{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T09:22:40Z","timestamp":1770974560931,"version":"3.50.1"},"reference-count":30,"publisher":"Emerald","issue":"9","license":[{"start":{"date-parts":[[2004,12,1]],"date-time":"2004-12-01T00:00:00Z","timestamp":1101859200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,12,1]]},"abstract":"<jats:p>Ubiquitous commerce or u\u2010commerce is the combination of traditional e\u2010commerce and wireless, television, voice and silent commerce. U\u2010commerce implies ubiquity, universality, uniqueness and unison. It is not a replacement for other types of commerce, but an extension of them. While bringing many benefits, there are challenges and impediments to overcome. Research is needed to assess the value of u\u2010commerce and to address its related issues and challenges. Questions that need to be addressed are: What is the value of u\u2010commerce? What are the ways to maximize the benefits and value of u\u2010commerce? Is it the right technology and what directions need to be considered? What are the privacy issues and risks involved? What about trust and security? What are the strategies for businesses in utilizing and implementing u\u2010commerce? The research issues presented in this article will help create a better understanding of u\u2010commerce and prepare us for challenges facing it.<\/jats:p>","DOI":"10.1108\/02635570410567739","type":"journal-article","created":{"date-parts":[[2004,11,15]],"date-time":"2004-11-15T19:18:09Z","timestamp":1100546289000},"page":"744-755","source":"Crossref","is-referenced-by-count":58,"title":["U\u2010commerce: emerging trends and research issues"],"prefix":"10.1108","volume":"104","author":[{"given":"Holtjona","family":"Galanxhi\u2010Janaqi","sequence":"first","affiliation":[]},{"given":"Fiona","family":"Fui\u2010Hoon Nah","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020520405114300_b1","unstructured":"Accenture (2001), \u201cThe unexpected eEurope\u201d, available at: www.accenture.com\/xdoc\/en\/ideas\/eeurope2001\/Full_Survey.pdf."},{"key":"key2022020520405114300_b2","unstructured":"Accenture (2002), \u201cThe value drivers of uCommerce\u201d, available at: www.accenture.com\/xd\/xd.asp?it=enweb&xd=services%5Ctechnology%5Cvision% 5Cucom_valuedrivers.xml."},{"key":"key2022020520405114300_b3","doi-asserted-by":"crossref","unstructured":"Adams, A. (1999), \u201cUsers\u2019 perception of privacy in multimedia communication\u201d, Proceedings of CHI\u2019 99 Conference, Pittsburgh, PA, 15\u201020 May.","DOI":"10.1145\/632716.632752"},{"key":"key2022020520405114300_b4","doi-asserted-by":"crossref","unstructured":"Bloom, P.N., George, R.M. and Robert, A. (1994), \u201cAvoiding misuse of information technologies: legal and societal considerations\u201d, Journal of Marketing, Vol. 58 No. 1, pp. 98\u2010110.","DOI":"10.1177\/002224299405800108"},{"key":"key2022020520405114300_b5","doi-asserted-by":"crossref","unstructured":"Culnan, M.J. and Armstrong, P.K. (1999), \u201cInformation privacy concerns, procedural fairness, and impersonal trust: an empirical investigation\u201d, Organization Science, Vol. 10 No. 1, pp. 104\u201015.","DOI":"10.1287\/orsc.10.1.104"},{"key":"key2022020520405114300_b6","doi-asserted-by":"crossref","unstructured":"Davis, G.B. (2002), \u201cAnytime\/anyplace computing and the future of knowledge work\u201d, Communications of ACM, Vol. 45 No. 12, pp. 67\u201073.","DOI":"10.1145\/585597.585617"},{"key":"key2022020520405114300_b7","doi-asserted-by":"crossref","unstructured":"Duffy, G. and Dale, B.G. (2002), \u201cE\u2010commerce processes: a study of criticality\u201d, Industrial Management and Data Systems, Vol. 102 No. 8, pp. 432\u201041.","DOI":"10.1108\/02635570210445862"},{"key":"key2022020520405114300_b8","doi-asserted-by":"crossref","unstructured":"Frynas, J.G. (2002), \u201cThe limits of globalization \u2013 legal and political issues in e\u2010commerce\u201d, Management Decision, Vol. 40 No. 9, pp. 871\u201080.","DOI":"10.1108\/00251740210441413"},{"key":"key2022020520405114300_b9","doi-asserted-by":"crossref","unstructured":"Grudin, J. (2002), \u201cGroup dynamics and ubiquitous computing\u201d, Communications of ACM, Vol. 45 No. 12, pp. 74\u20108.","DOI":"10.1145\/585597.585618"},{"key":"key2022020520405114300_b10","unstructured":"Junglas, I.A. and Watson, R.T. (2003a), \u201cU\u2010commerce: a conceptual extension of e\u2010commerce and m\u2010commerce\u201d, Proceedings of the International Conference on Information Systems, Seattle, WA, pp. 667\u201077."},{"key":"key2022020520405114300_b11","unstructured":"Junglas, I.A. and Watson, R.T. (2003b), \u201cU\u2010commerce: an experimental investigation of ubiquity and uniqueness\u201d, Proceedings of the International Conference on Information Systems, Seattle, WA, pp. 414\u201026."},{"key":"key2022020520405114300_b12","doi-asserted-by":"crossref","unstructured":"Kao, D. and Decou, J. (2003), \u201cA strategy\u2010based model for e\u2010commerce planning\u201d, Industrial Management & Data Systems, Vol. 103 No. 4, pp. 238\u201053.","DOI":"10.1108\/02635570310470638"},{"key":"key2022020520405114300_b13","unstructured":"Langheinrich, M. (2002), \u201cPrivacy invasions in ubiquitous computing\u201d, paper presented at Ubicomp\u20192002, G\u00f6teborg."},{"key":"key2022020520405114300_b14","unstructured":"Laudon, K.C. and Traver, C. (2002), E\u2010Commerce: Business, Technology, Society, Addison Wesley, Boston, MA."},{"key":"key2022020520405114300_b15","unstructured":"Lessig, L. (1999), Code and Other Laws of Cyberspace, Basic Books, New York, NY."},{"key":"key2022020520405114300_b16","doi-asserted-by":"crossref","unstructured":"Marx, G.T. (2001), \u201cMurky conceptual waters: the public and the private\u201d, Ethics and Information Technology, Vol. 3 No. 3, pp. 157\u201069.","DOI":"10.1023\/A:1012456832336"},{"key":"key2022020520405114300_b17","doi-asserted-by":"crossref","unstructured":"Murillo, L. (2001), \u201cSupply chain management and the international dissemination of e\u2010commerce\u201d, Industrial Management & Data Systems, Vol. 101 No. 7, pp. 270\u2010377.","DOI":"10.1108\/EUM0000000005825"},{"key":"key2022020520405114300_b18","doi-asserted-by":"crossref","unstructured":"Nah, F. and Davis, S. (2002), \u201cHCI research issues in e\u2010commerce\u201d, Journal of Electronic Commerce Research, Vol. 3 No. 3, pp. 98\u2010113, available at: www.csulb.edu\/web\/journals\/jecr\/issues\/20023\/paper1.pdf.","DOI":"10.1016\/S1567-4223(02)00015-7"},{"key":"key2022020520405114300_b19","doi-asserted-by":"crossref","unstructured":"Nah, F., Siau, K. and Sheng, H. (2004), \u201cThe value of mobile applications: a study on a public utility company\u201d, Communications of the ACM, forthcoming.","DOI":"10.1145\/1042091.1042095"},{"key":"key2022020520405114300_b20","unstructured":"Riaz, U., Osman, J.A., Gorra\u2010Stockman, M.R. and Shoup, C.A. (2002), \u201cWhy telematics is moving into the realm of transforming technologies\u201d, Outlook Point of View, Vol. 2002, January, available at: www.accenture.com\/xdoc\/en\/ideas\/outlook\/pov\/USLtr_telematicsPoV.pdf."},{"key":"key2022020520405114300_b21","unstructured":"Schapp, S. and Cornelius, R.D. (2001), \u201cU\u2010commerce: leading the world of payments\u201d, White Paper, Visa and Accenture, available at: www.corporate.visa.com\/av\/ucomm\/u_whitepaper.pdf."},{"key":"key2022020520405114300_b22","doi-asserted-by":"crossref","unstructured":"Siau, K. and Shen, Z. (2002), \u201cMobile commerce applications in supply chain management\u201d, Journal of Internet Commerce, Vol. 1 No. 3, pp. 3\u201014.","DOI":"10.1300\/J179v01n03_02"},{"key":"key2022020520405114300_b23","doi-asserted-by":"crossref","unstructured":"Siau, K. and Shen, Z. (2003a), \u201cBuilding customer trust in mobile commerce\u201d, Communications of the ACM, Vol. 46 No. 4, pp. 91\u20104.","DOI":"10.1145\/641205.641211"},{"key":"key2022020520405114300_b24","doi-asserted-by":"crossref","unstructured":"Siau, K. and Shen, Z. (2003b), \u201cMobile communications and mobile services\u201d, International Journal of Mobile Communications, Vol. 1 No. 1\/2, pp. 3\u201014.","DOI":"10.1504\/IJMC.2003.002457"},{"key":"key2022020520405114300_b25","doi-asserted-by":"crossref","unstructured":"Siau, K., Lim, E. and Shen, Z. (2001), \u201cMobile commerce: promises, challenges, and research agenda\u201d, Journal of Database Management, Vol. 12 No. 3, pp. 4\u201013.","DOI":"10.4018\/jdm.2001070101"},{"key":"key2022020520405114300_b26","unstructured":"Siau, K., Nah, F. and Sheng, H. (2003a), \u201cValues of mobile applications to end\u2010users\u201d, European Research Consortium for Informatics and Mathematics (ERCIM) News, Vol. 54, pp. 50\u20101."},{"key":"key2022020520405114300_b27","doi-asserted-by":"crossref","unstructured":"Siau, K., Sheng, H. and Nah, F. (2003b), \u201cDevelopment of a framework for trust in mobile commerce\u201d, Proceedings of the 2nd Annual Workshop on HCI Research in MIS, Seattle, WA, pp. 85\u20109.","DOI":"10.1504\/IJEB.2004.005143"},{"key":"key2022020520405114300_b28","doi-asserted-by":"crossref","unstructured":"Siau, K., Sheng, H., Nah, F. and Davis, S. (2004), \u201cA qualitative investigation on consumer trust in mobile commerce\u201d, International Journal of Electronic Business, Vol. 2 No. 3, forthcoming.","DOI":"10.1504\/IJEB.2004.005143"},{"key":"key2022020520405114300_b29","doi-asserted-by":"crossref","unstructured":"Soliman, F. and Youssef, M.A. (2003), \u201cInternet\u2010based e\u2010commerce and its impact on manufacturing and business operations\u201d, Industrial Management & Data Systems, Vol. 103 No. 8, pp. 546\u201052.","DOI":"10.1108\/02635570310497594"},{"key":"key2022020520405114300_b30","doi-asserted-by":"crossref","unstructured":"Watson, R.T., Pitt, L.F., Berthon, P. and Zinkhan, G.M. (2002), \u201cU\u2010commerce: expanding the universe of marketing\u201d, Journal of the Academy of Marketing Science, Vol. 30 No. 4, pp. 329\u201043.","DOI":"10.1177\/009207002236909"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570410567739","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570410567739\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570410567739\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:37:27Z","timestamp":1753400247000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/104\/9\/744-755\/175885"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,12,1]]},"references-count":30,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2004,12,1]]}},"alternative-id":["10.1108\/02635570410567739"],"URL":"https:\/\/doi.org\/10.1108\/02635570410567739","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2004,12,1]]}}}