ONLINE FILE W1.1 ZAPPOS CORE VALUES
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.1 ONLINE FILE W1.1 ZAPPOS CORE VALUES 1. Deliver WOW Through Service: Anything worth doing should be done with WOW. 2. Embrace and Drive Change: Constant change allows for faster evolution than competitors; most change is driven from the bottom up—from those employees directly involved with the processes, customers, and issues. 3. Create Fun and a Little Weirdness: In celebrating the individual differences in each employee, employees are more engaged in the work that they do, and the company as a whole becomes more innovative. 4. Be Adventurous, Creative, and Open-Minded: It’s important for people and the company as a whole to be bold and daring (but not reckless). 5. Pursue Growth and Learning: The best expertise an employee can bring is expertise at learning and adapting and figuring new things out—helping the company grow, and in the process, they grow. 6. Build Open and Honest Relationships with Communication: Openness and honesty make for the best relationships because that leads to trust and faith. 7. Build a Positive Team and Family Spirit: Creating an environment that is friendly, warm, and exciting encourages diversity in ideas, opinions, and points of view. 8. Do More with Less: Continuous innovation and endeavoring to be more efficient, always trying to figure out how to do something better, and using mistakes as learning opportunities. 9. Be Passionate and Determined: Passion is the fuel that drives the individual and the company forward. 10. Be Humble: We carry ourselves with a quiet confidence because we believe that, in the long run, our character will speak for itself. Source: Zappos.com. Used with permission.
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.2 W1.2 Part 1: Introduction to E-Commerce and E-Marketplaces ONLINE FILE W1.2 Application Case MARY KAY’S EC SYSTEMS Founded in 1962, Mary Kay (marykay.com) has about Movies and videotapes are available on YouTube 1.8 million consultants selling its cosmetics and fragrances in (youtube.com) and on movies.go.com. 34 countries. In 2008, the company had about $2.4 billion in Several blogs are available, both for and against the wholesale sales. company (e.g., marykayandrews.com/blog). As a company that has based its reputation on per- Auctions and fixed-price items are available for sale on sonal contacts through door-to-door visits and home gath- eBay. erings, one might think that Mary Kay would not benefit from EC. Actually, the opposite is true. Currently, more Mary Kay provides a consultant locator on the Internet than 95 percent of Mary Kay’s independent salespeople (marykay.com/customerpreferences/locator.aspx). place orders via the Internet. All of these developments are supported by an exten- The Problem sive hardware and software infrastructure, including a wire- The cosmetics market is very competitive, but it is growing less remote management system at the 760,000 square-foot rapidly, especially in developing countries. Mary Kay is try- corporate headquarters, an extensive wide area network ing to capitalize on this trend. The Mary Kay business (WAN, see Chapter 8), and a large data center. Some of the model enables rapid growth into new markets. By the early EC systems are used enterprise wide (e.g., service desk, 2000s, consultants found that more and more customers ticketing system for consultants attending events, and ser- wanted to shop online. With a long and global supply vice requests made by consultants). Others are functional chain and the need to manage almost 2 million consul- (e.g., accounting, finance, marketing, and inventory con- tants, it was clear that automation was needed, but Mary trol). The company uses an intranet for internal communi- Kay’s existing computer system was old and lacked Web or cations as well as dozens of other EC applications. e-commerce applications. Therefore, a major overhaul of In addition to providing better support to consul- the information systems was needed. Finally, it became tants, the EC initiatives produced other benefits, such as clear that the emergence of social computing might pro- greater efficiency, reduced costs and downtime, and vide a golden opportunity for Internet marketing by the improved service. In terms of human resources, it enabled company. the company to handle its rapid growth without a substan- tial increase in staffing. The changes also have allowed EC The Solution personnel to focus on strategic tasks. Mary Kay found that Mary Kay’s IT department is now split into three divisions: its engineers and technical people now have time to spend e-commerce, supply chain, and back-office support. on new innovations. Because of pressure from the consultants, the restructuring focused on e-commerce. Sources: Compiled from Rubin (2007), Channel Insider (2008), The company’s goals and objectives were set based on LGC Wireless (2008), Dubie (2006), and marykay.com (accessed industry best practices. Goals and objectives determine June 2009). what, how, and when the company is operated, and these also apply to EC initiatives. Mary Kay’s EC solution included the creation of an electronic service desk that supports Questions consultants in 30 countries in a standardized way. Mary Kay 1. List the drivers of EC at Mary Kay. also introduced a global electronic ordering system, called 2. List the business pressures faced by Mary Kay. How Atlas, that allows the consultants to communicate with did Mary Kay respond to them? company warehouses. An intelligent data repository that dynamically maintains a logical model of the EC environ- 3. What new EC models did Mary Kay implement? ment can be accessed by Mary Kay IT staff. 4. What types of EC transactions is Mary Kay Mary Kay and its consultants are also making extensive involved in? use of social computing. The following are some represen- 5. What social networking activities is Mary Kay tative examples of how Mary Kay uses social computing: involved in? The company posts job opening announcements on 6. What were the benefits of the new EC initiative to several sites, including MySpace Jobs (classifieds. Mary Kay and its employees and customers? myspace.com/job).
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.3 Chapter One: Overview of Electronic Commerce W1.3 REFERENCES FOR ONLINE FILE W1.2 Channel Insider. “Mary Kay Gets IT Makeover.” April LGC Wireless. “Mary Kay Puts a New Face on 25, 2008. channelinsider.com/c/a/News/Mary- Wireless.” LGC Wireless case study, 2008. lgcwireless. Kay-Gets-IT-Makeover (accessed March 2009). org/downloads/Case_Study_Mar y_Kay.pdf Dubie, D. “Mary Kay Makes Over Its WAN.” Network (accessed March 2009). World, June 1, 2006. networkworld.com/newsletters/ Rubin, C. “More Than Skin Deep.” Communication accel/2006/0529netop2.html (accessed March 2009). News, March 2007. ONLINE FILE W1.3 Application Case DELL—USING E-COMMERCE FOR SUCCESS The Problem/Opportunity Sales to the first group are classified as business-to- Founded in 1985 by Michael Dell, Dell Computer Corp. consumer (B2C). Sales to the other three groups are classi- (now known as Dell) was the first company to offer fied as business-to-business (B2B). Consumers shop at personal computers (PCs) via mail order. Dell designed its dell.com using an electronic catalog. The sales are com- own PC system (with an Intel 8088 processor running at pleted using mechanisms described in Chapters 2 and 3. 8 MHz) and allowed customers to configure their own In addition, Dell sells refurbished Dell computers and customized systems using the build-to-order concept. This other products at electronic auctions (dellauction.com). concept was, and is still, Dell’s cornerstone business Online auctions are an important sales channel. In 2006, model. By 1993, Dell had become one of the top five Dell opened physical stores, mainly in reaction to customer computer makers worldwide, threatening Compaq, demands. which started a price war. At that time, Dell was taking Business-to-Business EC Most of Dell’s sales are to orders by fax and snail mail and losing money. Losses businesses. Whereas B2C sales are facilitated by standard reached over $100 million by 1994. The company was in shopping aids (e.g., catalogs, shopping carts, credit card trouble. payments; see Chapter 2), B2B customers obtain addi- The Solution tional help from Dell. Dell provides each of its nearly 100,000 business customers with Premier Dell service. Direct Marketing Online For example, British Airways (BA) considers Dell to be The commercialization of the Internet in the early 1990s a strategic supplier. Dell provides notebooks and desktops and the introduction of the World Wide Web in 1993 pro- to 25,000 BA users. Dell offers two e-procurement services vided Dell with an opportunity to expand rapidly. Dell to BA purchasing agents. The more basic service, Premier implemented aggressive online order taking and opened Dell, allows BA (and other businesses) to browse, buy, and subsidiaries in Europe and Asia. Dell also started to offer track orders on a Dell Web site customized for the user’s additional products on its Web site. This enabled Dell to requirements. The site enables authorized users to select batter Compaq, and in 2000 Dell became number one in preconfigured PCs for their business unit or department. worldwide PC shipments. At that time, Internet sales A more advanced version, Premier B2B, supports topped $50 million per day (about $18 billion per year). e-procurement systems such as those from Ariba. This Today, Dell (dell.com) sells about $62 billion a year in provides automatic requisition and order fulfillment once computer-related products online, from network switches an authorized user has chosen to buy a PC from Dell. BA to printers, employing over 88,000 people. has placed the e-procurement tools on its E-Working Direct online marketing is Dell’s major electronic com- intranet. This allows authorized staff to purchase PCs merce (EC) activity. Dell sells to the following groups: through a portal that connects directly to Dell’s systems. ◗ Individuals for their homes and home offices In addition to supporting its business customers with ◗ Small businesses (up to 200 employees) e-procurement tools, Dell also is using EC in its own pro- ◗ Medium and large businesses (over 200 employees) curement. Dell developed an e-procurement model that it ◗ Government, education, and health care organizations shares with its business partners, such as BA. One aspect
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.4 W1.4 Part 1: Introduction to E-Commerce and E-Marketplaces ONLINE FILE W1.3 (continued) of this model is the use of electronic tendering to conduct execution accuracy, reduce order-to-delivery time, and bids (see Chapter 5). Dell uses electronic tendering when enhance customer service, Dell partnered with Accenture it buys the components for its products. to create a new, high-performance supply chain planning In 2000, Dell created a B2B exchange at dell.b2b.com. solution. Now in place in Dell’s plants around the world, This venture was a failure, like most other exchanges (see the program, which paid for itself five times over during Chapter 5). the first 12 months of operation, enables Dell to adapt more quickly to rapidly changing technologies and the E-Collaboration Dell has many business partners with business environment, maintaining its position as a high- whom it needs to communicate and collaborate. For exam- performance business. Dell also has automated its factory ple, Dell uses shippers, such as UPS and FedEx, to deliver scheduling, demand-planning capabilities, and inventory its computers to individuals. It also uses third-party logis- management using information technology and e-supply tics companies to collect, maintain, and deliver compo- chain models. nents from its suppliers, and it has many other partners. Dell is using Web Services, an EC technology, to facilitate Affiliate Program Dell provides affiliate partners the communication and reduce inventories. Web Services facili- opportunity to link from their Web sites to Dell.com. Dell tate B2B integration. Integration efforts began in 2000 pays 2 to 4 percent on any qualified sale made from click- with other technologies when Dell encouraged its cus- ing on Dell’s link at the partners’ sites (referring buyers). tomers to buy online. The B2B integration offer combines The Results Dell PowerEdge servers based on Intel architecture and Dell has been one of Fortune’s top five “Most Admired” webMethods B2B integration software to link customers’ companies since 1999, and it continuously advances in the existing ERP (enterprise resource planning) or procurement rankings of the Fortune 500 and the Fortune Global 500. systems directly with Dell and other trading partners. In Dell has over 100 country-oriented Web sites, and profits addition, Dell can provide e-procurement applications and are nearing $3 billion a year. If you had invested $10,000 consulting services. Dell also educates customers in its in Dell’s initial public offering (IPO) in 1987, you would be technologies and offers suggestions on how to use them. a millionaire just from that investment. This is particularly true for emerging technologies such as In 2006, Dell opened physical stores to match its wireless. competitors and customer demands. (Its major competitor Finally, Dell has a superb communication system with is HP. In 2006, HP regained its “top PC maker” position, its over 15,000 service providers around the globe. leaving Dell in second place and stayed in the lead through E-Customer Service Dell uses a number of different tools 2008.) Michael Dell returned to the CEO position in 2006, to provide superb customer service around the clock. To and a restructuring of the company began shortly there- leverage customer relationship management (CRM)—a cus- after. All sales to businesses will be managed centrally, tomer service approach that is customer centered for last- rather than from three regional headquarters around the ing relationships—Dell provides a virtual help desk for globe. The company cut its workforce by 8,000 in 2009. self-diagnosis and service as well as direct access to tech- Still, over 95 percent of its business is online and nical support data. In addition, a phone-based help desk through mail orders. It also launched a blog called is open 24/7. Customers can also arrange for a live chat Direct2Dell (en.community.dell.com/blogs/direct2dell). Dell with a customer care agent. Product support includes trou- also is expanding its business not only in the computer bleshooting, user guides, upgrades, downloads, news and industry but also in consumer electronics. It is clearly an press releases, FAQs, order status information, a “my example of EC success. account” page, a community forum (to exchange ideas, information, and experiences), bulletin boards and other Sources: Compiled from National Cristina Foundation (2006), customer-to-customer interaction features, training books Finkle (2008), dell.com and dellauction.com (accessed February 2009). (at a discount), and much more. Dell also offers educa- tional programs at learndell.com. Dell keeps a large customer database. Using data min- Questions ing tools, it learns a great deal about its customers and attempts to make them happy. The database is used to 1. List all the types of EC transactions used by Dell. improve marketing as well. 2. List the business models used by Dell. Intrabusiness EC To support its build-to-order capabili- 3. List the competitive advantage of Dell over brick- ties, significantly improve its demand-planning and factory and-mortar competitors.
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.5 Chapter One: Overview of Electronic Commerce W1.5 REFERENCES FOR ONLINE FILE W1.3 Finkle, J. “Top Dell Execs Leave as PC Maker National Cristina Foundation. “Dell Recycling.” Restructures.” Reuters, December 31, 2008. Cristina.org. cristina.org/dell.html (accessed January reuters.com/article/businessNews/idUSWNAB6 2009). 24720081231?feedTy pe=RSS&feedName= businessNews (accessed April 2009). ONLINE FILE W1.4 Application Case BOEING CHANGES THE NATURE OF ITS BUSINESS WITH GLOBAL COLLABORATION Boeing, the world’s largest aerospace company, has been a delivery is late, but the actual cost of development and major player in the global economy for almost a century. manufacturing is spread across its network of collabora- The company undertook a far-reaching transformation as it tors. At the same time, building such global relationships used cutting-edge materials and electronics and high-level may help the company sell its planes overseas. The biggest technology for the design and assembly process of its new savings are in the time saved through the online collabo- passenger plane—the Boeing 787. The new plane is Boeing’s ration process (from 33 to 50 percent), creating a huge bid for market leadership in competition with Airbus. The competitive advantage. new midsize passenger jet will have an outer shell and about Collaboration is a necessity for Boeing for several rea- half of its parts made of carbon-fiber-reinforced plastic, sons. Airplanes are huge and enormously complex. Politically, which makes it lighter and gives it better fuel economy. In sales of a “global product” are enhanced when people in September 2008, the company had over 700 firm orders for other countries are building parts of the airplane. Companies the new 787, which seats from 250 to 330 passengers in in these countries may then buy from Boeing. Basic collabo- varying configurations. The list price is about $150 million ration is done through information-flow tools such as per plane. Microsoft SharePoint. Boeing and partners are using Dassault The previous innovation in aviation manufacturing Systèmes 3D and Product Lifecycle Management solutions. was to have global partners work from a common blueprint Other IT tools used are a product suite from Exostar to produce parts—actually, whole sections of the airplane— LLC, with which Boeing can share two-dimensional draw- that were then physically shipped to a Boeing assembly ings, conduct forward and reverse auctions (Chapter 2), plant near Seattle to see if they fit together. Prior to the and respond to RFPs (Chapter 5), and an application called 787, wood mock-ups of planes would be constructed to see CATIA. The plane is designed at Global Collaboration if parts built by partners around the world would really fit Environment, a special online site maintained by Boeing. together. When there was no fit, cost in terms of time, Three levels of collaboration are facilitated money, and delays was extreme. between teams and companies. In the first level—design Boeing’s changes go beyond making planes faster and collaboration—all parties involved log in and make their cheaper. The new business model takes Boeing from a changes electronically in the blueprints, and the team manufacturer to a high-end technology systems integrator. works together. Quality is improved because the computer In 2004, Boeing’s IT systems people were consolidated finds the mistakes. The next level involves suppliers into the Boeing Technology Group. Now, parts are designed working with their supply chains. The third level is real- from concept to production concurrently by partners time collaboration that involves a considerable amount of (including companies in Japan, Russia, and Italy) and product life-cycle management across multiple countries “assembled” in a computer model maintained by Boeing enabled by technology that differentiates Boeing’s new outside its corporate firewall. Boeing’s role is one of inte- model from the previous kinds of global relationships. grator and interface to the airlines, while the partners take Boeing also uses the new partnership to solicit ideas for responsibility for the major pieces, including their design. how to improve designs, integration, and so on. This Boeing still takes the hit if there is no fit and the plane’s results in cost cutting.
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.6 W1.6 Part 1: Introduction to E-Commerce and E-Marketplaces ONLINE FILE W1.4 (continued) Boeing maintains 10 multimedia rooms at its Everett, security technology has developed to the point that the Washington, complex for the use of collaboration teams. security of the information is assured. These are open 365 days a year, 24 hours a day. A visual- All of this has helped Boeing accelerate the design ization application developed by Boeing allows the teams process, overcome some unforeseen problems, and deliver to do real-time design reviews of complex geometry with- the planes in fall 2008. out any lag time as the models load. Meetings are con- ducted in English, with sidebar conversations, as needed, Sources: Compiled from Cone (2006), Workforce-Performance (2006), in a team member’s native language. Collaborative design Berstein (2006), and boeing.com (accessed January 2009). also speeds the design process, helping Boeing to avoid expensive penalties from its customers if the plane is not delivered on time, and it gives the company more flexibility Questions in simultaneously designing multiple versions of the 787 1. Describe online collaboration and its benefits to that are part of its wide-ranging appeal in the marketplace. Boeing. Finished designs are stored in another Dassault prod- 2. List the levels of collaboration and the parties uct, Enovia, which is also maintained by Boeing. The stor- involved. age has become an enormous data-management task. The 3. How does technology facilitate collaboration? issue of security has also been a concern; however, REFERENCES FOR ONLINE FILE W1.4 Berstein, M. “Boeing Shrinks Supply Chain to Workforce-Performance. “Boeing 787 Global Design Team Facilitate Risk Sharing.” World Trade, April 1, Benefits from Collaboration Solution Incorporating 2006. Simulation,” Tech Horizon, May 22, 2006. techlearn Cone, E. “Flying in Formation.” CIO Insight, March newsline.com/News/05-22-06a.html (accessed January 2006. 2009). ONLINE FILE W1.5 Application Case CAMPUSFOOD.COM—STUDENT ENTREPRENEURS Campusfood.com’s recipe for success was a simple one: company’s customer base. This involved expanding to Provide interactive menus to college students, using the other universities, attracting students, and generating a power of the Internet to replace and/or facilitate the tra- list of restaurants from which students could order food for ditional telephone ordering of meals. Launched at the delivery. Currently, some of these activities are outsourced University of Pennsylvania (Penn), the company takes to a marketing firm, which enabled the site to add dozens thousands of orders each month for local restaurants— of schools nationwide. In 2004, the company served 200 bringing pizzas, hoagies, and wings to the Penn commu- schools linked to over 1,000 restaurants. nity and to dozens of other universities. Financed through private investors, friends, and fam- Founder Michael Saunders began developing the site ily members, the site was built on an investment of less (campusfood.com) in 1997 while he was a junior at Penn. than $1 million. (For comparison, another company with With the help of some classmates, Saunders launched the services also reaching the college-student market invested site in 1998. After graduation, he began building the $100 million.) Campusfood.com’s revenue is generated
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.7 Chapter One: Overview of Electronic Commerce W1.7 ONLINE FILE W1.5 (continued) through transaction fees—the site takes a 5 percent com- University students who signed up at Titan Poker with mission on each order from the sellers (the restaurants). a special bonus code provided by Campusfood.com were When you visit Campusfood.com, you can: eligible to play in a series of exclusive online poker tour- ◗ Navigate through a list of local restaurants, their hours naments (in April 2006). Winners received special of operation, addresses, phone numbers, and other Campusfood Cash coupons valued at $20,000, redeemable information. for food orders at participating restaurants. ◗ Browse an interactive menu. The company takes a restau- rant’s standard print menu and converts it to an elec- Questions tronic menu that lists every topping, every special, and every drink offered, along with the latest prices. 1. Classify this application by EC transaction type. ◗ Bypass “busy” telephone signals to place an order online, 2. Explain the benefits of Campusfood.com for its stu- and in so doing, avoid miscommunications. dent customers and for the restaurants it represents. ◗ Get access to special foods, promotions, and restaurant 3. Trace the flow of digitized information in this venture. giveaways. The company is working to set up meal deals that are available online exclusively for Campusfood.com 4. How does the outsourcing of the marketing activi- customers. ties contribute to the business? ◗ Arrange for electronic payment of an order. 5. What is the benefit of the Titan Poker contest to the company? REFERENCES FOR ONLINE FILE W1.5 Campusfood.com. campusfood.com (accessed November February 16, 2006. emediawire.com/releases/2006/2/ 2009). emw346598.htm (accessed February 2009). eMediaWire. “Titan Poker Teams Up With Campusfood for Tournaments Aimed at College Students.” Online File W1.6 Major Characteristics of Web 2.0 The following are representative characteristics: ◗ User-created content (self publishing). ◗ The ability to tap into the collective intelligence of users. The more users contribute, the more popular and valuable a Web 2.0 site becomes. ◗ Unique communication and collaborative environment. ◗ Making data available in new or never-intended ways. Web 2.0 data can be remixed or “mashed up,” often through Web Services interfaces, much the way a dance-club DJ mixes music. ◗ The presence of lightweight programming techniques and tools lets nearly anyone act as a developer (e.g., wikis, blogs, RSS, and podcasting). (continued)
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.8 W1.8 Part 1: Introduction to E-Commerce and E-Marketplaces Online File W1.6 (continued) ◗ The virtual elimination of software-upgrade cycles makes everything a perpetual beta or work in progress, and allows rapid prototyping using the Web as a platform. ◗ Unique sharing of content or all media. ◗ Networks as platforms, delivering and allowing users to use applications entirely through a browser. ◗ Open source architecture, which makes connectivity to computing resources simple. ◗ Users own the data on the site and exercise control over that data. ◗ An architecture of participation and digital democracy encourages users to add value to the application as they use it. ◗ New business models are created. ◗ A major emphasis on social networks. ◗ A rich interactive, user-friendly interface based on Ajax or similar frameworks. Ajax (Asynchronous JavaScript and XML) is a Web development technique for creating interactive Web applications. ◗ More productive organization communication due to improved search, links, user authority, etc. ◗ Global spread of innovation. As soon as a successful idea is deployed as a Web site in one country, similar sites appear around the globe. Online File W1.7 What Is a Radio Frequency Identification (RFID) System? Radio frequency identification (RFID) is a technology that uses electronic tags (or transponders), instead of bar codes, to automatically identify objects or items. The tags can be attached or embedded in objects, animals, or humans. RFID read- ers use radio waves to interact with the tags. The radio waves enable the unique identification and location of the objects, transmission of data, and/or storage of information about the object. Some tags can be read from several meters away and beyond the line of sight of the reader. An RFID system consists of (1) an RFID tag that includes an antenna and a chip with information about the item and (2) an RFID reader that contains a radio transmitter and receiver. An RFID tag remains inactive until radio frequency energy from the radio transmitter (on the tag) hits its antenna, giving the chip enough power to emit a 96-bit string of information, which is read by the radio receiver. This is three times the amount of information a bar code can hold, and the tag can be read through cardboard, wood, and plastic at a range of up to 30 feet. The reader then passes the informa- tion, wirelessly or through a docking station, to a computer for processing (see Exhibit W1.7.1). RFID Applications The number of applications for RFID is rapidly increasing. RFID technology is already being used for a variety of purposes: ◗ Track moving vehicles. The E-Z Pass (ezpass.com) prepay toll system uses RFID, as does Singapore’s Electronic Road Pricing system, which charges different prices to drive on different roads at different times. ◗ Track people. In some Japanese schools, tags in backpacks or clothes track students’ entry and departure from school buildings. In Denmark, the LEGOLAND amusement park offers parents a child-tracking system that combines RFID and Wi- Fi. As of 2006, all new U.S. passports contain an RFID tag that can be scanned on entry and departure from the United States. ◗ Track individual items. The Vatican Library is tagging over 2 million items in its collection. Retail giant Marks & Spencer is using antitheft tags on clothes and is tagging employee ID cards to control entrance into secure areas. The (continued)
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.9 Chapter One: Overview of Electronic Commerce W1.9 Online File W1.7 (continued) EXHIBIT W1.7.1 How Does RFID Work? RFID Tag Wireless (Transponder) Transmission Antenna RFID Reader Host Processor Control Business Rules Source: Drawn by E. Turban. Jacksonville, Florida, airport has a pilot test for RFID tracking of luggage. The U.S. army is tracking inventory, including weapons, with RFID tags. The Star City Casino in Sydney, Australia, is using RFID to keep track of 80,000 costumes and uniforms. ◗ Protect secure areas. FedEx uses RFID-tagged wristbands to give drivers access to their vehicles, reducing theft and speeding delivery time. The New York Police Department uses RFID tags embedded in ID tags to track visitors. ◗ Record transactions. Exxon Mobil Corp.’s Speedpass cards and key rings allow customers to speed through checkout lines. At the Baja Beach Club in Barcelona, Spain, an RFID chip embedded just under a guest’s skin is used to pay for purchases, including drinks at the pool. Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modu- lating and demodulating a (RF) signal, and other specialized functions. The second is an antenna for receiving and trans- mitting the signal. Tags can be active or passive. Active tags have their own internal power supply; passive ones do not have it. Passive tags collect power from the incoming signal. Active tags are more reliable due to having their own power supply, and they have a larger memory range (500 feet to 1,500 feet). For details see en.wikipedia.org/wiki/Rfid. The major capabilities of RFID are: ◗ Quick tracking of where items are (their location) in real time ◗ Finding extensive information about the items ◗ Enabling quick inventory taking of items (continued)
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.10 W1.10 Part 1: Introduction to E-Commerce and E-Marketplaces Online File W1.7 (continued) In contrast with a bar code, the information can be read from a much greater distance (about 30 feet or 10 meters with passive tags; 500 feet to 1,500 feet with active tags) and no line of sight is required. The technology is in extensive use in transportation, hospitals, libraries, and the like (see en.wikipedia.org/wiki/Rfid). Its most promising use is in enterprise supply chain management to improve the efficiency of inventory tracking (see Online Appendix A). These capabilities result in the following benefits: Benefits for Manufacturers RFID solutions provide the real-time information that’s necessary to improve operating efficiencies in a number of indus- trial applications. By automatically detecting product movements throughout the manufacturing process, RFID provides real-time inventory visibility while minimizing the need for human intervention. With RFID, it is possible for manufacturers to: ◗ Increase speed and efficiency, with fewer errors throughout the entire assembly process. ◗ Take inventory and perform picking operations to update inventory levels in real time. ◗ Improve efficiencies for work-in-process (WIP) reporting. ◗ Improve inventory visibility to production employees who use just-in-time (JIT) systems. ◗ Reduce stock levels, resulting from improved inventory management. ◗ Automate reporting of all material moves both inbound/outbound and within your facility. Benefits for Retailers RFID technology empowers retailers to increase inventory visibility, reduce labor costs, and improve profitability by deliv- ering the benefits of enterprise mobility to a variety of applications: ◗ Read/write RFID tags automatically at shipping and receiving doors to expedite loading and unloading processes. ◗ Improve customer satisfaction by ensuring that products are stocked and available. ◗ Reduce shrinkage, fraud, and spoilage. ◗ Increase in-stock merchandise for higher sales volumes and increased profits. ◗ Reduce human intervention and decrease labor costs. ◗ Dramatically improve overall warehousing efficiencies. Benefits for Transportation Companies RFID solutions can provide fast, accurate information to improve operational efficiencies in a variety of transportation applications. By automatically tracking assets throughout the course of transit, RFID transforms the tracking process and yields unsurpassed asset management and visibility. RFID can: ◗ Enhance passenger and employee safety by virtually eliminating security risks. ◗ Improve the efficiency of baggage-handling processes to reduce loss and theft, and increase customer satisfaction. ◗ Streamline cargo processes and reduce labor costs. ◗ Control cost by improving all facets of inventory tracking and management. Benefits for Federal Government and Defense Agencies RFID technology provides the solutions that government agencies need to improve security and inventory visibility throughout the world. With RFID, government and defense agencies can: ◗ Locate and track military personnel instantaneously. ◗ Increase the speed and accuracy of deliveries by allowing items to be inventoried at the container level. ◗ Augment available staff power by automating functions previously executed manually. ◗ Access real-time inventory to improve visibility and reduce shrinkage. (continued)
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.11 Chapter One: Overview of Electronic Commerce W1.11 Online File W1.7 (continued) Examples RFID implementation is slow due to privacy and security concerns, especially when it involves consumers. On the other hand, an increasing number of companies use the technology internally frequently in combination with other IT systems, as is done by Nokia. RFID at Nokia Security guards employed at Nokia carry mobile phone handsets with an attached RFID tag and RFID reader. RFID tags are also installed at various points around the facility. At the start of a shift, guards use the phones to read their RFID- enabled name badges. Then, security guards do their rounds, opening the handsets to read the various tags as they pass by them. Details of the phone number and RFID tag just read are transmitted over the cell phone network. Supervisors are thus given accurate information as to when a particular guard started and finished a shift, whether the guard patrolled all the required locations, and where the guard was at a particular point in time. In addition, supervisors can use the text and phone function to ask guards to recheck an area, vary their route, and the like. RFID at Harmon Hospital Keeping track of relatively small, movable assets (such as wheelchairs, pulse oximeters, and other medical devices) in hos- pitals can be time-consuming and difficult. Equipment may be stored in cupboards, moved to other wards and not returned, or sent home with patients and not returned. Studies also suggest that when hospital staff are unable to find the equipment they need, rather than instigating a full-scale search, they tend to place an order for more equipment. Thus, hospitals incur significant costs in both searching for equipment and in ordering equipment that is not actually necessary. Harmon Hospital in Las Vegas is addressing these concerns by attaching active RFID tags to various medical devices and installing RFID readers at various points throughout the hospital. This enables staff to locate any required item of equip- ment, with the system providing a text-based report or a map of the hospital indicating the location of the desired piece of equipment. Many other organizations in a variety of industries experience similar problems as those at Harmon Hospital. RFID in Philadelphia Cabs Taxicabs in Philadelphia, Pennsylvania, are equipped to accept payments using RFID technologies. Passengers can use RFID- enabled credit cards, such as PayPass from MasterCard or similar cards from Visa or American Express, to pay their cab fares. A terminal is located behind the front seat, facing the passenger. To activate the system, passengers wave their RFID-enabled cards near the reader. The driver can then complete the transaction using either credit or debit facilities. Payments are processed by sending payment information over wireless networks. Such technologies are reducing the time taken to complete a transac- tion. This system also can be used by the cab driver for routing and navigational information, for work scheduling (signing on and off a shift), for keeping logs of trips, and for tracking items mistakenly left by passengers in the cab (O’Connor 2006). RFID Use by CHEP The Asia Pacific Division of CHEP (famous for its pallets and reusable containers, based in Florida) has developed an innovative use of RFID for the automotive industry in Australia. CHEP manufactures and then rents reusable, custom-made, plastic stacking crates for transporting parts and components along the automotive supply chain. In addition to the tradi- tional text tags and bar-coded labels, CHEP has now added RFID tags to the outside of these crates. CHEP is able to easily determine which customer has which crate, while it gives the automotive companies much more precise insights into the location of parts both within their manufacturing environment and along their extended supply chains. Some good sources for information on RFID are aimglobal.org/technologies/RFID, rfidjournal.com, and ceng.usc.edu/~anrg/SensorNetBib.html. REFERENCES FOR ONLINE FILE W1.7 Heinrich, C. RFID and Beyond. Indianapolis, IN: rfidjournal.com/article/articleprint/2852/-1/1 Wiley, 2005. (accessed February 2009). O’Connor, M. C. “Philly Cabs Taking RFID Payments on the Road.” RFID Journal, November 29, 2006.
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.12 W1.12 Part 1: Introduction to E-Commerce and E-Marketplaces Online File W1.8 Examples of Innovative EC Applications Pearson Education, Inc., the publisher of this book, in collaboration with O’Reilly & Associates, offers professors reason- ably priced, customized textbooks for their classes by compiling material from thousands of Pearson’s publications and the instructors’ own materials. The customized books are either electronic (Chapter 6) or more expensive hard copies. In Japan, a person can wave a Casio watch over a scanner to purchase products from a vending machine, pay for food in a cafeteria, or pay for gasoline. More than 60 percent of all airline tickets sold in the United States are electronic tickets. It costs more to purchase a ticket from a local travel agent or by phone directly from the airline. In large airports, travelers can get their boarding passes from a machine. Most airlines allow travelers to print their boarding passes at home. In January 2004, NASA’s Web site received more than 6.5 billion hits in a few days—the biggest Internet government event to date—because people were interested in viewing the Mars Exploration Rover’s landing on Mars. Several banks in Japan issue smart cards that can be used only by their owners. When using the cards, the palm vein of the owner’s hand is compared with a prestored template of the vein stored on the smart card. When the owner inserts the card into ATM or vendors’ card readers that are equipped with the system, it will dispense the card owner’s money. The police are alerted if anyone other than the card’s owner tries to use it. Jacobi Medical Center in New York tracks the whereabouts of patients in the hospital. Each patient has an RFID in a plastic band strapped to the wrist. Each time a patient passes an RFID reader, the patient’s location is transmitted in real time to the responsible staff member. The RFID is linked to the hospital’s computer network, connecting the patient’s records to labs, billing, and the pharmacy. Online File W1.9 How Obama Used EC to Win Obama’s campaign team was everywhere on the Internet: MySpace, YouTube, Flickr, Facebook, and Twitter. At my.barackobama.com (MyBO) 1.5 million volunteers were registered, who in turn mobilized supporters and organized com- munities. Through the site, the campaign was able to train a large number of volunteers, arm them with up-to-date tar- geted information, and provide field-workers with names, contact coordinates, and voting histories. They started with voter registration and then turned their efforts to a get-out-the-vote campaign. MyBO redirected the energy of social net- workers to specific, campaign-oriented tasks. The site raised $600 million from just 3 million people. The campaign also built a consensual database of 3 million mobile numbers by promising (and keeping the promise) to get campaign news to the supporters before the news media. Obama’s e-mail list contained about 13 million addresses. Over the course of the campaign, aides sent more than 7,000 different messages, many of them targeted to specific donation- level participants. On average, supporters received 5 to 20 text messages per month, depending on where they lived and what kind of messages they opted to receive. Because social media is such a direct engagement and communication between friends, contacts, and families, ideas, opinions, and information are shared and become part of a close, trusted network. So, social networking brought Obama into the homes and hearts of millions who felt they knew him because they spent so much time with him. Obama’s campaign integrated online marketing methods with a viral campaign using word-of-mouth advertising and marketing techniques to create a real buzz about him. One instance of the marketing campaign was a viral video on YouTube that raised $300,000 in a week. The word-of-mouth advertising helped him raise enormous amounts of money and build his brand. (continued)
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.13 Chapter One: Overview of Electronic Commerce W1.13 Online File W1.9 (continued) Obama on MySpace The official profile page for Barack Obama included a blog, blurbs, news clips, videos, and comments from his MySpace friends. In January 2008, MySpace users selected Obama as the presidential winner taking 46 percent of the vote. Obama on YouTube Barack Obama speeches, events, and TV ads are still available at the official Obama-Biden Campaign YouTube channel. Obama campaign-related videos got 14.5 million hours of viewing time on YouTube. This time would have cost $47 million to buy on television. Obama’s 38-minute speech on race had more than 2 million views on YouTube in just two days after posting. In November of 2008, President Obama chose YouTube as the media stream for his “Saturday Fireside Chats” in both video and audio forms. Obama on Flickr On Flickr, photos of the president were organized by set and tags, including archives, favorites, and his profile. The cam- paign posted intimate photographs from a Chicago hotel room showing the minutes before Obama became president-elect. Obama on Facebook Obama supporters on Facebook found it impossible to be on the site at any given time and not see an Obama ad driving them to BarackObama.com. His Facebook friend count was over 3.1 million. Facebook cofounder Chris Hughes quit the company in early 2007 to help run the Obama campaign’s Web operations. Obama on Twitter On Twitter the campaign used an automated script that let users know that the Obama folks were following them. This sent the message they wanted to communicate, and they wanted to hear from the user. This built a sense of community. Obama’s posts were filled with words like encourage and friends, and every post was a clear call to action. In conclusion, the Obama campaign did not invent anything completely new. Instead, by using social networking applications, they created a powerful way to raise money, organize locally, fight smear campaigns, and get out the vote that helped them bring down Hillary Clinton first, and then the Republicans in 2008. REFERENCES FOR ONLINE FILE W1.9 Carr, D. “How Obama Tapped into Social Networks’ Cone, E. “Local Area Networks: How the Obama Power.” New York Times, November 9, 2008. Campaign Works on the Ground.” CIO Insight, Cone, E. “All Politicking Is Local: How the Obama September 29, 2008. blogs.cioinsight.com/ Campaign Is Using Technology to Change Elections knowitall/content001/local_area_networks_how_ on the Ground.” CIO Insight, September 29, 2008. the_obama_campaign_works_on_the_ground.html blogs.cioinsight.com/knowitall/content001/all_ (accessed March 2009). politicking_is_local_how_the_obama_campaign_ The Guardian. “Barack Obama’s Flickr Page Shows is_using_technology_to_change_elections_on_the Family as Their Lives Changed Forever.” November _ground.html (accessed March 2009). 7, 2008. guardian.co.uk/world/deadlineusa/2008/ Cone, E. “Connecting the Campaign: How the nov/07/barackobama-uselections2008 (accessed Democrats Built Their Network.” CIO Insight, March 2009). September 29, 2008. blogs.cioinsight.com/ Kiss, J. “Why Everyone’s a Winner.” The Guardian, knowitall/content001/connecting_the_ November 10, 2008. guardian.co.uk/media/2008/ compaign_how_the_democrats_built_their_ nov/10/obama-online-strategy (accessed March network.html (accessed March 2009). 2009).
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.14 W1.14 Part 1: Introduction to E-Commerce and E-Marketplaces REFERENCES FOR ONLINE FILE W1.9 (continued) Learmonth, M. “How Barack Obama Won Facebook.” obama-and-hillary-use-twitter-for-social-networking BusinessInsider.com, July 7, 2008. businessinsider. (accessed March 2009). com/2008/7/how-barack-obama-won-facebook Needle, D. “Huffington: ‘Obama Not Elected Without (accessed March 2009). Internet.’” InternetNews.com, November 7, 2008. McCarthy, C. “Surprise! Barack Obama, Ron Paul Win internetnews.com/webcontent/article.php/3783741 MySpace ‘Primaries.’” CNET.com, January 3, 2008. (accessed March 2009). news.cnet.com/8301-13577_3-9839328-36.html Tumulty, K. “Obama’s Viral Marketing Campaign.” (accessed March 2009). Time.com, July 5, 2007. time.com/time/magazine/ McKeever, C. “Obama and Hillary Use Twitter for Social article/0,9171,1640402,00.html (accessed March Networking.” OpenSourceMarketer.com, February 27, 2009). 2008. opensourcemarketer.com/marketing-tools/ Online File W1.10 Response Activities by Organizations Strategic Systems. Strategic systems provide organizations with strategic advantages, enabling them to increase their mar- ket share, better negotiate with their suppliers, or prevent competitors from entering into their territory. There are a vari- ety of EC-supported strategic systems. One example is FedEx’s tracking system, which allows FedEx to identify the status of every individual package, anywhere in the system. Most of FedEx’s competitors have already copied the FedEx system. In response, FedEx has been forced to continuously introduce EC innovations, but so are its competitors, especially UPS. Agile Systems. Agile organizations have the ability to consistently improve productivity—especially during periods of change. To create business agility, organizations use IT in general and EC in particular. The solution provided by EC enables capitalizing on changing industry, government, and business requirements; assimilating required resources and business processes quickly to meet demand; promptly adapting technology to fit new or modified business processes; leveraging existing resources to do the above; and doing it all economically. Continuous Improvement Efforts and Business Process Restructuring and Management. Many companies continuously conduct programs to improve their productivity, quality, and customer service. Two examples of how EC can help companies are Dell and Intel. Dell takes its orders electronically and immediately moves them via enterprise resource planning (ERP) software (see Online Tutorial T1) into the just-in-time assembly operation. Using an almost real-time extranet-based moni- toring system, Intel tracks the consumption of its products by a dozen of its largest customers in order to plan production schedules and deliveries. However, continuous improvement programs may not be a sufficient solution for some business problems. Strong busi- ness pressures may require a radical structural change. Such an effort is referred to as business process restructuring or reengineering (BPR). E-commerce is frequently interrelated with process restructuring that may be needed for implementa- tion of EC initiatives such as e-procurement. Customer and Partner Relationship Management. One of the major symptoms of the digital revolution is that the bar- gaining power of customers is stronger than ever, and that power is growing. The availability of information and the abil- ity to make quick comparisons online (e.g., google.com/products) increases this trend. Customers are called “kings” and “queens,” and organizations must make their customers happy in order to keep them. This may be accomplished through customer relationship management (CRM). EC is not just about buying and selling. Supporting CRM, as we will see throughout the book, is a major function of EC. Such support is done by multiple technologies, ranging from computerized call centers to intelligent agents. Some of the e-CRM topics highlighted in this book are sales force automation, call center tools and operations, personalization, empowerment of customers and frontline employees, support of mobile employees, and partner relationship management. (continued)
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.15 Chapter One: Overview of Electronic Commerce W1.15 Online File W1.10 (continued) Business Alliances. Many companies realize that alliances with other companies, even competitors, can be beneficial. For example, General Motors, Ford, and others in the automotive industry created a huge B2B e-marketplace called Covisint (see Chapter 5). Other types of business alliances include resource-sharing partnerships, permanent supplier–company rela- tionships, and joint design and research efforts. Electronic Markets. Electronic markets, private or public, can optimize trading efficiency, enabling their members to com- pete globally. Most electronic markets require the collaboration of different companies, sometimes even competitors, as you will see in Chapters 5 and 6. Reductions in Cycle Time and Time to Market. Cycle time reduction—shortening the time it takes for a business to com- plete a productive activity from its beginning to end—is extremely important for increasing productivity and competitive- ness. Similarly, reducing the time from the inception of an idea to its implementation (time to market) is important, because those who are first on the market with a product or who can provide customers with a service faster than their competitors enjoy a distinct competitive advantage. Extranet-based applications can expedite the various steps in the process of product or service development, testing, and implementation. Empowerment of Employees. Giving employees the authority to act and make decisions on their own is a strategy used by many organizations as part of productivity improvement programs. Management delegates authority to individuals or teams who can then execute the work faster and with fewer delays. Empowerment of employees may also be part of e-CRM. Empowered salespeople and customer service employees are given the authority to make customers happy and do it quickly, helping to increase customer loyalty. EC allows the decentralization of decision making and authority via empowerment and distributed systems, but simultaneously supports a centralized control. Empowerment can also be achieved by using automated decision systems. Supply Chain Improvements. EC, as is shown throughout the book, and especially in Chapter 5 and Online Appendix A, can help reduce supply chain delays, reduce inventories, and eliminate other inefficiencies. The use of e-supply chain mod- els to automate factory scheduling, which reduces response time and inventory management, can be seen in companies such as Dell and Toyota. Mass Customization: Made to Order in Large Quantities. Today’s customers demand customized products and services; the business problem is how to provide customization and do it efficiently. This can be done, in part, by changing manu- facturing processes from mass production to mass customization (Anderson 2002). In mass production, a company pro- duces a large quantity of identical items. In mass customization, items are produced in a large quantity but are customized to fit the desires of each customer. EC is an ideal facilitator of mass customization, for example, by enabling interactive communication between buyers and designers so customers can quickly and correctly configure the products they want. Also, orders placed online can reach production facilities in minutes. Note that mass customization is not easy to achieve; however, EC can help. Mass customization requires a build-to-order process (see Online File W1.15). Intrabusiness: From Sales Force Automation to Inventory Control. One area where EC has made major progress in sup- porting organizational responses is applications inside the business. The support can be provided to field representatives, warehouse employees, designers, researchers, and office workers. The improvements in productivity for these kinds of employees were fairly slow until the introduction of EC. Knowledge Management. Knowledge management (KM) refers to the process of creating or capturing knowledge, storing and protecting it, updating and maintaining it, and using it whenever necessary. Knowledge management programs and software are frequently associated with EC. For example, knowledge is delivered via corporate portals to assist users or to teach employees. Also, EC implementation requires knowledge, and EC activities such as market research create knowledge. For more on the EC–KM connection, see Chapter 6. Questions 1. List the major business pressures faced by organizations today. 2. List the major organizational responses to business pressures. 3. Describe how EC supports organizational responses to business pressures. 4. Describe an agile organization.
M01_TURB9235_03_SE_WC01.QXD 8/13/10 4:51 PM Page W1.16 W1.16 Part 1: Introduction to E-Commerce and E-Marketplaces REFERENCE FOR ONLINE FILE W1.10 Anderson, D. Build-to-Order and Mass Customization: Production Without Forecasts or Inventory. Los The Ultimate Supply Chain Management and Lean Angeles: CIM Press, 2004. Manufacturing Strategy for Low-Cost On-Demand Online File W1.11 Representative EC Business Models 1. Name your own price. Pioneered by Priceline.com, the name-your-own-price model allows buyers to set the price they are willing to pay for a specific product or service. Priceline.com will try to match a customer’s request with a supplier willing to sell the product or service at that price. This model is also known as a demand-collection model. 2. Find the best price. According to this model, also known as a search engine model, a customer specifies a need and then an intermediate company, such as Hotwire.com, matches the customer’s need against a database, locates the low- est price, and submits it to the consumer. The potential buyer then has 30 to 60 minutes to accept or reject the offer. A variation of this model is available for purchasing insurance: A consumer can submit a request for insurance to Insweb.com and receive several quotes. Many companies employ similar models to show price comparisons and find the lowest price. For example, consumers can go to eloan.com to find the best interest rate for auto or home loans. A well- known company in this area is Shopping.com. 3. Affiliate marketing. Affiliate marketing is an arrangement whereby a marketing partner (a business, an organization, or even an individual) refers consumers to a selling company’s Web site. The referral is done by placing a banner ad or the logo of the selling company on the affiliated company’s Web site. Whenever a customer who was referred to the sell- ing company’s Web site makes a purchase there, the affiliated partner receives a commission (which may range from 3 to 15 percent) of the purchase price. In other words, by using affiliate marketing, a selling company creates a virtual commissioned sales force. Pioneered by CDNow, the concept is now employed by thousands of retailers and manufactur- ers. For example, Amazon.com has over 1 million affiliates, and even tiny Cattoys.com offers individuals and organiza- tions the opportunity to put its logo and link on their Web sites to generate commissions. 4. Group purchasing. In the offline world of commerce, discounts are usually available for purchasing large quantities. So, too, EC has spawned the concept of demand aggregation, wherein a third party finds individuals or small-to-medium enterprises (SMEs), aggregates their small orders to attain a large quantity, and then negotiates (or solicits a tender offer) for the best deal. Thus, using the concept of group purchasing, a small business, or even an individual, can get a discount. This model is also known as the volume-buying model. One leading aggregator is Letsbuyit.com. Online pur- chasing groups are also called e-co-ops. 5. Online auctions. Almost everyone has heard of eBay, the world’s largest online auction site. Several hundred other com- panies, including Amazon.com and Yahoo!, also conduct online auctions. In the most popular type of auction, online shoppers make consecutive bids for various goods and services, and the highest bidders get the items auctioned. E- auctions come in different shapes and use different models. For example, eBay is using about 40,000 “assistants” in a model where the assistants perform the order fulfillment function. 6. Product and service customization. With customization, a product or service is created according to the buyer’s spec- ifications. Customization is not a new model, but what is new is the ability to quickly configure customized products online for consumers at costs not much higher than their noncustomized counterparts. Dell is a good example of a com- pany that customizes PCs for its customers. 7. Information brokers (infomediaries). Information brokers provide privacy, trust, matching, search, content, and other services (e.g., Bizrate.com, google.com/products). 8. Bartering. Companies use bartering (see Chapter 2) to exchange surpluses they do not need for things that they do need. A market maker (e.g., web-barter.com or tradeaway.com) arranges such exchanges. 9. Deep discounting. Companies such as Half.com offer products and services at deep discounts, as much as 50 percent off the retail price (see Chapter 3). (continued)
You can also read