更新时间:12-19 上传会员:一抹彩虹
分类:英语论文 论文字数:8013 需要金币:2000个
中文摘要:通过文献阅读和案例分析,笔者分析了淘宝和易贝的商业模式,对比了两个网站的盈利模式,沟通工具,支付方式,物流模式和信用评价体系。结果发现两个网站存在以下问题:淘宝存在物流服务质量差和虚假交易泛滥的问题;易贝存在用户粘性差,收费高且繁杂的问题。并且,它们还存在着假货和交易安全的问题。针对淘宝,笔者提出加强与物流公司的合作与沟通,加大力度打击“刷单”行为的对策;针对易贝,则提出改善搜索引擎,优化个性化服务,和整合收费项目,合理调整收费标准的对策。对于共同的问题,笔者建议两个网站应建立严格的商品上架机制,与工商部门联合打击假货,提高网络信息安全技术。
关键字:淘宝; eBay ;商业模式比较;问题和对策
Contents
Acknowledgments
Abstract
中文摘要
1. Introduction.1
1.1 Research Background.1
1.2 Research Purpose.1
2. Literature Review.1
2.1 Domestic Literature Review.1
2.2 Foreign Literature Review.2
3. The History and State Quo of Taobao and eBay3
3.1 The History and State Quo of Taobao3
3.2 The History and State Quo of eBay.3
4. The Comparison of Taobao and eBay’s E-commerce Models4
4.1 The Profit Model of Taobao and eBay4
4.2 The Communication Platform of Taobao and eBay5
4.3 The Payment Platform of Taobao and eBay6
4.4 The Logistics Model of Taobao and eBay.7
4.5 The Credit Evaluation System of Taobao and eBay8
5. Problems Existing in Taobao and eBay9
5.1 Problems Existing in Taobao9
5.1.1 Poor Logistics Service.9
5.1.2 The Overflowing of Bogus Transactions.9
5.2 Problems Existing in eBay.10
5.2.1 Poor User Viscosity10
5.2.2 High and Complex Fees 10
5.3 Same Problems Existing in Taobao and eBay11
5.3.1 The Problem of Counterfeit goods11
5.3.2 The Transaction Security Issues11
6. Countermeasures and Suggestions on the Problems Existing in Taobao and eBay.11
6.1 Countermeasures and Suggestion on the Problems Existing in Taobao .12
6.1.1Strengthen Cooperation and Communication with Logistics Companies.12
6.1.2 Strengthen Efforts to Combat “Click Farm”12
6.2 Countermeasures and Suggestion on the Problem Existing in eBay13
6.2.1 Optimize Search Engine and Personalized Services13
6.2.2 Simplify Charges and Reduce Charging Standards.13
6.3 Countermeasures and Suggestions on the Same Problems.13
6.3.1 Establish a Strict Mechanism for the Shelf-up of Products and Work Together with the Administration of Industry and Commerce to Combat Counterfeit Goods.13
6.3.2 Improve the Network Information Security Technology14
7. Conclusion14
References16