Professional Documents
Culture Documents
1. Type of market
Monopolistic
Perfect competition oligopoly monopoly
competition
Can be either
All firms sell identical Products are similar but
homogeneous or Homogeneous product
product not identic
differentiated
Dominated by a few
Large number of firms
Large number of firms firm and big enough to One seller
and are price taker
influence a market
Differentiation may
Not valuable for firms to
Price is defined by occur by advertising,
compete on price, as Price is determined by
equilibrium of supply branding, convenience
there will be no firm to earn the
and demand in the of location, product
economic profit as firm maximum profit
market quality, reputation of
will set to marginal cost
seller, etc
Demand is completely Demand is elastic, which Number of firms
elastic to price, a minor means increase in price determine the structure High elasticity means
increase in price will will result in reduction in of the market for higher monopoly power
result in zero demand demand products
Interdependence among
Product differentiation
Producers and few competitors. If one
can provide some
consumers have perfect firm tries to raise the Perfect Information
degree of price setting
information price, it will have no
power
market
Barrier to entry are high
No barriers to entry No barriers to entry and only allow presence Blocked entry
of only a few company
if the price is too high, Equilibrium is a situation
all firms have identical consumer will choose where profits are zero.
-
production function similar products from Price competition is not
other designer a suitable strategy
Topic 4
1. externality
- costs or benefits not transmitted through price.
- Costs or benefits which affects a party who did not choose to incur that costs or
benefits
2. Critical mass
- Level of adoption of a technology that generates a value for those adopting it
that is greater than or equal to the costs of adopting it.
- this is a key concept to understand competitive dynamics in digital economy and
strategic challenges that company face to successfully establish their presence in
this competitive environment
- if critical mass is not achieved, company will not be able to establish its presence
and to survive in a market that is affected by network effects
3. positive feedbacks
- once a firm generates network effects, it becomes more attractive for other
companies to develop complementary products and services that will make the
adoption of the technology even more valuable
4. lock-in
- companies must have a specific strategy to guarantee that their users or
customers do not easily migrate to other platform or substituted products
5. type of lock-in
- contractual commitments enforced by law
- durable purchases create associated with the life span of the technology
- brand specific training associated with the learning curve needed to get
acquainted with the functionality of the technology
- information and databases generate lock in as it is difficult to maintain data
quality
- specialized suppliers generate lock-ins as it is not easy to find alternatives
- loyalty programmes creates lock in as change suppliers may cause users to lose
benefits
6. path dependence
- set of decisions one faces for any given circumstances is limited by the decisions
one has made in the past
7. switching cost
- specific investments that users of technology that builds networks effects
encounter to overcome lock-in
8. transaction cost
- (Ronald coase 1937) economic equivalent of friction in physical systems. The
greater the friction, the more impeded the movement, and the higher the
transaction cost
14. Infomediaries
- Search engines are intermediaries which reduce the cost of gaining access to
and using information.
- Search engines like google, yahoo and bing are information broker
- Autobytel.com and bizrate.com offer consumer to gather information about
products & companies before they purchase
- Tripadvisor plays a role of neutral entity providing unbiased information and
reviews about specific companies
- Tmnplc.com is email broker that provide vendors with consumer information
that will help the vendor develop and market products
- Google adwords offer advertising services which are based on audience behavior
in responding to ads
Chapter 5
1. Business models
- Pure play – companies that only operates online (Amazon). Have advantage of
being able to specialize in ebusiness and focus on their online offerings
- Clicks-and-mortar – companies that operates using both channels
2. Revenue models
- Catalogue model – goods or services are sold from an electronic catalogue. It can
be customized, based on past purchased, or self-configuration of products
- Subscription model – consumers pay monthly or annual subscription for
unlimited access
- Advertising model – revenue comes from advertiser, and is popular with services
achieving high numbers of users
- Fee-for-transaction model – used by brokers such as travel agents. Fee is paid by
the vendor but is typically built into the price that buyers pays
1. Marketing
- Providing the right product, at the right price, in the right place at the right time
to the right person using the right communication for the right return
2. Customer segmentation
- Identification of different groups within target market to develop different
product offerings and communications
- Segmentation is made possible through market research, whereby companies
collect data on customers through surveys, focus group etc
4. Marketing mix
- Product, price, placement, promotion
5. Customer lifecycle
- Customer selection - types of customers to target which ties with market
segmentation
- Customer acquisition – forming relationship with new customers involves
appropriate marketing communication
- Customer conversion – value proposition development. Create appropriate site,
content, and offerings
- Customer retention and extension – strategies business employs to keep
customers from discontinuing the use of a certain product or service. Objective is
to intensify the business relationship by providing additional offerings
8. Strategic agility
- Concept associated with knowledge management theory to develop a sound
process for reviewing marketplace opportunities and threats and selecting the
appropriate
- The capability to innovate and gain competitive advantage by monitoring
changes within organization marketplace and to efficiently evaluate alternative
strategies to implement
9. Fog of the future
- Creating long-term vision are flawed as knowledge of the future is always
imperfect, and marketplace conditions are changing continuously
- Having a clear long-term vision, isn’t practical in most industries, thus company
should keep vision fuzzy but current priorities clear
- internet facilitates the new way of collecting data on customer preferences and
perceptions in much greater detail. Customer profiling allows seller to focus
their marketing effort and is widely seen as being very effective in increasing
sales
17. Main difference between online and offline marketing – individualization
- Personalization involves the individualization of content and can use different
variables to tailor content, including customers’ preferences, time or date,
upcoming events, but it is costly, and user needs to log-in
- Mass customization focuses on tailoring marketing content at the group level.
Ie. By recommending similar products according to what customers in the same
marketing
20. Main difference between online and offline marketing – independence of location
- Electronic media introduce the possibility of increasing the reach of company
communications to the global market, and opens up opportunities to sell to
international market
Chapter 7
1. B2B
- B2B e-commerce involves the sale of goods and services between businesses. It
enables an enterprise to form electronic relationship with their distributors,
suppliers and other partners
6. E-procurement
- Electronic integration and management of all procurement activities including
purchase request, authorization, ordering, delivery and payment between a
purchaser and supplier
7. Type of e-procurement
- Systematic sourcing – negotiated contracts with regular suppliers
- Spot sourcing – fulfilment of an immediate need, typically a commoditized item
8. Benefits of e-procurement
- Shortening or reduction in purchasing cycle time and cost
- Improved control over budget
- Reduction in administrative errors
- Enabling improvement in buyer’s productivity
- Driving down price through standardization of products
- Better management of information
- Greater integration of payment systems
26. EDI
- Electronic interchange of formatted data between computer applications using
agreed message standards
- Comprises of software, message standards, reliable 3rd party value added
networks, organizations
- Standardizations is important as senders and receivers of message had to be
using same formats and product codes
- Benefit of EDI is improved communication speed, uniformity, accuracy, cost
savings
- EDI facilitated global supply chain management, reduced uncertainty and
improved customer service
- Improved trading relationship, acting as a vehicle for collaboration between
trading partner
27. ERP
- Serve to integrate the various common function (accounting, production,
human resources) and data of an organization
- ERP allows an organization to manage order processing process, inventory
management, distribution management, procurement management,
production planning and demand forecasting processes
28. RFID
- Automatic identification without direct human intervention allows significantly
larger amount of data to be stored on the products (serial number, colour, size,
price) leading to better intelligence along the supply chain
- Tags increase inventory visibility for partners and improve response time to
customer demands and market trends
- Permits asset tracking, reduce shrinkage, allows partner to locate and remove
faulty goods quickly
- RFID can facilitate item-level tracking, tags are stored in each individual product
- Increase intelligence along supply chain in terms of theft detection, stock
monitoring, and product customization
1. Pricing strategies
- Different pricing strategies to maximize companies’ revenues in short and long
term, therefore companies have to position themselves in competitive
environment to respond and anticipate competitors move
2. Fixed pricing
- Does not make any discrimination against buyers, volumes of products
purchased, and time of the purchases. Every item is sold at the same price
3. Penetration pricing
- Companies exploit the potential of prices below market average to conquer a
new market. This helps customers to bear the cost of switching from existing
supplier to a new one
- Once new entrant has gained a large share, it will raise prices to avoid long term
losses (short term financial losses). This strategy needs to guarantee long term
returns and the price should be at least higher than average and marginal costs
- This is possible if products have a long lifecycle that guarantees large volumes
overtime, and companies will recover initial loss over the long terms.
- Penetration pricing can be used by companies that want to defend their position
from potential entrants
4. Loss leader
- Exploits the attractiveness of low-cost products to increase the selling of more
lucrative products
- Specific products are sold below cost to encourage the sales of other – profitable
products. Strategy works when the low-cost offers drive the consumption of
more profitable products
- This strategy is implemented by supermarkets whereas low price products
attract customers that also shop for high price products. Profits generated by
high price products cover the losses generated by products sold below cost
- Usually implemented by online websites that want to draw traffic by exceptional
offer to generate revenues from the sales of products that are not under offer.
5. Price leadership
- A party can set prices so it is very difficult for rivals to compete on price, and is
being set so that if competitors fix a price that is too high they will lose market
share, but if they set price too low, the price leader would match the price and
force smaller rival out of market
- Leader then will fix the price that every other business participating in the
market must follow. Ie. Amazon, whereas any competitors that want to compete
needs to offer products and delivery at the same level as amazon.
6. Price skimming
- Price strategy for company that have exclusive or protected access to a given set
of resources and firm will earn extra profit by setting price far above average
market and extract maximum profit.
- This follows a specific condition of protection granted by patents of copyright
which makes offered products unique.
- as there is no substitute, customers must pay the extra price. And this only
works in short term as in long term, there will always be competitors to offer
substitute products and following a penetration pricing to cannibalize the
product
8. Price lining
- Strategy used when demand is elastic at different price point and inelastic at
another point. There are different clusters of aggregate demands at different
price points.
- Companies use different versions of the same products at different prices. By
offering different configuration of the products at substantially different prices,
companies can exploit customer’s different expectations and willingness to pay
9. odd-even pricing
- common price strategy based on psychological price perception, whereas
number “1” Is more appealing to buyers and $9.99 seemed to be far cheaper
than $10
24. Crowdsourcing
- Organization seek to public to leverage wisdom of the crowd in their search for
ideas, information, and content (eg. Wikipedia)
- Crowdvoting sometimes employed by firms as input to their product
development processes
- Crowdfunding used by organization to generate investment funding for new
ventures
- Main idea is to take advantage of e-business technology to harness the ideas and
enthusiasm of the crowd to produce relevant and popular products and services
- Participation, democracy and innovation expands the boundaries to produce
new organizational form where ideally everyone benefits.
Chapter 10
Computer security layer – Securing the computer involves ensuring that machines
are installed with up-to-date anti-virus software. It can also involve the regular
backing-up of data in the case of data loss or computer failure.
Network security layer – Company intranets should be secured using appropriate
network architectures, including the use of firewalls.
Internet security layer – Encrypting data as it is sent along the public internet is a
fundamental aspect of information security. This includes the use of digital
signatures, which are a method of proving that a message is from a particular
sender and also that is has not been tampered with in transit.
The main problem is that they are easily lost and can be used by unauthorised
agents.
Anyone who gains possession of the token or ID card has the right to access the
system or facility, which creates a weakness in the authentication process.
Willison and Warkentin (2013) distinguish between external and internal threats
and between human and non- human threats.
External threats are typically emanated from hackers or rogue agents, motivated by
criminal, ideological or political desires.
Denial of service attacks – Malicious users flood a system with so many requests
(i.e. data packets) that it overloads and fails. These attacks are common, and when
a company’s site is attacked it can result in reputational harm, along with
monetary loss.
Web page hijacking – Fake copies of trusted websites are created and used to
redirect web users to malicious websites. This technique is commonly used by
spammers.
Phishing – Trying to fraudulently acquire information such as usernames,
passwords and credit card details from users by pretending to be a trustworthy
partner (such as a bank, online payment broker, helpdesk, etc.).
Botnets – Involves hijacking large numbers of computers connected to the internet,
for the purposes of creating a zombie network that can be used to send spam or
propagate viruses.
Internal threats also include human ones, in the shape of users (employees and
contractors), and non-human ones (hardware and system failures).
User threats are either malicious or unintentional and made directly through
internal machines or through personal devices or social media.
Negative organisational atmosphere, often leading to feelings of injustice or
disgruntlement among employees.
Employees may form an intention to abuse.
Organisations should focus on atmosphere, deterrence and prevention of
employee IT abuse.
16. Managing e-business security
Despite the risks of intentional employee abuse, the most frequent problems
emerge from unintentional employee behaviour leading to security breaches.
Employees writing their passwords on ‘post-it’ notes and sticking them onto their
desks or printers, carelessly giving out passwords, leaving computers unattended
and office doors open and accidentally bringing in viruses on their personal
machines or USB sticks.
Staff may be aware of the risks they individually pose but they often seem
unconcerned and usually unmotivated.
They typically dislike excessive controls and resent any interference in how they do
their jobs.
There is often a mismatch between security values and users’ values.
Many users, such as doctors, salesmen, bankers and journalists have highly stressful
jobs, where they need to focus very much on the task in hand with little regard for
‘extraneous’ security distractions