Free Essay

Digital Marketing

In: Business and Management

Submitted By starrcourtz
Words 4558
Pages 19
1.1 OVERVIEW OF ONLINE SHOPPING ONLINE SHOPPING is a web-based application Software Developed in IMB WEBSPHERE using JSP as front end on Pentium machine. The main aim of Online Shopping is to improve the services of Customers and vendors. It maintains the details of customer payments, product receipts, addition of new customers, products and also updating, deletion for the same. It also stores the details of invoices generated by customer and payments made by them with all Payments details like credit card. The primary features of online shopping are high accuracy, design flexibility and easy availability. It uses database tables representing entities and relationships between entities.

1.2 OBJECTIVE OF ONLINE SHOPPING The system is capable of maintaining details of various customers, vendors, Products and storing all the day to day transactions such as generation of shipment address bills, handling customers and product receipts, updating of stores The central concept of the application is to allow the customer to shop virtually using the Internet and allow customers to buy the items and articles of their desire from the store. The information pertaining to the products are stores on an RDBMS at the server side (store). The Server process the customers and the items are shipped to the address submitted by them.


The application was designed into two modules 1. Buy module 2. Database module

The Buy module is used for the customers who wish to buy the articles. The database module is for the storekeepers who maintains and updates the information pertaining to the articles and those of the customers.

The end user of this product is a departmental store where the application is hosted on the web and the administrator maintains the database. The application which is deployed at the customer database, the details of the items are brought forward from the database for the customer view based on the selection through the menu and the database of all the products are updated at the end of each transaction.

Data entry into the application can be done through various screens designed for various levels of users. Once the authorized personnel feed the relevant data into the system, several reports could be generated as per the security.



2.1 EXISTING SYSTEM eBay Inc. is an American Internet company that manages, an online auction and shopping website in which people and businesses buy and sell a broad variety of goods and services worldwide. Founded in 1995, eBay is one of the notable success stories of the dot-com bubble; it is now a multi-billion dollar business with operations localized in over thirty countries. offers several types of auctions:

a) Auction-style listings allow the seller to offer one or more items for sale for a specified number of days. The seller can establish a reserve price.

b) Fixed price format allows the seller to offer one or more items for sale at a Buy It Now price. Buyers who agree to pay that price win the auction immediately without submitting a bid.


2.2 PROPOSED SYSTEM Shop online: Shop online is an online shopping application, which provides the online shopping facility available for everyone. Any type of the product will be available for the customer, and it can be easily purchased faster when compair with ebay. Shop online application concentrates more on user friendly interfaces and promotes users to purchase faster and easier. There is a facility available to do online purchase. Shop online have registration facility. This will enable the new user to sign in and use the product much effectively. The registration process is faster and easier compaired to any existing application. In the User interface of Shop online there will be accomplished with options to find new products available and most purchased and customer satisfied products. Customer can avail this facility and buy the product faster. All products in the website will be highlighted with the image of the product. By click on the image it will take you directly to the buy page, from where customer can purchase easily. Shop online is provided with customer support page. Using this page any customer can get the assistance from the available customer support executive online. There we have Support over phone, email and chat. Customer can use this facility any time. As security issue pays major importance today, extra attention towards security is done in Shop online application. We incorporate digital signature technique to ensure much effective security for the customer. Digital signature will provide the secure data transactions and also during money transaction for purchase.


2.3 DIGITAL SIGNATURE A digital signature is a type of asymmetric cryptography used to simulate the security properties of a handwritten signature on paper. Digital signature schemes consist of at least three algorithms: a key generation algorithm, a signature algorithm, and a verification algorithm. A signature provides authentication of a "message". Messages may be anything, from electronic mail to a contract, or even a message sent in a more complicated cryptographic protocol. Digital signatures are often used to implement electronic signatures, a broader term that refers to any electronic data that carries the intent of a signature, but not all electronic signatures use digital signatures. In some countries, including the and in the electronic signatures have legal significance. However, laws concerning electronic signatures do not always make clear their applicability towards cryptographic digital signatures, leaving their legal importance somewhat unspecified. A digital signature scheme typically consists of three algorithms: y A key generation algorithm that selects a private key uniformly at random from a set of possible private keys. The algorithm outputs the private key and a corresponding public key. y A signing algorithm which, given a message and a private key, produces a signature.


y A signature verifying algorithm which given a message, public key and a signature, either accepts or rejects. Two main properties are required. First, a signature generated from a fixed message and fixed private key should verify on that message and the corresponding public key. Secondly, it should be computationally infeasible to generate a valid signature for a party who does not possess the private key. The purpose of a digital signature is the same as your handwritten signature. Instead of using pen and paper, a digital signature uses digital keys (public-key cryptology). Like the pen and paper method, a digital signature attaches the identity of the signer to the document and records a binding commitment to the document. Unlike a handwritten signature, It is considered impossible to forge a digital signature the way a written signature might be. The real value is in avoiding the paper and keeping your data electronic for a variety of reasons: save paper, send documents quickly via email, you can have multiple/exact copies and easier to manage the storage. To use digital signature software requires some initial setup: you will need a signing certificate. If in your business you commonly sign documents or need to verify the authenticity of documents, then digital signatures can help you save time and paper-handling costs. The DigiStamp web site and software is designed to help you with the process and allow you to take advantage of the convenience and power of digital signatures. The digital signature software is provided at this web site for you to install and use. You will need to get your personal signing certificate. Creating your certificate involves creating a public-private digital key pair and a Certificate Authority. The

private key is something you keep only to yourself. You sign a document with your private key. Then, you give your public key to anyone who wants to verify your signature. The process of creating your public-private key pair is easy and quick; we will help you with process. Public Keys. The public key certificate creates proof of the identity of the signer by using the services of a certificate authority. A certificate authority uses a variety of processes to associate the particular public key with an individual. You give your public key to anyone who wants to verify your signature. The combination of your public key and proof of identity result in a public key certificate - also called a signer's certificate. Private Keys. The private key is something you keep only to yourself. You sign a document with your private key. The public and private keys are related mathematically. Knowing the public key allows a signature to be verified but does not allow new signatures to be created. If your private key is not kept ³private,´ then someone could maliciously create your signature on a document without your consent. It is critical to keep your private key secret. There are several reasons to sign such a hash (or message digest) instead of the whole document. y For efficiency: The signature will be much shorter and thus save time since hashing is generally much faster than signing in practice.



For compatibility: Messages are typically bit strings, but some signature schemes operate on other domains (such as, in the case of RSA, numbers modulo a composite number N). A hash function can be used to convert an arbitrary input into the proper format.

For integrity: Without the hash function, the text "to be signed" may have to be split (separated) in blocks small enough for the signature scheme to act on them directly. However, the receiver of the signed blocks is not able to recognize if all the blocks are present and in the appropriate order. 2.3.1 BENEFITS OF DIGITAL SIGNATURE Below are some common reasons for applying a digital signature to communications: Authentication: Although messages may often include information about the entity sending a message, that information may not be accurate. Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. The importance of high confidence in sender authenticity is especially obvious in a financial context. For example, suppose a bank's branch office sends instructions to the central office requesting a change in the balance of an account. If the central office is not convinced that such a message is truly sent from an authorized source, acting on such a request could be a grave mistake.

8 Integrity: In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. (Some encryption algorithms, known as nonmalleable ones, prevent this, but others do not.) However, if a message is digitally signed, any change in the message will invalidate the signature. Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature, because this is still considered to be computationally infeasible by most cryptographic hash functions.


3.1 IBM WebSphere Application Server IBM WebSphere Application Server (WAS), a software application server, is the flagship product within IBM's WebSphere brand. WAS is built using open standards such as Java EE, XML, and Web Services. It is supported on the following platforms: Windows, AIX, Linux, Solaris, i/OS and z/OS. Beginning with Version 6.1 and now into Version 7, the open standard specifications are aligned and common across all the platforms. Platform exploitation, to the extent it takes place, is done below the open standard specification line. It works with a number of Web servers including Apache HTTP Server, Netscape Enterprise Server, Microsoft Internet Information Services (IIS), IBM HTTP Server for i5/OS, IBM HTTP Server for z/OS, and IBM HTTP Server for AIX/Linux/Microsoft Windows/Solaris. It uses 9060 port for connection as the default. 3.2 WebSphere Extended Deployment WebSphere Application Server V6 Extended Deployment Edition

(WebSphere XD) was released in 2006 as an add-on for WebSphere 6. XD provides advanced features for both administrators who manage multiple Java EEbased applications and developers building advanced applications that require asymmetric clustering techniques. It also has a number of technologies to significantly increase the performance of running applications, including an inmemory database cache and a highly advanced load balancer called the on demand router.

3.3 Security The WebSphere Application Server security model is based on the services provided in the operating system and the Java EE security model. WebSphere Application Server provides implementations of user authentication and authorization mechanisms providing support for various user registries: y y y y

Local operating system user registry LDAP user registry Federated user registry (as of version 6.1) Custom user registry

The authentication mechanisms supported by WebSphere are y Lightweight Third Party Authentication (LTPA)

3.4 IBM DB2 DB2 can be administered from either the command-line or a GUI. The command-line interface requires more knowledge of the product but can be more easily scripted and automated. The GUI is a multi-platform Java client that contains a variety of wizards suitable for novice users. DB2 supports both SQL and XQuery. DB2 has native implementation of XML data storage, where XML data is stored as XML (not as relational data or CLOB data) for faster access using XQuery. DB2 has APIs for REXX, PL/I, COBOL, RPG, FORTRAN, C++, C, Delphi, .NET CLI, Java, Python, Perl, PHP, Ruby, and many other programming languages. DB2 also supports integration into the Eclipse and Visual Studio .NET integrated development environments.

3.5 ERROR PROCESSING An important feature of DB2 computer programs is error handling. The SQL communications area (SQLCA) structure was once used exclusively within a DB2 program to return error information to the application program after every SQL statement was executed. The primary, but not singularly useful, error diagnostic is held in the field SQLCODE within the SQLCA block. The SQL return code values are: y y

0 means successful execution. A positive number means successful execution with one or more warnings. An example is +100 which means no rows found.


A negative number means unsuccessful with an error. An example is -911 which means a lock timeout (or deadlock) has occurred, triggering a rollback.

Later versions of DB2 added functionality and complexity to the execution of SQL. Multiple errors or warnings could be returned by the execution of an SQL statement; it may, for example, have initiated a Database Trigger and other SQL statements. Instead of the original SQLCA, error information should now be retrieved by successive executions of a GET DIAGNOSTICS statement.See SQL return codes for a more comprehensive list of common SQLCODEs.


4.1 SYSTEM DESIGN In order to design a web site, the relational database must be designed first. Conceptual design can be divided into two parts: 1. Data model 2. Process model.

4.1.1 Data model The data model focuses on what data should be stored in the database while the process model deals with how the data is processed. To put this in the context of the relational database, the data model is used to design the relational tables.

4.1.2 Process model The process model is used to design the queries that will access and perform operations on those Tables.

Design of software involves conceiving, planning out and specifying the externally observable characteristics of the software product. We have data design, architectural design and user interface design in the design process. These are explained in the following section. The goal of design process is to provide a blue print for implementation, testing and maintenance activities.


4.2 DATA DESIGN: The primary activity during data design is to select logical representations of data objects identified during requirement analysis and software analysis. A data dictionary explicitly represents the relationships among data objects and the constrains on the elements of the data structure. A data dictionary should be established and used to define both data and program design.

4.3 FESIBILITY STUDY: Feasibility study is conducted once the problem is clearly understood. Feasibility study is a high level capsule version of the entire system analysis and design process. The objective is to determine quickly at a minimum expense how to solve a problem. The purpose of feasibility is not to solve the problem but to

Determine if the problem is worth solving. The system has been tested for feasibility in the following points 1. Technical Feasibility 2. Economical Feasibility 3. Operational Feasibility.

4.3.1. Technical Feasibility: The project entitles "Project Monitoring System" is technically feasibility because of the below mentioned feature. The project was developed in Java which Graphical User Interface It provides the high level of reliability, availability and compatibility. All these make Java an appropriate language for this project. Thus the existing software Java is a powerful language.


4.3.2. Economical Feasibility: The computerized system will help in automate the selection leading the profits and details of the organization. With this software, the machine and manpower utilization are expected to go up by 80-90% approximately. The costs incurred of not creating the system are set to be great, because precious time can be wanted by manually. 4.3.3. Operational Feasibility: In this project, the management will know the details of each project where he may be presented and the data will be maintained as decentralized and if any inquires for that particular contract can be known as per their requirements and necessaries. 4.4 IMPLEMENTATION: Implementation is the stage where the theoretical design is turned into a working system. The most crucial stage in achieving a new successful system and in giving confidence on the new system for the users that it will work efficiently and effectively. The system can be implemented only after thorough testing is done and if it is found to work according to the specification. It involves careful planning, investigation of the current system and its constraints on implementation, design of methods to achieve the change over and an evaluation of change over methods a part from planning. Two major tasks of preparing the implementation are education and training of the users and testing of the system. The more complex the system being implemented, the more involved will be the systems analysis and design effort required just for implementation. The implementation phase comprises of several activities. The required hardware and software acquisition is carried out. The system may require some software to be developed.



5.1 DATA FLOW DIAGRAM Data Flow Diagrams show the flow of data from external entities into the system, and from one process to another within the system. There are four symbols for drawing a DFD: 1. Rectangles representing external entities, which are sources or destinations of data. 2. Ellipses representing processes, which take data as input, validate and process it and output it. 3. Arrows representing the data flows, which can either, be electronic data or physical items. 4. Open-ended rectangles or a Disk symbol representing data stores, including electronic stores such as databases or XML files and physical stores such as filing cabinets or stacks of paper.

The Data Flow Diagrams for the current system are explained below. Each process within the system is first shown as a Context Level DFD and later as a Detailed DFD. The Context Level DFD provides a conceptual view of the process and its surrounding input, output and data stores. The Detailed DFD provides a more detailed and comprehensive View of the interaction among the sub-processes within the system.


5.1.1 Customer-Browse Context DFD
Customer browser context data flow diagram explains connection between Customer and the search model.. The customer will be browsing for the item the server will be search and produce the output.


5.1.2 Customer-Browse Detailed DFD The below DFD diagram shows how the customer browse the content detailed.


5.1.3 Customer - ShoppingCart Context DFD Here the customer shopping cart DFD. The customer can create a cart and he can select the item needed and purchase the whole selected item.


5.1.4 Customer - ShoppingCart Detailed DFD The given DFD diagram shows the shopping cart detailed manner. The user can be modify as well as develop the cart.


5.1.5 Customer-Authentication Context DFD In this customer authentication DFD , the authentication of the customer will takes place. The database will be checking the given customer is valid or not, if he is valid means allow permission to access the server .


5.1.6 Customer-Authentication-PurchaseHistory DFD In the following DFD shows the customer history in detail, it means that the history of the customer will be saving the account of the customer. After some latter the customer can analyze his history.

5.1.7 Customer-Authentication-UserProfile DFD The authenticated use has his own profile he can be modify the profile submit the current details if any change happened in the previously submitted details.


5.1.8 Authenticated User-Purchase Context DFD Given DFD shows the all process taking place in the shoponline system.


5.1.9 Customer-NewUserRegistration DFD The new user registration DFD is showing below the use can be register to the website by giving the user id, password, and address.

The administrator verifying the data¶s


5.1.10 Administrator-new item adding DFD The administrator will be adding the new item to the server to introduce the customer


5.2 UML USE CASE DIAGRAM The Unified Modeling Language (UML) is a standard language for specifying, visualizing, constructing, and documenting the artifacts of software systems, as well as for business modeling and other non-software systems. The UML represents a collection of best engineering practices that have proven successful in the modeling of large and complex systems. The UML is a very important part of designing objects oriented software and the software development process. The UML uses mostly graphical notations to express the design of software projects. Using the UML helps project teams communicate, explore potential designs, and validate the architectural design of the software. Each Use Case is: y a pattern of behavior that the new system is required to exhibit. y a sequence of related actions performed by an actor and the system via a dialogue. y An actor is: anything that needs to interact with the system: y a person y a role that different people may play y another (external) system. A Use Case Diagram is a visual representation of actors together with use cases. A use case is a set of scenarios that describing an interaction between a user and a system.


A use case diagram displays the relationship among actors and use cases. The two main components of a use case diagram are use cases and actors.

An actor is represents a user or another system that will interact with the system you are modeling. A use case is an external view of the system that represents some action the user might perform in order to complete a task.



The diagram explained below is USE CASE diagram of online shopping sytem. In this project we have 3 main actor Customer, Warehouse Employee and Sales person. Customer is facilitised with Add item to cart, Remove items from Cart, Review contents of Cart, Purchase contents of Cart and Update order status. Warehouse employee can Update order status and Notify warehouse order information. Salesperson can notify warehouse about the order and receive and process the order. Sales person also have included with verification of payment.


5.4 SEQUENCE DIAGRAM Sequence diagrams show step-by-step what¶s involved in a use case y Which objects are relevant to the usecase. y How those objects participate in the function


5.5 Class Diagram for Shopping Cart Class diagram of shopping Cart consist of the five classes. The classes are represented inside the box as shown in the figure. It consists of Credit Card, Customer, Item to buy, Shopping Cart and Frequent Shopper. Shopping Cart Class deals with Adding new item to the cart, Cancelation of any purchase or Deletion of any item from the cart. Credit card class will have the security transaction and Security integrity enables the customer to process a secure transaction. Customer Class will have the information of the customer. Information like Billing address, Delivery address, Email Address and Credit rating.


5.6 UML ACTIVITY DIAGRAM Activity diagrams describe the workflow behavior of a system. Activity diagrams are similar to state diagrams because activities are the state of doing something. The diagrams describe the state of activities by showing the sequence of activities performed. Activity diagrams can show activities that are conditional or parallel.



Table Name: PRODUCT ----------------------------------------------------Column Name Type ----------------------------------------------------Product Id Int Product Name Varchar Product Type Varchar UnitPrice Float Quantity Units in stock Varchar Int

Units on Order Int -----------------------------------------------------

Table Name: CUSTOMER -----------------------------------------------Column Name Type -----------------------------------------------Order Number Int Order Date Date CustomerName Varchar BillAddress Varchar ShippingAddress Varchar PhoneNumber Varchar Email-Id Varchar Amount Float Shipped Status Varchar ------------------------------------------


Table Name: PRODTABLE -----------------------------------------------Column Name Type -----------------------------------------------ProdId Int ProductName Varchar Price Float ------------------------------------------------

Table Name: CREDITCARD -----------------------------------------------Column Name Type -----------------------------------------------CardType Varchar CardNumber Varchar



6.1 SYSTEM TESTING The testing phase is an important part of software development. It is the process of finding errors and missing operations and also a complete verification to determine whether the objectives are met and the user requirements are satisfied. 6.1.1 Software testing is carried out in three steps:

The first includes unit testing, where in each module is tested to provide its Correctness, validity and also determine any missing operations and to verify whether the objectives have been met. Errors are noted down and corrected immediately. Unit testing is the important and major part of the project. So errors are rectified easily in particular module and program clarity is increased. In this project entire system is divided into several modules and is developed Individually. So unit testing is conducted to individual modules.

The second step includes Integration testing. It need not be the case, the software whose modules when run individually and showing perfect results, will also show perfect results when run as a whole. The individual modules are clipped under this major module and tested again and verified the results. This is due to poor interfacing, which may results in data being lost across an interface. A module can have inadvertent, adverse effect on any other or on the global data structures, causing serious problems.


The final step involves validation and testing which determines which the software functions as the user expected. Here also some modifications were. In the completion of the project it is satisfied fully by the end user

6.2 MAINTENANCE AND ENHANCEMENT AS the number of computer based systems, grieve libraries of computer software began to expand. In house developed projects produced tones of thousand soft program

Similar Documents

Premium Essay

Digital Marketing

...Business Digital Marketing SBMA7109 February 2014 - Spring SBMA7109 – Digital Marketing Module Introduction/Information AIM(S) To encourage students to explore the range of possibilities presented by digital marketing and to identify future opportunities in this field. LEARNING OUTCOMES Upon the successful completion of this module, the student should be able to demonstrate the ability to: 1. Appraise the digital impact on each element of the marketing mix and the range of different e-marketing tools available to marketers through digital marketing techniques. 2. Critically evaluate contemporary digital and e-issues affecting customers, intermediaries and marketers. ASSESSMENT: 100% Coursework Weekly Lecture Schedule The topics covered in the course are engaged with over fortnightly sessions. The first week will usually be a lecture which is then consolidated in the second week with normally more learner centred activities: Exercises, group discussions, co-construction activity, online activities, research, presentations etc. Guest presenters may also be used in replace of activities. Tutors may split the topics and activities across the two weeks in differing patterns according to what is most appropriate. Week Topics 1 Introduction to digital marketing 2-3 Models of digital consumer behaviour 4-5 Digital revenue models 6-7 Technologies, tools and techniques Page 2 of 10 SBMA7109 – Digital Marketing 8-9 The digital marketing......

Words: 2974 - Pages: 12

Premium Essay

Digital Marketing

...AMAZING DIGITAL May 8, 2014 Authored by: Aaron Table of contents Summary Introduction A marketing plan helps you stay focused. This marketing plan is a map to guide business toward their goals. This plan will help coordinate efforts and be proactive. With it, they need to be realistic about task, time and energy. A plan will help stay organized and on track throughout the timeline. This plan will map out every stage of the task ahead. 1. Introduction 1 2. Executive Summary 2 3. Organisation Mission & Marketing 2 4. Situation Analysis 2-3 5. Organisation & Marketing Objectives 4 6. Strategy & Tactics 4 7. Activity Plan & Implementation 4-6 8. Control and Evaluation 6 9. Conclusions 6 9. Bibliography & references 6-7 N/B I do not work for any business mentioned, I have no access to any internal data 2. Executive Summary A marketing plan clarifies the key marketing elements of a business and maps out directions, objectives and activities for the business and its employees. The proposal marketing plan draws on the broader perspectives outlined Aldi's business plan. The marketing plan focuses on issues related to (SOSTAC) and the four Ps: product, price, promotion and place. Addressing these issues and putting them into written form can be useful for Aldi’s marketing objectives. A timeline plan can be a source of motivation to achieve......

Words: 2188 - Pages: 9

Premium Essay

Digital Marketing

...Traditional Marketing : Traditional marketing includes marketing through news paper advertisements or magazines, commercials on TV and radios,brochers ,business cards and bill boards .Traditional marketing advertising depends on the company’s available budget.Mid sized and big companies uses TV commercials in marketing . Companies who has limited marketing budget uses news paper ads for marketing . Digital Marketing : Digital marketing uses technologies internets channels like email,apps and social media likes Facebook , twitter etc .Digital marketing differs traditional marketing in the channel they market and the methods organization follow for marketing. Digital marketing is growing day by day since digital media is a source of news, shopping , entertainment ,social interaction , companies can know about the customer how much time he spends on searching the product on their website and how much interest he is showing on the product based on his search criteria .In the digital marketing companies can know the customer well compared to the traditional marketing .Relationship between the customer and the organization can be interactive in the digital marketing . Digital marketing channels includes : social media , blogging, email marketing , website , forums, search engine optimization etc. Traditional Marketing vs Digital Marketing : Digital Marketing is cost effective : Digital marketing is more cost effective than traditional advertising like television......

Words: 414 - Pages: 2

Premium Essay

Digital Marketing

...Managing Digital Enterprises Mobile Phone Online Marketing – Current Retail Environment, E-Value chain Analysis & Improvement Areas Jinu Joseph (B00573500) Master of Business Administration - FT Ulster Business School, University of Ulster Submitted on 22-Oct-2010 Contents 1. INTRODUCTION 3 2. MOBILE PHONE SALES INDUSTRY 4 2.1 CURRENT SCENARIO 5 3. RETAIL SALES ENVIRONMENT – OFFLINE AND ONLINE 5 4. VALUE CHAIN ANALYSIS 6 5. VALUE CREATION IN ONLINE MARKETING OF MOBILE PHONES 7 5.1 ADVANTAGES OF ONLINE MARKETING OF MOBILE PHONES 8 6. THREE SIGNIFICANT IMPROVEMENTS – ONLINE MARKETING MODEL 9 6.1 CUSTOMER SERVICE 9 6.2 TECHNOLOGY ENHANCEMENTS 9 6.3 PUBLIC RELATIONSHIPS 10 7. CONCLUSION 10 8. REFERENCES 10 TABLES AND FIGURES Figure 1:- Estimated Annual Retail Sales – World Telecommunication [] 5 Table 1:- E-value chain in Mobile Phone Industry 6 1. INTRODUCTION IT development has helped Organisations to market their products and services to World markets. This has promoted Production environment, Supply of the products to a more competitive world market. Organisation’s focus changed into more effective and value added customer service by understanding customer needs. Information technology tools like Internet, Mobile phones, Email and other kind of Visual Medias has helped to overcome the international boundaries to consider world as a ‘Local Market’ [3]. This paper analyse e-business methodology to......

Words: 1724 - Pages: 7

Premium Essay

Digital Marketing

...What is Digital Marketing? Digital marketing is the engine that drives today’s business, big or small. Effective digital marketing is the marketing that bridges electronic technology with psychology in the marketplace. As we enter the New Year, it’s time to reflect on the year gone by and plan for the next twelve months. For smedio, it’s a time to celebrate our success over the last year and put our heads down for the challenges that lie ahead in year 2016. 2015 was a phenomenal year for the smedio community as we established ourselves as a formidable force in the digital marketing segment. We received a lot of healthy feedback from our users and several new members emphasized the need for us to get down to the basics of digital marketing and marketing in general. Therefore, we begin the New Year with an introductory post on what is digital marketing. We talk about the underlying principle behind digital marketing, the means, the end and the ongoing evolution from a business as well as marketer’s perspective. We’ll make a conscious effort to stay away from technical jargon and uncover digital marketing in simple and easy to understand terms. What is Digital Marketing? I usually refrain from using textbook definitions as I believe they are good to memorize but offer little insights. To me, digital marketing is using techniques which allow a marketer to use the best of both worlds – digital and marketing. While the basic principles of marketing still apply, digital......

Words: 276 - Pages: 2

Free Essay

Digital Marketing

...CHAPTER 1: DIGITAL MARKETING 1. What is Digital Marketing? Digital Marketing is the new age form of marketing in which companies or brands use modern digital mediums like that of the internet. At its core, digital marketing centres around the extremely powerful medium of the internet. The internet can be used to “push” a message to someone like email, RSS etc as well as to “pull” content serving a banner ad & Pay Per Click search terms. Digital Marketing as a term has been around for too long but suffers from the lack of a clear & lucid definition. It does not include more traditional forms of marketing such as radio, TV, billboard & print because they are not real time & do not offer instant feedback. Thus the definition of Digital Marketing would be: Digital Marketing is the technique of promoting products & services using database-driven online distribution channels to reach consumers in a relevant, personal & cost-effective manner. Digital Marketing includes: 1.1 Online Marketing • Website Optimisation • Search Engine Marketing (SEM) • Video Search Engine Optimisation (VSEM) • Social Media Optimisation (SMO) • Blogs & Forums • Online Display Advertising • Email Marketing 1.2 Mobile Marketing • Messaging (SMS & MMS) • Mobile Internet • Mobile Apps • App Advertising 1.3 eMedia Marketing • Video, Audio & Content delivered via electronic devices • Digital Billboards Digital Marketing can be implemented in two ways: Push digital marketing & Pull digital......

Words: 2556 - Pages: 11

Premium Essay

Prada Digital Marketing

...strength of marketing. Prada dedicated on producing life style of elegance and sophisticated products and demonstrated its brand identity as “Contemporary classic, culturally elegant”. Today, Prada became a fashion empire with huge asset and related to numbers of people, which is including the sales, workers, managers and so on. In recent years, economic crisis crush the whole world’s economy, Prada is suffering as well. So, developing a strong marketing strategy for Prada is imperative. Though Prada has developed approximately 100 years and gained rich experience of traditional marketing and new marketing, there are still some drawbacks on new types of marketing. To choose an appropriate marketing trend, which need to adapt to nowadays society. Therefore, to exploring more opportunities in the twenty-first century, new type of marking methods should be introduced to cater to this network era. Evaluate the marketing trend Marketing trend: From traditional marketing to digital marketing With the popularization of network and smartphone, E-commerce and E-business has become more popular and more people discovered the advantages of online shopping. Compared digital marketing with traditional marketing, three differences have been stand out. Firstly, the digital marketing costs less than the traditional one, all the marketing strategy can develop online, which is convenient for both marketers and customers. Another factor should not be ignored, digital......

Words: 1599 - Pages: 7

Premium Essay

Marketing to Digital Consumer

...ONLINE MARKETING MARKETING TO THE DIGITAL CONSUMER Let’s admit it: most Web sites are duds The task is to attract and engage, not to price and promote Relating to “chiliheads” Should your online marketing be a separate unit? Alexa Kierzkowski • Shayne McQuade Robert Waitman • Michael Zeisser T of interactive media such as online services and the World Wide Web has taken many consumer marketers by surprise. While some marketers are still wondering what to do and how to do it, others are moving forward – but oƒten with mixed success. HE RAPID DEVELOPMENT Our recent analysis of 95 Fortune 500 consumer marketing companies with product or service-related Web sites reveals that consumer marketers fall far short of leveraging the full capabilities of interactive media. While over 90 percent of all the digital marketing applications examined provided product or service information and featured basic e-mail capabilities, only about half oƒfered links to other sites and non-product-related content, and fewer than half provided any sort of interactive content, such as a game or a diagnostic requiring some user input. Most revealingly, only a handful of the examined sites made an eƒfort to seriously collect information about their users, and fewer than 5 percent provided an opportunity to allow user-to-user communications, a unique – and one of the most popular – characteristics of interactive media. Alexa Kierzkowski, Shayne McQuade, Robert Waitman, and Michael Zeisser...

Words: 6873 - Pages: 28

Premium Essay

Advantages Of Digital Marketing

...INTRODUCTION: Digital marketing is a process of building and maintaining customer relationships through online activities to facilitate the exchange of ideas, products and services that satisfy the goals of both parties. Digital marketing increases and improves the interactions and relationships with current and prospective customers through various platforms like social networking sites, instant messaging systems and mobile applications. First of all, this is a type of direct marketing, with all of the advantages that comes tagged along with it. It gives personal attention to the customers, motivates to action and more. Second, it's possible to create uniform messages which are personally formatted for each recipient with great ease. For...

Words: 2685 - Pages: 11

Free Essay

Digital Marketing

...Digital Marketing Blob Summary 1 The article I analyzed was highlighted a blog website called The title of the article is “a systemic approach to pay per click ppc advertising”. The article talks about how difficult it can be to achieve pay-per-click marketing results. It also discusses how complex the pay per click platforms like Google AdWords and Facebook Ads are becoming. The author of the article explains that the complexity of pay per click marketing can be over whelming but there is a way to think about all this to help you through your day as a search engine-marketing manager a bit easier and it begins by thinking in systems. She explains how marketers need the ability to increase their capacity to think, learn, communicate and act more systemically. The author states how important it is to keep learning and exploring new approaches. The author of the article wrote a book called, “Dancing with systems” which reiterates her point of understanding the system of pay-per-click advertising and search engine marketing. She gives good advice and explains if you listen and pay attention to what is important, keywords and text ads will tell you their story once the data begins to unfold. I think this is true very true in marketing and is important. She explains how each day; search engine managers should crave to learn something new about an account or their approach to managing pay per click advertising. Everyone who touches a keyword is a part of the......

Words: 369 - Pages: 2

Premium Essay

Essay On Digital Marketing

...Future of digital marketing for small businesses Businesses are categorized mainly of two types, small scale and large scale business. In order for a business to succeed, advertising is important. Promoting and advertising makes the business known to public. It’s pretty common that people only buy products of companies they know. They won’t even have a look or feel to try other company products or services. Reviews also play a major role for the development of small businesses. Based on the performance, both positive and negative reviews will be given. Traditional and digital marketing are two types for promoting your business. Traditional marketing does not impact business: Traditional marketing includes displaying ads in newspapers, Television...

Words: 812 - Pages: 4

Premium Essay

Integrating Digital Marketing with Traditional Marketing

...Integrating Digital Marketing with Traditional Marketing Despite the vast changes in the marketing industry over the past twenty years and with online marketing being largely the dominating force, many basic marketing tactics still remain relevant today. One of them is traditional marketing. This method is very old school no doubt but very practical and very eminent. Before the era of internet, traditional marketing used to be the most effective with a very huge success rate. The methods of traditional marketing such as print advertisements like newsletters, billboards, flyers and newspaper or magazine print ads and also television spots or commercials, and radio advertising, are still incorporated and still very much present in this hi-tech era. There have been an ongoing battle over these years between marketers and advertisers about which type of marketing is more effective and useful given that digital marketing is all the rage and have somehow successfully dominated the marketing industry. Though many marketers agree on digital marketing and have proven huge success rate in their campaigns and advertisements, there are still few businesses that follows the traditional method marketing. Though this debate will still be prevalent for a long time as to which method of marketing offers greater value and benefit, the optimal choice would be to find a way how these two channels can work together and how marketers can leverage the best both channels have to offer. Basically,...

Words: 2545 - Pages: 11

Premium Essay

Digital Marketing Campaign

...the practising and potential entrepreneurs through a host of services like training, research, consultancy, information, education and extension. The Institute is a training ground for senior technocrats, bureaucrats and bankers who come here to gain expertise and knowledge in order to equip themselves with the latest practices and streamline their operations. Set up in 1960, ni-msme has made valuable contributions by creating an impressive record of achievements beyond the Indian shores, enabling other developing countries to get the benefit of the Institute’s facilities and expertise. ni-msme’s activities are changing from time to time to meet the needs of enterprises in the context of globalisation. Training Programme on MARKETING STRATEGIES FOR SHG PRODUCTS IN THE MODERN ERA (16-18 March 2016) Located in a sprawling and enthralling campus amidst a rich natural setting, ni-msme is well equipped with both physical and academic infrastructure. In keeping with the changing times and technological changes, the Institute has updated its style of functioning by focusing on the use of IT in every aspect of its activities, but at the same time retaining the wisdom and advantages of deeply ingrained traditional practices. The Institute stores and supplies information that helps make a successful entrepreneur who is well versed in the intricacies of business and can participate in business activities intelligently and diligently through its SENDOC. ni-msme......

Words: 1117 - Pages: 5

Premium Essay

Digital Marketing Plan

...ASSIGNMENT DIGITAL PLAN – Individual Pre Work Timbuk2 Digital Marketing Strategy Analysis POSITIVE | NEGATIVE | Website * Simple and effective layout * Relevant content * Advertises events, contests and programs for customers to participate (4th July Sale, “Golden Ticket” Contest, Bike Share) | Calls-to-Action * Not clear * Customer needs to browse through the page to find Contact information * Should have obvious positioning (top right/left), larger font and contrasting color. | Social Media Marketing * Excellent customer service approach (inquiries answered in an hour) * Timbuk2 customers can follow posts from the brand on Facebook, Twitter, Instagram, YouTube and Timbuk2 Blog. * Social media integration with website * Adds credibility with real time sharing and by engaging their audience | SEO * Low prominence on organic search results * Frequently searched keywords do not match with the brand unless this one is specifically searched for * Should consider adding relevant keywords to website might increase traffic | Content Strategy * Customer decides whether they want to sign up for newsletters and offers * Provides customized information if customer desires (selecting preferences and gender) * Intuitive navigation * Enjoyable browsing experience | Not Mobile Friendly * Does not have a Mobile App * Website is not mobile friendly * Webpage does not adjust to a smartphone screen * Customers might become frustrated......

Words: 351 - Pages: 2

Premium Essay

The Pros And Cons Of Digital Marketing

...surprise that digital marketing is constantly growing field with incredible scope. In fact, here’s a graph on what the predicted prospects of various marketing careers look like: (Pretty impressive right?) However, it is also true that the digital marketing domain is still relatively new. As such, formal qualifications to get into this field are neither fixed nor predictable. But this is often a blessing in disguise as the onus is on skills rather than a list of qualifications. Despite the lack of fixed qualifications to define this internet marketing domain, though, certain educational...

Words: 999 - Pages: 4