1. Trang chủ
  2. » Công Nghệ Thông Tin

the internet encyclopedia volume phần 10 pdf

97 222 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 97
Dung lượng 2,1 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Kwok, Hong Kong Polytechnic University, China Wireless Technologies and Wireless Marketing 850 Major Services Are Provided by Factors Influencing Adoption of Wireless Mobile Penetration i

Trang 1

W IRELESS I NTERNET 848

Intersymbol interference (ISI) Distortion of the

re-ceived signal due to temporal spreading and

interfer-ence of the transmitted pulses.

Medium access control (MAC) A protocol for ensuring

that the common wireline/wireless medium is shared

nicely among many potential users.

Node A device on the network, such as a workstation or

a router.

Roaming The ability to establish and maintain wireless

connection outside the home area of the user.

Router A device that performs routing.

Routing The process of moving packets from the source

to the destination in a network.

Routing table A list in the router that matches the

des-tination IP addresses to the physical ports that lead to

the optimal path to the destination.

Short messaging service (SMS) A service available on

many cellular networks that enables near real-time

transmission of short text message among the

sub-scribers.

SIP A signaling protocol used to set up and control

in-teractive applications over the Internet.

Tunneling The process of transporting encapsulated

data packets through foreign networks that may be

us-ing different network protocols.

Voice over IP (VoIP) A service that delivers voice

com-munication over the Internet using IP.

World Wide Web (WWW) A large group of servers on

the Internet that uses HTTP to transport files and

doc-uments, often formatted using HTML.

CROSS REFERENCES

See Mobile Commerce; TCP/IP Suite; Voice over Internet

Protocol (IP); Wireless Application Protocol (WAP).

REFERENCES

3GPP TS 23.040 (2002, April) Technical realization of the

short message service (SMS), version 4.6.0.

3GPP TS 23.140 (2002, April) Multimedia messaging

service (MMS); functional description; stage 2, version

4.5.0.

Aboba, B., & Simon, D (1999, October) PPP EAP TLS

authentication protocol (RFC 2716).

Bakre, A., & Badrinath, B (1995, May) I-TCP: Indirect

TCP for mobile hosts In Proceedings of the 15th IEEE

International Conference on Distributed Computing

Sys-tems (pp 136–143) New York: IEEE.,

Balakrishnan, H., Seshan, S., & Katz, R.H (1995,

Decem-ber) Improving reliable transport and handoff

perfor-mance in cellular wireless networks ACM Wireless

Net-works, 1(4), 469–481.

Bender, P., Black, P., Grob, M., Padovani, R.,

Sind-hushayana, N., & Viterbi, A (2000, July) CDMA/HDR:

A bandwidth efficient high speed wireless data service

for nomadic users IEEE Communications Magazine,

38(7), 70–77.

Bingham, J A C (1990, May) Multicarrier modulation

for data transmission: An idea whose time has come.

IEEE Communication Magazine, 28(5), 5–14.

Black, U (1997) ISDN and SS7: Architecture for

digi-tal signaling networks Englewood Cliffs, NJ: Prentice

Hall.

Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., &

Weiss, W (1998, December) An architecture for entiated service (RFC 2475).

differ-Borisov, N., Goldberg, I., & Wagner., D (2001, July) tercepting mobile communications: The insecurity of

In-802.11 In Proceedings of the 7th International ence on Mobile Computing and Networking (pp 180–

Confer-189) New York: ACM SIGMOBILE.

Braden, R., Clark, D., & Shenker, S (1994, July) Integrated services in the Internet architecture: An overview (RFC

1633).

Brady, P T (1971, January) Effects of transmission lay on conversational behavior on echo-free telephone

de-circuits Bell Technical Journal, 50(1), 115–134.

Brewer, E A., Katz, R H., Chawathe, Y., Gribble, S D., Hodes, T., Nguyen, G., et al (1998, October) A network architecture for heterogeneous mobile computing.

IEEE Personal Communications Magazine, 5(5), 8–

24.

Brown, K., & Singh, S (1997, October) M-TCP: TCP for

mobile cellular networks ACM Computer tion Review, 27(5), 19–43.

Communica-Caceres, R., & Iftode, L (1995, June) Improving the performance of reliable transport protocols in mobile

computing environments IEEE Journal on Selected eas in Communications, 13(5), 850–857.

Ar-Cai, J., & Goodman, D J (1997, October) General packet

radio service in GSM IEEE Communications zine, 35(10), 122–131.

Maga-Deering, S., & Hinden, R (1998, December) Internet tocol, version 6 (IPv6) (RFC 2460).

pro-De Vriendt, J., Lain´e, P., Lerouge, C., & Xu, X (2002, April) Mobile network evolution: A revolution on the

move IEEE Communications Magazine, 40(4), 104–

Berners-GSM Association Retrieved April 8, 2003, from http:// www.gsworld.com

Haartsen, J (1998) Bluetooth—The universal radio

inter-face for ad hoc, wireless connectivity Ericsson Review, 75(3), 110–117.

Hedrick, C (1988, June) Routing information protocol

(RFC 1058).

Heijenk, G., Karagiannis, G., Rexhepi, V., & Westberg,

L (2001, September) DiffServ resource management

in IP-based radio access networks Paper presented at

the 4th International Symposium on Wireless Personal Multimedia Communications, Aalborg, Denmark.

Hinden, R (1993, September) Applicability statement for the implementation of classless inter-domain routing (CIDR) (RFC 1517).

Honkasalo, H., Pehkonen, K., Niemi, M T., & Leino, A T (2002, April) WCDMA and WLAN for 3G and beyond.

IEEE Wireless, 9(2), 14–18.

Trang 2

R EFERENCES 849

How to make money on mobile services (2002) Strand

Consult Publications Retrieved May 13, 2003, from http://www.strandreports.com/sw494.asp

Huitema, C (2000) Routing in the Internet (2nd ed.)

En-glewood Cliffs, NJ: Prentice Hall.

Instant messaging more popular than ever at work (n.d.).

Retrieved May 13, 2003, from messangers.com/site/news/im more popular than ever.

http://www.instant-htm Institute of Electrical and Electronics Engineers (1999).

Wireless LAN medium access control (MAC) and cal layer (PHY) specifications, IEEE 802.11.

physi-Institute of Electrical and Electronics Engineers (2001).

IEEE 802.1X—Port based network access control.

ITU-T Recommendation Q.1701 (1999) Framework for

IMT-2000 networks.

Jakes, W C (1993) Microwave mobile communications.

New York: IEEE Press.

Lu, W W (Ed.) (2002, March) Fourth-generation

mo-bile initiatives and technologies IEEE tions Magazine, 40(3), 104–145.

Communica-Lu, W W., & Berezdivin, R (Eds.) (2002, April)

Tech-nologies on fourth generation mobile communications

[Special Issue] IEEE Wireless Communications, 9(2).

Mahonen, P., & Polyzos, G C (2001, December)

Eu-ropean R&D on fourth-generation mobile and

wire-less IP networks IEEE Personal Communications, 8(6),

6–64.

Mathis, M., Mahdavi, J., Floyd, S., & Romanow, A (1996,

October) TCP selective acknowledgement options (RFC

Mouly, M., & Pautet, M B (1992) The GSM system for

mobile communications, Palaiseau, France: Cell & Sys.

Moy, J (1998a) OSPF anatomy of an Internet routing

pro-tocol Reading, MA: Addison-Wesley.

Moy, J (1998b, April) OSPF Version 2 (RFC 2328).

Nielsen/NetRatings First Quarter 2002 Global Internet

Trends report (2002) Retrieved May 9, 2002, from http://www.nielsen-netratings.com/pr/pr 020509 eratings.pdf

Perkins, C (1996, October) IP mobility support (RFP

2002).

Perkins, C (1997) Mobile IP: Design principles and

prac-tice Reading, MA: Addison Wesley.

Postel, J (1980, August) User datagram protocol (RFC

768).

Postel, J (1981a, September) Internet protocol (RFC 791) Postel, J (1981b, September) Transmission control proto- col (RFC 793).

Postel, J., & Reynolds, J (1985, October) File transfer tocol (FTP) (RFC 765).

pro-Raggett, D., Le Hors, A., & Jacobs, I (1999) HTML 4.01 specification, W3C recommendation.

Rekhter, Y., & Li, T (1993, September) An architecture for

IP address allocation with CIDR (RFC 1518).

Rekhter, Y., & Li, T (1994, July) A border gateway protocol

4 (BGP-4) (RFC 1654).

Rosen, E., Viswanathan, A., & Callon, R (2001, January).

Multiprotocol label switching architecture (RFC 3031).

Schulzrinne, H., Casner, S., Frederick, R., & Jacobson, V.

(1996, January) RTP: A transport protocol for real-time applications (RFC 1889).

Simpson, W (1994, July) The point-to-point protocol (PPP) (RFC 1661).

Sklower, K., Lloyd, B., McGregor, G., Carr, D., & Coradetti,

T (1996, August) The PPP multilink protocol (MP)

(RFC 1990).

Telecommunications Industries Association (1991) lular radio-telecommunications intersystem opera- tions, TIA/EIA/IS-41B.

Cel-Telecommunications Industries Association (1993) Mobile-station base station compatibility standard for dual-mode wideband spread spectrum cellular system, IS-95.

Telecommunications Industries Association (1996) 800 MHz TDMA cellular radio interface mobile station base station compatibility, IS-136A.

Telecommunications Industries Association (2001) Physical layer standard for CDMA2000 spread spec- trum systems, TIA/EIA/IS-2000.

Viterbi, A J (1995) CDMA principles of spread spectrum communications Reading, MA: Addison-Wesley Walker, J R (2000, October 27) Unsafe at any key size: An analysis of the WEP encapsulation (802.11-00/

362).

Wireless World Research Forum (2001, December) The book of visions 2001—Visions of the wireless world, Ver- sion 1.0.

Yacoub, M D (1993) Foundations of mobile radio neering Boca Raton, FL: CRC Press.

engi-Zhang, L., Deering, S., Estrin, D., Shenker, S., & Zappala,

D (1993, September) RSVP: A new resource

reserva-tion protocol IEEE Network, 7(5), 8–18.

Zorn, G (1999, January) PPP LCP internationalization configuration option (RFC 2484).

Trang 3

Wireless Marketing

Pamela M H Kwok, Hong Kong Polytechnic University, China

Wireless Technologies and Wireless Marketing 850

Major Services Are Provided by

Factors Influencing Adoption of Wireless

Mobile Penetration in the United States

Marketing Opportunities and Wireless

Will Wireless (or Mobile) Substitute

What Industries Benefit Most From

What Must Marketers Do to Be a Successful

Merits of Reconfiguring the Value Chain 854

Key Impact of Mobile Number Portability

(MNP) or Wireless Number Portability

Brand Community and Customers’ Loyalty 854

Consumer Decision-Making Process

Real-Time Impacts of the Wireless Internet

Wireless Marketing and Examples of

Wireless technology began its growth in the 1980s and

the rapid development of wireless products such as

mo-bile phone, pagers, and other handheld devices has

trans-formed the ways that people conduct business (Lamont,

2001) Surfing the Web or online services is another way

to get product information and order merchandise from

catalogs Firms can quickly update information at

min-imum “costs” (Boone & Kurtz, 2001, p 25).

During the mid-1990s, the Internet became the main

online direct-marketing channel that allows users to send

e-mail and access public news, product information, and

online shopping activities, among other things (Kotler &

Armstrong, 2001) Nowadays, the development of

high-speed wireless Internet, Web-enabled mobile phone

hand-sets, and other wireless technologies has further sustained

the application direct-marketing or one-to-one marketing

in the wireless business world.

WIRELESS TECHNOLOGIES AND

WIRELESS MARKETING

Advancement in wireless technology such as WAP, iMode,

GSM, GPRS, UMTS, wireless LAN, WCDMA (see Table 1

for details) has enabled marketers to develop more effective and specific marketing (or one-to-one marketing) programs tailored to the needs of individual customers.

To fully utilize these technologies, marketers must learn how to work with their customers to develop long-term mutual benefit relationships Obviously, wireless mar- keting offers new business opportunities and threats to m-marketers Marketers must understand the key dy- namic developments in the wireless world to capitalize on business opportunities at the right time and take proactive strategies to eliminate potential risks.

What Is Wireless Marketing?

Wireless is defined as “radio communications” or a “radio

receiver or transmitter” (Oxford Advanced Learner’s English–Chinese Dictionary, 4th Edition, 1994) Microsoft

Dictionary (1998, available on CD-ROM) defined wireless

as “pertaining to, or characteristics that take place out the use of interconnecting wires or cables, such as

with-by radio, microwave, or infrared.” Marketing is regarded

as “a social and managerial process whereby individuals and groups obtained what they need and want through creating and exchanging products and value with others (Kotler & Armstrong, 2001, p 6) So wireless marketing

850

Trang 4

M OBILE P ENETRATION IN THE U NITED S TATES AND E UROPE 851

Table 1 Summary of Key Wireless Technologies

WAP Wireless application protocol

i-Mode A wireless service launched in Japan in spring 1999 by NTT DoCoMo The

service is accessed by a wireless packet network (PDC-P), and the contents are described in a subset of the hypertext markup language.

GSM Global system for mobile communication

GPRS General packet radio service

UMTS Universal mobile telephone system (third-generation telecommunications

system based on wideband code division multiple access)

Wireless LAN Wireless local access network

WCDMA Wideband code division multiple accessSource: Nokia (http://www.nokia.com)

refers to the exchange process (i.e., buying and selling)

that is carried out by wireless means (e.g., mobile phone,

m-commerce, wireless Internet, or any handheld wireless

devices).

Major Services Are Provided by

Third-Generation Technologies

The advancement in third-generation (3G) technology

brings additional benefits to consumers Multimedia

func-tions of 3G consist of several media components which

allow wireless delivery of video clips, still images, and

music It can be “interactive and distributional” (i.e.,

users may have subscribed to certain distributional

ap-plications, and receive only those subscribed services).

The maximum speeds of GPRS can reach up to

171.2 Kbps faster data transmission speed or download

time So GPRS enables interactive visual display (i.e.,

MMS [multimedia message service]) and enhancing

com-munications quality.

Besides these benefits, 3G technologies deliver the lowing value-added wireless services as well:

fol-1 Internet access (e.g., users can download ring-tones,

music, cartoon characters, real-time events)

2 Location-based application (e.g users can send

promo-tional messages to specific groups of customers)

3 Simple games (e.g., users can play card games and

crosswords)

Factors Influencing Adoption of Wireless

(or Mobile) Internet

The decision-making process is complex, and there is no

perfect formula to explain customers’ purchase behavior.

An industry report published by the International

Tele-communication Union (ITU, 2002a) in September 2002

reported that the adoption of mobile Internet service

might be due to the following factors:

rApplication of mobile multimedia services such as video

clips or still images, video, and music through 3G nologies

tech-rAvailability of Internet-enabled handsets with affordable

in recent years In 2002, the ITU (2002b) indicated the top

20 mobile and Internet markets worldwide (Table 2).

MOBILE PENETRATION IN THE UNITED STATES AND EUROPE

e-Marketer reported the interactive survey conducted by Telephia and Harris (Figure 1) The survey indicates that Greenville had the highest mobile phone’s penetration (i.e., 71%) among 35 major U.S cities by December

2002 It is closely followed by St Louis (69%) Forrester Research study in March 2002 reported that Finland, Norway, Sweden, and Italy have highest mobile penetra- tion (Figure 2).

Marketing Opportunities and Wireless (or Mobile) Internet

An analysis of Internet usage and projections covering more than 50 countries, carried out by Computer Indus- try Almanac in March 2002, reported that there would

be 1.12 billion Internet users worldwide by the end of

2005, and wireless Internet users will reach 48% “The wireless Internet will take off when always-on service and useful content for the small displays of wireless devices are available,” predicts Dr Egil Juliussen, author of the report (Computer Industry Almanac, 2002) Access to the Internet through personal digital assistants (PDAs) with multiple functions (e.g., built-in Internet access, digital camera, music player, and scanner) is expected to increase

in developed countries.

Interestingly, these wireless devices are expected to

be considered the primary devices for Internet access in countries with low Internet penetration rates The report suggests that 41.5% of the worldwide population will use the wireless Internet by 2004 In some developing markets such as the Philippines, the penetration rate of mobile phone services was three times higher than fixed-line penetration at the end of 2001.

Trang 5

W IRELESS M ARKETING 852

Table 2 Top 20 Mobile and Internet Index Rankings,

Worldwide

MOBILE/INTERNET

Note: From the International Telecommunications Union

Mobile/Internet Index included in the Internet for a Mobile Generation

Report The index measures how each economy is performing in terms

of information and communication technologies (ICTs) and captures

how poised the country is to take advantage of future ICT

advancements The index covers 26 variables sorted into three groups:

infrastructure, usage, and market structure These three components

combine for a score between a low of 0 and a high of 100 The table is

taken from the Statistical Annex to the Report, which provides

comprehensive data on network and service development for more

than 200 economies cInternational Telecommunications Union

(ITU), 2002 Reprinted with permission

Richter and Mar (2002, p 128) reported a recent

IDC forecast that the estimated average growth of global

spending on information technology (IT) would be about

10 to 11% between 2002 and 2005 The forecast report

showed that the Asia Pacific region has the highest growth

Figure 1: U.S cities with the highest mobile phone

penetra-tion rates, December 2002 Source: Telephia/Harris

Interac-tive, February 2003 c 2003 eMarketer, Inc.

Figure 2: Mobile phone penetration in selected countries

in Europe, fourth quarter 2001 Source: Forrester Research, March 2002 c 2002 eMarketer, Inc.

potential for IT spending (i.e., 11%) compared with other regions Moreover, according to the forecast, extraordi- nary growth of about 30% is expected in countries such

as India, China, Turkey, Egypt, and the Philippines For example, the penetration of value-added services

of short message service (SMS) is popular and ful in the Philippines Although that country has about

success-10 millions subscribers, success-100 millions SMS messages are sent every day In fact, making e-jokes through SMS has become part of Filipino culture The subscribers enjoy circulating e-jokes among themselves In addi- tion, the second-generation handsets are widely avail- able and supported by a competitive pricing strategy (about 2c/ U.S per SMS message) and a simple billing system (Ritcher & Mar, 2002) SMS is simple to adopt and adaptable for low-bandwidth services (i.e., always online).

E-entertainment (i.e., e-music, e-video, interactive

TV, e-gambling, etc.) has been regarded as the main driver behind wireless technologies The demand for e-entertainment service has led to new business oppor- tunities for hardware manufacturers (e.g., mobile phone and components suppliers), service operators, and soft- ware and network suppliers.

Another emerging market is China, where mobile phone service subscribers are expected to exceed fixed- line subscribers by March 2003 Furthermore, China’s cur- rent 5-year plan indicates that telecom service revenues will increase at twice the rate of the gross domestic product.

This implies the growing importance of wireless net services, particularly in those countries with a low In- ternet penetration rate On the other hand, marketers can make use of this opportunity to develop creative wireless

Trang 6

Inter-M- COMMERCE AND M ARKETING 853

marketing strategies to foster customer relationships and

cultivate new business opportunities—at the right time,

in the right place.

Will Wireless (or Mobile) Substitute

Fixed-Line Internet?

Mobile Internet will not be treated as a substitute for the

fixed-line Internet (ITU, 2002a, p 3), although 3G is

con-sidered a global wireless medium This is because mobile

Internet services can be supported by different wireless

technologies such as wireless local area networks (LANs),

short-range connectivity technologies, fixed broadband

networks, and so on From the user’s perspective, the

fol-lowing issues should be taken into considerations:

rDisplay quality is limited by the screen size of mobile

devices.

rFunctions provided by a keyboard are superior to those

of a mobile device keypad.

rFixed-line broadband has brought speedy connection

benefits at reasonable prices.

Nowadays, the majority of display screens provided

by wireless devices (e.g., PDAs and Web-enabled mobile

phones) are too small for viewing long documents such as

a contract or a book chapter In addition, more and more

consumers in developed countries have adopted fixed-line

broadband Internet access services at home For

exam-ple, going online through fixed-line broadband Internet

services at home has become part of the daily lives of

Hong Kong residents Although mobile messages through

SMS and multimedia messaging service (MMS) provide

“instant” and “interactive” benefits, they may not be able

to substitute for land-line access at this time; nonetheless,

they offer other benefits.

M-COMMERCE AND MARKETING

What Industries Benefit Most From

M-commerce?

A new market space has been created by Web-enabled

mo-bile phone services The interactive features, always-on

connections, and tailor-made contents benefit following

industries (Lamont, 2001):

rM-banking (e.g., online stock trading—making

en-quiries and money transfer transactions): M-banking offers convenient and “instant” benefits through both voice and data communications It allows customers to use their mobile phone services for online stock trading, checking balances, making money transfer, and so on anytime and anywhere Security issues have been a key obstacle for influencing consumers’ adoption of mobile- banking services.

rM-entertainment services (e.g., real-time sports, games,

live-entertainment events, entertainment on Internet and music): The unique benefit of “real-time” enables subscribers to enjoy different types of live-entertain- ment services anytime and anywhere.

M-commerce and Information Services

M-commerce is the word used to describe the tion of Internet services or the purchase of goods via a wireless link (Korhonen, 2001, p 433) M-commerce is expected to grow continuously in the coming years Fur- thermore, “everything available via the fixed Internet will also be available via the wireless Internet” (Korhonen,

consump-2001, pp 434–435) Wireless technologies allow speedy and real-time data transmission benefits As a result, information services in m-commerce may apply to the following:

1 Real-time broadcasting services (e.g., on television, radio)

2 Location-based advertisement (e.g., a list of restaurants offering special discounts in a particular location tar- geting specific customers); it is suggested that the list should cover only those restaurants located within half

a kilometer of the location of the handset

3 Purchase of consumer goods through mobile phone handsets

4 Paying for parking through SMS notices (e.g., sending reminders)

5 Conducting transactions with the parking meter ugh Bluetooth technology

thro-Database Marketing in M-commerce

Database marketing can be applied to m-commerce in the following areas (adapted from Kotler & Armstrong, 2001,

p 626):

1 Identify business prospects: Information obtained from enquiries (e.g., through counter services, the In- ternet, e-mail, or mobile phone) and business reply cards enable companies to identify potential customers

as well as business opportunities

2 Deciding which customers should receive a particular offer: Companies can tailor an offer (e.g., sending an e-coupon to a customer through mobile phone) accord- ing to the customer’s preferences and needs.

3 Deepening customer loyalty: Companies can make use

of database information to identify customers’ interest

by discovering their preferences and purchasing terns Furthermore, marketers can please customers

pat-by sending small gifts on special days For example,

a company could send an SMS birthday greeting, a birthday ring-tone download, or a discount e-voucher through mobile phone services before or on the cus- tomer’s birthday.

4 Reactivating customer purchases: A database enables marketers to stimulate sales from potential customers such as replacement of a mobile phone handset, up- grading of a service plan, or purchase of a package or

of complementary mobile phone products or services.

What Must Marketers Do to Be

a Successful M-marketer?

Lamont (2001) proposed several criteria (Table 3) for being a successful m-marketer In sum, m-commerce

Trang 7

W IRELESS M ARKETING 854

Table 3 Criteria for Being a Successful M-marketer

M-MARKETING

Product Introduce miniature information appliances with unique interactive content to

m-commerce customers Price Offer both commodity and higher value for money as marketing managers divide

m-commerce customers into those who do virtually everything online and those who prefer personal services from telecom, content, and financial service providers.

Promotion Provide customers with value-added intangible product attributes that are included

as part of their smart handheld devices For example, e-discount couples and free ring tone downloads

Segmentation Divide like groups of people across national frontiers into those who have the

income, are the correct age, live in the right neighborhoods, and belong to modernizing ethnic groups as candidates for the purchase of miniature information appliances, third-generation telecom services, and interactive Internet content.

Targeting Assemble smaller like groups of people who are bound together by profession,

skills, or personal tastes, habits, or values.

Positioning Match possible online Internet products with probable customers; the former offers

the latter enhanced customer relationships to try out m-commerce and the mobile Internet.

From Conquering the Wireless World—the Age of M-Commerce, by Douglas Lamont, p 279 Oxford, UK: Capstone, 2001.

c

 Captsone Publishing Limited (A Wiley Company) UK, 2001 Reprinted with permission.

operators must offer unique, personalized services to their

customers that offer value for the money More important,

m-commerce requires marketers to adopt a proactive

ap-proach and be sensitive to their marketing environment to

pursue new business opportunities in the changing

wire-less world M-marketers have to recognize that the

prod-uct life cycle of portable wireless devices (e.g., PDAs and

mobile phone handsets) is much shorter than it is for other

consumer durables in technology sector.

Merits of Reconfiguring the Value Chain

The term “wireless world” implies global business

per-spectives and death of physical distance, and it offers

con-venience benefits to the services subscribers “Businesses

now have to compete on the basis that the world is a

sin-gle market Under such circumstances, the two keywords

that are expected to lead corporations to a stable growth

are “efficiency” and “creativity” (Richter & Mar, 2002,

pp.142–143) Consequently, marketers need to “create

new value through the wireless Internet services (Lamont,

2001, p 55) Lamont summarized three merits of

recon-figuring the value chain:

1 Firms can recognize and identify decision

opportuni-ties across the industrial world for wireless telecom

services.

2 Firms can create better alternatives for making good

decisions either through alliances and partnerships or

through direct investments (or both).

3 Firms can establish a set of competitive principles for

the firm as they seek to conquer the wireless world in

the age of m-commerce.

WIRELESS CONSUMER BEHAVIOR

Key Impact of Mobile Number Portability (MNP) or Wireless Number Portability (WNP) on Customer Loyalty

The policies of MNP or WNP allow subscribers to carry their existing mobile telephone numbers to other network service providers It enables subscribers to switch service provider more easily Mobile phone subscribers are price sensitive and tend to keep on seeking service packages of- fering better value for money This has had a significant impact on customer loyalty and churn rate Marketers have to put more effort into cultivating customer loyalty and building long-term customer relationship to prevent high churn rate Obviously, it costs companies more to acquire new customers than to keep their existing ones Unfortunately, MNP may disrupt subscribers’ privacy when telemarketing calls are received through mobile phones As a result, m-marketers need to consider per- mission marketing seriously and develop a strategy for pursuing consistent branding image to establish a brand community for fostering customer loyalty and reinforcing customer relationship.

Brand Community and Customers’ Loyalty

Brand community exists because “brands connect sumers to brands, and consumer to consumer” (Muniz

con-& O’Guinn (2001, p 418) These social groups have a high propensity to be reasonably stable and devoted

to the brand Furthermore, members of a brand munity tend to be “committed,” “conscientious,” and

com-“passionate” toward the brand (Gruen & Ferguson, 1994).

Trang 8

W IRELESS C ONSUMER B EHAVIOR 855

Consequently, it facilitates marketers to strengthen their

branding strategies because the Web enable firms to

communicate instantly with each customer.

Consumer Decision-Making

Process for Wireless

Adoption of wireless services can be divided into five

stages (Steuernagel, 1999):

1 Awareness stage—information obtained from

televi-sion advertisement, mass media, observation of users.

2 Interest stage—attention and interest are stimulated by

multiple exposures to users and ads.

3 Evaluation stage—perceived benefits (e.g., job or

lifestyle, emergency, security), making enquiries for different models of handsets.

4 Trial stage—through friends or promotional

demon-strations.

5 Adoption stage—customer adopts wireless service and

continues tracking the cost—benefit relationship of the adoption.

Segmentation Variables for Wireless

Consumer Markets

Three major segmentation variables have been identified

for wireless consumer markets (Lamont, 2001):

1 Demographic—generation (e.g., Generation Y),

in-come groups (e.g., high disposable inin-come groups who can afford to pay for the wireless services), occupation (e.g., professional athletes).

2 Psychographic—lifestyle (e.g., high mobility, enjoying

high-tech life, people who prefer to do everything line), personality (e.g., personal value).

on-3 Behavioral—benefits (e.g., seeking speed, convenient

services, etc.), loyalty (through brand community).

Permission Marketing and Customer

Relationship

Godin and Peppers (1999) indicated the merit of

per-mission marketing is that it allows both parties to

en-joy “mutually beneficial dialogue” without worrying about

the privacy and legal issues “Permission Marketing has

been around forever (or at least as long as dating), but

it takes advantage of new technology better than other

forms of marketing The Internet is the greatest direct mail

medium of all time, and the low cost of frequent

interac-tion makes it ideal for Permission Marketing” (Godin &

Peppers, p 51) Wells, Burneet, and Moriarty (2003, p 23)

documented that this concept because many advertising

messages are regarded as interruptive As a result,

per-mission marketing should be taken seriously as a means

to foster good customer relationships and “mutually

bene-ficial dialogue.” This concept includes the following three

cus-Participation Marketing and Customer Relationship

This concept goes beyond permission marketing, ing to Alan Rosenspan (2000), an expert in direct market- ing It covers the following five principles (as cited in Wells

accord-et al., 2003, p 24):

1 You really understand your customers (i.e., needs and preferences), for example, by collecting feedback from customers through marketing research, internal sales team, enquires, and customers’ complaints.

2 You provide feedback at every opportunity (i.e., to show your concern and customer care), for example, by mak- ing a call to seek subscribers’ opinions of new value- added services.

3 You involve customer and prospects as much as sible (i.e., stimulate customers’ participation to build loyal customers, e.g., inviting customers to participate into charity events or public relations activities.

pos-4 You market on customers’ schedules, for example, by making promotional offers, such as sending coupons

or e-gifts (e.g., free download services) on customers’ birthdays.

5 You make customers feel vested in your success.

Ethical and Privacy Issues in Wireless Marketing

Similar to wired marketing (i.e marketing activities ducted through fixed telephone lines), wireless marketing can annoy and interrupt customer’s privacy Ethical and privacy issues (e.g., irritation, fraud, invasion of personal privacy) should be taken into consideration when develop- ing the marketing strategies to foster long-term customer relationships Some examples of ethical and privacy issues that can arise in the mobile environment are as follows:

con-1 Irritation—sending out too many, too long SMS tional or advertising messages to potential customers for pursuing location marketing strategies.

promo-2 Fraud—making false claims such as “today is the last day for the special offer” when it actually isn’t, over- charging customers on their bills, giving “misleading”

Trang 9

W IRELESS M ARKETING 856

or “unclear” product information to potential

cus-tomers.

3 Invasion of personal privacy—conducting

telemarket-ing activities too early in the morntelemarket-ing or too late at

night, disclosing personal data to a third party for

com-mercial or fundraising purposes.

Consequently, the concept of permission marketing

should be encouraged and cultivated throughout the

or-ganization In fact, companies need to set good practices

and an effective system to monitor these consumer issues.

Consumer Protection

Wireless technologies have gone through a significant

development period; however, the legal protection for

m-commerce is still in its infancy From an e-commerce

perspective, OECD’s (Organization for Economic

Co-operation and Development) Consumer Protection

Guide-lines for e-Consumers (December, 1999) has indicated

clearly about the possible consumer legal protection for

e-commerce The guidelines attempt to draw government,

business bodies and consumer groups’ attention for

devel-oping national and global awareness of consumer

protec-tion laws.

An ITU report (2002a), published in September 2002,

proposed the creation of special legal protection for

mobile consumers for the following reasons (OECD’s

guidelines can be regarded as a foundation for the legal

protection of m-commerce):

1 Mobile devices are classified as high-speed terminals.

2 Users of mobile devices are numerous and always have

limited usage experience.

3 Users usually have limited technical and legal

knowl-edge of m-commerce.

4 The display screen for display on mobile devices is

limited (it is difficult to display contract details).

5 Mobile devices have limited keypad functions (e.g.,

absence of “cancel” or “undo” keys) for making

cor-rections.

MARKETING MIX FOR WIRELESS

Product

Product Characteristics

Lamont (2001) suggested that marketers should make use

of brand name to differentiate themselves from their

com-petitors He also has identified the following product or

service characteristics for wireless industry:

rEffective mobile devices should have interactive and

instant features with unique content through wireless

Internet This content should be created for a particular

mobile device (e.g., PDA or mobile phone).

rSMS (the “killer application” for mobile phones), MMS

services, m-sports, m-commerce, m-entertainment, and

m-banking are expected to be the major value-added

services for mobile devices.

rNew products develop on mini handsets and handheld

mobile devices such as Web-based phones, WCDMA,

and GPRS (“always on connection”).

New Product Attributes in M-commerce

Dynamic wireless technology has changed the ways that people conducting their business, it also influences con- sumers’ daily lives and their consumption behavior The following summary of new product attributes for the wire- less products and services is adapted from Lamont (2001,

p 48–49) Wireless devices can or soon will be able to

rfind a parking space for your car,

rsearch for the best bargains for your family (e.g., where

to eat and shop),

rtransfer medical records to your physician,

rpermit mothers to breast-feed their babies on time and

at work,

rscan inventory and close a sale,

rdownload music recommended by your friends,

rchat with your friends,

rread your e-mail,

rpay bills while you commute to the city,

rtransfer funds from your checking to your savings account,

rarrange travel and other services,

rconduct banking services (e.g., enquiries, transfer ment),

pay-rwatch entertainment programs (e.g., sports),

rtake photos, and

rlisten to the radio.

Price

In the early days of widespread Internet use, an initial pricing strategy for the fixed-lined Internet was charged according to time spent online Later, flat-rate schemes

or plans for different user groups were offered Pricing for mobile (or wireless) Internet use is expected to follow the pattern of the fixed-line Internet (ITU, 2002a) Today subscribers are charged according to their rate of con- sumption (i.e., per minute) to browse the wireless Inter- net Unfortunately, the wireless industry is competitive, and marketers cannot control their prices Customers play

a more active role in influencing the pricing strategies of wireless industry because of a high level of transparency

in the wireless business world.

Pricing 3G

There are different types of services provided by 3G bile devices, such as data services and real-time Internet game applications, so the billing system is more complex than it was 2G devices It is expected that different tariffs will be adopted because some wireless services such as e-mail can accept delay, but other services such as Inter- net game applications cannot As a result, managers need

mo-to consider what happens if a real-time Internet game plication suffers from lower service quality because of net congestion, for example A billing system must be able

ap-to solve this kind of problem auap-tomatically (Korhonen, 2001) Above all, Lamont (2001) indicated that customers needed to be educated about the merits of the wireless Internet (e.g., anytime, anywhere, voice and data com- munications) to ensure that potential customers of 3G are

Trang 10

M ARKETING M IX FOR W IRELESS 857

willing to pay for different service rates and a smart billing

systems is developed to solve some basic technical

prob-lems of Internet surfing (e.g net congestion).

Prepaid Versus Postpaid

A prepaid concept is defined as customers who do not

have subscriptions with a mobile operator but buy

air-time for their SIM (Subscriber Identity Module) cards in

advance and then use the phone as long as there is credit

in their accounts When their airtime runs out, they

pur-chase more (Korhornen, 2001) SIM card is a small chip

card kept inside a mobile phone It serves as a network

ac-cess card and it is similar to a tiny computer It provides

storing capacity for phone numbers, text messages, and

value-added services The advantages of prepaid service

for the provider are as follows:

rThere is no need to carry out a credit check on new

customers.

rCustomers with imperfect credit information can adopt

mobile phone service under the prepaid scheme.

rThere is no need to bill prepaid customers.

rCustomers may never uses the services they pay for.

The advantages of prepaid service for users are as follows:

rUsers remain anonymous in prepaid (hardware and

soft-ware operators).

rUsers have more freedom to decide where to buy a

hand-set and SIM.

rThere is no contract arrangement, and customers have

more freedom to switch network operators.

rThere is no monthly subscription charge, so light users

can be attracted (e.g., keeping a mobile device for gency purpose only).

emer-rIt is an efficient way for customers to control costs

(automatically limits their phone service usage).

Disadvantages of prepaid service for the provider are the

following:

rFrom the operators’ perspective, there are security

prob-lems, because it is difficult to identify fraudulent users.

rThe anonymous nature of prepaid service does not allow

marketers to employ data mining or database marketing techniques (cannot identify their needs and characteris- tics).

The disadvantages of prepaid service for the customer are

the following:

rPrepaid calls are more expensive than postpaid SIMs.

rPrepaid service may have an expiration date (unused

airtime cannot be carried forwarded).

In Finland, the network usage is relatively sive, and thus the prepaid with no monthly fee would not

inexpen-offer any particular benefit Consequently, the demand

for the prepaid is limited in that country In Italy and

Portugal, however, some operators have more than 80 prepaid scheme customers.

Distribution or Sale Channels

As discussed earlier, the wireless Internet is not going to replace fixed-line Internet in the immediate future, so the wireless distribution channel is regarded as a supplemen- tary to existing sales channels (e.g., it could be applied

to internal direct sales force, dealers, retailers, and direct marketing, etc.) Direct marketing is covered in more de- tail in the Promotion section.

Internal Sales Force—Telemarketing

The internal sales team of service providers can pursue telemarketing to individual potential customers Suffi- cient training and retraining programs must be provided

to all sales people to carry out effective telemarketing tivities, however In addition, motivation programs (e.g., incentives, commission, or bonus schemes) for rewarding outstanding salespeople and employees should be consid- ered and integrated into the company’s policies.

ac-Middleman (e.g., Dealer, Retailers)

Service providers use middleman to attain a wider age of the marketplace The middlemen play an important role in facilitating business transactions for both business and consumer markets.

cover-Good channel relationship management is a key sue for pursuing success in channel management To eliminate channel conflicts, however, the m-channel (mo- bile channel) should only be considered a supplementary mode to the traditional channel of distribution Generally speaking, the channel of distribution can be divided into intensive, exclusive, and selective distribution Because mobile phone service is perceived as a commodity, inten- sive distribution (i.e., as many outlets as possible; Kotler

is-& Armstrong, 2001) should be considered.

Promotion

There are several promotional mix tools used in marketing strategy With respect to m-commerce, advertising, public relations, and direct marketing are recommended.

SMS Advertising

SMS refers to the short message services provided by mobile network providers SMS allows m-marketers to send electronic coupons and customized promotional messages to individual customers Advisor.com (2002, Document No 09546) reported a recent global study by HPI Research Group (marketing specialists) on the be- half of Nokia showing that a majority (88%) of customers like this mobile advertising method (i.e., sending advertis- ing messages or e-coupons via SMS) The study covered

11 countries including Brazil, Denmark, Germany, Italy, Japan, Korea, Singapore, Spain, Sweden, the United Kingdom, and the United States.

Public Relations

Service providers can use public relations to build brand

or corporate image Public relations is defined as ing good relations with the company’s various publics

Trang 11

“build-W IRELESS M ARKETING 858

Table 4 Real-Time Impact of Wireless Internet on the 4 Ps of Marketing

PRODUCT Real-time wireless Internet transactions force products to become commodities,

core assets to become peripheral, and valuable assets to become loss leaders.

Recognize that goods and services from wireless content providers tend to be the same in the minds of the buyers Marketers must create competitive transparency to succeed.

PRICE Real-time m-commerce transactions base prices on demand at the time of sale, and

these prices change continuously Deliver the lowest possible prices and minimum transactions costs for goods and services from content providers.

Users demand this competitive pricing structure in return for maximum purchases Marketers must establish financial nakedness to succeed.

PLACE Real-time wireless Internet transactions give all sellers power in the channel of

distribution Provide the maximum number of suppliers and minimum inventory levels Customers insist on success in fulfillment or the delivery of accurate orders Marketers must put in place distribution exposure.

PROMOTION Real-time m-commerce transactions push well-established brands out of the

market and into the dead brands society Increase marketing openness as the norm for customers who want promotion and advertising to provide information rather than new entry barriers Marketers must convert traditional push

advertising to pull promotions that are targeted to specific individuals through permission marketing.

From: Conquering the Wireless World—the age of m-commerce, by Douglas Lamont, 2001, p 28 Oxford, UK: Capstone.

c

 Captsone Publishing Limited (A Wiley Company), UK, 2001 Reprinted with permission.

by obtaining favorable publicity, building up a good

cor-porate image, and handling rumors, stories, and events”

(Kotler & Armstrong, 2001, p 512).

Public relations consists of different types of

promo-tional activities such as press releases for launching new

products or services and holding charity events, seminars,

or conference activities Customers tend to believe news

from public relations’ events or activities more than they

believe advertising messages As a result, an effective

pub-lic relations program enables a company to build a good

corporate image in a cost-effective manner Obviously, it

also allows marketers to strengthen customer

relation-ships through interactions with existing and potential

cus-tomers.

Direct Marketing

There are five major tools in direct marketing: (a) direct

mail, (b) catalogs, (c) telemarketing, (d) direct-response

advertising (Wells et al., 2003, p 407), and now (e) the

Internet The wireless technologies help marketers to

col-lect more detailed information about their customers’

needs and buying behavior Thus, it enables marketing

to tailor-made direct marketing strategies based on

cus-tomers’ individual’s needs Direct marketing tools include

the following:

1 Direct mail—SMS and MMS through mobile phones.

2 Catalogs—e-catalogs provided in Web pages, SMS, or

m-coupons of promotional offers sent through mobile

phones.

3 Telemarketing (message must be simple)—call

cus-tomers directly through mobile phone for information

promotional offers.

4 Direct-response advertising (to obtain action-oriented

objectives)—interactive advertising messages hosted in

m-commerce or the wireless Internet, which are sent directly to customers through mobile phone.

In addition, service providers may apply either push or pull promotion strategies for to pursue their promotional objectives (e.g., to create a level of awareness) Kotler and Armstrong (2001, p 531) defined the two strategies as follows:

Push strategy is a promotion strategy that calls for using the sales forces and trade promotion to push the prod- uct through channels.

Pull strategy is a promotion strategy that calls for ing a lot on advertising and consumer promotion to build up consumer demand, which pulls the product through the channels.

spend-Real-Time Impacts of the Wireless Internet

on the Four Ps of Marketing

Lamont (2001) summarized the “real-time” impact of wireless Internet on the Four Ps of marketing (product, price, place, promotion) as detailed in Table 4.

Wireless Marketing and Examples

of Business Models

Companies adopt different business models based on their strengths and their market situations The follow- ings are some examples of business models for wireless marketing:

1 Focus on every opportunity for generating revenues from wireless portal InfoSpace is considered as a very successful wireless portal It generates revenues

Trang 12

(b) Merchants are required to pay for a percentage (about 2–25%) for each business transaction gen- erated from the wireless portal.

(c) Wireless providers are obliged to pay a subscriber, per month fee.

per-2 Keep brand identity in wireless portal The service

provider is free to negotiate with content providers and merchants who are shown on its portal as long as they agree to carry the brand name in their contents Cur- rently, Rupp (2002) reported that BT (British Telecom) has adopted this business model, and it seems to be successful in terms of reducing churn rate (the rate at which subscribers stop using the service) and enhanc- ing ARPU (average revenue per user).

3 Charging for contents “The business model based

on paid content is simple and transparent—content providers know what they want and what revenues they will get,” said Eden Zoller, the Senior Analyst of Ovum (Fricke, 2001) This is because subscribers are expected

to pay for the content, which has perceived value, personalized and suitable for the reception by their mobile devices such as PDAs or Web-enabled mobile phones.

1 Traffic levels within the network (traffic load on the

radio interface and the utility of resources within the network nodes).

2 Verification of the network configuration (verifications

are based on fact findings).

3 Resource-access measurements (at regular time

inter-vals across the network).

4 Quality of service (QoS; attributes as experienced by

subscribers).

5 Resource availability (availability of the chosen

re-sources at different phases of the life cycle of the system).

The performance-measurement reports are expected to produce at a particular frequency known as the granular-

ity period Measurement samples are collected during the

granularity period The results can be kept in the local

net-work entity as files or sent to the concerned parties all at

once The network manager can access these files

when-ever he or she wants to Finally, data must be presented

to the configuration-management application.

In addition, it is necessary to have a strong system of fraud management for detecting and preventing fraud in

mobile telecommunication networks (Korhonen, 2001)

to ensure that quality wireless services are provided to customers.

Marketing Effectiveness and Efficiency Measures

Steuernagel (1999, p 106) defined the effectiveness and efficiency as follows:

1 “Effectiveness is the degree to which the marketing process—advertising, sales channels” converts poten- tial targets into customers There are many way to mea- sure it, such as

(a) revenue versus sales expense, (b) customer gain versus sales expense, (c) revenue versus marketing expense, (d) customer gain versus marketing expense, (e) store traffic or lead generation versus advertising expense,

(f) customer satisfaction (e.g., overall satisfaction, monthly statement clarity, missed or error calls over the past 30 days, etc.), and

(g) customer churn.

2 “Efficiency is a measure of long-term revenue versus the total cost to get and keep the customer—the ra- tio of unit output to input.” It may cover the following measures:

(a) increase in revenue, (b) gross sales per salesperson (vs peers in the same channel),

(c) leads and sales generated by promotional paigns, and

cam-(d) expected revenue per customer divided by the sales and marketing.

LOOKING AT FUTURE

The following represent future challenges for wireless marketers:

rCustomer churn rate,

rWireless consumer applications,

rBilling challenges for GPRS, and

rThe rise of the application service provider (ASP), which offers cost savings.

To be successful in the dynamic wireless business, it

is necessary for marketers to “work closely with other company departments to form an effective value chain that serves the customer” (Kotler & Armstrong, 2001,

p 677) A value chain involves commitments from various departments of an organization—for example, product design, production, marketing, logistics, and delivery—to

Trang 13

W IRELESS M ARKETING 860

perform value-creating activities The success of a

com-pany’s value chain depends on the performance of various

departments and how well these activities are coordinated

(Kotler & Armstrong, p 677).

In summary, customers are always the center of all

marketing activities in m-commerce A firm’s capabilities

and its adaptation for value creation based on customer

information are vital to sustaining long-term success.

“Customers become data Then data become customers.

Finally, both customers and data migrate to real time”

(Lamont, 2001, p 58) Marketers must carefully examine

the best ways to work with their customers; they must

know how to use the collected data better than their

com-petitors to create more value for customers.

GLOSSARY

Always-on service A 24-hour service supported by

GRPS that allows wireless subscribers access to

value-added services anytime and anywhere.

Anonymous Nondisclosure of personally identifiable

information

Brand community A group whose members have a

par-ticular brand preference and are grouped together to

form a brand community Members of this social group

are committed to the brand and are willing to share and

exchange information.

Churn rate A measure for the percentage of subscribers

who switch from one mobile phone service provider to

an alternative provider.

Consumer market The business environment in which

individual end users purchase goods or services for

their personal or household use.

Customer needs Human needs (e.g., basic needs for

food and shelter) that are not conceived by marketers.

Customer loyalty A factor used to describe a

con-sumer’s faithfulness in a particular brand or store A

loyal customer is one who has a preference for a

par-ticular brand or store without considering the

alterna-tives Marketers differ on how this loyalty can be

mea-sured.

Data mining A method for discovering patterns and

meaningful relationships of customers’ buying

behav-ior from a data bank

Database marketing A process that involves

establish-ing and updatestablish-ing customer information into a data

bank Marketers use the information provided to

de-cide how and when to contact the consumer for

mar-keting activities, such as a sales promotion.

Direct marketing A method of distribution in which

sellers contact potential buyers through direct

commu-nication channels (e.g., e-mail) seeking customers’

re-sponses (e.g., seeking more information, making a trial

purchase).

E-tailing (electronic retailing, e-retailing) A form of

di-rect marketing in which all business transactions are

arranged through electronic means such as the

Inter-net and cellular phones.

Lifestyle The ways that a consumer spends his or her

time and money.

One-to-one (1:1) marketing Designing and

im-plementing the marketing mix (product, price,

distribution, and promotion) for the individual buyer It relies on extensive information about each purchaser’s buying needs and behaviors.

Push promotion A traditional promotional method in business-to-business market Manufacturers offer dis- counts or incentives to a wholesaler or retailer to push their products to end users (or final consumers).

Pull promotion Manufacturers focus all their tional efforts (e.g., promotional discounts or compli- mentary gifts) to attract end users or final consumers who buy their products Under this structure, final cus- tomers would request the products from retailers Re- tailers will order the products from the manufacturers

promo-to meet expressed consumer demand.

Segmentation An important concept in marketing Market segmentation divides the market into small, mutually exclusive groups Each segment consists of customers with similar needs, characteristics, and buy- ing behavior Different marketing strategies (i.e., prod- uct, price, place [or distribution], and promotion) are required for targeting different segments because their needs are different Firms can select one or more seg- ments to target based on their strength and resources.

Supplementary channel An additional channel to isting distribution or sales outlets for selling products

ex-to cusex-tomers or end user.

Telemarketing A kind of direct marketing method in which sellers use telephone calls to sell a product or service to an individual customer.

Value chain A management tool to identify methods for generating more customer value.

CROSS REFERENCES

See Consumer Behavior; Marketing Communication Strategies; Personalization and Customization Technolo- gies; Value Chain Analysis.

REFERENCES

Advisor.com (2002, April 2) Mobile marketing: sumers say, “Bring it on!” (Marketing Advisor zone, Doc No 09546) Retrieved November 20, 2002, from http://advisor.com

Con-Boone, L E., & Kurtz D L (2001) Contemporary ing (10th ed.) Forth Worth, TX: Harcourt College.

market-Computer Industry Almanac (2002, March 21) Internet users will top 1 billion in 2005, wireless Internet users will reach 48% in 2005 (press release) Retrieved November 22, 2002, from http://www.c-i-a com/pr032102.htm

e-Marketer (2003) Mobile penetration in the US and Europe Retrieved February 13, 2003, from http://www emarketer.com/news/article.php

Fletcher, J (2000, August 14) InfoSpace looks to wireless

for exponential growth eCommerce Business, p 14.

Fricke, P (2001, August 22) Study: charging for

con-tent lead to wireless success CommWeb.com Retrieved

October 18, 2002, from http://www.commweb.com/ article/COM20010822S0003

Godin, S., & Peppers, D (1999) Permission ing: Turning strangers into friends, and friends into customers New York: Simon & Schuster.

Trang 14

market-F URTHER R EADING 861

Gruen, T., & Ferguson, J M (1994) Using

member-ship as a marketing tool: Issues and applications In

N Jagdish & A Parvatoyar, Relationship marketing:

Theory, method, and application (pp 60–64) Atlanta,

GA: Center for Relationship Marketing, Roberto C.

Goizueta Business School, Emory University.

International Telecommunication Union (2002a,

Septem-ber) ITU Internet report: Internet for a mobile generation—executive summary Retrieved October

28, 2002, from http://www.itu.int/osg/spu/publications/

sales/mobileinternet/execsumFinal.pdf International Telecommunications Union (2002b) Hong

Kong (China) and Denmark top ITU Mobile/Internet Index (press release) Retrieved February 8, 2003, from http://www.itu.int/newsarchive/press releases/2002/20.

html

Korhonen, J (2001) Introduction to 3G mobile

communi-cations Boston: Artech House.

Kotler, P., & Armstrong, G (2001) Principles of marketing

(9th ed.) Upper Saddle River, NJ: Prentice Hall.

Lamont, D (2001) Conquering the wireless world—the age

of m-commerce Oxford, UK: Capstone.

Muniz, A M., Jr., & O’Guinn, T C (2001) Brand

commu-nity Journal of Consumer Research, 27,412–432.

OECD (1999) The guidelines for consumer protection in

the context of electronic commerce Retrieved April 18,

2003, from http://www.oecd.org/pdf/M00000000/

M00000363.pdf

Oxford Advanced Learner’s English-Chinese Dictionary (4th

ed.) (1994) Oxford, UK: Oxford University Press.

Richter, F.-J., & Mar, P C M (2002) Recreating Asia—

vision for a new century In World Economic Forum— committed to improving the states of the world Singa-

pore: Wiley.

Rosenspan, A (2000, June) Participation marketing.

Direct Marketing, pp 54–55.

Rupp, W T (2002, July–August) Mobile commerce: New

revenue machine or black hole? Business Horizon,

International Telecommunications Union (2002c, cember 9) Telecom Asia 2002 Show Special adver-

De-tising section Business Week (Asian ed.) pp 36–

52 Lamont, D (1997) Salmon day: The end of the beginning for global business Oxford, UK: Capstone.

Shama A (2001, September–October) E-coms and their marketing strategies Business Horizons, pp 14–20.

Trang 15

862

Trang 16

XBRL (Extensible Business Reporting Language):

Business Reporting with XML

XBRL (Extensible Business Reporting Language):

Business Reporting with XML

J Efrim Boritz, University of Waterloo, Canada Won Gyun No, University of Waterloo, Canada

XML: A New Paradigm for Internet Documents 863

SGML (Standard Generalized Markup

Appendix B: For More Information Related

Since Pacioli defined the double-entry bookkeeping

sys-tem in his 1494 book, Summa de Arithmetica,

Geome-tria, Proportioni et Proportionalita, there have been many

new developments in accounting, and these continue

to-day in response to the demands of business and other

organizations, and users Accounting has contributed

to economic prosperity and will continue do so in the

future Indeed, with the explosion of interest in

communi-cating business information over the Internet, the recent

initiative to create and implement an XBRL (Extensible

Business Reporting Language) promises to dramatically

enhance the speed and ease of information exchange for

enhanced analysis and decision making In this chapter,

we trace the development of XBRL, from its conceptual

origins in SGML and XML, providing examples of its

ap-plication to financial information, including illustrations

of the steps involved in creating an XBRL document An

appendix provides a detailed illustration of the steps

in-volved in creating an XBRL document We conclude with

a summary of the benefits and limitations of XBRL.

XML: A NEW PARADIGM FOR

INTERNET DOCUMENTS

Today, most B2B (business-to-business) and B2C

(business-to-commerce), and many P2P

(person-to-person), interactions involve the exchange of

informa-tion over the Internet In fact, the empowerment of

information providers to easily and cheaply distribute

electronic documents via the Internet has fueled the tonishing growth of the World Wide Web (henceforth, the Web) Today, most documents on the Web are stored and transmitted in HTML (HyperText Markup Language), the Web’s lingua franca HTML is a simple language that was developed to provide hypertext and multimedia functions for the Internet However, as documents on the Web have grown larger and more complex, information providers have begun to encounter limitations in the functionality

as-of HTML attributable to its lack as-of extensibility, ture, and data checking These limitations prevent HTML from being a universal information exchange method HTML is based on SGML (Standard Generalized Markup Language), the international standard for defining de- scriptions of the structure and formatting of different types of electronic documents SGML is complex, dif- ficult, and costly to use To overcome these limitations and to extend Web technology, XML (Extensible Markup Language) was developed, started by John Bosak in

struc-1996, and established by the W3C (World Wide Web Consortium) as a standard in 1998 W3C was created

in October 1994 to lead the World Wide Web to its full potential by developing common protocols that promote its evolution and ensure its interoperability W3C has around 500 member organizations from all over the world and has earned international recognition for its contributions to the growth of the Web.

In contrast to HTML, which was designed to display data and to focus on its appearance, XML was designed

to provide structure and to validate the content of ments XML not only removes the limitations of HTML, it

docu-863

Trang 17

XBRL (E XTENSIBLE B USINESS R EPORTING L ANGUAGE ): B USINESS R EPORTING WITH XML 864

also facilitates more precise declarations of content, more

effective and efficient information exchange, and more

meaningful search results XML includes self-explanatory

data within a document; thus, it can be used for

univer-sal information exchange over the Internet This section

outlines the similarities and differences between SGML,

HTML, and XML, concluding with a summary of the

ben-efits of XML and setting the stage for the subsequent

dis-cussion of XBRL.

SGML (Standard Generalized

Markup Language)

GML (General Markup Language) was developed at IBM

in 1969 by Charles F Goldfarb, Ed Mosher, and Ray Lorie.

Markup refers to the sequence of characters or other

sym-bols that are inserted at certain places in a text or word

processing file to indicate how the file should look when it

is printed or displayed, or to describe the document’s

logi-cal structure The markup indicators are often logi-called tags.

GML was not merely an alternative to procedural markup

but the logical representation that motivated all

process-ing Publishing companies implemented it because they

needed a means of tagging the contents of a document

so that text could be presented in a number of different

ways This approach combined two traditions, one then

about 25 years old and the other around 500 years old.

(A third tradition, the computer programmer’s strategy of

tying markup to specific interpreters, which went back

to the first versions of ROFF at MIT in about 1962,

was intentionally set aside as violating the independence

of structural information from presentation processing.)

The 500-year-old printing and publishing industry

tradi-tion started when the first editor needed to give

unam-biguous instructions to more than one typesetter and

de-veloped his own markup language to do it According to

Smith (1996, pp 75–92), this goes back at least to Anton

Koberger’s printing of the Wurzburg Pslater in 1486.

Most of these instructions had the common

charac-teristic of using instructional tags in a format, such as

<start bold>some text<end bold>, to communicate

dis-play formatting instructions to typesetters and other

ar-tisans as clearly and unambiguously as possible The

25-year-old computing tradition was reflected in early text

processing applications, such as DIALOG and COLEX,

de-veloped in the 1960s These applications generally tagged

data by type at the time of data entry to make it easy to

ap-ply Boolean logic in text searches on files prepared using

tape-to-tape sorts Thus, a file entry would contain both

data and labeling information about the meaning and role

of that data, such as in the following example:

PUBDATE: JULY 26, 1959

LIB: 105DWC/PEMBROOK

PUB: RS, NY

AUTH: JOHN SCARNOUGH, BRANSTON GRECHI

TITLE: LOAD CONDITIONS FOR POLYHEDRAL RISERS

ABSTRACT: REVIEW OF STRUCTURAL INTEGRITY

FAILURE CONDITIONS FOR MECHANICAL

RISERS IN INTERVAL SUPPORT STRUCTURES.

In the mid-1980s, SGML was established by the

International Organization for Standardization (ISO

8879:1986) as an international standard for defining and using document structure and content ISO, founded in

1947, is a worldwide federation of national standards bodies from some 100 countries, one from each country Among the standards it fosters is OSI (Open Systems In- terconnection), a universal reference model for communi- cation protocols Many countries have national standards organizations, such as the American National Standards Institute (ANSI), that participate in and contribute to ISO standards SGML incorporates both data labeling and data presentation information but leaves procedural is- sues entirely to the rendering application.

Because SGML is a generalized theoretical cation, actual use requires selection of a specific DTD (Document Type Definition) A DTD defines the tags the document type will use, what they mean, and whether, and if so to what extent, individual tags can be nested For example, HTML is a SGML DTD SGML also requires use of an application that will correctly interpret the DTD

specifi-in combspecifi-ination with the document text to output either data for use by another application or instructions for a rendering engine SGML also requires a data processing application or a rendering application that will output the document on a specific display device, such as a screen or printer Web browsers like Netscape or Internet Explorer contain a rendering tool, such as a compiler or document handler, that combines text with HTML markup to create displayed pages using a set of internal rules known as style sheets For example <TITLE>text</TITLE> is interpreted

as labeling information giving the document title as “text”;

<P> as an instruction to begin a left-justified paragraph within the current text block, and <H1>text</H1> as an instruction to display “text” on a line (or lines) by itself using the font type and color set in the enclosing block but at about 3.1 times the user’s global default font size SGML was intended to be a language that would ac- count for every possible document format and presen- tation Thus, it enables users to create tags, to define document formats, and to exchange data among vari- ous applications Because SGML is system and platform independent and can save and validate a document’s structure, it can be used in various ways, such as for searching and exchanging data However, SGML is com- plex and contains many optional features that are not needed by many Internet applications Furthermore, it

is costly to develop software that supports SGML As a result, there are few SGML applications for the Inter- net Two examples are Xmetal and Wordperfect Figure 1 shows an SGML document that describes customer e-mail information.

HTML (HyperText Markup Language)

As mentioned earlier, HTML, the basic language for ating a Web page, is based on SGML HTML consists of

cre-a set of mcre-arkup symbols inserted in cre-a file intended for display on a Web browser The markup tags tell the Web browser how to display a Web page’s words and images for the user Each individual markup tag is referred to as

an element HTML uses predefined tags, and the ing of these tags is well understood; for example, <p> means a paragraph, </p> means end of a paragraph, and

mean-<table> means a table Thus, the text “Current Assets, Cash

Trang 18

XML: A N EW P ARADIGM FOR I NTERNET D OCUMENTS 865

Figure 1: SGML example.

and Cash equivalents, $12,345” can be marked up using

HTML as

<table border="1" cellpadding="0"

cellspacing="0" width="70%" align="Center">

<tr>

<td width="70%"><p align="left">Current Assets</p></td>

<td width="30%"></td>

</tr>

<tr>

<td width="70%"><p align="left">Cash and Cash Equivalents</p></td>

<td width="30%"><p align="center">

$12,345</p></td>

</tr>

</table>

This markup produces the table below when rendered

on a display using the postscript language However, the

result can be unpredictably different when rendered using

another combination of Web browser, graphics processor,

desktop settings, and screen.

Current Assets

HTML also adds hyperlink functions to simple uments using tags A hyperlink function enables a user

doc-to jump from document location doc-to document location

within the same document or documents at physically

dis-tant locations connected by the Internet Hypertext is the

organization of information units into connected

associa-tions that a user can choose to make An instance of such

an association is called a link or hypertext link

Hyper-text was the main concept that led to the invention of the

Web, which consists of information content connected by

hypertext links.

HTML is easy to learn and use Its simplicity and venience have aided the explosion of interest in the Inter-

con-net Figure 2 contains an example of an HTML document

and Figure 3 shows the HTML example from Figure 2 as it would appear in a Web browser such as Internet Explorer.

As mentioned previously, HTML has some tal limitations It merely facilitates access to text and multimedia It does not allow intelligent search, data ex- change, and non-HTML forms such as spreadsheets and databases Although HTML tags generally indicate only how the content should appear, XML tags indicate what the content is For example, a financial statement pre- pared using HTML displays the financial statement itself but cannot communicate information about the classifica- tion of numbers within categories or subtotals like current assets or cash and cash equivalents In contrast, XML can give information about the meaning of the numbers in the financial statement as well as displaying them Content, therefore, becomes more readily accessible through XML.

fundamen-As e-commerce grows, it becomes important to exchange data, use more meaningful search, manipulate data, and generate multiple views of the data As a result, HTML’s limitations and XML’s virtues are becoming increasingly noticeable.

XML Document

XML stands for Extensible Markup Language It is extensible because the language can be extended by anyone who wants to create additional tags for new and unforeseen purposes It is a markup language be- cause XML is a method of tagging information using accepted rules and formats to give definition to text and symbols XML was invented by adopting the key functions of SGML while excluding the less essential ones In fact, SGML can be used without modification and can be converted to XML (Further information may be found at http://www.w3.org/TR/NOTE-sgml-xml- 971215.html, Clark, n.d.) Furthermore, existing HTML can continue to be used, but more complicated and more highly structured documents can be created using XML The basic structure of XML is similar to HTML in many respects XML documents consist of XML ele- ments Basically, these elements involve a start tag such

as <TITLE>, an end tag such as </TITLE>, and the

Trang 19

XBRL (E XTENSIBLE B USINESS R EPORTING L ANGUAGE ): B USINESS R EPORTING WITH XML 866

Figure 2: HTML example.

content between the two tags Figure 4 shows an XML

document that contains customer information The code

for this example and all the other examples and

tax-onomies described in this paper is available in full online

at http://arts.uwaterloo.ca/ ∼jeboritz/XBRL/

Figure 3: HTML example in Internet Explorer.

Unlike HTML, XML tags indicate what each item

of data means; for example, tags such as <DATE>,

<ADDRESS>, and <PROFILE> convey meaning In the example in Figure 4, the data defined by the <PROFILE> tag indicates that the data represents customer profile.

Trang 20

XML: A N EW P ARADIGM FOR I NTERNET D OCUMENTS 867

Figure 4: XML example.

Therefore, recipients of this document can decode the

XML data and use it for their own purposes For instance,

a customer manager might use it to find customers who

live in the Waterloo area (<CITY>Waterloo</CITY>).

Because HTML tags are predefined and understood

by Web browsers, the Web browsers can display

HTML-tagged documents In contrast, because XML enables

users to create any tags they need, the meaning of these

tags will not necessarily be understood by a Web browser

unless they are the preexisting HTML commands There

is no way for a generic Web browser to anticipate all

possible tags and contain all the necessary rules for

dis-playing them Thus, to display XML documents in a Web

browser, it is necessary to have a mechanism to describe

how the document should be displayed This is done by

means of a style sheet A style sheet is prepared using style

sheet language Two of the most popular style sheet

languages are CSS (Cascading Style Sheets) and XSLT

(Extensible Stylesheet Language Transformations) CSS

provides procedural control by putting the additional

presentation control information needed to force a

browser to override its internal style sheet inside the

HTML file Thus, the following command overrides the

browser’s internal style sheet to turn text between <H1>

and </H1> blue while forcing it to a 12-point font size

regardless of user settings.

style sheet to HTML: external style sheet, internal style

sheet, and inline styles An external style sheet can be

cre-ated with any text editor, and a CSS style sheet should

be saved with a “css” extension Figure 5 shows an ample of an external style sheet An internal style sheet should be used when a document has a unique style The internal style sheet is defined in the head section

ex-by using the <style> tag The example shows an nal style sheet Finally, inline styles can be used with the style attribute in the relevant tag The style attribute can contain any CSS property (Further information may

inter-be found at html.html, Web Design Group, n.d.)

http://www.htmlhelp.com/reference/css/style-Figure 5 contains the CSS code used to represent the XML example in Figure 4, so that it can be displayed by

a Web browser exactly like Figure 3 There are several tools available to create the CSS code (e.g., Microsoft FrontPage).

After a XML document and a style sheet for that ument are prepared, the XML document can be shown

doc-in the Web browser by doc-includdoc-ing an doc-instruction doc-in the XML document specifying the style sheet to be used,

as in Figure 4: <?xml-stylesheet type = “text/css” href =

“customer.css”?> Of course, an HTML document is but one way of presenting an XML document Because XML separates content from presentation format, through the use of style sheets and other programmatic methods, the content in XML can be presented in several ways, such as

an HTML document, text document, and spreadsheet.

is a consortium led by not-for-profit entities Thus, XML creates a universal way for both formatting and presenting data and enables putting structured data

Trang 21

XBRL (E XTENSIBLE B USINESS R EPORTING L ANGUAGE ): B USINESS R EPORTING WITH XML 868

Figure 5: CSS example.

in a text file Because data in XML are coded with

tags that describe content and structure, the data

pre-sented in a XML format can be parsed, edited, and

manipulated Searches can produce more accurate and

relevant outputs Data can be exchanged and processed

without modification on any software and any hardware

platform because XML-based data are self-describing.

These capabilities have potential application to B2B

communications, transaction processing, and data

trans-fers between various systems and platforms Once an

XML file has been delivered to users, they can view it in

different ways Because XML is extensible, it also allows

users to create their own validation tools, including DTDs

and XML schema, effectively creating extensible tag sets

that can be used for multiple applications.

As mentioned previously, a DTD is a specific definition

that follows the rules of the SGML It defines elements,

el-ement attributes, and values and describes specifications

about which elements can be contained in others A DTD

accompanies a document and can be used as a validation

tool.

An XML schema is an XML-based alternative to a DTD.

It is developed to provide XML with flexibilities that a DTD

does not possess to meet users’ needs For example, with

a DTD it is difficult to validate the correctness of data, to

work with data from a database, and to describe

permissi-ble document content because a DTD does not have

sup-port for data types In addition, a DTD is not an XML

doc-ument; therefore, users have to learn another language.

In contrast, an XML schema describes the structure,

con-tent, and semantics of an XML document Thus, an XML

schema provides a means for expressing shared

vocabu-laries and allows machines to carry out rules made by

de-velopers (Further information may be found at the XML

schema Web site, http://www.w3.org/XML/Schema.html,

W3C, n.d.b.) Also, users do not have to learn another

lan-guage to create an XML schema because it is written in

XML.

XML is being extended with several additional

stan-dards that add styles (XSLT), linking (XLink), and

referencing ability to the core XML set of capabilities.

XML linking language (XLink) is a method of creating

and describing hyperlinks that support both

tradi-tional HTML and extended links, which provide more

functionality than traditional HTML links (Further mation may be found at the XLink Web site, http://www w3.org/TR/xlink/, W3C, n.d.a.)

infor-XBRL (EXTENSIBLE BUSINESS REPORTING LANGUAGE)

XBRL (Extensible Business Reporting Language), merly code-named XFRML (XML-based Financial Re- porting Markup Language), is the financial profession’s adaptation of XML for financial reporting A joint industry and government consortium was established for this pur- pose in the fall of 1999, including the American Institute

for-of Certified Public Accountants (AICPA), six information technology companies, and the five largest accounting and professional services firms (Information on XBRL member organizations is available at the XBRL Web site, http://www.xbrl.org/.) The consortium developed an XML- based specification for the preparation and exchange of financial reports and data This freely available and open specification provides a method by which financial profes- sionals can prepare, extract, analyze, and exchange busi- ness reports, like financial statements, and the informa- tion they contain.

The main objective of financial reporting is to provide useful information to users for their decision making pur- poses By providing financial information to intranet, ex- tranet, and corporate Web sites, entities can help users obtain more easily and on a more timely basis the infor- mation they need However, because there are no com- mon, generally accepted formats for describing business reporting data, it is difficult to generate reporting formats tailored to different users’ needs and to exchange data among applications Thus, users seeking to work with data posted on Web sites must reenter or cut and paste the data into their documents or spreadsheets This is clearly inefficient.

XBRL was created to help address these issues by ating a set of tags recognizable to XML-enabled Web browsers or other applications, such as spreadsheet and database software Using XBRL, tags are attached to all financial statement data to identify them as asset, cur- rent asset, liability, capital, profit, and so forth There- fore, information users can use a Web browser to visit

Trang 22

cre-XBRL (E XTENSIBLE B USINESS R EPORTING L ANGUAGE ) 869

companies’ Web sites, find the data with the tags (e.g.,

CashAndCashEquivalents), extract the data, and analyze

the data with analytical applications.

XBRL is different from other XML-based tions, such as FpML, FIX, FinXml, OFX, ebXML, and

specifica-XML/EDI.

rFpML (Financial Products Markup Language) is an

XML-based industry-standard protocol for swaps, derivatives and structured products (Further informa- tion may be found at the FpML Web site, http://www.

fpml.org, FpML, n.d.)

rFIX (Financial Information Eschange) defines specific

kinds of electronic messages for communicating rities transactions between two parties (Further infor- mation may be found at the FIX Web site, http://www.

secu-fixprotocol.org, FIX, n.d.)

rFinXML is an XML-based standard for financial

insti-tutions to exchange financial data and to communicate the details of highly structured financial transactions.

(Further information may be found at the FinXML Web site, http://www.finxml.org, FinXML, n.d.)

rOFX (Open Financial Exchange) is a specification for

the electronic exchange of financial data between cial institutions, businesses, and consumers via the In- ternet (Further information may be found at the OFX Web site, http://www.ofx.net, Open Financial Exchange, n.d.)

finan-rebXML (Electronic Business using XML) is a suite of

specifications that enables enterprises to conduct ness over the Internet ebXML provides a standard method for exchanging business messages, conducting trading relationships, communicating data in common terms, and defining and registering business processes.

busi-(Further information may be found at the ebXML Web site, http://www.ebxml.org, ebXML, n.d.)

rXML/EDI (Extensible Markup Language/Electronic Data Interchange) provides a standard framework to ex- change various types of data—for example an invoice, healthcare claim, or project status—can be searched, decoded, manipulated, and displayed consistently and correctly by first implementing EDI dictionaries and ex- tending vocabulary via online repositories to include business language, rules, and objects This framework

is intended to apply to a variety of information sources: transactions, exchanges via an API (Application Pro- gram Interface), Web automation, database portal, cat- alog, workflow document, or message (Further in- formation may be found at the XML/EDI web site, http://www.xmledi-group.org, XMLEDI, n.d.)

In contrast with these transaction-oriented tions, XBRL is reporting oriented As such, XBRL enables individual investors and financial professionals to search through and extract data from financial statements, then place them in their own applications, simplifying one

specifica-of the key phases specifica-of financial statement analysis XBRL does not establish new accounting standards (although XBRL.org has a process for approving taxonomies) but

is intended to enhance the value or usability of existing standards Also, it does not require providing additional financial information to outside users.

How XBRL Works

Figure 6 depicts how XBRL would be used Suppose that a public company, Toronto Inc., wishes to provide financial statements to analysts.

After the company prepares its financial information using its internal accounting system, an XBRL document

is created by mapping the financial information to

Toronto Inc.

Database

Application such as Accounting System

XBRL Taxonomy Other Taxonomies

Internet

XBRL Document

Application Software

HTML

PDF

Application Data

Other Formats Style Sheet

-Prepare XBRL Document -User’s Request -Obtain XBRL Document via the Internet -Translate XBRL Document into Other Formats

Third Party Style Sheet

Figure 6: How XBRL works.

Trang 23

XBRL (E XTENSIBLE B USINESS R EPORTING L ANGUAGE ): B USINESS R EPORTING WITH XML 870

XBRL taxonomy elements A number of new software

packages can do this automatically The created XBRL

document is automatically checked to ensure it is proper

XBRL There are several XBRL document validation

programs One is available from XBRL Solutions Inc., at

http://www.xbrlsolutions.com Then, the validated XBRL

document is placed on the company’s Web site or FTP

server.

When users need the information contained in the

XBRL document for their analysis, they obtain it on the

Internet Users use the XBRL document for their

analy-sis If they want to translate the document into HTML, a

spreadsheet, or database, they can do so with

appropri-ate style sheets developed by them or by outside software

developers Of course, an XBRL document would not

nec-essarily be viewed by a person in its raw form

XML-enabled software could automatically parse and

trans-form the content of the XBRL document and then transfer

it to another system for further processing.

XBRL Taxonomy and XBRL

Instance Document

A XBRL document is created by mapping financial

information to an XBRL taxonomy that describes

financial “facts” and the relationships between them A taxonomy is a dictionary of the financial terms used

in preparing financial statements or other business ports and the corresponding XBRL tags A XBRL tax- onomy can be regarded as an extension of an XML schema that defines elements corresponding to concepts that can be referenced in XBRL documents; for ex- ample, the element with the name “nonCurrentAssets propertyPlantAndEquipmentNet” represents such a con- cept A XBRL document has a hierarchical structure that

re-is defined by the taxonomy Figure 7 contains a cal illustration of the hierarchical structure of an XBRL document and a taxonomy as seen through a “taxonomy viewer.”

graphi-A XBRL instance document is an XML document containing XBRL elements In other words, a company’s financial statements, created by using XBRL, are an in- stance document in which various XBRL elements are embedded based on a specific taxonomy A common tax- onomy enables users to compare several firms’ finan- cial statements (assuming they use the same accounting guidelines) Because the same tags are used by all “pub- lishers” of XBRL documents, who rely on the same tax- onomy, all users of those documents will recognize the tagged data the same way For example, the tag <group

Figure 7: XBRL taxonomy as seen through a taxonomy viewer.

Trang 24

XBRL (E XTENSIBLE B USINESS R EPORTING L ANGUAGE ) 871

Figure 8: XBRL example.

type = “ci:balanceSheet.assets”> indicates that the data

after the tag relates to assets on the balance sheet Figure 8

shows an example of an XBRL instance document (Please

note that all the examples used in this chapter are based

on version 1.0 of XBRL The XBRL specification version

2.0 was publicly announced on Dec 14, 2001 This

specifi-cation is to be used to create XBRL taxonomies However,

at the time this chapter was prepared no XBRL taxonomy

based on version 2.0 was available Version 2.0 is

signif-icantly different from version 1.0, but the key concepts

described in this chapter are still applicable.)

The sample XBRL document in Figure 8 is based on the XBRL taxonomy for business reporting of commercial

and industrial companies, under U.S Generally Accepted

Accounting Principles (US GAAP), dated 2000-07-31

Fig-ure 9 shows a part of this taxonomy (A new version of this

taxonomy was nearing completion at the time this chapter

was written The new version will have significant

differ-ences from the version illustrated in this chapter; however,

the key concepts discussed here still apply.)

A XBRL taxonomy has several advantages First, it makes it possible to bring the semantics of financial infor-

mation to the surface, making it more transparent

Sec-ond, an XBRL taxonomy can make it easier to analyze how

similar companies applied various accounting rules or

methods Third, an XBRL taxonomy provides contextual

information that can enhance information search using

XBRL-based search engines to obtain more complete and

more accurate search results Finally, an XBRL taxonomy

can be used for converting an XBRL document based on one country’s generally accepted accounting principles (GAAP) to an XBRL document based on another coun- try’s GAAP For example, an XBRL document prepared

by using a U.S taxonomy can be converted to an XBRL document based on International Accounting Standards (IAS) taxonomy This may become an important function because hundreds of national and industry taxonomies are being developed.

At present, several taxonomies have been developed such as US GAAP CI, the XBRL taxonomy for busi- ness reporting of commercial and industrial companies under US GAAP, the XBRL GL (General Ledger) tax- onomy, and the IAS GAAP CI taxonomy Also, several national taxonomies are under development: Canadian GAAP CI, German GAAP CI, Australian GAAP CI, New Zealand GAAP CI, and Singapore GAAP CI Also, sev- eral prominent organizations have announced commit- ments to XBRL, including the Australian Prudential Reg- ulatory Authority, UK Inland Revenue, U.S FDIC, NAS- DAQ, Microsoft, Bank of America, Morgan Stanley, and Reuters Information about XBRL taxonomies may be found at http://www.xbrl.org, XBRL Home Page (2000) Information about the Australian Prudential Regula- tory Authority may be found at http://www.apra.gov.au, APRA (n.d.) Information related to Microsoft’s com- mitment to XBRL may be found at Microsoft’s web site, http://www.microsoft.com/msft, Microsoft (n.d.) Information on companies and organizations that

Trang 25

Figure 9: Taxonomy for business reporting of commercial and industrial companies, US

GAAP.

Figure 10: Customized taxonomy example.

872

Trang 26

XBRL (E XTENSIBLE B USINESS R EPORTING L ANGUAGE ) 873

provide XBRL statements may be found at the XBRL

ex-press web site, http://www.edgar-online.com/xbrl.

Extensibility

Because XBRL is an application of XML, it is

extensi-ble Therefore, if a taxonomy does not contain tags that

meet the users’ needs, the users can create their own tags.

An example of a customized taxonomy is shown in

Fig-ure 10 The customized taxonomy contains added

ele-ments to describe statement information, statement title,

and company name.

Style Sheets

Although XBRL documents can be easily handled by

soft-ware applications, they are not easily readable by

peo-ple However, XBRL documents can be transformed into

user-understandable formats, such Web pages, text

documents, and other XBRL documents, with the help

of style sheets As mentioned previously, Web browsers

such as Internet Explorer do not have built-in

seman-tics that enable them to process a labeling tag such as

<Assets.CurrentAssets> Thus, for an XBRL document to

be displayed by a browser, it must first be transformed

into a document the browser can render.

As mentioned previously, CSS (Cascading Style Sheets) and XSLT (Extensible Stylesheet Language Transforma-

Figure 11: XSLT example.

tions) are the two most popular style sheet languages CSS and XSLT overlap to some extent CSS is more broadly supported than XSLT Most Web browsers sup- port CSS, but only a few accept XSLT Thus, it is likely most of CSS (CSS1 and some of CSS2) to be well sup- ported by popular Web browsers, such as Netscape and Internet Explorer CSS1 (Cascading Style Sheets level 1)

is a W3C recommendation It describes the CSS language

as well as a basic formatting model CSS 2 (Cascading Style Sheets level 2), which is also a W3C recommen- dation, builds on CSS1 It includes media-specific style sheets (e.g., printers and aural devices), and element positioning and tables Although many HTML users and developers are familiar with CSS, it only provides for formatting of contents It does not allow users to change

or reorder contents (Further information may be found

at http://www.w3c.org/Style/CSS, W3C, n.d.c.) Although XSLT is more complicated than CSS and is not well supported, it is a more powerful and flexible style sheet language than CSS XSLT is currently the only style sheet language designed specifically for use with XML XSLT can transform XML into other documents, such as HTML or database, filter and sort XML data, and format XML data XSLT has evolved from the early XSL stan- dard XSL consists of a language for transforming XML documents and a language for formatting XML doc- uments The XSL formatting language, often called

Trang 27

XBRL (E XTENSIBLE B USINESS R EPORTING L ANGUAGE ): B USINESS R EPORTING WITH XML 874

Figure 12: XBRL example in Internet Explorer.

XSL-FO (Extensible Stylesheet Language Formatting

Objects), provides means to display data in some format

and/or media XSL transformations language, known as

XSLT, provides a means of parsing an XML documents

into a tree of nodes, and then converting the source tree

into a result tree XSLT was proposed and later accepted

as a separate standard for XML data transformation only.

XSL is now generally referred to as XSL-FO (XSL

For-matting Objects), to distinguish it from XSLT XSLT can

transform selected XML elements into HTML elements.

In addition, XSLT can add new elements into the

out-put file, or it can remove elements It can also rearrange

and sort the elements Figure 11 shows an XSLT

docu-ment that is applied to the XBRL example in Figure 8.

Further information may be found at the XSL Web site,

http://www.w3.org/TR/xsl, W3C, n.d.d.)

A XBRL document can be shown in a Web browser

by including an instruction in the XBRL document to

specify the XSLT style sheet to be used (<?xml-stylesheet

type = “text/xsl” href = “XBRL-example.xsl”?>) To plify the example, the style sheet is applied to the XML document by embedding the stylesheet command in the document However, it should be noted that embedding the stylesheet command in an XML document is only one way of displaying an XML document Another method of handling an XML document is to use XSLT to transform

sim-an XBRL or XML document into other formats, such as HTML, text, spreadsheet, and database formats Figure

12 shows the XBRL example in Internet Explorer Users might want to move data in and out of special applications, such as database and spreadsheet software For example, users might want to view, update, and re- view the data in a spreadsheet as an intermediate step

in the context of a larger business process Currently, most major office suite software supports the storage and manipulation of XML documents Microsoft Office XP, for instance, supports XML document files Therefore, with XML support built into Excel, users can load data

Trang 28

S UMMARY OF A DVANTAGES AND L IMITATIONS OF XBRL 875

Figure 13: XBRL example in Excel.

from an XBRL document into Excel and apply their own

analytic procedures on the data Figure 13 shows an

XBRL example document that is loaded into Microsoft

XBRL provides a number of important benefits It is

tech-nology independent; thus, XBRL is relevant for all users

of financial information, regardless of system or platform

used Second, XBRL tags describe content and structure.

Therefore, by searching tagged information, users can obtain more reliable results more efficiently Third, be- cause XBRL documents are prepared using a taxonomy, data can be exchanged and processed without modifi- cation This permits interchangeability of data and cuts down on data manipulation costs Fourth, XBRL docu- ments can be transformed to several formats, such as a Web page and a data file for spreadsheet and database software Consequently, data in XBRL may be displayed

in a Web browser, sent to a database, sent to a printer, and used to create other XBRL documents Fifth, because XBRL facilitates paperless financial reporting, the cost

of producing financial and regulatory information can be substantially reduced Finally, XBRL enhances the analy- sis of multiple company financial information; users can obtain and analyze several companies’ financial data si- multaneously (assuming they follow the same generally accepted accounting principles).

Trang 29

XBRL (E XTENSIBLE B USINESS R EPORTING L ANGUAGE ): B USINESS R EPORTING WITH XML 876

Limitations of XBRL

Although XBRL provides a number of important

bene-fits, it also has limitations First, it is important to note

that XBRL provides tags for conventional financial

state-ments and does not address other methods of displaying

financial data, such as formulas, graphs, and charts In

fact, XBRL is not primarily designed for easy rendering

of information for human consumption—its primary

ob-jective is to enhance efficiency of data transfer and

archiv-ing Many accounting professionals and users have

sug-gested that current financial statements do not fully live

up to users’ expectations because the conventional

finan-cial statement reporting format may not meet the needs

of users who prefer various types of multimedia formats

or multidimensional numerical and graphical

presenta-tions XBRL does not provide a standardized format for

such displays, focusing instead on conventional financial

statement content Second, XBRL does not currently

ad-dress the quality of information, for example whether

data coded in XBRL are reliable A number of XBRL

tax-onomies are being developed, raising the possibility of

errors in selecting and applying XBRL taxonomies and

codes/tags Also, information on the Web can be easily

created and revised, and its source can be disguised,

rais-ing questions about the trustworthiness of information

disseminated via the Internet, including information in

XBRL format Third, XBRL currently views the

accoun-tant’s report as part and parcel of the financial statement

package as a whole It does not provide for an assurance

report on an individual financial statement or an

individ-ual item in a financial statement, or on the internal

con-trols underlying the financial reports We deal with these

issues in some depth in Boritz and No (2002).

CONCLUSION

Many companies are attempting to disseminate financial

information over the Internet They have set up Intranets,

connected the Intranets to the Internet, and have created

corporate Web sites to provide employees, investors,

fi-nancial analysts, and other users with the information

they need on a timely basis However, data must often

be reentered or cut and pasted by users seeking to

ana-lyze it because there are no common, generally accepted

formats for describing business reporting data.

XBRL was created to help address these problems.

XBRL is a markup language for documents containing

structured financial information It provides a ized method to prepare, publish, and exchange financial reports and the information they contain without modifi- cation Thus, XBRL offers technology independence, full interoperability, efficient preparation of financial state- ments, and efficient extraction of financial information for analysis purposes.

standard-APPENDIX A: CREATING AN XBRL DOCUMENT

Here, we briefly describe how to create an XBRL ment and an XSLT style sheet Please note that this exam- ple is based on version 1.0 of XBRL The XBRL specifica- tion version 2.0 was publicly announced on Dec 14, 2001 However, at the time this article was prepared, the XBRL taxonomy version 2.0 was not yet available Version 2.0 is significantly different from version 1.0, but the key con- cepts described in this article are still applicable Suppose Waterloo Inc wishes to prepare its financial statements and distribute them to creditors, investors, analysts, and regulatory parties over the Internet in XBRL format Table A1 shows the simple balance sheet of Waterloo Inc.

docu-An XBRL document is a collection of elements and tributes that describe financial information and data The XBRL document can be created by using a text editor (a software application that enables a user to create and modify text files), such as WordPad, or an XML editor or

at-an XBRL instat-ance creation tool The XBRL document for the balance sheet of Waterloo Inc is shown below.

Table A1 Balance Sheet

Trang 30

A PPENDIX A: C REATING AN XBRL D OCUMENT 877

The first line is the XML declaration: <?xml version =

“1.0” encoding = “utf-8”?> It is an example of an XML

processing instruction The XML processing instruction

starts with “<?” and ends with “?>” and the first word

af-ter “<?” is the name of the processing instruction Usually,

an XML document starts with the XML declaration that

specifies the version of XML being used Thus version =

“1.0” indicates that the document conforms to XML 1.0.

The XML declaration may also have several attributes.

In the above example, the “encoding” attribute specifies

which character encoding is being used UTF-8 is used

for the example document UTF stands for UCS (Universal

Character Set) transformation formats It is a compressed

form of unicode that leaves pure ASCII text unchanged.

Therefore, XBRL documents that contain nothing but the

common ASCII characters can be edited with applications

that do not deal with multibyte character sets like

Uni-code.

Line 2 contains the processing instruction required to display the XBRL document in the Web browser The processing instruction, <?xml-stylesheet?>, has two at- tributes, “type” and “href.” The type attribute specifies the style sheet language used, and the href attribute specifies

a URL where the style sheet is located In our example, the type is “text/xsl” and the href is “Appendix.xsl.” These are further explained and illustrated later.

XBRL documents are created by using one or more onomies A taxonomy is a dictionary of the financial terms used in preparing business reports, such as financial state- ments The taxonomy can be a commonly accepted taxon- omy, such as the CI (Commercial and Industrial) taxon- omy created by XBRL.ORG, or other taxonomies created

tax-by users for their specific requirements Lines 4 through

12 indicate the XML namespace for the taxonomy used to create the example document, namely the CI taxonomy (us-gaap-ci-2000-07-31.xsd) XML namespaces provide a

Trang 31

XBRL (E XTENSIBLE B USINESS R EPORTING L ANGUAGE ): B USINESS R EPORTING WITH XML 878

Figure A1: XBRL “Cash and Cash Equivalents” element in a taxonomy viewer application.

simple method for qualifying element and attribute names

used in XML documents by associating them with

names-paces identified by URL references Thus, they uniquely

identify a set of names so that there is no ambiguity when

objects having different origins but the same names are

mixed together In an XML document, any element type

or attribute name can thus have a two-part name,

con-sisting of the name of its namespace and then its local

(functional) name (Further information may be found at

the W3C Web site, http://www.w3.org.)

The main task in creating an XBRL document is

map-ping the company’s financial information to XBRL

finan-cial terms contained in the taxonomy This involves

find-ing the XBRL elements that correspond to the company’s

financial information For example, lines 15 and 46 show

the XBRL elements for the balance sheet The <group

type = “ci:statements.balanceSheet”> is a start tag, and

</group> is an end tag The XBRL elements between the

two tags describe each balance sheet item.

Because XBRL taxonomy files are XML files, users can

find XBRL elements that correspond to their financial

in-formation by using a text editor, as illustrated in Figure 9.

Although it is possible for users to view taxonomy

infor-mation with any text editor, a taxonomy viewer

appli-cation can help users obtain a better and faster

under-standing of the structure of this information Therefore,

with a taxonomy viewer application, users can easily pare XBRL documents by mapping XBRL elements in various taxonomies to their financial information For instance, lines 16 through 20 illustrate the XBRL ele- ments for the cash and cash equivalents item Using the taxonomy viewer application, users obtain the XBRL el- ement name for their cash and cash equivalents item.

pre-A screen shot of the XBRL “Cash and Cash lents” element in a taxonomy viewer application is shown

Equiva-in Figure A1 The taxonomy viewer application used Equiva-in Appendix I is available from XBRL Solutions Inc., at http://www.xbrlsolutions.com.

The name of the XBRL taxonomy element for cash and cash equivalents is “cashCashEquivalentsAndShortTerm- Investments.cashAndCashEquivalents.” Thus, the start tag for the cash and cash equivalents item is <group type =

AndCashEquivalents”>, and the end tag is </group> The XBRL elements between the start and end tags de- scribe “label” and “item” information Line 17 shows the label of the cash and cash equivalents item, and lines 18 and 19 illustrate the amount of cash and cash equivalents for the years 2000 and 1999, respectively.

“ci:cashCashEquivalentsAndShortTermInvestments.cash-By following the same steps, the rest of the balance sheet items in the balance sheet of Waterloo Inc can be mapped to XBRL elements Lines 21 through 25 show the

Trang 32

A PPENDIX A: C REATING AN XBRL D OCUMENT 879

Figure A2: Screen shot of the Internet-based XBRL validation service provided by XBRL

Solutions Inc.

XBRL elements for the accounts receivable item, and the

XBRL elements for the accounts payable item are shown

in lines 31 through 35 Finally, lines 36 though 40 contain

the XBRL elements for the common stock item.

Once the XBRL document is created, it is important to check whether the created document is a valid XBRL doc-

ument The validation can be performed by using

valida-tion software or an Internet-based service A screen shot

of the Internet-based XBRL validation service provided

by XBRL Solutions Inc (http://www.xbrlsolutions.com/)

is shown in Figure A2.

An XBRL document provides contextual information, but it does not define how the information should be dis-

played To display an XBRL document in a Web browser,

users need to write a style sheet (prepared with a style sheet language) for the XBRL document to specify how the document should be displayed A style sheet can be shared between different documents and different users,

as well as integrated with other style sheets With the appropriate style sheets, users can transform the XBRL document into an HTML document, text document, word processing document, spreadsheet, database file, or an- other XBRL document The two most popular style sheet languages are CSS and XSLT XSLT is currently the only style sheet language designed specifically for use with XML Thus, for our XBRL example, we will create an XSLT style sheet to transform XBRL into HTML The cor- responding XSLT style sheet example is shown below.

09: <P ALIGN="CENTER"><B><FONT SIZE="6">Balance Sheet</FONT></B></P>

10: <P ALIGN="CENTER"><I><B><FONT SIZE="3">Waterloo Inc.</FONT></B></I></P>

11: <TABLE BORDER="0" CELLPADDING="5" CELLSPACING="0" WIDTH="100%">

Trang 33

XBRL (E XTENSIBLE B USINESS R EPORTING L ANGUAGE ): B USINESS R EPORTING WITH XML 880

19: <TD WIDTH="25%" STYLE="border-bottom-style: solid; border-bottom-width: 3"

Because XSLT uses XML to describe templates, rules,

and patterns, an XSLT style sheet starts with the XML

dec-laration <?xml version = “1.0”?> The XSLT document

it-self is an “xsl:stylesheet” element Thus, line 2 of the XSLT

style sheet example describes the start of the XSLT

pro-cess with the XSLT propro-cessing instruction: <xsl:stylesheet

xmlns:xsl = “http://www.w3.org/1999/XSL/Transform”

version = “1.0”>

Line 52 indicates the end of the XSLT process:

</xsl:stylesheet> The XSLT processing instruction

indi-cates the XSLT name space—the location of the XML

el-ements that comprise XSLT instructions XSLT

instruc-tions are identified by the “xsl:” prefix on the element.

Line 4 specifies the overall method used for outputting

the result.

As you can see from the example, an XBRL document

has a hierarchical structure whereby the root element is

connected to its child elements, each of which may

con-nect to zero or more children of its own, and so forth.

Figure A3 displays each element of the XBRL example as

a tree structure.

XSLT accepts an XBRL document as input and duces another document as output An XSLT style sheet consists of a list of templates and instructions A template has a pattern that specifies the elements it applies to an XBRL document Thus, when the pattern is matched, in- structions contained in the template are applied In other words, when an XSLT style sheet is applied to an XBRL document, XSLT recognizes the root element of the XBRL document and looks through each child element in turn.

pro-As each element in the XBRL document is read, XSLT compares it with the pattern of each template in the style sheet When XSLT finds an element that matches a tem- plate’s pattern, it creates outputs by applying the instruc- tions contained in the template.

Each template is represented by using a “xsl:template” processing instruction The template instruction starts with <xsl:template match = “ ”> and ends with </xsl: template> Lines 5 and 51 show an example of a template instruction Line 5 indicates the template of the root el- ement: <xsl:template match = “/”> Each “xsl:template” instruction has a “match” attribute that specifies which

Trang 34

A PPENDIX A: C REATING AN XBRL D OCUMENT 881

Root

Assets

Liabilities and Stockholders Equity

Liabilities Stockholders

Equity Cash and

Cash Equivalents

Accounts Receivable

Accounts Payable Common Stock Balance Sheet

Figure A3: Elements of the XBRL example displayed as a tree

structure.

element of the template is instantiated To specify the root

element in the template, the value “/” is given its match

attribute.

There are three useful XSLT processing instructions for transforming the value of an element in the XBRL

document into an element in the output document First,

the “xsl:value-of” instruction copies the value of an

ele-ment in the XBRL docuele-ment into the output docuele-ment.

Each “xsl:value-of” instruction has a “select” attribute that

specifies which element’s value is being taken For

exam-ple, suppose you want to copy the content of the cash

and cash equivalents element, specifically the value of its

item You can obtain the value with <xsl:value-of select

= “item”/> The “xsl:value-of” instruction should only be

used in contexts where it is unambiguous as to which

el-ement’s value is being taken, because if there are multiple

possible elements that could be selected, only the first one

will be chosen.

There are several ways of processing multiple elements

in turn One option is the “xsl:for-each” instruction The

“xsl:for-each” instruction processes each element chosen

by its selected attribute in turn Lines 23 and 47 show

an example of the “xsl:for-each” instruction Both lines

illustrate the processing of the child elements of the

“group” element Line 19 shows a start tag <xsl:for-each select = “group/group/group”> and line 54 indicates an end tag </xsl:for-each> Each “xsl:for-each” instruction has a “select” attribute that specifies which element’s value

is being taken To specify the child elements, the value “/”

is given its selected attribute For example, “group/group” indicates that all group elements within a group element should be processed.

Finally, XSLT provides instructions that enable users

to process child elements based on the input One option

is the “xsl:choose” instruction It provides multiple ditional testing in conjunction with the “xsl:when” and

con-“xsl:otherwise” elements Lines 25 through 45 show an ample of the “xsl:choose” instruction The “test” attribute

ex-of “xsl:when” contains a select expression that evaluates

to a boolean Therefore, if the expression is true, the tents of the “xsl:when” instruction are processed Other- wise, the contents of the “xsl:otherwise” instruction are processed.

con-Line 25 shows the start tag of the “xsl:choose” struction: <xsl:choose> Line 53 shows the end tag: </xsl: choose> This instruction states that if the “type” at- tribute of the current element is equal to “ci:statements balanceSheet” or “ci:balanceSheet.liabilitiesAndStock holdersEquity,” then the XSLT instructions between lines

in-27 and 35 are processed Otherwise, the XSLT instructions between lines 38 and 43 are processed.

When the XSLT style sheet example is applied to the XBRL document example, the following actions occur.

Lines 1 and 2: These indicate the start of the XSLT process.

Line 4: This XSLT instruction indicates that the results are transformed as HTML.

Line 5: The root element is compared with the pattern of each template in the style sheet It matches the first one.

Lines 6–22: The following HTML tags are written out.

<HTML>

<TITLE>XBRL Example</TITLE>

<BODY>

<P ALIGN="CENTER"><B><FONT SIZE="6"> Balance Sheet</FONT></B></P>

<P ALIGN="CENTER"><I><B><FONT SIZE="3">Waterloo Inc.</FONT></B></I></P>

<TABLE BORDER="0" CELLPADDING="5" CELLSPACING="0" WIDTH="100%">

Trang 35

XBRL (E XTENSIBLE B USINESS R EPORTING L ANGUAGE ): B USINESS R EPORTING WITH XML 882

Lines 23–47: The “xsl:for-each” instruction processes each

child element of the “group/group/group” element.

Line 24: The HTML tag, <TR>, is written out.

Lines 25–45: The XSLT instruction “xsl:choose” is

pro-cessed.

Lines 26–36: If the attribute of the current element is equal

to “ci:statements.balanceSheet” or “ci:balanceSheet.

liabilitiesAndStockholdersEquity,” then instructions

between lines 27 and 35 are processed These lines

show the XSLT instructions that write out total assets

and total liabilities and stockholders’ equity.

Line 27: The HTML tag, <TD WIDTH = “50%” STYLE =

“border-top: 2px solid #000000; border-bottom: 5px

double #000000”>, is written out.

Line 28: The value of the current element’s label is written

out with HTML tags Example: <B><FONT SIZE = “3”>

Total assets </FONT></B>

Line 29: The HTML tag, </TD>, is written out.

Line 30: The “xsl:for-each” instruction processes each

“item” element.

Lines 31–32: The <TD WIDTH = “25%” STYLE =

“border-top: 2px solid #000000; border-bottom: 5px double

#000000”> and <FONT SIZE = “3”><P ALIGN =

“RIGHT”> tags are written out.

Line 33: The value of the current element is converted to

a formatted number Example: 30,000.

Line 34: The </P></FONT></TD> tags are written out.

Lines 37–44: Otherwise, instructions between lines 38 and

43 are processed These lines show the XSLT

instruc-tions that write out balance sheet items.

Line 38: The value of the current element’s label is

written out with HTML tags Example: <TD WIDTH =

Figure A4: XBRL example.

“50%”><FONT SIZE = “3”> Cash and cash equivalents

Line 41: The value of the current element is converted to

a formatted number Example: 18,000.

Line 42: The </P></FONT></TD> tags are written out Line 46: The </TR> tag is written out.

Lines 48–50: The following HTML tags are written out.

“Appendix.xsl”?> Currently, the processing instruction

<?xml -stylesheet?> is included in the XBRL document

to specify the style sheet to be used However, in the long term, there will be a number of different ways to do it, including browser-server negotiation via HTTP headers,

Trang 36

G LOSSARY 883

naming conventions, and browser-side defaults Figure A4

shows the XBRL example in the Web browser.

Microsoft Internet Explorer 6.0 is recommended for this example Internet Explorer 5.0 and 5.5 include the

Microsoft XML parser (MSXML), which includes an

implementation of XSL, which is based on a working

draft of the XSLT specification The XSLT specification

was finalized on November 19, 1999 The MSXML

parser installed in Internet Explorer 5.0 and 5.5 does

not support the most current XSLT specification Thus,

a reader of this article who uses Internet Explorer 5.0

or 5.5 must install MSXML 3.0 or a higher version

from http://MSDN.microsoft.com/xml Unfortunately,

Netscape 6.2 does not support the XSLT specification.

Therefore, the example will not work in Netscape.

In this appendix, we have explained how to create an XBRL document and an XSLT style sheet However, in

practice, XBRL documents will be created by a software

package that automatically creates an XBRL document

by mapping a company’s financial statements prepared

by its internal accounting system to XBRL taxonomy

ele-ments and validates the resulting XBRL code In addition,

XSLT style sheets would be created automatically by using

a style sheet generating software package The validated

XBRL document can then be made available to users, such

as creditors, investors, and analysts, on the company’s

Web site Users can analyze the data in the XBRL

doc-ument by loading it into software, such as spreadsheet

and database software, on their own computers.

APPENDIX B: FOR MORE

XBRL Information xbrlinfo.htm

Oracle http://technet.oracle.com/tech/xmlPricewaterhouseCoopers http://www.pwcglobal.com

xbrl-publicXBRL Solutions, Inc http://www.xbrlsolutions.comXBRL Tools http://www.xbrl.org/resource

ex-CSS Cascading Style Sheets It is a means of ing the presentation from the structural markup Cas- cading Style Sheets level 1 (CSS1) is a W3C recom- mendation It describes the CSS language as well as a basic formatting model Cascading Style Sheets level 2 (CSS2), which is also a W3C recommendation, builds

separat-on CSS1 It includes media-specific style sheets (e.g., printers and aural devices), and element positioning and tables.

DTD Document Type Definition A DTD defines the tags the document type will use, what they mean, and whether, and to what extent, individual tags can be nested For example, HTML is a SGML DTD.

Element A concept described by a taxonomy For ample, the element with the name “nonCurrentAssets propertyPlantAndEquipmentNet” is a concept.

ex-HTML HyperText Markup Language, the basic guage for creating a Web page HTML consists of a set of markup symbols inserted into a file intended for display on a Web browser page The markup tags tell the Web browser how to display a Web page’s words and images for the user.

lan-Instance An XML document containing XBRL ments that together constitute one or more statements The financial statements of a specific company, ex- pressed in XBRL, would be an instance.

ele-Item A fact reported within a given period of time about

a given business entity Corresponds to an abstract XML element “item” in XBRL.

Markup The sequence of characters or other symbols that are inserted at certain places in a text or word processing file to indicate how the file should look when it is printed or displayed or to describe the doc- ument’s logical structure The markup indicators are often called tags.

SGML Standard Generalized Markup Language, an ternational standard for defining and using document structure and content SGML incorporates both data labeling and data presentation information but leaves procedural issues entirely to the rendering applica- tion.

in-Style Sheet A mechanism to describe how a document should be displayed A style sheet is prepared with a style sheet language Two of the most popular style sheet languages are CSS and XSLT.

Taxonomy A dictionary of the financial terms used in preparing financial statements or other business re- ports and the corresponding XBRL tags.

XBRL Extensible Business Reporting Language XBRL

is the financial profession’s adaptation of XML for nancial reporting A joint industry and government consortium, including the American Institute of Certi- fied Public Accountants (AICPA), six information tech- nology companies, and the five largest accounting and professional services firms, was established for this purpose in the fall of 1999.

Trang 37

fi-XBRL (E XTENSIBLE B USINESS R EPORTING L ANGUAGE ): B USINESS R EPORTING WITH XML 884

XML Extensible Markup Language XML was invented

by adopting the key functions of SGML while

exclud-ing the less essential ones It is extensible because the

language can be extended by anyone who wants to

cre-ate additional tags for new and unforeseen purposes.

It is a markup language because XML is a method of

tagging information using accepted rules and formats

to give definition to text and symbols.

XML Schema An XML-based alternative to a DTD to

de-scribe the structure, content and semantics of an XML

document.

XSLT Extensible Stylesheet Language Transformations,

a style sheet language designed specifically for use

with XML XSLT can transform XML into other

doc-uments, such as HTML or database, filter and sort

XML data, format XML data, add or remove elements

into/from the output file, and rearrange and sort the

element.

CROSS REFERENCES

See Cascading Style Sheets (CSS); Extensible Markup

Language (XML); Extensible Stylesheet Language (XSL);

HTML/XHTML (HyperText Markup Language/Extensible

HyperText Markup Language); Public Accounting Firms.

REFERENCES

APRA (n.d.) Retrieved April 29, 2003, from http://www.

apra.gov.au/

Boritz, J E., & No, W G (2002) Assurance reporting with

XML: XARL (extensible assurance reporting language).

Manuscript, University of Waterloo, Center for

Infor-mation System Assurance.

Clark, J (n.d.) Comparison of SGML and XML Retrieved

April 29, 2003, from

FpML (n.d.) FpML: The XML standard for swaps,

deriva-tives and structured products Retrieved April 29, 2003,

from http://www.fpml.org/

Microsoft (n.d.) MSFT investor relations Retrieved

April 29, 2003, from http://www.microsoft.com/msft/

Open Financial Exchange (n.d.) Retrieved April 29, 2003,

from http://www.ofx.net/

Smith, M (1996) Complex typography: How an early

printer eliminated the scribes’ red Typography Papers,

1, 75–92.

Web Design Group (n.d.) Linking style sheets to HTML.

Retrieved April 29, 2003, from http://www.htmlhelp.

com/reference/css/style-html.html

W3C (n.d.a) XML Linking Language (XLink) version

1.0 Retrieved April 29, 2003, from http://www.w3.org/

ver-XBRL Home Page (2000) Retrieved August, 2001, from http://www.xbrl.org/

XMLEDI (n.d.) Retrieved April 29, 2003, from http:// www.xmledi-group.org/

FURTHER READING

Bosak, J (1997) XML, Java, and the future of the Web.

Retrieved May 12, 2002, from http://www.xml.com/ pub/a/w3j/s3.bosak.html

Bosak, J., & Bray, T (1999) XML and the second generation Web Retrieved January, 2002, from http://www.sciam.

com / article.cfm ? articleID = B4A8809EC588EEDF

0008C786-91DB-1CD6-Floyd, M (1998) A Conversation with Charles F Goldfarb Retrieved January, 2002, from http://www.

webtechniques.com/archives/1998/11/beyo/

Halfhill, T R (1999) XML: the next big thing Retrieved

February, 2002, from http:// http://domino.research ibm.com/comm/wwwrthinkresearch.nsf/pages/xml199 html

Harold, E R (2001) XML Bible 2nd Edition New York:

John Wiley & Sons.

Hoffman, C., Kurt, C., & Koreto, R J (1999) The XML files Retrieved January, 2002, from http://www.aicpa.

MSDN online Web Workshop (2001) XML (extensible markup language) Retrieved April, 2002, from http://

msdn.microsoft.com/xml/general/index.htm

The CoverPages (1999) AICPA, Information ogy Companies, and Five Largest Accounting and Professional Service Firms Join Forces in Developing XML-Based Financial Reporting Language Retrieved

Technol-February 18, 2002, from http://xml.coverpages.org/ xfrmlAnn.html

Schatz, B R (1997) Information retrieval in digital

libraries: Bringing search to the net Science, 275, 327–334 Retrieved March 11, 2003, from http://www.

canis.uiuc.edu/archive/papers/science-irdl-journal.pdf

Schmidt, W C., & Cohen, E E (1999) A better language for utilizing the Web Retrieved February, 2002, from

http://www.nysscpa.org/cpajournal/f201199m.html Watson, L A., McGuire, B L., & Cohen, E E (2000).

Looking at business reports through XBRL-tinted glasses Retrieved April, 2002, from http://www.

strategicfinancemag.com/2000/09g.htm

W3C (1999) XML in 10 points Retrieved February,

2002, from points.html

http://www.w3.org/XML/1999/XML-in-10-XBRL Home Page (2000) Overview/facts sheet Retrieved

August, 2001, from http://www.xbrl.org/Faq.htm

XBRL Home Page (2000) Financial reporting for mercial and industrial gompanies, US GAAP Retrieved

Trang 38

com-F URTHER R EADING 885

August, 2001, from http://www.xbrl.org/us/gaap/ci/

2000-07-31/us-gaap-ci-2000-07-31.htm

XBRL Home Page (2000) Extensible business

report-ing language (XBRL) specification Retrieved August,

2001, from 2000-07-31.htm

http://www.xbrl.org/TR/2000-07-31/XBRL-XBRL Resource Center (2001) http://www.xbrl.org/TR/2000-07-31/XBRL-XBRL educational resource section Retrieved November, 2001, from http://web.

bryant.edu/ ∼xbrl/index.html Zarowin, S., & Harding, W E (2000) Finally, business

talks the same language Journal of Accountancy,

Au-gust, 24–30.

Trang 39

886

Trang 40

Carlisle M Adams Senior

Cryptographer, Entrust, Inc

E Scott Adler University of Colorado,

Boulder

Fred J Aebli Penn State University

Van B Afes New York University

Ilieva Ilizastigui Ageenko Wachovia

Jim Allan Texas School for the Blind

and Visually Impaired

Kathleen Allen University of Southern

California

Marcus T Allen Florida Atlantic

University

Sheri Alpert University of Notre Dame

Patrick Alphonso Swamiware LLC

Maria Dolores Alvarez Bo ˘gaziçi

Fedor Andrianov The University of

California, Los Angeles

Marios C Angelides Brunel University,

Alfred W Arsenault Diversinet Corp.

Angelo Artale University of California,

Berkeley

Robert C Ash University Southeast

Okechukwu B Asobie University of

at Little Rock

Annelise J Bazar West Valley College Michael D Beavers Lake Land College Greg Becker University of Maryland Andrew Beckerman-Rodau Suffolk

University

Barton Beebe Yeshiva University Salvatore Belardo State University of

New York, at Albany

Colleen Bell University of Oregon Mary Ann Bell Sam Houston State

University

Thomas W Bennet Mississippi College Robert Berezdivin George Mason

University

Anthony K Betrus State University of

New York at Potsdam

B Bhagyavati Columbus State

Chico

Alex Bordetsky Naval Postgraduate

School, Monterey, California

Polly D Boruff-Jones Indiana

University Purdue UniversityIndianapolis

William H Bowers Penn State

Berks-Lehigh Valley College

Paul Bracke Arizona Health Sciences

New York at Buffalo

Stephen T Brower Raritan Valley

Anglia, United Kingdom

Gary Burnett Florida State University Ray Cafolla Florida Atlantic University Xiaomei Cai University of Delaware Metin Çakanyildirim University of

Texas at Dallas

Dean S Caldwell University of

Maryland, University College

Dale W Callahan University of

Heidi Campbell University of

Edinburgh, United Kingdom

Kim Sydow Campbell University of

Ngày đăng: 14/08/2014, 09:22

TỪ KHÓA LIÊN QUAN