E COMM PPT

33
MARKETING, ADVERTISING AND SECURITY ISSUES ON INTERNET

Transcript of E COMM PPT

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 1/33

MARKETING,ADVERTISING AND

SECURITY ISSUESON INTERNET

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 2/33

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 3/33

• INTERNET MARKETING,

also known as webmarketing, online marketing or e- marketing, is referred to as

the marketing of products or services over the internet.

I-Marketing is used as an abbreviated form for Internet Marketing.

• It is considered to be wider in concept.

• Includes marketing via e- mail and wireless media.

• Internet Marketing ties together the creative and technical aspects

of the Internet, including design, development, advertising andsales. Internet marketing also refers to the placement of media along

many different stages of the customer engagement cycle through

search engine marketing (SEM), banner ads on specific websites,

email marketing, mobile marketing. 

MEANING:

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 4/33

DISPLAY MARKETING: 

The use of web banners orbanner ads placed on a third-party website to drive traffic to a

company's own website and increase product awareness.

•SEARCH ENGINE MARKETING (SEM): A formof marketing that seeks to promote websites by increasing their

visibility in search engine result pages through the use of either paid

placement, contextual advertising, or through the use of free search

engine optimization techniques.

TYPES OF INTERNET MARKETING: 

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 5/33

Contd;

•SOCIAL MEDIA MARKETING: The process of 

gaining traffic or attention through social media websites such as

Facebook, Twitter, etc.

•EMAIL MARKETING: Involves directly marketing a

commercial message to a group of people using electronic mail.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 6/33

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 7/33

1. BANNER ADS- Banner ads provide messages containing

product information with sound, animation and graphics.

They operate in interactive mode and are posted in amerchant’s website. 

.

2. PULL MARKETING- In this technique, the user takes the

initiative to request a specific web page by clicking on thelink. The page then gets downloaded and display it on the

user’s screen. 

3. PUSH MARKETING- In this technique, the website

pushes the information to the customer computer via the

internet irrespective of his/ her interest.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 8/33

4. SPAMMING- This is a technique where e-mails containing product

information are sent to millions of users who never asked for them.

Addresses of these recipients are purchased, swapped with otherbusiness partners or collect it from software robots that scan the web

and collect addresses from websites.

5. POP UP ADVERTISING- These messages pop up in a new

window in the midst of the current webpage regardless of the user’swish to open such new windows. Sometimes becomes very

frustrating but considered an effective form of marketing technique.

6. PERMISSION MARKETING- In this mode, the merchant first

asked for permission from the client to send information fromcompany and on getting the consent the company sends the

advertisement to the prospective customers who are interested in the

product. It develops a strong relationship with customers.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 9/33

INTERNET

ADVERTISING

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 10/33

ADVERTISING:

Advertising is a form of 

communication used to persuade anaudience (viewers, readers or

listeners) to take some action with

respect to products, ideas, or services.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 11/33

ONLINE ADVERTISING:

Online advertising is a form

of promotion that usesthe Internet and World Wide Web to

deliver marketing messages to attract

customers.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 12/33

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 13/33

The New Paradigm consists of the

following:

One-to-one , one-to-many and many-to-many

models

Concept of multimedia

Concept of animations

Concept of virtual reality

Concept of interactivity

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 14/33

REVENUE MODELS: 

CPM (Cost Per Mille) or CPT (Cost Per ThousandImpressions)

CPC (Cost Per Click) or PPC (Pay per click)

CPA (Cost Per Action or Cost Per

Acquisition) or PPF (Pay Per Performance)

CPL (Cost Per Lead)

CPS (Cost Per Sale), PPS (Pay Per Sale).

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 15/33

TYPES:Floating ad: An ad which moves across the user's screen or

floats above the content.

Expanding ad: An ad which changes size and which may

alter the contents of the webpage.

Polite ad: A method by which a large ad will be downloaded

in smaller pieces to minimize the disruption of the content

being viewed.

Wallpaper ad: An ad which changes the background of thepage being viewed.

Trick banner: A banner ad that looks like a dialog box with

buttons. It simulates an error message or an alert.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 16/33

Pop-up: A new window which opens in front of the current one,

displaying an advertisement, or entire webpage.

Pop-under: Similar to a Pop-Up except that the window is loaded

or sent behind the current window so that the user does not see it until

they close one or more active windows.

Video ad: Similar to a banner ad, except that instead of a static or

animated image, actual moving video clips are displayed. This is thekind of advertising most prominent in television, and many

advertisers will use the same clips for both television and online

advertising.

Mobile ad: an SMS text or multi-media message sent to a cell

phone.

Interstitial ad: a full-page ad that appears before a user reaches

their original destination.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 17/33

E- MAIL ADVERTISING

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 18/33

DISPLAY ADVERTISING

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 19/33

SKYSCRAPERS

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 20/33

Advantages:

• Inexpensive. 

• Can reach a wide audience.

• Appealing to consumers.

• Measures statistics easily and inexpensively.

• Results can be measured and tracked immediately.

• Quick response.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 21/33

Limitations:

• Requires newer and sophisticated technology.

• Merchants sometimes make the websites too clumsy.

• Unsuitable for certain products such as perfumes or clothes.

• Low speed internet often becomes an hindrance to online

marketing.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 22/33

INTERNET

SECURITY

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 23/33

INTERNET SECURITY

MEANING :

Internet security is a branch of computer security specifically related to

the Internet, often involving browser security but also network security

on a more general level as it applies to other applications or operating

systems on a whole.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 24/33

FUNDAMENTAL SECURITY OBJECTIVES:

Four fundamental objectives of Info Security

Confidentiality - Protection from unauthorized persons.

Integrity - consistency of data; no unauthorized creation, alteration or

destruction.

Availability - ensuring access to legitimate users.

Legitimate use - ensuring appropriate use by authorized users.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 25/33

BASIC SECURITY ATTACKS:

Intrusion - unauthorized access and use of systems.

Denial of service - an attack aimed at preventing use of company computers.

•email bomb or flooding/Internet worm.•disabled, rerouted or replaced services.

Information theft - network taps, database access,hacking into sites to give out more info or to wrong parties.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 26/33

TYPES OF SECURITY:

1. Network layer security: This can be made secure with the help of 

cryptographic methods and protocols have been developed for securingcommunications on the internet. Examples- SSL and TLS for web traffic, PGP

for email, and IPsec for the network layer security.

2. IPsec Protocol: This protocol is designed to protect communication in a

secure manner using TCP/IP. It is a set of security extensions developedby IETF, and it provides security and authentication at the IP layer by using

cryptography.

3. Electronic mail security (E-mail): It includes :

a) Pretty Good Privacy (PGP) - PGP provides confidentiality by

encrypting messages to be transmitted or data files to be stored using an

encryption algorithm such 3DES or CAST-128.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 27/33

b) Multipurpose Internet Mail Extensions (MIME) - MIME

transforms non-ASCII data at the sender's site to Network Virtual Terminal

(NVT) ASCII data and delivers it to client's Simple Mail TransferProtocol (SMTP) to be sent through the Internet. The server SMTP at the

receiver's side receives the NVT ASCII data and delivers it to MIME to be

transformed back to the original non-ASCII data.

c) Message Authentication Code - A Message Authentication

Code is a cryptography method that uses a secret key to encrypt a message.

This method outputs a MAC value that can be decrypted by the receiver, using

the same secret key used by the sender. The Message Authentication Code

protects both a message's data integrity as well as its authenticity.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 28/33

TECHNICAL SAFEGUARDS:

Security Services

Authentication (entity, data origin)

Access control (prevent unauthorized access)

Confidentiality (disclosure, encryption)

Data integrity (value of data item)

Non-repudiation (falsely denying a transaction)

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 29/33

FIREWALLS:

tools that are used to enhance the security of computers connected to anetwork, such as a Local Area Network or the Internet.

deny or accept all messages and sites based on a list that is stored in the

system.

impose restrictions on incoming and outgoing packets to and from

private networks.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 30/33

TYPES OF FIREWALLS:

1. Packet filters: Packet filters are one of several different types of 

firewalls that process network traffic on a packet-by-packet basis. Their main job is to filter traffic from a remote IP host, so a router is needed to connect

the internal network to the Internet.

2. Circuit-level gateways: The circuit-level gateway is a proxy server

that statically defines what traffic will be allowed.

3. Application-level gateways: An application-level gateway is a

proxy server operating at the TCP/IP application level. A packet is forwarded

only if a connection is established using a known protocol. 

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 31/33

FIREWALL CAPABILITIES:

Focus security decisions - single point toleverage control.

Enforce security policy - minimize exceptions.

Limit exposure - separate sensitive areas of one

network from another or outside world.

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 32/33

FIREWALL LIMITATIONS:

Can’t protect against 

malicious insiders

connections that don’t go through it 

new threatsviruses

•scans for source & destination addresses & port

numbers, not details of data

8/2/2019 E COMM PPT

http://slidepdf.com/reader/full/e-comm-ppt 33/33