The Uptake of E-Commerce Services In Johannesburg

Yohannes Bekele Worku, Mammo Muchie


The aim of study was to assess the pace of adoption and quality of E-Commerce services that are provided to customers in Johannesburg, South Africa.  Data was collected from 180 E-Commerce enterprises operating in Fourways, Eastgate and Rosebank. A one-way multivariate analysis of variance model (MANOVA) with maximum likelihood estimation was used for comparing the three business districts of Johannesburg with regards to the average cost of services and the average length of time required for providing services to customers.  The adequacy of E-Commerce services provided to customers was assessed based on criteria defined by Bonson et al. [1]. The study showed that there was no significant difference among the three business districts of Johannesburg with regards to both variables of comparison (cost and time). The results showed that the pace of adoption of E-Commerce services in the three business districts was significantly influenced by a combination of technological and organisational factors. The study has shown that E-Commerce enterprises in Johannesburg need assistance from the City of Johannesburg in areas related to infrastructure, economic incentives, skills-based training, and monitoring and evaluation.


Fire Detection; Early Warning; “Incipient” Fire Stage; Probabilistic Risk Assessment; Reactor Regulation.


Bonson, E., Royo, S., and M. Ratkai. “Facebook practices in Western European municipalities: An empirical analysis of activity and citizens’ engagement.” Administration & Society 49, no. 3 (2017): 320-347. doi: 10.1177/0095399714544945.

Biener, C., Eling, M., and J. H. Wirfs. “Insurability of cyber risk: An empirical analysis.” The Geneva Papers on Risk and Insurance-Issues and Practice.” 40, no.1 (2015): 131-158.

Gheyas, I. A., and A. E. Abdallah. “Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis.” Big Data Analytics 1, no. 1 (2016): 6. doi: 10.1186/s41044-016-0006-0.

Kitch, E. W. “The law and economics of rights in valuable information. In Who Owns Knowledge?” (pp. 35-76). New York: Routledge.

Soomro, Z. A., Shah, M.H., and Ahmed, J. “Information security management needs more holistic approach: A literature review.” International Journal of Information Management 36, no. 2 (2016): 215-225. doi: 10.1016/j.ijinfomgt.2015.11.009.

Gross, M.L., D. Canetti, and D. R. Vashdi. The psychological effects of cyber terrorism. Bulletin of the Atomic Scientists 72 no. 5 (2016): 284-291.

Wurm, Jacob, Yier Jin, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, and Mark Tehranipoor. “Introduction to Cyber-Physical System Security: A Cross-Layer Perspective.” IEEE Transactions on Multi-Scale Computing Systems 3, no. 3 (July 1, 2017): 215–227. doi:10.1109/tmscs.2016.2569446.

Drahos, P., and J. Braithwaite. “Information feudalism: Who owns the knowledge economy.” New York: Routledge (2017).

Zingales, L. “Presidential address: Does finance benefit society?” The Journal of Finance 70, no. 4 (2015): 1327-1363. doi: 10.1111/jofi.12295.

Chatterjee, S., and A. S. Hadi. Regression analysis by example. New York: John Wiley & Sons (2015).

Cavusgil, S.T., G. Knight, J. R. Riesenberger, H. G. Rammal, and E. L. Rose. “International business.” Sydney: Pearson Australia (2014).

Howe, C., H. Suich, B. Vira, and G. M. Mace, G.M. “Creating win-wins from trade-offs? Ecosystem services for human well-being: a meta-analysis of ecosystem service trade-offs and synergies in the real world.” Global Environmental Change, 28, no. 1 (2014): 263-275. doi: 10.1016/j.gloenvcha.2014.07.005.

Cavelty, M.D., and V. Mauer. “Power and security in the information age: Investigating the role of the state in cyberspace.” Routledge (2016).

Li, Zhiming, Konda Gokuldoss Pradeep, Yun Deng, Dierk Raabe, and Cemal Cem Tasan. “Metastable High-Entropy Dual-Phase Alloys Overcome the Strength–ductility Trade-Off.” Nature 534, no. 7606 (May 18, 2016): 227–230. doi:10.1038/nature17981.

Li, Beibei, Rongxing Lu, Wei Wang, and Kim-Kwang Raymond Choo. “Distributed Host-Based Collaborative Detection for False Data Injection Attacks in Smart Grid Cyber-Physical System.” Journal of Parallel and Distributed Computing 103 (May 2017): 32–41. doi:10.1016/j.jpdc.2016.12.012.

Laudon, K.C., and J. P. Laudon. “Management information system.” London: Pearson Education (2016).

Holt, T.J., O. Smirnova, and Y. T. Chua. “Exploring and estimating the revenues and profits of participants in stolen data markets.” Deviant Behavior, 37, no. 4 (2016): 353-367. doi: 10.1080/17440572.2016.1197123

Levy, P. S., and S. Lemeshow. “Sampling of populations: Methods and applications.” New York: John Wiley & Sons (2013).

Louwers, T.J., R. J. Ramsay, D. H. Sinason, J. R. Strawser, and J. C. Thibodeau. “Auditing & assurance services.” New York: McGraw-Hill Education (2015).

Mangiaracina, Riccardo, Gino Marchet, Sara Perotti, and Angela Tumino. “A Review of the Environmental Implications of B2C e-Commerce: a Logistics Perspective.” International Journal of Physical Distribution & Logistics Management 45, no. 6 (July 6, 2015): 565–591. doi:10.1108/ijpdlm-06-2014-0133.

Marz, N., and J. Warren. “Big Data: Principles and best practices of scalable real-time data systems.” New York: Manning Publications (2015).

Newcomer, K. E., H. P. Hatry, and J. S. Wholey. “Handbook of practical program evaluation.” New York: John Wiley & Sons (2015).

Antonio, Amy, and David Tuffley. “The Gender Digital Divide in Developing Countries.” Future Internet 6, no. 4 (October 31, 2014): 673–687. doi:10.3390/fi6040673.

Ngai, E.W., S. S. Tao, and K. K. Moon. Social media research: Theories, constructs, and conceptual frameworks. International Journal of Information Management 35, no. 1 (2015): 33-44. doi: 10.1016/j.ijinfomgt.2014.09.004.

O’Hara, Maureen. “High Frequency Market Microstructure.” Journal of Financial Economics 116, no. 2 (May 2015): 257–270. doi:10.1016/j.jfineco.2015.01.003.

Pawlowsky-Glahn, Vera, Juan José Egozcue, and Raimon Tolosana-Delgado. “Modelling and Analysis of Compositional Data” (March 9, 2015). doi:10.1002/9781119003144.

Kerber, Wolfgang. “Digital Markets, Data, and Privacy: Competition Law, Consumer Law and Data Protection.” Journal of Intellectual Property Law & Practice (October 15, 2016): jpw150. doi:10.1093/jiplp/jpw150.

Rahurkar, Saurabh, Joshua R. Vest, and Nir Menachemi. “Despite The Spread Of Health Information Exchange, There Is Little Evidence Of Its Impact On Cost, Use, And Quality Of Care.” Health Affairs 34, no. 3 (March 2015): 477–483. doi:10.1377/hlthaff.2014.0729.

Michie, Susan, Lucy Yardley, Robert West, Kevin Patrick, and Felix Greaves. “Developing and Evaluating Digital Interventions to Promote Behavior Change in Health and Health Care: Recommendations Resulting From an International Workshop.” Journal of Medical Internet Research 19, no. 6 (June 29, 2017): e232. doi:10.2196/jmir.7126.

Shaikh, A. A., and H. Karjaluoto. “Mobile banking adoption: A literature review.” Telematics and Informatics, 32, no. 1 (2015): 129-142. doi: 10.1016/j.tele.2014.05.003

Skopik, F., G. Settanni, and R. Fiedler. “A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing.” Computers & Security, 60, no. 1 (2016): 154-176. doi: 10.1016/j.cose.2016.04.003.

Gereffi, G. “Global value chains in a post-Washington Consensus world.” Review of international political economy, 21, no. 1 (2014): 9-37. doi: 10.1080/09692290.2012.756414.

Statistics South Africa. “Mid-year population estimates for the year 2016”. Pretoria: Statistics South Africa.

Krinsky, C. “The Ashgate research companion to moral panics.” New York: Routledge (2016).

Jokar, P., N. Arianpoo, and V. C. Leung. “Electricity Theft Detection in AMI Using Customers' Consumption Patterns.” IEEE Trans. Smart Grid 7, no. 1 (2016): 216-226. doi: 10.1049/oap-cired.2017.0500.

Mackey, T.K., and G. Nayyar. “Digital danger: a review of the global public health, patient safety and cybersecurity threats posed by illicit online pharmacies.” British Medical Bulletin 118, no. 1 (2016): 110-126. doi: 10.1093/bmb/ldw016.

Wamba, S.F., S. Akter, A. Edwards, G. Chopin, and D. Gnanzou. “How ‘big data’can make big impact: Findings from a systematic review and a longitudinal case study.” International Journal of Production Economics 165, no. 1 (2015): 234-246. doi: 10.1016/j.ijpe.2014.12.031.

Van Ouytsel, J., K. Ponnet, and M. Walrave. “Cyber dating abuse victimization among secondary school students from a lifestyle-routine activities theory perspective.” Journal of Interpersonal Violence 33, no. 17 (2018): 2767-2776. doi: 10.1177/0886260516629390.

World Bank. “World development indicators 2017.” Washington DC: World Bank Publications (2017).

Yaraghi, Niam. “An Empirical Analysis of the Financial Benefits of Health Information Exchange in Emergency Departments.” Journal of the American Medical Informatics Association (June 27, 2015): ocv068. doi:10.1093/jamia/ocv068.

Romanosky, S. “Examining the costs and causes of cyber incidents.” Journal of Cybersecurity, 2, no. 2 (2016): 121-135. doi: 10.1093/cybsec/tyw001.

Full Text: PDF

DOI: 10.28991/cej-2019-03091250


  • There are currently no refbacks.

Copyright (c) 2019 Yohannes Bekele Worku

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.