unit8 a1 student_template vdfghtgnsw

26
Why E- commerce?

Upload: jo-lowes

Post on 14-Jan-2015

290 views

Category:

Documents


7 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Unit8 a1 student_template vdfghtgnsw

Why E-commerce?

Page 2: Unit8 a1 student_template vdfghtgnsw

Benefits of E-commerce

Global Marketplace: by having a global presence a business can target a global audience.

P2

Page 3: Unit8 a1 student_template vdfghtgnsw

Benefits of E-commerce

24/7 Trading: Trading can be carried out at any time, day or night, in all different time zones around the world.

P2

Page 4: Unit8 a1 student_template vdfghtgnsw

Benefits of E-commerce

Low Start -up & Running Costs: This is a great incentive to company owners.

P2

Page 5: Unit8 a1 student_template vdfghtgnsw

Benefits of E-commerceSearch Facilities:There are often different criteria you can easily add to find exact product you looking for.

P2

Page 6: Unit8 a1 student_template vdfghtgnsw

Benefits of E-commerce

Fluid Pricing:

P2

Alternatively when selling products like holidays as the time draws closer, the prices could go down to ensure all the places are sold.

Page 7: Unit8 a1 student_template vdfghtgnsw

Weaknesses of E-commerce & how to address this

Consumer Trust: consumers can have concerns about several different issues when you use e-commerce sites, people can be worried weather the shop or the item they have brought are real or that it is a scam and someone has got there personal information and security worries.

P2

Page 8: Unit8 a1 student_template vdfghtgnsw

Weaknesses of E-commerce& how to address this

Lack of Human Contact: Some customers are deterred from purchasing online because they cannot speak to anyone from the business directly. Some find this impersonal and prefer to have face to face contact.

P2

Page 9: Unit8 a1 student_template vdfghtgnsw

Weaknesses of E-commerce& how to address this

Product Description Problems: Some consumers might have concerns that what is described on the e-commerce site might not accurately reflect the real product. The quality of the image used is also another factor.

P2

Page 10: Unit8 a1 student_template vdfghtgnsw

Weaknesses of E-commerce& how to address this

Security issues: perhaps the main worry for consumers is that their financial details will not be safe, that the business will use them in some unauthorised way or security of this information may not be sufficient.

P2

Page 11: Unit8 a1 student_template vdfghtgnsw

The Technology

Browsers: This allows you to view web pages like Facebook, Hotmail, Twitter act….One way this is done is via the browser address bar.

P1

Page 12: Unit8 a1 student_template vdfghtgnsw

The Technology

Database systems: This site normally has a database attached to them that hold the catalogue of products and costumers records.

P1

Page 13: Unit8 a1 student_template vdfghtgnsw

The Technology

Domain Names: Its important that a website has a memorable domain name.

P1

Page 14: Unit8 a1 student_template vdfghtgnsw

The Technology

Ports & Protocols: Each computer has a number to make the data reaches the right location on the network.

Browser & Platform Compatibility

P1

Page 15: Unit8 a1 student_template vdfghtgnsw

Promotion

Paying to be prominent in search engine results

M1

When a consumer searches in their search terms, a list of the most relevant sites comes up. It isn't relevant- often search engines look for your search term within the web pages they've collected and indexed. The results reflect the search engine's determination of how relevant the site's content is to your inquiry.

Page 16: Unit8 a1 student_template vdfghtgnsw

Promotion

Newsgroups & Forums: They are tend to be very focused by the discussion made. They are more structured and you often need special software to use them.

M1

Page 17: Unit8 a1 student_template vdfghtgnsw

Promotion

Banners & Pop-ups: This is basically when you are e.g. on facebook and you get a pop-up a advertisement comes up and for instants if u click on it could be a scam or a virus so if you get a pop-up just click of the advertisement.

M1

Page 18: Unit8 a1 student_template vdfghtgnsw

Promotion

Spam: This is annoying because if you get an email no matter what it is it gets to everyone who has a email. The bad side of this is if yuo click on the spam email it could give u a virus or put you on an inappropriate site.

M1

Page 19: Unit8 a1 student_template vdfghtgnsw

Promotion

Ensuring An Effective User Interface: An effective interface for a website to make sure when a website goes on your site e.g. if you create a website there are quite a lot of factors to avoid – Broken links, difficult navigation, unclear fonts and too much text. The good side of this is that they will be able to purchase products and services with ease.

M1

Page 20: Unit8 a1 student_template vdfghtgnsw

Promotion

Establishing Customer loyalty in a virtual environment: There is a lot of different methods which is help to create customers loyalty, this includes direct mailing to customers is often useful. This is helped to keep your business at the front of their minds.

M1

Page 21: Unit8 a1 student_template vdfghtgnsw

Promotion

Site Names: This is basically a name of a website it is really important because if you forget the name you would be less likely to go on that website. If the name is really hard to remember then it would be a lot easier to choose a name more re-memorable.

M1

Page 22: Unit8 a1 student_template vdfghtgnsw

Promotion

Direct Marketing: Direct Marketing is targeted at special audience, for e.g. if you are signed up to newspaper the offers or updates. This basically means if the customers have chosen to be a pat of this they have a genuine interests in the products/services so they are more likely to purchase from the site.

M1

Page 23: Unit8 a1 student_template vdfghtgnsw

Security

Hacking Prevention

P3, M2

Hacking means finding out weaknesses in the computer and exploits it. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.

Page 24: Unit8 a1 student_template vdfghtgnsw

Security

Viruses and Virus Prevention:

P3, M2

A virus is speed around easily by disk to disk and by computer to computer. A Trojan Horse must be sent by someone/carried by another program and also may arrive in the form of a joke program or software of some sort.

Page 25: Unit8 a1 student_template vdfghtgnsw

Security

ID Theft and Identity theft is a form of fraud or another word is cheating of another person's identity this is were

someone is protecting to be that person which they have took there personal information.

There are millions of people are concerned about identity theft and this can make them worried about giving their details to companies that they are not familiar with.

Personal information can be formed as many different forms, for example by leaving accounts logged on whilst leaving a computer unattended, not password protecting sensitive information and from hackers and phishing scams.

ID Theft Protection

P3, M2

Page 26: Unit8 a1 student_template vdfghtgnsw

Security

Strong Passwords: By having a strong password can mean that a hacker may not be able to guess your password because your password is to strong.

P3