, "IT alignment: what have we learned?," in Journal of Information technology, 2007. p. 297-315.
[6] Teo, T.S. and J.S. Ang, "Critical success factors in the alignment of IS plans with business plans," in International Journal of Information Management, 1999. p. 173-185.
[7] March, S.T. and G.F. Smith, "Design and natural science research on information technology," in Decision support systems, 1995. p. 251-266.
[8] Burn, J.M. and C. Szeto, "A comparison of the views of business and IT management on success factors for strategic alignment," in Information & Management, 2000. p. 197-216.
[9] Issa-Salwe, A., Ahmed, M., Aloufi, K., & Kabir, M., "Strategic Information Systems Alignment: Alignment of IS/IT with Business Strategy," in JIPS, 2010. p. 121-128.
[10] King, W.R. and T.S. Teo, "Assessing the impact of proactive versus reactive modes of strategic information systems planning," in Omega, 2000. p. 667-679.
[11] Sabherwal, R. and Y.E. Chan, "Alignment between business and IS strategies: a study of prospectors, analyzers, and defenders," in Information systems research, 2001. p. 11-33.
[12] Baker, J. and D. Jones, "A theoretical framework for sustained strategic alignment and an agenda for research," 2008.
[13] Prat, N., I. Comyn-Wattiau, and J. Akoka, "Artifact Evaluation in Information System Design Science Research – A Holistic View," in 18th Pacific Asia Conference on Information Systems, Chengdu, China, 2014.
[14] March, S.T. and V.C. Storey, "Design science in the information systems discipline: an introduction to the special issue on design science research," in Management Information Systems Quarterly, 2008. p. 6.
[15] von Alan, R. H., March, S. T., Park, J., & Ram, S., "Design science in information systems research," in MIS quarterly, 2004. p. 75-105.
[16] Hevner, A. and S. Chatterjee, "Design science research in information systems," in Design Research in Information Systems, 2010. p. 9-22.
[17] Mohan, K., F. Ahlemann, and M. Kugler, "Understanding the Nature of Use Regarding System Development and Management Methodologies--Using Psychoanalysis to Understand the Influences of Methodology Attributes," in System Sciences (HICSS), 46th Hawaii International Conference on, 2013, IEEE. p. 4384-4393.
[18] Fitzgerald, B., "Formalized systems development methodologies: a critical perspective," in Information systems journal, 1996. p. 3-23.
[19] Pelletier, C. and L. Raymond, "The IT Strategic Alignment Process: A Dynamic Capabilities Conceptualization," 2014.
[20] Turban, E. and D. Gehrke, "Determinants of e-commerce website," in Human Systems Management, 2000. p. 111-120.
[21] Yazdanifard, R. and M.S.A. Elkhabir, "Mobile Commerce and Related Mobile Security Issues," in Proceedings of International Conference on Software and Computer Applications (ICSCA 2011), 2011.
[22] Jahanshahi, A.A., A. Mirzaie, and A. Asadollahi, "Mobile commerce beyond electronic commerce: Issue and challenges," in Asian Journal of Business and Management Sciences, 2012. p. 119-129.
[23] Okazaki, S., "New perspectives on m-commerce research," in Journal of Electronic Commerce Research, 2005. p. 160-164.
[24] Barnes, S.J., "The mobile commerce value chain: analysis and future developments," in International Journal of Information Management, 2002. p. 91-108.
[25] Sadeh, N., "M-commerce: technologies, services, and business models," 2003, John Wiley & Sons.
[26] Tiwari, R., S. Buse, and C. Herstatt, "From electronic to mobile commerce: Opportunities through technology convergence for business services," in Asia Pacific Tech Monitor, 2006. p. 38-45.
[27] Yeo, J. and W. Huang, "Mobile e-commerce outlook," in International Journal of Information Technology & Decision Making, 2003. p. 313-332.
[28] Shaikh, A.A. and G.K. Gupta, "M-Commerce Recomendation With Mobile Cloud Architecture," in International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2014. p. 347 - 351.
[29] Laisuzzaman, I. M., Imran, N., Nahid, A. A., Ziaul, M., & Alim, M., "The framework for implementing ecommerce: the role of bank and telecom in bangladesh," in arXiv preprint arXiv:1002.3333, 2010.
[30] Lind, M., D. Rudmark, and U. Seigerroth, "Design Science Research for Business Process Design: Organizational Transition at Intersport Sweden," in Human Benefit through the Diffusion of Information Systems Design Science Research, 2010. p. 159-176.
[31] Burn, J.M. and C. Szeto, "A comparison of the views of business and IT management on success factors for strategic alignment." in Information & Management, 2000. 37(4): p. 197-216.
[32] King, W.R. and T.S. Teo, "Integration between business planning and information systems planning: validating a stage hypothesis," in Decision Sciences, 1997. p. 279-308.
[33] Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S., "A design science research methodology for information systems research," in Journal of management information systems, 2007. p. 45-77.
[34] Cleven, A., P. Gubler, and K.M. Huner, "Design alternatives for the evaluation of design science research artifacts," in Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology, 2009, ACM. p. 19.
[35] Carlsson, S.A., "Developing Knowledge Through IS Design Science Research," in Scandinavian Journal of Information Systems, 2007. p. 2.
[36] Russo, N., J. Wynekoop, and D. Walz, "The use and adaptation of system development methodologies," in Managing Information & Communications in a Changing Global Environment, Idea Group Publishing, PA, 1995.
[37] Patel, U.A. and N.K. Jain, "New Idea In Waterfall Model For Real Time Software Development," in International Journal of Engineering Research and Technology, 2013.
[38] Smith, H.A., J.D. McKeen, and S. Singh, "Developing information technology strategy for business value," in Journal of Information Technology Management, 2007. p. 49-58.
[39] Mohammed, N., A. Munassar, and A. Govardhan, "A Comparison Between Five Models Of Software Engineering," 2010.
[40] Sun, Z., "A waterfall model for knowledge management and experience management," 2004.
[41] Bassil, Y., "A simulation model for the waterfall software development life cycle," in arXiv preprint arXiv:1205.69042012.
[42] Tesch, D.B., "An assessment of systems development methodologies," in Journal of Information Technology Management, 1991. p. 39.
[43] Myers, M.D. and D. Avison, "Qualitative research in information systems," in Management Information Systems Quarterly, 1997. p. 241-242.
[44] Potter, W.J., "An analysis of thinking and research about qualitative methods," Routledge, 2013.
[45] Merriam, S.B., "Qualitative Research and Case Study Applications in Education," Revised and Expanded from" Case Study Research in Education, 1998, ERIC.
[46] Yin, R.K., "Discovering the future of the case study method in evaluation research," in Evaluation Practice, 1994. p. 283-290.
[47] Noor, K.B., "Case study: a strategic research methodology," in American Journal of Applied Sciences, 2008. p. 1602.
[48] Zhang, Y. and B.M. Wildemuth, "Qualitative analysis of content," in Applications of social research methods to questions in information and library science, 2009. p. 308-319.
[49] Minichiello, V., R. Aroni, and T. Hays, "In-depth interviewing: Principles, techniques, analysis," 2008.
[50] Milena, Z.R., G. Dainora, and S. Alin, "Qualitative research methods: a comparison between focus-group and in-depth interview," in Annals of faculty of economics, University of Oradea, 2008. p. 1279-1283.
[51] Yin, R.K., "The case study crisis: some answers," in Administrative science quarterly, 1981. p. 58-65.
[52] Yin, R.K., "Case study research: Design and methods," in Sage publications, 2014.
[53] Niranjanamurthy, M. and N. Kavyashree, "Analysis of E-Commerce and M-Commerce: Advantages, Limitations and Security issues," in Analysis, 2013.
[54] Grami, A. and B. Schell, "Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges," in PST, 2004. p. 1-14.
[55] Chari, S., Kermani, P., Smith, S., & Tassiulas, L., "Security Issues in M—Commerce: A Usage—Based Taxonomy," in E-commerce agents, 2001, Springer. p. 264-282.
[56] Yazdanifard, R., M.A. AbuTabik, and A.P. Seyedi, "Security and Trust in Electronic Commerce-Finding the Safe Side," in Information Communication and Management--International Proceedings of Computer Science and Information Technology, 2011.
[57] Salam, A., Iyer, L., Palvia, P., & Singh, R., "Trust in e-commerce," in Communications of the ACM, 2005. p. 72-77.
[58] McKnight, D.H. and N.L. Chervany, "What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology," in International Journal of Electronic Commerce, 2002. p. 35-60.
[59] Herrmann, P., L. Wiebusch, and H. Krumm, "State-Based Security Policy Enforcement in Component-Based E-Commerce Applications," in Towards the Knowledge Society, 2003, Springer. p. 195-209.
[60] Culnan, M.J., "How Did They Get My Name?: An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use," in MIS quarterly, 1993. p. 341-363.
[61] Siddiqui, A.T., "M-commerce: security in mobile transaction," in IEEE Communication Magazine on E-Commerce, 2002.
[62] Nah, F.F.-H. and S. Davis, "HCI research issues in e-commerce," in Journal of Electronic Commerce Research, 2002. p. 98-113.
[63] Shi, H., "Design of a E-Commerce Model in Higher Education District," in Management and Service Science, MASS'09. International Conference on 2009, IEEE, 2009. p. 1-4.

QR CODE