{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:11:28Z","timestamp":1754158288224,"version":"3.41.2"},"reference-count":37,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2001,8,1]],"date-time":"2001-08-01T00:00:00Z","timestamp":996624000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001,8,1]]},"abstract":"<jats:p>During the past two decades, advances in computer technologies combined with telecommunication technologies have led to the development of the Internet and its most popular application, the World Wide Web (WWW). Like many other technologies, the WWW has not been free of problems and challenges. A Delphi technique was utilized to assess a list of issues identified in the existing literature. In addition to this list, the panel of experts who participated in the Delphi study identified other critical issues and eventually ranked them in their order of priority and importance. The critical issue identified provides closer insights into issues affecting the overall utilization and management of Web\u2010enabled technologies, and offers many implications and challenges for businesses, governments and the user community.<\/jats:p>","DOI":"10.1108\/eum0000000005745","type":"journal-article","created":{"date-parts":[[2002,11,18]],"date-time":"2002-11-18T17:23:03Z","timestamp":1037640183000},"page":"208-220","source":"Crossref","is-referenced-by-count":5,"title":["Critical issues of  Web\u2010enabled technologies in modern organizations"],"prefix":"10.1108","volume":"19","author":[{"given":"Mehdi","family":"Khosrow\u2010Pour","sequence":"first","affiliation":[]},{"given":"Nancy","family":"Herman","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031420472243700_B1","unstructured":"Baer, T. (1996), \u201cI want my metadata\u201d, Software Magazine, Vol. 16 No. 8, pp. 53\u201060."},{"key":"key2022031420472243700_B2","doi-asserted-by":"crossref","unstructured":"Berghel, H. (1996), \u201cThe client\u2019s side of the World Wide Web\u201d, Communications of the ACM, Vol. 39 No. 1, pp. 30\u201040.","DOI":"10.1145\/234173.234177"},{"key":"key2022031420472243700_B3","doi-asserted-by":"crossref","unstructured":"Berghel, H. (1997), \u201cE\u2010mail \u2013 the good, the bad, and the ugly\u201d, Communications of the ACM, Vol. 40 No. 4, pp. 11\u201015.","DOI":"10.1145\/248448.248450"},{"key":"key2022031420472243700_B4","doi-asserted-by":"crossref","unstructured":"Berners\u2010Lee, T.J., Caillian and Groff, J.F. (1992), \u201cThe World Wide Web\u201d, Computer Networks & ISDN Systems, Vol. 25 No. 4, pp. 454\u20109.","DOI":"10.1016\/0169-7552(92)90039-S"},{"key":"key2022031420472243700_B5","doi-asserted-by":"crossref","unstructured":"Bhimani, A. (1996), \u201cSecuring the commercial Internet\u201d, Communications of the ACM, Vol. 39 No. 6, pp. 29\u201031.","DOI":"10.1145\/228503.228509"},{"key":"key2022031420472243700_B6","unstructured":"Bird, J. (1996), \u201cUntangling the Web\u201d, Management Today, pp. 68\u201070."},{"key":"key2022031420472243700_B7","unstructured":"Blohm, H. and Steinbuch, K. (1973), Technological Forecasting in Practice, Saxon House\/Lexington Books, Lexington, MA."},{"key":"key2022031420472243700_B8","unstructured":"Bright, J.R. (1972), A Brief Introduction to Technology Forecasting Concepts and Exercises, The Parnaquid Press, Austin, TX."},{"key":"key2022031420472243700_B9","unstructured":"Cetron, M.J. (1969), Technological Forecasting: A Practical Approach, Gordon and Breach Science Publishers, London."},{"key":"key2022031420472243700_B10","unstructured":"Charlesworth, A. (1997), \u201cInternet law and regulation\/law and the information superhighway\u201d, International Review of Law, Computers & Technology, Vol. 11 No. 1, pp. 175\u20109."},{"key":"key2022031420472243700_B11","doi-asserted-by":"crossref","unstructured":"Felton, E.W. (1997), \u201cWebware security\u201d, Communications of the ACM, Vol. 40 No. 4, pp. 130\u201031.","DOI":"10.1145\/248448.257470"},{"key":"key2022031420472243700_B12","doi-asserted-by":"crossref","unstructured":"Foo, S. and Lim, E\u2010P. (1997), \u201cA hypermedia database to manage World\u2010Wide\u2010Web documents\u201d, Information and Management, Vol. 31 No. 5, pp. 235\u201049.","DOI":"10.1016\/S0378-7206(96)01088-9"},{"key":"key2022031420472243700_B13","doi-asserted-by":"crossref","unstructured":"Fox, A., and Brewan, E.A. (1996), \u201cReducing WWW latency and bandwidth requirements by real\u2010time distillation\u201d, Computer Networks & ISDN Systems, Vol. 28 No. 7\u201011, pp. 1445\u201056.","DOI":"10.1016\/0169-7552(96)00027-X"},{"key":"key2022031420472243700_B14","unstructured":"Frook, J.E. (1997), \u201cHelping employees get hip to the Web\u201d, InternetWeek, No. 647, pp. 1\u20104."},{"key":"key2022031420472243700_B15","unstructured":"Gardner, D. (1997), \u201cTop of the news: Web culture clash\u201d, InfoWorld."},{"key":"key2022031420472243700_B16","doi-asserted-by":"crossref","unstructured":"Grimshaw, A.S. (1997), \u201cThe Legion vision of the worldwide virtual computer\u201d, Communications of the ACM, Vol. 40 No. 1, pp. 39\u201045.","DOI":"10.1145\/242857.242867"},{"key":"key2022031420472243700_B17","unstructured":"Hacker, R.C. (1996), \u201cThe real value of the World Wide Web\u201d, Target Marketing, Vol. 19 No. 2, pp. 30\u201032."},{"key":"key2022031420472243700_B18","unstructured":"Higgins, K.J. (1997), \u201cDare to Webify your back office\u201d, InternetWeek, No. 679, pp. 1\u20105."},{"key":"key2022031420472243700_B19","doi-asserted-by":"crossref","unstructured":"Hill, R. (1997), \u201cElectronic commerce, the World Wide Web, Minitel, and EDI\u201d, Information Society, Vol. 13 No. 1, pp. 33\u201041.","DOI":"10.1080\/019722497129269"},{"key":"key2022031420472243700_B20","unstructured":"Hodges, M. (1997), \u201cBuilding a bond of trust\u201d, MIT\u2019s Technology Review, Vol. 100 No. 6, pp. 26\u20107."},{"key":"key2022031420472243700_B21","unstructured":"Jacobs, I.G. (1998), \u201cCompanies get wired for the Web \u2013 Internet VARs are leading their customers down a more viable business path\u201d, VARBusiness, No. 140, pp. 1\u20104."},{"key":"key2022031420472243700_B22","unstructured":"Linstone, H.A. and Turoff, M. (1975), The Delphi Method Techniques and Applications, Addison\u2010Wesley Publishing Company, Reading, MA."},{"key":"key2022031420472243700_B23","doi-asserted-by":"crossref","unstructured":"Liu, C., Arnett, K.P., Capella, L.M., and Beatty, R.C. (1997), \u201cWeb sites of the Fortune 500 companies: facing customers through home pages\u201d, Fortune 500, Information and Management, Vol. 31 No. 6, pp. 335\u201045.","DOI":"10.1016\/S0378-7206(97)00001-3"},{"key":"key2022031420472243700_B24","doi-asserted-by":"crossref","unstructured":"McConnell, J. (1997), \u201cThe next frontier: Web performance tracking\u201d, InternetWeek, Vol. XX No. 693, pp. 1\u20103.","DOI":"10.1007\/BF02589363"},{"key":"key2022031420472243700_B25","unstructured":"Machlis, S. (1998), \u201cMicropayments aren\u2019t just chump change\u201d, Computerworld, Vol. 32 No. 9, pp. 37\u20109."},{"key":"key2022031420472243700_B26","doi-asserted-by":"crossref","unstructured":"Marchiori, M. (1998), \u201cThe limits of Web metadata, and beyond\u201d, Computer Networks & ISDN Systems, Vol. 30 Nos. 1\u20107, pp. 1\u20109.","DOI":"10.1016\/S0169-7552(98)00085-3"},{"key":"key2022031420472243700_B27","doi-asserted-by":"crossref","unstructured":"Meeks, B.N. (1997), \u201cBetter democracy through technology\u201d, Communications of the ACM, Vol. 40 No. 2, pp. 75\u20108.","DOI":"10.1145\/253671.253712"},{"key":"key2022031420472243700_B28","unstructured":"Misic, M. (1994), \u201cKeys to success with the Internet\u201d, Journal of Systems Management, Vol. 45 No. 11, pp. 6\u201010."},{"key":"key2022031420472243700_B29","unstructured":"Phillips, J.T Jr (1995), \u201cMetadata \u2013 information about electronic records\u201d, Records Management Quarterly, Vol. 29 No. 4, pp. 52\u20105."},{"key":"key2022031420472243700_B30","doi-asserted-by":"crossref","unstructured":"Pitkow, J.E. (1996), \u201cEmerging trends in the WWW user population\u201d, Communications of the ACM, Vol. 39 No. 6, pp. 106\u201008.","DOI":"10.1145\/228503.228525"},{"key":"key2022031420472243700_B31","unstructured":"Prawitt, D.F. Romney, B. and Marshall, (1997), \u201cEmerging business technologies (list of new technologies and risks related to them)\u201d, Internal Audit, Vol. 54 No. 1, pp. 24\u201032."},{"key":"key2022031420472243700_B32","unstructured":"Presti, K. (1996), \u201cCorporate intranet growth puts new spin on World Wide Web\u201d, Computer Reseller News."},{"key":"key2022031420472243700_B33","unstructured":"Rose, L. (1996), \u201cBefore you advertise on the Net \u2013 check the international marketing laws\u201d, Bank Marketing, Vol. 28 No. 5, pp. 40\u201042."},{"key":"key2022031420472243700_B34","unstructured":"Roush, W. (1995), \u201cSpinning a better Web\u201d, Technology Review, Vol. 98 No. 3, pp. 11\u201013."},{"key":"key2022031420472243700_B35","unstructured":"Sampson, S. (1997), \u201cWild Wild Web: legal exposure on the Internet\u201d, Software Magazine, Vol. 17 No. 13, pp. 75\u20108."},{"key":"key2022031420472243700_B36","unstructured":"Walsh, J. (1998), \u201cVector graphics gets major vendor boost\u201d, InfoWorld, Vol. 20 No. 16, pp. 59\u201060."},{"key":"key2022031420472243700_B37","unstructured":"Weston, R. (1996), \u201cIt\u2019s taxing to untangle Web commerce laws\u201d, Computerworld, Vol. 30 No. 43, p. 28."}],"container-title":["The Electronic Library"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/EUM0000000005745","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EUM0000000005745\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EUM0000000005745\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:48:54Z","timestamp":1753404534000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/el\/article\/19\/4\/208-220\/34476"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,8,1]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2001,8,1]]}},"alternative-id":["10.1108\/EUM0000000005745"],"URL":"https:\/\/doi.org\/10.1108\/eum0000000005745","relation":{},"ISSN":["0264-0473"],"issn-type":[{"type":"print","value":"0264-0473"}],"subject":[],"published":{"date-parts":[[2001,8,1]]}}}