File Name: internet business models and strategies text and cases .zip
- Internet Business Models in the Consumer Market – a Typological Approach (pdf)
- Analysing e-business Models
- Internet Business Models: Text and Cases
- Types of Ecommerce Business Models: Traditional and Innovate New Ones to Consider
A business model describes the rationale of how an organization creates, delivers, and captures value ,  in economic, social, cultural or other contexts. The process of business model construction and modification is also called business model innovation and forms a part of business strategy.
The phrase business model has found its way into the vocabulary of just about everyone who must manage or work in businesses with an Internet content, from venture capitalists to CEOs. Despite the enormous importance of the Internet and business models to firms, and the explosive interest in both sub- jects, there are no business school texts that address the impact of the Inter- net on firm performance. In Internet Business Models and Strategies: Text and Cases, we draw on research in strategic management and the management of technology to develop an integrative framework that allows readers to put their minds around what determines firm performance and the central role that business models play in the face of the Internet. We offer concepts and tools that students of management need to analyze and synthesize business models, especially Internet business models.
Internet Business Models in the Consumer Market – a Typological Approach (pdf)
Log In Sign Up. Download Free PDF. AJ Quek. Download PDF. A short summary of this paper. PrefaceThe phrase "business model" has found its way into the vocabulary of just about everyone who must manage or work in businesses with an Internet content, from venture capitalists to CEOs. Despite the enormous importance of the Internet and business models to firms, and the explosive interest in both subjects, there are no business school texts that address the impact of the Internet on firm performance.
In Internet Business Models and Strategies: Text and Cases, we draw on research in strategic management and the management of technology to develop an integrative framework that allows readers to put their minds around what determines firm performance and the central role that business models play in the face of the Internet.
We offer concepts and tools that students of management need to analyze and synthesize business models, especially Internet business models. The framework developed in the book allows its users to make more informed concept-and theory-grounded arguments about Internet start-ups, bricks-and-mortar firms that must face challengers, the relative merits of formulating and implementing Internet business models and strategies, and how much ventures might be worth.
In the first part of the book, we explore the concepts on which Internet business models rest and the tools that can be used to analyze and appraise them.
In addition to building a conceptual framework, the chapters include discussion questions and key terms to engage readers further with the subject matter. The second part of the book offers cases of both pure-play Internet firms as well as bricks-and-mortar firms that must formulate and execute successful business models and strategies in order to gain, defend, or reinforce a competitive advantage in the face of the Internet.
To the best of our knowledge, no other book addresses the central issues of the impact of the Internet on business performance. This is not to say that there are no books on e-commerce or the impact of the Internet from a functional perspective, simply that they do not centrally address business issues, particularly the impact of the Internet on business models and firm performance.
Introduction and OverviewMost firms are in business to win, to outperform their competitors. They are in business to make money. They adopt new technologies to fend off new competitors, reinforce an existing competitive advantage, leapfrog competitors, or just to make money in new markets. Performance is critical. If performance is so significant to firms and their managers, an important question is: What determines performance to begin with? Only by understanding the determinants of business performance can firms better formulate their business models-how they plan to make money over the long term.
By understanding the determinants of firm performance, firms are in a better position to comprehend how a technology such as the Internet impacts that performance and how firms can exploit the new technology. In this chapter, we briefly describe the determinants of firm performance and the role played by business models, especially Internet business models. We sketch the framework on which the book is built. What exactly constitutes firm performance can be the subject of passionate debate and even controversy.
One can make a strong argument for defining performance as profits, cash flow, economic value added EVA , market valuation, earnings per share, sales, return on sales, return on assets, return on equity, return on capital, economic rents, and so on.
Throughout this book, except where noted, performance means accounting profits. Now, let's return to the determinants of performance. ChangeThe last determinant of firm performance is change.
Its role is more indirect than direct. Change impacts business models or their environments, which can translate into higher or lower profitability. Change can come from competitors, suppliers, customers, demographics, the macro environment, or the firm itself. Better still, witness the change brought about by the Internet that we explore in this book.
The impact of change on a firm's business model or industry is a function of the type of change. Radical, architectural, or disruptive change can render existing business models obsolete and drastically alter the competitive landscape in existing industries or create entirely new industries while killing old ones.
It can result in what the economist J. Schumpeter Schumpeter termed "creative destruction" when it gives rise to new entrepreneurial firms creating wealth and old, established incumbents dying off.
The InternetThe Internet is a technology with many properties that have the potential to transform the competitive landscape in many industries while at the same time creating whole new industries. The Internet is a low cost standard with fast interactivity that exhibits network externalities, moderates time, has a universal reach, acts as a distribution channel, and reduces information asymmetries between transacting parties. These properties have a profound impact on the 5-Cs of coordination, commerce, community, content, and communications.
Since nearly every firm's activities rest on some subset of the 5-Cs, one can expect the Internet to have a profound effect on all firms. It plays a critical and profound role in the way firm activities internal or external are coordinated, how commerce is conducted, how people and machines communicate, how communities are defined and how they interact, and how and when goods are made and delivered.
The Internet has the potential to influence established ways of conducting business while creating new ones and new businesses. This book is about Internet business models and how to analyze them. So far, we have only briefly discussed the Internet and said nothing about the World Wide Web.
In this chapter, we fully explore both. The Internet is a vast collection of networks of computers that are interconnected both physically and through their ability to encode and decode certain specialized communications protocols called the Internet Protocol IP and the Transmission Control Protocol TCP.
IP describes how information to be transmitted should be broken down into small packets, while TCP describes how a "stream" of packets should be reconstructed at the other end and what to do, for example, if a packet is missing. The backbone is a collection of high-speed telecommunications lines what used to be called "trunk lines" or simply "telephone lines" but now have a much higher capacity that are connected by high-speed computers.
It is made up of fast fiber-optic lines that allow computers to transfer data at very high speeds. The bandwidth of the telecommunications line refers to the capacity or speed of data transfer: the amount of information-the digital 1s or 0s that ends, the information "flows" along the backbone lines as it is forwarded from one digital switch to the next.
Many of these intermediate switches are connected to more than two backbone lines. Based on the destination and the congestion along the lines, they decide which line information should be "routed" forwarded. To gain access to this network requires other specialized computers.
The three most common types of end users are 1 individuals, 2 small-to mediumsized organizations, and 3 large organizations or "enterprises.
A POP is simply a point of access to the network and consists of a switch computer that knows how to route traffic to the end users connected directly to it. The means of access are a little more complicated as the individual may be moving from one location to the next, but conceptually speaking it is similar to the case of the home user. The wireless gateway serves as an interface between the Internet and the wireless operator's own network.
Information within the operator's network, that is, from the mobile device to and from the operator's equipment, is treated as any voice call would be. Large enterprises connect to the Internet by means of a similar kind of switch called a gateway or local area network LAN server, which may or may not be behind a "firewall"-a combination of specialized hardware and software that provides protection from users and requests outside the LAN.
LANs consist of various types of hardware devices and other resources that organizations can share. Large LANs such as those that serve enterprises are usually connected directly to a high-speed switch through the LAN server, which also knows how to route local traffic to end users on the LAN see Figure 2. End users can be physically connected to the LAN the so-called fixed-line or wire-line Internet or can be connected wirelessly through the combination of a network access point that is physically attached to the network and a wireless card antenna that sends and receives data from the access point.
This setup is often called fixed wireless. All computers that can interconnect with the Internet are considered part of the Internet. Hypertext is different from "normal" text in that it does not follow a linear path from top to bottom; instead, one can follow items of interest in a nonlinear fashion by selecting words or pictures of interest and immediately gaining more information on the items selected.
Not all potential items words or pictures can be selected, so how does the user-reader know which items are available? The author of the page decides which items are worthy of more information and creates a special link from the current page to the page or pages that has additional information.
The pages are also called the content; thus, the author ties in the United States and many overseas, in addition to many research institutes and some companies, usually defense-oriented companies with some affiliation with DARPA Defense Advanced Research Projects Agency, as ARPA became known. At one point, the National Science Foundation took over responsibility for providing the backbone high-speed trunk line services.
As the number of commercial users grew from year to year and it became clear that users were willing to pay for such services, private telecommunications companies stepped into the void and began providing their own high-speed lines, the use of which they rented or sold to companies wanting access.
Most of the traffic in the early days of the Internet, as the network eventually became known, was generated by just four applications.
The most widely used service was electronic mail, or e-mail. E-mail service allowed a user at one end-user computer also known as a host to send a text message and have this message stored for delivery at the recipient's host for retrieval by the recipient when convenient. Users posting messages to a newsgroup or a discussion list had their messages copied to all other subscribers of the list. Another popular application, especially among the scientific community, was file transfer protocol ftp.
With a file transfer, one could either send a file to or retrieve one from a remote host. The advantage of this was that a user could move large blocks of data very quickly, much more quickly than backing up a file on tape and carrying or mailing it to the remote site. Finally, a highly useful application was telnet or remote login capability.
This allowed the user to log in to a remote host and perform functions on the remote computer as if the user were connected to the host on-site. For example, a user in California could log in to a computer in Korea and be indistinguishable from a user sitting at a terminal in Korea. These four applications were popular enough to drive the growth of the Internet for many years.
The Internet infrastructure-the backbone, digital switches, computer servers, POPs, users' computers, software, and protocolswas created to help users gain access to information on computers anywhere in the world. The problem in the early days was that to find information on the Internet, a user had to specify the address of the computer on which the information resided.
This made finding information on different computers tedious and limited to those with computer science skills. The scientists who worked at CERN came from all over the world and had immense problems exchanging incompatible documents and e-mail messages from their own proprietary systems. Berners-Lee revived an earlier idea of his from that was a precur-sor to a hypertext storage and retrieval system.
He proposed that CERN's scientists could combine their knowledge by linking their documents contextually. He developed a language called HyperText Markup Language HTML that he could use not only to create links to different computers but also to display graphics associated with some files. To the user, such links, or hypertext, are highlighted; all the user needs to do to gain access to the information associated with the link is to click on it. These hypertext links and the associated information stored on the Internet nodes became known as the World Wide Web.
CERN made the source code for the first WWW browser and server freely available, which spurred growth in their development as programmers from all over the world began contributing to the infrastructure of the WWW.
We mention just a few of the most important ones here with the proviso that the wireless sector is in a great deal of flux. IEEE Bluetooth is another, albeit slower but more energyefficient.
Analysing e-business Models
Excerpts from the article: T. This paper presents characteristics of business models adopted by Internet companies operating in the consumer market. The typology covers online vendors, e-service providers, content providers, multi-sided platforms, and community providers. The business model types are described here, also with respect to selected economic categories. Additionally, the paper discusses the notion of business models from systemic and typological perspectives and compares this term to the notion of strategy and revenue model. The notion of business model gained in popularity as Internet companies emerged in the late s.
Where did you go to buy clothes? How did you get your groceries? What did you do when it was time to buy a new mattress? Innovative ecommerce businesses have transformed the way we shop today and redefined what is possible. While many of the tools are new and rapidly improving, the rules have stayed the same. Each has its benefits and challenges, and many companies operate in several of these categories simultaneously. Knowing what bucket your big idea fits in will help you think creatively about what your opportunities and threats might be.
Towards the Knowledge Society pp Cite as. The business model concept is becoming increasingly popular within e-businesses and e-business research. However, the concept is often used relatively independently from theory, meaning model components and their interrelations are relatively obscure. This paper analysis three e-business models taxonomies based on a generic business model, which include customers and competitors, the offering, activities and organisation, resources and factor market interactions. The longitudinal processes and actions by which business models evolve are also included.
Internet Business Models: Text and Cases
The system can't perform the operation now. Try again later. Citations per year. Duplicate citations. The following articles are merged in Scholar.
The design of their business models is decisive for the market success of entrepreneurial ventures attempting to commercialize an emerging technology. Growing evidence suggests that entrepreneurs can draw on a series of proven mechanisms, business model patterns, for business model innovation. Yet, these patterns typically only cover individual parts of a complete business model, and few have been examined in relation to start-up success.
Улочка имела множество поворотов и тупиков, и он быстро потерял направление. Он поднял вверх голову, надеясь увидеть Гиральду, но окружившие его со всех сторон стены были так высоки, что ему не удалось увидеть ничего, кроме тоненькой полоски начинающего светлеть неба.
Types of Ecommerce Business Models: Traditional and Innovate New Ones to Consider
ГЛАВА 59 Сьюзан протянула руку, и коммандер Стратмор помог ей подняться по лестнице в помещение шифровалки. А перед глазами у нее стоял образ Фила Чатрукьяна, его искалеченного и обгоревшего тела, распростертого на генераторах, а из головы не выходила мысль о Хейле, притаившемся в лабиринтах шифровалки. Правда открылась со всей очевидностью: Хейл столкнул Чатрукьяна. Нетвердой походкой Сьюзан подошла к главному выходу- двери, через которую она вошла сюда несколько часов .
Стеклянная панель обдала его дождем осколков. Дверь повернулась и мгновение спустя выкинула его на асфальт. Беккер увидел ждущее такси. - Dejame entrar! - закричал Беккер, пробуя открыть запертую дверцу машины. Водитель отказался его впустить. Машина была оплачена человеком в очках в тонкой металлической оправе, и он должен был его дождаться. Беккер оглянулся и, увидев, как Халохот бежит по залу аэропорта с пистолетом в руке, бросил взгляд на свою стоящую на тротуаре веспу.
Беккер спустился вниз, постоял, глядя на самолет, потом опустил глаза на пачку денег в руке. Постояв еще некоторое время в нерешительности, он сунул конверт во внутренний карман пиджака и зашагал по летному полю. Странное начало. Он постарался выкинуть этот эпизод из головы. Если повезет, он успеет вернуться и все же съездить с Сьюзан в их любимый Стоун-Мэнор.
In Internet Business Models and Strategies: Text and Cases, we draw on research in strategic management and the management of technology to develop an.
Причастие. Он застонал. Проклятые испанцы начинают службу с причастия. ГЛАВА 92 Сьюзан начала спускаться по лестнице в подсобное помещение. Густые клубы пара окутывали корпус ТРАНСТЕКСТА, ступеньки лестницы были влажными от конденсации, она едва не упала, поскользнувшись.
Это невозможно! - рявкнул Нуматака. - Вы обещали, что они будут у меня сегодня до конца дня. - Произошло нечто непредвиденное. - Танкадо мертв.
Она стояла у второй входной двери, что была в некотором отдалении, прижимая сумку к груди. Она казалось напуганной еще сильнее, чем раньше. - Мистер, - сказала она дрожащим голосом, - я не говорила вам, как меня зовут. Откуда вы узнали.
Можете оставить свое имя и адрес - наверняка мистер Густафсон захочет вас поблагодарить. - Прекрасная мысль.
Выскочив из кабинета, он повернул налево по главному коридору здания Нуматек. Сотрудники почтительно кланялись, когда он проходил мимо. Нуматака хорошо понимал, что эти поклоны вовсе не свидетельствует об их любви к нему, они - всего лишь знак вежливости, которую японские служащие проявляют по отношению даже к самым ненавистным начальникам. Нуматака проследовал прямо на коммутатор компании. Все звонки принимались единственным оператором на двенадцатиканальный терминал Коренсо-2000.
К несчастью, это был самый надежный способ собрать в шифровалке всех сотрудников Отдела обеспечения системной безопасности. После таких экстренных действий на главном коммутаторе раздавался сигнал общей тревоги. Проверку шифровалки службой безопасности Хейл допустить не. Он выбежал из помещения Третьего узла и направился к люку.
Сначала он предназначался для использования в ходе избирательных кампаний как способ создания в режиме реального времени моделей данной политической среды. Загруженная громадным количеством информации программа создавала паутину относительных величин - гипотетическую модель взаимодействия политических переменных, включая известных политиков, их штабы, личные взаимоотношения, острые проблемы, мотивации, отягощенные такими факторами, как секс, этническая принадлежность, деньги и власть. Пользователь имел возможность создать любую гипотетическую ситуацию, и Мозговой штурм предсказывал, как эта ситуация повлияет на среду. Коммандер относился к этой программе с религиозным трепетом, но использовал ее не в политических целях: она служила ему для расчета времени, оценки информации и схематического отображения ситуации, выработки сложных стратегических решений и своевременного выявления слабых мест.
- Танкадо отдал кольцо с умыслом. Мне все равно, думал ли он, что тучный господин побежит к телефону-автомату и позвонит нам, или просто хотел избавиться от этого кольца. Я принял решение. Мы вводим эту цитату. Сейчас .