Professional Documents
Culture Documents
ECOM - Đề cương tổng hợp
ECOM - Đề cương tổng hợp
ECOM - Đề cương tổng hợp
3 4
- Non-Internet EC includes the use of mobile handwriting-recognition computers used by field - Intrabusiness EC: E-commerce category that includes all internal organizational
reps to write their notes in the field. activities that involve the exchange of goods, services, or information among various units and
individuals in an organization. For example, SAP (Systems, Applications, and Products) is a
2. Stages multinational software corporation known for its enterprise software, including ERP systems.
2.1. Information SAP's ERP system is an example of Intrabusiness EC as it facilitates seamless electronic
2.2. Transaction communication and transactions within an organization.
2.3. Collaboration - Business-to-employees (B2E): E-commerce model in which an organization delivers
In general, selling and buying electronically can be either business-to-consumer (B2C) or services, information, or products to its individual employees. For example, Microsoft Teams is a
business-to-business (B2B). Online transactions are made between businesses and individual collaboration platform that exemplifies B2E by providing a centralized space for communication
consumers in B2C, such as when a person purchases a coffee at store.starbucks.com or a and collaboration within an organization. It is part of the Microsoft 365 suite of productivity tools.
computer at dell.com. In B2B, business transactions are made online between businesses, such - Collaborative commerce (c-commerce): E-commerce model in which individuals or
as when Dell electronically buys parts from its sup- pliers. Dell also collaborates electronically groups communicate or collaborate online. For example, business partners may design a new
with its partners and provides customer service online e-CRM. product together.
3. Classification - Consumer-to-consumer (C2C): E-commerce model in which consumers sell directly to
3.1. By Target (slide) other consumers. Examples of C2C include individuals selling computers, musical instruments,
- Exchange: A public electronic market with many buyers and sellers or personal services online. eBay sales and auctions are mostly C2C as are the ads on Craigslist.
- Exchange-to-exchange (E2E): E-commerce model in which electronic exchanges - Peer-to-peer (P2P): Technology that enables networked peer computers to share data
formally connect to one another for the purpose of exchanging information and processing with each other directly; can be used in C2C, B2B, and B2C e-commerce. For
example, BitTorrent is a peer-to-peer file-sharing protocol designed for distributing data over the
3.2. By Types of Organization (slide + book1, page 11) internet in a decentralized manner. It's commonly used for sharing large files such as software,
- Business-to-business (B2B): E-commerce model in which all of the participants are movies, music, and other digital content.
businesses or other organizations. Today, about 85% of EC volume is B2B. For Dell, the entire - E-learning: The online delivery of information for purposes of training or education. For
wholesale transaction is B2B. Dell buys most of its parts through e-commerce and sells its example, Coursera is a popular online learning platform that offers a wide range of courses,
products to businesses (B2B) and individuals (B2C) using e-commerce. specializations, and degrees in collaboration with universities and organizations worldwide. It
- Business-to-consumer (B2C): E-commerce model in which businesses sell to individual provides learners with access to high-quality educational content in various fields, from computer
shoppers.The typical shopper at Amazon.com is this type. science and business to humanities and health.
- E-tailing: Online retailing, usually B2C. - E-government: E-commerce model in which a government entity buys or provides
- Business-to-business-to-consumer (B2B2C): E-commerce model in which a business goods, services, or information from or to businesses or individual citizens. For example, the
provides some product or service to a client business that maintains its own customers. For Vietnam e-Government Portal serves as a hub for sharing information related to government
instance, Alibaba Group operates a platform called Tmall, which is an online marketplace that policies, regulations, and announcements. This transparency helps citizens stay informed about
facilitates B2B2C transactions. Tmall connects businesses (B2B) with individual consumers (B2C) government activities.
through an intermediary platform.
- Consumer-to-business (C2B): E-commerce model in which individuals use the Internet
to sell products or services to organizations or individuals who seek sellers to bid on products or
services they need. Priceline.com is a well-known organizer of C2B travel service transactions,
where people place a request for offers at a price they are willing to pay for a specific trip.
- Mobile commerce (m-commerce): E-commerce transactions and activities conducted in
a wireless environment. For example, The Amazon mobile app is a prime example of
m-commerce, allowing users to shop for a wide range of products directly from their mobile
devices.
- Location-based commerce (l-commerce): M-commerce transactions targeted to
individuals in specific locations, at specific times. For example, The Starbucks mobile app is an
example of L-commerce as it leverages location-based features to enhance the customer
experience.
5 6
organize, motivate, devise strategy, and restructure processes, as needed, to optimize the
4. Framework (book1, page 10) business use of EC models and strategies.
5. Characteristics
(gộp vào mục 4)
6. Business models in E-COM
(Thông tin tổng hợp từ slides là chính + ví dụ từ trong giáo trình hoặc bên ngoài. Thông tin trong
giáo trình khác vcl :D so với slides ý nên là t sẽ note lại các trang trong giáo trình tương ứng để
lúc đi thi mng tìm trong giáo trình nhé)
BOOK 1. Phần 1.6. Trang 25-28.
- Definition: A business model is a method of doing business by which a company can generate
revenue to sustain itself. (Book 1, p.26)
- Six elements of business model: (Book 1, p.26)
+ Customers and the company’s relationships with these customers including customers’
value proposition
+ All products and services the business will offer
+ The business process required to make and deliver the products and services
+ The resources required and the identification of which ones are available, which will be
developed in house, and which will need to be acquired
+ Supply chain: including suppliers and other business partners
+ The revenue expected (revenue model), anticipated costs, sources of financing and
estimated profitability (financial viability)
- Revenue model: how the company or an EC project will earn revenue (Book 1, p.27)
7 8
- Value proposition: the benefits a company can derive from using EC (Book 1, p.27) Eg. Spotify charges $10.99 for a monthly subscription for Spotify premium.
7. Benefits and challenges of E-COM Expansion Physical expansion to new locations Expansion of the retail base
7.1. Benefits (Book 1, p.15,16) requirements and spaces requires increased server capacity
For organizations For individual customers For the society and distribution methods.
- Global reach - Availability -Enable Technology Automated sales technologies such - Front-end technologies
- Cost reduction - Ubiquity telecommuting as POS (Point of Sale) systems, - Back-end technologies
- Facilitate problem-solving - Self-configuration - More and better self-checkout machines - "Information" technologies
- Supply chain improvements - Find bargains public services
Customer - More sustainable relationships - Less durable due to anonymous
- Business always open - Real-time delivery - Improve homeland
relationships thanks to direct contact contact
- Customization/Personalization - No sales tax security
- Easier to reconcile in arguments - Less tolerant in arguments due to
- Ability to innovate, use new business - Enable telecommuting - Increase standard of
due to tangibility intangibility
models - Social interaction and living
- "Physical" relationship - "Logical" relationship
- Lower communication costs engagement - Close the digital
- Efficient procurement - Find unique items divide Competition - Local competition - Global competition
- Improved customer service and - Comfortable shopping - Home shipping - Fewer competitors - More competitors
relationship
- Help SME to compete Customer base - Customers in the local area - Customers in a wide area
- Lower inventories characteristics - Not anonymous - Nameless
- Lower cost of distributing digitizable - Fewer resources are needed to - More resources are needed to
products increase customer loyalty increase customer loyalty
- Provide competitive advantage
8. Global and country-specific E-com development trends
7.2. Challenges (Book 1, p.29) 8.1. Global (Book 1, p.30)
- Ethical issues - China continues to lead in global ecommerce sales according to the International Trade
- Technological limitations Association, accounting for more than 50% of all retail sales worldwide, with total online sales just
- Need for universal standards over the $3 trillion mark in 2022.
- Insufficient telecommunication - After China and the US, the third-largest ecommerce market is the United Kingdom, taking up
- Lack of software development tools 4.8% of the retail ecommerce sales share. The UK is followed by Japan (3%) and South Korea
- Difficulty in integrating Internet and EC software (2.5%).
- Additional cost from special web servers for EC - The UK is forecast to do more than $143.8 billion in ecommerce sales in 2023 (Statista).
- Internet accessibility - Latin America (including Peru, Brazil, Argentina, Chile, Colombia, and Mexico) saw $104 billion in
- Automated warehouse for order fulfillment ecommerce sales in 2022, up 22.4% from $85 billion in 2021.
- Non-technological limitations - The Singapore ecommerce market is one of the top 5 fastest growing countries in the world,
- Security and privacy concerns of customers with a 25.5% growth in sales in 2022 (Insider Intelligence).
11 12
- The US ecommerce market is forecasted to reach more than $940.9 billion in 2023, a little over a years. Technological advances like branded mobile apps, 5G wireless, and social shopping
third of China’s total (Statista). make it easier for people to shop on their phones.
- Recent studies show that around 218.8 million US consumers will shop online in 2023 (Insider In 2022, mobile shopping from Shopify merchants captured 69% of online sales over BFCM.
Intelligence).
- Over 50% of consumers shop online for free delivery, followed by coupons and discounts at Online retail continues to expand due to the increasing use of smartphones and tablets
38.7%. (Data Reportal). globally. Mobile commerce is expected to account for 42.9% of ecommerce sales by 2024.
- Recent reports state that the average shopping cart abandonment rate is 70.19% (Baymard Another facet of mobile shopping, social commerce sales are set to triple by 2025. While
Institute). only 47% of US consumers report purchasing goods through social platforms, over 84% of
- 28% of US shoppers use mobile phones while in a physical store to look up discounts, compare Chinese consumers report shopping on social networks, the highest in the world.
pieces, and read product reviews (PYMNTS).
- 30% of consumers report that influencer recommendations guide online purchases, compared Expect more branded shopping apps, more SMS and Facebook Messenger marketing
to only 27% for recommendations from friends or family (HubSpot). campaigns, and more social commerce content on TikTok and Instagram.
- As of May 2023, the average conversion rate across ecommerce sites was 2.02%, a 0.2 percent
3. A new mix of marketing channels
point increase from the previous month (IRP Commerce).
In recent years there have been exciting advancements in several areas of
- B2C online marketplace sales (Think Amazon and eBay) in the US are expected to reach $2.1
advertising—including access to new marketing channels.
trillion by 2024 (Research and Markets).
- The gap between ecommerce growth and retail growth in 2022 was nearly nonexistent, just Social commerce has been on the radar for the past five years, with the release of
two-tenths of a percentage point (Insider Intelligence). Facebook and Instagram shopping features, and, more recently, TikTok shopping.
- There were 41.8 million online shoppers between 25 and 34 years old in 2022, with millennials as However, as an extension of social commerce, live shopping has started to become more
the largest group amongst digital buyers (Insider Intelligence). popular as the strategy has soared in China. The live commerce market in China was at
$3.49 billion in 2021 and is expected to increase to $4.92 billion in 2023.
E-COM TRENDS IN THE FUTURE
1. Global inflation pressures Another new marketing channel coming on the horizon is connected TV
For customers worldwide, inflation has become a leading concern for 40% of advertising—which refers to ads you’ll find on platforms like Hulu, Roku, and YouTube. The
respondents—above poverty and social inequality (31%), unemployment and jobs (26%), perception of these ads by customers are largely no different to that of linear/cable TV, but
and coronavirus (12%). customers comparing the two found ads on streaming services to be better.
While people are still spending money, global brands are not exempt from the pressure of Hoka is an athletic footwear company that recently launched a global ad campaign using
inflation. As such, if you’re planning to use cross-border ecommerce, you’ll need to connected TV platforms, and reported a 68% increase in ecommerce website visitors and a
consider the impact of inflation on potential customer purchasing decisions. bump in followers on social media platforms.
Speaking to Glossy in a recent interview, Olaplex CEO JuE Wong explains how even with 4. A slowly stabilizing supply chain
net sales increases of 38.6% in Q2 2022, Olaplex isn’t immune from global inflation, The impact the pandemic made on supply chains was, according to Morris Cohen,
macroeconomics, and geopolitical situations. As a result, Wong says while the business is Wharton professor of operations, information, and decisions, “a major disruption, along the
cash-rich, it will be investing in technology (such as ecommerce solutions) and lines of having an earthquake or tsunami.” For decades, the core features of supply chain
technological capabilities to help advance growth. management were:
With this concern in mind, it’s worth researching the inflation rates of the countries you’ll ● Globalization
be targeting and potentially revising your pricing strategy using the data you gather. ● Low-cost supply
● Minimal inventory
2. More consumers will shop on their smartphones
When COVID-19 broke supply chains around the world, it drove companies to focus
The pandemic made a significant impact on ecommerce trends around the world. While
on building supply chain resilience or to think of ways to keep supply chains from halting
retail and ecommerce revenue have stabilized again, there are still more people online
and restoring them quickly when they do.
shopping than before.
The effects of COVID-19 were not an exception to the rule: Supply chain disruptions
M-commerce, or mobile commerce, involves shopping online through mobile devices, like are happening with increasing frequency and severity. Levi Strauss saw its biggest
a smartphone or tablet. Mobile ecommerce will continue to break out over the next few year-over-year loss in Europe in 2022, where revenue decreased 19% from the same period
13 14
in 2021. McKinsey reports that significant disruptions to manufacturing production now 9. E-com systems
occur every 3.7 years, on average.
Experts predict that systems will “normalize” throughout 2023 at the earliest. Even
once they do, the pandemic has exposed global logistic network vulnerabilities to future
political instability, natural disasters, and regulatory changes. Brands like Volkswagen even
lowered delivery targets in 2023 due to supply chain issues.
“There are [some experts] who think that supply chain problems are the new normal.
There are other global crises afoot that are going to affect how global manufacturing
happens. There’s no reason to think that this system is not going to be susceptible in the
future to other problems,” says Rebecca Heilweil, a supply chain reporter.
How does Packet Switching work? (tham khảo ngoài để hiểu thêm)
“Internet” refers to the global information system that Packet Switching works by breaking data into packets and transmitting them across the network
independently.
(i) is logically linked together by a globally unique address space based on the Internet Protocol - Splitting data packets: Data to be transmitted
(IP) or its subsequent extensions/follow-ons; is divided into smaller packets. Each data
(ii) is able to support communications using the Transmission Control Protocol/Internet packet contains information such as source
Protocol (TCP/IP) suite or its subsequent extensions/follow-ons, and/or other IP-compatible address, destination address, sequence
number, and error checking.
protocols; and
- Routing: Each data packet is appended with
information about the destination address,
(iii) provides, uses or makes accessible, either publicly or privately, high level services layered on
and switches (such as routers) use this
the communications and related infrastructure described herein.”
17 18
information to decide the optimal path to deliver the packet to the destination. sequencing the packets to and from the applications
- Data packet transmission: Data packets are transmitted across the network from one switch to another. - Application layer: includes a variety of protocols used to provide user services or exchange data
Each data packet can go through different paths and does not necessarily follow the same path. + One of the most important is the Border Gateway Protocol (BGP), which enables the
- Data packet concatenation: When the data packet reaches the destination, the data packets are
exchange of routing information among different autonomous systems on the Internet.
reassembled to reconstruct the original data.
BGP uses TCP as its transport protocol.
During transmission, Packet Switching also provides features to check the integrity of data packets and
+ Other important protocols included in the Application layer include HyperText Transfer
resend corrupted packets if necessary.
Protocol (HTTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP)
+ Four TCP/IP layers (each layer handling a different aspect of the communication problem)
- Network interface layer: is responsible for
placing packets on and receiving them from
the network medium
- Internet layer: is responsible for
addressing, packaging, and routing
messages on the Internet Domain Names, DNS, and URLs
- Transport layer: is responsible for - Domain name: IP address expressed in natural language
providing communication with other - Domain Name System (DNS): system for expressing numeric IP addresses in natural language
protocols (applications) within the TCP/IP - Uniform Resource Locator (URL): the address used by a web browser to identify the location of
protocol suite by acknowledging and content on the Web
19 20
+ A typical URL contains the protocol to be used when accessing the address, followed by its + Definition of Client/Server computing: Client/Server Computing: a model of computing
location. in which client computers are connected in a network together with one or more servers,
+ A URL can have from two to four parts; for example, name1.name2.name3.org. Eg: the URL which are computers that are dedicated to performing common functions that the client
http://www.azimuth-interactive.com/flash_test computers on the network need, such as file storage, software applications, printing, and
+ the IP address 208.148.84.1 Internet access
+ domain name “azimuthinteractive.com” + client: a powerful desktop computer that is part of a network
+ protocol being used to access the address: HTTP + server: networked computer dedicated to common functions that the client computers
+ A resource called “flash_test” is located on the server directory path /flash_test on the network need (eg: file storage, software applications, printing, and Internet access)
The New Client: The Emerging Mobile Platform (k biết cô lấy ở đâu 🙂 )
Within a few years, primary Internet access will be through:
- Netbooks
+ Designed to connect to wireless Internet
+ Under 2 lbs, solid state memory, 8” displays
+ $200–400
- Smartphones: Disruptive technology: Processors, operating systems
Cloud computing
- Definition: Cloud computing is a model of computing in which computer processing, storage,
software, and other services are provided as a shared pool of virtualized resources over the
Internet
The Domain Name System is a hierarchical namespace with a root server at the top. Top-level
domains appear next and identify the organization type (such as .com, .gov, .org, etc.) or
geographic location (such as .uk [Great Britain] or .ca [Canada]). Second-level servers for each
top-level domain assign and register second-level domain names for organizations and
individuals such as IBM.com, Microsoft.com, and Stanford.edu. Finally, third-level domains
identify a particular computer or group of computers within an organization, e.g.,
www.finance.nyu.edu.
- Firms and individuals obtain computing power and software over Internet
Eg: Google Apps
- Fastest growing form of computing
- Radically reduces costs of:
+ Building and operating Web sites
+ Infrastructure, IT support
+ Hardware, software
(Cloud computing has many significant implications for e-commerce. For e-commerce firms,
- Client/server computing cloud computing radically reduces the cost of building and operating websites because the
necessary hardware infrastructure and software can be licensed as a service from CSPs at a
21 22
fraction of the cost of purchasing these services as products. This means firms can adopt
“pay-as-you-go” and “pay-as-you-grow” strategies when building out their websites. For instance,
according to Amazon, hundreds of thousands of customers use Amazon Web Services. For
individuals, cloud computing means you no longer need a powerful laptop or desktop computer
to engage in e-commerce or other activities. Instead, you can use much less expensive tablet
computers or smartphones that cost a few hundred dollars.
For corporations, cloud computing means that a significant part of hardware and software costs
(infrastructure costs) can be reduced because firms can obtain these services online for a fraction
of the cost of owning, and they do not have to hire an IT staff to support the infrastructure.)
- IXPs: Internet Exchange Point (IXP) hub where the backbone intersects with local and regional
networks and where backbone owners connect with one another
- CANs: Campus/corporate area network (CAN) are generally local area networks operating within
a single organization—such as New York University or Microsoft Corporation that leases access to
the Web directly from regional and national carriers
EXTRANET
Internet Service Providers (ISPs)
- Definition:
- Provide lowest level of service to individuals, small businesses, some institutions
❖ Theo giáo trình (1) trang 8: An extranet is a network that uses Internet
- Types of service
technology to link intranets of several organizations in a secure manner
+ Narrowband (dial-up) service is the traditional telephone modem connection now
❖ Theo slide cô: Extranet is formed when firms permit outsiders to access their
operating at 56.6 Kbps
internal TCP/IP networks
+ Broadband: refers to any communication technology that permits clients to play
streaming audio and video files at acceptable speeds
- Digital Subscriber Line (DSL) service is a telephone technology that provides
highspeed access to the Internet through ordinary telephone lines found in a home
or business.
- Cable Internet: t refers to a cable television technology that piggybacks digital
access to the Internet using the same analog or digital video cable providing
television signals to a home
- T1 and T3 are international telephone standards for digital communication
+ T1: offers guaranteed delivery at 1.54 Mbps
+ T3: offers guaranteed delivery at 45Mbps
25 26
- In Vietnam: Vnnic (http://vnnic.vn)
27 28
- WiMax: High-speed, medium range broadband wireless metropolitan area network
- Bluetooth:
+ technology standard for short-range wireless communication under 30 feet
+ Low-speed, short range connection
- Ultra-Wideband (UWB): Low power, short-range high bandwidth network
- Zigbee: Short-range, low-power wireless network technology for remotely controlling digital
device
Internet Connection
31 32
+ A memorable experience if the users have Equipment: When most online stores are
AR keeps the connection to reality intact, is VR is suitable when there’s a need for
functioning with 2D images, allowing users to virtually step into your online store and buy
more real and gives a more persistent presenting the user with a virtually rendered
products from there will certainly make their shopping experience memorable and one of
experience to the users. environment, different from their real
a kind.
environment.
+ Great for Gaming and Entertainment Marketing: A VR ecommerce store can offer users
For example, through AR, users can place a
an unmatched gaming experience that they may want to discuss with their friends and
sofa in their living room, and view how it may For example, VR Will be helpful when the
relatives. In most cases, VR may help optimize your entertainment marketing campaigns.
look. user needs to use certain equipment to step
This may also help your business gain popularity through word of mouth.
into a virtual furniture store and take a look at
+ Attractive Ideas: An easy-to-use and functional VR-based ecommerce store can be a
the sofa.
remarkable experience for many consumers. This could help attract quality leads. Plus, as a
result of this completely immersive VR shopping experience, more of your users may
remember your store and its products and want to keep coming back. 3.3. Blockchain
For example, Lowe’s Holoroom uses VR to allow shoppers to virtually feel the experience of - Definition: A blockchain is a type of decentralized, peer-to-peer database that is dispersed
using a specific tool or performing a complex DIY project. The ability to utilize this across all of the nodes in the trustless blockchain network. As the name indicates, a blockchain is
technology to build confidence around a startup eCommerce brand could significantly a series of blocks. To preserve the integrity of the whole blockchain, certain properties are
increase buyer trust in a completely new product. included in each block. The blockchain employs strong cryptography to maintain this integrity.
+ Comes at a High Premium: By stepping into a virtual ecommerce store, customers may
get the chance to virtually pick a product, take a quick look at it, read details, and make an - Companies Use Blockchain in E-commerce:
informed purchase. However, in the best cases, VR requires high installation costs, upfront + Walmart: While being a brick-and-mortar retailer, Walmart's online presence is significant.
payments, can be difficult to set up, and expects the users to purchase additional Walmart has been an early adopter of blockchain for tracking its supply chain. The
equipment. These roadblocks may make applications less enjoyable, and more technical. company uses it to trace the origins of produce and other products. For example, by
- Comparing AR and VR: According to McKalin (2015), both technologies are similar in their goal collaborating with IBM's Food Trust Network, they have enhanced the safety and
of immersing the users. But they do it in different ways and for different purposes. traceability of food products.
Differences Between AR and VR + Starbucks: Starbucks is piloting a blockchain-based system to track the journey of coffee
beans from farms to stores. The company aims to enhance transparency and support
Augmented Reality Virtual Reality ethical sourcing practices. It also allows consumers to have a clear understanding of the
origins of their coffee.
AR allows users to project 3D visuals of objects VR allows users to step into a virtually + Amazon Web Services: AWS's blockchain templates are enabling e-commerce businesses
into their personal view of the real world. designed reality, which, in a way, replaces the to set up blockchain networks. This, in turn, fosters innovation and drives growth in the
view of the real world. sector. With these templates, businesses can harness the benefits of blockchain
technology and explore new possibilities for their operations.
For a seamless viewing experience, it’s VR systems may function on mid-range
important to minimize AR visual files. Avatar's bandwidth connections. However, users can - The Pros of Blockchain in E-commerce:
patent techniques can create real time assets also download files to eliminate the constant + Manage supply chain : Blockchain solves the problem of supply chain management, the
meant for AR experiences at scale. Using the need for a high bandwidth connection. process of transporting goods to consumers by smart contracts, which enables parties to
topology preserved compression techniques, easily sign and link with multinational enterprises. Thereby ensuring the transparency of
Avataar is able to achieve savings over 90% in the customer’s transaction process with the retailer and between the retailer and the
file sizes vis-a-vis traditional 3D formats. E-commerce site system. Blockchain is used to track parcels and shipments, which can
help reduce shipping costs in the e-commerce industry. By using a distributed ledger,
Most often requires a mobile phone with a VR headsets needed for a complete shipping companies and retailers can track shipments from origin to consignee with more
camera. experience. accuracy and efficiency, which reduces costs for buyers and sellers.
+ Secure customer information: Limit the audience who can access customer information
data on the E-commerce site. This system will allow customers to access their information
in a secure and anti-counterfeit way, ensuring that users can make payments and
purchases quickly with high security. Blockchain technology improves the e-commerce
33 34
industry by providing a more transparent and efficient system that allows entities in the Moreover, Big Data empowers merchants to segment their customer base into distinct
same supply chain to verify trusted customer identities and provide the highest security categories, which in turn, enables targeted marketing and promotions. For instance,
for customer databases and CRM systems. sending discount offers on baby products to recent parents. Through such segmentation,
+ Prevent data fraud: Timely prevention of data breaches by admins in the system, ensuring promotions resonate better with customers, enhancing the likelihood of purchases and
all ratings and reviews are approved by surveyors. By using Blockchain, retailers can ensure fostering a more personalized connection between the e-commerce platform and its
that buyers’ data is safe and secure from theft or misuse. By creating immutable data users.
records, the system can easily detect objects that try to add fake/fraudulent transactions of + Inventory Management
goods or payments. The integration of Blockchain technology into e-commerce platforms, Through demand forecasting, Big Data aids in predicting the demand for various
ensures that all transactions are legal and accountable. products, which in turn assists in precise inventory management. For example, by
+ Speedy payment: Implement regulated transactions by online payment method analyzing past sales data and current market trends, an e-commerce platform can
connecting directly between sellers and buyers on websites and e-commerce platforms, forecast the demand for winter jackets during the cold season, ensuring an adequate
eliminating the involvement of intermediaries. Thereby reducing transaction budget, stock is maintained to meet customer needs.
saving time waiting for transaction payment processing. One way that Blockchain can Secondly, logistics optimization is another arena where Big Data proves invaluable. By
help improve the speed of payments in e-commerce is through the ability to create analyzing and predicting traffic patterns and delivery times, logistics operations are honed
tamper-proof records of transactions. This can allow the retailers to eliminate the need for to ensure timely deliveries. For instance, by leveraging Big Data, a logistics manager can
customers to provide their personal information, such as addresses and digital card signals plan routes that avoid traffic congestions, thereby reducing fuel costs and ensuring timely
during checkout. Thereby helping them save time, automate transactions and secure their deliveries to customers.
information. + Marketing and Advertising
- The cons of Blockchain in Ecom: By sifting through customer data, e-commerce platforms can craft advertising campaigns
+ Technical and Scalability Challenges: Implementing blockchain technology for that resonate with specific customer segments. For instance, analyzing shopping behavior
e-commerce requires a robust infrastructure that can be costly and complex to set up and data might reveal a group of customers with a penchant for outdoor gear, enabling the
maintain. Also, as the number of transactions increases, the blockchain network can creation of tailored advertising campaigns promoting hiking boots or camping equipment
become slower and less efficient. The scalability challenge arises as each new transaction to this segment.
must be added to every node in the network. But it consumes large computational power Furthermore, Big Data extends its utility to the realm of performance analytics.
and time. This can be particularly problematic for large e-commerce businesses with high Post-campaign analysis powered by Big Data can unveil the effectiveness of marketing
transaction volumes. Furthermore, the complexity of blockchain leads to a need for more strategies, highlighting areas of success and aspects needing refinement. For example, if a
skilled professionals. particular social media campaign drives a surge in website traffic and sales, it can be a cue
to allocate more resources to similar future campaigns.
+ Regulatory and Legal Considerations: Blockchain technology is still new, and the
regulations governing it are changing. This can create uncertainties and compliance
problems for e-commerce companies. - How does Big Data benefit E-commerce companies? Big Data aids in analyzing customer
behavior for personalized experiences, optimizing inventory through demand forecasting, and
adjusting prices dynamically based on market conditions.
3.4. Big Data
- What is Big Data? Big Data refers to the massive volumes of data that are generated every - What are the challenges faced when integrating Big Data in E-commerce? Key challenges
second from various sources including social media, online transactions, researches, and more. include ensuring data privacy and security, managing high volumes of data, and requiring
This data can be structured, semi-structured, or unstructured and is characterized by its high specialized skills to analyze and interpret data effectively.
velocity, volume, and variety, often referred to as the 3 Vs. - How can E-commerce platforms ensure data privacy while leveraging Big Data?
The analysis of Big Data, using advanced analytics and machine learning algorithms, can reveal E-commerce platforms can ensure data privacy by complying with data protection laws,
valuable insights and patterns that were previously hidden or inaccessible. implementing strong encryption methods, and being transparent with customers on data usage
- The key benefits of Big Data in Ecommerce: policies
3.5. AI
+ Customer insights: Through behavior analysis, brands and sellers can scrutinize the - Definitions and characteristics: Artificial intelligence (AI) has several definitions; however, many
interactions and behaviors of customers on their platforms to discern preferences and experts agree that AI is concerned with two basic ideas: (1) the study of human thought
buying patterns. For instance, if a significant number of customers frequently buy athletic processes (to understand what intelligence is) and (2) the representation and duplication of those
wear, it's an indicator of a preference trend. thought processes in machines (e.g., computers, robots). One well-publicized definition of AI is
35 36
“behavior by a machine that, if performed by a human being, would be called intelligent.” A sensory apparatus, such as a camera, that collects information about the robot’s
well-known application of artificial intelligence is the chess program hosted at a supercomputer. surroundings and its operations. The collected data are interpreted by the “brain” of the
robot, allowing it to respond to the changes in the environment. Robots can be fully
- Adoption of AI in e-commerce: autonomous, programmed to do tasks completely on their own, or they can be remotely
+ Intelligent Agents An intelligent agent (IA) is an autonomous, relatively small, computer controlled by a human. Some robots resemble humans and are known as androids. Most
program that observes and acts upon a changing environment and directs its activities industrial robots are not. The autonomous robots are equipped with an AI intelligent
toward achieving specific goals, related to the above changes, by running specific tasks, agent. The more advanced smart robots are not only autonomous, but they can learn from
autonomously. Intelligent agents may have the ability to learn by using and expanding the their environment, building on their capabilities. Robots today can learn complex tasks by
knowledge embedded in them. Intelligent agents are powerful tools for overcoming the watching what humans do. This leads to better human–robot collaboration.
most critical burden of the Internet— information overload—and making e-commerce a + Natural Language Processing (NLP) technology gives computer users the ability to
more viable organizational tool. Interest in using intelligent agents for e-commerce started communicate with a computer in their native language. This technology allows for a
in the academic world soon after the birth of EC, in the mid-1990s. However, it is only since conversational type of interface, in contrast to using a programming language that
2014, when the capabilities of IA increased remarkably, that we started to see many consists of computer jargon, syntax, and commands. It includes two subfields:
applications, which will be presented in section “Recent AI Applications in E-Commerce”. ● Natural language understanding that investigates methods of enabling computers
Initially, intelligent agents were used mainly to support routine activities such as searching to comprehend instructions or queries provided in ordinary English or other
for products, getting recommendations, determining products’ pricing, planning languages
marketing, conducting negotiations, improving computer security, managing auctions, ● Natural language generation that strives to have computers produce ordinary
facilitating payments, and improving inventory management. However, these applications spoken language so that people can understand the computers more easily.
were very simple, using a lower level of intelligence. Their major benefit was increasing NLP is related to voice-generated data, as well as text and other data.
speed, reducing cost, reducing errors, and improving customer service. + Speech (Voice) Understanding: A speech (voice) understanding is the recognition and
Example: Virus Detection Program: A simple example of an intelligent software agent is a understanding of spoken languages by a computer. Applications of this technology have
virus detection program. It resides in your computer, scans all incoming data, and removes become more and more popular. For instance, many companies have adopted this
found viruses automatically while learning new virus types and detection methods. technology in their call centers. Related to NLP is machine translation of languages, which
Intelligent agents are also applied in personal digital assistants, e-mail servers, news is done both of written text (e.g., Web content) and of voice conversation (e.g., by Skype).
filtering and distribution, appointment handling, and automated information gathering. + Language Translation Machine uses computer programs to translate words and
+ Machine Learning AI systems do not have the same learning capabilities that humans sentences from one language to another. For example, you can use Babel Fish translation,
have; rather, they have simplistic (but improving) learning capabilities (modeled after available at babelfish.com, to try more than 25 different combinations of language
human learning methods) called machine learning. The machine learning scientists try to translation. Similarly, you can also use Google’s free Translate to translate dozens of
teach computers to identify patterns and make connections by showing it a large volume different languages (translate.google.com). Finally, users can post their status in Facebook
of examples and related data. Machine learning allows computer systems to monitor and in any language. Then translation can be made.
sense their environmental activities and adjust their behavior to match changes in the + Another AI technology related to NLP and robots is chatbots. Chatbots is a computerized
environment. Technically speaking, machine learning is a scientific discipline that is service that enables conversations between human and computers, usually over the
concerned with the design and development of algorithms that allow computers to learn, Internet. The conversations are frequently done by short questions and answers. More
based on data coming from sensors, databases, or other sources. Machine learning intelligent chatbots are equipped with natural language processors, so the computer can
algorithms are used today by many companies. Well-known examples are product understand unstructured dialog. The computer side can look like a person or an avatar.
recommendation services. The service is also available at messaging services such as Facebook’s Messenger and on
+ Robotics Systems Sensory systems, such as scene recognition systems, and Twitter.
signal-processing systems, when combined with AI, define a broad category of complex ● Chatbots in E-Commerce: The most common use of chatbots (bots in short) in EC
systems generally called robots. There are several definitions of robots and they are is in customer service. Example: Nordstrom Uses Chatbots “If you wanted to buy
changing over time. A classical definition is that a robot is an electromechanical device shoes from Nordstrom online, you would go to their website, look around until you
that can be programmed to perform manual and/or mental tasks. Robotics Institute of find the shoes you wanted, and then you would purchase them. If Nordstrom makes
America formally defines a robot as “a programmable multifunctional manipulator a bot, which I am sure they will, you would simply be able to message Nordstrom on
designed to move materials, parts, tools, or specialized devices through variable Facebook. It would ask you what you are looking for and you would simply tell it.
programmed motions for the performance of a variety of tasks.” This definition ignores the Instead of browsing a website, you will have a conversation with the Nordstrom bot,
many mental tasks done by today’s robots. An “intelligent” robot or a bot has some kind of mirroring the type of experience you would get when you go into the retail store.”
37 38
- The AI Contribution to E-Commerce - Hypertext:
As described earlier, AI enhanced EC since its inception. However, it is only now that we see a + Text formatted with embedded links (links connect documents to one another, and to
wave of powerful applications. Here is what the major technology companies do with AI: other objects such as sound, video, or animation files.
+ Apple. According to Fingas (2016), AI and augmented reality are core technologies in + Uses HTTP and URLs to locate resources on the web.
Apple’s future. Apple is continuously improving Siri (its personal assistant robot. Apple has - Markup Languages
several other AI initiatives, including making the iPhone “smarter” . + A way to annotate text to provide additional information about the structure of the
+ Google. Google is involved in several AI initiatives. One major effort is Google Brain, a document. They consist of tags or codes embedded in the text that define how the text
secretive project that includes machine learning. We already mentioned the company’s should be displayed or structured.
DeepMind in section “Introduction to Intelligent E-Commerce”. Google believes that AI will + Common Markup Languages: HTML (Hypertext Markup Language, a GML that is relatively
be able to solve the world’s biggest problems. O’Brien (2016a), a scientist at Google Brain, easy to use in web page designers with a fixed set of markup “tags” that are used to format
stresses that it “will take some smart humans to get it there.” a web page), XML (eXtensible Markup Language, a markup language specification
+ Facebook. Facebook’s CEO is a great believer in AI. He is developing a personal assistant developed by the W3C that is designed to describe data and information)...
robot for his own use. Facebook is working on several other projects related to advertising - Web servers:
and customer service. Facebook says that its new AI can understand text with near-human + Software that enables a computer to deliver web pages written in HTML to client
accuracy. computers on a network that request this service by sending an HTTP request.
+ IBM. IBM pioneered the concept of smart commerce in 2013/2014. At that time, they + Types of specialized servers on the Web : database servers (access specific information
concentrated on big data and analytics. A major part was the use of data mining within a database), ad server (deliver targeted banner ads), mail server (provide email
technologies (an AI product) for discovering hidden correlations. This enables a better messages), video server (serve video clips)
predictive analysis, which is used in EC strategy and decision-making. Deep Blue was the - Web clients: Any computing device attached to the Internet that is capable of making HTTP
powerful computer that defeated the world’s chess champion in the 1990s. IBM is also requests and displaying HTML pages, most commonly a Windows PC
known for its Watson, the supercomputer that won the Jeopardy game, and for its - Web Browsers: Software program whose primary purpose is to display web pages.
contribution to medical research. Watson is also used to psychoanalyze people from their -> For example: Internet Explorer, Firefox, Chrome, Safari…
tweets to help marketers.
+ Amazon.com. This company pioneered the use of AI in the 1990s. The most well known are 2. EC Website analysis (Web development circle)
their book recommendation engines. Today, the company is experimenting or using AI in 2.1. Systems Analysis/Planning
many activities of its e-tailing. Well known is the use of smart robots in the warehouse. The - In the systems analysis/planning step of the SDLC, you try to answer the question: “What do we
company is also using predictive analysis and machine learning to assess demand for its want this e-commerce site to do for our business?” The key point is to let the business decisions
products. AI is also used for inventory management drive the technology, not the reverse. This will ensure that your technology platform is aligned
- What About ChatGPT and E-commerce? with your business.
ChatGPT is a language model that is designed to simulate human-like conversations and - One way to start is to identify the specific business objectives for your site, and then develop a
generate responses based on the input it receives. While it can be used for various purposes, list of system functionalities and information requirements.
including e-commerce, it is not a standalone AI tool that is specifically designed for e-commerce - System analysis: Business objectives, system functionalities, and information requirements for a
applications. typical EC site (use as examples)
In e-commerce, chatbots are typically used to provide customer support, answer product-related
questions, and guide customers through the purchasing process. While ChatGPT can simulate Business Objectives System Functionality Information Requirements
conversations and generate responses, it is not optimized for these specific use cases and may
Display goods Digital catalog Dynamic text and graphics catalog
not be as effective as a dedicated e-commerce chatbot solution.
That being said, ChatGPT can still be useful in e-commerce for generating product descriptions, Provide product Product description, stocking numbers, inventory
customer reviews, and other content. Additionally, it can be integrated into other AI tools and information (content) Product database levels
e-commerce platforms to enhance their capabilities and provide a more personalized experience Site log for every customer visit; data mining
for customers. Personalize/ Customer on-site capability to identify common customer paths and
customize product tracking appropriate responses
CHAPTER 3. E-COMMERCE WEBSITE
Engage customers in On-site blog; user Software with blogging and community forum
1. Website technologies conversations forums functionality
- Website is a group of World Wide Web pages usually containing hyperlinks to each other.
39 40
Shopping cart/ Secure credit card clearing; multiple payment continual checking, testing, and repair. Systems maintenance is vital, but sometimes not
Execute a transaction payment system options budgeted for.
3. EC website attributes
Accumulate Name, address, phone, and email for all customers;
3.1. Two ways interaction
customer information Customer database online customer registration
- Allows for two-way communication between merchant and consumer and enables the
Provide after-sale merchant to engage a consumer in ways similar to a face-to-face experience but on a much
customer support Sales database Customer ID, product, date, payment more massive, global scale.
Coordinate 3.2. Measurement
marketing/ Ads, email, banner, Site behavior log of prospects and customers linked - The process of evaluating and quantifying various characteristics or features of an EC website
advertising campaign manager to email and banner ad campaigns (Web analytics, e.g. Google Analytics)
3.3. Instantaneous
Understand
- Available just about everywhere, at all times, making it possible to shop from your desktop, at
marketing Site tracking and Number of unique visitors, page visited, products
home, at work, or even from your car.
effectiveness reporting system purchased, identified by marketing campaigns
3.4. Global
Provide production Inventory Product and inventory levels, supplier ID and contact, - Permits commercial transactions to cross cultural and national boundaries far more
and supplier links management system order quantity data by product conveniently and cost-effectively than is true in traditional commerce.
3.5. Personalization
2.2. Systems Design - The increase in information density allies merchants to target their marketing messages to
- Once you have identified the business objectives and system functionalities, and have specific individuals and results in a level of personalization and customization unthinkable with
developed a list of precise information requirements, you can begin to consider just how all this previously existing commerce technologies.
functionality will be delivered. You must come up with a system design specification—a
description of the main components in the system and their relationship to one another. 4. EC Website design
- The system design itself can be broken down into 2 components: - Important factors in EC Website design:
+ Logical design: describes the flow of information at your EC site, the processing functions Factor Description
that must be performed, the databases that will be used, the security and emergency
Pages that work, load quickly, and point the customer toward your product
backup procedures that will be instituted, and the controls that will be used in the system.
Functionality offerings.
+ Physical design: translates the logical design into physical components.
2.3. Building the System Links that customers can easily find to discover more about you and your
- Now that you have a clear idea of both the logical and physical designs for your site, you can Informational products.
begin considering how to actually build the site or outsource. Ease of use Simple fool-proof navigation.
2.4. Testing the System
Redundant
- Once the system has been built and programmed, you will have to engage in a testing process.
navigation Alternative navigation to the same content.
Depending on the size of the system, this could be fairly difficult and lengthy. Testing is required
whether the system is outsourced or built in-house. A complex EC site can have thousands of Ease of purchase 1 or 2 clicks to purchase.
pathways through the site, each of which must be documented and then tested. Multi-browser
- Form of testing: functionality Site works with the most popular browsers.
+ Unit testing
Avoids distractions, obnoxious graphics and sounds that the user cannot
+ System testing
Simple graphics control.
+ Acceptance testing
+ A/B testing Legible text Avoids backgrounds that distort text or make it illegible.
+ Multivariate testing - EC website features that annoy customers:
2.5. Implementation and Maintenance + Requiring user to view ad or intro page before going to website content
While the beginning of the process is over, the operational life of a system is just beginning. + Pop-up and pop-under ads and windows
Systems break down for a variety of reasons—most of them unpredictable. Therefore, they need + Too many clicks to get to the content
+ Links that don’t work
41 42
+ Confusing navigation; no search function - Cookies:
+ Requirement to register and log in before viewing content or ordering + Small text files deposited by the website on the user's computer to store information about
+ Slow loading pages the user, accessed when the user next visits the website.
+ Content that is out of date… + Can help personalize website experience
5. Other software support for EC website + However, it can pose privacy threat
5.1. The Foundations 5.2. Other EC sites tools
- Email: - Tools for Search Engine Optimization:
+ The most used application of the Internet + Meta Tags, titles, page content
+ Uses series of protocols for transferring messages with text and attachments (images, + Identify market niches
sound, video clips, etc.,) + Offer expertise
+ Can be an effective marketing tool + Get linked up
+ However, spam is a worsening problem + Buy ads
- Instant messaging: Displays text entered almost instantaneously. Recipients can then respond + Local EC
immediately to the sender the same way, making the communication more like a live - Tools for Interactivity and Active Content:
conversation than is possible through email + Common Gateway Interface (CGI):
For example, Meebo, Digsby allow users to communicate across platforms. + Active Server Pages (ASP) and ASP.NET
- Search engines: + Java, Java Server Pages (JSP), and JavaScript
+ Identify web pages that match queries based on one or more techniques (keyword + ActiveX and VBScript
indexes, page ranking) + ColdFusion
+ Also serve as: shopping tools; advertising vehicles (search engine marketing); a tool within + PHP, Ruby on Rails (RoR), and Django
EC sites. + Widget
+ Outside of email, search engines is the most commonly used Internet activity - Personalization Tools: For example, when a user returns to a site, you can read the cookie to
For example, how Google works: find a customer ID, look the ID up in a database of names, and greet the customer (“Hello Mary!
Glad to have you return!”).
- Web site optimization:
+ Page Generation: Server response time, Device-based accelerators, Efficient resource
allocation, Resource utilization thresholds, Monitoring site performance
+ Page Delivery: Content delivery networks, Edge caching, Bandwidth
+ Page Content: Optimize HTML, Optimize images, Site architecture, Efficient page style
5.3. Web 2.0 Features and Services
- Blogs: Personal Web page that typically contains a series of chronological entries by its author,
and links to related Web pages
- Really Simple Syndication (RSS): Program that allows users to have digital content
automatically sent to their computers over the Internet.
- Podcasting: Audio presentation stored as an audio file and available for download from Web
- Intelligent agents (bots): Software programs that gather and/or filter information on a specific - Wikis: Allow users to easily add and edit content on Web page
topic and then provide a list of results (search bot, shopping bot, news bot…) - New Music and video services: Videocasts, digital video on demand
- Online forums and chat: - Internet telephony (VOIP): Uses Voice Over Internet Protocol (VOIP) and Internet’s
+ Online forums: Web application that enables Internet users to communicate with each packet-switched network to transmit voice and other forms of audio communication over the
other, although not in real time. Members visit online forums to check for new posts. Internet
+ Online chat: Typically, multiple users log into chat rooms. - Internet Television (IPTV)
- Streaming media: - Telepresence and video conferencing
+ Enables music, video, and other large files to be sent to users in chunks so that when - Online software and Web services: Web apps, widgets, gadgets, digital software libraries,
received and played, files come through uninterrupted. distributed storage
+ Allows users to begin playing media fuels before the file is fully downloaded. - M-commerce applications
43 44
Adaptability to Slow Rapid
CHAPTER 5. RETAILING IN E-COMMERCE (B2B, B2C…) (Câu hỏi thảo luận thực tế)
market trends
1. Definition of electronic retailing
Retailing conducted over the Internet is called electronic retailing (e-tailing), and sellers who
3. Online purchasing process
conduct retail business online are called e-tailers. For example, Amazon.com sells to both
individuals and to organizations. Walmart (walmart.com) sells to both individuals and businesses
(via Sam’s club). Dell sells its computer to both consumers and businesses from Dell.com.
Increase of Expansion of locations, stores Going out of their regular area and even
sales volume and space globally to find customers
Customer base Local area customers. Lack of Wide-area customers. Anonymity most
anonymity. High increase of of the time. Easy to switch brands (less
customer loyalty loyalty).
Customization Expensive and slow. Not very Fast, more efficient. Popular
and popular
personalizatio
n
Price changing Expensive and slow, not done Inexpensive, can be done anytime
often
45 46
5. Online consumer purchasing decision-making and behavior 6.3. Banking and Finance
(P362 behavior) - Bank branches: These branches provide a variety of banking services, such as checking and
savings accounts, loans, and investment products.
- Automated teller machines (ATMs): These machines allow customers to withdraw cash, make
deposits, and transfer funds.
- Insurance agencies: These agencies sell insurance products, such as life insurance, health
insurance, and auto insurance.
- Tax preparation services: These services help individuals and businesses prepare their taxes.
6.4. Real estate
- Real estate brokerages: These brokerages help buyers and sellers of real estate find properties,
negotiate contracts, and complete transactions.
- Real estate agents: These agents work for real estate brokerages and represent buyers or sellers
in real estate transactions.
- Property management companies: These companies manage rental properties for landlords,
such as finding tenants, collecting rent, and maintaining the property.
- Real estate investment firms: These firms invest in real estate, such as buying, developing, and
managing properties.
49 50
+ Proper Communication Network: providing fast & best customer support → Customers can + Identity resolution: attribute multiple data points to the same individual customer profile,
easily contact the agents & get their issues resolved, Agents are required to keep a record track and store data coming from anonymous users through cookies and are able to
of each & every interaction with customers identify these users and provide more context regarding the pre-purchase stages of their
+ Cost Controlling: All data is stored digitally on a database centrally. → reduces the customer journey
manpower requirement for business → overall brings down the cost & increase the profit + Customer data analysis & activation:
margin ● The analytical capabilities of CDP allow for several types of analysis: in-depth analysis
+ Improve Quality: better understanding the needs of customers → customers happy & of individual customers, real-time audience segmentation, journey analytics
properly satisfied, product is meeting the minimum quality standard level ● Customer data activation: sending high-quality customer data to the right
* CDP: marketing channels
- Features: c, Application model (Hướng dẫn sử dụng)
- CRM Using process
+ Step 1: Generate brand awareness
The first step to acquiring new customers is
awareness, which refers to how familiar prospects
and customers are with your brand → collect these
clues from the very first point of contact.
The marketing team begins this task by
researching your target audience’s demographics,
purchasing behavior, interests, and preferences →
create “The customer persona” → deliver a
personalized customer experience.
51 52
If leads seem interested but haven’t made a purchase -> can leverage engagement data stored in
your CRM to provide personalized offers that will help build trust and nurture them toward
purchase.
You can also apply lead scoring to focus your efforts on the right leads and identify winning
opportunities.
+ Step 4: Nurture Leads
+ A CDP connects to a wide range of technology platforms, data sources and channels by
using built-in connectors, SDKs, webhooks, and APIs. They ingest and integrate data from
multiple disparate sources, including profile data and real-time interaction data (behavioral
Your customer relationship management process continues to increase retention by providing
data, transactional data), campaign data, product data, customer support data, mobile,
personalized experiences that meet and exceed customer expectations -> Ex: email marketing
POS, marketing, device, and internet-of-things (IoT) data.
+ A customer data platform ingests and integrates those data sets to create a single unified
+ Step 5: Provide Quality Customer Support
customer profile. This integration process is called identity resolution or data unification.
Leverage your CRM’s help desk and service system to understand your customer’s user
Customer identity resolution includes sophisticated algorithms to stitch identifiers from
experience after they make a purchase. Getting honest feedback from them is important to
multiple systems, as well as automate graph creation and continuously unifying data into
understand the changes you need to make to improve their experience.
a profile as customers engage in real-time. During the unification process, data is
+ Step 6: Drive Upsells & Cross-sells
validated, cleaned, and de-duped to create a single customer view. Profiles are then
Once you’ve built and established your customer database, the goal is to introduce repeat buyers
enriched with first, second, and third-party data sources to fill in missing attributes and
to your other products or services -> use upselling and cross-selling strategies
update other attributes with more recent information.
+ CDPs can also analyze and segment customer profiles using rules or machine learning,
- CDP Using process
perform predictive scoring, and journey orchestration capabilities. Some more advanced
CDPs provide machine learning (ML) and artificial intelligence (AI) for predictive analytics
and audience segmentation. With customer journey orchestration capabilities, marketers
can analyze customer interactions throughout the entire customer journey to deliver the
right message, at the right time, on the right channels.
53 54
d, Differentiate CRM and CDP. What is the best solution for businesses?
potential customers, hence, it helps multiple touchpoints and marketing
CRM CDP the business to stay in touch with channels to gain a single, unified view
current customers to build brand of customers’ journey.
Data Types - A CRM collects first-party data from - A CDP collects first, second, and loyalty and encourage them to
customers’ interactions with different third-party data from various online repurchase again in the future.
departments of the company. CRMs and offline sources. It then unifies this
are capable of providing only a data into individual profiles to create a Users - While CRMs can help many different Non-customer-facing roles, like
snapshot of a specific part of a single customer view of each departments, it’s customer-facing marketing, often use CDPs. That’s
customer profile or journey. customer. roles - like sales and customer service because CDPs give you a complete
- CRMs can only store data to existing - CDP can collect from known reps - that most often use CRM overview of your customers’
customers or leads. They don’t collect customers as well as anonymous software. behaviors, including how they use
anonymous user data as they cannot users. - A CRM platform is most effective for your website and which marketing
identify and link them with existing - CDPs can track: Which pages users sales teams because it tracks all the channels they interact with. Moreover,
data. visit on the website? Which marketing data the reps need to successfully CDP integration enables marketers to
- CRMs can collect data like: channels do they interact with? As close more deals. perform omnichannel personalized
Demographic data, Customer well as other personal data, - It houses all the contact details of marketing.
purchasing history, Customer engagement data, behavioral data your leads, so your sales team can
preferences, etc. and attitudinal data of customers. easily communicate with prospects at
each stage of the sales funnel to
For example, using the CDP system, Samsung can notice that one of the encourage them to convert into
customers first found their product through a search on Google. Let’s say they customers.
search: “What is the newest Samsung smartphone?”. Then they visited your
website to see the product. And after that, they went on Youtube to watch => Solution:
reviews of the product before making a purchase. All of this data will be - CRM is more suited for B2B (fewer needs of PR/Marketing)
automatically collected by the CDP system. And if Samsung only used the + Main focus: Little multi-channel interaction among businesses
CRM system, the company could only know the customer’s behaviors when + Data scale: B2B businesses would require a smaller amount of data.
they were on its official landing page. - CDP is more suited for B2C to consolidate a vast amount of data into clear customers’ profile
+ Main focus: Customers come from everywhere and interact all over the place
Data - Data volume: CDPs are built to collect, process, and stream data at scale. + Data scale: Large B2C brands (like Samsung, Unilever, for example) that serve millions of
Collection That includes tracking engagement activity for millions of users. That’s a big users would be a perfect fit with CDP.
step up from a CRM, which is built to handle a smaller number of data. Ultimately, the best solution will depend on the business’s needs and budget. CDPs offer more
- Collecting data speed: Speed is a big factor here, too: CDPs are built to robust functionality and integration, but they can be more expensive. CRMs are more affordable
stream data at rates as fast as tens or hundreds of thousands of hits per and easier to use, but they may not have all the features the business needs. Most importantly,
second, while solving for things like identity resolution and privacy in real time. identify what best fits the business through the pros and cons of both systems
CRMs aren’t built for that. They use more infrequent batching because the use
cases they’re designed for didn’t require real-time data. CHAPTER 6. ONLINE B2B TRANSACTION (Câu hỏi thảo luận thực tế)
- Integration: CDP can easily integrate with other data platforms or marketing 1. Definition and online B2B Models
tools while CRM has limited capabilities in integrating with multiple systems Business-to-business e-commerce (B2B EC), also known as eB2B (electronic B2B), or just B2B,
and channels refers to a transactions between business conducted electronically over the Internet, extranets,
intranets, or private networks. Such transactions may take place between a business and ít
Purposes The purpose of a CRM is to help a On the other hand, the purpose of supply chain partners, as well as between a business and a government and with any other
business improve interactions and CDP is to help a business better business. In this context, a business refers to any organization, private, public, profit, or nonprofit.
relationships with their customers. understand their customers’ In B2B, companies aim to computerize trading transactions and communication and
This tool can track all company’s behaviors. This system can track and collaboration process in order to increase efficiency and effectiveness. B2B EC is very different
relationships with current and manage customer data across and more com``6an B2B. It is much more difficult to sell to a company than to individuals.
55 56
+ Company-centric (EC)
2. Evolution of B2B Commerce + The company has control over all transaction and supporting information systems
- Automated order-entry systems 1970’s: Seller-side solution using tele modems to send digital + Private
orders to companies + As a solution, large buyers can open their own marketplaces called buy-side
- Electronic data interchange (EDI) e-marketplaces , and invite sellers to browse and offer to fulfill demand.
+ Buyer-side solution aimed at reducing buyer cost
+ Hub-and-spoke system with buyers in the center
+ Serve vertical markets that provide products/services for a specific industry such as auto
industry
- B2B electronic storefronts are online catalogs of products available to the public by a single
supplier
- Net marketplaces bring many suppliers and buyers together into a single internet-based
environment to do business
- Private industrial networks enable buyer firms and their suppliers to share product design,
development, marketing, inventory, product scheduling and communication
3. Types of transaction
3.1. Buyers’ side (buy-side): One buyer from many sellers
- Some basic characteristics:
+ Many-to-one
+ One company does all the buying
57 58
3.3. Exchange market (marketplaces or exchanges): Many sellers to many buyers
59 60
personal systems, helping it to better deliver for customers on a day-to-day basis.
61 62
5.4. Others
- Blockchain:
- Barcode:
+ A blockchain is a database in which bits of information (or blocks) are linked together (in a
+ A barcode is a square or rectangular image consisting of a series of parallel black lines and
chain). Since the database is shared and managed by more than one party, irregularities
white spaces of varying widths that can be read by a scanner. Barcodes are applied to
are easily spotted, making it a highly trustworthy system.
products as a means of quick identification. They are used in retail stores as part of the
+ By leveraging blockchain, e-commerce businesses enhance security, transparency, and
purchase process, in warehouses to track inventory, and on invoices to assist in accounting,
efficiency. Yet, it's crucial to consider the challenges associated with its implementation.
among many other uses.
They include technical and scalability issues, as well as regulatory considerations. To
+ There are two general types of barcodes:
navigate complexities, we will provide best practices for implementing blockchain in
○ 1-dimensional (1D): are a series of lines used to store text information, such as
e-commerce.
product type, size, and color. They appear in the top part of universal product codes
- Big data:
(UPCs) used on product packaging, to help track packages through the U.S. Postal
+ Big data is a form of e-commerce that uses Big Data and Analytics to improve customer
Service, as well as in ISBN numbers on the back of books.
engagement, personalize the shopping experience, and increase sales. Big data engages
○ 2-dimensional (2D): are more complex and can include more information than just
customers in two main ways: by providing personalized recommendations and increased
text, such as the price, quantity, and even an image. For that reason, linear barcode
visibility into product information.
scanners can’t read them, though smartphones and other image scanners will.
+ Some advantages of Big Data in e-commerce:
- RFDI:
○ Personalization
+ Radio-frequency identification (RFID) technology is a way for retailers to identify items
○ Improve SEO
using radio waves. It transmits data from a RFID tag to a reader, giving you accurate,
○ Manage Customer Relationships
real-time tracking data of your inventory.
○ Improve Customer Service
+ RFID is a wireless technology with two main parts: tags and readers. The reader is a device
- GIS:
that has one or more antennas that send and receive electromagnetic signals back from
+ A geographic information system (GIS) is a system that creates, manages, analyzes, and
RFID tags. These tags, which store a serial number or unique identifier, use radio waves to
maps all types of data. GIS connects data to a map, integrating location data (where things
send their data to nearby readers. They contain RFID chips, also known as integrated
are) with all types of descriptive information (what things are like there). This provides a
circuits (IC), which communicate data to the reader.
foundation for mapping and analysis that is used in science and almost every industry. GIS
helps users understand patterns, relationships, and geographic context. The benefits
include improved communication and efficiency as well as better management and
decision making.
+ The advantage of using GIS has been the ability to visualize spatial relationships, such as
identifying the distribution of customers, viewing purchasing behavior, and understanding
63 64
the demographic characteristics of local communities. These applications were based on
desktop software systems, but that is changing. The Web has truly transformed the
delivery of information forever. It has changed the way we purchase goods, and our
expectations of customer service. It has also changed business-to-business and
business-to-customer marketing by bringing the relationship between each into much
closer association. By capitalizing on the ability to deliver spatially enabled applications by
way of the Internet, mapping technology is maturing throughout a vast number &
industry sectors. Few examples of such spatial applications are customer relationship
management (CRM), enterprise resource planning (ERP), data mining and Webbased
address locator tools.
- DMS (Distributed Management System)
+ Distributor Management Systems (DMS) are now a fundamental component in any
consumer goods company’s route-to-market. They help manage the supply chain
between Manufacturers and a myriad of Distributors by aligning retail activities, trade
promotions, inventory, invoicing, claims, competitive insights and much more.
+ A modern DMS streamlines all distribution workflows and activities, improves supply chain
efficiency, eliminates stock outs and overstocking and allows companies to access real
time data from distributors. The right solution can bolster sales and distribution activities
even in a fragmented marketplace, but let’s examine exactly why it is that they’re so CHAPTER 7. E-GOVERNMENT
important. 1. Overview - Book 1 Page 169
6. Collaborative commerce - Definition: E-government refers to the use of information technology and communication
6.1. Definition (ITC) in general, and e-commerce in particular, to improve the delivery of government services
Collaborative commerce is an e-commerce technology that can be used to improve collaboration and activities in the public sector, such as providing citizens with more convenient access to
within and among organizations, frequently in supply chain relationships. information and services and providing effective delivery of government services to citizens and
6.2. Essentials of Collaborative commerce businesses as well as improving the performance of government employees.
Collaborative commerce (c-commerce) refers to electronic support for business collaboration. It E-government offers an opportunity to improve the efficiency and effectiveness of the internal
enables companies to collaboratively plan, design, develop, manage, and research products, operation of a government.
services, and innovative business processes, including EC applications. An example would be a 2. Different models (G2G, G2E, G2B, G2C) - Book 1 Page 170
manufacturer who is collaborating electronically with an engineering company that designs a
product or a part for the manufacturer. C-commerce implies communication, information
sharing, and collaborative planning done online by using tools such as groupware, blogs, wikis,
and specially designed EC collaboration tools. Sometimes as a digital partnership, c-commerce
can drive significant business success. Many collaboration efforts are done along the supply chain
where the major benefits are cost reduction, increased revenue, fewer delays, faster movement of
goods, fewer rush orders, fewer stockouts, and better inventory management. C-commerce is
strongly related to e-collabo-ration, which is collaboration using digital technologies among
people for accomplishing a common task.
6.3. The Elements and Processes of C-Commerce
The elements of the processes of the c-commerce vary according to situations.
65 66
• Intelink. Intelink (intelink.gov) is an intranet that contains classified information that is shared
by the numerous US intel-ligence agencies. It is a US government computer system that is
provided only for authorized US government use
2.4 Government-to-Employees (G2E)
- Government-to-employees (G2E) applications refer to e-commerce activities between the
government and its employees.
- Such activities may be especially useful in enabling efficient e-training of new employees,
e-learning for upgrading skills, and communication and collaboration activities. Other typical
services are e-payroll, e-human resource management, and e-recruiting
2.5 Internal Efficiency and Effectiveness (IEE)
- Automation, including e-commerce, provides an opportunity to significantly improve operations
3. Framework
4. Government regulations on E-gov
5. Digital Government - Book 2 Page 175
M-Government (Mobile government) is the implementation of e-government applications
using wireless platforms and mobile devices, especially smartphones. It is done mostly in G2C
● Technologies in e-Government
- Artificial Intelligence (AI) Applications
- Virtual Advisors
- Chatbots
- Virtual Reality and Augmented Reality
69 70
connection requires one powered device (the initiator, such as a smartphone), and one - Malicious software: Malware, such as phishing scams and viruses, can be used to trick people
target device, such as a merchant NFC reader, that can respond to requests from the into revealing their personal information or downloading malware that can steal their payment
initiator. information.
● Include: Apple Pay, PayPal, Square, Google Wallet - Chargebacks: Chargebacks occur when a customer disputes a transaction with their bank. This
2.4. Social/mobile peer-to-peer payment systems can be due to fraud, unauthorized use of their card, or dissatisfaction with the goods or services
Services such as Venmo, Square Cash, Snapcash, Google Wallet, and the new Facebook they purchased. Chargebacks can be costly for businesses, as they may have to refund the
Messenger Payment service all enable users to send another person money through a mobile customer and pay additional fees.
application or website, funded by a bank debit card. - Card data security.
2.5. DIGITAL CASH AND VIRTUAL CURRENCIES 4. Overview of online payment in VN
● Digital cash: an alternative payment system in which unique, authenticated tokens Vietnam's online payment landscape is experiencing rapid growth, driven by a number of factors
represent cash value including increasing smartphone penetration, growing e-commerce adoption, and government
Ex: Bitcoin. Bitcoins are encrypted numbers (sometimes referred to as cryptocurrency) initiatives to promote cashless payments.
that are generated by a complex algorithm using a peer-to-peer network in a process
referred to as “mining” that requires extensive computing power. Like real currency, Cash on delivery (COD) remains the most popular online payment method in Vietnam,
Bitcoins have a fluctuating value tied to open-market trading. Like cash, Bitcoins are accounting for over 70% of all e-commerce transactions. However, the use of e-wallets and other
anonymous—they are exchanged via a 34-character alphanumeric address that the user digital payment methods is growing rapidly. MoMo, ZaloPay, and ShopeePay are the most
has, and do not require any other identify-ing information. popular e-wallets in Vietnam.
● Virtual currency: typically circulates within an internal virtual world community or is
issued by a specific corporate entity, and used to purchase virtual good Bank transfers are also a popular online payment method, accounting for around 20% of all
Ex: such as Linden Dollars, created by Linden Lab for use in its virtual world, Second Life e-commerce transactions. However, bank transfers can be slow and inconvenient, and many
2.6. ELECTRONIC BILLING PRESENTMENT AND PAYMENT (EBPP) consumers are turning to e-wallets for their convenience and security.
● Electronic billing presentment and payment (EBPP) systems are systems that enable the
online delivery and payment of monthly bills. Credit and debit cards are less popular for online payments in Vietnam, accounting for around
● EBPP Business Models: online banking, biller-direct, mobile, and consolidator. 10% of all e-commerce transactions. This is due to a number of factors, including low card
○ Online Banking: the most widely used today. Consumers establish an online penetration and concerns about security. However, the use of credit and debit cards is expected
payment service with their banks and use it to pay bills as they come due or to grow in the coming years as more people become comfortable using them online.
auto-matically make payments for, say, rent. The payments are made directly to the
seller’s bank account. The Vietnamese government is also taking steps to promote cashless payments. In 2020, the
○ Biller-direct: consumers are sent bills by e-mail notification, and go to the government launched a national e-payment strategy with the goal of increasing the use of
merchant’s website to make payments using their banking credentials digital payments to 80% by 2025. The government is also working to improve the regulatory
○ Moblie: allows consumers to make payments using mobile apps, once again relying environment for e-payments and to encourage the adoption of digital payment solutions by
on their bank credentials as the source of funds. Consumers are notified of a bill by businesses.
text message and authorize the payment. An extension of this is the social-mobile
model, where social networks like Facebook integrate payment into their The growth of online payments in Vietnam is being driven by a number of factors, including:
messaging services. This is the fastest growing form of EBPP.
○ Consoilidator: a third party, such as a financial institution or a focused portal such as Increasing smartphone penetration: Vietnam has one of the highest smartphone penetration
Intuit’s Paytrust, Fiserv’s MyCheckFree, Mint Bills, and others, aggregates all bills for rates in Southeast Asia, with over 70% of the population owning a smartphone. This is making it
consumers and permits one-stop bill payment. easier for people to access and use online payment services.
3. Online payment risks
- Fraud: Fraudsters can use stolen or fake payment information to make unauthorized purchases. Growing e-commerce adoption: E-commerce is growing rapidly in Vietnam, with the market
This can result in financial losses for both businesses and individuals. expected to reach US$30 billion by 2025. This is driving the demand for convenient and secure
- Data breaches: Hackers can break into the systems of businesses and payment processors to online payment methods.
steal sensitive customer data, such as credit card numbers and Social Security numbers. This
data can then be used to commit identity theft or other forms of fraud.
71 72
Government initiatives to promote cashless payments: The Vietnamese government is
committed to promoting cashless payments and is taking steps to make it easier for people to
use digital payment solutions.
The future of online payments in Vietnam is bright. The market is expected to continue to grow
rapidly in the coming years, driven by the factors mentioned above. This will create opportunities
for new players to enter the market and for existing players to expand their offerings.
Here are some of the key trends that are expected to shape the future of online payments in
Vietnam:
The rise of mobile payments: Mobile payments are expected to become increasingly popular in
Vietnam, as more people use their smartphones to make online and offline purchases.
The development of new payment technologies: New payment technologies, such as biometrics
and tokenization, are expected to be adopted in Vietnam in the coming years.
The Vietnamese online payment landscape is dynamic and evolving rapidly. Businesses that
want to succeed in this market need to be aware of the latest trends and technologies and be
prepared to adapt their offerings accordingly.
- Malicious code (trang 416) (malware) – a threat at both client and server level
Malware is a software program that, when spread, is designed to infect, alter, damage, delete, or
replace data or an information system without the owner’s knowledge or consent. Malware is
comprehensive term that describes any malicious pro-gram or software (e.g., a virus is a “subset”
of malware). Malware attacks are the most frequent security breaches. Computer systems
infected by malware take orders from the criminals and do things such as send spam or steal the
user’s stored passwords.
+ Exploits and exploit kits: Exploit kits are collections of exploits bundled together and
rented or sold as a commercial product, often with slick user interfaces and in-depth
analytics functionality. Use of an exploit kit typically does not require much technical skill,
enabling novices to become cybercriminals.
Exploit kits typically target software that is widely deployed, such as Microsoft Windows,
Internet Explorer, Adobe Flash and Reader, and Oracle Java. In 2015 and the first half of
73 74
2016, the Angler exploit kit, which uses Flash, Java, Microsoft Internet Explorer, and Ex: One example is Zeus, which steals information by keystroke logging and has infected
Microsoft Silverlight vulnerabilities, and which was primarily used to spread ransomware, over 10 million computers since it first became known in 2007. Other examples in Check
was the most prevalent exploit kit. Point’s top 20 malware list for 2016 include Tinba, a Trojan first seen in the wild in 2012 that
+ Drive-by downloads: A drive-by download is malware that comes with a downloaded file sells user credentials via a web injection attack as users attempt to log into their bank
that a user intentionally or unintentionally requests. Drive-by is now one of the most website, and Ramnit, which is designed to steal banking, FTP passwords, session cookies,
common methods of infecting computers. and personal data (Checkpoint Research Team, 2017)
Ex: websites as disparate as the New York Times, MSN, Yahoo, and AOL have experi-enced + Backdoor: is a feature of viruses, worms, and Trojans that allows an attacker to remotely
instances where ads placed on their sites either had malicious code embedded or directed access a compromised computer. Downadup is an example of a worm with a backdoor,
clickers to malicious sites. while Virut, a virus that infects various file types, also includes a backdoor that can be used
+ Viruses: A virus is a computer program that has the ability to replicate or make copies of to download and install additional threats.
itself, and spread to other files. In addition to the ability to replicate, most computer viruses + Bots, botnets:
deliver a “payload.” The payload may be relatively benign, such as the display of a message - Bots (short for robots): are a type of malicious code that can be covertly installed
or image, or it may be highly destructive—destroying files, reformatting the computer’s on your computer when attached to the Internet. Once installed, the bot responds
hard drive, or causing programs to run improperly to external commands sent by the attacker; your computer becomes a “zombie”
+ Worms: Viruses are often combined with a worm. Instead of just spreading from file to file, and is able to be controlled by an external third party (the “bot-herder”)
a worm is designed to spread from computer to computer. A worm does not necessarily - Botnets: are collections of cap-tured computers used for malicious activities such as
need to be activated by a user or program in order for it to replicate itself. sending spam, participating in a DDoS attack, stealing information from computers,
● The Slammer worm is one of the most notorious. Slammer targeted a known and storing network traffic for later analysis. The number of botnets operating
vulnerability in Microsoft’s SQL Server database software and infected more worldwide is not known but is estimated to be well into the thousands, controlling
than 90% of vulnerable computers world-wide within 10 minutes of its release millions of computers.
on the Internet; crashed Bank of America cash machines, especially in the - Bots and bot networks are an important threat to the Internet and e-commerce
southwestern part of the United States; affected cash registers at because they can be used to launch very large-scale attacks using many different
supermarkets such as the Publix chain in Atlanta, where staff could not techniques.
dispense cash to frustrated buyers; and took down most Internet connections + Potentially unwanted programs (PUPs): program that installs itself on a computer,
in South Korea, causing a dip in the stock market there. typically without the user’s informed consent
● The Conficker worm, which first appeared in 2008, is the most significant - Browser parasites: (also sometimes referred to as a browser-setting hijacker) is a
worm since Slammer, and reportedly infected 11 million computers worldwide program that can monitor and change the settings of a user’s browser.
(Microsoft, 2015). Originally designed to establish a global botnet, a massive For instance, changing the browser’s home page, or sending information about the
industry effort has defeated this effort, but in 2017, Conficker was resurrected sites visited to a remote computer. Browser parasites are often a component of
by hackers to aid in infecting computers with WannaCry ransomware, adware
described below (SCmagazine.com, 2017). It is the most widely detected EX: In 2015, Lenovo faced a barrage of criticism when it became known that it had
malware on the Internet. been shipping its Windows laptops with Superfish adware preinstalled. Superfish
+ Ransomware: is a type of malware (often a worm) that locks your computer or files to stop injected its own shopping results into the com-puter’s browser when the user
you from accessing them. Ransomware will often display a notice that says an author-ity searched on Google, Amazon, or other websites. In the process, Superfish created a
such as the FBI, Department of Justice, or IRS has detected illegal activity on your security risk by enabling others on a Wi-Fi network to silently hijack the browser and
com-puter and demands that you pay a fine in order to unlock the computer and avoid collect anything typed into it.
prosecution. - Adware: is typically used to call for pop-up ads to display when the user visits
- CryptoLocker. certain sites. It is increasingly being used as a tool by cybercriminals.
- CryptoDefense - Spyware: a program used to obtain information such as a user’s keystrokes, e-mail,
- Cryptowall. instant messages, and so on
+ Trojan horses: appears to be benign, but then does something other than expected. The + Phishing: is any deceptive, online attempt by a third party to obtain confidential
Trojan horse is not itself a virus because it does not replicate, but is often a way for viruses information for financial gain. Phishing attacks typically do not involve malicious code but
or other malicious code such as bots or rootkits (a program whose aim is to subvert control instead rely on straightforward misrepresentation and fraud, so-called “social
of the computer’s operating system) to be introduced into a computer system. engi-neering” techniques.
75 76
- Social engineering (trang 421): Social engineering relies on human curiosity, greed, Along with several Russian co-conspirators, Gonzalez broke into the central computer
and gullibility in order to trick people into taking an action that will result in the systems of TJX, BJ’s, Barnes & Noble, and other companies, stealing over 160 million card
downloading of malware. numbers and costing these firms over $200 million in losses (Fox and Botelho, 2013)
Ex: Kevin Mitnick, until his capture and imprisonment in 1999, was one of America’s + SPOOFING, PHARMING, AND SPAM (JUNK) WEBSITES:
most wanted computer criminals. Mitnick used simple deceptive techniques to - Spoofing: involves attempting to hide a true identity by using someone else’s e-mail
obtain passwords, social security, and police records, all without the use of any or IP address
sophisticated technology (Mitnick, 2011). Ex: a spoofed e-mail will have a forged sender e-mail address designed to mislead
- E-mail scams (trang 421): The scam begins with an e-mail: a rich former oil minister the receiver about who sent the e-mail.
of Nigeria is seeking a bank account to stash millions of dollars for a short period of - Pharming: automatically redirecting a web link to an address different from the
time, and requests your bank account number where the money can be deposited. intended one, with the site masquerading as the intended destination. Links that
In return, you will receive a million dollars. This type of e-mail scam is popularly are designed to lead to one site can be reset to send users to a totally unrelated
known as a “Nigerian letter” scam. site—one that benefits the hacker
- Spear phishing (trang 422-423) - Spam (Junk): also referred to as “link farms”; promise to offer products or services,
- Identity fraud/theft: Any business activity that uses deceitful practices or devices to but in fact are just collections of advertisements.
deprive another of property or other rights. Ex: you may search for “[name of town] weather,” and then click on a link that
+ Hacking (trang 413) promises your local weather, but then discover that all the site does is display ads for
- Hackers vs. crackers: crackers. A hacker describes someone who gains unauthorized weather-related products or other websites.
access to a computer system. A cracker (also known as a black hat hacker) is a + Denial of service (DoS) attack and Distributed denial of service (DDoS) attack
malicious hacker with extensive computer experience who may be more damaging. - DoS: flooding a website with useless traffic to inundate and overwhelm the network
- Types of hackers: White, black, grey hats - DDoS: using numerous computers to attack the target network from numerous
+ white hats: “good” hackers who help organizations locate and fix security launch points
flaws + Sniffing and man-in-the-middle attacks:
+ black hats: hackers who act with the intention of causing harm - Sniffer: is a type of eavesdropping program that monitors information traveling over
+ grey hats: hackers who believe they are pursuing some greater good by a network.
breaking in and revealing system flaws - man-in-the-middle attacks: attack in which the attacker is able to intercept
- Hacktivism: adds a political twist. Hacktivists typically attack governments, communications between two parties who believe they are directly
organi-zations, and even individuals for political purposes, employing the tactics of communi-cating with one another, when in fact the attacker is controlling the
cybervandal-ism, distributed denial of service attacks, data thefts, and doxing communications
(gathering and exposing personal information of public figures, typically from + Insider attacks: Some of the largest disruptions to service, destruc-tion to sites, and
emails, social network posts, and other documents). diversion of customer credit data and personal information have come from
- Cybervandalism (trang 407): cyberwarfare or cyberwar refers to any action by a insiders—once trusted employees. Employees have access to privileged information, and,
nation, state, or international organization to penetrate another nation’s computer in the presence of sloppy internal security procedures, they are often able to roam
networks for the purpose of causing damage or disruption. However, broader throughout an organization’s systems without leaving a trace.
definitions claim that cyberwarfare also includes acts of “cyberhooliganism,” + Poorly designed software
cybervandalism, or cyberterrorism. + Social network security issues
+ Disrupting, defacing, destroying Web site. For example, in 2015, hackers attacked the + Mobile platform security issues
German Parliament’s computer network (Troinovski 2015). + Cloud security issues
According to Khanal (2016), the United States and Russia are on the brink of an open cyberwar. + Internet of things security issues
+ Credit card fraud/theft: In the past, the most common cause of credit card fraud was a
lost or stolen card that was used by someone else, followed by employee theft of customer 6. Legal aspects of EC security (Sách 2, Từ trang 305)
numbers and stolen identities (criminals applying for credit cards using false identities).
Today, the most fre-quent cause of stolen cards and card information is the systematic
hacking and looting of a corporate server where the information on millions of credit card
purchases is stored. For instance, in 2010, Albert Gonzalez was sentenced to 20 years in
prison for organizing one of the largest thefts of credit card numbers in American history.
77 78
CHAPTER 10. DIGITAL MARKETING
1. Overview (Slide Chap 10 - page 3,4)
- Internet marketing is the use of the Internet, mobile devices, social media, search engines,
and other channels to reach consumers.
- Why do we need an internet marketing strategy?
● It provides a consistent direction for online marketing activities
● It means analysis of the external environment, internal resources and capabilities will take
place
● Following it will help the company achieve competitive advantage
● The company can achieve its hierarchy of objectives
● Gives a focus to choice of target markets, positioning and the use of the marketing mix
● It helps us to understand which strategies and tactics should not be pursued
● Tells us how resources will be deployed and how the organization will be structured to
achieve the strategy.
2. Online marketing research and segmentation
2.1. Online marketing research and techniques (Book 1 - 371)
- To conduct online marketing, it is necessary to know what the customer wants or needs. Such
information can be collected by:
+ Soliciting information from customers online (e.g., via interviews, questionnaires, use of
focus groups, or blogging)
+ Observing what customers are doing on the Web by using transaction logs and cookies
+ Using data, text, and Web mining or collaborative filtering techniques to analyze the
available data
- Data Collection and Analysis: Specific methods for collecting online data include e-mail
communication with individual customers, questionnaires placed on websites, monitoring
conversations in social networks, and tracking customers’ movements on the Web.
- Online Surveys: An online survey is a major method for collecting EC data, and it is considered
the most cost-effective mode of survey research. It has several other advantages, including lower
overall preparation and administration costs, better control of the process of filling out the
questionnaire (which may lead to fewer response errors, and easier follow-up), and more flexibility
in the questionnaire design. In addition, the cycle time can be much shorter. However, online
surveys also have some limitations, including the lack of anonymity, data errors due to
7. E-contract nonresponses, reporting biases, and poor data privacy.
Này t tìm thấy e-signature thoi - Web-Based Surveys: A special type of online survey is done by placing questions on selected
8. EC security solutions (slide chap 9) websites and inviting potential consumers to reply.
- Protecting Internet communications -> For example, General Mills used a Web-based survey to help understand how consumers use
+ Cryptography Chex cereal. Web surveys may be passive (a fill-in questionnaire) or interactive (respondents
+ Encryption download the questionnaires, add comments, ask questions, and discuss issues). The surveys
- Securing channels of communication may include both approaches.
+ SSL, TLS, VPNs, Wi-Fi - Online Focus Groups: Several research firms create panels of qualified Web visitors to
- Protecting networks participate in online focus groups.
+ Firewalls, proxy servers, IDS, IPS -> For example, see NPD Group, Inc. This panel consists of 2 million consumers recruited online
- Protecting servers and clients and verified by telephone to provide information for NPD’s consumer tracking services. The use of
+ OS security, anti-virus preselected focus group participants helps to overcome some of the research limitations (e.g.,
79 80
small sample size and partial responses) that sometimes limit the effectiveness of Web-based user and his or her movements to a monitoring site (e.g., to find out if the user has viewed
surveys. certain content on the Web page). Many believe that cookies and Web bugs are an
- Hearing Directly from Customers: Instead of using focus groups, a company may ask invasion of a user’s privacy.
customers directly what they think about a product or service. Companies can use chat rooms, + Spyware: is software that enters your computer like a virus does, without your knowledge.
social network discussion groups, blogs, wikis, podcasts, and electronic consumer forums to It then enables an outsider to gather information about your browsing habits. Originally
interact with consumers. designed to allow freeware authors to make money on their products, spyware
-> For example, toymaker LEGO used a market research company to establish a direct survey on applications are typically bundled together with freeware that is downloaded onto users’
an electronic bulletin board where millions of visitors read each other’s comments and share computers. Many users do not realize that they are downloading spyware with the
opinions about LEGO toys. The researchers analyzed the responses daily and submitted the freeware. The best defense against spyware is to install antivirus software, which should
information to LEGO. detect and remove any viruses or other harmful intrusions.
+ Netflix is using this approach extensively by encourag- ing customers to report their likes + Web Analytics and Mining: Web analytics deal with the monitoring, collecting,
and dislikes. Software tools can facilitate obtaining input directly from customers. measuring and evaluating, and reporting tasks related to Internet data and activities (e.g.,
-> For example, see millwardbrowndigital.com, a leading provider of media analytics and see Kahn 2015 and Batrinca and Treleaven 2014). Web analytics help us understand and
marketing solutions. optimize Web usage. Such analysis is done, for example, by retailers for market research.
- Data Collection in Social Networks and Other Web 2.0 Environments: Collecting data in -> For example, see IBM Coremetrics. A company can also use Web analytics software to
social networks and Web 2.0 environments provides new and exciting opportunities. Here are improve its website’s look and operation. Web analytics can provide quick feedback from
some methods: Polling, Blogging, Chatting, Tweeting, Live chat, Chatterbots, Collective wisdom customers to help marketers decide which products to promote.
(intelligence), Find expertise, Folksonomy, Data in videos, photos, and other rich media, + Clickstream Analysis: Clickstream data are data that describe which websites users visit,
Discussion forums. in what order, and the time spent on each. This is done by tracking the succession of
-> Example: Xiaomi’s Data Collection from Social Media in China. Xiaomi, Inc. (mi.com/en) is a “clicks” each visitor makes. Clickstream analysis is a widely used component of overall web-
Chinese company that designs and sells smartphones and consumer electronics. It sold 18.7 site and e-commerce system analysis. It provides a detailed set of information about user
million smartphones in 2013, only three years after its launch. A key to its success story is the activities online, specifically how they respond to a website or e-commerce store. By
effective use of social media as a marketing research tool. Xiaomi engages fans on social media evaluating this data, site owners can get a better picture of their users’ aggregate interest
sites. For example, the company organized a flash sale in 2014, using social media to notify their and activity patterns. These patterns can help influence a variety of areas including website
fans about their upcoming sale. According to the company’s global director of marketing, social design, e-com- merce system design, and product/recommended product placement.
media is very important to Xiaomi, as it is the most direct and effective way to interact with its -> For example, Analytics 10 from Webtrends, Inc. features several advanced tools for
fans. The company analyzed user contributions on the Xiaomi website to design a user interface analyzing clickstream data. Finally, clickstreamr.com configures Google Analytics
called MIUI. Xiaomi’s success story shows the importance of market research on social media. By standards and can be used for such analysis.
November 2014, the Millet Forum (bbs.xiaomi.cn) had more than 221 million posts from its 30 + Web Mining: refers to the use of data mining techniques for both Web content and usage
million members. in Web documents in order to dis- cover patterns and hidden relationships. Web mining
- Observing Customers’ Movements Online: To avoid some of the problems of online surveys, has the potential to change the way we access and use the information available on the
especially the reporting bias that occurs when people give false or biased information, some Web.
marketers choose to learn about customers by observing their behavior rather than by asking 2.2. Market segmentation (Slide chap 5 - page 13, sau consumer touch point)
them questions. Keeping track of consumer’s online behavior can be done by using transaction - Online customer segmentation:
logs (log files) or cookie files. This allows activity-based filtering to be done. ● Types of customers:
+ Transaction Logs: (for Web applications) is a user file that records the user’s activities on a ➢ Impulsive customers: make purchases very quickly
company’s website from the computer log. A transaction log can be further analyzed with ➢ Customers are patient: buy products after comparison
log file analysis tools (e.g., from Oracle) to get a good idea about online visitors’ activities, ➢ Customer analysis: research very carefully and thoroughly before deciding intend to
such as how often they visit the site. purchase a product or service
+ Cookies and Web Bugs: can be used to supplement transaction log methods. Cookies ● Types of customers (divided by motivation and spending behavior):
allow a website to store data on the user’s personal device. When the customer returns to ➢ Customers save time: willing to accept high prices, or spend additional fees to save
a site visited previously, the website can find what the customer did in the past from the time when purchasing
cookie. The customer can be greeted by their name, or a targeted ad can be sent to them. ➢ Customers do not like to buy products in the traditional way
Cookies are frequently combined with Web bugs that are tiny (usually invisible) objects ➢ Customers prefer high technology
concealed in a Web page or in e-mail messages. Web bugs transmit information about the
81 82
➢ Customers only use the Internet to find product and operational information
traditional shopping
➢ Shoppers: like to compare prices & find goods to buy and sell there's a bargain
➢ Customers are loyal to the brand
➢ Customers shop online, pay online, communicate, play games, watch news...
- Market Segments:
Demographic Geographic Behavioral Psychographic
- Web Advertising (Book 1 - page 375): Advertising is the delivery of ads to Internet users in order
to influence people to buy a product or a service. Traditional advertising (also known as
83 84
marketing communication) is an impersonal, one-way mass communication. Telemarketing and + The synergy between TV and online advertising can help attract more attention than
direct mail ads attempted to overcome the deficiencies of mass advertising, but they were either medium on its own. It has been found that a TV campaign increases brand
expensive and their response rate was not too high. awareness by 27%, whereas a combined TV and online campaign increases it by 45%. A TV
-> For example, a direct mail campaign costs about $1 per person and has a response rate of only campaign increases intent to purchase by 2%, whereas a combined TV and online
1% to 3%. This makes the cost per responding person in the range of $20 (for a 5% response) to campaign increases it by 12%.
$100 for 1% response. Such an expense can be justified only for high-ticket items (e.g., cars). + The impact of Internet ads on newspaper viability is devastating. Many newspapers are
- Basic Internet Advertising Terminology (Book 1 - page 376/ Slide Chap 10 - page 52): disappearing, merging, or losing money. One solution is to increase their digital ads, as the
+ Ad views: The number of times users call up a page that has a banner on it during a New York Times is doing.
specific period; known as impressions or page views. + Internet ads are subject to limitations such as screen size, space, and policies.
+ Button: A small banner that is linked to a website; may contain downloadable software. - Online Advertising Methods (Book 1 - page 377/ Slide Chap 10 - page 56):
+ Page: An HTML (Hypertext Markup Language) document that may contain text, images, + Major Categories of Ads: Ads can be classified into three major categories: classified,
and other online elements, such as Java applets and multimedia files; may be generated display, and interactive.
statically or dynamically. ● Classified Ads: These ads usually use text, but lately may include photos. The ads are
+ Click (ad click): A count made each time a visitor clicks on an advertising banner to access grouped according to classification (e.g., cars, rentals). They are the least expensive.
the advertiser’s website. Classified ads can be found on special sites (e.g., see classified ads at craigslist.org
+ CPM (cost per mille, i.e., thousand impressions): The fee an advertiser pays for each 1,000 and backpage.com), as well as on online newspapers, e-markets, and portals. In
times a page with a banner ad is shown. many cases, posting regular-size classified ads is free, but placing them in a larger
+ Hit: A request for data from a Web page or file. size, in color, or with some other noticeable features is done for a fee.
● A request for data from a Web page or file ● Display Ads: These are illustrated advertisements that use graphics, logos, colors, or
● CPC (Cost per click) special designs. These ads are usually not classified, but they can be combined.
● CPA (Cost per action; ex of fill the registration form) Display ads are popular offline in billboards, yellow pages, and movies. They are
● CPO (Cost per order) becoming very popular on the Internet as well. All major search-based advertising
● Doanh thu (CPS) companies (e.g., Google, Yahoo!, Microsoft) are leverag- ing their online positions in
+ Conversion rate: The percentage of clickers who actually make a purchase. search advertising into the display ad business.
+ Landing page: The page a viewer is directed to after having clicked on a link. In online ● Interactive Ads: These ads use online or offline interactive media to interact with
marketing, this page is used to convert the person from a viewer to a buyer. consumers and to promote products, brands, and services. This is most commonly
+ Click-through rate/ratio (CTR): The percentage of visitors who are exposed to a banner ad performed through the Internet, often using video as a delivery medium. There are
and click on it. several variations in each of these categories. The major methods are presented
+ Visit: A series of requests during one navigation of a website; a pause of a certain length of next.
time ends a visit. - Banners (Book 1 - page 378/ Slide Chap 10 - page 56): A banner is a display that is used for
+ Unique visit: A count of the number of visitors entering a site, regardless of how many advertising on a Web page (words, logos, etc. embedded in the page). A banner ad is frequently
pages are viewed per visit. linked to an advertiser’s Web page. When users “click” on the banner, they are transferred to the
+ Stickiness: Characteristics that influence the average length of time a visitor stays in a site. advertiser’s site. A banner must be designed to catch a consumer’s attention. Banners often
- Advertising Online and Its Advantages (Book 1 - page 377/ Slide Chap 10 - page 55): include images and sometimes video clips and sound. Banner advertising, including pop-up
+ Cost: Online ads usually are cheaper than ads in traditional media. banners, is a popular advertising method on the Web.
+ Media richness: Web ads can include rich and diversified media (e.g., videos, animation). In + Random banners: appear randomly, not as a result of some action by the user. Companies
addition, ads can be combined with games and entertainment. that want to introduce their new products (e.g., a new movie or CD) or promote their brand
+ Easy updating: Updating can be done quickly and inexpensively. using random banners.
+ Personalization. Web ads can be either one-to-one or addressed to population segments. + Static banners: stay on a Web page regularly.
+ Location-based: Using wireless technology and GPS, Web advertising can be location + Pop-up banners: appear in a separate window when its affiliated Web page is activated.
based. + Live banners: are ads where the content can be created or modified at the time the ads
+ Linking to shopping: It is easy to link from an online ad to a vendor’s webstore. Usually, it pop up instead of being prepro- grammed like banner ads. They usually are rich media.
can be done in one click. + Keyword banners: Banner ads that appear when a predetermined word is queried from a
- Traditional Versus Online Advertising (Book 1 - page 377): search engine.
+ Each advertising medium, including the Internet, has its advantages and limitations. - Online Advertising Methods (Slide Chap 10 - page 57):
85 86
+ Pop-up ad: An ad that appears in a separate window before, after, or during Internet
surfing or when reading email
+ Pop-under ad: An ad that appears underneath the current browser window, so when the
user closes the active window the ad is still on the screen
+ Email marketing: refers to the use of e-mails for sending commercial messages to users.
Email marketing may occur in different formats and for different purposes. Typical email
marketing formats are:
● Using e-mail advertising means that ads are attached to emails
● Sending e-mail messages for facilitating vendor-customer relationships (CRM types)
● Sending e-mail messages for attempting to acquire new customers
● Sending messages via microblogs or other social media platforms
+ Email advertising: Adding advertisements to e-mail messages sent to customers
● The Major Advantages and Limitations of E-Mail Advertisement
● Implementing E-Mail Advertising
+ Search advertising: A method of placing online advertisements on Web pages that show
results from search engine queries
● URL Listing
+ Advergaming: The practice of using computer games to advertise a product, an
● Keyword Advertising
organization, or a viewpoint.
● Search engine optimization (SEO): The craft of increasing site rank on search
+ Augmented reality (AR): A live direct or indirect view of a physical, real-world environment
engines; the optimizer uses the ranking algorithm of the search engine (which may
whose elements are augmented by computer-generated sensory input, such as sound or
be different for different search engines) and best search phrases, and tailors the ad
graphics.
accordingly.
+ Advertising in Chat Rooms and Forums: Chat rooms can be used for advertising. For
+ Video Advertising: Consumer-Generated Videos: Many companies are utilizing
example, Mattel Corp. sells about one-third of its Barbie dolls to collectors. These collectors
user-generated videos for their online ads and even for their TV commercials. YouTube is
use chat rooms to make comments or ask questions that are subsequently answered by
the largest advertising platform for video ads. It has billions of videos and is growing
Mattel’s staff. The Xiaomi case in this chapter runs a smartphone forum for its product
rapidly. YouTube permits selected marketers to upload videos with ads to the site. Google’s
design and advertising. Advertisers sometimes use online fantasy sports (e.g., available at
AdSense ad distribution network also offers supported video clips. Another way for
Yahoo!, ESPN, and more) to send ads to specific sports fans (e.g., fans of the National
advertisers to use viral video is by creating contests.
Football League or Major League Baseball). Online fantasy sports attract millions of visitors
+ Interactive Videos:
every month.
● Video Click-Throughs: VideoClix.tv and Clickthrough.com have developed tools that
+ Mobile marketing: is frequently defined as the use of mobile devices and wireless
allow people who watch videos to click on any person, place, banner ad, and so forth
infrastructure as a means of marketing and advertising. The marketer intends to access
in the video.
potential customers through wireless information channels.
● Live Interactive Videos: In live interactive videos, you can see certain events in real
● The Mobile Marketing Association (mmaglobal.com) provides definitions of
time and sometimes interact with those in the video. For example, GE presented the
advertising, apps, messaging, m-commerce, and CRM on all mobile devices,
company’s annual report in a banner ad during a live Webcast of its annual
including smartphones and tablets.
meeting. Viewers were able to interact with the presenters, asking questions or
● Mobile marketing includes sales, market research, customer service, and
making comments.
advertising, all supported by mobile computing. Companies can devise contests
● Viral Videos: A viral video is a video that is spread rapidly through the process of
where customers describe the quality of a new product, and the sellers can post
online information sharing. These videos become popu- lar when they are circulated
coupons and promotions. You can make ads interactive since mobile computing
via email, SMSs, blogs, discussion forums, and so forth. This way, people share videos
provides a direct link between vendors and consumers.
that receive more attention, sometimes drawing millions of viewers in a short time.
+ Mobile advertising (m-advertising): is defined by the IAB (2016) as “Advertising tailored to
Popular sites that are used for sharing viral videos include YouTube and Vimeo.
and delivered through wireless mobile devices such as smartphones (e.g. Blackberry,
iPhone, Android, etc.), feature phones (e.g. lower-end mobile phones capable of accessing
mobile content), and media tablets (e.g. iPad, Samsung Galaxy Tablet, etc.).” Mobile
advertising ranges from simple text messaging to intelligent interactive messaging on
87 88
mobile devices. It involves several key players, such as the advertisers, mobile ad networks, banner to read it, and after he or she passes some tests to assure they read the content,
mobile apps, and mobile devices. the customer is paid for the effort. Readers can sort and choose what they read, and the
● Mobile Interactive Advertising advertisers can vary the payments to reflect the frequency and enthusiasm of the readers.
● Types of Mobile Ads Payments may be cash, credit, or product discounts. This method is used with
● Viral Mobile Marketing smartphones, too.
● Mobile Marketing and Advertising Campaigns (Fig ở Book 1 - P393)
● Representative Examples of Mobile Advertising
(Fig ở Book 1 - P388)
89 90
Commerce and Sales Data Management
● Retail, Proximity & IOT ● Marketing Analytics ● Agile & Lean Management
● Affiliate Marketing & Performance & Attribution ● Collaboration
Management ● Audience/Marketing Data & ● Talent Management
● Sales Automation Data Enhancement ● Budgeting & Finance
Enablement & ● Ipaas Cloud/Data Integration ● Projects & Workflow
Intelligence & Tag Management ● Product Management
● eCommerce Platforms ● Business/Customer ● Vendor Analysis &
& Carts Intelligence & Data Science Management
● eCommerce ● DMP
Marketing ● Dashboards & Data
● Channel Partner & Visualization
Local Marketing ● Governance Compliance
And Privacy
● Mobile & Web Analytics
● Customer Data Platform
91 92