E-commerce - Cape Peninsula University of Technology
E-commerce - Cape Peninsula University of Technology
E-commerce - Cape Peninsula University of Technology
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 2: Literature review<br />
• Search problems<br />
• Inadequate measurement <strong>of</strong>web application success<br />
• Security (real and perceived) weaknesses and<br />
• Lack <strong>of</strong> Intemet standards.<br />
Page 38<br />
Download delays, security weaknesses and lack <strong>of</strong> Internet standards will be<br />
discussed briefly.<br />
• Download delays: Download time is described as the amount <strong>of</strong> time it<br />
takes for a Web client machine to receive and display a data file<br />
submitted by a Web server after that file was requested by the client.<br />
Download delays impede the development and use <strong>of</strong> Internet<br />
technologies such as multimedia for B2C e-<strong>commerce</strong>. For example,<br />
technology exists to show a television ad on a company web page.<br />
However, the waiting time required before such an ad is downloaded<br />
and shown is prohibitive, and therefore is not <strong>of</strong>ten used. Download<br />
delays are responsible for the virtual absence <strong>of</strong> television-style 30<br />
second audio and video advertising over the Intemet (McCrohan,<br />
2003).<br />
For the most part, practical limits <strong>of</strong> multimedia use are established by<br />
what e-customers think is acceptable download time. Under normal<br />
computing conditions, e-customers find it objectionable to wait more<br />
than a few seconds between computer processing cycles (such as the<br />
amount <strong>of</strong> time it takes to load a web page upon requesting it).<br />
Waiting more than half a minute is considered intolerable for e<br />
customers (van der Merwe & Bekker, 2003).<br />
• Security weaknesses: Security threats exist for both e-customers and<br />
for e-retailers. There appears to be sufficient technology for secure<br />
B2C e-<strong>commerce</strong> transactions on the networks between server and