Skip to main content

The success of I-Way is based on market strategies. Discuss.

The success of I-Way is based on market strategies.

An e-marketing strategy consists of the various steps taken and the procedures followed for marketing a brand through the web. The website of a company is the most important thing in an e-marketing to which web users are to be attracted for increasing sales of any product and services provided by that company. But, before that website should be in a proper design and format. It should be attractive so that it has a good impression on buyers.

There are few E-marketing services which should be easily followed by a marketer.

  • Search Engine Marketing: A survey shows that around 90% of Americans use internet daily. Search engine optimization (SEO) is a procedure through which we can attract internet users to our website. With the help of SEO we can promote our website in the top position and gain traffic. This is called search engine marketing.
  • E-mail marketing: Email-marketing is also a important component of E-marketing which is all about marketing our product and services to customers through E-mail. For business generation, it proved as the most important tool.
  • Online Advertising: Online advertising is one of the useful marketing method that definitely gives you a big ROI (Return on Investment) value. Through online advertising, we place our product's advertisements on the good ranked websites or the website having good traffic. The good example of online marketing is Affiliate marketing in which you pay your product advertiser according to the sales of our product.

There are many other E-marketing strategies like press release, RSS feed and blogging etc.


Popular posts from this blog

What is the responsibility of business towards society? Why is social responsibility at a low pitch in India?

Responsibility of business towards society
A society consists of individuals, groups, organizations, families etc. They all are the members of the society. They interact with each other and are also dependent on each other in almost all activities. Thus, it has certain responsibilities towards society, which may be as follows:
to help the weaker and backward sections of the societyto preserve and promote social and cultural valuesto generate employmentto protect the environmentto conserve natural resources and wildlifeto promote sports and cultureto provide assistance in the field of developmental research on education, medical science, technology etc.
In other words, the responsibility of business towards society are:
Protection of environment.Better living conditions like housing, transport, canteen, crèches etc.Promotion of sports and culture.Opportunity for better career prospectsRegular supply of goods and servicesProper working conditions and welfare amenitiesGoods and services at…

Explain the meaning, relevance and features of the Competition Act, 2002.

In 1969 Govt. has passed an act and it had given the name monopoly and restrictive trade practices (MRTP). It became popular with the name of MRTP 1969. This act has many provisions to control the monopoly and to promote the competition. It has defined RTP and also explained the powers of MRTP commission. But its scope was very narrow and Govt. of India has made new act called competition act 2002. On the place of MRTP ACT 1969 after this MRTP act 1969 was fully repealed.

Explanation of Competition Act 2002
Competition Act 2002 states that Indian traders must not do any activity for promoting monopoly. If they will do any activity in the form of production, distribution, price fixation for increasing monopoly and this will be against this act and will be void. This act is very helpful for increasing good competition in Indian economy.

Under this act following are restricted practice and these practices are stopped by this act.
Price fixing: If two or more supplier fixes the same price…

How is data and message security ensured in e-business?

The data and message security ensured in e-business via:

Encryption: This technology deploys a public key and a private key infrastructure to ensure security. The public key can be distributed but the private key remains only with the user and the service provider. So, it works just like the username and password system of your e-mail account.Digital signatures: This technology requires a recipient’s password to decode the encrypted data. The sender’s authentication gets confirmed through a digital certificate, issued by credible authorities such as Verisign and Thawte.Secure socket layers (SSL): This process involves both public key and digital certificate technologies to ensure privacy and authentication. To initiate the process, a client asks for authentication from the server, which is done through a digital certificate. Then, both the client and server design session keys for data transfer. The session will expire following any modification or prolonged period of inactivity.Firewa…