Professional Documents
Culture Documents
Prof.
David Jyoti P.E-Business
Chaffey, Das & E-Commerce Management, 5th Edition, © Marketing Insights Limited 2012
Slide 3.2
• How can trust and privacy be assured for the customer while seeking to
achieve marketing objectives of customer acquisition and retention?
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.3
Every organization is a part of the business environment, within which it operates. No entity
can function in isolation because there are many factors that closely or distantly surrounds
the business, which is known as a business environment.
The general environment within the economy that influences the working, performance,
decision making and strategy of all business groups at the same time is known as Macro
Environment. It is dynamic in nature. Therefore, it keeps on changing.
It constitutes those outside forces that are not under the control of the firm but have a powerful
impact on the firm’s functioning.
That is why, it is also termed as an external environment which consists of individuals, groups,
organizations, agencies and others with which the firm deals during the course of its business.
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.5
Micro-environment
David Chaffey, E-Business & E-Commerce Management, 5 th Edition, © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.6
Macro-environment
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.7
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.8
PESTLE analysis
• The study of macro environment is
performed through PESTLE analysis.
PESTLE stands for the variables that exist in
the environment
• Population & Demographic,
• Economic,
• Socio-Cultural,
• Technological,
• Legal & Political,
• Environmental
• These variables consider both economic
and non-economic factors like
• social concerns;
• government policies and political
stability;
• population size, ethnic mix, and
family structure;
• Inflation and GDP aspects,
• Income distribution,
• taxes, and duties, etc.
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.9
Social
Legal
Economic
Political
Technological
Environment
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.10
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.11
Wave of change
An indication of the challenge of assessing the macro-environment factors is presented in
the figure. This figure of the ‘waves of change’ shows how fluctuations in the characteristics
of different aspects of the environment vary at different rates through time. An organization
has to constantly scan the environment and assess which changes are relevant to their
sphere of influence
The social and cultural impacts of the Internet is important from an e-business
JAN
2020 perspective since they govern demand for Internet services and propensity to
purchase online.
SOURCES: ITU; GLOBALWEBIN DEX; GSMA INTELLIGENCE; EUROSTAT; SOCIAL MEDIA PLATFORMS’ SELF-SERVICE ADVERTISING TOOLS; LOCAL GOVERNMENT
BODIES AND REGULATORY AUTHORITIES; APJII; UNITED NATIONS (ALL LATEST AVAILABLE DATA IN JANUARY 2020). TIME SPENT DATA FROM GLOBALWEBIN DEX
(Q3 2019), BASED ON A BROAD SURVEY OF INTERNET USERS
G
l
th
David Chaffey, E-Business & E-Commerce Management, 5 Edition, © Marketing Insights Limited 2012
Prof. Jyoti P. Das o
Slide 3.13
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.14
3. Ease of use.
• Ease of first connecting to the Internet using the ISP and the ease of using the web once
connected.
4. Security.
• The perception generated by news stories may be that if you are connected to the
Internet then your personal details and credit card details may not be secure.
• It will probably take many years for this fear to diminish as using the Internet
slowly becomes established as a standard way of purchasing goods.
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.15
• Lack of Interest– Some people are simply not compelled to use the Internet. McKinsey found that
people may not have an awareness about the myriad of information available on the Internet.
Unreliable e-commerce platforms in some parts of the world in addition to government
surveillance and censorship may also be contributing factors.
• Affordability– The largest obstacle to Internet access is the cost. Most individuals who make up
the offline population live in poverty and therefore do not have the funds to buy a computer or
pay their service providers.
• User Capability– The offline population generally cannot afford computers and tend to be digitally
illiterate. This generates a culture of distrust and misunderstanding that drives away potentials
users.
• Infrastructure– Some countries do not have the resources or have chosen to not invest in the
necessary infrastructure to provide Internet connectivity in rural areas.
These barriers to access and usage will remain and governments are concerned about social exclusion
where some sectors of the society have lower levels of access and opportunity
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.16
To fully understand online customer propensity to use online service we need to consider
the user’s access location, access device and ‘webographics’, which can help target
certain types of customers and are an important constraint on site design. Webographics
includes:
• Usage location (in most countries, users access either from home or from work, with
home being the more popular choice)
• Access device (browser and computer platform including mobile devices)
• Connection speed – broadband versus dial-up connections
• ISP
• Experience level
• Usage type
• Usage level
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.17
JAN
THEAVERAGE AMOUNT OF TIME EACH DAYTHATINTERNET USERSAGED 16 TO 64* SPEND WITH DIFFERENTKINDS OF MEDIA AND DEVICES
2020
global global
web web
inde inde
x x
SOURCE: GLOBALWEBINDEX (Q3 2019). FIGURES REPRESENT THE FINDINGS OF A BROAD SURVEY OF INTERNET USERS AGED 16 TO 64. SEE GLOBALWEBINDEX.COM FOR MORE DETAILS.
*NOTES: TELEVISION TIME INCLUDES BROADCAST (LINEAR) TELEVISION AND CONTENT DELIVERED VIA STREAMING AND VIDEO-ON-DEMAND SERVICES. USE
OF DIFFERENT DEVICES AND CONSUMPTION OF DIFFERENT MEDIA MAY OCCUR CONCURRENTLY.
David Chaffey, E-Business & E-Commerce Management, 5 th Edition, © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.18
JAN
2020
zzzzzzzzzzzzzzzzzzzzzzzz
zzzz
David Chaffey, E-Business & E-Commerce Management, 5 th Edition, © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.19
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.20
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.21
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.22
There is now less difference between the products than there was two or three years ago.
% of online shoppers w ho
46%
online marketing is to support research, 42% 41%
38% 38%
while for other standardized products 27% 27% 25%
22% 19%
like books and CDs there will be a dual 15% 15% 14% 14% 14%
role for the web in supporting research
and enabling purchase.
David Chaffey, E-Business & E-Commerce Management, 5 th Edition, © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.23
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.24
1. Data protection and privacy law • Collection, storage, usage and deletion of personal information directly through data capture on forms
and indirectly through tracking behaviour through w eb analytics
• E-mail marketing and SMS mobile marketing
• Use of viral marketing to encourage transmission of marketing messages betw een consumers
• Use of cookies and other techniques for personalizing content and tracking on-site
• Use of cookies for tracking betw een sites, for example for advertising netw orks
• Use of digital assets installed on a user’s PC for marketing purposes,
e.g. toolbars or other dow nloadable utilities sometimes referred to as ‘malw are’
2. Disability and discrimination law • Accessibility of content such as images for the visually impaired w ithin different digital environments:
• Web site
• E-mail marketing
• Mobile marketing
• IPTV
• Accessibility affecting other forms of disability including hearing difficulties and motor impairment
3. Brand and trademark protection • Use of trademarks and brand names w ithin:
• Domain names
• Content on site (for search engine optimization)
• Paid search advertising campaigns (e.g. Google AdWords)
• Representation of a brand on third-party sites including partners, publishers and social netw orks
• Defamation of employees
4. Intellectual property rights • Protection of digital assets such as text content, images, audio and sounds through digital rights
management (DRM)
David Chaffey, E-Business & E-Commerce Management, 5 th Edition, © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.25
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.26
Privacy legislation
Privacy is to a moral right of individuals to avoid intrusion into their personal affairs by
third parties. Privacy of personal data such as our identities, likes and dislikes is a major
concern to consumers, particularly with the dramatic increase in identity theft. This is
clearly a major concern for many consumers when using e-business services since they
believe their privacy and identity may be compromised.
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.27
Although there is much natural concern amongst consumers about their online privacy,
information about these consumers is very useful to marketers. Through understanding
their customers’ needs, characteristics and behaviours it is possible to create more
personalized, targeted communications such as e-mails and web-based personalization
about related products and offers which help increases sales
Effective e-business requires a delicate balance to be struck between the benefits the
individual customer will gain to their online experience through providing personal
information and the amount and type of information that they are prepared for
companies to hold about them.
The main information types used by the e-marketer/retailer which are governed by
ethics and legislation are:
• Contact information.
• Profile information.
• Platform usage information.
• Behavioral information (on a single site).
• Behavioral information (across multiple sites)
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.28
1. Contact information: name, postal address, e-mail address and, for B2B companies,
web site address.
2. Profile information: information about a customer’s characteristics that can be used
for segmentation. They include age, sex and social group for consumers, and company
characteristics and individual role for business customers.
3. Platform usage information: Through web analytics systems it is possible to collect
information on type of computer, browser and screen resolution used by site users.
Many Internet users will not realize that their visits are tracked on virtually all sites,
but the important point to know is that it is not possible to identify an individual
unless they have agreed to give information through a web form.
4. Behavioral information (on a single site): This is purchase history, but also includes the
whole buying process. Web analytics can be used to assess the web and e-mail content
accessed by individuals.
5. Behavioral information (across multiple sites): This can potentially show how a user
accesses multiple sites and responds to ads across sites. Typically these data are
collected and used using an anonymous profile based on cookie or IP addresses which is
not related to an individual.
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.29
5. Behavioural information across multiple sites • Third-party cookies used for assessing visits from
know they were being tracked if different sources such as online advertising netw orks or
they have cookie monitoring •
affiliate netw orks (Chapter 9)
Search engines such as Google use cookies to track
software installed or if they seek advertising through its AdWords pay-per-click programme
• Services such as Hitw ise (www.hitwise.com) monitor IP
out the privacy statement of a traffic to assess site usage of customer groups w ithin a
product category
publisher which offers
advertising.
David Chaffey, E-Business & E-Commerce Management, 5 th Edition, © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.30
Ethical issues concerned with personal information ownership have been categorized in
four areas:
• Privacy – what information is held about the individual?
• Accuracy – is it correct?
• Property – who owns it and how can ownership be transferred?
• Accessibility – who is allowed to access this information, and under which conditions?
An alternative perspective, raising these issues of concern for both the individual and
the marketer:
• Transparency – who is collecting what information and how do they disclose the collection of
data and how it will be used?
• Security – how is information protected once it has been collected by a company?
• Liability – who is responsible if data are abused?
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.31
The General Data Protection Regulation (GDRP) -EU is the toughest privacy and security law
in the world The regulation was put into effect on May 25, 2018 . Though it was drafted and
passed by the European Union (EU), it imposes obligations onto organizations anywhere, so
long as they target or collect data related to people in the EU.
Data Protection principles: If you process data, you have to do so according to seven
protection and accountability principles
• Lawfulness, fairness and transparency — processing
must be lawful, fair, and transparent to the data subject.
• Purpose limitation — must process data for the
legitimate purposes specified explicitly to the data
subject when you collected it.
• Data minimization — collect and process only as much
data as absolutely necessary for the purposes specified.
• Accuracy — keep personal data accurate and up to date.
• Storage limitation — store personally identifying data
for as long as necessary for the specified purpose.
• Integrity and confidentiality — processing must be done
in such a way as to ensure appropriate security, integrity,
and confidentiality (e.g. by using encryption).
• Accountability — The data controller is responsible for
being able to demonstrate GDPR compliance with all of
these principles
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.32
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.33
GDRP-EU lists the instances in which it’s legal to process person data.
1. The data subject has given specific, unambiguous consent to process the data. (e.g. They’ve
opted in to your marketing email list.)
2. Processing is necessary to execute or to prepare to enter into a contract to which the data
subject is a party. (e.g. You need to do a background check before leasing property to a
prospective tenant.)
3. Need to process it to comply with a legal obligation of yours. (e.g. You receive an order from the
court in your jurisdiction.)
4. Need to process the data to save somebody’s life.
5. Processing is necessary to perform a task in the public interest or to carry out some official
function.
6. You have a legitimate interest to process someone’s personal data. This is the most flexible
lawful basis, though the “fundamental rights and freedoms of the data subject” always override
your interests, especially if it’s a child’s data.
Don’t even think about touching somebody’s personal data — don’t collect it, don’t store it, don’t sell it to
advertisers — unless you can justify it with one of the above:
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.34
There are strict new rules about what constitute consent from a data subject to
process their information
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.35
The Indian government looks set to legislate a Personal Data Protection Bill (DPB), which
would control the collection, processing, storage, usage, transfer, protection, and
disclosure of personal data of Indian residents
India has followed the EU’s General Data Protection Regulation (GDPR) in allowing global
digital companies to conduct business under certain conditions, instead of following the
isolationist framework of Chinese regulation that prevents global players like Facebook
and Google from operating within its borders.
Indian Personal Data Protection Bill (DPB) carries additional provisions beyond the EU
regulation. Because India is a nation state, it would treat the data generated by its citizens
as a national asset, store and guard it within national boundaries, and reserve the right to
use that data to safeguard its defense and strategic interests.
There are a number of features of the DPB that will require companies to change their
business models, practices, and principles. Many others will add operational costs and
complexity.
These issues serve as a primer for what businesses need to keep in mind about India’s new
regulation. Understanding these issues will help digital companies plan ahead, address
future regulations, and decide whether to enter or exit certain markets
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.36
Privacy as a fundamental right: In 2017, the Supreme Court of India ruled that privacy is a constitutional
right of Indian citizens. DPB intends to protect and safeguard citizen’s privacy rights by controlling the
collection, security, storage, sale, and exploitation of these data.
User consent: DPB requires that a digital company must obtain explicit permission from a user before
collecting their personal data. In doing so, it must explain the extent and the purpose of data collection.
Explicit permission must also be obtained at each stage of subsequent data processing.
Raw data could also be transferred to a third-party data processor for analysis, creating new
information in conjunction with the data received from other data collectors. Digital companies now
become “data fiduciaries” as defined in the DPB, instead of being mere data collectors, when they
assume responsibility for obtaining user permission for both initial collection and subsequent
processing of user data
Ownership of personal data: DPB proposes that the data provider is the owner of their own personal
data. Just like a property owner can ask for return of their property. Companies in the digital world
would have to figure out how to comply with this requirement when the user demands erasure or recall
of their personal data from a digital company.
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.37
All sensitive and critical data must be stored in servers located in India. Sensitive data may be processed
outside but must be brought back to India for storage. Critical data cannot be taken out of the country
at all. There are no restrictions for general data.
Data sovereignty: DPB reserves the right to access the locally stored data to protect national interests.
This implies that DPB would treat citizens’ data as a national asset, no different than control over
citizens’ physical properties.
National interests: While placing a large emphasis on citizens’ privacy, DPB disregards privacy rights in
certain cases. It states: “All or any of the provisions of this Act shall not apply to any agency of the
Government in respect of processing of such personal data…” Public sector entities of the government
of India will not require individuals’ consent to obtain their personal data when responding to the
security of the state, detection of any unlawful activity or fraud, and epidemic and medical
emergencies.
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.38
Verification tag: DPB requires that all digital companies must identify their users and tag them into
three categories to reduce trolling:
• Users who have verified their registration and display real names;
• users who have a verified registration but have kept their names anonymous;
• and users that have not verified registration.
This would be a first regulation of its kind in global social media. This implies that digital companies
must put in place procedures for collecting and verifying the real identities of their users.
Compliance and enforcement: DPB proposes steep penalties for noncompliance. In case of a data
breach or inaction by the fiduciary upon data breach or a minor violation, the penalties could reach $
700,000 or 2% of a company’s global revenues, whichever is higher. For major violations, such as data
shared without consent, the penalties would double.
Other issues: The DPB applies to all businesses that collect personal data, not just digital businesses.
For example John Deere and processes data obtaines from its farm equipment. Whether DPB applies
to tractors with sensors, whether the collected data belongs to the farmers, and how the benefits of
farm data are shared becomes a debatable point.
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.39
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.40
A comprehensive framework
for assessing an ‘e-economy’
has been developed by Booz
Allen Hamilton .
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.41
Impact of globalization
Globalization refers to the move towards international trading in a single global market-
place and also to blurring of social and cultural differences between countries. Some
perceive it as ‘Westernization’ or even ‘Americanization’
Electronic communications gives the opportunity for increasing the reach of the company
to achieve sales around the world.
Organizations that wish to compete in the global marketplace must have:
• a 24-hour order taking and customer service response capability;
• regulatory and customs-handling experience to ship internationally;
• in-depth understanding of foreign marketing environments to assess the advantages of its own
products and services.
Language and cultural understanding present a problem and many organizations are
unlikely to possess the resources to develop a multi-language version of its site or employ
staff with sufficient language skills.
However, growth of the use of the Internet for business has accelerated the trend of
English becoming the lingua franca of business
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.42
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.43
For some organizations products are similar across countries and localization simply involve
providing a local-language version o the web-site.
To be effective this often needs more than translation, since different promotion concepts may
be needed for different countries.
An example of a business-to-consumer site with extensive localization is Durex and a business-
to-business site is 3M. Durex localizes content for many countries since language and the way in
which sexual issues can be discussed will vary greatly between different countries. 3M, however,
only localizes content in local language for some countries such as France, Germany and Spain.
Localization is a significant strategic issue for e-business. The decision on the level of localization
will need to be taken on a regional or country basis to prioritize different countries according
to the size of the market and the importance of having localization.
Deciding on the degree of localization is a difficult challenge for managers since while it has been
established that local preferences are significant, it is often difficult to balance localization costs against
the likely increase or conversion rate through localization.
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.44
Since the cost of localization is high it may only generate a return on investment for the
largest markets.
An evaluation framework is used to decide on the level of localization required:
• Standardized web sites (not localized). A single site serves all customer segments (domestic and
international).
• Semi-localized web sites. A single site serves all customers; however, there will be contact
information about foreign subsidiaries available for international customers. Many sites fall into this
category.
• Localized web sites. Country-specific web sites with language translation for international
customers, wherever relevant.
• Highly-localized web sites. Country-specific web sites with language translation; they also include
other localization efforts in terms of time, date, postcode, currency formats, etc. Dell
(www.dell.com) provides highly localized web sites.
• Culturally customized web sites. Web sites reflecting complete ‘immersion’ in the culture of target
customer segments; as such, targeting a particular country may mean providing multiple web sites
for that country depending on the dominant cultures present.
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.45
Changing tax laws to reflect globalization through the Internet is a problem that many
governments have grappled with.
The fear is that the Internet may cause significant reductions in tax revenues to national or
local governments if existing laws do not cover changes in purchasing patterns.
In India the government taxation revenue from domestic consumption (GST + Excise Duty)
is around 40% with revenue from import taxation around 6%. Governments are clearly
keen that this revenue is protected when purchases are made overseas outside their
jurisdiction using e-business
Government revenue is normally protected when goods are imported. While this can be
levied for physical goods imported by air and sea it is less easy to administer for services.
Tax jurisdiction determines which country gets tax income from a transaction. Under the
pre-electronic commerce system of international tax treaties, the right to tax was divided
between the country where the enterprise that receives the income is resident (‘residence
country’) and that from which the enterprise derives that income (‘source country’).
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.46
Political factors
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.47
Booz Allen Hamilton reviews approaches used by governments to encourage use of the
Internet. They identify five broad themes in policy:
• Increasing the penetration of ‘access devices’. Approaches include either home access through
Sweden’s PC Tax Reform, or in public places, as in France’s programme to develop 7,000 access
points by 2003. France also offer a tax incentive scheme, where firms can make tax-free gifts of
PCs to staff for personal use.
• Increasing skills and confidence of target groups. These may target potentially excluded groups,
as with France’s significant €150 million campaign to train the unemployed.
• Establishing ‘driving licences’ or ‘passport’ qualifications. France, Italy and the UK have schemes
which grant simple IT qualifications, particularly at low-skilled groups such as the long-term
unemployed.
• Building trust, or allaying fears. An example of this in the US is the 1998 Child Online Protection
Act which used schemes to provide ‘kitemark’-type verification, or certification of safe services.
• Direct marketing campaigns. According to the report, only the UK, with its UK Online campaign,
is marketing directly to citizens on a large scale.
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.48
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.49
Technology factors
One of the great challenges of managing e-commerce is the need to be able to assess
which new technological innovations can be applied to give competitive advantage
No one can predict the future, there are lots of examples of companies that have mis-
understood the opportunity for introduction of new technologies
When a new technology is introduced organizations face a difficult decision as to
whether to:
• ignore the use of the technique, perhaps because it is felt to be too expensive or untried, or
the manager simply doesn’t believe the benefits will outweigh the costs;
• enthusiastically adopt the technique without a detailed evaluation since the hype alone
convinces the manager that the technique should be adopted;
• evaluate the technique and then take a decision whether to adopt it according to the
Diffusion-adoption process
The diffusion–adoption process who classified organizations as innovators, early
adopters, early majority, late majority, or laggards This process can be used in two main
ways as an analytical tool to help organizations.
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.51
Technology adoption
The problem with being an early adopter is that the leading edge of using new technologies is often also
referred to as the ‘bleeding edge’ due to the risk of failure. New technologies will have bugs, may
integrate poorly with the existing systems, or the marketing benefits may simply not live up to their
promise. The reason for risk taking is that the rewards are high – if you are using a technique that your
competitors are not, then you will gain an edge on your rivals.
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.53
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das
Slide 3.54
Weekly assignment
th Edition,
David Chaffey, E-Business & E-Commerce Management, 5 © Marketing Insights Limited 2012
Prof. Jyoti P. Das