E-Business Notes
E-Business Notes
E-Business Notes
I NT R OD U C T I O N
DEFINITION OF E-BUSINESS
Electronic Business is the delivery of goods, services ,information ,or payments over computer
networks or by any other electronic means.
1
It is the application of technology toward the automation of business transactions and workflow.
Electronic Business is a tool that addresses the desire of firms, consumers, and management to
cut services costs while improving the quality of customer service and increasing the speed of
service delivery.
From an online perspective.
Electronic Business provides the capability of buying and selling products and information over
the Internet and other online services.
It provides a gathering place for community members, to learn, transact, and collaborate.
There is some degree of overlap between e commerce and e business. This can
however be refuted by the fact that the overlap between buy side and supply side e
commerce is significant often with linkages in the form of intranets ( a private network
within a single company using internet standards to enable employees to share
information using e mail and web publishing).
E Business and e commerce are synonymous as the two are broadly equivalent.
E commerce is a subset of e business. This seems more realistic since e commerce
does not refer to many of the transactions within a business such as processing a
purchase order that are part of e business. E business therefore emphasizes full
integration and application of technologies to operations.
2
While some use e-commerce and e-business interchangeably, they are distinct concepts.
In e-commerce, information and communications technology (ICT) is used in inter-
business or inter-organizational transactions (transactions between and among
firms/organizations) and in business-to-consumer transactions (transactions between
firms/organizations and individuals).
In e-business, on the other hand, ICT is used to enhance one’s business. It includes any
process that a business organization (either a for-profit, governmental or non-profit
entity) conducts over a computer-mediated network. A more comprehensive definition
of e-business is:
“The transformation of an organization’s processes to deliver additional customer value
through the application of technologies, philosophies and computing paradigm of the new
economy.”
Three primary processes are enhanced in e-business:
1. Production processes, which include procurement, ordering and replenishment of
stocks; processing of payments; electronic links with suppliers; and production control
processes, among others;
2. Customer-focused processes, which include promotional and marketing efforts,
selling over the Internet, processing of customers’ purchase orders and payments, and
customer support, among others; and
3. Internal management processes, which include employee services, training,
internal information-sharing, video-conferencing, and recruiting. Electronic applications
enhance information flow between production and sales forces to improve sales force
productivity. Workgroup communications and electronic publishing of internal business
information are likewise made more efficient. [6]
IST H E I N T E R N E T E C O NO M Y SY NO NY M O U S WI T H E - C O M M E R C E A ND E -
BUSINESS?
The Internet economy is a broader concept than e-commerce and e-business. It includes
e-commerce and e-business.
Right information
Infrastructure, and
3
Support services
People
Public Policy
Business partners
Support services
E-C O M M E R C E A PP LI C A T I O N S : I S S U E S A ND P RO SP E C T S
a) Benefits of e Commerce
4
• Increase Visibility through Search Engine Marketing
increase sales - this is the first thing that people consider when dealing with e-commerce
decreasing costs
increase profits
Tangible benefits
5
Increased sales from new sales leads giving rise to increased revenue from new customers
and markets as well as from existing customers through repeat selling and cross selling.
Marketing cost reductions from reduced time in customer service, online sales, and
reduced printing and distribution costs of marketing communications.
Supply chain cost reductions from reduced levels of inventory, increased competition
from suppliers and shorter cycle time in ordering.
Administrative cost reductions from more efficient routine business processes such as
recruitment, invoice payment etc
Intangible benefits
Advantages
elderly people or people with disability’s who are not able to go to the shops can still be
customers of yours
6
E-commerce makes “mass customization” possible. E-commerce
applications in this area include easy-to-use ordering systems that allow
customers to choose and order products according to their personal and
unique specifications. For instance, a car manufacturing company with an e-
commerce strategy allowing for online orders can have new cars built
within a few days (instead of the several weeks it currently takes to build a
new vehicle) based on customer’s specifications. This can work more
effectively if a company’s manufacturing process is advanced and
integrated into the ordering system.
Limitations of E-Business
Security and
Technological privacy concerns
There is lack of
Limitations deter customers
universally
from buying.
accepted standards
for quality, security, Trust in E-
and reliability. Business and in
The unknown sellers
telecommunication hinders buying.
bandwidth is
National and
insufficient.
International
government
regulations
Software
sometimes get in
development tools
the way.
are still evolving.
It’s difficult to
There are
measure the
difficulties
benefits of
intergrating the
effectiveness of
Internet and the E-
online
Business software
advertising.
wuth some existing
(especially legacy) Some customers
applications and like to feel and
databases. touch
products .Custo
Special web servers
mers are
in addition to the
7
network servers are resistant to the
needed (added change from a
costs). real to an online
store.
Internet
accessibility is still People do not
expensive and /or yet sufficiently
inconvinient. trust paperless,
faceless
transactions.
There is an
insufficient
number (critical
mass) of sellers
and buyers
needed for
profitable E-
Business
operations.
Ecommerce can be broken into four main categories: B2B, B2C, C2B, and
C2C.
B2B (Business-to-Business)
Companies doing business with each other such as manufacturers selling to distributors and
wholesalers selling to retailers. Pricing is based on quantity of order and is often negotiable.
Examples include organization sites such as www.dell.com or business marketplaces such
as commerceone.
B2C (Business-to-Consumer)
Businesses selling to the general public typically through catalogs utilizing shopping cart
software. By dollar volume, B2B takes the prize, however B2C is really what the average Joe
has in mind with regards to ecommerce as a whole.eg organization sites like
8
www.amazon.com or consumer marketplaces such as www.shopsmart.com .
Having a hard time finding a book? Need to purchase a custom, high-end computer system?
How about a first class, all-inclusive trip to a tropical island? With the advent ecommerce, all
three things can be purchased literally in minutes without human interaction. Oh how far
we've come!
C2B (Consumer-to-Business)
C2B models involve interactions originating from the customer. Such businesses fall into the
following categories:
Idea collectors
A company can motivate consumers who have innovative ideas to improve existing products
or services and buy the ideas at a reasonable price.
A consumer posts his project with a set budget online and within hours companies review
the consumer's requirements and bid on the project. The consumer reviews the bids and
selects the company that will complete the project. The internet empowers consumers
around the world by providing the meeting ground and platform for such transactions.eg
www.ideas.com
Reverse auctions
The process starts with asks or offers from buyers and sellers compete to serve the buyer
Consumers are allowed to submit binding bids by credit card for the purchase of products
such as airline tickets eg www.priceline.com
Complaint centres
This allows individuals to post complaints about a business, view other complaints about
any given business ,and interact directly with the business in question. The company
presents a business response time and effectiveness and effectiveness for public display, and
makes money by selling aggregated complaint research data. Eg www.ecomplaints.com
9
C2C (Consumer-to-Consumer)
There are many sites offering free classifieds, auctions, and forums where individuals can
buy and sell thanks to online payment systems like Pay Pal where people can send and
receive money online with ease. EBay’s auction service is a great example of where person-
to-person transactions take place everyday since 1995.
Brokerage
Advertising
Infomediary
Merchant
Manufacturer (Direct)
Affiliate
Community
Subscription
Utility
Type of
Model: Description:
10
Brokerag Brokers are market-makers: they bring buyers and
e sellers together and facilitate transactions. Brokers
Model play a frequent role in business-to-business (B2B),
business-to-consumer (B2C), or consumer-to-
consumer (C2C) markets. Usually a broker charges
a fee or commission for each transaction it enables.
The formula for fees can vary. Brokerage models
include:
11
Model broadcaster, in this case, a web site, provides
content (usually, but not necessarily, for free) and
services (like email, IM, blogs) mixed with
advertising messages in the form of banner ads.
The banner ads may be the major or sole source of
revenue for the broadcaster. The broadcaster may
be a content creator or a distributor of content
created elsewhere. The advertising model works
best when the volume of viewer traffic is large or
highly specialized.
12
intended content. [CBS MarketWatch]
13
online ordering. [Lands' End]
return to top
14
represents no cost to the merchant. The affiliate
model is inherently well-suited to the web, which
explains its popularity. Variations include, banner
exchange, pay-per-click, and revenue sharing
programs. [Barnes & Noble, Amazon.com]
15
Subscripti Users are charged a periodic -- daily, monthly or
on annual -- fee to subscribe to a service. It is not
Model uncommon for sites to combine free content with
"premium" (i.e., subscriber- or member-only)
content. Subscription fees are incurred irrespective
of actual usage rates. Subscription and advertising
models are frequently combined.
16
The impact of B2B markets on the economy of developing countries is
evident in the following:
Transaction costs. There are three cost areas that are significantly reduced
through the conduct of B2B e-commerce. First is the reduction of search
costs, as buyers need not go through multiple intermediaries to search for
information about suppliers, products and prices as in a traditional supply
chain. In terms of effort, time and money spent, the Internet is a more
efficient information channel than its traditional counterpart. In B2B
markets, buyers and sellers are gathered together into a single online
trading community, reducing search costs even further. Second is the
reduction in the costs of processing transactions (e.g. invoices, purchase
orders and payment schemes), as B2B allows for the automation of
transaction processes and therefore, the quick implementation of the same
compared to other channels (such as the telephone and fax). Efficiency in
trading processes and transactions is also enhanced through the B2B e-
market’s ability to process sales through online auctions. Third, online
processing improves inventory management and logistics.
Economies of scale and network effects. The rapid growth of B2B e-markets
creates traditional supply-side cost-based economies of scale. Furthermore,
the bringing together of a significant number of buyers and sellers provides
the demand-side economies of scale or network effects. Each additional
17
incremental participant in the e-market creates value for all participants in
the demand side. More participants form a critical mass, which is key in
attracting more users to an e-market.
M-COMMERCE
As content delivery over wireless devices becomes faster, more secure, and
scalable, some believe that m-commerce will surpass wireline e-commerce
as the method of choice for digital commerce transactions. This may well be
true for the Asia-Pacific where there are more mobile phone users than
there are Internet users.
Nature of m commerce
Time sensitivity the user is always on.It is possible to target the user at the appropriate time
Instant connectivity
Personalisation
18
Industries affected by m-commerce include:
Financial services, including mobile banking (when customers use their handheld devices
to access their accounts and pay their bills), as well as brokerage services (in which stock
quotes can be displayed and trading conducted from the same handheld device);
Telecommunications, in which service changes, bill payment and account reviews can all
be conducted from the same handheld device;
Service/retail, as consumers are given the ability to place and pay for orders on-the-fly; and
Information services, which include the delivery of entertainment, financial news, sports
figures and traffic updates to a single mobile device.
There are at least three major forces fuelling e-commerce: economic forces,
marketing and customer interaction forces, and technology, particularly
multimedia convergence.
19
departments within a corporation, and of business operations and
processes. This allows critical business information to be stored in a digital
form that can be retrieved instantly and transmitted electronically. Internal
integration is best exemplified by corporate intranets. Among the
companies with efficient corporate intranets are Procter and Gamble, IBM,
Nestle and Intel.
20
collection of networks, connected to share information using a common set
of protocols. Also, as a vast network of people and information, the Internet
is an enabler for e-commerce as it allows businesses to showcase and sell
their products and services online and gives potential customers, prospects,
and business partners access to information about these businesses and
their products and services that would lead to purchase.
Before the Internet was utilized for commercial purposes, companies used
private networks-such as the EDI or Electronic Data Interchange-to transact
business with each other. That was the early form of e-commerce. However,
installing and maintaining private networks was very expensive. With the
Internet, e-commerce spread rapidly because of the lower costs involved
and because the Internet is based on open standards.
add-on products, services, and new systems when they are needed. With
network production, a company can assign tasks within its non-core
competencies to factories all over the world that specialize in such tasks
(e.g., the assembly of specific components).
E BUSINESS INFRASTRUCTURE
21
The internet
The internet started in the 1960s as the Arpanet research and defense
network in the United States that linked servers used by the military and
academic collaborators. It was established as a network that would be
reliable even if some of the links were broken. This was achieved since data
and messages sent between users were broken up into smaller packets and
could follow different routes. Although the internet was subsequently
extended worldwide it was initially used extensively by academic and
defense communities. It has only recently catapulted into the mainstream
business and consumer usage.
22
It offers hyperlinks (a method of moving between one we site page and another, indicated to
a user by an image or text highlighted by underlining or a different colour).It allows for
easier surfing.
HTML supports a wide range of formatting making documents easy to read on different
devices.
Interaction is possible through HTML based forms that enable users to supply their personal
details for more information on a product, perform searches, ask questions, make comments
etc
Internet terms
1. Web browsers are software programmes used to access information on the web. They provide
an easy method of accessing and viewing information stored as web documents on different
servers. Examples include Microsoft Internet Explorer, Mozilla Firefox and Netscape Navigator.
2. Web servers are powerful computers that store and present the web pages accessed by web
browsers.
3. FTP(File Transfer Protocol) refers to programme standards used to upload and download files to
and from web servers.
4. Intranet is a private network within an organisation using internet standards to enable the
sharing of information using email and web publishing within the organisation.
5. Extranet is formed by extending the intranet beyond a company to customers, suppliers and
collaborators.
7. Search engine is a website or a database and the tools to search it e.g. google.com
23
HTTP(hypertext transfer protocol) is a standard which defines the way
information is transmitted across the internet between web browsers and web
servers. When you click on a link while viewing a website , the web browser
you are using will request information from the server computer hosting the
website using http protocol hence the letters http:// are used to prefix all we
addresses. According to Tim Berners Lee (1999) HTTP rules defines things like
which computer speaks first and how they speak in turn. When two computers
agree they can talk, they have to find a common way to represent their data so
that they can share it.
Domain name refers to the name of the web server and is usually selected to
be the same as the name of the organisation and the extension will indicate its
type. This extension is known as the global top level domain(gTLD).There are
also some country code top level domains(coTLD) e g .zw for Zimbabwe or .za
for South Africa. Common gTLDs are:
24
presented in HTML(hypertext markup language).It ensures that any web page
authored according tote definitions in the standard will appear the same way in
any web browser.
GIF(graphics interchange format) a graphics format and algorithm best used for simple graphics
like banner adverts.
JPEG(joint photographics experts group) a graphics format and algorithm best used for
photographs.
Streaming media(sound and video that can be experienced within a web browser before the
whole clip is downloaded)
Plug ins are add on programs to a web browser providing extra functionality such as animation
or reading other formats like PDF e g Adobe Acrobat and Macromedia Flash.
When designing a website 3 elements must be in mind i.e. the purpose, target
audience and expected behaviour.
Purpose relates to the sites reason for existence, its essence and what it aims
to accomplish. As such, it is important to define the stance of the site i.e. is it
formal or informal or whether is serious or fun. This can be shown in the style
of the site communicated through the use of colour, images, typography and
layout. What is shown should be in line with the way a product is branded or
positioned.
Target audience. Website designers must understand clearly who will benefit
from the site. It is useful to prepare a short description of the audience and
display it prominently. The definition of the audience must not be too broad or
too narrow and the audience must be substantial and reachable. A business
audience often requires detailed information while a consumer site is more
graphically intensive.
25
website will be static (one way) or interactive (two way) depending on the
amount of activity.
Quality of a website
Information quality relates to the factuality or correctness of information. Users do not need to
be inconvenienced checking and rechecking a site. In formation that is obviously propaganda or
unconditional praise leads to increased cynicism amongst users. Incorrect spellings and poor
grammar obviously affect user opinion. The quality of links matters. Brocken links (links that do
not work or lead to a page not found message) and wrong links (links that take you to a place you
did not expect) detract from the quality of information.
Information structure quality. Information also needs to be organised effectively. This helps
individuals understand the scope of the information provided and help them quickly locate
information they care about. Structure quality is detracted by too many categories, too few
categories, not enough information in a category and no logical arrangements.
Usability captures the quality of the user’s experience. High usability indicates great navigation
and easy access leading to a satisfying user experience. The top web design problems related to
usability are:
Long download times many users are very impatient about long download times and switch
away to another page if the page does not load in a few seconds.
Lay out Users must understand the overall structure of the page at all times and where they are
in relation to the homepage. Providing a site map or a consistent menu visible on all pages
alleviates this problem. Users can also make assumptions about the layout e g they assure that if
they click on the site logo in the left hand corner and go to the home page .If this does not
happen they may become confused.
Non standard link colours colours have meaning on line. Typically, darker colours like dark blue
are reserved for unread links and light colours like light brown are reserved for links that have
been used before.
Scrolling text and animations a document with a lot of text accessible only if users scroll to the
bottom is badly designed. Each page should have a small chunk of information that can be easily
understood. Simplicity is advisable for visuals. Many users are irritated by flashing, blinking, or
noisy things that detract from their main objective.
According to Yahoo website managers a profitable and effective website should have 3
characteristics:
26
Magnetic in terms of acquisition of visitors by way of promotions and making it
attractive.
Sticky in terms of retention or keeping customers on the site once they arrive and
encouraging them to engage in revenue generating activities.
a. Systems software
Standardisation can reduce purchase prices through multi/user licenses. These choices occur for the
client, server and network.
b. Transport or Network
Such decisions are based on the internal company network and its link
to the public internet. The main management business is whether internal or
external network management will be performed by the company or
outsourced to a third party.
c. Storage
27
Storage can be managed internally or externally. This is not an either or choice
e.g. intranet and extranet can be managed internally while internet storage
such as the corporate website is commonly managed externally or at an
application service provides.
Decisions also need to be made involving 3rd party service providers of the
technology infrastructure e.g.
Internet service providers ISP are companies that provide home or business
users with a connection to access the internet and hosting of websites e.g.
ecoweb, telone, zim on line.
ISPs provide a link to the worldwide web and also they host websites or provide
a link from a company’s web services to enable other companies and
consumers access to a corporate websites.
i. speed
ii. Availability
iii. Security
i. The speed of access is determined by the speed of the server and the
speed of the network connection to the server. Often the speed of the server
depends on the number of users. Often to ensure reliability companies can pay
ISPs foe services of a dedicated server a server that only contains contents and
application for a single company or using several servers to spread the demand
load i.e. web farms
To ensure the best speed and availability a company should check the service
level agreements (SLAs) when outsourcing web site hosting services. The SLA
should define confirmed standards of availability and performance. It should
28
also include notification to the customer derailing when the web service
becomes unavailable and reasons why and estimates when service will be
restored.
Rapid fulfillment of orders. Reduced lead times are achieved through reduced
times in placing and receiving orders, reduced times of information in transit
and through interaction with other processes.
Fewer errors in data entry and less time spent by the buyer or supplier on
exception handling
Reduced costs resulting from reduced staff time material savings such as paper
and forms and improved inventory control.
E environment
Social Factors
Much of activity online is social in native considering the use of email, social
networks such as face book, music sharing, gaming, and shopping among other
activities.
Cost of access initial costs of the computer are a major expenditure for many
households as well as costs of using an ISP
And the media phone line or cable charges also affect adoption.
29
Ease of use refers to ease of connecting through the ISP and the ease of using
the web once connected.
Fear of the unknown especially a general fear of technology a domain for the
young mostly under 45 years old. Other demographics webographics according
to Grossnickle and Raskin 2001 include
Experience level
Usage type
Usage level
Political Factors
i. Physical space comprising each individual country where its own laws
e.g privacy taxation or trading laws hold.
30
ii. ISPs make the connection between the physical and the virtual world
Since it is difficult to identify the end user in order to target them appropriately, often it
is necessary to invade the user’s privacy by planting cookies (small text files stored on an
end users computer to enable websites to identify them) or electronic tags on the end
users computer. Cookies have a bad reputation since it is believed that they could be
used to capture credit card information and other personal information. In most cases
customers would be unaware that their privacy is being invaded.
Customers may be quite happy to give personal information to a company that they
have formed a relationship with. They are likely to be less than happy if this company
sells the information to another company and they are subsequently bombarded with
promotional material. The other risk is of hackers accessing information held about a
customer on servers within a company.
Legal Factors
Some of the main e business related loyal issues on which companies seek specific legal
advice are:
31
Advertising standards. Most countries have specific laws to avoid
misrepresentation to the consumer and uncompetitive practices.
Data Protection and privacy law. A website must protect data held on
consumers according to the local law.
Technological Factors
Due to interlinkages within an organisation the setup develops into more of a supply chain network
which links between an organisation and all its partners with multiple supply chains. Logistics is a
concept closely related to supply chain management. It is the time related positioning of resources or
the strategic management of the supply chain. It relates to inbound logistics resources entering an
organisation from suppliers and outbound logistics resources supplied by an organisation to its
customers and intermediaries.
32
Development in supply chain management
To understand how e business can enhance supply chain and logistics management it is important to
consider the historical context of management approaches to supply chain management. The
following stages can be identified.
This focused on the physical movement of goods by treating stock management, warehousing, order
processing and delivery as related rather than separate activities.
Although information systems were developed to manage these processes they were often paper
based and not integrated across different functions. However some leading companies had
started using EDI at this time
1970/1980 logistics Management Materials requirements Planning MICP and Just in Time JIT
The JIT philosophy aims to make the process of raw materials production and distribution as efficient
and flexible as possible in terms of response supply and customer service. Minimum order
quantities and stock levels were sought by the customer and therefore manufacturers had to
introduce flexible manufacturing process and systems that interfaced directly with the customer
who would call an order directly against a prearranged schedule with a guarantee between that
it would be delivered on time.
MRP systems were important in maintaining resources at an optimal level. For JIT and MRP emphasis
was on lean production and lean supply where supply chains efficiency is aimed at eliminating
waste and minimise inventory and work in progress.
This involved closer integration the supplier, customer and intermediaries. Supply chain
management aimed at maximising the efficiency and effectiveness of the total supply chain for
the benefit of all the players and to maximum the opportunity for customer purchase by
ensuring adequate stock level at all stages of the process. Integrated systems such as SAP
Enterprise Resource Planning(ERP) system have helped manage the entire supply chain. ERP
system include modules which are deployed throughout the business and interface with
customers .Technology has enabled the introduction of faster, more responsive and flexible
ordering, manufacturing and distribution systems , which has diminished even the need for
warehouses to be located near to markets that they serve.
The ECR concept was developed for the food retailing business in the US but
has been applied to other products and other countries. It aimed at timely,
accurate, and paperless information flow by revising of processes supported by
information to ensure smooth continual flow of products matched to
33
consumption. To do so other areas such as retail space ,promotions and new
product development were prioritised.
1. Increased efficiency of individual processes. The cycle time needed to complete a process as
well as the resources needed to execute it has been reduced.
2. Reduced complexity of the supply chain .Disintermediation has resulted in a simpler supply
chain with a reduced cost of channel distribution.
3. Improved data integration between elements of the supply chain. A company can now share
information with its suppliers on the demand for its products to optimise the supply process. An
associated benefit has been the reduction in cost of paper processing.
4. Reduced cost through outsourcing. A company can outsource or use virtual integration to
transfer assets and costs such as inventory holding costs to third party companies. Technology
also enables formation of value networks and in changing suppliers on the basis of cost and
quality. Costs are lowered through price competition and reduced spending on manufacturing
and holding capacity.
5. Innovation. It is possible to offer new products or new ways of ordering and servicing products to
customers e.g. a B2B company may use e commerce to enable its customers to specify the
mixture of chemical compounds and additives used to formulate their plastics and refer to a
history of previous formulations. This results in better customer responsiveness.
There is also need to look at how e commerce can deliver to customers at the
other end of the supply chain by:
34
Increased choice of suppliers leading to lower costs.
Faster lead times and lower costs through reduced inventory holding.
Increased information about products and transactions such as technical data sheets and order
histories.
There are two alternative viewpoints on the impact of e commerce on supply chains. One holds
that electronic networks may lock in customers to a particular supplier because of the overheads
and risks associated with moving to another supplier.
The other view is that electronic marketplaces are characterised by ephemeral relationships.
Steinfield et al (1996) suggest that it is easier to form an electronically mediated relationship and
is as easy to break it. They however stress the importance of personal relationships which may be
strengthened further by electronic contact.
E PROCUREMENT
It is the electronic integration and management of all procurement activities including purchase
request, authorisation, ordering, delivery and payment between a purchaser and a supplier. E
procurement should be aimed at improving performance for each of the 5 rights of
purchase ,which are sourcing items:
E procurement is not very new .There have been many attempts to automate
the process of procurement for the buyer using electronic procurement
systems(EPS), workflow systems and links with suppliers through EDI.
E procurement has resulted in reduced cycle time from search for goods to
payment by up to 4 days for low value items. Amongst other benefits of are:
35
elimination of administrative errors(correcting errors is traditionally a major part of a buyers
workload)
Implementing e procurement
Stock control system relates to mainly production related procurement. The system highlights
when reordering is required, when the number in stock falls below reorder thresholds.
CD/Web based catalogue .Paper catalogues have been replaced by electronic ones that make it
quicker to find suppliers.
E mail or database workflow systems integrate the entry of the order by the originator, approval
by the manager and placement by the buyer. The order is routed from one person to the next
and will wait in the inbox for actioning.
Order entry on website. The buyer often has the opportunity to order directly on the suppliers
website but this will involve rekeying and there is no integration with systems for requisitioning
or accounting.
Accounting systems. Networked accounting systems enable staff in the buying department to
enter an order which can then be used by accounting staff to make payments when the invoice
arrives.
Integrated e procurement or ERP systems. This aims to integrate all processes from requisition of
order, approval to payment for the goods.
36
E MARKETING
The customer acquisition process requires a comparison of the incremental benefit of attracting
a customer with the incremental benefit of doing so.The benefit is measured in terms of the
lifetime value of a customer i.e. the discounted cashflows (potential revenues less the cost of
attracting and retaining the customer) that are expected to arise from a customer over his or her
lifetime.
Profits arising from each individual customer are determined by comparing the revenue from the
individual to the sum of acquisition and retention costs to date. Customers who contribute the
most to company profitability should be rewarded with preferential treatment while those high
maintenance customers should be fired.
Defense
Tough defense
37
This is designed to entice customers of he competition to switch. This could prove
expensive especially if the competition retaliates and must therefore be managed
carefully.
Easy offense
This is designed to capture the ‘’low hanging fruit’’ i.e. consumers who are known
to be price switchers are persuaded by using price promotions such as coupons or
sales.
Once a database is in place the company can encourage customers to buy more or
in other categories e.g. Amazon .com entered the marketplace selling books but
once they had established a database they tried to do this by up selling and cross
selling.
Cross selling involves selling other products to existing customers e.g. selling book
customers music CDs and DVDs.
o Diminishing returns
o Competition
One has to monitor and keep pace with what the competition is doing to
acquire customers. However, setting the budget at the same level as
competition may be unwise because it can lead to escalating acquisition
costs.
VIRAL MARKETING
38
Viral marketing proposes that messages can be rapidly disseminated from
consumer to consumer, like the spread of a virus, leading to large scale market
acceptance. It is based on the idea of word of mouth advertising. With the
advent of the internet and e mail, marketers have to view markets as networks
of consumers rather than an amorphous mass and use this knowledge to
enhance the spread of their message.
Incidental contagion
Contagion due to transaction consummation
Incidental contagion
In this case the consumer is not made aware of his or her role in the message dissemination
process. Consumers sign on to a service while using the service, unwittingly increase the
awareness of the product. Consumers do not perform any special promotional tasks and do
receive any reward.
In this case a firm makes an attractive product available for free provided that all interested
parties register for the service. In other words, a service is available to a particular individual only
if others sign up giving the user an incentive persuade others to sign up as well e.g. PayPal which
allows users to make small payments to one another online, paid $10 to its early users to sign up
and a few more dollars for each new member they referred. As a result PayPal reached 3 million
users in the first 9 months. Once it reached a critical mass PayPal reduced its payments to $5.
In this case consumers are encouraged to contact others and inform them about the product.
This can be done in two ways. No incentive might be provided to the consumer. The “tell a
friend” icon might appear right next to a product display or news story. Alternatively, the
marketer sets up an explicit incentive structure to reward consumers who bring in the most
traffic.
39
When to use viral marketing
From a strategic perspective viral marketing is called for when you care about the quantity rather
than the quality of traffic frequenting you site i.e. building up a crowd. Viral campaigns also work
well for markets that are homogeneous rather than heterogeneous. Viral marketing works best
for products or services that have one or more of the following characteristic:
Uniqueness.
It works very well for products that are market creators or are nothing like what is
available on the market and represent a new way of thinking e.g. Hotmail at its
launch was in an era of paid for e mail.It being a free e mail service represented a
new way of thinking about customer acquisition.
Viral marketing works when individuals are excited about a product and its value
proposition. As such, viral marketing is great for products that are entertaining,
colourful and exhilarating to use.
The product has to be as simple as possible for a consumer to explain to his or her
friends. A concept as simple as “free e mail”, as in the case of Hotmail, was naturally
easy to disseminate.
In trying a product, the total cost of adopting a product should be low. The total
cost can be broken down into several components i.e. switching costs, transaction
costs and the cost of the product. Switching costs refer to the cost of moving from
an old product under use to a new product. The price of a product entails the
products value. Viral marketing works best for products that are free or inexpensive
e.g. digital products, free communication technologies e.t.c.
40
Transaction costs involve actual payment to make the move and hassles involved
e.g. filling up forms. For a successful viral market campaign the actual sign up or
registration process must be seamless.
1. Brand control is reduced by viral marketing. One has no control over the audiences
contacted in the process and how the message may be modified leading to variability in
how your brand is perceived.
2. Uncharted growth. Viral marketing can lead to unanticipated growth paths which may
lead to abrupt changes in strategic direction like being led to unplanned for markets.
3. Lack of measurement. Results of viral marketing are difficult to track and measure. In
many cases it may not be possible to tell if people who adopted your service did so
because of your viral marketing technique.
4. Spam Threats. Poorly done viral marketing can lead to large scale spam(unsolicited e
mail) especially in the case of paid for viral marketing where people who want to earn
money go about sending as many messages as possible which might not be as well
received.
Though viral marketing offers an organic customer led growth path, continuous managerial
oversight is required. This can be done:
Carefully picking the initial recipients of the message. Viral pioneers must be
popular (have access to a large social network), influential and representative of the
target market. It is also important to identify and pick people who play a bridging
role in bringing together two social networks. It is not advisable to pick such
individuals out of convenience e.g. friends of employees rather than by any
strategic consideration.
Carefully picking the message. The message should be designed such that it
communicates the value proposition clearly and simply, so that it is easy for
consumers to pass the message on.
Putting control mechanisms in place. This will measure the impact of the viral
marketing campaign. A simple way of doing this is to ask new customers how they
heard about your service. One must constantly monitor how consumers are
spreading the message.
41
As with any other form of promotion, viral marketing works for products that offer
general value to customers. If a product is bad viral marketing can sink it fast.
Search engines like google.com and directories like www.yahoo.com are designed to
help consumers navigate the millions of pages on the web. Search engine optimisation is
therefore, trying to get the best out of these resources. Search engines use software
programmes called spiders or crawlers to search the web and create a large database or
index of what is available online.
Paid listing search engines which only includes listings from companies who
have paid to be included e.g. Go To.com.
Reward based search engines which reward customers for using the engine by
entering them into a contest e.g. iwon.com.
Meta search engine which searches across multiple search engines e.g.
metacrawler or vivismo.com.
Natural language querry which allows users to ask questions using full form
English instead of key words e.g. AskJeeves.com
People often use search engines to locate information on the internet. In searching for
information individuals are presented with hundreds of selections but will not read
through all selections but the top few entries. To get more traffic it is advisable to design
a website so that it shows up in the top five of any listing. Search engines rank web
pages using:
Frequency of keywords.
Link popularity.
42
There is a penalty for search keyword spamming (i.e. if you try to include every
popular keyword with the hope that you will show up near the top in many
searches, there is a penalty you may end up at the end of the list.)
To attain and maintain a position at the top end of a listing the following strategies
can be followed.
1. Change the Meta tags on the page. All web pages are written using HTML
which has a set of commands known as tags that determine how the page
looks. A Meta tag does not affect how the page looks but rather it is a
secret instruction of visiting search engines on where to put the page in
the index.
2. Change the page title.
3. Link reciprocally .i.e. site A and site B agree that they will place a link to
the others site on their page. This way a wider audience is exposed to both
pages.
6. Pay for position approach. This entails paying the search engine to place
you in the top five.
Internet advertising
a) Banners are small rectangles that appear on the top, bottom and sides of the in a website. They
come in many sizes ranging from small buttons to skyscrapers which occupy a large portion of
the screen. The are 3 banner advertisement variations :
Interstitials appear when the user transitions from one website to another. An
interstitial occupies an entire screen and can either be automatically timed out or the
user may be asked to initiate closure.
Pop up adverts appear abruptly when a consumer first visits a site or at any other point
during the browsing experience.
Pop unders open up in a new window that is visible only when the user closes the
current window.
43
These variations of the banner catch the user by surprise but are likely to annoy
customers.
b) Site sponsorships involve advertisers signing long term agreements to have the logo displayed at
all times son a given website. As with banners consumers can click on the logo to visit the
sponsor’s site.
This concept was pioneered by Amazon.com boss Jeff Bezos, who described it as a micro
franchising strategy e.g. a small site that specialises in Zimbabwean stone sculpture
signs up for Amazon.com associates programme. As part of the agreement the site posts
a small Amazon .com banner and encourages visitors to purchase books on Zimbabwean
stone sculpture from Amazon.com. The site receives 15% of the sales. Associate
programmes benefit both the advertiser and the associate. The advertiser gets traffic
from the site and the associate gets a commission every time a customer they refer buys
something. Associate programmes are also a great branding tool as they provide more
exposure at basically no charge while enjoying the benefits of associating with big
names.
Personalisation
44
When to adopt personalisation
Personalisation only makes sense if customers differ in their value to the organisation
and if they have dramatically different needs.
Customer sensitivity
This refers to whether customers care if the personalisation is offered or not. Where
levels of customer involvement are low the value of personalisation is low.
Process amenability
This refers to whether technology for personalisation exists and how extensive or
expensive it is to implement. It also entails whether the organisation has the level of
detail regarding customer needs and if the marketing personnel can analyse such
information.
Competitive environment
This refers to how competitive forces in the market enhance or detract from the
advantage the company has from implementing personalisation i.e. how competitors
react and how much competitive edge personalisation gives.
Organisational readiness
This refers to the company’s culture and resources and how much they can cope with
the change.
Permission marketing
Consumer control( a firm cannot send a message to a consumer who has not given it
permission)
Permission marketing uses mostly e mail though SMS and other formats are
increasingly being adopted.
45
Types of permission marketing
a) Opt out
This refers to a situation when a marketer sends an unsollicited e mail and then provides an
individual an option of not recieving future messages.
b) Opt in
It requires the consumer to tell the marketer explicitly that it has the permission to send
messages.Opt in can either be :
Directly between the advertiser and the consumer (direct relationship maintenance).
Between the consumer and the web portal or site which then alerts its
partners(permission partnership)
A permission pool where firms pool together information sent by consumers then send
promotional material.
To avoid instances when consumers receive unwanted e mails or messages as in the case of
someone signing in on someone else’s behalf, double opt in asks the marketers to send a
confirmation email to individuals who opted in. When an individual confirms, the cycle is
complete and the organization can be doubly sure that it has the right person on its list.
Explain in plain language and in plain view the intended use of the e mail address.
Avoid using a ‘must fill’ field for the e mail address so that it does not appear like you are
confiscating e mail address.
Always send a confirmation auto reply following registration. This reiterates the intent of the
programme and gives the registrant a last chance to opt out.
Ask only critical targeting questions minimising the online collection of basic demographic data.
Consumers are often asked for their permission when they initially register and then never asked
to revisit their preferences.
46
Permission is given once and thereafter they are repeatedly targeted with marketing messages
resulting in them becoming less engaged and more irritated.
Opt in programmes often encompass broad categories which may mean the bulk of messages
would be of no use to the consumer.
It places demands on consumers who have to work to get relevant adverts mainly by filling out
surveys about themselves. It may therefore fail to attract consumers with limited.
Explicit permission seeking process must be free from deceptive tactics and the customers right
to be left alone must be honoured.
Verification processs must avoid consumers signing in friends or associates indiscriminately,
placing an undue transactional burden on them.
Access to personal information must benefit the firm while empowering and reassuring the
consumer.
Communication control. The consumer must be able to control the nature and volume of
messages being sent to them.
Frictionless exit ability. A consumer should be able to effortlessly exit from a permission
marketing relationship. Frustrated consumers stop attending to the messages leading to low
response rates.
d. Movies
47
e. Images i.e. photographs, art, advertisements e.t.c
Pricing strategies for digital products include zero pricing, bundling, differential
pricing, subscription and site licensing
1) Zero pricing entails not charging for the product e.g. readers pay $1 for a hard copy of the Herald
but can access it for free on www.herald.co.zw. There is also free software which can be
in the form of freeware (copyrighted software given away for free by the author) OR shareware
(delivered free of charge though the owner might require a small fee and does not allow one to
pass it on for free) OR public domain (when a program is not copyrighted and can be used
without restriction.
When the primary revenue stream is from advertising the company expects greater profits when
it achieves higher levels of customer traffic or activity.To attract traffic they offer the product for
free.
To generate and encourage trial especially for products that have complicated quality attributes
that cannot be determined without using the product.
Some digital products are offered for free in exchange for personal information which is more
valuable as it can be used to target consumers in other fields or can be sold to other marketers.
A way to gain market acceptance especially with software often written by hobbyists for personal
growth and satisfaction.
2) Bundling
This refers to offering a combination of products instead of selling products individually e.g.
Microsoft Office is a bundle of Word, Excel, PowerPoint, Outlook, Access and other programs.
Bundling can either be mixed bundling (which gives some room for choice) or pure bundling (take
it or leave it basis).Bundling is useful when:
Even if a large proportion of the population is indifferent about most of the bundles,
components it can be profitable if the total number of components is high e.g. DSTV’s
48
premium bouquet has several channels which most viewers don’t watch but is still
profitable.
Differential pricing
Providing discounts on the basis of purchase history to reward loyal customers or to entice first
time buyers.
Identity based or personalised pricing (charging each individual a different price) on the basis of
the offer given or income levels. It however can cause controversy and negative publicity if
customers find out they are charged much higher prices.
Subscription
This is when a buyer promises to buy access to content over a specific period of
time e.g. internet access over a year or pay TV over a year. On the internet,
subscription pricing can be:
Subscription reduces the seller’s demand uncertainty over time. A paid up subscription means
assured demand for the period. Many publishers offer price discounts for this reduced
uncertainty. It also reduces administrative costs of tracking transactions. Subscriptions can
increase consumer usage, leading to higher advertising and sponsorship rates.
49
Site licensing
This pricing practice is often used with institutional buyers. Typically a large
company or university pays a flat fee so that everyone in the institution or
some subset of individuals can use a software programme or gain access to an
online database e.g. a journal site like Emerald Insight is subscribed by
universities. Licensing has the following benefits for the software seller:
It places the burden of enforcing the license and checking for software piracy on the consumer.
It is a simple pricing model and is easy to enforce.
It encourages new users to try a software package thus stimulating more usage.
Digital products like software can be delivered in a box or can be a service downloadable
from the internet as with antivirus products. The important distinction is that consumers do
not pay for the product that comes on a CD but pay a recurring service fee.
Customers benefit with just in time functionality. If a new feature is designed, the customer
has immediate access. They also enjoy a seamless upgrade process which can be done
remotely ‘while you sleep’. Customers get to spread out costs over time thus improving
levels of access. From a company’s perspective, moving to a service distribution system is
advantageous since costs associated with the upgrade process are reduced if not eliminated.
The company no longer pays to produce CD’s and manuals and by using bundling strategies
can create a more profitable pricing structure. The challenge for the company is on changing
mindsets regarding appreciating a service instead of a tangible product, once off payments
and seamless upgrades
2. Versioning
This involves creating a menu of products and charging different prices for each version.
Digital products can be versioned as:
No banner ads
Some users simply hate banner ads and are prepared to pay fora version without
advertisements.
50
Delay
This is designed for those information products with a value tied to timelines e.g.
get stock price quotes in real time at a higher price or thirty minutes later at a
reduced price OR an online version of a paper or magazine appearing after some
delay to allow sales of the print version.
Features .A stripped down version is available for a low price but if the user wants
to upgrade to the next level he or she is charged a very high price.
Speed of access i.e. consumers get low access for free or a high access speed for a
small fee.
A higher version can be easily changed into a lower priced version leading to public
outrage or public relations problems.
Arbitrage e.g. a user who has obtained the high end product for a high price can
easily make multiple copies and sell them to others. Alternatively a low end user
can make the product available to high end users.
Customer acquisition
Customer retention
Customer extension
1) Customer acquisition
51
This entails techniques used to gain qualified leads that result in sales from new
customers. Customer acquisition starts with properly qualifying a customer
profile that details a customer’s product interests, demographic or role in the
buying process. Essentially, marketing communications both online and offline
can be used in attracting customers. Offline techniques include print adverts,
public relations and word of mouth. Online techniques include search engine
optimization, link building, viral marketing and banner advertising.
2) Customer retention
LOYALTY
Evangelist
Zone of
affectio
n
52
Zone of indifference
Zone of affection
Zone of
defectio
n
Terrorist SATISFACTION
Marketers should then drive customers up the curve towards the zone of
affection. It is worth noting that the majority of customers are not in that zone
and to achieve retention marketers must understand why customers defect or
are indifferent. Drivers of loyalty include order fulfillment, product
performance and post sale service and support.
Online community (customer interaction delivered via email groups, web based discussion
forums or chat rooms)
1. Tangibles (this dimension is influenced by the ease of use and visual appeal based on the
structural and graphic design of the site).such issues as the quality of the content, download
speeds, updates, coupons and incentives are tangibles expected by customers.
2. Reliability (refers to the availability of the website i.e. how easy it is to connect to he website as
a user)
53
3. Responsiveness (refers to the feedback customers get as well as the time it takes for a page
request to be delivered to the user’s browser as a page impression.)
4. Assurance (refers to the quality of response and level of privacy and security of customer
information).
5. Empathy (can be achieved online by way of personalized facilities on a website as well as the
response to customer feedback by way of interactive tools).
Customer Extension
CRM Applications
The aim of CRM is to provide an interface between the customer and the
employee that replaces or facilitates direct interaction. The ultimate aim of
CRM systems is to enable contact regardless of the communications channel
that the customer wants to use. Integration of such a system is essential to give
visibility of the customer information to everyone in the organization and to
provide excellent customer support.
E BUSINESS IMPLEMENTATION
Change Management
It is the process of dealing with process, technical; staff and culture change
within an organization. The following aspects have to be considered in
managing a change process:
Managing the human impact of e business change(what is the best way to introduce large scale
e business change to employees)
54
Technologies to support e business change (the role of knowledge management ,groupware and
intranets explored)
Technology infrastructure
Scale of change
The extent and scale of changes varies in intentions, involvement and risks
involved. Three approaches can be identified:
It is the fundamental rethinking and radical redesign of business processes to achieve dramatic
improvements in critical, contemporary measures of performance such as cost, quality, service
and speed. It has the highest risk of failure.
55
It involves automating existing manual ways of working through information technology.
Planning change
a) Estimation (identifying the activities involved in the project i.e. work breakdown structure
(WBS)).
b) Resource allocation.
c) Scheduling or planning (the amount of time for each task can be determined by the
availability and skills of the people assigned to the tasks. It can be monitored by comparing
effort time (expected time for completion of a task) and elapsed time (actual time taken).
d) Monitoring and controlling ( this ensures that the project is working according to plan and
taking corrective action in case of deviations)
Adoption of any e business change depends on whether the change has any
positive influences and whether the people involved buy into it. It is therefore
essential to obtain both management and staff commitment. To management
commitment is key to any change can be influenced :
The degree to which the leaders can break from previous ways of working.
The significance and comprehensiveness of change.
The extent to which the head of the organization is actively involved with the change process.
Shock
Denial
Acceptance(letting go)
56
New ideas and strategies
Integration
a) Unfreeze the present situation by creating a climate of change by education, training and
motivation of future participants.
b) Quickly move from the present situation by quickly developing and implementing the new
system.
c) Refreeze by making the system an accepted part of the way the organization works.
To achieve the unfreeze stages; different staff can be identified for different roles by the project
manager:
System sponsors. (Senior managers or board members who have bought into the e business
initiative. They will try to fire up staff with their enthusiasm and stress why the system is
important to the business and its workers).
System owners.(managers in the organization of key processes such as the procurement
manager or the marketing manager who will use the e business system to achieve benefits in
their area).
System users.(staff in different areas of the business who are actively involved in making the
process happen e.g. a buyer or a brand manager)
a) Stakeholders.(these are staff who are respected by co workers and who can act as a
source of enthusiasm for the system)
b) Legitimisers. (They protect the norms and values of the system. They are experienced in
their job and are regarded as experts by fellow workers. They may be initially resistant
to change and therefore need to be influenced early)
57
c) Opinion leaders (these are people whom others watch to see whether they accept new
ideas and change. They usually have little formal power but are regarded as good ideas
people who are receptive to change and also need to be involved early in the project)
Knowledge management
a) External structure initiative i.e. to gain knowledge from customers or offer customers additional
knowledge.
b) Internal structure initiative i.e. such as building a knowledge sharing culture, creating new
revenues from existing knowledge then storing and spreading it.
c) Competence initiatives such as creating careers based on knowledge management and creating a
microenvironment for knowledge transfer and learning.
Connection to the explicit knowledge via an intranet with a portal with search tools and a
directory of information.
58
Connection of people to people with specialized knowledge through an expertise locator (a type
of phone directory with people in different expertise categories also accessed via search tools)
Connection to communities of practices which can help sharing and learning between people
o Expert systems
a) Capturing knowledge
b) Interpreting knowledge
d) Staff training
Risk Management
c) Implementing solutions targeting the highest impact and most likely risk areas.
59
Growth risks such as pressures for performance, rate of expansion and inexperience of key
employees.
Culture risks i.e. rewards for entrepreneurial risk taking. Executive resistance to bad news and
lack of action and levels of internal competition.
Information management risks like transaction complexity and velocity, gaps in diagnostic
performance measures (poor reporting capabilities) and the degree of decentralized decision
making.
Security design
The certification authority( a body that issues digital certificates that confirm the identity of
purchases and merchants)
Banks
The basic requirements for security systems from these different parties
include:
a) Authentication (confirming if the parties to the transaction are who they claim to be)
b) Privacy and confidentiality
c) Integrity (checks that the message sent is complete and that it is not corrupted)
60
e) Availability (how threats to continuity and performance of the system be eliminated)
Testing
The testing of new e business technologies or systems aims to check for non
conformance with business or user requirements and to identify errors or bugs.
The testing process should be conducted in a structured way using a test
specification which can include developer tests, feasibility testing, system
testing, usability testing, acceptance tests and content or copy testing.
Changeover
Test the system in a controlled environment before going live thus minimizing the risk of adverse
publicity due to problems with the site.
The company can also conduct a soft launch whereby a preliminary site launch is done with
limited promotion to provide initial feedback and testing of an e business site.
a) Immediate cutover i.e. straight from the old system to a new system on a single date. Its main
advantage is that it is rapid and incurs the lowest cost in the short term. It however means high
costs and major disruptions if there are serious errors with the system.
b) Parallel running i.e. old system and new system run side by side for a period of time. This has risk
that immediate cutover but is slower and incurs higher costs than immediate cutover.
c) Phased implementation i.e. involves different modules of the system introduced sequentially. It is
a good compromise between parallel running and immediate cutover but it is technically difficult
to achieve due to interdependencies between modules.
d) Pilot system involves a trial implementation before widespread deployment. It is essential for
international or national rollouts but it has to be used with other methods in the process.
61
Content management and maintenance
The moment an e business system is live it require updates to the content and
services. The frequency of fixing problems depends on the category and
seriousness of the problem (fault taxonomy Jorgenson 1995).Changes on the
content are mostly in response to customer demands or competitor
innovations.
Write. (involving writing the copy and designing layout of copy and associated images)
Review. (An independent review of the copy is necessary to check for errors before the
document is published. It can be reviewed for corporate image, marketing copy, branding and
legality.)
Publish (to a test environment). (putting the corrected copy on a web page for further checking
from within the company)
Test. For technical issues such as whether the page loads successfully on different browsers.
Publish (to a live environment) i.e. to the main website and to customer.
Encryption
A process of transforming plain text or data into cipher (to make it unreadable) text
The transformation of a cipher text is accomplished by using a key por a cipher code
Key
a software application that acts as filters between a company’s private network and the
internet , they monitor and validate all incoming and outgoing comm., every massage
that is sent or received from the network is processed by the firewall software which
62
determines if the massage meets security guidelines established by the business or
organization,
Typically have built user and password requirement that provides a level of
authentication
Antivirus software
Easiest and list expensive way to prevent threats to systems intergrity that is the
installation of antivirus software
Antivirus identify and eradicate the most common type of viruses as they enter a
computer as well as destroy those already on the hard drive
It is however not enough to simply install the software at once as it requires constant
updating . since new viruses are developed daily routine updates are needed to prevent
new threats from being loaded
Mobile commerce
Defined as “the use of handheld wireless devices to communicate ,interact and transact
via high speed connection to the internet”
It is also used to describe the growing trend of using networks that interact with
wireless devices e.g. laptops personal digital assistance mobile phones etc to initiate or
complete online e commerce transactions
As content delivery over wireless devices becomes faster, more secure, and scalable
some believe that m-commerce will surpass wireless ecommerce as a method of choice
for digital commerce transactions
63
CHARACTERISTICS OF M-COMMERCE
According to Ding, Iijima and Ho who concurred that m-commerce has 5 basic and
important characteristics
1. Ubiquity
2. Convenient
3. Accessibility
4. Personalization
5. Localization
UBIQUITY
CONVENIENT
ACCESSIBILITY
PERSONALIZATION
localization
64
DISADVANTAGES OF M-COMMERCE
Mobile devices offer limited capabilities such as limited display. Between mobile
devices, these capabilities vary so much that end user services will need to be
customized accordingly.
The heterogeneity of device, operating systems, and network technology is a challenge
for uniform end user platform.
Communication over the air interface between mobile devices and networks introduces
additional security threats.
They are built from a basic model and other models when different
technologies where in place, in the 2G models
1. Basic model,
2. Network operator centric model
N
E
C
T
O
W
N
O
T
R
A
K
C
T
P S P
R U R
O B O
V S V
I C I
D R D
E I E
R B R
E
R
/
U
S
E
R
In the basic model the third party services and application providers are
separated from the MNO. in this model it leads to more business
opportunities from the market point of view as well as more available
services from the customers point of view
65
THE NETWORK OPERATOR CENTRIC MODEL
It is responsible for providing users with its own services and application
in addition to other services and applications offered by third party
independent services and application providers. The service or content
abbreviator comes into a direct arrangement /agreement with a
network provider for delivering content and services through the
network provider’s infrastructure
…………..diagram…………….
In this model instead of the service and content abbreviator, the service
and content providers come directly into agreement with network
providers for delivery their applications and services through the latter’s
telecommunications infrastructure. The service and content providers
define the pricing and payment policies and charge the user based on
their usage of transport and service and content
………diagram…….
66
I. Technology infrastructure or hardware
II. Applications infrastructure
Standardization can reduce prices through multi user licences. These choices occur for the
client, server and network
Transport/network
The decisions on network infrastructure are based on the internal company network and its
link to the public internet, the main management decision is whether the internal or external
network management would performed by the company or outsourced from a third party
Storage
Storage can be managed internally or externally this is not an either or choice e.g. intranet and
extranet can be managed internally while internet storage like the company website is
commonly managed externally. Decision also need to be made involving third party service
providers of technology infrastructure such as internet service providers
These are companies that provide home or business users with a connection to access the
internet and the hosting of websites e.g. ecoweb, tel-one. ISP PROVIDE A LINK TO THE WWW
and they also host the websites and provide a link from a company’s web services to enable
other companies and consumers to get access to a co-operate’s website . the primary issue in
managiging isps is to ensure the satisfactory service quality which is determined by
I. Speed
II. Availability
III. Security
Speed is determined by the speed of the server and the speed of the network connection to
the server. Often the speed of the server has determined by the number of users. To ensure
reliability companies can pay ISPs for services of the dedicated server that only contains
contents and applications for a single company or through using several servers to spread
demand load
67
Availability refers to the amount of time the website i.e. available to consumers a company
offering 24 hr service to ensure that its website is available 100% because lack of availability
translates to lost revenue. To ensure the best speed and availability a company should check
the service level agreement when outsourcing website hosting services. Service level
agreements should define confirmed standards of availability and performance it should also
include notification to the customer detailing when the web service becomes unavailable the
reasons why and it should also estimate when services would be restored
Security
Security ensures of confidentiality and lowers exposure to risk therefore measures should be
taken to ensure that security is at its maximum
Since it is difficult to identify the end user in order to charge them often it is necessary to
invade the users’ privacy by planting cookies (they are small text files stored on an end
user’s computer to enable websites to identify them) or electronic tags on the end user’s
computer.
Cookies have a bad reputation since it is believed that they could be used to capture
credit card information and other personal information in most cases customers will not
be aware that their privacy is being invaded or intruded upon
d) Customers may be quiet happy to give personal information to a company that they
have a relationship with. They are likely to be less than happy if this company sells
the information to another and their subsequently bombarded with promotional
material. The other risk is of hackers accessing information held about a customer on
severs within a company
e) Sending unsolicited e-mails to consumers, spamming the sending of unsolicited mails
or massages to a large number of internet users. it is inclusive and irritating to most
internet users. For ethical reasons, e-marketers can adopt and opt in or opt out
principle. Opt in is when a customer proactively agrees to receive server information
opt out is
Legal factors
68
Some of the main e-business related loyal issues on which companies
seek specific legal advice are
Defamation and libel. Information published on a site critical of another company’s people or products
could represent libel.
Copyright and intellectual property rights permission must be sort for information or images sourced
elsewhere in the same way as for any other media
Data protection and privacy law a website must protect data held on consumers according to the local
law
Taxation on business, the global nature of e-business raises questions as to where revenue is taxable as
well as the appropriate tax jurisdiction . current international tax are such that the right to tax is divided
between the country where the enterprise derive its revenue and that to where it is
The use of cash is free in that neither the merchant nor consumer pays a transaction fee for using
it
69
Other forms of payment requires significant use of other third parties , paper trail, however cash is
limited to smaller transactions, it moved in large amounts it can be easily stolen
Funds are transferred directly via a signed draftor cheque from a consumer’s chequing account to a
merchant they can be used for both small and large transactions
They are not anonymous and require third part interfererence for them to work
They are Risk for merchants, they can be forged more easily than cash hence authentification
is required.
Cheques also present risk in that they can be cancelled before they cleared or may bounce
back, if there is not enough money in the account
Money order cashier cheques and travellers cheques are insured cheques that address some of
the limitations of the
Credit card
A credit card system represents an account that extends credit to customers i.e
permitting customers to purchase items while deferring payment
They offer customers a line of credit and the ability to make small or large purchases
instantly they are a widely accepted form of payment and they reduce the risk of theft
and associated with carrying cash and also decrease customer convenience
Accunts created by depositing funds in an account and from which funds are paid out or
withdrawn as needed. They are similar to some extent to chequeing transfere which
also store funds but the store value system does not involve writing a cheque. Eg smart
cards and debt cards
Debt cards look like credit cards but rather than providing access to a line of credit they
instant immediately debt the account debt cards are dependant on funds being
available in a customer’s bank account
Accumulating balance ac that accumulate expenditure and to which the customer makes
periodic payments are accumulating balance payment system e.g. utility bills like internet
70
bils which accumulate balances mutually over a month and then paid in full at the end of the
period
DIGITAL GOODS
Digital goods is a general term used to described any goods that are stored delivered
and used in electronically. They are shipped electronically to the consumer through e-
mail or downloaded from websites.
They are also called e-goods
When the primary revenue stream from advertising , the company expects greater profits
when it achieves high levels of traffic or activity
To generate and to encourage trial especially for products that have complicated attributes
that cannot be determined without using the product
BUNDLING
DIFFERENTIAL PRICING
The base of this is to charge different customers different prices for the same
products it can be in the form of discounts on the bases of purchase to
promote customers Or to intise first time buyers
SUBSCRIPTION
71
WHEN A BUYER PROMISES TO BUY ACCESS TO CONTENT OVER A SPECIFIC PERIOD OVER A YEAR E.G.
INTERNET ACCESS OVER A YEAR SUBSCRIPTION REDUCES THE SELLERS DEMAND UNCERTAINITY OVER
TIME.
SITE LICENSING
THIS PRICING SCHEME IS OFTEN USED BY INSTITUTIONAL OR ORGANIZATIONAL
BUYERS TYPICALLY A LARGE COMPANY PAYS A FLAT FEE SO THAT EVERYONE IN
THE INSTITUTION OR SOME SUBSET OF INDIVIDUALS CAN USE A SOFTWARE
PROGRAM OR GAIN ACCESS TO THE ONLINE DATA BASE
IMIDIATE CUT OVER (BIGBANG) IT INVOLVES MOVING DIRECTLY FRO AN ORIGINAL SYSTEM TO THE
NEW SYSTEM AT A PARTICULAR POINT IN TIME ON A DESIGNATED DATE, ON THAT DATE THE OLD
SYSTEM IS SWITCHED OFF AND ALL STAFF MOVE TO USE THE NEW SYSTEM
THIS IS A HIGH RISK STRATEGY SINCE THERE IS NO CALL BACK CONDITIONS WHICH SERIOUS
CHALLENGES ARE ENCOUNTERED
HOWEVER THIS SYSTEM IS ADOPTED BY MANY LARGE COMPANIES SINCE IT MAYBE IN PRACTICAL AND
COSTLY TO RUN DIFFERENCE SYSTEMS IN PARALLEL. BEFORE CUT OVER OCCURS THE COMPANY WILL
DESIGN THE SYSTEM CAREFULLY AND CONDUCT EXTENSIVE TESTING TO MAKE SURE THAT IT IS
RELIABLE AND THEREFORE REDUCE THE RISK OF FAILURE.
PARALLEL RUNNING
THIS IS THE CHANGE OVER WHICH INVOLVES THE OLD AND THE NEW SYSTEM OPERATING
TOGETHER AT THE SAME TIME UNTIL THE COMPANY IS CERTAIN THAT THE NEW SYSTEM WORKS
PARALLEL RUNNING PREVENTS A LOWER RISK THAN IMMEDIATE CUTOVER METHOD SINGE IF THE
NEW SYSTEM FAILS THE COMPANY CAN REVERSE THE OLD SYSTEM AND BUSINESS OPERATIONS
WILL NOT BE AFFECTED
PARALLEL RUNNING INVOLVES USING THE MANUAL AND PAPER BASED SYSTEM AS BACKUP IN CASE
THE NEW SYSTEM FAILS. THE COST OF RUNNING TWO SYSTEMS IS HIGH NOT ONLY IN TERMS OF
MAINTAINING TWO SETS OF SOFTWARE AND POSSIBLY BUT ALSO IN THE COARSE OF HUMAN
OPERATERS
PARRAREL RUNNING MAYBE ONLY APPROPRIATE WAY THE OLD & NEW SYSTEM PERFORMSIMILAR
FUNCTION & USE SIMILAR SOFTWARE & HARDWARE COMBINATIONS
3 PHASED IMPLIMENTATION
72
IT INVOLVES DELIVERING THE PART OF THE NEW SYSTEM AT DIFFERENT TIMES.
THESE MODULES WILL NOT BECOME FUNCTIONAL SIMULTANEOUSLY BUT RATHER IN SEQUENCE.
EACH MODULE CAN BE INTRODUCED AS EITHER IMMEDIATE CUTOVER OR IN PARALLEL, THIS GIVES
STAFF THE OPPORTUNITY TO LEARN ABOUT THE NEW SYSTEM MORE GRADUALLY, AND PROBLEMS
ENCOUNTERED IN EACH MODULE CAN BE FIXED BEFORE MOVING ON TO THE NEXT MODULE
THE NEW SYSTEM IS TRIED IN A MORE LIMITED AREA BEFORE IT IS IMPLEMENTED EXTENSIVELY
ACROSS THE BUSINESS. THIS INCLUDE DEPLOYING THE SYSTEM IN ONE OPERATING REGION OF THE
COMPANY POSSIBLY A SINGLE COUNTRY OR A LIMITED NUMBER OF OFFICES.
THIS SYSTEM IS COMMON IN MULTINATIONAL COMPANIES WITH SEVERAL OFFICES. SUCH A PILOT
SYSTEM USUALLY ACTS AS A TRIAL BEFORE MORE EXTENSIVE DEPLOYMENT OF THE SYSTEM
73