Today`s Strategic Imperative: E

Today’s Strategic Imperative:
E-Business
Jeremy Malley
BSAD – 145
Ch. 3
20 February 2002
Table of Contents





Business-To-Consumer e-commerce (B2C)
Business-To-Business e-commerce (B2B)
Security
CLJ
CTQ
Business-To-Consumer (B2C)

Business to consumer e-business is the most
widely reported form of e-business.


$38.5 billion dollar industry in 2000.
750 million Internet users by 2008


50% of those users will shop online.
B2C Advantages

Global accessibility, Reduced order processing,
Greater availability, Closer customer relationships,
Increased customer loyalty, New products and
services, Direct Marketing
B2C

(cont.)
Disintermediation- the elimination of
intermediaries (distributors and resellers,
for example) in the chain.

Customers have access to wide range of
competitive prices and sellers for products,
driving down profit margins and the price for
products.
Business-To-Business (B2B)


B2B is doing business electronically over the
Internet, intranets, or private networks.
Automate the trading process in order to
improve it.


It can be conducted directly between a buyer and a seller or
through an online intermediary.
Use a more efficient chain, or sell direct to
retailers and or businesses. (Dell)

Management and redesign of the supply chain has
become a major strategic issue
B2B

(cont.)
Businesses can use B2B to eliminate paper
based systems, speed up cycle time,
reduce errors, reduce costs, and increase
customer service.
Security

Security ranks as one of the top management
and consumer concerns about e-business.

Concerned about protecting company assets and
information and ensuring the integrity of e-business
transactions.

Sniffing- the interception and reading of electronic messages.
Spoofing- the assumption of a false identity and the execution of
fraudulent transactions.

Hacking- the unauthorized access to a host computer.

Security

Security has become increasingly important with the amount of
business that takes place on the Internet.



(cont.)
Cyber attacks are on the increase; in 2000 70% of businesses
experienced unauthorized use.
71% of businesses experienced unauthorized use of by insiders, and
79% experienced employee abuse of internet privileges.
Managers need to understand the risks of poor security.
 Attacks can result in damage to technical and information
assets.
 Temporary loss of Web site and Internet access, which can result
in loss of income.
 Internal breaches are more prevalent than external breaches, so
management must take measure to address these inside threats.
CLJ

“Disintermediation: is e-business a danger for
the channel?”




By Paul Shearstone, 18 April, 2001
http://www.integratedmar.com/eyc.cfm?item=EYC041801-04
New direct commerce empowered by technology means
manufacturers will no longer require services of either reseller or
distributor middlemen to reach end-user customers, but……
Limits of e-commerce (present form)
 Still not prefered way of doing business
 Not replaced or reduced traditional operations to any significant
extent.
 Comfort level.
 Nor the evironment for skilled sales persons to sell.
CTQ

What do you feel the role of
disintermediation will be in the future of ecommerce as far as strategic advantages
are concerned? (p.87)