Free Essay

Marketing on the Web

In:

Submitted By kalunga
Words 3674
Pages 15
1- Briefly explain Electronic Cash

A system that allows a person to pay for goods or services by transmitting a number from one computer to another. Like the serial numbers on real dollar bills, the digital cash numbers are unique. Each one is issued by a bank and represents a specified sum of real money. One of the key features of digital cash is that, like real cash, it is anonymous and reusable. That is, when a digital cash amount is sent from a buyer to a vendor, there is no way to obtain information about the buyer. This is one of the key differences between digital cash and credit card systems. Another key difference is that a digital cash certificate can be reused.

2- Briefly explain ActiveX Control

ActiveX control is a control using Microsoft ActiveX technologies. An ActiveX control can be automatically downloaded and executed by a Web browser. ActiveX is not a programming language, but rather a set of rules for how applications should share information. Programmers can develop ActiveX controls in a variety of languages, including C, C++, Visual Basic, and Java. An ActiveX control is similar to a Java applet. Unlike Java applets, however, ActiveX controls have full access to the Windows operating system. This gives them much more power than Java applets, but with this power comes a certain risk that the applet may damage software or data on your machine. To control this risk, Microsoft developed a registration system so that browsers can identify and authenticate an ActiveX control before downloading it. Another difference between Java applets and ActiveX controls is that Java applets can be written to run on all platforms, whereas ActiveX controls are currently limited to Windows environments.

3- Briefly explain Firewalls
A firewall is a software or hardware device that protects your computer from internet dangers, such as (among many, many others) viruses, spyware, and hackers. Think of it like a thick stone castle wall - no one can get through it except at heavily guarded gates. Any data going from the internet to your computer must first pass through the firewall, where it is carefully scanned for threats. If the firewall detects any dangers, it blocks the data. Firewalls close off all of the unused ports, channeling all internet traffic through only a handful of open ports. Furthermore, the firewall filters all data moving through these ports, meaning that it examines all the data packets for the proper security authorization. Any data that fails to meet these security requirements is not allowed through the firewall onto your computer. Firewalls also make sure that any personal or sensitive information leaving your computer is protected. It does this by encrypting the information. The information can be decrypted when it arrives at its legitimate destination. Any hackers or spyware that intercept the information on the way, however, gets only scrambled data that it can't read or use.
4- Briefly explain Cookies A cookie is a small file that is stored on a client's computer. That means that whenever a user visits your web site, you can secretly stash a file with information on their hard drive. This file can contain almost any information you want - including user info, site statistics, or even your own name, for those with vanity problems. We can see how this could potentially be an easy target for hackers because of the possibilities it opens up. One security trick to prevent abuse is that cookies can only be accessed by the domain that created them. This means that, for example, ASP101.com can only access (read from and write to) cookies that ASP101.com created. Generally, this is not a problem at all, but what if you work on two different sites on different domains that share user info, that is stored in cookies? You could, of course, just duplicate user info, but what if you want the user to only have to register on one site, and be automatically registered on the other? Or if they share the same user database, and you want to auto-login users? Sharing cookies across domains is ideal for this situation.

5- Briefly explain Enterprise Application Integration and database
Enterprise Application Integration) Hooking up applications within an enterprise. EAI software acts as a hub that translates data and messages between different applications. The need for EAI arose as companies sought to exchange information between separate 'silos' of automation, such as ERP and CRM systems. EAI is regarded as more tightly coupled and inflexible than emerging alternatives based on web services. Enterprise Application Integration Refers to various techniques that are used to make information systems work together in the large enterprise. For example, when companies acquire other companies, disparate systems have to be integrated. Within a company, newly developed systems must work with legacy systems, and separate systems developed independently in the past must often be tied together to provide required information and services. When information systems are integrated, business intelligence can be gleaned across the entire enterprise.

6- Briefly explain Magnetic Strip Cards
A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe, sometimes called swipe card or magstripe, is read by physical contact and swiping past a magnetic reading head. A number of International Organization for Standardization standards, ISO/IEC 7810, ISO/IEC 7811, ISO/IEC 7812, ISO/IEC 7813, ISO 8583, and ISO/IEC 4909, define the physical properties of the card, including size, flexibility, location of the magstripe, magnetic characteristics, and data formats. They also provide the standards for financial cards, including the allocation of card number ranges to different card issuing institutions.

Briefly explain Smart Cards
A small electronic device about the size of a credit card that contains electronic memory, and possibly an embedded integrated circuit (IC). Smart cards containing an IC are sometimes called Integrated Circuit Cards (ICCs). Smart cards are used for a variety of purposes, including: Storing a patient's medical records Storing digital cash Generating network IDs (similar to a token) To use a smart card, either to pull information from it or add data to it, you need a smart card reader, a small device into which you insert the smart card.

7- Briefly explain Return on Investment (ROI)
A performance measure used to evaluate the efficiency of an investment or to compare the efficiency of a number of different investments. To calculate ROI, the benefit (return) of an investment is divided by the cost of the investment; the result is expressed as a percentage or a ratio. In finance, rate of return (ROR), also known as return on investment (ROI), rate of profit or sometimes just return, is the ratio of money gained or lost (whether realized or unrealized) on an investment relative to the amount of money invested. The amount of money gained or lost may be referred to as interest, profit/loss, gain/loss, or net income/loss. The money invested may be referred to as the asset, capital, principal, or the cost basis of the investment. ROI is usually expressed as a percentage.

8- Briefly explain pros and cons of PayPal
PayPal is without doubt the most widely-known and widely-used payment processor for Internet marketing. They offer a wide range of benefits, which makes them a very popular choice, but there are a few drawbacks to using PayPal, too. As payment systems go PayPal is pretty easy to set up compared to standard merchant accounts. This is one of the major reasons why so many people choose to use them. They don’t require you to fill out and sign a ton of paperwork, they don’t do a credit check, and the money you earn can be instantly available for withdrawal at an ATM if you have their debit card.

9- Briefly explain Asymmetric Encryption System
The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. Anyone who knows the secret key can decrypt the message. One answer is asymmetric encryption, in which there are two related keys--a key pair. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key.

This means that you do not have to worry about passing public keys over the Internet (the keys are supposed to be public). A problem with asymmetric encryption, however, is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the content of the message.
Briefly explain Symmetric Encryption System Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key.

10 - Briefly explain Telnet Telnet is a system for logging onto a remote computer through the Internet. There are lots of reasons to do this. Telnet allows you to access computers all over the world and use the resources you find on those computers. You could use telnet to access Brand X while on vacation to check your mail. You can use it to play games, to join chat lines, or you can use it to access and modify web pages if you have a web site. Telnet does this by simulating a UNIX terminal connected to the other computer via the Internet. So what you see in Telnet is the same thing as what you would see if you were at a terminal hooked directly to the other computer.
Briefly explain FTP
File Transfer Protocol (FTP) is a standard network protocol used to copy a file from one host to another over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server. FTP users may authenticate themselves using a clear-text sign-in protocol but can connect anonymously if the server is configured to allow it. The first FTP client applications were interactive command-line tools, implementing standard commands and syntax. Graphical user interface clients have since been developed for many of the popular desktop operating systems in use today

1- Briefly explain Electronic Cash

A system that allows a person to pay for goods or services by transmitting a number from one computer to another. Like the serial numbers on real dollar bills, the digital cash numbers are unique. Each one is issued by a bank and represents a specified sum of real money. One of the key features of digital cash is that, like real cash, it is anonymous and reusable. That is, when a digital cash amount is sent from a buyer to a vendor, there is no way to obtain information about the buyer. This is one of the key differences between digital cash and credit card systems. Another key difference is that a digital cash certificate can be reused.

2- Briefly explain ActiveX Control

ActiveX control is a control using Microsoft ActiveX technologies. An ActiveX control can be automatically downloaded and executed by a Web browser. ActiveX is not a programming language, but rather a set of rules for how applications should share information. Programmers can develop ActiveX controls in a variety of languages, including C, C++, Visual Basic, and Java. An ActiveX control is similar to a Java applet. Unlike Java applets, however, ActiveX controls have full access to the Windows operating system. This gives them much more power than Java applets, but with this power comes a certain risk that the applet may damage software or data on your machine. To control this risk, Microsoft developed a registration system so that browsers can identify and authenticate an ActiveX control before downloading it. Another difference between Java applets and ActiveX controls is that Java applets can be written to run on all platforms, whereas ActiveX controls are currently limited to Windows environments.

3- Briefly explain Firewalls
A firewall is a software or hardware device that protects your computer from internet dangers, such as (among many, many others) viruses, spyware, and hackers. Think of it like a thick stone castle wall - no one can get through it except at heavily guarded gates. Any data going from the internet to your computer must first pass through the firewall, where it is carefully scanned for threats. If the firewall detects any dangers, it blocks the data. Firewalls close off all of the unused ports, channeling all internet traffic through only a handful of open ports. Furthermore, the firewall filters all data moving through these ports, meaning that it examines all the data packets for the proper security authorization. Any data that fails to meet these security requirements is not allowed through the firewall onto your computer. Firewalls also make sure that any personal or sensitive information leaving your computer is protected. It does this by encrypting the information. The information can be decrypted when it arrives at its legitimate destination. Any hackers or spyware that intercept the information on the way, however, gets only scrambled data that it can't read or use.
4- Briefly explain Cookies A cookie is a small file that is stored on a client's computer. That means that whenever a user visits your web site, you can secretly stash a file with information on their hard drive. This file can contain almost any information you want - including user info, site statistics, or even your own name, for those with vanity problems. We can see how this could potentially be an easy target for hackers because of the possibilities it opens up. One security trick to prevent abuse is that cookies can only be accessed by the domain that created them. This means that, for example, ASP101.com can only access (read from and write to) cookies that ASP101.com created. Generally, this is not a problem at all, but what if you work on two different sites on different domains that share user info, that is stored in cookies? You could, of course, just duplicate user info, but what if you want the user to only have to register on one site, and be automatically registered on the other? Or if they share the same user database, and you want to auto-login users? Sharing cookies across domains is ideal for this situation.

5- Briefly explain Enterprise Application Integration and database
Enterprise Application Integration) Hooking up applications within an enterprise. EAI software acts as a hub that translates data and messages between different applications. The need for EAI arose as companies sought to exchange information between separate 'silos' of automation, such as ERP and CRM systems. EAI is regarded as more tightly coupled and inflexible than emerging alternatives based on web services. Enterprise Application Integration Refers to various techniques that are used to make information systems work together in the large enterprise. For example, when companies acquire other companies, disparate systems have to be integrated. Within a company, newly developed systems must work with legacy systems, and separate systems developed independently in the past must often be tied together to provide required information and services. When information systems are integrated, business intelligence can be gleaned across the entire enterprise.

6- Briefly explain Magnetic Strip Cards
A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe, sometimes called swipe card or magstripe, is read by physical contact and swiping past a magnetic reading head. A number of International Organization for Standardization standards, ISO/IEC 7810, ISO/IEC 7811, ISO/IEC 7812, ISO/IEC 7813, ISO 8583, and ISO/IEC 4909, define the physical properties of the card, including size, flexibility, location of the magstripe, magnetic characteristics, and data formats. They also provide the standards for financial cards, including the allocation of card number ranges to different card issuing institutions.

Briefly explain Smart Cards
A small electronic device about the size of a credit card that contains electronic memory, and possibly an embedded integrated circuit (IC). Smart cards containing an IC are sometimes called Integrated Circuit Cards (ICCs). Smart cards are used for a variety of purposes, including: Storing a patient's medical records Storing digital cash Generating network IDs (similar to a token) To use a smart card, either to pull information from it or add data to it, you need a smart card reader, a small device into which you insert the smart card.

7- Briefly explain Return on Investment (ROI)
A performance measure used to evaluate the efficiency of an investment or to compare the efficiency of a number of different investments. To calculate ROI, the benefit (return) of an investment is divided by the cost of the investment; the result is expressed as a percentage or a ratio. In finance, rate of return (ROR), also known as return on investment (ROI), rate of profit or sometimes just return, is the ratio of money gained or lost (whether realized or unrealized) on an investment relative to the amount of money invested. The amount of money gained or lost may be referred to as interest, profit/loss, gain/loss, or net income/loss. The money invested may be referred to as the asset, capital, principal, or the cost basis of the investment. ROI is usually expressed as a percentage.

8- Briefly explain pros and cons of PayPal
PayPal is without doubt the most widely-known and widely-used payment processor for Internet marketing. They offer a wide range of benefits, which makes them a very popular choice, but there are a few drawbacks to using PayPal, too. As payment systems go PayPal is pretty easy to set up compared to standard merchant accounts. This is one of the major reasons why so many people choose to use them. They don’t require you to fill out and sign a ton of paperwork, they don’t do a credit check, and the money you earn can be instantly available for withdrawal at an ATM if you have their debit card.

9- Briefly explain Asymmetric Encryption System
The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. Anyone who knows the secret key can decrypt the message. One answer is asymmetric encryption, in which there are two related keys--a key pair. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key.

This means that you do not have to worry about passing public keys over the Internet (the keys are supposed to be public). A problem with asymmetric encryption, however, is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the content of the message.
Briefly explain Symmetric Encryption System Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key.

10 - Briefly explain Telnet Telnet is a system for logging onto a remote computer through the Internet. There are lots of reasons to do this. Telnet allows you to access computers all over the world and use the resources you find on those computers. You could use telnet to access Brand X while on vacation to check your mail. You can use it to play games, to join chat lines, or you can use it to access and modify web pages if you have a web site. Telnet does this by simulating a UNIX terminal connected to the other computer via the Internet. So what you see in Telnet is the same thing as what you would see if you were at a terminal hooked directly to the other computer.
Briefly explain FTP
File Transfer Protocol (FTP) is a standard network protocol used to copy a file from one host to another over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server. FTP users may authenticate themselves using a clear-text sign-in protocol but can connect anonymously if the server is configured to allow it. The first FTP client applications were interactive command-line tools, implementing standard commands and syntax. Graphical user interface clients have since been developed for many of the popular desktop operating systems in use today

Similar Documents

Premium Essay

Marketing on the Web

...Running Head: MARKETING ON THE WEB In today’s business industry a company’s marketing strategy is vital in order for that company to reach its target market. When the World Wide Web was created it gave companies a way to new ways not only to meet its target markets but also potential markets all over the world. Marketing on the web can provide a company with many benefits that can expand knowledge of the company, its brand, and products and services it offers. A company decides how to market its web page by first figuring out how it will group itself based on do they provide a product or service to the customer or are they based on what the customer wants. Product-based marketing strategies arrange the products on the web page the same as the product design. Customer-based strategies lets the company think as if they were the customer and design the page according to what they think is the customers’ needs. Choosing a marketing strategy for the web page thus entails a company will reach its market segments targeted. To reach a target market a company must first find their market then segment them accordingly. Although there are many types of market segments companies can choose to group consumers in order to reach their target market effectively, on the Web there are three main segments that used are demographic, geographic, and psychographic segmentations. In demographic segmentation, consumers are categorized according to gender, age, income, occupation, education, and...

Words: 1256 - Pages: 6

Premium Essay

Web Marketing

...Web Design & Development Proposal For Cybertel USA From: Sk.Tariqual Islam Justaio Technologies info@justaio.com Web Design & Development Proposal May 7, 2014 JUSTAIO TECHNOLOGIES Introduction Justaio Technologies is pleased to submit a proposal for the web site development of Cybertel USA This proposal describes the technology, services, terms, and schedule for the web site development project. In the digital age, a web site frequently serves as your business or organization’s front entrance through which many customers will pass. Our mission is to give you a professional on-line presence that will generally enhance your organization’s image and branding, as well as move prospects through the sales process. About Us JUSTAIO Technologies is a top provider of professional web site design and development. We have over 3 years of experience in the web development field with a long list of satisfied customers. We will be happy to provide additional references upon request.We have a clear understanding of the web site development requirements, and we have the knowledge, skills and experience to successfully complete the web site project. Our Team & Leadership Sk.Tariqual Islam (Project Manager) Sk Tariqual Islam, well-known for his strategic imagination in aligning business goals with creative strategy and expression, has successfully led brand design and marketing engagements for a variety of clients. Sk...

Words: 968 - Pages: 4

Premium Essay

Web Marketing

...Report On “Green Banking Practice in Bangladesh: A Case Study of Jamuna Bank Limited” ASA University Bangladesh Report On “Green Banking Practice in Bangladesh: A Case Study of Jamuna Bank Limited” Submitted to: Abdullah Al Masum Lecturer Faculty of Business ASA University Bangladesh Submitted by: Md: Rased Chowdhury Id: 083-12-0057 Batch: 5th Bachelor of Business Administration ASA University Bangladesh Submission Date: 12 August, 2012 Letter of Transmittal 12 August, 2012 Abdullah Al Masum Lecturer Faculty of Business ASA University Bangladesh Subject: Submission of Internship Report. Dear Sir It is with great pleasure that I am going to present my internship report on “Green Banking Practice in Bangladesh: A Case Study of Jamuna Bank Limited”. I have worked at Jumana Bank Limited (JBL), Ring Road Branch for three months. Based on this, I have tried to incorporate theories...

Words: 1061 - Pages: 5

Premium Essay

Web Marketing Mix

...BASE I have to say my dream job is to work from home and I could easily use Internet Marketing to advertise, research, sell, and make money. Two components for a Home base would be setting up a website and search engine marketing. Both components would be beneficial in getting your business out to the public. If I am ever looking for a business or information, the first thing I do is perform a Google search. Once the search is done, I go to a website. Setting up a website for a home business allows potential customers access to your business and what you offer. Once a website is set up, make sure you list your business in every search engine possible. It seems like most people take chances on what they find on the internet, and if Google or Yahoo shows your information, you have a chance for more views that means more customers that turns into more money. Without a website, you have nothing for the potential customer to go on. Your website needs to give a brief history of what your business is about and should give images that will attract your target audience. This means to research the likes and dislikes of potential customers. You want to know what will attract them and what may cause them to turn away. A good example is Diamond Candles at www.diamondcandles.com. This is a website that was created from a home base business that has now turned into something bigger. Open Source Web Design is a great way to start with many free templates. First, set up your domain and...

Words: 763 - Pages: 4

Premium Essay

Web and Email Marketing

...(w) WORK EXPERIENCE Web Applications Developer (Consultant) Thermo Fisher Scientific (Life Technologies) - Fremont, CA - February 2014 to Present Responsibilities Working in the Remedy Queue as an applications support engineer capacity to resolve IT trouble tickets for the Array Manufacturing Support group. Installed ColdFusion 11 on a Red-Hat Unix system to upgrade a mission critical CRM system (http://vss.appliedbiosystems.com ) Acting as steward of other in-house developed systems in Cold Fusion. Participating in regular agile sprint cycle meetings in my capacity as reports developer for the OligoInc group. Skills Used ColdFusion 8-11. Windows XP, Professional and RedHat UNIX. Oracle 11g Crystal Reports 10, Visual Studio 10, VB.NET, C#. ASP.NET IT Applications Developer Alliance Analytical - Fremont, CA - September 2013 – September 2014 Responsibilities Maintained and enhanced coldfusion backend of components that connected to SQL Server 2008 database of in-house CRM system. Customized Adobe Flex components in the front end as required. Integrated the contacts data of the database with an external SMTP provider by building a web service of the data that fed into the third party API to render email broadcasts data. Maintained web site at http://www.aaisolutions.com . Web Applications Developer (Consultant) Life Technologies - Pleasanton, CA - February 2013 to August 2013 Responsibilities Created a web interface to process replacement...

Words: 982 - Pages: 4

Premium Essay

The Nine Elements of Effective Web Marketing

...Elements of Effective Web Marketing Introduction When it comes to web marketing, it’s all about ‘conversion’ - how many of your site visitors you can convert into a lead or a sale. We suggest that companies lacking a well conceived and well implemented website conversion strategy, are failing to leverage the most important marketing medium of the twenty-first century. The Nine Elements: 1. Identification of site goals 2. Clearly defined target audience 3. Compelling message 4. Site structure and information flow 5. Calls to action 6. Lead capture mechanism 7. Supporting graphic design 8. Site promotion 9. Testing, measurement, and refinement 1. Site Goals Identifying goals is critical for two reasons. First, goals help you to determine what should or shouldn’t be included on your site. You use your goals document as a set of criteria for determining site content, simplifying the design process, and removing the ‘political element’ that plagues some companies. Secondly, having specific goals allows you to measure the effectiveness of your site after it’s completed and live. That’s key because if you can’t measure site performance, then improving it becomes much more problematic. So you’ll find that measurement and improvement are the keys to that ROI you’re looking for. The bottom line on goal setting is that if you never identify the target, then you can’t expect to hit it. 2. Target Audience A foundation of effective web marketing is the ‘who’. Determining...

Words: 1266 - Pages: 6

Premium Essay

Marketing Plan

...the Spider? http://www.HowMuchForSpider.com/TOC.htm Marketing Plan Example http://www.WebSiteMarketingPlan.com Marketing Plan Example Based on methods in the marketing plan and Web promotion guide How Much For Just the Spider? Strategic Website Marketing by Bobette Kyle, ISBN 1-59113-113-8 http://www.HowMuchForSpider.com/TOC.htm Copyright © 2002 - 2005 Bobette Kyle, WebSiteMarketingPlan.com 8050 Watson Road, Suite 315, St. Louis, MO 63119 http://www.websitemarketingplan.com All rights reserved. You may share this document with others as long as you keep the entire document intact. 1 Copyright © 2002 - 2005 Bobette Kyle All rights reserved. Based on methods in How Much For Just the Spider? http://www.HowMuchForSpider.com/TOC.htm Marketing Plan Example http://www.WebSiteMarketingPlan.com This not the kind of sample marketing plan you had in mind? Then take a look at this marketing plan software, with integrated samples to help write your plan: http://www.WebsiteMarketingPlan.com/mplan/software 1 Copyright © 2002 - 2005 Bobette Kyle All rights reserved. Based on methods in How Much For Just the Spider? http://www.HowMuchForSpider.com/TOC.htm Marketing Plan Example http://www.WebSiteMarketingPlan.com A Retail Business Example: Arlington Accessories and More To demonstrate the marketing plan development process detailed in the book, throughout this booklet I develop a sample Web site marketing plan for a fictional retailer. "Arlington Accessories...

Words: 2480 - Pages: 10

Free Essay

E-Marketing

...targeted e-marketing campaigns an important strategic decision for businesses to stay competitive and to increase profitability. The three e-business marketing strategies are: e-commerce website, e-marketing and web services using underlying web technologies including Extensible Markup Language, Simple object Access protocol, Web Services Description Language and Universal Descript on, Discovery and International specification using NuSOAP Web Services Toolkit for PHP, HTML, My SQL, HTTP etc. We evaluate the effectiveness of the web technologies used and recommend further functionalities that can improve speed, performance and security. INTRODUCTION E-marketing can be considered to be equivalent to Internet marketing. Most in the industry would look at it this way. However, E-marketing is sometimes considered to have a broader scope since it refers to digital media such as web, e-mail and wireless media, but also includes management of digital customer data and electronic customer relationship management systems (E-CRM systems). Extending these channels to include electronic marketing or e-marketing activities requires proper planning and effective implementation. Small business face more challenges than large business when deploying offline marketing activities due to limited resources, such as huge cost of advertising on magazine, TV, Radio, newspaper etc. We analyze challenges facing small business when implementing e-marketing activities; choices of available web technologies...

Words: 1556 - Pages: 7

Premium Essay

Nick

...international business and marketing: A literature review Name student: Tao Yi Student number: 1192930 Course name: Master thesis international track Course code: 2012-191880750-1A Assessor: Assistant Prof. Dr. E. Constantinides and Dr. Huub J.M. Ruel Hand in date: 15-09-2012 E-commerce and Web 2.0: An intensive literature review on their impacts on international business and marketing Table of content Managerial summary ............................................................................................ 2 1. Background and research objectives .............................................................. 3 2. Research problem and research questions...................................................... 4 3. Research methodology ................................................................................... 6 4. Key findings .................................................................................................. 8 4.1. 4.1.1. 4.1.2. 4.1.3. 4.2. 4.2.1. 4.2.2. 4.3. 4.4. 4.4.1. 4.4.2. 4.4.3. 4.5. 4.5.1. 4.5.2. 4.5.3. 4.6. The impacts of Internet on International business and marketing .................................. 8 The impacts on international business ......................................................................... 8 The impacts on international entrepreneurship ............................................................ 9 The impacts on international companies‟ marketing ................................................. 10 Web 2.0 and its impacts...

Words: 21450 - Pages: 86

Premium Essay

As a New Hr Representative, You Have Been Asked to Facilitate a Session on Attribution Theory to a Group of Perspective Managers Participating in a Management Development Program. Your Manager Has Asked That You Explain

...“INTERNET” ………………………………………………………….. 1 3. INTERNET MODEL FOR MARKETING SUCCESS ………………………………… 1 4. ADVANTAGES OF THE INTERNET ………………………………………………….. 2 4.1. Web Search Queries Predict Stock Market Trading Volumes …………….. 3 5. SUCCESSFUL WEBSITES …………………………………………………………….. 4 6. DISCUSSION …………………………………………………………………………… 5 7. CONCLUSION …………………………………………………………………………… 6 8. REFERENCES …………………………………………………………………………… 7 ABSTRACT Internet and Commerce relation is an interesting topic especially for researchers in the marketing field. It is a new way of marketing a product/service globally to the targeted market around the world. This paper introduces a new approach concerning Internet marketing in electronic commerce; showing how advertisers need this innovation to be successful. This also relieves marketing managers for more value added tasks such as marketing plans for better development of the company. Keywords - Internet marketing, innovation, E-commerce 1-INTRODUCTION Internet marketing (IM) is also known as digital marketing, web marketing, online marketing, or e-marketing. As the name states, it is the advertising of products or services over the Internet. However, it also implies marketing through the wireless media and through e-mail. Electronic customer relationship management (ECRM) systems are also categorized under Internet marketing. IM can be creative, as well as, technical through its design...

Words: 1760 - Pages: 8

Premium Essay

Research Method Proposal

...accessed throughout the world. Accordingly, the development of information technology through the concept of e-commerce has changed the business environment more conducive to force us to dominate the field more quickly. Rapid development in information technology, especially in the development of the Internet has led to the extensive use of electronic in the daily business such as e-commerce, e-government and e-commerce as well. E-mail and the internet site are the most important component of e-commerce. While the growing importance of the Web 2.0 and the effects on consumers and organisations are issues frequently making headlines and increasingly attracting academic attention. The interest is often focused on the ways in which these applications will contribute to customer behavioural change and on new challenges facing strategist and marketers (Urban, 2003; McKinsey Quarterly, 2007). There is little clarity as to the exact nature of Web 2.0 for all intents and purposes, there is still no generally accepted definition of the term and no systematic...

Words: 3684 - Pages: 15

Premium Essay

No Title

...Influencing the online consumer’s behavior: the Web experience Efthymios Constantinides The author Efthymios Constantinides is an Assistant Professor at the University of Twente, Faculty of Business, Public Administration and Technology, Department of Marketing, Strategy and Entrepreneurship, Enschede, The Netherlands. Keywords Internet marketing, Worldwide web, Online operation, Consumer behaviour, Buying behaviour The consumers” buying behavior has been always a popular marketing topic, extensively studied and debated over the last decades while no contemporary marketing textbook is complete without a chapter dedicated to this subject. The predominant approach, explaining the fundamentals of consumer behavior, describes the consumer buying process as a learning, information-processing and decision-making activity divided in several consequent steps: (1) Problem identification. (2) Information search. (3) Alternatives evaluation. (4) Purchasing decision. (5) Post-purchase behavior (Bettman, 1979; Dibb et al., 2001; Jobber, 2001; Boyd et al., 2002; Kotler, 2003; Brassington and Pettitt, 2003). A distinction is frequently made between high and low involvement purchasing, implying that in practice the actual buying activity can be less or more consistent with this model, depending on the buyer’s perceived purchasing risks. High or low degree of involvement is also a question of buyer experience; products purchased for the first time, in general, require more involvement than...

Words: 10668 - Pages: 43

Premium Essay

Consumer Buying Behaviour

...Influencing the online consumer’s behavior: the Web experience Efthymios Constantinides The author Efthymios Constantinides is an Assistant Professor at the University of Twente, Faculty of Business, Public Administration and Technology, Department of Marketing, Strategy and Entrepreneurship, Enschede, The Netherlands. Keywords Internet marketing, Worldwide web, Online operation, Consumer behaviour, Buying behaviour The consumers” buying behavior has been always a popular marketing topic, extensively studied and debated over the last decades while no contemporary marketing textbook is complete without a chapter dedicated to this subject. The predominant approach, explaining the fundamentals of consumer behavior, describes the consumer buying process as a learning, information-processing and decision-making activity divided in several consequent steps: (1) Problem identification. (2) Information search. (3) Alternatives evaluation. (4) Purchasing decision. (5) Post-purchase behavior (Bettman, 1979; Dibb et al., 2001; Jobber, 2001; Boyd et al., 2002; Kotler, 2003; Brassington and Pettitt, 2003). A distinction is frequently made between high and low involvement purchasing, implying that in practice the actual buying activity can be less or more consistent with this model, depending on the buyer’s perceived purchasing risks. High or low degree of involvement is also a question of buyer experience; products purchased for the first time, in general, require more involvement than...

Words: 10668 - Pages: 43

Premium Essay

E-Commerce

...Influencing the online consumer’s behavior: the Web experience Efthymios Constantinides The author Efthymios Constantinides is an Assistant Professor at the University of Twente, Faculty of Business, Public Administration and Technology, Department of Marketing, Strategy and Entrepreneurship, Enschede, The Netherlands. Keywords Internet marketing, Worldwide web, Online operation, Consumer behaviour, Buying behaviour The consumers” buying behavior has been always a popular marketing topic, extensively studied and debated over the last decades while no contemporary marketing textbook is complete without a chapter dedicated to this subject. The predominant approach, explaining the fundamentals of consumer behavior, describes the consumer buying process as a learning, information-processing and decision-making activity divided in several consequent steps: (1) Problem identification. (2) Information search. (3) Alternatives evaluation. (4) Purchasing decision. (5) Post-purchase behavior (Bettman, 1979; Dibb et al., 2001; Jobber, 2001; Boyd et al., 2002; Kotler, 2003; Brassington and Pettitt, 2003). A distinction is frequently made between high and low involvement purchasing, implying that in practice the actual buying activity can be less or more consistent with this model, depending on the buyer’s perceived purchasing risks. High or low degree of involvement is also a question of buyer experience; products purchased for the first time, in general, require more involvement than...

Words: 10668 - Pages: 43

Premium Essay

Beyond Traditional Marketing

...Beyond Traditional Marketing Prepered By: Dipali Parmar and Harsh Pandya Dept. of Business Administration, Faculty of Management., Bhavnagar University Bhavnagar Content of Abstract:Introduction:Every marketing manager needs to know about marketing in today‟s competitive markets. Beyond traditional marketing means now a days there are introduce many new technologies for the purpose of marketing. For instance, web assessment-measuring the effectiveness of electronic commerce site, Direct marketing, effect of word-of-mouth (WOM) marketing on member growth at an Internet social networking site, network marketing/ multi-level marketing, current trends, prospects and challenges in Indian retail industries, rural marketing, Indian marketing strategies for new product development, current marketing environment, value chain and corporate strategic planning, focus on consumer behavior, customer satisfaction etc….. Abstract:Successfully conducting business on the Internet calls for new marketing paradigms that meet the requirements of the unique combination of its inherent characteristics: electronic markets, technological platform, and marketing issues. In this context, electronic markets are the Framework in which market transactions are performed on the Internet. Underlying Internet technology forces marketing activities to be different from the ones applied to traditional sales channels and performance marketing is the essential ingredient for creating the best offering for...

Words: 3941 - Pages: 16