1. INTRODUCTIONElectronic Commerce is for age Information Technology what mercantilism, the quest for gold and the actual conquest of new lands were for age discovery. Like the prow of a sizable fishing boat, it draws towards itself other interests and elements of society, also it will leave new discoveries and modifications in its wake. The vast social networking of world through optic fibers, satellites and wireless communication is developing a new global community and a brand new global market, in which most from the countries should participate. It is conditioning, almost paradoxically, the identity of little groups, isolated communities and minority interests and driving them towards a cheaper social and economic activity and extending their opportunities. And most importantly, it's empowering small businesses to compete along with multinational corporations and enabling consumers to find the world for exactly what these people needed. E-Commerce basically means using n
etworks (Internet) to handle all the activities involved in company management and operation: buying and selling of services and products, technology and partner search, dealing along with counterparts, choosing the most convenient transport and insurances, performing bank transactions, having to pay and billing, communicating with company sales staff, picking up orders, and any alternative activities necessary for trading. A company can post a complete catalog of it's services and products on the Internet, which can be continuously updated to provide new or updated products, proving a sizable virtual showcase for potential clients, a way to communicate with clients and in this way, adjusts it's offer to their needs; while at the same time it will obtain access to virtual markets where it can purchase what it requires. Through integral systems already under improvement, one company will connect to other companies located all over the world, to buy and sell, choosing the serv
ices and products which best meets its needs from the huge network. And it's true this revolution involves us all. 2. BUSINESS-TO-BUSINESS (B2B)B2B e-commerce means companies buying from and selling to one another online. It automates and streamlines the process of exchanging the intermediate products. It provides much more reliable updating of business data. B2B makes product information available globally and updates it instantly. Hence, procuring organization can take benefit of vast amount of product information. [3]Now, we must know do you know the entities of B2B e-commerce & their own concerns:
Selling company: with advertising management perspective.
Buying company: with procurement administration perspective.
Electronic intermediary: A third party intermediating company (the scope of service may be extended to incorporate the order fulfillment ).
Deliverer: who should match the JIT (Just in Time Delivery)
System platform: such as the Internet, Intranet, as well as Extranet.
Protocols and communication: such because EDI (Electronic Data Interchange) and assessment shopping, possibly using software agents.
Back-end info system: possibly implemented using the intranet as well as Enterprise Resource Planning (ERP) systems.
B2B e-commerce means that both the sellers and buyers tend to be business corporations. It covers a broad spectrum associated with applications that enable an enterprise or business to create electronic relationship with their distributors, re-sellers, providers, and other partners. B2B applications will offer you enterprises access to the following types of information:
Product: Specifications, prices, product sales history.
Customer: Sales history and predictions.
Supplier: Product lines and lead occasions, sales terms and conditions.
Product procedure: Capacities, commitments, product plans.
Transportation: Bears, lead-times, costs.
Inventory: Inventory levels, transporting costs, locations.
Supply chain alliance: Crucial contacts, partners roles and responsibilities, agendas.
Competitor: Benchmarking, competitive product offering, marketplace share.
Sales and marketing: Point associated with sales (POS), promotions.
Supply chain procedure and performance: Process descriptions, performance steps, quality, delivery time and customer fulfillment.
2. 1 How to get the bestPeople always would like to get the best shot in life. To deliver a sound roi you must add on time shipping and flavor of some strategies. This tactic should include proper marketing, channel administration, solid technology, strategic partners and excellent products. Let us have a look on all of them. 2. 1. 1 Just in Time delivery (JIT)In this type of case (JIT), delivery materials and parts promptly is a must. Using E-Commerce, it's highly possible to assure JIT transport. Just in time delivery can be realized through the co-coordinated effort of delivery- service organization and suppliers inventory policy. Quick delivery doesn't necessarily mean JIT delivery, but the machine for quick delivery is the anchor of JIT delivery. For the B2B E-Commerce environment the advance confirmation from the delivery date at the contract stage is essential. [5][15]2. 1. 2 Add strategies for your business2. 1. 2. 1 Direct MarketingIn an average business organization
, buying decisions, especially for products on the few thousand dollars, are made by number of individuals. As a result, direct marketers have to extent the reach of their programs to different functional areas as well as perhaps even different levels within a practical area. There are multiple buyers and influences in any organization who are likely involved in the buying decision. You may know with reasonable certainty who most of your target is, but secondary target could be just as important to reach. You might have to reach business buyers and influencers within three basic management areas (functional administration, financial management and general management) and get it done at middle to upper managerial, in addition to technical levels. To do it businesses need accurate E-mail list, which they are able to develop by viewing companies Websites and reviewing annual reports along with other public documents. 2. 1. 2. 2 Relationship MarketingBusiness buyers are not alwa
ys ready to buy services or products when you are ready to market them. Factors you cannot control, like the companies' budgeting process, the need with regard to additional approvals, or purchasing procedures, might have a direct impact on plans to buy. There may be a casual curiosity about the product but not an instant need. The smart B2B direct marketer compensates with this uncertainty by making sure a plan of regular, ongoing communications (often called a continuity program) is before prospects periodically. This can be done by immediate E-mail and by placing the information online. 2. 1. 2. 3 Internet MarketingSeveral potential marketing strategies may be used in B2B E-Commerce marketing. These strategies could be classified into the following five groups:
Generating and qualifying leads using the Internet.
Using Internet events to promote services and products.
Executing instant fulfillment on the Web.
Generating orders through the Internet.
Enhancing customer relationship using the Internet.
2. 1. 2. 4 Funnel ManagementThe first element is coherent advertising or channel management. The true test of the successful E-Commerce implementation is how well it exploits the web to reach, capture and retain the best customers. Choosing which products and services is going to be offered through which channel is also an important decision. E-commerce runs across multiple product sales channels, including direct, indirect and E-marketplaces. The option of which marketplaces to use as sales channels is really a crucial decision. In addition to areas, using indirect sales channels is also a place for explosive sales opportunities. Enabling your own selling partners to host your list, inventory and fulfillment databases on their systems can make efficiency that grows their business as well as yours. You also can continue your direct one-to-one trading relationship with very long time strategic vendors by "E-enabling" the entire business process in the initial request for quote
through purchase fulfillment to automatic billing and repayment. These channels create a situation in which the E-Commerce sell side platform must work across multi-channel selling strategies --which brings us to another element of your strategy: technology. 2. 1. two. 5 TechnologyIndustry standard tools often allow a seller to construct and manage product catalogs and content once and rely on them throughout the entire multi-channel selling conduits. Evolving tools and capabilities permit you to develop customer friendly web sites and win repeat customers because they build customer loyalty. The front end for e-commerce selling is definitely an important piece of B2B success, connecting your web systems with your existing techniques. The 24*7 online marketplace means your E-business needs to be continually available. IT infrastructure must supply more performance, reliability, security and process integration than the usual bricks-and-mortar environment. In addition, mainf
rames hosting the databases and ERP (Enterprise Source Planning) systems operating the management systems should be seamlessly integrated with the e-commerce engine to provide the grade of service customers expects and to realize the price efficiencies B2B E-Commerce can provide. Selecting a flexible E-Commerce platforms and a system integrator familiar with the entire business process is essential for success. 2. 1. 2. 6 PartnersLike choosing the web as a sales channel, it's also important to pick the best partners, including an integration partner who's experienced in helping to move ahead rapidly over the entire E-business process. we have to simply accept that any move to E-Commerce isn't about incremental improvement, rather fundamental redesign from the key business processes. 2. 1. two. 7 ProductsWith the presence on the net, we can effectively and efficiently transact business with this clients 24*7. But so can the competitors. Survivals and success in E-Commerce ent
ails more than merely building a storefront to sell on the internet. [5]3. BUSINESS-TO-CONSUMER (B2C) While the term E-Commerce describes all online transactions, B2C stands for "Business-to-Consumer" and pertains to any business or organization that sells its services or products to consumers over the Internet for his or her own use. In the late 90s, dotcoms-- which were quickly gaining in dimensions and market capitalization -- posed a threat to traditional physical businesses. In many ways, these dotcoms appeared to be rewriting the rules of business -- they'd the customers without the expenses associated with maintaining physical stores, little inventory, unlimited use of capital and little concern about real earnings. The idea was to get big fast and be worried about profits later. And a popular thought automatically makes our mind: " Learn to swim as the tide is out. Learn from the types of customers that are out there right now. It is a small market- play by using it;
learn to price business in the forex market, learn how to assess risk. If you're able to do it well, the stakes will get higher and you'll succeed where others may not. "3. 1 Do you know the major challenges of B2C e-commerceGetting browsers to purchase things -- Your E-Commerce site cannot survive traffic alone. Getting visitors to the website is only half the battle. Whether or not they buy something is what determines should you win. Some ways to boost the actual B2C conversion rate include improving routing, simplifying checkout process (such as one-step checkout as well as easily replaced passwords), and sending out e-mails with special deals. Building customer loyalty -- With a lot of sites out there, how can you develop a strong relationship with customers? Here tend to be some tips:
Focus on customization: A wide array of software packages can be found to help e-commerce sites create distinctive boutiques that target specific customers.
Create an easy-to-use customer support application. Providing just an e-mail address could be frustrating to customers with questions. Reside chat or, at the very minimum, a phone number will help.
Focus on making your site simple to use.
Fulfillment -- E-Commerce has increased the concentrate on customer satisfaction and delivery fulfillment. Companies should improve their logistical systems to assure on-time delivery. Providing instant gratification with regard to customers still isn't easy, but successful B2C E-Commerce operations find that fulfillment headaches can be eased with an increase of focus and investment in supply string and logistical technologies. [5]3. 2 6 Keys to B2C E-Commerce successSo, what will it really take to capture the E-consumer as well as generate online insurance sales? Based upon Insurance & Technology's interviews with each early adopters and industry analysts, there seem to be six key success factors:
Proper Goals Assessment/Customer Needs Assessment
What are your goals like a company? Who are your customers? What exactly are their needs? These may sound such as basic questions, but both insurers and analysts emphasize that the company's Web presence must reflect these details.
Create a Usable, Targeted and Sticky Site
Usability and site performance are a few of the key factors insurers need to bear in mind when developing their B2C E-Commerce methods. Insurers also need to be aware of all their various constituencies when developing B2C endeavours. The Web can reach multiple audiences and none ought to be overlooked. A good Web site will communicate with consumers in addition to business partners, agents, suppliers and suppliers.
Stickiness, or the success of an internet site in attracting and keeping new as well as returning visitors, is another success element. Turning the site into more of the information portal with real-time news rss feeds with keeping content updated and synchronized can help keep customers coming back.
Integration
The web is not a stand-alone platform or even medium. To be an effective support and distribution channel, it must end up being integrated with back-end legacy systems, broker systems, call centers, marketing initiatives as well as pricing and underwriting systems. The Internet is simply another client relationship channel and integration with other customer service functions happens to be a number-one priority.
Innovate with Web Programs and Real-Time Transactions
B2C online applications are the relatively basic, such as updating plan information, to the complex, such because comparative rate quoting and electronic statements submission. Regardless of the specific functions a company plans to increase its Web site, they must serve the requirements of the E-consumer. This means that internet sites should have interactivity and immediate satisfaction.
Partnerships
Although insurers need to end up being selective in initiating online partnerships, such agreements possess the potential to extend market reach and add features inside a relatively low-cost manner. According to a current Gartner Group study, 46 percent of insurance firms active on the internet have partnerships with banks, 30 percent have partnerships with other insurance providers and 22 percent have partnerships along with investment firms. Partnerships with insurance portals provide comparative quoting capabilities and could generate business.
Put Tools in Spot to Keep Learning
E-consumer is a shifting target. Investor should always say that they're still playing and always capturing information from all their channels. They must focus on organizations, used third-party assessments and have hired interface specialists. "The process is iterative: You simply keep learning. " [5]
4. NATIONAL INFRASTRUCTURE INTEGRATIONIn this web enabled world, clients rule. The ability to offer mass customization has turned into a practical reality. To rapidly meet these types of requirements, time to deployment of brand new or enhanced application is shrinking significantly. These applications must be built to be simple to use, nimble, open, extensible, and available across all platforms and each one of these demanding characteristics must be achieved from minimal cost. Replacement of legacy system application is costly so it's seen that people started to combination information from disparate sources and incorporate them for seamless information flow, the demand to communicate with a multitude of mobile devices, and the shortage of skills and knowledge which are further compounded by shrinking time-to-deployment needs. These software integration technologies lower improvement and deployment costs by doing the next:
Supplying the communication and integration code so application developers can focus on the value-added business logic;
Providing a typical platform on which to build, set up, and manage distributed applications;
Reducing the IT skills necessary to deliver difficult enterprise requirements;
Providing rapid application development tools to get rid of custom coding and simplify integration; as well as
Enabling the reuse of integration elements over many projects.
4. 1 What's needed for Integration
Requirements
Traditional requirements definition in line with the functionality desired is yielding to the definition Based on time-to-deployment and a chance to integrate future technologies. New infrastructure requirements are emerging which places more importance about the task of planning the migration road to newer technologies.
Technology selection
For the very best result the right technology should continually be picked up. Technology should be so that the integrated solution fulfill the subsequent criteria's: Extensibility and reusability, Flexibility, Effectiveness, Interoperability and breadth, Cost effectiveness, Easy maintenance, Deployment ease and efficiency, Easy administration, Industry acceptability, Enterprise integration, Technology. [1]
4. 2 Benefits of IntegrationIt may be surveyed that the end users are benefited in a variety of ways after the completion ofIntegration task. Benefits thus obtained are:
Easy and complete development platform,
Platform self-reliance,
Network-aware development and run-time platform,
Highly unified intranet, extranet and Internet,
Main administration of new software versions,
Comfortable access to enterprise IT resources,
Rich and highly functional interface component,
Simple and robust security design. [1]
5. SECURITY ISSUESSecurity is a major concern in developing E-Commerce because this has become the most important reason people hesitates to buy things online. Buying on the Net requires your charge card number and other personal information. But broadcasting your charge card number through the ether? It seems pretty dicey. So, it's a challenge for companies to create their site secure and safe so that people can fully use them. 5. 1 What does security implyWhatever environmental surroundings, paper or electronic, securing it always implies the prevention of
Destruction associated with information and
Unauthorized availability of info.
5. 2 Security issuesThe issues that confront us with regards to securing electronic transaction are therefore:
Discretion
Integrity
Availability
Authenticity/Non-reputability
Auditability
Confidentiality: Information ought to be protected from prying eyes of unauthorized inner users, external hackers and from being intercepted throughout transmission on communication networks by which makes it unintelligible to the attacker. The content should be transformed so that it is not decipherable by anyone who not know the transformation information. Integrity: On retrieval or receipt in the other end of a communication network the info should appear exactly as was saved are sent. It should be possible to create an alert on any modification, addition or deletion towards the original content. Integrity also precludes info "replay" i. e., a fresh copy from the data is generated or resent while using authorization features of the earlier genuine message. Suitable mechanisms are required to make sure end-to end message content and duplicate authentication. Availability: The information that has been stored or transmitted across communication networks ought to be available
whenever required and to what ever extent as desired within pre-established period constraints. Network errors, power outages, functional errors, application software errors, hardware problems and viruses are a few of the causes of unavailability of information. The mechanisms for implementation of counter measures to these threats can be found but are beyond the scope associated with end-to-end message security for implementing Digital Commerce. Authenticity: It should be possible any individual or object from masquerading as somebody else or object. When a message is received it will therefore be possible to verify it's indeed been sent by the person or object claiming to become the originator. Similarly, it should also be possible to ensure the message is sent to the individual or object for whom it is intended. This implies the need for reliable identification from the originator and recipient of data. Non-reputability: After sending / authorizing a note, the sender sho
uld not be in a position to, at a later date, deny getting done so. Similarly the recipient of a message shouldn't be able to deny receipt later on. It should, therefore be possible to bind message acknowledgements using their originations. Auditability; Audit data must be recorded so that all specified confidentiality and ethics requirements are met. [2]5. 3 Protection solutions
Cryptography is the most widely used way of implementing technology solution for all these security problems. It comprises encryption -- the procedure of making information unintelligible to the actual unauthorized reader and decryption - reserving encryption to create the information readable once again. Conventional cryptography runs on the secret code or key to encrypt info. The same secret key is utilized by the receiver to decrypt the info. [14]
Password is the most common mechanism employed for authenticate people. Passwords are expected to become known only by the owner. The onus is about the owner to keep the password solution.
Digital signature can be used not just to verify the authenticity of the message and also the claimed identity of the sender, but additionally to verify the message integrity. The actual recipient, however, should not be able to make use of the received digital signature to falsely "sign" messages with respect to the original sender. Here a message is encrypted using the sender's private key to generate the actual 'signature'. The message is then sent to the destination in addition to this signature. The recipient decrypts the signature while using sender's public key, and if the end result matches with the copy of the actual message received, the recipient can make sure that the message was sent by the actual claimed originator and that the message is not modified during transmission, since only the originator is within possession of the corresponding encryption crucial. It is a two key cryptosystems.
A more effective solution can be acquired by using a biometric authentication gadget, such as a fingerprint scanner, within the e-wallet.
Smart card are similar to credit cards except they have chips embedded in them. These cards may be used to store value and carry authentication info.
6. CONCLUSIONChanging market scenario puts pressure upon business persons to adapt new and smart ways of reach the pinnacle of success. New inventions are rapidly becoming a part of IT infrastructure. But to get effective feedback we want a multi functional team approach comprising business people who can correctly determine business requirements, technology requirements and achievement criteria. People can reduce the risk and time-to-deployment by thinking about the factors described above. 7. REFERENCES
Aberdeen Team, Inc. "e-Business Infrastructure Integration: Practical Methods, " An Executive White Paper, Birkenstock boston, Massachusetts 02108, USA, November 2001
Kamlesh Nited kingdom. Bajaj and Debjani Nag, "E-Commerce: The Leading edge of Business, " Tata-McGrawHill, 1999
Efraim Turban, Jae Shelter, David King, H. Michael Chung, "Electronic Commerce-A Managerial Viewpoint, " Pearson Education Asia, 2001
Ravi Kalakota as well as Andrew B. Whinston, "Frontiers of Digital Commerce, " Addison Wesley, 2001
Susmita Das, Malabika Dinda, Sudipa Batabyal, Sangeeta Mishra, "A Study on Various Facets of E-Commerce Paradigms with One Design Execution, " B. Tech. (Honours) Thesis, Haldia Start of Technology (Vidyasagar University), 2002
Simon Utes. Y. Shim, Vishnu S. Pendyala, Meera Sundaram, as well as Jerry Z. Gao, "Business to Company E-Commerce Frameworks, " Computer, IEEE Pc Society, Volume 33, Number 10, Oct 2000.
Wenli Wang, Zoltan Hidvegi, Tim D. Bailey Jr., and Andrew W. Whinston, "E-Process Design and Assurance Utilizing Model Checking, " Computer, IEEE Pc Society, Volume 33, Number 10, Oct 2000
Tim Ebringer, Peter Thorne, as well as Yuliang Zheng, "Parasitic Authentication To Safeguard Your E-Wallet, " Computer, IEEE Pc Scciety, Volume 33, Number 10, Oct 2000
Abhijit Chaudhury, Debasish Mallick, as well as H. Raghav Rao, "Web Channels within E-Commerce, " Communications of the ACM, Quantity 44, Number 1, January 2001
Ted Becker, "Rating the actual Impact of New Technologies on Democracy, " Communications from the ACM, Volume 44, Number 1, The month of january 2001
Joe Mohen and Julia Glidden, "The Situation for Internet Voting, " Communications from the ACM, Volume 44, Number 1, The month of january 2001
Deborah M. philips and hans The. von Spakovsky, "Gauging the Risks associated with Internet Elections, " Communications of the actual ACM, Volume 44, Number 1, The month of january 2001
Lance J. Hoffman and Lorrie Cranor, Visitor Editors, " Internet Voting for Open public Officials, " Communications of the ACM, Quantity 44, Number 1, January 2001
Tim S. Tanenbaum, "Computer Networks, " 3rd Edition, Prentice-Hall
Debajyoti Mukhopadhyay and Sangeeta Mishra, "How to satisfy The Challenges Of Managing E-Commerce Effectively, " Journal of the Calcutta Administration Association, Volume VII, Number 2: July 2002
Prof. Debajyoti Mukhopadhyay is Director of Internet Intelligence & Distributed Computing Research Lab (WIDiCoReL) and it is a Professor of Computer Science & It. He was a Professor at Western Bengal University of Technology affiliated architectural colleges (2001-2008). He was a Visiting Professor within the Division of Electronics & Information Engineering at Chonbuk National University within the Republic of Korea (October 2006 in order to February 2007). He has also trained at Stevens Institute of Technology, Nj (1982-1984) and at Bengal Engineering University affiliated to Calcutta University, West Bengal (1980-1981). He'd earlier worked in IT industry with regard to 16 years. During 1982-1994 and within 1999, he was in the UNITED STATES. He had worked at Bell Marketing communications Research, New Jersey, USA in it's Computing Systems and Architecture Lab. Sangeeta Mishra obtained her B. Tech. in Computer Technology & Engineering degree from Haldia Start of Technology,
India in 2002. After employed in IT industry for over two many years in India, she has moved to California and it is currently working in an IT Organization in the united states.
View this post on my blog: http://creditcard.valuegov.com/strategic-issues-for-a-successful-e-commerce/
- May 01 Tue 2012 03:33
Strategic Issues For A Successful E-Commerce
close
全站熱搜
留言列表
發表留言