Complex information technology-intensive firm eBay.

EBay is an online shopping and auction website that allows people and websites to trade, buy and sell variety of goods and services worldwide. Majority of sales takes place through a set time auction format. eBay has established localized websites as Paypal, Kijiji, and Stubhub in various countries to facilitate easier trading. eBay auctions provide a convenient, efficient, and entertaining market place in which to sell and shop (David and Richard, 2 000).eBay is a phenomenon in the expanding universe of e-commerce. Many people have made eBay an important part of their live and businesses, where they out bargain or find items for their personal collections(David and Richard,2000).The use of Internet allows eBay to offer its customers something distinctive. According to David and Richard (2000) when Shirley Bryant began listing her more expensive books on eBay auctions, items that would normally stay for months in her store catalog sold quickly at eBay and at good prices and better still, her local business took on global proportions (p.1).She soon started dealing with customers all over the world saying that eBay provided her customers she would never have found on catalogs or store. Internet can also allow eBay to solve a new set of problems for customers. At a given time web surfer can find over 4 million different sites in over 2,000 different product categories on eBay. Internet site is the world largest market for person to person trading (David and Richard, 2000).The person to person trading forums on the internet allows interaction, collectible shows, auction houses and classified ads, therefore expanding geographical reach of sellers enormously and increasing buyers profitability.

eBay reaches a very wide range of customers through the internet. It is one of the most important aspects in expanding the e commerce industry. Considering the number of people who browse the internet daily, approximetaly 500 million consumers are reached every day (David and Richard, 2000).With such an intense growth in internet connection and usage it means that the amount of business being carried by an average user is also growing significantly meaning there is more to be purchased over the net. The  consumers that can use eBay  include those who want airline tickets, home morgages,drugs,auotomobiles and even groceries through web house. Accordingly David (2000) says that a research has shown an increase in online retail sales by 108 billion (p.7).However the society of advancement of education (2006) says that a growing number of users are buying less online, approximately 41, due to growing worries about identity theft, which include mishandling of data by credit card processing company card systems (p.1). eBay practices the dynamic pricing where transaction prices are determined by buyers. The internet has enabled to lift commercial activities directly from offline model thus providing no greater value. The only thing that online auction has done is to minimize risk and maintain business, by valuing the cost of goods as the cost of transferring them electronically. From a consumers perspective theres no difference in purchasing the same good or service on a retailers catalog and purchasing it on the internet. However since the introduction of price line in 1995 the buyer gets a low price on a good or service on the net, and the seller unloads something that might otherwise expire as worthless (David and Richard, 2000).

e Bay makes a growing company to engage in different mechanisms called site policing for communication of the companys values to millions of active users  which is limited to e-mails and various bulletin boards, newsletters and announcements it places on its site. In the early years, when the community was small eBay values were passed to new users by veteran buyers and sellers (David and Richard, 2000).The rate of growth of eBay makes it impossible for an organization to manage its infrastructure efficiently. Constant increase in human traffic in eBay web site requires constant upgrading of technology and expansion of network infrastructure, engineer staff and transaction processing systems e.g. installation of web servers with the company hosting supplier. Lack of implementation may result in slower response by users. Managing of a dot com company requires new and unique management that will scale the organization and identify opportunities, come up with a vision and organize improvisers. Growing internet companies require personnel with in depth knowledge in managing processes and people. The launch of online stock trading meant that companies had to employ personnel with knowledge in online forex trading so as to keep the company in touch with the market trends.

The power of internet has helped eBay to perform existing transactions at a faster pace since most of the people in the world have access to the internet. In a magazine e business, internet has helped to boost investment in eBay. There has been a major increase in previous years market performance and reinforcing of the development agencys to be at the top of technology. John de Kanter a chief executive of In Staffs said that since the start of use of internet to market the institution, a new feel and look  on the institution  site has been created  with even modern design that provide in depth information thus making it easier for people to browse through the site. Since its launch In Staffs has seen significant leadership in technology innovation and internal investments.Tomtom (2007) has also linked with Google to meet the growing demands of its customers through the internet (p.22).Tomtom said that its users were able to transfer their data into Tomtom devices through the net. Without the internet then such data would be outdated therefore internet plays a major role in Tomtom .When an award winning  Stockton e-tail specialists Visual soft launched its ground breaking designer clothing as on line sale, shoppers spent a massive on their clothing, it was  named the winner of the Design of the Year Award. The director of Visual soft said that the approach to web development was the key success factor (Gale, 2009). Internet is unleashing a wave of change in eBay and its clearly seen in various companies. As the Cisco, Chris Sionton says since the launch of internet in his company it has been easier to transact business within the company.

Internet has a number effect to the people, environment, systems and strategy structure of eBay. Internet creates thousand of employment opportunities ranging from programmers, managers and software engineers. Stock markets in the world are currently trading online. It has also made companies to emerge faster and compete with higher ranking companies in the world. It also creates a conducive environment where every employee has the freedom of speech. According to David and Richard (2000), Pierre said that he looked upon his employees to speak out if the company management was doing something that was not right.

Actually he said that he had empowered everyone to be the guardian of culture (p.98).The internet helps in continual learning, Systems thinking and open information flow in the organization thus helping the organization in better decision making, resource mobilization and environment understanding. Dot com companies run into unanticipated problems and opportunities with startling regularity making them more efficient and effective (David and Richard, 2000).When a company has a mission, like to be the worlds largest online auction company, the management will make its decisions in regard to its mission .Thus through the internet eBay has facilitated making key decisions quickly and effectively. Through the internet eBay facilitates continued new programs in the company, new sites and major initiatives. This reveals the companys involvement in problems and opportunities. Internet has helped the companies to grow very quickly. Accordingly e-commerce environment is growing at a very high rate and changing quickly. The companies have to build substantial excess capacity systems that can hold excess growth human traffic in their eBay websites (David and Richard, 2000).

E-Commerce Models

The dramatic effect which internet has on the global platform necessitates integration of internet facilities in the present day business today. The wide range of exposure which has been presented using electronic media has been highlighted by the electronic brochure, distribution channel, support channel, and marketing channel. This platform provides an easy and information loaded channel for the emerging customer. It is important to evaluate the delicacy of these channels which address the needs of the customer in their own unique way with their specific strengths and weaknesses. The suitability of the business needs to be identifies and strategies need to be adopted which can engage customers with the business and establish a link which is developed on the foundation of sound e-commerce principles. The e-commerce is the need of the time and should be used to supplement other traditional channels. The businesses should be encouraged to direct their sales directly to the customer. Though the decision to deal with e-commerce should be based on facts and figures and which are concerned with principles based on which successful e-commerce model can evolve to benefit the vision and the business aspect of the company.

Important business-critical decisions in the industry The critical issues related to e-commerce needs to be identified based on which the strategies for sound business development should be targeted. The activities should be selectively chosen and developed to integrate the experiences of the maturing internet within the framework of the business. The aim should be build a good support which is backed by high quality, innovative and interactive e-commerce integration within the existing business plan. This also necessitates targeted focus on the development of customer service provisions which can evaluate the degree of customer satisfaction. Avery important component of the success in this field should involve financial plans which can address the maximization of the revenues and minimization of the cost. The critical assessment needs to develop a system which builds on branding the services and enhancing the value for the existing customers as well as future clientele. This can be achieved using distribution channels which can maximize the benefits of the Web experience. It is important to procure goods at reasonably low prices and have reliable supply system which meets the demand of the product. This also necessitates sound inventory management and acknowledgement of variables which are critical for the success of such e-commerce model.

The companies which consider enforcement of e-commerce for their specific business need some critical variables integrated within their framework. Some of these criteria are people oriented, technology oriented, management oriented and distribution channel oriented. The integration of these forces to boost the organization structures is very significant. These can be introduced as positive e-commerce variables which would impact significantly the success of the e-commerce model selected for the specific business.

One of the most characteristic variables can be evaluated in the context of people. People oriented decisions have to be addressed in harmony with the organizations vision and should reflect the interaction with the customer, visitors, suppliers and employees of the business unit.

The technology oriented focus is essential for maintaining invoice and billing system accurate and efficient. It would also enhance the contact mechanism for the business unit. It can make the consumer tracking more effective and efficient. It would enhance the procurement of internet based orders and keep information current and accurate.

There is need for specific management oriented decision-making which helps determine the pricing, maintains the reliability factor within the organization at internal as well as external levels. Hs effective implementation of the supply lines and is focused on product availability which meets the demand of the outlet.

The focus on the distribution channel oriented effort will enhance the work management and human resource management which play a key role in determining the sale of the product in accordance with the human resource management.

Another very important variable is the retail implementation plan which determines the e-commerce strategy. It should address the human resource management and the organization structures. This should include the integration of the display and selling of the products based on the Web model. It should be authenticated and backed by data and distribution channels which take into consideration the ordering, activation of the service and purchasing of the products. This should also include the shipment models which directly deal with the customer contact and tracking of the product. Invoice also plays a key role in effective work model which takes into consideration accounting, budgeting and human resource to manage the financial side of the business.

Clear description of the role played by information systems in these decisions The critical variables which have been identified serve as the basis for the development of the e-commerce models with specific considerations in the above mentioned criteria.

People Oriented The people oriented enforcement of e-commerce requires sound strategies for the development of peoples relationship programs based on party relationship, party role and the person concerned. The role of the customer response and involvement is needed which necessitates authentic information which needs to be gathered from the customer source as well from the organizations internal human resource management. The essential role is played by the webmaster and employees to serve the customer effectively and efficiently. The human resource factor needs to be nurtured which can re-enforce the e-commerce for the specific business. The host server would be able to access information regarding visitor, consumer, subscriber and referrer. There is also need to establish harmony between ISP, Supplier and Internal organization. This information is necessary to implement the strategies on the regular basis.

Technology oriented In the context of the high quality management of the e-commerce business is it absolutely essential to maintain a high quality technological setup and support system. There has to en established and authenticated web history which is controlled by the date, user ID and password system. The web user and the user login should be activated with current information on user ID and password system. Web content is also an important part of the technological support. It should also establish a network of external support for online transaction as well internal support in the form of billing, invoice and consumer tracking system which will enhance the contact mechanism of the business unit using e-commerce models. The procurement orders must be accurate and authentic, well guarded by the system.

Management Oriented The management based strategic decision to integrate e-commerce models for the business unit is critical in the determination of the pricing and consumer confidence. This requires good development and maintenance of the supply lines which are readily available to address the internal as well as the external links. The demand must be met effectively with the support of the effective supply lines.

Distribution Channel Oriented The harmonious and efficient working of the distribution channel is essential for ongoing success of the business unit based on e-commerce models. There is need for ongoing product information and update on the  Web. The opportunity to capture information will enhance the specific needs of the parties, capture Web-related information with regard to visitors. These information which can integrate product management and human resource management is the key to success of e-commerce model.

Retail Implementation Plan The implementation plan will be assessed based on the e-commerce strategy adopted by the business unit. It necessitates integration of the subscriber, visitor, customer and the prospect. There is need to integrate human resource management with the vision of the organization structures. Shipment model also plays an important role in consumer tracking and activation. This would boost the financial gains of the company.

Connecting decisions to industry data models The data models are very essential in charting the essential growth curve based on the e-commerce model which have charted out in accordance with the informations systems which provides specific and precise guidelines for implementation of e-commerce model. This should be identified in accordance with the critical variables, the related information for the chosen business unit.

People Oriented The strategies related to peoples relationship is very effectively presented in the Figure 9.1 which addresses the issues related to  party relationship, party role and the person concerned. The personal role, organizational role and automated agent role is critical in the success of the e-commerce model. The success of the organization depends upon the party relationship and internal human resource management. The objective is to target specific business. The host server would be able to access information regarding visitor, consumer, subscriber and referrer. There is also need to establish harmony between ISP, Supplier and Internal organization. This information is necessary to implement the strategies on the regular basis. Fig.9.2 which deals with retail e-commerce party roles also establishes an important connection between the internal organization, visitor, customer, referrer, employee and webmaster. The diagram provides good systematic information for development of successful e-commerce model.

Technology oriented  The high quality management of the e-commerce business necessitates maintenance of high quality technological setup and support system. This requires development of authenticated web history management and fig.9.2 very clearly reflects the important role played in this context by party contact mechanism system, which emphasizes on the postal addresses, IP addresses, e-mail, addresses, web addresses and IP addresses. The Party ID also plays an important role in the management of the technological aspect. The contact link mechanism is also developed as presented in fig.9.4. The most significant information is most systematically presented in fig.9.3 which addresses the Login Account History, the chart is superb in navigational information.  There has to established and authenticated web history which is controlled by the date, user ID and password system. The web user and the user login should be activated with current information on user ID and password system.

Management Oriented The management of the e-commerce model is very comprehensively represented in fig.9.4 which targets the product, object usage, web content and product objective. It defines the product and its objects in very clear flow chart. This would impact the demand and effective supply lines management for effective pricing and reliability of the business unit.

Distribution Channel Oriented The distribution channels with regard to the e-commerce model is effectively presented in fig. 9.4 which addresses the needs of the consumer, product and objects, visitor and the prospective role of the web content and product category. It also includes in its determination the communication events. There is systematic scope for gathering authentic information on the Web which is essential for the success of the business unit based on the e-commerce models.

Retail Implementation Plan The most diverse aspects of the implementation plan is presented in Fig.9.10 which addresses the user, the platform, the browser, the protocol and the method type. The object purpose defines the product, subscription and web content control. Thus it addresses the overall party, person, organization and automated agent in most harmonious functioning order. The data model is the key to the successful implementation of the e-commerce business for the organization. This covers the key components which determine the successful outcome of the e-commerce model. The model is complete and comprehensive.

Management

In contemporary business world, stiff competition has presented a major challenge for the organizations that seek to expand their market. This has therefore made many organizations to adopt strong marketing strategies in order to effectively compete with their competitors in the market. In the same way, organizations have embarked on e-business practices to ensure that they acquire a competitive advantage both locally and internationally. This is achieved through the use of e-business architectures which are aimed at supporting e-business activities in an organization. This paper proposes and justifies the use of oracle e-business suite architecture to the Century 21 real estate Companys senior manager in order to support the operations of the company. The paper will also summarize the application that is needed to work with oracle e-business suite architecture outlining their interfaces with each other. In addition, the paper will explain how the application differs from the current systems as well as oracle benefits.

Century 21 real estate agency is a US based company which is headquartered in Parsippany, New Jersey. It was established in 1971 by Art Bartlett and Marsh Fisher, two real estate agents in California. It is therefore a global company which provides proper services for the customers who need fine homes as well as other luxurious products. It is imperative to note that many people who buy or sell their properties are sometimes busy performing other duties hence they may have a stressful time. In this regard, century 21 offer their services to such people including offering advice to the customers, and helping them to navigate the best path during home acquisition process. This is achieved through the use of state of the art sales tools and technology which put into control the sale or purchase of properties.

On the other hand, Oracle e-business suite is an internet enabled architecture that can be managed from a single site. With oracle e-business suite a company can operate a single date center with a single database which is similar to ERP products. E-Business suite contains a number of product lines which can be implemented by users in their business. It include the companys enterprise resource planning (ERP) products as well as supply chain management (SCM) and customer relation management applications which are licensed separately to ensure that companies are able to select the combination which is suitable for their business processes. In this way, the users are able to streamline their business processes in such a way that the organization will be able to succeed in the simplest form possible.

Proposal and justification for oracle e-business suite
Being a multinational real estate company, I would propose that Century 21 adopt oracle e-business suite in order to simplify its business processes and as a way of speeding its production processes. Although the company has greatly used online marketing to attract customers, it has not fully adopted proper e-business based on the believe that their customers are always within their reach. This is brought about by the fact that Century 21 real estate agency has established over 50 branches in the US as well as in many other countries around the world. However, having so many branches in many localities may not be guarantee that the company is in a position to reach all the customers. In this regard, the company needs to fully take up e-business and especially the use of oracle e-business suite to ensure that all customers are reached and are guaranteed satisfactory services.

Applications that are needed to support Oracle e-business suite
In an attempt to ensure full support of Oracle e-business suite, there are some major applications needed to work hand in hand with the architecture. One of the applications that are needed to support Oracle includes asset life cycle management application. Since the operating assets of an organization which range from plant and equipment, to rolling stock and operating production machinery are the heart and core of the business, the ability to monitor those assets during their useful life is critical to their success. Oracle Asset Lifecycle Management (ALM) provides the total solution since it is the cornerstone of a unified approach to capital asset management and long-cycle product service. In this way, the company will be able to deal with the assets that are long-lasting as oracle will enable proper tracking as well as maintenance of the assets.

Therefore, Asset Lifecycle Management consists of many solutions that are part of Oracles E-Business Suite Financials family of applications (Susan, 2001). Customer relationship management is yet another application that is needed to support oracle. Oracles integrated Customer Relationship Management (CRM) solution is a set of applications that give the company information-driven sales, service, and marketing since it is built on an open, standards-based architecture that streamlines business processes, improves data quality, and allows all key divisions to draw from the same source of data. With Oracle CRM, century 21 real estate agency owns the single best tool for customer success as well as accurate information. Likewise, Oracle supply chain management is an application which integrates and automates all key supply chain processes, from design, planning and procurement to manufacturing and fulfillment, providing a complete solution set to enable companies to power information-driven value chains. Century 21 real estate Company can anticipate market requirements and risks, adapt and innovate to respond to volatile market conditions, and align operations across global networks. In the same way, a unified data model provides a single, accurate view of the companys entire supply chain. Hence, century 21 Company can implement lean, demand driven principles and manage their increasingly complex and global supply chains. It is imperative to note that, when Oracle Supply Chain Management runs on Oracle technology, the companys speed of providing services and the company performance optimized and streamlined (Thomas, 2005).

Application interface
Oracle e-business suite use open interfaces for its applications. Open interfaces therefore includes oracle payables, oracle general ledger, oracle receivables, oracle assets, cash management, inventory as well as purchasing. Oracle general ledger refers to the section of the budget chapter that is responsible for uploading budgets. It also contains an importing journal and loading dairy rates in the user guide. Likewise, oracle payables contains credit card transaction interface table, invoice import interface which is used to review columns in a table, payable open interface as well as purchase order matching. In this way, century 21 real estate Company will be able to monitor all the transaction online without having to employ many employees to the job. In the same way, oracle receivables contains auto Invoice, Auto Lockbox, customer interface, sales tax rate interface as well as tax vendor extension. In oracle assets, there are ACE interface, budget open interface, mass addition interface and production interface which are all incorporated in the user guide to help the company manage its assets (Paul, 2000). In addition, oracle cash management contains bank statement open interface, forecasting open interface and reconciliation open interface which are incorporated in the oracle cash management user guide to help the company to manage its income. Also, oracle inventory contains customer item interface, open item interface, open transaction interface, cycle count interface as well as move order open interfaces. These refer to the inventories in the manufacturing and distribution open interfaces manual. In this way, century 21 real estate Company may be able to offer all customers especially online quality services

Difference between oracle applications and the current systems
One of the differences between oracle applications and the current system is that assets life cycle management applications provides the companies which uses it ability to monitor assets during their useful life without incurring high cost. In this way, the company is able to identify possible problems and solve it in advance. Whereas, the current system require an administrator to monitor the progress of the assets manually. Likewise, Oracles integrated Customer Relationship Management (CRM) applications give the company information-driven sales, service, and marketing since it is built on an open, standards-based architecture that streamlines business processes, improves data quality, and allows all key divisions to draw from the same source of data unlike the current system in which sales, marketing as well as provision of services are conducted differently and may not be information driven. Similarly, Oracle supply chain management application integrates and automates all key supply chain processes, from design, planning and procurement to manufacturing and fulfillment, providing a complete solution set to enable companies to power information-driven value chains. This is contrary to the current system which does not automate all the supply chain processes. Instead, the current system automates some while other processes are done manually. It is imperative that century 21 real estate Company embrace oracle e-business suite, since it will realize improved performance, increases sales as well as strong advantages to assist them out compete its competitors in the market (Jorge and Thoben, 2003).

Benefits of oracle business suite
Through the use of oracle e-business suite, century 21 real estate agency may gain various benefit in their business. One of the benefits include large oracle database since the main USP of Oracle enterprise resource planning is that it is based on Oracle Database, which in itself is a market leader. Hence the company will be in a position to take advantage of the advances in the database technology which is provided by oracle e-business suite. Likewise, the company will benefit from oracle consultants. It is vital to note that, as far as the components of the suite itself are concerned, Oracle Financials is a market leader. This makes it possible for Oracle human resource management system and Payroll system to catch up very fast. So the market indications are pretty positive and the company has enough consultants in the market to redeem. In the same way, century 21 real estate agency will benefit from user interface that are user friendly. Since Oracle Applications user interface comes in two flavors, including the Oracle Forms and the Oracle Self Service Application (HTML), the previous is meant for the power user and provides incredibly quick learning curves for people from the finance and other domains. The Oracle Self Service Application is an HTML based solution and specifically caters to the global organization where Internet plays a major role (Lisa, 2001). Another benefit that Real Estate Company will realize from Oracle e-business suite is role based security. Since Oracle has been a lead the way in Database Security systems, Oracle Database is indestructible. This is due to the fact that Oracle Applications seem to gain from legacy of secure systems. Hence, it is clear that the role based security system offered by Oracle applications is one of the better security models available. Therefore century 21 real estate agency will be secure following security aspects of Oracle. In addition, century 21 will benefit from best software which cater for specific area of human resource management and finance among others.

Basing on the above analysis on e- business, it prudent to note that e-business is a vital aspect in business especially for those organizations which need to extend their market globally. Consequently, the use of systems architecture to support e-business is equally critical since it simplifies all the processes that are involved in production of goods and services. In my opinion, it is of the essence that business undertakings take up e-business system architecture so as to ensure that all their customers are provided with sufficient as well as quality products in order to ensure effective satisfaction for their customers. In this way, the companies will be able to maximize productivity and to gain competitive edge in the market which are fundamental tools of addressing the stiff market competition.

E COMMERCE

Every organisation is affected by e-business and internet will keep on being important to many organisations. It has brought so much change to the way business is being conducted and has affected every business in many important ways. According to Trade and Enterprise, 2005 p.5, the main use of internet is to search for information that will help in making decisions. Fundamentally, e-Business is used to describe the use of information and communication to business processes across the economy to reduce costs and improve customer satisfaction as well as find new markets for goods and services. There is a fundamental difference between traditional business systems and e-Business systems because according to a research by Damanpour and Damanpour, 2001 p. 16-33, many firms that undertake e-commerce projects do not appraise or evaluate them in traditional ways.

e-Business stands for electronic business. It means conducting business through the internet through buying, selling, serving customers and collaborating with business partners. It was first used by International Business Machines, IBM in 1997 during their launch of a thematic campaign.

Increase in technological innovations has pushed major corporations to rethink their business strategies in terms of the internet through e-commerce because of its new cultures and capabilities. e-Commerce is used by organisations to buy and sell parts and supplies from other companies in the globe over the internet. Examples of organisations that use the internet very conveniently include Amazon.com that sells books. There is also direct selling, called e-retailing for any commodity ranging from computer software to hardware, as evidenced by Dell computers which reported internet sales in millions of dollars.

There are however disadvantages associated with e business such as lack of security, accessing the market portion that does not use internet, initial installation costs, maintaining up do date information, and losing the live customer touch by customer care. This has however been countered by building of securities in todays browsers, along with the numerous advantages of speed, convenience and reductions in operational costs. Computer security is done through the availability of digital certificates. According to Lowson and Burgess, 2003 p. 153  163, a firm can employ a number of operational strategies that can be customized to a particular situation to offer substantial benefits in driving best practices in e-Business. According to Carter, 2001 e commerce doesnt just stand for electronic commerce but evolving commerce as well, as the web opens a whole new market for goods and services. Mofazali, 2000, p. 6. So along the methods that were used to design traditional business systems there are new emerging methods of designing e-Business systems.

REPORT TO MANAGER

Proposal and Justification for an e-Business Strategy.

e-Business has many advantages as compared to the traditional way of doing business and are measurable as outlined as follows -

Convenience 
Our customers and suppliers will be available on a 24 hour basis. This is the kind of flexibility that any business person or customer would value a flexibility that is not only based on time but space as well, as workers can conduct business from wherever they are and at their convenient time. For instance if customers could only access us for 10 hours a day, they can now do that for 24 hours a day.

Wonderful way of advertising
There is so much advertising opportunity on the internet in various sites where the public would discover a commodity or service they otherwise never thought of. Secondly advertising companies can reach us in large numbers and we will have the opportunity to choose the advertising company with which to work. If we previously spent 3000 dollars on advertising now it would only be the cost of establishing a hub.

Speed
Most of e-Business is done through information exchange by the click of a mouse. It is more useful for products such as software, music, movies, e-books, services and journals that are information intensive. The cycle time is drastically reduced online because business processes now become parallel and simultaneous rather than sequential.  Electronic Funds Transfer, EFT facilitates these transactions even faster. For instance if it took up to 6 hours to make an order, receive and pay for an item, it would only take less than 5 minutes to fill in online details.

Global access
A global market is created through the internet as buyers and suppliers are able to access each other through the internet. Additionally, the buyers have the freedom to choose products and services from anywhere in the world. If we previously had 0.05 per cent market share in the whole world, we will now grow to 1 one per cent and steadily continue growing.

Movement towards a paperless society
This has been evidenced through the reduction of depending on paper work and red tape. It involves the whole processes ranging from sourcing to ordering and paying.

The Main Changes and How They Will Be Achieved.

There are factors to be considered before implementing an e-business strategy and these include -
substantial resource commitment in developing a new game plan
redefining product lines to make them on-line saleable
upgrading of the computer systems and coming up with websites
training personnel at all levels so that they can be acquainted to the internet
hiring new staff and working with external consultants and other service providers for technical expertise.

According to Reynolds and Mofazali, 2000, p. 104, the implementation of an e-Commerce website can give rise to many performances, scalability and integration problems that only time can solve. As much as these difficulties will be faced, and looked at in terms of heavy upgrading costs and equipment acquisitions, time and workforce and future uncertainties it finally pays off. To finally enjoy the fruits of moving to e-Business, it is very necessary to keep up with current technological innovations and changes. After an e-Business implementation the following benefits will accrue -

Development of a more cost-effective communicating and marketing strategy.

This is through the acquisition of a vital web presence in which case our customers will access us from wherever they want and at whatever time that they want.

Reaching of new markets world wide.

We will gain more customers whom we did not previously have. We will get new ideas and methods of promoting our products online, and this will allow us to reach our target market all over the world.

Reaching of local customers and prospects more effectively
More and more people are becoming comfortable using the internet and moving away from the traditional sources of advertising. Thus if our organisation has an aggressive web presence, we will make better business sense for our local customers. This gives a leeway for developing new markets further.

Cutting of advertising and marketing costs.

Online advertising is more efficient and less expensive than traditional advertising. It even reaches more people. We may argue that there is that population that has no access to internet but access to internet is something that is happening at an increasing rate. More people access the internet today than they did yesterday and more still will tomorrow. Secondly, sales training can be substituted for online seminars through training videos and tutorials as opposed to expensive hotel bookings for trainings.

Streamlining some processes
These include processes such as ordering through taking of online orders by implementing an online ordering system that allows one to do away with manual paper work or ordering through the phone. Secondly, our sales can be integrated with fulfillment of orders and delivery to customers thus speeding up the process.

Cutting of communication and telephone costs.

Our company will drastically reduce communication costs as well as paper letters, which would be totally eliminated. We will further implement live help where there will be a support or sales staff online on a 24 hour basis. Customers would be able to chat and get immediate assistance. We could also develop Voice Over Internet, VoIP which should completely change the face of services through the telephone.

Traditional business systems are still in use. However, they are not entirely appropriate for e-Business systems and so there is need for different development approaches for e-Business systems projects. There are however those systems that would still be useful for a successful transition from the traditional methods to the current e-Business. These methods encompass the three primary processes that are enhanced in any business whether traditional or electronic. There are as follows -

Production processes 
They are processes whose objectives are to create goods and services that meet the customers needs and wants. They include sourcing, procurement, ordering systems, replenishing of stocks, processing of payments, electronic links with suppliers, and production control processes. Traditionally, these are done through paper work and sending of physical correspondence with the help of telephone calls. The formats for traditional documents can be used for creating online documents for e-Business.

Customer-focused processes
These include sales and marketing and promotional efforts, internet selling, purchase order processing and receiving and making of payments, as well as customer support. These types of processes may not necessarily help in the generation of e based processes for instance live chat is only possible through e-Business.

Internal management processes
These include services by employees, training, communication, recruiting video-conferencing, and recruiting. Through electronic applications information flow between production and sales forces is enhanced and helps improve sales force productivity. Other methods include workgroup communications and electronic publishing of internal business information are, which are also made more efficient. Previously these processes were done through physical meetings so as to co-ordinate as there were no electronic systems.

Harmon, Rosen, and Guttman, 2001 p. 68 shows how business models need to be revised and business processes redesigned through computer architecture. It is necessary to have systems for developing e-Business at a fast rate. Traditional business systems had methods for developing them and they may not be appropriate for current e-Business. It is therefore necessary to do a research and see if these systems can work just as well. According to Gerald, King and Datchek, 2002, p. 302, there is need to shift from the traditional company view to moving up to a higher level of the enterprise view. Electronic business poses significant challenges for organisations as it affects the market, competitors and many activities. Gottschalk, 2006, p. 39. so again this shows that there is a necessity to upgrade methods for developing business systems and especially of electronic nature.

It is easy to integrate traditional business systems to e-business systems and gradually adopt a fully operational e-Business system. Kalakota and Robinson, 2004 p. 187. However, there is need for an upgrade as previously mentioned by Gottschalk, 2006.

Research Question.
What is the necessity of developing new methods for e-business rather than using the same methods that were used for developing traditional business systems, and what are these methods.
Necessity for change and the new methods

E-business research is currently one of the most actively researched areas due to the rapid advancement in information technology. e-Business applications have however advanced beyond traditional business transactions and services. They have come up with other systems to cover customer relationship management, CRM which was previously not there. Lee, 2008, p. 47. There are fundamental business processes that create any business and they have to have a basis for even transition from traditional to modern e-Business. Information systems integrate and support organisation wide business processes and functions from marketing, manufacturing and even human resources. These are shown as -

Production processes 
These include computer integrated manufacturing, CIM that automate many of the activities that are needed in manufacturing. e-Business is aimed at increasing response speed and reduce production costs. It then requires quantitative analysis methods to cover both physical and information flows within a production system. These methods need various techniques and modeling tools as opposed to traditional business systems that were based on observations and instant decisions as opposed to quantitative research.

Customer-focused processes 
It is important to note that retailing through the web is most appropriate for well-defined products and services and that are widely known. There are processes that make customers active participants in the marketing process as opposed to traditional business where the sales and marketing team looked for the customers and persuaded them to buy. Through this system, customers are empowered as they trade in friction-free market. AS opposed to traditional methods, organizations wishing to tap into the online friction free market need to develop methods in which to approach customers and communicate their value propositions online. This then calls for online tools such as questionnaire and surveys that may not be supported by methods that developed traditional business.

Internal management processes 
Carter 2001 points out that developing a successful  e-Business system require combining a unique set of business development skills as well as computer science. These involve the traditional business processes as well as new ones. It is prudent to ensure that web strategies are linked to business strategies for internal management processes to succeed.

Damanpour and Damanpour, 2001 p. 16-33 further cite three critical success factors for e-Business. These include creating a consumer-centric strategy for customer processes, embracing outsourcing for improving performance in business processes and use information management to differentiate your products. They also mention how some companies deal with security on the internet and advise that a strategy must be developed to avoid reducing returns on investment, thus making e-Business an attractive strategy to do business.

Since every business is unique, it requires unique e-Business solutions. That is why it is prudent to look at the business orientation of a company before suggesting an e-Business strategy. Businesses range from advertising companies to suppliers of various goods and services. It is also important to note that the size of the business also matters so for those businesses that will not have in-house resources it would be recommended for them to outsource though finding an e-Business solution provider.

SECURITY ISSUES IN E-COMMERCE

Security concerns are eroding internet users confidence and bringing a chilling effect on their online behavior. The startling rise in phishing attacks, spyware intrusions, virus infections and the compromise of personal data, have limited e-commerce activities of internet users. This paper is going to look at various security issues in E-commerce. It will look at vulnerabilities that have surrounded the e-commerce users and curtailed their level of involvement in this highly upcoming market. The paper also looks at the various defense mechanisms that can be used to restore sanity and provide possible solutions to insecurity issues in e-commerce.

E-commerce refers to the exchange of goods and services over the internet. It consists of buying and selling of products or services over electronic systems such as the internet and other computer networks. The widespread internet usage has enabled the amount of trade conducted electronically to grow extraordinarily. The aspects of e-commerce include E-tailing or virtual storefronts on websites with online catalogues, the gathering and use of demographic data through web contacts, Electronic Data Interchange (EDI), the business to business exchange of data, email, business-to-business buying and selling, the security of business transactions among others (VanKetel  Tim, 2009).

E-commerce systems are also relevant to the services industry, which include online banking and brokerage services which allow customers to retrieve bank statements online, transfer funds, pay credit card bills, buy and sell securities, get financial guidance and information among others. Internet commerce applications have been threatened by continued stories of hacker attacks on e-commerce sites and abuse of consumer data privacy. This increased lack of security, may cause business operators to revert back to traditional methods of doing business. The customers computers  network and the business servers network are vulnerable to insecurity issues. Information flow is no longer immune to everyday break-ins, theft, fraud and vandalism. In order to counter this trend, network security issues at the e-commerce and customer sites must be constantly reviewed and appropriate counter measures developed (Marchany  Tront, 2002).

Background Information
Insecurity in e-commerce has been very alarming they follow right after violent crimes in the news. Rampant news about an attack on a major website where sensitive information is obtained, have been on the increase of late. This leaves us to wonder why e-commerce has been such vulnerable. The reasons that have been given by the majority of the people are that e-commerce exploits incentives are a bargain compared to other illegal opportunities. The tools necessary to perform an attack on the internet are fairly cheap compared to other crimes like robbing a bank. The pay off of a successful attack is unimaginable. A penny from every account at any one of the major banks will easily amount to several million dollars. This knowledge has left the use of e-commerce vulnerable to hackers of which immediate steps are required to be undertaken in order to counter these crimes (Khusial McKegney, 2005).

Another reason that explains why e-commerce is such vulnerable to insecurity issues is the fact that web application developers are often not very well versed with secure programming techniques. Security of the application is thus not one of the design goals of those applications. It has been occasioned by the urgent need to meet deadlines in the fast-moving e-commerce world. A delay in publishing a new feature on your website could allow a competitor to steal a march over you. The attitude is thus to put the functionality online, and issues regarding security can be dealt with later on.

In most shopping carts and online payment systems, they tout their 128-bit SSL (Secure Socket Layer) certificates as proof that their sites are well secured. The gullibility of customers to believe in this has reduced over time as experiences have taught them differently. There still exists thousands of websites displaying Thwart certificate icons as proof of their security. Any system has to meet four basic requirements that are basic principals for customer security privacy which entails information being kept from unauthorized parties, integrity where information is not tampered with, authentication which requires both the sender and the recipient to prove their identities to each other and non-repudiation which is a proof that the message was indeed received.

Threats to E-commerce
According to Marchany  Tront (2002) the standard client model has three components the server system, the network and the client system. Server systems such as Window NT and Windows 2000 are slowly replacing mainframe operating systems such as MVS, VM or UNIX. The network component includes the internal business network. It is the path between the business and the customer through various Internet Service Providers and the customers internal network. Client systems are usually PC (Personal Computers) or Macintosh systems which run their respective window 9X, NT, W2K among other operating systems. E-commerce security strategies mainly deal with two issues which are mainly protecting the integrity of the business network and its internal systems and also accomplishing transaction security between the customer and the business. There are various tools that businesses use in order to protect their internal Network.

Security Attack Methods
In order for us to identify measures that should be put in place to deal with the issues of insecurity in e-commerce, it is vital to look at the potential methods which an attacker or hacker uses. The vulnerability of a system exists at the entry point and exit points within the system. There are several points which an attacker can target, which includes the shopper, shoppers computer, network connection between shopper client and websites server, website server and software vendor among others. In these points, the attacker can trick the shopper, scan the workstation of the client, snoop the network, attack the server, or else attack the software vendor to produce rogue programs (Khusial  McKegney, 2005).

Tricking the Client
The easiest and most profitable attacks are based on tricking the shopper. The attacks involve surveillance of the shoppers behavior, gathering information to use against the shopper among many others. If the client is tricked into giving away the password once the challenge question is provided, the site is compromised and it is very likely that the client used the same logon ID and password on other sites which the attacker can now access. The attacker as an alternative can use the logon details of the client as personal information, in order to change details of the account of the client for his favor. He will only call the website administrators and pose as the client. Other tricks include phishing schemes where the attacker plays on the names of famous sites. He collects authentication and registration information when a client mistypes the real sites name and mistakenly enters the attackers site (Perez, 2005).

Snooping the Clients computer
Most computer users have limited knowledge of security vulnerabilities of their computer systems. They connect with the internet and shop for software in the internet. Most software vendors ensure their products are easy to install by disenabling their security features. The client will in most cases not bother to install the security features which will create a treasure trove for attackers. According to Khusial  McKegney (2005) tools such as SATAN is used to perform port scans on a computer that detects entry points into the machine. The attacker can use various techniques to gain entry into the users system based on the opened ports found. They can easily scan the file system to obtain personal information that will lead them to their end.

Sniffing the Network
The attacker is able to monitor data between the clients computer and the server. He collects data about the client, or steals personal information, which may include passwords, credit card numbers and other important personal details. It is impractical for attackers to target the middle of the network as their attacking point. This is because a single request by a client to a server is broken up in small pieces (packets) as it leaves the clients computer and is reconstructed at the server. It is almost impossible for an attacker to access all the packets in the middle of the network which leaves them with the option of targeting near the clients computer or server. It is normally easier to use the clients computer end since most clients ship their wireless hubs with security features disabled. The attacker can thus scan unencrypted traffic from the users computer (Khusial  McKegney, 2005).

Denial of Service (DoS) Attacks
This involves getting the server to perform large number of mundane tasks, which exceeds the capacity of the server to cope with any other task. A smart hacker gets the server to use more computational resources in processing the request, than he does in generating the request. It is used in popular sites where the hacker infects computers on the internet via a virus or other means. The infected computer becomes slaves to the hacker which he can use to bombard the target server with useless but resource consuming requests.

Viruses and Trojan Horses
Viruses are the most publicized threats to client systems. The insecurity of the client system makes the viruses effective. Subverting a PC will only require access to the system and no special privilege is needed to write data into sensitive system areas. The viruses once in the system will destroy the users files. Trojan horse programs which include Netbus, BackOrifice and others can allow a hacker to control, examine, or monitor any information on the target PC. They are also able to use the target PC to send information to the net as if the legitimate user has done it. Trojan horses are thus used by hackers to develop forgery, data modification and eaves dropping (Marchany  Tront, 2002).

Guessing Passwords
Attackers also can guess a users password either manually or automatically by the use of electronic devices. Automated use of password proves to be more successful than the manual, which is only carried out when the attacker has vital information about the client. Other methods which are used by hackers include use of known server bugs and use of server root exploits. As technology improves, newer methods of attacks are being developed. This implies that businesses have to be proactive in designing counter measures against these schemes and practices which swindle millions of dollars in the business world (Marchany  Tront, 2002).

Defense Mechanism Tools
Despite the existence of hackers and crackers, e-commerce can remain to be a safe and secure activity. Resources which are available to companies that are involved in e-commerce are enormous, and as such they will pursue every legal route to protect their customers. The people who use the business system should be well educated. Education will also be the only way to ensure that customers take appropriate precautions. The precautions will include, installing personal firewalls for the client machines, storing confidential information in encrypted form, the stream can be encrypted using the SSL protocol to protect information flowing between the client and the e-commerce website, using appropriate password policies, firewalls, and routine external security audits and using threat model analysis, strict development policies and external security audits in order to protect the software that is running the website (Khusial McKegney, 2005).

Personal and Server Firewalls
A firewall ensures that requests can only enter the system from specified ports. It ensures that all accesses are only from certain physical machines in some cases. It is a common technique where a demilitarized zone is set up using two firewalls. The outer firewall has ports open that allow ingoing and outgoing HTTP requests. This only allows the client browser to communicate with the server. The second firewall sits behind the e-commerce servers. It is greatly fortified, and only requests from trusted servers on specific ports are allowed through. They both use intrusion detection software to detect any unauthorized access attempts. A honey port server is also used its a resource which can involve a fake payment server, which is placed on the demilitarized zone in order to fool the hacker into thinking that he has penetrated the inner wall. These servers are closely monitored and any access by an attacker is detected. When a computer is being connected to a network, it becomes vulnerable to attack. A personal firewall helps protecting the computer by limiting the types of traffic initiated by and directed to the computer (Khusial  McKegney, 2005).

Use of Secure Socket Layer (SSL)
This is a protocol that encrypts data between the Clients shoppers computer and the sites server. When an SSL-protected page is requested, the browser identifies the server as a trusted entity and initiates a handshake to pass encryption key information back and forth. On subsequent requests to the server, the information flowing is encrypted so that a hacker sniffing the network cannot read the contents. The SSL certificate is issued to the server by a certificate authority. In the procedure, the client sends a message to the server, which replies with a digital certificate. The server and client negotiate to create keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates (LitLangs, 2010).

Digital Signatures and Certificates
According to LitLangs (2010) digital signatures meet the need for authentication and integrity. In this case a message is run through a hash function and if given a value the message digest. This digest, the hash function and the plain text which is encrypted with the recipients public key is sent to the recipient who decodes the message with the private key. He runs the message through the supplied hash function so as the message digest value remains unchanged which shows that the message has not been tampered with. The message is normally time stamped in most cases by a third party agency, which provides non-repudiation. A customer is able to know that the website receiving sensitive information is not set up by some other party posing as the e-merchant since they can always check the digital certificate which is issued by the certification authority. This certificate uniquely identifies the merchant.

Password Policies
It is fundamental for the company and the clients to ensure that password policies are enforced for shoppers and internal users. Issues such as number of attempts on account lockout threshold should be limited in order to prevent minimize the chances for hackers who guess passwords. The strength of the password should be looked into by setting the minimum length of password. The Federal Processing Standard recommends six characters. One may choose to have different policies for your clients and also policies for internal users. The policies should ensure that the passwords are sufficiently strong enough such that they cannot be easily guessed. The account lockout capability ensures that an automated scheme cannot make more than few guesses before the account is locked (Perez, 2005).

Intrusion Detection and Audits of Security Logs
An effective security system will prevent attacks and detect potential attackers. This helps in understanding the nature of the systems traffic, or a way in which the attackers can be brought to book and measures taken against them. The system should communicate to the client once a suspicious transaction is about to take place. The account should be closed and notification made to both the client and the systems administrator. The event can also be written to a security log. Any attempted unauthorized access to the system should also be logged. This will occur when a user attempts to use resources that he is not allowed to use, or perform actions that he is not allowed to perform. This indicates that the account has been co-opted and should be locked out. Business auditing should be used in addition to security logs, in order to monitor activities such as payment processing. This should also be done in order to detect patterns of inappropriate interaction at the business process level (Khusial  McKegney, 2005).

Regulation, economic issues, and privacy co-design
According to Ackerman  Donald (n.d.) there are various government attempts, by law or decree, which directs regulation of the e-commerce environment on behalf of the citizens. It has also included emerging legal precedents and case law for governing privacy in cyberspace. In the US, privacy is largely a matter of economics with the admonition that caveat emptor is the rule for consumers. All right to data is lost by an individual once heshe has provided it to an e-commerce or anyone else. The consumers are thus left with no recourse, which has resulted in loss of trust. Companies use the data supplied by their clients, which include selling it to third parties for subsequent reuse. There are some specific areas of greater protection which include medical records. The Federal Trade Commission that regulates the consumer and inter-state trade in the US has taken upon itself to take privacy cases to court.

In the European Union privacy rules are strikingly different. Europeans must unambiguously give consent after being informed as to why the information will be used. In Europe, consumers must be told of the entity collecting the data, purposes of the processing, recipients of the data, and the rights the customers have over the data. This has developed trust in European consumers and if the privacy issue is well developed in the US, a lot can be achieved in making e-commerce successful (Ackerman  Donald, n.d.).

Recommendations and Conclusion
The US congress should pass legislation to bolster online privacy protection. This will ensure that websites that interact with consumers will give a notice defining privacy policies, a choice of how the information collected by the site is used, the scope of access of data by an individual and assurances that the data is secure.

It will also be vital for the government and private sector to ensure that the consumer is well educated on security issues. Training programs, orientation programs and other programs should be developed in order to increase the general populaces awareness of security in the internet. It will also be vital for the IT and the financial controlaudit groups within the e-commerce site to form an alliance, which will overcome the general resistance to implementing security practices at the business level.

To restore consumer confidence, the customers and businesses should ensure that the defense mechanism highlighted in this paper are well developed and properly exercised, so as to ensure that hacking and cracking of systems is no longer prevalent in the economy. It will also be worth mentioning that technology should be well used so as to counter new techniques which system hackers and crackers use. The use of proactive measures will be beneficial to companies, consumers and the government, in predetermining possible areas of weaknesses that can be target areas for hackers and crackers.

A Study on the Customer Protection results from e-Commerce

More and more consumers are using E-commerce in every imaginable way because of its flexibility and interactive nature. From booking flights to shopping for items and gathering information on insurance, the internet is being harnessed in every way possible. However all the information available may not be incredible and how far it is endangering the customers and how much they trust this information and advice is questionable.

A consumer international, a research based company has developed a project that spans 13 countries and 460 websites. They have suggested a definition for credibility for online information based on the findings of the research.

The study reveals the following information.

When it comes to the internet consumers need to be cautious while making use of the available information. In order to make judgment on the value of the information the consumers need to know

The background of the website, ownership details, the partners if any and also sponsors information.

They have to investigate the quality of the information provided like whether it is authentic and comprehensive, and also the authority of people providing such advice.

If they are seeking information then they have to make sure if the site is devoid of any commercial interests and if they display links what is the coexisting relationship.

Are they required to furnish personal details, what is the site going to do with it and whether the information being provided is safe

Several sites on the internet today are not well equipped to provide credibility in these areas and in the end they leave consumers misguided and put them at potential risks. Also the consequential results of following misleading and exaggerated advice could waste time and money and prove to be detrimental. The study on consumer protection calls for action on the businesses part to provide information that is transparent and reliable to win the consumers trust. The government should also participate in confidence building of the consumer by exercising more stringent laws on cyber safety. Consumers as of now can take full advantage of the internet tools like compare prices while shopping, get great deals and benefit from the offers. Consumers at the same time should also be able to find reliable source of information and find reliable retailers who will honor their commitment.

Ecommerce

With adoption of technology in business, operations are running smoothly thus benefiting almost everybody (Bijan Fazlollahi. 2002). Electronic commerce has such benefits like banking or shopping any time and anywhere and elimination of middlemen. Sellers are also able to advertise their products easily through the internet targeting the right customers. In a nut shell electronic commerce or technology in business benefits both the sellers and the buyers.

Gold peak industries is a multinational company which concentrates on new product development and business to business electronic commerce in more than ten countries. The company aims at providing quality product and services to the customers, and also ensures that reliable and value added services are delivered to the customers. Gold peek industries use the latest technology so as to develop the latest products which will be competitive in the market and will result to customers being loyal and establishment of long-term relationship. The company uses technology to make sure that significant information is available to the customers like the production status of the company and shipment, the company profile, product catalogue, account summary and also the sales made. The company has developed ecommerce sites which are used as marketing tools for the company (Bijan Fazlollahi.2002).

On the other hand the company has some short falls in its operations because it is experiencing the problem of getting the right manpower since it is hard to get a person experienced in information technology and at the same time has industrial know how. The other problem experienced is that online banking services cannot be conducted in Hong Kong because the banking services are not comprehensive enough. The business also experienced a technical problem with the electronic system which was developed with an online payment feature and thus due to this problem it the online payment was scrap. Development of local business to customer businesses was inhibited because there was lack of maximum liability to support credit card transactions.

The companys aim is to gain a competitive edge in the market and for this reason it should concentrate on it strengths and at the same time work towards ironing out its weaknesses. It should make sure that the customers get the best value added products and services so that it will build a good brand name which will make the customers to be loyal, give the company a competitive edge and at the same time earn more profits. In order for the company also to get the right manpower it should train the employees to make them conversant with both information technology and industrial know how.

The company should adopt the electronic commerce wallet which is a payment method that helps in managing payment instruments. It helps the businesses or consumers to pay online accurately and conveniently (Bijan Fazlollahi.2002). This is done by storing the users debit or credit card, electronic cheque and addresses securely in the wallet for use. By use of electronic wallet online purchasing of goods and services has been made possible. The company should also adopt a good robust infrastructure system for finance and technology so that it will compete effectively in electronic business industry. In order also for the company to ensure online banking which is a success factor to many businesses, it should make sure that it has maximum liability.

In conclusion, the above information analyses the gold peak industries giving the strengths and weaknesses of the industries. The information also gives recommendations on the right marketing strategies and technology to be adopted to make the company have a competitive edge in the market.

International Business eBay in Asia Risk for Finance Professionals



There are various cultural and financial risks for E-Bay in Asia. The financial manager faces the major problem in the form of exchange rate risks. The cost of procurements and the cost of the final product might vary from the destinations these have been purchased or sold. This has impact on margins, which is minimized using different financial tools.

There are various financial risk experienced by thousands of finance professionals with interest in the Asia-Pacific region. E-Bay is one of these.  The financial manager needs to deal with different local and level of national banks and financial institutions like Investment banks, Regional and local banks, Private Banks, Insurance companies, Brokers, Law Firms and Consultancies.            
                           
Finance officer bear the administration cost, revenue cost due to exchange rate. The level of acceptance of e-commerce like e-bay is very less in many of the Asian countries due to low level of penetrations of internet and computer knowledge.

Internet is still used for communication purpose and it is not perceived as a proper mode for shopping experiences. People usually not enjoy shopping through internet. They feel internet shopping is not safe at all, so they prefer to go market and purchase whatever they want. However companies like E-Bay are making the shopping a fun experience for their consumers by introducing bidding into the same (Ihlwan, 2010).

There are various risks from culture to the exchange rate that affects the business operations. The growing numbers of internet users on one hand are increasing the hope for expanding market whereas current shopping behavior of consumer does not recognizes the e-shopping as major solutions for their needs.
Setting of a new offices and starting the new operations needs to be within the regulatory frame work of the respective country. The finance officer needs to look at these issues for the organization before making the financial investment decisions.

Amazon

What are the advantages and disadvantages of selling books and goods over the internet
The globalization of the world and modern day technology has made it possible to carry out complete businesses online. All the tasks of handling a business can be carried out online. Likewise, books are also traded, sold, and bought online. The biggest site for online book buying is Amazon. There are certain disadvantages as well as advantages of selling goods online.

The advantages of the online book selling business are that first of all the buyer gets to browse through millions of books and read reviews. The buyer can get any book he wants from a single place. He does not have to wander from shop to shop.  The ease with which a book can be found from the huge database is a plus point. The user simply enters the name of the book, or author name and the book, its description along with its different editions is displayed. The system of payment and delivery is also simple and fast. Books can be bought through a PayPal account or a credit card number. People are more accustomed to trusting online trading. Another advantage of online selling is that the store is open 24 hours. The look of the site can have a great influence on the image of the store. A professional look of the site portrays the image that the site is not a spam and we are here to do business.  (Bragg, 2007)

The disadvantages of online bookstores are the hidden costs that are attached to the shipping process. Buyers get very annoyed with such costs and dont buy frequently. Another disadvantage of selling online is having the fear of not being able to handle the computer operations. The frequent cost of maintain a website is a disadvantage. A lot of time and effort is required to direct a site to the intended customers. The owner has to give a lot of time to sort out the books and orders that are placed on daily basis.  (Bragg, 2007)

If books can be downloaded online, how will Amazons business change
The downloading of online books will affect the business of many bookstores like Amazon. Their business will go in great lose as one will want to buy a book. Everyone would prefer to download it to save a few bucks. To avoid this, Amazon has already a membership fee that has options of downloading in a limit. The fee although is quite expensive. If books were available free online, bookstores like Amazon which depends upon buying and selling of books would simply go out of business.

Amazon has come up with a solution for such a situation. It has designed Kindle. This enables users to not only buy and sell books but also subscribe to major newspapers and magazines. By this the traditional way of online selling is transformed. Books will no longer have to be shipped. This will save the site some money as well.  (NewsWeek, 2007)

What do traditional stores have to gain from setting up an e-commerce side to complement their retail stores
The pleasure of buying books from traditional stores is unbeatable. Many people still want to buy books only after they have personally viewed its condition and contents. This experience is missed in online shopping. To provide a personal feeling, traditional stores have showrooms and advertise their books that can be bought online. This gives them the advantage of selling books both ways. International customers also benefit from their favorite bookshop in this way. E-Commerce reduces the facility and employees cost.  (Neowave)

E-Business Automates

The emergence of computers in the commercial world has seen revolutionary changes in the way business processes are accomplished. The internet and the World Wide Web have to a large extent enabled traditional business processes to be conducted seamlessly over distant geographical locations.
Elaborate e-commerce systems handle various processes of the transactions including enquiries, ordering and order tracking and payments. Traditionally these transactions were accomplished by human resources. But with the advent of electronic commerce systems, the computer systems have replaced the human resource.

E-Business Informates
Business processes automation also result into a different concept. The machines that translates electronic signal into action may also register data about that process thus generating new streams of information. Such information may include Model of the machine that accomplish a task, various time-stamps on which a certain process occurs and duration of a process. Such information may trickle down to lower levels and may even land in the wrong hands. With so much information in the wrong hands, the system becomes vulnerable to external attacks or manipulation.

For example, computer-based, numerically controlled machine tools or microprocessor-based sensing devices not only apply programmed instructions to equipment but also convert the current state of equipment, product, or process into data. Scanner devices in supermarkets automate the checkout process and simultaneously generate data that can be used for inventory control, warehousing, scheduling of deliveries, and market analysis. The same systems that make it possible to automate office transactions also create a vast overview of an organizations operations, with many levels of data coordinated and accessible for a variety of analytical efforts. (Zuboff, 1988 p. 9)

ICT has enriched work for many people instead of deskilling them or making them redundant
The primary concern that arose with emergence of computer systems at the work place was the imminent unemployment. It was to later be realized that unemployment was not to be blamed on automation. Laying off human resource whose tasks were executed by emergent systems was more of economical politics in organizations.

With the advent of business processes automation, there arose rewarding employment opportunities to those who would sustain the technology. Such professions as Internet security professionals arose. In addition, it opened the traditional boundaries set by geographical and social economic factors.  Today, a small firm in Africa can buy equipments in Europe at the click of a button.

Poorly structured e-electronic commerce systems frustrate users.  It also results to tedious and ineffective services. If for instance an online stores order now link is malfunctioning, it results to inconveniences to all the customers who use it. This results to bad company image and may lose clients.

Privacy Online
Online banking has gone a long way in easing access to your finances regardless of your geographical location. With billions of dollars and pounds changing hands over the internet, more and more cyber cash crimes are being reported.

Despite the challenges, large transfers of different currencies are exchanged over the internet day in day out.

People are scared of the safety of their transfers but they hope that their transactions wont be intercepted by malicious hackers.  The banking industries, aware of the risk they have to face have in return invested in elaborate technological and security measures. Owing to the vulnerability of their transaction, they build secure private networks with high levels of security implementations.

While online banking scares are real, they are should not hinder online money transfers. In essence, they are as hard to occur and might require a genius to intercept the communication leading to eavesdropping.
In events of breaching of privacy leading to exposure of a clients details or loss of cash, the safeguards and penalties are not enough. A banking system that is vulnerable to cyber cash crimes results in customers having little confidence with the bank. In cases like these, banks come up with compensation schemes which are in no way effective in winning back the confidence of the customer. Much more should be done to enhance the security of banking transaction online. Cyber cash crime policies should be stringent and elaborate.  Governments, which have the collective roles of creating enabling infrastructural environments should set standards and well outlined policies to govern the online banking transfers.  Unfortunately, just but a few governments have put in place measures like these.

Virtual Organizations
Modern web based technologies have led to emergent concepts arising from inter-linking markets.  As such online commerce leads to customers accessing markets that are far geographically separated from what they would physically access. A web based store reflects what is stocked in a store somewhere. A vendor just places an advert on an online page in the virtual organization. A client just need to access a web page and enquire, order and the rest is implemented in a shopping cart manner.

Virtual organization have there advantages and disadvantages. Many have come up and disappeared, often with clients orders- fully paid. This infidelity has led to increased caution when dealing with them. Users need more assurance that the service they are paying for will be delivered in the right and agreed form.  With little legal constraints, accountability in a virtual organization transaction becomes an issue of concern.

Putting in place stringent rules and prequalifying approved virtual organizations would be a great leap to the fore for online buyers and sellers.  Governments and policy makers should lay down appropriate policy that will govern the way the transactions are conducted on the virtual organizations. So doing there will be end to end assurance that transactions are safe and reliable.  Setting stringent rules and standards as well as assurances that they can sustain and be accountable for their malpractices should be prioritized.

Unfortunately, in the present virtual organizations remain at your own risk business entities. With increased incidents of social engineering, it remains an activity so insecure and vulnerable. People from as far as Africa buy from e-bay based on trusting that everything will be fine. However they dont know who to complain to.

Usability of Web System
The implementation of technologies running over the internet has been a challenge to the world of developers. For a long time balancing between the fuss that is the technology running beneath and the aesthetic value that would make the system workable for a lay man whose eyes react to beauty easily  has proven to be an uphill task. However, that has been addressed by emergence of scripting languages like java script, DHTML, PHP, ASP etc.  Web based distributed system now implement aesthetic menus as friendly as the vista buttons and which add to the aesthetic appeal of a system.

A poorly designed website with many navigations will take too much of a prospective customers time. They will spend too much time looking for an item as opposed to the time they might be having. If a website has many malfunctioning and error prone links, they repel the user. If a web page keeps on submitting a page in error the customer might lose patience and seek an alternative source.

Adapting user friendly design strategies in earlier stages of system analysis and design would help address the problems arising from poor planning and design implementation. Some web based systems have a high latency arising from poorly optimized data base tables.  Ensuring that the design strategy address optimization to the database tables is important.

M-Commerce
Mobile commerce describes the phenomenon of obtaining business services ion mobile devices.  Including mobile phones, PDAs, blackberry etc. Wikipedia describes it in the following terms Mobile Commerce is any transaction, involving the transfer of ownership or rights to use goods and services, which is initiated andor completed by using mobile access to computer-mediated networks with the help of an electronic device

Due to the ubiquitous nature of mobile services, m-commerce is gaining popularity. Streamlining and putting the necessary regulations in place is necessary in the industry.  With increased access to mobile devices a move to regulate the industry by putting in place proper regulatory step would make the technology trustworthy and reliable.

M-commerce has been successful in poorer countries due to the following
mobile devices are relatively cheaper than computers which are used in developed countries
the GSM and CDMA technologies are relatively pronounced even poor economies
they are relatively easier to use as opposed to distributed web based systems
banks and financial institutions have stringent banking requirements and regulations
The future of m-commerce is brighter in this age due to the fact that mobile technology is rapidly growing.

Other reasons for its growth include the fact that mobile devices are mobile than any other equipment in market today and have functional ability rivaling the microprocessor.

M-banking is in no way a threat to mainstream banking. Banks that seize the opportunity and partner with m-banking services providers will benefit from easier utility services e.g. cash transfers between accounts, deposits, withdrawals and others like standing orders payments. M-banking is strongly complementing standard banking which is rather inconvenient or demanding especially in the third world.

E-Business Development
Unlike in traditional business that was based on a buyer and a seller meeting in the market and exchanging goods and services with cash, e-business  emphasizes on a buyer and a seller, wherever they maybe exchanging services or commodities over electronic medium e.g. the internet.   However, the systems of business are quite different when it comes to the e-business. A computer hardware company in United States can have its assembling industry in Malaysia and its headquarters in New York. Sales department maybe located in the US while production is done in the Far East. This is because, e-business has become ubiquitous unlike the traditional business where the buyer has to meet the seller at the market place.

Therefore stronger emphases need to be applied in the ensuring that quality assurance, shipping and secure payment methods are in place to make the trade a success.

Unlike in the traditional business processes where the buyer and the seller settles the deal at the market place, in e-commerce the process is quite different because the buyers sees the product only after it has been shipped overseas.  This requires that the requirements cited above be met.

Online Communities
Online communities have been a great success in the recent past. Many successful companies in the world have resulted to creating online communities as a marketing tool across the globe.  Users register in forums such as training and support and in return the companies market their products. E-bay and Amazon enjoy relative popularity the world over for the services they offer virtual markets. They make it possible for people from different corners of the globe to interact in various business processes like ordering, paying and shipping. All these processes are comparable to the real markets and often at a fraction of their cost.

Unlike the ordinary communities in our lives, online communities comprise of people who hardly know one another. They may have or never have met but they all belong to that community. Online communities are not demarcated by borders political or otherwise. To live in an online community, one does not have to have formal documents like national identity cards etc. and most of all, online communities comprise of people of similar interest.

In the context of online communities, we broadly describe them as a group of telecommuters who have a certain interest in common and share the same infrastructure over the internet to meet their needs.  It has greatly changed our perception of the community in that communities no longer describe physical residents who share a neighbourhood.

Government Promotion of E-business
E-business caught the world unawares, or so I suppose. Mostly so because, very few policy makers had an idea what was going on in the internet world and for a long time, they thought of the internet as a place where computer geeks come to exchange wits and invade computer systems. For a moment, internet was for office solutions e-mails and file sharing. Revolutionary e-commerce shyly became a reality in the 90 and vibrantly burst into scenes in the early 2000s.

E-commerce is facing challenges of plausibility in that it lacks clear cut regulations governing its processes despite being ubiquitous. Thus, it suffers from lack of credibility of end to end delivery of the process. Governments have been involved in formulation of strategies and policies due to their natural control over cyber space through statutory bodies like the Communication control commissions.  Their input is necessary for legislation purposes. A policy affecting national economies is better addresses by the governments.

Mobipocket.com Overview

In the city of Paris in France, 10 years ago in 2000, Mobipocket saw light. This was the result of the collaborated efforts between Nathalie Ting and Thierry Brethes in order to fulfill the demand of an e-book reader that is secure and is also compatible with Palm OS, Symbian, Blackberry, Java Me and many other PDA operating systems. In the early months of 2000, the first version of the reader was introduced. Mobipocket succeeded in gaining a reputation of an innovative enterprise by introducing a new technology to a sector that was suffering from obsolete methods. In 2005, the company was acquired fully by Amazon which was believed to be a strategic decision to answer the Adobe systems to cease updating and supporting its e-book software and package. Today, with a concentrated strategy and a new owner, the company is selling different types of e-books as well as creating innovative and secured readers for the e-books. However, the company takes of Paris as its main headquarters.

The main website of Mobipocket,  HYPERLINK httpwww.mobipocket.com www.mobipocket.com, is a web 2.0 application and is dynamic in nature.  The website is developed with ASP in order to give the user an interactive experience with the interface. The concepts of marketing efforts have been changed by the internet. A successful marketing effort today means having a high traffic of online visitors and a high ranking on Google and other famous search engines. The wellness of Mobipockets indexing can be revealed by a simple search on Google for e-book readers. Moreover, a direct link to the books available at Mobipockets store has also been placed by Amazon.com in e-book formats. The two extensions that were introduced by Amazon .mobi and .prc became the most frequently used formats for e-books. Through these efforts, Mobipocket started noticing an increase in its traffic at alexa.com. Another important point to note is that Mobipocket relies on new technology being introduced which is secure as well as stable in order to build the trust and enhance the image of the company. Mobipocket is ranked among the top websites for e-books and is well known even though the marketing efforts are not strong.

Market of Mobipocket.com
Segments
Mobipocket is a company that introduces innovative technology to readers and is also a pure .com company. The segmentation of the market is done according to the technology that is used by the potential customer such as PDA, Computers and Mobile Phones. Sub-segments are also made by Mobipocket for each segment for example if the user uses a computer, what is the operating system used by him like Mac, Windows or Unix. Mobipocket uses psychographic segmentation as it is also an e-book store. According to the potential customers preference of genre, like fictional or non-fictional, the company sub-segments each criterion.

Targets
All types of readers are targeted by Mobipocket by offering different genre, but more accurately, the users who can read English, French, Spanish or German are the target market of Mobipocket, even though the technology is itself available to everyone.

Differentiation
The differentiation by Mobipocket is only being done from the competitors whose e-readers give access to screening reading of 40,000 books instantly to different electronic devices like internet retailer.com.

Positioning
The company has not only positioned itself in the world of e-books as a pioneer but also provided a unique technology that guarantees security from fraud and offers compatibility.

General GoalsObjectives
According to a press release, the goal of Mobipocket is to make sure that the technology is used and adopted by 50 million users in the next three years. The second e-commerce objective of Mobipocket is to increase the usage of its readers by retailers and publishers and to make use of its extension the most portable e-book format.

E-business Model
The E-business of Mobipocket has been a pure play as it is on the enterprise level and a pure dot com business. Since Mobipocket sells its products online directly to the consumers, most of the activities of the business are automated such as accounting, sales and also support. Instant interaction with the customer and use of content sponsorship is also offered by the company.

Marketing Mix
ProductService Offering
Two types of products are offered currently by Mobipocket, the online e-books that only the reader can read and the Mobipocket reader itself. Mobipocket created a new online brand, being a pure play firm. This strategy allowed the company to avoid any conflicts with the offline market. In order to benefit from the low prices, the customers do not have any other choices than to go online and participate in the e-business experience.

Pricing Valuation
A Hi-Low pricing strategy is used by Mobipocket which keeps different prices for each book and the prices are kept in accordance to the value that is given by a customer to that book. The prices are occasionally reduced when the demand from the consumers is low. A discount coupon is also offered to the customers to be used during a specific period which expires when the time is up and the prices are returned to normal levels. A boost is given to the sales during a period of stagnant sales with this strategy.

Supply ChainDistribution
Mobipocket uses direct marketing as most of the e-businesses do as it sells directly to the customers through the website. Any intermediaries are bypassed in attempt to sell directly to the customers. Moreover, the customers are redirected to the main site, which are on an affiliate site to conclude any sales. For example, the customers shopping on Amazon.com are redirected to Mobipocket.com if they are found to be interested in any e-book.

Integrated Communication Mix
The main aspect of any dot com business is communication as it is the key of development and innovation. Mobipocket has a wiki in order to inform its customers about the new advancements in the technology and also to attract any suggestions from the consumers. The forum also provides support to the users and developers, a knowledgebase and a platform to the users to give feedback anytime of the day.

Performance Metrics
The goals of Mobipocket have been customer satisfaction, customer loyalty and improvement of the customer perception of the product. To measure these goals, the company measures the number of abandoned carts and the number of complaints from the users. The number of purchases during a specified period is also measured in order to keep inventories including the percentage of refunds during a specified period.

The internal perspectives of the business are measured by online technical help, quality of online service and the size of operational web server size. In order to measure these metrics, the company measures the uptime percentage, the number of customers who use the services and the number fo problems covered on the wiki and the forum FAQs.

The learning and the growth of the organization is reflected by the innovation in online service which is measured by the number of new products or services to market in a year.

The goals of financial perspectives of the firm are increase in profit from individual customers and enhancement of conversion rate. These goals are measured by the average value of an order and the total number of orders or visitors.