SlideShare a Scribd company logo
INTRODUCTION 351
consumers are placing their orders online, but companies still
provide toll-free numbers for those who are hesitant to provide
confidential information, such as credit card numbers, online.
Airlines were among the first providers to provide a financial
incentive to purchase online. Later, they shifted to an additional
financial cost if toll-free numbers of support personnel were
accessed to make a purchase.
Concerns about Internet security have been blown out of
proportion. Although online business transactions are not
perfectly secure, they are no riskier than ordering via telephone
or fax. Computer hackers are similar to everyday criminals who
try to find ways to circumvent security systems and procedures,
although there are some additional security issues associated
with electronic commerce. First, the Internet is an open network
without any physical barriers to prevent theft (e.g., hidden
cameras, safes, security guards). Second, the same technologies
that are being used for commerce can be used to breach security
(e.g., computer software used to search for passwords).
Several methods can be used to restrict access and improve
security in electronic commerce. First, a form of authentication
can be required through the use of some combination of account
numbers, passwords, and IP (Internet protocol) addresses.
Second, a firewall can be used to monitor traffic between an
organization's network and the Internet. This barrier can restrict
access to certain IP addresses or applications. A third method is
to use coding or encryption techniques to transform data to
protect their meaning. These security methods can be used
individually or together depending on the level of security
desired. For instance, firms that are transmitting payment
information will be more inclined to use all three levels of
defense. This next section covers four topics: the traits of a
networked economy, the definition and scope of electronic
commerce, the use of electronic marketing, and the beginning of
electronic commerce.
Authentication
Verifying the appropriate access by a user through the use of
some combination of account numbers, passwords, and IP
(Internet protocol) addresses.
Firewall
A filter is used to monitor traffic between an organization's
network and the Internet. This barrier can restrict access to
certain IP addresses, applications or content.
INTRODUCTION 349
Traits of a Networked Economy
Some people view electronic commerce as a boom-and-bust
cycle, but that is really not true. In the mid-1990s, there was a
dramatic increase in activity in the broad field of e-commerce.
Companies such as eBay, Amazon, and Expc dia provide
tangible evidence of the impact that e-commerce has had on th
business world. These companies, and hundreds like them,
created an ecc nomic boom unlike anything seen before. It
began to unravel in 2000, wit the dot-com bust." The impacts
are still being felt. Most traditional comp; nies, including those
in the hospitality and tourism industry, were forced t
Encryption
Transmitted data are scrambled to prevent unauthorized access
by
350 CHAPTER IO ELECTRONIC COMMERCE
change their business practices and business models. Online
reservations for hotels, airlines, and restaurants, online check-in
for airlines and hotels, and other forms of electronic exchanges
are now quite common. In the airline industry, these
transactions are ubiquitous.
Those who follow the evolution of electronic commerce agree
that a networked economy, based on firms that have an Internet
presence and conduct business online (at least in part), has
several important traits:2
· It creates value largely or exclusively through the gathering,
synthesizing, and distribution of information. Firms that engage
in e-commerce activities can collect significant data about their
customers. They can more easily determine consumers' likes,
dislikes, and responses to various marketing stimuli. The wealth
of data, which is readily analyzed, allows marketing managers
to make better-informed decisions.
· It formulates strategy in ways that result in a convergence of
management of the business and management of various
technologies. The management of technology is viewed not as a
separate function, but as a core business competency. The
development of e-commerce applications is viewed not as a
parallel activity, but as part of the core set of activities within
the firm.
· It allows firms to compete in real time, not in cycle time or in
asynchronous time. Historically, businesses made changes on an
intermittent basis, as a result of data about, for instance,
financial performance or guest response. With the increasing
use of technology, this lag time can be nearly eliminated. For
example, an airline can post price changes to an e-commerce
Web site and then monitor site transactions to determine within
a very short time whether the price change has resulted in the
desired change in buyer behavior.
· It operates in business environments in which there are low
barriers to entry and extremely low variable costs. This trait is
applicable to pure electronic commerce companies, but less so
to companies in the hospitality and tourism industry. Hospitality
and tourism firms have higher capital costs for buildings,
fixtures, and equipment than do firms that are pure electronic
commerce companies.
· It organizes resources around the demand side of the business
(i.e., the level of demand from potential buyers of the products
and services). Demand from potential customers is constantly
monitored to determine changes in demand. These firms then
attempt to influence demand by changing marketing variables
such as price and availability.
INTRODUCTION 349
·
· It examines relationships with customers in "screen-to-face"
interfaces in which technology is used to manage and customize
customers' experiences. In order to increase relationship-
building interactions and reduce labor costs at the same time,
technology is used to "push" customized information to the
consumer. This can take many forms, including e-mail and web
site information that is customized to match the interests and
past behavior of individual consumers.
· It uses technology-mediated methods to measure and track
customer behavior and interaction patterns. These data are then
used to customize future interaction with individual customers
and customer groups with similar buyer behavior.
Definition and Scope of Electronic Commerce
The use of digital technology has dramatically shifted the
business paradigm, both domestically and internationally.
Digital technology has created entire new industries, shifted
others, and forced managers and leaders of firms to look at their
customers, markets, and competitors in entirely new ways. The
size and scope of e-commerce has changed dramatically in the
past ten years. Numerous industry publications and research
organizations report on these trends. Among the most notable
are www.emarketer.com, www.cnet.com, and www.
forester.com. Table 10.1 provides several facts and figures that
characterize the development of the Internet within the
hospitality and tourism industry.
Electronic commerce can be characterized by several
attributes.3 First and foremost, e-commerce is about exchanges:
· Exchange of digitized information. The foundation of e-
commerce includes exchange of digitized information. These
exchanges can involve information or communications, or they
can be related to the purchase of goods or services in a digital
format. The exchanges occur between organizations or
individuals.
· Technology-enabled transactions. E-commerce is about
technology-enabled transactions. Use of Web browsers is the
most common form of e-commerce, but there are others. When
banks use ATM machines or companies use phone or personal
digital assistant (PDA) interfaces to create exchanges, these are
part of e-commerce as well. Years ago, companies managed
these exchanges through human interaction, but technology is
used more frequently today. The result is normally better
response to customer needs and a reduction in the cost of the
exchange. Perhaps the best

More Related Content

Similar to INTRODUCTION 351consumers are placing their orders online, but.docx

Web technology and commerce unit 3
Web technology and commerce unit 3Web technology and commerce unit 3
Web technology and commerce unit 3
arun0501
 
Security concerns for Electronic business
Security concerns for Electronic businessSecurity concerns for Electronic business
Security concerns for Electronic business
Dr. Prashant Vats
 
Report
ReportReport
Report
Disha Rathod
 
E commerce
E commerceE commerce
E commerce
sandeepmalik04
 
Iare e marketing_pp_ts_e2
Iare e marketing_pp_ts_e2Iare e marketing_pp_ts_e2
Iare e marketing_pp_ts_e2
AditiVeda1
 
Chirag Janani E-commerce Project
Chirag Janani E-commerce ProjectChirag Janani E-commerce Project
Chirag Janani E-commerce Project
dezyneecole
 
Himanshu Sharma E-commerce project
Himanshu Sharma E-commerce projectHimanshu Sharma E-commerce project
Himanshu Sharma E-commerce project
dezyneecole
 
Sangeeta Singh BCA E-commerce Project
Sangeeta Singh BCA E-commerce ProjectSangeeta Singh BCA E-commerce Project
Sangeeta Singh BCA E-commerce Project
dezyneecole
 
E commerce project
E commerce project E commerce project
E commerce project
dezyneecole
 
E commerce and the mnc
E commerce and the mncE commerce and the mnc
E commerce and the mnc
03374
 
E-commerce
E-commerceE-commerce
E-commerce
Sakib Ahmed Anik
 
Online assignment.
Online assignment.Online assignment.
Online assignment.
vazhichal12
 
Amrit E-commerce project
Amrit E-commerce project Amrit E-commerce project
Amrit E-commerce project
dezyneecole
 
E commerce
E commerceE commerce
E commerce
Kavita Sharma
 
Lecture 02.pdf
Lecture 02.pdfLecture 02.pdf
Lecture 02.pdf
IhtishamAhmad20
 
E commerce course
E commerce courseE commerce course
E commerce course
Udara Sandaruwan
 
E commerce course
E commerce courseE commerce course
E commerce course
Udara Sandaruwan
 
E business
E businessE business
E business
Abhishek Vishwa
 
Contemporary technology
Contemporary technologyContemporary technology
Contemporary technology
Harry Pott
 
E business & e-commerce contrasted
E business & e-commerce contrastedE business & e-commerce contrasted
E business & e-commerce contrasted
Kato Ismael, MUBS-UGANDA
 

Similar to INTRODUCTION 351consumers are placing their orders online, but.docx (20)

Web technology and commerce unit 3
Web technology and commerce unit 3Web technology and commerce unit 3
Web technology and commerce unit 3
 
Security concerns for Electronic business
Security concerns for Electronic businessSecurity concerns for Electronic business
Security concerns for Electronic business
 
Report
ReportReport
Report
 
E commerce
E commerceE commerce
E commerce
 
Iare e marketing_pp_ts_e2
Iare e marketing_pp_ts_e2Iare e marketing_pp_ts_e2
Iare e marketing_pp_ts_e2
 
Chirag Janani E-commerce Project
Chirag Janani E-commerce ProjectChirag Janani E-commerce Project
Chirag Janani E-commerce Project
 
Himanshu Sharma E-commerce project
Himanshu Sharma E-commerce projectHimanshu Sharma E-commerce project
Himanshu Sharma E-commerce project
 
Sangeeta Singh BCA E-commerce Project
Sangeeta Singh BCA E-commerce ProjectSangeeta Singh BCA E-commerce Project
Sangeeta Singh BCA E-commerce Project
 
E commerce project
E commerce project E commerce project
E commerce project
 
E commerce and the mnc
E commerce and the mncE commerce and the mnc
E commerce and the mnc
 
E-commerce
E-commerceE-commerce
E-commerce
 
Online assignment.
Online assignment.Online assignment.
Online assignment.
 
Amrit E-commerce project
Amrit E-commerce project Amrit E-commerce project
Amrit E-commerce project
 
E commerce
E commerceE commerce
E commerce
 
Lecture 02.pdf
Lecture 02.pdfLecture 02.pdf
Lecture 02.pdf
 
E commerce course
E commerce courseE commerce course
E commerce course
 
E commerce course
E commerce courseE commerce course
E commerce course
 
E business
E businessE business
E business
 
Contemporary technology
Contemporary technologyContemporary technology
Contemporary technology
 
E business & e-commerce contrasted
E business & e-commerce contrastedE business & e-commerce contrasted
E business & e-commerce contrasted
 

More from mariuse18nolet

IRM 3305 Risk Management Theory and PracticeFall 2014Proje.docx
IRM 3305 Risk Management Theory and PracticeFall 2014Proje.docxIRM 3305 Risk Management Theory and PracticeFall 2014Proje.docx
IRM 3305 Risk Management Theory and PracticeFall 2014Proje.docx
mariuse18nolet
 
Ironwood Company manufactures cast-iron barbeque cookware. During .docx
Ironwood Company manufactures cast-iron barbeque cookware. During .docxIronwood Company manufactures cast-iron barbeque cookware. During .docx
Ironwood Company manufactures cast-iron barbeque cookware. During .docx
mariuse18nolet
 
IRM 3305 Risk Management Theory and PracticeGroup Project.docx
IRM 3305 Risk Management Theory and PracticeGroup Project.docxIRM 3305 Risk Management Theory and PracticeGroup Project.docx
IRM 3305 Risk Management Theory and PracticeGroup Project.docx
mariuse18nolet
 
Iranian Women and GenderRelations in Los AngelesNAYEREH .docx
Iranian Women and GenderRelations in Los AngelesNAYEREH .docxIranian Women and GenderRelations in Los AngelesNAYEREH .docx
Iranian Women and GenderRelations in Los AngelesNAYEREH .docx
mariuse18nolet
 
IRB HANDBOOK IRB A-Z Handbook E.docx
IRB HANDBOOK IRB A-Z Handbook  E.docxIRB HANDBOOK IRB A-Z Handbook  E.docx
IRB HANDBOOK IRB A-Z Handbook E.docx
mariuse18nolet
 
IQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docx
IQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docxIQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docx
IQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docx
mariuse18nolet
 
iPython 2For Beginners OnlyVersion 1.0Matthew .docx
iPython 2For Beginners OnlyVersion 1.0Matthew .docxiPython 2For Beginners OnlyVersion 1.0Matthew .docx
iPython 2For Beginners OnlyVersion 1.0Matthew .docx
mariuse18nolet
 
Iranian Journal of Military Medicine Spring 2011, Volume 13, .docx
Iranian Journal of Military Medicine  Spring 2011, Volume 13, .docxIranian Journal of Military Medicine  Spring 2011, Volume 13, .docx
Iranian Journal of Military Medicine Spring 2011, Volume 13, .docx
mariuse18nolet
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
mariuse18nolet
 
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docxIP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
mariuse18nolet
 
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docxIranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
mariuse18nolet
 
ipopulation monitoring in radiation emergencies a gui.docx
ipopulation monitoring in radiation emergencies a gui.docxipopulation monitoring in radiation emergencies a gui.docx
ipopulation monitoring in radiation emergencies a gui.docx
mariuse18nolet
 
In Innovation as Usual How to Help Your People Bring Great Ideas .docx
In Innovation as Usual How to Help Your People Bring Great Ideas .docxIn Innovation as Usual How to Help Your People Bring Great Ideas .docx
In Innovation as Usual How to Help Your People Bring Great Ideas .docx
mariuse18nolet
 
Investor’s Business Daily – Investors.comBloomberg Business – Blo.docx
Investor’s Business Daily –  Investors.comBloomberg Business – Blo.docxInvestor’s Business Daily –  Investors.comBloomberg Business – Blo.docx
Investor’s Business Daily – Investors.comBloomberg Business – Blo.docx
mariuse18nolet
 
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docxInvitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
mariuse18nolet
 
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docx
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docxInvitation to the Life SpanRead chapters 13 and 14.Objectives.docx
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docx
mariuse18nolet
 
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docxIOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
mariuse18nolet
 
INVITATION TO Computer Science 1 1 Chapter 17 Making .docx
INVITATION TO  Computer Science 1 1 Chapter 17 Making .docxINVITATION TO  Computer Science 1 1 Chapter 17 Making .docx
INVITATION TO Computer Science 1 1 Chapter 17 Making .docx
mariuse18nolet
 
Investment Analysis & Portfolio Management AD 717 OLHomework E.docx
Investment Analysis & Portfolio Management AD 717 OLHomework E.docxInvestment Analysis & Portfolio Management AD 717 OLHomework E.docx
Investment Analysis & Portfolio Management AD 717 OLHomework E.docx
mariuse18nolet
 
Investment BAFI 1042 Kevin Dorr 3195598 GOODMAN .docx
Investment BAFI 1042  Kevin Dorr 3195598  GOODMAN .docxInvestment BAFI 1042  Kevin Dorr 3195598  GOODMAN .docx
Investment BAFI 1042 Kevin Dorr 3195598 GOODMAN .docx
mariuse18nolet
 

More from mariuse18nolet (20)

IRM 3305 Risk Management Theory and PracticeFall 2014Proje.docx
IRM 3305 Risk Management Theory and PracticeFall 2014Proje.docxIRM 3305 Risk Management Theory and PracticeFall 2014Proje.docx
IRM 3305 Risk Management Theory and PracticeFall 2014Proje.docx
 
Ironwood Company manufactures cast-iron barbeque cookware. During .docx
Ironwood Company manufactures cast-iron barbeque cookware. During .docxIronwood Company manufactures cast-iron barbeque cookware. During .docx
Ironwood Company manufactures cast-iron barbeque cookware. During .docx
 
IRM 3305 Risk Management Theory and PracticeGroup Project.docx
IRM 3305 Risk Management Theory and PracticeGroup Project.docxIRM 3305 Risk Management Theory and PracticeGroup Project.docx
IRM 3305 Risk Management Theory and PracticeGroup Project.docx
 
Iranian Women and GenderRelations in Los AngelesNAYEREH .docx
Iranian Women and GenderRelations in Los AngelesNAYEREH .docxIranian Women and GenderRelations in Los AngelesNAYEREH .docx
Iranian Women and GenderRelations in Los AngelesNAYEREH .docx
 
IRB HANDBOOK IRB A-Z Handbook E.docx
IRB HANDBOOK IRB A-Z Handbook  E.docxIRB HANDBOOK IRB A-Z Handbook  E.docx
IRB HANDBOOK IRB A-Z Handbook E.docx
 
IQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docx
IQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docxIQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docx
IQuiz # II-Emerson QuizGeneral For Emerson, truth (or.docx
 
iPython 2For Beginners OnlyVersion 1.0Matthew .docx
iPython 2For Beginners OnlyVersion 1.0Matthew .docxiPython 2For Beginners OnlyVersion 1.0Matthew .docx
iPython 2For Beginners OnlyVersion 1.0Matthew .docx
 
Iranian Journal of Military Medicine Spring 2011, Volume 13, .docx
Iranian Journal of Military Medicine  Spring 2011, Volume 13, .docxIranian Journal of Military Medicine  Spring 2011, Volume 13, .docx
Iranian Journal of Military Medicine Spring 2011, Volume 13, .docx
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docxIP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
 
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docxIranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
 
ipopulation monitoring in radiation emergencies a gui.docx
ipopulation monitoring in radiation emergencies a gui.docxipopulation monitoring in radiation emergencies a gui.docx
ipopulation monitoring in radiation emergencies a gui.docx
 
In Innovation as Usual How to Help Your People Bring Great Ideas .docx
In Innovation as Usual How to Help Your People Bring Great Ideas .docxIn Innovation as Usual How to Help Your People Bring Great Ideas .docx
In Innovation as Usual How to Help Your People Bring Great Ideas .docx
 
Investor’s Business Daily – Investors.comBloomberg Business – Blo.docx
Investor’s Business Daily –  Investors.comBloomberg Business – Blo.docxInvestor’s Business Daily –  Investors.comBloomberg Business – Blo.docx
Investor’s Business Daily – Investors.comBloomberg Business – Blo.docx
 
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docxInvitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
 
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docx
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docxInvitation to the Life SpanRead chapters 13 and 14.Objectives.docx
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docx
 
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docxIOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
 
INVITATION TO Computer Science 1 1 Chapter 17 Making .docx
INVITATION TO  Computer Science 1 1 Chapter 17 Making .docxINVITATION TO  Computer Science 1 1 Chapter 17 Making .docx
INVITATION TO Computer Science 1 1 Chapter 17 Making .docx
 
Investment Analysis & Portfolio Management AD 717 OLHomework E.docx
Investment Analysis & Portfolio Management AD 717 OLHomework E.docxInvestment Analysis & Portfolio Management AD 717 OLHomework E.docx
Investment Analysis & Portfolio Management AD 717 OLHomework E.docx
 
Investment BAFI 1042 Kevin Dorr 3195598 GOODMAN .docx
Investment BAFI 1042  Kevin Dorr 3195598  GOODMAN .docxInvestment BAFI 1042  Kevin Dorr 3195598  GOODMAN .docx
Investment BAFI 1042 Kevin Dorr 3195598 GOODMAN .docx
 

Recently uploaded

220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
andagarcia212
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 

Recently uploaded (20)

220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 

INTRODUCTION 351consumers are placing their orders online, but.docx

  • 1. INTRODUCTION 351 consumers are placing their orders online, but companies still provide toll-free numbers for those who are hesitant to provide confidential information, such as credit card numbers, online. Airlines were among the first providers to provide a financial incentive to purchase online. Later, they shifted to an additional financial cost if toll-free numbers of support personnel were accessed to make a purchase. Concerns about Internet security have been blown out of proportion. Although online business transactions are not perfectly secure, they are no riskier than ordering via telephone or fax. Computer hackers are similar to everyday criminals who try to find ways to circumvent security systems and procedures, although there are some additional security issues associated with electronic commerce. First, the Internet is an open network without any physical barriers to prevent theft (e.g., hidden cameras, safes, security guards). Second, the same technologies that are being used for commerce can be used to breach security (e.g., computer software used to search for passwords). Several methods can be used to restrict access and improve security in electronic commerce. First, a form of authentication can be required through the use of some combination of account numbers, passwords, and IP (Internet protocol) addresses. Second, a firewall can be used to monitor traffic between an organization's network and the Internet. This barrier can restrict access to certain IP addresses or applications. A third method is to use coding or encryption techniques to transform data to protect their meaning. These security methods can be used individually or together depending on the level of security desired. For instance, firms that are transmitting payment information will be more inclined to use all three levels of defense. This next section covers four topics: the traits of a networked economy, the definition and scope of electronic
  • 2. commerce, the use of electronic marketing, and the beginning of electronic commerce. Authentication Verifying the appropriate access by a user through the use of some combination of account numbers, passwords, and IP (Internet protocol) addresses. Firewall A filter is used to monitor traffic between an organization's network and the Internet. This barrier can restrict access to certain IP addresses, applications or content. INTRODUCTION 349
  • 3. Traits of a Networked Economy Some people view electronic commerce as a boom-and-bust cycle, but that is really not true. In the mid-1990s, there was a dramatic increase in activity in the broad field of e-commerce. Companies such as eBay, Amazon, and Expc dia provide tangible evidence of the impact that e-commerce has had on th business world. These companies, and hundreds like them, created an ecc nomic boom unlike anything seen before. It began to unravel in 2000, wit the dot-com bust." The impacts are still being felt. Most traditional comp; nies, including those in the hospitality and tourism industry, were forced t Encryption Transmitted data are scrambled to prevent unauthorized access by 350 CHAPTER IO ELECTRONIC COMMERCE change their business practices and business models. Online reservations for hotels, airlines, and restaurants, online check-in for airlines and hotels, and other forms of electronic exchanges are now quite common. In the airline industry, these transactions are ubiquitous. Those who follow the evolution of electronic commerce agree that a networked economy, based on firms that have an Internet presence and conduct business online (at least in part), has several important traits:2 · It creates value largely or exclusively through the gathering, synthesizing, and distribution of information. Firms that engage in e-commerce activities can collect significant data about their
  • 4. customers. They can more easily determine consumers' likes, dislikes, and responses to various marketing stimuli. The wealth of data, which is readily analyzed, allows marketing managers to make better-informed decisions. · It formulates strategy in ways that result in a convergence of management of the business and management of various technologies. The management of technology is viewed not as a separate function, but as a core business competency. The development of e-commerce applications is viewed not as a parallel activity, but as part of the core set of activities within the firm. · It allows firms to compete in real time, not in cycle time or in asynchronous time. Historically, businesses made changes on an intermittent basis, as a result of data about, for instance, financial performance or guest response. With the increasing use of technology, this lag time can be nearly eliminated. For example, an airline can post price changes to an e-commerce Web site and then monitor site transactions to determine within a very short time whether the price change has resulted in the desired change in buyer behavior. · It operates in business environments in which there are low barriers to entry and extremely low variable costs. This trait is applicable to pure electronic commerce companies, but less so to companies in the hospitality and tourism industry. Hospitality and tourism firms have higher capital costs for buildings, fixtures, and equipment than do firms that are pure electronic commerce companies. · It organizes resources around the demand side of the business (i.e., the level of demand from potential buyers of the products and services). Demand from potential customers is constantly monitored to determine changes in demand. These firms then attempt to influence demand by changing marketing variables such as price and availability. INTRODUCTION 349 ·
  • 5. · It examines relationships with customers in "screen-to-face" interfaces in which technology is used to manage and customize customers' experiences. In order to increase relationship- building interactions and reduce labor costs at the same time, technology is used to "push" customized information to the consumer. This can take many forms, including e-mail and web site information that is customized to match the interests and past behavior of individual consumers. · It uses technology-mediated methods to measure and track customer behavior and interaction patterns. These data are then used to customize future interaction with individual customers and customer groups with similar buyer behavior. Definition and Scope of Electronic Commerce The use of digital technology has dramatically shifted the business paradigm, both domestically and internationally. Digital technology has created entire new industries, shifted others, and forced managers and leaders of firms to look at their customers, markets, and competitors in entirely new ways. The size and scope of e-commerce has changed dramatically in the past ten years. Numerous industry publications and research organizations report on these trends. Among the most notable are www.emarketer.com, www.cnet.com, and www. forester.com. Table 10.1 provides several facts and figures that characterize the development of the Internet within the hospitality and tourism industry. Electronic commerce can be characterized by several attributes.3 First and foremost, e-commerce is about exchanges: · Exchange of digitized information. The foundation of e- commerce includes exchange of digitized information. These exchanges can involve information or communications, or they can be related to the purchase of goods or services in a digital format. The exchanges occur between organizations or individuals. · Technology-enabled transactions. E-commerce is about
  • 6. technology-enabled transactions. Use of Web browsers is the most common form of e-commerce, but there are others. When banks use ATM machines or companies use phone or personal digital assistant (PDA) interfaces to create exchanges, these are part of e-commerce as well. Years ago, companies managed these exchanges through human interaction, but technology is used more frequently today. The result is normally better response to customer needs and a reduction in the cost of the exchange. Perhaps the best