Abstract
By working through this chapter, you will be able to:
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
See for the following chapter also Wirtz (2020b).
Bibliography
Abts, D., & Mülder, W. (2017). Anwendungsarchitekturen. In D. Abts, & W. Mülder (Eds.), Grundkurs Wirtschaftsinformatik. Eine kompakte und praxisorientierte Einführung (9th ed., pp. 139–158). Wiesbaden: Vieweg + Teubner.
Adyen. (2018). How the payments industry evolved. Available online at https://www.adyen.com/blog/how-the-payments-industry-evolved, checked on 7/7/2020.
Baltzan, P. (2014). Business driven information systems (4th ed.). New York: McGraw-Hill/Irwin.
Beynon-Davies, P. (2013). eBusiness (2nd ed.). Houndmills, Basingstoke, New York, NY: Palgrave Macmillan.
Cao, B., Liu, J., Tang, M., Zheng, Z., & Wang, G. (2013). Mashup service recommendation based on usage history and service network. International Journal of Web Services Research (IJWSR), 10(4), 82–101.
Chaffey, D. (2009). E-business and E-commerce management (4th ed.). Essex: Prentice Hall; FT Prentice Hall.
Chaffey, D. (2015). Digital business and E-commerce management. Strategy, implementation and practice (6th ed.). Harlow: Pearson Education Limited.
de Vries, A. (2018). Bitcoin’s growing energy problem. Joule, 2(5), 801–805.
Deloitte. (2019). The future of digital payments. Choices to consider for a new ecosystem. Available online at https://www2.deloitte.com/content/dam/Deloitte/sg/Documents/financial-services/sg-fsi-future-of-digital-payments.pdf, checked on 7/9/2020.
Der Digisaurier. (2018). Blockchain-Prinzip. How does blockchain work? Available online at https://www.digisaurier.de/was-zur-hoelle-hat-oekostrom-mit-der-blockchain-zu-tun/https_media-g2crowd-comwp-contentuploads20180123135723blocks-2/, checked on 6/9/2020.
Deutsche Bank. (2020). The future of payments. Part II. Moving to digital wallets and the extinction of plastic cards. Edited by Deutsche Bank Research. Available online at https://www.dbresearch.com/PROD/RPS_EN-PROD/PROD0000000000504508/The_Future_of_Payments_-_Part_II__Moving_to_Digita.pdf, checked on 7/9/2020.
European Central Bank. (1998). Report on electronic money. European Central Bank.
European Commission. (2013). Europäisches Zentrum zur Bekämpfung der Cyberkriminalität: Eröffnung am 11. Januar. Available online at https://ec.europa.eu/commission/presscorner/detail/de/IP_13_13, checked on 6/5/2020.
European Commission. (2018). Tackling online disinformation: A European Approach. Available online at https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018DC0236&from=de, checked on 6/5/2020.
FBI. (2020). Cyber crime. Available online at https://www.fbi.gov/investigate/cyber, checked on 6/5/2020.
Franco, P. (2015). Understanding Bitcoin. Cryptography, Engineering and Economics. Chichester, West Sussex: Wiley (The Wiley Finance Series). Available online at http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=876164
Gelinas, U. J., Sutton, S. G., & Fedorowicz, J. (2004). Business processes and information technology. Mason, OH: Thomson/South-Western.
Herbert, J., & Litchfield, A. (2015). A novel method for decentralised peer-to-peer software license validation using cryptocurrency blockchain technology. In Proceedings of the 38th Australasian Computer Science Conference, pp. 27–35. Available online at http://openrepository.aut.ac.nz/bitstream/handle/10292/10328/CRPITV159Herbert.pdf?sequence=6&isAllowed=y, checked on 6/9/2020.
Hileman, G., & Rauchs, M. (2017). Global cryptocurrency benchmarking study. In Cambridge Centre for Alternative Finance 33.
International Telecommunication Union. (2005). Agenda for the Information Society – Tunis 2005. Available online at https://www.itu.int/net/wsis/outcome/booklet/tunis-agenda_C.html, checked on 6/8/2020.
Jansen, J. (2016). Wie viel Macht überlässt man den Maschinen? Available online at https://blogs.faz.net/netzwirtschaft-blog/2016/07/19/wie-viel-macht-ueberlaesst-man-den-maschinen-3950/, checked on 6/9/2020.
Krcmar, H. (2005). Informationsmanagement (4th ed.). Berlin: Springer.
Krugman, P. (2018). Bubble, Bubble, Fraud and Trouble. Available online at https://www.nytimes.com/2018/01/29/opinion/bitcoin-bubble-fraud.html, checked on 6/9/2020.
Laudon, K. C., Laudon, J. P., & Schoder, D. (2010). Wirtschaftsinformatik. Eine Einführung (2nd ed.). München: Addison-Wesley.
Lippert, S. K., & Govindarajulu, C. (2015). Technological, organizational, and environmental antecedents to web services adoption. Communications of the IIMA, 6(1), 147–160.
Mitchell, D. (2007). In online world, pocket change is not easily spent. The New York Times, 27.
Morris, D. Z. (2017). Bitcoin hits a new record high, but stops short of $20,000. Available online at https://fortune.com/2017/12/17/bitcoin-record-high-short-of-20000/, checked on 6/9/2020.
Mündges, S. (2019). Strategien der Europäischen Union gegen Desinformation. Available online at https://www.bpb.de/gesellschaft/digitales/digitaledesinformation/290565/strategien-der-europaeischen-union-gegendesinformation, checked on 6/5/2020.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system, pp. 1–9. Available online at https://bitcoin.org/bitcoin.pdf, checked on 6/9/2020.
Nilson Report. (2020). Global card brands – ranked by purchase transactions. Available online at https://nilsonreport.com/research_featured_chart.php, checked on 06.07.20.
Papazoglou, M., & Ribbers, P. (2006). E-business. Organizational and technical foundations (1st ed.). Chichester: Wiley.
Papazoglou, M., & Ribbers, P. (2011). E-business. Organizational and technical foundations (2nd ed.). Chichester: Wiley.
Satti, R. S., Ejaz, S., & Aslam, S. (2016). Design and implementation of Mashup using WebServices. Universal Journal of Computers and Technology (UJCT), 2(2), 78–82.
Schneider, G. P. (2017). Electronic Commerce (12th ed.). Stamford, CT: Cengage Learning.
Srinivasan, R., Lilien, G. L., & Rangaswamy, A. (2002). Technological opportunism and radical technology adoption: An application to e-business. Journal of Marketing, 66(3), 47–60.
Statista. (2020c). FinTech report 2020. Statista digital market outlook. Edited by Statista. Available online at https://de.statista.com/statistik/studie/id/44591/dokument/fintech-report/, checked on 7/8/2020.
Turban, E., & Sipior, J. C. (2015). Information technology for management. Digital strategies for insight, action, and sustainable performance (10th ed.). Hoboken, NJ: Wiley.
Turban, E., Volonino, L., & Wood, G. R. (2013). Information technology for management. Advancing sustainable, profitable business growth, 9th edition. With assistance of Janice C. Sipior (9th ed.). Hoboken, N.J: Wiley.
U.S. Department of State. (2020). Intellectual property enforcement. Available online at https://www.state.gov/intellectual-property-enforcement/, checked on 6/5/2020.
U.S. President. (2019). Executive order on maintaining American leadership in artificial intelligence. Available online at https://www.whitehouse.gov/presidential-actions/executive-order-maintaining-american-leadership-artificial-intelligence/, checked on 6/5/2020.
von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, 97–102.
Vought, R. T. (2019). Guidance for regulation of artificial intelligence applications. Available online at https://www.whitehouse.gov/wp-content/uploads/2020/01/Draft-OMB-Memo-on-Regulation-of-AI-1-7-19.pdf, checked on 6/5/2020.
W3Techs. (2016). Usage of server-side programming languages for websites. Available online at http://w3techs.com/technologies/overview/programming_language/all, checked on 12/14/2016.
Wirtz, B. W. (2013a). Electronic business (4th ed.). Wiesbaden: Gabler.
Wirtz, B. W. (2016b). Electronic business (5th ed.). Wiesbaden: Springer Gabler.
Wirtz, B. W. (2020b). Electronic business (7th ed.). Wiesbaden: Springer Gabler.
Wirtz, B. W., & Weyerer, J. C. (2017a). Cyberangriffe und Datensicherheit in öffentlichen Netzwerken und Dateninfrastrukturen in Deutschland. Verwaltung and Management, 23 (3), pp. 154–159. Available online at https://www.nomos-elibrary.de/10.5771/0947-9856-2017-3-154/cyberangriffe-und-datensicherheit-in-oeffentlichen-netzwerken-und-dateninfrastrukturen-in-deutschland-jahrgang-23-2017-heft-3, checked on 6/9/2020.
Wirtz, B. W., & Weyerer, J. C. (2017b). Cyberterrorism and cyber attacks in the public sector: How public administration copes with digital threats. International Journal of Public Administration, 40(13), 1085–1100. https://doi.org/10.1080/01900692.2016.1242614.
Wirtz, B. W., & Weyerer, J. C. (2019a). Ein integratives KI-Leitlinienmodell für die öffentliche Verwaltung. Verwaltung and Management, 25(2), 90–95.
Wonglimpiyarat, J. (2004). Strategies of competition in the bank card business: Innovation management in a complex economic environment. Sussex Academic Press.
Working Group on Internet Governance. (2005). Report of the Working Group on Internet Governance. Available online at https://www.wgig.org/docs/, checked on 6/8/2020.
Yue, K., Wang, X. I., & Zhou, A.-Y. (2004). Underlying techniques for Web services: A survey. Journal of Software, 15(3), 428–442.
Zuckerberg, M. (2019). The Internet needs new rules. Let’s start in these four areas. Available online at https://www.washingtonpost.com/opinions/mark-zuckerberg-the-internet-needs-new-rules-lets-start-in-these-four-areas/2019/03/29/9e6f0504-521a-11e9-a3f7-78b7525a8d5f_story.html, checked on 6/4/2020.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Wirtz, B.W. (2021). Digital Business Technology and Regulation. In: Digital Business and Electronic Commerce. Springer Texts in Business and Economics. Springer, Cham. https://doi.org/10.1007/978-3-030-63482-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-63482-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-63481-0
Online ISBN: 978-3-030-63482-7
eBook Packages: Business and ManagementBusiness and Management (R0)