Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David King is active.

Publication


Featured researches published by David King.


Archive | 2015

Marketing and Advertising in E-Commerce

Efraim Turban; David King; Jae Kyu Lee; Ting-Peng Liang; Deborrah C. Turban

Upon completion of this chapter, you will be able to: 1. Describe factors that influence online consumer behavior. 2. Explain how consumer behavior can be analyzed for creating personalized services. 3. Understand consumer market research in e-commerce. 4. Describe the objectives and characteristics of Web advertising. 5. Describe the major advertising methods used on the Web. 6. Learn mobile marketing concepts and techniques. 7. Describe various online advertising strategies and types of promotions. 8. Understand some implementation issues.


Archive | 2015

Social Commerce: Foundations, Social Marketing, and Advertising

Efraim Turban; David King; Jae Kyu Lee; Ting-Peng Liang; Deborrah C. Turban

Upon completion of this chapter, you will be able to: 1. Define social commerce and describe its roots and evolution. 2. Describe the scope, drivers, and content of the social commerce field. 3. Summarize the benefits and limitations of social commerce. 4. Describe the major models of social shopping. 5. Explain how advertising and promotions are conducted in social networking environments. 6. Describe how social networking can facilitate customer service, customer support, and CRM.


Archive | 2015

Business-to-Business E-Commerce

Efraim Turban; David King; Jae Kyu Lee; Ting-Peng Liang; Deborrah C. Turban

Upon completion of this chapter, you will be able to: 1. Describe the B2B field. 2. Describe the major types of B2B models. 3. Discuss the models and characteristics of the sell-side marketplace, including auctions. 4. Describe sell-side intermediaries. 5. Describe the characteristics of the buy-side marketplace and e-procurement. 6. Explain how reverse auctions work in B2B. 7. Describe B2B aggregation and group purchasing models. 8. Define exchanges and describe their major types. 9. Describe third-party exchanges. 10. Describe how B2B can benefit from social networking and Web 2.0. 11. Describe collaborative commerce.


Archive | 2015

Overview of Electronic Commerce

Efraim Turban; David King; Jae Kyu Lee; Ting-Peng Liang; Deborrah C. Turban

Upon completion of this chapter, you will be able to: 1. Define electronic commerce (EC) and describe its various categories. 2. Describe and discuss the content and framework of EC. 3. Describe the major types of EC transactions. 4. Describe the drivers of EC. 5. Discuss the benefits of EC to individuals, organizations, and society. 6. Discuss social computing. 7. Describe social commerce and social software. 8. Understand the elements of the digital world. 9. Describe some EC business models. 10. List and describe the major limitations of EC.


Archive | 2015

Electronic Commerce Payment Systems

Efraim Turban; David King; Jae Kyu Lee; Ting-Peng Liang; Deborrah C. Turban

The e-book market is booming while the brick-and-mortar book market is rapidly declining. In 2013, Amazon.com released the 6th generation of the Kindle reader – the “Kindle Paperwhite” (also known as‘Paperwhite 2’).” Kindle books can also be read on virtually every PC or tablet device. Barnes & Noble has a Kindle competitor called the Nook. The result is that some categories of books in digital format sell better than their hardcover and paperback counterparts, as described in Chap. 5.


Archive | 2015

Retailing in Electronic Commerce: Products and Services

Efraim Turban; David King; Jae Kyu Lee; Ting-Peng Liang; Deborrah C. Turban

In the early 1990s, entrepreneur Jeff Bezos saw an opportunity rather than a business problem. He decided that books were the most logical product for selling online. In July 1995, Bezos started Amazon.com ( amazon.com ) and began selling books online. Over the years, the company has continually improved, expanded, changed its business model, and expanded its product selection, improving customer experience, and adding new products and services and business alliances. The company also recognized the importance of order fulfillment and warehousing early on. It has invested billions of dollars building physical warehouses and distribution centers designed for shipping packages to millions of customers. In 2012, the company started same day delivery from its new distribution centers. After 2000, the company added information technology products and services, notably the Kindle e-reader family as well as Web Services (cloud technologies). Amazon.com’s challenge was, and still is, to profitably sell many consumer products and services online.


Springer Texts in Business and Economics | 2017

Introduction to Electronic Commerce and Social Commerce

Efraim Turban; Judy Whiteside; David King; Jon Outland

This is a complete update of the best-selling undergraduate textbook on Electronic Commerce (EC). New to this 4th Edition is the addition of material on Social Commerce (two chapters); a new tutorial on the major EC support technologies, including cloud computing, RFID, and EDI; ten new learning outcomes; and video exercises added to most chapters. Wherever appropriate, material on Social Commerce has been added to existing chapters. Supplementary material includes an Instructors Manual; Test Bank questions for each chapter; Powerpoint Lecture Notes; and a Companion Website that includes EC support technologies as well as online files. The book is organized into 12 chapters grouped into 6 parts. Part 1 is an Introduction to E-Commerce and E-Marketplaces. Part 2 focuses on EC Applications, while Part 3 looks at Emerging EC Platforms, with two new chapters on Social Commerce and Enterprise Social Networks. Part 4 examines EC Support Services, and Part 5 looks at E-Commerce Strategy and Implementation. Part 6 is a collection of online tutorials on Launching Online Businesses and EC Projects, with tutorials focusing on e-CRM; EC Technology; Business Intelligence, including Data-, Text-, and Web Mining; E-Collaboration; and Competition in Cyberspace.


Archive | 2017

Mobile Commerce and the Internet of Things

Efraim Turban; Judy Whiteside; David King; Jon Outland

Upon completion of this chapter, you will be able to: 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure that supports m-commerce (devices, software, and services). 3. Discuss m-commerce applications in banking and financial services. 4. Describe enterprise mobility applications. 5. Describe consumer and personal applications of m-commerce, including entertainment. 6. Define and describe ubiquitous computing and sensory networks. 7. Describe the Internet of Things and its major smart applications. 8. Describe wearables, Google Glass, smartwatches, and fitness trackers. 9. Describe the major implementation issues from security and privacy to barriers of m-commerce.


Archive | 2015

Order Fulfillment Along the Supply Chain

Efraim Turban; David King; Jae Kyu Lee; Ting-Peng Liang; Deborrah C. Turban

With traditional retailing, customers go to a physical store and purchase items that they then take home. Large quantities are delivered to each store or supermarket; there are not too many delivery destinations. With e-tailing, customers want the goods quickly and to have them shipped to their homes. Deliveries of small quantities need to go to a large number of destinations. Also, items must be available for immediate delivery. Therefore, maintaining an inventory of items becomes critical. Maintaining inventory and shipping products costs money and takes time, which may negate some of the advantages of e-tailing. Let’s see how Amazon.com, the “king” of e-tailing, handles the situation.


Archive | 2015

E-Commerce Security and Fraud Issues and Protections

Efraim Turban; David King; Jae Kyu Lee; Ting-Peng Liang; Deborrah C. Turban

Upon completion of this chapter, you will be able to: 1. Understand the importance and scope of security of information systems for EC. 2. Describe the major concepts and terminology of EC security. 3. Understand about the major EC security threats, vulnerabilities, and technical attacks. 4. Understand Internet fraud, phishing, and spam. 5. Describe the information assurance security principles. 6. Describe the major technologies for protection of EC networks, including access control. 7. Describe various types of controls and special defense mechanisms. 8. Describe consumer and seller protection from fraud. 9. Discuss enterprisewide implementation issues for EC security. 10. Understand why it is so difficult to stop computer crimes. 11. Discuss the future of EC.

Collaboration


Dive into the David King's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ting-Peng Liang

National Chengchi University

View shared research outputs
Top Co-Authors

Avatar

H. Michael Chung

California State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge