preview

Mis Ch9

Better Essays

1. Most businesses should engage in e-commerce on the Internet. Do you agree or disagree with this statement? Explain your position. * 2. Why do you think there have been so many business failures among “dot-com” companies that were devoted only to retail e-commerce? * 3. If personalizing a customer’s Web site experience is a key success factor, then electronic profiling processes to track visitor Web site behavior are necessary. Do you agree or disagree with this statement? Explain your position. * 4. All corporate procurement should be accomplished in e-commerce auction marketplaces, instead of using B2B websites that feature fixed-price catalogs or negotiated prices. Explain …show more content…

Do you ever stop to consider whether you may have been misled? How could you tell the difference? 2. Brian Maynard of KitchenAid notes that the development of the Internet changed the problem of brand policing. What are some of these changes? What new challenges can you think of that did not exist in the preonline world? Provide several examples. 3. The companies mentioned in the case (e.g., Kitchen- Aid, RBC, Disney, and Coke) were well established and enjoyed strong brand recognition well before the advent of the Internet. Do you think online-only companies face the same problems as they do? Why or why not? Justify the rationale for your answer. No. Online companies are strongly associated with their domain name (google, ebay, amazon, etc.). As a result, users can be assured they are getting the real thing simply by knowing how to read a URL. Recent problems with DNS servers aside, users can be assured that if a URL reads "amazon.com", then they have reached the Amazon.com website and no other. Long- established companies, on the other hand, have to build their domain name recognition from the ground up. During this period, many users might be fooled by clever variations on the name. Real World Activities 1. Online trust providers such as eTrust ( www.etrust.org ) and others review privacy policies, including information collection and use, sharing and disclosure, and security, and then certify Web sites as meeting

Get Access