1
18kviews
Discuss some of the barriers to the adoption of e-commerce by consumers and suggest how a company could counter these.
1 Answer
4
268views

1.Barriers for the adoption of e-commerce by consumers:

  • Quality evaluation: On the Internet, it is more or less impossible to make sure, beyond doubt, that (tangible) products have the desired features (e.g. design, material, colour, fit), giving rise to a quality evaluation barrierto e-commerce.
  • Security risks. It has been suggested that transaction security(such as the credit card number being picked up by third-party hackers) is mostly a perceptual problem in e-commerce. Nevertheless, the fact remains that it may be one of the more complex barriers to be overcome.
  • Lack of trust in virtual sellers. The fear of fraud and risk of loss has commonly been cited as a significant barrier to B2C e-commerce, with empirical research findings supporting this assumption.
  • Delivery times. In tangible product categories, any home-shopping method involves delivery times which mean that the Internet is at a disadvantage to physical stores as it fails to meet the customers’ need for instant gratification .Consumers may thus be reluctant to wait for the delivery of ordered goods for days/weeks if the same product can be collected immediately in physical outlets.
  • Lack of personal service. While e-commerce offers great opportunities for one-to-one marketing, it significantly reduces, or even puts an end to the personal service characterizing traditional commerce.
  • Time-consuming nature. As noted, e-commerce may offer consumers savings in time. In practice, however, using the Internet for commercial purposes may prove to be too much time consuming for many users .There are multiple reasons for this: (i) difficulties locating Websites/products/services (ii) registration procedures required to access services (iii) making price comparisons.
  • Cost of entry. Cost of acquiring a computer, etc.
  • Cost of use. Internet access fees.
  • Limited Internet/ computer experience. Reluctance/difficulties operating computers and/or browsing the Web.
  • Poor connection speed. Due to low bandwidth connections, using the Internet may be time consuming, and thus frustrating.

2.Measures taken by company to counter these barriers:

3.Techniques for retaining new customers (Customer retention):

  1. Definition: Customer retention is the activity that a selling organization undertakes in order to reduce customer defections. Successful customer retention starts with the first contact an organization has with a customer and continues throughout the entire lifetime of a relationship.
  2. Techniques:

    a. Personalization and mass customization: Personalization and mass customization can be used to tailor information and opt-in email can be used to deliver it to add value and at the same time remind the customer about the product. Personalization refers to customization of information requested by a site customer at an individual level. Mass customization involves providing tailored content to a group with similar interests. An example of mass customization is when Amazon recommends similar books according to what others in a segment have offered. This approach is sometimes referred to as ‘collaborative filtering’.

    All the personalization techniques take advantage of the dynamic possibilities of the web content. Personalization can be achieved through several dynamic variables including:

    • The customer’s preferences
    • The date or time
    • Particular events
    • The location

    b. Online communities: Community is a key feature of the new interactive media that distinguishes them from traditional push media. Thus, it is a customer-to-customer interaction delivered via e-mail groups, web based discussion forums or chat. The key to successful community is customer centred communication. It is a C2C interaction. Consumers, not the businesses generate the content of the site, email list or bulletin board. Depending on the market sector, an organization has a choice of developing different types of community for B2C based on:

    • Purpose
    • Position
    • Interest
    • Profession

    c. Techniques for managing customer activity and value: Within the online customer base of an organization, there will be customers who have different levels of activity in usage of online services or sales. The various objectives and tactics required for managing include:

    • Increasing number of new-users per month and annually through promoting online services to drive visitors to website.
    • Increasing % of active users: Using direct communications such as email, personalized website messages, direct mail and phone communications to new, dormant and inactive users increases the percentage of active users.
    • Decreasing % of dormant users, but have not used within a time period to be classified as active.
    • Decreasing % of inactive users: Those who have signed up for a service bur have not used up that service. Another key metric, in fact the key retention metric for e-commerce sites refers to repeat business. The main retention metrics are as follows:

      a. Repeat customer conversion rate: How many first time customers purchased a second product.

      b. Repeat customer base: The proportion of customer base that have made repeat purchases.

      c. Number of transactions per repeat customer: This indicates the stage of development of customer in the relationship.

      d. Revenue per transaction of repeat customer: This is a proxy for lifetime value since it gives average order value.

    d. Improving online service quality: Delivering service quality in e-commerce can be assessed through reviewing existing frameworks for determining levels of service quality. Those most frequently used are based on the concept of a ‘service-quality gap’ that exists between customers expected level of service and their perception of actual level of service delivery. The dimensions of service quality on which consumers judge expected and delivered service quality levels are:

    • Tangibles: The physical appearance and visual appeal of facilities
    • Repeatability: The ability to perform service consistently and accurately.
    • Responsiveness: A willingness to help customers and provide prompt service.
    • Assurance: The knowledge and courtesy of employees and their ability to convey trust and confidence.
    • Empathy: Providing caring, individualized attention.

Cross and up selling using media:

  1. Cross-selling is the action or practice of selling among or between clients, markets, traders, etc. or the action or practice of selling an additional product or service to an existing customer. This article deals exclusively with the latter meaning. In practice, businesses define cross-selling in many different ways. Elements that might influence the definition might include the size of the business, the industry sector it operates within and the financial motivations of those required to define the term. The objectives of cross-selling can be either to increase the income derived from the client or clients or to protect the relationship with the client or clients. The approach to the process of cross-selling can be varied.

  2. Up selling is a sales technique whereby a seller induces the customer to purchase more expensive items, upgrades, or other add-ons in an attempt to make a more profitable sale. Up selling usually involves marketing more profitable services or products but can be simply exposing the customer to other options that were perhaps not considered. Up selling implies selling something that is more profitable or otherwise preferable for the seller instead of, or in addition to, the original sale. A different technique is cross-selling in which a seller tries to sell something else. In practice, large businesses usually combine up selling and cross-selling techniques to enhance the value that the client or clients get from the organization in addition to maximizing the business's profit. In doing so, the organization must ensure that the relationship with the client is not disrupted. In restaurants and other similar settings, up selling are commonplace and an accepted form of business. In other businesses (e.g. car sales), the customer’s perception of the attempted up sell can be viewed negatively and impact the desired result.

Various approaches of developing secure e-commerce systems include:

1.Digital Certificates

  • Digital certificates consists of keys made up of large numbers that are uniquely used to identify individuals.
  • Two main types of encryption can be achieved using digital certificates:
  • Secret key encryption: This type of encryption involves parties having an identical (shared) key that is known only to them. Only this key can be used to encrypt and decrypt messages. The secret key has to be passed from one party to other before use.
  • Public key encryption: In this type of encryption, both parties use related but different key to encode and decode messages. The two keys are related by a numerical code, so only the pair of keys can be used in combination to encrypt and decrypt information.

2.Digital signatures

  • It is method of identifying individuals or companies using public key encryption.
  • It can be used to create commercial systems by using public key encryption to achieve authentication.
  • The purchaser’s digital signature is encrypted before sending a message using their private key and, on receipt, the public key of the purchaser is used to decrypt the digital signature.

3.Public-key infrastructure (PKI) and certificate authorities (CAs)

  • In order for digital signatures and public key encryption to be effective it is necessary to be sure that the public key intended for decryption of a document actually belongs to the person you believe in sending the document.
  • The developing solution to this problem is the issuance by a trusted third party (TTP) of a message containing owner identification information and a copy of a public key of that person.
  • The TTP’s are usually referred to as ‘Certificate Authorities’ and that message is called as ‘Certificate’.
  • Certificate information could include:

    a) User Identification data.

    b) Issuing authority identification and digital signature.

    c) User’s public key

    d) Expiry date of this certificate.

    e) Class of certificate

    f) Digital Identification code of this certificate.

4.Virtual Private Networks

  • In simple words, Virtual Private Networks (VPN) is a private network created using the public network infrastructure of the Internet.
  • The technique by which VPN operates is sometimes referred to as ‘tunnelling’.
  • It involves encryption to both packet headers and content using a secure form of Internet protocol known as IPSec.
  • VPNs allow employees to securely access their company's intranet while traveling outside the office.
  • VPN technology is also used by individual Internet users to secure their wireless transactions, to circumvent geo restrictions and censorship, and to connect to proxy servers for the purpose of protecting personal identity and location.
Please log in to add an answer.