Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where A. F. Salam is active.

Publication


Featured researches published by A. F. Salam.


Communications of The ACM | 2003

Consumer-perceived risk in e-commerce transactions

A. F. Salam; H. R. Rao; C. C. Pegels

A major promise of the Internet is its potential for online shopping and its benefits in the form of cost reduction, for consumers and businesses alike. For example, according to Penton Research (www.penton.com), using the Web site as a marketing tool provides a compelling means for cost reduction in terms of cost per contact statistics (Internet:


Communications of The ACM | 2005

Agents in e-supply chains

Rahul Singh; A. F. Salam; Lakshmi S. Iyer

0.98, direct mail:


Communications of The ACM | 1998

Marketing and the Internet

H. Raghav Rao; A. F. Salam; Brian DosSantos

1.68, telemarketing:


systems man and cybernetics | 2006

Semantic information assurance for secure distributed knowledge management: a business process perspective

Rahul Singh; A. F. Salam

31.16, tradeshows:


Information Systems Management | 2005

Intelligent Agents to Support Information Sharing in B2B E-Marketplaces

Lakshmi S. Iyer; Rahul Singh; A. F. Salam

162). Yet the new medium is far from the true electronic marketplace of the future. This is due largely to the reluctance of consumers to engage in transactions over the Internet. In their study, Hoffman, Novak and Peralta found that consumers, on the Web, may fear providing credit card information to any commercial Web provider and that consumers simply do not trust most Web providers enough to engage in exchange relationships involving money [4]. This perceived risk among consumers translates into their reluctance to use debit and/or credit card information over the Internet resulting in their disengagement from electronic transactions. Most sites on the Internet today do not focus on building and nurturing trust as part of an ongoing relationship with their customers [7, 9]. Millions of consumers browse thousands of Web vendor sites everyday with the intention of buying products and services. Yet, the majority of these consumers opt for buying the products or services from a brick-andmortar facility rather than completing the purchase process online. Reliable encryption and authentication methods are available. But we believe that secure technological infrastructure is only a necessary foundation and by itself not sufficient for creating the level of trust needed for spontaneous electronic transactions over the Internet. This is due to the fact that secure transaction methods using encryption and


Journal of information technology case and application research | 2002

ERP Selection at Custom Fabrics

Rajeev Sharma; Prashant Palvia; A. F. Salam

Realizing the potential of intelligent infomediary-based e-marketplaces.


Electronic Markets | 2014

Does service convenience matter? An empirical assessment of service quality, service convenience and exchange relationship in electronic mediated environment

Hua Dai; A. F. Salam

We have witnessed a marked increase in the importance of marketing over the past decade as organizations moved from emphasizing manufacturing to MARKETING focusing on customer needs. As this century comes to a close, and the a new enabler— the Internet—has emerged as the single greatest INTERNET delivery vehicle for the virtual enterprise by removing some of the physical constraints of doing business. The Internet has the potential of providing a possible means for Marshall McLuhans vision of a global village.


Computers in Human Behavior | 2014

Examining the impact of computer-mediated social networks on individual consumerism environmental behaviors

Richelle L. Oakley; A. F. Salam

Secure knowledge management for eBusiness processes that span multiple organizations requires intraorganizational and interorganizational perspectives on security and access control issues. There is paucity in research on information assurance of distributed interorganizational eBusiness processes from a business process perspective. This paper presents a framework for secure semantic eBusiness processes integrating three streams of research, namely: 1) eBusiness processes; 2) information assurance; and 3) semantic technology. This paper presents the conceptualization and analysis of a secure semantic eBusiness process framework and architecture, and provides a holistic view of a secure interorganizational semantic eBusiness process. This paper fills a gap in the existing literature by extending role-based access control models for eBusiness processes that are done by using ontological analysis and semantic Web technologies to develop a framework for computationally feasible secure eBusiness process knowledge representations. An integrated secure eBusiness process approach is needed to provide a unifying conceptual framework to understand the issues surrounding access control over distributed information and knowledge resources


Archive | 2000

Internet Involvement: Instrument Development, Measurement and Implications for Electronic Commerce

A. F. Salam; H. R. Rao; C. C. Pegels

Abstract This article proposes an architecture to support information and knowledge exchange between collaborating business partners. the focus is on knowledge representation and exchange by intelligent agents to support collaborative business functions through agents that exchange problem-specific information in standardized formats. the article then shows the application of the proposed architecture in the context of an infomediary-based B2B E-marketplace.


hawaii international conference on system sciences | 2015

Examining the Role of Business Intelligence in Non-profit Organizations to Support Strategic Social Goals

Richelle L. Oakley; Lakshmi S. Iyer; A. F. Salam

Abstract As firms try to replace outdated legacy systems and modernize their information systems, they seriously consider implementing Enterprise Resource Planning (ERP) packages. However, the firm selecting an ERP vendor is faced with several difficult issues besides the typical issues of software vendor selection, and the process is fraught with risks. Such issues include: the degree of fit of the package with existing business processes, the possible restructuring of the business, and the degree of business integration. In addition, the typical factors include vendor selection criteria as well as the management of the selection process. In this case, Custom Fabrics wrestled with many of the issues either implicitly or explicitly. The case describes many of the objective and subjective processes Custom Fabrics went through. In spite of much care and attention to the process, what is interesting is that in the end Custom Fabrics reversed its original decision.

Collaboration


Dive into the A. F. Salam's collaboration.

Top Co-Authors

Avatar

Lakshmi S. Iyer

University of North Carolina at Greensboro

View shared research outputs
Top Co-Authors

Avatar

Rahul Singh

University of North Carolina at Greensboro

View shared research outputs
Top Co-Authors

Avatar

Richelle L. Oakley

University of North Carolina at Greensboro

View shared research outputs
Top Co-Authors

Avatar

Hua Dai

University of Wisconsin–La Crosse

View shared research outputs
Top Co-Authors

Avatar

Prashant Palvia

University of North Carolina at Greensboro

View shared research outputs
Top Co-Authors

Avatar

Connie S. Albert

University of North Carolina at Greensboro

View shared research outputs
Top Co-Authors

Avatar

C. C. Pegels

State University of New York System

View shared research outputs
Top Co-Authors

Avatar

H. R. Rao

State University of New York System

View shared research outputs
Top Co-Authors

Avatar

Sherrie Drye Cannoy

University of North Carolina at Greensboro

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge