SlideShare a Scribd company logo
1 of 28
TIP TOP AUTO MOBILE SDN. BHD.



                              INTRODUCTION


There is a need in Tip Top Auto Mobile for a large selection of quality used car, and E2C
Consulting Co. Berhad will help Tip Top Auto Mobile to sell these top quality used car vehicles
at competitive price.   They currently publish a magazine called Second-Hand Car mart to
develop more sales in this company. It currently sells 3000copies per issue/RM10.00

We will continue to develop to you an excellent working relationship with local dealers and
auctions to bring the savings to the customer. We will be successful because we offer something
different. We are selling professional services and an experience in car buying that will bring
customers back again by using only internet, as well as referring friends and family. We
estimate an optimistic gross margin over the industry average. We will be successful because of
the excellent team we have assembled and the drive of the owners.




Mission

Portland Mobile Auto Inspectors' mission is to provide customers with convenient, thorough,
used car inspections. We exist to attract and maintain customers. When we adhere to this maxim,
everything else will fall into place. Our services will exceed the expectations of our customers.




Target Marketing

Tip Top Auto Mobile target customer will be a used car buyer, typically looking for a car over
RM50000. The used car buyer purchasing a car below RM50000 typically is looking just for a
type of transportation and is not all that concerned with the possible problems that might affect
the vehicle. In general they accept the fact that for under RM50000 there are going to be many
different things wrong with the car and they are not willing to pay someone to tell them that there
are a bunch of things wrong with the car which they cannot afford to fix.

E2C CONSULTING CO. BERHAD                                                                    Page 1
TIP TOP AUTO MOBILE SDN. BHD.


PMAI's customer is buying a used car for one of two reasons:

   1. They cannot afford what they want in a new vehicle, or
   2. They recognize the value that they gain by purchasing a used car.



This value is generated by the fact that a new car will depreciate the most, 20%, within the first
year. It makes sense to allow the car to depreciate on someone else other than yourself. This is of
course based on the logic that you have the used car inspected so all afflictions are known to you
at the time of purchase. Beyond pointing out any problems, the inspection can also indicate how
the car was driven over its life, was it babied or beaten.

The target customer has typically done their research and narrowed down their search to a few
different vehicles. They have looked at the car and found that it meets their needs. The last step
is to make sure the car is in good condition.




E2C CONSULTING CO. BERHAD                                                                   Page 2
TIP TOP AUTO MOBILE SDN. BHD.



                                          TASK 1

Carlist.my

 We have research and made some notes on the revenue modal and marketing techniques that
are adopted by www.carlist.my website to promote their service to both car buyer and sellers.
This website is so interesting which is they upload thousands of new image of second hand cars
everyday with the details such as car name, cc (cubic centimeter), type of car which is automatic
or manual, year of bought the car, mileage of the car, the place of steering, person to contact and
the price. Even they give protection through PayTrade, buyer’s money is held by tradecarview
securely until PayTrade confirm the shipment is completed and payment will be refunded if the
vehicle of the buyer ordered is not shipped.

 Moreover, revenue model of Carlist.com used was sales model. They sell second hand cars in
many varies country by their website. Furthermore, sellers can also advertise about their car for
free in Carlist.my website. Even they also used email alert which allows buyer or sellers can set
their criteria for the car they want and Carlist.my website will send the email report to all the
buyers which match with their requires or criteria of the car. Lastly, Carlist.my also provides
“looking for accessories”, where buyers, sellers or people who need accessories for their cars can
buy from their website.

Marketing techniques that we have suggest to upgrade their business are forum posting. Those
posts attract targeted traffic, they should write an answer to a question or ask a question there.
Lots of postings in forums are questions to get advice. Basically it's a bit of courtesy to help out
buyers or sellers and a bit of branding a name. Forums are also a meeting place where Carlist.my
can make contacts with others or try to find joint venture partners. But the most powerful feature
of postings to forums is leaving their 'business card' in the form of a signature file.




E2C CONSULTING CO. BERHAD                                                                    Page 3
TIP TOP AUTO MOBILE SDN. BHD.




Tip Top Auto Mobile

 We also have research about another company which is Tip Top Auto Mobile. They are also
selling second hand cars as similar to Carlist.my but with different revenue model. The revenue
model that tip top auto mobile is using are sales model where they sell cars online and also buy
cars online. Another revenue model used by Tip Top Auto Mobile is advertising model where
sellers and buyers can advertise their cars and detail of the car with low cost in the website.
Transaction model is also used as revenue model in their company, which is helping to sell a
second hand car to second parties and receive commission or fees from the first parties who is
owner of the car. They also always update current issue about cars in the website which make
easier for the buyers and sellers to get knows of the price of second hand cars in market or other
details about cars. Even Tip Top Auto Mobile has given space in website to write criteria of the
car they want to buy or sell by the buyer or seller.

 Marketing techniques are used by Tip Top Auto Mobile is they give 20% discount for cars that
used for 6 years, they also have social network which is facebook where seller or buyers can
also connect to them and even people can easily will get knows about this company via
facebook. Other than that, they advertised in magazines, news paper, even by telecasting in
television. Buyers also can easily find the car they needed buy just clicking on the button “find
car” in the Tip Top Auto Mobile website. Moreover, they also have website links to and from
other websites and portals where sellers and buyers can easily connect by click on the links.
They also provide email enquiry buttons and forms. Lastly, they also given protection as
Carlist.my company, which is through PayTrade, buyer’s money is held by tradecarview
securely until PayTrade confirm the shipment is completed and payment will be refunded if the
vehicle of the buyer ordered is not shipped.


 Marketing techniques that we have suggested to improve their business are offering an
irresistible free gift. This is one of the best ways to build their potential customer list. They will
educate people about their value, provide them with helpful information, and begin to build a
relationship. Type of gift that we can suggest are car accessories which make their buyers
satisfied with their service and even buyers can introduce about the company to their friends and

E2C CONSULTING CO. BERHAD                                                                      Page 4
TIP TOP AUTO MOBILE SDN. BHD.


relative. Other than this, we also can suggest with a web promotion plan and an effective web
design and development strategy to upgrade and to make their website more attractive. Lastly,
Get ranked at the top in major search engines, and practice good search optimization techniques.
These are the marketing techniques that we have suggested to Tip Top Auto Mobile.




E2C CONSULTING CO. BERHAD                                                                Page 5
TIP TOP AUTO MOBILE SDN. BHD.



                                         TASK 2

REVENUE MODEL



       E-Commerce revenue models specifically describe different techniques used in
generating income from the publisher's websites. As the e-commerce progress, the traditional
revenue model of sales is expanded to more variety of revenue options and e-commerce business
model .

       One of the techniques that could be used in promoting new e-commerce site is through
advertising. Through advertising, publishers could advertise and describe more details about the
products or services that they sell and provide. In advertising their product, publishers have to be
creative so that their advertising section could attract people to buy their product. Besides that,
the information provided in the advertisement must be real so that customers would not feel as if
they have been cheated.

       Subscriptions are also an appropriate way in promoting new e-commerce site.
Subscriptions mean that customers must subscribe first so that they can get the latest information
about the product of a company. Usually there are fees in subscribing a site. However, it depends
on the publisher of the site to impose the fees or not. The publishers of an e-commerce site
usually provided something or some gift to attract customers to subscribe them.

       Transaction is the way where customers could make payment through the website
provided. By using this way, it would make easier for the customers. Actually, this transaction
thing involved the third party. The publishers of the e-commerce website offer the third party to
make it easier for customers to make their payment. Through this way, the publisher or the seller
would gain more profit and the way of they doing business would be easier and efficient.
However, the risk is customer’s trust.

       The last appropriate way in promoting e-commerce is of course, the goods that they sell.
Products or services sells by the seller or publisher must in good condition and worth it.

E2C CONSULTING CO. BERHAD                                                                    Page 6
TIP TOP AUTO MOBILE SDN. BHD.


Logically, customers would not buy expensive things online. Thus, seller should have thought a
creative way in selling things that people would buy and yet could give benefits to them.
Besides, when selling things through online, the shipping process is a must. The sellers should
always make sure that the shipping process went well without any problem. Whenever there are
problems in that kind of situation, it could affect the brand name of the company and the
customers trust towards them.

        No matter what we do, there must be and advantages and disadvantages on certain things.
There are advantages to customers in using e-commerce site. First of all, customer’s time would
not be wasted by visiting the shop that offers things that they want, they could just do it online
and pay it online and just wait for their item to received. Besides that, by using e-commerce site,
customers don’t need to worry or wondering either the shop they wanted to go is closed or what
so on. By using e-commerce site, they can do it for 24 hours since the website would never
closed. There are also varieties of products offered and they can compare things that they want
easily just by clicking it.

        However, there are also some disadvantages. Customers trust to these e-commerce sites is
low. They are not sure either it can be trusted or it’s illegal or not. Nowadays there are a lot of
hacking stuff happens. Thus when customers wanted to pay things, they would think twice. To
customers, it’s a risk in using e-commerce site. They could easily be cheated if they took the
wrong step in trusting and evaluating sites. Another disadvantages to the customers is they would
not know either the products offered is in a good condition or not. The quality of the product
would also be questioned. It another risk to them to trust the site hundred percent.

        As for the conclusion, there are some revenue models that an e-commerce site must have.
This could make the percentage rate of people clicking and using the site increase from day to
day. The seller or the publisher must be creative in creating an attractive environment on the site.




E2C CONSULTING CO. BERHAD                                                                    Page 7
TIP TOP AUTO MOBILE SDN. BHD.



                                  TASK 3

THE MARKETING PLAN




E2C CONSULTING CO. BERHAD                                   Page 8
TIP TOP AUTO MOBILE SDN. BHD.




E2C CONSULTING CO. BERHAD                                   Page 9
TIP TOP AUTO MOBILE SDN. BHD.




E2C CONSULTING CO. BERHAD                                   Page 10
TIP TOP AUTO MOBILE SDN. BHD.




E2C CONSULTING CO. BERHAD                                   Page 11
TIP TOP AUTO MOBILE SDN. BHD.




E2C CONSULTING CO. BERHAD                                   Page 12
TIP TOP AUTO MOBILE SDN. BHD.




E2C CONSULTING CO. BERHAD                                   Page 13
TIP TOP AUTO MOBILE SDN. BHD.




E2C CONSULTING CO. BERHAD                                   Page 14
TIP TOP AUTO MOBILE SDN. BHD.




E2C CONSULTING CO. BERHAD                                   Page 15
TIP TOP AUTO MOBILE SDN. BHD.



                                         TASK 4

Domain

A domain name is an identification string that defines a realm of administrative autonomy,
authority, or control in the Internet. Domain names are formed by the rules and procedures of the
Domain Name System (DNS).

Domain names are used in various networking contexts and application-specific naming and
addressing purposes. In general, a domain name represents an Internet Protocol (IP) resource,
such as a personal computer used to access the Internet, a server computer hosting a web site, or
the web site itself or any other service communicated via the Internet.

Domain names are organized in subordinate levels (sub domains) of the DNS root domain,
which is nameless. The first-level set of domain names are the top-level domains (TLDs),
including the generic top-level domains (gTLDs), such as the prominent domains com, net and
org, and the country code top-level domains (ccTLDs). Below these top-level domains in the
DNS hierarchy are the second-level and third-level domain names that are typically open for
reservation by end-users that wish to connect local area networks to the Internet, create other
publicly accessible Internet resources or run web sites. The registration of these domain names is
usually administered by domain name registrars who sell their services to the public.




E2C CONSULTING CO. BERHAD                                                                 Page 16
TIP TOP AUTO MOBILE SDN. BHD.




                                                         .(dot)




                                       gTLD                                        ccTLD

                                              )


                                                                                250 COUNTRY
                                                                                    CODE




     .GOV                                                                .INT

                      .EDU                                        .NET

                              .COM                .ORG


                                       .MIL




Top-level domains

The top-level domains such as .com and .net and .org are the highest level of domain names of
the Internet. A top-level domain is also called a TLD. Top-level domains form the DNS root
zone of the hierarchical Domain Name System. Every domain name ends in a top-level or first-
level domain label.

When the Domain Name System was created in the 1980s, the domain name space was divided
into two main groups of domains.[4] The country code top-level domains (ccTLD) were
primarily based on the two-character territory codes of ISO-3166 country abbreviations. In
addition, a group of seven generic top-level domains (gTLD) was implemented which
represented a set of categories of names and multi-organizations.[5] These were the domains
GOV, EDU, COM, MIL, ORG, NET, and INT.




E2C CONSULTING CO. BERHAD                                                                  Page 17
TIP TOP AUTO MOBILE SDN. BHD.


During the growth of the Internet, it became desirable to create additional generic top-level
domains. As of October 2009, there are 21 generic top-level domains and 250 two-letter country-
code top-level domains.[6] In addition, the ARPA domain serves technical purposes in the
infrastructure of the Domain Name System.

During the 32nd International Public ICANN Meeting in Paris in 2008,[7] ICANN started a new
process of TLD naming policy to take a "significant step forward on the introduction of new
generic top-level domains." This program envisions the availability of many new or already
proposed domains, as well a new application and implementation process.[8] Observers believed
that the new rules could result in hundreds of new top-level domains to be registered.[9]

An annotated list of top-level domains in the root zone database is published at the IANA
website at http://www.iana.org/domains/root/db/ and a Wikipedia list exists.




Second-level and lower level domains

Below the top-level domains in the domain name hierarchy are the second-level domain (SLD)
names. These are the names directly to the left of .com, .net, and the other top-level domains. As
an example, in the domain example.co.uk, co is the second-level domain.

Next are third-level domains, which are written immediately to the left of a second-level domain.
There can be fourth- and fifth-level domains, and so on, with virtually no limitation. An example
of an operational domain name with four levels of domain labels is www.sos.state.oh.us. The
www preceding the domains is the host name of the World-Wide Web server. Each label is
separated by a full stop (dot). 'sos' is said to be a sub-domain of 'state.oh.us', and 'state' a sub-
domain of 'oh.us', etc. In general, sub domains are domains subordinate to their parent domain.
An example of very deep levels of sub domain ordering are the IPv6 reverse resolution DNS
zones,   for   an    example     which     is   using   this   formula,    1.0.0.0.0.0.0.0.0.0.0.0.0.
0.0.0.0.0.0.0.0.0.0.0.ip6.arpa, which is the reverse DNS resolution domain name for the IP
address of a loopback interface, or the local host name.




E2C CONSULTING CO. BERHAD                                                                    Page 18
TIP TOP AUTO MOBILE SDN. BHD.


Second-level (or lower-level, depending on the established parent hierarchy) domain names are
often created based on the name of a company (e.g., bbc.co.uk), product or service (e.g.,
gmail.com). Below these levels, the next domain name component has been used to designate a
particular host server. Therefore, ftp.wikipedia.org might be an FTP server, www.wikipedia.org
would be a World Wide Web server, and mail.wikipedia.org could be an email server, each
intended to perform only the implied function. Modern technology allows multiple physical
servers with either different (cf. load balancing) or even identical addresses (cf. anycast) to serve
a single hostname or domain name, or multiple domain names to be served by a single computer.
The latter is very popular in Web hosting service centers, where service providers host the
websites of many organizations on just a few servers.

The hierarchical DNS labels or components of domain names are separated in a fully qualified
name by the full stop (dot, .).




E2C CONSULTING CO. BERHAD                                                                    Page 19
TIP TOP AUTO MOBILE SDN. BHD.


                   THE THREE IMPOTENTIAL DOMAIN NAMES

.org

The domain name org is a generic top-level domain (gTLD) of the Domain Name System (DNS)
used in the Internet. The name is created from the word organization.

The org domain was one of the original top-level domains, with com, edu, gov, mil and net,
established in January 1985. It was originally intended for non-profit organizations or
organizations of a non-commercial character that did not meet the requirements for other gTLDs.

With the intention of selling second hand car mart using org as the domain for the site is a good
way of selling. Most of the organization needs cars to run their business for the transportation
purpose. So, it’s a good chance for this site to register under the org and make a lot of profit.

Furthermore, registrations in the org are processed via accredited registrars worldwide. Anyone
can register an org. Although org was recommended for non-commercial entities, there are no
restrictions for registration. The org can also be use for commercial.

The market is wide for our site to be recognized because the main focuses are to sell for all the
organization out there. There is numerous number of buyers out there that are ready to buy cars
and search for cars. It’s a new era of business, seller are not searching for buyers, but now the
buyer are searching for sellers. But, it is determine on how a seller can attract their customer with
the site they have created. The more attract the site, more buyers would be interested. It is highly
recommended for our company to be choosing org as a domain for the site.




.net

The domain name net is derived from the word network. Indicating its originally intended
purpose for organizations involved in networking technologies, such as Internet service providers
and other infrastructure companies. However, restrictions were never enforced and the domain is
now a general name space as the same as org,com,mil and others. It is still popular with network
operators, and is often treated as an alternate to com.


E2C CONSULTING CO. BERHAD                                                                     Page 20
TIP TOP AUTO MOBILE SDN. BHD.


Net is one of the original top-level domains which have been created in January 1985. As of
2011, it is the third most popular top-level domain, after .com and .de. Net can also be use for the
company domain site because the networking connects with a lot of sources and user that can
make more viewers in short of time. It’s a good opportunity for our new site to be recognized as
new comers.

Networking is one of the important things in business to get more and more client. So, by using
net as domain would be a good suggestion. As we all know, client is one of the asset, if we use it
properly, the asset can make some profit. Even though, using net might be hard for business but,
the market is extremely wide. The buyers are not from one area such as organization only as the
buyer. It can be a person, company or organization as the buyers.




.com (recommended)

The domain name com is commonly use as the main search for everything’s nowadays. Its name
is derived from the word commercial, indicating its original intended purpose for domains
registered by commercial organizations. Registrations in com are processed via registrars
accredited by ICANN. The registry accepts internationalized domain names.

Although com domains were originally intended to designate commercial entities along with
others such as government agencies or educational institutions have different top-level domains
assigned to them. With the commercialization and popularization of the Internet, the com domain
was opened to the public and quickly became the most common top-level domain for websites,
email, and networking. People often use com as their search domain and com are well known by
every internet users. By, advertising the company site in com domain will make it easy to be
search.

Many non-commercial sites and networks use com names to benefit from the perceived
recognizability of a com domain. That is why, if the company were intend to commercialize their
business, it would be recommended to use com as the domain. Furthermore, the registration
statistics show varying popularity over the years.



E2C CONSULTING CO. BERHAD                                                                   Page 21
TIP TOP AUTO MOBILE SDN. BHD.


One of benefit we can get by registering com as domain is that we can control the area of our
bussines because we can limited the user by using the country code as the second level of
domain. So,if the last address is .my, the users in Malaysia know where access and search for the
web.




E2C CONSULTING CO. BERHAD                                                                Page 22
TIP TOP AUTO MOBILE SDN. BHD.



                                        TASK 5

SECURITY THREATS



The Internet serves as the electronic connection between buyers and sellers. The most important
thing is about communication channel security is that the Internet was not designed to be secure.
Nowadays, the Internet remains largely unchanged from its original, insecure state. Message
packets on the Internet travel an unplanned path from a source node to a destination node. A
packet passes through a number of intermediate computers on the network before reaching its
final destination. The path can vary each time a packet is sent between the same source and
destinations points. Because users cannot control the path and do not know where their packets
have been, it is possible that Internet diary can be read the packets, alter them, or even delete
them. That is, any message travelling on the Internet is subject to secrecy, integrity, and
necessity threats.

1) Secrecy Threats
   Secrecy is the security threat that is most frequently mentioned in articles and the popular
   media. Closely linked to secrecy is privacy, which also receives a great deal of attention.
   Secrecy and privacy, though similar, are different issue. Secrecy is the prevention of
   unauthorized information disclosure. Privacy is the protection of individual rights to
   nondisclosure. Secrecy is a technical issue requiring sophisticated physical and logical
   mechanisms, whereas privacy protection is a legal matter. A classic example of the
   difference between secrecy and privacy is e-mail.
    One significant threat to electronic commerce is theft of sensitive or personal information,
   including credit card numbers, names and personal preferences. The same problems can
   occur in e-mail transmissions. Software applications called sniffer programs provide the
   means to record information that passes through a computer or router that is handling Internet
   traffic. Using a sniffer program is analogues to tapping a telephone line and recording a




E2C CONSULTING CO. BERHAD                                                                Page 23
TIP TOP AUTO MOBILE SDN. BHD.


   conversation. Sniffer programs can read e-mail messages and unencrypted Web client server
   message traffic, such as user logins, passwords, and credit card numbers.




2) Integrity Threats
   An integrity threats, also known as active wiretapping, exists when an unauthorized party can
   alter a message stream of information. Unprotected banking transactions, such as deposit
   amounts transmitted over the Internet, are subject to integrity violations. Integrity violations
   implies a secrecy violation because an intruder who alters information can read and interpret
   that information. Unlike secrecy threats, where a viewer simply sees information he or she
   should not, integrity threats can cause a change in the actions a person or corporation takes
   because a mission-critical transmission has been altered.
   Cyber vandalism is an example of an integrity violation. Cyber vandalism is the electronic
   defacing of an existing Web site’s page. The electronic equivalent of destroying property or
   placing graffiti on objects, cyber vandalism occurs whenever someone replaces a Web site’s
   regular content with his or her own content, recently, several cases of Webpage defacing
   involved vandals replacing business content with pornographic material and other offensive
   content.
   Masquerading or spoofing-pretending to be someone you are not, or representing a Web site
   as an original when it is a fake-is one means of disrupting Web sites.


3) Necessity Threats.
   The purpose of a necessity threat, which is usually as a delay, denial, or denial-of-service
   (DoS) attack, is to disrupt normal computer processing, or deny processing entirely. A
   computer that has experienced a necessity threats slows processing to an intolerably slow
   speed. For example, if the processing speed of a single ATM transaction slows from one or
   two seconds to 30 seconds, user will abandon ATMs entirely. Similarly, slowing any Internet
   service drives customers to competitor’ Web or commerce sites-possibly discouraging them
   from ever returning to the original commerce site. In the other words, slower processing can
   render a service unusable or unattractive.



E2C CONSULTING CO. BERHAD                                                                  Page 24
TIP TOP AUTO MOBILE SDN. BHD.


   Attackers can use the botnets to launch a simultaneous attack on a Web site from all of the
   computers in the botnet. This form of attack is called distributed denial-of-service (DDoS)
   attack.
   DoS attacks can remove information altogether, or delete information from a transmission or
   file. One denial attack caused some PCs that have been Quicken installed to divert money to
   the perpetrator’s bank account. In other famous DoS attack against high-profile electronic
   commerce site such as Amazon.com, the attackers used a botnet to send a flood of data
   packets to the sites. This overwhelmed the sites’ servers and chocked off legitimate
   customers’ access. Prior to the attack, perpetrators located vulnerable computers and loaded
   them with the software that attacked the commerce sites.


4) Threats to Physical Security of Internet Communication Channel.
   The Internet was designed from its inception to withstand attacks on its physical
   communication links. The Internet’s packet-based network design precludes it from being
   shut down by an attack on a single communications link on that network.
   An individual user’s Internet service can be interrupted by destruction of that user’s link on
   the Internet. Few individual users have multiple connections to an ISP. However, larger
   companies and organizations often do have more than one link to the main backbone of the
   Internet. Typically, each link is purchased from a different network access provider can
   switch traffic to another network access provider’s link to keep the company, organization, or
   ISP connected to the Internet.




E2C CONSULTING CO. BERHAD                                                                Page 25
TIP TOP AUTO MOBILE SDN. BHD.


COUNTERMEASURES



Here are five key countermeasures that can be used to drive cyber security activities in industrial
control system environments.

1. Security policies.
   Security policies should be developed for the control systems network and its individual
   components, but they should be reviewed periodically to incorporate the current threat
   environment, system functionality, and required level of security.
2. Blocking access to resources and services.
   This technique is generally employed on the network through the use of perimeter devices
   with access control lists such as firewalls or proxy servers. It can be enabled on the host via
   host-based firewalls and antivirus software.
3. Detecting malicious activity.
   Detection activities of malicious activity can be networked or host-based and usually require
   regular monitoring of log files by experienced administrators. IDS are the common means of
   identifying problems on a network, but can be deployed on individual hosts as well. Auditing
   and event logs should be enabled on individual hosts when possible.
4. Mitigating possible attacks.
   In many cases, vulnerability may have to be present because removal of the vulnerability
   may result in an inoperable or inefficient system. Mitigation allows administrators to control
   access to vulnerability in such a fashion that the vulnerability cannot be exploited. Enabling
   technical workarounds, establishing filters, or running services and applications with specific
   configurations can often do this.
5. Fixing core problems.
   The resolution of core security problems almost always requires updating, upgrading, or
   patching the software vulnerability or removing the vulnerable application. The software hole
   can reside in any of the three layers (networking, operating system, or application). When
   available, the mitigation should be provided by the vendor or developer for administrators to
   apply.



E2C CONSULTING CO. BERHAD                                                                  Page 26
TIP TOP AUTO MOBILE SDN. BHD.



         IMPLICATION AND CONCLUSION

Some clear implications can be extracted from the foregoing pages-consider some on them;

   1. The used car market value is significantly large than the new car market at present and
       there are signs this may continue at least short terms.


   2. The used car market can be analyzed in similar ways to the new car market and it is
       possible for dealers to develop inventory and marketing strategies to exploit the result of
       such analysis


   3. Used car buyers expect to be treated as first-class citizens as such.




The conclusion is that by using the e-marketing or e-commerce strategies, it may improve the
market revenue of Tip Top Auto Mobile Company. As for the time being, this company uses
magazines to promote their products and their profit increase. If e-commerce site for this
company be introduced, their profit graph would show an increase in profits. Therefore, we
suggest for Tip Top Auto Mobile to use our recommendation in e-marketing business so that
they can increase the profit much more than previous year.




E2C CONSULTING CO. BERHAD                                                                 Page 27
TIP TOP AUTO MOBILE SDN. BHD.



                              REFERRENCE

   1. http://www.marketingprofs.com/articles/2005/1482/how-to-formulate-marketing-
      messages
   2. http://faculty.chicagobooth.edu/steven.kaplan/research/frame.pdf
   3. http://www.marketing-made-simple.com/articles/marketing-plan.htm#axzz1pSKQ3XcD
   4. http://www.biztree.com/Templates/Marketing-Plan.html
   5. http://www.keyscouts.com/Online%20Marketing%20Plan%20-%20Bar-
      Ilan%20University.pdf
   6. http://www.yudkin.com/sampleplan.htm
   7. http://www.shahzadtc.com/pdf/SWOTTOWS.pdf
   8. http://sbaloanbusinessplan.com/used-car-dealer-swot-analysis/
   9. http://www.matthewhoover.net/Portfolio_files/MGT%205391%20Strategy%20Project.pd
      f
   10. http://www.rocketwatcher.com/blog/2010/05/7-key-elements-of-a-marketing-plan.html
   11. http://www.arpapress.com/Volumes/Vol2Issue3/IJRRAS_2_3_13.pdf
   12. http://www.wikipedia.com/domain
   13. http://www.wikipedia.com/e-commerce
   14. http://www.wikipedia.com/securitythreats
   15. http://www.wikipedia.com/revenuemodel




E2C CONSULTING CO. BERHAD                                                            Page 28

More Related Content

What's hot

APF Dealer Presentation
APF Dealer PresentationAPF Dealer Presentation
APF Dealer PresentationErik Loebl
 
Enterprise Rent-a-Car
Enterprise Rent-a-CarEnterprise Rent-a-Car
Enterprise Rent-a-CarNCVPS
 
Digital marketing and dealing in the auto industry Presentation
Digital marketing and dealing in the auto industry PresentationDigital marketing and dealing in the auto industry Presentation
Digital marketing and dealing in the auto industry PresentationAmigo MGA
 
ComCap Beauty Overview December 2016
ComCap Beauty Overview December 2016ComCap Beauty Overview December 2016
ComCap Beauty Overview December 2016Uren Dhanani
 
Digital Dealer Magazine Interview with Ralph Paglia is Cover Story
Digital Dealer Magazine Interview with Ralph Paglia is Cover StoryDigital Dealer Magazine Interview with Ralph Paglia is Cover Story
Digital Dealer Magazine Interview with Ralph Paglia is Cover StoryRalph Paglia
 
Digital Automotive marketing Guide 2014
Digital Automotive marketing Guide 2014Digital Automotive marketing Guide 2014
Digital Automotive marketing Guide 2014HouseLead Italia
 
Canadian Brand Telemetry Report
Canadian Brand Telemetry ReportCanadian Brand Telemetry Report
Canadian Brand Telemetry ReportStradablog
 
Cars Online Trend Study 2016
Cars Online Trend Study 2016Cars Online Trend Study 2016
Cars Online Trend Study 2016Stradablog
 
Digital Dealer April 2007 Ralph Paglia Cover Story 2
Digital Dealer April 2007 Ralph Paglia Cover Story 2Digital Dealer April 2007 Ralph Paglia Cover Story 2
Digital Dealer April 2007 Ralph Paglia Cover Story 2Ralph Paglia
 

What's hot (13)

APF Dealer Presentation
APF Dealer PresentationAPF Dealer Presentation
APF Dealer Presentation
 
Enterprise Rent-a-Car
Enterprise Rent-a-CarEnterprise Rent-a-Car
Enterprise Rent-a-Car
 
New Car Online Sales
New Car Online SalesNew Car Online Sales
New Car Online Sales
 
Digital marketing and dealing in the auto industry Presentation
Digital marketing and dealing in the auto industry PresentationDigital marketing and dealing in the auto industry Presentation
Digital marketing and dealing in the auto industry Presentation
 
ComCap Beauty Overview December 2016
ComCap Beauty Overview December 2016ComCap Beauty Overview December 2016
ComCap Beauty Overview December 2016
 
SEO vs Social Media
SEO vs Social Media SEO vs Social Media
SEO vs Social Media
 
strategy paper
strategy paperstrategy paper
strategy paper
 
Digital Dealer Magazine Interview with Ralph Paglia is Cover Story
Digital Dealer Magazine Interview with Ralph Paglia is Cover StoryDigital Dealer Magazine Interview with Ralph Paglia is Cover Story
Digital Dealer Magazine Interview with Ralph Paglia is Cover Story
 
Digital Automotive marketing Guide 2014
Digital Automotive marketing Guide 2014Digital Automotive marketing Guide 2014
Digital Automotive marketing Guide 2014
 
Canadian Brand Telemetry Report
Canadian Brand Telemetry ReportCanadian Brand Telemetry Report
Canadian Brand Telemetry Report
 
True car changes to become dealer friendly v2
True car changes to become dealer friendly v2True car changes to become dealer friendly v2
True car changes to become dealer friendly v2
 
Cars Online Trend Study 2016
Cars Online Trend Study 2016Cars Online Trend Study 2016
Cars Online Trend Study 2016
 
Digital Dealer April 2007 Ralph Paglia Cover Story 2
Digital Dealer April 2007 Ralph Paglia Cover Story 2Digital Dealer April 2007 Ralph Paglia Cover Story 2
Digital Dealer April 2007 Ralph Paglia Cover Story 2
 

Similar to E-Commerce

Carl Bauer "Trade-Ins Online
Carl Bauer "Trade-Ins OnlineCarl Bauer "Trade-Ins Online
Carl Bauer "Trade-Ins OnlineSean Bradley
 
Car Dealer Job Description
Car Dealer Job DescriptionCar Dealer Job Description
Car Dealer Job Descriptionspectacularspec34
 
Kiran motors limited
Kiran motors limitedKiran motors limited
Kiran motors limitedjitharadharmesh
 
Business plan on Car Dealership.
Business plan on Car Dealership.Business plan on Car Dealership.
Business plan on Car Dealership.Nabil Hassan
 
Autobytel.com - Harvard case analysis
Autobytel.com - Harvard case analysisAutobytel.com - Harvard case analysis
Autobytel.com - Harvard case analysisManeesh Garg
 
How Automakers Can Enhance Customer Experience in the New Normal
How Automakers Can Enhance Customer Experience in the New NormalHow Automakers Can Enhance Customer Experience in the New Normal
How Automakers Can Enhance Customer Experience in the New NormalCognizant
 
Car dealership website design
Car dealership website designCar dealership website design
Car dealership website designautoman87
 
Automotive Microsite Strategy One Is Not Enough Dealership Websites
Automotive  Microsite  Strategy  One Is Not Enough  Dealership  WebsitesAutomotive  Microsite  Strategy  One Is Not Enough  Dealership  Websites
Automotive Microsite Strategy One Is Not Enough Dealership WebsitesRalph Paglia
 
Automotive Microsite Strategy One Is Not Enough Dealership Websites
Automotive Microsite Strategy One Is Not Enough Dealership WebsitesAutomotive Microsite Strategy One Is Not Enough Dealership Websites
Automotive Microsite Strategy One Is Not Enough Dealership WebsitesRalph Paglia
 
Dealership Websites One Is Not Enough!
Dealership  Websites    One Is Not Enough!Dealership  Websites    One Is Not Enough!
Dealership Websites One Is Not Enough!Ralph Paglia
 
Dealership Websites One Is Not Enough!
Dealership Websites   One Is Not Enough!Dealership Websites   One Is Not Enough!
Dealership Websites One Is Not Enough!Ralph Paglia
 
Automotive Microsite Stratehy Dealership Websites; One Is Not Enough!
Automotive Microsite Stratehy Dealership Websites; One Is Not Enough!Automotive Microsite Stratehy Dealership Websites; One Is Not Enough!
Automotive Microsite Stratehy Dealership Websites; One Is Not Enough!Ralph Paglia
 
Dealership Websites; One Is Not Enough! by Ralph Paglia
Dealership Websites; One Is Not Enough! by Ralph PagliaDealership Websites; One Is Not Enough! by Ralph Paglia
Dealership Websites; One Is Not Enough! by Ralph PagliaRalph Paglia
 
Motorherd
MotorherdMotorherd
Motorherdkevinsok
 

Similar to E-Commerce (20)

Carl Bauer "Trade-Ins Online
Carl Bauer "Trade-Ins OnlineCarl Bauer "Trade-Ins Online
Carl Bauer "Trade-Ins Online
 
Car Dealer Job Description
Car Dealer Job DescriptionCar Dealer Job Description
Car Dealer Job Description
 
Kiran motors limited
Kiran motors limitedKiran motors limited
Kiran motors limited
 
Business plan on Car Dealership.
Business plan on Car Dealership.Business plan on Car Dealership.
Business plan on Car Dealership.
 
Autobytel.com - Harvard case analysis
Autobytel.com - Harvard case analysisAutobytel.com - Harvard case analysis
Autobytel.com - Harvard case analysis
 
How Automakers Can Enhance Customer Experience in the New Normal
How Automakers Can Enhance Customer Experience in the New NormalHow Automakers Can Enhance Customer Experience in the New Normal
How Automakers Can Enhance Customer Experience in the New Normal
 
Car dealership website design
Car dealership website designCar dealership website design
Car dealership website design
 
Automotive Microsite Strategy One Is Not Enough Dealership Websites
Automotive  Microsite  Strategy  One Is Not Enough  Dealership  WebsitesAutomotive  Microsite  Strategy  One Is Not Enough  Dealership  Websites
Automotive Microsite Strategy One Is Not Enough Dealership Websites
 
Automotive Microsite Strategy One Is Not Enough Dealership Websites
Automotive Microsite Strategy One Is Not Enough Dealership WebsitesAutomotive Microsite Strategy One Is Not Enough Dealership Websites
Automotive Microsite Strategy One Is Not Enough Dealership Websites
 
Dealership Websites One Is Not Enough!
Dealership  Websites    One Is Not Enough!Dealership  Websites    One Is Not Enough!
Dealership Websites One Is Not Enough!
 
Dealership Websites One Is Not Enough!
Dealership Websites   One Is Not Enough!Dealership Websites   One Is Not Enough!
Dealership Websites One Is Not Enough!
 
Automotive Microsite Stratehy Dealership Websites; One Is Not Enough!
Automotive Microsite Stratehy Dealership Websites; One Is Not Enough!Automotive Microsite Stratehy Dealership Websites; One Is Not Enough!
Automotive Microsite Stratehy Dealership Websites; One Is Not Enough!
 
Dealership Websites; One Is Not Enough! by Ralph Paglia
Dealership Websites; One Is Not Enough! by Ralph PagliaDealership Websites; One Is Not Enough! by Ralph Paglia
Dealership Websites; One Is Not Enough! by Ralph Paglia
 
Auto Dealership Websites - One Is Not Enough!
Auto Dealership Websites - One Is Not Enough!Auto Dealership Websites - One Is Not Enough!
Auto Dealership Websites - One Is Not Enough!
 
MKT500 assg 1
MKT500 assg 1MKT500 assg 1
MKT500 assg 1
 
Conroy S Acura
Conroy S AcuraConroy S Acura
Conroy S Acura
 
NFC Auto tlick
NFC Auto tlickNFC Auto tlick
NFC Auto tlick
 
Auto tlick
Auto tlickAuto tlick
Auto tlick
 
Autotlick
AutotlickAutotlick
Autotlick
 
Motorherd
MotorherdMotorherd
Motorherd
 

Recently uploaded

Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 

Recently uploaded (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 

E-Commerce

  • 1. TIP TOP AUTO MOBILE SDN. BHD. INTRODUCTION There is a need in Tip Top Auto Mobile for a large selection of quality used car, and E2C Consulting Co. Berhad will help Tip Top Auto Mobile to sell these top quality used car vehicles at competitive price. They currently publish a magazine called Second-Hand Car mart to develop more sales in this company. It currently sells 3000copies per issue/RM10.00 We will continue to develop to you an excellent working relationship with local dealers and auctions to bring the savings to the customer. We will be successful because we offer something different. We are selling professional services and an experience in car buying that will bring customers back again by using only internet, as well as referring friends and family. We estimate an optimistic gross margin over the industry average. We will be successful because of the excellent team we have assembled and the drive of the owners. Mission Portland Mobile Auto Inspectors' mission is to provide customers with convenient, thorough, used car inspections. We exist to attract and maintain customers. When we adhere to this maxim, everything else will fall into place. Our services will exceed the expectations of our customers. Target Marketing Tip Top Auto Mobile target customer will be a used car buyer, typically looking for a car over RM50000. The used car buyer purchasing a car below RM50000 typically is looking just for a type of transportation and is not all that concerned with the possible problems that might affect the vehicle. In general they accept the fact that for under RM50000 there are going to be many different things wrong with the car and they are not willing to pay someone to tell them that there are a bunch of things wrong with the car which they cannot afford to fix. E2C CONSULTING CO. BERHAD Page 1
  • 2. TIP TOP AUTO MOBILE SDN. BHD. PMAI's customer is buying a used car for one of two reasons: 1. They cannot afford what they want in a new vehicle, or 2. They recognize the value that they gain by purchasing a used car. This value is generated by the fact that a new car will depreciate the most, 20%, within the first year. It makes sense to allow the car to depreciate on someone else other than yourself. This is of course based on the logic that you have the used car inspected so all afflictions are known to you at the time of purchase. Beyond pointing out any problems, the inspection can also indicate how the car was driven over its life, was it babied or beaten. The target customer has typically done their research and narrowed down their search to a few different vehicles. They have looked at the car and found that it meets their needs. The last step is to make sure the car is in good condition. E2C CONSULTING CO. BERHAD Page 2
  • 3. TIP TOP AUTO MOBILE SDN. BHD. TASK 1 Carlist.my We have research and made some notes on the revenue modal and marketing techniques that are adopted by www.carlist.my website to promote their service to both car buyer and sellers. This website is so interesting which is they upload thousands of new image of second hand cars everyday with the details such as car name, cc (cubic centimeter), type of car which is automatic or manual, year of bought the car, mileage of the car, the place of steering, person to contact and the price. Even they give protection through PayTrade, buyer’s money is held by tradecarview securely until PayTrade confirm the shipment is completed and payment will be refunded if the vehicle of the buyer ordered is not shipped. Moreover, revenue model of Carlist.com used was sales model. They sell second hand cars in many varies country by their website. Furthermore, sellers can also advertise about their car for free in Carlist.my website. Even they also used email alert which allows buyer or sellers can set their criteria for the car they want and Carlist.my website will send the email report to all the buyers which match with their requires or criteria of the car. Lastly, Carlist.my also provides “looking for accessories”, where buyers, sellers or people who need accessories for their cars can buy from their website. Marketing techniques that we have suggest to upgrade their business are forum posting. Those posts attract targeted traffic, they should write an answer to a question or ask a question there. Lots of postings in forums are questions to get advice. Basically it's a bit of courtesy to help out buyers or sellers and a bit of branding a name. Forums are also a meeting place where Carlist.my can make contacts with others or try to find joint venture partners. But the most powerful feature of postings to forums is leaving their 'business card' in the form of a signature file. E2C CONSULTING CO. BERHAD Page 3
  • 4. TIP TOP AUTO MOBILE SDN. BHD. Tip Top Auto Mobile We also have research about another company which is Tip Top Auto Mobile. They are also selling second hand cars as similar to Carlist.my but with different revenue model. The revenue model that tip top auto mobile is using are sales model where they sell cars online and also buy cars online. Another revenue model used by Tip Top Auto Mobile is advertising model where sellers and buyers can advertise their cars and detail of the car with low cost in the website. Transaction model is also used as revenue model in their company, which is helping to sell a second hand car to second parties and receive commission or fees from the first parties who is owner of the car. They also always update current issue about cars in the website which make easier for the buyers and sellers to get knows of the price of second hand cars in market or other details about cars. Even Tip Top Auto Mobile has given space in website to write criteria of the car they want to buy or sell by the buyer or seller. Marketing techniques are used by Tip Top Auto Mobile is they give 20% discount for cars that used for 6 years, they also have social network which is facebook where seller or buyers can also connect to them and even people can easily will get knows about this company via facebook. Other than that, they advertised in magazines, news paper, even by telecasting in television. Buyers also can easily find the car they needed buy just clicking on the button “find car” in the Tip Top Auto Mobile website. Moreover, they also have website links to and from other websites and portals where sellers and buyers can easily connect by click on the links. They also provide email enquiry buttons and forms. Lastly, they also given protection as Carlist.my company, which is through PayTrade, buyer’s money is held by tradecarview securely until PayTrade confirm the shipment is completed and payment will be refunded if the vehicle of the buyer ordered is not shipped. Marketing techniques that we have suggested to improve their business are offering an irresistible free gift. This is one of the best ways to build their potential customer list. They will educate people about their value, provide them with helpful information, and begin to build a relationship. Type of gift that we can suggest are car accessories which make their buyers satisfied with their service and even buyers can introduce about the company to their friends and E2C CONSULTING CO. BERHAD Page 4
  • 5. TIP TOP AUTO MOBILE SDN. BHD. relative. Other than this, we also can suggest with a web promotion plan and an effective web design and development strategy to upgrade and to make their website more attractive. Lastly, Get ranked at the top in major search engines, and practice good search optimization techniques. These are the marketing techniques that we have suggested to Tip Top Auto Mobile. E2C CONSULTING CO. BERHAD Page 5
  • 6. TIP TOP AUTO MOBILE SDN. BHD. TASK 2 REVENUE MODEL E-Commerce revenue models specifically describe different techniques used in generating income from the publisher's websites. As the e-commerce progress, the traditional revenue model of sales is expanded to more variety of revenue options and e-commerce business model . One of the techniques that could be used in promoting new e-commerce site is through advertising. Through advertising, publishers could advertise and describe more details about the products or services that they sell and provide. In advertising their product, publishers have to be creative so that their advertising section could attract people to buy their product. Besides that, the information provided in the advertisement must be real so that customers would not feel as if they have been cheated. Subscriptions are also an appropriate way in promoting new e-commerce site. Subscriptions mean that customers must subscribe first so that they can get the latest information about the product of a company. Usually there are fees in subscribing a site. However, it depends on the publisher of the site to impose the fees or not. The publishers of an e-commerce site usually provided something or some gift to attract customers to subscribe them. Transaction is the way where customers could make payment through the website provided. By using this way, it would make easier for the customers. Actually, this transaction thing involved the third party. The publishers of the e-commerce website offer the third party to make it easier for customers to make their payment. Through this way, the publisher or the seller would gain more profit and the way of they doing business would be easier and efficient. However, the risk is customer’s trust. The last appropriate way in promoting e-commerce is of course, the goods that they sell. Products or services sells by the seller or publisher must in good condition and worth it. E2C CONSULTING CO. BERHAD Page 6
  • 7. TIP TOP AUTO MOBILE SDN. BHD. Logically, customers would not buy expensive things online. Thus, seller should have thought a creative way in selling things that people would buy and yet could give benefits to them. Besides, when selling things through online, the shipping process is a must. The sellers should always make sure that the shipping process went well without any problem. Whenever there are problems in that kind of situation, it could affect the brand name of the company and the customers trust towards them. No matter what we do, there must be and advantages and disadvantages on certain things. There are advantages to customers in using e-commerce site. First of all, customer’s time would not be wasted by visiting the shop that offers things that they want, they could just do it online and pay it online and just wait for their item to received. Besides that, by using e-commerce site, customers don’t need to worry or wondering either the shop they wanted to go is closed or what so on. By using e-commerce site, they can do it for 24 hours since the website would never closed. There are also varieties of products offered and they can compare things that they want easily just by clicking it. However, there are also some disadvantages. Customers trust to these e-commerce sites is low. They are not sure either it can be trusted or it’s illegal or not. Nowadays there are a lot of hacking stuff happens. Thus when customers wanted to pay things, they would think twice. To customers, it’s a risk in using e-commerce site. They could easily be cheated if they took the wrong step in trusting and evaluating sites. Another disadvantages to the customers is they would not know either the products offered is in a good condition or not. The quality of the product would also be questioned. It another risk to them to trust the site hundred percent. As for the conclusion, there are some revenue models that an e-commerce site must have. This could make the percentage rate of people clicking and using the site increase from day to day. The seller or the publisher must be creative in creating an attractive environment on the site. E2C CONSULTING CO. BERHAD Page 7
  • 8. TIP TOP AUTO MOBILE SDN. BHD. TASK 3 THE MARKETING PLAN E2C CONSULTING CO. BERHAD Page 8
  • 9. TIP TOP AUTO MOBILE SDN. BHD. E2C CONSULTING CO. BERHAD Page 9
  • 10. TIP TOP AUTO MOBILE SDN. BHD. E2C CONSULTING CO. BERHAD Page 10
  • 11. TIP TOP AUTO MOBILE SDN. BHD. E2C CONSULTING CO. BERHAD Page 11
  • 12. TIP TOP AUTO MOBILE SDN. BHD. E2C CONSULTING CO. BERHAD Page 12
  • 13. TIP TOP AUTO MOBILE SDN. BHD. E2C CONSULTING CO. BERHAD Page 13
  • 14. TIP TOP AUTO MOBILE SDN. BHD. E2C CONSULTING CO. BERHAD Page 14
  • 15. TIP TOP AUTO MOBILE SDN. BHD. E2C CONSULTING CO. BERHAD Page 15
  • 16. TIP TOP AUTO MOBILE SDN. BHD. TASK 4 Domain A domain name is an identification string that defines a realm of administrative autonomy, authority, or control in the Internet. Domain names are formed by the rules and procedures of the Domain Name System (DNS). Domain names are used in various networking contexts and application-specific naming and addressing purposes. In general, a domain name represents an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, a server computer hosting a web site, or the web site itself or any other service communicated via the Internet. Domain names are organized in subordinate levels (sub domains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TLDs), including the generic top-level domains (gTLDs), such as the prominent domains com, net and org, and the country code top-level domains (ccTLDs). Below these top-level domains in the DNS hierarchy are the second-level and third-level domain names that are typically open for reservation by end-users that wish to connect local area networks to the Internet, create other publicly accessible Internet resources or run web sites. The registration of these domain names is usually administered by domain name registrars who sell their services to the public. E2C CONSULTING CO. BERHAD Page 16
  • 17. TIP TOP AUTO MOBILE SDN. BHD. .(dot) gTLD ccTLD ) 250 COUNTRY CODE .GOV .INT .EDU .NET .COM .ORG .MIL Top-level domains The top-level domains such as .com and .net and .org are the highest level of domain names of the Internet. A top-level domain is also called a TLD. Top-level domains form the DNS root zone of the hierarchical Domain Name System. Every domain name ends in a top-level or first- level domain label. When the Domain Name System was created in the 1980s, the domain name space was divided into two main groups of domains.[4] The country code top-level domains (ccTLD) were primarily based on the two-character territory codes of ISO-3166 country abbreviations. In addition, a group of seven generic top-level domains (gTLD) was implemented which represented a set of categories of names and multi-organizations.[5] These were the domains GOV, EDU, COM, MIL, ORG, NET, and INT. E2C CONSULTING CO. BERHAD Page 17
  • 18. TIP TOP AUTO MOBILE SDN. BHD. During the growth of the Internet, it became desirable to create additional generic top-level domains. As of October 2009, there are 21 generic top-level domains and 250 two-letter country- code top-level domains.[6] In addition, the ARPA domain serves technical purposes in the infrastructure of the Domain Name System. During the 32nd International Public ICANN Meeting in Paris in 2008,[7] ICANN started a new process of TLD naming policy to take a "significant step forward on the introduction of new generic top-level domains." This program envisions the availability of many new or already proposed domains, as well a new application and implementation process.[8] Observers believed that the new rules could result in hundreds of new top-level domains to be registered.[9] An annotated list of top-level domains in the root zone database is published at the IANA website at http://www.iana.org/domains/root/db/ and a Wikipedia list exists. Second-level and lower level domains Below the top-level domains in the domain name hierarchy are the second-level domain (SLD) names. These are the names directly to the left of .com, .net, and the other top-level domains. As an example, in the domain example.co.uk, co is the second-level domain. Next are third-level domains, which are written immediately to the left of a second-level domain. There can be fourth- and fifth-level domains, and so on, with virtually no limitation. An example of an operational domain name with four levels of domain labels is www.sos.state.oh.us. The www preceding the domains is the host name of the World-Wide Web server. Each label is separated by a full stop (dot). 'sos' is said to be a sub-domain of 'state.oh.us', and 'state' a sub- domain of 'oh.us', etc. In general, sub domains are domains subordinate to their parent domain. An example of very deep levels of sub domain ordering are the IPv6 reverse resolution DNS zones, for an example which is using this formula, 1.0.0.0.0.0.0.0.0.0.0.0.0. 0.0.0.0.0.0.0.0.0.0.0.ip6.arpa, which is the reverse DNS resolution domain name for the IP address of a loopback interface, or the local host name. E2C CONSULTING CO. BERHAD Page 18
  • 19. TIP TOP AUTO MOBILE SDN. BHD. Second-level (or lower-level, depending on the established parent hierarchy) domain names are often created based on the name of a company (e.g., bbc.co.uk), product or service (e.g., gmail.com). Below these levels, the next domain name component has been used to designate a particular host server. Therefore, ftp.wikipedia.org might be an FTP server, www.wikipedia.org would be a World Wide Web server, and mail.wikipedia.org could be an email server, each intended to perform only the implied function. Modern technology allows multiple physical servers with either different (cf. load balancing) or even identical addresses (cf. anycast) to serve a single hostname or domain name, or multiple domain names to be served by a single computer. The latter is very popular in Web hosting service centers, where service providers host the websites of many organizations on just a few servers. The hierarchical DNS labels or components of domain names are separated in a fully qualified name by the full stop (dot, .). E2C CONSULTING CO. BERHAD Page 19
  • 20. TIP TOP AUTO MOBILE SDN. BHD. THE THREE IMPOTENTIAL DOMAIN NAMES .org The domain name org is a generic top-level domain (gTLD) of the Domain Name System (DNS) used in the Internet. The name is created from the word organization. The org domain was one of the original top-level domains, with com, edu, gov, mil and net, established in January 1985. It was originally intended for non-profit organizations or organizations of a non-commercial character that did not meet the requirements for other gTLDs. With the intention of selling second hand car mart using org as the domain for the site is a good way of selling. Most of the organization needs cars to run their business for the transportation purpose. So, it’s a good chance for this site to register under the org and make a lot of profit. Furthermore, registrations in the org are processed via accredited registrars worldwide. Anyone can register an org. Although org was recommended for non-commercial entities, there are no restrictions for registration. The org can also be use for commercial. The market is wide for our site to be recognized because the main focuses are to sell for all the organization out there. There is numerous number of buyers out there that are ready to buy cars and search for cars. It’s a new era of business, seller are not searching for buyers, but now the buyer are searching for sellers. But, it is determine on how a seller can attract their customer with the site they have created. The more attract the site, more buyers would be interested. It is highly recommended for our company to be choosing org as a domain for the site. .net The domain name net is derived from the word network. Indicating its originally intended purpose for organizations involved in networking technologies, such as Internet service providers and other infrastructure companies. However, restrictions were never enforced and the domain is now a general name space as the same as org,com,mil and others. It is still popular with network operators, and is often treated as an alternate to com. E2C CONSULTING CO. BERHAD Page 20
  • 21. TIP TOP AUTO MOBILE SDN. BHD. Net is one of the original top-level domains which have been created in January 1985. As of 2011, it is the third most popular top-level domain, after .com and .de. Net can also be use for the company domain site because the networking connects with a lot of sources and user that can make more viewers in short of time. It’s a good opportunity for our new site to be recognized as new comers. Networking is one of the important things in business to get more and more client. So, by using net as domain would be a good suggestion. As we all know, client is one of the asset, if we use it properly, the asset can make some profit. Even though, using net might be hard for business but, the market is extremely wide. The buyers are not from one area such as organization only as the buyer. It can be a person, company or organization as the buyers. .com (recommended) The domain name com is commonly use as the main search for everything’s nowadays. Its name is derived from the word commercial, indicating its original intended purpose for domains registered by commercial organizations. Registrations in com are processed via registrars accredited by ICANN. The registry accepts internationalized domain names. Although com domains were originally intended to designate commercial entities along with others such as government agencies or educational institutions have different top-level domains assigned to them. With the commercialization and popularization of the Internet, the com domain was opened to the public and quickly became the most common top-level domain for websites, email, and networking. People often use com as their search domain and com are well known by every internet users. By, advertising the company site in com domain will make it easy to be search. Many non-commercial sites and networks use com names to benefit from the perceived recognizability of a com domain. That is why, if the company were intend to commercialize their business, it would be recommended to use com as the domain. Furthermore, the registration statistics show varying popularity over the years. E2C CONSULTING CO. BERHAD Page 21
  • 22. TIP TOP AUTO MOBILE SDN. BHD. One of benefit we can get by registering com as domain is that we can control the area of our bussines because we can limited the user by using the country code as the second level of domain. So,if the last address is .my, the users in Malaysia know where access and search for the web. E2C CONSULTING CO. BERHAD Page 22
  • 23. TIP TOP AUTO MOBILE SDN. BHD. TASK 5 SECURITY THREATS The Internet serves as the electronic connection between buyers and sellers. The most important thing is about communication channel security is that the Internet was not designed to be secure. Nowadays, the Internet remains largely unchanged from its original, insecure state. Message packets on the Internet travel an unplanned path from a source node to a destination node. A packet passes through a number of intermediate computers on the network before reaching its final destination. The path can vary each time a packet is sent between the same source and destinations points. Because users cannot control the path and do not know where their packets have been, it is possible that Internet diary can be read the packets, alter them, or even delete them. That is, any message travelling on the Internet is subject to secrecy, integrity, and necessity threats. 1) Secrecy Threats Secrecy is the security threat that is most frequently mentioned in articles and the popular media. Closely linked to secrecy is privacy, which also receives a great deal of attention. Secrecy and privacy, though similar, are different issue. Secrecy is the prevention of unauthorized information disclosure. Privacy is the protection of individual rights to nondisclosure. Secrecy is a technical issue requiring sophisticated physical and logical mechanisms, whereas privacy protection is a legal matter. A classic example of the difference between secrecy and privacy is e-mail. One significant threat to electronic commerce is theft of sensitive or personal information, including credit card numbers, names and personal preferences. The same problems can occur in e-mail transmissions. Software applications called sniffer programs provide the means to record information that passes through a computer or router that is handling Internet traffic. Using a sniffer program is analogues to tapping a telephone line and recording a E2C CONSULTING CO. BERHAD Page 23
  • 24. TIP TOP AUTO MOBILE SDN. BHD. conversation. Sniffer programs can read e-mail messages and unencrypted Web client server message traffic, such as user logins, passwords, and credit card numbers. 2) Integrity Threats An integrity threats, also known as active wiretapping, exists when an unauthorized party can alter a message stream of information. Unprotected banking transactions, such as deposit amounts transmitted over the Internet, are subject to integrity violations. Integrity violations implies a secrecy violation because an intruder who alters information can read and interpret that information. Unlike secrecy threats, where a viewer simply sees information he or she should not, integrity threats can cause a change in the actions a person or corporation takes because a mission-critical transmission has been altered. Cyber vandalism is an example of an integrity violation. Cyber vandalism is the electronic defacing of an existing Web site’s page. The electronic equivalent of destroying property or placing graffiti on objects, cyber vandalism occurs whenever someone replaces a Web site’s regular content with his or her own content, recently, several cases of Webpage defacing involved vandals replacing business content with pornographic material and other offensive content. Masquerading or spoofing-pretending to be someone you are not, or representing a Web site as an original when it is a fake-is one means of disrupting Web sites. 3) Necessity Threats. The purpose of a necessity threat, which is usually as a delay, denial, or denial-of-service (DoS) attack, is to disrupt normal computer processing, or deny processing entirely. A computer that has experienced a necessity threats slows processing to an intolerably slow speed. For example, if the processing speed of a single ATM transaction slows from one or two seconds to 30 seconds, user will abandon ATMs entirely. Similarly, slowing any Internet service drives customers to competitor’ Web or commerce sites-possibly discouraging them from ever returning to the original commerce site. In the other words, slower processing can render a service unusable or unattractive. E2C CONSULTING CO. BERHAD Page 24
  • 25. TIP TOP AUTO MOBILE SDN. BHD. Attackers can use the botnets to launch a simultaneous attack on a Web site from all of the computers in the botnet. This form of attack is called distributed denial-of-service (DDoS) attack. DoS attacks can remove information altogether, or delete information from a transmission or file. One denial attack caused some PCs that have been Quicken installed to divert money to the perpetrator’s bank account. In other famous DoS attack against high-profile electronic commerce site such as Amazon.com, the attackers used a botnet to send a flood of data packets to the sites. This overwhelmed the sites’ servers and chocked off legitimate customers’ access. Prior to the attack, perpetrators located vulnerable computers and loaded them with the software that attacked the commerce sites. 4) Threats to Physical Security of Internet Communication Channel. The Internet was designed from its inception to withstand attacks on its physical communication links. The Internet’s packet-based network design precludes it from being shut down by an attack on a single communications link on that network. An individual user’s Internet service can be interrupted by destruction of that user’s link on the Internet. Few individual users have multiple connections to an ISP. However, larger companies and organizations often do have more than one link to the main backbone of the Internet. Typically, each link is purchased from a different network access provider can switch traffic to another network access provider’s link to keep the company, organization, or ISP connected to the Internet. E2C CONSULTING CO. BERHAD Page 25
  • 26. TIP TOP AUTO MOBILE SDN. BHD. COUNTERMEASURES Here are five key countermeasures that can be used to drive cyber security activities in industrial control system environments. 1. Security policies. Security policies should be developed for the control systems network and its individual components, but they should be reviewed periodically to incorporate the current threat environment, system functionality, and required level of security. 2. Blocking access to resources and services. This technique is generally employed on the network through the use of perimeter devices with access control lists such as firewalls or proxy servers. It can be enabled on the host via host-based firewalls and antivirus software. 3. Detecting malicious activity. Detection activities of malicious activity can be networked or host-based and usually require regular monitoring of log files by experienced administrators. IDS are the common means of identifying problems on a network, but can be deployed on individual hosts as well. Auditing and event logs should be enabled on individual hosts when possible. 4. Mitigating possible attacks. In many cases, vulnerability may have to be present because removal of the vulnerability may result in an inoperable or inefficient system. Mitigation allows administrators to control access to vulnerability in such a fashion that the vulnerability cannot be exploited. Enabling technical workarounds, establishing filters, or running services and applications with specific configurations can often do this. 5. Fixing core problems. The resolution of core security problems almost always requires updating, upgrading, or patching the software vulnerability or removing the vulnerable application. The software hole can reside in any of the three layers (networking, operating system, or application). When available, the mitigation should be provided by the vendor or developer for administrators to apply. E2C CONSULTING CO. BERHAD Page 26
  • 27. TIP TOP AUTO MOBILE SDN. BHD. IMPLICATION AND CONCLUSION Some clear implications can be extracted from the foregoing pages-consider some on them; 1. The used car market value is significantly large than the new car market at present and there are signs this may continue at least short terms. 2. The used car market can be analyzed in similar ways to the new car market and it is possible for dealers to develop inventory and marketing strategies to exploit the result of such analysis 3. Used car buyers expect to be treated as first-class citizens as such. The conclusion is that by using the e-marketing or e-commerce strategies, it may improve the market revenue of Tip Top Auto Mobile Company. As for the time being, this company uses magazines to promote their products and their profit increase. If e-commerce site for this company be introduced, their profit graph would show an increase in profits. Therefore, we suggest for Tip Top Auto Mobile to use our recommendation in e-marketing business so that they can increase the profit much more than previous year. E2C CONSULTING CO. BERHAD Page 27
  • 28. TIP TOP AUTO MOBILE SDN. BHD. REFERRENCE 1. http://www.marketingprofs.com/articles/2005/1482/how-to-formulate-marketing- messages 2. http://faculty.chicagobooth.edu/steven.kaplan/research/frame.pdf 3. http://www.marketing-made-simple.com/articles/marketing-plan.htm#axzz1pSKQ3XcD 4. http://www.biztree.com/Templates/Marketing-Plan.html 5. http://www.keyscouts.com/Online%20Marketing%20Plan%20-%20Bar- Ilan%20University.pdf 6. http://www.yudkin.com/sampleplan.htm 7. http://www.shahzadtc.com/pdf/SWOTTOWS.pdf 8. http://sbaloanbusinessplan.com/used-car-dealer-swot-analysis/ 9. http://www.matthewhoover.net/Portfolio_files/MGT%205391%20Strategy%20Project.pd f 10. http://www.rocketwatcher.com/blog/2010/05/7-key-elements-of-a-marketing-plan.html 11. http://www.arpapress.com/Volumes/Vol2Issue3/IJRRAS_2_3_13.pdf 12. http://www.wikipedia.com/domain 13. http://www.wikipedia.com/e-commerce 14. http://www.wikipedia.com/securitythreats 15. http://www.wikipedia.com/revenuemodel E2C CONSULTING CO. BERHAD Page 28