Chapter 2. From Brick-and-Mortar to E-commerce to E-business Transformation

E-BUSINESS IS NOT ONLY ABOUT making business processes available over the Web or designing and posting a Web site online. E-business leverages up-to-date technologies and trends to turn a viable business into a viable online business. It is also about testing and improving strategies to grow an e-business while keeping it secure.

E-commerce is the activity of negotiating the exchange of products and services electronically. E-commerce existed in a variety of forms before the inception of the Web. Money wire transfers, for example, were electronic fund transfers (EFTs) to exchange account information over private communication networks. Businesses also have been engaging in a form of e-commerce known as electronic data interchange (EDI) when transmitting computer-readable data in a standardized, agreed-upon format to another business.

With Internet and Web developments, e-commerce and e-business have taken a giant leap forward. This chapter explores the transformation to e-business and e-commerce, including what it takes to create, manage, and grow a successful online business.

The Evolution of Business from Brick-and-Mortar to the WWW

Since its inception, e-commerce has rapidly changed with the introduction of new technologies. E-commerce has gone through three distinct phases that feature trends from the development stages of the Internet and the Web. In this section, you will read about the three stages of the e-commerce history: the brick-and-mortar model, the consumer-driven model, and distributed e-commerce.

E-commerce: A Brick-and-Mortar Model

Many early e-commerce sites offered catalog display systems essentially duplicating brick-and-mortar storefronts. One of the primary goals of e-commerce at this point was to display or distribute information about products and services, but the emphasis was to drive customers to the physical store. In many cases, e-commerce sites operated as display windows for the brick-and-mortar store. For their part, customers began to visit these sites for comparison-shopping, not to buy online.

The e-commerce business model of this time closely mimicked the policies, procedures, and practices of the physical store. Much of the software, security protocols, and infrastructure were in early stages of development. Over time, software advanced, allowing greater support for online transaction processing, supply-chain management, customer relationship management (CRM), enterprise resource planning (ERP), ordering, inventory management, shipping and logistics, and data mining.

As technologies advanced, it became clear that e-commerce sites were more than electronic advertisements for a physical store, they were themselves viable storefronts. The focus shifted towards the Web, the consumer, and online marketing.

Customer-Focused E-commerce

Rather than merely presenting catalog offerings to consumers, e-commerce applications developed around the business semantics of the transaction. True Internet e-commerce shifted from general selling to focusing on the individual customer. Online marketing became critical, and companies that did marketing best made money. Many e-business owners could see that their strategy had to move from passive marketing in which customers "happened" upon a Web site to aggressive marketing in which potential customers were brought to a Web site.

To do this, a strong emphasis was placed on "demographics" (characteristics of customers) and on understanding everything possible about potential customers. Internet marketing leveled the playing field in that anyone with a product or idea could easily publish a Web site and try online marketing. Many such entrepreneurs became wealthy overnight; many more lost everything.

Today, the World Wide Web is a marketing and advertising juggernaut with organizations scrambling to be part of it. Advertising controls much of the Web today; virtually every Web site displays a number of ads. In the background, companies seek personal information to profile potential customers and track surfing habits to see what sites are visited and why. Your Facebook account, for instance, reveals demographic information, and this information determines what ads appear when you check the site.

Where e-commerce is today is largely the focus of this chapter.

Emerging Trends in E-commerce: Distributed E-commerce

Web 2.0 developments and the Web 3.0 paradigm have launched the next stage of e-commerce. Consumers advertise their needs, and businesses or individuals compete to meet them. With the promise of the Semantic Web, intelligent agents will assist you in finding businesses or individuals to fulfill your needs. The Web browser will change from a mere interface to an intelligent personal assistant or agent.

Wireless and embedded Internet-enabled devices have made significant advances. Wireless technologies provide access to network computing anywhere. Smartphones and similar devices offer interaction quality that's comparable to desktop computers. Embedded devices have been emerging in homes and businesses alike. These devices not only provide access to an entity on the Internet, they also enable access to certain activities. It is a distributed e-commerce model in which e-commerce occurs anytime and anywhere.

Top-of-Mind Business Drivers

Profitability and competitive edge are two important goals for all companies. Managers and the CEO continually look for ways to increase their customer base and improve their company's bottom line. Common business drivers that spur companies to create a Web site or improve and update existing Web sites are:

  • Growing the business through the WWW—A Web presence is a must for business today, even for companies that don't engage in e-commerce. Potential customers use the Web to find information about products and services they can buy online or locally. An easy-to-use and informative Web site can help expand a company's services.

  • Transforming a business into an e-business—The Web makes some business processes easier and more efficient. For example, you can tie your inventory database to a Web interface for sales purposes. Real-time inventory updates streamline ordering and customer delivery. In addition, a Web presence can save on printing and mailing items that change often, such as sales fliers and product lists.

  • Building secure and highly available Web sites and e-commerce portals to expand revenue potential—Reliability and availability are key considerations for e-business. Reliability refers to the robustness of the Web or e-mail server and its ability to continue service in the event of failure. Every e-business needs high availability, so that it's accessible 24 hours a day. Downtime often equates to a loss in sales and, potentially, a loss of customers.

  • Building a Web-enabled customer service strategy—Users today are accustomed to and feel comfortable with Internet communication methods such as Web chats, instant messaging (IM), forums, social networks, and e-mail. E-business customer service strategies must adapt and use these forms of communications to meet the expectations of modern consumers. Such a strategy engages customers more dynamically with technologies they like.

  • Obtaining new customers through Internet marketing—Acquisition is a critical consideration for every business. If you don't have visitors, you don't have customers. Today, companies of all sizes hire "acquisition consultants" whose job is to drive traffic to corporate Web sites.

Solving Common Business Challenges

Most businesses have an online presence, that is, a Web site that augments their existing brick-and-mortar store. Many sites, however, under-perform, and companies do not see an adequate return on investment (ROI) from their Web strategy. This stems from the lack of an Internet e-business strategy: Organizations without an effective e-business strategy struggle to find a foothold online. E-businesses face numerous challenges, none of which is manageable without a clearly defined e-business strategy.

Note

To grow and be successful, online businesses take hours of work, maintenance, and research. Attracting visitors to an e-business site requires creativity and multifaceted online marketing strategies.

You'll learn about e-business strategies in detail in the "E-business Strategies" section later in this chapter. The next sections focus on solving common business challenges.

Planning Properly

Transforming a brick-and-mortar business to an e-business is not a straightforward process—you must make many decisions. Certainly, the establishment of an e-business requires more than just posting a Web site. Here's a to-do checklist when starting an e-business:

  • Market research—Research the competition's Web sites and gather as much information as possible about shipping costs, price points, Web site navigation, shopping cart procedures, and alternate revenue streams. The more information obtained from competitors, the greater the knowledge of the market, demographics, and advertising avenues.

  • Business plan—Create a detailed business plan with sales projections, budgets, goals, and actions. E-commerce sites are best executed according to a carefully crafted business plan.

  • Domain name—Choose a domain name that reflects your business and identifies it in the Uniform Resource Locator (URL).

  • Target market—Clearly identify your target market. What information is available about the target demographic? Where do members surf? What is their income? Detailed knowledge of the demographic is a priority in establishing the correct e-business presence.

  • Advertising budget—While some online marketing strategies are free, many are not. Review your advertising marketing options and create a realistic marketing budget.

  • Distribution—If shipping is required, establish distribution channels. Are shipping costs and returns carefully factored into the plan? How will your target market wish to pay: by credit card, bank transfer, or some other way?

  • Revenue stream—Determine your main revenue streams. Do you sell goods or services? Do you sell advertising?

  • Data management—If you must handle personal customer data, such as credit card information or mailing addresses, it is essential to have a published policy detailing how this information will be gathered, stored, and secured. Data use policies are typically published on the Web site.

  • Return policy—Establish a return policy and state it clearly.

  • IT support—Decide whether you will update and maintain the Web site in-house or outsource IT support.

  • Customer service—Determine the methods you'll use for online customer service. These methods often differ from those used in offline stores.

These are some considerations for planning an e-business. You will need to address each item to help ensure success. Setting up a Web site is just one step; the site then requires constant updating, marketing, and technology and security enhancements. This work will ultimately determine the success of your site.

Managing the Customer Life Cycle

Growing an online business also requires an understanding of customer life cycle management (CLM) and how it pertains to online marketing. CLM refers to the relationship with online visitors from the moment they click onto a Web site to the time they leave. CLM is an essential part of the online marketing campaign and forms the foundation from which all marketing strategies are designed and applied.

There are three distinct stages involved with the CLM:

  • Acquisition—Attracting visitors to your site

  • Conversion—Getting visitors to perform a desired action on the site, such as a purchase

  • Retention—Drawing customers back for future business

These stages flow sequentially. There can be no conversion without acquisition and no retention with conversion. Some developers and marketing businesses simplify CLM by asserting that e-business success is all about acquisition and driving traffic to the site. This statement is only partially true. Growing your e-business online involves getting "qualified" traffic to your site. This means marketing strategies that focus on the acquisition of visitors who fit your desired demographic.

Note

E-business success depends on many factors, including a clear understanding of CLM and the relationship between acquisition, conversion, and retention.

Implementing an Effective Internet Marketing Strategy

One of the greatest challenges facing e-business is driving traffic to the site. Designing and deploying an effective Internet marketing strategy does not happen by accident. Rather, it is a dedicated and proactive search for marketing avenues. Internet marketing is not passive, not simply waiting for visitors to arrive. Internet marketing requires knowing and actively seeking the demographic.

For example, assume an upstart e-business wants to sell craft supplies online. The competition for search engine optimization (SEO), covered in detail later in this chapter, would be very high for this type of business, making it a great challenge to draw visitors to the craft site.

Direct customer interaction and grassroots marketing is key. Following are 10 online marketing avenues that a craft-based Web site could use to drive traffic to its e-business site:

  1. Participate in craft-related forums building relationships with other crafts people. These relationships can form a customer base.

  2. Submit articles to ezinearticles.com, isnare.com, or other places to establish yourself as a crafts expert and drive traffic to the site with article links.

  3. Issue online press releases for new products or services using companies such as prweb.com or sourcewire.com.

  4. Develop a social networking site for like-minded people. For example, a Facebook page with 100 contacts all interested in crafting makes a great customer base.

  5. Develop a blog with strong content around crafts and crafting. This is another way to build credibility. Post hints, tips, and other forms of feedback on other craft supply Web sites.

  6. Develop a link exchange program with related Web sites.

  7. Use click-based advertising on related sites and aim for a specific demographic on social networking sites.

  8. Develop instructional videos and post them on Web sites such as youtube.com.

  9. Register the bookmarks of your business online with companies such as delicious.com.

How and where businesses meet and interact with clients count. This is the foundation for modern Internet marketing. So, why aren't all e-businesses doing this? Many lack knowledge or time. Online marketing campaigns, writing articles, posting on forums, and more are time consuming and results can be slow. Those who do these tasks, however, will enjoy a much better ROI on their Internet investment.

Creating New Revenue Streams

Revenue diversification is a key consideration for many e-businesses. While the primary revenue source is often the sale of a product, the addition of alternate sources can boost revenues of the online venture.

Four key revenue streams are available online today:

  • Advertising—Advertising is a common way to increase revenue. E-business sites with many monthly hits can benefit greatly from ad revenue.

  • Subscription revenue—Subscriptions can be lucrative for an online business. A subscription requires quality and original content that customers cannot easily find for free.

  • Products and service revenue—Revenue derived from direct Internet sales of products and services is common. Products can be virtual, downloadable, or a physical product that requires shipping. To avoid shipping costs, virtual products are preferred. Services such as Web site evaluations, financial services, and counseling services are potential sources of revenue.

  • Commission revenue—Commission revenue is made from paid marketing alliances and affiliate marketing.

Enhancing Customer Service Delivery

A bedrock of online customer service is the personal touch. Poor customer service will drive customers away while great customer service will bring customers back. The following are three proven strategies for enhancing customer service:

  • Reply to customer queries quickly. Making customers wait creates frustration and a negative impression of the e-business.

  • Define customer service policies and stick to them. Customer service policies detail how customers are treated. All members of your organization must follow the policies.

  • Be open, friendly, and approachable. The Internet can be a cold and impersonal place for doing business. Providing a personal and friendly approach to customers will encourage repeat business.

One means of providing enhanced customer service is through self service. A "self-service" Web site allows customers to conduct business without direct involvement by a company representative. Many Web site development tools include personalization features that give self-service customers the feeling of one-to-one attention.

Note

Conversion rates determine the success or failure of a self-service Web site. Conversion failure is typically a result of complicated checkout procedures, poor navigational structure, lack of trust icons, and the wrong demographic focus.

To be effective, a self-service Web site needs to be easy to use with accessible instructions and support. The success of a self-service e-business site hinges upon the quality, quantity, and ease of access of information. Often, a self-service site is tested and retested to make sure that it is user friendly and answers all relevant questions. The benefits of a well-designed self-service Web site are clear: reduced customer support costs and speed of transaction for the customer.

Enhancing customer service delivery also involves ensuring modern communication technologies are used. Voice over Internet Protocol (VoIP) transfers human voice over the Internet using IP data packets. VoIP technology provides a less-expensive alternative to standard phone service. VoIP avoids the high cost of regular phone calls by using the Internet. No monthly bills or expensive long-distance charges are required.

Note

SIP also includes a suite of security services, such as denial of service prevention, authentication (both user-to-user and proxy-to-user), integrity protection, encryption, and privacy services.

VoIP relies on the Session Initiation Protocol (SIP) to make communication happen. SIP is designed to establish and maintain multimedia sessions such as Internet telephony calls. This means that SIP can create communication sessions for such features as audio/videoconferencing, online gaming, and person-to-person conversations over the Internet. This makes SIP a viable option for e-business communications.

You'll learn about VoIP and SIP technology in Chapter 3, and best practices for securing VoIP and SIP communications in Chapter 14.

Telecommuting and Secure Access for Remote Employees

Remote access to the network and telecommuting is common in business today. It is impractical to use dedicated connections for each remote employee; instead, secure remote communication channels need to be established over a free network, the Internet. While the Internet provides the infrastructure through which remote employees can access the corporate network, it creates significant security concerns. To address security concerns, you can use a virtual private link between the employee system and the remote network. This private link is known as a virtual private network (VPN).

Secure Web communication protocols provide a way to authenticate clients and servers on the Web and to protect the integrity of communication between clients and servers. Three such protocols are:

  • Point-to-Point Tunneling Protocol (PPTP)Point-to-Point Tunneling Protocol (PPTP) creates a secure communications tunnel between two points on a network. This tunnel is the basis for VPNs. You can use VPNs to establish remote point-to-point connections over a public network, such as the Internet. PPTP enables authenticated and encrypted transmissions between two points, such as a Web client and a server. PPTP competes with L2TP and IPSec as protocols for establishing a VPN.

  • Layer Two Tunneling Protocol (L2TP)—Like PPTP, it uses tunneling to deliver data. It authenticates the client in a two-phase process: first the computer and then the user. By authenticating the computer, it prevents data from being intercepted, changed, and returned to the user in what is known as a man-in-the-middle attack. L2TP does not provide encryption over a VPN. That's where IPSec comes in.

  • Internet Protocol Security (IPSec)Internet Protocol Security (IPSec) secures communication between systems within a network as well as communications that are transmitted outside a local area network (LAN). IPSec can be used to encrypt, authenticate, and verify the integrity of communications. IPSec is commonly used to secure VPN connections.

You use each of these protocols to secure specific forms of communications via VPNs. Employees with access to the Internet can create a VPN link and access their corporate network as if they were sitting at it. In this way, a VPN extends a LAN to remote clients. Using secure protocols, the VPN provides a secure, point-to-point, dedicated link between two points over a public IP network.

Organizations use the VPN link as a secure, cost-effective, and convenient way to connect remote users to the network. Many elements are required to establish a VPN connection:

  • A VPN client—The client is the remote user attempting to access the corporate network. The VPN client is the computer that initiates the communication.

  • A VPN server—The VPN server responds to the client request and authenticates the connection.

  • Transmission media—The transmission media most often used is the Internet. Private networks also support VPN connections.

  • VPN protocols—A VPN is created and secured using specific protocols, namely PPTP, L2TP, and Secure Sockets Layer (SSL). PPTP and L2TP can create the VPN tunnel and enable authentication and encryption. Authentication allows VPN clients and servers to establish the identity of people on the network. Encryption allows potentially sensitive data to be guarded from the general public.

Note

Despite the advantages of using a VPN, security and reliability are primary concerns. You can manage security with proper protocol application; however, Internet connectivity can be unreliable. You'll learn about VPN and other communications security in Chapter 8.

Maintaining Highly Available and Secure E-mail and Web Site Hosting

Many companies contract with a Web hosting company to host their e-business sites. Web hosting companies utilize several advanced methods to ensure availability. When choosing a Web hosting company, it is important to review the company's availability measures. Some of the problems Web hosting companies must protect against include:

  • Hardware failures—Hardware failures are managed using redundant hardware configurations such as redundant array of independent disks (RAID) for hard disks, multiple memory, and failover servers.

  • Software failures—Software failures are a constant concern. Hardening applications using the latest service packs and patches help prevent software failures.

  • Virus infection—All Web-hosting companies require up-to-date virus checkers and constant updates on the checkers.

  • Denial of service (DOS) attackDenial of service (DOS) attacks are designed to flood a server or service. A Web hosting company can manage these threats using secure protocols.

  • Infrastructure failure—Web hosting companies typically use high-end networking equipment, but even it can fail. Redundant infrastructure equipment is used in a failover configuration to manage problems.

  • Power outage—Power outages are commonplace and are managed using large, uninterruptible power supplies (UPSs). A UPS protects a Web server against brownouts, blackouts, and power spikes.

  • Natural disasters—Fire, floods, and other natural disasters can down Web servers. Natural disasters are typically managed using a remote network location. Should the primary location be compromised, the second facility can take over.

A good Web hosting company will be aware of these threats and take the necessary precautions to mitigate them.

The Internet and WWW Never Sleep

Long after the lights go out in brick-and-mortar stores, e-commerce Web sites stay open for business. Modern networking hardware is designed to last and run thousands of hours without failure. In the event of failure, numerous strategies are in place to ensure that the Internet is open for business.

The Internet itself is an interconnected collection of computer networks. These networks are linked using routers and high-speed media such as fiber cabling. The Internet operates as a huge mesh network enabling multiple paths for data to reach its destination. Riding on these hardware technologies and fault-tolerant strategies is the most robust suite of protocols in use today, TCP/IP.

This means that the Internet is built on solid ground and can be trusted to be up and running 24 × 7 × 365.

Virtual Businesses Run 24 × 7 × 365

The availability of the Internet allows e-business unrestricted access to all-day, every-day business availability. This is a boon for companies whose e-business uses a self-service form of e-commerce. With self-service Web sites, no interaction is required on the part of the business. All support, purchasing, e-mail responses, and shipping are handled automatically.

It's no wonder organizations are scrambling to be part of this open, global marketplace. However, despite being open all hours, many companies do not see an adequate ROI if their Web site generates very little interest. Here are a few reasons why an e-commerce site may fail even though it is available all the time:

  • No visitor tracking—Visitor tracking tools such as Google Analytics provide e-business owners with a detailed look at the traffic flow to their site—who's coming, where they came from, how long they stayed, and more. Web analytic tools help track and trace visitors, allowing e-business to monitor trends and patterns and help focus their site.

  • Poor site design—An e-business site may be available all hours, but if it is unappealing and difficult to work with, it will not see the required conversions.

  • Confusing check-out procedures—If analytic software identifies that visitors leave when they get to checkout, there's a problem with checkout procedures. For ideas on streamlining the process, visit other e-business sites.

The overall point: If an e-business site is open 24 × 7 × 365, it should enjoy conversions. If not, it's time to reevaluate the business strategy plan or make one for the first time.

E-business Strategies

An e-business strategy is a set of policies, procedures, and practices that provide the framework of the business. Without one, an e-business will struggle. Some questions an e-business strategy addresses include:

  • Who exactly is the target demographic?

  • What marketing strategies are appropriate for the demographic?

  • What is the marketing budget?

  • Who will monitor traffic and visitor trends?

  • How will customer support be handled?

  • What method of client contact will be used?

  • Is SEO the primary marketing technique?

The answers to these questions provide the focus and direction for the complete e-business strategy.

Customer Acquisition and Revenue Growth

One of the great myths of e-business is that the more visitors who go to a site, the more sales or conversions. As mentioned earlier in the chapter, marketing and acquisition efforts must focus on getting qualified traffic to the site. Qualified traffic refers to those visitors who are searching specifically for your goods or services. If acquisition efforts are not focused, it is possible to waste advertising budgets and hamper the growth of the e-business.

There are three key steps involved in traffic acquisition:

  • Isolating the demographic—Who is your target market? Women? Children under 12? Doctors? Sports fans over 25?

  • Designing a site that meets the needs of that demographic—The language, tone, and feel of a site will be different if marketing to snowboarders than to seniors. The site is designed around the demographic with its unique needs and expectations in mind.

  • Identifying demographically appropriate marketing avenues—There are many ways to market online. For example, a senior poker enthusiast is more likely to see an advertisement on a poker-related Web site than on Facebook.

Once these three conditions are met, it's possible to focus marketing budgets and drive qualified traffic to your site. Marketing and e-business success is hindered if the demographic is not clearly isolated.

Isolating Key Demographics

An e-business Web site is designed with a demographic in mind. The demographic shapes the look, language, images, and even the navigational structure of the site. Demographics represent the statistical characteristics of a particular group of customers. Isolating these characteristics enables businesses to identify the behaviors, attitudes, and even surfing habits of potential visitors and clients. Understanding the demographic is key to acquisition and e-business success.

You can use online surveys, e-mail campaigns, and Web analytics from companies such as Google and Yahoo to gain demographic information. The types of information to look for include:

  • Age range

  • Relationship status

  • Geographical location

  • Employment status

  • Type of employment

  • Income range

  • Hobbies

  • Shopping habits

  • Surfing habits

Note

Growing an online business will almost certainly require using Web analytic tools. For a look at Google Analytics, go to http://www.google.com/analytics/. Yahoo! Web Analytics are at http://web.analytics.yahoo.com/. The Quantcast Web site at http://www.quantcast.com also helps you identify and evaluate demographics.

All this information and more go into developing a clear idea of your ideal visitor. Are you targeting women over 50 with an average income of $50,000, male adolescents, or middle-aged men who love the outdoors? The narrower your demographic niche, the more targeted your advertising can be and the more qualified your traffic becomes.

Conversion: Getting Results

A conversion occurs when a visitor performs a desired action on the site, such as purchasing a product or service. It also can be signing up for a newsletter, entering an e-mail address, subscribing to a site, and much more.

You can measure the success of an e-business site by the conversion rate. Specifically, the conversion rate represents the percentage of visitors that performs a desired action against the percentage that does not. The higher the conversion rate, the better the site. On the other hand, a high bounce rate is damaging to an e-commerce site. The bounce rate is the percentage of single-page visits to a site-visitors who "bounce away" to another site. This is a standard measure of a site's quality and relevance to the visitor. The lower the bounce rate, the better the site.

There are many reasons an e-business site suffers from low conversions and high bounce rates. These factors include:

  • No discernable demographic—If the demographic has not been successfully isolated, the conversion rate likely will be low.

  • Complex page design—Simple sites with easy navigational strategies work best. If an e-business site is cluttered or visually unappealing, visitors are likely to leave. Poor navigation can lead to frustration, a high bounce rate, and a low conversion rate.

  • Slow load times—Most visitors do not stay long waiting for a Web site to load. Slow load times almost certainly lead to higher bounce rates and lower conversion rates.

  • Limited contact information—Visitors feel more comfortable when they see contact information, should they have questions or concerns. While an e-business is not a brick-and-mortar store, it should emulate the characteristics of a physical store.

  • No return policy—Customers want to know how to return a product. Having a visible return policy can increase confidence.

  • No clear call to action—The "call to action" tells the visitor what to do. Calls to action include: "Click here for a free download," "Buy now and get a second free," and "Sign up for our newsletter."

  • Complicated conversion procedures—Is the shopping cart process complex? If so, it can lead to frustration and lower conversion rates. Make the process logical and easy.

Note

All visitors to an e-business Web site bring with them expectations. They expect the Web site to load quickly and to offer easy access to the information they are looking for. They also expect relevant content, trust icons, calls to action, an appropriate level of technology, and more.

Tracking down the causes of poor conversions can be arduous, but it is essential to growing an e-business. Using Web site tracking tools, you can get a complete picture of a visitor's experience with your site. For example, you can determine the browser they used, the site they came from, which pages they visited on your site, how long they visited your site, and which page they left from. Software tools such as Google Analytics can fully analyze your Web site and give you the information you need.

Tip

If a site has plenty of hits but a high bounce rate, the wrong traffic is being driven to the site. To bring in more qualified traffic, track where you are running advertisements and modify your plan.

Retention: Getting Repeat Visitors

Retention is the third key element of a successful e-business. Retention is the process of keeping existing customers and obtaining repeat business. A business grows with new customers and survives with the established customer base.

Several strategies help retain customers. These include:

  • E-mail updates—One of the goals of an e-business site is to obtain the e-mail addresses of visitors and maintain communication. The e-mail address can be used to send visitors product additions, news releases, coupons, and other updates. This form of communication encourages visitors to return to the site.

  • Newsletters—Having customers sign up for newsletters is a great way to keep in touch. The newsletter can be used to introduce new products, informative articles, product reviews, and much more.

  • Bookmarks—Customers bookmark the e-business site for easy return.

  • RSS feed—Customers sign up for an RSS feed so they can receive updates about the site.

These are just a few strategies to keep customers engaged and informed.

E-commerce and Enhanced Customer Service Delivery

As with offline stores, e-businesses have a number of customer service avenues. Feedback forms, e-mail, phone, and visitor forums are possibilities. The incorporation of customer service strategies will significantly change how well your online business is perceived and trusted. This will ultimately move your conversion rates in a positive direction.

There are three levels of customer service communication, each with its own advantages and disadvantages. These are one-way communication, limited two-way communication, and full two-way communication.

One-Way Communication

One-way communication is the most cost-effective form of customer service. With one-way communication, customer support and service materials are placed on the e-business site to communicate with customers. This may include a frequently asked questions (FAQ) section, support documents, and knowledge centers. The goal of one-way customer service communication is for customers to find answers without calling or e-mailing customer support. If done correctly, this can reduce costs and the time commitment to customer service while addressing customers' needs.

There are several key strategies you can use on a one-way communication site:

  • Develop a comprehensive FAQ section. Many customer service calls are repeat questions. Answering them in a FAQ section can reduce customer frustration and time on calls.

  • Develop downloadable manuals and product documentation to better inform customers of the product or service.

  • Make sure your page layout is clear and displays your content well. A cluttered e-business site makes it hard to find relevant information.

  • Develop a knowledge center or searchable database for solutions to commonly asked questions.

  • Record training videos or webinars for customers to watch.

  • Many customer service calls center around checkout procedures. Streamlining and thoroughly testing checkout procedures can significantly reduce calls.

Limited Two-Way Communication

Note

The information received from these forms is incorporated into the Web site in FAQs, knowledge databases, and more. The more feedback received, the better the e-commerce site becomes.

Most e-business Web sites will incorporate some form of limited two-way communication. This strategy moves more towards Web 2.0, seeking feedback from the visitor. The incorporation of feedback into the site makes it better suited to address the needs of the demographic. Some Web-enabled systems for limited two-way communication include:

  • Customer surveys

  • Feedback forms

  • "Contact us" forms

  • E-mail support links

  • Customer support request forms

  • An associated social networking site

Full Two-Way Communication

Full two-way communication is the most time-consuming and costliest form of customer support, because it requires full dialog with the customer. This can quickly become unmanageable. Imagine 5,000 visitors to an e-business site per day with 1 percent having a support question. That's 50 support calls, each requiring 10 to 20 minutes. That could translate into eight-plus hours of customer support. Several technologies enable full two-way communication for customer support. These include:

  • Phone support

  • E-mail communication

  • Forums

  • Instant messaging

  • Web chats

  • VoIP

Two-way communication strategies are essential for large organizations and require dedicated staff to manage large customer service systems. Small to mid-sized companies may want to lessen the focus on two-way communication to reduce costs.

E-business with Integrated Applications

E-commerce requires an infrastructure of technologies that starts with the Internet and World Wide Web and includes hardware, software and networking components, distributing computer environments, middleware, user-interface technologies, server-side facilities and services, languages, and software development methodologies.

The five layers of e-commerce architecture are:

  • Foundation layer—The basic operational platform, which consists of the hardware and system software on the local machines, as well as the networking hardware and software that enable computers to communicate.

  • Internal applications layer—Represents the ERP, CRM, and legacy systems. It acts as an interface between the infrastructure and the e-commerce applications. ERPs are systems that enable a business to execute product planning, inventory management and purchases, and CRMs manage the customer base. They collect data on customers and their buying habits, and potential customers. They use this information to set prices, negotiate terms, customize promotions, add features to the product or extend services offered, all to customize the business's relationship with any individual customer. ERPs and CRMs have started to integrate solutions that support both the revenue and the administrative support functions of a business.

  • Middleware layer—The framework that enables distributed applications for common services. Examples of middleware frameworks are Java Remote Method Invocation (RMI) and the Common Object Request Broker Architecture (CORBA). Java RMI provides a framework for writing distributed applications in Java. CORBA enables code written in various languages (including code written for legacy systems) to communicate and work together.

  • Application layer—E-commerce applications make up the application layer. Software needs to be written for the commerce server and the Web server. The Web server is the interface of the commerce server to the applications requesting services by means of the Internet.

  • Relationship layer—The user interface to the e-commerce application. Two examples of entities in this top level of e-commerce architecture are e-commerce agents and wireless technologies providing user access to the e-commerce applications.

Internet Marketing Strategies

A range of online marketing strategies can be used to generate traffic for an e-business site. Some of these are costly, others free, but each has a time commitment and learning curve.

A pay-per-click (PPC) revenue model is an Internet advertising model that uses clickable ads on a Web page that link to another Web page. The PPC ads are associated with the keywords used by a Web browser and are purchased by an advertiser. Essentially, the more the keyword is used in searching, the more you pay. Choosing the wrong keywords and paying too much will surely sink your acquisition efforts. PPC ad campaigns can be very complex, involving hundreds of keywords and daily tracking procedures. Companies such as Google, Yahoo, and Facebook offer PPC ad campaigns.

Other types of Internet advertising include:

  • Affiliate marketing—An ad is placed on one site (the affiliate) and directs traffic to someone else's Web page. The Web page owner tracks visitors referred from the affiliate's Web site and the affiliate is compensated for referrals that become customers or complete a required transaction.

  • Banner advertising—A banner ad is typically a short, rectangular ad placed into a Web site. The advertiser's cost is determined by the number of hits the site receives and the placement of the banner ad on the page.

E-mail Distribution Lists and E-mail Blasting

Today, e-mail marketing is a major marketing tool. Most companies have an e-mail marketing campaign whether formal or informal, because campaigns are cheap and effective. Advantages of e-mail marketing include:

  • Personalized communication

  • Global communication

  • Round-the-clock advertising

  • Trackable results

  • Fast response

  • Easy implementation

With such advantages, e-mail will continue to be an effective marketing tool if used correctly. Poor e-mail marketing includes e-mail blasting, which is sending out unsolicited bulk e-mails, spamming, and not respecting requests to be taken off e-mail lists.

To be effective, many companies use opt-in or distribution lists in which visitors agree to receive company e-mails. An e-mail distribution or opt-in list is the best approach for e-mail marketing.

Lead-Generation Web Sites

While many e-business sites measure conversion success in terms of sales, other sites are designed for lead generation. These Web sites get contact information from a visitor to encourage a future purchase rather than one today. These types of sites can be very effective if you can contact the visitor and close the sale. Often the goal of lead-generation Web sites is to get visitors' contact information for later use.

One type of page used in a lead-generation Web site is known as a "landing page." A landing page is the Web page arrived at when clicking an online ad, e-mail link, or any other form of online marketing campaign. Landing pages are not Web sites. Rather, they are a focused page typically designed for a single purpose, often to have a visitor perform a specific action. With lead generation, the landing page obtains a visitor's contact information. Landing pages effectively engage visitors and may be the next wave in online marketing strategies.

SEO Marketing

One well-documented online marketing strategy is search engine optimization (SEO). SEO refers to a collection of procedures to make a Web site more browser-friendly and, in turn, increase a site's placement in search engine results. This is important because Internet users typically do not look past the first 10 displayed results. To move higher in search rankings, a site has to be search-engine friendly. The key is keywords.

Using HTML Tags

Within the HTML code for Web sites are tags in which keywords can be placed. When the site is visited, the keyword within these tags should draw the attention of the search engine and improve search ranking. For those unfamiliar with HTML, the next section may be a bit confusing, but it is worth knowing for marketing purposes.

HTML <TITLE> tags.

Every page within a Web site can have a <title> tag built into the HTML code. The content within the <title> tag can be seen in the Web browser's title bar. The title itself from the tag is shown in the top left-hand corner every time a browser is opened. The <TITLE> tag is placed between the <HEAD> tags within your HTML Web page code, using the <TITLE> (beginning) and </TITLE> (ending) syntax.

The information within the <TITLE> tag is sought out by search engines and the engine assumes (correctly or incorrectly) that whatever is in the <TITLE> tag directly relates to the content of your page. The <TITLE> tag should, therefore, contain keywords associated with the content of your site.

To see how all this lines up in the HTML code of a typical page, check out the following:

<HTML>
<HEAD>
<TITLE>This is a keyword example text</title>
</HEAD>
<BODY>

To effectively use the <TITLE> tag, consider the following:

  • Ensure that the information within the <TITLE> tag is relevant to the site and includes keywords related to the site.

  • Each Web page within a site can have its own <TITLE> tag, allowing separate keywords for each page.

  • Be succinct in the <TITLE> tag. Long, wordy descriptions will be lost.

HTML <DESCRIPTION> tags.

The <DESCRIPTION> tag is used to inform the search engine about what the site is actually about. Unlike the <TITLE> tag, the <DESCRIPTION> tag can be several sentences long and should be used to provide a detailed description of the site. The <DESCRIPTION> tag should include a number of keywords. The following is an example of a <DESCRIPTION> tag.

<HEAD>
<TITLE>This is a keyword example text</title></HEAD>
<META name="description" content="It is important to place keywords in the description tag. This should help the search engines index the site accurately.">
<BODY>

Note

Part of a SEO strategy involves periodically updating the content on a site. This keeps search engines looking at your page and it keeps visitors interested.

Remember, the information within the description tag may be used in the search results to identify the site. It is important to write the description well.

Social Networking and Other Forms of User-Generated Content

As mentioned in Chapter 1, Web 2.0 ushered in social networking and other forms of user-generated content. Companies, government, nonprofit organizations, and even individuals have discovered ways to use the "social" aspects of Web 2.0 as effective forms of marketing.

The following quick list highlights ways to obtain new customers and drive traffic to your Web site using Web 2.0 features:

  • Develop a social network presence—Social networks are a great way to spread the word about an e-business. Social networks such as Facebook have built-in advertising streams you can buy. With this strategy, you choose the demographic and an ad appears on pages of members that match the criteria. Social networks can also be used for free as an e-business information distribution service.

  • Submit articles—By writing and submitting articles to other Web sites, you can include links and drive traffic to your e-business site. Sites like digg.com, isnare.com, and ezinearticles.com enable users to post articles with back links.

  • Use social bookmarking—Share your bookmarks online for others to link to. Sites such as furl.net and delicious.com allow for social bookmarking.

  • Join forums—Become established as an expert or regular contributor in discussion forums. Once you're established, you can lead traffic to your e-business site.

Summing Up

As you've seen, there are many avenues open to e-business marketing. Some marketing strategies, such as banner ads, require a budget and close monitoring over time to modify the budget based on the effectiveness of the ads. Other strategies require little or no up-front costs. However, most marketing strategies require an investment of time and effort, and some are highly time consuming. The success of an e-business site often depends on how much time and energy goes into these marketing campaigns.

Table 2-1 highlights marketing strategies and the potential time commitment of each.

A conservative estimate suggests that managing Internet marketing strategies requires 20 to 25 hours per week. The more time you put in, the better the results. Table 2-1 outlines 10 possible marketing strategies, but there are more. Each e-business must decide which strategies provide the best ROI and which are not manageable.

Table 2-1. Internet marketing strategies and requirements.

MARKETING STRATEGY

REQUIREMENTS

HOURS PER WEEK

Article submissions

Writing articles for various Web sites (e.g., isnare.com and ezinearticles.com) of 300 to 500 words in length and including a link with a bio at the end of each article. You can also post articles on sites the target demographic visits.

3–5

SEO

Researching keywords, modifying site for keyword optimization, testing keyword density, etc.

2-3

PPC

Writing ads, monitoring ad effectiveness, ensuring that the ads' content matches content of the e-business site, improving ads.

2-3

Writing and posting blogs

Creating fresh content regularly to attract search engines, increase keyword density and provide new content to encourage repeat visits.

2-3

Managing a presence in online forums

Registering on forums and communicating in discussions to increase profile and awareness.

2-3

Social network marketing

Building a strong profile on social networking sites to build a following, reveal new products, or join discussions.

2-3

Banner advertising

Tracking banner ad effectiveness and placing new banner ads on relevant sites.

1-2

Tracking visitors to the site using analytic software

Finding out who the visitors were this week, what the referral sources were, and how long they stayed.

5-6

Market analysis and research

Tracking what competitors are doing and what they know, whether there are new competitors, and if they're making improvements.

1-2

E-mail campaigns

Following up with past customers or visitors via e-mail announcing new releases or content.

2-3

Risks, Threats, and Vulnerabilities with Web Sites

Because e-commerce sites manage money and sensitive client information, they are often the target of attack. Part of e-business is maintaining stringent site security. E-commerce security has three main concepts: confidentiality, integrity, and availability.

Confidentiality allows only authorized parties to read private information. Integrity emphasizes the need for the information to be delivered unaltered to the recipient. Availability enables access to the information.

While security features do not guarantee a secure system, they are necessary to build a secure system. Security features fall into one of the following categories: authentication (verification of the identity of the user), authorization (allowing manipulation of resources in a specific way), encryption (hiding information by making it not readily understandable to unauthorized users), and auditing (keeping records of operations and transactions).

Vulnerabilities of a system can exist in its components. Attackers usually target a computer system's entry and exit points.

Connecting to the Internet Means You Are Connecting to the Outside World

In the networking world, there are two types of networks, public and private. The private networks are the local and wide area networks owned by organizations. Private networks are tucked behind a firewall, secured so that no user outside the organization is allowed entry. Companies of all shapes and sizes have secured private networks.

Public networks are a different story. The Internet is the largest public network; it is unregulated and full of dangers. Every time you connect to the Internet, you leave the relative safety of the local area network and head into a very public place.

For personal use, the dangers of the public Internet are not as significant as they are for business. Before going online, a business should have a full understanding of the potential risks to data and how to protect that data. Internet and application security are discussed further in Chapter 8.

Web Sites Are Prone to Attack and Scrutiny

Today on the Internet, governments, defense industries, and companies in finance, utilities, and telecommunications are all subjected to a barrage of attempted cyber attacks. The threats are numerous and managing them is an arduous responsibility. The Internet is not a secure medium; it is unmonitored, unmanaged and full of potential risks. However, this is where e-commerce sites reside. So, making them safe is a critical consideration. Listed below are a few security considerations.

Threats to be aware of include:

  • DoS attacks that stop access to authorized users of a Web site, so that the site is forced to offer a reduced level of service or, in some cases, to cease operation

  • Gaining access to sensitive data, such as internal price lists or valuable intellectual property, and then altering, copying, or destroying it

  • Altering your Web site and damaging your image or directing your customers to another site

  • Gaining access to financial information about your business or your customers, with the goal of perpetrating fraud

  • Using viruses to corrupt your business data

E-commerce Applications House Customer Privacy Data and Credit Card Transaction Processing Data

A breach of confidentiality and the theft of personal data will severely harm an e-business. That makes it imperative to invest in procedures to mitigate the risk of a loss of confidentiality.

Note

Confidentiality is highly important when customer information is in question. Loss of confidentiality can occur in many ways, intentionally and unintentionally. For example, data may be exposed through intentional release of company data or a misapplication of network rights.

Confidentiality, as defined by the International Organization for Standards in the ISO-17799 document, is "ensuring that information is accessible only to those authorized to have access." Unless it is clear that the information can be made public, what you disclose to a business or a party should be kept between you and the other party. In other words, confidentiality is the prevention of intentional or unintentional unauthorized disclosure of contents. To ensure confidentiality of customer data, e-commerce sites implement network security protocols, network authentication services, and data encryption services.

In addition to security protocols, organizations should have detailed policies identifying how they handle customer data and maintain privacy. This includes how long data is kept, how it is stored, how it is disposed of, and more. These polices should be on the e-business Web site for customers to read.

Credit, Charge, and Debit Cards

When using credit, charge, or debit cards, payment acceptance and processing protocols go through four major steps:

  1. The cardholder securely sends the card number to the merchant, along with shipping and billing information.

  2. The online merchant seeks bank authorization, which requires the amount of the purchase to be reserved against the customer's funds availability.

  3. The merchant's bank sends the request to the bank that issued the customer's card.

  4. If cardholder funds are available, the issuing bank sends an approval message through a network. If the funds are not available, it denies the request.

Online transactions are typically settled when the authorization request is issued. When the transaction is settled, the fulfillment system ships the product or delivers the service to the buyer. If the consumer is downloading digital goods, delivery of the product or the service can start immediately. The merchant's account receives a deposit at the time of settlement. This deposit equals the deduction of funds from the customer's account. Processing fees may also be charged against the cardholder's account.

Electronic Cash and Wallets

An electronic wallet is a device that stores electronic currency or information about the wallet's owner, such as name, address, phone, and credit card numbers. The electronic wallet resides either on the client's PC or on the e-commerce server. It automatically fills in data on Web forms. A "smartcard" is a plastic card that contains a computer chip that stores electronic currency and information about the card user. The card needs to be inserted in a card reader in order to use its data.

Electronic cash is similar to the cash you carry in your wallet. You purchase electronic cash with a credit card, and then download it to your electronic wallet or to a card. No additional permissions are needed to use this cash. This is an anonymous channel for payment online. The only restriction is the requirement that the merchant accepts the particular electronic cash. Payment with electronic cash goes through these steps:

  1. The consumer acquires electronic cash from an electronic cash broker.

  2. The consumer purchases goods or services from a merchant.

  3. The merchant sends a specifically coded invoice to the consumer's browser.

  4. The consumer's electronic wallet interprets the invoice and sends it and the electronic cash amount to the broker.

  5. The electronic cash broker interprets the invoice and validates the electronic cash.

  6. The broker notifies the merchant that the transaction is valid and deposits the transaction amount to the merchant's account.

  7. Then the merchant can fulfill the consumer's order.

Web-Enabled Applications May Face Threats and Vulnerabilities

Web applications are software entities that do not operate in a vacuum. As software, their code, usually a large collection of programming commands that may or may not reside in one place, provide vulnerabilities that malicious individuals may want to exploit. Once built, Web applications operate on networks and inherit the vulnerabilities of the networks. Most of the time, attacks happen where the money is. Thus, sites that typically handle financial transactions are of particular interest to malicious individuals. They may operate on their own or assemble groups of criminals of various technical skills, engaging a network of hijacked computers to execute elaborate attacks while covering their tracks. To mitigate these risks, several areas must be considered.

Firmware

In addition to basic network security, upgrading firmware is important. Firmware is a small software program that is stored on a piece of hardware. This may be a video card, motherboard, digital camera, printer, and so on. Firmware is also used on the devices that create network infrastructure, such as network cards, routers, and switches.

Hardware ships with one version of firmware already stored on the chips. However, firmware can be updated on each device to add more functionality to a hardware device, correct a problem with a hardware device, or address a security flaw.

To safeguard security, administrators must periodically check the manufacturer's Web site to see whether new firmware has been released for a particular piece of networking hardware. If new firmware has been released, the administrator should verify why and what it's designed to do. If new firmware includes a security fix, administrators should apply it as soon as possible.

Operating Systems and Applications

Note

It is a security best practice to check a software vendor's Web site periodically for updates, service packs, and patches. You can be sure hackers are trolling these sites to find new vulnerabilities and will use them.

Both operating systems and applications require maintenance to ensure that they are secure. Today's applications and operating systems are complex, having to accommodate a dynamic environment while providing secure services to clients. This complexity makes it very hard for products to provide 100 percent security out of the box. Administrators must be diligent in plugging all potential security holes. This process is sometimes referred to as application or operating systems hardening.

The number one way to harden applications is to ensure that the latest service packs and patches are installed. These updates are designed to address the security flaws in applications, making them more robust and harder to exploit. Installing service packs and patches was discussed in Chapter 1.

Coding and SQL Vulnerabilities

End users may not know that applications sometimes have inherent coding flaws that make them vulnerable to attack. Remote code execution vulnerabilities, for example, are enabled by improper coding techniques and let the attacker gain access to protected information. Like other forms of software, it is essential to check the developer's Web site periodically for updates to products. Once a coding error is found, a patch is released and should be applied immediately.

SQL injection allows an attacker to retrieve crucial information from a Web server's database by carefully crafted statements that the attacker enters in the username or password fields of a Web site, fooling the system into allowing access. Query requests to databases in SQL can cause the server to expose information. Some commands in programming languages accept unformatted user input. By manipulating the formatting controls, attackers can crash an application, get access to a portion of the memory content on the victim's machine, or execute attacker-supplied code. By providing more input than an application can store in the temporary memory (or buffer), the extra information can overflow to other memory entities, overwriting the code an application executes. This extra information, when carefully crafted, can make the system function in unexpected ways, display private data, or crash. Buffer overflow is a frequently exploited vulnerability.

CHAPTER SUMMARY

The Internet and the Web provide infrastructure and technologies for effectively conducting business transactions online. Companies today need to be online and in operation 24 hours per day.

However, e-commerce attracts thieves because the possibility for illegal gain is much greater than in robbing brick-and-mortar stores. These attacks exploit vulnerabilities of the infrastructure, the software, and the people who participate in online transactions. Any system is only as secure as its weakest link, so understanding how attacks work is crucial to developing security strategies. Data privacy, transaction confidentiality, and trust are essential to the complex, global world of e-commerce.

KEY CONCEPTS AND TERMS

  • Affiliate marketing

  • Auditing

  • Authentication

  • Authorization

  • Availability

  • Bounce rate

  • Click-through rate (CTR)

  • Confidentiality

  • Conversion rate

  • Cost per click (CPC)

  • Denial of service (DoS)

  • Electronic cash

  • Electronic wallet

  • Encryption

  • Integrity

  • Internet Protocol Security (IPSec)

  • Pay-per-click (PPC) revenue model

  • Point-to-Point Tunneling Protocol (PPTP)

  • Privacy

  • Qualified traffic

  • Session Initiation Protocol (SIP)

  • Search engine optimization (SEO)

  • Trust icons

  • Virtual private network (VPN)

  • Voice over Internet Protocol (VoIP)

CHAPTER 2 ASSESSMENT

  1. DoS attacks stop access to authorized users of a Web site.

    1. True

    2. False

  2. Which of the following are included in CLM? (Select three.)

    1. Acquisition

    2. Retention

    3. Suspension

    4. Conversion

  3. Which of the following are required to establish a VPN connection? (Select three.)

    1. VPN client

    2. VPN server

    3. SSL

    4. Transmission media

  4. You are designing a customer service strategy for a large company. They have requested full two-way communication between service staff and the customer. Which of the following methods would you suggest? (Select two.)

    1. E-mail support

    2. FAQ

    3. Customer feedback forms

    4. VoIP

  5. You are placing keywords into the HTML code of a Web page. Which of the following tags should you use? (Select two.)

    1. <Keyword>

    2. <Description>

    3. <TITLE>

    4. <HEAD>

  6. You are trying several different online marketing strategies and decide to share your bookmarks online to promote your site. Which type of marketing strategy are you employing?

    1. Social blogging

    2. Social book keeping

    3. Social bookmarking

    4. Social tracking

  7. The single most important thing an organization can do to defend itself against network attacks and malware is to keep systems patched and updated.

    1. True

    2. False

  8. A "Contact us" form is an example of______.

  9. You have to connect three remote employees to the corporate network. Which of the following technologies would you use?

    1. SSL

    2. VPN

    3. One-way communication

    4. Remote acquisition

  10. E-commerce security has three main concepts: confidentiality, integrity, and availability.

    1. True

    2. False

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.227.69