Figure 7.4 The Six Forces Model for the NE Era 1 Unsustainable Competitive Advantage through NE Systems • NE technologies, such as Enterprise Resource Planning (ERP) systems per se may not confer competitive advantage, as commercially available systems are available to anyone. • Furthermore, even ‘homegrown’ software systems are often easily imitated. • Nevertheless, some firms are better at exploiting these systems than others. 2 Sustainable Competitive Advantage through NE Systems • According to Ross, Beath and Goodhue (1996) sustainable competitive advantage comes from the following three areas: Figure 7.10 Resources Leading to Sustainable Competitive Advantages 3 Alpha, Beta, and Omega Effects in Measuring NE Strategic Success • The GSU NE study depicts 3 anticipated levels of benefits [Straub and Klein (2001)]: – – – • Alpha – 1st order changes that fairly immediately lower costs and improve productivity. Beta – 2nd order changes occur when the full effect of intermediation comes into play. Omega – 3rd order changes occur when the firm views NE strategy as a learning process to exploit information advantages over competitors. Firms that create a profile of a customer that indicates the type of products they prefer (e.g., Amazon), can profit from such information advantages. 4 Proprietary Data as a Resource that Captures a Relationship • Resources that are publicly available or readily copied may not be able to provide a sustainable advantage. • But those (such as a customer database) over which a firm has proprietary control may provide competitive advantage since these often create large barriers to potential new entrants. • Creating and sustaining competitive advantage over time can thus be possible for firms that gather and creatively use their proprietary customer data. 5 Figure 7.13 Proprietary Data as Resources that Capture Relationships 6 3 Steps Needed to Dominate the Relationship with Customers • • • First, there must be a commitment to collecting data about customers despite the costs. Second, the firm’s NE systems must be able to be personalized to be able to respond to this customer information. Third, customers must be able to be “pushed” information that successfully targets their personal needs. 7 Model Type Description 1 Content Provider Provides content (e.g., information, digital products & services via intermediaries) 2 Direct-toConsumer Provides goods or services directly to customer often surpassing traditional channel players 3 Full Service Provider Offers a full range of services in one domain (e.g., financial, health care) directly or via complementors who are attempting to own the primary customer relationship 4 Intermediary Brings together buyers and sellers by concentrating information (e.g., search engines, auctions) 8 Table 8.2a Types of NE Business Models (cf. Weill & Vitale 2001) Model Type Description 5 Shared Infrastructure Brings together multiple competitors to cooperate by sharing common IT infrastructure 6 Value Net Integrator Coordinates value net activities by gathering, synthesizing and distributing information 7 Virtual Community Facilitates and creates loyalty of an online community of people with a common interest of enabling interaction and service provision 8 Single Point of Contact Offers a firm-wide single point of contact consolidating all services provided by a large, multi-business organization 9 Table 8.2b Types of NE Business Models (cf. Weill & Vitale 2001) Three Key NE Resources 1. The relationship with the customer. This is usually the most important long-term resource, as it converts to loyalty and sustained revenues. Alternatively, this might be a revenue-producing relationship with a complementor. 2. Proprietary data is one of the most valuable resources a firm can own as it can lead to a sustainable competitive advantage. 3. The transaction may be the least important of the three. Another way to see this is as a customer perception of your company as the point of contact. NE also allows firms to establish links directly with their customers base and by-pass intermediaries. 10 Relationship Data Transaction X X X X X X X X 1. Content Provider 2. Direct-toConsumer 3. Full Service Provider 4. Intermediary 5. Shared Infrastructure 6. Value Net Integrator 7. Virtual Community 8. Single Point of Contact X X X X X X X X Table 8.3 Ownership of Resources by NE Business Models (cf. Weill and Vitale 2001) 11 Figure 8.2 Graphical Symbols for Interpreting Business Model Schematics Schematics allow managers to configure their business models in ways that maximize their effectiveness, as well as helping others understand a model and, in so doing, helping to convince others of its investment potential. 12 Figure 8.3 Type I: Content Provider Schematic 13 Figure 8.4 Type 2: Direct-to-Customer Schematic 14 Figure 8.5 Type 3: Full Service Provider Schematic 15 Figure 8.6 Type 4: Intermediary Schematic 16 Figure 8.7 Type 5: Shared Infrastructure Schematic for Suppliers-Members 17 Figure 8.8 Type 5: Shared Infrastructure Schematic for Customers-Members 18 Figure 8.9 Type 6: Value Net Integrator Schematic 19 Figure 8.10 Type 7: Virtual Community Schematic 20 Figure 8.12 Type 8: Single Point of Contact Schematic 21 Figure 8.13 Lonely Planet as a Hybrid (Molecular) Business Model Composed of Many Atomic Models 22 Chapter 9. Intermediation and Cybermediation Foundations of Net-Enhanced Organizations Detmar Straub, 1st Edition Copyright © 2003 John Wiley & Sons, Inc. 23 9.2 What is Intermediation? • Intermediation: a business process that lies between and facilitates (adds value to) the points in a value chain (see Figure 9.1) Intermediaries often provide an informationbased service rather than a product. • – • Their typical role is to bring multiple buyers and sellers together. Common examples are: stock brokers and travel agents. Figure 9.1 Intermediaries 24 in the Value Chain Intermediaries in a Value Chain • The role of an intermediary is to: 1. Use information to match buyers and sellers, 2. Facilitate the rapid transfer goods and services through their operation. • Two major categories of intermediaries are: 1. Virtuals: who do not take ownership of products and services. 2. Aggregators: who may own, but do not produce or even assemble the goods and services themselves. • When an intermediary offers its services over the Web, it is called a cybermediary. 25 9.4 Dis-intermediation, Re-intermediation and Cyber-mediation (Figures 9.2 and 9.3) • Disintermediation: adding a parallel link going around intermediators [Delta Airlines, encouraged customers to call direct to the airline, saving a 5-15% commission and disintermediating its travel agents]. • Re-intermediation: electronic re-insertion into the role of intermediator in a firm’s value chain [Delta.com allowed customers to go directly to its Web site to buy electronic tickets, taking over the job of brokers via a direct connection. – This is a direct-to-consumer business model, or possibly a shared infrastructure model, as in the case of Orbitz • A firm that offers intermediary services over the Web, is a cybermediary. This can disintermediate agents. 26 Figure 9.2 Disintermediation via Traditional Channels Figure 9.3 Reintermediation of Delta into the Value Chain 27 9.5 Theory of Intermediation • Since purchases and transactions that are least costly are preferable to customers, especially for commodity goods and services, • All other things being equal, the value chain with the fewest intermediaries will have the lowest price. • However, there are additional costs: – Intermediaries have their own cost structure. – Consumers incur costs when searching for goods/services to purchase. • Thus a consumers must weigh a cost tradeoff between searching for the cheapest commodity price and paying extra to use an intermediary. 28 Figure 9.5 Intermediation Pre- and Post- Internet 29 Intermediation Pre- and Post-Internet • A decade ago, for example, intermediation in air travel, involved both airlines and consumers paying commissions to travel agents. • When the issue of disintermediation was first discussed, many predicted the complete demise of intermediators. • Sarker, Butler & Steinfield (1995) argued instead that cyberspace would change intermediation, but never make it irrelevant. • They differentiated between categories of threatened intermediaries, like travel agents, who could lose their business, with cybermediaries, (e.g., Travelocity), who had very low marginal costs and would thrive. • Supplemented intermediaries, firms that decide to reintermediate into the value chain, were also predicted to succeed. 30 Search efficiencies and information management Use knowledge of how to procure items & services; create trading floor for buyers and sellers Expedia.com eBay.com Routinizing and guaranteeing transactions Handle complex transactions; insure payments and shipments Ibm.com Amex.com Logistics Delivery of goods, locally or globally Ups.com Aggregating demand/ negotiating prices Gather orders & negotiate prices with client(s) Priceline.com ETNs like Covisint Creating packages Break bulk through largevolume purchases, and reassemble into packages Dell.com Table 9.2 Value-Added Roles of Intermediaries and Cybermediaries (based on Westland and Clark, 2000) 31 9.7.1 Portals and Content Aggregators • Companies like Yahoo and Amazon are described as cyberspace “portals” and “content aggregators” – Their true business models are complex hybrids and include being intermediaries and making direct-toconsumer sales. • Again the main idea is replacing physical processes with information processes. • If Yahoo was a retailer like Wal-Mart, its distribution system, etc., would have to be huge. – Instead it handles these processes through its Web-based and information-based systems. Its market niche in the economy is based on this. 32