ELECTRONIC BUSINESS ENVIRONMENT. Learning objectives Identify the different elements of the e-environment that impact on an organisation’s e-business.

Slides:



Advertisements
Similar presentations
ITU Regional Seminar on E-commerce Bucharest, Romania May 2002 National E-commerce Strategies for Development Dr. Susanne Teltscher United Nations.
Advertisements

Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
E-commerce Strategies
CHAPTER 4 E-ENVIRONMENT
Slide 4.1 Dave Chaffey, E-Business and E-Commerce Management, 3 rd Edition © Marketing Insights Ltd 2007 CHAPTER 4 E-ENVIRONMENT.
OHT 4.1 © Marketing Insights Limited 2004 Chapter 4 E-environment.
E-Business Professor Linda A Macaulay
Global Information Systems
Marketing in the Internet Age
Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.1 Chapter 3 The Internet macro-environment.
Introduction to e-business and e-commerce
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Framework for Global Electronic Commerce Communications 411 Relevant Site:
E-commerce COM380 E-commerce environment Lecture 3 E-commerce environment.
E-Commerce: Regulatory, Ethical, and Social Environments
E-commerce E-commerce is defined "as the process of buying, selling, or exchanging products, services, or information via computer networks, including.
Personal Data Privacy and The Internet by Stephen Lau Privacy Commissioner for Personal Data, Hong Kong SAR at the Joint Conference of the OECD, HCOPIL,
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Attorney at the Bars of Paris and Brussels Database exploitation & Data protection Thibault Verbiest Amsterdam 1 April 2005
Operational Data Tools Chapter Eight. Copyright © Houghton Mifflin Company. All rights reserved.8–28–2 Chapter Eight Learning Objectives To learn database.
Designing and Managing Integrated Marketing Channels
Chapter 5 E-environment
2 Private versus public. 2 Lesson objectives By the end of the session, you will: understand how you might unintentionally disclose personal data; define.
Chaffey, Internet Marketing 4th Edition, © Pearson Education Limited 2009 Slide 1.1 Chapter 3 Click to add subtitle.
E-business Environment ITU Spring Figure 2.1 The environment in which e-business services are provided E-business environment.
Chapter 4 E-environment.
Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003OH 4.1 Chapter 4 Internet marketing strategy.
Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.1 Chapter 3 The Internet macro-environment.
Chapter 3 The Internet micro-environment
Chapter 1 Introduction to Internet Marketing
Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 2.1 Chapter 2 The Internet micro-environment.
Chaffey, Internet Marketing, 3 rd Edition © Pearson Education Limited 2007 Slide 2.1 Chapter 2 The Internet micro-environment.
Marketing: An Introduction Armstrong, Kotler
Chapter 12 Electronic marketing. Learning objectives 1Discuss the difference between electronic marketing and Internet marketing 2Understand how the Internet.
Social contexts of IS Ch. 3 – Boddy et al.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
Environments of LSOs. Environments is the term used to describe the context in which business is carried out. There are two main environments: Internal:
The Data Protection Act [1998]
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
ND e-commerce Carl Arrowsmith Session 14 Consumer Protection & Trust.
Slide 4.1 Dave Chaffey, E-Business and E-Commerce Management, 4 th Edition, © Marketing Insights Limited 2009 Chapter 4 E-environment.
Chapter 4 E-environment
Electronic Commerce Semester 1 Term 1 Lecture 3. Types of E-Commerce There are three distinct general classes of e-commerce: –Inter-organisational (business-to-business/B2B)
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS PLUG-IN B19 Global Information Systems.
CHAPTER 17 INTERNATIONAL MARKETING IN E-COMMERCE.
Introduction to E-commerce
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Ecommerce Applications 2007/8 E-Commerce Applications UK e-Commerce Regulations.
CHAPTER 2 The Internet micro-environment
Copyright © Houghton Mifflin Company. All rights reserved. 4–1 Chapter Outline Marketing on the Internet –Basic Characteristics of Electronic Marketing.
Data Protection Philip Reed. Introduction What is data? What is data protection? Who needs your data? Who wants your data? Who does not need your data?
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Data protection—training materials [Name and details of speaker]
Slide 2.1 David Chaffey, E-Business & E-Commerce Management, 5 th Edition, © Marketing Insights Limited 2012 Chapter 2 Marketplace Analysis for E-Commerce.
4. E-ENVIRONMENT. Slide 4.2 Dave Chaffey, E-Business and E-Commerce Management, 4 th Edition, © Marketing Insights Limited 2009 LEARNING OUTCOMES Identify.
Chapter 4 E-environment 1 1.
Introduction to E-Business
BIS 375 MASTER Leading through innovation/bis375masterdotcom.
E-Environment. Learning Outcomes Identify the different elements of an organization macro-environment that impact on an organization’s e-business and.
Slide 4.1 David Chaffey, E-Business & E-Commerce Management, 5 th Edition, © Marketing Insights Limited 2012 Chapter 4 E-Environment.
CJA 234 MART The power of possibility/cja234martdotcom BIS 375 Entire Course FOR MORE CLASSES VISIT BIS 375 Week 1 Discussion Question.
4. E-ENVIRONMENT. Slide 4.2 Dave Chaffey, E-Business and E-Commerce Management, 4 th Edition, © Marketing Insights Limited 2009 LEARNING OUTCOMES Identify.
Chapter 3 The Internet macro-environment
MGMT 452 Corporate Social Responsibility
Tour IV : e-Environment
Chapter 2 Marketplace analysis for e-commerce
Chapter 2 Marketplace analysis for e-commerce
Chapter 4 E-environment.
Chapter 2 Marketplace analysis for e-commerce
Presentation transcript:

ELECTRONIC BUSINESS ENVIRONMENT

Learning objectives Identify the different elements of the e-environment that impact on an organisation’s e-business and e-marketing strategy. Assess the impact of legal, moral and ethical constraints or opportunities on a company and devise solutions to accommodate them. Assess the role of macro-economic factors such as economics, taxation and legal constraints

Issues for managers What are the constraints placed on developing and implementing an e-business strategy by the e-environment? What factors influence the adoption of new digital media and how can we estimate future demand for online services? How can trust and privacy be assured for the customer while seeking to achieve marketing objectives of customer acquisition and retention?

Activity 4.1 List all the social, legal and ethical issues that the manager of a sell-side e- commerce web site needs to consider to avoid damaging relationships with users of his or her site or which may leave the company facing prosecution. You can base your answer on issues which may concern you, your friends or family when you access a web site.

Activity answer – this lecture Cookies – laws and consumer perception on placing these Are we limiting access to information from certain sections of society (social exclusion)? Privacy of personal information entered on a web site Sending unsolicited Replying promptly to Copyright Site content and promotional offers/adverts are in keeping with the different laws in different countries Providing text, graphics and personality in keeping with social mores of different countries

SLEPT Factors Macro-environment –Social –Legal –Economic –Political –Technological

Social Demand analysis (part of micro- environment) –Have access to the channel. –Are influenced by using the channel. –Purchase using the channel.

Popularity of online activities Figure 4.1 Popular online activities in the UK showing variation between October 2000 and October 2002 Source: Copyright © Crown copyright 2002, Crown copyright material is reproduced with the permission of the Controller of HMSO.

Internet access worldwide Figure 4.2 Percentage of global population with Internet access Source: Reprinted from CyberAtlas.com, a publication of Jupitermedia Corporation. Copyright © 2003 Jupitermedia Corporation

Internet and PC penetration Figure 4.3 Global variation in number of PCs per hundred population and percentage Internet access in 2002 Source: International Telecommunications Union

Demographics of UK population Figure 4.4 Variation in demographic characteristics of UK Internet users Source: ONS (2002)

% of employees that access Internet Figure 4.6 Average percentage of employees using the Internet at least once a month Source: DTI (2002)

% businesses who identify suppliers online Figure 4.7 Percentage of businesses that identify suppliers online Source: DTI (2002)

Ethical issues and data protection Ethical issues concerned with personal information ownership have been usefully summarised by Mason (1986) into four areas: 1.Privacy – what information is held about the individual? 2.Accuracy – is it correct? 3.Property – who owns it and how can ownership be transferred? 4.Accessibility – who is allowed to access this information, and under which conditions?

Ethics – Fletcher’s view Fletcher (2001) provides an alternative perspective, raising these issues of concern for both the individual and the marketer: – Transparency – who is collecting what information? – Security – how is information protected once collected by a company? – Liability – who is responsible if data is abused?

The eight principles for data protection Fairly and lawfully processed; processed for limited purposes; adequate, relevant and not excessive; accurate; not kept longer than necessary; processed in accordance with the data subject's rights; secure; not transferred to countries without adequate protection.

Opt-in vs opt-out Figure 4.8 (a) Opt-in online form, (b) opt-out form

Opt-in vs opt-out Figure 4.8 (c) implicit opt-in

Information flows for data protection Figure 4.9 Information flows that need to be understood for compliance with data protection legislation

TRUSTe

Legal – Sparrow’s eight areas 1.Marketing your e-commerce business 2.Forming an electronic contract 3.Making and accepting payment 4.Authenticating contracts concluded over the Internet 5. risks 6.Protecting intellectual property 7.Advertising on the Internet 8.Data protection

Economic / Political Ensuring companies competitive –Funding for education and technology: e.g. –Promoting new technology e.g. broadband 12% in UK, 70% Taiwan, South Korea Achieving government efficiencies –E-government – all UK services online by 2005 –Singapore ‘Intelligent Island’ Taxation regimes –Legislation for offshore trading

E-economy framework Figure 4.11 A framework describing the e-economy Source: Booz Allen Hamilton (2002). Copyright © Crown copyright 2002, Crown copyright material is reproduced with the permission of the Controller of HMSO.

Leaders and laggards in e-commerce Figure 4.12 Leaders and laggards in e-commerce Source: © 2003 Reproduced by permission of the Economist Intelligence Unit. E-readiness Rankings 2003

Technological issues Rate of change –Which new technologies should we adopt? Monitoring for new techniques Evaluation – are we early adopter? Re-skilling and training Are our systems secure?

Diffusion of adoption curve Figure 4.13 Diffusion–adoption curve

Personalisation at RS Components Figure 4.14 Personalization at RS Components (

Responses to change in technology Figure 4.15 Alternative responses to changes in technology