02.06.2013 Views

E-commerce - Cape Peninsula University of Technology

E-commerce - Cape Peninsula University of Technology

E-commerce - Cape Peninsula University of Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2: Literature review<br />

• Search problems<br />

• Inadequate measurement <strong>of</strong>web application success<br />

• Security (real and perceived) weaknesses and<br />

• Lack <strong>of</strong> Intemet standards.<br />

Page 38<br />

Download delays, security weaknesses and lack <strong>of</strong> Internet standards will be<br />

discussed briefly.<br />

• Download delays: Download time is described as the amount <strong>of</strong> time it<br />

takes for a Web client machine to receive and display a data file<br />

submitted by a Web server after that file was requested by the client.<br />

Download delays impede the development and use <strong>of</strong> Internet<br />

technologies such as multimedia for B2C e-<strong>commerce</strong>. For example,<br />

technology exists to show a television ad on a company web page.<br />

However, the waiting time required before such an ad is downloaded<br />

and shown is prohibitive, and therefore is not <strong>of</strong>ten used. Download<br />

delays are responsible for the virtual absence <strong>of</strong> television-style 30­<br />

second audio and video advertising over the Intemet (McCrohan,<br />

2003).<br />

For the most part, practical limits <strong>of</strong> multimedia use are established by<br />

what e-customers think is acceptable download time. Under normal<br />

computing conditions, e-customers find it objectionable to wait more<br />

than a few seconds between computer processing cycles (such as the<br />

amount <strong>of</strong> time it takes to load a web page upon requesting it).<br />

Waiting more than half a minute is considered intolerable for e­<br />

customers (van der Merwe & Bekker, 2003).<br />

• Security weaknesses: Security threats exist for both e-customers and<br />

for e-retailers. There appears to be sufficient technology for secure<br />

B2C e-<strong>commerce</strong> transactions on the networks between server and

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!