Strategic Management

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

3.

1 Environment Analysis

Every business considers varying factors and the changing environment in their data
analysis. In order to adequately prepare the changing variables, they should establish a set of
values that defines with the quantities of another step. This means that, the business should
mapped out the following details to respond to each potential external and internal environment
disruption. Writing an optimized environmental analysis is an effective way to adapt to change.

To assess the levels of risk and to identify the environmental factors which are the internal
and external factor, the following framework are commonly used for measuring environmental
risk;

Political - The political and legal environment in the region or country is determined through
government, public opinion, and consumer advocacy groups. The government needs to put in
place a control measure to oversee internet development. But as the internet fosters global
collaboration, government agencies across countries need to work together to ensure the safety of
e-commerce transactions.

Economic - Economic factors are of great significance to business activities. Whether it is an


online or physical business, economic factors can have a significant effect on it. This is because
economic factors are directly related to the business and their effect also directly on the revenue
and profit of the business. Higher economic activity means faster growth and higher revenue for
the e-commerce industry while lower economic activity means the opposite. In this way,
economic factors can have a direct and profound impact in the e-commerce industry (Uzoka,
Shemi & Seleka, 2007; Scott et al., 2001; Zhu & Thatcher, 2010)

Social Socio-cultural factors have profound effects on e-commerce. Among internet users, the
biggest concern comes with privacy (Hwang, 2010). Privacy is described as an individual ethical
right, benefiting from intrusion into their personal affairs. Internet users have an online identity
through which they conduct financial and personal transactions (Liang et al., 2011). Consumers
are very concerned with protecting this online identity (Lu, Fan, & Zhou, 2016).

The increasing use of mobile technology has affected e-commerce. In most societies, mobile
technology is already very common, and a larger number worldwide are now using mobile
gadgets for shopping and other purposes. Socio-cultural factors also affect the business in other
ways (Nandonde, 2019).

Technology - The industry depends so much on technology. Everything is based on technology


in electronics retail from sales to customer service. All e-commerce brands are in a race to stay
ahead of their competitors in terms of technology. In this way, technology is a major influence on
businesses and in this case e-commerce technology factors have a very special importance
(Bendoly & Kaefer,2004).

Environmental - While the industry's direct environmental impact is very low and almost zero, it
still focuses heavily on sustainability. Brands like Amazon have invested heavily in the
technology. Even in eCommerce, there are several areas where investing in sustainability can pay
off. From sustainable packaging to minimizing waste and renewable energy, there are several
areas where electronics retailers can invest sustainability (Nandonde, 2019; Rahayu and Day,
2015).

Legal - Compliance is also important for businesses globally (Zhu, 2009). Any dispute with the
law can be a costly affair and even e-retail brands can be targeted if they are not interested in
compliance (Nandonde, 2019). That is why major electronics retail brands have separate teams to
handle legal matters. Failure to comply can lead to financial loss as well as loss of image and
reputation. From labor laws to sustainability laws, there are several areas where e-retail brands
must be careful in compliance (Shih and Kraemer, 2005).

3.2 Mission

To create and develop an environment that promotes personal data protection and individual
rights while also ensuring that personal data privacy laws and regulations are followed.

3.3 Vision

Our vision is that organizational data will be securely accessible, understood, and trusted, and
that it will be used in a consistent, responsible, and meaningful way to improve compatibility,
ensure reliability, and influence decision-making in our community.

3.4 Objectives
● Preserving all forms of data, whether personal, sensitive, or confidential.
● Ensuring that personal data is not processed without their knowledge, and, wherever
possible, that it is processed with their consent.
● Establishing consistent criteria for appropriate access and security of data across the
institution and supporting enforcement of relevant rules and policies.

3.7 Sample Formulation

1. We see this strategy as an advantage towards the development of data privacy that could
help the B2B e-commerce to foster strong relationship through trust and loyalty when
engaging with e-commerce. The people behind this strategy are being motivated to
transform e-commerce into a trusted source of income.

2. Nowadays, many people are making money through accessing online business. However,
there were some circumstances that triggers the relationship between the users and e-
commerce itself. Due to the problem with counting on a username and password type of
login is that you just can’t always keep your password safe. By that, the password may
well be stolen through a scam, like phishing or from a business you've got an account
with, if they need an information breach.

3. Adding two-factor authentication or unique identifier to your login process may be a


simple way of adding an additional layer of security to your accounts.

4. By logging in your account aside from putting password. The unique identifier will serve
to verify if the user is not an imposer. By saying a unique word that can only recognize
the voice of the user.
5. The system will then scan the voice and the word used to open the account. Its like you
put your password by using your voice to identify the user.
3.8 Sample Implementation

Here are some of the processes to execute the unique identifier strategy to protect against privacy
threats and issues:

1. To start with the process, the user must first enable the unique identifier for voice
recognition;
2. Second, record a word that could serve as the password.
3. Think of a unique code that code only the user knows.
4. Say the word three times (3x) until the voice is being recognized or recorded by the
system.

After the system saved your voice, you have to login again to your account with your unique
identifier.

The login process:

Login Voice
Input email
Password recognition

In this process, the user must first input the email of his/her account. Second, login the password.
Third, is to say a word that was recorded by the system based on what’s been given by the user.
For example, “short” or “smile before you open”. The longer the password, the better and higher
the security.
3.9 Evaluation and Control

Some buyers and sellers are more interested in building strong relationships with one another
than others. Existing data warrants research into the influence that large buyers have on the e-
commerce adoption of smaller sellers. Marketing to businesses is very different from marketing
to individual consumers. That’s why an entirely different marketing method — B2B marketing
— exists, and that’s why we built this guide. The purpose of B2B marketing is to make other
businesses familiar with your brand name, the value of your product or service, and convert them
into customers.

In B2B, one business sells a set of products or services to another business. Typically, there is a
group or department that uses the vendor's products and services. Occasionally, a single user on
the buyer side makes a transaction in support of the company's business goals. And some B2B
transactions involve the entire company's use of the products, such as office furniture, computers
and productivity software.

3.10 Comparison Between

Comparison between Lazada data privacy policy and unique identifier policy

Lazada data policy and our unique identifier policy are both committed to protect all customers’
personal data and privacy. The purpose of this Data Protection Policy is to set out some clear
guidelines on certain do’s and don’t regarding customers’ personal data. Lazada data policy at
Lazada, they take your privacy seriously, and we are committed to complying with all data
protection/privacy laws as are applicable to us.

- The Lazada Privacy Policy exists to keep you in the know about how we collect, use, store,
disclose and/or process the data we collect and receive when providing our services to you, our
customer. We will only collect, use, store, disclose and/or process your personal data in
accordance with this Privacy Policy, and Republic Act 10173 or the Data Privacy Act of 2012
and its Implementing Rules and Regulations.
- Identifier policy use an easy username and password' combination to try and do so.
Adding two-factor authentication or 2FA to your login process may be a simple way of adding an
additional layer of security to your accounts. Adding another level of security with 2FA makes it
harder for an attacker to access your online accounts just knowing your password isn’t enough.
And, if you’re running a business, 2FA may also facilitate you keep your business systems and
data safe. It is a wide issue, but it generally refers to a random string of letters and/or numbers
that will be accustomed authenticate a transaction. Let’s assume you create a web purchase and
pay using your phone.

3.11 Recommendations for…

3.12 Challenges of

The idea that some complex dynamical systems exhibit unpredictable behaviors such that small
variances in the initial conditions could have profound and widely divergent effects on the
system’s outcomes. Because of the sensitivity of these systems, outcomes are unpredictable.”
This is the problem with strategic management: Just because a company has a plan, it doesn’t
mean that outside variables can’t dramatically challenge its ability to succeed.

You might also like