메뉴 건너뛰기




Volumn , Issue , 2014, Pages

The impact of it-enabled coordination on group performance in an electronic group-buying market

Author keywords

Competitive arousal; Electronic group buying; Experimental economics; ITenabled group coordination; Online market design

Indexed keywords

DECISION THEORY; ELECTRONIC COMMERCE; INFORMATION SYSTEMS; PROFITABILITY; SALES; SOCIAL NETWORKING (ONLINE);

EID: 84928643720     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (73)
  • 2
    • 9744248703 scopus 로고    scopus 로고
    • Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues
    • Washington, DC: U. S. Patent and Trademark Office. Alavi, M., & Leidner, D. E. (2001). Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues. MIS quarterly, 107-136.
    • (2001) MIS Quarterly , pp. 107-136
    • Alavi, M.1    Leidner, D.E.2
  • 3
    • 0040382372 scopus 로고    scopus 로고
    • How entrepreneurial firms can benefit from alliances with large partners
    • Alvarez, S. A., & Barney, J. B. (2001). How Entrepreneurial Firms Can Benefit From Alliances With Large Partners. The Academy of Management Executive, 15(1), 139-148.
    • (2001) The Academy of Management Executive , vol.15 , Issue.1 , pp. 139-148
    • Alvarez, S.A.1    Barney, J.B.2
  • 4
    • 0036330919 scopus 로고    scopus 로고
    • Determinants of innovation through a knowledge-based theory lens
    • Aranda, D. And Fernandez, L. (2002). Determinants of Innovation Through A Knowledge-Based Theory Lens, Industrial Management & Data Systems, Vol. 102 No. 5, pp. 289-96.
    • (2002) Industrial Management & Data Systems , vol.102 , Issue.5 , pp. 289-296
    • Aranda, D.1    Fernandez, L.2
  • 5
    • 84951415684 scopus 로고
    • Licensing tacit knowledge: Intellectual property rights and the market for know-how
    • Arora, A. (1995). Licensing Tacit Knowledge: Intellectual Property Rights and the Market for Know-How. Economics of Innovation and New Technology, 4(1), 41-60.
    • (1995) Economics of Innovation and New Technology , vol.4 , Issue.1 , pp. 41-60
    • Arora, A.1
  • 7
    • 84986121026 scopus 로고    scopus 로고
    • What knowledge managers really do: An empirical and comparative analysis
    • Asllani, A. And Luthans, F. (2003). What Knowledge Managers Really Do: An Empirical and Comparative Analysis. Journal of Knowledge Management, Vol. 7 No. 3, pp. 53-66.
    • (2003) Journal of Knowledge Management , vol.7 , Issue.3 , pp. 53-66
    • Asllani, A.1    Luthans, F.2
  • 8
    • 77958033339 scopus 로고    scopus 로고
    • The evaluation of policies for knowledge transfer: Some emerging issues
    • Barbieri, E. (2010). The Evaluation of Policies for Knowledge Transfer: Some Emerging Issues. International Journal of Healthcare Technology and Management, 11(4), 263-282.
    • (2010) International Journal of Healthcare Technology and Management , vol.11 , Issue.4 , pp. 263-282
    • Barbieri, E.1
  • 10
    • 44349117526 scopus 로고    scopus 로고
    • Governing knowledge risks-design and results of an empirical study
    • Austria
    • Bayer, F. And Maier, R. (2007). Governing Knowledge Risks-Design and Results of an Empirical Study. Proceedings of I-KNOW '07 Graz, Austria, pp 200-208.
    • (2007) Proceedings of I-KNOW '07 Graz , pp. 200-208
    • Bayer, F.1    Maier, R.2
  • 12
    • 33846813917 scopus 로고    scopus 로고
    • Information lifecycle security risk assessment: A tool for closing security gaps
    • Bernard, R. (2007). Information Lifecycle Security Risk Assessment: A Tool for Closing Security Gaps. Computers & Security, 26(1), 26-30.
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 26-30
    • Bernard, R.1
  • 14
    • 84928602119 scopus 로고    scopus 로고
    • Comprehensive evaluation model and application of risks of knowledge management in supply chain node enterprises
    • 978-1-4244-6484-5
    • Bing Hui Liui and Xiao Qing LI (2010). Comprehensive Evaluation Model and Application of Risks of Knowledge Management in Supply Chain Node Enterprises. 978-1-4244-6484-5 IEEE 2010.
    • (2010) IEEE 2010
    • Hui Liui, B.1    Xiao Qing, L.I.2
  • 19
    • 34547659242 scopus 로고    scopus 로고
    • Conflicts between privacy and property: The discourse in personal and organizational knowledge
    • Dulipovici, A., & Baskerville, R. (2007). Conflicts Between Privacy and Property: The Discourse in Personal and Organizational Knowledge. The Journal of Strategic Information Systems, 16(2), 187-213.
    • (2007) The Journal of Strategic Information Systems , vol.16 , Issue.2 , pp. 187-213
    • Dulipovici, A.1    Baskerville, R.2
  • 20
    • 84979792294 scopus 로고    scopus 로고
    • IT security outsourcing: How safe is your IT security
    • Fenn, C., Shooter, R., & Allan, K. (2002). IT Security Outsourcing: How Safe Is Your IT Security. Computer Law & Security Review, 18(2), 109-111.
    • (2002) Computer Law & Security Review , vol.18 , Issue.2 , pp. 109-111
    • Fenn, C.1    Shooter, R.2    Allan, K.3
  • 22
    • 34547418297 scopus 로고    scopus 로고
    • Trust and knowledge management: The seeds of success
    • Queen's University, Kingston, ON, Canada, (accessed 26 August 2004)
    • Ford, D. (2001). Trust and Knowledge Management: The Seeds of Success. Queen's KBE Center for Knowledge-Based Enterprises, Queen's University, Kingston, ON, Canada, available at: Http://business. queensu. ca/knowledge/workingpapers/working/working-01-08. pdf (accessed 26 August 2004).
    • (2001) Queen's KBE Center for Knowledge-Based Enterprises
    • Ford, D.1
  • 23
    • 0042363355 scopus 로고    scopus 로고
    • The application of information security policies in large ukbased organizations: An exploratory investigation
    • Fulford, H., & Doherty, N. F. (2003). The Application of Information Security Policies in Large UKBased Organizations: An Exploratory Investigation. Information Management & Computer Security, 11(3), 106-114.
    • (2003) Information Management & Computer Security , vol.11 , Issue.3 , pp. 106-114
    • Fulford, H.1    Doherty, N.F.2
  • 24
    • 84928597806 scopus 로고    scopus 로고
    • Knowledge-intensive business services: Processing knowledge and producing innovation/proceedings of the international conference
    • 22 and 23 June 2000
    • Gallouj, F. (2000). Knowledge-intensive Business Services: Processing Knowledge and Producing Innovation/Proceedings of the International Conference "The Economics and Socio-Economics of Services: International Perspectives" (Lille-Roubaix, 22 and 23 June 2000),vol. 2: 57-76.
    • (2000) The Economics and Socio-Economics of Services: International Perspectives" (Lille-Roubaix , vol.2 , pp. 57-76
    • Gallouj, F.1
  • 25
    • 84928597006 scopus 로고    scopus 로고
    • Knowledge retrieval process in multinational consulting firms
    • Frederiksberg, Denmark, (accessed 4 September 2004)
    • Gammelgaard, J. And Ritter, T. (2000). Knowledge Retrieval Process in Multinational Consulting Firms. Danish Social Sciences Research Council, Frederiksberg, Denmark, available at: Http://web. cbs. dk/departments/int/seminarpapers/JG-Knowledge. pdf (accessed 4 September 2004).
    • (2000) Danish Social Sciences Research Council
    • Gammelgaard, J.1    Ritter, T.2
  • 26
    • 0027630926 scopus 로고
    • Building a learning organization
    • July-August 1993
    • Garvin, D. A. (1993). Building a Learning Organization. Harvard Business Review, July-August 1993, pp. 78-91.
    • (1993) Harvard Business Review , pp. 78-91
    • Garvin, D.A.1
  • 27
    • 33745850766 scopus 로고    scopus 로고
    • Legal issues for the knowledge economy in the twenty-first century
    • Gayton, C. M. (2006). Legal Issues for the Knowledge Economy in the Twenty-first Century. Vine, 36(1), 17-26.
    • (2006) Vine , vol.36 , Issue.1 , pp. 17-26
    • Gayton, C.M.1
  • 28
    • 0031256391 scopus 로고    scopus 로고
    • Benchmarking the learning capability of organizations
    • Goh, S., & Richards, G. (1997). Benchmarking the Learning Capability of Organizations. European Management Journal, 15(5), 575-583.
    • (1997) European Management Journal , vol.15 , Issue.5 , pp. 575-583
    • Goh, S.1    Richards, G.2
  • 29
    • 0034906005 scopus 로고    scopus 로고
    • Knowledge management: An organizational capabilities perspective
    • Gold, A. H., Malhotra, A. And Segars, A. H. (2001). Knowledge Management: An Organizational Capabilities Perspective. Journal of Management Information Systems, Vol. 18 No. 1, pp. 185-214.
    • (2001) Journal of Management Information Systems , vol.18 , Issue.1 , pp. 185-214
    • Gold, A.H.1    Malhotra, A.2    Segars, A.H.3
  • 31
  • 32
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • Herath, T., & Rao, H. R. (2009). Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness. Decision Support Systems, 47(2), 154-165.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 33
    • 0026104387 scopus 로고
    • Imminent policy considerations in the design and management of national and international computer networks
    • Hoffman, L., & Clark, P. C. (1991). Imminent Policy Considerations in the Design and Management of National and International Computer Networks. Communications Magazine, IEEE, 29(2), 68-74.
    • (1991) Communications Magazine, IEEE , vol.29 , Issue.2 , pp. 68-74
    • Hoffman, L.1    Clark, P.C.2
  • 34
    • 1342303833 scopus 로고    scopus 로고
    • Organizational factors that influence university-based researchers' engagement in knowledge transfer activities
    • Jacobson, N., Butterill, D., & Goering, P. (2004). Organizational Factors That Influence University-Based Researchers' Engagement In Knowledge Transfer Activities. Science Communication, 25(3), 246-259.
    • (2004) Science Communication , vol.25 , Issue.3 , pp. 246-259
    • Jacobson, N.1    Butterill, D.2    Goering, P.3
  • 35
    • 35548990551 scopus 로고    scopus 로고
    • Security as a contributor to knowledge management success
    • Jennex, M. E., & Zyngier, S. (2007). Security as a Contributor to Knowledge Management Success. Information Systems Frontiers, 9(5), 493-504.
    • (2007) Information Systems Frontiers , vol.9 , Issue.5 , pp. 493-504
    • Jennex, M.E.1    Zyngier, S.2
  • 36
    • 21144472613 scopus 로고
    • An empirical analysis of canadian merger policy
    • Khemani R. S. And Shapiro D. M. (1993), "An Empirical Analysis of Canadian Merger Policy", Journal of Industrial Economics, 41(2), 161-177.
    • (1993) Journal of Industrial Economics , vol.41 , Issue.2 , pp. 161-177
    • Khemani, R.S.1    Shapiro, D.M.2
  • 37
    • 37949036945 scopus 로고    scopus 로고
    • Using intellectual assets as a success strategy
    • Klaila, D., & Hall, L. (2000). Using Intellectual Assets as a Success Strategy. Journal of Intellectual Capital, 1(1), 47-53.
    • (2000) Journal of Intellectual Capital , vol.1 , Issue.1 , pp. 47-53
    • Klaila, D.1    Hall, L.2
  • 39
    • 0033449090 scopus 로고    scopus 로고
    • The role of classification in knowledge representation and discovery
    • Kwasnik, B. H. (2000). The Role of Classification in Knowledge Representation and Discovery. Library Trends, 48(1), 22-47.
    • (2000) Library Trends , vol.48 , Issue.1 , pp. 22-47
    • Kwasnik, B.H.1
  • 41
    • 18144362124 scopus 로고    scopus 로고
    • Property, intellectual property, and free riding
    • Lemley, M. A. (2004). Property, Intellectual Property, and Free Riding. Tex L. Rev., 83, 1031.
    • (2004) Tex L. Rev. , vol.83 , pp. 1031
    • Lemley, M.A.1
  • 42
    • 84870969267 scopus 로고    scopus 로고
    • Can social exchange theory explain individual knowledge-sharing behaviour? A meta-analysis"
    • Liang, Ting-Peng, Liu, Chin-Chung and Wu, Chia-Itsien. "Can Social Exchange Theory Explain Individual Knowledge-Sharing Behaviour? A Meta-Analysis" (2008), ICIS 2008 Proceedings.
    • (2008) ICIS 2008 Proceedings
    • Liang, T.-P.1    Liu, C.-C.2    Wu, C.-I.3
  • 44
    • 0036173202 scopus 로고    scopus 로고
    • Insider threat prediction tool: Evaluating the probability of it misuse
    • Magklaras, G. B., & Furnell, S. M. (2001). Insider Threat Prediction Tool: Evaluating the Probability of IT Misuse. Computers & Security, 21(1), 62-73.
    • (2001) Computers & Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.B.1    Furnell, S.M.2
  • 47
    • 34249003431 scopus 로고    scopus 로고
    • Do formal intellectual property rights hinder the free flow of scientific knowledge: An empirical test of the anti-commons hypothesis
    • Murray, F., & Stern, S. (2007). Do Formal Intellectual Property Rights Hinder the Free Flow of Scientific Knowledge: An Empirical Test of the Anti-commons Hypothesis. Journal of Economic Behavior & Organization, 63(4), 648-687.
    • (2007) Journal of Economic Behavior & Organization , vol.63 , Issue.4 , pp. 648-687
    • Murray, F.1    Stern, S.2
  • 52
    • 34948828036 scopus 로고    scopus 로고
    • A strategic risk approach to knowledge management
    • Perrott, B. E. (2007). A Strategic Risk Approach to Knowledge Management. Business Horizons, 50(6), 523-533.
    • (2007) Business Horizons , vol.50 , Issue.6 , pp. 523-533
    • Perrott, B.E.1
  • 53
    • 84992999005 scopus 로고    scopus 로고
    • Reducing m &a risk through improved due diligence
    • Perry, J. S., & Herd, T. J. (2004). Reducing M &A Risk Through Improved Due Diligence. Strategy & Leadership, 32(2), 12-19.
    • (2004) Strategy & Leadership , vol.32 , Issue.2 , pp. 12-19
    • Perry, J.S.1    Herd, T.J.2
  • 54
    • 84928615419 scopus 로고    scopus 로고
    • Technology initiatives in the new administration
    • Raysman, R., & Brown, P. (2008). Technology Initiatives in the New Administration. Media L. & Pol'y, 18, 95.
    • (2008) Media L. & Pol'y , vol.18 , pp. 95
    • Raysman, R.1    Brown, P.2
  • 56
    • 77951482187 scopus 로고    scopus 로고
    • The governance of university-industry knowledge transfer
    • Rossi, F. (2010). The Governance of University-industry Knowledge Transfer. European Journal of Innovation Management, 13(2), 155-171.
    • (2010) European Journal of Innovation Management , vol.13 , Issue.2 , pp. 155-171
    • Rossi, F.1
  • 61
    • 0038089969 scopus 로고    scopus 로고
    • Knowledge transfer from universities to business: Returns for all stakeholders
    • Stevens, J. M., & Bagby, J. W. (2001). Knowledge Transfer from Universities to Business: Returns for All Stakeholders. Organization, 8(2), 259-268.
    • (2001) Organization , vol.8 , Issue.2 , pp. 259-268
    • Stevens, J.M.1    Bagby, J.W.2
  • 62
    • 84555222620 scopus 로고    scopus 로고
    • Knowledge management in public organizations: A study on the relationship between organizational elements and the performance of knowledge transfer
    • Syed-Ikhsan, S. And Rowland, F. (2004). Knowledge Management in Public Organizations: A Study on the Relationship Between Organizational Elements and the Performance of Knowledge Transfer. Journal of Knowledge Management, Vol. 8 No. 2, pp. 95-111.
    • (2004) Journal of Knowledge Management , vol.8 , Issue.2 , pp. 95-111
    • Syed-Ikhsan, S.1    Rowland, F.2
  • 63
    • 0031230342 scopus 로고    scopus 로고
    • Needed: A new system of intellectual property rights
    • Thurow, L. C. (1997). Needed: A New System of Intellectual Property Rights. Harvard Business Review, 75, 94-107.
    • (1997) Harvard Business Review , vol.75 , pp. 94-107
    • Thurow, L.C.1
  • 65
    • 68049123109 scopus 로고    scopus 로고
    • A study of ontology-based risk management framework of construction projects through project life cycle
    • Tserng, H. P., Yin, S. Y., Dzeng, R. J., Wou, B., Tsai, M. D., & Chen, W. Y. (2009). A Study of Ontology-Based Risk Management Framework Of Construction Projects Through Project Life Cycle. Automation in Construction, 18(7), 994-1008.
    • (2009) Automation in Construction , vol.18 , Issue.7 , pp. 994-1008
    • Tserng, H.P.1    Yin, S.Y.2    Dzeng, R.J.3    Wou, B.4    Tsai, M.D.5    Chen, W.Y.6
  • 66
    • 0036299647 scopus 로고    scopus 로고
    • The development of access control policies for information technology systems
    • Ward, P., & Smith, C. L. (2002). The Development of Access Control Policies for Information Technology Systems. Computers & Security, 21(4), 356-371.
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 356-371
    • Ward, P.1    Smith, C.L.2
  • 67
    • 74949143896 scopus 로고    scopus 로고
    • Internet of things-new security and privacy challenges
    • Weber, R. H. (2010). Internet of Things-New Security and Privacy Challenges. Computer Law & Security Review, 26(1), 23-30.
    • (2010) Computer Law & Security Review , vol.26 , Issue.1 , pp. 23-30
    • Weber, R.H.1
  • 69
    • 1242265154 scopus 로고    scopus 로고
    • In defense of the realm: Understanding the threats to information security
    • Whitman, M. E. (2004). In Defense of the Realm: Understanding the Threats to Information Security. International Journal of Information Management, 24(1), 43-57.
    • (2004) International Journal of Information Management , vol.24 , Issue.1 , pp. 43-57
    • Whitman, M.E.1
  • 70
    • 85010089902 scopus 로고    scopus 로고
    • Intellectual property rights systems and the assemblage of local knowledge systems
    • Vermeylen, S., Martin, G., & Clift, R. (2008). Intellectual Property Rights Systems and the Assemblage of Local Knowledge Systems. International Journal of Cultural Property, 15(02), 201-221.
    • (2008) International Journal of Cultural Property , vol.15 , Issue.2 , pp. 201-221
    • Vermeylen, S.1    Martin, G.2    Clift, R.3
  • 71
    • 11744309038 scopus 로고    scopus 로고
    • Information security management (2): Guidelines to the management of information technology security (gmits)
    • Von Solms, R. (1998). Information Security Management (2): Guidelines to the Management of Information Technology Security (GMITS). Information Management & Computer Security, 6(5), 221-223.
    • (1998) Information Management & Computer Security , vol.6 , Issue.5 , pp. 221-223
    • Von Solms, R.1
  • 72
    • 0001897127 scopus 로고    scopus 로고
    • Information security management: Why standards are important
    • Von Solms, R. (1999). Information Security Management: Why Standards Are Important. Information Management & Computer Security, 7(1), 50-58.
    • (1999) Information Management & Computer Security , vol.7 , Issue.1 , pp. 50-58
    • Von Solms, R.1
  • 73
    • 2142764324 scopus 로고
    • Glossary of industrial organisation economics and competition law
    • Centre for Co-operation with the European Economies in Transition, & Organisation for Economic Co-operation and Development. Washington, DC: OECD Publications and Information Centre.
    • Zecchini,S. ,Centre for Co-operation with the European Economies in Transition, & Organisation for Economic Co-operation and Development. (1993). Glossary of industrial Organisation Economics and Competition Law. Organisation for Economic Co-operation and Development; Washington, DC: OECD Publications and Information Centre.
    • (1993) Organisation for Economic Co-operation and Development
    • Zecchini, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.