Strategic Issues For A Successful E-Commerce

0
879

1. INTRODUCTION

Electronic Commerce is for the age of Information Technology, what mercantilism, the hunt for gold, and the conquest of new lands have been for the period of discovery. Like the prow of a big fishing boat, it attracts toward itself all different interests and elements of society, and it will go away findings and changes in its wake. The world’s good-sized networking via optic fibers, satellites, and wireless communication is growing a brand new international network and a new international market, wherein a maximum of the international locations must participate. It is almost sarcastically strengthening the identity of small businesses, isolated communities, and minority pastimes. They use them closer to a less steeply-priced social and monetary activity and widen their possibilities. Most importantly, it empowers small companies to compete with multinational businesses and allows clients to search the world for precisely what they want.

E-commerce is essentially the way the usage of networks (Internet) to perform all the activities involved in business control and operation: shopping for and selling services and products, era and partner search, managing opposite numbers, choosing the most convenient transportation and insurance, acting bank transactions, paying and billing, speaking with employer salespeople, picking up orders, and every other activity essential for trading.

A corporation may be able to submit a complete catalog of it is services and products on the Internet, which may be continuously updated to give new or up-to-date products, providing a massive virtual showcase for capable customers, a means to talk with customers and in that manner, adjusts it’s an offer to their requirements; while on the equal time, it’s going to get entry to virtual markets wherein it can purchase what it desires.

Through necessary systems already under improvement, one agency will connect with other groups located everywhere in the world to buy and sell, selecting the goods and services that first meet its wishes from a massive network. And it is genuine that this revolution involves us all.

2. BUSINESS-TO-BUSINESS (B2B)

B2B e-trade means agencies buying from and selling to every different online. It automates and streamlines the process of purchasing and promoting intermediate products. It presents a greater dependable updating of enterprise records. B2B makes product information available globally and updates it in real-time. Hence, the purchasing enterprise can benefit from many product facts. [3]

READ MORE :

Now, we must realize what B2B e-commerce & their concerns, Selling organizations, with advertising and marketing management attitude, are. Buying corporation: with a procurement management perspective.
Electronic middleman: A 1/3 party intermediating provider issuer (the provider’s scope may be extended to encompass the order’s success ). Deliverer: who must satisfy the JIT (Just in Time Delivery) Network platform: which includes the Internet, Intranet, and Extranet. Protocols and communiques include EDI (Electronic Data Interchange) and assessment buying, likely using software program retailers. Back-end Facts machine: in all likelihood applied using the Intranet and Enterprise Resource Planning (ERP) systems. B2B e-trade implies that each dealer and consumer is an enterprise business. It covers a huge spectrum of packages that enable a company or industry to form digital dating with their distributors, re-dealers, providers, and other partners. B2B programs will provide companies with admission to the following varieties of statistics:

Product: Specifications, fees, income history.
Customer: Sales records and forecasts.
Supplier: Product traces and lead instances, income terms, and situations.
Product technique: Capacities, commitments, product plans.
Transportation: Carries, lead times, charges.
Inventory: Inventory stages, wearing costs, locations.
Supply chain Alliance: Key contacts, companions roles, responsibilities, schedules.

E-Commerce
Competitor: Benchmarking, aggressive product offering, market percentage.
Sales and advertising: Point of income (POS), promotions.
Supply chain process and performance: Process descriptions, overall performance measures, nice, shipping time, and purchaser satisfaction.

2.1 How to get a satisfactory

People always want to get the best shot in existence. To supply a legitimate return for your funding, you must upload on-time delivery and flavor of a few strategies. This approach should include marketing, channel control, stable Technology, strategic companions, and excellent merchandise. Let us have a glance at each of them.

2.1.1 Just in Time Shipping (JIT)

In one of these cases (JIT), shipping materials and elements on time have to. Using E-Commerce, it’s far highly possible to ensure JIT deliveries. In time, shipping may be discussed through the coordinated transport provider agency and suppliers’ stock coverage. Quick shipping does now not necessarily mean JIT shipping. However, the device for brief shipping is the backbone of JIT transport. For the B2B E-Commerce environment, the development confirmation of the agreement degree’s shipping date is crucial. [5][15]

2.1.2 Add techniques to your commercial enterprise

2.1.2.1 Direct Marketing

In a typical business employer, shopping for decisions, especially for merchandise over some thousand bucks, is made through individual institutions. As a result, direct marketers want to extend their packages to exclusive functional regions and possibly even specific stages inside a purposeful vicinity. Multiple shoppers and influences in any enterprise play a role in the shopping for decisions. You might also recognize your primary target with reasonable reality, but a secondary goal can be as important to reach. You might also reach commercial enterprise consumers and influencers in three fundamental control areas (functional control, monetary control, and widespread management) and do it at the center of upper managerial and technical stages. Corporations want an accurate E-mail list, which they could broaden by viewing agencies’ Websites and reviewing annual reports and other public files.

2.1.2.2 Relationship Marketing

Business shoppers are not constantly prepared to shop for products or services when ready to sell them. Factors you can not manage, together with the corporations’ budgeting manner, the need for added approvals, or buying methods, might also have an instantaneous effect on buying plans. There can be an informal interest in the product; however, it is no longer an immediate want. The clever B2B direct marketer compensates for this uncertainty by ensuring that the software of everyday, ongoing communications (often called continuity software) is periodically in front of potentialities. This can be done through direct E-mail and by placing the statistics online.

2.1.2.Three Internet Marketing

Several capacity marketing techniques can be utilized in B2B E-Commerce advertising. These strategies may be classified into the following five classes:

Generating and qualifying leads with the Internet.
Using Internet activities to promote services and products.
Executing immediate achievement on the Internet.
Generating orders through the Internet.
Enhancing patron dating with the Internet.
2.1.2.4 Channel Management

The first element is coherent advertising or channel control. The actual check of a hit E-Commerce implementation is how properly it exploits the Internet to reach, capture, and retain the right customers. Choosing which products and services can be supplied through which channel is also essential. E-commerce runs throughout multiple sales channels with direct, oblique, and E-marketplaces. The desire to choose which marketplaces to use as income channels is a vital selection.

In addition to marketplaces, using oblique sales channels is an area for explosive income opportunities. Enabling your selling companions to host your catalog, stock, and fulfillment databases on their systems can create a performance that grows their enterprise and yours. You also can keep your direct one-to-one trading dating with long-term strategic carriers by “E-permitting” the complete business manner from the preliminary request for quote via order success to automated billing and price. These channels create a state of affairs wherein the E-Commerce sell-side platform should transact across multi-channel selling strategies –which brings us to the next detail of your design: Technology.

2.1.2.Five Technology

Industry general gear often allows a vendor to construct and manipulate product catalogs and content as soon as possible and use them during multi-channel promoting conduits. Evolving equipment and abilties help you develop patron-friendly websites and win repeat clients by constructing consumer loyalty. The front desk for e-trade enabling is crucial to B2B success, connecting your new internet systems with your present systems. The 24*7 online marketplace manner your E-business must always be to be had. IT infrastructure should offer greater performance, reliability, safety, and process integration than bricks-and-mortar surroundings. The mainframe website hosting the databases and ERP (Enterprise Resource Planning) structures running the management systems should be seamlessly incorporated with the e-trade engine to offer the quality that carrier clients expect and realize the cost efficiencies B2B E-Commerce can offer. Choosing a flexible E-Commerce platform and a device integrator skilled in the complete business system is a need for achievement.

2.1.2.6 Partners

Like selecting the Internet as an income channel, it’s also critical to pick the proper companions, including an integration companion skilled in assisting in moving in advance swiftly throughout the entire e-commerce enterprise procedure. We have to be given that any pass to E-Commerce is not about incremental improvement, as an alternative essential redecorate of the key enterprise approaches.

2.1.2.7 Products

With the presence on the Internet, we will correctly and efficaciously transact enterprise with our customers 24*7. But so can our competition. Survival and success in E-Commerce entail more than certainly building a storefront to promote online. [5]

3. BUSINESS-TO-CONSUMER (B2C)

While the period E-Commerce refers to all online transactions, B2C stands for “Business-to-Consumer.” It applies to any enterprise or company that sells its products or services to clients over the Internet for their use.

In the late 90s, dotcoms- speedily gaining in size and market capitalization- posed a danger to standard brick-and-mortar companies. In many methods, these dotcoms seemed to be rewriting the enterprise’s guidelines — they had the customers without the costs of maintaining bodily shops, little stock, limitless admission to capital, and little problem with real profits. The idea was to get big rapid and worry about earnings later. And a popular thought robotically comes into our reviews: ” Learn to swim while the tide is out. Learn from the kinds of clients that can be accessible now. It is a small market- play with it, learn how to price business in this market, and discover ways to examine hazards. If you could do it well, the stakes increase, and you will succeed where others may not.”

3.1 What are the important demanding situations of B2C e-trade

Getting browsers to shop for matters — Your E-Commerce site can not stay on visitors on my own. Getting visitors to the website is the simplest half of the battle. Whether they buy something is what determines if they win. Some approaches to enhance the B2C conversion fee encompass improving navigation, simplifying the checkout process (along with one-step checkout and easily changed passwords), and sending out e-mails with unique gives. Building consumer loyalty- With so many websites obtainable, how will you construct a robust relationship with customers? Here are some pointers:

Focus on personalization: A big range of software packages are to be had to assist e-trade websites in creating specific boutiques that concentrate on particular customers. Create a smooth-to-use customer service utility. Providing just an electronic mail can be frustrating to customers with questions. Live chat or a minimum of a cellphone range will help. Focus on making your website online clean to apply.

Successful

Fulfillment — E-commerce has expanded the focal point on patron delight and transport fulfillment. Companies should enhance their logistical structures to ensure on-time transport. Providing instant gratification for clients still isn’t always clean. However, successful B2C E-Commerce operations find that success complications can be eased with accelerated awareness and investment in supply chain and logistical Technology. [5]

3.2 Six Keys to B2C E-Commerce Achievement

So, what does it genuinely take to capture the E-customer and generate online insurance income? Based on Insurance & Technology’s interviews with both early adopters and enterprise analysts, there appear to be six key fulfillment factors:

Strategic Goals Assessment/Customer Needs Assessment What are your dreams as a business enterprise? Who are your customers? What are their desires? These may also sound like fundamental questions, but each insurer and analyst emphasizes that an employer’s Web presence should replicate this fact.

Create a Usable, Targeted, and Sticky Web Site. Usability and placement overall performance are some of the key elements insurers want to keep in mind when growing their B2C E-Commerce strategies. Insurers also want to be privy to all in their numerous constituencies while growing B2C initiatives. The Web can reach multiple audiences, and none should be neglected. A suitable Web website will communicate with clients and commercial enterprise companions, dealers, suppliers, and companies. Stickiness, or the achievement of a Web site attracting and maintaining new and returning traffic, is another achievement factor. Turning the website into a greater data portal with real-time news feeds and keeping content updated and synchronized will help preserve customers coming back.

Integration The Internet is not a stand-by platform or medium. It should be integrated with lower back-give-up legacy structures, agent structures, call centers, advertising projects, pricing, and underwriting structures to be an effective provider and distribution channel. The Internet is another purchaser relationship channel, and integration with additional customer service capabilities is a variety of precedence.

Innovate with Web Applications and Real-Time Transactions B2C online packages vary from the exceedingly fundamental, updating policy facts to the complicated, including comparative rate quoting and digital claims submission. Regardless of the unique capabilities an employer plans to feature on its website online, they have to serve the E-purchaser’s wishes. In this manner, net sites ought to have interactivity and instantaneous gratification.

Partnerships Although insurers need to be selective in initiating online partnerships, such agreements can increase market attain and upload functions in a rather low-fee way. According to a current Gartner Group look, 46 percent of coverage companies live on the Web have partnerships with banks, 30 percent with other insurance organizations, and 22 percent with investment firms. Partnerships with insurance portals offer comparative quoting skills and can generate commercial enterprise.
Putting Tools in Place To Keep Learning E-patron is a transferring goal. Investors should continually say they’re still playing and constantly shooting records from their channels. They need to focus on organizations, use third-birthday party checks, and employ consumer interface specialists. “The process is iterative: You simply hold studying.” [5]

4. INFRASTRUCTURE INTEGRATION

In this net-enabled international, customers rule. The capability to offer mass customization has emerged as a real fact. To unexpectedly meet these necessities, the time to deployment of recent or enhanced software is shrinking dramatically. These programs must be constructed to be smooth to apply, elegant, open, extensible, and to be had across all platforms. This kind of stressful characteristic must be finished at a minimum price.

Replacement of legacy device applications is luxurious, so it is visible that people started to aggregate facts from disparate assets and combine them with seamless records glide, the demand to talk with an extensive form of cellular gadgets, and the absence of skills and know-how that are further compounded with the aid of shrinking time-to-deployment necessities. These software program integration technologies lower development and deployment expenses by doing the following:

Supplying the communique and integration code so software builders can focus on the fee-added commercial enterprise logic; Providing a standard platform on which to build, set up, and control dispensed packages;
Reducing the IT skills required to supply tough company requirements, Providing rapid application development equipment to cast off custom coding and simplify integration, and Enabling the reuse of integration additives over many tasks.

4.1 What is Needed for Integration

Requirements Traditional necessities definition based totally on the functionality preferred yields a definition based on time-to-deployment and the capability to combine destiny technology. New infrastructure necessities are rising, which places extra importance on planning the migration course to newer technologies.
Technology selection For the first-class result, the proper Technology should usually be picked up. Technology needs to be such that the incorporated solution fulfills the following criteria: Extensibility and reusability, Flexibility, Efficiency, Interoperability and breadth, Cost-effectiveness, Ease of renovation, Deployment ease and efficiency, Ease of management, Industry acceptability, Enterprise integration, Technological innovation. [1]
4.2 Benefits of Integration

It has been surveyed that the end customers benefited from various approaches after the crowning glory of

Integration assignment. Benefits hence acquired are:

Simple and entire development platform,
Platform independence,
Network-aware development and run-time platform,
Technologically unified intranet, extranet, and Internet,
Central administration of recent software versions,
Easy get right of entry to organization IT resources,
It is a rich and exceedingly useful consumer interface thing,
Simple and strong safety version. [1]
5. SECURITY ISSUES

Security is a prime difficulty in developing E-Commerce because this might be the most crucial. After all, humans hesitate to buy matters on the Net. Buying at the Net calls for your credit card’s wide variety and other private facts. But broadcasting your credit score card wide variety through the ether? It sounds pretty dicey. So, a company’s mission is to make its web page relaxed and safe so that human beings can fully rely on it.

5.1 What does security imply

Whatever the environment, paper or digital, securing it necessarily implies the prevention of

Destruction of information and
Unauthorized availability of data.
Five.2 Security problems

The issues that confront us about securing electronic transactions are consequently:

Confidentiality
Integrity
Availability
Authenticity/Non-reputability
Auditability
Confidentiality:
Information should be protected from unauthorized internal customers’ prying eyes and outside hackers and intercepted throughout transmission on communique networks, making it unintelligible to the attacker. The content has to be converted in one way that it isn’t decipherable by absolutely everyone who does not understand the transformation information.

Integrity:

On retrieval or receipt at the opposite stop of a verbal exchange network, the information has to seem exactly as it became saved or despatched. It must be possible to generate an alert on any amendment, addition, or deletion to the original content. Integrity also precludes statistics “replay,” i.e., a sparkling replica of the information is generated or resent using the earlier proper message’s authorization functions. Suitable mechanisms are required to ensure quit-to-end message content material and copy authentication.

Availability:

The facts stored or transmitted throughout verbal exchange networks should be available on every occasion required and in any quantity, as favored inside pre-set-up time constraints. Network errors, strength outages, operational mistakes, utility software program errors, hardware troubles, and viruses are some of the reasons for the unavailability of statistics. The mechanisms for implementing countermeasures to those threats are to be had; however, they are beyond the scope of cease-to-cease message safety for implementing Electronic Commerce.

Authenticity:

Any character or object masquerading as a few different men or women or items has to be feasible. When a message is obtained, it should be possible to verify it has certainly been sent via the character or object claiming to be the originator. Similarly, it should also be possible to ensure that the message is sent to the individual or entity for whom it is supposed. This implies the want for the dependable identity of the originator and recipient of facts.

Non-reputability:

After sending/authorizing a message, the sender ought not to be able to deny having accomplished so at a later date. Similarly, the recipient of a message needs to be unable to restrain receipt at a later date. It must, therefore, be feasible to bind message acknowledgments with their originations.

Auditability;

Audit facts should be recorded to meet each special confidentiality and integrity necessity.[2]

5.3 Security answers

Cryptography is the most widely used method for implementing generation solutions for the above-noted protection issues. It contains encryption- creating information unintelligible to the unauthorized reader and decrypting – booking encryption to make the statistics readable repeatedly. Conventional cryptography makes use of a mystery code or key to encrypt information. The receiver utilizes the same mystery secret to decrypt the data.[14]

Password is the most commonplace mechanism used to authenticate humans. Passwords are anticipated to be known only with the aid of the owner. The onus is on the owner to hold the password secret. The digital signature may be used now to affirm the authenticity of the message and the sender’s claimed identity and verify the message’s integrity. However, the recipient must no longer be capable of using the obtained virtual signature to falsely “sign” letters on behalf of the authentic sender. A message is encrypted with the sender’s private key to generate the ‘signature.’ The message is then sent to the vacation spot alongside this signature. The recipient decrypts the signature to use the sender’s public key. Suppose the result suits the replica of the message acquired. In that case, the recipient can be sure that the claimed originator despatched the news and that the message has not been changed during transmission when you consider that only the originator owns the corresponding encryption key. It is a key cryptosystem.
A more effective solution can be acquired using a biometric authentication device in the e-wallet, including a fingerprint scanner.

Smart cards are similar to credit score cards, except they have embedded chips. These cards may be used to save the value and convey authentication records.

6. CONCLUSION

The changing market scenario stresses enterprise humans to evolve new and clever strategies to reach the fulfillment pinnacle. Innovations are hastily turning into a part of IT infrastructure. But to get powerful remarks, we need an all-in-one team technique consisting of business folks who can correctly perceive enterprise necessities, technology necessities, and fulfillment standards. People can lessen the hazard and time-to-deployment by considering the elements described above.

7. REFERENCES

Aberdeen Group, Inc. “e-Business Infrastructure Integration: Practical Approaches,” An Executive White Paper, Boston, Massachusetts 02108, USA, November 2001 Kamlesh K. Bajaj and Debjani Nag, “E-Commerce: The Cutting Edge of Business,” Tata-McGraw-Hill, 1999 Efraim Turban, Jae Lee, David King, H. Michael Chung, “Electronic Commerce-A Managerial Perspective,” Pearson Education Asia, 2001 Ravi Kalakota and Andrew B. Whinston, “Frontiers of Electronic Commerce,” Addison Wesley, 2001

Susmita Das, Malabika Dinda, Sudipa Batabyal, Sangeeta Mishra, “A Study on Various Aspects of E-Commerce Paradigms with One Design Implementation,” B.Tech.(Honours) Thesis, Haldia Institute of Technology (Vidyasagar University), 2002 Simon S. Y. Shim, Vishnu S. Pendyala, Meera Sundaram, and Jerry Z. Gao, “Business to Business E-Commerce Frameworks,” Computer, IEEE Computer Society, Volume 33, Number 10, October 2000.
Wenli Wang, Zoltan Hidvegi, Andrew D. Bailey Jr., and Andrew B. Whinston, “E-Process Design and Assurance Using Model Checking,” Computer, IEEE Computer Society, Volume 33, Number 10, October 2000

Tim Ebringer, Peter Thorne, and Yuliang Zheng, “Parasitic Authentication To Protect Your E-Wallet,” Computer, IEEE Computer Scciety, Volume 33, Number 10, October 2000 Abhijit Chaudhury, Debasish Mallick, and H. Raghav Rao, “Web Channels in E-Commerce,” Communications of the ACM, Volume forty-four, Number 1, January 2001
Ted Becker, “Rating the Impact of New Technologies on Democracy,” Communications of the ACM, Volume forty-four, Number 1, January 2001

Joe Mohen and Julia Glidden, “The Case for Internet Voting,” Communications of the ACM, Volume forty-four, Number 1, January 2001 Deborah M. Philips and Hans A. Von Spakovsky, “Gauging the Risks of Internet Elections,” Communications of the ACM, Volume forty-four, Number 1, January 2001 Lance J. Hoffman and Lorrie Cranor, Guest Editors, ” Internet Voting for Public Officials,” Communications of the ACM, Volume forty-four, Number 1, January 2001

Andrew S. Tanenbaum, “Computer Networks,” Third Edition, Prentice-Hall

Debajyoti Mukhopadhyay and Sangeeta Mishra, “How to Meet The Challenges Of Managing E-Commerce Successfully,” Journal of the Calcutta Management Association, Volume VII, Number 2: August 2002
Prof. Debajyoti Mukhopadhyay is the Director of the Web Intelligence & Distributed Computing Research Lab (WIDiCoReL) ‘s Professor of Computer Science and Information Technology. He became a Professor at West Bengal University of Technology affiliated engineering colleges (2001-2008). He became a Visiting Professor in the Division of Electronics & Information Engineering at Chonbuk National University in Korea (October 2006 to February 2007). He has also taught at Stevens Institute of Technology, New Jersey (1982-1984) and Bengal Engineering College affiliated to Calcutta University, West Bengal (1980-1981). He had worked in an IT enterprise for sixteen years. During 1982-1994 and in 1999, he became in the USA. He had labored at Bell Communications Research, New Jersey, USA, in its Computing Systems and Architecture Lab. Sangeeta Mishra received her B.Tech. I have a Computer Science & Engineering diploma from the Haldia Institute of Technology, India, in 2002. After running an IT enterprise in India for over a few years, she moved to California and ran an IT organization in the USA.