E-business has turned to be the norm of today’s business as organization focus on steering business growth. There are several e-business models which Super PowerOrg can adopt in order to spearhead its business success. First, business portal model is widely being used by organizations to grow business. Any business should be ready to adopt emerging technologies because market is quite volatile and changes are emerging within a very short period of time. Portal model is being used to offer customized and integrated view of specific organizational information and content (Pedersen, Gwozdz & Hvass, 2018). Besides reports, portals are being used to offer services such as chats, emails and other advanced features to deliver specific information to the target customers. Portal model have some unique attributes such as Minimum Information Unit (MIU), frequency which defines the rate at which portal content gets updated to all customers or specific client. Similarly, there are User-generated content and home page content delivery which highlights some news and advertisement to the customers (Westerlund, Leminen & Rajahonka, 2014). In Super PowerOrg case, portal seems to be very convenient as it will help to reach all customers. Its customers can create account with organizational portal in order to be able to get all required information.
The innovation of e-business has resulted to selling of some products to online customers. Many organizations are adopting e-business which in turn has been developed to e-commerce revenue model. E-revenue model has made it possible for businesses to capture large market share across the globe (Trusov, Bodapati & Bucklin, 2010). Mainly, it is being used to analyze the best ways of structuring e-business. Some of the revenue model which seems best for Super PowerOrg are affiliate marketing which can help SPO to offer products for sale to all customers or specific clients. To reach many customers, organization might decide to offer some incentives to its content promoters. Online advertisement is another e-business reliable revenue model which involves organization buying advertisement space from another webpage. According to Pedersen, Gwozdz & Hvass (2018), online advertisement works best on websites that have high number of users. These two revenue models are quite applicable on Super PowerOrg case because it targets to capture large market share than its competitors. Mainly, these models target to reach many customers as well as segment market according to customers demand. As the company targets to establish its services to overseas countries, both affiliate marketing and online advertising would be quite applicable in generating revenue to the organization. Both will result to large market share as well as segmenting market in order to analyze profitable segments.
To set up to date Super PowerOrg communication channels and e-business models, the organization would require to purchase some equipment and devices. With e-business and revenue model, security of the business operations and data would be of great importance. Some of the infrastructure include; firewalls which would be used to provide organizational online activities with required security. Kim (2012) argues that, firewalls are used to filter all communication signals as well as protect organizational network access. Similarly, routers would be required to help in setting up and distributing organizational Local Area network (LAN). Beside LAN connection, routers are used to segment organizational network into different subnets such as administration network and general users’ network (Thierer, 2015). Network segmentation is one of the methodologies used by organizations to make sure network is provided to employees according to tasks and roles assigned to them. Additionally, servers would be required to host organizational network as well as its operational data. Data collected from various customers and partners need to be secured from in housed servers in order to keep operations secret. In housed servers would also grant organization an opportunity to control access to its sensitive data (Stephen & Toubia, 2010). Finally, computers would be required to facilitate access to the e-business as well as e-revenue models. They would be used to communicate with client through available technologies.
To run e-business successfully, organization would require both hardware and software in order to achieve its desired goals. In this case, web servers would be required because it combines both hardware and software which is quite useful in delivering internet accessible contents. The main use of the web servers is to help organization host its own websites but can still be used in storing organizational data as well as supporting and running organizational applications (Kim, 2012). A good example of software is a web browser which is used to display internet webpages to website users. Additionally, database systems are used to store organizational data which is meant for decision making. Database systems includes data servers, backup servers and database management systems. To make sure organizational data is secure, data encryption is a major requirement as it makes sure unauthorized data access does not result to any data loss. Additionally, Tuna, Gungor & Gulez (2013) argues that, e-commerce and e-revenue application or website is required in order to facilitate organizational business transactions. These two are the basis under which organizational activities are run on and must be hosted for e-business operations to be available. Finally, computers with working operating system would be required to facilitate content access. All e-business processes would be made possible by computer and cannot be excluded in any transaction.
Online business operations are coupled with several technological challenges that should be addressed effectively to facilitate business operations. Some of the issues that organization should focus on are data privacy and hacking. To prevent organizational data from unauthorized access, organization need to be responsible enough to train its employees on best practices of securing passwords (Yadav & Pavlou, 2014). This would help in solving out unauthorized data access through specific organizational employees. Similarly, it has been realized that, most of the data loss cases result from a well-crafted activities from within organization. To secure organizational data, all employees need to be involved in formulating rules and regulations that govern data access and transmission. This will make employees aware of the consequences once an employee is found guilty of being involved in compromising organizational data. Additionally, data encryption has proved to be the best mechanism to protect organizational data from access by any unauthorized persons. Even when access to the data is successful, data is not useful to any person because it requires decryption key (Kim, 2012). Finally, data replication and backup is the solution to catastrophic data threats. When an event such as fire affects organizational operations, data replication and backup is the only possible mechanism to restore its operations without losing operational data.
To make e-business successful, it is important to focus on the best ways of meeting all business operational requirements. First, organization would be tasked with a responsibility of choosing the best trading partners and representatives. This is very important aspect because it helps organization to select only suitable stakeholders who can help organization meet its goals efficiently (Yadav & Pavlou, 2014). Selecting advertising companies with high traffic flow would make it possible for organizational services and products to be widely known by many users. In this regard, organization would be able to capture large market share. Next, organization would focus on creating social network forums, groups and chat rooms to help the organization capture its customers’ requirements and preferences. Giving room for customers to give their opinion and express various preferences on the product gives organization an opportunity to change service delivery in order to satisfy its customers. Finally, organization should invest heavily on research in order to come up with the most suitable ways of reaching many potential customers (Tuna, Gungor & Gulez, 2013). This would be made possible through realization of emerging technologies that are being used by many potential customers. Since e-marketing targets to use all available and suitable technologies to capture and reach potential customers across the globe, research need to establish cross border platforms that can drive business growth.
Business operation across borders should present business with different mode of making payment for goods and services. With many possible alternatives, organization need to select only secure and reliable means of making payment. The selected means of making payment to the organization depends on customers’ location and preference. To the customers within the state, they are allowed to make use of direct bank transfer in order to make it easy to transact without limitations. Similarly, PayPal money transfer is available to all customers provided it is accepted as a means of payment from within the state of customer’s residence. Interesting to note is that PayPal is one of the e-business service that is globally used as a means of money transfer (Thierer, 2015). It is very secure and more reliable means of making payment worldwide provided it is accepted by specific state government and approved by service provider. Additionally, customers can make payment for services through credit cards which offers direct transfer capability. With organizational portal, SPO can link its services in such a way that customers can attach transaction e-receipts to their portal for confirmation of service payment. These three modes of payments are highly accepted because they offer secure and trusted services to both customer and client.
Data privacy has been of major concern in the industrial market due to technological advancements. To organizational data privacy, SPO would be tasked to formulate rules and regulations that govern data access while in the live system or at storage in backups. These rules would be meant to enforce data access criterion in the following means; authentication defines mechanisms provided by the organization in order to access any information system (Chen, Chiang & Storey, 2012). Passwords are the common means of providing system authorization and its misuse by employees has proved to undermine data privacy strategies. To solve the issues, it would be advisable to use biometric passwords in order to minimize unauthorized data access because any access would mean it was through specific individual as biometric are not prone to lose. Next, according to Boritz & No (2011), authorization is used to assign required privileges in order to limit and grant required data access according to the roles assigned. In this case, users of the system would be granted various access privileges such that maker of the data requires different user with higher worker class to verify the data. These access mechanisms would be used to reduce unauthorized data access by restricting those assigned to be responsible with mode of access granted to a specific dedicated terminal.
Business operations are expected to comply with state rules that governs how business are run. Each state has defined rules that approves the mode of business to be run within its territories. As SPO plans to expand its business operation to cross borders, it will be important to evaluate if the target market segment within a given state acknowledge e-business operations. Next, e-business operations are being run under strict rules with aim of protecting personal data collected by the organization (Konak & Bartolacci, 2012). With e-business turning to be the mode of running business, government and all system users expects personal data to be stored securely. Personal data such as payment cards, biometric data such as passwords and addresses should not be exposed to unauthorized persons. Therefore, before setting up any business hub in a given state, SPO should establish e-business rules in a specific state and the mode of payment permitted by the government.
Customer issues are very sensitive and should be addressed clearly in order to meet their demands. Every issue raised by customers require specific evaluation in order to come up with strategies to meet all requests. To solve customer issue, organization should venture into intensive research with aim of evaluating more demanding services as well as the expected time response (Ramachandran & Chang, 2016). E-business models such as portal gives customers an opportunity to raise any query at any time. In order to offer timely response, organization need to focus on having 24/7 support services. This would make customers feel they are part of the organization due to warm customer relation. Solving customer issues on time and responding to any issue helps organization retain its customers as well as attract more which in turn results to high profit generation. Additionally, since e-business is an open business forum, customers need to be free to share all ideas and feeling about SPO service delivery. To open both criticism and service satisfaction, organization might opt to have a shared open chat which is accessible by all customers. This makes it possible for customers to interact and exchange ideas on possible ways of improving service delivery.
The success of any project proposal is dependent on several factors such as; aligning proposal with subject organizational goals and objectives. In regard to business objectives, the proposal has been developed according to business operational goals. Organization focus on capturing large market share in order to realize high profit margin. Next, project proposal implementation cannot aim to utilize more than half of organizational revenue (Herzog et al., 2013). Evaluation of both e-business model and revenue model has proved to be cheap to implement and maintain. This proposal has greatly considered SPO revenue generation when giving out recommendations on the suitable tools and devices to implement in the project. Finally, the proposal has focused on real time inputs that can translate directly to actual organizational output. This has been achieved by considering current needs of the organization and possible ways of maximizing its profit.
References
Boritz, J. E., & No, W. G. (2011). E-commerce and privacy: Exploring what we know and opportunities for future discovery. Journal of Information Systems, 25(2), 11-45.
Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: from big data to big impact. MIS quarterly, 1165-1188.
Herzog, C., Richter, A., Steinhüser, M., Hoppe, U., & Koch, M. (2013). Methods and metrics for measuring the success of Enterprise Social Software–what we can learn from practice and vice versa. 21st ECIS, 1-12.
Kim, H. (2012). Security and vulnerability of SCADA systems over IP-based wireless sensor networks. International Journal of Distributed Sensor Networks, 8(11), 268478.
Konak, A., & Bartolacci, M. (2012). Broadening e-commerce information security education using virtual computing technologies. In Proceedings of the 2012 Networking and Electronic Commerce Research Conference (pp. 1-6).
Pedersen, E. R. G., Gwozdz, W., & Hvass, K. K. (2018). Exploring the relationship between business model innovation, corporate sustainability, and organisational values within the fashion industry. Journal of Business Ethics, 149(2), 267-284.
Ramachandran, M., & Chang, V. (2016). Towards performance evaluation of cloud service providers for cloud data security. International Journal of Information Management, 36(4), 618-625.
Stephen, A. T., & Toubia, O. (2010). Deriving value from social commerce networks. Journal of marketing research, 47(2), 215-228.
Thierer, A. D. (2015). The internet of things and wearable technology: Addressing privacy and security concerns without derailing innovation.
Trusov, M., Bodapati, A. V., & Bucklin, R. E. (2010). Determining influential users in internet social networks. Journal of Marketing Research, 47(4), 643-658.
Tuna, G., Gungor, V. C., & Gulez, K. (2013). Wireless sensor networks for smart grid applications: a case study on link reliability and node lifetime evaluations in power distribution systems. International Journal of Distributed Sensor Networks, 9(2), 796248.
Westerlund, M., Leminen, S., & Rajahonka, M. (2014). Designing business models for the internet of things. Technology Innovation Management Review, 4(7).
Yadav, M. S., & Pavlou, P. A. (2014). Marketing in computer-mediated environments: Research synthesis and new directions. Journal of Marketing, 78(1), 20-40.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download