Tom’s T-Shirts One of the main goals of this course is to demonstrate how Internet, web features, and services support e-commerce and e-commerce presence. Using the provided proposal guidelines, review the following case study and develop a written proposal presenting solutions that would be appropriate to present to the company’s business owner. Tom’s T-shirts is brick and mortar retail shop that specializes in the sale and design of T-shirts. Tom’s T-shirts primarily buys its T-shirt inventory from wholesalers, but they also do some custom printing. One of Tom’s T-shirt services is to custom design and print T-shirts for corporations, non-profit organizations, and youth sports. Tom’s T-Shirts has had great success, and was named Small Business of the Year two out of the last five years in its local community. Knowing that there is a market for custom t-shirts, the owner Tom Smith has decided that he would like to expand his T-shirt shop business nationwide. Tom has decided that, rather than opening other physical retail stores, he wants to explore an e-commerce operation. You have known Tom for many years, and he has asked you to put together a business proposal to bring his e-commerce operation to life. Tom loves innovation and has deep pockets, so you will not be constrained with a budget….sky’s the limit! Project Proposal Guidelines: Make sure that the following features are present in your paper: Explain to the owner the unique features of e-commerce that will allow Tom’s T-shirts to expand to a nationwide market. Identify the market, the value proposition, and type of e-commerce channels that Tom’s T-shirts will utilize to get its e-commerce operation up and running. Outline the steps that the owner will need to take to develop an E-commerce presence. Define and explain what Internet, Web features, and services you will suggest incorporating into this e-commerce proposal. Describe to the owner the different types of social networks and on-line communities and their business models (how they make their money). Propose a traditional online marketing strategy and compare it to social-mobile-local marketing platforms. Describe basic concepts related to online security, privacy, and intellectual property as it relates to Tom’s T-Shirt’s website and e-commerce operation. The requirements below must be met for your paper to be accepted and graded: Write between 750-1000 words (approximately 3-4 pages) using Microsoft Word. Attempt APA style. Use the APA Resources in your course for guidance. Use font size 12 and 1″ margins. Include a cover page and reference page. At least 80% of your paper must be original content/writing. No more than 20% of your content/information may come from references. Use at least two references from outside the course material, preferably from EBSCOhost. The textbook, lectures, and other materials in the course may be used, but are not counted toward the two reference requirement. Reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) must be identified in the paper and listed on a reference page. Reference material must come from sources such as scholarly journals found in EBSCOhost, online newspapers such as The Wall Street Journal, government websites, etc. Sources such as Wikis, Yahoo Answers, eHow, etc. are not acceptable. Grading Criteria – AssignmentsMaximum Points Explain the unique features of e-commerce that will allow Tom’s T-shirts to expand nationwide. 12.5 Identify the market and the value proposition that Tom’s T-shirts will utilize to get its e-commerce operation up and running. 12.5 Identify the types of e-commerce channels that Tom’s T-shirts will utilize to get it’s e-commerce operation up and running. 12.5 Outline the steps that the owner will need to take to develop an e-commerce presence. 12.5 Define and explain what Internet, web features, and services you will suggest incorporating into this e-commerce proposal. 12.5 Describe to the owner the different types of social networks, online communities, and their business models. 12.5 Propose a traditional online marketing strategy and compare it to social-mobile-local marketing platforms. 12.5Describe basic concepts related to online security, privacy, and intellectual property as it relates to Tom’s T-shirt website and e-commerce operation.

    Tom’s T-Shirt Concourse

    Name

    Institution affiliations

    Tutor

             Date

    Project proposal

    Tom wants to observe a scant e traffic features control his calling to dilate earthwide. He should elect an e traffic nearness ubiquitous; beneficial everywhere at any space. It should be of global stretch to perfect his customers in the earth. Its technical standards should be disclosed to other e-traffic positions in the earth. He should conservation a nearness that perfectows interactivity betwixt the consumers and the merchants. The not attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributableice grant should be self-possessed and vile to discern. I would confide that Tom’s e-traffic position should perfectow customization, where the merchants target their clients by using their names, emails, and addresses (Laudon & Traver, 2013). It should to-boot perfectow the sellers to exexchange the consequence appraisements according to the consumer bearing. Instruction granted should be close and self-possessed to transmit and discern. He should conservation an e-traffic nearness that perfectows gregarious technology, where customers can yield feedtail and views encircling a consequence. This instruction procure bring-about Tom discern the client wants polite-behaved-behaved and competition with his emulators.

    Tom should unconcealed a calling statement with either AcceleratedPal or head that his customers procure conservation to accelerated control the consequence. His e-traffic tissueposition should perfectow control the companies negotiation using belief cards. It should be detain and adduce twinkling services. Tom should apprehobject his customers polite-behaved, and he should close that the e-traffic position should be unclosed to perfect his clients and emulators earthwide. His trafficing skill should be at par with other callinges in the earth (Laudon & Traver, 2013). The appraise sentence of Tom’s T-shirts Concourse should be of character and meliorate than that of the firm’s emulators. This procure bring-about the T-shirts Concourse relish perfect the benefits of the consequence. Tom should regular appraisement control his t-shirts carefully behind observeing the emulator appraisements. The appraisements should be affordable and inferior than the emulator’s appraisement. He should centre on accelerated grant and maintenance to customers. He should to-boot adduce a diversity of consequences control his customers to elect. The appraise sentence procure extension sales and incline multifarious customers into the calling earthwide. Toms; T-shirt calling is a calling to consumer (B2C) e-traffic utensil becaconservation he is selling T-Shirts to his customers instantly. This utensil procure bring-about Tom’s calling extension in sales in the competitive trafficplace.

    There are scant treads that Tom procure fulfil precedently developing the e-traffic nearnesss. Chief, Reexploration and skill. The message betwixt the tissue developers and the client should be disentangled. Tom and his developers want to discern polite-behaved-behaved the concourse, its target auditory, and the consequence. They want to discern the activity as a undiminished. They should brainstorm potential guide wards that the clients procure conservation into furnish the position and fix the at-once and easily. This tread is probing becaconservation it procure hinder you space and coin. If you do not attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable fulfil this tread, you controlce devastate coin and instrument trying to stretch the injustice customers, and the calling may ftotal in the object. Tread two should be planning. List down perfect the requirements of the e-traffic position, the landing page, the exploration page and the total of instruction you absence to discover to your customers. Ask yourself what the potential provisions the clients procure be using to furnish your consequence and shirk disclosed instruction whose exploration leads into not attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributablehing results are.

    Tread three is the instruction edifice. Observe the layout and navigation of your position. Tread control is the artifice. Develop and generate a administrative, customer-oriented artifice that captures your disgrace and centre. Tread Five is the edifice. The face and tail object programming should be tested control potential errors and third border tools integrated (Gefen & Straub, 2004). The decisive tread is travel and hurling. You want to actuate the position from a persomal server to a subsist hurl. Confirm perfect other measures chief and close everything works polite-behaved. Bring-about fast that the position leads to a purchasing resolution. The position should incorporate electronic postulates interexchange (EDI), inconstant traffic, internet trafficing, online negotiation processing, electronic funds transplant, automated postulates assemblage, and list skill plans. It should get an online traffic fix control calling to consumer utensil and to-boot consumer to consumer utensil. It should get a comments area control the clients to yield their views and feedback.

    Different types of gregarious networks and online communities enclose Facebook, YouTube, Instagram, Twitter, and LinkedIn. Facebook gets its wealth from advertising sales and to-boot control message sale from indirect consequence sales. The calling owns multifarious companies, and multifarious investors conservation Facebook control advertising their sales. It account wealths from conservationrs, spaceline, adverts, self-serve advertisements, and part economics.  It conservations conservationr driven calling example (Liben‐Nowell& Kleinberg, 2007). YouTube is a video-sharing tissueposition and a exploration engine. It sells the views that conservationrs bring-about to the video possessors. The past pictures are rendered on a video; the past YouTube bring-abouts coin. Advertisers accelerated control views and clicks. It to-boot bring-abouts coin from embedded advertisements. The YouTube calling example is advert5ising and non-ad-publisher-dependent wealth cause.

    Unwritten online trafficing is a closed trafficing skill occasion inconstant trafficing is an unconcealed plan inconstant-persomal trafficing is a true space plan, you do not attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable entertain to endure control a replication or control your sales to boost online. The results are spontaneous and beneficial 24/7. Unwritten trafficing is not attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable a true space plan. You entertain to endure control results to be processed and presented to you. Inconstant trafficing has a local demographic target occasion unwritten trafficing does not attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable. The online trafficing has a vast demographic target to its intended customers occasion unwritten trafficing lacks this skill.

    Tom’s T-shirt Concourse should get consumers protection, and separate instruction protection. The position should be easy from hackers and should answer-restraint control customers protection (Gefen & Straub, 2004). If the position is not attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable attributable detain control the clients, then the calling possessor controlce be prosecuted in a affect of code and could be jailed control violating this consumer fair. Tom should get questionable fairs, copyfair fairs, trafficmarks fairs, and traffic secrets fairs control his calling. His concourse is an subjective attribute and should be protected underneathneath those indelicate protection bodies.

    References

    Laudon, K. C., & Traver, C. G. (2013). E-commerce. Pearson.

    Gefen, D., & Straub, D. W. (2004). Consumer confidence in B2C e-Traffic and the significance of gregarious nearness: experiments in e-Products and e-Services. Omega, 32(6), 407-424.

    Liben‐Nowell, D., & Kleinberg, J. (2007). The link‐prediction problem control gregarious networks. journal of the Association control Instruction Science and Technology, 58(7), 1019-1031.