Ebook Digital business and ecommerce management: Strategy, implementation and practice strategy, implementation and practice (Sixth edition) – Part 1

210 2 0
Ebook Digital business and ecommerce management: Strategy, implementation and practice strategy, implementation and practice (Sixth edition) – Part 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Ebook Digital business and ecommerce management: Strategy, implementation and practice strategy, implementation and practice (Sixth edition) – Part 1 introduces digital business and ecommerce. It seeks to clarify basic terms and concepts by looking at different interpretations of terms and applications through case studies. Đề tài Hoàn thiện công tác quản trị nhân sự tại Công ty TNHH Mộc Khải Tuyên được nghiên cứu nhằm giúp công ty TNHH Mộc Khải Tuyên làm rõ được thực trạng công tác quản trị nhân sự trong công ty như thế nào từ đó đề ra các giải pháp giúp công ty hoàn thiện công tác quản trị nhân sự tốt hơn trong thời gian tới.

33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 SIXTH EDITION DIGITAL BUSINESS AND E-COMMERCE MANAGEMENT STRATEGY, IMPLEMENTATION AND PRACTICE DAVE CHAFFEY Which strategies and actions are needed to develop and sustain a Digital Business? How should we prioritise our investments in E-commerce and Digital Business? What are the main changes that need to be made to an organisation to facilitate Digital Business? The new edition of Dave Chaffey’s bestselling book is your guide to answering these difficult questions Written in an engaging and informative style, Digital Business and E-Commerce Management will equip you with the knowledge and skills to navigate today’s fast-paced world of continuous technological development In this sixth edition of his bestselling book, leading authority Dave Chaffey brings together the most recent academic thinking and professional practice Covering all aspects of e-business including strategy, digital marketing and supply chain management, Digital Business and E-Commerce Management gives you the benefit of: • A structured approach to review, plan and implement e-commerce strategy for all types of organisation • The latest on digital marketing techniques such as search engine, content and social media marketing • Expanded coverage of creating integrated experiences for mobile and desktop devices • Case studies and interviews showing how startups and large organisations have grown through creating effective digital business strategies • A companion website at www.pearsoned.co.uk/chaffey, providing access to the latest digital business and e-commerce developments via Dave Chaffey’s regularly updated Blog, twitter feed and updates to Dave’s series of books The website also provides the opportunity for self-assessment and access to extra case studies demonstrating digital business and e-commerce in action Whether you’re a student studying digital business and e-commerce, or a business manager, Digital Business and E-Commerce Management is the essential text to help you understand and apply digital technology, strategy and implementation Dave Chaffey is co-founder of e-commerce advice site SmartInsights.com and a consultant, trainer and visiting lecturer on digital marketing courses at Cranfield School of Management, University of Derby and Manchester Metropolitan University www.pearson-books.com 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Digital Business and E-Commerce Management 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Sixth edition Digital Business and E-Commerce Management Strategy, Implementation and Practice Dave Chaffey 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Pearson Education Limited Edinburgh Gate Harlow CM20 2JE United Kingdom Tel: +44 (0)1279 623623 Web: www.pearson.com/uk First published 2002 (print) Second edition published 2004 (print) Third edition published 2007 (print) Fourth edition published 2009 (print) Fifth edition published 2011 (print) Sixth edition published 2015 (print and electronic) © Dave Chaffey 2002 (Print) © Marketing Insights Limited 2002, 2009, 2011 © Marketing Insights Limited 2015 (print and electronic) The right of Dave Chaffey to be identified as author of this work has been asserted by him in accordance with the Copyright, Designs And Patents Act 1988 The print publication is protected by copyright Prior to any prohibited reproduction, storage in a retrieval system, distribution or transmission in any form or by any means, electronic, mechanical, recording or otherwise, permission should be obtained from the publisher or, where applicable, a licence permitting restricted copying in the United Kingdom should be obtained from the Copyright Licensing Agency Ltd, Saffron House, 6-10 Kirby Street, London EC1N 8TS The ePublication is protected by copyright and must not be copied, reproduced, transferred, distributed, leased, licensed or publicly performed or used in any way except as specifically permitted in writing by the publishers, as allowed under the terms and conditions under which it was purchased, or as strictly permitted by applicable copyright law Any unauthorised distribution or use of this text may be a direct infringement of the author’s and the publishers’ rights and those responsible may be liable in law accordingly All trademarks used herein are the property of their respective owners The use of any trademark in this text does not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement of this book by such owners Pearson Education is not responsible for the content of third-party internet sites ISBN: 978-0-273-78654-2 (print) 978-0-273-78657-3 (PDF) 978-0-273-78655-9 (eText) British Library Cataloguing-in-Publication Data A catalogue record for the print edition is available from the British Library Library of Congress Cataloging-in-Publication Data A catalog record for the print edition is available from the Library of Congress 10 18 17 16 15 14 Print edition typeset in 10/12pt MinionPro by 75 Print edition printed and bound by L.E.G.O.S.p.A., Italy 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Brief contents Preface Guided tour About the author Publisher’s acknowledgements Part xiv xxvi xxviii xxix Introduction1 Introduction to digital business and e-commerce 3 Marketplace analysis for e-commerce 41 Managing digital business infrastructure 77 E-environment 127 Part Strategy and applications177 Digital business strategy Supply chain management E-procurement Digital marketing Customer relationship management Part 179 247 297 323 387 Implementation467 10 Change management 11 Analysis and design 12 Digital business service implementation and optimisation Glossary Index 468 517 597 650 666 vi 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Contents Preface Guided tour About the author Acknowledgements xiv xxvi xxviii xxix Part Introduction Risks and barriers to digital business adoption Evaluating an organisation’s digital business capabilities Drivers of consumer technology adoption Barriers to consumer Internet adoption Case Study 1.2 eBay – the world’s largest online business? Summary Exercises References Web links 32 32 32 34 34 37 38 39 40 Introduction to digital business and e-commerce 3 Marketplace analysis for e-commerce 41 Learning outcomes Management issues Links to other chapters Introduction 4 The impact of electronic communications on traditional businesses Inbound marketing Social media marketing Trends update: Social media usage Mobile commerce 12 Case Study 1.1 The Facebook business model 8 Trends update: Mobile usage 12 What is the difference between digital business and e-commerce? 13 E-commerce defined 13 Trends update: E-commerce growth rates 13 Digital business defined 14 Intranets and extranets 15 Different types of sell-side e-commerce 17 Digital marketing 18 Trends update: Social network usage 19 Options for companies to reach their audience online 19 Owned, earned and paid media options 19 The six key types of digital media channels 20 Web 2.0 and user-generated content 23 Supply chain management 24 Business or consumer models of e-commerce transactions 24 E-government defined 28 Digital business opportunities 28 Drivers of digital technology adoption 30 Cost/efficiency drivers 30 Competitiveness drivers 30 Learning outcomes 41 Management issues 41 Links to other chapters 41 Introduction 42 Business and revenue models for e-commerce 42 Online marketplace analysis 42 Strategic agility 46 A process for online marketplace analysis 47 Location of trading in the marketplace 53 Review of marketplace channel structures 53 Location of trading in the marketplace 55 The importance of multichannel marketplace models 55 Commercial arrangement for transactions 57 Different types of online intermediary and influencers 57 Summary of the types of intermediary 58 The importance of search engines 58 Business models for e-commerce 58 Revenue models 62 Online publisher and intermediary revenue models 62 Calculating revenue for an online business 64 Focus on Online start-up companies 66 Assessing online businesses 67 Valuing Internet start-ups 67 Concept 67 Innovation 67 Execution 67 Traffic 68 Financing 68 Profile 68 Examples of e-commerce failures 68 Case Study 2.1 i-to-i – a global marketplace for a start-up company 69 Why dot-coms failed 70 viii 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Contents Summary Exercises References Web links 73 74 75 76 Managing digital business infrastructure 77 Learning outcomes 77 Management issues 77 Links to other chapters 77 Introduction 78 Supporting the growing range of digital business technology platforms 82 Desktop, laptop and notebook platforms 83 Mobile phone and tablet platforms 83 Trends update: Mobile usage 83 Other hardware platforms 85 Augmented reality 87 Digital business infrastructure components 88 A short introduction to Internet technology 89 Management issues in creating a new customer-facing digital service 90 Domain name selection 90 Uniform resource locators (URLs) 91 Domain name registration 92 Managing hardware and systems software infrastructure 92 Layer II – Systems software 93 Managing digital business applications infrastructure 93 Focus on Web services, SaaS, cloud computing and service-oriented architecture (SOA) 96 Benefits of web services or SaaS 96 Application programming interfaces (APIs) 97 Challenges of deploying SaaS 97 Cloud computing 98 Examples of cloud computing web services 99 Virtualisation 101 Service-oriented architecture (SOA) 102 Selecting hosting providers 102 Managing service quality when selecting Internet service and cloud hosting providers 103 ISP connection methods 103 Issues in management of ISP and hosting relationships 103 Speed of access 103 Availability 105 Service level agreements 106 Security 106 Managing internal digital communications through intranets and extranets 107  Intranet applications 107 Extranet applications 109 Encouraging use of intranets and extranets 112 IPTV (Internet TV) 113 Voice over IP (VoIP) 113 Widgets 113 Web presentation and data exchange standards 114  Examples of XML applications 114 Semantic web standards 115 Microformats Focus on Internet governance The net neutrality principle The Internet Corporation for Assigned Names and Numbers (ICANN, www.icann.org) The Internet Society (www.isoc.org) The Internet Engineering Task Force (IETF, www.ietf.org) The World Wide Web Consortium (www.w3.org) Telecommunications Information Networking Architecture Consortium (TINA-C, www.tinac.com/) How can companies influence or take control of Internet standards? Open-source software Case Study 3.1 Innovation at Google Summary Exercises References Web links 116 116  117 118 119 119 119 119 119 120 121 123 123 124 125 4 E-environment 127 Learning outcomes 127 Management issues 127 Links to other chapters 127 Introduction 128 Social and legal factors 131 Factors governing e-commerce service adoption 131 Understanding users’ access requirements 132 Consumers influenced by using the online channel 133 Motivation for use of online services 133 Purchased online 136 Business demand for digital business services 136 B2B profiles 137 Adoption of digital business by businesses 137 Privacy and trust in e-commerce 138 Privacy legislation 139 Why personal data are valuable for digital businesses 139 Anti-spam legislation 145 Regulations on privacy and electronic communications 145 Worldwide regulations on privacy and electronic communications 145 Other e-commerce legislation 150 1  Marketing your e-commerce business 150 2  Forming an electronic contract (contract law and distance-selling law) 152 3  Making and accepting payment 153 4  Authenticating contracts concluded over the Internet 153 5  Email risks 153 6  Protecting intellectual property (IP) 153 7  Advertising on the Internet 154 8  Data protection 154 Environmental and green issues related to 154 Internet usage 162 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Part Introduction Activity 4.5 Overcoming SME resistance to international e‑commerce Purpose To highlight barriers to exporting amongst SMEs and suggest measures by which they may be overcome by governments Activity For each of the four barriers to internationalisation given in Table 4.5, suggest the man‑ agement reasons why the barriers may exist and actions that governments can take to overcome these barriers Evaluate how well the government in your country communi‑ cates the benefits of e‑commerce through education and training Table 4.5 Issues in SME resistance to exporting Barrier Management issues How can barrier be overcome? Psychological Operational Organisational Product/market Source: Barriers from Hamill and Gregory (1997) and Poon and Jevons (1997) Answers to activities can be found at www.pearsoned.co.uk/chaffey More recent research suggests that SMEs have been relatively slow to adopt the Internet Research by Arnott and Bridgewater (2002) tests the level of sophistication by which SMEs are using the Internet (see stage models in Chapter 5) They find that the majority of firms are using the Internet for information provision rather than interactive, relationship-building or transactional facilities Smaller firms are using significantly fewer Internet tools than their larger counterparts Quayle (2002) has assessed issues considered by SMEs to be strategically important In the UK, 298 SMEs were surveyed Issues of marketing, leadership and waste reduction were given highest priority, and supplier development, financial management, time to market and supply chain management were medium priority Perhaps unsurprisingly, the lowest priority was given to technology, research and development, e-commerce, customer management and purchasing – all closely related to e-business In further research, Meckel et al (2004) analysed e-business adoption by several hundred SMEs in the northwest of England and found that fewer than 15% had formal, documented e-business strategies Political factors The political environment is shaped by the interplay of government agencies, public opinion, consumer pressure groups such as CAUCE (Coalition Against Unsolicited Email – www cauce.org) and industry-backed organisations such as TRUSTe (www.truste.org) that promote best practice amongst companies Chapter E‑environment 163 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Political action enacted through government agencies to control the adoption of the Internet can include: ● ● ● ● promoting the benefits of adopting the Internet for consumers and business to improve a country’s economic prosperity; enacting legislation to protect privacy or control taxation, as described in previous sections; providing organisations with guidelines and assistance for compliance with legislation; setting up international bodies to coordinate the Internet (see Chapter 3) Political involvement in many of these activities is intended to improve the economic competitiveness of countries or groups of countries Quayle (2002) summarises six strands of the UK government strategy for e‑commerce which are intended to increase industry competitiveness: Establish a brand in e‑commerce both domestically and internationally Transform existing businesses Foster e‑commerce creation and growth Expand the e‑commerce talent pool (skills) Provide leadership in international e‑commerce policy development Government online should be a priority These goals are typical for many countries and specific targets are set for the proportion of people and businesses that have access, including public access points for those who cannot currently afford the technology Managers who are aware of these initiatives can tap into sources of funding for development or free training to support their online initiatives Alternatively, there may be incentives such as tax breaks The European Commission (EC) provides some other examples of the role of government organisations in promoting and regulating e‑commerce: ● Information society A society with widespread access and transfer of digital information within business and the community The EC Information Society initiative was launched in 1998 with the aims of increasing public awareness of the impact of the information society and stimulating people’s motivation and ability to participate (reducing social exclusion); increasing ­socio-​­economic benefits and enhancing the role of Europe in influencing the global information society Information society was defined by the UK INSINC working party on social inclusion in the information society in 1997 as: A society characterised by a high level of information intensity in the everyday life of most citizens, in most organisations and workplaces; by the use of common or compatible technology for a wide range of personal, social, educational and business activities; and by the ability to transmit and receive digital data rapidly between places irrespective of distance ● ● UNESCO has also been active in advancing the information society in less developed countries (http://​portal.unesco.org/ci) The European Community has set up ‘i2010’ (European Information Society in 2010) whose aims include: providing an integrated approach to information society and ­audio-​­visual policies in the EU, covering regulation, research, and deployment and promoting cultural diversity (eEurope, 2005) ● In 1998, new data protection guidelines were enacted to help protect consumers and increase the adoption of e‑commerce by reducing security fears Since 2000, ­cross-​­Europe laws have been enacted to control online consumer privacy, electronic selling and taxation Booz Allen Hamilton (2002) review approaches used by governments to encourage use of the Internet They identify five broad themes in policy: Increasing the penetration of ‘access devices’ Approaches include either home access through Sweden’s PC Tax Reform, or in public places, as in France’s programme to 164 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Part Introduction develop 7,000 access points by a specific year/target date France also offers a tax incentive scheme, where firms can make tax-free gifts of PCs to staff for personal use Increasing skills and confidence of target groups These may target potentially excluded groups, as with France’s €150 million campaign to train the unemployed Japan’s IT training programmes use existing mentors Establishing ‘driving licences’ or ‘passport’ qualifications France, Italy and the UK have schemes which grant simple IT qualifications, particularly aimed at low-skilled groups Building trust, or allaying fears The US 1998 Child Online Protection Act used schemes to provide ‘kitemark’-type verification, or certification of safe services Direct marketing campaigns According to the report, only the UK, with its UK Online campaign, is marketing directly to citizens on a large scale Internet governance Internet governance Control of the operation and use of the Internet Internet governance describes the control put in place to manage the growth of the Internet and its usage (as discussed at the end of Chapter 3) Dyson (1998) describes the different layers of jurisdiction These are: Physical space comprising each individual country where its own laws hold ISPs – the connection between the physical and virtual worlds Domain name control (www.icann.net) and communities Agencies such as TRUSTe (www.truste.org) The organisations that manage the infrastructure also have a significant role in governance E‑government Electronic government (e-government) The use of Internet technologies to provide government services to citizens E-government is distinct from Internet governance (In Chapter 1, we noted that e-govern- ment is a major strategic priority for many countries.) To achieve the potential cost savings, some governments have set targets for both buy- and sell-side e-government In the UK, the government’s main target was: That by 2005, 100% of dealings with Government should be capable of being delivered electronically, where there is a demand Although this target is to be applauded, it was not met and we can view this as the UK government’s dot-com bubble Although many services have been created, adoption rates tend to be low and the government is having to invest in marketing usage of these services In Australia, the National Office for the Information Economy, NOIE (www.noie.gov.au), has created a strategic framework which has the following themes This summarises the types of actions that many governments are taking to encourage e-business within their countries Access, participation and skills – Encouraging all sectors of the community to actively participate in the information economy Adoption of e-business – The government is working to provide more efficient communication between businesses to help improve the productivity of the Australian economy Confidence, trust and security – The government is working to build public trust and confidence in going online, and addressing barriers to consumer confidence in e-commerce and other areas of online content and activity E-government strategies and implementation – The use of new technologies for government information provision, service delivery and administration has the potential to transform government, which will improve the lives of Australians Chapter E‑environment 165 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Environment for information economy firms – Provide research on the environmen- tal variables that drive innovation and growth in the information economy and underpin its future development International dimensions – NOIE, in cooperation with other government bodies, represents Australia in world forums where decisions are made that may affect national interests in the information economy Mini Case Study 4.1 SourceUK SourceUK (www.sourceuk.net) is a successful e‑government initiative that has been responsible for the delivery and management of the busiest electronic communication and e‑procurement channels to UK gov‑ ernment and wider ­public-​­sector departments in line with the Modernising Government Agenda legislation Approximately 250,000 senior managers, budget holders and decision makers have direct access to the channels for their on‑­the-​­minute ­must-​­have news and information needs and for the sourcing of their goods and services SourceUK is proven to be one of the most accredited, respected, ­well-​­known and busiest portals of its sort available to this marketplace The portal is currently receiving on average 500,000 visits each month Source: SourceUK email alert, 2008 Technological innovation and technology assessment One of the great challenges of managing e‑commerce is the need to be able to assess which new technological innovations can be applied to give competitive advantage – what is ‘the next big thing’? The truth is no one can predict the future, and many companies have misunderstood the market for products: This ‘telephone’ has too many shortcomings to be seriously considered as a means of communication The device is inherently of no value to us Western Union internal memo, 1876 Who the hell wants to hear actors talk? H M Warner, Warner Brothers, 1927 I think there is a world market for maybe five computers Thomas Watson, chairman of IBM, 1943 There is no reason for any individual to have a computer in their home Ken Olson (President of Digital Equipment Corporation) at the Convention of the World Future Society in Boston in 1977 I personally believe the best that organisations can is to analyse the current situation and respond rapidly where appropriate As the Canadian ­science-​­fiction writer William Gibson said: The future is here It’s just not widely distributed yet A slightly different, and more ­forward-​­looking, perspective came from Bruce Toganizzi, who founded the Human Interface Team at Apple and developed the company’s first interface guidelines (E‑consultancy, 2007): Successful ­technology-​­predicting is based on detecting discontinuities and predicting the trends that will flow from them 166 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Part Introduction He gives the example of the introduction of the Apple iPhone and the other devices based on gestural interfaces that will follow In addition to technologies deployed on the website, the suitability of new approaches for attracting visitors to the site must be evaluated – for example, should registration at a ­paid-​­for search engine, or new forms of banner adverts or email marketing, be used (Chapter 9)? (Decisions on strategy are covered in Chapter 5.) When a new technique is introduced, a manager faces a difficult decision as to whether to: ● ● ● Early adopter Company or department that invests in new technologies and techniques Hype cycle A graphic representation of the maturity, adoption and business application of specific technologies Ignore the use of the technique, perhaps because it is felt to be too expensive or untried, or the manager simply doesn’t believe that the benefits will outweigh the costs – a cautious, ‘­wait-​­and-​­see’ approach Enthusiastically adopt the technique without a detailed evaluation since the hype alone convinces the manager that the technique should be adopted – a ­risk-​­taking, ­early-​­adopter approach Evaluate the technique and then take a decision whether to adopt it according to the evaluation – an intermediate approach This ­diffusion–​­adoption process (represented by the bell curve in Figure 4.12) was identified by Rogers (1983), who classified those trialling new products as innovators, early adopters, early majority, late majority, or laggards Figure 4.12 can be used in two main ways as an analytical tool First, it can be used to understand the stage customers have reached in adoption of a technology, or any product For example, the Internet is now a ­well-​­established tool and in many developed countries we are into the late majority phase of adoption, which suggests that it is essential to use this medium for marketing purposes Second, managers can look at adoption of a new technique by other businesses – from an organisational perspective For example, an online supermarket could look at how many other e‑tailers have adopted personalisation to evaluate whether it is worthwhile adopting the technique An alternative graphic representation of diffusion of innovation has been developed by technology analyst Gartner for assessing the maturity, adoption and business application of specific technologies (Figure 4.13) Gartner (2010) recognises the following stages within a hype cycle, an example of which is given in Figure 4.13 for trends current in 2010: Technology trigger – The first phase of a hype cycle is the ‘technology trigger’ or break- through, product launch or other event that generates significant press and interest Figure 4.12 ­Diffusion–​­adoption curve of a Gartner hype cycle Chapter E‑environment 167 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 4G Standard Activity Streams Cloud Computing Cloud/Web Platforms 3D Flat-Panel TVs and Displays Wireless Power Media Tablet Augmented Reality Private Cloud Computing Internet TV Speech-to-Speech Translation 3D Printing Social Analytics Mobile Robots Gesture Recognition Mesh Networks: Sensor Expectations Pen-Centric Tablet PCs Video Search Autonomous Vehicles Extreme Transaction Processing Tangiable User interfaces Microblogging Electronic Paper E-Book Readers Video Telepresence Predictive Analytics Interactive TV Internet Micropayment Systems Biometric Authentication Methods Mobile Application Stores Idea Management Consumer-Generated Media Public Virtual Worlds Virtual Assistants Terahertz Waves Computer-Brain Interface Context Delivery Architecture Human Augumentation Broadband Over Power Lines Peak of inflated expectations Technology trigger Years to mainstream adoption: less than years to years Figure 4.13 Speech Recognition Location-Aware Applications As of August 2010 Trough of disillusionment Slope of enlightenment Plateau of productivity Time to 10 years more than 10 years obsolete before plateau Example of a Gartner hype cycle Source: Gartner (2010) Peak of inflated expectations – In the next phase, a frenzy of publicity typically generates ­ ver-​­enthusiasm and unrealistic expectations There may be some successful applications o of a technology, but there are typically more failures Trough of disillusionment – Technologies enter the ‘trough of disillusionment’ because they fail to meet expectations and quickly become unfashionable Consequently, the press usually abandons the topic and the technology Slope of enlightenment – Although the press may have stopped covering the technology, some businesses continue through the ‘slope of enlightenment’ and experiment to understand the benefits and practical application of the technology Plateau of productivity – A technology reaches the ‘plateau of productivity’ as the ­benefits of it become widely demonstrated and accepted The technology becomes increasingly stable and evolves in second and third generations The final height of the plateau varies according to whether the technology is broadly applicable or benefits only a niche market Trott (1998) identifies different requirements that are necessary within an organisation to be able to respond effectively to technological change or innovation: ● ● ● Growth orientation – a ­long-​­term rather than ­short-​­term vision Vigilance – the capability of environment scanning Commitment to technology – willingness to invest in technology 168 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Part Introduction ● ● ● ● ● ● Acceptance of risk – willingness to take managed risks ­Cross-​­functional cooperation – capability for collaboration across functional areas Receptivity – the ability to respond to externally developed technology Slack – allowing time to investigate new technological opportunities Adaptability – a readiness to accept change Diverse range of skills – technical and business skills and experience The problem with being an early adopter (as an organisation) is that the leading edge is often also referred to as the ‘bleeding edge’ due to the risk of failure New technologies will have bugs, may integrate poorly with the existing systems, or the marketing benefits may simply not live up to their promise Of course, the reason for risk taking is that the rewards are high – if you are using a technique that your competitors are not, then you will gain an edge on your rivals Approaches to identifying emerging technology PMP (2008) describes four contrasting approaches to identifying new technologies, which may give a company a competitive edge: Technology scouting A structured approach to reviewing technology innovations akin to football scouting Crowdsourcing Utilising a network of customers or other partners to gain insights for new product or process innovations Technology networking Individuals monitor trends through their personal network and technology scouting and then share them through an infrastructure and process that supports information sharing PMP (2008) explains that Novartis facilitates sharing between inside and outside experts on specific technologies through an extranet and face‑to‑face events Crowdsourcing Crowdsourcing facilitates access to a marketplace of ideas from customers, partners or inventors for organisations looking to solve specific problems Lego is well known for involving customers in discussion of new product developments InnoCentive (Figure 4.14) is one of the largest commercial examples of crowdsourcing It is an online marketplace which connects and manages the relationship between ‘seekers’ and ‘solvers’ Seekers are the companies conducting research and development that are looking for new solutions to their business challenges and opportunities Solvers are the 170,000 registered members of InnoCentive who can win cash prizes ranging from $5,000 to $1,000,000 for solving problems in a variety of domains, including business and technology Technology hunting This is a structured review of new technology through reviewing the capabilities of start‑up companies For example, British Telecom undertakes a structured review of up to 1,000 ­start-​­ups to assess relevance for improving their own capabilities which may ultimately be reduced to five companies with which BT will enter into a formal arrangement each year Technology mining A traditional literature review of technologies described in published documents Deutsche Telekom AG use technology to automate the process through software such as Autonomy which searches for patterns indicating potential technology solutions within patents, articles, journals, technological reports and trend studies A simpler approach is setting up a keyword search for technologies through a free service such as Google Alerts (www.google.com/alerts) It may also be useful to identify how rapidly a new concept is being adopted When a product or service is adopted quickly, this is known as ‘rapid diffusion’ Access to the Internet is an example of this – in developed countries the use of the Internet has become widespread more rapidly than the use of TV, for example ­Internet-​­enabled mobile phones are relatively ­slow-​­diffusion products So, what action should e‑commerce managers take when confronted by new techniques and technologies? There is no straightforward rule of thumb, other than that a balanced approach must be taken It would be easy to dismiss many new techniques as fads, or classify them as ‘not relevant to my market’ However, competitors will probably be reviewing Chapter E‑environment Figure 4.14 169 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 InnoCentive Changes in strategy and technology new techniques and incorporating some, so a careful review of new techniques is required This indicates that benchmarking of ‘best of breed’ sites within sectors and in different sectors is essential as part of environmental scanning However, by waiting for others to innovate and reviewing the results on their website, a company may have already lost to 12 months A Innovator B Responder I Technology changes C Laggard Time Figure 4.15 Alternative responses to changes in technology 170 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Part Introduction Multiscreening A term used to describe simultaneous use of devices such as digital TV and tablet Figure 4.15 summarises the choices The stepped curve I shows the variations in technology through time Some may be small incremental changes such as a new operating system, others such as the introduction of personalisation technology are more significant in delivering value to customers and so improving business performance Line A is a company that is using innovative business techniques, that adopts technology early, or is even in advance of what the technology can currently deliver Line C shows the conservative adopter whose use of technology lags behind the available potential Line B, the middle ground, is probably the ideal situation where a company monitors new ideas as early adopters trial them and then adopts those that will have a positive impact on the business At the time of writing, the growth in use of mobile technology is perhaps the most significant trend in consumer adoption of digital media Multiscreening is a trend that needs to be considered for its impact on consumers Figure 4.16 shows common uses of mobile platforms introduced in Chapter and considered further in Chapter 11 Figure 4.16 Summary Multiscreen usage patterns Source: Google (2012) Environmental scanning and analysis are necessary in order that a company can respond to environmental changes and act on legal and ethical constraints on its activities Environmental constraints are related to the ­micro-​­environment variables reviewed in Chapter and the m ­ acro-​­environment variables in this chapter using the SLEPT mnemonic Social factors that must be understood as part of the move to the Information Society include buyer behaviour characteristics such as access to the Internet and perceptions about it as a communications tool Ethical issues include the need to safeguard consumer privacy and security of per‑ sonal information Privacy issues include collection and dissemination of customer information, cookies and the use of direct email Chapter E‑environment 171 Legal factors to be considered by e‑commerce managers include: accessibility, domain name registration, copyright and data protection legislation Economic factors considered in the chapter are the regional differences in the use of the Internet for trade Different economic conditions in different markets are con‑ sidered in developing e‑commerce budgets Political factors involve the role of governments in promoting e‑commerce, but also trying to control it Rapid variation in technology requires constant monitoring of adoption of the tech‑ nology by customers and competitors and appropriate responses Exercises ­Self-​­assessment questions Why is environmental scanning necessary? Give an example how each of the ­macro-​­environment factors may directly drive the content and services provided by a website Summarise the social factors that govern consumer access to the Internet How can companies overcome these influences once people venture online? What actions can e‑commerce managers take to safeguard consumer privacy and security? What are the general legal constraints that a company acts under in any country? How governments attempt to control the use of the Internet? Summarise adoption patterns across the continents How should innovation be managed? Essay and discussion questions You recently started a job as e‑commerce manager for a bank Produce a checklist of all the different legal and ethical issues that you need to check for compliance on the existing website of the bank How should the e‑commerce manager monitor and respond to technological innovation? Benchmark different approaches to achieving and reassuring customers about their privacy and security using three or four examples for a retail sector such as travel, books, toys or clothing ‘Internet access levels will never exceed 50% in most countries.’ Discuss Select a new Internet access technology that has been introduced in the last two years and assess whether it will become a significant method of access Assess how the eight principles of the UK Data Protection Act (www.gov.uk/dataprotection) relate to actions that e‑commerce managers need to take to ensure legal compliance of their site Examination questions Explain the different layers of governance of the Internet Summarise the ­macro-​­environment variables a company needs to monitor Explain the purpose of environmental scanning 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 172 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Part Introduction Give three examples of how websites can use techniques to protect the user’s privacy What are the three key factors which affect consumer adoption of the Internet? Explain the significance of the ­diffusion–​­adoption concept to the adoption of new technologies to: (a) Consumers purchasing technological innovations (b) Businesses deploying technological innovations What action should e‑commerce managers take to ensure compliance with ethical and legal standards of their site? References Ahmed, N.U and Sharma, S.K (2006) Porter’s value chain model for assessing the impact of the internet for environmental gains International Journal of Management and Enterprise Development, 3(3), ­278–​­95 Arnott, D and Bridgewater, S (2002) Internet, interaction and implications for marketing Marketing Intelligence and Planning, 20(2), ­86–​­95 Bart, Y., Shankar, V., Sultan, F., and Urban, G (2005) Are the drivers and role of online trust the same for all web sites and consumers? A ­large-​­scale exploratory empirical study Journal of Marketing, October, ­133–​­52 Basu, D (2007) Global Perspectives on E‑commerce Taxation Law Ashgate, Aldershot Booz Allen Hamilton (2002) International E‑Economy Benchmarking The World’s Most Effective Policies for the E‑Economy Report published 19 November, London Cairns, S (2005) Delivering supermarket shopping: more or less traffic? Transport Reviews, 25(1), ­51–​­84 Chaffey, D., Mayer, R., Johnston, K and E ­ llis-​­Chadwick, F (2009) Internet Marketing: Strategy, Implementation and Practice, 4th edn Financial Times Prentice Hall, Harlow CIFAS (2013) CIFAS (Credit Industry Fraud Association) Press release: Fraud continues to pose problems in 2012 Common Sense Advisory (2002) Beggars at the Globalization Banquet White Paper available at: www.commonsenseadvisory.com Editor: Don Da Palma No locale given ’Daniel, L., Wilson, H and Myers, A (2002) Adoption of e‑commerce by SMEs in the UK Towards a stage model International Small Business Journal, 20(3), ­253–​­70 Digitas (2007) Segmenting Internet Users: Implications for online advertising White Paper published at: http://digitalhive.blogs.com/digiblog/files/WebDotDigitas.pdf Dyson, E (1998) Release 2.1.A Design for Living in the Digital Age Penguin, London E‑consultancy (2007) E‑business briefing interview Bruce Tognazzini on ­human–​­computer interaction Interview published November eEurope (2005) Information Society Benchmarking Report From eEurope (2005) initiative EuroStat (2012) Internet use in households and by individuals 2012 EuroStat, 50 Published December 2012 Available from: http://epp.eurostat.ec.europa.eu/portal/page/portal/ product_details/publication?p_product_code=KS‑SF‑12–050 EuroStat (2013) Enterprises making slow progress in adopting ICT for e‑business integration Published February 2013: http://epp.eurostat.ec.europa.eu/portal/page/portal/ product_details/publication?p_product_code=KS‑SF‑13–006 Chapter E‑environment 173 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Fletcher, K (2001) Privacy: the Achilles heel of the new marketing Interactive Marketing, 3(2), ­128–​­40 Freedom House (2000) Censoring ­dot-​­gov report 17 April: www.freedomhouse.org/news/ pr041700.html, New York Gartner (2010) Gartner’s Hype Cycle: Special Report for 2010 Report summary available at www.gartner.com/it/page.jsp?id=1447613 Godin, S (1999) Permission Marketing Simon and Schuster, New York Google (2012) The New Multiscreen World: Understanding C ­ ross-​­platform Consumer Behavior Available at: http://services.google.com/fh/files/misc/multiscreenworld_final pdf Google Shopper Sciences (2011) The Zero Moment of Truth Macro Study Published April 2011: ​www.google.com/think/research-studies/the-zero-moment‑of‑truth-macrostudy.html Grossnickle, J and Raskin, O (2001) The Handbook of Online Marketing Research: Knowing Your Customer Using the Net ­McGraw-​­Hill, New York Hamill, J and Gregory, K (1997) Internet marketing in the internationalisation of UK SMEs Journal of Marketing Management, 13, ­9–​­28 Mason, R (1986) Four ethical issues of the information age MIS Quarterly, March Meckel, M., Walters, D Greenwood, A and Baugh, P (2004) A taxonomy of e‑business adoption and strategies in small and medium sized enterprises Strategic Change, 13, ­259–​­69 Mougayer, W (1998) Opening Digital Markets – Battle Plans and Strategies for Internet Commerce, 2nd edn Commerce Net Press, ­McGraw-​­Hill, New York Multilingual (2008) Localizing a localizer’s website: the challenge Jan/Feb, 3­ 0–​­33 Nitish, S., Fassott, G., Zhao, H and Boughton, P (2006) A ­cross-​­cultural analysis of German, Chinese and Indian consumers’ perception of web site adaptation Journal of Consumer Behaviour, 5, ­56–​­68 NMA (2008) Profile – Travis Katz Author: Luan Goldie New Media Age magazine, published 31 January PMP (2008) Supply Chain& Manufacturing Systems Report PMP Research Report published at: www.conspectus.com March Poon, S and Jevons, C (1997) ­Internet-​­enabled international marketing: a small business network perspective Journal of Marketing Management, 13, ­29–​­41 Quayle, M (2002) E‑commerce: the challenge for UK SMEs in the t­wenty-​­first century International Journal of Operation and Production Management, 22(10), ­1148–​­61 Quelch, J and Klein, L (1996) The Internet and international marketing Sloan Management Review, Spring, ­61–​­75 Rodgers, S., Chen, Q., Wang, Y Rettie, R and Alpert, F (2007) The Web Motivation Inventory International Journal of Advertising, 26(4), ­447–​­76 Rogers, E (1983) Diffusion of Innovations, 3rd edn Free Press, New York Siikavirta, H., Punakivi, M., Karkkainen, M and Linnanen, L (2003) Effects of e‑commerce on greenhouse gas emissions: a case study of grocery home delivery in Finland Journal of Industrial Ecology, 6(2), ­83–​­97 Singh, N and Pereira, A (2005) The Culturally Customized Web Site, Customizing Web Sites for the Global Marketplace ­Butterworth-​­Heinemann, Oxford Sparrow, A (2000) E‑Commerce and the Law The Legal Implications of Doing Business Online Financial Times Executive Briefings, London Trott, P (1998) Innovation Management and New Product Development Financial Times Prentice Hall, Harlow Ward, S., Bridges, K and Chitty, B (2005) Do incentives matter? An examination of on‑line privacy concerns and willingness to provide personal and financial information Journal of Marketing Communications, 11(1), ­21–​­40 174 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Part Introduction Web links Smart Insights Digital Marketing Statistics sources (http://bit.ly/smartstatistics/) A compilation of the Top 10 statistics sources and a custom search engine to search them Google Think Insights Databoard (http://www.google.com/think/tools/databoard.html) Google’s compilation of latest research The Oxford Internet Institute (OII) (www.oii.ox.ac.uk) Research institute focussed on the study of the impact of the Internet on society Government sources on Internet usage and adoption ● European government (http://ec.europa.eu/eurostat) ● OECD (www.oecd.org) OECD broadband research (www.oecd.org/sti/ict/broadband) ● UK government (www.statistics.gov.uk) ● Ofcom ( www.ofcom.org.uk ) Ofcom is the independent regulator and competition authority for the UK communications industries, with responsibilities across television, radio, telecommunications and wireless communications services and has in‑depth reports on communications markets ● US government reference centre (www.usa.gov) Online audience panel media consumption and usage data These are ­fee-​­based data, but contain useful free data within press release sections ● comScore (www.comscore.com) Data from comScore's global consumer panel is available in its blog and press releases section ● Hitwise ( www.hitwise.com ) Hitwise blog ( http://weblogs.hitwise.com ) Sample reports from Hitwise on consumer search behaviour and importance of different online intermediaries ● Netratings (www.netratings.com) ● Other major online research providers ● The European Interactive Advertising Association ( www.eiaa.net) The EIAA is a ­ pan-​ E ­ uropean trade organisation with surveys of media consumption and usage across Europe ● International Telecommunications Union ( www.itu.int/ITU‑D/icteye ) Adoption of Internet and mobile phone statistics by company ● The Pew Internet & American Life Project (www.pewinternet.org) Produces reports that explore the impact of the Internet on families, communities, work and home, daily life, education, healthcare, and civic and political life Privacy ● Australian Privacy Commissioner (www.privacy.gov.au) Information on privacy laws in Australia such as the Privacy Act and the Telecommunications Act ● European Data Protection resources (http://europa.eu.int/comm/justice_home/fsj/pri‑ vacy/index_en.htm) These laws are coordinated centrally, but interpreted differently in different countries ● Federal Trade commission (www.ftc.gov/privacy) US privacy initiatives ● GetSafeOnline (www.getsafeonline.org) Site created by government and business to educate consumers to help them understand and manage their online privacy and security Chapter E‑environment ● ● ● ● ● ● 175 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49 Home Office Identify theft web site (www.identitytheft.org) An awareness site created by the government iCompli (www.icompli.co.uk) Portal and e‑newsletter about privacy and data protection compliance Information Commissioner (www.ico.org.uk) Site explaining law for UK consumers and businesses Marketing Law (www.marketinglaw.co.uk) Useful email update on the latest privacy law developments Outlaw (www.out-law.com) Compilation of the latest ­technology-​­related law Privacy International (www.privacyinternational.org) A human rights group formed in 1990 as a watchdog on surveillance and privacy invasions by governments and corporations 33a8d66 6e7d7dc9e13 dd1 05b1 1d31 bb1a 3455 1df2b0 cb9 7186 bc6 d16a 369ee5 b ee72a4a6 c95e 8b44 261 c11b4da31 9ff705 b88da 47d8 4df733 b53a c07db5dfacc 1510e98 0f4 50b60aa5d5a6890 d04 084e1 69f91b0a 0746aa f8db6ad4b36 3cb2aa f7241 c66a 32f777 f8d7 cb0bb287 f89ee b3cc87 25aa013 8eb5 ef5 3e30 c2eaa3 b4 e02a5a6fa 70b0 7f7 fcd90 ba65b61b8 f12 3f1 9667 d8f652fe56 cf4 b7e8a dcc6c3 27fc8c5 9ff18a6 cc5 b550e f27 2207e 2890 e7004 6d87 71b5cc78 c4cc78 b7b5 3ed 7c671 77c6ed c0d9 cb4e3df6 d9b4 f27 9f2 4b01 e9147a 384db32 2798e 50c0f8e b6 be2c8 01b1fb0070 8e12 c6de 961 c5f1c0 06855 d27 b368 f5d3200 457bf86 82875 7da9aa76 fc2 ed63 f83 0eaf0 c38 74ebfb6 7e9c8ed f16 f6dc82 6b51 078e7 60f49c 65a914d4973 444e2 d79a7 58d43b2e 6adbb6da 6d7 cb1 d692 8950 8de5 27b9 8e614 08e5183 8cb468 07e5 f69d5b5 f32e 0b59 dd6 d94 9422a0 b5 cc7e 452e d3c3d3a4 8f c8c0 747 d2d9 988b26a4d181 f8d1ae03e7 8f6a 3d5a4 0036 f14 74f03bfa68a33 1f 24180d1943 19c5b53 60e51 00c27f5c0 6601 be5b55b9 1eb2 908e5 cb1a159e 6e2b bd19 f0b1a72 c4971 21fb1e8 ee703 c88 1d05 b4f370 b27a4 cb9a 76d3 8fc7fa3 9f9 6e4c1 25a430 5bfc91 dc8 7d41 6036 0fb00fca063 6038aae 4774 0cfd0a7 b33ab4d c075 cc2 f31a 7f7 245 c7a5fca8 f749 3b20 d1be27aa69 d40 c7a2 f7f36b3f0ae f35 e190ac1c9 6f6 f10 748 f84c4d3a 7aaad61 9ff8ef2 9806 c05 43c99b8a 20c9a1df4 b83b8 d125 48d1f8 da85e1 7f2 45c47e48 f5 cf18c4a38b4fb6219a 69980 133a2 49

Ngày đăng: 14/01/2024, 18:25

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan