Thursday, December 12, 2019
E-Business Plan Entire Business Globe
Question: Describe about the E-Business Plan for Entire Business Globe . Answer: Introduction Online food delivery is a business currently trending in most parts of the entire globe. The established business utilizes online sources for all the business activities. E-commerce businesses like online food delivery uses high technologies to reach their customers (Adeyeye 2008). The use of this technologies makes this business to be special business as compared to normal business. As a result of the special nature, venturing into e-commerce requires vivid concept before commencing operations. The report therefore provide the analysis of e-business environment through exploitation of business environmental analysis models. E-commerce businesses have got large environment linking all the segment of the business.These segmentsas indicated inplan one include: business to business, business to clients, customer to customer and finally customer to business. The paper further investigates the extended environment through the use of SWOT analysis and Porters competitive analysis model.The report also investigates various competitive advantages identified through business environmental analysis, potential security and fraud issues related to online food delivery (Hoshino 2011). Business Environmental Analysis Managing an e-commerce business requires the administration to identify and have clear knowledge of business environment. Business environments includes both external and internal factors which are likely to influence online food delivery (Banham 2006). Business environment is composed of several factors which should be put into consideration before venturing into the business. Environmental analysis is therefore is the process of gathering information on various factors in e-commerce business and its environment. These factors include the strengths and weaknesses of online food delivery as an organization among other issues. The purpose of this analysis basically looks into the factors that are beyond management control. For this established business to prosper and meet the market requirement these factors must be analyzed and proper strategies put in place. SWOT analysis and Porters competitive analysis have been used to analyze the various factors within online food delivery. SWOT analysis This is a designed tool which is exploited various organizations to work various factors. (Gliniecki and Ogada 2012). SWOT analysis important to any business entity since it enables investors to evaluate various business environments. This kind of evaluation helps build on the business strengths leading to the success of the business. The tool when well exploited leads to reduced weakness, fuels utilization of available opportunities and help eliminate the threats. The tool has been used in relation to the objectives outlined in the first part of the plan. Exploitationof this tool enabled the determination of various weaknesses, strength, opportunities and threats in an E-commerce business. Internal environment Strengths Weaknesses Excellent sales staff with strong knowledge of existing products Good relationship with customers Good internal communications High traffic location Successful marketing strategies Reputation for innovation Currently struggling to meet deadlines - too much work Market research data may be out of date Cash flow problems Holding too much stock Poor record keeping External environment Opportunities Threats Similar products on the market are not as reliable Products are more expensive Loyal customers Product could be on the market for Christmas Customer demand - have asked sales staff for similar product Competitors have a similar product Competitors have launched a new advertising campaign Competitor opening restaurants nearby Downturn in economy may mean people are spending less Business strength With the use SWOT business environment analysis several factors have been considers as the strength of the business. The business is therefore planned to utilize the identified strength to maximize on income. Development of a perfect sales team who are well equipped with prevailing market condition can drive the business towards meeting its goals. Other factors were also placed in to consideration as mentioned in the table above. Creation of internal communication, perfect relationship between the consumers and the business, high traffic location, successful marketing strategies and reputation for innovation can be important in fueling the business towards its success. Weaknesses The analysis performed brought into some factors which are likely to affect the business from within that should be minimized as soon as possible. The team is currently working on the stabilizing the business thus a lot of pressure which requires regulation. It was also noted that some of the obtained data are kind of outdated and may be misleading. Since the business is emerging and uses online money transfer there is difficulty in cash flow which should be acted upon. Opportunities This is the third component of SWOT analysis. In a given business environment there are opportunities business owners should considered. Online food delivery is currently booming and many investors are entering in to the business. Similar products produced by these companies on the market are not as much reliable. The companies are stable producing more expensive and are not affordable to the majority; most of customers have been found to be loyal if provided with quality products as indicated above. The analysis also revealed that there would be maximum sales during Christmas seasons. These opportunities should be majored on by the business in order to meet the business objectives. Improvement in the mobile technology is another opportunity in plan as it will enable consumers to easily access the business manual and make orders in relation to their taste and preference. Threat Several threats such as competitors having similar product, new advertising campaigns currently launched the competitors, Competitor opening more restaurants in all the corners of Australia may be a threat to the business. The downturn in economy may mean that people are spending less which is a challenge to the business as it entirely depend on the rate at which people are willing and able to purchase the products. These threats require strategies for this business to prevail. Porters Competitive Analysis This technique employs the use of five factors in analyzing a business. The tool majorly deals with market and creation of appropriate competitive. These factors include: Supplier power; the ability of the raw food suppliers to the business is so important.The company should have a number of suppliers in order to have the supply power. This makes it easy to obtain the resources used in food preparation in the created restaurants. When a company is having the suppliers power the possibility of its growth is high. Buyer power; the business highly depends on how much consumers are able to purchase the offered services. The business design allows the buyers to bargain for the products (Effah 2012). Every individual buyer is considered to be important. Flexibility of the business is therefore to adapt to customer demands since at some point the business is dictated by the powerful buyers. And this gives the treason for unique products and food helping to limit the availability of the substitutes. Competitive nature of the industry The Australian online food delivery market is vastly untapped as indicated in part one of the plan. There is a very bright scope for the new companies to excel in this business. There are two large and renowned companies that are the competitors of the new Online Food Delivery Business. They are Delivery Hero and Menulog (Ritter 2002). The company strategies are determined to adapt to the system. Since the industry is made up of stable companies which may offer stiff competition without suitable strategies. Threat of substitution The business packages are designed to be unique and special. Food prepared at various restaurants have got unique taste that is difficult to prepare at home. This assist the company to maintain their customers and limit copyright. Threat of new entries The business power in the market is likely to affect by many firms joining the industry. The company stability when properly utilized can help maintain the business power within the industry. Sources Competitive advantages Competitive advantage occurs when the business is designed better to beat other firms within the industry. Competitive advantages come from within or without the company. The following are some of the sources of the business competitive advantage: Market orientation The market orientation offered by a given firm ensure its survival in the industry. In light of 9 years of information, economic scholars find that 'market introduction positively affects business execution in the short and the long run. The company can set aside some time for the market orientation to have a beneficial outcome, so administration needs to give shore up (Adeyeye 2008). As time goes by, an organization with a market introduction has favorable position. Still, the study finds that under profoundly focused weight, an organization can pick up preferred standpoint with proper market introduction or orientation. Quality relation with employees. Numerous studies exhibit that workers engagement can be a wellspring of upper hand. One study, occurring in the work serious lodging industry, found that the 'exceptionally fulfilled, propelled, submitted and completely drew in' representatives yielded a higher piece of the overall industry than their rival. Technological advancements In this season of extraordinary technological advances in Australia, there are numerous open doors for increasing upper hand through innovative development. Nonetheless, an organization needs to make a culture that is interested in receiving new innovation successfully (Niranjanamurthy and Chahar 2013.). Company can use the mobile technology to create a selling app as discussed to be the best in the industry. The firm can use mobile phones to reach their various customers. Since most of people have access to their mobile phones in all the places the company is likely to deliver food than other online food organizations How to prevent security and fraud in E-commerce business The business is online business therefore is prone to risks without clear precedes and security plans clearly implemented. These risks include system: Hacking where fraudsters may make forgery billings on delivered orders. Bridge of customers account during billing of the orders can be risky to the business as majority may be afraid of their banks accounts. Internet viral injections in to the system in order to access business information.This can put the business at serious risk since information may be leaked to the competitors leading to company weakness. Failure or crash of internet service provider may be a risk to the business as unauthorized parties may access the system during the breakdown project Internet traffic mismanagement Mitigations plan Objective The main objective of the plan is to minimize the above security threats and eliminate some respectively. Site selection The threat elimination plan will be applied according to department server. This will enable the company to eliminate the problems at base level and enable easy funding. Main plan Each department is meant to begin working on the fraud and security with the commencement of the operations. Materials needed provided according to the requirement and the nature of threat most likely to happen with the system. The department will organize their system protection time which will be created. The systems will undergo the process at different time intervals to enable the business to run the whole day and night. Amount estimation and funding Various department assisting with the process estimates the amount of money they require to execute the process. The source of finance to be used in risk maintenance is calculated as part of the capital. Mitigation plan template Action Responsible team Anticipated cost Funding sources Status Hazard Addressed Action #1 Accountants $1200 Capital High Billing fraud Action #2 Supervisors $5000 capital medium Billing fraud Action #3 IT DEPARTMENT $2000 capital Medium Virus Action #4 Service provider $3000 capital medium Server crash Action #5 IT department $4200 capital medium Hacking Actions Restraining the quantity of declined exchanges. One simple approach to spot extortion endeavors are rehashed declined exchanges, where the fraudster is speculating or utilizing a vindictive programming script to produce MasterCard numbers and seeking after a match (Effah 2012). Past anticipating extortion, you will probably bring about a little expense for each declined exchange, so it is to your greatest advantage to make a point of confinement on endeavored exchanges. At the point when the breaking point is hit, the client ought to be bolted out of the shopping basket and coordinated to contact client benefit by telephone for help submitting a request. Coordination of billing address and IP area. The company is determined to watch out for IP addresses from abroad that don't coordinate the charging address. Destinations like IP-Lookup.net permit relevant employees to physically explore an IP address (Befve 2008). One regular technique is to just keep online exchanges from IP addresses, which start in locations to which the firm don't deliver food. Numerous e -Commerce stages offer security usefulness which will naturally perceive suspicious IP locations or errors. Training representatives on how to secure the systems. Representatives "need to know they ought to never email or content touchy information or uncover private client data in visit sessions as none of these specialized strategies is secure," says Jayne Friedland Holland, boss security officer and partner general direction at innovation firm NIC Inc.. "Representatives additionally should be taught on the laws and arrangements that influence client information and be prepared on the activities required to guard it," Holland says. At last, "utilize strict composed conventions and strategies to strengthen and urge representatives to stick to commanded security hones." Creation of solid passwords by the clients. In the event that your e-Commerce stage requires or permits clients to make an online client profile with spared data, ensure you require solid passwords that meet best practices for misrepresentation anticipation: Least number of characters Blend of capital letters, numbers and images numerous e-commerce merchants offer their own particular programmed secret key for quality check (Stoian 2013). Maintenance and standardization The selected sites for threat management is expected to be of high quality. For the business to maintain the standards of the, the system will be under clear supervision executed by various supervisory team per department. Conclusion The above discussion provides step two of planning online food delivery business. it has been approved from the discussion that venturing into an e-commerce requires determination of the business and its environment. Environmental analysis is important since it enables investors to prior identify the risk and factors within the business surrounding which influence the business in either way (Foster 2009). Business environment also enables business owners to act appropriately to the weaknesses of the business and advance on the strength of the business. And this process shows the potentials of the business in that industry. It also includes the analysis of the competitors. The competitors analysis helps to spot out the loopholes of the business and gives the scope for improvement (Duncan 2014). After the industry analysis, the goals of the business must be set on higher priority. In this report, three particular goals of the new online food delivery e-business have been established an d justified E-commerce as business is faced with other technology challenges compared to other businesses. For online food delivery business to thrive security and fraud measures should be put in place. References Adeyeye, M., 2008. E-Commerce, business methods and evaluation of payment methods in Nigeria. Electronic Journal of Information System Evaluation, 11(1), pp.1-6. Aksenov, S.L., 2016. Survival of Small Enterprises in a Vague Environment of Emerging Economy. International Journal of Humanities and Cultural Studies (IJHCS)? ISSN 2356-5926, pp.824-839. Banham, H.C., 2006. Organisational Change in Small and Medium EnterprisesA Regional Study. Unpublished doctoral dissertation, University of Southern Queensland, Australia. BARKAN, D. and Wright, B., 1989. Preparing for EDI. Befve, E., 2008. Economie de la connaissance. Boss, A.H., 1992. Electronic Data Interchange Agreements: Private Contracting Toward a Global Environment. Nw. J. Int'l L. Bus., 13, p.31. CGA, H.C.B., 2010. External environmental analysis for small and medium enterprises (SMEs). Journal of Business Economics Research, 8(10), p.19. Chaudhari, M.A.N. and Shirbhate, P.V., The study of E-Commerce Security Issues and Solutions. Duncan, W.J., Fast 101 Pty Ltd., 2014. Invoiceless trading and settlement method and system. U.S. Patent 8,660,947. Effah, J., 2012. Mobilizing culture for e-business in developing countries: An actor network theory account. The Electronic Journal of Information Systems in Developing Countries, 52. Effah, J., 2013. Institutional effects on E-payment entrepreneurship in a developing country: Enablers and constraints. Information Technology for Development, pp.1-15. Effah, J., 2013. Institutional effects on E-payment entrepreneurship in a developing country: Enablers and constraints. Information Technology for Development, pp.1-15. Foster, B., 2009. Using Simulation in the Process Industries. Gliniecki, J.Y. and Ogada, C.G., 2012. Legal Acceptance of Electronic Documents, Writings, Signatures, and Notices in International Transportation Coventions: A Challenge in the Age of Global Electronic Commerce, The. Nw. J. Int'l L. Bus., 13, p.117. Hoshino, T., 2011. Series Offshore Expansion by Small and Medium Entreprises Part I. Key Points in Offshore Expansion by SMEs. Institute for International Studies and Training, Japan, 28. James, G.M., Understanding Organisational Adaptation. Society and Economy, 25(1). Niranjanamurthy, M. and Chahar, D.D., 2013. The study of e-commerce security issues and solutions. International Journal of Advanced Research in Computer and Communication Engineering, 2(7). Pareek, N., Design and Analysis of Access Control and Security Model in E-commerce System. Prn?u, C. and Vlad, A.I., 2013. UML Language use in identifying tangible and intangible assets in a cluster. Journal of Knowledge Management Economics and Information Technology, 3(6), pp.1-13. Ritter, J.B. and Gliniecki, J.Y., 1992. International Electronic Commerce and Administrative Law: The need for harmonized national reforms. Harv. JL Tech., 6, p.263. Ritter, J.B. and Gliniecki, J.Y., 1992. International Electronic Commerce and Administrative Law: The need for harmonized national reforms. Harv. JL Tech., 6, p.263. Ritter, J.B., 2002. Defining international electronic commerce. Nw. J. Int'l L. Bus., 13, p.3. Singh, A., Secure Payment System for Electronic Transaction. International Journal of Advanced Research in Computer Science and Software Engineering. Stoian, M.B., 2013. Predic?iaperforman?einfunc?ii de conducere din domeniulordinii?isiguran?eipublice. Aspectemetodologice. Thomas, B. ed., 2010. E-Commerce Adoption and Small Business in the Global Marketplace: Tools for Optimization: Tools for Optimization. IGI Global. Trubow, G.B., 1992. European Harmonization of Data Protection Laws Threatens US Participation in Trans Border Data Flow, The. Nw. J. Int'l L. Bus., 13, p.159.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.