A buyer need not necessarily accept the lowest bid, but may still prefer to use
a tried and tested
supplier at a slightly higher price. But the reverse auction offers buyers a num
ber of benefits: it
shortens the time spent negotiating separately with each supplier, the inclusion
of non-incumbent
suppliers can help to bring pricing down and, according to Mr Allen, It makes the
process a
little more transparent, since everyone can see the lowest price on offer. In ge
neral, nonincumbent
suppliers like the process, though some incumbent suppliers are a little less ha
ppy.
SmithKline Beecham is using private online auctions for global procurement of hi
ghly specified
items at a spend that is attractive to the market. In contrast, Andrew Biggs, ma
naging director of
Bidbusiness.co.uk, is providing public reverse auction facilities for what he de
scribes as low
touch products
construction bricks and sand and gravel, for example as well as ha
ulage
services and builders skips. Buyers can post their tenders on his specialist site
s and sellers can
bid for the work using a pseudonym.
Mirroring the need for liquidity in successful financial markets, auctions need
a competitive
environment and public auction sites seek to attract more buyers and sellers thr
ough features
such as Category Watch from OpenSite, the company that supplies software for Bid
business.
This feature will notify registered users by e-mail when an item of interest to
them is posted.
Now companies that provide auction facilities are looking to factor other variab
les into their
software as well, to let buyers and sellers take account of differences in trans
port costs, lead
times, duration of warranty periods and so on.
The strength of the auction is that it allows prices to fluctuate according to d
emand and factors in
the value of opportunity. But, arguably, its weakness is the fixed nature of the
event. The auction
format demands the simultaneous attention of everyone interested in that particu
lar contract or
item.
Airlines try to match availability to demand and reward early bookers by creatin
g fare classes
where some seats on a particular flight cost more than others. The problem is th
at fare classes are
determined in advance and fare differentials can be rigid, creating a blunt tool
, according to
Sharookh Cambata, president of Greaves Travel USA, an airline ticket wholesaler.
Greaves has teamed up with Equant to develop a dynamic pricing engine to automat
ically adjust
the price of airline tickets according to demand. First, the airline needs to be
able to track all
bookings into one point, so the pricing engine can view the current request agai
nst other
demands. The pricing engine must then work rapidly. Customers booking through a
web site, for
example, are not going to wait minutes for lengthy number crunching; they want a
n instant price.
Greaves will soon start trials of the new system, called Web-fares , but Mr Cambata
believes it
also has potential for other pre-booked travel services, such as hotel accommoda
tion. Using the
system, a web site user would quickly get the price for the flight or service th
ey wanted, but
could also be directed to a cheaper alternative at a different time.
Online auctions are no longer just for surplus goods or unwanted gifts, and the
advent of dcommerce
is more than marketing hype. The concept of dynamic pricing is gathering interes
t
very quickly. For example, Transco, the UK provider of gas piping infrastructure
, has recently
introduced web-based auctions to sell capacity in its pipelines, since demand fo
r gas fluctuates
according to weather and other conditions.
Dynamic pricing is a convincing example of the way in which the internet will fu
ndamentally
change the way we do business.
Questions
1. Explain how SmithKline Beecham is achieving lower prices than traditionally t
hrough ecommerce.
2. To what extent do you think this approach would work for companies smaller th
an
SmithKline Beecham?
3. What are the implications for a dynamic pricing engine referred to a supplier
and its
customers.
Assignment C
1 By Electronic Commerce we mean:
a. Commerce of electronic goods
b. Commerce which depends on electronics
c. Commerce which is based on the use of internet
d. Commerce which is based on transactions using computers connected by
telecommunication network
2 For carrying out B2B e-Commerce the following infrastructure is essential:
(i) World Wide Web
(ii) Corporate network
(iii) Electronic Data Interchange standards
(iv) Secure Payment Services
(v)Secure electronic communication link connecting businesses
a. i, ii, iii
b. ii, iii, iv
c. ii, iii, iv, v
d. i, ii, iii, iv, v
3 For carrying out B2C e-Commerce the following infrastructure is essential (i)
World Wide Web
(ii) Corporate network
(iii) Electronic Data Interchange standards
(iv) Secure Payment Services
(v) Secure electronic communication link connecting businesses
a. i, iv
b. i, iii, iv
c. ii, iii
d. i, ii, iii, iv
4 For carrying out C2C e-Commerce the following infrastructure is essential
(i) World Wide Web
(ii) Corporate network
(iii) Electronic Data Interchange standards
(iv) Secure Payment Services
c. i, ii, iii, iv
d. ii, iii, iv
13 EDI use
a. requires an extranet
b. requires value added network
c. can be done on internet
d. requires a corporate intranet
14 EDI over internet uses
a. MIME to attach EDI forms to e-mail messages
b. FTP to send business forms
c. HTTP to send business forms
d. SGML to send business forms
15 By security in e-Commerce we mean
(i) Protecting an organization s data resource from unauthorized access
(ii) Preventing disasters from happening
(iii) Authenticating messages received by an organization
(iv) Protecting messages sent on the internet from being read and understood by
unauthorized persons/organizations
a. i, ii
b. ii, iii
c. iii, iv
d. i, iii, iv
16 A firewall is a
a. wall built to prevent fires from damaging a corporate intranet
b. security device deployed at the boundary of a company to prevent unauthorized
physical access
c. security device deployed at the boundary of a corporate intranet to protect i
t
from unauthorized access
d. device to prevent all accesses from the internet to the corporate intranet
17 A firewall may be implemented in
a. routers which connect intranet to internet
b. bridges used in an intranet
c. expensive modem
d. user s application programs
18 Firewall as part of a router program
a. filters only packets coming from internet
b. filters only packets going to internet
c. filters packets travelling from and to the intranet from the internet
d. ensures rapid traffic of packets for speedy e-Commerce
19 By encryption of a text we mean
a. compressing it
b. expanding it
c. scrambling it to preserve its security
d. hashing it
20 Encryption is required to
(i) protect business information from eavesdropping when it is transmitted on in
ternet
(ii) efficiently use the bandwidth available in PSTN
(iii) to protect information stored in companies databases from retrieval
(iv) to preserve secrecy of information stored in databases if an unauthorized p
erson
retrieves it
a. i and ii
b. ii and iii
c. iii and iv
d. i and iv
21 Encryption can be done
a. only on textual data
b. only on ASCII coded data
30. What type of commerce occurs when a business sells its products over the
Internet to other businesses?
a. B2B
b. B2C
c. C2B
d. Enterprise commerce
31. ________is a software that helps a web server process web pages containing
server-side scripts or tags.
a. web server
b. server operating system
c. network operating system
d. none of the above
e.
32. In order to prevent the theft of credit card numbers and banking
information, the _________________communications protocol is used.
a. TCP/IP
b. HTML
c. XML
d. SSL
33. What are plastic cards the size of a credit card that contains an embedded
chip on which digital information can be stored?
a. Customer relationship management systems cards
b. E-government identity cards
c. FEDI cards
d. Smart cards
34 Which of the following is used in B2B to pay for purchases?
a. e-commerce
b. financial electronic data interchange
c. electronic data exchange
d. electronic checks
35. An agent of the biller that accepts remittance information on behalf of the
Biller is
a. Biller payment provider (BPP)
b. Biller service provider (BSP)
c. Consolidator
d. Customer service provider (CSP)
36. A chemical manufacturer has transactions that are predominantly:
a. business to business
b. consumer to consumer
c. consumer to business
d. business to consumer
37. E-business infrastructure refers to:
a. e-business networking
b. e-business client/server environment
c. e-business applications
d. e-business content hosting
e. all of the above.
38. The website for a company is hosted on a:
a. web infrastructure.
b. Web client
c. Web page
d. Web server
39. Which of the applications has most increased business usage of the Internet?
a. World Wide Web (WWW).
b. Extensible Markup Language (XML).
c. Electronic Data Interchange (EDI).
d. Usenet Newsgroups
e. None of the above
40 The typical sequence for a web transaction is:
a. script runs on server, user presses submit on form, transmitted across Intern
et,
result returned.
b. transmitted across Internet, user presses submit on form, script runs on serv
er,
result returned.
c. transmitted across Internet, script runs on server, result returned, user pre
sses
submit on form.
d. result returned, user presses submit on form, transmitted across Internet, sc
ript
runs on server.
e. none of the above
Contact www.solvedcare.com for best and lowest cost solution or email solvedcare
@gmail.com