Design and Implementation of An Online Marketing Information Management System
Design and Implementation of An Online Marketing Information Management System
Design and Implementation of An Online Marketing Information Management System
net/publication/347840636
CITATIONS READS
0 4,008
1 author:
Ahmad Bafadhl
Umm Al-Qura University
1 PUBLICATION 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ahmad Bafadhl on 24 December 2020.
ABSTRACT
Online marketing, which is also referred to as internet marketing, involves the utilization of intelligent, interactive, and
virtual components for the advancement and promotion of business goods and business ventures on the internet. Recently,
web-based communication companies have contributed to the advancement and restructuration of major economic divisions
including marketing. Being financially-effective, flexible, adaptable and fast and enjoying an extraordinary global reach,
internet marketing has achieved various unimaginable incredible gains for businesses. However, this effective, new
technique additionally involves building an online marketing system.
In order to develop an online marketing system, a number of programming technologies must be studied and understood.
These include multi-tiered architecture, server and client side scripting techniques, implementation technologies such as
HTML, CSS and a Server side programming language (such as PHP) and relational databases. This is a project with the
objective to develop a basic online marketing system where business goods and ventures can advertise their goods and
business ventures and sell seamlessly.
4
II. REQUIREMENTS SPECIFICATIONS
The online
3. The system provides protection and marketing
safety information
1,3 Easy to system
Maintenance displays the
4. The system bears the pressure products in
an easy and
simple way
and provides
protection
and safety
A. FUNCTIONAL REQUIREMENTS
5
The system provides protection for buyers'
Registered User: (Customer. money, issues a purchase invoice for them, and
Administrator) keeps their information confidential
Login system (Username and Password)
4. The system bears the pressure
Customer
Fill the form (with the required Customer The system can bear a large number of users at
information one time, and the purchase, processing with it is
Display old orders and select one of the quick
them to display it items
C. POWER REQUIREMENTS
Start new orders and select required
product and quantity The final system shall be modular and easy to
Fill payment detail and sent order reconnect and reconnect parts of the system. The
Administrator application should be available at any time and
Display product details and add new serve the largest number of users at the same time
products
D. ENVIRONMENTAL REQUIREMENTS
Display category list and can add/modify
them There are no environmental requirements
Create, modify and display payment type
Register new administrator employees E. INTEGRITY REQUIREMENTS
(create user ID’s for the admin and
employees in-order to login) Whenever possible, system will prevent incorrect
Change current user password and after data from being introduced and shall protect itself
from accidental misuse. In the event of lost
login
integrity, complete system (and settings), data
Display customer orders and most recent current orders will be reloaded
Create, modify and display country from back-up source. This may be a manual
information process analogues to opening a previous copy of
a data after system has crashed.
B. PERFORMANCE REQUIREMENTS
F. SAFETY REQUIREMENTS
1. The system displays the products in an easy
and simple way Provide protection to the user, save user
information, issue an electronic purchase invoice
The system should display the products in an for him
easy, smooth and difficult way
The system works on Android system and Apple Analysis is an integral part of the development cycle of any
system, and there is a dedicated website for it system. The proposed new system will make use of files and
records in table’s prepared using database to store
information about everyday transaction. Having analysed the
3. The system provides protection and safety existing system, there is need for an alternative system; the
proposed system (electronic shopping system) will eliminate
the problems experienced in the existing system.
6
The proposed new system is design to enhance the following:
Convenience
Consistency of Data
Reliability
Increases Productivity
A. LEVEL 0 DIAGRAM
7
B. LEVEL 1 DIAGRAM
C. LEVEL 2 DIAGRAM
8
VI. CONCLUSION [14] www.cio.com/forums/erp/
[15] www.CRMMagazine.com,.
[16] www.CRMCommunity.com.
Designed a website and an app at the same [17] www.privacyalliance.org,
[18] www.supply-chain.org.
time that help with internet marketing. I did
this using programming, design, and
understanding control methods. The online
shopping system is more convenient than
manual shopping. The administrator of most
marketing companies will have full control
over the online shopping system as a
module for product registration, ordering
and online payment will be performed. We
do not know what the future holds for us in
terms of technologies and developments,
but we will try to develop and do what is
best for users and not to have the system
monopolize a specific area and help in
developing this area in all ways.
REFERENCES
[1] M. Rashid, M. W. Anwar, A. M. Khan, “Towards the Tools
Selection in Model Based System Engineering for Embedded
Systems - A Systematic Literature Review”, Journal of Systems and
Software, vol. 106, pp.150-163, May 2015.
[2] M. Rashid, M. Imran, A. R. Jafri, Turki Al-Somani, “Flexible
Architectures for Cryptographic Algorithms - A Systematic
Literature Review”, Journal of Circuits, Systems and Computers
(JCSC), vol. 28, No. 3, March 2019.
[3] M. Rashid, M. W. Anwar, A. M. Khan, “Identification of Trends for
Model Based Development of Embedded Systems”, 12th IEEE
International Symposium on Programming and Systems, pp. 1-8,
Algiers, Algeria, April 2015.
[4] M. Imran and M. Rashid, “Architectural Review of Polynomial
Bases Finite Field Multipliers Over GF(2m)”, 2017 IEEE
International Conference on Communication, Computing and Digital
Systems, pp. 331-336, Islamabad, Pakistan, March 2017.
[5] M. Rashid, M. Imran, A. R. Jafri, “Comparative analysis of flexible
cryptographic implementations”, 11th International Symposium on
Reconfigurable Communication-centric Systems-on-Chip, pp. 1-6,
Tallinn, Estonia, June 2016.
[6] M. Rashid, M. W. Anwar, “A systematic investigation of tools in
model based system engineering for embedded systems”, 11th IEEE
System of Systems Engineering Conference, pp. 1-6, Kongsberg,
Norway, June 2016.
[7] M. Rashid, M. Imran and A. R. Jafri, “Exploration of Hardware
Architectures for String Matching Algorithms in Network Intrusion
Detection Systems”, 11th ACM International Conference on
Advances in Information Technology, Bangkok, Thailand, pp. 1-7,
July 2020.
[8] Berry, M. J. A. and Linoff, G. (1997). Data Mining Techniques for
Marketing, Sales and Customer Support, New York: Wiley.
[9] Bidgoli, H. (1997). Modern Information Systems for Managers, San
Diego: Academic Press.
[10] Hansen, W, (2000). Internet Marketing, Cincinnati, Ohio: South-
Western Publishing.
[11] Kachur, R. (2000). Data Warehouse Management Handbook.
Paramus, N.J.: Prentice Hall.
[12] Khandpur, N. and Wevers, J. (1998). Sales Force Automation Using
Web Technologies. New York:Wiley.
[13] www.bg.geoplace.com
9