Vous êtes sur la page 1sur 28

Web personalization:-

An approach to anticipate users’ needs and to provide suitable information to each of


them

Why to have web personalization?


 Amount of information is increasing
 Users can hardly digest these information
 Able to treat each user differently
 Save user’s time with valuable information

Objectives :
 to make web sites more responsive to each user’s needs.
 to provide users with information with higher quality

Methodology:-

1. User Profiling
 a process to get to know the users
 by collecting their information
 by guessing their interests/needs

Methods For Collecting User Information:-


 Manual input:
 provided by users manually
 example: demographics information

 Implicit input:
 from user’s interactions with the web site
 example: clicking and purchasing activities

Method For Guessing User’s Interest/Needs :-


 Inference
 from implicit input
 user’s interested categories
 from product’s features
 user’s requirements

2. Recommendation
 To search for suitable products
 To promote products

 Information Filtering:-
 base on user’s interests
 Example:

1
Interest: Computers, low costs

User Profile

Recommend low cost computer products

 Lack of serendipitous discovery

 Collaborative Filtering
 base on what other like-minded users like to do
 Example:
Item
1 … 50 Phone Camera
User
A
B
User A = Predicator for user B
User B = Predicator for user A

Revenue Model:-
 Describes how the firm will earn revenue, generate profits, and produce a superior
return on invested capital
 Terms financial model and revenue model often used interchangeably
 Major types:
 Advertising revenue model
 Subscription revenue model
 Transaction fee revenue model
 Sales revenue model
 Affiliate revenue model

1. Advertising Revenue Model


 Web site that offers content, services and/or products also provides a forum for
advertisements and receives fees from advertisers
 Example: Yahoo.com

2. Subscription Revenue Model


 Web site that offers users content or services charges a subscription fee for access to
some or all of its offerings
 Examples:
 Consumer Reports Online
 Yahoo! Platinum
2
3. Transaction Fee Revenue Model
 Company that receives a fee for enabling or executing a transaction
 Examples:
 eBay.com
 E-Trade.com

4. Sales Revenue Model
 Company derives revenue by selling goods, information, or services to customers
 Examples:
 Amazon.com
 LLBean.com
 Gap.com

5. Affiliate Revenue Model


 Sites that steer business to an “affiliate” receive a referral fee or percentage of the
revenue from any resulting sales
 Example:
 MyPoints.com

Competitive Intelligence (CI):-


 Competitive Intelligence: A systematic and ethical program for gathering,
analyzing, and managing external information that can affect your company's
plans, decisions, and operations.

Categories of Competitive Intelligence


 Market Intelligencezz
• Industry level information on
 Trends

3
 Government regulations
 Geopolitical issues
 Partner Intelligence
• Monitoring activities of
 Company’s major suppliers
 Strategic partners
 Competitor Intelligence
• Detailed monitoring & analysis of
 Key competitors
 High-level scans of other competitors
 Ongoing identification of new entrants
 Technical Intelligence
• Monitoring advancements of
 Technical developments
 Customer/Prospect Intelligence
• Determining & monitoring
 Key internal influences
 Budget cycles
 Key focus areas

IP Spoofing – Basic Overview


 Basically, IP spoofing is lying about an IP address.
 Normally, the source address is incorrect.
 Lying about the source address lets an attacker assume a new identity.
 Because the source address is not the same as the attacker’s address, any replies
generated by the destination will not be sent to the attacker.
 Attacker must have an alternate way to spy on traffic/predict responses.
 To maintain a connection, Attacker must adhere to protocol requirements
 Difficulties for attacker:
 TCP sequence numbers
 One way communication
 Adherence to protocols for other layers

4
3. RESET – Umm.. I
have no idea why you
are talking to me

2. SYN ACK – Sure,


what do you want to
Sucker - Alice talk about? Victim - Bob

1. SYN –
Let’s have a
4. No connection –
conversation
Guess I need to take Bob
out of the picture…

Attacker - Eve

Chaffing :-

 Chaffing -> adding fake packets with bogus MACs. MAC based on sequence number
and message.
 Winnowing -> discarding packets with bogus MACs

1, Hi Bob, 462312
2, Meet me at, 782290
3, 7 PM, 238291

,
4, Love Alice 839128

1, Hi Bob, 462312
1, Hi Larry, 388231
2, I’ll call you at, 562381
2, Meet me at, 782290
3, 7 PM, 238291
3, 6 PM, 823911
4, Yours Sue, 728377
4, Love Alice, 839128

 Wheat - Good packets


 Chaff - Bad packets
 Security depends on difficulty (for the adversary) of distinguishing the chaff from
the wheat

5
 Chaffing will normally add at least one chaff packet for each wheat packet.

S/MIME (Secure / Multipurpose Internet Mail Extension ):-


 Secure / Multipurpose Internet Mail Extension
 a security enhancement to MIME
 provides similar services to PGP
 based on technology from RSA Security
 industry standard for commercial and organizational use
 RFC 2630, 2632, 2633

MIME
 defines new message header fields
 defines a number of content formats (standardizing representation of multimedia
contents)
 defines transfer encodings that protects the content from alteration by the mail system

MIME - New header fields


 MIME-Version
 Content-Type
– describes the data contained in the body
– receiving agent can pick an appropriate method to represent the content
 Content-Transfer-Encoding
– indicates the type of the transformation that has been used to represent the
body of the message
 Content-ID
 Content-Description
– description of the object in the body of the message
– useful when content is not readable (e.g., audio data)

MIME – Content types and subtypes


 text/plain, text/enriched
 image/jpeg, image/gif
 video/mpeg
 audio/basic
 application/postscript, application/octet-stream
 multipart/mixed, multipart/parallel, multipart/alternative, multipart/digest (each part
is message/rfc822)
 message/rfc822, message/partial, message/external-body

MIME – Transfer encodings


 7bit
– short lines of ASCII characters
 8bit
– short lines of non-ASCII characters
 binary
– non-ASCII characters
– lines are not necessarily short

6
 quoted-printable
– non-ASCII characters are converted into hexa numbers (e.g., =EF)
 base64 (radix 64)
– 3 8-bit blocks into 4 6-bit blocks
 x-token
– non-standard encoding

S/MIME services
 enveloped data (application/pkcs7-mime; smime-type = enveloped-data)
– standard digital envelop
 signed data (application/pkcs7-mime; smime-type = signed-data)
– standard digital signature (“hash and sign”)
– content + signature is encoded using base64 encoding
 clear-signed data (multipart/signed)
– standard digital signature
– only the signature is encoded using base64
– recipient without S/MIME capability can read the message but cannot verify
the signature
 signed and enveloped data
– signed and encrypted entities may be nested in any order

PGP (Pretty Good Privacy):-


 PGP - Pretty Good Privacy
 general purpose application to protect (encrypt and/or sign) files
 can be used to protect e-mail messages
 can be used by corporations as well as individuals
 based on strong cryptographic algorithms (IDEA, RSA, SHA-1)
 first version developed by Phil Zimmermann
 PGP is now on an Internet standards track (RFC 3156)

PGP services
 messages
– authentication
– confidentiality
– compression
– e-mail compatibility
– segmentation and reassembly

 key management
– generation, distribution, and revocation of public/private keys
– generation and transport of session keys and IVs

Message authentication
 based on digital signatures
 supported algorithms: RSA/SHA and DSS/SHA

7
Ksnd -1

sender
m h σ
hash enc

m h h σ
hash compare dec
ce

er
re

iv

Ksnd
accept / reject

Message confidentiality
 symmetric key encryption in CFB mode with a random session key and IV
 session key and IV is encrypted with the public key of the receiver
 supported algorithms:
– symmetric: CAST, IDEA, 3DES
– asymmetric: RSA, ElGamal
m
prng Krcv
{k, iv}Krcv
sender

s.enc a.enc
k, iv

{m}k

Compression
 applied after the signature
– enough to store clear message and signature for later verification
– it would be possible to dynamically compress messages before signature
verification, but …
– then all PGP implementations should use the same compression algorithm
– however, different PGP versions use slightly different compression algorithms
 applied before encryption
– compression reduces redundancy ® makes cryptanalysis harder

8
 supported algorithm: ZIP

The Resource Description Framework (RDF):-


The Problems:
• Too much Web information
o around 1,000,000,000 (1× 109) resources
o Many different types of resources
♦ text, images, graphics,
♦ audio, video, multimedia,
♦ databases, Web applications, …
♦ resource metadata (pointers to media servers)
• Information not indexable
o No common “scheme” for doing so
o Short-lived, dynamic resources
o Differing relationships between authors, publishers, info intermediaries, users
♦ Each community uses their own approach
• Information not shareable
o Difficult to share information
o Difficult to share information about information
♦ no common cataloging schemes

• Metadata
o Information about information
o Structured data about data

• Many types/forms of metadata, dependent on role:


» Web Resource discovery
» Content rating
» Product & Services description
» Document management administration
» Security & User authentication
» Database / Data schemas
» Intellectual property rights management
» Archival information / status
» Process description & control

• Language for expressing metadata.


• Must be:
o universal (so all can understand)
o flexible (to incorporate different types)
o extensible (flexible to custom types)
o simple (to encourage adoption)
o modular (so that schemes can be mixed, extended)

• Shared Metadata Architectures:

9
o To share names, and meanings (shared semantics)

Market Research for E-Commerce:-


 The goal of market research is to find information and knowledge that describes the
relationships among consumers, products, marketing methods, and marketers.
 Questionnaires
 Telephone Surveys
 Focus Groups
 Market Segmentation
 The process of dividing a consumer market into logical groups for conducting
marketing research, advertising, and sales.
 Segmenting options
 Geography
 Demographics
 Psychographics
 Benefits sought
 How its done
 Data modeling and warehousing
 Data and web mining
 Conducting Online Market Research
 What are we looking for in EC Market Research?
 Analyze personal profiles to explain and predict online buying
behavior.
 Typical Questions
 What are the purchase patterns for individuals and groups?
 What factors encourage online purchasing?
 How can we distinguish real buyers from browsers?
 How do individuals navigate?
 What is the optimal web page design?

 Online Market Research Methods


 Web-based surveys
 Online focus groups
 Hearing directly from customers
 Customer scenarios
 Tracking customer movements
 Transaction logs
 Clickstream behavior
 Cookies
 Web bugs
 Spyware

 Limitations of Online Market Research


 Having too much data
 Accuracy of responses
 Equipment failure

10
 Ethics and legality of web tracking
 Truly representative samples

Web Transaction Logs :-


 Built into Web server software
 Records user activity at a Web site
 WebTrends a leading log analysis tool
 Can provide treasure trove of marketing information, particularly when combined
with:
 Registration forms – used to gather personal data
 Shopping cart database – captures all item selection, purchase and payment
data

Cookies :-
 Cookies: small text file that Web sites place on a visitor’s client computer every time
they visit, and during the visit as specific pages are accessed.
 Cookies provide Web marketers with a very quick means of identifying the customer
and understanding his or her prior behavior
 Location of cookie files on computer depends on browser version

Web Bugs :-
 Tiny (1 pixel) graphic files embedded in e-mail messages and on Web sites

11
 Used to automatically transmit information about the user and the page being viewed
to a monitoring server
e-Tendering :-
• E Tendering is a process of carrying out entire Tendering Cycle Online including
submission of Price Bid such that Efficiency, Economy, Speed of Internet can be
harnessed.
• E Tendering Cycle can be broken in Key Modules

1) Tender Notice Creation 7) Tender Storage & Opening


2) Tender Promotion 8) Tender Evaluation
3) Tender Document 9) Negotiation
4) Pre Bid Meeting 10) Tender Award
5) Bid Submission 11) Vendor Registration & Rating
6) Payment Gateway 12) Tender Audit & Storage
Benefits of Tendering Authority
• Completely Automated Process
• Shortens Procurement Cycle
• Economical and Environment Friendly
• Greater Transparency
• Improvement in work culture in the departments
• System aided Evaluation process
• On the fly reports/comparatives statement
• Minimize Human errors
• Minimal Storage Spaces
• Change in Perception – Progressive Organization
• Lesser hassle of communication and administration

Benefits to Suppliers/Contractors
• Anytime & Anywhere Bidding
• Fair, Free and Fearless participation for vendors.
• No dependence on Newspaper, Courier, Banks,…
• Zero Administrative hassles
• Can carry out all activities from any computer
• Economical – saving on Traveling cost
• Reduces efforts & cost of bidding
• No tenders can be missed because of distance
• Can submit bid on last minute

Manual Vs E Tendering System

Manual Tendering System


• Longer Procurement Cycle
• Expensive
• Paper Based Procurement
• Restricted Mobility
• No work on Holidays
• Prone to Human errors

12
• Content not sharable
• Physical Security
• Wastage of space to store bids
• Not retrievable
• Ideal till 2003

E - Tendering System
• Shorter Procurement Cycle
• Economical – Fixed Cost
• Environmentally Friendly
• Anytime – Anywhere Bidding
• Bidding possible on Holidays
• Automated & Accurate process
• Shareable Content
• Foolproof Security
• Lifelong storage on CD
• One click access to bids
• For year 2004 & Beyond

Ease of e-Tendering –Tender Cycle


e-Tendering involves following phases as per convential tendering systems.

• Phase 1: Pre Tendering Activities


• Phase 2: Tendering Cycle
• Phase 3: Post Tendering Activities

Fundamentals of Dynamic Pricing and E-Auctions


 auction
Market mechanism by which buyers make bids and sellers place offers; characterized
by the competitive and dynamic nature by which the final price is reached
 electronic auctions (e-auctions)
Auctions conducted online

 dynamic pricing
Fluctuating prices that are determined based on supply and demand relationships at
any given time

13
 One Buyer, One Seller
 One Seller, Many Potential Buyers
 forward auction
An auction in which a seller offers a product to many potential buyers
 sealed-bid auction
Auction in which each bidder bids only once; a silent auction, in which bidders do not
know who is placing bids or what the bid prices are
 Vickrey auction
Auction in which the highest bidder wins but pays only the second highest bid

 One Buyer, Many Potential Sellers


 reverse auction
Auction in which the buyer places an item for bid (tender) on a request for quote
(RFQ) system; potential suppliers bid on the job, with bid price reducing sequentially, and the
lowest bid wins; used mainly in B2B and G2B e-commerce
 “name-your-own-price” model
Auction model in which would-be buyers specify the price (and other terms) they
are willing to pay to any willing seller; a C2B model pioneered by Priceline.com

 Many Sellers, Many Buyers


 vertical auction
Auction that takes place between sellers and buyers in one industry or for one
commodity
 auction vortals
Another name for a vertical auction vertical portal

 Benefits of E-Auctions
 Benefits to sellers
 Larger reach and increased revenues
 Optimal price setting
 Removal of expensive intermediaries

14
 Liquidation
 Lower transaction costs
 Lower administrative costs
 Better customer relationships

 Benefits to buyers
 Opportunities to Find Unique Items and Collectibles
 Lower prices
 Anonymity
 Convenience
 Entertainment

 Benefits to E-Auctioneers
 Higher repeat purchases
 A stickier Web site
 Expansion of the auction business

 Limitations of E-Auctions
 Possibility of fraud
 Limited participation
 Security
 Auction software
 Long cycle time
 Monitoring time
 Equipment for buyers
 Order fulfillment costs

 Double Auctions
 single auction
Auction in which at least one side of the market consists of a single entity (a single
buyer or a single seller)
 double auction
Auction in which multiple buyers and sellers may be making bids and offers
simultaneously; buyers and their bidding prices and sellers and their asking prices are
matched, considering the quantities on both sides

E-Auction Fraud and Its Prevention


 Types of E-Auction Fraud
 bid shielding
Having phantom bidders bid at a very high price when an auction begins; they pull
out at the last minute, and the real bidder who bid a much lower price wins
 shilling
Placing fake bids on auction items to artificially jack up the bidding price
 Fake photos and misleading descriptions
 Improper grading techniques
 Bid siphoning
 Selling reproductions as originals

15
 Failure to pay
 Failure to pay the auction house
 High shipping costs and handling fees
 Failure to ship merchandise
 Loss and damage claims
 Fake escrow services
 Switch and return
 Other frauds

Protecting against E-Auction Fraud


 User identity verification
 Authentication service
 Grading services
 Feedback forum
 Insurance policy
 Escrow services
 Nonpayment punishment
 Appraisal services
 Physical inspection
 Item verification
 Buyer protections
 Spoof (fraudulent) Web site protection
 eBay security center

E-Supply Chains :-
• Definitions and Concepts
supply chain
The flow of materials, information, money, and services from raw material suppliers
through factories and warehouses to the end customers
e-supply chain
A supply chain that is managed electronically, usually with Web technologies

• Supply Chain Parts


– Upstream supply chain
– Internal supply chain
– Downstream supply chain

• Managing Supply Chains


– Managing supply chains can be difficult due to the need to coordinate:
• Several business partners
• Several internal corporate departments
• Numerous business processes
• Possibly many customers
• Information technology provides two types of software solutions:
1. SCM
2. ERP and its predecessors MRP and MRP II

• Managing e-Supply Chains

16
e-supply chain management (e-SCM)
The collaborative use of technology to improve the operations of supply chain
activities as well as the management of supply chains
– The success of an e-supply chain depends on:
• The ability of all supply chain partners to view partner collaboration as
a strategic asset
• Information visibility along the entire supply chain
• Speed, cost, quality, and customer service
• Integrating the supply chain more tightly

– Activities and Infrastructure of e-SCM


– Supply chain replenishment
– E-procurement
– Supply chain monitoring and control using RFID
– Collaborative planning
– Collaborative design and product development
– E-logistics
– Use of B2B exchanges and supply webs

– Infrastructure for e-SCM


– Electronic Data Interchange (EDI)
– Extranets
– Intranets
– Corporate portals
– Workflow systems and tools
– Groupware and other collaborative tools

• Typical Problems along the Supply Chain


– Supply chains can be very long, involving many internal and external partners
located in different places
– Both materials and information must flow among several entities, and these
transfers, especially when manually handled, can be slow and error-prone
– Companies can improve their demand forecasting by using IT-supported
forecasts, which are done in collaboration with business
– A lack of logistics infrastructure exacerbates uncertainties that exist in
delivery times
– Quality problems with materials and parts can contribute to deficiencies in the
supply chain
– Pure EC companies are likely to have more supply chain problems because
they do not have a logistics infrastructure and are forced to use external
logistics services
– Other problems along the EC supply chain mainly stem from the need to
coordinate several activities and internal units and business partners

Bullwhip effect
Erratic shifts in orders up and down supply chains

• The Need for Information Sharing along the Supply Chain


– A supply chain includes the flow of information to and from all participating
entities

17
– It includes:
• Product pricing
• Inventory
• Shipping status
• Credit and financial information
• Technology news

• EC Solutions along the Supply Chain


– Order taking can be done over the Internet, EDI, EDI/Internet, or an extranet,
and may be fully automated
– Order fulfillment can become instant if the products can be digitized
– Electronic payments can expedite both the order fulfillment cycle and the
payment delivery period
– Managing risk to avoid supply-chain breakdown can be done in several ways
– Inventories can be minimized by introducing a build-to-order (on-demand)
manufacturing process as well as by providing fast and accurate information to
suppliers
– Collaborative commerce among members of the supply chain can be done in
many areas

EDI :-
EDI is sometimes called paperless trading. It is used for trade transactions such as orders and
invoices.

More formally it can be defined as:

The transfer of structured data, by agreed message standards,from one computer system to
another,by electronic means.

EDI is used for the transfer of structured data.


This means formal documents such as an order.
The order consists of an order header, specifying:
 Customer possibly using a Customer No.
 Supplier possibly using a Supplier No.
 Order Number, etc.
Order lines specifying:
 Product possibly using a Product Code
 Quantity.
Codes increase precision and reduce the volume of data.

EDI agreed message standards are system and machine independent.


Examples of EDI standards are:

 Tradercoms: a UK standard for general merchandise.


 Odette: a European standard used by the vehicle assemblers.
 ANSI X12: a general American standard.
 EDIFACT: the United Nations international standard for all trade sectors.

18
- EDI messages are sent from one computer system to another without the need for -manual
intervention.
- Some small suppliers may not have fully automated systems and could simply print out the
EDI order.
- EDI will also be used for other trade transactions such as delivery note, invoice and
payment.

EDI messages are sent by electronic means:


 Direct (dial-up) connection.
 Internet.
 Value added data service (VADS / VAN).
The VADS provides:
 Time independence.
 Protocol independence.
Using a post and forward network.

EDI software:

 Translate transaction into the EDI format and transmit into the network.
 Interrogate the network for any EDI messages, retrieve them and then translate for the
application.
The normal approach is to buy EDI software.
Interfacing an application to EDI is normally a sizeable (and hence expensive) undertaking.

EDI agreement specifying:

 The EDI standards to be used.


 The codes to be used for products, customers, suppliers, etc.
 The network to be used.
 The frequency of the interchange
 How any disputes are to be resolved.

The EDI trading system:

19
Customer Supplier

Stock EDI EDI Order


Control / Software Software Processing
Replenish
System
ment
System

EDI Agreement

Large EDI Users include:

 Multiple retailers, e.g. supermarkets.


 Assembly manufacturers, e.g. car makers.

Other users are diverse, examples are:

 Inland Revenue.
 Dentists claiming NHS fees.

EDI Advantages:

 Speed of transaction.
 Error reduction – no keying errors.
 Cost cutting – no data entry staff.
 Reduced stock holding – just-in-time
 Business opportunities.
 Cash flow – quicker payment of invoices.

Click stream Analysis:-


Click stream analysis is the record of an individual’s movement through time at a web site.

What click streams reveal to businesses about their customers?


 Reveals path taken; number of clicks to get to destination

 Advertisements analysis; click-through

 Shopping cart analysis; sequences of items bought or abandoned.

Credit card laundering:-


No merchant may present to or deposit into a credit card system for payment, or cause
another person to present to or deposit into a credit card system for payment, any credit card
sales draft generated by a telephone transaction that is not a sale by that merchant to the
holder of that credit card.

20
Deep linking :-
 Hyper linking is linking from one site or location to another.
 Deep linking is linking from one web site to another website by means of a hyperlink
to a web page other than the home page.
 Shallow linking is a link or pointer to an index or home page.

Introduction to FireWire:-
• FireWire is the Apple trademark for the IEEE 1394 standard
• Sony refers to their implementation as i.Link
• It is the industry standard for high-performance device connections

History of FireWire
• Introduced by Apple in 1995 as IEEE 1394-1995
• In 2000, the standard received minor revisions and was renamed 1394a
• In 2002, the standard received major revisions and was renamed 1394b

Advantages of FireWire
• Device communication is peer-to-peer
• A “root node” is elected by all the devices on a bus
• The root node coordinates all activities on the bus
• A new root node is chosen within 300 microseconds of any addition or removal of a
device from the bus

Advantages over USB


• No host computer is required, as all devices are capable of serving as the root node
• FireWire is more efficient at utilizing the bus, and therefore faster than USB
• FireWire can use multiple cable types

Uses of FireWire
• Digital multimedia (audio and video)
• Other uses:
– Printers
– Scanners
– External hard drives
– Optical disk writers (CD/DVD±R/RW)
– Video game consoles

Push Vs Pull :-
 Push technology is a set of technologies used to send information to a client without
the client requesting it
 Push versus Pull
 Pull technology is based on the traditional request/reply model. It requires
that users know a priori where and when to look for data. It suffers from
transmission latency and duplicate data traffic.
21
 Push technology allows users to get information as soon as it become
available and users do not have any knowledge about virtual information
servers. This transfer of control from users to providers is a potential
problem.
 Focus is on Multicast-base push protocols
 Multicasting is a 1-to-n form of communication for transmitting packets from one
host to a set of member hosts in the same group

Document and Content Management System :-


• DMS and CMS are two types of systems that are very different, and serve
complementary needs.

Content Management System Document Management System


CMS is more recent, primarily designed to DMS is certainly the older discipline, born out of
meet the growing needs of the website and the need to manage huge numbers of documents
intranet markets. in organisations.
can't build a website with just a DM system
Manages small, interconnected units of Focused on managing documents, in the
information (eg. web pages) traditional sense (like Word files)
Each unit (page) is defined by its location Each unit of information (document) is fairly
on the site large, and self-contained
Extensive cross-linking between pages There are few (if any) links between documents

focused primarily on page creation and focused primarily on storage and archiving
editing
provides a very powerful publishing engine limited web publishing engine typically produces
(templates, scripting, etc) one page for each document

Blogs :-
A blog / weblog is
 A web page containing brief entries arranged chronologically
 Can be like
 A journal or diary
 A ‘What’s New’ page
 A page of interesting links
 They have been called personal web publishing communities*
 Weblogs don’t stand alone
 Relate / link to other blogs and the world
 Connect people together with a common interest

Terminology :-
 Blogger – person who maintains a blog
 Blogging – the act of creating a blog
 Blogrolling – moving from blog to blog

22
 Blogorrhea – hundreds of posts per day about anything

Why was there such an explosion?


 2000-2006
 “Push button publishing”
 No need to know HTML
 No need to know FTP
 Add / edit content anywhere, anytime
 Dozens of features – dynamic, quick and easy to develop

Why have library Blogs?


 Easy to publish
 Simple from an IT standpoint
 Help solve real problems:
 Email overload
 Personal knowledge management
 Discover/uncover expertise
 Information discovery
 Collaborate
 Keep up professionally

How easy is it to publish?


1. Login
2. Type your entry
3. Publish it!

E-Procurement :-
 Using internet or intranet based information systems software to coordinate the
buying, shipping, inventory management, supplier selection, and approval process of
vital business acquisitions within the organizations core competency.

 Purchasing Process - Preliminary Actions


 Need/Specification Identification
 Supplier Selection
 Terms Negotiation
 Regulations

 Purchasing Process - Buying Process


 Purchase Order Delivery Process
 Purchase Order Receipt Process
 Order Fill Timing
 Order Accuracy
 Order Receipt
 Order Inspection
 Order Payment Process

 Purchasing Process - Concluding Actions

23
 Order Record Storage & Organization
 Order Reviews
 Benchmarking
 Comparative Analysis

 Software Tool
 Preliminary Actions
 Coordinates inventory management systems with purchasing systems.
 Coordinates new business ventures with purchasing systems.
 Creates List of Needed Items (Inputs)
 Archives that List

 Preliminary Actions
 Maintains Record of Suppliers
 Maintains Record of Supplier Profiles
 Maintains Record of Supplier Capabilities
 Maintains Record of Negotiated Prices
 Maintains Record of Negotiated Terms
 Maintains Record of Contracted Limitations

 Buying Actions
 Sends Purchase Order Delivery directly to Supplier
 Maintains Real-time Order Status
 Records Order Delivery timing
 Records Order Accuracy
 Records Order Inspection Data
 Submits Payment Request
 Coordinates Payment Approval Process

 Concluding Actions:
 Sends Electronic Receipts to suppliers, archives, managers
 Maintains on-demand records for order reviews
 Allows reports and analyses for benchmarking
 Facilitates comparative and costs analyses

 Benefits
 Streamlines procurement process
 Increases communication
 Increases procurement speed
 Eliminates non-value added personnel
 Reduces DEAD time
 Provides records
 Produces reports
 Facilitates improvements

 Detriments

24
 Limits flexibility for extensive notations
 Poor performance for exception items

Digital Divide :-
 The gap in:
 Information communication technology
 The Internet use
 The gap between various:
 Income
 Age
 Gender
 Ethnicity
 Language
 Geography
 Family, company size

 Result:
 Less access
 Lack of information
 Impact
 Business
 Science
 Education
 Slowing down of the society
Online Advertising :-
 Paid message on a Web site, online service or other interactive medium, such as
interactive messaging
 Advantages:
 Ability to target ads to narrow segments and track performance in almost real
time
 Provide greater opportunity for interactivity
 Disadvantages:
 Concerns about cost versus benefit
 Concerns about how to adequately measure results

Forms of Online Advertisements


 Banners, pop-ups and rich media ads
 Search engine marketing: Paid search engine inclusion and placement
 Sponsorships
 Affiliate relationships

Banners, Pop-ups and Rich Media Ads :-


 Banners: Display promotional message in a rectangular box at top or bottom of
computer screen
 Pop-ups: Appear on screen without user calling for them

25
 Pop-unders: Open underneath user’s active browser window and do not appear until
user closes active window
 Rich media ads: Employ Flash, DHTML, Java, streaming audio and/or video
 Interstitials: Provide way of placing a full-page message between current and
destination pages of user
 Superstitials: Rich media ad that is pre-loaded into browser’s cache and does not
play until fully loaded and user clicks to another page

Online Advertising Placement Methods


 Banner swapping: Arrangements among firms allow each firm to have its banners
displayed on other affiliate sites for no cost
 Banner exchanges: Arrange for banner swapping among firms
 Advertising networks: Act as brokers between advertisers and publishers, placing
ads and tracking all activity related to the ad
Search Engine Marketing: Paid Search Engine Inclusion and Placement
 Search engine marketing one of fastest growing and most effective forms of online
marketing communications
 Paid inclusion – firms pay for inclusion in search engine index
 Paid placement – firms pay for a guarantee that it will appear prominently in results of
relevant searches
 Overture.com and Google leaders in this technology
 Appropriate disclosure of paid inclusion and placement practices an issue

Sponsorships and Affiliate Marketing


 Sponsorship: Paid effort to tie an advertiser’s name to particular information, event,
venue in way that reinforces brand in a positive, yet not overtly commercial manner
 Advertorial a common form
 Affiliate relationship: Permits a firm to put its logo or banner ad on another firm’s
Web site from which users of that site can click through to the affiliate’s site
 Sometimes called tenancy deals
 Amazon/ToysRUs an example
 Customer hijacking an issue

Direct E-mail Marketing and the Spam Explosion


 Direct e-mail marketing: E-mail marketing messages sent directly to interested
consumers who “opt-in” or have not “opted-out”
 Spam: Unsolicited commercial e-mail
 Spam is exploding out of control – March 2003, 45% of all Internet e-mail
purportedly was spam
 Efforts to control spam:
 Filtering software (only partly effective)
 Self-regulation by industry (ineffective)
 Government regulation (no Federal legislation yet)

Other Forms of Online Marketing Communications


 Online catalog: Provide equivalent of paper-based catalog
 Online chat: Provides equivalent of help from sales representative

26
 Public relations: Involves communicating with target audiences, or publics, using
methods other than advertising

Viral Marketing :-
• Online advertising that propagates itself and spreads rapidly through social network
groups.
• Spreads like a virus each new contact point can spread to multiple contacts

• Viral Marketing Goals:


• Minimum input for maximum output
• Increases in brand awareness
• Increase interested in company
• Increase victors to company website
• INCREASE PROFITS

• Viral Marketing Strategy:


• Takes advantage of others resources
• Use pre-existing social networks
• Exploits common motivations and behaviors

E-mail marketing evolution

Simple versus Multi-tiered Web Site Architecture :-


 System architecture: refers to the arrangement of software, machinery, and tasks in
an information system needed to achieve a specific functionality
 Two-tier architecture: Web server responds to requests for Web pages and a
database server provides backend data storage
 Multi-tier architecture: Web server is linked to a middle-tier layer that typically
includes a series of application servers that perform specific tasks, as well as to a
backend layer of existing corporate systems

E-commerce Architecture:-

27
28

Vous aimerez peut-être aussi