Research on the risk factors of mobile business: based on the sorting Delphi method

被引:3
作者
Chen, Feiming [1 ]
Liu, Yuqing [2 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Management, Wuhan 430074, Peoples R China
[2] Wuhan Technol & Business Univ, Wuhan 430065, Peoples R China
关键词
mobile business risk; Delphi method; risk factors;
D O I
10.4028/www.scientific.net/JERA.21.215
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the development and popularization of mobile terminal device, including mobile payment, mobile stock market, mobile banking and mobile office et al., several of mobile business styles are coming to social life. To better response to the constantly changing of mobile business operating environment, it is essential to put forward the system of mobile business risk management and mitigation strategy. This paper uses Delphi method to investigate and obtain the 10 key elements of the mobile business risks. According to the SCP model, the risk factors are divided into three "categories" namely: (1) the macro environment; (2) the industry environment and (3) the enterprise operational level. These three categories can further be subdivided into more specific risks such as: the Macro environmental risks comprising of the economic environment risks, policy environment risks and technology environment and cultural environmental risks; the industry environment risks comprising of industry competition risks, cooperation risks of service providers and cooperation risks of equipment manufacturers; and finally the Enterprise operational risks which include the cost management risks, internal integration risks and customer loss risks. According to the degree of importance, several of risk factors are sorted and the risks coordinate diagram is plotted.
引用
收藏
页码:215 / 230
页数:16
相关论文
共 33 条
[1]   E-commerce project development risks: evidence from a Delphi survey [J].
Addison, T .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2003, 23 (01) :25-40
[2]  
Adler M., 1996, GAZING ORACLE DELPHI
[3]  
[Anonymous], 2009, 2009 ANN REP HUTCH W
[4]  
[Anonymous], 1968, IND ORG
[5]  
[Anonymous], 2009, 2009 STAT B NAT TEL
[6]  
[Anonymous], 2009, 2009 ERNST YOUNG BUS
[8]   SOFTWARE RISK MANAGEMENT - PRINCIPLES AND PRACTICES [J].
BOEHM, BW .
IEEE SOFTWARE, 1991, 8 (01) :32-41
[9]  
Bohlin E., 2007, Telematics and Informatics, V24, P217, DOI 10.1016/j.tele.2007.04.002
[10]  
Cleff E. B., 2007, Computer Law and Security Report, V23, P262, DOI 10.1016/j.clsr.2007.03.005