Unit IV
Client Server Network Security, Encrypted documents and E-mail, Architectural frames work for E-Commerce - WWW as architecture, hypertext publishing, Electronic Data Interchange (EDI), Information based marketing, advertising on the Internet.
CLIENT-SERVER
NETWORK SECURITY
Network security on the
Internet is a major concern for commercial organizations, especially top
management. By connecting to the Internet, a local network organization may be
exposing itself to the entire population on the Internet. Internet connection
effectively breaches the physical security perimeter of the corporate network
and opens itself to access from other networks comprising the public Internet.
Organizations must pay
attention to security. For many commercial operations, security will simply be
a matter of making sure that existing system features, such as passwords and
privileges, are configured properly. They need to audit all access to the
network. A system that records all log on attempts – the unsuccessful ones –
can alert managers. Hackers can use password guessing, password trapping,
security holes in programs, or common network access procedures to impersonate
users and thus pose a threat to the server.
Client Server network
security problems manifest themselves to three ways:
Physical security holes
result when individuals gain unauthorized physical access to a computer. A good
example would be a public workstation room, where it would be easy for a
wandering hacker to reboot a machine into single user mode and tamper with the
files. Hackers gain access to network systems by guessing password of various
users.
Software security holes
result when badly written programs or “privileged” software are “compromised”
into doing things they shouldn’t. The most famous example of this category is
that “send mail” hole, which brought the Internet top its knees in 1988. A more
recent problem was the “rlogin” hole in the IBM RS-6000 workstations which
enabled a cracker to create a “root” shell or super user access mode. It could
be used to delete the entire file system, or create a new account or password
file resulting in incalculable damage.
Inconsistent usage holes
result when a system administrator assembles a combination of hardware and
software such that the system is seriously flawed from a security point of
view. The incompatibility of attempting two unconnected but useful things
creates the security hole. Problems like this are difficult to isolate. So it
is better to carefully build the system with them in mind. This type of problem
is becoming common as software becomes more complex.
Over the years, several
protection methods have been developed, including trust based security,
security through obscurity, password schemes and biometric systems.
1. Trust Based Security:
Quite simply, trust based
security means to trust everyone and do nothing extra for protection. It is
possible not to provide access restrictions of any kind and to assume that all
users are trustworthy and competent in their use of the shared network. This
approach worked in the past, when the system administrator had to worry about a
limited threat. Today, this is no longer the case.
2. Security through Obscurity
Most organization in the
mainframe era practiced a philosophy known as security through obscurity (STO)
– the notion that any network can be secure as long as nobody outside its
management group is allowed to find out anything about its operational details
and users are provided information on a need to know basis. Hiding account
passwords in binary files or scripts with the presumption that “nobody will
ever find them”.
This method was quite
successful with stand alone systems. But the users are free to move around the
file system, have a great understanding of programming techniques, and have
immense computing power at their fingertips. Then STO becomes less effective
and make this method of security useless.
3. Password Schemes
One straightforward security
solution, a password scheme, erects a first level barrier to accidental
instruction. In actuality, however, password scheme do little about deliberate
attack, especially when common words or proper names are selected as passwords.
The simplest method used by most hackers is dictionary comparison – comparing a
list of encrypted user passwords against a dictionary of encrypted common
words.
To counter these threats,
various approaches have been suggested for creating one time passwords,
including smart cards, randomized tokens, and generate a token that a computer
system can recognize – the token is derived from a cryptographic function of
the clock time and some initialization information, and a personal
identification number (PIN) is required to complete the authentication process.
4. Biometric Systems
Biometric systems, the most
secure level of authorization, involve some unique aspect of the person’s body.
Past biometric authentication was based on comparisons of fingerprints, palm
prints, retinal patterns, or on signature verification or voice recognition.
Biometric systems are very expensive to implement.
Biometric
device variations are appearing, such as system that recognize keyboard typing
patterns or read infrared facial patterns from passersby using only a simple
video camera for image capture.
ENCRYPTED DOCUMENTS AND ELECTORNIC MAIL
E-mail users who desire
confidentiality and sender authentication are using encryption. Encryption is
simply indeed to keep personal thoughts personal. E-mail is typically encrypted
for the reason that all network correspondence is open for eavesdropping.
Internet e-mail is obviously far less secure than the postal system, where envelopes
protect correspondence from casual snooping.
E-mail software is
increasingly incorporating specific options that simplify encryption and
decryption. Examination of encrypted information is nontrivial each file must
be decrypted even before it can be examined.
There are two schemes for
e-mail encryption that are being deployed on the Internet.
1. Privacy
Enhanced Mail Standard
PEM is the Internet Privacy
Enhanced Mail standard, designed, proposed but not yet officially adopted, by
the Internet Activities Board to provide secure electronic mail over the
Internet. PEM includes encryption, authentication, and key management, and
allows use of both public key and secret key cryptosystems. The system supports
multiple cryptographic tool: for each mail message, the specific encryption
algorithm, digital signature algorithm, hash function, and so on are specified
in the header.
Trusted Information Systems,
Inc. has developed a free non-commercial implementation of PEM, and other
implementations should soon be available as well. RIPEM, a program developed by
Mark Riordan, enables secure Internet e-mail; it provides both encryption and
digital signatures, using RSA and DES routines from RSAREF. It does not fully
support certificates.
2. Pretty
Good Privacy (PGP)
Pretty Good Privacy (PGP) is
a implementation of public key cryptography based on RSA. It is a free software
package developed by Philip Zimmerman that encrypts e-mail. Since being
published in the US as freeware in June 1991, PGP has spread rapidly and has
since become the de facto worldwide standard for encryption of e-mail.
PGP provides secure
encryption of documents and data tiles that even advanced supercomputers are
hard pressed to “crack”. For authentication PGP employs the RSA public key encryption
scheme and the MDS developed by Rivest, a one-way hash function to form a
digital signature that assures the receiver that an incoming message is
authentic.
ARCHITECTURAL
FRAMESWORK FOR ELECTRONIC COMMERCE
The software framework
necessary for building electronic commerce applications is little understood in
existing literature. In general, a framework is intended to define and create
tools that integrate the information found in today’s closed systems and allows
the development of e-commerce applications. It is important to understand that
the aim of the architectural frame-work itself is not to build new database
management systems, data repository, computer languages, software agent based
transaction monitors, or communication protocols rather, the architecture
should focus on synthesizing the diverse resources already in place
incorporations to facilitate the integration of data and software for better
applications. The electronic commerce application architecture consists of six
layers of functionality, or services: (1) Applications; (2) Brokerage services,
data or transaction management; (3) Interface, and; support layers” (4) Secure
messaging, security and electronic document Interchange; (5) Middle ware and
structured document interchange; and (6) Network infrastructure and basic
communications services.
Application services |
Customer-to- business, Business-to-business,
Intra- organizational |
Brokerage and data
management |
Order processing-mail order
houses, Payment schemes- electronic cash, Clearing House or Virtual mail |
Interface layer |
Interactive catalogues, Directory
support functions, Software agents |
Secure messaging |
Secure hypertext transfer
protocol Encrypted e-mail, EDI Remote programming (RPC) |
Middle ware services |
Structured documents (SCML,
HTML) Compound documents (OLE, OpenDocs) |
Network infrastructure |
Wireless - cellular, radio,
PCs Wire line– POTS, coaxial, fiber optic |
These layers cooperate to
provide a seamless transition between today’s computing resources and those of
tomorrow by transparently integrating information access and exchange within
the context of the chosen application.
Electronic Commerce Application Services
Three distinct classes of electronic
commerce application can be distinguished: customer to business,
business-to-business, and intra organization.
Consumer-to-Business Transactions
This category is also known
as marketplace transaction. In a marketplace transaction customers learn about
products differently through electronic publishing, buy them differently using
electronic cash and secure payment systems, and have them delivered
differently. In light of this, the organization itself has to adapt to a world
where the traditional concepts of brand differentiation no longer hold-where
“quality” has a new meaning, where “content” may not be equated to “product,”
where “distribution” may not automatically mean “physical transport”.
Business-to Business Transactions
This category is known as
market-link transaction. Here, businesses, governments, and other organizations
depend on computer-to-computer communication as a fast, an economical, and a
dependable way to conduct business transactions. Business-to-business
transactions include the use of EDI and electronic mail for purchasing goods
and services, buying information and consulting services, submitting requests
for proposals, and receiving proposals. Each year the trading partners exchange
millions of invoices, checks, purchase orders, financial reports, and other
transactions.
The current manual process of
printing, mailing is costly, time consuming, and error-prone. Given this
situation and faced with the need to reduce costs, small businesses are looking
toward electronic commerce as a possible savior.
Intra-organizational Transactions
This category is known as
market-driven transactions. A company becomes market driven by dispersing
throughout the firm information about its customers and competitors; by
spreading strategic and tactical decision making so that all units can
participate; and by continuously monitoring their customer commitment by making
improved customer satisfaction an ongoing objective. To maintain the
relationships that are critical to delivering superior customer value,
management must pay close attention to service, both before and after sales. In
essence, a market-driven business develops a comprehensive understanding of its
customers business and how customers in the immediate and downstream markets
perceive value.
Three major components of market-driven transactions
are
Customer orientation through product and
service
Customization; cross-functional
coordination through enterprise Integration; and advertising, marketing, and
customer service
Information Brokerage and Management
The information brokerage and
management layer provides service integration through the notion of information
brokerages, the development of which is necessitated by the increasing
information resource fragmentation. The notion of information brokerage is used
to represent an intermediary who provides service integration between customers
and information providers, given some constraint such as a low price, fast
service, or profit maximization for a client. Information brokers, for example,
are rapidly becoming necessary in dealing with the voluminous amounts of
information on the networks. As on-line databases migrate to consumer
information utilities, consumers and information professionals will have to
keep up with the knowledge, and owner-ship of all these systems. With all the
complexity associated with large numbers of on-line databases and service
bureaus, if it is impossible to expect humans to do the searching. It will have
to be software programs information brokers or software agents, to use the more
popular term-that act on the searcher’s behalf.
Information brokerage does
more than just searching. It addresses the issue of adding value to the
information that is retrieved. For instance, in foreign exchange trading,
information is retrieved about the latest currency exchange rates in order to
hedge currency holdings to minimize risk and maximize profit.
Another aspect of the
brokerage function is the support for data management and traditional
transaction services. Brokerages may provide tools to accomplish more
sophisticated, time-delayed updates or future compensating transactions. These
tools include software agents, distributed query generator, the distributed
transaction generator, and the declarative resource constraint base which
describes a business’s rules and environment information. Software agents are
mobile programs that have been called “healthy viruses”, “digital butlers” and
“intelligent agents”. Agents are encapsulations of users’ instruction that
perform all kinds of tasks in electronic marketplaces spread across networks. Information
brokerages dispatch agents capable of information resource gathering,
negotiating deals, and performing transactions.
Interface and Support Services
The third layer, interface
and support services will provide interfaces for electronic commerce
applications such as interactive catalogues and will sup-port directory
services-functions necessary for information search and access. These two
concepts are very different. Interactive catalogs are the customized interface
to consumer applications such as home shopping. An interactive catalog is an
extension of the paper-based catalog and incorporates additional features such
as sophisticated graphics and video to make the advertising more attractive.
Directories, on the other hand, operate behind the scenes and attempt to
organize the enormous amount of information and transactions
generated to facilitate electronic commerce. Directory services databases make
data from any server appear as a local file. In the case of electronic
commerce, directories would play an important role in information management
functions.
Secure Messaging and Structured Document
Interchange Services
In Integrated Messaging: a
group of computer services that through the use of a network send, receive, and
combine messages, faxes, and large data files. Some better-known examples are
electronic mail, enhanced fax, and electronic data interchange. Broadly
defined, messaging is the software that sits between the network infrastructure
and the clients or electronic commerce applications, masking the peculiarities
of the environment. Others define messaging as a frame-work for the total
implementation of portable applications, divorcing you from the architectural
primitives of your system. In general, messaging products are not applications
that solve problems; they are more enablers of the applications that solve
problems. Messaging services offer solutions for communicating non formatted
(unstructured) data-letters, memos, reports as weft as formatted (structured)
data such as purchase orders, shipping notices, and invoices. Unstructured
messaging consists of fax, e-mail, and form-based systems like Lotus Notes
Middleware Services
Middleware is a relatively
new concept that emerged only recently. Users in the 1970s, when vendors,
delivered homogeneous over the years, there developed the need to solve all the
interface, translation, transformation, and interpretation problems that were
driving application developers crazy. As the cry for distributed computing
spread, users demanded interaction between dissimilar systems, networks that
permitted shared resources and applications that could be accessed by multiple
software programs. Middleware is the ultimate mediator between diverse software
programs that enables them talk to one another. Another reason for middleware
is the computing shift from application centric to data centric i.e. remote
data controls all of the applications in the network instead of applications
controlling data.
WORLD WIDE WEB
(WWW) AS THE ARCHITECTURE
Web provides the
functionality necessary for electronic commerce. Electronic commerce depends on
the unspoken assumption that computers cooperate efficiently for seamless
information sharing.
The web community of
developers and users is tackling the complex problems. The web began in March
1989, when Tim Berners-Lee of the European Laboratory for particle
Physics
proposed the web project for research collaboration. Information sharing has
been a goal of CERN, whose members are located in a number of European
countries, for many years.
The initial proposal outline
a simple system of using networked hypertext to quickly disseminate documents
among colleagues. There was no intention of supporting sound, video, or images
in this proposal. By the end of 1990, an implementation of the web was placed
on a NEXT machine at CERN. The software had the capability to edit documents on
the screen using a very primitive line mode browser.
Hundreds of people throughout
the world have contributed by writing and modifying web software and documents.
The project reached global proportions by the middle of 1993 with the
introduction of the NCSA Mosaic – a multimedia front end to all the information
served by the web.
The web architecture is made up of three
primary entities: client browser, web
server and third party services. The client browser usually interacts with the
www server, which acts as an intermediary in the interaction with third party
services.
The client browser resides on
the user’s PC or workstation and provides an interface to the various types of
content. For instance, if the user retrieves a graphics file from a web server,
the browser automatically starts up the graphics files are available – JPEG,
GIF, TIFF, BMO, among others. The browser has to be smart to understand what
file it is downloading and what browser extension it needs to activate to
display the file.
Web server functions can be
categorized into information retrieval, data and transaction management, and
security. The third-party services could be other web servers that make up the
digital library, information processing tools, and electronic payment systems.
HYPERTEXT
PUBLISHING
Hyper Media on the Internet
(called distributed or global hypermedia) has accelerated sharply following the
success of the web and browsers such as the NCSA Mosaic. This success has been
aided by more powerful workstations, high resolution graphics displays, faster
network communications, and decreased cost for large online storage.
Hypertext versus Hypermedia
Hypertext is an approach to
information management in which data are stored in a network of documents
connected by links. These links represent relationships between nodes. A
hypermedia system is made of nodes (documents) and links (pointers). A node
usually represents a single concept or idea. Nodes can contain text, graphics,
animation, audio, video, images or programs. The nodes, and in some systems the
network itself, are meant to be viewed through an interactive browser and
manipulated through a structure editor.
Nodes are connected to other
nodes by links. The node from which a link originates is called the reference
or anchor, and the node at which a link ends is called the referent. The
movement between nodes is made possible by activating links, which connect
related concepts or nodes. In the web, links are not types. Links can be either
referential or hierarchical. Hypertext is a very simple concept based on the
association of nodes through links.
Hypermedia contains links not
only to other pieces of text but also to other forms of media – sounds, images,
and movies. Images themselves can selected to link to sounds or documents. In
short, hypermedia combines qualities of hypertext and multimedia.
Benefits of Hypermedia Documents
Hypermedia documents are much
more flexible than conventional documents. For example, one can read a
hypermedia article just as one reads a conventional newspaper article. However,
once also read the sections in different order depending on what captures the
reader’s interest.
Hypermedia documents are also
convenient. Hypermedia documents offer sound, video sequences, animation, even
computer programs that execute when the links are selected.
Hypermedia links and nodes
can change dynamically. Information in individual nodes can be uploaded, new
nodes can be linked into overall hypermedia structure, and new links can be
added to show new relationships.
Hypermedia
systems are taking off as a new class of document authoring and management
systems.
These systems allows people
to create, annotate, link together, and share information from a variety of
media such as text, graphics, audio, video, animation, and programs.
ELECTRONIC DATA
INTERCHANGE (EDI)
EDI can be used to
electronically transmit documents such as purchase orders, invoices, shipping
notices, receiving advices, and other standard business correspondence between
trading partners. EDI can also be used to transmit financial information and
payments in electronic form. When used for affecting payments, EDI is usually referred
to as Financial EDI and Electronic Funds Transfer (EFT).
As the EDI is fast, accurate,
& economical in handling business document, more and more companies are
adopting this method to increase the efficiency of the organization. It is the
paperless exchange of information by using E-mail, Electronic Bulletin Boards,
Electronic Fund Transfer & other similar technologies. It is also known as
“Paperless Trading”.
Electronic data interchange
is the electronic transfer from one computer to another computer processable
data using an agreed standard to structure the data.
BENEFITS OF EDI
Computers have speeded up the
production of invoices, purchase orders, etc. When these documents are produced
by high-speed printers, however, they must still be detached, inserted, and
mailed; copies must also be filed by the originating organization. Originals
must be physically transported to the addressee, opened, carried to the
appropriate individual within the addressee organization, and processed, which
usually entails keying of the data into an MIS system, manually.
The use of EDI eliminates
many of the problems associated with traditional information flow, which are
mentioned below.
EDI helps organization by automatically
processing information.
EDI reduces associated
expenses of storage, printing, postage, mailing and recycling EDI minimizes
data entry errors, improves accounts payable/receivable times as processes
become streamlined and can be used for forecasting.
Your business cycle is
improved and stock levels are kept constantly up to date and visible.
EDI
transfer ensures real-time processing and eliminates times associated with
manually sending, receiving and entering orders.
EDI reduces the time it takes
your staff to manually create invoices and process purchase orders.
EDI eliminates paper trails
and ensures paper usage is kept to a minimum.
Another advantage in the use
of EDI is that it generates a functional acknowledgement whenever an EDI
message is received, and it is electronically transmitted to the sender. This acknowledgement
states that the message is received.
It is most suited in areas
where any of the following characteristics exists.
A large volume of repetitive standard
actions.
Very light operating margins.
Strong competition requiring
significant productivity improvement.
Operational time constraint.
Trading partners request for
paperless exchange of documents.
LIMITATIONS OF
EDI
Cost of Implementation: It is true that EDI provides massive cost savings
benefits but for small businesses re-designing and implementing software
applications to fit in EDI into current applications can be quite costly. Such
limitations of EDI must be considered if you plan on implementing such system.
Electronic System Safety: EDI also necessitates substantial investment in
computer networks and security systems for maximum security. Any EDI system
installed would require protection from hacking, malware, viruses, and other
cyber security threats.
Preliminary Setup Consumes Time: Not only is the implementation of EDI system
expensive to install, but it also consumes a considerable amount of time to set
up the essential parts. Thus, such limitations of EDI can hinder fast-tracking
of services if urgently required.
Several Standards to maintain: Numerous businesses looking to implement EDI also
consider the several standards involved. These limitations of EDI do not allow
small businesses to exchange data with larger establishments that make use of
latest edition of a document standard. Some known measures include ANSI ASC
X12, GS1 EDI, HL7, TRADACOMS, and UN/EDIFACT.
Suitable Backup System: EDI implementation also requires regular maintenance
as the business functionality is highly dependent on it. Some robust data
backup system is needed in case of system crash or for statistical purpose.
Such limitations of EDI can cost some substantial amount to implement.
THE NEW AGE OF
INFORMATION-BASED MARKETING
Interactive marketing brought
on by electronic commerce will change the roles of small business, retailers,
manufacturers, and media companies.
Retailers versus Manufacturers
The role of Retailers and
manufacturers are fast reversing in electronic commerce. Now days, retailers
have an advantage over manufacturers because they can measure customer response
and get first crack at the broadest range of information. Indeed, point-of-sale
(POS) scanning systems have played a major role in shifting power from
manufacturers to retailers, as large innovators like Wal-Mart have amply
proven.
Information based marketing
can offer manufacturers and retailers a means to do market research and
customer prospecting; to establish branch loyalty, market presence, and
distribute redeemable coupons; and to create customized product bundles.
Retailer’s vs Manufacturers have the
following methods:
Market research and customer prospecting
Market presence method
Product or services building
method
Information-based products
pricing and priority method
Target and Micro Marketing:
Electronic commerce,
technology has put target and micromarketing within the research of small
business. It gives information to the micro marketers not only about its own
business but also consumer’s information. Consumer target is two-way flow of
communication between seller and buyer. Direct mail and telemarketing are two
fast growing ways to micro market. Technology is an essential tool in
micromarketing. There are two main types of micro marketing:
Direct-relationship
micromarketing is aimed at stimulating sales at retail establishments through
direct contacts with consumers.
Direct - order micromarketing
is focused on selling products directl y to consumers in their homes or
businesses.
Small Business versus Large Business:
The key distinction between
small and large business remains access to national and international marketing
for advertising purposes.
Regulatory and Legal implications of
Cyberspace Marketing:
Today, exorbitant advertising
cost represents the barrier to reaching the customer effectively. Internet and
other networks plays good role in advertising. The major difference between the
internet and other I-way advertising media are ownership and membership fees.
Due to the empowering effect of internet-facilitated advertising however, the
balance of power between large and small companies may change in future
Internet advertising has been
around since 1994, but things have changed quite a bit in the last quarter
century. From simple banner ads to pop ups, to now video production ads.
Internet advertising provides businesses with billions of opportunities to
reach target customers via computer and now mobile phones.
Internet Advertising
Channels: Search, Social and Display
Internet advertising can
split into three categories: search, social and display.
Paid Search:
Search advertising, also
known as paid search and search engine marketing (SEM), are online ads that
appear in search engine results on platforms like Google AdWords or Bing Ads.
So, whenever a person uses a
major search engine to look up a certain product, search advertisements are the
ones that will be appear in the top areas of your Google or Bing search.
For example, if I wanted to
buy a dog bed for my French bulldog Nigel, I could Google “dog bed” and get the
results
As you can see, paid search
advertising is solely focused on intent-based results! You are marketing with
the intent to buy!
This is a great way to
advertise because you’re giving the potential customer products and services
they want! This leads to high conversion rates and value.
So how do you pay for search
advertising?
Paid search advertising uses
a pay-per-click (PPC) advertising model, which means that every time your ad is
clicked you pay the search engine for that traffic.
Paid Social
Social advertising or paid
social ads are advertisements that appear on social media platforms. Social
media platforms like Twitter, Facebook and Instagram are paid to promote a
business through boosted posts, offers and promotions.
Social ads help you target
potential customers by personal, professional, demographic and behavioral
parameters which allow you to reach the people who are most relevant instead of
buyer intent!
An example of this would be a
“sponsored” Facebook post that is used to increase the post’s presence or an
Instagram advertisement:
Using paid social
advertisements, you are able to use effective targeting, call to action
buttons, useful tracking and analytics to see fast results in relevant
platforms everyone uses daily!
Display ads are the ad boxes
that are on the tops or sides of a website. They can be traditional banner ads
or even videos. These types of ads appear on sections reserved for paid
advertising and are aimed at generating call to action.
For example, many news
websites are full of video ads and clickable banner ads that are even that much
more aggressive making you watch five seconds of a video before you can get
into the content you came for.
Display advertisements are
effective as they have a wide spread across millions of websites reached by
Google’s Display Networks. These search engines share your ads to websites and
apps based on keywords targeting preferences.
Online Advertising: Campaign Elements
There is much more to online
advertising than simply placing an ad on the Internet and hoping for the best.
The most effective advertising campaigns combine numerous interconnected
elements, all of which perform unique functions to maximize the campaign’s
potential. Not every online advertising campaign will have every element, but
the following components of a digital marketing initiative will be common to
many campaigns.
Text and Visual Ads
Google AdWords and Bing Ads
offer advertisers the choice of either text-based ads or more visual
advertisements, such as banners. Text-based ads are often referred to simply as
PPC ads, whereas banners and similar ad formats are commonly referred to as
display ads. In addition, social media platforms such as Facebook offer highly
visual advertising formats that include some ad copy, which can be thought of
as a combination of both. There are dozens of advertising formats available to
today’s advertisers, allowing you to choose the format and advertising network
that best suits the needs of your campaigns.
Landing Pages
Landing pages are
specialized, optimized web pages that visitors are taken to upon clicking an
ad. Landing pages can feature specific products featured in the advertisements
themselves, or they may include prompts for users to provide the advertiser
with more information, such as web forms. Landing pages can be used to convince
prospects to complete an action, such as making a purchase, or function as
another step in a longer “funnel,” such as requesting additional information or
downloading a piece of content for lead generation purposes.
Call Tracking
To many advertisers, phone calls
are the most valuable source of leads. For this reason, advertisers can choose
to track phone calls generated from online advertising campaigns.
WordStream Advisor, our comprehensive PPC and paid social management platform,
offers fully integrated call tracking functionality, allowing you to determine
the precise ad and keyword that prompted a prospective customer to call your
business.
Sponsored Content
Many advertisers choose to
utilize sponsored content as an element of their online advertising campaigns.
Sponsored content can take many forms, from advertorial-style editorial content
featured on websites (commonly known as native advertising), to sponsored
updates on social media platforms. Both Facebook and Twitter offer advertisers
this feature, with both platforms boasting a wide range of sponsored update
options, such as Facebook’s Promoted Posts and Twitter’s Sponsored Tweets.
Analytics
Advertisers do not simply
publish ads to the web and hope for the best – they must know exactly how well
their ads are performing, and from where their traffic is coming. This is why
analytics is a crucial component of any online advertising strategy. Analytics
tools such as those found within WordStream Advisor offer a wealth of
information about an advertising campaign, from impression share and
click-through rate to cost-per-conversion and trends over time. Analytics tools
are also invaluable in determining how consumers discover and ultimately interact
with your website, a process known as attribution modeling.
Email Marketing
Email marketing is one of the
most common elements in an online advertising campaign. Some advertisers launch
email-only campaigns to highlight time-specific offers or content downloads,
whereas others use email to complement their other digital marketing channels.
Email marketing can be highly effective, making it a popular choice for today’s
advertisers.
Remarketing
Consumers rarely discover a
website and decide to make a purchase immediately. The customer journey can be
lengthy and complex, and take place across multiple devices and websites over
prolonged periods of time. For this reason, remarketing has become one of the
most important tools in a digital marketer’s toolbox. Remarketing allows you to
track users who have visited your website – but failed to convert or take
action – once they leave your site, and serve ads to them on other websites.
This not only significantly increases brand awareness, but also provides numerous
further opportunities for the user to revisit your website and convert at a
later time. Remarketing can be enabled on search and display campaigns, as well
as social advertising initiatives.
No comments:
Post a Comment