The Internet-EDI Systems Adoption by Enterprises in Jordan: Descriptive analysis of Adoption, Strategies and Benefits

Abstract

This paper reviewed and explored the current extent of the Internet Electronic Data Interchange systems adoption in Jordan particularly in the SME sector. Also the paper presented the benefits of IEDI adoption and showed the main obstacles facing the SME in Jordan to adopt. This paper used the descriptive and theoretical analysis approaches for collecting and analysis the historical and archived data. The literature showed that Jordan, as a developing country, has achieved forward steps in introducing the Internet to the different sectors of life. The adoption of the electronic tools in business became a governmental target in recent years to make it possible for SMEs to be able to continue to achieve success in their business [1]. Most of Jordanian SMEs have little or no competitive pressure to use I-EDI systems, since most suppliers, customers and other competitors do not seem to promote I-EDI systems. The study concluded that SMEs in Jordan could grow and become larger companies, and supporting national economy. Thus it is very important to develop and grow Jordanian SMEs by doing more research.

Share and Cite:

A. Bakri, "The Internet-EDI Systems Adoption by Enterprises in Jordan: Descriptive analysis of Adoption, Strategies and Benefits," International Journal of Internet and Distributed Systems, Vol. 1 No. 3, 2013, pp. 18-24. doi: 10.4236/ijids.2013.13004.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] A. Al-Bakri, “The Adoption of B2B by SME in Amman and the Perceptions of Its Influence on Their Performance and Efficiency,” PhD Thesis (Non-Published Thesis), University of Southern Queensland, Toowoomba, 2009.
[2] T. R. Peltier, “Information Security Risk Analysis,” CRC Press, Boca Raton, 2001.
[3] H. Rank and B. Schmitt, “The Challenge of Information Security,” Military Technology, Vol. 29, No. 11, 2005, pp. 8-50.
[4] T. Thanasankit, “E-Commerce and Cultural Values,” Idea Group Inc., New York, 2002. doi:10.4018/978-1-59140-056-1
[5] UNCTAD, “Building Confidence: E-Commerce and Development Report,” 2012. http://www.unece.org/trade/untdid/welcome.htm
[6] M. Gerber and R. Solms, “Information Security Requirements—Interpreting the Legal Aspects,” Computers & Security, Vol. 27, No. 5-6, 2008, pp. 124-135. doi:10.1016/j.cose.2008.07.009
[7] D. Kim, S. Cavusgil and R. Calantone, “Information System Innovations and Supply Chain Management: Channel Relationships and Firm Performance,” Journal of the Academy of Marketing Science, Vol. 34, No. 1, 2006, pp. 40-54.
[8] V. Zeithaml, A. Parasuraman and A. Malhotra, “Service Quality Delivery through Web Sites: A critical Review of Extant Knowledge,” Journal of the Academy of Marketing Science, Vol. 30, No.4, 2003, pp. 362-375.
[9] K. Hausken, “Information Sharing among Firms and Cyber-Attacks,” Journal of Accounting and Public Policy, Vol. 26, No. 6, 2007, pp. 639-688. doi:10.1016/j.jaccpubpol.2007.10.001
[10] W. Titi, “The Impact of Adoption Electronic Commerce in Small to Medium Enterprises Jordanian Companies,” The 1st International Conference on E-Business and E-Learning, Jordan, 24-25 May 2005, pp.159-178.
[11] M. Stamp, “Information Security,” John Wiley & Sons, New York, 2005. doi:10.1002/0471744190
[12] M. Warren and W. Hutchinson, “Cyber-Attacks Against Supply Chain Management Systems: A Sort Note,” International Journal of Physical Distribution & Logistics Management, Vol. 30, No. 7-8, 2002, pp. 710-716. doi:10.1108/09600030010346521
[13] C. Steinfield and P. Whitter, “Community level Socio-Economic Impacts of Electronic commerce,” Journal of Computer Mediated Communication, Vol. 5, No. 2, 1999, pp. 714-719.
[14] J. Westby, “International Guide to Combating Cybercrime,” American Bar Association, USA, 2003.
[15] E. Abu Zaid, “Attracting e-Commerce. First GCC E-Commerce Conference, UAE,” 2005. www.kenzay-traning.com
[16] V. Leopoulos, K. Kirytopoulos and D. Voulgaridou, “the benefits of e-commerce: a case study of the Greek Para-pharmaceutical industry,” National Technical University of Athens, Athens, 2006.
[17] Abu-Ghazaleh and C. Consulting, “Market Brief on Telecommunications Sector in Jordan,” 2009. http://www.commercecan.ic.gc.ca
[18] Department of Statistics in Jordan (DOS), Census of Enterprises, 2011. http://www.dos.gov.jo
[19] A. Abu-Samaha and Y. Abdel Samad, “Challenges to the Jordanian Electronic Government Initiative,” Journal of Business Systems, Governance and Ethics, Vol. 2, No. 3, 2007, pp. 101-109.
[20] Ministry of Trade and Industry in Jordan, 2010. http://www.mit.gov.jo
[21] Ministry of Industry and Trade in Jordan (MIT), 2012. http://www.mit.gov.jo
[22] M. Al-Ibraheem and H. Tahat, “Regulating Electronic Contracting in Jordan,” 21st BILETA Conference; Globalization and Harmonization in Technology Law, Malta, 6-7 April 2006, pp. 6-19.
[23] Arab Advisor Group, 2012.www.arabadvisors.com
[24] Arab Advisor Press Room, 2012. http://www.arabadvisors.com
[25] N. Black, A. Lockett, H. Winklhofer and C. Ennew, “The Adoption of Internet Financial Services: A Qualitative Study,” International Journal of Retail and Distribution Management, Vol. 29, No. 8, 2000, pp. 390-398. doi:10.1108/09590550110397033
[26] S. Blythe, “Digital Signature Law of the United Nation. European Union, United Kingdom and United state: Promotion of Growth in E-commerce with Enhanced Security,” Richmond Journal of Law and Technology, Vol. XI, No. 2, 2005, pp. 1-20.
[27] Business Integration Technology, Inc., “Why Supply Chain Executives Should Care about B2B Integration Technology,” 2012. http://businessintegrationtechnology.com/PDF/WhyB2BiMatters.pdf
[28] Business Integration Technology Inc., 2012. http://www.businessintegrationtechnology.com
[29] J. Caldow, “The Quest for Electronic Government: A Defining Vision,” Institute for Electronic Government, IBM Corporation, Washington DC, 1999.
[30] C. Easttom, “Computer Security Fundamentals,” Pearson Prentice Hall, Michigan, 2007.
[31] C. Iacovou, I. Benbasat and A. Dexter, “‘Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology,” MIS Quarterly, Vol. 19, No. 4, 1995, pp. 465-481. doi:10.2307/249629
[32] M. El-Nawawy and M. Ismail, “Overcoming Deterrents and Impediments to Electronic Commerce in Light of Globalization,” Proceedings of the 9th Annual Conference of the Internet Society, INET 99, San Jose, 22-25 June 1999, pp. 9-18.
[33] ESCWA, “National profile of the Information Society in Jordan,” United Nation Report, 2007, pp. 1-16.
[34] ESCWA, “Development of E-Commerce Sectors in the Arab Region,” World Summit on the Information Society (WSIS), Beirut, 4-6 February 2003, pp. 53-65.
[35] J. Fraser, “The Strategic Challenge of Electronic Commerce,” Supply Chain Management, Vol. 5, No. 1, 2000, p. 7. doi:10.1108/13598540010312936
[36] M. Greenstein and T. Feinman, “Electronic Commerce; Security, Risk Management and Control,” McGraw-Hill, Boston, 2000.
[37] R. Gulati, “Business-to-Business E-Commerce: Past, Present, and Future,” 2012.
[38] E. M. Heffes, “Refining the Rules of Commerce,” Financial Executive, Vol. 17, No. 3, 2001, pp. 3-18.
[39] E. Kritzingera and E. Smith, “Information Security Management: A Previous Term Information Security Retrieval and Awareness Model for Industry,” Computers & Security, June 2008
[40] T. Layton, “Guide to Information Security,” CRC Press, Boca Raton, 2006.
[41] Ministry of Information and Communication Technologies in Jordan (MICT), “The E-Readiness Assessment of the Hashemite Kingdom of Jordan,” 2011. http://www.moit.gov.jo
[42] Organization for Economic Cooperation and Development OECD, “Economic Growth in the OECD Area,” OECD Working Paper, 2000.
[43] Organization for Economic Cooperation and Development OECD, “E-Commerce: Impacts and Policy Challenges,” Organization for Economic Cooperation and Development (OECD), Vol. 67, No. 193, 2000, pp. 193-202.
[44] Organization for Economic Cooperation and Development OECD, “The Economic and Social Impacts of electronic Commerce,” Preliminary Finding and Research Agenda, 1999.
[45] Organization for Economic Cooperation and Development (OECD), “E-Commerce: Impacts and Policy Challenges,” 2002.
[46] Y. Rezgui and A. Marks, “Information Security Awareness in Higher Education: An Exploratory Study,” Computers and Security, Vol. 27, No. 7, 2007, pp. 241-253.
[47] M. Sahawneh, “E-Commerce and Its Effect on Labor Force” Socio-economic Impact of Persistent Organic Pollutants,” Royal Scientific Society, 2005.
[48] M. Sahawneh, “E-Commerce: The Jordanian Experience, Industrial Studies Department,” Royal Scientific Society, 2002.
[49] R. Schperberg and R. Kenneth, “Cybercrime,” ISACA, Rolling Meadows, 2005.
[50] P. Chanu, “Determinants of Small Business EDI Adoption: An Empirical Investigation,” Journal of Organisational Computing and Electronic Commerce, Vol. 11, No. 4, 2001, pp. 229-252. doi:10.1207/S15327744JOCE1104_02

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.