An e-commerce business is much like any other commodity which is generally purchased to generate a return on investment (ROI). A wholesaler, for example, might sell chocolate bars to a retailer but only if a ROI is present or likely. This is the same with the retailer who also desires a ROI. Ultimately, however, the worth of the chocolate comes not from the wholesaler or the retailer but from the price that a buyer is willing to pay for it.
When selling your e-commerce business, you are like the wholesaler selling to the retailer. Whatever the retailer will do with your business after he purchases it matters less than that you are able to sell the business to him. And just as much as you are looking to make a ROI, so too is the buyer.
Profit vs. Assets and Revenue
Your e-commerce business is only worth what someone is willing to pay you for it. This necessitates distinguishing between profit, assets, revenue and loss, four variables that are often confused during the valuation of an e-commerce business:
- Revenue is the amount of money brought in by a business over a given period of time.
- Losses include whatever amount of money is spent to keep the business running.
- Assets in an e-commerce business include things such as the domain, design, traffic and list. Though they can help to generate profit, they are essentially losses.
- Profit exists when revenue exceeds losses.
For example, a seller with an e-commerce business that spent $15,000 making a website, $10,000 for its domain and a traffic valuation of $50,000 values the worth of his business at an extra $75,000 based on these assets. But because these assets may not be quantifiable as profit, the buyer may not include them in his valuation of the worth of your e-commerce business. The buyer desires a ROI and thus will not include non-profitable assets in his valuation of the business. Rather, they will likely act as losses for you as the seller.
From Profit to Worth
In calculating a probable ROI, the buyer is liable to include a risk-assessment in his valuation of your business. Such factors that decrease risk and thus increase the worth of your business include but are not limited to solid, consistent earnings for the business over a period of time, documented increased and increasing growth of the business, the use of automated systems, the generation of revenue through multiple streams, diverse traffic sources, a unique selling proposition and proven market leadership and branding.
Based on this risk assessment, a buyer will multiply the profit generated by the business by a multiple he deems fair. The average multiple used by buyers is 2.51. This means that a one-year-old business with a profit of $40,000 in a single year will be valued on average at $100,400. Assets that can increase the profit of a business may also be taken into consideration and added to the value, but this is not always the case. Simply because $25,000 might have been spent on the making of a website and its domain does not mean that a business valued at $100,400 will suddenly be worth $125,400.
As shown in the chart below, however, the multiple can be highly variable (0.5x to 6x). This means that an e-commerce business with a profit of $40,000 could be valued between $20,000 and $240,000.
So what is your website worth? Most simply it is worth whatever a buyer will pay for it. This means that there is no simple and static number that can be given. Based on its generation of profit, the risk it has for the buyer and the possible return on investment, each e-commerce business will be worth a different value than other e-commerce businesses. Lastly, what one buyer is willing to pay you for your e-commerce business may be very different than what another buyer is willing to pay.
6 Unexpected Security Concerns, and How to Prepare
As powerful as the Internet is right now, it’s impossible to even imagine where it will go over the next years and beyond. But, as fast as security protection continues to improve, hackers seem to improve even more quickly. Everything from new devices to apps…
Your Business Needs These 13 Digital Security Solutions – Here’s How To Get The Most Out Of Each
How would you characterize your organization’s digital security posture? If you’re not sure how to answer this question, or perhaps would prefer not to answer it at all, you’re not alone. Countless decision-makers, from uber-competent CTOs and CISOs to CEOs and COOs who couldn’t code…
Louisiana And Oklahoma Introduce Digital Identification To Prevent Fake ID Use
Digital ID in Louisiana Utilizing digital IDs has been a commonly broached topic for a while now. Although most states are only either deliberating their helpfulness or in the utmost initial stages, Louisiana has moved forward. The primary introduction of this technology was done back…
ScanGuard Review – Here is What You Should Know
Doesn’t it sound good and satisfying to have a goop-performing antivirus that is reliable enough? Yes, it is. For that reason, you need to be extra careful when you are in search of a good antivirus. Put all the necessary factors into consideration so that…
The Emerging Need for Social Media Security
By the time you’ve finished reading this sentence, nearly 700 passwords have been stolen from social media accounts across the world. Social media security breaches have the potential to cause up to $6 trillion in cybercrime damages by 2021, up from $3 billion in costs…
- 3D Printing
- App Dev
- Artificial Intelligence
- Arts and Entertainment
- Big Data
- Blockchain Tech
- Business Technology
- Car Technology
- Cloud Computing
- Cloud Storage
- Computer and Technology
- Conference Calling
- Coupons and Deals
- Cyber Security
- Dark Left 1
- Data Center
- Data Recovery
- Digital Arena
- Digital Marketing
- Edu Tech
- Email Marketing
- Google Glass
- Guides and Tutorials
- Health and Fitness
- Home Improvement
- Home Security
- Internet and Businesses Online
- Internet Marketing
- IT Careers
- Mobile Apps
- Mobile Security
- New Tech
- Online Shopping
- Project Management
- Reference and Education
- Reputation Management
- Sales & Marketing
- Shopping and Product reviews
- Small Business
- Social Media
- Tech Trends
- Technical Support
- Technology in Education
- Tips & Tricks
- Tips And Tricks
- Video Conferencing
- Virtual Reality
- Wearable Technology
- Web Design
- Web Development
- Web Hosting
Why Business Owners Should Also Invest In Real Estate
Business owners often count on their businesses almost exclusively to secure ongoing revenue and plan for the future. They might plan to sell the business eventually, using the money to fund their retirement, or might imagine working for the company indefinitely, with a consistent line…
Best Free-Play Slots You Need To Try While You Can!
Video slots are currently the most preferred form of entertainment found in digital casinos. The reasons are many – they are easy to play, highly rewarding, provide endless entertainment, and there are a lot of titles to choose from. Nevertheless, every experienced player will tell…
3 Ways to Prepare For Cyber Security Risks That Employees Must Know
In a world where everything is much easier to do via mobile, app, or device, technology is not going to slow down. We’re all guilty of potentially owning more than one device, whether that is our personal phones, work phones, tablets or fitness trackers. All…
Non-Negotiable Elements For Your Business IT Security Plan
In 2019, having a business IT security plan is more important than ever. An IT security plan is the first line of defense you have for protecting your business – and your clients – against cybercriminals. Cybercriminals include hackers, who frequently obtain personal information with…
Businesses Need To Be Proactive When It Comes To Cyber Security
For business of any size, making sure they are not only compliant with security regulations but continually improving and adjusting the measures they have in place is vital. Quite often the factor which determines how a business approaches cyber security is the mindset of the…
How To Become A Cyber Security Analyst
What is Cyber Security? Cyber security is the practice of protecting a system or network from digital attacks. These attacks are generally aimed to retrieve or destroy sensitive information and it is a serious threat to all the organizations. Who is A Cyber Security Analyst…