Strategic Issues For A Successful E-Commerce

1. INTRODUCTION

Electronic Commerce is for the age of Information Technology what mercantilism, the search for gold and the conquest of latest lands have been for the age of discovery. Like the prow of a giant fishing boat, it attracts in the direction of itself all different pursuits and parts of society, and it'll depart new discoveries and adjustments in its wake. The huge networking of world via optic fibers, satellites and wi-fi communication is creating a brand new world group and a brand new world market, through which much of the nations ought to take part. It is strengthening, near paradoxically, the id of small teams, remoted communities and minority pursuits and driving them in the direction of a less high-ticket social and commercial enterprise exercise and widening their alternatives. And most significantly, it's empowering small companies to vie with international companies and enabling shoppers to go looking the world for precisely what they wanted.

  Home Insurance Gift Card

E-Commerce chiefly means utilizing networks (Internet) to hold out all of the actions concerned in enterprise administration and operation: shopping for and promoting of services and products, expertise and companion search, cope with counterparts, selecting probably the most handy transportation and insurances, acting commercial enterprise institution dealings, paying and charge, speaking with firm salesmen, choosing up orders, and another actions vital for buying and merchandising.

An organization will be capable of put up a whole catalog of it is services and products on the Internet, which may be constantly up up to now to current new or up up to now merchandise, proving a big digital showcase for potential purchasers, a method to speak with purchasers and in this approach, adjusts it is supply to their necessities; whereas on the identical time it should get entry to digital markets the place it may possibly buy what it wants.

Through integral programs already underneath improvement, one firm will connect with different firms positioned wherever on the earth, to purchase and promote, selecting the services and products which finest meets its wants from an large community. And it is true that this rotation includes us all.

2. BUSINESS-TO-BUSINESS (B2B)

B2B e-commerce means firms shopping for from and promoting to one another on-line. It automates and streamlines the method of shopping for and promoting the intermediate merchandise. It supplies extra dependable updating of enterprise cognition. B2B makes product info accessible globally and updates it in actual time. Hence, procuring group can reap the benefits of huge measure of product info. [3]

Now, we should know what are the entities of B2B e-commerce & their considerations:

  • Selling firm: with advertising administration perspective.
  • Buying firm: with procurance administration perspective.
  • Electronic middleman: A 3rd occasion intermediating service provider (the scope of service could also be prolonged to incorporate the order achiever ).
  • Deliverer: who ought to fulfill the JIT (Just in Time Delivery)
  • Network platform: such because the Internet, Intranet, and Extranet.
  • Protocols and communication: remindful of EDI (Electronic Data Interchange) and comparison buying, presumably utilizing computer software brokers.
  • Back-end info system: presumably carried out utilizing the intranet and Enterprise Resource Planning (ERP) programs.

B2B e-commerce implies that each the Peter Sellers and consumers are enterprise companies. It covers a broad spectrum of functions that allow an enterprise or enterprise to kind digital relationship with their distributors, re-Peter Sellers, providers, and different companions. B2B functions will supply enterprises entry to the next types of cognition:

  1. Product: Specifications, costs, gross revenue historical past.
  2. Customer: Sales historical past and forecasts.
  3. Supplier: Product traces and lead occasions, gross revenue phrases and circumstances.
  4. Product course of: Capacities, commitments, product plans.
  5. Transportation: Carries, lead-times, prices.
  6. Inventory: Inventory ranges, carrying prices, places.
  7. Supply chaall toldiance: Key contacts, companions roles and obligations, schedules.
  8. Competitor: Benchmarking, aggressive product providing, market share.
  9. Sales and advertising: Point of gross revenue (POS), promotions.
  10. Supply chain course of and efficiency: Process descriptions, efficiency measures, high quality, supply time and buyer satisfaction.

2.1 How to get the most effective

People all the time wish to get the most effective shot in life. To ship a sound return in your funding you need to affix time supply and taste of some methods. This proficiency ought to embody correct advertising, channel administration, strong expertise, strategic companions and nice merchandise. Let us get a load on every of them.

2.1.1 Just in Time supply (JIT)

In such a case (JIT), supply supplies and components on time is a should. Using E-Commerce, it's extremely potential to guarantee JIT deliveries. Just in time supply may be accomplished by the co-coordinated effort of delivery- service bureau and providers stock coverage.

Quick supply doesn't in essence imply JIT supply, even so the system for fast supply is the spine of JIT supply. For the B2B E-Commerce atmosphere the advance affirmation of the supply date on the contract stage is essential. [5][15]

2.1.2 Add methods to what you are promoting

2.1.2.1 Direct Marketing

In a typical enterprise group, shopping for choices, particularly for merchandise over a number of thousand {dollars}, are made by group of people. As a consequence, direct entrepreneurs have to extent the attain of their packages to whole different purposeful areas and perchance even whole different ranges inside a purposeful space.

There are a number of consumers and influences in any group who play a job inside the shopping for resolution. You could know with cheap certainty who your major goal is, even so secondary goal may be simply as vital to accomplish. You could have to accomplish enterprise consumers and influencers in three fundamental administration areas (purposeful administration, medium of exchange administration and common administration) and have a go at it at center to higher managerial, additionally to technical ranges. To have a go at it firms want correct E-mail record, which they will develop by viewing firms Websites and reviewing annual studies and different public paperwork.

2.1.2.2 Relationship Marketing

Business consumers should not all the time prepared to purchase services or products when you're able to promote them. Factors you can not management, remindful of the businesses' budgeting course of, the necessary for extra approvals, or buying procedures, could have a direct influence on plans to buy. There could also be an off-the-cuff curiosity inside the product even so not a right away want.

The good B2B direct trafficker compensates for this uncertainty by ensuring a program of normal, on-going communication hypothesis (typically referred to as a continuity program) is in entrance of prospects periodically. This may be completed by direct E-mail and by putt the cognition on the web site.

2.1.2.3 Internet Marketing

Several potential advertising methods can be used in B2B E-Commerce advertising. These methods may be labelled into the next 5 classes:

  1. Generating and qualifying leads with the Internet.
  2. Using Internet occasions to advertise services and products.
  3. Executing immediate achiever on the Internet.
  4. Generating orders via the Internet.
  5. Enhancing buyer relationship with the Internet.

2.1.2.4 Channel Management

The first component is coherent advertising or channel administration. The true check of a profitable E-Commerce implementation is how properly it exploits the Internet to accomplish, seize and retain the proper clients. Choosing which services and products can be provided via which channel can be a vital resolution.

E-commerce runs throughout a number of gross revenue channels, together with direct, oblique and E-marketplaces. The alternative of which marketplaces to make use of as gross revenue channels is a vital resolution.

In addition to marketplaces, utilizing oblique gross revenue channels can be an space for explosive gross revenue alternatives. Enabling your promoting companions to host your catalog, stock and achiever databases on their programs can create effectiveness that grows their enterprise and yours. You can also proceed your direct one-to-one buying and merchandising relationship with very years strategic distributors by "E-enabling" your complete enterprise course of from the preliminary request for quote via order achiever to computerised charge and cost.

These channels create a state of personal business the place the E-Commerce promote aspect platform should transact throughout multi-channel promoting methods --which brings us to the later component of your proficiency: expertise.

2.1.2.5 Technology

Industry commonplace instruments typically permit a trafficker to construct and handle product catalogs and content material as soon as and use them all through your complete multi-channel promoting conduits. Evolving instruments and capabilities mean you can develop buyer pleasant net sites and win repeat clients by constructing buyer loyalty. The entrance finish for e-commerce promoting is a vital piece of B2B achiever, copulative your new net programs on with your pbegrudge programs. The 24*7 on-line market means your E-business necessarily to be often accessible. IT infrastructure should pbegrudge extra efficiency, reliability, safety and course of integration than a bricks-and-howitzer atmosphere. In addition, mainframes net hosting the databases and ERP (Enterprise Resource Planning) programs working the administration programs should be seamlessly built-in with the e-commerce engine to offer the caliber of service clients expects and to appreciate the price efficiencies B2B E-Commerce can pbegrudge. Choosing a versatile E-Commerce platforms and a system integrator virtuoso with your complete enterprise course of is a should for fulfillment.

2.1.2.6 Partners

Like selecting the Internet as a gross revenue channel, it is also vital to pick out the proper companions, together with an integration companion who's virtuoso in serving to to maneuver forward quickly throughout your complete E-business course of. we've to simply accept that any transfer to E-Commerce isn't about additive enchancment, moderately basic redesign of the important matter enterprise processes.

2.1.2.7 Products

With the presence on the net, we are able to achieverfully and effectively transact enterprise with our purchasers 24*7. But so can our rivals. Survivals and achiever in E-Commerce entails greater than only constructing a shopfront to promote on-line. [5]

3. BUSINESS-TO-CONSUMER (B2C)

While the period of time E-Commerce refers to all on-line dealings, B2C stands for "Business-to-Consumer" and applies to any enterprise or group that sells its services or products to shoppers over the Internet for their very own use.

In the late 90s, dotcoms-- which have been shortly gaining in dimension and market capitalisation -- posed a risk to conventional brick and howitzer companies. In some ways, these dotcoms gave the impression to be revising the principles of enterprise -- that they had the purchasers with out the bills of sustaining bodily shops, little stock, limitless entry to capital and little concern about precise earnings. The construct was to get massive quick and fear about earnings later. And a preferred thought habitually comes into our thoughts: " Learn to swim piece the tide is out. Learn from the kinds of clients that are out there now. It is a small market- play with it; learn to price business in that market, learn how to assess risk. If you can have a go at it well, the wager will get higher and you will succeed where others may not."

3.1 What are the main challenges of B2C e-commerce


  • Getting browsers to purchase issues -- Your E-Commerce website can't dwell on visitors alone. Getting guests to the location is barely half the battle. Whether they purchase one matter is what determines in the event you win.Some methods to spice up the B2C conversion fee embody amelioratory navigation, simplifying checkout course of (remindful of one-step checkout and simply changed watchwords), and sending out e-mails with particular pbegrudges.

  • Building buyer loyalty -- With so many websites on the market, how are you going to construct a robust relationship with clients? Here are some ideas:
    1. Focus on personalization: A big selection of computer software packages can be found to assist e-commerce websites create distinctive boutiques that center on particular clients.
    2. Create an easy-to-use client support utility. Providing simply an e-mail tackle may be irritating to clients with questions. Live chat or, on the very least, a telephone measure will assist.
    3. Focus on making your website straightforward to make use of.

  • Fulfillment -- E-Commerce has elevated the deal with buyer satisfaction and supply achiever. Companies ought to enhance their supply programs so as to assure on-time supply. Providing immediate satisfaction for patrons even so is not straightforward, even so profitable B2C E-Commerce operations are discovering that achiever complications may be alleviated with elevated focus and funding in provide chain and supply applied sciences. [5]

3.2 Six Keys to B2C E-Commerce achiever

So, what does it actually fancy seize the E-consumer and generate on-line coverage gross revenue? Based on Insurance & Technology's interviews with each early adopters and trade analysts, there seem like six key achiever components:

  1. Strategic Goals Assessment/Customer Needs Assessment What are your objectives as an organization? Who are your clients? What are their wants? These could sound like fundamental questions, even so each insurers and analysts emphasize that an organization's Web presence should mirror this info.
  2. Create a Usable, Targeted and Sticky Web Site Usability and website efficiency are a couple of of the key components insurers want to remember when creating their B2C E-Commerce methods. Insurers extraly want to revolve around all of their many constituencies when creating B2C initiatives. The Web can attain a number of audiences and none ought to be neglected. A very good Web website will talk with shoppers additionally to enterprise companions, brokers, providers and distributors. Stickiness, or the achiever of a Web website in attracting and protective new and returning guests, is one other achiever issue. Turning the location into extra of an info portal with real-time information feeds with protective content material up up to now and contemporary will assist hold clients coming again.
  3. Integration The Internet isn't a stand-alone platform or medium. To be an efficient service and distribution channel, it should be built-in with back-end bequest programs, agent programs, name facilities, advertising initiatives and pricing and underwriting programs. The Internet is just one other buyer relationship channel and integration with different client support features is sure a number-one precedence.
  4. Innovate with Web Applications and Real-Time Transactions B2C on-line functions vary from the comparatively fundamental, remindful of updating coverage info, to the complicated, remindful of comparative fee quoting and digital claims submission. Regardless of the particular features an organization plans so as to add to its Web website, they have to serve the wants of the E-consumer. This implies that net sites ought to have interactivity and speedy satisfaction.
  5. Partnerships Although insurers must be selective in initiating on-line partnerships, such agreements have the potential to increase market attain and add options in a comparatively low-cost method. According to a current Gartner Group examine, 46 % of coverage corporations lively on the Web have partnerships with banks, 30 % have partnerships with different coverage firms and 22 % have partnerships with funding corporations. Partnerships with coverage portals pbegrudge comparative quoting capabilities and will generate enterprise.
  6. Put Tools in Place To Keep Learning E-consumer is a transferring goal. Investor ought to all the time say that they're even so enjoying and all the time capturing info from all of their channels. They should deal with teams, used third-party assessments and have employed consumer interface specialists. "The process is iterative: You just keep learning." [5]

4. INFRASTRUCTURE INTEGRATION

In this net enabled world, clients rule. The potential to supply mass customization has turn bent on be a sensible actuality. To quickly meet these necessities, time to deployment of latest or augmented utility is shrinkage dramatically. These functions should be constructed to be straightforward to make use of, nimble, open, extensible, and accessible throughout all platforms and all these needy traits should be accomplishd at stripped-down value.

Replacement of bequest system utility is high-ticket so it's seen that individuals began to mixture info from disparate sources and combine them for seamless info circulation, the demand to speak with all kinds of cellular units, and the scarceness of abilities and data which power be extra combined by shrinkage time-to-deployment necessities.

These computer software integration applied sciences decrease improvement and deployment prices by doing the next:

  • Supplying the communication and integration code so utility builders can consider the value-added enterprise logic;
  • Providing a typical platform on which to construct, deploy, and handle diffuse functions;
  • Reducing the IT abilities required to ship hard enterprise necessities;
  • Providing fast utility improvement instruments to remove made-to-order cryptography and simplify integration; and
  • Enabling the reprocess of integration elements over many initiatives.

4.1 What is required for Integration

  1. Requirements Traditional necessities definition based mostly on the performance desired is yielding to a definition Based on time-to-deployment and the flexibility to combine future applied sciences. New infrastructure necessities are rising which locations extra significance on the duty of provision the migration path to newer applied sciences.
  2. Technology choice For the most effective consequence the proper expertise ought to all the time be picked up. Technology ought to be such that the built-in answer fulfill the next standards's: Extensibility and reusability, Flexibility, Efficiency, Interoperability and breadth, Cost effectiveness, Ease of upkeep, Deployment ease and effectiveness, Ease of administration, Industry acceptability, Enterprise integration, Technological innovation. [1]

4.2 Benefits of Integration

It has been surveyed that the top clients are benefited in many methods after the completion of

Integration venture. Benefits thus obtained are:

  1. Simple and full improvement platform,
  2. Platform independence,
  3. Network-aware improvement and run-time platform,
  4. Technologically unified intranet, extranet and Internet,
  5. Central administration of latest computer software variations,
  6. Easy entry to enterprise IT assets,
  7. Rich and extremely purposeful consumer interface element,
  8. Simple and sturdy safety mannequin. [1]

5. SECURITY ISSUES

Security is a significant concern in creating E-Commerce as a result of that is all told chance an important purpose common people hesitates to purchase issues on the Net. Buying on the Net requires your bank card measure and different private info. But broadcast medium your bank card measure via the ether? It sounds fairly dicey. So, it is a problem for firms to make their website safe and secure so that individuals can totally depend on them.

5.1 What does safety suggest

Whatever the atmosphere, paper or digital, securing it in essence implies the bar of

  • Destruction of cognition and
  • Unauthorized accessibility of cognition.

5.2 Security points

The points that confront us in relation to securing digital dealing are attributable this fact:

  • Confidentiality
  • Integrity
  • Availability
  • Authenticity/Non-reputability
  • Auditability
Confidentiality:

Information ought to be protected against prying eyes of unauthorized inner clients, exterior hackers and from being intercepted throughout transmission on communication networks by making it unintelligible to the attacker. The content material ought to be reworked in such a approach that it isn't clear by anybody who doesn't know the transformation info.

Integrity:

On recovery or receipt on the different finish of a communication community the cognition ought to seem precisely as was saved are despatched. It ought to be potential to generate an alert on any modification, addition or deletion to the unique content material. Integrity extraly precludes info "replay" i.e., a contemporary copy of the info is generated or begrudge utilizing the authorization options of the sooner genuine content. Suitable mechanisms are required to make a point end-to finish content content material and replication authentication.

Availability:

The info that's being saved or transmitted throughout communication networks ought to be accessible every time required and to disregardless extent as desired inside pre-established time constraints. Network errors, energy outages, operational errors, utility computer software errors, {hardware} issues and viruses are a couple of of the causes of unaccessibility of cognition. The mechanisms for implementation of counter measures to those threats can be found even so are past the scope of end-to-end content safety for implementing Electronic Commerce.

Authenticity:

It ought to be potential any individual or object from masquerading as another individual or object. When a content is obtained it ought to attributable this fact be potential to confirm it has sure been despatched by the individual or object claiming to be the conceiver. Similarly, it must also be potential to make a point that the content is diffuse to the individual or object for whom it's meant. This implies the necessary for dependable identification of the conceiver and recipient of information.

Non-reputability:

After sending / authorizing a content, the sender shouldn't be in a position to, at a later date, deny having completed so. Similarly the recipient of a content shouldn't be in a position to deny receipt at a later date. It ought to, attributable this fact be potential to bind content accognitionments with their originations.

Auditability;

Audit cognition should be recorded in such a approach that every one specific confidentiality and wholeness necessities are met.[2]

5.3 Security options

  • Cryptography is probably the most extensively used approach for implementing expertise account the above talked about safety issues. It includes encodeion -- the method of creating info unintelligible to the unauthorized reader and decodeion - reserving encodeion to make the cognition clear as soon as once more. Conventional cryptography makes use of a cipher or key to encode info. The identical secret secret is used by the receiver to decode the cognition.[14]
  • Password is the most typical mechanism used for authenticate common people. Passwords are expected to be recognized only by the owner. The onus is on the owner to maintain the watchword secret.
  • Digital signature can be used not only to confirm the legitimac of the content and the claimed id of the sender, but extraly to confirm the content wholeness. The recipient, even so, shouldn't be ready to make use of the obtained digital signature to incorrectly "sign" contents on behalf of the unique sender. Here a content is encodeed with the sender's personal key to generate the 'signature'. The content is then despatched to the resort area together with this signature. The recipient decodes the signature utilizing the sender's public key, and if the consequence matches with the copy of the content obtained, the recipient can make certain this the content was despatched by the claimed conceiver and that the content has not been modified throughout transmission, since only the conceiver is in possession of the corresponding encodeion key. It is a two key cryptosystems.
  • A simpler answer may be obtained through the use of a biometric authentication machine, remindful of a fingermark scanner, inside the e-wallet.
  • Smart card are just like bank card game besides that they've chips embedded in them. These acting card game can be used to retail merchant worth and carry authentication info.

6. CONCLUSION

Changing market state of personal business places strain on enterprise individuals to adapt new and good methods to accomplish the head of achiever. New innovations are quickly turning into a part of IT infrastructure. But to get efficient suggestions we'd like a multi purposeful crew method consisting of enterprise individuals who can fitly determine enterprise necessities, expertise necessities and achiever standards. People can cut back the chance and time-to-deployment by contemplating the components delineate above.

7. REFERENCES

  1. Aberdeen Group, Inc. "e-Business Infrastructure Integration: Practical Approaches," An Executive White Paper, Boston, Massachusetts 02108, USA, November 2001
  2. Kamlesh Okay. Bajaj and Debjani Nag, "E-Commerce: The Cutting Edge of Business," Tata-McGrawHill, 1999
  3. Efraim Turban, Jae Lee, David King, H. Michael Chung, "Electronic Commerce-A Managerial Perspective," Pearson Education Asia, 2001
  4. Ravi Kalakota and Andrew B. Whinston, "Frontiers of Electronic Commerce," Addison Wesley, 2001
  5. Susmita Das, Malabika Dinda, Sudipa Batabyal, Sangeeta Mishra, "A Study on Various Aspects of E-Commerce Paradigms with One Design Implementation," B.Tech.(Honours) Thesis, Haldia Institute of Technology (Vidyasagar University), 2002
  6. Simon S. Y. Shim, Vishnu S. Pendyala, Meera Sundaram, and Jerry Z. Gao, "Business to Business E-Commerce Frameworks," Computer, IEEE Computer Society, Volume 33, Number 10, October 2000.
  7. Wenli Wang, Zoltan Hidvegi, Andrew D. Bailey Jr., and Andrew B. Whinston, "E-Process Design and Assurance Using Model Checking," Computer, IEEE Computer Society, Volume 33, Number 10, October 2000
  8. Tim Ebringer, Peter Thorne, and Yuliang Zheng, "Parasitic Authentication To Protect Your E-Wallet," Computer, IEEE Computer Scciety, Volume 33, Number 10, October 2000
  9. Abhijit Chaudhury, Debasish Mallick, and H. Raghav Rao, "Web Channels in E-Commerce," Communications of the ACM, Volume 44, Number 1, January 2001
  10. Ted Becker, "Rating the Impact of New Technologies on Democracy," Communications of the ACM, Volume 44, Number 1, January 2001
  11. Joe Mohen and Julia Glidden, "The Case for Internet Voting," Communications of the ACM, Volume 44, Number 1, January 2001
  12. Deborah M. philips and hans A. von Spakovsky, "Gauging the Risks of Internet Elections," Communications of the ACM, Volume 44, Number 1, January 2001
  13. Lance J. Hoffman and Lorrie Cranor, Guest Editors, " Internet Voting for Public Officials," Communications of the ACM, Volume 44, Number 1, January 2001
  14. Andrew S. Tanenbaum, "Computer Networks," Third Edition, Prentice-Hall
  15. Debajyoti Mukhopadhyay and Sangeeta Mishra, "How to Meet The Challenges Of Managing E-Commerce Successfully," Journal of the Calcutta Management Association, Volume VII, Number 2: August 2002


Strategic Issues For A Successful E-Commerce

Post a Comment

0 Comments