CIS8100 Assignment - Development of the Website for ERT Company

Verified

Added on  2022/08/19

|18
|5186
|14
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CIS8100 ASSIGNMENT 3
CIS8100 ASSIGNMENT 3
Name of student
Name of university
Author’s note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
CIS8100 ASSIGNMENT 3
Executive summary
This report intends to analyse the development of the website for ERT Company that would
help the company to provide increased products and services to the customers. The
considered company, ERT photography is a photography service company. The company
sells photoshoots and print packages on the internet. The company provides the services of
photoshoot to the people and presently, with the introduction of the eCommerce in the
market, the company has decided to create a website that would help in gaining bookings of
photoshoot easily and provide various services to customers easily.
Document Page
2
CIS8100 ASSIGNMENT 3
Table of Contents
Introduction....................................................................................................................3
Implementation plan.......................................................................................................3
Social marketing campaign............................................................................................5
Privacy in Social Networks............................................................................................8
Challenges in Online Retail.........................................................................................10
Recommendations........................................................................................................12
Conclusion....................................................................................................................12
References....................................................................................................................14
Document Page
3
CIS8100 ASSIGNMENT 3
Introduction
In the present times, the introduction of the online business is rapidly changing the
business style. The eCommerce could also be considered as the electronic commerce that
deals with the procuring as well as selling the goods or services using internet platform as
well as transfer of significant amount of data and money for executing the transactions. The
considered company, ERT photography is a photography service company. The company
sells photoshoots and print packages on the internet. The company provides the services of
photoshoot to the people and presently, with the introduction of the eCommerce in the
market, the company has decided to create a website that would help in gaining bookings of
photoshoot easily and provide various services to customers easily.
Implementation plan
Software Development Life Cycle could be described as the procedure that is
presently used by major software industry for designing, developing as well as testing the
high quality systems (Rao, Kumar and Reddy 2018). SDLC mainly aims to offer the high
quality software that effectively meets or even exceeds the expectations of the customers,
reaches the completion within the allocated time and the cost prediction. SDLC could be also
considered as the procedure that is efficiently followed for any software project, within any
software organisation. It comprises of the detailed plan on the methods of describing the
development, maintenance, replacement and the modification or improvement of any
particular software. The life cycle mainly defines the methodology for the improvement of
quality of the software as well as the complete development procedure (Chauhan, Rana and
Sharma 2017). There are five major stages in the SDLC and are as follows:
System analysis: In this phase, all the requirement of the system are analysed and this
stage has been considered as the most crucial stage in the SDLC. It is mainly executed by

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
CIS8100 ASSIGNMENT 3
senior members of project team with the inputs from various customers, sales department, the
market surveys as well as the domain experts within that particular industry (Selvarani and
Sankar 2016). The utilisation of information is done for planning the fundamental approach
of the project and for conducting the product feasibility study within the economical,
technical as well as the operational basis. When the analysis of all the requirement is done,
the next stage includes the clear defining as well as the documentation of the product
requirements and then gain the approval from customers or market analysis (Akbar et al.
2017). In the project of ERT company where a website is being developed, this stage would
include analysis of all the basic requirements of the customers from the website and analyse
what aspects of the websites makes it appealing and relatively easy to use (Woods 2019).
System design: In this stage, the SRS is referred and then the most appropriate
architecture for system is determined. On the basis of all the requirements that is specified in
the SRS, commonly more than one approach of designing is determined for the system
architecture and it is proposed as well as documented in the DDS (Design Document
Specification). The crucial stakeholders then review the DDS and then based on the several
parameters such as the risk assessment, design modularity, budget and the time constraints,
the most suitable design is chosen for the website (Ibrahim, Johar and Rahman 2018). In the
website project of ERT company, the development of DDS would be done in this stage and
the most appropriate architecture for the website is determined.
System development: With the specified architecture in the previous stage, the
developers then initiate the system development. The developers are required to adhere to the
coding guidelines that have been defined by the organisation as well as the programming
tools such as the compilers, debuggers, interpreters, for generating the code (Harris 2019).
The various high level programming language like the C, C++, PHP and Java are mainly used
for the coding stage. The selection of the programming language is done with the respect to
Document Page
5
CIS8100 ASSIGNMENT 3
the various kinds of software that are being developed. In this stage of the website project, the
coding of the website is initiated by the developers and appropriate tools are used for
developing the website according to the requirements (Arora and Arora 2016).
System testing: This stage could be considered as the subset of each of the stages that
are used in the present models of SDLC because the activities of testing is extensively
included in majority of all stages of the SDLC. Moreover, this step mainly refers to testing
only stage of product where the defects discovered in the product are reported, tracked
effectively, fixed and then again retested. This stage of testing and fixing issues is done till
the complete system reaches all the quality standards that have been defined in the SRS. In
this stage of the website project of ERT company, the website is provided to a group of test
users and then any reported issues are fixed and again retested (Zenita and Fiati 2019).
Maintenance of system: As soon as the testing of the product is completed, the system
is deployed in the appropriate market. In some situations, the deployment of the product is
done in various stages according the business strategy of the organisation. Then on the basis
of the gained feedback, the release of the product is done as it has been developed or with
recommended enhancements in the targeting of market segments. In the website project of
ERT company, the deployment of the website is done on the internet and based on the
feedbacks gained from the various users, constant improvements are done (Sakthivel 2017).
Social marketing campaign
The social marketing process is the series of the five major stages, which are the fan
acquisition, engagement, amplification, community, and ultimately brand strength or the
sales.
Fan acquisition: The aspect of fan acquisition on the ongoing social media platform
could be considered as the basic component for the social media marketing. It helps in
Document Page
6
CIS8100 ASSIGNMENT 3
expanding the viral potential of the message, increases lifetime connections to the interested
audience members and expedite the social media marketing Return on Investment (Domegan
et al. 2019). The fan acquisition helps in increasing the virality and the reach of the messages
of social media marketing. The expansion of the fan bae with the help of the social media is
considered as the important component of the social media marketing. The fan acquisition
could be considered as the cornerstone of the businesses seeking the new clients and the
customers. The fan acquisition campaigns must emphasise on the quality and the not on the
quantity. The website of ERT company could assist with the fan acquisition by displaying
various messages on the website that attracts the customers.
Engagement: The social media engagement mainly measures the likes, shares and the
comments of the public for the social media efforts of the online businesses (Key and
Czaplewski 2017). The most popular social media platforms that are used in the present times
for social media engagement are the Facebook, Twitter and Instagram. Each of the platform
possesses their respective mechanisms for the users to effectively express their appreciation
for the individual posts as well as the posters that are efficiently measured distinctly across
each of the platforms. It has been observed that the companies gain huge engagement by the
methods of partnership with other companies, offering value to customers, and covering all
the bases of social media. The website of ERT company could produce the appealing content
for popular social media sites and then integrate the content with the social media platforms
(Mulderrig 2017). It would allow the users to visit the website to gain increased users by
allowing them to travel within the websites.
Amplification: The social media amplification could be referred as the huge topic
sector within the inbound marketing. When this task is executed accurately, it could boot the
message of the company significantly. Over the recent some years, there have been several
researches exploring the several components of the digital content marketing strategy with

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
CIS8100 ASSIGNMENT 3
the help of several blog series (Sampogna et al. 2017). The amplification of the message
through the social media mainly implies the promotion of the brand with the help of
respective channels. The amplification of message is not completely done until it is able to
pick up as well as carried message on social media. The website could execute this task by
engaging in several kinds of conversation with the users and displaying all the information
regarding the conversations that have been done with other users. The social marketing
channels could be linked with the website that would allow having conversations on the
website easily (Salazar, Mills and Veríssimo 2019).
Community: While the consumers are presently using the social media platform such
as the Twitter and Facebook for over a decade, the brands are only beginning to catch on
recent years and then realise the complete potential of the social media to execute marketing.
The social media not solely makes the improved knowledge of the people, but it also provides
significantly huge amount of amazing opportunities to the businesses regardless of their size.
Rather than using the social networks only for the marketing purposes for the advertisement
of products, the companies could presently utilise the social media for developing the
improved customer experience and develop extensive engagement (Holston et al. 2019). The
ability of connecting as well as communicating using direct line with the target audience
permits the brands in developing the robust fan base as well as develop their community. The
website of ERT company could make the communities in the website by allowing more and
more people to visit the website and recommend them to engage in discussions with other
users. It would create the community.
Brand strength: The social media marketing could provide significantly huge amount
of benefits to the brand by increasing the brand awareness, develop the brand community,
nurture the brand champions, and expressing the brand leadership. The social media platform
could provide the required voice for communicating to the huge amount of customers as well
Document Page
8
CIS8100 ASSIGNMENT 3
as the potential customers that could not be done without the social media platform. The
social media applications and platforms helps in encouraging the two method communication
with the potential customers and the customers by actively engaging with the customers that
would help in discovering the requirements and desires of the customers. The brand strength
of the ERT company could be increased with the help of the website by allowing more and
more people to come online and easily make the bookings of photoshoot. All the details of
the services provided by the company would be provided in the website and the customers
could also view the products that are presently available in the company.
Privacy in Social Networks
In the social networking platforms, like the Twitter, Facebook and Instagram, there is
a significant threat of privacy and security issues that could affect the users adversely.
Majority of the users of social network shares the large quantity of the private information in
the space of their social network (Aghasian et al. 2017). This information could range from
the demographic information, comments, contact information, videos and the images. In
some situations, the users may publish the information publicly deprived of any careful
consideration. Therefore, the social networks are becoming the large source of critical data of
the users. However, the users of social networks tends in having the significantly high stage
of trust towards the other users of social media. It has been discovered that the friend requests
are accepted easily, and easily trust any attachment that has been sent by the friends of users.
As the large population and the huge information base of the social networks, along with the
simple accessibility, the websites of social networks are presently becoming the new targets
that efficiently targets the cyber criminals (Yu et al. 2018). The sensitive data could be
exploited by the cyber criminals along with the chain of connection majorly with the help of
social engineering as well as the reverse social engineering. The main intention of these two
processes are obtaining the context information of the users, which is the information that is
Document Page
9
CIS8100 ASSIGNMENT 3
associated or even meaningful to the users. Both the methods are presently being utilised
prior to any other attack like the phishing, malware attack, and spamming. In the social
engineering, the accounts of the users are approached by the attackers and then the context
information of the users are extracted and then utilise this particular information for
increasing the extensive successfulness of the attacks. The social networking websites are
becoming the potential target for the attackers because of the availability of the sensitive
information and the significantly large user base. The privacy issues is presently becoming
the major concern as several users of the social media platforms are not extensively careful
regarding the exposure of the information that is being done by them (Li et al. 2016). Identity
theft is considered are the major security issues where the attackers make the use of any
account of social network for stealing the identities of the victims.
The sharing of various kinds of information on the social media platforms introduces
the users to the various kinds of security threats. The identity thieves gathers the personal
information from the websites of social media. Although the users have their personal
account on the significantly highest security conditions, there are several methods by which
any identity thief gain the information of the users. Majority of the websites of social network
have all the information that is needed like birthday or the email address (Kayes and
Iamnitchi 2017). It is common for any identity thief to hack any email account by the
effective utilisation of the social information. The social networking websites are the most
common sector of attacking for the hackers, going straight to the source for interjecting the
malicious codes. The hackers uses the codes that could effectively steal the identity, inject
various kinds of viruses to the computer, and also obstruct the information of the bank
account of the users. The shortened URLs are primarily susceptible to the hackers. The
shortened URLs could trick any user into visiting the harmful websites where the personal
information could be easily compromised as there is no view of the complete URL. When the

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
CIS8100 ASSIGNMENT 3
personal information is posted on the social networking websites, the hackers could gain the
data and stalk the users. As soon as the information has been posted on the social media, it
could no longer be private and it could fall into wrong hands. The more any user has posted,
the more susceptible the users become to the people who wishes to harm them (Kekulluoglu,
Kokciyan and Yolum 2018). Each time any website has been browsed by the users, the
companies could put the invisible markers on the computer referred as cookies. In the theory,
no two kind of cookies are similar. The major threat of the users on the social media platform
is the overconfidence. Several users consider that with the installation of the antivirus on the
computer, there are no major threat to the security. When the information has been gained by
the hackers from the social media platform, it could allow the hackers to gain some kind of
access to the computer system. When the consideration of the extent of information that
could be shared on the social media platform is not done properly, the user might end up
revealing sensitive information on the websites that could be used by the hackers to harm the
users in various manners (Brendel et al. 2018).
Challenges in Online Retail
Presently the market of the online retail is growing significantly. Mainly, the retailer
intends to take the advantage of the immense demographic, but it also denotes that the
competition in the world of the online retail is becoming significantly competitive than
earlier. The new retailers are being introduced in the online market and the consumers are
required to pick up when the consideration of buying any new product is done on the online
platform (Fernie and Sparks 2018). The main challenges that are faced by the online retailers
on the internet platform are the expectations of the customers, cultivating the several channels
of the communication, staying competitive and maintaining the loyal relationships with the
customers. As soon as the customer visits the online platform for buying any product, to the
moment they gain the products in their homes, the customer possesses significantly high
Document Page
11
CIS8100 ASSIGNMENT 3
expectations. The customers wishes the seamless ordering as well as the shipping experience.
If any online retailer cannot meet these particular expectations, the company might lose out
of business. As there is significant saturation in the market, any customers could quickly
discovering an online platform that might act as the alternative for their desires and buy the
product from any other website (Bernon, Cullen and Gorst 2016). The major challenge for the
online retailers is that it is required by them to stay on the top of the game in all the aspects of
the business for staying significantly competitive as well as the ensure that the customers are
always happy. It denotes that the company needs to maintain the various items in stock, offer
the fast shipping, developing the easy-to-navigate website as well as the checkout procedure,
minimising the errors of shipping, and having the strong as well as the responsive customer
service (Wang 2017). This challenge could be considered as major aspect for the ERT
company because without providing the various products at all times and fulfil all the
expectations of the customers, the company could not perform effectively on the online
platform.
The customer requires the various methods of communicating with the business as
quickly and feasibly as possible. Obviously, this could be considered as true for both the
online as well as the conventional offline stores (Chen, Cheung and Tan 2018). Moreover, it
has been specifically considered to be true for the businesses with the only presence, as the
customers cannot physically talk to the sales associate. If the customers are not able to
communicate effectively with the representative from any online retailer, the customers might
shift to any other online retailer that provides the effective services (Prachaseree, Ahmad and
Md Isa 2019). It denotes that the online retailers are required to develop as well as manage
the several channels of the communication for allowing the customers to reach out in any
form that is convenient for them, and it could be considered to be challenging to the retailers
for maintaining this. It include the channels such as email, live chats, phone calls, on website,
Document Page
12
CIS8100 ASSIGNMENT 3
as well as the comments and the messages using the various social media platforms (Mena et
al. 2016). The teams required the possession of correct technology for managing the
customers inquires that are presently incoming from the various sources. Along with this
aspect, the online retailers requires the sufficient workforce for handling the communication
attempts in the proper manner for maintaining the customer loyalty as well as customer trust
(Xiong et al. 2019).
Recommendations
It could be recommended to the organisation that the introduction of the website in the
company would help in gaining increased customers and improve their business significantly.
The company could introduce themselves in the online retail platform and provide the
services to the customers at all times. It is recommended to the organisation that the
development of the website should be done by properly following the SDLC methodology
that would ensure the appropriate development of the system. The social marketing process is
the series of the five major stages, which are the fan acquisition, engagement, amplification,
community, and ultimately brand strength or the sales that could be employed by the
company for ensuring the proper assistance to the website development.
Conclusion
Therefore, it could be concluded from the above discussion that the introduction of
the website could be significantly beneficial for the company as it would introduce the new
methods of conducting business. Software Development Life Cycle could be described as the
procedure that is presently used by major software industry for designing, developing as well
as testing the high quality systems. The aspect of fan acquisition on the ongoing social media
platform could be considered as the basic component for the social media marketing. The
social media engagement mainly measures the likes, shares and the comments of the public

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
CIS8100 ASSIGNMENT 3
for the social media efforts of the online businesses. The social media amplification could be
referred as the huge topic sector within the inbound marketing. In the social networking
platforms, like the Twitter, Facebook and Instagram, there is a significant threat of privacy
and security issues that could affect the users adversely. As soon as the customer visits the
online platform for buying any product, to the moment they gain the products in their homes,
the customer possesses significantly high expectations.
Document Page
14
CIS8100 ASSIGNMENT 3
References
Rao, P.V., Kumar, V.P. and Reddy, B.P.K., 2018. Applying Agile Software Methodology for
the Development of Software Development Life Cycle Process (SDLC). Journal for
Research| Volume, 4(02).
Selvarani, M.P. and Sankar, S.H., 2016. Student-driven learning circle through Software
Development Life Cycle (SDLC) methodology. Advances in Natural and Applied
Sciences, 10(4), pp.355-363.
Akbar, M.A., Sang, J., Khan, A.A., Shafiq, M., Hussain, S., Hu, H., Elahi, M. and Xiang, H.,
2017. Improving the quality of software development process by introducing a new
methodology–AZ-model. IEEE Access, 6, pp.4811-4823.
Ibrahim, Z., Johar, M.G.M. and Rahman, N.R.A., 2018. Preliminary Study of Methodology
on the Impact of Different Teamwork Skill Levels on the Efficiency on the Software
Development Workflow Based on Industry in Malaysia. International Journal of
Engineering & Technology, 7(4.28), pp.510-514.
Harris, S.M., 2019. The Use of a Modified System Development Life Cycle (MSDLC) in a
Sociological Environment to Improve Solution Validation (Doctoral dissertation, Morgan
State University).
Arora, R. and Arora, N., 2016. Analysis of SDLC models. International Journal of Current
Engineering and Technology, 1(1), pp.1-6.
Zenita, H. and Fiati, R., 2019. SDLC Model For Implementation Of E-Blangko On
Department Of Population And Civil Registration. KLIK-KUMPULAN JURNAL ILMU
KOMPUTER, 6(1), pp.58-70.
Document Page
15
CIS8100 ASSIGNMENT 3
Sakthivel, S., 2017. Integrated methodology for software metric selection to enhance
software reliability.
Domegan, C., McHugh, P., McCauley, V. and Davison, K., 2019. Co-creating a Sea Change
Social Marketing Campaign for Ocean Literacy in Europe: A Digital Interactive Tool for
Environmental Behavior Change. In Social Marketing in Action (pp. 393-409). Springer,
Cham.
Key, T.M. and Czaplewski, A.J., 2017. Upstream social marketing strategy: An integrated
marketing communications approach. Business Horizons, 60(3), pp.325-333.
Mulderrig, J., 2017. Reframing obesity: A critical discourse analysis of the UK’s first social
marketing campaign. Critical Policy Studies, 11(4), pp.455-476.
Sampogna, G., Bakolis, I., Evans-Lacko, S., Robinson, E., Thornicroft, G. and Henderson,
C., 2017. The impact of social marketing campaigns on reducing mental health stigma:
results from the 2009–2014 Time to Change programme. European Psychiatry, 40, pp.116-
122.
Salazar, G., Mills, M. and Veríssimo, D., 2019. Qualitative impact evaluation of a social
marketing campaign for conservation. Conservation Biology, 33(3), pp.634-644.
Holston, D., Verbois, C., Walker, B., Hofer, R. and Wolford, B., 2019. P102 A Follow-Up
Outcome Evaluation of a Comprehensive SNAP-Ed Social Marketing Campaign in
Louisiana. Journal of Nutrition Education and Behavior, 51(7), pp.S78-S79.
Aghasian, E., Garg, S., Gao, L., Yu, S. and Montgomery, J., 2017. Scoring users’ privacy
disclosure across multiple online social networks. IEEE access, 5, pp.13118-13130.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
CIS8100 ASSIGNMENT 3
Yu, L., Motipalli, S.M., Lee, D., Liu, P., Xu, H., Liu, Q., Tan, J. and Luo, B., 2018, June. My
friend leaks my privacy: Modeling and analyzing privacy in social networks. In Proceedings
of the 23nd ACM on Symposium on Access Control Models and Technologies (pp. 93-104).
Li, H., Zhu, H., Du, S., Liang, X. and Shen, X.S., 2016. Privacy leakage of location sharing
in mobile social networks: Attacks and defense. IEEE Transactions on Dependable and
Secure Computing, 15(4), pp.646-660.
Kayes, I. and Iamnitchi, A., 2017. Privacy and security in online social networks: A
survey. Online Social Networks and Media, 3, pp.1-21.
Kekulluoglu, D., Kokciyan, N. and Yolum, P., 2018. Preserving privacy as social
responsibility in online social networks. ACM Transactions on Internet Technology
(TOIT), 18(4), pp.1-22.
Brendel, W., Han, F., Marujo, L., Jie, L. and Korolova, A., 2018, April. Practical Privacy-
Preserving Friend Recommendations on Social Networks. In Companion Proceedings of the
The Web Conference 2018 (pp. 111-112).
Fernie, J. and Sparks, L. eds., 2018. Logistics and retail management: emerging issues and
new challenges in the retail supply chain. Kogan page publishers.
Bernon, M., Cullen, J. and Gorst, J., 2016. Online retail returns management: Integration
within an omni-channel distribution context. International Journal of Physical Distribution
& Logistics Management, 46(6/7).
Wang, E.S.T., 2017. Creating utilitarian and hedonic value from website quality and online
retail performance. Journal of Electronic Commerce in Organizations (JECO), 15(3), pp.1-
13.
Document Page
17
CIS8100 ASSIGNMENT 3
Chen, Y., Cheung, C.M. and Tan, C.W., 2018. Omnichannel business research: Opportunities
and challenges.
Mena, C., Bourlakis, M., Bernon, M., Cullen, J. and Gorst, J., 2016. Online retail returns
management. International Journal of Physical Distribution & Logistics Management.
Xiong, F., Chapple, L., Song, X.Y. and Hui, K.N., 2019. New Development of Online Retail
in China and the Associated (Accounting) Challenges. IEEE Access, 7, pp.39299-39304.
Prachaseree, K., Ahmad, N. and Md Isa, N., 2019. Assessing the challenges and opportunities
for Small and Medium Enterprises (SMEs) in Thailand online retail market. Voice of
Academia (VOA), 15(1), pp.52-61.
Chauhan, B.D., Rana, A. and Sharma, N.K., 2017, September. Impact of development
methodology on cost & risk for development projects. In 2017 6th International Conference
on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)
(ICRITO) (pp. 267-272). IEEE.
Woods, R., 2019, November. ADDIE vs. SDLC: A Comparison. In E-Learn: World
Conference on E-Learning in Corporate, Government, Healthcare, and Higher
Education (pp. 427-442). Association for the Advancement of Computing in Education
(AACE).
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]