Download presentation
Presentation is loading. Please wait.
Published byNeal Patterson Modified over 9 years ago
1
Lesson Three General Comments on Harrah’s Discuss Ben and Jerry’s Chapters 5 and 6 Review Mid Term Time for Group Project
2
WHAT’S REPLACING THE DAY AFTER THANKSGIVING FOR SHOPPING SALES? Black Friday is traditionally a big day for retailers It’s when Christmas shoppers spend a lot of money, moving retailers out of the red and into the black But Black Friday may soon be replaced by Cyber Monday Cyber Monday is the Monday after Thanksgiving when people go back to work and buy products online
3
B2B E-Commerce Business to Business (B2B) e-commerce – when a business sells products and services to customers who are primarily other businesses Where all the e-commerce money is Basically, it’s about businesses doing business with other businesses Supply chain management (from Chapter 2) is a big part of B2B e-commerce
4
B2C E-Commerce Business to Consumer (B2C) e-commerce – when a business sells products and services to customers who are primarily individuals B2C is the glitzy e-commerce like iTunes, eBay, etc B2C is a primary focus of the later sections in this chapter
5
C2B E-Commerce Consumer to Business (C2B) e-commerce – when an individual sells products and services to a business True economic inversion of the B2C model Fotolia is a good example (www.fotolia.com)www.fotolia.com There you can post photos and videos and businesses will pay you a royalty to use them (if they like what you offer) You can also advertise businesses on your personal Web site (called an affiliate program) and receive monies for visitors who jump from your site to the business’ Web sites
6
C2C E-Commerce Consumer to Consumer (C2C) e-commerce – when an individual sells products and services to another individual. You selling to another person (or the reverse) Usually occurs through an intermediary such as eBay
7
B2G E-Commerce Business to Government (B2G) e- commerce – when a business sells products and services to a government entity. Lockheed providing products and services to DoD Fairly large e-commerce model in terms of revenue Most U.S. government entities (for sure at the federal level) won’t do business with your business if you can’t do it electronically
8
G2C E-Commerce Government to Consumer (G2C) e- commerce – e-commerce activities performed between a government and its citizens Does not fit well at all within the traditional supply-and-demand e-commerce notion Paying taxes, registering vehicles, etc
9
Examples: www.amazon.com www.kayak.com www.alibaba.com www.ebay.com www.crowdspring.com www.topcoder.com www.threadless.com www.mystarbucksidea.com www.groupon.com www.woot.com www.krn.com
10
B2B: Horizontal Versus Vertical B2B e-commerce takes advantage of e- marketplaces Electronic marketplace (e-marketplace) – interactive business providing a central market where multiple buyers and sellers can engage in e-commerce Horizontal e-marketplaces Vertical e-marketplaces
11
B2C Marketing Mix Tools SEO/SEM Online ads Viral marketing Affiliate programs Social Media
12
Affiliate Programs
13
B2C Payment Systems Credit cards Financial cybermediaries Electronic checks Electronic Bill Presentment and Payment Smart cards
14
Financial Cybermediaries Financial cybermediary – Internet-based company that makes it easy for one person to pay another person or organization over the Internet PayPal (www.paypal.com) is the most well- knownwww.paypal.com
15
Financial Cybermediaries
16
Security: The Pervading Concern Security is very important when moving money Some security measures… Encryption Secure Sockets Layers Secure Electronic Transactions Many, many others
17
Encryption Encryption – scrambles the contents of a file so that you can’t read it without having the right decryption key Often through public key encryption (PKE) – uses two keys: a public key for everyone and private key for only the recipient of the encrypted information
18
Public Key Encryption
19
Secure Sockets Layers Secure Sockets Layer (SSL)… Creates a secure connection between a Web client and server Encrypts the information Sends the information over the Internet Denoted by lock icon on browser or https:// (notice the “s”)
20
Secure Sockets Layers The “s” in https and the padlock
21
Secure Electronic Transactions Secure Electronic Transaction (SET) – transmission method that ensures transactions are legitimate as well as secure Helps verify use of a credit card, for example, by sending the transaction to the credit issuer as well as the seller/supplier
22
E-Business Trend – M-Commerce Class-show iphone
23
E-Business Trend – Long Tail Long Tail – first offered by Chris Anderson; explains e-commerce profitability in terms of a sales curve Brick-and-mortar businesses carry limited inventory, inventory that is popular E-businesses can carry huge amounts of “niche” inventory that may only sell a couple of times a year
24
E-Business Trend – Long Tail
25
Old Style Software Development
26
Phase 1: Planning Sample Project Plan
27
Phase 2: Analysis Two primary analysis activities: 1. Gather the business requirements Business requirements - the detailed set of knowledge worker requests that the system must meet in order to be successful Business requirements address the “why” and “what” of your development activities Joint application development (JAD) - knowledge workers and IT specialists meet, sometimes for several days, to define or review the business requirements for the system
28
Phase 2: Analysis 2. Prioritize the requirements Requirements definition document – prioritizes the business requirements and places them in a formal comprehensive document Again, you probably can’t do everything, so prioritizing is important Users sign off on this document which clearly sets the scope for the project
29
Phase 2: Analysis Take time during analysis to get the business requirements correct. If you find errors, fix them immediately. The cost to fix an error in the early stages of the SDLC is relatively small. In later stages, the cost is huge.
30
Phase 3: Design Design phase - build a technical blueprint of how the proposed system will work Two primary design activities: 1. Design the technical architecture Technical architecture - defines the hardware, software, and telecommunications equipment required to run the system
31
Phase 4: Development Development phase - take all of your detailed design documents from the design phase and transform them into an actual system Two primary development activities: 1. Build the technical architecture 2. Build the database and programs Both of these activities are mostly performed by IT specialists
32
Phase 5: Testing Testing phase - verifies that the system works and meets all of the business requirements defined in the analysis phase Two primary testing activities: 1. Write the test conditions Test conditions - the detailed steps the system must perform along with the expected results of each step
33
Component-Based Development Methodologies Rapid application development (RAD) Extreme programming (XP) Agile methodology
34
Rapid Application Development (RAD) Rapid application development (RAD) (also called rapid prototyping) - emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process Prototypes are models of the software components The development team continually designs, develops, and tests the component prototypes until they are finished
35
Rapid Application Development (RAD) Build new software components Use already- existing software components
36
Extreme Programming (XP) Extreme programming (XP) - breaks a project into tiny phases and developers cannot continue on to the next phase until the first phase is complete
37
Agile Methodology Agile methodology - a form of XP, aims for customer satisfaction through early and continuous delivery of useful software components
38
PROTOTYPING Prototype – a model of a proposed product, service, or system Prototyping - the process of building a model that demonstrates the features of a proposed product, service, or system Proof-of-concept prototype - used to prove the technical feasibility of a proposed system Selling prototype - used to convince people of the worth of a proposed system
39
The Prototyping Process The prototyping process involves four steps: 1. Identify basic requirements 2. Develop initial prototype 3. User review 4. Revise and enhance the prototype
40
The Prototyping Process
41
Advantages of Prototyping Encourages active user participation Helps resolve discrepancies among users Gives users a feel for the final system Helps determine technical feasibility Helps sell the idea of a proposed system
42
Disadvantages of Prototyping Leads people to believe the final system will follow Gives no indication of performance under operational conditions Leads the project team to forgo proper testing and documentation
43
OUTSOURCING Outsourcing – the delegation of specified work to a third party for a specified length of time, at a specified cost, and at a specified level of service The third “who” option of systems development, after insourcing and selfsourcing
44
OUTSOURCING The main reasons behind the rapid growth of the outsourcing industry include the following: Globalization The Internet Growing economy and low unemployment rate Technology Deregulation
45
Outsourcing – RFP Request for proposal (RFP) – formal document that describes in excruciating detail your logical requirements for a proposed system and invites outsourcing organizations (vendors) to submit bids for its development In outsourcing, you must tell another organization what you want developed; you do that with an RFP Therefore, the RFP must be very detailed and complete Some RFPs can take months or even years to develop
46
Outsourcing – SLA Service level agreement (SLA) - formal contractually obligated agreement between two parties In outsourcing, it is the legal agreement between you and the vendor and specifically identifies what the vendor is going to do (and by when) and how much you’re going to pay Supporting SLA documents – service level specifications and service level objectives – contain very detailed numbers and metrics
47
Offshore Outsourcing Primary outsourcing countries are: India China Eastern Europe (including Russia) Ireland Israel Philippines
48
The Advantages and Disadvantages of Outsourcing Advantages: Focus on unique core competencies Exploit the intellect of another organization Better predict future costs Acquire leading-edge technology Reduce costs Improve performance accountability
49
The Advantages and Disadvantages of Outsourcing Disadvantages: Reduces technical know-how for future innovation Reduces degree of control Increases vulnerability of your strategic information Increases dependency on other organizations
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.