e-commerce module-2. traditional marketing market research customer opinion and preferences...
TRANSCRIPT
E-COMMERCEMODULE-2
Traditional marketingMarket researchCustomer opinion and preferencesPublicity from pressAdvertising in the form of classifieds and
displaySales including distribution and
merchandisingCustomer service and support
Traditional marketingExpensiveTime consumingHIT & MISS quality
E-MarketingPower of online networks, computer
communications and digital interactive media to reach company’s marketing objective
Save moneyHelp stretch marketing budgetSave time and cut step from marketing
processInformation reach and interactive24*7 operation
E-advertisingWeb based advertisingPrefer to surf then watching TVDevelopment of search engineGlobal reach
Various meansE-mailBannersSkyscrapersBanner swappingMini sites, pop-ups and interstitials
E-Branding criteriaPowerful statement of quality
Element Meaning to customer
Differentiation How Product is unlike to others?
Relevance How product fits into my life?
Perceived value Is this product good?
Marketing strategies
Permission marketing strategiesBrand-Leveraging marketing strategiesAffiliate marketing strategiesViral marketing strategies
E-commerce security issues
internet is unregulated, unmanaged and uncontrolled
internet means that your internal IT and e-commerce systems are potentially accessible by anyoneISSUES COMMENT
Connection to the internet
PC network at risk
Unknown risk New methods of attacking
Customer privacy Should be protected
Goals of securityIntegrity-data sent and receivedConfidability-not accessible to othersAvailability-available to the people to whom it
is meant
Threats from hackers and the risks to businessdenial-of-service (DoS) attacksaccess to sensitive dataaltering your websitegaining access to financial information Viruses, Trojan horses, worms and botnetsImpact of a security incident on the
business direct financial loss as a consequence
of fraud or litigation unwelcome publicity criminal charges customer confidence is affected
Common e-commerce security controls
User authenticationA user name and password combinationauthentication tokendigital certificate A person's unique physical attributeAccess controlnetwork restrictionsindividuals are limitedrestrictions on what can be copied from the
systemlimits on the sending and receiving
Data encryptionFirewallAnti-virus softwareVirus alert services
EncryptionThe process of scrambling a message to ensure
data secrecyThe message is encoded and decoded by
electronic keyprivate key Public key
: Message before encryptionTo: [email protected]: [email protected]: Money––––––––––––––––––––––––––––––xyz. The account code is 451-3329 and the
password is `meekatharra'I'll see you (and the money) at the airport this
Friday. abc
: Message before encryptionTo: [email protected]: [email protected]: Money––––––––––––––––––––––––––––––xyz..
hEwDfOTG8eEvuiEBAf9rxBdHpgdq1g0gaIP7zm1OcHvWHtx+9++ip27q6vI
tjYbIUKDnGjV0sm2INWpcohrarI9S2xU6UcSPyFfumGs9pgAAAQ0euRGjZY RgIPE5DUHG
abc
What is a Firewall?A choke point of control and monitoring Interconnects networks with differing trustImposes restrictions on network services
only authorized traffic is allowed Auditing and controlling access
can implement alarms for abnormal behavior
Components of the firewallNetwork policyPermit any service unless it is expressly deniedDeny any service unless it is expressly permittedPacket filteringAdvance authenticationSmartcard, Authentication token, BiometricsApplication gateways
Filtering with incoming or outgoing interfacesPermits or denies certain services
Packet filtering
Firewalls - Application Level Gateway (or Proxy)
Application-Level FilteringHas full access to protocol
user requests service from proxy proxy validates request as legal then actions request and returns result to user
Need separate proxies for each service E.g., SMTP (E-Mail)NNTP (Net news)NTP (Network Time Protocol)custom services generally not supported
Electronic moneyElectronic funds transfer.introduced in the late 1960s.transactions must pass through the banking system. Digital cash.first issued in 1976 by the forerunner of Telecom
Italia.you can lose it or it can be stolen. Ecash. Digicash of Amsterdam has developed an ecash. digital bank account and ecash client software.Credit card.
E-Payment systemElectronic transaction of moneyServe customer at faster rate and at lower
costOnline payment categoryMicropayment - Transaction value < $5Consumer payment- $5< Tra. value < $500Business payment- Transaction value > $500Risk and E-payment system
Digital payment requirementAcceptabilityAnonymityConvertibilityEfficiencyIntegrationScalabilitySecurityReliability
Features of E-banking in IndiaCan access account at any timeCharge and credit card statementCan pay bills onlineCan download account transactionCan send E-mail to the bankCan phone banking
E-CRMThe aligning of business strategy with a
corporate structure of organization along with customer information and a supporting information technology of customer interactions so that promote a mutually beneficial relationship between customer and enterprise.
E-CRM-toolkitContent, Should delivering a content
customer wants to see.Storefront serviceE-mail managementCustomer managementE-marketingAssisted selling
CRM capabilities supported by Business operationConsumer survey and focus groupDelivering informationTracking promotional materialManaging couponsInvoicingFulfilling orders
CRM capabilities supported by Business ManagementManaging customer touchesManaging marketing campaignsMonitoring marketing campaign performanceManaging inventory levelsDriving contact center scriptsCapturing key performance metrics
CRM capabilities supported by Business intelligenceClick stream analysisMarket basket analysisCustomer segmentationCross selling analysisLifetime customer value analysisCustomer profilingFactor analysis
Customer life cycleA cyclic process of interactions between each
customer
Acquisition
Evaluation
ServiceRetention
Attrition
Consumers
supply chainProcurement planningProduction planningDemand planningInbound logisticsDistribution of productsCustomer services
E-supply chain managementSUPPLIERS
CUSTOMERS
procurement
Production Distribution
Electronic procurement
Production optimization
Distribution, sales and service co-ordination
SCM solution
Component Advanced scheduling and manufacturing
planning programDemand forecasting programTransportation programDistribution planning programOrder commitment
architecturecommit schedule make Deliver
Order commitment
Demand forecasting
Advanced scheduling
DistributionTransportation
Integrated E-SCM application
E-SCM advantagesGlobal trading capabilityGlobal knowledge exchangeCollaborative work flowEnterprise to enterprise connectivityRapid deployment and scalabilityReal time processingReturn on investmentWeb basedIt supports real time dataAccessible at any time
Trends in E-SCMTrends Characteristics
Consumer trends Speed of serviceIntegrated solutions
Service trends Convergence of salesEase of use
Organizational trends Becoming brand intensive Constant innovationEmployee retention
Enterprise technology trends Connect and co-operateInfrastructure convergence multichannel integration