Posts

Showing posts with the label E-commerce.

Consider you are given a role of SEO analyst to perform search engine optimization analysis of www.sastodeal.com, what kind of SEO activities you will perform so as to improve rank of the website.

Image
If I were an SEO analyst of www.sastodeal.com then my fundamental role will be to increase the number of people who visit a website or a number of websites. SEO stands for 'search engine optimization, I include the following responsibilities: I'll carry out keyword research using software such as Moz to optimize web content I'll track metrics such as organic traffic, conversion rates, and time spent on the page using platforms such as Google Analytics I'll monitor and report on search trends and SEO performance I'll analyze websites and social media pages to make recommendations for improvement I'll perform competitor analysis to identify content gaps and areas for improvement in website design, and I'll stay up to date with new SEO, social media, and digital marketing industry trends, tools, and practices, which are constantly changing I'll use Excel spreadsheets to compile reports I'll implement link-building strategies I'll make suggestions fo

Describe how promoted tweets, promoted trends and lead generation cards are used as Twitter marketing tools?

Image
There are many kinds of Twitter marketing products, and the firm is creating new ones every few months. The current major Twitter marketing tools include the following. Promoted Tweets Promoted Trends Promoted Accounts Enhanced Profile Page Amplify Promoted Videos Television Ad Retargeting Lead Generation Cards i) Promoted Tweets:   Advertisers pay to have their tweets appear in users' search results. Promoted Tweets are Twitter's version of Google's AdWords. The tweets appear as "promoted" in the search results. Pricing is on a "cost-per-click" basis, based on an auction run by Twitter on the Twitter ad platform, and might range from $.50 to $10 per engagement. An "ad carousel" allows up to 12 ads to be shown in a single space, enabling users to swipe through the Promoted Tweets. Promoted Tweets can be geotargeted and also offer keyword targeting that enables advertisers to send the tweets to specific users based on keywords in their recent tw

How linear, non-linear, in-banner, and in-text video ads are used for digital marketing?

Image
Linear, Non-Linear, In-banner, and in-text video ads are described below:- i) Linear Video Ads:  More commonly known as pre, mid and post-roll ads, linear ads take over the full video player space. They're linear because they run in line sequentially with the content, for example, a pre-roll will appear as (ad-video); a mid-roll will be (video-ad-video) and a post-roll will appear as (video-ad). Linear ads can be 15 or 30-seconds long and do not allow for fast-forwarding through the ad. OR, Linear Video Ads are the most iconic and widespread formats of in-stream video advertising. Just like in the traditional TV broadcasts, they are cutting into the main video and playing in-line with the rest of the content. Linear ad interrupts the primary video and occupies the entire video-played space. It can encompass the interactive component or work with a companion ad. ii) Non-linear Video ad: runs parallel to the video content so the users see the ad while viewing the content. Non-linear

Discuss the possible security threats in e-commerce systems

Image
Security threats in e-commerce systems The different types of security threats in e-commerce systems are described below: i) Malicious Code viruses, worms, Trojan horses, ransomware, and bots. ii) Adware iii) Spyware iv) Social Engineering v) Phishing vi) Hacking vii) Credit Card Fraud and Identity Fraud Any five of them are described below: i) Malicious Code:   Malicious code (sometimes referred to as "malware"). Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware includes a variety of threats such as viruses, worms, Trojan horses, ransomware, and bots. ii) Adware:  Adware is a form of threat where the computer starts for pop-up ads to display when th user visits certain sites. Adware is not typically used for criminal activities but it can be pretty annoying. iii) Spyware:  Spyware can be used to obtain information such as a user's keystrokes, copies of email and instant messages, and even take scree

What is a shopping cart in an e-commerce application? How can you build shopping carts?

Image
 Shopping art  A shopping cart software is an eCommerce tool that allows web visitors top services offered on a website. We can add and remove items as we wish. jus. id. It is used by online merchants to streamline the web buyer's experience and make it possible to select, reserve, and store items from a website. A shopping cart tool also handles online payments with payment gateway integrations. For online merchants, shopping cart software is an integral part of the business. Several vendors offer this type of software, each providing various features to help you out with your online business. Shopify, Magento, woo commerce, Wix,x-cart, etc are the websites which are using shopping carts. Benefits of shopping cart software to customers:  Safe shopping experience More payment options View more detailed product descriptions Save items and return at a later date Express checkout Track orders in real-time

What is e-payment? Describe the working mechanism of online credit card transaction.

Image
E-payment An e-payment system is a way of making transactions or paying for goods and services through an electronic medium, without the use of checks or cash. It's also called an electronic payment system or an Online payment system. Pros: Potential for great flexibility Low transaction costs Rapid and diverse purchase power How online credit card transaction works  Some information about How online credit card transaction works  Processed in much the same way that in-store purchases are  The major difference is that online merchants do not see or take an impression of a card, and no signature is available.  Participants include consumer, merchant, clearinghouse, merchant bank (acquiring bank), and consumer’s card issuing bank  Five parties involved in this transaction a) Consumer  b) Merchant  c) Clearinghouse  d) Merchant bank  e) Issuing bank Step 1:-  When the customer wants to pay, a secret tunnel through the internet is created using SSL, and credit card information is sent

Describe the possible types of revenues models that can be adapted in e commerce systems.

Image
Revenue model A firm's revenue model describes how the firm will earn revenue, generate profits, and produce a superior return on invested capital. capital. We use the terms revenue model and financial model interchangeably.  There are many different e-commerce revenue models that have been developed followings are the types of revenue models: ➤Types of Revenue Model the advertising model,  the subscription model, the transaction fee model, the sales model, and the affiliate model. i. The advertising model:   In the advertising revenue model, a company that offers content, services, and/or products also provides a forum for advertisements and receives fees from advertisers. Companies that are able to attract the greatest viewership or that have a highly specialized, differentiated viewership and are able to retain user attention are able to charge higher advertising rates. Yahoo, for instance, derives a significant amount of revenue from display and video. ii. The subscription mode

How the features like ubiquity, information density, and richness make e-commerce better than traditional commerce. Justify with examples

Image
There are four major characteristics of e-commerce: i. Ubiquity ii. Global Reach iii. Information Richness iv. Information density v. Personalization and Customization vi. Interactivity i. Ubiquity: Because E-Commerce is ubiquitous, the market is able to extend its traditional operating hours. Online stores never close, it is available everywhere at any time. Ubiquity lowers transaction costs for the consumer/buyer. For example, if the user is at an outstation, he also can through www.acer.com get information about the product. ii. Information Richness: Advertising and branding are important parts of commerce. E-Commerce can deliver video, audio, animation, etc. to introduce products. Individuals may see information richness if a post contains a video related to a product and hyperlinks that allow him/her to look at or purchase the product and send information about the post via text message or email. An example is the richness is can make the websites become attract people to browse.

What is e-commerce? How does it differ from e-business?

Image
Ecommerce Ecommerce, also known as electronic commerce or internet commerce, refers to the buying and selling of goods or services using the internet, and the transfer of money and data to execute these transactions. Examples of E-Commerce are online retailers like Amazon, Flipkart, Myntra, Paytm mall, seller  Activities of E-Commerce are: Buying and selling products online Online ticketing Online Payment Paying different taxes Online accounting software Online customer support The difference between E-commerce and E-business are as follows:-  E-commerce The trading of merchandise, over the internet, is known as E-commerce. E-Commerce is a narrow concept and it is considered a subset of E-Business.  Commercial transactions are carried out in e-commerce. In e-commerce transactions are limited. It involves mandatory use of the internet. E-commerce is more appropriate in the Business to Customer (B2C) context. E-Business Running a business using the internet is known as E-business. E-Busi

Consider a company is planning to establish a B2B e-commerce system. Now describe in detail the possible types of B2B Business Models the company can adapt.

Image
The major business models used to date in the B2B arena include:  i) Net marketplaces  E-distributors  E-procurement  Exchange Industry Consortium ii) Private Industrial Network Single Firm Private Industrial  Network Industry-wide Private Network  i) Net marketplaces a)  E-distributor:   E-distributors is a company that supplies products and services directly to individual businesses. E-distributors are owned by one company seeking to serve many customers. In E-distributors the more products and services a company makes available on its sites, the more attractive that site is to potential customers. The revenue model of e-distributors is Sales of goods, Advertisements. Example: Grainger.com is are owned e-distributors with online catalogs used to access and provide information on over 1 million items.   b) E-procurement:  These firms create and sell access to digital markets. The Revenue model of E-procurement is fees for market-making services, supply chain management, and fulfillmen

What is Secured Electronic Transaction (SET) Protocol? Describe how purchase request, payment authorization and payment capture are done in SET? [

Image
Secured Electronic Transaction (SET) Protocol Secure Electronic Transaction is an open-source encryption and security specification designed to protect credit card transactions on the internet. The secure electronic transaction is not a payment system; it is a set of security protocols and formats that ensures that using online payment transactions on the internet is secure. Secure Electronic Transaction is also called SET. i) Purchase Request:   Before the purchase request exchange begins, the cardholder has completed browsing, selecting, and ordering. The end of this phase occurs when the merchant sends a completed order to the customer. All of the preceding occurs without the use of SET. The purchase request involves 4 messages:- Initiate Request Initiate Response Purchase Request  Purchase Response When the merchant receives the Purchase Request message, it performs the following actions: It verifies the cardholder certificates by means of its CA signatures. It verifies the dual si

Describe the various security mechanisms used to secure e-commerce systems.

Image
Security mechanisms used to secure e-commerce systems E-Commerce security is the guideline that ensures safe transactions through the internet. It consists of protocols that safeguard people who engage in online selling and buying goods and services.  The different types of security measures of e-commerce systems are given below i) Cryptography:  Cryptography is a science that is used to hide the semantic meaning of a text using some mathematical module. They give the power to hide the information during the network traverse or storage. Many methods are 16-bit,32-bit, 128-bit, and 256-bit encryption or many algorithms like AES, DES, Message Digest, RSA, Quantum encryption, etc. In this form, Original messages are converted into non-readable forms. ii) Hash Function:  Hash functions are an important type of cryptographic algorithm and are widely used in cryptography such as digital signature, data authentication, e-commerce, e-cash, and many other applications. The purpose of the use of

What are the barriers to the complete implementation of private industrial networks?

Image
 The barriers to the complete implementation of private industrial networks are:- One barrier is that participating firms are required to share sensitive data with their business partners up and down the supply chain. This is a huge corporate mindset change because what was previously considered proprietary and secret must now be shared. Furthermore, in the digital environment, it can be difficult to control the limits of this information sharing. Information that a firm willingly gives to its largest customer may wind up being shared with its closest competitor. Other barriers include difficulties in integrating private industrial networks into existing ERP (enterprise resource planning) systems and EDI (electronic data interchange) networks. Most ERP systems were not designed initially to work with extranets or even to be particularly Internet compliant; they were based on business models that use entirely internal business processes. Furthermore, changes in corporate culture and att

What is CPFR, and what benefits could it achieve for the members of a private industrial network?

Image
 CPFR (collaborative resource planning, forecasting, and replenishment)  CPFR (collaborative resource planning, forecasting, and replenishment) involves working with network members to forecast demand, develop production plans, and coordinate shipping, warehousing, and stocking activities. The goal is to ensure that retail and wholesale shelf space is precisely maintained.  The benefits it could achieve for private industrial network members are that hundreds of millions of dollars of excess inventory and capacity could be wrung out of an industry.

Explain the difference between an industry consortium and a private industrial network.

Image
The difference between an industry consortium and a private industrial network are:- Private industrial networks, which presently dominate B2B commerce, are Web-enabled networks for coordinating trans-organizational business processes (collaborative commerce). These networks range in scope from a single firm to an entire industry. Although the central purpose of a private network is to provide industry-wide global solutions to achieve the highest levels of efficiency, they generally start with a single sponsoring company that “owns” the network. This differentiates private markets from industry consortia, which are usually owned collectively by major firms through equity participation.

What is the main reason why many of the independent exchanges developed in the early days of e-commerce failed?

Image
 The main reason is they failed to attract enough players to achieve liquidity. That is, the number of buyers and sellers in the market, the transaction volume, and the size of the transactions were insufficient to sustain a profit.

List three of the objectives of a private industrial network.

Image
The objectives of a private industrial network may include to: • develop efficient industry-wide purchasing and selling business processes • develop industry-wide resource planning to supplement enterprise-wide resource planning • create increasing supply chain visibility so that the inventory levels of buyers and suppliers will be known to the participants • achieve closer buyer-supplier relationships, including demand forecasting, communications, and conflict resolution • foster operations on a global scale • reduce industry risk by preventing imbalances in supply and demand, including developing financial derivatives, insurance, and futures markets

Identify and briefly explain the anti-competitive possibilities inherent in Net marketplaces.

Image
The anti-competitive possibilities inherent in Net marketplaces include: • The possibility that they may provide some firms with an ideal platform to collude on pricing, market sharing, and market access. For example, in a Net marketplace owned by large industry players, owner-members could collide with one another on the prices they are willing to pay for inputs. • The sharing of information in order to reach market-sharing agreements in which they divide the market up into segments and agree to produce only enough for their allocated segment. • The coordination of a reduction in purchases, forcing the suppliers to sell their inputs below market prices. • The restriction of market access if large industry players exclude smaller rivals, thus forcing them to pay higher prices for their inputs.

What are the three dimensions that characterize an e-procurement market based on its business functionality? Name two other market characteristics of an e-procurement Net marketplace.

Image
The three dimensions that characterize an e-procurement market based on its business functionality are that  (1) they are horizontal marketplaces  (2) in which long-term contractual purchasing agreements are used  (3) to buy indirect goods.  Other market characteristics of e-procurement are:- Net marketplaces are that they are independently owned, they are many-to-many markets, and they use fixed-price catalogs. E-procurement companies serve as intermediaries connecting hundreds of online suppliers offering millions of MRO goods to business firms who pay a fee to join the market, thus it is a public marketplace. They are mediated by an independent third party that purports to represent both buyers and sellers; however, they are likely to have a bias in favor of the buyer because they include the catalogs of competing suppliers and competing e-distributors.

How do the value chain management services provided by e-procurement companies benefit buyers? What services do they provide to suppliers?

Image
Value chain management services benefit The value chain management services benefit buyers by automating a firm’s entire procurement process including purchase orders, requisitions, sourcing, business rules enforcement, invoicing, and payment. For the suppliers, they provide automation of the entire selling business process including catalog creation, content management, order management, fulfillment, invoicing, shipment, and settlement.