Transcript Chapter 4
Course B: Advanced e-Business Module 4. e-Commerce by Vatcharaporn Esichaikul, AIT Outline B2C/B2B e-commerce Business models of e-commerce Internet shopping Selling on the web Online customer service E-payment systems and security for e-com E-auction B2C/B2B e-commerce Categories of eCom/eBiz Business-to-customer (B2C) Business-to-business (B2B) Sales of goods and services among businesses Consumer-to-consumer (C2C) Retailing of products and services directly to individual customers Individuals use Web for private sales or exchange Business-to-employee (B2E) Information and services made available to employees online Pure vs. Partial EC Pure vs. Partial EC: based on the degree of digitization of Product [physical/digital] Process [physical/digital] Delivery agent [physical/digital] Traditional commerce: all dimensions are physical Pure EC: all dimensions are digital Partial EC: all other possibilities include a mix of digital and physical dimensions Business Models of e-Commerce Real-world Cases Amazon.com New Business Model: Amazon.com Online retailer of books, CDs, electronics, and other products Uses software to create detailed customer profiles and make customer-specific offers What led to Amazon’s fantastic growth? What led to Amazon’s fantastic growth? First mover – embraced a revolutionary way to reach end consumers They made their brand more important than profit Customer service focus Dimensions of Competition: Price/Cost Example Amazon cuts costs of retail outlets and intermediaries. Amazon’s distribution system is less expensive than its competitors. Shipment from an Amazon warehouse is more costly than visiting a retail outlet. Amazon gets paid before paying the distributor, whereas in the traditional distribution system it is the other way around. Dimensions of Competition: Custom Features Example Amazon uses the data obtained from customers to offer personal buying recommendations. Amazon’s innovations have included oneclick shopping, its popular bestseller list ranking sales on the site, and the associates program. Dimensions of Competition: Brand Example More personalized products and Web site experiences. Broader offering of products are built into brand experience, allowing more revenue and profit per customer. Dimensions of Competition: Speed of Delivery Example For in-stock items, there is no technology advantage for Amazon. For out-of-stock items, technology allows greater order tracking and notification features. Dimensions of Competition: Selection Example Amazon.com offers 3 million titles compared with 175,000 for a Barnes & Noble retail superstore. Both Amazon.com and BarnesAndNoble.com offer a similar selection of book titles. Dimensions of Competition: Convenience Example Available 7/24/365. Easy-to-navigate site. Excellent use of e-mail for marketing and customer service. Skilled at tailoring product recommendations to individuals. One-click ordering. Amazon Implications B2C example Technology can be used to compete in many dimensions Technology provides more than just new business models Will Amazon survive? What are the Consequences of the Amazon Business Model? Immediate Dominant Internet shopping brand. A lot of valuable information about customer buying. Future Wal-Mart of the Internet? Sub-contract to other dot com’s Impact of Technology on Dimensions of Competition Dimension Price/cost Technology’s Impact Allows personalized pricing, eliminates middlemen, and shrinks value chain (removing non-value-added interactions). Reduced Transaction costs Allows faster product lifecycle, more customer-specific products, and changeable and upgradeable products. Custom features Distribution Brand, promotions Causes disintermediation, reintermediation, and globalization. Allows 1-to-1 (personalized) marketing. Impact of Technology on Dimensions of Competition Dimension Speed of delivery Selection Convenience Service Technology’s Impact Reduces delivery time and inventory, and causes disintermediation. Improved Information Allows greater sales, lower inventory, and customer-driven business systems. Allows 24/7 shopping, order tracking, broader selection, and comparative pricing. Personalizes service using historic and/or predictive information. eBay New Business Model: eBay Online auction system for individuals. People can post items for sale or search for items being auctioned and make bids. Why did eBay’s business model & strategy work? What made eBay Work? Connected people who previously couldn’t be connected economically (new possibility) Users motivation to participate was strong Rapid success Technology was kept simple instead focusing on core objectives What are the Consequences of the eBay Business Model? Immediate Rapid growth of person-to-person auctions. Rise of “questionable” auction items. Future End of flea markets and garage sales? Creates new markets Specialized trading? Facilitate others? eTrade New Business Model: E*TRADE Top online brokerage company. Why is stock-trading ideally suited to online business? Why E*TRADE? No physical delivery of goods makes this an ideal online business Implication: All information-based services can benefit from being online Reduced transaction costs Effective delivery of services Customer segmentation Built a new brand in an industry which competes on brand.. What are the Consequences of the E*TRADE Business Model? Immediate More online customers. More day-traders. Greater trading volume. More stock market volatility. Future Disintermediate the NYSE? Create an ECN (Electronic Communications Network) like Instinet? Dell New Business Model: Dell Largest direct PC manufacturer and one of the largest PC manufacturers. Sells directly to customers, bypassing retailers and passes on the savings. Has much less inventory than its competitors and much faster deliveries. What Rules Did Dell Break? You can’t customize every order for every customer, so offer pre-configured models that can’t be changed. Retailers recommend specific models to customers, so the channel cannot be bypassed. What are the Consequences of the Dell Business Model? Immediate Decline of computer retailer. PC industry margin squeeze – consolidation and bankruptcy. Future Offer non-PC products in an electronics marketplace. Sabre New Business Model: Sabre Electronic reservation system for airlines, hotels, car rental companies. Sets prices for individual airline tickets to maximize total company revenue or profit. What is Optimal Dynamic Pricing? What Rules Did Sabre Break? You can’t charge customers different prices for the same product. Companies cannot share their complete pricing strategies with all competitors. What are the Consequences of the Sabre Business Model Immediate Travel agent disintermediation. Higher revenue and profits for airlines, hotels, and other travel companies. Future Airline alliances. Airline management by Sabre. Single travel marketplace for all players. Hotmail New Business Model: Hotmail Free Web-based e-mail. Spent only $500,000 on initial marketing, much less than the $20 million spent by its nearest competitor Juno. How did they do this? New Business Model: Hotmail Used viral marketing (every message ends with a message stating “Get Your Private, Free Email at http://www.hotmail.com”). How did this business make money as an independent entity? What Rules Did Hotmail Break? You can’t grow a business or brand without spending a lot on marketing. Customers won’t like being used as part of a marketing campaign. Customers won’t give out personal information to get a “free” service. What are the Consequences of the Hotmail Business Model? Immediate Single standard and source for e-mail. Consumers expect other free services. Traffic for MSN sites. Future Single standard and source for all communications? Does the online advertising business model work? Priceline.com New Business Model: Priceline.com Online shopping service that allows customers to “Name Your Own Price” for a variety of products, like vacations and electronics. What Rules Did Priceline.com Break? Suppliers determine the price of products and publish them to customers. What are the Consequences of the Priceline.com Business Model? Immediate All prices are negotiable online. Future End of price setting by sellers? Conclusions Technology allows new ways of doing new things and new ways of doing old things. Different businesses – different models & strategies “If you’re not changing faster than your environment, you are falling behind” – Jack Welsh, CEO of General Electric. Internet Shopping Why do people shop online? Why don’t people shop online? Why Internet Shopping? Enables consumers to shop or do other transactions 24 hours a day, all year round from almost any location Provides consumers with more choices Provides consumers with less expensive products and services by allowing them to shop in many places and conduct quick comparisons Why Internet Shopping? Allows quick delivery of products and services, especially with digitized products Consumers can receive relevant and detailed information in seconds, rather than in days or weeks Allows consumers to interact with other consumers n electronic communities and exchange ideas as well as compare experiences Facilitates competition, which results in substantial discounts Why not Internet Shopping? Security and Privacy Customers do not trust: Difficult to convince customers that online transactions and privacy very secure Unknown faceless sellers Paperless transactions Electronic money Switching from a physical to a virtual store may be difficult Lack of touch and feel online Many unresolved legal issues Expensive and/or inconvenient accessibility to the Internet ePayment is not in place Online Consumer Behavior Model Consumer Behavior Online (cont.) Consumer types Individual consumer Organizational buyers Governments and public organizations Private corporations Resellers Consumer behavior viewed in terms of Why is the consumer shopping? How does the consumer benefit from shopping online? Consumer Behavior Online (cont.) 3 categories of consumers Impulsive buyers—purchase quickly Patient buyers—make some comparisons first Analytical buyers—do substantial research before buying Online Customer Service and CRM Online Customer Service Customer service Traditional: do the work for the customer EC delivered: gives tools to the customer to do the work for him/herself (log: tracking, troubleshooting, FAQ) with Improved communication Automated process Speedier resolution of problems Online Customer Service (cont.) E-service—online help for online transactions Foundation of service—responsible and effective order fulfillment Customer-centered services—order tracing, configuration, customization, security/trust Value-added services--dynamic brokering, online auctions, online training and education Online Customer Service (cont.) Product life cycle and customer service Phases of product life cycle Requirements: assisting the customer to determine needs Acquisition: helping the customer to acquire a product or service Ownership: supporting the customer on an ongoing basis Retirement: helping the client to dispose of a service or product Service must be provided in all of them Online Customer Service (cont.) Customer relationship management (CRM) Customer-focused EC Make it easy for customers to do business online Business processes redesigned from customer’s point of view Design a comprehensive, evolving EC architecture Foster customer loyalty by: Personalized service Streamline business processes Own customer’s total experience Customer Relationship Management (CRM) Customer service functions Provide search and comparison capabilities Provide free products and services Provide specialized information and services Allow customers to order customized products and services Enable customers to track accounts or order status Customer Relationship Management (cont.) Customer service tools Personalized Web pages Used to record purchases and preference Direct customized information to customers efficiently FAQs Customers find answers quickly Not customized, no personalized feeling and no contribution to relationship marketing Customer Relationship Management (cont.) Tracking tools Chat rooms Customers track their orders saving time and money for all Example: FedEx’s package tracking discuss issues with company experts and with other customers E-mail and automated response Disseminate general information Send specific product information Conduct correspondence regarding any topic (mostly inquiries from customers) Customer Relationship Management (cont.) Help desks and call centers A comprehensive customer service entity EC vendors take care of customer service issues communicated through various contact channels Telewebs combine Web channels (automated e-mail reply) Web knowledge bases (portal-like self service) Call center agents or field service personnel Troubleshooting tools —assist customers in solving their own problems Customer Relationship Management (cont.) Justifying customer service and CRM programs—2 problems Most of the benefits are intangible Substantial benefits reaped only from loyal customers, after several years Metrics—standards to determine appropriate level of customer support Response and download times Up-to-date site and availability of relevant content Others Customer Relationship Management (cont.) Examples of customer service Amazon.com Convenience, selection, value, special services E-mail order confirmation Personalized services Federal Express (FedEx) Package tracking service Ability to calculate delivery costs, online shipping forms, arrange pickup, find local drop bo Electronic Payment Systems E-payment Players and processes involved in using credit cards online Online alternatives to credit card payments Key elements in securing an e-payment Overview of Electronic Payments E-payment methods Electronic funds transfer (EFT) Credit cards E-payments Smart cards Digital cash Digital checks E-billing All have the ability to transfer payment from one person or party to another Electronic Payments Five parties involved in e-payments (cont.) Issuer Customer/payer/buyer Merchant/payee/seller Regulator Automated Clearing House (ACH) Key issue of trust must be addressed Privacy Authentication and authorization Integrity Nonrepudiation Electronic Payments (cont.) Crucial factors in determining which method of e-payment achieves widespread acceptance Independence Interoperability and portability Security Anonymity Ease of use Transaction fees E-Cards Three common types of payment cards Credit cards —provides holder with credit to make purchases up to a limit fixed by the card issuer Charge cards —balance on a charge card is supposed to be paid in full upon receipt of monthly statement Debit card —cost of a purchase drawn directly from holder’s checking account (demand-deposit account) E-Cards (cont.) The Players Cardholder Merchant (seller) Issuer (your bank) Acquirer (merchant’s financial institution, acquires the sales slips) Card association (VISA, MasterCard) Third-party processors (outsourcers performing same duties formerly provided by issuers, etc.) Online Credit Card Processing . E-Cards (cont.) E-wallets A software component in which a user stores credit card numbers and other personal information when shopping online, the user simply clicks the e-wallet to automatically fill in information needed to make a purchase E-Cards (cont.) Security risks with credit cards Stolen cards Reneging by the customer—authorizes a payment and later denies it Theft of card details stored on merchant’s computer E-Cards (cont.) Purchase cards Instrument of choice for B2B purchasing Special-purpose, non-revolving payment cards issued to employees solely for purchasing and paying for nonstrategic materials and services Purchase cards—operate like other credit cards Cardholder of corporation places an order for goods or services Supplier processes transaction with authorization of card issuer Issuer verifies purchase authorization E-Cards (cont.) Purchase cards All cardholders’ transactions processed centrally— one payment for all purchases Each cardholder reviews monthly statement Card issuer analyzes transactions—standard and ad hoc reports are made Card issuer creates electronic file to upload to corporation’s ledger system E-Cards (cont.) Benefits of purchasing cards Cost savings Productivity gains Bill consolidation Payment reconciliation Preferred pricing Management reports E-Cards (cont.) Smart Cards An electronic card containing an embedded microchip that enables predefined operations or the addition, deletion, or manipulation of information on the card E-Cards (cont.) Categorize smart cards by how they store data Contact card —insert in smart card reader Contactless(proximity) card —embedded antenna read by another antenna (mass-transit applications) E-Cash and Payment Alternatives The digital equivalent of paper currency and coins, which enables secure and anonymous purchase of low-priced items E-cash alternatives for credit cards (micropayments— under $10) E-cash (eCoin.net) Identity of user hidden from merchant Easier to use than earlier e-cash systems Requires specialized software Qpass (Qpass.com) Set up Qpass account User name and password What credit card to charge E-Cash & Payment Alternatives (cont.) Stored-value cards and other innovations Visa Cash: A stored-value card designed to handle small purchases or micropayments; sponsored by Visa Visa Bucks: prepaid card designed for teens Mondex: A stored-value card designed to handle small purchases or micropayments; sponsored by Mondex, a subsidiary of MasterCard E-Cash & Payment Alternatives (cont.) E-loyalty and rewards programs Electronic script A form of electronic money (or points), issued by a third party as part of a loyalty program can be used by consumers to make purchases at participating stores MyPoints-CyberGold (mypoints.com) Customers earn cash Cash used for later purchases E-Cash & Payment Alternatives (cont.) Person-to-person (P2P) payments and gifts Enable transfer of funds between two individuals Repaying money borrowed Paying for an item purchased at online auction Sending money to students at college Sending a gift to a family member Sending money with PayPal Source: paypal.com. E-Checking The electronic version or representation of a paper check Eliminate the need for expensive process reengineering Can be used by all bank customers who have checking accounts To be integrated with the accounting information system of business buyers and with the payment server of sellers Used mainly in B2B E-Checking (cont.) Benefits of e-checking Online check collection process Online notices of check returns Truncating paper checks at bank of first deposit B2B Electronic Payments Financial supply chains (FSC) Follows a buyer’s transaction activities related to cash flow, which start with a purchase order and end in settlement with the seller E-Billing Customers are either individuals or companies Two common models of e-billing Biller direct—customer receives bill from a single merchant Third-party consolidators—presents bills from multiple merchants E-Bill Presentment Payment Gateway server-based transaction processing system which enables businesses to authorize, process, and manage credit card transactions securely in a realtime, online environment from any computer with an Internet connection and a Web browser. specifically designed to accommodate the increasing demand by e-commerce companies offered by banks and companies who are authorized to accept credit card online payment Ex: Citibank payment gateway E-Commerce Security Need for E-Commerce Security Annual survey conducted by the Computer Security Institute Organizations continue to experience cyber attacks from inside and outside of the organization The types of cyber attacks that organizations experience were varied The financial losses from a cyber attack can be substantial It takes more than one type of technology to defend against cyber attacks Security Is Everyone’s Business Security practices of organizations of various sizes Small organizations (10 to 100 computers) The “haves” are centrally organized, devote a sizeable percentage of their IT budgets to security Medium organizations (100 to 1,000 computers) Rarely rely on managerial policies in making security decisions, and they have little managerial support for their IT policies Overall exposure to cyber attacks and intrusion is substantially greater than in smaller organizations Security Is Everyone’s Business (cont.) Large organizations (1,000 to 10,000 computers) Complex infrastructures and substantial exposure on Internet While aggregate IT security expenditures are fairly large, their security expenditures per employee are low Large/Very Large organizations IT security is part-time and undertrained—sizeable percentage of the large organizations suffer loss or damage due to incidents Base their security decisions on organizational policies extremely complex environments that are difficult to manage even with a larger staff Security Issues From the user’s perspective Is the Web server owned and operated by a legitimate company? Does the Web page and form contain some malicious or dangerous code or content? Will the Web server distribute unauthorized information the user provides to some other party? Security Issues (cont.) From the company’s perspective Will the user not attempt to break into the Web server or alter the pages and content at the site? Will the user will try to disrupt the server so that it isn’t available to others? Security Issues (cont.) From both parties’ perspectives Is the network connection free from eavesdropping by a third party “listening” on the line? Has the information sent back and forth between the server and the user’s browser been altered? Security Requirements Authentication: The process by which one entity verifies that another entity is who they claim to be Authorization: The process that ensures that a person has the right to access certain resources Confidentiality: Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes Security Requirements (cont.) Integrity: As applied to data, the ability to protect data from being altered or destroyed in an unauthorized or accidental manner Auditing: The process of collecting information about attempts to access particular resources, use particular privileges, or perform other security actions Nonrepudiation: The ability to limit parties from refuting that a legitimate transaction took place, usually by means of a signature Types of Threats and Attacks Nontechnical attack An attack that uses chicanery to trick people into revealing sensitive information or performing actions that compromise the security of a network Technical attack An attack perpetrated using software and systems knowledge or expertise Types of Threats and Attacks (cont.) Denial-of-service (DoS) attack An attack on a Web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources Distributed denial-of-service (DDoS) attack Attacker gains illegal administrative access to as many computers on the Internet as possible and uses these multiple computers to send a flood of data packets to the target computer Types of Threats and Attacks (cont.) Malware: A generic term for malicious software The severity of the viruses increased substantially, requiring much more time and money to recover 85% of survey respondents said that their organizations had been the victims of e-mail viruses in 2002 Types of Threats and Attacks (cont.) Malicious code takes a variety of forms—both pure and hybrid Virus: A piece of software code that inserts itself into a host, including the operating systems, to propagate; it requires that its host program be run to activate it Worm: A software program that runs independently, consuming the resources of its host in order to maintain itself and is capable of propagating a complete working version of itself onto another machine Macro virus or macro worm: A virus or worm that is executed when the application object that contains the macro is opened or a particular procedure is executed Trojan horse: A program that appears to have a useful function but that contains a hidden function that presents a security risk Security Risk Management Definitions involved in risk management Assets—anything of value worth securing Threat—eventuality representing danger to an asset Vulnerability—weakness in a safeguard Required to determine security needs 4 phases of risk management Assessment Planning Implementation Monitoring Security Risk Management (cont.) Assessment phase—evaluation of assets, threats, vulnerabilities Determine organizational objectives Inventory assets Delineate threats Identify vulnerabilities Quantify the value of each risk Security Risks for EC & Other Internet Sites Security Risk Management (cont.) Planning phase of risk management— arrive at a set of security policies Define specific policies Establish processes for audit and review Establish an incident response team and contingency plan Security Risk Management Implementation phase of risk management (cont.) choose particular technologies to deal with high priority threats Monitoring phase of risk management ongoing processes used to determine which measures are successful, unsuccessful and need modification Methods of securing EC Authentication system System that identifies the legitimate parties to a transaction, determines the actions they are allowed to perform Access control mechanism Mechanism that limits the actions that can be performed by an authenticated person or group Biometric Controls Biometric systems Authentication systems that identify a person by measurement of a biological characteristic fingerprint, iris (eye) pattern, facial features, or voice Encryption Encryption The process of scrambling (encrypting) a message in such a way that it is difficult, expensive, or time-consuming for an unauthorized person to unscramble (decrypt) it Private and public key encryption Encryption Plaintext Ciphertext An unencrypted message in human-readable form A plaintext message after it has been encrypted into a machine-readable form Encryption algorithm The mathematical formula used to encrypt the plaintext into the ciphertext, and vice versa Encryption Methods (cont.) Key - The secret code used to encrypt Types of encryption systems and decrypt a message Symmetric (private key) Use the same lkey to encrypt and decrypt message Shared by sender and receiver of message Asymmetric (public key) Use a pair of keys Public key to encrypt the message Private key to decrypt the message Encryption Methods Public key infrastructure (PKI): A scheme for securing e-payments using public key encryption and various technical components Elements of PKI Digital signature: An identifying code that can be used to authenticate the identity of the sender of a document or a message ensure the original content of the electronic message or document is unchanged Cannot be easily repudiated or imitated Can be time-stamped Digital Signatures Elements of PKI (cont.) Digital certificate: Verification that the holder of a public or private key is who they claim to be Certificate authorities (CAs): Third parties that issue digital certificates Security Protocols Secure Socket Layer (SSL) Transport Layer Security (TLS): Protocol that utilizes standard certificates for authentication and data encryption to ensure privacy or confidentiality As of 1996, another name for the SSL protocol Secure Electronic Transaction (SET) A protocol designed to provide secure online credit card transactions for both consumers and merchants; developed jointly by Netscape, Visa, MasterCard, and others Securing EC Networks Technologies for organizational networks Firewall: A network node consisting of both hardware and software that isolates a private network from a public network Packet-filtering routers: Firewalls that filter data and requests moving from the public Internet to a private network based on the network addresses of the computer sending or receiving the request Application-level proxy: A firewall that permits requests for Web pages to move from the public Internet to the private network Securing EC Networks (cont.) Securing EC Networks (cont.) Personal firewalls: Personal firewall: A network node designed to protect an individual user’s desktop system from the public network by monitoring all the traffic that passes through the computer’s network interface card Securing EC Networks (cont.) Virtual private network (VPNs) A network that uses the public Internet to carry information but remains private by using encryption to scramble the communications, authentication to ensure that information has not been tampered with, and access control to verify the identity of anyone using the network Securing EC Networks (cont.) Intrusion detection systems (IDSs): A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees Network-based IDS uses rules to analyze suspicious activity at the perimeter of a network or at key locations in the network What are the consequences of poor security? Dynamic Pricing and E-auctions Dynamic Pricing 4 categories one buyer, one seller -- negotiation, bargaining many buyers, many sellers -- dynamic exchanges one seller, many potential buyers -forward(regular) auctions one buyer, many potential sellers -reverse auction, tendering Online Auction(e-Auction) ..... any system that uses algorithms to competitively bid price to consummate a transaction between a seller & a purchaser, including Internet exchanges which are online markets where auctions take place Similar to real-life auctions BUT sellers and bidders don’t go to a physical auction house --- they go to a web site where bidding takes place Real-life vs. Online Auctions Who do buy from? period of auctions most online auctions -- buy directly from the seller traditional, real-life auctions -- buy from an auctioneer most online auctions -- last for days, except flash auction examine the goods -- can’t for online auctions buyers & sellers have to arrange for the goods to be shipped privately Process of Online Auctions Activities Initial buyer/seller registration Setting up a particular auction event Scheduling and advertising Bidding Evaluation of bids and closing the auction Trade settlement Benefits of e-Auction Create more efficient markets Relax geographic constraints Consumers getting a ‘good deal’ / save money Make extra money -- one man’ s trash is another man’ s treasure Contribute to buyers and sellers sense of online community Disadvantages of e-Auction Blind shopping Less competitive Vulnerability to bidder collusion Vulnerability to a lying auctioneer Security Untrustworthy Framework of e-Auction 6 components auctioneer supplier/seller customer/buyer trade objects transaction phase rule base + the network/Internet covers the entire auction framework for communication Forward Auction Formats English Auction seller lists an item and an opening bid, also specifies a bid increment buyers start bidding the highest bid wins at their bid price Yankee Auction commonly used when a seller places one or more identical items on sale all winning bidders pay the identical price -- the lowest successful bid = bottom of the winning bid range Auction Formats con’t Reserve Auction a reserve price -- the lowest price a seller is willing to sell an item, not disclosed to bidders reserve the right to refuse the item beneath Proxy Format a buyer sets the maximum price they’ re willing to pay the site will do your bidding for you if somebody outbids you, your bid will automatically be increased by the increment set continue until someone bids above your max bid or until the auction is over and you win Auction Formats con’t Dutch Auction prices start at a high level, slowly declined bidders specify quantity to buy at declining price Express or Flash Auction very much like real-life auction, bid against others live online held for short amount of time, often last an hour or less Reverse Auction Potential sellers bid, reducing the price sequentially until bidders do not reduce the price sealed-bid -- bid only once, silent auction Some Issues Auction or not Your own auction site or 3rd Party site Auction strategy Support services Payment What is auctioned e-Bay www.ebay.com the world’s largest online auction Main Page of the site many services auction listings e-Bay con’t Find what you want to buy Featured items Browsing by category Doing a search You want to buy the first stamp in the world How to Place Your Bids Steps Check out the item details page Place your bid Follow up on your bidding Close the deal