Research on the Risk Factors of Mobile Business: Based on the Sorting Delphi Method

Article Preview

Abstract:

With the development and popularization of mobile terminal device, including mobile payment, mobile stock market, mobile banking and mobile office et al., several of mobile business styles are coming to social life. To better response to the constantly changing of mobile business operating environment, it is essential to put forward the system of mobile business risk management and mitigation strategy. This paper uses Delphi method to investigate and obtain the 10 key elements of the mobile business risks. According to the SCP model, the risk factors are divided into three “categories”namely: (1)the macro environment; (2)the industry environment and (3)the enterprise operational level.These three categories can further be subdivided into more specific risks such as: the Macro environmental risks comprising of the economic environment risks, policy environment risks and technology environment and cultural environmental risks; the industry environment risks comprising of industry competition risks, cooperation risks of service providers and cooperation risks of equipment manufacturers; and finally the Enterprise operational risks which include the cost management risks, internal integration risks and customer loss risks. According to the degree of importance, several of risk factors are sorted and the risks coordinate diagram is plotted.

You might also be interested in these eBooks

Info:

Pages:

215-230

Citation:

Online since:

December 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2016 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] 2009 Annual Report of Hutchison Whampoa Limited, Hutchison Whampoa Limited, (2009).

Google Scholar

[2] P. Olla, N.V. Patel. A value chain model for mobile data service providers. Telecommunications policy, Vol. 26 (2002), pp.551-571.

DOI: 10.1016/s0308-5961(02)00031-9

Google Scholar

[3] A. Tsalgatidou, J. Veijalainen. Mobile Electronic Commerce: Emerging Issues. Springer, Berlin, Heidelberg, (2000), pp.477-486.

DOI: 10.1007/3-540-44463-7_42

Google Scholar

[4] The 2009 Statistical Bulletin of the National Telecom Industry, Ministry of Industry and Information Technology of the People's Republic of China, (2009).

Google Scholar

[5] F.C. Harmantzis V.P. Tanguturi. Investment decisions in the wireless industry applying real options. Telecommunications Policy, Vol. 31, (2007), pp.107-123.

DOI: 10.1016/j.telpol.2006.02.005

Google Scholar

[6] H. Gruber. An investment view of mobile telecommunications in the European Union. Telecommunications Policy, Vol. 23 (1999), pp.521-538.

DOI: 10.1016/s0308-5961(99)00042-7

Google Scholar

[7] M. Pagani , C.H. Fine. Value network dynamics in 3G-4G wireless communications: A systems thinking approach to strategic value assessment. Journal of Business Research, Vol. 61, (2008), pp.1102-1112.

DOI: 10.1016/j.jbusres.2007.11.004

Google Scholar

[8] V.P. Tanguturi ,F.C. Harmantzis . Migration to 3G wireless broadband internet and real options: The case of an operator in India. Telecommunications Policy, Vol. 30( 2006), pp.400-419.

DOI: 10.1016/j.telpol.2006.02.004

Google Scholar

[9] E. Bohlin. Business models and financial impacts of future mobile broadband networks. Telematics and Informatics, Vol. 24(2007), pp.217-37.

DOI: 10.1016/j.tele.2007.04.002

Google Scholar

[10] Y. F, Kuo, C. W, Yu. 3G telecommunication operators' challenges and roles: A perspective of mobile commerce value chain. Technovation, Vol. 26, (2006), pp.1347-56.

DOI: 10.1016/j.technovation.2005.08.004

Google Scholar

[11] A.K. Ghosh, T.M. Swaminatha. Software security and privacy risks in mobile e-commerce, Communications of the ACM, Vol. 44, (2001), pp.51-57.

DOI: 10.1145/359205.359227

Google Scholar

[12] G. Ng-Kruelle, P.A. Swatman, D.S. Rebne, F. Hampe. The Price of Convenience: Privacy and Mobile Commerce. Quarterly Review of Electronic Commerce, Vol. 3, (2002), pp.273-285.

Google Scholar

[13] H. Galanxhi, H. Nah FF. Privacy issues in the era of ubiquitous commerce. Electronic markets, Vol. 16(2006), pp.222-232.

DOI: 10.1080/10196780600841894

Google Scholar

[14] T. Walter,L. Bussard,Y. Roudier. Secure mobile business applications—framework, architecture and implementation. Information Security Technical Report, Vol. 9(2004), pp.6-21.

DOI: 10.1016/s1363-4127(05)70036-4

Google Scholar

[15] G.S. Schwiderski, H. Knospe. Secure mobile commerce. Electronics & Communication Engineering Journal, Vol. 14(2002), pp.228-238.

DOI: 10.1049/ecej:20020506

Google Scholar

[16] E, B, Cleff. Implementing the legal criteria of meaningful consent in the concept of mobile advertising. Computer Law & Security Report, Vol. 23(2007), pp.262-269.

DOI: 10.1016/j.clsr.2007.03.005

Google Scholar

[17] O. Pitkanen, M. Mantyla, M. Valimaki , J. Kemppinen. Assessing Legal Challenges on the Mobile Internet. International journal of electronic commerce. Vol. 8 (2003), pp.101-120.

Google Scholar

[18] H. Grupp. Der Delphi-Report: Dt. Verl. -Anst.; (1995).

Google Scholar

[19] D.G.A. Kenis . Improving group decisions: designing and testing techniques for group decision support systems applying Delphi principles: Utrecht, (1995).

Google Scholar

[20] H.H. Holzmüller,J. Schlüchter. Delphi study about the future of B2B marketplaces in Germany. Electronic commerce research and applications, Vol. 1, (2002), pp.2-19.

DOI: 10.1016/s1567-4223(02)00003-0

Google Scholar

[21] T. Addison. E-commerce project development risks: evidence from a Delphi survey. International Journal of Information Management, Vol. 23 (2003), pp.25-40.

DOI: 10.1016/s0268-4012(02)00066-x

Google Scholar

[22] M. Keil, A. Tiwana, A. Bush. Reconciling user and project manager perceptions of IT project risk: a Delphi study. Information systems journal, Vol. 12, (2002), pp.103-19.

DOI: 10.1046/j.1365-2575.2002.00121.x

Google Scholar

[23] R. Schmidt, K. Lyytinen, M. Keil, P. Cule. Identifying software project risks: An international Delphi study. Journal of Management Information Systems, Vol. 17( 2001), pp.5-36.

DOI: 10.1080/07421222.2001.11045662

Google Scholar

[24] M. Adler, E. Ziglio Gazing into the oracle: the Delphi method and its application to social policy and public health: Jessica Kingsley Pub, (1996).

Google Scholar

[25] A. L. Delbecq. A.H. Van, D.H. Gustafson. Group techniques for program planning: A guide to nominal group and Delphi processes: Green Briar Press, Middleton, WI, (1975).

Google Scholar

[26] B.W. Boehm . Software Risk Management: Principles and Practices. IEEE software, Vol. 8(1991), p.32.

Google Scholar

[27] R. Schmidt. Managing Delphi surveys using non-parametric statistical techniques. Decision sciences, Vol. 28(1997), pp.63-74.

Google Scholar

[28] A.T. Cox Jr . What's wrong with risk matrices? Risk Analysis, Vol. 28(2008), pp.497-512.

Google Scholar

[29] J.S. Bain. Relation of profit rate to industry concentration: American manufacturing, 1936-1940. The Quarterly Journal of Economics, Vol. 65 (1951), pp.293-324.

DOI: 10.2307/1882217

Google Scholar

[30] J.S. Bain . Industrial organization: John Wiley & Sons; (1968).

Google Scholar

[31] E.W.T. Ngai, A. Gunasekaran. A review for mobile commerce research and applications. Decision support systems, Vol. 43(2007), pp.3-15.

DOI: 10.1016/j.dss.2005.05.003

Google Scholar

[32] The 2009 Ernst & Young business risk report—Telecommunications, Global telecommunications center of ernst & young, (2009).

Google Scholar

[33] The Mobile Internet Report, Morgan Stanley, (2009).

Google Scholar