Channel Conflict
- 1) Vertical Channel Conflict: Here conflict exists between two members of different levels of a same distribution channel.
- 2) Horizontal Channel Conflict: Here conflict exists between two members of the same channel level.
- 3) Multi-Channel Conflict: Here conflict exists between members of two different channels.
Pricing Conflict
Pricing a product or service on the Internet, especially by a click and mortar company, is complicated.
On one hand, prices need to be competitive on the Internet. Today's comparison engines will show the consumer the prices at many stores, for almost all commodity products.
On the other hand, prices should be in line with the corporate policy on profitability and in a click-and-mortar company, in line with the off-line channel's pricing strategy. To avoid price conflict, some companies have created independent online subsidiaries.
Disintermediation and Reintermediation
Intermediation is one of the most important and interesting e-commerce issue related to loss of jobs. The services provided by intermediaries are:
- 1) Matching and providing information.
- 2) Value added services such as consulting.
Trust
Trust is the psychological status of involved parties who are willing to pursue further interactions to achieve a planned goal. When people trust each other, they have confidence that as transaction partners they will keep their promises.
However, both parties in a transaction assume some risk. In the marketplace, sellers and buyers do not meet face to face. The buyer can see a picture of the product but not the product itself. Promises of quality and delivery can be easily made - but will they be kept? To deal with these issues, electronic commerce vendors need to establish high levels of trust with current and potential customers.
Trust is particularly important in global electronic commerce transactions due to the difficulty in taking legal action in cases of a dispute or fraud and the potential for conflicts caused by differences in culture and business environments.
Non-Work-related Use of Internet
Employees are tempted to use e-mail and the web for non-work-related purposes. In some companies this use is tremendously out of proportion with its work related use. The problem has various dimensions. For example, email can be used for threatening, illegal betting, advertise own business.
Codes of Ethics
Guidelines for Corporate Web Policy
- 1) Issue written policy guidelines about employee use of the Internet.
- 2) Make it clear to employees that they cannot use copyrighted trademarked material without permission.
- 3) Post disclaimers concerning content, such as sample code, that the company does not support.
- 4) Post disclaimers of responsibility concerning content of online forums and chat sessions.
- 5) Make sure that web content and activity comply with the laws in other countries, such as those governing contests.
- 6) Make sure that the company's web content policy is consistent with other company policies.
- 7) Appoint someone to monitor Internet legal and liability issues.
- 8) Have attorneys review web content to make sure that there is nothing unethical, or illegal, on the company's website.
Privacy
Collecting Information about Individuals
In the past, the complexity of collecting, sorting, filing, and accessing information manually from several different government agencies was, in many cases, a built- in protection against misuse of private information. It was simply too expensive, cumbersome, and complex to invade a person's privacy. The Internet, in combination with large-scale databases, has created an entirely new dimension of accessing and using data. The inherent power in systems that can access vast amounts of data can be used for the good of society.
The Internet offers a number of opportunities to collect private information about individuals. Here are some of the ways that the Internet can be used to find information about an individual:
- 1) By reading an individual's newsgroup postings.
- 2) By looking-up an individual's name and identity in an Internet directory.
- 3) By reading an individual's e-mail.
- 4) By conducting surveillance on employees.
- 5) By wiretapping wire-line and wireless communication lines and listening to employees.
- 6) By asking an individual to complete a registration form on a website.
- 7) By recording an individual's actions as they navigate the web with a browser, usually using cookies.
- 8) By using spyware and similar methods.
- 1) Website Registration: Virtually all B2C and marketing websites ask visitors to fill-out registration forms. During the process, customers voluntarily provide their names, addresses, phone numbers, e-mail addresses, sometimes their hobbies and likes or dislikes, and so forth in return for information, for the chance to win a lottery, or for some other item of exchange. There are few restraints on the ways in which the site can use this information. The site might use it to improve customer service. Or, the site could just as easily sell the information to another company, which could use it in an inappropriate or intrusive manner.
- 2) Cookies: Another way that a website can gather information about an individual is by using cookies. A cookie is a small piece of data that is passed back and forth between a website and an end-user's browser as the user navigates the site. Cookies enable sites to keep track of users without having to constantly ask the users to identify themselves. Users can protect themselves against cookies: They can delete them from their computers or they can use anti-cookie software such as Pretty Good Privacy's. Anti-cookie software disables all cookies and allows the user to surf the web anonymously. The problem with deleting or disabling cookies is that the user will have to keep re-entering information, and in some instances may be blocked from viewing particular pages.
- 3) Spyware and Similar Methods; Spyware is a tool that some merchants use to spy on users without their knowledge. Spyware (also known as spybots or tracking software) is a software program that secretly collects information about the user and relays it to advertisers. It may enter the user's computer as a virus or as a result of the user clicking an option in a deceptive pop-up window. Sometimes, when users download and install legitimate programs, they get spyware as well.
- Spyware is very effective in tracking users' web surfing habits. It can scan computer hard drives for sensitive files, and send the results to hackers or spammers. Spyware is clearly a violation of the computer user's privacy. It cans also slow-down computer performance. Spyware writers are getting more innovative, and are trying to avoid detection.
Protecting against Privacy
Antivirus software and Internet firewalls cannot 'see' spyware; special protection is needed. Many anti-spyware software packages are on the market. Many are free. Representative free programs are Ad-Aware, Spybot, Spykiller and PestPatrol. For free programs include SpySubstract, SpySweeper, Ad-Aware Plus, and SpyWasher.
- 1) Notice/Awareness: Consumers must be given notice of an entity's information practices prior to the collection of personal information. Consumers must be able to make informed decisions about the type and extent of their disclosures based on the intentions of the party collecting the information.
- 2) Choice/Consent: Consumers must be made aware of their options as to how their personal information may be used, as well as any potential secondary uses of the information. Consent may be granted through opt-out clauses, which require steps to prevent collection of information. In other words, no action equals consent or, consumers may grant consent through opt-in clauses, which require steps to allow the collection of information.
- 3) Access/Participation: Consumers must be able to access their personal information and challenge the validity of the data.
- 4) Integrity/Security: Consumers must be assured that their personal data are secure and accurate. It is necessary for those collecting the data to take whatever precartions are required to ensure that data are protected from loss, unauthorized access, destruction, and fraudulent use, and to take reasonable steps to gain information from reputable and reliable sources.
- 5) Enforcement/Redress: A method of enforcement and remedy must be available. Otherwise, there is no real deterrent or enforceability for privacy issues.
Protecting Intellectual Property Rights (IPR)
According to the World Intellectual Property Organization (WIPO) intellectual property refers to "creations of the mind: inventions literary and artistic works, and symbols, names, images, and designs used in commerce".
Whereas privacy protection is the major concern for individuals, intellectual property protection is the major concern of those who own intellectual property. Intellectual property rights are one of the foundations of modern society. Without these rights, the movie, music, software, publishing, pharmaceutical, and biotech industries would collapse.
Types of Intellectual Property
There are three main types of intellectual property in EC:
- i) Re-produce a work, in whole or in part, and
- ii) Distribute, perform, or display it to the public in any form or manner, including the Internet.
Working having Copyrights
- i) Commercial production of infringing works,
- ii) Selling or dealing in infringing works,
- iii) Possessing infringing works for trade or business, and
- iv) Manufacturing and selling technology for defeating copyright protection systems.
Digital Rights Management
- i) Use the trademark on goods and services for which the trademark is registered.
- ii) Take legal action to prevent anyone else from using the trademark without consent on goods and services that are identical or similar to those for which the trademark is registered.


This comment has been removed by a blog administrator.
ReplyDelete