Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Are intelligent e-commerce agents partners or predators?

Published: 01 May 2002 Publication History

Abstract

Mobile agents are changing the face of e-business and reshaping business models. In the process these agents are also posing new concerns regarding who really owns information.

References

[1]
Applegate L.M., McFarlan, W.F., and McKenney, J.L. Corporate Information Systems Management: The Challenge of Managing in the Information Age. Irwin Professional Publications, 1999.
[2]
Chircu, A.M. and Kauffman, R.J. Reintermediation strategies in business-to-business electronic commerce. International Journal Electronic Commerce 4, 4 (Summer 2000), 7--42.
[3]
Falconi, R. and Firozabadi, B.S. The challenge of trust. Knowledge Engineering Review 14, 1 (1999), 81--89.
[4]
Hendler, J. Making sense out of agents. IEEE Intelligent Systems. (Mar./Apr. 1999), 32--37.
[5]
Hoffman D.L., Novak, T.P., and Peralta, M. Building consumer trust online. Commun. ACM 42, 4 (Apr. 1999), 80--85.
[6]
Lange, D.B. and Oshama, M. Programming and Deploying Java Mobile Agents with Aglets. Addison-Wesley, Reading, PA, 1998.
[7]
Maes, P., Guttman, R.H., and Moukas, A.G. Agents that buy and sell. Commun. ACM 42, 3 (Mar. 1999), 81--91.
[8]
Mandry T., Pernul, G., and Röhm, A. Mobile agents on electronic markets: Opportunities, risks, agent protection. International Journal of ElectronicCommerce 5, 2 (Winter 2000--2001), 47--60.
[9]
Murch, R. and Johnson, T. Intelligent Software Agents. Prentice Hall PTR, 1999.
[10]
Turban, E., Lee, J., Lee, J.K., King, D., and Chung, H.M. Electronic Commerce: A Managerial Perspective. Prentice Hall, Upper Saddle River, NJ, 2002.
[11]
Wang S. Analyzing agents for electronic commerce. Information Systems Management 16, 1 (Winter 1999), 40--47.

Cited By

View all
  • (2017)A survey of decision support system applications (1995–2001)Journal of the Operational Research Society10.1057/palgrave.jors.260214057:11(1264-1278)Online publication date: 21-Dec-2017
  • (2015)The Causal Relationship between Information Security Countermeasures and Information System MisuseJournal of the Korea society of IT services10.9716/KITS.2015.14.4.08114:4(81-104)Online publication date: 31-Dec-2015
  • (2014)An XML-Based Intelligent Agent Protocol Design Framework for Individualized Privacy Postures within Trusted Network EnvironmentsJournal of Information Privacy and Security10.1080/15536548.2006.108557842:1(16-28)Online publication date: 10-Sep-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 45, Issue 5
The Adaptive Web
May 2002
94 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/506218
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 2002
Published in CACM Volume 45, Issue 5

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)189
  • Downloads (Last 6 weeks)16
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2017)A survey of decision support system applications (1995–2001)Journal of the Operational Research Society10.1057/palgrave.jors.260214057:11(1264-1278)Online publication date: 21-Dec-2017
  • (2015)The Causal Relationship between Information Security Countermeasures and Information System MisuseJournal of the Korea society of IT services10.9716/KITS.2015.14.4.08114:4(81-104)Online publication date: 31-Dec-2015
  • (2014)An XML-Based Intelligent Agent Protocol Design Framework for Individualized Privacy Postures within Trusted Network EnvironmentsJournal of Information Privacy and Security10.1080/15536548.2006.108557842:1(16-28)Online publication date: 10-Sep-2014
  • (2013)The Effect of Perceived Security on Consumers' Intent to UseJournal of Electronic Commerce in Organizations10.4018/jeco.201310010311:4(37-51)Online publication date: 1-Oct-2013
  • (2012)Enhancing customer relationships by semantic consumer support systemsInformation Processing Letters10.1016/j.ipl.2012.08.002112:22(860-868)Online publication date: 1-Nov-2012
  • (2012)Approaches to Information Quality Management: State of the Practice of UK Asset-Intensive OrganisationsAsset Condition, Information Systems and Decision Models10.1007/978-1-4471-2924-0_1(1-18)Online publication date: 2012
  • (2010)An ontology-based architecture for consumer support systemsWSEAS Transactions on Information Science and Applications10.5555/1852489.18524907:2(153-165)Online publication date: 1-Feb-2010
  • (2010)Information Systems for Enhancing Customer RelationshipsInformation Technology Journal10.3923/itj.2010.1306.13169:7(1306-1316)Online publication date: 1-Jul-2010
  • (2010)Constructing ontology for customer information in consumer support systems2010 2nd IEEE International Conference on Information Management and Engineering10.1109/ICIME.2010.5477723(128-132)Online publication date: Apr-2010
  • (2009)A construction method for the ontology of customer information in consumer support systemsProceedings of the 8th WSEAS International Conference on E-Activities and information security and privacy10.5555/1736186.1736198(66-71)Online publication date: 14-Dec-2009
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media