The Internet-EDI Systems Adoption by Enterprises in Jordan: Descriptive analysis of Adoption, Strategies and Benefits

Abstract

This paper reviewed and explored the current extent of the Internet Electronic Data Interchange systems adoption in Jordan particularly in the SME sector. Also the paper presented the benefits of IEDI adoption and showed the main obstacles facing the SME in Jordan to adopt. This paper used the descriptive and theoretical analysis approaches for collecting and analysis the historical and archived data. The literature showed that Jordan, as a developing country, has achieved forward steps in introducing the Internet to the different sectors of life. The adoption of the electronic tools in business became a governmental target in recent years to make it possible for SMEs to be able to continue to achieve success in their business [1]. Most of Jordanian SMEs have little or no competitive pressure to use I-EDI systems, since most suppliers, customers and other competitors do not seem to promote I-EDI systems. The study concluded that SMEs in Jordan could grow and become larger companies, and supporting national economy. Thus it is very important to develop and grow Jordanian SMEs by doing more research.

Share and Cite:

A. Bakri, "The Internet-EDI Systems Adoption by Enterprises in Jordan: Descriptive analysis of Adoption, Strategies and Benefits," International Journal of Internet and Distributed Systems, Vol. 1 No. 3, 2013, pp. 18-24. doi: 10.4236/ijids.2013.13004.

1. Introduction

Today, information sharing is critical to almost every enterprise. Also the open flow of information gives consumers real choice in conducting their daily affairs [2]. In addition, reference [3,4] asserted that information technology has also radically altered the management of supply chain operations, many business partners who are adjacent on the supply chain can gain from entering inter-organizational information sharing relationships and sharing information that was previously accessible to only one of them. Therefore, information sharing systems allow businesses to determine TPs needs accurately and meet those needs efficiently and permit TPs to be informed rapidly and at low cost of those opportunities in which they are most likely to be interested [5]. Hence, responsible sharing of personal information enhances the productivity of the enterprise’s economy and generates significant benefits for its TPs [6]. In addition, reference [6] mentioned that typically, the development of interorganizational information systems and the sharing of information are mainly targeted at increasing operational efficiency by reducing ordering costs, inventory costs and supply lead times. Many studies have been focusing on studying the information sharing technology issues and estimating the value generated from these arrangements using traditional models of inventory and ordering costs. For example, reference [5,7] mentioned that through information sharing, the ready availability of personal information facilitates a vibrant economy, improves efficiency, reduces costs, creates jobs and provides valuable products and services that people desire within an enterprise. The key goals of information security are to protect the confidentiality, integrity and availability of information. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take [3]. Hence, all forms of information security in an enterprise are driven by “business” needs. This means that security must reflect the enterprise perspective and contribute to rather than hinder the enterprise goals and objectives [8]. All this makes information security a governance and management issue [9]. In addition, the primary business benefit of information security in enterprise is avoiding loss through security failures. These losses usually have an economic dimension, either directly or indirectly. However, good security management presents opportunities for other benefits such as improving operational and administrative efficiency and effectiveness [10]. Nevertheless, without information security, the fortunes of the new economy so dependent on information may be short lived. Furthermore, it is the role of information security to provide the basic requirements to successfully integrate security into IT in a manner that properly addresses real threats. While the goal of information security is to ensure the confidentiality, integrity, and availability of information, the role of information security is essential for the protection of consumers, businesses and governments from the threats caused by the natural advancement of IT [1]. Information security poses considerable risks to information sharing such as B2B systems that are connected through networks. Information security can also result in the systems and the networks running randomly cause loss of information, and information to be corrupted, with the associated loss of productivity and operation efficiency of the enterprise [9]. Cybercrime can be defined as all the criminal offences that are committed with the aid of communication devices in a network such as the Internet, the telephone line or the mobile network [11]. Such acts commonly include unauthorized access to computer files and/or theft of proprietary information, disruption of information housed in a remote computer with viruses, Trojans, worms, logic bombs and denial of service (DOS) attacks, selling illegal objects and substances over Internet, and the theft and forgery of identity [9]. Like retailers and service providers, most websites that produce income could stand to lose money in the event of downtime created by cyber criminals.

As Internet-businesses have increased economic importance to many countries, cybercrime has also become more political and therefore “terror” related [12]. Less common crimes are more institutionally targeted, such as organized assaults on a nation’s network infrastructure; the hacking of government, commercial, or non-profit websites; or attacks on critical infrastructure [11]. On the other hand, the costs that are affected by the cyber-attacks can be extremely high for an organization and the effects of cybercrime can also be felt far from the place where the crime is committed. It can also greatly weaken countries’ economy, thereby stripping it of its resources and to an extent making it more vulnerable to military attack. Cyber terror can also affect many Internet-based businesses.  

2. Definition of Information Sharing and Security

Today, information sharing is critical to almost every organization. Also the open flow of information gives consumers real choice in conducting their daily affairs [2]. In addition, reference [3] asserted that information technology has also radically altered the management of supply chain operations, many business partners who are adjacent on the supply chain can gain from entering inter-organizational information sharing relationships and sharing information that was previously accessible to only one of them. Therefore, Information-sharing practically B2B systems allow businesses to determine trading partners needs accurately and meet those needs efficiently and permits trading partners and suppliers to be informed rapidly and at low cost of those opportunities in which they are most likely to be interested. Hence, responsible sharing of personal information enhances the productivity of the enterprise’s economy and generates significant benefits for its suppliers and partners. In addition, reference [6] said typically, the development of inter-organizational information systems and the sharing of information are mainly targeted at increasing operational efficiency by reducing ordering costs, inventory costs and supply lead times. Many studies have focused on studying the information sharing technology issues and estimating the value generated from these arrangements using traditional models of inventory and ordering costs. Further, reference [7] mentioned which, through information sharing the ready availability of personal information facilitates a vibrant economy, improves efficiency, reduces costs, creates jobs, and provides valuable products and services that people want within an organization. The key goals of information security are to protect the confidentiality, integrity and availability of information. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take. All forms of information security in an enterprise are driven by ‘business’ needs. This means that security must reflect the ‘business’ perspective and contribute to and not hinder ‘business’ goals and objectives. All this makes information security a governance and management issue [9]. In addition, the primary business benefit of information security in enterprise is avoiding loss through security failures. These losses usually have an economic dimension, either directly or indirectly. However, good security management presents opportunities for other benefits such as improved operational and administrative efficiency and effectiveness [10]. Nevertheless, without information security, the fate of the new economy so dependent on information may be short lived. Furthermore, it is the role of Information Security to provide the basic requirements to successfully integrate security into IT in a manner that properly addresses real threats. While the goal of information security to ensure the confidentiality, integrity, and availability of information, the role of information security is essential for the protection of consumers, businesses and governments, from the threats caused by the natural advancement of IT. Information security poses considerable risks to information sharing such as B2B systems that are connected through networks. They can also result in the systems and the networks to run randomly, cause loss of information, and information to be become corrupted, with the significant loss of productivity and operation efficiency for the enterprise [9]. Cybercrime can be defined as the all the criminal offences that are committed with the aid of communication devices in a network such as Internet, the telephone line or the mobile network [11]. Such acts commonly include unauthorized access to computer files and/or theft of proprietary information, disruption of information housed in a remote computer with viruses, Trojans, worms, logic bombs and denial of service (DOS) attacks, selling illegal objects and substances over Internet, and the theft and forgery of identity [9] Like retailers and service providers, most websites that produce income could stand to lose money in the event of downtime created by cyber criminals. As internet-businesses have increasing economic importance to many countries, cybercrime has also become more political and therefore “terror” related [12]. Less common crimes are more institutionally targeted, such as organized assaults on a nation’s network infrastructure; the hacking of government, commercial, or non-profit web-sites; or attacks on critical infrastructure [11]. On the other hand, the costs that are affected by the cyber-attacks can be extremely high for an organization and the effects of cybercrime can also be felt far from the place where the crime is committed. It can also weaken countries’ economy greatly, thereby stripping it of its resources and to an extent where by making it more vulnerable to military attack. Cyber terror can also affect many internet-based businesses.  

3. Internet Electronic Data Interchange (I-EDI) Systems

The Internet Electronic Data Interchange (I-EDI) systems are defined as a direct computer-to-computer communication between enterprises and their TPs. Exchange information of business documents, data and information and structured format that permit data to be processed by the receiver without re-keying [1]. I-EDI system is an illustration of an early adoption of computer networking [1]. I-EDI systems have become a key element of corporate strategies to create value by providing closer linkages among enterprises and TPs [13]. I-EDI systems allow enterprise’s computers to perform electronic transactions such as purchase orders and invoices without human intervention [1]. I-EDI systems were popular among large enterprises because it saved money that otherwise would be spent on processing paper and re-keying data. The continuously accelerated level of I-EDI system proliferation in recent years has prompted a growing number of researchers to examine some of the emerging issues surrounding the adoption, implementation, and diffusion of I-EDI systems. I-EDI systems have become a fundamental part of information management in many organizations over the world. I-EDI systems represent a new way of thinking about an old business function. It is the belief in the ability to modernize and streamline business practices [1]. The complexities of I-EDI systems are centered on the definition of the TPs relationships and the data integration with supporting business application systems. I-EDI systems also provide businesses with the ability to exchange business documents easily between trading partners without the laborious, time consuming, error prone movement and handling of paper [1].

3.1. Benefits of I-EDI Systems

The benefits are I-EDI systems both direct and indirect in nature. Direct benefits include operational cost savings and other internal efficiencies arising from, for example, reduced paperwork, reduced data re-entry, and reduced error rates. Likewise, indirect benefits are opportunities that emerge from the use of I-EDI systems, such as improved customer services and the potential for process reengineering [1]. At the same time, benefits are distinguished into operational benefits and strategic benefits. Operational benefits are related to the internal efficiency of an organization and include reduction of transaction errors, improvement in data accuracy, decreased transaction costs, and faster application processes. Strategic benefits should contribute to tactical and competitive advantages and are related to the impact of I-EDI systems on business processes and business relationships [1]. The following shows some of I-EDI systems benefits:

1)    EDI systems improve operational performance in terms of operation efficiency, cost saving and inventory control [1].

2)    EDI systems improve performance of Supply Chain Management (SCM): Shared and exchange information between supply chains partners can only be fully leveraged through process integration. The main objective of SCM is to integrate all key business activities through the improved relationships at all levels of the supply chain including internal operation, supplier’s networks and distribution channels [14].

3)    EDI systems help to maintain a better relationship with TPs. This improves supplier-enterprise relationships and creates a competitive advantage.

3.2. Practice and Strategies of I-EDI Systems

In theory, I-EDI systems allow all vendors and their customers such as TP to link their computing infrastructures without worrying about the differences in their respective enterprises and systems. However, in practice, I-EDI systems have been difficult to use efficiently or inexpensively in developing countries particularly in SMEs [1]. The core purpose of I-EDI systems in B2B systems transactions is to transport business documents via electronic means in a format that is reusable throughout the entire organization and beyond [1]. The degree of effectiveness of the I-EDI systems operation itself, as well as the internal management information available from its use, will certainly be greater if application systems are up-to-date and efficient. Reverences [1,15,16] divided I-EDI system adoption strategies into three categories:

1)    Strategies not requiring third party involvement using additional front-end software. In these strategies, data exchange is dependent on the front-end software used by TPs.

2)    Strategies requiring third party involvement without using additional front-end software. The third party in this strategy may be a value added network (VAN) wanting to establish a web presence.

3)    Strategies requiring third party involvement using additional front-end software. In this strategy, TPs also require additional front-end-formatting software provided by the third party (I-VANS).

4. SMEs in Jordan

Most of the SMEs in Jordan are run as family enterprises [17,18]. Jordanian SMEs are mainly directed to making small types of goods rather than having a strong industrial capacity in local, regional, and global markets. This eventually impedes these enterprises to expand the scope of their products and services to local and global markets. In Jordan, Department of Statistics (DOS) classifies an enterprise with less than five employees as a small enterprise, while those with 5 to 19 employees are classified as medium enterprises [18,19]. The following

Table 1 provides the economic sectors in Jordan and their contributions to GDP.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] A. Al-Bakri, “The Adoption of B2B by SME in Amman and the Perceptions of Its Influence on Their Performance and Efficiency,” PhD Thesis (Non-Published Thesis), University of Southern Queensland, Toowoomba, 2009.
[2] T. R. Peltier, “Information Security Risk Analysis,” CRC Press, Boca Raton, 2001.
[3] H. Rank and B. Schmitt, “The Challenge of Information Security,” Military Technology, Vol. 29, No. 11, 2005, pp. 8-50.
[4] T. Thanasankit, “E-Commerce and Cultural Values,” Idea Group Inc., New York, 2002. doi:10.4018/978-1-59140-056-1
[5] UNCTAD, “Building Confidence: E-Commerce and Development Report,” 2012. http://www.unece.org/trade/untdid/welcome.htm
[6] M. Gerber and R. Solms, “Information Security Requirements—Interpreting the Legal Aspects,” Computers & Security, Vol. 27, No. 5-6, 2008, pp. 124-135. doi:10.1016/j.cose.2008.07.009
[7] D. Kim, S. Cavusgil and R. Calantone, “Information System Innovations and Supply Chain Management: Channel Relationships and Firm Performance,” Journal of the Academy of Marketing Science, Vol. 34, No. 1, 2006, pp. 40-54.
[8] V. Zeithaml, A. Parasuraman and A. Malhotra, “Service Quality Delivery through Web Sites: A critical Review of Extant Knowledge,” Journal of the Academy of Marketing Science, Vol. 30, No.4, 2003, pp. 362-375.
[9] K. Hausken, “Information Sharing among Firms and Cyber-Attacks,” Journal of Accounting and Public Policy, Vol. 26, No. 6, 2007, pp. 639-688. doi:10.1016/j.jaccpubpol.2007.10.001
[10] W. Titi, “The Impact of Adoption Electronic Commerce in Small to Medium Enterprises Jordanian Companies,” The 1st International Conference on E-Business and E-Learning, Jordan, 24-25 May 2005, pp.159-178.
[11] M. Stamp, “Information Security,” John Wiley & Sons, New York, 2005. doi:10.1002/0471744190
[12] M. Warren and W. Hutchinson, “Cyber-Attacks Against Supply Chain Management Systems: A Sort Note,” International Journal of Physical Distribution & Logistics Management, Vol. 30, No. 7-8, 2002, pp. 710-716. doi:10.1108/09600030010346521
[13] C. Steinfield and P. Whitter, “Community level Socio-Economic Impacts of Electronic commerce,” Journal of Computer Mediated Communication, Vol. 5, No. 2, 1999, pp. 714-719.
[14] J. Westby, “International Guide to Combating Cybercrime,” American Bar Association, USA, 2003.
[15] E. Abu Zaid, “Attracting e-Commerce. First GCC E-Commerce Conference, UAE,” 2005. www.kenzay-traning.com
[16] V. Leopoulos, K. Kirytopoulos and D. Voulgaridou, “the benefits of e-commerce: a case study of the Greek Para-pharmaceutical industry,” National Technical University of Athens, Athens, 2006.
[17] Abu-Ghazaleh and C. Consulting, “Market Brief on Telecommunications Sector in Jordan,” 2009. http://www.commercecan.ic.gc.ca
[18] Department of Statistics in Jordan (DOS), Census of Enterprises, 2011. http://www.dos.gov.jo
[19] A. Abu-Samaha and Y. Abdel Samad, “Challenges to the Jordanian Electronic Government Initiative,” Journal of Business Systems, Governance and Ethics, Vol. 2, No. 3, 2007, pp. 101-109.
[20] Ministry of Trade and Industry in Jordan, 2010. http://www.mit.gov.jo
[21] Ministry of Industry and Trade in Jordan (MIT), 2012. http://www.mit.gov.jo
[22] M. Al-Ibraheem and H. Tahat, “Regulating Electronic Contracting in Jordan,” 21st BILETA Conference; Globalization and Harmonization in Technology Law, Malta, 6-7 April 2006, pp. 6-19.
[23] Arab Advisor Group, 2012.www.arabadvisors.com
[24] Arab Advisor Press Room, 2012. http://www.arabadvisors.com
[25] N. Black, A. Lockett, H. Winklhofer and C. Ennew, “The Adoption of Internet Financial Services: A Qualitative Study,” International Journal of Retail and Distribution Management, Vol. 29, No. 8, 2000, pp. 390-398. doi:10.1108/09590550110397033
[26] S. Blythe, “Digital Signature Law of the United Nation. European Union, United Kingdom and United state: Promotion of Growth in E-commerce with Enhanced Security,” Richmond Journal of Law and Technology, Vol. XI, No. 2, 2005, pp. 1-20.
[27] Business Integration Technology, Inc., “Why Supply Chain Executives Should Care about B2B Integration Technology,” 2012. http://businessintegrationtechnology.com/PDF/WhyB2BiMatters.pdf
[28] Business Integration Technology Inc., 2012. http://www.businessintegrationtechnology.com
[29] J. Caldow, “The Quest for Electronic Government: A Defining Vision,” Institute for Electronic Government, IBM Corporation, Washington DC, 1999.
[30] C. Easttom, “Computer Security Fundamentals,” Pearson Prentice Hall, Michigan, 2007.
[31] C. Iacovou, I. Benbasat and A. Dexter, “‘Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology,” MIS Quarterly, Vol. 19, No. 4, 1995, pp. 465-481. doi:10.2307/249629
[32] M. El-Nawawy and M. Ismail, “Overcoming Deterrents and Impediments to Electronic Commerce in Light of Globalization,” Proceedings of the 9th Annual Conference of the Internet Society, INET 99, San Jose, 22-25 June 1999, pp. 9-18.
[33] ESCWA, “National profile of the Information Society in Jordan,” United Nation Report, 2007, pp. 1-16.
[34] ESCWA, “Development of E-Commerce Sectors in the Arab Region,” World Summit on the Information Society (WSIS), Beirut, 4-6 February 2003, pp. 53-65.
[35] J. Fraser, “The Strategic Challenge of Electronic Commerce,” Supply Chain Management, Vol. 5, No. 1, 2000, p. 7. doi:10.1108/13598540010312936
[36] M. Greenstein and T. Feinman, “Electronic Commerce; Security, Risk Management and Control,” McGraw-Hill, Boston, 2000.
[37] R. Gulati, “Business-to-Business E-Commerce: Past, Present, and Future,” 2012.
[38] E. M. Heffes, “Refining the Rules of Commerce,” Financial Executive, Vol. 17, No. 3, 2001, pp. 3-18.
[39] E. Kritzingera and E. Smith, “Information Security Management: A Previous Term Information Security Retrieval and Awareness Model for Industry,” Computers & Security, June 2008
[40] T. Layton, “Guide to Information Security,” CRC Press, Boca Raton, 2006.
[41] Ministry of Information and Communication Technologies in Jordan (MICT), “The E-Readiness Assessment of the Hashemite Kingdom of Jordan,” 2011. http://www.moit.gov.jo
[42] Organization for Economic Cooperation and Development OECD, “Economic Growth in the OECD Area,” OECD Working Paper, 2000.
[43] Organization for Economic Cooperation and Development OECD, “E-Commerce: Impacts and Policy Challenges,” Organization for Economic Cooperation and Development (OECD), Vol. 67, No. 193, 2000, pp. 193-202.
[44] Organization for Economic Cooperation and Development OECD, “The Economic and Social Impacts of electronic Commerce,” Preliminary Finding and Research Agenda, 1999.
[45] Organization for Economic Cooperation and Development (OECD), “E-Commerce: Impacts and Policy Challenges,” 2002.
[46] Y. Rezgui and A. Marks, “Information Security Awareness in Higher Education: An Exploratory Study,” Computers and Security, Vol. 27, No. 7, 2007, pp. 241-253.
[47] M. Sahawneh, “E-Commerce and Its Effect on Labor Force” Socio-economic Impact of Persistent Organic Pollutants,” Royal Scientific Society, 2005.
[48] M. Sahawneh, “E-Commerce: The Jordanian Experience, Industrial Studies Department,” Royal Scientific Society, 2002.
[49] R. Schperberg and R. Kenneth, “Cybercrime,” ISACA, Rolling Meadows, 2005.
[50] P. Chanu, “Determinants of Small Business EDI Adoption: An Empirical Investigation,” Journal of Organisational Computing and Electronic Commerce, Vol. 11, No. 4, 2001, pp. 229-252. doi:10.1207/S15327744JOCE1104_02

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.