0% found this document useful (0 votes)
41 views62 pages

Digital Business Chapter 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views62 pages

Digital Business Chapter 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 62

MOBILE COMMERCE

COMMERCE, E-COMMERCE & M-


COMMERCE
ATTRIBUTES APPLICATIONS AND
BENEFITS OF M-COMMERCE:
 Ubiquity
 Convenience and capabilities

 Interactivity

 Personalization

 Localization
MOBILE MARKETING - SHOPPING AND
ADVERTISING:
 Mobile Shopping: (The App World)
MOBILE ADVERTISING:
TYPES OF MOBILE ADS
 Short Message Ads
 Location-Based Ads

 Viral Mobile Marketing


MOBILE MARKETING AND
ADVERTISING CAMPAIGNS
 Building brand awareness.
 Changing brand image.

 Promoting sales.

 Enhancing brand loyalty.

 Building customer databases.

 Stimulating mobile word of mouth.


SOCIAL COMMERCE
E-COMMERCE VS. SOCIAL COMMERCE
THE SOCIAL COMMERCE LAYOUT
SOCIAL COMMERCE ACTIVITIES
SIX ELEMENTS OF SOCIAL COMMERCE
6 CS OF SOCIAL COMMERCE
 Content
 Community

 Commerce

 Context

 Connection

 Conversation
EVOLUTION OF E-COMMERCE
SOCIAL MEDIA MARKETING
 Social media marketing (SMM) is the
application of marketing communication and
other marketing tools using social media.
Social media marketing facilitates social
commerce, builds brands, repairs brand
reputation damage in social media, and
fosters long-term customer relationships,
among other things
PASSIVE APPROACH
 Blogs,
 Content Community

 Forums

 Reviews
ACTIVE APPROACH
 Google Adsense
 Social Media Ads

 Sponsored Contents
ENTERPRISE 2.0
 Enterprise 2.0, also known as Social Media-
based Enterprise, which is used by an
increasing number of companies to conduct
several social media and social commerce
activities inside the enterprises
 e.g., idea generation, problem-solving, joint

design, and recruiting


 Enterprise 2.0 can also be referred as Social

Enterprise. Social enterprise refers to the use


of social media tools and platforms and
conducting social networking activities in
organizations, while its major objectives are
either commercial or nonprofit activities
WEB 2.0
 Customer Reviews
 Shopping Widgets

 Questions and Answers

 Twitter

 User-Generated Cross Sells

 Facebook Pages

 Co-Browsing

 Retail Blogging

 Video Sharing
IMPROVED BUSINESS MODELS
 Shopping business models include widgets on social media sites to ―buy
now.‖

 Online software agents that put buyers and sellers together, such as
when TripAdvisor refers users to online travel sites to purchase hotel rooms.

 Content sponsorship–selling advertising on a site that supports content


development (YouTube).

 Crowdsourcing models that allow companies to design their products or


logos by involving their customers.

 Sales promotions conducted in social networks that drive traffic to the


company‘s site, such as contests, discounts, and downloading free music
and software.

 Recruiting in social networks, as exemplified by LinkedIn.

 Collaboration models that are facilitated by blogs, wikis, and


crowdsourcing
ENTREPRENEUR NETWORKS
 Biznik (biznik.com)

 Startup Nation (startupnation.com)

 Startup India(startupindia.gov.in)

 Indian Entrepreneurs
(indianentrepreneurs.org.in)

 Make in India (makeinindia.com)


ENTERPRISE SOCIAL NETWORKS
 Networking and community building

 Crowdsourcing.

 Social collaboration.

 Social publishing.

 Social views and feedback.


HOW ENTERPRISE SOCIAL NETWORKING
HELPS EMPLOYEES AND ORGANIZATIONS
 Quick access to knowledge, knowhow,
and “knowwho.”

 Expansion of social connections and


broadening of affiliations

 Self-branding

 Referrals, testimonials, and


benchmarking
SOCIAL COLLABORATION
(COLLABORATION 2.0)
SOCIAL COLLABORATION IS
SUPPORTED MAINLY BY:

 Wikis, blogs, and microblogging (e.g., Twitter)

 Collaborative communities (forums and


discussion groups)

 Early vintage Web 2.0 technologies

 Crowdsourcing

 Other tools (e.g., Yammer)


COMPANIES USE SOCIAL COMMERCE
FOR

 Project collaboration and communication

 Process and procedure documentation

 FAQs

 E-learning and e-training

 Forums for new ideas

 Corporate-specific dynamic glossary and terminology

 Collaboration with customers


Information Security
Office of Budget and Finance
Education – Partnership –
Solutions

THE INTERNET OF THINGS (IOT)


Information Security
Office of Budget and Finance
Education – Partnership –
Solutions

WHAT IS IOT?

 The Internet of Things (IoT) is the network of


physical objects—devices, vehicles, buildings and
other items embedded with electronics, software,
sensors, and network connectivity—that enables
these objects to collect and exchange data.
Information Security
Office of Budget and Finance
Education – Partnership –
Solutions

VARIOUS NAMES, ONE CONCEPT

 M2M (Machine to Machine)


 “Internet of Everything” (Cisco Systems)
 “World Size Web” (Bruce Schneier)
 “Skynet” (Terminator movie)
Information Security
Office of Budget and Finance
Education – Partnership –
Solutions
HISTORY OF IOT
The concept of the Internet of Things first
became popular in 1999, through the Auto-ID Center at
MIT and related market-analysis publications. R

Radio-frequency identification (RFID) was seen


as a prerequisite for the IoT at that point. If all objects
and people in daily life were equipped with identifiers,
computers could manage and inventory them. Besides
using RFID, the tagging of things may be achieved
through such technologies as near field
communication, barcodes, QR codes, bluetooth, and
digital watermarking. 38
HOW IOT WORKS?
Internet of Things is not the result of a single novel
technology; instead, several complementary technical
developments provide capabilities that taken together
help to bridge the gap between the virtual and physical
world. These capabilities include:
 Communication and cooperation
 Addressability
 Identification
 Sensing
 Actuation
 Embedded information processing
 Localization
 User interfaces 39
HOW IOT WORKS?

RFID Sensor Smart Tech Nano Tech

To identify To collect To enhance To make the


and track and process the power of smaller and
the data of the data to the network smaller
things detect the by devolving things have
changes in processing the ability to
the physical capabilities to connect and
status of different part interact.
things of the
network.

40
THE STRUCTURE OF IOT
The IoT can be viewed as a gigantic network
consisting of networks of devices and computers
connected through a series of intermediate technologies
where numerous technologies like RFIDs, wireless
connections may act as enablers of this connectivity.

 Tagging Things : Real-time item traceability and addressability


by RFIDs.
 Feeling Things : Sensors act as primary devices to collect data
from the environment.
 Shrinking Things : Miniaturization and Nanotechnology has
provoked the ability of smaller things to interact and connect
within the “things” or “smart devices.”
 Thinking Things : Embedded intelligence in devices through
sensors has formed the network connection to the Internet. It can
make the “things” realizing the intelligent control.
41
Information Security
Office of Budget and Finance
Education – Partnership –
Solutions

THE IOT MARKET

 13.14 billion IoT devices in 2022


 Expected to grow up to 29.42 billion by 2030
 Revenue $ 251.6 billion in 2022
 Expected to grow up to 621.6 billion by 2030
REVENUE
CONNECTED DEVICES
Information Security
Office of Budget and Finance
Education – Partnership –
Solutions

WHERE IS IOT?

It’s everywhere!
Information Security
Office of Budget and Finance
Education – Partnership –
Solutions

Smart
Appliances

Wearabl
e Tech

Healthcar
e
Information Security
Office of Budget and Finance
Education – Partnership –
Solutions
THE FUTURE OF IOT

"The Sky's not the limit. It's only the


48
THE POTENTIAL OF IOT

GE’s estimates on potential of just ONE percent


savings applied using IoT across global industry
49
UNLOCK THE MASSIVE POTENTIAL OF IOT

50
TECHNOLOGY ROADMAP OF IOT

51
APPLICATIONS OF IOT

"The Ultimate Goal of IOT is to Automate Human Life."


52
53
54
55
56
IoT helps you in LIFE LOGGING 57
Information Security
Office of Budget and Finance
Education – Partnership –
Solutions

WHY BE CONCERNED ABOUT IOT?

 It’s just another computer, right?


 All of the same issues we have with
access control, vulnerability
management, patching, monitoring,
etc.
 Imagine your network with
1,000,000 more devices
 Any compromised device is a
foothold on the network
Information Security
Office of Budget and Finance
Education – Partnership –
Solutions

DOES IOT ADD ADDITIONAL RISK?

 Are highly portable devices captured during


vulnerability scans?
 Where is your network perimeter?
 Are consumer devices being used in areas – like
health care – where reliability is critical?
 Do users install device management software on
other computers? Is that another attack vector?
Information Security
Office of Budget and Finance
Education – Partnership –
Solutions

ATTACKING IOT
 Default, weak, and hardcoded credentials
 Difficult to update firmware and OS

 Lack of vendor support for repairing vulnerabilities

 Vulnerable web interfaces (SQL injection, XSS)

 Coding errors (buffer overflow)

 Clear text protocols and unnecessary open ports

 DoS / DDoS

 Physical theft and tampering


Information Security
Office of Budget and Finance
Education – Partnership –
Solutions

RECOMMENDATIONS
 Plan for IoT growth:
 Additional types of logging, log
storage: Can you find the needle in the
haystack?
 Increased network traffic: will your
firewall / IDS / IPS be compatible and
keep up?
 Increased demand for IP addresses
both IPv4 and IPv6
 Increased network complexity – should
these devices be isolated or
segmented?
Information Security
Office of Budget and Finance
Education – Partnership –
Solutions

THREAT VS. OPPORTUNITY

 If misunderstood and misconfigured, IoT poses


risk to our data, privacy, and safety

 If understood and secured, IoT will enhance


communications, lifestyle, and delivery of services

You might also like