SlideShare a Scribd company logo
1 of 4
WEB 435 Entire Course: Phoenix University:
New Updated Course
Click this link to get the tutorial:
http://homeworkfox.com/questions/computer-
science/2392/web-435-entire-course-phoenix-university-new-
updated-course/
WEB 435 Week 1 DQ 1

Based on the Gariffo (2010) article, how has Adobe leveraged its 2005 acquisition of
Macromedia to expand its portfolio, which include development tools, such as the ColdFusion,
Dreamweaver, Flash, and Flex technologies to provide a development stack for building
commercial websites?

WEB 435 Week 1 DQ 2

A successful security policy requires the support of senior management. Should management
also be involved in the development of a web security policy?

WEB 435 Week 2 Individual Assignment Web Security Issues Paper

Prepare a 2-3 page paper discussing methods to address client (user) security issues. Include
ways that a website can be attacked by malicious users such as:

Java script insertion

SQL insertion

Hidden field manipulation

Header manipulation

Cookies

Precautions:

How can worms and viruses be introduced to a website?

What is the most common method to ensure client security?

WEB 435 Week 2 DQ 1
Based on the Keston (2010) article, why are the leading search players aggressively revising
their privacy policies to better protect user data?

WEB 435 Week 2 DQ 2

Why are security and privacy issues the main reasons for not building online customer trust?
What can businesses do to enhance online trust?

WEB 435 Week 3 Individual Assignment Authentication and Authorizations Paper

XYZ Company has contracted you to secure an Apache server or Microsoft Internet Information
Server (IIS). Explain how you would secure the server and describe the system settings that you
would employ for the server.

Write a 2-3 page paper in which you discuss methods to address this scenario. Be sure to
include:

Methods for authentication

Methods for authorization

WEB 435 Week 3 DQ 1

Based on the O’Kennon (2010) article, how will CDNs, which are now offering products that
take advantage of ESI (edge side includes) dynamically, create content at the edge of the
network?

WEB 435 Week 3 DQ 2

Based on the Keston (2010) article, why is the idea of using semantic technology on the web
only recently begun gaining traction?

WEB 435 Week 4 Individual Assignment Homepage Organization Paper

Write a 1-2 page paper that discusses the homepage organization of a Web site. Be sure to
communicate the purpose of the site immediately and clearly and explain the following:

· The e-cycle of Internet marketing (the 4 P’s of marketing: price, promotion, product, and
place)

· The role of e-CRM (How is this different from traditional methods?)

· Micro customization

What is the value of implementing each of these?
· Include how e-CRM has changed traditional customer relations

· How does a company’s micro customization process (infrastructure) influence these processes?

· How does the concept of micro customization enhance e-CRM and Internet marketing?

Create a storyboard that demonstrates these principles.

WEB 435 Week 4 DQ 1

Germanakos, Tsianos, Lekkas, Mourlas, and Samaras (2008), discuss the importance of user-
centric content delivery for m-commerce. Discuss the challenges of providing personalized
content for mobile device users.

WEB 435 Week 4 DQ 2

Based on Benou and Bitos’s (2008) article, discuss why rapid application development should be
adopted for the creation of mobile applications.

WEB 435 Week 5 Learning Team Project and Presentation

Prepare an 8-10 page proposal in which you incorporate the previous week’s draft papers.
Continue to build your final proposal by including the following:

· Discuss how social networks could be implemented on the Web site.

· Explain the advantages and disadvantages of Web 2.0 for your proposal.

· In your recommendations be sure to explain the following:

o The advantages and disadvantages of using m-commerce

o What is necessary to make the e-commerce site available to mobile devices?

o Explain the advantages of using XHTML mobile profile 1.0.

· The advantages and disadvantages of using Web 2.0 for e-commerce

· Methods to incorporate web-based communities such as:

o Blogs

o Book reviews

o Sales of used books (the bookstore website takes a small percentage of revenue)
o Use of Second Life

o Individual student personalized web page

· Explain methods for infusing web-based commerce to increase sales.

Create a 1-2 page executive summary of your proposal that will be presented to company
management.

Present your recommendations in 10-15 Microsoft® PowerPoint® slides with speakers notes in
which you summarize the information from the prior three assignments and incorporate the
additional information from this week’s assignment.

More Related Content

Similar to Web 435 entire course

The Power of Dedicated Web Development: Transforming Businesses in the Digita...
The Power of Dedicated Web Development: Transforming Businesses in the Digita...The Power of Dedicated Web Development: Transforming Businesses in the Digita...
The Power of Dedicated Web Development: Transforming Businesses in the Digita...company
 
Web 434 entire course
Web 434 entire courseWeb 434 entire course
Web 434 entire courseWEB434
 
JISC-PoWR Project: Web 1.0 Preservation
JISC-PoWR Project: Web 1.0 PreservationJISC-PoWR Project: Web 1.0 Preservation
JISC-PoWR Project: Web 1.0 PreservationMarieke Guy
 
Dedicated Web Development
Dedicated Web DevelopmentDedicated Web Development
Dedicated Web DevelopmentFariha Tasnim
 
Web engineering notes unit 2
Web engineering notes unit 2Web engineering notes unit 2
Web engineering notes unit 2inshu1890
 
IRJET- Web Page Builder
IRJET- Web Page BuilderIRJET- Web Page Builder
IRJET- Web Page BuilderIRJET Journal
 
Choosing the Right Technologies A Guide to Frameworks and Tools for Web App D...
Choosing the Right Technologies A Guide to Frameworks and Tools for Web App D...Choosing the Right Technologies A Guide to Frameworks and Tools for Web App D...
Choosing the Right Technologies A Guide to Frameworks and Tools for Web App D...BitCot
 
Web Development Services
Web Development ServicesWeb Development Services
Web Development ServicesSanjida Afrin
 
Rich Internet Applications
Rich Internet ApplicationsRich Internet Applications
Rich Internet ApplicationsYoussef Shaath
 
A Brief Note On Asp.Net And Cloud Computing Essay
A Brief Note On Asp.Net And Cloud Computing EssayA Brief Note On Asp.Net And Cloud Computing Essay
A Brief Note On Asp.Net And Cloud Computing EssayLanate Drummond
 
Web Application Architecture: A Comprehensive Guide for Success in 2023
Web Application Architecture: A Comprehensive Guide for Success in 2023Web Application Architecture: A Comprehensive Guide for Success in 2023
Web Application Architecture: A Comprehensive Guide for Success in 2023stevefary
 
A Comprehensive Guide to Web Application Architecture
A Comprehensive Guide to Web Application ArchitectureA Comprehensive Guide to Web Application Architecture
A Comprehensive Guide to Web Application Architecturestevefary
 
Over view of software artitecture
Over view of software artitectureOver view of software artitecture
Over view of software artitectureABDEL RAHMAN KARIM
 
Joomla Chicago Meeting July, 2009: CMS CageMatch II
Joomla Chicago Meeting July, 2009: CMS CageMatch IIJoomla Chicago Meeting July, 2009: CMS CageMatch II
Joomla Chicago Meeting July, 2009: CMS CageMatch IIJohn Coonen
 
MS PowerPoint format
MS PowerPoint formatMS PowerPoint format
MS PowerPoint formatwebhostingguy
 
Deployment Strategies For Web 2.0
Deployment Strategies For Web 2.0Deployment Strategies For Web 2.0
Deployment Strategies For Web 2.0lisbk
 

Similar to Web 435 entire course (20)

The Power of Dedicated Web Development: Transforming Businesses in the Digita...
The Power of Dedicated Web Development: Transforming Businesses in the Digita...The Power of Dedicated Web Development: Transforming Businesses in the Digita...
The Power of Dedicated Web Development: Transforming Businesses in the Digita...
 
Web 434 entire course
Web 434 entire courseWeb 434 entire course
Web 434 entire course
 
Thesis
ThesisThesis
Thesis
 
JISC-PoWR Project: Web 1.0 Preservation
JISC-PoWR Project: Web 1.0 PreservationJISC-PoWR Project: Web 1.0 Preservation
JISC-PoWR Project: Web 1.0 Preservation
 
Dedicated Web Development
Dedicated Web DevelopmentDedicated Web Development
Dedicated Web Development
 
Web engineering notes unit 2
Web engineering notes unit 2Web engineering notes unit 2
Web engineering notes unit 2
 
IRJET- Web Page Builder
IRJET- Web Page BuilderIRJET- Web Page Builder
IRJET- Web Page Builder
 
Choosing the Right Technologies A Guide to Frameworks and Tools for Web App D...
Choosing the Right Technologies A Guide to Frameworks and Tools for Web App D...Choosing the Right Technologies A Guide to Frameworks and Tools for Web App D...
Choosing the Right Technologies A Guide to Frameworks and Tools for Web App D...
 
Web Development Services
Web Development ServicesWeb Development Services
Web Development Services
 
Rich Internet Applications
Rich Internet ApplicationsRich Internet Applications
Rich Internet Applications
 
A Brief Note On Asp.Net And Cloud Computing Essay
A Brief Note On Asp.Net And Cloud Computing EssayA Brief Note On Asp.Net And Cloud Computing Essay
A Brief Note On Asp.Net And Cloud Computing Essay
 
Web Application Architecture: A Comprehensive Guide for Success in 2023
Web Application Architecture: A Comprehensive Guide for Success in 2023Web Application Architecture: A Comprehensive Guide for Success in 2023
Web Application Architecture: A Comprehensive Guide for Success in 2023
 
SunidhiSharma
SunidhiSharmaSunidhiSharma
SunidhiSharma
 
A Comprehensive Guide to Web Application Architecture
A Comprehensive Guide to Web Application ArchitectureA Comprehensive Guide to Web Application Architecture
A Comprehensive Guide to Web Application Architecture
 
Over view of software artitecture
Over view of software artitectureOver view of software artitecture
Over view of software artitecture
 
Joomla Chicago Meeting July, 2009: CMS CageMatch II
Joomla Chicago Meeting July, 2009: CMS CageMatch IIJoomla Chicago Meeting July, 2009: CMS CageMatch II
Joomla Chicago Meeting July, 2009: CMS CageMatch II
 
Tapas Ghosh
Tapas GhoshTapas Ghosh
Tapas Ghosh
 
Resume
ResumeResume
Resume
 
MS PowerPoint format
MS PowerPoint formatMS PowerPoint format
MS PowerPoint format
 
Deployment Strategies For Web 2.0
Deployment Strategies For Web 2.0Deployment Strategies For Web 2.0
Deployment Strategies For Web 2.0
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Web 435 entire course

  • 1. WEB 435 Entire Course: Phoenix University: New Updated Course Click this link to get the tutorial: http://homeworkfox.com/questions/computer- science/2392/web-435-entire-course-phoenix-university-new- updated-course/ WEB 435 Week 1 DQ 1 Based on the Gariffo (2010) article, how has Adobe leveraged its 2005 acquisition of Macromedia to expand its portfolio, which include development tools, such as the ColdFusion, Dreamweaver, Flash, and Flex technologies to provide a development stack for building commercial websites? WEB 435 Week 1 DQ 2 A successful security policy requires the support of senior management. Should management also be involved in the development of a web security policy? WEB 435 Week 2 Individual Assignment Web Security Issues Paper Prepare a 2-3 page paper discussing methods to address client (user) security issues. Include ways that a website can be attacked by malicious users such as: Java script insertion SQL insertion Hidden field manipulation Header manipulation Cookies Precautions: How can worms and viruses be introduced to a website? What is the most common method to ensure client security? WEB 435 Week 2 DQ 1
  • 2. Based on the Keston (2010) article, why are the leading search players aggressively revising their privacy policies to better protect user data? WEB 435 Week 2 DQ 2 Why are security and privacy issues the main reasons for not building online customer trust? What can businesses do to enhance online trust? WEB 435 Week 3 Individual Assignment Authentication and Authorizations Paper XYZ Company has contracted you to secure an Apache server or Microsoft Internet Information Server (IIS). Explain how you would secure the server and describe the system settings that you would employ for the server. Write a 2-3 page paper in which you discuss methods to address this scenario. Be sure to include: Methods for authentication Methods for authorization WEB 435 Week 3 DQ 1 Based on the O’Kennon (2010) article, how will CDNs, which are now offering products that take advantage of ESI (edge side includes) dynamically, create content at the edge of the network? WEB 435 Week 3 DQ 2 Based on the Keston (2010) article, why is the idea of using semantic technology on the web only recently begun gaining traction? WEB 435 Week 4 Individual Assignment Homepage Organization Paper Write a 1-2 page paper that discusses the homepage organization of a Web site. Be sure to communicate the purpose of the site immediately and clearly and explain the following: · The e-cycle of Internet marketing (the 4 P’s of marketing: price, promotion, product, and place) · The role of e-CRM (How is this different from traditional methods?) · Micro customization What is the value of implementing each of these?
  • 3. · Include how e-CRM has changed traditional customer relations · How does a company’s micro customization process (infrastructure) influence these processes? · How does the concept of micro customization enhance e-CRM and Internet marketing? Create a storyboard that demonstrates these principles. WEB 435 Week 4 DQ 1 Germanakos, Tsianos, Lekkas, Mourlas, and Samaras (2008), discuss the importance of user- centric content delivery for m-commerce. Discuss the challenges of providing personalized content for mobile device users. WEB 435 Week 4 DQ 2 Based on Benou and Bitos’s (2008) article, discuss why rapid application development should be adopted for the creation of mobile applications. WEB 435 Week 5 Learning Team Project and Presentation Prepare an 8-10 page proposal in which you incorporate the previous week’s draft papers. Continue to build your final proposal by including the following: · Discuss how social networks could be implemented on the Web site. · Explain the advantages and disadvantages of Web 2.0 for your proposal. · In your recommendations be sure to explain the following: o The advantages and disadvantages of using m-commerce o What is necessary to make the e-commerce site available to mobile devices? o Explain the advantages of using XHTML mobile profile 1.0. · The advantages and disadvantages of using Web 2.0 for e-commerce · Methods to incorporate web-based communities such as: o Blogs o Book reviews o Sales of used books (the bookstore website takes a small percentage of revenue)
  • 4. o Use of Second Life o Individual student personalized web page · Explain methods for infusing web-based commerce to increase sales. Create a 1-2 page executive summary of your proposal that will be presented to company management. Present your recommendations in 10-15 Microsoft® PowerPoint® slides with speakers notes in which you summarize the information from the prior three assignments and incorporate the additional information from this week’s assignment.