Assignment Purposes: 1. Evaluate the characteristics of e-commerce. 2. Demonstra
ID: 353843 • Letter: A
Question
Assignment Purposes:
1. Evaluate the characteristics of e-commerce.
2. Demonstrate effective use of technology for communication.
3. Evaluate the effectiveness of an e-commerce Web site.
4. Explain the security and threats in the e-commerce environment.
5. Analyze basic concepts of consumer behavior and purchasing decisions
Assignment Objectives & Requirements:
1. To create a new E-commerce business, which is located in the Kingdom of Saudi Arabia, which include the followings:
a. Introduction about your business.
b. Product and type of services.
c. Business statement.
d. Business vision.
e. Business objective.
2. To explain your business E-commerce processes.
3. To apply a SWOT analysis to your business.
4. Building the E-commerce website.
a. How it will look likes in terms of design and format (draft).
5. Student is required to explain its E-commerce system functionality, such as:
a. The product menu will show all the product we have in stoke.
b. The contact button will have all the company contact details, social media links Facebook, Instagram, etc.
Explanation / Answer
E-Commerce can be described as doing business online with the help of the digital mediums. E-Commerce is based on the Internet and the business structure is very vast which could span across the globe. It is highly competitive as well as have unlimited possibilities as the area of operation for The E-Commerce is extremely huge.
Technology is an essential part of communication. In modern time technology plays an important role in determining different various communication methods. This method could range from telephonic communication to the internet based communication which is highly efficient and provide visual feedback as well. This communication methods are creating a different change in the organisational structures as the overall communication is highly increased with the help of the Technologies.
E-Commerce is prone to several attacks some of them are as follows
fraudulent transactions
By acquiring the company's confidential data using the company's identity which could result in a huge loss for an organisation. Hackers usually import a virus into the company is system and later eats observing about the activities going inside a computer of the company and also capture all the typed data on the keyboard. Later the data is sent to the hacker with the help of that virus without even knowing. By having the important credentials of the company the hacker could easily represent himself as the company and can do big transactions.
Phishing
It is a very major part of hacking and it is usually done by the emails. It is done to acquire the personal data and later use it for asking for ransom or just too defame some personality. the hackers also selfies profiles to some unidentified customers for doing
fraudulent transactions under the fake identity.
Social engineering
This term is used you describe the collection of the data for gaining the physical access to a customer or an employees life. Requiring the social engineering data from the organisation a hacker can easily replicate his Lifestyle Virtually and can create fraudulent transaction as well as more deeper private information for misusing it. One more reason for social engineering used by hackers is to produce corporate espionage to give out profits to the competitor organisations.
For reducing the overall risk of hacking companies can directly via intranet system which only ensure the interconnectivity between the organisation. This is specific configuration reduces the overall effect of the external network sent to the organisation and directly insurance that the system would not be hacked by any other external forces. By using personalised belt operating systems which provide extreme security to the system and if they are connected to Internet. This is specific configuration could be benefit if an organisation requires to connect to the Internet by exposing their database for online securities. Ensuring extreme SSL security could also be very beneficial in reducing the overall hacking for specific organisation.
Consumer behaviour can change time to time while buying stuff from the market.
Consumer behaviour is totally based 6 stages
Problem recognition
Information search
Evaluation of alternatives
Purchase decisions
Purchase
Post purchase evaluation
Problem recognition
Problem recognition can be defined as a desire to overcome some specific problem in and individuals life. Define the need or some specific choice of buying new products for betterment of your life.
Information search
After having your problem recognised individual search for the information regarding the same. If you Want to go out for shopping new pair of shoes you will be setting 40 information on the different sources such as Internet or some external search like friends or relatives.
Evaluation of alternatives
By determining if you really want the product or not and ranking the product according to the need for resuming the search or the product which fulfills the exact criteria which comes into your mind is evaluation of alternatives.
Purchase decisions
By making decisions over the purchases and alternative options consumer decides to purchase different products as well as services. Purchase decisions plays an important role about using the specific content provider for the choices of the customer.
Purchase
In this step consumer decides to purchase the specific product or services from a store. It is not necessarily correct that the individual wouy the product he decided in Purchase Decision.
Post purchase evaluation
If the person is satisfied or not satisfied the level of satisfaction as well as if the individual has made the right decision to buy the product is evaluated in post purchase evaluation. Specific term plays an important role in maintaining the brand loyalty. Experience is positive the customer repeat the process and goes with the same brand for the next time.
By using Different techniques as well as consumer behaviour analysis marketers can easily determine the consumer behaviour and Orient them towards buying their specific products. By providing visual aid as well as provision of different promotional tactics.
By providing discounts towards and specific product creating promotions as well as customer feedback forms can also be very beneficial in orienting the customer towards and specific product.
As a customer and waiter buying decision emarketer can help him turning that buying decision in to purchase by involving different factors as well as benefits for the customer.
In the initial stage there is no influence of the marketer has problem recognition goes inside the customers mind.
While having the information such a marketer can influence its customer by easily implementing the overall advertisement strategies over different platforms of information which would directly lead the customer towards purchasing the product.
When customer is evaluating the alternatives promotional strategies could be done to make your product better in the eyes of the customer. Boy proposing different promotional events as well as discounts a customer can easily evaluate the alternative and choose your product over others.
While making Purchase Decision additional information over over the products and I need of requirement could be told to the customer for making a specific Purchase Decision.
While making a final purchase discount could be provided to improve the overall loyalty of the customer towards a specific organisation. This is specific term is very important as customer can change its mind so providing benefits to the customer could be directly beneficial in making a purchase.
By maintaining the product quality as well as maintaining the service quality can be very beneficial and post product evaluation which creates a feeling of loyality in the customer and directly affects the overall sales of the product as a customer returns to buy the same product again.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.