Define the concept of online marketing through compared to the traditional concept of marketing

Define the concept of online marketing through compared to the traditional concept of marketing:

We will try to accomplish that in the following:

1.
Internet does not belong to any organization.

2.
Internet an open network, and not a closed network such as those owned by cable companies or communications

Telephone.

3.
Internet and interactive way and not a mass such as television and magazines.

4.
In the industrial age was marketers in control of the reins from the beginning to the end. As

In the Internet age, the reins become gradually turn into the hands of customers.

5.
No longer rotation between effectiveness and efficiency list, in the era of the Internet should be

Marketer to satisfy the needs of existing and future customers effectively and efficiently.

6.
Exchanges no longer revolves around the exchange of singly and in a specific period of time.
Valmsoukon

Internet era became working to satisfy the needs and desires through a large-scale

Providing packages commodity and service variety.

Third: defining the concept of Internet marketing on the basis of different positions around him:

There are two or two entrances towards the concept of Internet marketing are:

Entrance silent Marketer: the proponents of this approach that the task of the marketer is silent

Focus on attracting customers to its position without the need for direct interaction with them.
After that

The responsibility lies with the the Orders automated system in which all positions

The network is fully locked.

Entrance to the active participation: Valambaat according to this entrance is achieved through the active participation

In discussion forums, and mailing glossaries, and and other online auctions, where you can

Foundation collection, management and analysis of information about potential customers and business partners

To maintain their competitiveness.

Fourth: defining the concept of online marketing through changing laws that governed:

Law impasse: the following states "The creation of a Web site like a

Building and store front in a deadlock.
If you want to comes Almtdon to store

This, it should be for you to provide them with an excuse or a reason to invite them to come to you, "not all of

Have a Web site achieves success. Only those who use  and skills
  

Hotshot marketer together online techniques the upscale  they who are able to achieve

Impossible.

Giveaway and sales law: which states to attract visitors to your site by giving them something

For free, and then try to sell something additional to those who .

Trust law: where reads as follows: "Trust is the grease lubrication on businesses

The network. Without this confidence depends hinted rack and ending his life. "Accordingly the online

Entails building site and build confidence through this site.

Drag-and-pay law: This law provides for the following: "drag people to your site

Through attractive content s m upscale push information at them regularly through e-

Mail. "

Follow this law guarantees the institution repeat purchase by the customer, so when working

Foundation to provide goods and services to exceed their expectations levels.

That owns (AMAZON.COM) 5.
Law decent site: large institutions such as could

The entire market segments because it has rich experience and enormous potential. Smaller institutions

Its success depends on finding a decent positions that are either not packed or semi-packed, and in both cases

The Foundation small fill these positions by offering unique products or services in every sense

The word, and to maintain these positions through a competitive advantage over others.

Thus, online marketing requires the necessities to be bound by these basic laws

Five. They are all important, there's no law is more important than other laws. They are combined

Tmahdmsouk via the Internet in particular, the way to create and configure a successful business opportunities on the web.

Based on the above it is clear that Internet marketing is part of a broader activity is

E-marketing, and is one of the means.
Where e-marketing a broader and more comprehensive than

Internet marketing. Latter is in those marketing activities that rely on the internet

Specifically, although it is most common now, as a result of the increasing growing Internet usage in various

Contemporary business activities.

The third requirement: the advantages of e-marketing

The most important advantages and benefits caused by the application of e-marketing when the marketing plan includes

: Achieving integration between the WHO web site on the internet and the rest of the other marketing tools as follows
  
Expand the customer base a result entry intraday and the of durable, the site is always open and can be

entry to him by the client the international too.

Reduce costs and help achieve the flexibility of the marketing budget.

Cruise in the relationship between the seller and the buyer through the channels of communication Statistics

And direct interaction in order to achieve a strong relationship between the two.

Reduce paperwork for more attention to the needs of the client.

Reduce the time of completion of the transaction, as all stages of the marketing process can be

By direct service to computers and the Internet.

Easily enter into new markets and provide access to all markets

And global recognition for its products, and access to customers anywhere without Meet the hands of

Geographical borders.

7.
Increase the ability to collect detailed information on customers and on the survey and evaluation

Mail What helps in the improvement and development of market analysis. Analysis in addition to developing

Products by the possibility of the collection and examination, collation and dissemination of information about products

Via the Internet.

8.
The greatest potential to benefit from the help and advice of experts and specialists.

9.
The use of Web sites to disseminate information at a low cost marketing c the Da compared to the cost of

Advertising in other media, allowing customers to choose from more than one provider

For the service.

10.
The provision of a new marketing method, fast and outstanding customer to the masses, as they

Require detailed information about the goods and services they want to buy, which

Encourage them to make the right decision and choose what suits them for awareness and confidence.

11. Flexibility in the presentation of information about products and services quickly updated with

Information quickly and at limited additional cost, including institutions that can reward the best

Customers during raid information on prices and special offers for products and services.

12.
The ability to track visitors to the site for their assessment through the use of special programs such as

1. COOKIE

13.
Run faster processing and more efficient queries and customer inquiries.  

The ability to identify target customer and provide value-added services to him

The level of cost does not compare for a traditional marketing campaign.

15.
Institutions can provide a higher level of service, such as custom manufacturing

In large numbers, and offer individual discounts according to the pattern of previous purchase of the Client

And preferences.

16. Smart organization can take advantage of the new ways in which Tq blood in the network

The area of ​​customer service.

17. Institutions can through the collection, management, analysis and distribution of information about

Customers to understand their needs and identify the opportunities available to them better and evolution

In light of this and strengthen its relationship with customers and improve their services and product profitability

And services and provide valuable new performances. After knowing the advantages of e-marketing,

Is necessary to know the basic features that have been  discriminate these traditional marketing environment and this

Features are: 1

1. Susceptibility selection: technology has made online visitors can identify network sites

Themselves and provide information on their needs and desires of products before embarking on purchases and the ability of

Any market to identify customers before they submit to the process of buying on MERCHANTABILITY invited to the selection.

The offer portability Selection express the basic concept of marketing., And with the knowledge that they collect from customers

Using their positions in the network the international .

2. Reaction: The the distinctive feature of the e-marketing is the interaction that allows customers to express

Their needs and desires directly to the institution and this means that Touch and disabilities can interact with customers

Financiers in real time.
Of course, the individuals existing sales process are always able

Work on this, but at a greater cost.
International Network offers the advantages of having or attending a sales representative

But a wider coverage and lower cost.

3. Memory: Memory refers to the organization's ability to access databases or data warehouses

Containing information about the customer and dates of previous purchase, and use this data in a timely

Real or actual offer presentation catalog for a particular customer.

4. Control: The network the International referred to it as a way to withdraw certain, because users

Ih Ddon what Istardoh in web sites the international and the ability of workers in the site of the International Network
  
To control the content that users care about and comes a limited context and organization uses text

Superior in content marketing is can not the control the the context which sees the browser

Content.

5. Portability Login: There is an unusual amount of information in the Internet., And the ability to obtain

It is referred to ability to the entry. Because customers can enter a lot of information on

Products and services for any organization and the relative value of any earlier.

6. Method the digital : refers method  the digital-to-the ability to view a particular product or service or on

At least some of the products or services as digital parts of the information and means method the digital site

Internet, which can be used to distribute and promote those attributes, regardless of the physical single

Itself. Vocabulary is characterized by the digital as easily mix and work to meet customer requests each

Them freed.

II. Effectiveness of e-marketing: to succeed the process of e-marketing. Process be successful

And effective, it should be available by the number of elements, including: 1

1. The benefit to the customer: the institution should seek to provide sufficient and clear benefit through

Ask a product (good or service) via the Internet.
It follows the level of this benefit the customer's decision

Repeat or not to repeat the purchase process. Therefore should include all website content

Promotive services that are responsive to the wishes of the customer and that the Foundation seeks to swans the YZ through the provision of

Unique and distinct benefits to its customers.

2. Achieve integration with all the activities of the e-business: the institution should seek to achieve

Integration of e-marketing and the rest of the e-business activities so that these activities are reflected in the

Each stage of the marketing process., For example, can not take place and the process

Selling successfully if there is no interaction and integration with systems the payment via the Internet. If there is no security systems

And effective protection.

3. The ability to view the contents of Web services in the form of actors:

Should be presented in various content and services within the Web site are appropriate to the new nature

E-Business.
And are different from the methods used in the field of traditional business.

The content of the site should include three basic aspects of marketing are:

A - providing the necessary and sufficient information about the products offered for sale online
  
B - enabling the client to communicate and interact with important elements in the marketing process, such as vendors, Director

Site, reference groups, ...

C - effectively achieve the exchange process.
This requires providing all of the following needs and desires of the client.
And the provision of

Supplementary services relating to Mountoj (good or service).

4. Simple construction and innovation of the web site: should be constructed in a simple and innovative facilitates

Client on the process of obtaining data and information and the conduct of interaction and exchange. For

Example, should not exceed the number of links that lead to the final information for the three links

This is necessary to facilitate the process and Anjazaha. LAYERS steps or pages or LINKS layers of the

Quickly.

Achieving this requires to achieve a balance between three interrelated elements:

A - view and provide adequate and necessary information with the shortcut as much as possible in order to preserve the time

To achieve the client speed.

B - providing accurate information that the client is looking for exclusively.

C - achieve the Table organization by the pages of the Web site.

However, despite the availability of the above-mentioned elements can be e-marketing process ineffective or

Is successful, if there is no element of safety.
The continued expansion in the use of the Internet to transfer data

Between many destinations and increasing applications, a de to ask many questions by users such as: Is

Personal information is safe?, And whether information can be revealed someone's account to others when

Queries via the Internet?
Is it possible to steal your credit card number when you the  market by

Internet?

To answer these and other questions we will discuss in the pro most important requirement based on safety standards

Online.

The requirement fourth: Security-mail:

One of the most important obstacles to transforming the Internet into the commercial market inadequate security across it.
Because of Operations

Rejects many. (INTERNET HACKER) penetration and subversion practiced by thieves online

Internet users conduct of a financial nature across the network.

Internet has succeeded institutions develop technological solutions effective and able to achieve effective security

And confidential commercial and financial transactions over the Internet.
Since 1998, companies began warranty cards
  
And computer companies offering and build a set of security standards for transactions and exchanges

Trade that takes place across the network, where it became a high level of security and the secret.
1

Among the most important of these standards include:

(Open Buying on the Internet) OBI: 1. Standard purchase online Open

The efforts directed to develop a set of standards that are able to achieve the security and confidentiality

Financial transactions that take place via the Internet in order to facilitate and raise the level of security effectiveness.
The standard

Seeks to be a unified standard agreed to keep up with the type of yolk number OBI Open the buy online

This standard is sponsored by (B2B) e-business types a business-to-business

Company and General Electric Company, Ford and supported by well-known companies such as: American Express Company

.2 United Technologies Corporation, BASF

(Open Financial Exchange Specification) OFX: 2. Specification Open Financial Exchange

This specification has been designed and developed in order to deal with a specific type of institutions.
They are

Based on addressing the issues of security and confidentiality concerning financial transactions between financial institutions

And as well as between these institutions and between their customers and which are made via the Internet.

This specification covers a variety of financial institutions.
And has seen many applications in the field of business

Small banking and financial dealings with customers.

Microsoft in 1997, was designed and nurtured OFX companies and has been the beginning of the use of

And has been supported and endorsed by most financial institutions, Cheek Free, Inuit and

3.Bank of America and Citibank like ancient

(Electronic Funds Transfer) ETF: 3. Electronic remittance system

Is a crucial part of the infrastructure for electronic banking business that operates online

This system allows electronic safe way transfer of remittances or financial payments from a bank account

To another bank account, in addition to the transfer of information relating to these transfers, and the advantage of this system

A high degree of security and ease of use and reliability, the conversion process is the financial-mail

The signing of a model dependent client and one for the benefit of the beneficiary, and allows this form truncated value

Specific customer's account in a certain chronological order (daily, weekly, or monthly), and differs from model
  
Electronic money transfer check that the validity apply for more than one conversion process, and in the

Usually handles the bank and the client with their job brokers provide the software needed to process transfers.
(Electronic Data Interchange) EDI: 4. Electronic data exchange system

Is a collection of software used in the exchange of information between computers of partners

Trading partners, and the implementation of electronic business transactions in a manner not adopt the paper, and the operations of the

Electronic data exchange system: queries, purchase orders, pricing, scheduling, shipping

And reception, billing and payments, contracts, production data, in addition to sales; using algorithms

Prevent fraud, espionage or hacking.
2

(Secure Electronic Transactions) SET: 5. Specification secure financial transactions

Visa card, Microsoft IBM, secure financial transactions standard adopted by the Company

Boil the Internet.

Consumers »: Engen Lockart Mr. Master Card where he told General Manager

They can use their cards to perform banking transactions in the virtual space with the same level of security

3 «.
And ease when using their cards in shops

And has been the use of a standard Secure financial transactions in the first exchange of Mali in 1997

United States of America.

To achieve a set of goals, including: SET and seeks

Achieve a high level of trust and security in data and information
 

Make sure the payment process.

Legitimize and reliability on electronic shopkeepers and credit cardholders.

The basic requirements and needs that have been focused on and expressed within the standard

Has been divided into the following: SET

Any data and information transfer and sent via the Internet must remain confidential, and should not be able to

Access and be accessed only from the party on their future and that against him.

Must remain content of any process of exchange is subject to change during the data transfer process

It can design an electronic signature, and can SET and information, and using Moasf
  
To say that the inclusion of this signature within the data and information process helps to discover whether

There was a change in the course of transportation and transmission.

Store-mail needs to be assured that the payment card holder is the rightful owner of the No.

Payment card account, and on the other hand, it must be able to cardholder verification

The identity of the owner of the store address, and be confident that this store is able to achieve

To provide a set of standards achieved SET certifications secure financial transactions, and operates Specification

Electronic and these confer legitimacy on the identity of members who engage in the process of trade

Electronic.

Must be viable and execution on a wide range of tools SET 4.
Electronic, and that is not being preference programmatic entity or a specific physical entity on the other so

Be more capable of application and implementation of the specification.
(Secure Socket Layer) SSL: 6. Secure protocol layers

The secure transfer of information, Secure Socket Layer, which is the acronym for the SSL protocol

Between client and server.

Private) and private key (Public Key) This protocol is based on a public key algorithm

As the server provides the customer keys in general, and these public keys used to encrypt messages (Key

Flying to the server, and can not use the public key to decode The Da message that the Code, as unique

Private key (the server) with the ability to decode code message that the public key.

And This method prevents the emergence of communication problems, such as spying or eavesdropping when disclosure of information

Content, as this protocol helps to verify that the public key issued by the server and make sure

Information has not changed during transport, and using digital certificates.
And serve as digital certificates or identity card registration business enterprise license, exporter

Licensed party to an international destination, and used by the individual in the E-Government to encrypt and decrypt messages
Electronic and can assist the parties in check and recognize each and therefore used in

Ensure the security of commercial transactions and individual, which provides a safe environment to do business.

Institutions need to digital certificates in order to encode and decode electronic correspondence

And to determine the identities of the senders of e-mails and payment and purchase orders, sales, and access to sites

Web, and internal checks; digital certificates and find her role in archiving operations and save documents
  
To ensure that manipulated and changed only of VPL individuals and entities authorized to do so, in addition to

Dozens of other applications. 
Share this article :
 

Post a Comment

 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. karena - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger