E-commerce vs business, Other Subject

Assignment Help:

E-COMMERCE VS BUSINESS

While several use e-business and e-commerce interchangeably, they are different concepts. In e-commerce information and communications technology (ICT) is used in business-to-consumer transactions (transactions between firms/ organizations and individuals) and inter-organizational or inter-business transactions (transactions between and among firms/ organizations).

In e-business on the other hand, ICT is used to improve one's corporation. It includes any procedure that a business organization (either a for-profit, governmental or non-profit entity) conducts over a computer-mediated network. A more complete definition of e-business is:

"The alteration of an organization's processes to deliver additional customer value via the application of technologies, philosophies and computing paradigm of the new economy."

Three key processes are improved in e-business:

1.   Customer-focused processes- which comprise marketing and promotional efforts, processing of customer's purchase orders and payments, selling over the Internet and customer support, among others.

2.   Internal management processes- which comprise employee training, services, video-conferencing, internal information-sharing and recruiting. Electronic applications improve information flow between sales and production forces to get better sales force productivity. Workgroup electronic publishing and communications of internal business information are equally made more efficient.

3.   Production processes- which enhance ordering, procurement and replenishment of stocks; electronic links with suppliers; processing of payments and production control processes, among others.


Related Discussions:- E-commerce vs business

Importance of human communication, Importance of Human Communication: Comm...

Importance of Human Communication: Communication, indirectly and directly, plays vital role in society: I am looking for assignment help on the topic Importance of Human Communica

Describe the models of managed care, The following chart is just one exampl...

The following chart is just one example of how money flows from the employer who purchases a health plan, to the providers: The employer pays the Health plan on a monthly basis.

Methods of overtaking maneuvers, Methods of Overtaking Maneuvers Early...

Methods of Overtaking Maneuvers Early studies or researches on overtaking manoeuvre were developed by the American, Swedish and Australian. The first study was done by Lauer a

Access control, Access Control Identificatio n is an declaration of ...

Access Control Identificatio n is an declaration of who an important person is or what something is. If a person makes the declaration "Hello, my name is Johanna Doe." the

Server environment - in hardware, In hardware A server is a computer th...

In hardware A server is a computer that has been place away to run a specific server application. For illustration, while the software Apache HTTP Server is used as the web ser

Types of diseases caused by drugs, SOLVE is an interactive educational prog...

SOLVE is an interactive educational programme designed by the ILO to assist in the development of policy and action to address psychosocial hazards or problems at workplaces. The

Requirements from an operations perspective of competing on, QUESTION 1 ...

QUESTION 1 Critically discuss the following requirements from an operations perspective of competing on (a) quality (b) cost (c) flexibility (d) dependability (e

American government texas edition, i really need some help in college amer...

i really need some help in college american government book, "we the people ninth edition texas

Report on security council resolution, Large protests have been taking plac...

Large protests have been taking place in Libygpt (a state in North Africa) against its oppressive authoritarian leader General Weird Al -dress-sense. The protesters want the Genera

Ten most horrible security mistakes by it professionals, The Ten most horri...

The Ten most horrible Security Mistakes by  IT Professionals 1.   by means of unencrypted protocols for organization systems, firewalls, routers, and PKI. 2.   Giving users

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd