Marketing Notes 1
Marketing Notes 1
The Vision
Vision: a company’s long-term achievement; a plan for the business’s future involving
significant improvements and goals.
The Vision includes:
1. Reduced search and transaction costs; customers able to find the lowest price
● Ease of Finding Deals: E-commerce reduces the effort and cost of searching
for products. Customers can easily find the lowest prices available. (Pet
grooming company got food, accessories etc)
● Cost-Effective Shopping: Whether customers want something expensive or
cheap, online platforms provide a flexible selection, allowing them to choose
based on their budget.
2. Low Barrier Market Entry and Low Operating Costs
● Access for All: E-commerce has low barriers for entering the market. Anyone
can start selling products online without the high costs associated with traditional
brick-and-mortar stores.
● High Efficiency: Online businesses often operate at lower costs and higher
efficiency compared to physical stores.
Tutorial Questions
What is an omni-channel merchant? What advantages do they have? What challenges do
they face?
(Points) An omni-channel merchant integrates both online and physical retail experiences,
offering a seamless approach to cater to different customer preferences. This integration allows
businesses to leverage the advantages of both platforms. For example, ZUS Coffee provides a
personalized customer application that offers a seamless experience by allowing users to place
orders online and pick them up in-store. If a customer is rushing to work and doesn't have time
to wait at the outlet, they can use the app to place their order and receive a notification when
their drink is ready, saving time and enhancing convenience for both the business and the
consumer. (Elaboration) Omni-channel merchants benefit from increased customer satisfaction
and loyalty by providing flexible shopping options and consistent experiences across channels.
Additionally, despite the growth of e-commerce, human interaction remains important. An
omni-channel strategy ensures that businesses can provide the personal touch that some
customers still value, such as in-person assistance and the ability to physically inspect products
before purchase. (Oppose points) However, they also face challenges such as the need for
robust inventory management, the integration of online and offline data systems, and the
coordination of marketing and customer service efforts across multiple platforms. Despite these
challenges, the omni-channel approach allows businesses to reach a broader audience and
adapt to changing consumer behavior effectively.
Why are on-demand service companies viewed as being disruptive and controversial?
On-demand service companies like Grab and Netflix are viewed as disruptive and controversial
because they significantly alter traditional business models and market dynamics. By providing
transportation, entertainment, and accommodation services through their apps, these platforms
bypass traditional intermediaries, reducing costs and offering greater flexibility to users.
However, this disruption has led to controversies, such as regulatory challenges and labor
disputes. For example, in Malaysia, traditional taxi services have faced stiff competition from
Grab, leading to protests from taxi drivers and calls for stricter regulations. Taxi drivers argue
that Grab drivers are not subject to the same stringent licensing requirements and fees, creating
an uneven playing field and threatening their livelihoods. Similarly, Netflix has disrupted the
traditional television and film industries in Malaysia, affecting local broadcasters like Astro and
TV3. These traditional media companies have seen a decline in viewership and advertising
revenue as more people turn to on-demand streaming services. This shift has caused tension
within these industries, with calls for regulatory changes to ensure fair competition and protect
local production.
List and discuss the FOUR types of online retailing models
Retail mobile e-commerce is booming as today's generation relies heavily on smartphones for
shopping. Unlike the past when laptops were the primary tool for online shopping, mobile
devices now dominate e-commerce activities. Retailers such as Shopee, Lazada, JD, and
FootLocker have shifted their focus towards mobile commerce by improving their app
experiences. These improvements often include app-only promotions or exclusive deals that are
not available in physical stores, thus driving more traffic to their mobile platforms and enhancing
customer engagement.
Social networks and social e-commerce are transforming how businesses reach and interact
with customers. Platforms like Facebook, Instagram, and TikTok are integrating shopping
features directly into their apps, allowing users to make purchases without leaving the platform.
This integration makes social media a powerful tool for marketing, customer engagement, and
direct sales. For instance, brands can now run targeted ad campaigns, communicate with
customers in real-time, and sell products through social media channels, which has become an
essential component of modern business strategies.
Subscription-based models are a significant trend in online retail. This model involves offering
services that customers subscribe to on a recurring basis, such as AI assistants (Chat GPT),
entertainment platforms (Netflix), online learning (Coursera), consultancy services, and music
streaming (Spotify). Subscription models provide a steady revenue stream for businesses and
often result in higher customer loyalty. For example, Netflix offers unlimited access to its content
library for a monthly fee, providing convenience and value that encourage long-term customer
subscriptions. Additionally, Netflix's strategy of offering a free trial period encourages potential
customers to explore its content without any initial financial commitment. By requiring payment
details upfront and converting to a paid plan automatically if not canceled, Netflix attracts new
users and leverages convenience to retain them.
Big data and predictive marketing is revolutionizing how businesses understand and cater to
their customers. By collecting and analyzing customer data, companies can identify preferences
and predict future demand. This allows for highly personalized marketing strategies, such as
sending tailored emails with special offers based on past purchase behavior. For instance, Nike
might send a personalized email with a discount voucher to a customer who hasn't shopped in a
while, encouraging them to return and make a purchase. Predictive marketing helps businesses
anticipate customer needs and adjust their offerings accordingly, ensuring they stay ahead of
market trends.
Identify the key industry strategic factors and describe how they impact the viability of
firms operating within that industry.
Key industry strategic factors significantly impact the viability of firms operating within an
industry, influencing their ability to survive and thrive.
Barriers to entry are generally low in online retail, as starting a business online is often easier
and cheaper than establishing a physical store. However, government regulations can raise
these barriers, as seen in countries that ban platforms like Facebook or TikTok, complicating
social media-based e-commerce.
Power of suppliers also plays a crucial role. When suppliers are plentiful, retailers have more
options and bargaining power, but recognized and pioneer suppliers can exert significant
influence over terms and conditions.
High customer power, driven by the ability to easily compare products, forces retailers to
constantly innovate and improve their offerings to attract and retain customers. The existence of
substitute products, such as tablets replacing traditional paper, compels firms to differentiate
their products to maintain competitiveness. For example, streaming services like Netflix and
Spotify have disrupted traditional media, requiring these providers to adapt by offering online
services.
Value chain and supply chain are vital to operational efficiency, with internal departments
adding value through specialized functions and external partners facilitating production and
distribution. Companies often outsource functions like marketing to focus on core competencies.
Intra-industry competition involves related products and services that can either complement
or compete with each other, as seen in the pet industry or the smartphone ecosystem. Apple, for
instance, enhances the iPhone experience with accessories, apps, cloud services, and support,
creating a comprehensive ecosystem that boosts customer loyalty and drives profitability.
Chapter 9: E-commerce Security (Part 1)
Key security Risks arises in Online Businesses
Computer Risk and Risk Management
Asset protection from unauthorized access, use, alteration and destruction
● Physical security: Involves tangible measures to protect assets from unauthorized
access, use, alteration, and destruction. It includes devices and protocols such as CCTV
cameras, alarms, security guards, fireproof doors, security fences, safes, and bomb
proof buildings. It aims to protect the physical property and infrastructure of an
organization, ensuring that only authorized personnel can access critical information. For
example, securing an entire residential area (Taman Bunga) with a security group helps
prevent unauthorized access and potential physical threats to the area and its residents,
such as thieves and burglars.Or in technology form, these security measures helps
prevent unauthorized access from hackers and IT threats.
● Logical security: This involves using non-physical means to protect digital assets,
including data and network systems. Logical security measures include implementing
strong passwords, encryption, firewalls, and access controls. Biometric systems,
such as fingerprint or facial recognition, are increasingly used for enhanced security.
Additionally, it focuses on maintaining data integrity (keeping the data accurate and
unaltered), secrecy (protecting data from unauthorized access), and availability
(making sure the data is accessible when needed). These practices help protect the data
from cyber threats like hackers, malware, and other IT-related risks.
Risk management model: Four general actions to address physical threats, which are
categorized based on their impact (cost) and probability.
● Eavesdropping: Refers to an unauthorized party, whether a person or a device, that
listens to and copies internet transmissions. This can happen through various means,
such as:
○ Man-in-the-middle attacks: Intercepting and potentially altering the
communication between two parties (a user and website) without their
knowledge. For example, a fake banking website may be used to capture
financial login information. The fake site is “in the middle” between the user and
the actual bank website. The goal of an attack is to steal personal information,
such as login credentials, account details and credit card numbers.
*Ignore the rest, FOCUS ON PREVENTING “High Probability & Impact”
● High probability: the probability that it will happen
● Low impact: Does not impact on your security that much.
High Probability & Low Impact
● In cybersecurity, even low-impact events can have serious repercussions. For instance,
if customers distrust an e-commerce platform due to perceived security weaknesses,
they may avoid making purchases, leading to revenue loss. Additionally, these
customers might share their negative experiences with friends and family, amplifying the
damage and causing a broader loss of potential customers.
● Frequent but minor issues can disrupt operations if not managed properly. Containing
and controlling them prevents small problems from becoming major ones. For instance,
Phishing Attempts. Phishing emails can be controlled through employee training and
email filtering software. While each attempt may not cause significant damage,
consistent vigilance prevents potential breaches.
High Probability, High Impact
● Prevent targets risks that are both highly probable and highly impactful. The goal is to
implement measures to prevent these risks from occurring in the first place. For
instance, Data Breaches. High-profile data breaches can result in significant financial
loss and reputational damage. Investing in strong cybersecurity measures, such as
firewalls, encryption, and regular security audits, is essential to prevent such incidents.
Elements of Computer Security
By maintaining data integrity (keeping the data accurate and unaltered), secrecy (protecting
data from unauthorized access), and availability (making sure the data is accessible when
needed), these practices will help protect the data from cyber threats like hackers, malware, and
other IT-related risks.
Secrecy
● Refers to protecting data against unauthorized access while ensuring data authenticity.
In e-commerce terms, it means safeguarding sensitive customer information, such as
personal details and payment data, from being accessed by unauthorized parties.
Customers are often reluctant to provide detailed information unless they are confident
that the platform can protect their privacy and data. For example, websites can use
encryption protocols like SSL/TLS to ensure that data transmitted between the user’s
browser and the website remains confidential. This means that even if data is
intercepted, it cannot be read without the correct decryption key.
Integrity
● Means that keeping the data accurate and unaltered. For instance, Man-in-the-Middle
(MITM) Attack: In a MITM attack, a hacker intercepts communication between a user
and a legitimate website. For instance, a fake banking website could be used to capture
financial login information. The fake site is "in the middle" between the user and the
actual bank website. The hacker’s goal is to steal personal information like login
credentials, account details, and credit card numbers. Some ways to prevent MITM
attacks are adopting secure channels, such as VPNs, firewalls, or encrypted
messaging services.
Necessity (Availability)
● Refers to ensuring that data and resources are accessible when needed. It involves
preventing delays or denials of data availability. For instance, a Distributed Denial of
Service (DDoS) attack overwhelms a website with traffic, causing it to slow down or
become unavailable. This can prevent users from accessing important data or services.
Integrity: Ensures that data remains accurate and unaltered during storage and transmission.
Implementing checksums or hash functions to verify data integrity.
Availability: Ensures that data and systems are available to authorized users when needed.
Using redundancy and backup solutions to prevent downtime during hardware failures or
cyber-attacks.
User Authentication: Confirms the identity of users accessing the system to prevent
unauthorized access. Using multi-factor authentication (MFA) or two-factor authentication
(2FA) to add an extra layer of security beyond just passwords.
Examples:
A financial institution like banks that handles sensitive customer information should have a
strong security policy to protect against threats such as hacking and phishing attacks. By
implementing strong encryption, firewalls, user authentications, and employee training on
cybersecurity best practices, the institution can safeguard its assets and maintain customer
trust.
Active Content
Active Content refers to the interactive elements embedded within web pages, enhancing user
experience by enabling dynamic features and real-time updates. For instance, animations,
videos, playing audio, and moving graphics. Active Content’s purpose is transforming a static
web page into a responsive and engaging platform. For example, platforms like Facebook and
Instagram use active content technologies to create personalized user experiences by using
algorithms that create a personalized feed based on user preferences and behavior such as
foodie, or car enthusiast will receive recommended contents respectively.
Active Content is safe when used correctly, there is a risk of malicious code being embedded in
some active elements. For instance, Crackers can embed malicious active contents like Trojan
Horse. It is a type of malicious software that disguises itself as a legitimate program or file.
Trojan cannot self-replicate but can mislead the users. It performs various malicious activities
such as stealing sensitive information like login credentials, financial data, and personal files.
For example, a user unknowingly downloading a Trojan from a fake Netflix plugin could have
their login details stolen. A zombie is a computer that has been secretly taken over by a hacker
and is used to perform malicious activities without the owner's knowledge. When a computer
becomes a zombie, it becomes part of a botnet (a network of infected computers) controlled by
the hacker. These botnets can be used to launch large-scale attacks, such as Distributed Denial
of Service (DDoS) attacks or spams. For instance, an Instagram user might click on a malicious
link, turning their device into a zombie that participates in a botnet used to launch DDoS attacks
against other websites. To mitigate these risks, web developers should follow best practices and
ensure that up-to-date security measures are in place, and users should only access websites
they trust.
Chapter 10: (Part 2)
Steganography
Steganography is the practice of hiding information within another piece of information, such as
embedding a secret file inside an image or audio file, to keep it hidden from normal users. This
technique is often used to hide encrypted data, ensuring that the hidden information remains
undetectable and secure. The process involves two key steps:
● First, the file is encrypted to protect its contents from being read
● Second, steganography is employed to embed this encrypted file within another file,
making it virtually invisible to anyone who might come across it.
This method is used by malicious actors to covertly transfer sensitive or illicit data such as
personal information, confidential business data and login credentials. For example, a
stenographer might hide an encrypted document within the pixels of a digital image; to a normal
user, the image would appear normal, but the hidden document could only be accessed with the
correct decryption key and steganographic technique.
The main difference between these 3 different ‘Hat Hackers’ are their intentions and methods
when it comes to computer security.
Black Hat Hacker
Black hat hackers are cybercriminals that illegally crack systems with malicious intention. They
gain unauthorized access to computer systems by implanting a virus or other type of malware
such as a trojan. For instance, black hat hackers use ransomware attacks to extort financial
gains, hacking into a bank's network to steal customer data, including credit card information
and personal details, to commit fraud or sell the stolen information on the dark web.
Grey Hat Hacker
Grey hat hackers operate in a more ambiguous space; they may identify security weaknesses
without the consent/permission of the organization they hack into. However, they do not exploit
(utilize) these vulnerabilities for personal gain. Instead, they may disclose their findings to the
affected parties, sometimes seeking compensation or recognition. A researcher who discovers a
significant security flaw in a software but doesn't have permission to test it. They responsibly
disclose(reveal) the flaw to the software developer to address the issue before publicly revealing
it, but seeking a reward or recognition for their discovery.
White Hat Hacker
White hat hackers, known as ethical security hackers, identify and fix vulnerabilities. They hack
into systems with the permission of the organizations and try to uncover system weaknesses to
fix them and strengthen overall internet security of the organization. For instance, a
cybersecurity professional from a company like Google or Microsoft who is hired to conduct
penetration testing on their systems to find and fix security weaknesses to protect against
potential cyber attacks, ensuring the company's systems are secure.
Protecting an IP address (website) is crucial to ensure the security and privacy of your
network and systems. Users can safeguard their IP address using firewalls, keeping software
updated, using VPNs and enabling two-factor authentication.
Encryption Solutions and Encryption Algorithms !!
Encryption is the process of converting information into a coded format using a mathematical
algorithm and a secret key, making it unreadable to anyone who does not have the decryption
key. This technique is crucial for protecting sensitive data by transforming readable text
(plaintext) into an unreadable format (ciphertext). The main purpose of encryption is to enhance
data security. For example, when you make an online purchase, encryption ensures that your
credit card information is securely transmitted by converting it into a format that can only be
deciphered by the secure payment system, protecting it from unauthorized access or hackers.
Decryption is the process of converting encrypted data back into its original, readable format
from ciphertext to plaintext. It reverses the encryption process by using a specific algorithm and
a key to decode the ciphertext, making it understandable again. For example, when you receive
a secure email, the message is initially encrypted to protect it during transmission. Once you
enter the correct decryption key, the email is decoded and becomes readable, allowing you to
access its contents.
Worm
A worm is a type of malicious software designed to harm computers and networks. To initiate its
spread, a worm typically infects a computer through methods, such as being disguised as an
email attachment. The worm often appears as an important document, like an invoice, to lure
the victim into opening it. Once the victim opens the attachment, the worm executes its code,
allowing it to spread further and possibly infect more systems. A worm only needs to enter a
device, either through the internet, email, online message application or file sharing, then it will
automatically affect the programs. No execution needed.
● Internet Worms
● Instant Messaging Worms
● Email Worms
● File Sharing Worms
● Computer Worms
○ Morris Worm
○ Storm Worm
Worms can delete files, install backdoors, steal sensitive information, consume network
bandwidth, and install additional malware. To protect against worms, we can:
1) install reliable antivirus software and firewalls, and ensure regular scans are
performed to detect potential threats.
2) Next, we should be cautious with suspicious emails or messages and disable the
Windows Autorun feature to avoid automatic execution of malicious files.
3) Use strong passwords to enhance security, regularly backup to safeguard important
data, and utilize spam filters to block potentially harmful messages.
Virus (active execution)
Is a computer virus program where a code duplicates itself by copying its code into other
programs or files on a device, causing damage to the device. The host needs to initiate the virus
to begin the spread. For instance, it often activates when a file is opened, allowing the malicious
code to infect additional files. Once active, the virus can automatically damage or delete files.
Notable examples of computer viruses include Creeper, Blaster, and Slammer.
Deep Fake
Deepfake technology poses a significant threat to the e-commerce sector by enabling criminals
to create convincing but fake identities for sellers or buyers. This can lead to fraudulent
transactions, putting both sellers and buyers at risk. The potential for deepfake can damage
consumer confidence and disrupt the integrity of online transactions.
VPN (Virtual Private Network) (protection of network) INTI access taylors with INTI wifi
(blocked)
A VPN is a secure and private network connection established over the public internet or any
other unsecured network. VPNs use encryption to protect sensitive data from unauthorized
access and provide a secure connection, even over the internet. The main benefits of VPN are
increased privacy and security, as well as access to resources that may be restricted or
blocked in a user’s location. For example, with a VPN, a user in Malaysia can access Netflix
content available in other countries, such as the United States , where different shows and
movies are offered.
IPv4 vs IPv6
IPv4 and IPv6 are both protocols that govern how devices communicate over the internet, but
they differ significantly in their approach to security and malware protection. IPv4, or Internet
Protocol version 4, uses a 32-bit address system, offering around 4.3 billion unique addresses.
While it supports basic network operations, its security features are limited and often require
additional measures, such as firewall rules and VPNs, to protect against malware and cyber
threats. In contrast, IPv6, or Internet Protocol version 6, utilizes a 128-bit address space,
providing an almost infinite number of addresses and integrating security features directly into
the protocol, such as IPsec (Internet Protocol Security). IPsec offers end-to-end encryption and
authentication, making IPv6 inherently more secure and better suited for protecting sensitive
e-commerce transactions from interception and tampering.
For example, an e-commerce website using IPv6 can leverage its built-in encryption capabilities
to secure customer data and transactions more effectively than a website using IPv4. As the
number of connected devices and cyber threats grow, IPv6's enhanced security features and
expansive address range are crucial for safeguarding networks and ensuring the secure
exchange of information.
Dynamic pricing
Dynamic pricing involves adjusting prices based on real-time supply and demand conditions.
Sometimes really high prices and sometimes really low prices. This pricing strategy allows
businesses to optimize revenue by charging higher prices when demand is high or reducing
them when supply exceeds demand. For instance, airlines frequently use dynamic pricing to
adjust ticket prices based on factors such as booking time, seasonality, and demand
fluctuations.
Types of Auctions
Many buyers to one seller [Forward/Regular Auction]
An auction in which a seller offers a product to many potential buyers. For instance, an art
auction where collectors bid on paintings, with the highest bid winning the item, is a typical
example of a forward auction. There are different types of Auction including English Auction,
Yankee Auction and Dutch Auction.
Benefits of E-Auctions
● Benefits to Sellers:
○ E-auctions offer numerous advantages for sellers, including a broader market
reach and increased potential revenue. By utilizing online platforms, sellers
can access a global audience, which often translates to higher bids and better
prices for their items.
○ E-auctions also encourage optimal price setting by enabling competitive
bidding, thus securing the best possible price for goods.
○ Additionally, e-auctions eliminate costly intermediaries, reducing both
transaction and administrative costs.
○ This can make it easier for sellers to liquidate inventory quickly and efficiently.
○ Moreover, sellers benefit from improved customer relationships through direct
engagement with buyers, enhancing trust and fostering loyalty.
● Benefits to Buyers:
○ One major advantage for buyers is the ability to find unique items and
collectibles that may not be available through traditional retail channels.
E-auctions often feature rare or one-of-a-kind products, appealing to collectors
and enthusiasts.
○ Additionally, buyers can often secure lower prices due to the competitive nature
of bidding, which drives down costs.
○ The anonymity of e-auctions protects buyer identities, allowing for more
comfortable and private purchasing.
○ The convenience of online bidding eliminates the need to travel to physical
auction sites, and the competitive bidding process adds an element of
entertainment to the shopping experience.
● Benefits to E-Auctioneers:
○ For e-auctioneers, the platform provides substantial benefits including higher
repeat purchases and increased website engagement. Successful e-auctions
can drive repeat business as satisfied buyers return for future auctions. The
interactive and competitive nature of e-auctions also makes the website more
engaging, keeping users returning.
○ This sticky environment fosters a loyal user base and expands the auction
business.
○ As e-auction platforms grow in popularity, they can leverage their success to
attract more sellers and buyers, further enhancing their market presence and
auction business opportunities.
Limitations of E-Auctions
● Possibility of Fraud:
○ One of the primary limitations of e-auctions is the potential for fraud. Since
e-auctions operate online, they are vulnerable to various forms of fraud, such as
fake bids or misrepresented items. Fraudulent sellers might list non-existent or
counterfeit goods, while buyers might employ misleading tactics to drive down
prices. This risk underscores the need for robust verification processes and
secure payment methods to protect both parties involved. For instance, platforms
like eBay and Alibaba implement stringent verification procedures to minimize
fraudulent activities, but risks still persist, necessitating continuous vigilance and
improvement in security measures.
Shilling
= Many bidders bid very high prices, then real bidders follow assuming goods have demand,
manipulate actual bidders that the goods are very valuable, then bid very aggressively, end up
overpaid the market value.
Shilling, or using shill bidders, involves artificially inflating the auction price by having
accomplices place bids on behalf of the seller. These fake bids create the illusion of high
demand and competition, leading genuine bidders to offer higher amounts than they initially
intended. For instance, in an auction for a high-end digital camera, a seller might employ shill
bidders to inflate the final sale price. For instance, shill bidders place high initial bids and raise
the price during the auction, prompting genuine bidders to increase their offers. As a result, the
camera sells for significantly more than its market value. This deceptive practice undermines
auction fairness, leading genuine bidders to pay more and damaging trust in the auction
platform. Shill bidding manipulates auction outcomes to benefit sellers or their accomplices.
2. Authentication Service:
Authentication services enhance security by ensuring that users are genuinely who they claim to
be during the auction. Multi-factor authentication (MFA), such as requiring both a password and
a code sent to a mobile device, adds an extra layer of protection. For instance, an auction site
might use MFA to verify bidders' identities before they can place bids. This approach helps
prevent unauthorized access to accounts and reduces the risk of fraud.
4. Insurance Policy:
Insurance policies offer financial protection against potential losses resulting from fraud or
disputes. Auction platforms or sellers might obtain insurance to cover losses from non-delivery,
misrepresentation, or other issues. For instance, if an item is falsely advertised and the buyer
suffers a financial loss, insurance can help cover the costs. This safeguard protects both buyers
and sellers and promotes trust in the auction process.
5. Escrow Services:
Escrow services act as a neutral intermediary that holds funds until both parties fulfill their
contractual obligations. In an auction context, the buyer's payment is held in escrow until the
item is delivered and verified. For example, a buyer's payment for a high-value item is secured
by an escrow service until the item is received and confirmed. This practice reduces the risk of
fraud by ensuring that the transaction is completed as agreed before funds are released.
6. Nonpayment Punishment:
Implementing penalties for nonpayment discourages bidders from defaulting on their
commitments. This can include fines, account suspension, or legal actions. For instance, an
auction platform might impose a fee or temporarily suspend accounts of bidders who fail to
complete their purchases. These measures ensure that bidders adhere to their commitments
and reduce the risk of fraud by holding participants accountable.
While direct materials are critical for production and often involve strategic, long-term
procurement agreements, indirect materials are typically purchased on a recurring basis and
support the operational aspects of a business.
Logistic Activities
Logistics activities focus on ensuring that goods are delivered accurately and efficiently, aiming
to provide the right products in the correct quantities, at the appropriate location, and at the right
time. This involves managing materials, supplies, and finished goods throughout the supply
chain. For example, a company might engage a third-party logistics (3PL) provider to handle its
warehousing and transportation needs, leveraging GPS and portable computing technologies to
track and manage shipments in real time. These technologies help streamline operations,
reduce errors, and enhance overall efficiency by providing accurate data and timely updates,
ultimately improving customer satisfaction and operational effectiveness.
Business Processes Support Activities
Supply Web
A supply web is a modern evolution of the traditional supply chain, reflecting a shift from rigid
hierarchical structures to more flexible network structures. Supply webs consist of
interconnected parallel lines that create a complex network of relationships among suppliers,
manufacturers, and distributors. For example, consider a tech company like Apple, which uses a
supply web to manage its global production of iPhones. Apple sources various components
from a network of suppliers worldwide such as chips from Company A, displays from Company
B, and assembly services from Company C. Instead of relying on a linear (single) supply chain,
Apple's supply web connects these suppliers and manufacturers, allowing for real-time
adjustments and coordination. If a new component becomes available or a problem arises with
a supplier, Apple can quickly switch to alternative sources or modify production schedules to
maintain efficiency. This flexibility not only helps Apple respond quickly to market demands, but
also strengthens its ability to negotiate better terms and forge strategic partnerships, ultimately
resulting in a more stable and responsive manufacturing network.
In a supply web, technologies like the Internet of Things (IoT) and cloud storage play crucial
roles by enabling real-time data sharing and seamless access to information across different
parts of the network. IoT devices track and monitor inventory levels, shipment statuses, and
equipment conditions, enhancing operational efficiency. Cloud storage supports this by
providing a central repository for data, accessible from anywhere, which facilitates coordination
between various suppliers and manufacturers. Just-In-Time (JIT) inventory practices reduce
storage costs by ensuring that materials arrive only as needed, minimizing waste and optimizing
production schedules. Inter-firm trade agreements streamline procurement processes, while
automation tools increase productivity by reducing manual tasks and minimizing errors. These
technologies collectively enhance accuracy in order fulfillment and production planning, allowing
businesses to respond swiftly to market demands and maintain a competitive edge.
For example, Malaysian retailer Lotus leverages technologies like IoT, cloud storage, and
automation to streamline its supply web. By using IoT sensors to monitor inventory levels in
real-time and cloud storage for seamless data sharing, Aeon can efficiently manage stock
across its numerous locations. Just-In-Time (JIT) practices ensure that products arrive at stores
precisely when needed, reducing excess inventory and improving turnover. Inter-firm trade
partnerships enhance procurement efficiency, while automation boosts productivity and
accuracy in order fulfillment. This integrated approach helps Lotus maintain a responsive and
effective supply chain, ensuring timely delivery of products and optimizing overall performance.
Materials-Tracking Technology
EDI and RTLS
Materials-tracking technologies are essential for managing inventory flows and forecasting
material needs throughout the supply chain. One common method is Electronic Data
Interchange (EDI), which facilitates the electronic transfer of data between companies,
although it can be challenging to track materials in transit. Real-Time Location Systems
(RTLS), such as barcode tracking systems used in fulfillment centers, provide precise tracking
of materials as they move through the supply chain. For example, J&T Express Malaysia
employs Real-Time Location Systems (RTLS) to monitor the exact location of parcels within
its sorting hubs and warehouses. By using advanced barcode tracking and GPS technology,
J&T Express can trace each package's journey from the moment it arrives at the warehouse
until it is delivered to the customer. This system ensures that packages are sorted accurately
and routed efficiently, minimizing delays and reducing the risk of lost items. The real-time
visibility provided by RTLS allows J&T Express to quickly address any issues that arise,
streamline its operations, and better meet customer expectations for timely deliveries.
RFID (Active/Passive)
Radio Frequency Identification (RFID) is a technology that uses radio waves to identify and
track items through small chips embedded in tags. RFID tags come in two main types: active
and passive. Active RFID tags have their own power source, allowing them to transmit signals
over greater distances and with higher accuracy, making them ideal for tracking high-value
items or large shipments. Passive RFID tags are smaller, less expensive, and do not require a
power source; they rely on the reader’s signal to power up and transmit data, which makes them
suitable for tracking lower-value items or large quantities of goods. For example, a retail chain
might use passive RFID tags to monitor inventory levels on shelves, reducing stock outs and
lost sales by ensuring accurate and real-time stock information. Active RFID, such as that used
in high-security environments or logistics operations, enables precise tracking of valuable
assets across extensive distances, enhancing operational efficiency and minimizing losses.
● Benefit of RFID:
○ Real-Time Inventory Updates: RFID provides real-time data on inventory levels.
This ensures that stock levels are always current, which helps in managing
reorder points and avoiding stockouts.
○ Reduced Manual Checks: Traditional inventory methods often involve manual
stock counts, which are time-consuming and error-prone. RFID automates this
process, reducing the need for manual intervention and improving accuracy.
○ Improved Accuracy: RFID eliminates common errors associated with manual
entry or bar code scanning, providing precise information on product availability
and location.
Detail example:
For example, if Samsung experiences a surge in demand for the Samsung S22 Ultra, it can
immediately update their Samsung Supplier Portal with revised forecasts and expected delivery
dates. Suppliers can then adjust their production and logistics plans accordingly, ensuring timely
and accurate order fulfillment. This level of visibility helps to prevent delays and shortages as
suppliers are not left guessing about Samsung's needs. In addition, the portal includes features
to track shipments and address any issues that arise, further enhancing collaboration and trust.
This collaborative approach not only optimizes inventory management, but also strengthens the
partnership between Samsung and its suppliers, resulting in a more efficient and responsive
supply chain.