wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

BUSINESS MODELS OF E COMMERCE

profile
Khushboo Jaiswar
Aug 30, 2022
0 Likes
0 Discussions
87 Reads

E-commerce business models can generally be categorized into the following categories.

 

Business - to - Business (B2B)

Business - to - Consumer (B2C)

Consumer - to - Consumer (C2C)

Consumer - to - Business (C2B)

Business - to - Government (B2G)

Government - to - Business (G2B)

Government - to - Citizen (G2C)

 

  • Business - to – Business

A website following the B2B business model sells its products to an intermediate buyer who then sells the product to the final customer. As an example, a wholesaler places an order from a company's website and after receiving the consignment, sells the end product to the final customer who comes to buy the product at one of its retail outlets.

  • Business - to - Consumer

A website following the B2C business model sells its products directly to a customer. A customer can view the products shown on the website. The customer can choose a product and order the same. The website will then send a notification to the business organization via email and the organization will dispatch the product/goods to the customer.

  • Consumer - to - Consumer

A website following the C2C business model helps consumers to sell their assets like residential property, cars, motorcycles, etc., or rent a room by publishing their information on the website. Website may or may not charge the consumer for its services. Another consumer may opt to buy the product of the first customer by viewing the post/advertisement on the website.

  • Consumer - to - Business

In this model, a consumer approaches a website showing multiple business organizations for a particular service. The consumer places an estimate of amount he/she wants to spend for a particular service. For example, the comparison of interest rates of personal loan/car loan provided by various banks via websites. A business organization who fulfills the consumer's requirement within the specified budget, approaches the customer and provides its services.

  • Business - to - Government

B2G model is a variant of B2B model. Such websites are used by governments to trade and exchange information with various business organizations. Such websites are accredited by the government and provide a medium to businesses to submit application forms to the government.

 


Comments ()


Sign in

Read Next

Multiprocessor and scheduling

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Data carving - using hex editor

Blog banner

Security in Cloud Computing

Blog banner

Royal enfield

Blog banner

Data Mapping

Blog banner

Multiple processor scheduling

Blog banner

A little bit of salt is all the hash needs!

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Deadlock and Starvation

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Esri India launches Policy Maps.

Blog banner

SNAPCHAT

Blog banner

BENIFITS OF YOGA

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Proton mail

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

Os Virtual Memory

Blog banner

File Management

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

OS Assignment 3 Deadlock

Blog banner

NIKE

Blog banner

Evolution of OS

Blog banner

Traveling

Blog banner

Memory Management

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Virtualisation

Blog banner

Privacy LAWs in IT

Blog banner

Kafka - A Framework

Blog banner

PPT methodology

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

BIRYANI ! The history you never knew about

Blog banner