Social and Mobile Marketing and Business 1)Research, 2)Analysis & 3)Planning. 1,700-2,000 Words

https://online.cdu.edu.au/bbcswebdav/pid-4561247-dt-content-rid-31702107_2/courses/BUS303_Sem1_2023/02%20-%20Learning%20Materials/Week04/autoPresentation/story_html5.html

https://online.cdu.edu.au/bbcswebdav/pid-4561254-dt-content-rid-31909089_2/courses/BUS303_Sem1_2023/02%20-%20Learning%20Materials/Week05/AutoPresentation/story_html5.html

https://online.cdu.edu.au/bbcswebdav/pid-4561261-dt-content-rid-32408979_2/courses/BUS303_Sem1_2023/02%20-%20Learning%20Materials/Week06/autoPresentation/story_html5.html

https://www.mckinsey.com/capabilities/growth-marketing-and-sales/our-insights/the-big-reset-data-driven-marketing-in-the-next-normal?cid=other-eml-alt-mip-mck&hdpid=0121ad4c-e8c4-4e3f-aa8b-63f6403ba4e1&hctky=12678911&hlkid=f23a70e6b8574f72b041a89a02383a1b

https://www.broadbandsearch.net/blog/internet-statistics

What is Cybercrime?
What are the functions of the European Cybercrime Centre?
What is cybercrime-as-a-service, and how can it be combatted?
What Government department is responsible for monitoring and reporting on cybercrime in Australia?
List and describe the current eCommerce Security issues.
Is it possible to have a 100% guaranteed secure eCommerce system? (justify you answer)
To identify a targeted level of security what might you consider and why?
List and describe the six key dimensions to e-commerce security.
Discuss the issues and tensions related to implementing very high security mechanisms on an eCommerce site and social values?
What are the key point of vulnerability in the physical and software eCommerce environment?
List and describe the most common and damaging forms of security threats to eCommerce consumers and site operators?
Describe encryption.
Describe SSL/TLS.
What is a VPN and how does it work?
How might you protect networks?
Do operating system have features to help with security (discuss)?
The development and implementation of a security plan will be paramount to the security of your eCommerce site, describe the major feature of a security plan and its implementation?
Search the Web and see if you can identify Australian Laws that might help the tracking and policing of eCommerce criminals (explain what you have found)?
List and describe the most common forms of eCommerce payment systems?
List the five parties involved in an online credit card purchase.
Describe how you might go about setting your eCommerce site up to accept Credit card purchases.
Describe how an online credit card transaction works.
Discuss the difference between Digital Cash and Virtual Currency.

What is a business model and how is it used to guide a business to success?
Describe and discuss the key elements of a business model?
How does a business plan relate to a business model?
Why is capital so important to a start-up?
List as many sources of capital as you can?
Why is crowdfunding problematic to and what is changing to improve the situation?
List and describe the main B2C eCommerce Business Models?
Discuss how revenue models relate to the business model.List and describe the main B2C eCommerce Business Models?
Describe what a Private Network is.Can eCommerce change industry structures and if so how?
What is a Value Chain?
What is a Value Chain Analysis and how is it used to inform Management?
What are Firm Value Webs and how can they improve value chain efficiency?
What are business strategies and how are they used to promote success?
Describe and discuss the five generic strategies that might be used to realise profit?
What are Disruptive Technologies and what are the four general stages of the disruption process?

Discuss the growth rates of eCommerce consumer relative to different regions and stages of development.
Discuss the usage statistics for different demographics groups and why it is important to know.
Do any of your potential customers NOT use broadband, if so why is this important to your marketing?
Is price the only thing you might consider when marketing your product or service (discuss)?
Why is it important to understand the Five stages in the consumer decision making process?
Do online marketing activities have anything to do with offline sales (discuss)?
Are “Big Ticket” items often bought online (discuss)?
Describe eCommerce shoppers and why their habits might be important.
Describe and discuss the two most important customer factors in generating online sales?
What are the key difference between online and offline marketing techniques?
Discuss multi-channel marketing and its importance.
Which part of your marketing plan should you focus on first?
What should the firms Web site be used for?
Describe and discuss some important marketing and advertising tools you might use to attract eCommerce customers.
What are the pros and cons of email marketing and how might you go about conducting an email campaign?
Describe Affiliate, Viral and Lead generating marketing.
What is social marketing and why do you thin it is so effective?
Is multi channel marketing effective, support your argument?
Is customer retention important and why?
Do all customer’s want the cheapest price (discuss)?
Describe the demand curve and why it is important.
How do web transaction logs, cookies and databases relate to eCommerce marketing?
What is Big Data and what are some of its advantages and disadvantages?
You have just launched an online marketing campaign, how might you go about measuring its success?
Discuss CPC and CPA.

Introduction:
Social and mobile marketing are among the most popular marketing strategies today. They provide businesses with an opportunity to reach out to potential customers through social media platforms, mobile applications, and other online channels. However, before businesses can engage in social and mobile marketing, they need to conduct research, analysis, and planning. This essay will discuss various aspects of social and mobile marketing and business, including cybercrime, e-commerce security, business models, strategies, and marketing techniques.

Cybercrime
Cybercrime refers to criminal activities that are committed using the internet or other online platforms. The European Cybercrime Centre (EC3) is a unit within Europol that is responsible for combatting cybercrime across Europe. Cybercrime-as-a-service (CaaS) is a criminal business model that involves providing criminal tools and services to other criminals. It can be combatted through international cooperation and collaboration between law enforcement agencies, cybersecurity experts, and other stakeholders. In Australia, the Australian Cyber Security Centre (ACSC) is responsible for monitoring and reporting on cybercrime.

E-commerce Security
E-commerce security refers to measures that are put in place to protect online transactions and data from unauthorized access, theft, and other cyber threats. Current e-commerce security issues include phishing, identity theft, hacking, malware, and payment fraud. It is not possible to have a 100% guaranteed secure e-commerce system, but businesses can implement various security measures to reduce the risk of cyber attacks. To identify a targeted level of security, businesses need to consider various factors such as the nature of their business, the types of data they handle, and the level of risk they are willing to accept.

The six key dimensions of e-commerce security are confidentiality, integrity, availability, non-repudiation, authenticity, and accountability. However, implementing very high-security mechanisms on an e-commerce site can create issues and tensions related to social values such as privacy, freedom, and transparency.

The key points of vulnerability in the physical and software e-commerce environment include unsecured networks, unpatched software, weak passwords, and social engineering. The most common and damaging forms of security threats to e-commerce consumers and site operators include phishing, malware, hacking, and payment fraud.

Encryption is a method of encoding data so that it can only be accessed by authorized parties. SSL/TLS is a protocol that is used to secure online communications and transactions by encrypting data between a web server and a web browser. A virtual private network (VPN) is a secure connection between two or more devices or networks that allows them to communicate privately over a public network.

Operating systems have various features that can help with security such as firewalls, antivirus software, and encryption tools.

The development and implementation of a security plan is paramount to the security of an e-commerce site. A security plan should include policies, procedures, and guidelines for security management, risk assessment, data protection, incident response, and employee training.

Business Models and Strategies
A business model is a framework that describes how a business creates, delivers, and captures value for its stakeholders. It is used to guide a business to success by providing a clear and concise plan for generating revenue and profits. The key elements of a business model include the value proposition, customer segments, channels, customer relationships, revenue streams, key resources, key activities, key partnerships, and cost structure.
A business plan is a detailed document that outlines a business’s goals, strategies, and tactics for achieving them. It relates to the business model by providing a roadmap for how the business will execute its plan and achieve its objectives.

Capital is crucial to a start-up because it provides the necessary resources to launch and grow the business. Sources of capital include personal savings, friends and family, angel investors, venture capitalists, crowdfunding, and government grants
Introduction: Start with a brief background of the topic, highlight the main problem, research questions, and objectives.

Literature Review: Analyze and critically review existing literature on the topic. Compare and contrast different viewpoints and approaches to the problem.

Methodology: Describe the research design, data collection, and analysis techniques used in the study. Justify the choice of the methodology.

Results: Present the main findings and summarize the data collected. Use tables, charts, and graphs to support the results.

Discussion: Interpret the results and link them to the research questions and objectives. Discuss the implications of the study and identify limitations.

Conclusion: Sum up the key points of the study, restate the research questions, and offer recommendations for further research.

References: List all sources cited in the paper according to the Harvard referencing style.

Here are four scholarly references from 2015-2023 that you can use:

Yang, L., Wang, S., & Zhang, Y. (2018). The influence of social media on consumer behavior: An empirical study of factors affecting purchase intention. Journal of Retailing and Consumer Services, 43, 48-57.

Kim, J., & Ko, E. (2019). The effect of brand personality and brand credibility on consumer purchase intention: A study of food products in South Korea. Journal of Foodservice Business Research, 22(3), 221-237.

Hsieh, C. M., Chang, J. C., & Hung, Y. C. (2017). Investigating the factors that influence purchase intention of green products among young consumers in Taiwan. Journal of Cleaner Production, 161, 1052-1064.

Hamari, J., Sjöklint, M., & Ukkonen, A. (2016). The sharing economy: Why people participate in collaborative consumption. Journal of the Association for Information Science and Technology, 67(9), 2047-2059.

Published by
Study Bay
View all posts