Documente Academic
Documente Profesional
Documente Cultură
BM063-3.5-2-EBM
Group Assignment
E-Business Management
Overview
Establishing, running, and maintaining e-business are needs many measurements in order to
make its business success or sustain. For instance, it is very essential for Bicycle For You to
set marketing activities. Marketing activities can consist of CRM, branding, optimization for
the multi-channels, e-mail marketing, and banner advertisement. For instance, CRM
1|Page
BM063-3.5-2-EBM
Group Assignment
E-Business Management
recommend well-designed Web site in order to attract customer and using database marketing
to ask customers permission from using their information (e.g. amazon), also, branding the
product with unique logos design, superior quality in purpose to gain benefits from
competitive advantage as the starter. Maximizing search engine ability by putting some
unique keyword or marketed them in many ways such as through banner advertisement in
social media, e-mail marketing which e-mail known as low cost and time savings media.
To maintain e-business sustainability, supply chain needs to optimize material flows along
with information flows. It is suggested that Bicycle For You applying pull type of supply
chain and implement RFID to record all the transactions that occur, in order to prevent
confusion from its process and helping company to personalized mechanizing opportunities,
with RFID companies able to improve both process and product, reduce inventory costs,
wastes and out-of-stock condition. In the other hand, Bicycle For You will need to consider
EDI for enhancing supply chain.
Other elements that Bicycle For You should consider is the security issues. Malicious
software, staff misuses system, attacks from outside (hackers/crackers), theft/fraud of data,
and system failure/data corruption are very dangerous for the online presence and public
image of Bicycle For You. Care should be taken when setting up an e-business to overcome
these security issues.
Marketing Activities
CRM
Customer Relationship Management or CRM is an approach that perceives that clients are the
center of the business and that the organization's prosperity relies on upon adequately
overseeing associations with them (Fiore, 2002). CRM perceives clients as an imperative
resource of the association and keeping up client relationship is the center methodology of a
business. A business that succeeded in holding its clients is five times more profitable on
average. A few procedures for keeping up great association with clients are suggested such
as:
A good website design is one of the easy way to attract customers attention. However,
customers are easily getting frustrated with the unfriendly websites when they insisted to visit
2|Page
BM063-3.5-2-EBM
Group Assignment
E-Business Management
a particular website which is directed by the search engines or led by links from other
websites. Once they disappointed with the service provided, there will be high possibility for
them not to visit the page again in the future. The criteria of a user friendly website must be
included before creating a website for a company. In relation with Bicycle for You case
study, a good website must be designed with minimal useless information and only
information related to the company, in this case, Bicycle.
Besides, a database marketing is also somehow can be related to the CRM. It is a human
nature to be respected and valued by others. Same goes to an organization, a good
relationship with the customers can be reached in e-business by database marketing. In
database marketing, the company will ask for a permission from customer to get their
personal information. This method is actually good to create a good bond with the clients and
highly recommended for Bicycle for You company. Another good action taken by the
Amazon.com which they use their customer profile to recommend books that are considered
suitable for them. In the other word, the organization is customizing their customers based on
their personal interest and information.
Branding
"If this business were split up, I would give you the land and bricks and mortar, and I would
take the brands and trademarks, and I would fare better than you." John Stuart, Chairman
of Quaker (Fiore, 2002). To brand the products or services is something that really counted in
order to start up a new business and enter the competitive market. There is a way, for Bicycle
for You to become instantly recognizable to the industry market and to gain the trust from
their customers. From the name itself, the tone, the colors, the font, the logo and the motto,
the brand plays a big role. It's a discriminating business variable for an organization's
prosperity, the more the brand is related to appointed esteem by the business group more it
will become, enhancing the chances to gain more customers.
Branding your products is one of the crucial elements in marketing strategy, as it conveys a
strong message of what is offered and allows customers to create a bond with the product
provider. In order for Bicycle for You to stay competitive, the products must have a unique
touch. Such as the design, the prices, and also the superior quality.
BM063-3.5-2-EBM
Group Assignment
E-Business Management
business. Customers are attracted to good website through its content and performance, and
the feedback of other users. However, websites with keyword stuffing, purchase links and
poor user experiences will definitely shatter the image of the organization (Chaffey, 2004).
Also, an optimization for the multi-channels also can be done in Bicycle for You marketing
strategy whereby the SEO implementation is not only on site, but it can be extended to other
platforms. The multi-channel optimization can group together social networks such as
Facebook, Twitter, LinkedIn, and offline site can be radio and also television advertisements.
Throughout this effective marketing strategy, the products in Bicycle for You can be marketed
in different ways and reach majority of public. Through this platform, customers and
potential customers are comparing the business to the competition and telling stories about
the company that have visited according to their experiences (Fiore, 2002).
The earliest marketing tools of e-business have been across in the use of e-mail. It is a
versatile medium that provides communication facility electronically to reach the whole
world. It is the basic medium of creating account for everyone to be able to use any todays
online facilities such as social media websites. E-mail Marketing is a marketing activity, it is
also a marketing tool, to targeting customer through e-mail. It helps marketers to reach a lot
of customers in order to attract them and end with purchasing their products. Subsequently,
Bicycle for You is recommended to use e-mail marketing as a promotional tool. The email
marketing can cause a spam in each customers email. However, the issue can be settled up
4|Page
BM063-3.5-2-EBM
Group Assignment
E-Business Management
by not sending the email too often or maybe the notifications only updated once per week.
Besides, it is also found attractive, as in its a real-time campaign, compare to direct
marketing tool. There are some reasons that e-mail marketing could be beneficial for Bicycle
for You:
-
Less cost
By using e-mail marketing, an organization can turn out lots of works into pieces of
campaign messages. Direct marketing tools might spend days or weeks to create, which is not
efficient. E-mail marketing could use templates or graphics that have designed and simply
copy and send to the customers list database. Thus, employees who used to spend days or
weeks in doing such promotional activity could change it into few ours.
For example, faster delivery and responds. Due to e-mail speed, it can arrive in a few
seconds, as well as its responds. Thus, a campaign could be demonstrated much faster
compare to direct marketing tools. A frequent communication could be tied between
marketers and customers. So, it eases them to understand, analyze and categorized the
customers.
5|Page
BM063-3.5-2-EBM
Group Assignment
E-Business Management
Banner Advertisement
Banner advertisement is defined as commercial messages placed on third party web sites,
including search engines and directories available through Internet access (Reynold, 2010).
It is displayed on a website that encloses hyperlinks that links to alternative webpage or
website that typically used for promoting products or services. Based on the creativity,
design, attractiveness and content, it is effective in helping an organization to reach targeted
customers. There are classifications of banner advertisement:
- Standard image/text link
Categorized as advertisements that are many components contained, specialized in
either animated or static image, or text beneath the image that direct clickers to the
same URL. Format based of its image are GIF and JPEG.
Flash
Its a vector- based macromedia that produce interactive elements as its output.
Requires a plug-in to access the URL.
In the line with the case, it is recommended for Bicycle for You to apply banner
advertisement in order to develop e-business strategy. It can measure the effectiveness of
campaigns. It engages customers in more sophisticated strategies that lead to increasing
6|Page
BM063-3.5-2-EBM
Group Assignment
E-Business Management
repetition content through clicking rates. Its advantages, clarity, relevance, content and
intention should be in consideration of applying banner advertisements. As an example, the
advertisements and the users reason for being on a particular website should be related to
each other. However, there is some issue about the banner for example the pop-ups while
browsing. Therefore, they dont need to leave the webpage or website. And most important
key is the intention. Making sure that it is not blind. It should indicate that what would
happen if it were clicked on. Does it really provide customer wants or not. Refer to Figure 5
for an example banner for Bicycle For You.
Figure 5: The example of Bicycle For You banner Advertisement
E-Supply Chain
Supply chain is defined as essential of optimization of material flows and together with
information flows that is related in businesss operations (Chaffey, 2009). E-supply chain is
when supply chain is being enhanced by IT. E-supply chain is related with reducing time
consuming in information flows. There are two types of supply chain which are pull supply
chain and push supply chain. Bicycle for You is suggested to use a pull supply chain.
IT
Customer
Retailer
IT
IT
Distributor
Manufacturer
Supplier
IT
Figure 6
7|Page
BM063-3.5-2-EBM
Group Assignment
E-Business Management
Figure 7
8|Page
BM063-3.5-2-EBM
Group Assignment
E-Business Management
minimizing variability by sharing the information about the requirements from customers and
suppliers. Beside of that, EDI also enhancing the e-commerce application in real life.
According to Jhanson and Whang (2002) that is written in Reynolds (2010),E-Commerce is
helping networks of supply chain partners identify and respond quickly to changing customer
demand. ERP consists of e-ordering and e-invoicing which both are allowing customer to
place orders then will be notified electronically of order and shipment status and for
payments (Reynold, 2011). The process of information exchange is done through EDI. In
manufacturing, the result will be a shorter supply chain. It can be seen from Figure 8.
Customer
Retailer
Distributor
Customer
Manufacturer
Supplier
Manufacturer
Supplier
Figure 8
Other thing that can be considered is a website that allows Bicycle for You find an easier way
to find supplier such as www.Alibaba.com. Alibaba provide business-to-consumer, consumerto-consumer and business-to-business via internet.
Figure 9
BM063-3.5-2-EBM
Group Assignment
E-Business Management
Alibaba.com is also good because it save time and cost for searching the right supplier that
sometimes may involve another expenses.
Security Threats
There are many security threats that could endanger the online presence and public image of
Bicycle For You. It is of the utmost importance that these threats be identified and avoided
before a security breach occurs in any e-business system that will be established. According
to Chaffey (2009) the most recurrent security issues faced by e-businesses are malicious
software, staff misuse of the system, attacks from outside (hackers/crackers), theft/fraud of
data, and system failure/data corruption.
Malicious software is created to gain partial or full access to the affected system. Malicious
software or Malware can be categorized into Trojans, viruses, backdoors, worms, spyware,
adware, and root kits. Viruses can be extremely dangerous as it can erase data on a system as
well as hijack a system to send out spam (UMass Amherst, 2012). Spyware can collect
private information from a system and relay it to others as well as install Trojans onto
systems and adware can make systems display unnecessary advertisements (UMass Amherst,
2012). Malware can have a detrimental effect on system health unless it is quickly dealt with.
Staff misuse of information systems are an increasing problem for organizations. Staff misuse
of information systems can be a major threat to organizations as it can lead to employee time
wasting, confidential data being compromised as well as illegal activities taking place on
company systems (Computer Economics, 2009). Time wasting is a high occurrence as staff
are able to connect to the internet unrestricted as well as download pirated media, this can
lead to lawsuits being filed against the company in addition to the loss of productivity
(Chaffey, 2009). Confidential data can be leaked as staff can copy files onto portable storage
devices, enabling remote access to systems, using personal devices instead of company
devices, etc (Computer Economics, 2009).
Hacking and cracking are similar activities where they gain unauthorized access to a system.
The objectives of anyone seeking to gain unauthorized access to a system may be to steal
information or data, such as rival companies seeking insider information, or persons seeking
monetary gain, or seeking to destroy or cripple a system causing system failure and data
10 | P a g e
BM063-3.5-2-EBM
Group Assignment
E-Business Management
corruption (Chaffey, 2009). Important information such as customers personal details as well
as their credit card information can be stolen by hackers/crackers if it is left unsecured.
There are numerous options available to combat these threats. Common options used for
security are anti-virus software, monitoring internet, limiting user access, frequently updating
system software, encryption, and firewalls (Ghosh, 1998).
Purchasing an anti-virus software plan for a system can help it remain free from malicious
software, however it would require regular updates due to the rapid release of new viruses on
the internet (Chaffey, 2009). Monitoring the internet can help reduce staff misuse of
information as well as blocking access to networking websites and file sharing programs can
reduce the number of pirated media being downloaded (Chaffey, 2009). Limiting user access
can reduce system breaches from employee side as well as customer side, care should be
taken to ensure employees and customers only have access to necessary features only.
Enabling updates to the operating system and software can reduce the number of
vulnerabilities in the system. To avoid hacking, companies can use encryption software
(digital signatures) to encrypt sensitive information as well as using firewalls to prevent
unauthorized access to the system (Chaffey, 2009).
11 | P a g e
BM063-3.5-2-EBM
Group Assignment
E-Business Management
References
Alibaba.com. (2014). Alibaba.com Global Trade Starts here. [Online]. Avaiable at:
http://www.alibaba.com/trade/search?
fsb=y&IndexArea=product_en&CatId=&SearchText=bicycle [Accessed: 29th October 2014].
Amor, D. (2000). The E-Business Revolution. United States of America: Prentice-Hall Inc.
Chaffey, D. (2009). E-BUSINESS AND E-COMMERCE MANAGEMENT. 4th Ed. Harlow,
England: FT Prentice Hall.
Computer Economics, (2009). Security Threats in Employee Misuse of IT Resources.
[Online]. 2009. Available from: http://www.computereconomics.com/article.cfm?id=1436
[Accessed: 1 November 2014].
Cunningham, M. (2002). Smart Things to Know About E-business. United Kingdom:
Capstone Publishing Limited.
Edwards, V. (2013). SEO Basics: 8 Essentials When Optimizing Your Site. [Online]. Search
Engine Watch. Available at: http://searchenginewatch.com/article/2259693/SEO-Basics-8Essentials-When-Optimizing-Your-Site [Accessed 13 Nov. 2014].
Evans, M. (2014). 12 E-Commerce Strategies To Grow Your Business This Year. [Online].
Forbes. Available at: http://www.forbes.com/sites/allbusiness/2014/01/16/12-e-commercestrategies-to-grow-your-business-this-year/ [Accessed 13 Nov. 2014].
Fiore, F. (2001). E-marketing strategies. Indianapolis: Que.
Fogco, F. (2014). Inbound Marketing Case Study | Mainstreethost. [Online]. Mainstreethost.
Available at: http://www.mainstreethost.com/case-studies/fogco.html [Accessed 13 Nov.
2014].
Gao,
K.
(2014).
Top
10
Benefits.
[Online].
Available
at:
http://emailmarketing.comm100.com/email-marketing-ebook/email-marketing-benefits.aspx
[Accessed: 10/11/2014].
Ghosh, A. (1998). E-Commerce Security. New York: John Wiley.
Muller, I. (2014). Brand, branding, E-Business Consulting. [Online]. E-businessconsulting.it.
Available at: http://www.e-businessconsulting.it/en/mkt/branding/ [Accessed 13 Nov. 2014].
12 | P a g e
BM063-3.5-2-EBM
Group Assignment
E-Business Management
Poireir, C. & Bauer, M. (2011). E-Supply chain: Using the internet to Revolutionize Your
Business. 1st ed. United States: Michael Bass.
Reynolds, J. (2010). E-Business: A Management Perspective. 1st Ed. Oxford: OUP.
Salim, L. (2008). What is CRM? How can it affect on e-business?. [Online]. All About EBusiness. Available at: http://electronicbizniz.wordpress.com/2008/04/30/what-is-crm-howcan-it-affect-on-e-business/ [Accessed 13 Nov. 2014].
Tun, E., Jaen, J., Martinez,R., Beltran, A.(2007) BENEFITS OF ELECTRONIC DATA
INTERCHANGE (EDI) FOR SUPPLY CHAIN(SC). Primer Condreso de Logostoc y
Gestion de la Cadena de Suminstro Zaragoza, 13th September. [Online]. Available at:
http://www.cnc-logistica.org/congreso-cnc/documentos/62.pdf[Accessed: 30th October 2014].
UMass Amherst, (2012). Malware: Viruses, Spyware, Adware & Other Malicious Software.
[Online]. Available at: https://www.oit.umass.edu/security/malware-viruses-spyware-adwareother-malicious-software [Accessed: 1 November 2014].
13 | P a g e
BM063-3.5-2-EBM
Group Assignment
E-Business Management
Appendices
Appendix 1
The Intranet basically refers to an internal system which is within an organisation and anyone
from outside the organisation will be unable to reach private information. For example, Apple
has a system where employees can buy older systems and accessories online through their
intranet service (Amor, 2000). Extranet is an area which deals with business-to-business type
of deals whereby two organisations are able to see confidential information of each other.
14 | P a g e