Beruflich Dokumente
Kultur Dokumente
Features of e-marketing
Identifying customer needs
E-MARKETING TOOLS
E-Marketing tools and strategies include:
Business websites;
Search Engine;
Email;
Online newsletters/e-zines;
Online catalogues;
Online press releases;
Online surveys;
Online customer service;
Banner advertising;
Affiliate marketing.
Mobile telephone marketing;
Online Community (Friendster, YouTube) - new
Web Log (Blog) - new
Importance of e-marketing
Sell
Service
Save
Speak
Sizzle
Sizzle Reel
Demerits of e
marketing
E-marketing tools
1.opt-in-e-mail
2. Mobile phone
i-radio
Web radio
Digital Radio
Web radio
Digital radio
i-kiosks
i-kiosks
Internet marketing
Advantages of internet
marketing
Limitations of internet
marketing
E-advertising
advertising through
electronic media
Objectives of eadvertising
2 way communication
2 way interaction
customer retention
online sale
Brand awareness
Advantages of e-advertising
Interactive
low cost
effectiveness can be measured
24*7 access
updated/change
creative
Limitations of eadvertisement
Types of internet
advertising
website
Banners
Banners
Buttons
Pop Ups
Sponsorship
E-male
Measurement of eadvertising
effectiveness
Measurement by hit
Impression method
Growth
B2B segment
Advertising
Digital media
Integrated marketing communication
Rich media advertising
Relationship marketing
Domain name
Importance of ebranding
Increase sale
Promotion
More order
Adds value to brand
Improve image of the company
Confidence in B2B division
e-payment system
Types of e-payment
system
Properties of E-cash
system
Monetary value
Exchangeable
Storable and
retrievable
Not easy to copy
Properties of E-payment
system/essential requirement
AICD
Atomicity
Consistency
Isolation
Durability
ICES
Interoperabili
ty
Conservation
Economy
Scalability
Classification of e-payment
Media
E-payment media
Credit card
Debit card
Smart card
E-Cheque
E-wallet
1 Credit card
2 Debit Cards
3 Smart Cards
Smart Cards
E- Cheque
E- Cheque
E-Wallet
Security risks in
internet
Spoofing
Unauthorized disclosure
Unauthorized action
Eavesdropping
Data alteration
Phishing
Business practices
Information privacy practices
Transaction integrity
Information protection
Consumer recourse
Authentication
Confidentiality
Integrity
Non- repudiability
privacy
Internet Security
Tools
Anti-virus programme
Integrity checking
software
Audit logs
Firewalls
Digital signature
Digital certificate
Hardware
technologies
Connectivity
Scalability
Maximum throughput
Load balancing and linear growth
Reliability
Security