1) Overview:-
a) A few of JCPenney's major competitors are Kohls, Sears, Wal-Mart, Target, Marshall Fields, Carson Pirie Scott, etc. They all follow the Reactive and Partial cyber-marketing business model, which means that they are present physically and they also have an online presence. Partial cyber marketing is a reactive response of existing companies who have done business through the physical distribution channels.' (text, pg 44) Even though these stores have an electronic presence, their main business is generated through physical stores.
The market segment at which the products/services are aimed …show more content…
The Upstream activity Wherein different suppliers and manufacturers bring their goods and commodities and pass on to the main supplier for JCPenney. Also, boxes from the paperboard company and labels from the label company are sent.
II. The Internal activity Where the goods and items are first inspected, then either approved or rejected and then sent for assembly and packaging.
III. The Downstream activity- Where the approved and packaged items are sent to the distributors and who in turn send the items as needed to the physical stores plus the online outlets and through it, go to the final customer.
c) Buyers play an upper hand in the overall buying; because if no buyers, then no shops and no sales for big or small vendors and suppliers. In an electronic market, buyers play a major role because of the choices and competitions available over the net. With the internet, customers have the privilege of visiting all the major competitors by just a click of the button. It is not needed for them to go store to store searching for choices and deals. Buyers also have another added advantage online auction sites, (like e-bay for instance, for the case in question JCPenney). Buyers can not only get choices, but can also bid for the same and get a particular item at a price that is comfortable to their wallet. Therefore, companies are to an extent dependent on the buyer in an electronic …show more content…
People pose as sellers of a particular product, lure the customer into buying it, and then ask for their credit card number and other personal information like their home phone number, their social security number, address and so on. Later on, they use this information to their benefit by purchasing items for their own use. The person whose identity has been just stolen is then held responsible for the payment. This way, the thieves get what they want and escape from paying even a penny. This has become a big threat to all businesses operating over the net. Companies need to keep checking and updating their online theft-blocking, spam blocking software and assure customers about the same time and time again in order for people to visit their website and make