Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.2
Learning outcomes
Summarize approaches for analyzing requirements for e-business systems Identify key elements of approaches to improve the interface design and security design of e-commerce systems.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.3
Management issues
What are the critical success factors for analysis and design of e-business systems? What is the balance between requirements for usable and secure systems and the costs of designing them in this manner? What are the best approaches for incorporating new IS solutions with legacy systems into the architectural design of the e-business?
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.4
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.5
Workflow management
Workflow is the automation of a business process, in whole or part during which documents, information or tasks are passed from one participant to another for action, according to a set of procedural rules. Examples: Booking a holiday Handling a customer complaint Receiving a customer order.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.6
BizFlow
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.7
Process modelling
Often use a hierarchical method of establishing
the
processes and their constituent sub-processes the dependencies between processes the inputs (resources) needed by the processes and the outputs.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.8
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.1
Slide 11.10
Process dependencies
Summarize the order in which activity occur according to the business rules Data flow diagrams and flow charts are widely used as diagramming techniques
Flow
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.2
Figure 11.3
Flow process chart showing the main operations performed by users when working using workflow software
Table 11.5
Figure 11.4
Slide 11.15
Data modelling
Uses well established techniques used for relational database design Stages:
1. 2. 3.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.5
Slide 11.17
Identify entities
Entities define the broad groupings of information such as information about different people, transactions or products. Examples include customer, employee, sales orders, purchase orders. When the design is implemented each design will form a database table. Entity A grouping of related data, example customer entity. Implementation as table. Database table Each database comprises several tables.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.18
Identify attributes
Entities have different properties known as attributes that describe the characteristics of any single instance of an entity. For example, the customer entity has attributes such as name, phone number and e-mail address. When the design is implemented each attribute will form a field, and the collection of fields for one instance of the entity such as a particular customer will form a record. Attribute A property or characteristic of an entity, implementation as field. Field Attributes of products, example date of birth. Record A collection of fields for one instance of an entity, example Customer Smith.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.19
Identify relationships
The relationships between entities requires identification of which fields are used to link the tables. For example, for each order a customer places we need to know which customer has placed the order and which product they have ordered. As is evident from Figure 11.5, the fields customer id and product id are used to relate the order information between the three tables. The fields that are used to relate tables are referred to as key fields. A primary key is used to uniquely identify each instance of an entity and a secondary key is used to link to a primary key in another table. Relationship Describes how different tables are linked. Primary key The field that uniquely identifies each record in a table. Secondary key A field that is used to link tables, by linking to a primary key in another table.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.20
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.6
Slide 11.22
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.7
Slide 11.24
User-centred design
Unless a web site meets the needs of the intended users it will not meet the needs of the organization providing the web site. Web site development should be user-centred, evaluating the evolving design against user requirements. (Bevan, 1999a)
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.25
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.26
Usability
An approach to web-site design intended to enable the completion of user tasks Involves two key project activities:
Expert
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.27
4.
Identify different audiences. Rank importance of each to business. List the three most important information needs of audience. Ask representatives of each audience type to develop their own wishlists.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.28
Use-case analysis
The use-case method of process analysis and modelling was developed in the early 1990s as part of the development of object-oriented techniques. It is part of a methodology known as Unified Modelling Language (UML) that attempts to unify the approaches that preceded it such as the Booch, OMT and Objectory notations. Use-case modelling A user-centred approach to modelling system requirements. Unified Modelling Language (UML) A language used to specify, visualize and document the artefacts of an objectoriented system.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.29
Benefits of personas
Fostering customer centricity Identifies detailed information needs and steps Test existing web-site design To compare and test the strength and clarity of communication Can be linked to marketing
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.30
Developing a persona
1. 2.
3.
Build personal attributes into personas Remember that personas are only models of characteristics and environment Different scenarios can be developed for each persona
Info-seeking scenario Purchase scenario
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.31
Identify actors.
Actors are typically application users such as customers and employers also other systems
2.
Identify use-cases.
The sequence of transactions between an actor and a system that support the activities of the actor
3.
4.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.8
Relationship between actors and use-cases for The B2C Company, sellside e-commerce site
Figure 11.9
Slide 11.34
Use-case starts when customer presses register Customer enters name, postal address and email The post/zip code will be checked for validity The customer will select submit The system will check all fields are present A redirect page will be displayed to thank the customer.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.10
Primary scenario for the Register use-cases for The B2C Company
Figure 11.11
Slide 11.37
process of arranging a way of organizing objects on the web site the relationship between pages and other content components way of illustrating the layout of an individual page
Blueprints
Shows
Wireframes
A
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Site structure diagram (blueprint) showing layout and relationship between pages
Figure 11.12
Figure 11.13
Slide 11.40
Support the brand Fits audiences information needs Clear, simple, consistent Clear, simple, consistent Engaging and relevant.
Site organization
Site navigation
Page design
Content
Slide 11.41
Principle 1: Standards
Users spend most of their time on other sites. This means that users prefer your site to work the same way as all the other sites they already know Think Yahoo and Amazon. Think "shopping cart" and the silly little icon. Think blue text links.
Slide 11.42
Acquisition of new or existing customers Retention gain repeat visitors Extension cross and up-selling
Communicate the online value proposition Establish credibility Convert customer to action.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.43
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.44
Customer orientation
Web users are notoriously fickle They take one look at a home page and leave after a few seconds if they can't figure it out The abundance of choice and the ease of going elsewhere puts a huge premium on making it extremely easy to enter a site.
Nielsen www.useit.com
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.45
Dell.com
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.14
Different types of audience for the web site of The B2B Company
Slide 11.47
www.usability.serco.com
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.48
Site personality
How
would you describe the site if it were a person? E.g. Formal, Fun, Engaging, Entertaining, Professional
Site style
Information
Are personality and style consistent with brand and customer orientation?
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.49
(d) (c)
Back
DTI Cisco
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.50
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.15
(a) Narrow and deep and (b) broad and shallow organization schemes
Slide 11.52
Navigation (Continued)
Enter by:
To:
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.53
4.
5.
Exposure can it be seen? Attention does it grab? Comprehension and perception is message understood? Yielding and acceptance : It is credible and believable? Retention is the message and experience remembered?
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.54
Web accessibility
Number of visually impaired people Number of users of less popular browsers or variation in screen display resolution More visitors from natural listings of search engines Legal requirements http://www.w3.org/TR/WCAG10/
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.55
Priority levels
Priority 1 (Level A)
Web
developer must satisfy this checkpoints developer should satisfy this checkpoints developer may address this checkpoints
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.56
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.16
Slide 11.58
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.17
Source: DTI (2006) Department of Trade and Industry Information Security Breaches Survey. Executive Summary 2006
Slide 11.60
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.18
Source: Code Red (CRv2) Spread Animation. Copyright 2001 The Regents of the University of California www-cse.ucsd.edu/~savage/ papers/IEEESP03.pdf
Slide 11.62
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.19
Source: DTI (2006) Department of Trade and Industry Information Security Breaches Survey
Figure 11.20
Figure 11.21
Source: DTI (2006) Department of Trade and Industry Information Security Breaches Survey
Slide 11.66
E-mail management
To minimize the volume
Spam Internal
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.22
Slide 11.68
Minimizing spam
1. 2. 3. 4. 5. 6. 7.
Avoid harvesting of addresses Educate staff not to reply to spam Use filters Use peer-to-peer blocking services Use blacklist services Use whitelist services Ensure anti-virus software and blocking is effective
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.23
Slide 11.70
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Slide 11.71
Security Attacks
Hacking Phishing Denial-of-service attacks
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition Marketing Insights Ltd 2007
Figure 11.24