Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.1 Chapter 3 The Internet macro-environment.

Slides:



Advertisements
Similar presentations
Working with the Internet
Advertisements

CHAPTER 4 E-ENVIRONMENT
OHT 4.1 © Marketing Insights Limited 2004 Chapter 4 E-environment.
ELECTRONIC BUSINESS ENVIRONMENT. Learning objectives Identify the different elements of the e-environment that impact on an organisation’s e-business.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.1 Chapter 3 The Internet macro-environment.
Business Plug-In B7 Ethics.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Commerce: Regulatory, Ethical, and Social Environments
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Marketing - Best Practice from a Legal Point of View Yvonne Cunnane - Information Technology Law Group 30 November 2006.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Operational Data Tools Chapter Eight. Copyright © Houghton Mifflin Company. All rights reserved.8–28–2 Chapter Eight Learning Objectives To learn database.
Chapter 5 E-environment
Chaffey, Internet Marketing 4th Edition, © Pearson Education Limited 2009 Slide 1.1 Chapter 3 Click to add subtitle.
E-business Environment ITU Spring Figure 2.1 The environment in which e-business services are provided E-business environment.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003OH 4.1 Chapter 4 Internet marketing strategy.
C4- Social, Legal, and Ethical Issues in the Digital Firm
© Oklahoma State Department of Education. All rights reserved.1 Credit Cards: More Than Plastic Standard 8. 1 Credit Cards and Online Shopping.
Chapter 3 The Internet micro-environment
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Internet Security for Small & Medium Business Week 6
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Chapter 1 Introduction to Internet Marketing
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 2.1 Chapter 2 The Internet micro-environment.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Dimensions of E – Commerce Security
1 Unit 1 Information for management. 2 Introduction Decision-making is the primary role of the management function. The manager’s decision will depend.
Privacy Issues In Market Research Duane L. Berlin, Esq. General Counsel, CASRO Principal, Lev & Berlin, P.C. PL&B Annual Conference Cambridge, MA 22 August.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Social contexts of IS Ch. 3 – Boddy et al.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Overview: Electronic Commerce Electronic Commerce, Seventh Annual Edition.
Systems that support electronically executed business transactions.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
 What is Marketing?? MKT I. Definition  Marketing consists of the strategies and tactics used to identify, create and maintain satisfying relationships.
CHAPTER 2 The Internet micro-environment
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Data protection—training materials [Name and details of speaker]
Slide 2.1 David Chaffey, E-Business & E-Commerce Management, 5 th Edition, © Marketing Insights Limited 2012 Chapter 2 Marketplace Analysis for E-Commerce.
Chapter 4 E-environment 1 1.
Electronic Banking & Security Electronic Banking & Security.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Introduction to E-Business
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 8 Moving from Analysis to Design Design Strategies.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Multichannel – future of retailing
Chapter 3 The Internet macro-environment
Tour IV : e-Environment
Chapter 17 Risks, Security and Disaster Recovery
Ethical questions on the use of big data in official statistics
Chapter 4 E-environment.
E-Commerce and Economic Forces
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.1 Chapter 3 The Internet macro-environment

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.2 Learning objectives Identify the different elements of the Internet macro-environment that impact on an organisation’s Internet marketing strategy and execution; assess the impact of legal, moral and ethical constraints and opportunities on an organisation and devise solutions to accommodate them; evaluate the significance of other macro- economic factors such as economics, taxation and legal constraints.

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.3 Questions for marketers Which factors affect the environment for online trading in a country? How do I make sure my online marketing is consistent with evolving online culture and ethics? How do I assess new technological innovations? Which laws am I subject to when trading online?

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.4 What is the macro-environment? Figure 2.1 The Internet marketing environment

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.5 Example - Oxfam

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.6 Ethical issues Ethical issues concerned with personal information ownership have been usefully summarised by Mason (1986) into four areas: Privacy – what information is held about the individual? Accuracy – is it correct? Property – who owns it and how can ownership be transferred? Accessibility – who is allowed to access this information, and under which conditions?

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.7 Ethics – Fletcher’s view Fletcher (2001) provides an alternative perspective, raising these issues of concern for both the individual and the marketer: Transparency – who is collecting what information? Security – how is information protected once collected by a company? Liability – who is responsible if data is abused?

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.8 Types of information needed Contact info Profile info Behavioural info –Single site –Multiple sites

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.9 Company best practice 1 (see p.88) 1 Inform the user, before asking for information: Who the company is What personal data is collected, processed and stored Purpose of collection 2 Ask for consent for collecting sensitive personal data and good practice to ask before collecting any type of data. 3 Provide a statement of privacy policy. ‘A privacy statement helps individuals to decide whether or not to visit a site and, when they do visit, whether or not to provide any personal information to the data controller.’ 4 Always let individuals know when 'Cookies' or other covert software are used to collect information about them.

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.10 Company best practice 2 (see p88) 5 Never collect or retain personal data unless it is strictly necessary for the organisation’s purposes. For example, a person’s name and full address should not be required to provide an online quotation. If extra information is required for marketing purposes this should be made clear and the provision of such information should be optional. 6 Amend incorrect data when informed and tell others. Enable correction on-site. 7 Only use data for marketing (by the company, or third parties) when a user has been informed this is the case and has agreed to this (this is opt-in). 8 Provide the option for customers to stop receiving information (this is opt-out). 9 Use technology to protect the customer information on your site.

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.11 A summary of actions 1. Reassure customers by providing clear and effective privacy statements and explaining the purpose of data collection 2. Follow privacy and consumer protection guidelines and laws in all local markets 3. Make security of customer data a priority 4. Use independent certification bodies 5. Emphasise the excellence of service quality in all marketing communications

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.12 Technology Think of new mobile technologies introduced in past 2-3 years. Examples: –WAP –3G –MMS (multimedia messaging) What issues do these raise for managers?

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.13 Managers’ choices 1.‘Wait and see’ 2.Early adopter 3.Intermediate What are the benefits of each for mobile phone companies introducing these technologies?

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.14 Diffusion of innovation curve Figure 3.5 Diffusion–adoption curve

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.15 Mobile/wireless proposition Element of proposition Evaluation Not fixed locationThe user is freed from the need to access via the desktop making access possible when commuting, for example. Location-based services Mobiles can be used to give geographically-based services, e.g. an offer in a particular shopping centre. Future mobiles will have global positioning services integrated. Instant access / convenience The latest GPRS and 3G services are always on, avoiding the need for lengthy connection. PrivacyMobiles are more private than desktop access, making them more suitable for social use or for certain activities such as an alert service for looking for a new job. PersonalisationAs with PC access personal information and services can be requested by the user, although these often need to be set up via PC access. SecurityIn the future mobile may become a form of wallet, but thefts of mobile make this a source of concern.

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.16 WAP infrastructure Figure 3.8 Hardware and software infrastructure for a WAP system

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.17 Mobile technology standards Figure 3.9 Mobile access technology standards

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.18 Example 3G device

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.19 iDTV proposition Element of proposition Evaluation Instant access/ convenience Interactive services are available quite rapidly, but return path connections using phone lines for purchase are slower. PersonalisationThis is less practical for PC and mobile since there are usually several viewers. SecurityCredit card details can be held by the iDTV provider making it theoretically unnecessary to repeatedly enter personal details.

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.20 Interactive digital TV Figure 3.12 Components of an interactive digital TV system

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.21 Security requirements Authentication – are parties to the transaction who they claim to be? Privacy and confidentiality – is transaction data protected? The consumer may want to make an anonymous purchase. Are all non-essential traces of a transaction removed from the public network and all intermediary records eliminated? Integrity – checks that the message sent is complete i.e. that it isn’t corrupted. Non-repudiability – ensures sender cannot deny sending message. Availability – how can threats to the continuity and performance of the system be eliminated?

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.22 Encryption Figure 3.13 Public-key or asymmetric encryption

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.23 SET standard Figure 3.14 An example of the Secure Electronic Transaction (SET) standard

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.24 Open Buying on the Internet Figure 3.15 The Open Buying on the Internet model for business-to-business e-commerce

Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.25 Leaders and laggards Figure 3.16 Leaders and contenders in e-commerce Source: Adapted from the Economist Intelligence Unit/Pyramid Research e-readiness ranking (