All these aspects of a B2B transaction, when consistently executed on, create a level of trust that becomes one of the strongest and most unassailable differentiators there are in a market.
Companies occupying the second highest layer, Collaborating, are using portals and other Internet-based tools to maximize information sharing and co-development of strategies and the co-sharing of communications tools and ultimately platforms. Security, DRM and digital signature strategies all aimed at increasing trust as a differentiator; apply equally across B2B and B2C selling strategies, with B2B-based approaches having the greatest long-term impact on eventually quantifying trust and leading to greater levels of synchronization across channel, supply chain, and selling partners.
Anticipating, the second highest level in the maturity model, is where the majority of companies are today from both a B2B and B2C perspective. The focus on making a strong correlation between making information flow optimized vs. striking a collaborative focus with other global trading partners on the part of EU manufacturers and service companies. This level of the maturity model is a transitory one and is focused more on either small, incremental gains from the first level, which is Reacting. For many companies in the Anticipating layer of the model, initial efforts have proven at time successful, and time problematic. An example would be the use of online transactions from Expedia where prices are changed suddenly at check-out as old pricing tables are used for the presenting of offers and new pricing tables, for check-out. This technological gap causes a lack of trust to take hold and eventually force a company to re-define their process workflows over time to stay competitive. When the medium of exchange is trust in transactions, no company can afford to stay in this layer of the model for very long.
In the Reacting layer of this proposed PR Maturity Model, the majority of EU manufacturers and service companies alike have decidedly "every department in the company for itself when it comes to security" approach to process maturity and have trusted workflows that are purely dependent on personal productivity applications that have no synchronized series of processes and programs that align efforts internally . That is to say specifically that at this low level of performance in the model, e-commerce departments focuses first on tactical wins at the expense of global victories in the pursuit of trust with either B2B or B2C customers.
This mindset in turn creates an isolated approach to defining trust in e-commerce initiatives from a strategic perspective for industries where the majority of companies inhabit this lowest layer of the model. One of the key attributes of this level of the PR Model is the neglecting of the many user-generated from of content including blogs, Wikis and other forms of interactive customer feedback. The short-sighted nature of being a company in the Reacting layer of this model forces security and marketing teams more into firefighting and creating a chaotic environment where security firefighting pervades the growth of strategies for turning trust in a competitive differentiator.
In summary, the three critical success factors of becoming a trusted advisor, focusing on value-based differentiation and less on features and functions, and the strong trend towards the quantification of any company's ability to generate trust through its strategies. Underscoring all this in the research is the acceptance that blogs, Wikis, and user-generated content is here to stay and is aiding in the globalization of B2C and B2B activities by companies comprising the EU manufacturing and service base. Finally, the correlation of a company's ability to attain trusted advisor status with its customers and retain that status through continual reinforcing of security and DRM initiatives that validate that trust once earned must be kept if any EU-based company will survive for the long-term.
Proposed Thesis Chapter Structure
In completing this thesis the following chapter structure will provide for enough flexibility on covering core concepts yet also be flexible enough in defining the future developments in the quantification of trust and the introduction of the EU e-commerce Maturity Model as briefly discussed in this proposal:
1) E-Commerce's Dilemma: Global Growth and Local Distrust
This chapter will discuss the global growth of both B2B and B2C e-commerce including the role of evolving role of standards in the B2B arena including RosettaNet and other Internet-based protocols overtaking EDI. The chapter will also show the progression of the quantification of trust for B2C companies from the most fundamental approaches of 64 bit encryption in browsers to the frameworks now used for the definition...
Personal issues re. Cloud computing and data security This essay is an attempt on sorting out my conflictual feelings on cloud computing and data security. These include emotional investment on the subject, intellectual curiosity, advocacy, and bias. The following also explains my attraction towards the research. Cloud computing is the use of computing resources (both hardware and software) that are delivered as a service over the Internet. I certainly have a mix
Love is a personal issue that attracts public debate with each person giving it their own approach as understood or experienced in the past. The two stories herein look into people in search of love and another set, a group of people trying to understand the love they have experienced in the past. There are depiction of people trying to get into terms with what love is and trying to
Personal Selling in Hospitality Personal selling in the tourism and hospitality industry is an essential part of destination and hotel sales, driving base demand, creating awareness, and is becoming more competitive than ever before as organizations' continue to learn the benefits of this marketing component. This paper will analyze some of the traits that could be associated with the ideal salesperson in this industry by reviewing the literature as well as
Recognizing the Significance Effective Interpersonal Communication I have also learned that many types of interpersonal conflict in the workplace begin as little more than ineffective communications and misinterpretations by one or more individuals. The email communications medium has demonstrated itself to be particularly vulnerable to unintended tones or to unintended interpretations or assumptions. For that reason, I may sometimes review email exchanges. In our organization, the privacy policy is that supervisors
Career Effectiveness For many in the workforce, the transition to parenthood marks the beginning of their work-family concerns. Policy makers and parents themselves often believe that the solution is a switch from full-time to part-time work (Stacy, 2000). Further, research shows that throughout early parenthood, women exhibit significant movement into and out of the labor force (Hynes and Clarkberg, 2005). Hence, the learner anticipates big adjustments in her career as she
For example, a person who is originally from a conservative religious community may be more comfortable living an openly gay lifestyle elsewhere but not when returning to his or her community of origin. If the differential degree of personal disclosure allows the person to enjoy the fullest and most satisfying relationships in both scenarios, that differential degree of disclosure serves and helps achieve a beneficial purpose for the individual. Meanwhile,
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now