Introduction To DM
Introduction To DM
In the marketing literature, there are widely used mnemonics, which aim to act as an
aide-memoire for the macro-environmental forces, e.g. PEST, SLEPT and PESTLE, where
each letter represents a slightly different arrangement of the following macro forces:
● Political forces
● Economic forces
● Social forces
● Technological forces
● Legal forces
● Environmental forces
Changes in technology which influence marketing opportunities; create new product
Technological Forces development opportunities; introduce new ways to access target markets through
channel integration; create new forms of access platforms and applications.
cultural diversity among digital communities, which influences use of the Internet and
Social Forces
the services businesses provide online.
determine the methods by which products can be promoted and sold online. Laws and
Legal Forces ethical guidelines that seek to safeguard individuals’ rights to privacy and businesses’ to
free trade.
An indication of the challenge of assessing the macro-environment factors is presented
in Figure 3.1. This figure of the ‘waves of change’ shows how fluctuations in the
characteristics of different aspects of the environment vary at different rates through
time.
The rate of environment change
Strategic agility , a concept strongly associated with knowledge management theory and based on
developing a sound process for reviewing marketplace opportunities and threats and then
selecting the appropriate strategy options.
Strategic agility is important for digital marketers to understand and they should con-
sider how to ensure:
Web server
Used to store the web pages accessed by web browsers. They may also contain databases of
customer or product information, which can be queried and retrieved using a browser.
Web browser
Browsers such as Google Chrome, Mozilla Firefox, Apple Safari and Microsoft Internet Explorer
provide an easy method of accessing and viewing information stored as HTML web documents on
different web servers.
Streaming media server
A specialist server used to broadcast audio (e.g. podcasts) or video (e.g. IPTV or
webcast
presentations). Served streams can be unicast (a separate copy of stream is served for
each recipient), multicast (recipients share streams) or peer-to-peer.
CSS
(Cascading
Used to style web pages, separating content from design
Style elements.
Sheets)
Text information and data – XML (eXtensible
Markup Language)
Metadata Literally, data about data – a format describing the structure and
content of data.
Intranets Extranets
A network within a single Formed by extending the
company that enables access to intranet beyond a company to
company information using the customers, suppliers,
familiar tools of the Internet such collaborators or even
as email and web browsers. Only competitors. This is again
staff within the company can password-protected to prevent
access the intranet, which will be access by general Internet users
password-protected
The relationship between intranets,
extranets and the internet text editor
Web Application frameworks and
Application servers
Web Application Framework Application Servers
A standard programming Software processes
framework based on which is accessed by a
reusable library functions standard programming
for creating dynamic interface (API) of a web
websites through a application framework to
programming language. serve dynamic website
functionality in response
to requests received from
browser
Digital Security
Why Digital Security Matters?
Data • Risk: Credit card details stolen during transmission using packet sniffing software
Interception • Impact: Financial loss and identity theft
Server • Risk: Customer credit card details stolen from merchant’s server through hacking
Hacking • Impact: Large-scale data breaches
Identity • Risk: Merchants or customers are not who they claim to be, leading to fraudulent transactions
Fraud • Impact: Financial loss and reputational damage
The main website security risks
1. Validation of input and output data
2. Direct data access (and theft)
3. Data poisoning
4. Malicious file execution
5. Authentication and session management
6. System architecture and configuration
7. Phishing
8. Denial of service
9. System information leakage
10. Error handling
Approaches to developing secure system
1. Digital certificates
• Secret-key or symmetric encryption involves both parties having an identical (shared)
key known only to them. Only this key can be used to encrypt and decrypt messages.
Asymmetric encryption
2. Digital signatures
Digital signatures can be used to create commercial systems by using public-key encryption to achieve
authentication: the merchant and purchaser can prove they are genuine.
2. Easily Access
QR Codes
Quick Response code A two-dimensional matrix bar code. These are a popular type of two-
dimensional code used for direct response.
• Easily scan by Mobile
• Opportunities for integrating customers
• Using as promotional initiatives
Wi-Fi
• High speed local area network
• No need for cabling
• Potential to access through large area like airports and
shopping centers
Bluetooth
Wireless standard for transformation of data with a potential for different local
marketing as,
• Viral communication
• Local activity
• Location based service , like getting electric coupon while passing through a
store
Emerging Technology
New devices Increasing Users
• Internet TV or IPTV
• Radio and television apps available on internet With improvement of technology people are being
• Devices being improved with high internet more connected to it . Internet access has been
speed connected so deeply to their lives.
Slope of enlightenment :
Technology trigger :The first Although the press may have
phase of a hype cycle , where stopped covering the technology
product launch or other event that Trough of
some businesses continue
generates significant press and disillusionment :
through the ‘slope of
interest. Technologies
enlightenment’ and experiment to
enter the ‘trough
understand the benefits
of disillusionment’
because they fail
to meet Plateau of productivity :
Peak of inflated expectations: In expectations and Technology becomes increasingly
this phase, a frenzy of publicity quickly become stable and evolves in second and
typically generates over- unfashionable. third generations. The final height
enthusiasm and unrealistic of the plateau varies according to
expectations. whether the technology is broadly
applicable or benefits only a niche
market
Economic Forces
Globally economic influences affect the level of success of
business. Economic forces affect supply and demand and
consequently it is important for digital markets to identify
which economic influences they need to monitor. Classic
economic factors such as growth and unemployment, interest
and exchange rates can affect every aspect of business activity
and are equally pertinent to offline and online businesses.
International market growth and emerging economies – for
example central and eastern European markets and the BRIC
economies – also have the potential to influence digital
marketing activities.
Market Growth and Employment
According to Varley (2001), ‘Modern societies are organized around
consumption and so the trends in patterns of consumption that
emerge over time are very important for marketers to observe and
understand.’ The impact of changes in demand can have far- reaching
implications for digital marketing initiatives as this will affect the
strength of market growth, so it is important to anticipate demand.
Sophisticated technology enables companies to analyze purchasing
patterns and forecast future demand. But this is only part of the
picture of consumption that drives modern global economies. It is also
important to monitor changes to trends (which affect market growth)
in order to be able to make realistic predictions about how consumers
and companies are going to behave in the future.
Market Growth and Employment
Demographics is the study of populations, which uses measurable variables to
monitor and analyze population trends. Demographic variables include:
● age profiles
● birth rates
● education levels
● gender
● household structures
● life stage (e.g. single, married, divorced)
● total income and expenditure
● working patterns and occupations
International Market Growth and Emerging Economies
Globalization
The increase of international trading and shared social and cultural values. A major
driver of Internet adoption by commercial organizations is the opportunity for market
expansion in domestic and international markets .
Economic Disruption
Gorell’s observations are that in order to be able to manage in periods of economic
change business leaders should focus on developing the ability to:
1. Anticipate and act on market uncertainty and unmet customer needs by applying a
focused business model.
2. Focus on innovations and how they can deliver value to the company’s business model.
3. Expect opportunities to emerge from uncertainty and develop strategies which can
maximize any emerging market advantage (Gorell, 2011).
Economic Disruption
The world’s best-performing companies are adept at spotting opportunities in times
of economic disruption but, according to Gorell (2011): ‘By adoption of their best
practices, almost any company can learn to out-compete their rivals by creating new
products, finding white-space markets and imagining new business models even in the
toughest of times. However, in order to achieve success companies should:
● focus on improving opportunities and innovations which already exist within the
business;
● be selective about which innovations are likely to bring early gains and carefully
manage company resources – innovations which require limited resources can be very
useful in challenging economic times;
● involve everyone in the company in working towards a common goal.
Political forces
The political environment is shaped by the interplay
of government agencies, public opinion and
consumer pressure groups and industry-backed
organizations such as TRUSTe ( www.truste.org ).
Interaction between these organizations helps to
create a trading environment with established
regulations. The political environment has many
factors which influence the trading environment,
such as taxation, investment and management of
business and public affairs.
Political Forces
● It is important for digital marketers to be aware that political action enacted through government
agencies to control the adoption of the Internet includes:
● promoting the benefits of adopting the Internet for consumers and business to improve a country’s
economic prosperity;
● sponsoring research leading to dissemination of best practice among companies, for example the
DTI international benchmarking survey;
● enacting legislation to regulate the environment, for example to protect privacy or control taxation;
● involvement in setting up international bodies to coordinate the Internet, such as ICANN (the
Internet Corporation for Assigned Names and Numbers, www.icann.com ), which has introduced
new domains such as .biz and .info .
E- government
The use of Internet technologies to provide government services to citizens.
Political Control and Democracy
Government action that can have a significant impact on the online marketplace is control of
intermediaries. This depends on the amount of regulation in a given country and in individual markets.
Taking the UK as example, regulation of different marketplaces occurs through these groups:
Financial Services Authority – controls providers of banking products such as current accounts,
savings and loans.
Ofcom – controls providers of mobile phone and broadband services.
Internet Governance
Control of the operation and use of the Internet.
Taxation
How to change tax laws to reflect globalization through the Internet is a problem that
many governments are grappling with. The fear is that the Internet may cause
significant reductions in tax revenues to national or local governments if existing laws do
not cover changes in purchasing patterns.
Tax Jurisdiction
Tax jurisdiction determines which country gets the tax income from a transaction. Under
the current system of international tax treaties, the right to tax is divided between the
country where the enterprise that receives the income is resident (‘residence’ country)
and that from which the enterprise derives that income (‘source’ country).
Legal Forces
Laws develop in order to provide a framework of control and
regulations that aim to enable individuals and businesses to go
about their business in a legal and ethical manner. How-ever,
laws are open to interpretation and there are many legal and
ethical considerations in the online trading environments.
1. Fairly and lawfully processed : Personal data shall be processed fairly and lawfully and, in
particular, shall not be processed unless at least one of the conditions in Schedule 2 is met; and in the case of
sensitive personal data, at least one of the conditions in Schedule 3 is also met. This requires:
• appointment of a data controller who is the person with defined responsibility for data protection within a
company;
• clear details in communications such as on a website or direct mail of how a data subject can contact the
data controller or a representative;
• before data processing, 'the data subject has given his consent' or the processing must be necessary
either for a 'contract to which the data subject is a party
• sensitive personal data requires particular care,
• no other laws must be broken in processing the data.
2. Process for limited purpose :
Personal data shall be obtained only for one or more specified and lawful purposes, and
shall not be further processed in any manner incompatible with that purpose or those
important issues are:
• Whether future communications will be sent to the individual (explicit consent is required for this in
online channels; this is clarified by the related Privacy and Electronic Communications Regulation Act
which is referred to below);
• Whether the data will be passed on to third parties (again explicit consent is required);
• How long the data will be kept.
3. Adequate, relevant and not excessive :
Personal data shall be adequate, relevant and not excessive in relation to the purpose or
purposes for which they are processed.
4. Accurate :
Personal data shall be accurate and, where necessary, kept up to date.
5. Not kept longer than necessary :
Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that
purpose or those purposes. The guidelines state: To comply with this principle, data controllers will need to
review their personal data regularly and to delete the information which is no longer required for their purposes
6. Processed in accordance with the data subject's rights :
Personal data shall be processed in accordance with the rights of data subjects under this Act.
7. Secure :
Appropriate technical and organizational measures shall be taken against unauthorized or unlawful
processing of personal data and against accidental loss or destruction of, or damage to, personal data.
Laws have been enacted in different countries to protect individual privacy and with the intention of
reducing s
pam or unsolicited commercial email (UCE).
Pay-per-click: Pay-per-click search marketing refers to when a company pays for text ads to be displayed Of the search
results pages when a specific key phrase is entered by the search page users.
Country of origin principle- The contract formed between a buyer and a seller on a website will
be subject to the laws of a particular country. In Europe, many such laws are specified at the regional
(European Union) level, but are interpreted differently in different countries.
Distance Selling Laws - Distance selling laws have taken some time to be updated to reflect online trading,
particularly of digital products. For example, new EU rules on consumer rights initially kind 4. These change
protect consumers were intended to:
Social exclusion
The social impact of the Internet has also concerned many commentators because the Internet has the
potential effect of accentuating differences in quality of life, both within a society in a single country and
between different nations, essentially creating 'information haves' and 'information have-nots'. Social
exclusion is a part of society is excluded from the facilities available to the remainder.
Governments should focus on three aspects of e-inclusion:
1. The access divide (or 'early digital divide'), which considers the gap between those with and those without
access. Governments will encourage competition to reduce costs and give a wider choice of access through
different platforms
2. The usage divide ('primary digital divide'), concentrating on those who have access but are non-users.
Governments promote learning of basic Internet skills through ICT courses to those with the highest risks of
disengagement.
3. The divide stemming from quality of use (secondary digital divide'), focusing on differentials in participation
rates of those people who have access and are users. Training can also be used to reduce this divide.7
Cultural Forces
The local language and culture of a country or region can dramatically affect the requirements
of users of a web service.