Вы находитесь на странице: 1из 17

PRESENTED BY:

Mirza Ghalib Munna


Arif Hossein
Talitha Lewis
Ishtiaq Reza
Sudipto Sarker
Topics to be covered

OVERVIEW OF DIGITAL STRATEGY


E-BUSINESS FOR E-BUSINESS

E-BUSINESS
REVENUE MODEL
Shadmart™ E-BUSINESS SECURITY

E-BUSINESS
CONCLUSION
PLATFORM/INFRASTRUCTURE
Vision & Mission

Vision Mission
• To be the most reliable e- • Deliver high-quality products
business and the leading to customers
cross-border company in • Provide superior customer
Bangladesh service
E-Business Model
Range of Products
Driver’s of E-Business Adoption
Accessibility and Convenience

Global Choice

Time Savings

Access to extensive information

Competitive Pricing

Privacy & Anonymity


E-Business Revenue Model
Online Marketplace
Value Proposition Revenue Model
Structure
• Over 80 million • Targets masses
products through online
• Competitive • Web Catalogue channel
Pricing Revenue Model • Strong relationship
• Dedicated with suppliers
Customer Service • Acts as an online
retailer
E-Business Application Services
E-Commerce
• Over 80 million products
• Online Payment

Supply Chain Management


• Home grown platform
• Effective communication with suppliers

Customer Relationship Management


• Maintains customer records
• Provides real-time tracking of shipments

Data Warehousing & Business Intelligence


• Collects and stores large amount of customer data
• Interpret data into meaningful information using BI tools
IT Use for E-Business Applications

Internet Intranet Extranet


• Online • TCP/IP • Private Electronic Electronic
platform Protocol Network for
Funds Data
• Cross-border • Internal external
company employees parties Transfer Interchange
(EFT) (EDI)
Web Technology & Software
Applications

Web
Blog Widget
2.0
Web Content Management Strategy
• Hire and maintain a team of professional content writers
• Instruct them to upload new content on a weekly/bi-
weekly/monthly basis
• Ensure that the content written will not be difficult to understand for
the users/customers
• Use Search Engine Optimization (SEO) techniques to develop new
content
• Add interactive design to make the content more dynamic and
attractive
E-Business Strategy
Effective Supply Chain
• Offers over 80 million products
• Home grown inventory system

Customer focus
• Promotion of products and promotional offers
• Online payment facilities
• After-sales service

Internal Management System


• Automates various business functions
• Accounting system, HR and Supply Chain functions
SWOT Analysis

POSITIVE NEGATIVE

STRENGTH WEAKNESS

› Sophisticated in-house developed e- › International shipping cost is


INTERNAL

business platform comparatively higher


› Special relationships with existing suppliers › International shipping delays delivery of
goods
› Functional Customer Support team

OPPORTUNITY THREAT
EXTERNAL

› Acquire existing competitors like › Specialized shops who are customize


Daraz.com, Bagdoom.com to become products accordingly to customers’ needs
market leader
› New entrants with their own e-business
› Set up local warehouses to reduce delays platform
Porter’s Five Forces Analysis
Intensity of rivalry

• Few competitors like Daraz, Bagdoom etc.

Threat of new entry

• Threat is low
• Substantial initial investment

Power of suppliers

• Low
• Shadmart maintains relationship with a huge portfolio of suppliers/manufacturers

Power of customers

• High
• Low switching cost

Threat of substitutes

• High
• Lot of substitutes in terms of other online competitors and physical stores
Exposure to IT Security Risks
• Attempt to gain unauthorized access
Credit Card Fraud • Steals customers’ private and confidential information

Distributed Denial of Service • Aims to shut down an online store


(DDoS) Attacks • Sends overwhelming amount of requests from untraceable IP addresses

• Penetrates communication between customers and e-commerce site


Man-in-the-Middle Attacks • Aims to gain unauthorized access to customer’s confidential information

• Malicious software programs


Malware • Aims to gain illegal access

• E-mail sent to users


Phishing Scams • Aims to illegally extract their credit card information and access credentials
Security Management

Use SSL Certificates

Use Address Verification System (VAS)

Use Encryption
Thank You

Вам также может понравиться