Lemon Problems in the Internet Transactions and Relative Strategies

Lemon Problems in the Internet Transactions and Relative Strategies

Li Qi (Xi’an Jiaotong University, China) and Zhang Xianfeng (Xi’an Jiaotong University, China)
DOI: 10.4018/978-1-93177-743-8.ch013
OnDemand PDF Download:
$37.50

Abstract

Based on some new traits of the Internet environment, this chapter discusses lemon problems in the Internet transactions. It points out that the information asymmetry does not disappear, but develops to be even worse under the new Internet environment. By virtue of mathematical tools, the authors analyze products and services’ lemon problems in the new environment. It is found that many new traits of digital products and services lead to new appearances of “lemon” problems. In the end, relative strategies are provided in order to lessen these problems. The authors further hope that through the discussion, some implications can be made to e-sellers and online service providers.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Preface
Rasool Azari
Acknowledgments
Chapter 1
Göran Pulkkis, Kaj J. Grahn, Peik Åström
This chapter is a topical overview of network security software and related skills needed by network users, IT professionals, and network security... Sample PDF
Network Security Software
$37.50
Chapter 2
Vlasti Broucek, Paul Turner
This chapter is divided to two parts. Part one identifies common security and privacy weaknesses that exist in e-mail and WWW browsers and... Sample PDF
A Forensic Computing Perspective on the Need for Improved User Education for Information Systems Security Management
$37.50
Chapter 3
Sr. Korzyk
The U.S. military’s concept of a Cooperative Engagement Capability should serve as a useful referent for those attempting to design/develop large... Sample PDF
Integrating Cooperative Engagement Capability into Network-Centric Information System Security
$37.50
Chapter 4
Maria Grazia Fugini, Pierluigi Plebani
In building cooperative distributed information systems, a methodology for analysis, design and implementation of security requirements of involved... Sample PDF
A Methodology for Developing Trusted Information Systems: The Security Requirements Analysis Phase
$37.50
Chapter 5
Vernon Stagg, Matthew Warren
Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and... Sample PDF
A National Information Infrastructure Model for Information Warfare Defence
$37.50
Chapter 6
Stewart T. Fleming
This chapter discusses the current state of the art of biometric systems. The use of biometrics is an important new part of the design of secure... Sample PDF
Biometrics: Past, Present and Future
$37.50
Chapter 7
Geoffrey Sandy, Paul Darbyshire
As the amount of content on the Web grows almost exponentially, one of the new growth industries is that of filtering products. The effectiveness of... Sample PDF
User Types and Filter Effectiveness: A University Case Study
$37.50
Chapter 8
Bernd Carsten Stahl
Social responsibility is a highly popular term, and it seems to be of importance to what is happening in the information age. In this paper, the... Sample PDF
What is the Social Responsibility in the Information Age? Maximising Profits?
$37.50
Chapter 9
Robert Joseph Skovira
This chapter introduces the social contract as a basis for personal and corporate responsibility and obligation. I briefly discuss three... Sample PDF
The Social Contract Revised: Obligation and Responsibility in the Information Society
$37.50
Chapter 10
Rasool Azari, James Pick
This paper examines the technological level of 74 counties in technologically advanced states in the United States at the end of the 1990s. The... Sample PDF
The Influence of Socioeconomic Factors on Technological Change: The Case of High-Tech States in the U.S.
$37.50
Chapter 11
Heberto J. Ochoa-Morales
In Latin America, the proliferation of regional and multilateral agreements with integration as a purpose has generated a high flow of goods... Sample PDF
Social Responsibility and the Transition Toward a Knowledge-Based Society in Latin America
$37.50
Chapter 12
Husain Al-Lawatia, Thomas Hilton
This chapter explores similarities and differences between two cultures, the USA and the Arab World, in BIS ethics, through a survey of American and... Sample PDF
Information Systems Ethics in the USA and in the Arab World
$37.50
Chapter 13
Li Qi, Zhang Xianfeng
Based on some new traits of the Internet environment, this chapter discusses lemon problems in the Internet transactions. It points out that the... Sample PDF
Lemon Problems in the Internet Transactions and Relative Strategies
$37.50
Chapter 14
Zhangxi Lin, Dahui Li, Wayne Huang
Reputation is an important organization asset, particularly in the era of e-commerce. In an online consumer-to-consumer (C2C) auction market, a... Sample PDF
Reputation, Reputation System and Reputation Distribution - An Exploratory Study in Online Consumer-to-Consumer Auctions
$37.50
Chapter 15
Hasan A. Abbas, Salah M. Al-Fadhly
The Internet is a hot issue nowadays because of its important role at different levels. The topic of privacy is a debatable issue: we read in the... Sample PDF
Privacy Perspective from Utilitarianism and Metaphysical Theories
$37.50
About the Authors