Digital Business Chapter 2
Digital Business Chapter 2
Interactivity
Personalization
Localization
MOBILE MARKETING - SHOPPING AND
ADVERTISING:
Mobile Shopping: (The App World)
MOBILE ADVERTISING:
TYPES OF MOBILE ADS
Short Message Ads
Location-Based Ads
Promoting sales.
Commerce
Context
Connection
Conversation
EVOLUTION OF E-COMMERCE
SOCIAL MEDIA MARKETING
Social media marketing (SMM) is the
application of marketing communication and
other marketing tools using social media.
Social media marketing facilitates social
commerce, builds brands, repairs brand
reputation damage in social media, and
fosters long-term customer relationships,
among other things
PASSIVE APPROACH
Blogs,
Content Community
Forums
Reviews
ACTIVE APPROACH
Google Adsense
Social Media Ads
Sponsored Contents
ENTERPRISE 2.0
Enterprise 2.0, also known as Social Media-
based Enterprise, which is used by an
increasing number of companies to conduct
several social media and social commerce
activities inside the enterprises
e.g., idea generation, problem-solving, joint
Facebook Pages
Co-Browsing
Retail Blogging
Video Sharing
IMPROVED BUSINESS MODELS
Shopping business models include widgets on social media sites to ―buy
now.‖
Online software agents that put buyers and sellers together, such as
when TripAdvisor refers users to online travel sites to purchase hotel rooms.
Startup India(startupindia.gov.in)
Indian Entrepreneurs
(indianentrepreneurs.org.in)
Crowdsourcing.
Social collaboration.
Social publishing.
Self-branding
Crowdsourcing
FAQs
WHAT IS IOT?
40
THE STRUCTURE OF IOT
The IoT can be viewed as a gigantic network
consisting of networks of devices and computers
connected through a series of intermediate technologies
where numerous technologies like RFIDs, wireless
connections may act as enablers of this connectivity.
WHERE IS IOT?
It’s everywhere!
Information Security
Office of Budget and Finance
Education – Partnership –
Solutions
Smart
Appliances
Wearabl
e Tech
Healthcar
e
Information Security
Office of Budget and Finance
Education – Partnership –
Solutions
THE FUTURE OF IOT
50
TECHNOLOGY ROADMAP OF IOT
51
APPLICATIONS OF IOT
ATTACKING IOT
Default, weak, and hardcoded credentials
Difficult to update firmware and OS
DoS / DDoS
RECOMMENDATIONS
Plan for IoT growth:
Additional types of logging, log
storage: Can you find the needle in the
haystack?
Increased network traffic: will your
firewall / IDS / IPS be compatible and
keep up?
Increased demand for IP addresses
both IPv4 and IPv6
Increased network complexity – should
these devices be isolated or
segmented?
Information Security
Office of Budget and Finance
Education – Partnership –
Solutions