logo

E-commerce Presence, Payment System, Business Strategies, Marketing and Advertisement, Social Mobile Local Marketing

   

Added on  2023-06-12

15 Pages4135 Words334 Views
Running head: E-PORTFOLIO
E-BUSSINESS SYSTEMS
Name of the Student
Name of the University
Author Note
E-commerce Presence, Payment System, Business Strategies, Marketing and Advertisement, Social Mobile Local Marketing_1
1E-PORTFOLIO
Portfolio 1: Building An E-commerce Presence
The main aspects of building an e-commerce presence depend on certain criteria like the
search is to made id paid or not, the targeted audience, the use of e-commerce for the consumers
and many more (Dan and Qihong 2014). The main idea behind the e-commerce presence is to
see the proper vision, which includes audience target, strategic analysis, the matrix of marketing
and the timeline of the development. There are several models of business to generate the
revenue from the e-commerce. The audiences are target based on their lifestyle, consumption
pattern, and access pattern. The strength and the weakness need to follow to grow the e-business.
Weakness needs to remove and the strength must be higher for a better experience. The five
major steps of building a system are planning, design, building the system, testing, and
implementation. Page delivery, page generation and page content are the main aspects for the
website optimization (Masood et al., 2013). The tiers of architecture are one tier, two tier and
multi tier architecture. Web server software hosts websites and linked it to the server apache and
the internet information software made my Microsoft are the two most trusted servers out there.
Some basic tools are included in the web servers that verify the links on the pages are valid or
not. JDBC, ODBC are the tools, which establishes the database connectivity. The e-commerce
merchant software servers provide the online catalog of the products, allow the shoppers to
preview the items and payment checkout option. In the packaging of the merchant server
software packages various functionality (Chuan et al., 2013). Some of the key functionalities of
the merchant server software are there functionality, business process modeling tool, different
business model support, visual site management and reporting, performance and scalability,
connectivity with the business systems, capability of global and multicultural, shipping rules and
E-commerce Presence, Payment System, Business Strategies, Marketing and Advertisement, Social Mobile Local Marketing_2
2E-PORTFOLIO
the local sales tax. The more the hardware is high the more the speed of the website is increases.
The scalability of the software is the ability of the website to increase as the demand warrants.
Various ways are there to scale software vertical where processing power of the individual
components increased, horizontal where the workload is shared by the multiple computers,
improvement of architecture for processing, cloud service out sourcing. The website needs to
design in such a way that the customer can be able to buy the things what they want. For
optimizing the search engine various tools are used. For the designing tools for interactivity and
active content is common gateway interface, active server pages, java, JSP, java script,
VBSCRIPT, ColdFusion, PHP, Ruby on Rails and many other design elements. Personalization
tools have the ability to treat people based on their personal qualities and prior history with the
website. The customization tool has the ability to change the product to fit better as per the need
of the customer. The primary method to achieve personalization is the cookies. To enhance the e-
commerce there must be some privacy guidelines, which will set several statement declaring how
the website is to be treated by the customer.
Portfolio 2: (E-commerce Scenario and payment system)
Cybercrime on the e-commerce website are growing day by day and in higher rate. The
ecommerce websites must be prepared for various criminal activities. There are multiple security
threats to an ecommerce website, the threats are malicious code, adware, spywarew, phishing,
hacking, spoofing and sniffing (Gagnon 2013). To protecting the e-commerce, the must to do
thing is the implementation of encryption. The data must be encrypt in to cipher text so that the
data cannot be seen by the other people except the sender and the receiver. The encryption
provides multiple dimensions to the security of e-commerce. The technology helped immensely
E-commerce Presence, Payment System, Business Strategies, Marketing and Advertisement, Social Mobile Local Marketing_3
3E-PORTFOLIO
to the security of ecommerce by providing message integrity which provide message that sent
cannot be altered, neon repudiation prevents user from denying sent message, authentication
provide the proper verification of the customer who is sending the message or data, and
confidentiality that give the security that the message or the data cannot be leaked. The major
payment system is the online payment system known as electronic payment. It also called as a
sample of electronic data interchange. Ecommerce systems have become so popular due to the
increased usage of internet and Smartphone. Online payment provide a secure gateway for
transaction by the online transactions consumers can transfer money online to any ecommerce
website and the process is secure end to end. The loss due to the cybercrime is unclear. The
attacks are more now days because of the web attack kits price are low. To achieve the optimum
security the consumer must use new technologies and web antivirus for protection. The
consumer must follow the industry standards and the rules possessed by the government
(Olufemi, Kayode and Sunday 2014). Some times after using optimum protection the security
breaks at the weakest link. E commerce websites are vulnerable due to the client server
architecture. Credit card fraud is the common threat comes with the ecommerce. This mostly
happen because the corporate server are hacked (Blakemore 2016). The largest threat of an
business institutions comes from the inside embezzlement. Poor security application is
responsible for the data breaches. The social networks are also under the cyber threat because of
the viruses, identity fraud, malware, phishing and spamming. Mobiles are also attack by vishing,
smishing, SMS spoofing and madware. To secue all the threaths after encryption the channels of
the communication also needs to be secure. The firewalls, proxy servers, IDS, IPS need to
protect. Cryptography can be implemented to secure the data two types to cryptography are there
E-commerce Presence, Payment System, Business Strategies, Marketing and Advertisement, Social Mobile Local Marketing_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Introduction to e-Business : Assignment
|3
|769
|63

Concepts and Business Modules of E-Commerce
|18
|4010
|40

Understanding E-Business: SWOT Analysis, SDLC Methodology, and System Architecture
|3
|789
|408

Digital Enterprise and E-commerce Assignment 2022
|17
|627
|14

E-commerce Strategies
|17
|3755
|2

Building an E-commerce Presence: Strategies and Challenges
|13
|2753
|346