Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to E-Commerce Benefits of E-Commerce.

Similar presentations


Presentation on theme: "Introduction to E-Commerce Benefits of E-Commerce."— Presentation transcript:

1 Introduction to E-Commerce Benefits of E-Commerce

2 Introduction to E-Commerce  Improved Customer Service Shop-at-home convenience Detailed product information Customer controls transaction Simplified ordering Open 24/7/365 Shop-at-home convenience Detailed product information Customer controls transaction Simplified ordering Open 24/7/365

3 Introduction to E-Commerce  Expanded Markets Elimination of Boundaries Direct to customer (no middleman) Elimination of Boundaries Direct to customer (no middleman)

4 Introduction to E-Commerce  Cost Cutting Streamlined order processing Fewer errors in order entry Increased speed Lower marketing costs Streamlined order processing Fewer errors in order entry Increased speed Lower marketing costs

5 Introduction to E-Commerce  Higher Profits Additional sales channel User fee income Advertising Income Lower marketing costs Additional sales channel User fee income Advertising Income Lower marketing costs

6 Introduction to E-Commerce E-Commerce Challenges Security & privacy Scams & Fraud Down time & poor service Awkward design & functionality Lack of retail experience Security & privacy Scams & Fraud Down time & poor service Awkward design & functionality Lack of retail experience

7 Chapter 2 Technology Infrastructure: The Internet and the World Wide Web

8 Routing Packets

9 Internet Protocols A protocol is a collection of rules for formatting, ordering, and error-checking data sent across a network.A protocol is a collection of rules for formatting, ordering, and error-checking data sent across a network.

10 IP Addresses IP addresses are based on a 32-bit binary number that allows over 4 billion unique addresses for computers to connect to the Internet.IP addresses are based on a 32-bit binary number that allows over 4 billion unique addresses for computers to connect to the Internet. IP addresses appear in ‘dotted decimal’ notation (four numbers separated by periods).IP addresses appear in ‘dotted decimal’ notation (four numbers separated by periods).

11 Domain Names To make the numbering system easier to use, an alternative addressing method that uses words was created.To make the numbering system easier to use, an alternative addressing method that uses words was created. An address, such as www.course.com, is called a domain name.An address, such as www.course.com, is called a domain name. The last part of a domain name (i.e., ‘.com’) is the most general identifier in the name and is called a ‘top-level domain’ (TLD).The last part of a domain name (i.e., ‘.com’) is the most general identifier in the name and is called a ‘top-level domain’ (TLD).

12 Web Page Delivery Hypertext Transfer Protocol (HTTP) is the set of rules for delivering Web pages over the Internet.Hypertext Transfer Protocol (HTTP) is the set of rules for delivering Web pages over the Internet. HTTP uses the client/server modelHTTP uses the client/server model A user’s Web browser opens an HTTP session and sends a request for a Web page to a remote server.A user’s Web browser opens an HTTP session and sends a request for a Web page to a remote server. In response, the server creates an HTTP response message that is sent back to the client’s Web browser.In response, the server creates an HTTP response message that is sent back to the client’s Web browser. The combination of the protocol name and the domain name is called a uniform resource locator (URL).The combination of the protocol name and the domain name is called a uniform resource locator (URL).

13 Hypertext Markup Language HTML is a simplified programming language that includes tags defining the format and style of text elements in a document.HTML is a simplified programming language that includes tags defining the format and style of text elements in a document.

14 HTML Editors HTML documents can be created in any general- purpose text editor or word processor.HTML documents can be created in any general- purpose text editor or word processor. Sophisticated editors can create full-scale, commercial-grade Web sites with database access, graphics, fill-in forms, and display the Web page along with the HTML code.Sophisticated editors can create full-scale, commercial-grade Web sites with database access, graphics, fill-in forms, and display the Web page along with the HTML code. Microsoft FrontPage and Macromedia Dreamweaver are examples of Web site builders.Microsoft FrontPage and Macromedia Dreamweaver are examples of Web site builders.

15 Globalization Issues

16 Language Issues To do business effectively in other culturesTo do business effectively in other cultures –Must adapt to culture Researchers have found thatResearchers have found that –Customers are more likely to buy products and services from Web sites in their own language LocalizationLocalization –Translation that considers multiple elements of local environment

17 Culture Issues Important element of business trustImportant element of business trust –Anticipate how the other party to a transaction will act in specific circumstances CultureCulture –Combination of language and customs –Varies across national boundaries –Varies across regions within nations

18 Infrastructure Issues Internet infrastructure includesInternet infrastructure includes –Computers and software connected to Internet –Communications networks over which message packets travel Organization for Economic Cooperation and Development’s ( OECD)Organization for Economic Cooperation and Development’s ( OECD) –Statements on Information and Communications Policy Deal with telecommunications infrastructure development issuesDeal with telecommunications infrastructure development issues

19 Infrastructure Issues (Continued) Flat-rate access systemFlat-rate access system –Consumer or business pays one monthly fee for unlimited telephone line usage –Contributed to rapid rise of U.S. electronic commerce Targets for technological solutionsTargets for technological solutions –Paperwork and processes that accompany international transactions

20 Revenue Models

21 Revenue model of selling goods and services on the WebRevenue model of selling goods and services on the Web –Based on mail order catalog revenue model that predates the Web Spiegel Spiegel Mail order or catalog modelMail order or catalog model –Proven to be successful for wide variety of consumer items Web catalog revenue modelWeb catalog revenue model –Taking the catalog model to the Web

22 Computers and Consumer Electronics Apple, Dell, Gateway, and Sun MicrosystemsApple, Dell, Gateway, and Sun MicrosystemsAppleDellGatewaySun MicrosystemsAppleDellGatewaySun Microsystems –Have had great success selling on the Web DellDell –Created value by designing entire business around offering high degree of configuration flexibility to its customers

23 Books, Music, and Videos Retailers using the Web catalog model to sell books, music, and videosRetailers using the Web catalog model to sell books, music, and videos –Among the most visible examples of electronic commerce Jeff BezosJeff Bezos –Formed Amazon.com Amazon.com Jason and Matthew OlimJason and Matthew Olim –Formed online music store they called CDnow CDnow –Used the Web catalog revenue model

24 Luxury Goods People are still reluctant to buy through a Web sitePeople are still reluctant to buy through a Web site Web sites of Vera Wang and VersaceWeb sites of Vera Wang and VersaceVera Wang VersaceVera Wang Versace –Constructed to provide information to shoppers, not to generate revenue Web site of EvianWeb site of EvianEvian –Designed for a select, affluent group of customers

25 Clothing Retailers Clothing Retailers Lands’ EndLands’ EndLands’ EndLands’ End –Pioneered idea of online Web shopping assistance with its Lands’ End Live feature in 1999 Personal shopperPersonal shopper –Intelligent agent program that learns customer’s preferences and makes suggestions Virtual modelVirtual model –Graphic image built from customer measurements

26 Flowers and Gifts 1-800-Flowers1-800-Flowers1-800-Flowers –Created online extension to its telephone order business Chocolatier GodivaChocolatier GodivaGodiva –Offers business gift plans on its site

27 Digital Content Revenue Models Firms that own intellectual propertyFirms that own intellectual property –Have embraced the Web as a new and highly efficient distribution mechanism Lexis.comLexis.comLexis.com –Provides full-text search of court cases, laws, patent databases, and tax regulations ProQuestProQuestProQuest –Sells digital copies of published documents

28 Advertising-Supported Revenue Models Broadcasters provide free programming to an audience along with advertising messages KOMO KINGBroadcasters provide free programming to an audience along with advertising messages KOMO KINGKOMOKINGKOMOKING Success of Web advertising hampered bySuccess of Web advertising hampered by –No consensus has emerged on how to measure and charge for site visitor views Stickiness of a Web site: ability to keep visitors and attract repeat visitorsStickiness of a Web site: ability to keep visitors and attract repeat visitors –Very few Web sites have sufficient visitors to interest large advertisers

29 Web Portals Web directoryWeb directory –A listing of hyperlinks to Web Pages Portal or Web portalPortal or Web portal –Site used as a launching point to enter the Web –Almost always includes a Web directory and search engine –Example: Yahoo, AOL, Altavista YahooAltavistaYahooAltavista

30 Advertising-Subscription Mixed Revenue Models SubscribersSubscribers –Pay a fee and accept some level of advertising –Typically subjected to much less advertising Used byUsed by –The New York Times and The Wall Street Journal The New York Times The Wall Street JournalThe New York Times The Wall Street Journal

31 Fee-for-Transaction Revenue Models Businesses offer services and charge a fee based on number or size of transactions processed PayPalBusinesses offer services and charge a fee based on number or size of transactions processed PayPalPayPal DisintermediationDisintermediation –Removal of an intermediary from value chain ReintermediationReintermediation –Introduction of a new intermediary

32 Fee-for-Service Revenue Models Fee based on value of service providedFee based on value of service provided ServicesServices –Range from games and entertainment to financial advice Online gamesOnline games –Growing number of sites include premium games in their offerings –Site visitors must pay to play these premium games

33 Fee-for-Service Revenue Models (Continued) Concerts and filmsConcerts and films –As more households obtain broadband access to the Internet Companies are providing streaming video of concerts and films to paying subscribersCompanies are providing streaming video of concerts and films to paying subscribers Professional ServicesProfessional Services –State laws One of the main forces preventing U.S. professionals from extending their practices to the WebOne of the main forces preventing U.S. professionals from extending their practices to the Web

34 If you build it they will come – you hope! If you build it they will come – you hope! Exploring E-Commerce Marketing on the Web

35 Marketing The management process responsible for identifying, anticipating, and satisfying customer’s requirements The management process responsible for identifying, anticipating, and satisfying customer’s requirements. Exploring E-Commerce The commercial functions involved in transferring goods from producer to consumer.

36 Product-based Strategies: product categories Staples Home Depot Home Depot Costco Musical Instruments Musical Instruments More Musical Instruments More Musical Instruments Staples Home Depot Home Depot Costco Musical Instruments Musical Instruments More Musical Instruments More Musical Instruments Exploring E-Commerce

37 Customer-based Strategies: Meeting specific needs Sabre Business Services Business Services Web Marketing Web Marketing Sabre Business Services Business Services Web Marketing Web Marketing Exploring E-Commerce

38 Target Marketing Micromarketing (go for the “niche”) Geographic Marketing Demographic Marketing Psychographic Marketing Micromarketing (go for the “niche”) Geographic Marketing Demographic Marketing Psychographic Marketing Exploring E-Commerce

39 Customer Behavior Strategies Browsers – use of “triggers”. Sports Outfitter Sports Outfitter Browsers – use of “triggers”. Sports Outfitter Sports Outfitter Exploring E-Commerce

40 Customer Behavior Strategies Buyers – ready to buy. Barnes and Noble Barnes and Noble Buyers – ready to buy. Barnes and Noble Barnes and Noble Exploring E-Commerce

41 Advertising on the Web

42 Banner Ads Most advertising on the Web uses banner ads.Most advertising on the Web uses banner ads. A banner ad is a small rectangular object on a Web page that displays a stationary or moving graphic and includes a hyperlink to the advertiser’s Web site.A banner ad is a small rectangular object on a Web page that displays a stationary or moving graphic and includes a hyperlink to the advertiser’s Web site. The most common sizes of banner ads are:The most common sizes of banner ads are: –Full banner –Half banner –Square button Most advertising on the Web uses banner ads.Most advertising on the Web uses banner ads. A banner ad is a small rectangular object on a Web page that displays a stationary or moving graphic and includes a hyperlink to the advertiser’s Web site.A banner ad is a small rectangular object on a Web page that displays a stationary or moving graphic and includes a hyperlink to the advertiser’s Web site. The most common sizes of banner ads are:The most common sizes of banner ads are: –Full banner –Half banner –Square button

43 Other Web Ad Formats Another format of Web advertising is the pop-up ad.Another format of Web advertising is the pop-up ad. A pop-up ad is an ad that appears in its own window when the user opens or closes a Web page.A pop-up ad is an ad that appears in its own window when the user opens or closes a Web page. Another type of pop-up ad is called the pop- behind ad.Another type of pop-up ad is called the pop- behind ad. A pop-behind ad is a popular ad that is followed very quickly by a command that returns focus to the original windowA pop-behind ad is a popular ad that is followed very quickly by a command that returns focus to the original window –The window is parked behind the user browser waiting to appear when the browser is closed. Another format of Web advertising is the pop-up ad.Another format of Web advertising is the pop-up ad. A pop-up ad is an ad that appears in its own window when the user opens or closes a Web page.A pop-up ad is an ad that appears in its own window when the user opens or closes a Web page. Another type of pop-up ad is called the pop- behind ad.Another type of pop-up ad is called the pop- behind ad. A pop-behind ad is a popular ad that is followed very quickly by a command that returns focus to the original windowA pop-behind ad is a popular ad that is followed very quickly by a command that returns focus to the original window –The window is parked behind the user browser waiting to appear when the browser is closed.

44 E-Mail Marketing Unsolicited e-mail is often considered to be Spam.Unsolicited e-mail is often considered to be Spam. Sending e-mail messages to Web site visitors who have expressly requested the e-mail messages is a completely different story.Sending e-mail messages to Web site visitors who have expressly requested the e-mail messages is a completely different story. The practice of sending e-mail messages to people who have requested them is a part of marketing strategy called permission marketing.The practice of sending e-mail messages to people who have requested them is a part of marketing strategy called permission marketing. Unsolicited e-mail is often considered to be Spam.Unsolicited e-mail is often considered to be Spam. Sending e-mail messages to Web site visitors who have expressly requested the e-mail messages is a completely different story.Sending e-mail messages to Web site visitors who have expressly requested the e-mail messages is a completely different story. The practice of sending e-mail messages to people who have requested them is a part of marketing strategy called permission marketing.The practice of sending e-mail messages to people who have requested them is a part of marketing strategy called permission marketing.

45 Search Engine Positioning Marketers want to make sure that when a potential customer enters search items that relate to their products or services, their companies’ Web site URL appears among the first 10 returned listings.Marketers want to make sure that when a potential customer enters search items that relate to their products or services, their companies’ Web site URL appears among the first 10 returned listings. The combined art and science of having a particular URL listed near the top of a search engine results is called search engine positioning.The combined art and science of having a particular URL listed near the top of a search engine results is called search engine positioning. Search engine positioning is also called:Search engine positioning is also called: –Search engine optimization –Search engine placement Marketers want to make sure that when a potential customer enters search items that relate to their products or services, their companies’ Web site URL appears among the first 10 returned listings.Marketers want to make sure that when a potential customer enters search items that relate to their products or services, their companies’ Web site URL appears among the first 10 returned listings. The combined art and science of having a particular URL listed near the top of a search engine results is called search engine positioning.The combined art and science of having a particular URL listed near the top of a search engine results is called search engine positioning. Search engine positioning is also called:Search engine positioning is also called: –Search engine optimization –Search engine placement

46 Chapter 5 - Business to Business Strategies: From Electronic Data Interchange to Electronic Commerce

47 Supply Chain Purchasing activitiesPurchasing activities Supply chainSupply chain ProcurementProcurement Supply managementSupply management SourcingSourcing E-procurement or e-sourcingE-procurement or e-sourcing

48 Supply Chain Vendor Customer Product information Pricing Shipping Order status Invoice

49 Vendor Customer Product specifications Inventory levels Purchase order Payment Supply Chain

50 Chapter 6 - Web Auctions, Virtual Communities, Web Portals Types of Auctions (English, Dutch)Types of Auctions (English, Dutch) Auction related services (directories, escrow, price monitoring)Auction related services (directories, escrow, price monitoring) Virtual communities (gathering place; narrow interests)Virtual communities (gathering place; narrow interests) Portal strategies (gathering place plus revenue)Portal strategies (gathering place plus revenue)

51 Chapter 7 –Legal, Ethical, and Tax Issues Web content issues – copyright; trademarkWeb content issues – copyright; trademark Privacy ObligationsPrivacy Obligations CybersquattingCybersquatting Taxation – Nexus = “connection”Taxation – Nexus = “connection” Sales TaxSales Tax Borders and jurisdiction “power, effects, legitimacy, notice”Borders and jurisdiction “power, effects, legitimacy, notice”

52 Power Power, in the form of control over physical space and the people and objects that reside in that space, is a defining characteristic of statehood.Power, in the form of control over physical space and the people and objects that reside in that space, is a defining characteristic of statehood. Effective law enforcement requires power.Effective law enforcement requires power. The ability of a government to exert control over a person or corporation is called jurisdiction.The ability of a government to exert control over a person or corporation is called jurisdiction.

53 Effects Laws in the physical world are grounded in the relationship between physical proximity and the effects of a person’s behavior.Laws in the physical world are grounded in the relationship between physical proximity and the effects of a person’s behavior. Government-provided trademark protection is a good example.Government-provided trademark protection is a good example. The characteristics of laws are determined by the local culture’s acceptance of or reluctance to various kinds of effects.The characteristics of laws are determined by the local culture’s acceptance of or reluctance to various kinds of effects.

54 Legitimacy Most people agree that the legitimate right to create and enforce laws derives from the mandate of those who are subject to those laws.Most people agree that the legitimate right to create and enforce laws derives from the mandate of those who are subject to those laws. Legitimacy is the idea that those subject to laws should have some role in formulating them.Legitimacy is the idea that those subject to laws should have some role in formulating them.

55 Notice The physical boundary, when crossed, provides notice that one set of rules has been replaced by a different set of rules.The physical boundary, when crossed, provides notice that one set of rules has been replaced by a different set of rules. Borders provide this notice in the physical world.Borders provide this notice in the physical world.

56 Chapter 8 – Web Server Hardware and Software What is a server? Web page; database; emailWhat is a server? Web page; database; email E-commerce siteE-commerce site Dynamic contentDynamic content Multi-tier structuresMulti-tier structures Software – operating system; web server; email; FTP; searchSoftware – operating system; web server; email; FTP; search Measuring performanceMeasuring performance Buy or find a host?Buy or find a host?

57

58 Chapter 9 – Electronic Commerce Software Catalog displayCatalog display Shopping CartShopping Cart Transaction processingTransaction processing MiddlewareMiddleware Web servicesWeb services Technology-enabled Customer Relationship ManagementTechnology-enabled Customer Relationship Management

59 Chapter 10 – Electronic Commerce Security Security policySecurity policy SecrecySecrecy IntegrityIntegrity NecessityNecessity

60 Secrecy refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data’s source.Secrecy refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data’s source. Integrity refers to preventing unauthorized data modification.Integrity refers to preventing unauthorized data modification. Necessity refers to preventing data delays or denials.Necessity refers to preventing data delays or denials.

61 Security Overview

62 Types of Encryption “Asymmetric encryption,” or public-key encryption, encodes messages by using two mathematically related numeric keys: a public key and a private key.“Asymmetric encryption,” or public-key encryption, encodes messages by using two mathematically related numeric keys: a public key and a private key. “Symmetric encryption,” or private-key encryption, encodes a message using a single numeric key to encode and decode data.“Symmetric encryption,” or private-key encryption, encodes a message using a single numeric key to encode and decode data.

63 Firewalls A firewall is a computer and software combination that is installed at the entry point of a networked system.A firewall is a computer and software combination that is installed at the entry point of a networked system. The firewall provides the first line of defense between a network and the Internet or other network that could pose a threat.The firewall provides the first line of defense between a network and the Internet or other network that could pose a threat. Acting as a filter, firewalls permit selected messages to flow into and out of the protected network.Acting as a filter, firewalls permit selected messages to flow into and out of the protected network.

64 Payment Systems for Electronic Commerce Chapter 11

65 Advantages and Disadvantages of Payment Cards Advantages:Advantages: Payment cards provide fraud protection.Payment cards provide fraud protection. They have worldwide acceptance.They have worldwide acceptance. They are good for online transactions.They are good for online transactions. Disadvantages:Disadvantages: Payment card service companies charge merchants per-transaction fees and monthly processing fees.Payment card service companies charge merchants per-transaction fees and monthly processing fees.

66 Planning for Electronic Commerce Chapter 12

67 Linking Objectives to Business Strategies Businesses can use downstream strategies, which are tactics that improve the value that the business provides to its customers.Businesses can use downstream strategies, which are tactics that improve the value that the business provides to its customers. –Toyota, Real Estate ToyotaReal EstateToyotaReal Estate Businesses can pursue upstream strategies that focus on reducing costs or generating value by working with suppliers or inbound logistics.Businesses can pursue upstream strategies that focus on reducing costs or generating value by working with suppliers or inbound logistics. –RFID strategy, Private e-markets RFID strategyPrivate e-marketsRFID strategyPrivate e-markets

68 Comparing Benefits to Costs If the benefits exceed the cost of a project by a comfortable margin, the company invests in the project.If the benefits exceed the cost of a project by a comfortable margin, the company invests in the project. Companies should evaluate each element of their electronic commerce strategies using this cost/benefit approach.Companies should evaluate each element of their electronic commerce strategies using this cost/benefit approach. Managers often use return on investment (ROI) to evaluate any capital investment.Managers often use return on investment (ROI) to evaluate any capital investment.


Download ppt "Introduction to E-Commerce Benefits of E-Commerce."

Similar presentations


Ads by Google