Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

E-Commerce Strategies

This week, you learned about different e-commerce models, including business-to-business, business-to-consumer, consumer-to-business, and consumer-to-consumer. These models have commonalities and distinct characteristics. It is important that you understand how they are similar and how they differ in order to know what model to apply to a specific scenario.

For this Discussion, consider the electronic purchases you may have recently made. If you have not made electronic purchases recently, consider two e-commerce sites that carry products you have or would like to purchase. Also, conduct some Internet research on e-commerce strategies used by various companies.

Post by 250-word explanation of the strategies that at least two companies you make electronic purchases from use to market products to their customers.

If you have not made electronic purchases recently, identify two e-commerce sites that carry products you would like to purchase. Explain the strategies used by the companies you selected to market products to their customers.

In addition, compare the strategies the companies you selected use to those used by the companies that sell to other businesses.

Finally, compare the IT components and systems (e.g., security, payment) for the business-to-consumer and business-to-business e-commerce models.

Be sure to support your work with specific citations from the Learning Resources and any additional sources.

READING : Management Information Systems for The Information Age : Haag, S., & Cummings, M. (2013). Management information systems for the information age. bY New York: McGraw-Hill.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92342738
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Management Information System

Project title security lapses and data breaches an

Project Title: "Security Lapses and Data Breaches: An Examination of the Failures to Protect Business Data and their Consequences" Instruction of creating the Background: Background information expands upon the key point ...

Research the it security policy used by your university or

Research the IT security policy used by your university or by some other organization you are associated with. Identify which of the topics listed in Section 14.2 this policy addresses. If possible, identify any legal or ...

Suppose that frames are 500 bytes long which includes 58

Suppose that frames are 500 bytes long which includes 58 bytes of overhead. Also assume that ACK frames are 64 bytes long. a) The transmission uses Stop-and-Wait ARQ. Let the transmission rate of the system be R where R= ...

Question what is the resolution and unification algorithm

Question : What is the resolution and unification algorithm, and what is an algorithm? What is the Turing test, and who is Alan Turing? What is a neural network? Can machines really demonstrate intelligence?

Using the university digital library or the google scholar

Using the University Digital Library or the Google scholar website, locate a peer reviewed article about privacy. Write a critical evaluation of the article; make sure to include three to five key points that you thought ...

Wireless applications please respond to the

"Wireless Applications" Please respond to the following: •Analyze what you believe to be the three most important advancements in wireless technologies within the last five years and describe how they have impacted busin ...

Choose your roadmap to certification part 2 federal

Choose Your Roadmap to Certification Part 2: Federal Information Security Modernization Act (FISMA) Compliance In this assignment, students will review the federal work sector requirements and executives/organizations pr ...

Task description data engineering and mining the data set

Task description: Data Engineering and Mining The data set comes from the Kaggle Digit Recognizer competition. The goal is to recognize digits 0 to 9 in handwriting images. Because the original data set is large, I have ...

Differentiate between the browser object model and the

Differentiate between the browser object model and the document object (DOM) model. Recommend three (3) DOM methods that you believe are essential to an effective and efficient Website. List and describe three (3) DOM ob ...

Assignment creating and communicating a security

Assignment : Creating and Communicating a Security Strategy As an IT professional, you'll often be required to communicate policies, standards, and practices in the workplace. For this assignment, you'll practice this im ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As