📚 Course Syllabus

Topic 1: Introduction to Electronic Marketing 17 hrs

Introduction to the Subject 1 hrs

In recent years, Information and Communication Technologies (ICTs) have evolved rapidly, transforming the way businesses conduct their activities (Wu and Hisa, 2008). They are introduced into organizations to optimize and support operational and business processes, which in turn boosts competitiveness and productivity. These technologies generate information in conjunction with platforms designed to facilitate the development and dissemination of knowledge, considered a key resource for economic activities (Tello, 2007).

In recent years, Information and Communication Technologies (ICTs) have developed rapidly, changing the way companies conduct their operations (Wu and Hisa, 2008). They are implemented in organizations to improve and support operational and business processes, thereby increasing competitiveness and productivity. These technologies generate information, along with platforms that support the development and dissemination of knowledge, an essential resource for economic activities (Tello, 2007).

Beyond the Internet, the infrastructure of many businesses has evolved toward digital, driven by the increasing intertwining of products, processes, and services. According to Bharadwaj et al. (2013, p. 471), digital technologies are 'fundamentally transforming business strategies, operational processes, enterprise capabilities, as well as products and services, and key relationships between firms in extended business networks.' For these authors, the role of ICT should be considered not only as a functional aspect of strategy, but aligned with the overall business strategy.

In this context, marketing is presented as an essential component of business strategy and has experienced rapid evolution in its application through the Internet and ICT (De Swaan Arons, Van den Driest and Weed, 2014).

Thus, digital marketing, also known as Internet marketing or electronic marketing, which refers to the use of ICT in marketing practice, becomes crucial for businesses, as it facilitates the approach to customers, allows them to understand them better, adds value to products, expands distribution channels and encourages increased sales (Chaffey and Smith, 2013).

1.1 Introduction to Electronic Marketing 1 hrs

In recent years, the theoretical concept of digital marketing has evolved comprehensively, exponentially, and also variably, with different types of digital marketing identified. Some organizations have worked on and communicated the need to achieve digital marketing without abandoning traditional marketing. Thus, business organizations are evolving their marketing strategies, especially as marketing usage and dynamism increase, creating challenges for those who lead or manage marketing departments. Furthermore, and in parallel, organizational strategic support has also evolved, and there are various types and methods for implementing it.

Digital Marketing encompasses all efforts to market our business's products or services online. Its main purpose is to connect with potential customers so that business objectives can be achieved.

Digital marketing uses various strategies to:

  • • Connect with the potential client.
  • • Attract him to the business.
  • • Convert them into a prospect (lead); that is, a client who shows interest in the solutions you can offer.
  • • Getting this potential client to become a real client.
  • • Build loyalty in new customers so they become repeat customers, or recommend you to other potential customers.

In this sense, digital marketing and strategic support go hand in hand to achieve the objectives to be fulfilled by the different organizations, since any topic related to organizational administration or business management is open to all possibilities and strategies that are developed under this scheme, both concepts seeming inseparable and generating an important binomial between those who use them as cutting-edge administrative tools.

One of the definitions of marketing that best fits current realities would be that of Monroy (2014), which states that marketing seeks to understand the market and all the needs and desires that may exist, so that through the development of plans and strategies with a logical sequence, not only are these needs met, but a value greater than expected is also delivered, allowing for the creation of profitable relationships with which, in return, sales items, profits and long-term customer value are obtained.

This definition is complemented very well by Lovett (2012), who explains that these desires are established by the society in which we live and the environment in which we develop and operate; that is, they are shaped by consumer culture. When these desires are within our economic reach, we can say that they become demands, which ultimately become the determining component of any company's revenue projection, since their profits are derived from them.

To complement the previous definitions, Pressman (2005) is cited, who states that any element of marketing must be focused on the customer, in devising different ways to win them over, retain them and gain their loyalty by delivering superior value in the products and services offered.

However, before these processes can be implemented, it is first necessary to understand how their needs and desires manifest themselves, and this requires a meticulous analysis of these factors. In marketing, there are forces that affect a company's behavior and can work against or in its favor. These forces require constant monitoring and control to prevent them from affecting the company's ability to serve its customers, with the goal of developing relationships that remain stable over the long term.

For all these reasons, a marketing manager must be attentive to the inherent changes in production systems, and regarding the profile of this person, the magazine Marketing Digital (2019) states that the marketing manager is someone who understands the masses and knows how to lead them, in order to work towards the efficient fulfillment of a task or goal. This is a professional with charisma in their personality, and who is additionally consistent in their actions and words, which is why they inspire security in their team. This is why these people become authentic leaders in their environments, companies and work teams, understanding this concept from the perspective of Fisher, Sharp & Richardson (1998), which coincides with Chiavenato (2007), Earls & Forsyth (1991), Hersey et al. (1998) and Pérez-López (1998) and Rodríguez-Ponce et al. (2016), in their view that the actions of leaders are normally reflected in the actions they perform in their companies and in social life itself, through external behaviors, the way they see life, the way they interact, and a series of congenital variables that in turn make them different from one another. It is also important to emphasize the need for these leaders to have highly developed competencies related to emotional intelligence, as pointed out by Goleman (2015) and Maxwell (2007).

In this regard, Robles-Francia et al. (2013) conclude that a charismatic marketing manager has a more affective, effective and efficient influence on the company in question, and that this is the driving force behind its development, arguing that “in order to predict which style of behavior will be more efficient, it is necessary to know the most relevant facets of the situation where digital marketing occurs. These approaches emphasize the importance of contextual factors, such as the nature of the task, the availability of human and material resources, organizational characteristics and the attributes of subordinates. They are theories based on the assumption that different behaviors and styles are effective under different situational conditions, and that there is no single, optimal behavior for all situations.”

CURRENT SITUATION OF THE DIGITAL MARKET

There are approximately 3.8 billion active social media users. Social media advertising spending increased by almost 30% in 2021 compared to 2020. Instagram helps at least 80% of its users make the decision to purchase a product or service. TikTok was the most downloaded app in the world in March 2021, with more than 115 million downloads. Around 75% of millennials watch videos on social media daily. Year after year, smartphones are consolidating as the devices of choice for searches, while desktop computers are increasingly falling in preference for performing this type of action. At least 28% of people who search for a local business through their smartphones make a purchase. When it comes to influencer marketing, micro-influencers are gaining increasing prominence.

During the third quarter of 2020, compared to the third quarter of 2019, the number of influencers using the #ad hashtag in their posts increased by 10.6%. Videos are the most used tool in content marketing, followed by blogs and infographics.

Globally, 70% of marketing professionals actively invest in content marketing. In Latin America, the percentage drops to 50%. However, the trend in the region is to invest increasingly in this type of marketing.

Today, despite the fact that we've been immersed in a digital world for several years, many companies still don't take full advantage of all the potential benefits this situation offers. Therefore, those who do can significantly advance their competitors.

1.2 Online marketing 1 hrs (8 hrs)

Online marketing, also known as digital marketing, consists of a set of strategies that use digital media to promote products or services.

Characteristics

  • Allows you to measure and personalize digital marketing in real time.
  • It is based on internet technologies and digital platforms.
  • It is essential to build brand presence and generate sales.
  • Includes content management, public relations, online reputation, customer service, and sales.

Advantages

  • Attract new customers and foster loyalty.
  • Improves brand visibility.
  • Facilitates interaction and closeness with customers.
  • It is flexible and adaptable, allowing control and correction in real time.

1.2.1 The online consumer 2 hrs

The digital consumer is a very demanding shopper who seeks more than just products. They want to buy experiences and feel unique and special. Therefore, brands face a very important challenge: satisfying consumers who are highly impacted by different digital channels with endless offers that aim to capture their attention and touch their emotions with unique advertising and very special experiences. Thus, brands today must seek out their best appeal and offer their customers something unique that will keep them coming back. Furthermore, these profiles highly value immediacy and, therefore, generally lack patience.

Therefore, there is no such thing as a digital consumer profile; rather, companies must differentiate between the characteristics of each to determine which one to focus on more closely. Consumers are divided based on their interest in a particular product or service. In this way, we will differentiate between the different consumers that exist in the digital age so you can understand the specific characteristics of each and how best to impact them, based on their characteristics.

No one is more important than the other, but it is important to differentiate them in order to understand the behaviors of each one.

Types of digital consumers:

  • Consumers addicted to current events and news
  • Consumer applicants
  • Enthusiastic Consumers
  • Trusted consumers

Consumers addicted to current events and news:

This type of profile uses social platforms as their primary source of information for both news and events. Therefore, they are users who consume various digital platforms, which is where we must be if we want to impact them and sell our products or services.

Consumer applicants:

These are those who request information and look for opportunities to find specific products. Thus, this isn't a profile interested in new content, but rather one seeking opinions and comments from consumers who have already purchased the product.

Let's say this type of digital consumer is pretty clear about what they want; they just need to decide where to buy it. They tend to be quite quick and impatient because they're very clear about wanting a product as soon as possible. If they don't love it, they'll abandon the website and look for the same product on a competitor's website.

Enthusiastic consumers:

These are those who seek to connect with people who share their interests. These are young people who value brands that try to connect with them and reach their emotions. Due to their age, they are very active consumers on social media, where brands undoubtedly need to be present to reach them. Recently, new platforms have emerged where Generation Z has a significant presence, such as TikTok and the recently created social network, Be Real.

Trusted consumers:

In this case, we're talking about consumers who have a close relationship with their family and friends—that is, their inner circle. They are very demanding and difficult consumers, as they tend to rely on what their friends and family say and the product recommendations they make.

Social consumers:

They're the ones who understand that social media is for friends and their close circle, but they don't mix it with the work world. That is, they don't have their coworkers on social media.

An online consumer is someone who regularly makes purchases online, from any location where the transaction can be made.

Just as the consumer profile has transformed, their behavior has also developed a number of distinctive attributes due to the countless changes in consumer habits and the way customers interact with brands.

Since we live in a technological environment that offers many facilities to users, we can observe some specific characteristics in digital consumer behavior:

  • It's more interactive.
  • It is more reactive.
  • He likes to share opinions and experiences.
  • He values ​​his time a lot and tends to abandon sites that take him a long time..
  • Look for benefits.
  • Knows and likes to compare products and services.

1.2.2 Most common segmentation bases for online markets 3 hrs

A market is made up of people and organizations with needs, money to spend, and the desire to spend it.

A company must deepen its knowledge of its market in order to adapt its offer and marketing strategy to its requirements.

Identifying and selecting market segments poses the problem of deciding the position the company wants to occupy in those markets, that is, choosing a positioning for its products.

One of the key factors in the success of products facing competitive markets is proper positioning.

What is market segmentation?

Market segmentation is a process that involves dividing the total market for a good or service into several smaller, internally homogeneous groups. The essence of segmentation is truly understanding consumers. One of the decisive elements of a company's success is its ability to properly segment its market.

This marketing technique allows us to generate different lists of clients with heterogeneous behaviors or characteristics.

Types of Market Segmentation

  • Geographic Segmentation: subdivision of markets based on their location.
  • Demographic Segmentation: It is used very frequently and is closely related to demand and is relatively easy to measure.
  • Psychographic Segmentation: It consists of examining attributes related to a person's thoughts, feelings and behaviors.
  • Behavioral segmentation: refers to product-related behavior, using variables such as the desired benefits of a product and the rate at which the consumer uses the product.

Marketing actions allow three basic strategies:

  • Undifferentiated Marketing: A single message and a single product presentation.
  • Differentiated Marketing: It requires a message (plan) and product tailored to each market segment, but with a product geared toward the entire market.

Concentrated or Focused Marketing:

Product and message solely oriented to one or more market segments, without seeking global marketing.

Marketing actions allow three basic strategies:

Segmentation characteristics

Segmentation requires that target customer groups meet a number of requirements:

  • Quantification
  • Accessibility
  • Homogeneity
  • Substantiality

Segmentation variables

Some variables are used to segregate, while others are used to aggregate. Among the former, segregation variables, are some of the most generic:

  • Demographics
  • Geographical
  • Socio-economic

1.2.3 Online Pricing Strategies 2 hrs

Online pricing strategies are planned approaches to setting the price of products or services online. The goal is to achieve financial and market goals and meet customer expectations.

Some online pricing strategies are:

  • Competition-based pricing: Set the price of products or services at the current market price.
  • Cost-based pricing: Set prices based on production costs.
  • Value-based pricing: Set the price based on the value the consumer assigns to the product.
  • Psychological price: Setting prices based on social influence, consumer emotions, and their associations between price and product features.
  • Dynamic pricing: Set prices dynamically based on demand and other factors.
  • Skimmed price: Setting a high price for a new product, which will then be lowered as the product loses relevance.
  • Line price: Select a limited number of prices at which a store can sell its merchandise.

When setting online prices, it's important to consider the balance between what customers are willing to pay and the revenue needed for the business to have positive cash flow.

According to various marketing experts, the main or most commonly used pricing strategies are the following:

Price Skimming Strategy:

According to Stanton, Etzel, and Walker, setting a relatively high initial price for a new product is called market skimming pricing.

Prestige Pricing Strategies:

According to Kerin, Berkowitz, Hartley, and Rudelius, the use of prestige pricing involves setting high prices so that quality- or status-conscious consumers are attracted to the product and purchase it.

Competition-Oriented Pricing Strategies:

In this pricing strategy, the focus is on what competitors are doing. According to Águeda Esteban Talaya, the following actions can be distinguished.

1.3 Online market research 2 hrs

Online market research is a technique for gathering market and consumer information via the internet. It can be used to understand your target audience and develop marketing strategies.

What is online market research?

Online Market Research is a research method in which the data collection process is conducted over the Internet.

Online market research can be qualitative or quantitative. Qualitative online tools include video ethnography and market research online communities (MROCs). Quantitative online methods include mobile and app surveys.

This research can evaluate the performance of a product or service and can allow companies to gain insight into consumer purchasing behavior. With the increasing use of the Internet, online research has become a popular tool among market research firms.

Online research can provide additional information about a buyer, such as their past purchasing history. Online research projects can be conducted by the company itself or by a contracted research firm.

Growth in online market research

In recent years, there has been a substantial increase in the number of registered home Internet users, which has made online shopping more popular.

As businesses have become more global and virtual, their target audiences have expanded far beyond any specific geographic location. A company can conduct an online survey, selecting respondents from around the world, in a less costly manner than through mail, telephone, or in-person interviews.

Advantages of online market research

Conducting online research can be a complex procedure and may require considerable expertise on the part of researchers to obtain accurate data.

Recruiting participants for online research can be difficult for several reasons. Recipients may be reluctant to participate in online research because they may fear that the privacy and confidentiality of their personal information will be violated. Since the researcher's identity cannot be fully verified, people may find it difficult to trust such research methods.

Researchers often present participants with monetary or non-monetary rewards for their participation. Participants may be wary of monetary compensation promised online.

What are online panels?

Another common practice for online surveys is the use of online panels. An online panel is a group of selected individuals who have agreed to participate in online research projects for a particular company at specific intervals over a period of time. These participants are selected through a screening process based on their demographics, lifestyles, and habits, and the research company typically rewards their efforts regularly.

Online dashboards can allow businesses to gain insight into how to build long-term relationships with their customers.

These panels can also allow customers to provide direct feedback on products and services without the potential reluctance that can occur in face-to-face interactions. Online panels can also mitigate the bias caused by peer pressure to agree on a particular point of view, a phenomenon that can occur in in-person panels.

Tools

  • Online surveys.
  • Online observation.
  • Focus group online.
  • Online communities.
  • Google Trends.
  • SurveyMonkey.
  • SEMrush.
  • Qualtrics.
  • Statista.
  • Google Analytics.

Steps to conduct online market research:

  • Define the objective of the research.
  • Use keywords to find out what users are searching for.
  • Read industry-related blogs.
  • Study the competition.
  • Conduct effective online surveys.
  • Plan the research process.

Research results

The results of online market research allow:

  • Identify opportunities.
  • Evaluate the competition.
  • Profile the client.
  • Optimize campaigns.

1.4 Definition of Electronic Commerce and Business 1 hrs

Online transactions that take place on mobile devices are known as mobile commerce or m-commerce. Business e-commerce is the buying and selling of products to large companies or organizations. M-commerce and business e-commerce are two examples of e-commerce.

E-commerce offers people the convenience of shopping from their computers, phones, tablets, and other devices. They visit websites, social media pages, and other virtual channels to find what they're looking for. Entrepreneurs, startups, small and medium-sized businesses, and large retailers can use e-commerce to reach customers around the world.

Selling online can be a company's sole source of income or it can be part of a multi-channel sales strategy. For example, a large retailer might adopt an online sales channel, or an entrepreneur might sell a small number of specialized handmade products through social media such as Facebook, Instagram, or Pinterest.

E-commerce takes many forms, as there are different ways to interact with online channels. For example, sellers and buyers exchange products and services through m-commerce, business-to-business commerce, and social selling destinations like Amazon Live.

These are some common business models:

  • B2C: Businesses sell to individual consumers, sometimes referred to as “end customers”.
  • B2B: Businesses sell to other businesses . Often, the buyer resells the products to the consumer.
  • C2B: Customers sell to businesses. C2B companies allow customers to sell to other businesses.
  • C2C: Consumers sell to other consumers. Businesses create online shopping destinations to connect customers.
  • B2G: Businesses sell to governments or government entities.
  • C2G: Consumers sell to governments or government entities.
  • G2B: Governments or government entities sell to businesses.
  • G2C: Governments or government entities sell to consumers.

Business models can also vary. You can make direct sales, offer subscriptions to customers, or make money through affiliate marketing and other methods.

What is an e-commerce website?

An e-commerce website is a virtual store where customers can find products, search for deals, and make purchases online. It facilitates the transaction between buyer and seller.

What is an e-commerce business?

An e-commerce business is a company that generates revenue by selling products or services online, or uses the internet to find potential customers. For example, you might sell software, clothing and accessories, household goods, or web design services. You can run an e-commerce business from a single website or through multiple online channels, such as social media and email.

Advantages of e-commerce

From the convenience of shopping from home to the wide variety of products available, the advantages of e-commerce are undeniable. In this section, we'll explore in detail how e-commerce has transformed the shopping experience and provided benefits to both businesses and consumers.

  • 1. Convenience and accessibility: One of the most obvious advantages of e-commerce is the convenience it offers consumers. With just a few clicks, users can access a wide range of products and services from the comfort of their homes or mobile devices. This accessibility eliminates geographic and time restrictions, allowing transactions to be conducted anytime, anywhere.
  • 2. Scalability and Expansion: E-commerce provides businesses with the ability to expand their reach and grow scalably without the need to invest in expensive physical infrastructure. Through online platforms, companies can reach a global audience, overcoming geographical limitations and maximizing their growth potential.
  • 3. Personalization and Segmentation: The ability to personalize the customer experience is one of the key advantages of e-commerce. Companies can use behavioral and preference data to offer tailored recommendations and promotions, increasing the relevance and effectiveness of their marketing strategies.
  • 4. Operational efficiency: E-commerce allows businesses to automate processes and reduce operating costs. From inventory management to payment processing, automating routine tasks streamlines business operations and improves overall efficiency.
  • 5. Greater geographic reach: Unlike physical stores, which are limited by their geographic location, e-commerce offers businesses the opportunity to reach customers worldwide. This ability to reach new markets expands growth potential and increases revenue diversification.
  • 6. Data analytics to improve customer experience: E-commerce provides a wealth of data on customer behavior and preferences. Businesses can use data analytics to better understand their audience, identify purchasing trends, and continuously improve the customer experience.

Disadvantages of e-commerce

Despite its numerous advantages, e-commerce also faces a number of challenges that must be addressed. From security concerns to the lack of human contact, these disadvantages raise questions about e-commerce.

  • 1. Lack of human contact: Unlike in-person transactions, e-commerce lacks direct human interaction between seller and customer. This lack of contact can make it difficult to build strong customer relationships and limit the ability to provide personalized service.
  • 2. Security concerns: As online transactions increase, so do concerns about data security and privacy. Consumers fear the theft of personal and financial information, which can undermine their trust in e-commerce platforms and reduce their propensity to shop online.
  • 3. Intense Competition: E-commerce has democratized market access, meaning barriers to entry are lower than ever. This has led to market saturation and fierce competition between companies, making it difficult for businesses to stand out and capture consumers' attention.
  • 4. Shipping and return costs: Despite the convenience, shipping and return costs can discourage consumers from shopping online. High shipping costs and complicated return policies can affect customer satisfaction and decrease conversion rates.
  • 5. Connectivity Dependence: E-commerce relies heavily on internet connectivity, which can be a challenge in areas with limited infrastructure or unstable connections. Lack of reliable internet access can limit businesses' reach and negatively impact customer experience.

Difference between e-commerce and e-business

E-business refers to digitally enabled transactions and processes within an organization, involving information systems under the organization's control. Additionally, e-business does not include commercial transactions that involve an exchange of value across organizational boundaries.

For example, an organization's online inventory control mechanism is a component of e-business, but such internal processes do not directly generate revenue for the organization (Laudon and Guercio Traver, 2017).

According to this, e-commerce consists of commercial transactions conducted over the Internet, while e-business uses information technology and information systems, seeking to improve processes and transactions within organizations. However, it should be noted that an organization's technological infrastructure is fundamental to both e-commerce and e-business.

Unique features of e-commerce

UBIQUITY. It refers to the fact that e-commerce is available anywhere and at any time of day, allowing consumers to purchase from a computer, a mobile device, at home, in their car, or wherever they happen to be. The result of this is a market space.

That is, the traditional boundaries of space and time are transcended. Ubiquity, therefore, reduces transaction costs and cognitive energy (Laudon and Guercio Traver, 2017).

GLOBAL REACH E-commerce technology enables commercial transactions across regional, national, and cultural boundaries. The potential market size for e-commerce is equal to the size of the global online population (Laudon and Guercio Traver, 2017).

UNIVERSAL STANDARDS: A striking feature of e-commerce is that the technical standards of the Internet, and therefore the technical standards used in e-commerce, are universal standards shared by all nations around the world. These standards have no cost; they simply need to be met. Therefore, market entry costs are lower, as are search costs. This allows for price discovery and network externalities (Laudon and Guercio Traver, 2017).

WEALTH. E-commerce has the potential to offer richer information because it allows for interactivity and tailors messages to the user's needs. An example of this is the role of virtual advisors.

Additionally, wealth enables the sale of more complex services and goods, which previously required face-to-face contact (such as financial and tourism services, for example) (Laudon and Guercio Traver, 2017).

INTERACTIVITY. Websites offer consumers spaces such as forums and social media platforms for sharing experiences with the services and products offered. This is the case with Like and Share buttons, which provide consumers with the opportunity to interact with the business and other consumers (Laudon and Guercio Traver, 2017).

PERSONALIZATION. In e-commerce, personalization can be viewed from two perspectives. The first is the targeting of marketing messages according to consumers' needs, interests, and previous purchases. The second perspective is the consumer's ability to personalize the product or service based on their preferences (Laudon and Guercio Traver, 2017).

SOCIAL TECHNOLOGY E-commerce allows users to create and share content with the web community. Using these forms of communication, users are able to create new social networks and strengthen existing ones (Laudon and Guercio Traver, 2017).

These spaces benefit organizations because they allow for interaction between them and consumers, allowing them to gain insights into their opinions and suggestions, which the organization can then use to improve and innovate products and services, among other things.

Types of e-commerce

E-commerce can take many forms depending on the degree of digitalization of the product, the purchase/sale process, and delivery. When the product, the purchase/sale process, and delivery are digital, it is referred to as pure e-commerce (Turban and Volonino, 2010). An example of pure e-commerce would be purchasing an e-book, paying electronically and generating a download link.

Partial e-commerce is when the product, the purchase/sale process, or the delivery process are not digital. For example, when a shirt is purchased from an online store, payment is made digitally, and delivery is via a shipping company. This is a clear example that illustrates that not the entire process is entirely digital.

1.5 Opportunities and risks of online business 2 hrs

E-commerce has created new ways of doing business, redesigned customer relationships and exchange mechanisms, and impacted the regional, national, and global environment. The primary opportunities for generating business via the Internet are:

Network space is used to share information. The system is not for profit; essentially, no products are sold.

OPPORTUNITIES:

  • The Internet is a communication channel
  • There is no editorial cost when posting information
  • It has no distribution cost
  • It has a pre-active, global and well-informed audience
  • It is interactive
  • It is continuously accessible globally.

RISKS:

Companies that fail to understand the Internet phenomenon will be swallowed up by their more savvy competitors or substitutes. As a commercial medium, the Web presents the following deficiencies derived from both its technology and its interactive nature.

Credit card fraud. Online credit card transactions are classified as card-not-present by credit card issuers.

This means that if a cardholder files a dispute alleging they haven't received an item, the business owner is responsible for refunding the funds, even if the item has already been shipped. In contrast, brick-and-mortar merchants require a signature on the receipt and rarely face accusations of fraudulent charges. Online sales carry the risk of having to cover fraudulent orders.

E-Commerce:

  • It has generated new ways of doing business.
  • It has transformed business relationships with customers and methods of exchange.
  • It has influenced the regional, national and global environment.

Benefit: It's easier to locate and reach customers. Few companies offer products that appeal to everyone. Most products are geared toward a specific market, such as teenagers, new mothers, or healthcare professionals. In particular, specialized markets, such as those who consume only raw foods, are known as niche markets.

Marketing to a specific market can be challenging and often involves targeting a large volume of people in the hopes of capturing the interest of a few buyers.

1.6 Important elements in the design of successful websites 2 hrs

Key elements of successful website design include navigation, visual identity, call to action, and mobile optimization.

Navigation

  • Navigation should be simple and easy to use.
  • Larger sites should have clear navigation, organized by categories.

Visual identity.

  • Visual identity encompasses the brand's colors, fonts, and logos.
  • The color palette should evoke emotions and establish a coherent atmosphere.

Call to action

  • Call-to-action (CTA) buttons direct visitors to take specific actions.

Mobile Optimization

  • The site must be compatible with all screen sizes.
  • Responsive design ensures an optimal experience on all devices.

Other essential elements

  • High-quality content
  • Good performance
  • High security
  • Relevant business information
  • Contact information
  • Social media presence
  • Reliable web hosting

DreamHost believes that web design is an art form, allowing for calculated and reversible risks.

In today's digital environment, having key elements in successful website design is essential for any business or professional who wants to stand out online. A website is no longer a luxury, but a necessity, as it generates trust, security, and visibility for both the brand and users.

When looking to purchase a product or service, buyers often conduct initial research online, which makes it easier to access firsthand information through our website.

However, the question arises: what are the essential elements of a successful web design that is secure and helps communicate and achieve the desired goals? In this blog, we'll delve into the fascinating world of effective web design and explore tips, tools, and platforms that will help you incorporate the key elements of a successful website.

Topic 2: Business Model in the Digital Economy 14 hrs

2.1 Introduction to business models 2 hrs

A digital business model focuses on the marketing of digital services and products, such as software, applications, online content, and more. Today, these business models have emerged as a constantly expanding trend, driven by the impact that technology has on the business world. In this article, we'll delve into what digital business models are and how they operate in today's market.

A digital business model is a business strategy that uses technology to create and deliver value to customers. Its popularity has grown due to the increasing use of the internet and the growing demand for digital services and products. Unlike traditional models, these focus on the sale of digital services and products, such as software, applications, and online content.

The main objective of digital business models is to establish a sustainable and scalable system that allows companies, regardless of their size, to maximize their reach and profitability. They also focus on implementing advanced technologies to automate processes and reduce costs, allowing them to offer more competitive prices.

What are digital business models?

Today, digital business models have become essential tools for companies seeking to innovate and adapt to an increasingly competitive market. A digital business model is defined as the way a company uses technology to generate value and generate profits. In other words, it is the strategy a company uses to create, deliver, and capture value through digital channels.

Freemium

One of the best-known digital models is 'freemium', which applies to applications and online services. This model consists of offering a free basic version of a service or application, while charging for additional features and enhancements. Additionally, some companies opt for a subscription model, where customers pay a monthly or annual fee to access exclusive content or services.

Asset Tokenization

Likewise, digital business models open the door to new opportunities. For example, many companies are adopting blockchain technology to develop business models focused on asset tokenization. This technology allows an asset or good to be converted into a digital token that can be transferred and verified on a blockchain.

A token is a digital unit of value that symbolizes an asset, such as a currency, stock certificate, real estate, or artwork, among others. This allows companies to develop new forms of financing and monetization, which is especially beneficial in sectors such as art and music.

Characteristics of digital business models

Digital business models have several characteristics that distinguish them from traditional models. Here are some of the main characteristics of digital models:

- Digitalization

Digital business models are based on technology and the digitalization of processes. Products and services are delivered through digital channels, and digital tools are used to manage and optimize these processes.

Digitalization is essential for the success of digital business models. Consumers today expect companies to offer easy, fast, and personalized user experiences.

By digitizing processes and services, companies can provide online solutions that are more accessible and convenient for customers.

- Scalability

Digital business models have the ability to scale rapidly in response to increased demand. This is because digital products and services can be replicated and distributed on a large scale without incurring significant additional costs.

Scalability is one of the most notable characteristics of digital business models, as it refers to a company's ability to grow and expand without a significant increase in fixed costs. In other words, the company can serve a growing number of customers without increasing its expenses proportionally.

In the digital environment, scalability takes on a significant importance due to the rapid growth and evolution of the market. Successful digital business models often face high demand in a short period of time, which means the company must be agile to meet this need without compromising profitability.

Furthermore, scalability is essential to maintaining competitiveness in the digital marketplace. Companies that scale quickly can capture greater market share and outperform their competitors. Furthermore, those with scalable business models are more attractive to investors, as their growth and profitability potential is high.

- Personalization

Digital business models facilitate greater customization of products and services, adapting them to customers' specific needs. This is achieved through the use of data and algorithms that analyze consumer behavior, allowing for the provision of tailored solutions.

Digital business models that don't consider personalization are missing out on a valuable opportunity to differentiate themselves in an increasingly competitive market. Customers expect personalized and relevant experiences; otherwise, they're likely to turn to competitors for options.

- Interconnection

Digital business models are interconnected with other digital systems and platforms, allowing them to offer complementary products and services through partnerships and collaborations.

Interconnectedness is essential to the success of these models. In an increasingly connected world, consumers crave a seamless shopping experience where they can interact with a brand across multiple channels and devices.

Therefore, digital business models must be designed to allow for the integration of different systems and technologies, ensuring effective communication between them.

Furthermore, it's essential because it enables companies to offer more comprehensive and satisfactory customer service. For example, customers can interact with a company through various channels, such as a mobile app, online chat, or social media. All of these channels are interconnected, allowing customers to start a conversation on one channel and continue it on another without having to repeat their question or information.

- Monetization

Finally, digital business models employ various monetization strategies, such as:

  • Advertising;
  • The sale of products and services;
  • Subscriptions;
  • The freemium model;
  • Among others.

These strategies allow companies to generate revenue from different sources and adapt to specific market and customer needs.

In short, digital business models are based on technology and the digitalization of processes, which allows them to be:

  • Scalable;
  • Customized;
  • Interconnected;
  • Agile;
  • And offer multiple monetization strategies.

These characteristics make them the ideal option for creating new businesses and the digital transformation of traditional companies.

2.2 Classification of business models 2 hrs (12 hrs)

Types of Digital Business Models

There are various digital business models that can be used to create and manage online businesses. Below are some of the most common models:

1. Online direct sales model: This model is based on offering products or services directly to the customer through an online store. The company handles the entire sales process, from website management to product or service delivery.

2. Online advertising model: This model focuses on generating revenue through digital advertising. The company can create its own website or social media platform and monetize it through paid ads, in addition to using advertising to promote products or services.

3. Subscription model: In this model, subscriptions are sold to access digital products or services. The company offers exclusive content, tools, applications, consulting, or any type of digital content to subscribers, who pay a monthly or annual fee.

4. Intermediary model: This model allows the company to act as an intermediary between the customer and the supplier of products or services. The company operates an online platform that connects customers with suppliers and charges a commission for each transaction made through it.

5. Licensing or franchising model: This involves selling licenses or franchises that allow others to use a technology, product, or brand. The company generates revenue through the sale of these licenses and may also earn royalties from the sale of products or services that use the technology or brand.

6. Collaborative economy model: This approach is based on collaboration between users to create value and generate revenue. The company develops an online platform that facilitates connections between suppliers and customers, benefiting from the transactions.

7. Ecosystem model: This involves creating a digital ecosystem where different companies and users can interact and offer their products and services. This approach seeks to generate value through collaboration and joint innovation. Examples of this model include Apple, Google, and Facebook.

This model encompasses the sharing economy, the circular economy, and the access economy, among others.

1. Freemium: Refers to a service that offers a free basic version of a product or service to attract users, who are then given the option to upgrade to a premium version with additional features for a fee. Examples of this model include Spotify, Dropbox, and LinkedIn.

2. Market model: this model facilitates the connection between supply and demand in a digital environment, where suppliers present their products or services to customers through a digital platform. Examples of this model include Airbnb, Amazon, and Uber.

2.2.1 Business to Business (B2B) 3 hrs

B2B is a business model that focuses on the services one company offers to another, with the goal of increasing sales of its products and goods. In other words, it's a commercial transaction between companies.

Unlike the B2C (Business-to-Consumer) model, which is aimed at the end customer, the B2B model is oriented toward the supplier of goods or the middle part of the marketing chain, which plays a crucial role in the effectiveness of a business.

An example of a B2B business would be a provider of web content to other companies, whether through blog posts, social media, or websites, seeking to improve brand visibility online.

Today, companies operating under this model have a significant opportunity to strengthen their position, thanks to easy access to information, the ability to manage administrative processes through various platforms, and effective communication with other members of the supply chain via a variety of channels.

What benefits does a B2B model bring?

In this context, it's essential to understand the importance of the B2B business model and the advantages it offers SMEs. Although a company can operate in both B2B and B2C, the former offers numerous advantages for your business.

Cost savings

One of the most significant advantages of the B2B model is the financial savings it can generate. By positively positioning your brand through B2B marketing, you avoid spending more resources than necessary on B2C marketing, which is focused on the target audience that could purchase your product or service.

Furthermore, B2B customers tend to base their purchases on specific needs for a broader group of people, rather than on emotional or impulsive decisions. While this may reduce the number of buyers, it allows resources to be channeled toward providing solutions that meet the specific needs of potential customers.

Digital agility

In today's digital age, technology makes it easier to build strong relationships with new customers and expand your market. One of the most notable benefits for SMEs is the opportunity to grow and reach new customers beyond their local area through B2B e-commerce. Having an online presence is essential for quickly accessing new markets, utilizing a B2B marketing strategy that includes SEO, online advertising, and content marketing. In this context, social media, websites, and networking platforms are essential.

Identity generation in the sector

In a global world where products, goods, and services are becoming increasingly similar, it's vital for your company to differentiate itself from the competition and build brand recognition. In this sense, B2B is valuable for defining a company's identity in its sector, increasing its recognition and visibility.

Higher profits

By implementing B2B in your SME, you'll notice a significant increase in sales. This model allows you to offer products in larger quantities, which improves your offering to buyers. Larger orders generate higher potential sales. Although the process may be slower compared to B2C due to the complexity of demand, over a period of six months or more, you can achieve higher sales volumes and, therefore, ensure the growth of your business.

Digital tools for B2B

Digital tools are essential for B2B growth, as they facilitate more efficient interaction between companies. Below are some of them, organized by category:

E-commerce

E-commerce refers to online commerce, encompassing the buying and selling of products, goods, and services on the web, including social media. But what are its benefits?

1. You can offer catalogs anytime, anywhere, updating them easily thanks to your B2B store..

2. Your customers will be able to place orders 24 hours a day, seven days a week, without restrictions..

You'll have the opportunity to internationalize your business, allowing your products to reach any country you want, while taking into account shipping costs and required procedures.

To develop your e-commerce effectively, here are some digital tools that can be of great help:

  • Salesforce: An on-demand software that delivers all the necessary B2B functionality through an online self-service system.
  • Google Analytics: A web analytics tool that provides information about funnels and channel statistics, allowing you to identify the most effective ones and how users interact with each one.
  • MailChimp: A comprehensive marketing platform that offers email marketing tools essential for e-commerce success.

Marketing B2B

To boost your sales within a B2B business model, you can leverage digital tools to support your digital marketing campaigns, thus ensuring the success of your company. Some of these tools include:

  • Wrike: A platform that improves campaign visibility, collaboration, and planning—three key aspects for automating administrative processes and organizing work into folders and tasks.
  • SEMrush: A powerful resource that combines various features to position a brand in the market. It offers a toolkit that includes tools for backlinks, web optimization, and strategies to increase organic traffic.
  • Leads Bridge: A tool that facilitates the creation of digital audiences based on specific marketing campaigns and tags, with the goal of achieving business success.

Process optimization

For the B2B model, integrating solutions that streamline processes and agreements between companies is crucial. One of these solutions is electronic signatures.

E-signatures improve the customer experience by modernizing and simplifying the process of signing contracts and other agreements. They are a fast, secure, and efficient method for closing deals and streamlining operations with customers and suppliers from anywhere.

This tool is used, for example, in the following sectors:

  • Online service subscriptions: allowing users to sign contracts from their computer or mobile device.
  • In-store sales: facilitating the signing of all types of contracts.
  • B2B distance selling: Once negotiations are concluded, the seller can send the agreement to the customer using an e-signature solution. The customer will receive a link via email or text message for quick and easy signing.

2.2.2 Business to Customers (B2C) 2 hrs

B2C, or Business to Consumer, refers to the commercial strategies designed by companies to connect directly with the customer or end consumer, satisfying their needs through the products or services they offer. In this sense, we can consider B2C a direct trade business model.

Although this type of business already existed before, it was the rise of the internet that enabled its development, as this digital platform facilitates the purchase and sale of products or services without intermediaries between the customer and the company.

B2C model

B2C strategies have been fundamental for companies that have made the transition to the digital world, modernizing their traditional business model into a more contemporary and profitable one. Within the B2C model, there are various submodels that help us understand its broad scope.

Some of the sales models are:

  • Direct seller: This is the most common model, where brands have digital stores and also distribute their products physically..
  • Intermediary seller: Refers to sellers or platforms that offer products or services without being the suppliers or manufacturers of the same.
  • Advertising-based: These sites attract a large volume of traffic to sell advertising, which in turn seeks to promote products or services to consumers. They use high-quality, free content to attract visitors, where they can also find ads.
  • Fee-based: These sites charge consumers a subscription fee to access a service or product. They often offer trial periods or limited monthly access as part of their marketing strategy.

Characteristics of B2C

As mentioned above, B2C is conducted between the company and the consumer, which means that all actions in this business relationship are focused on the end buyer. Unlike B2B, where business relationships are more rational, B2C is dominated by the emotional factor.

The internet offers every user a wide variety of options when choosing the product or service they wish to purchase. Generally, sales in the B2C market are more impulsive than logical, as customers tend to value the benefits and emotions generated by the product more than focusing on its objective features.

Advantages and disadvantages of B2C

As with everything, there are positive and negative aspects. Before you get discouraged, review the advantages and disadvantages of the B2C model to determine if it's right for you and your brand.

Advantages

  • Greater savings: This advantage applies especially to online stores, since compared to traditional brick-and-mortar stores, costs are significantly lower as they do not require hiring staff and have a lower sales tax burden.
  • More users: Because the Internet is accessible to everyone, it allows you to reach a greater number of potential customers who are looking for your product or service.
  • Greater control: The B2C model facilitates precise management of available inventory for sale, as well as giving you a clear view of what's in high demand and what's not.
  • Greater control: The B2C model allows you to precisely manage the inventory available for sale, as well as giving you a clear view of which products are in high demand and which are not.
  • More effective advertising: The era of flyers is over; today, digital advertising is much more effective than you imagine. There are techniques that provide exponential visibility to your website, allowing you to segment and expand your customer base.
  • Loyalty: Many brands seek to establish a strong bond with their customers, and this business model facilitates this. Communication becomes personalized and focuses on meeting the consumer's needs. If the brand succeeds in convincing the customer, they will remain loyal.

Disadvantages

  • Competition: Consumers can choose from multiple brands and opt for their favorite.
  • Distrust: Some people still prefer to purchase products or services in physical stores due to their distrust of online payment methods and their potential risks.
  • Shipping costs: This aspect impacts small businesses the most, as shipping costs can be higher compared to sales in physical stores.

B2C e-commerce

More and more companies are choosing to venture into the digital world, but it's not enough to have informative websites that describe your brand and what it offers. It's crucial to take advantage of the sales opportunities offered by e-commerce, considering the increasing number of people shopping online.

Examples of B2C Companies

Which brands do you buy most frequently? What factors led you to choose them? Many of your favorite brands use the B2C business model to reach their target audience, so it's no coincidence that you chose them; their strategy has surely convinced you that they're the best in their sector. Below, we present some of the most successful B2C companies worldwide: Spotify:

Understanding consumer habits is essential in B2C, and that's exactly what Spotify, the Swedish multiplatform music streaming service, has achieved. The vast amount of data generated by its users has allowed the company to personalize the content it offers.

2.2.3 Business to Government (B2G) 2 hrs

B2G, by definition, encompasses any commercial relationship between authorities and businesses via the Internet. This e-commerce model encompasses various commercial interactions, processes, and communications, such as public tenders, grants or subsidies, business financing, taxation, and others.

To facilitate processes for both companies and public authorities, B2G communication primarily takes place online. For companies, the rapid processing of requests is particularly attractive and promises greater efficiency. For example, forms can be downloaded directly or tax transfers can be made. B2G cooperation is often designed for long periods and is characterized by a high order volume. Therefore, it is essential to maintain smooth and efficient communication between both parties in this business relationship.

Characteristics:

  • Transparency in the development of calls and tenders.
  • Greater speed in the management of procedures.
  • The government can access the best prices and payment terms.
  • A single point of entry to the Government, meaning the government portal acts as a common gateway for all public services.
  • Customer focus, which involves understanding their needs and working to offer them comprehensive service.
  • Creation of a single exchange market, which seeks to unify the purchases of different state agencies for more efficient and transparent management.

Advantages

  • Collaborating with these companies provides a competitive advantage over others in the same sector, as the experience will generate greater customer confidence.
  • If the work experience is positive, these government institutions are likely to decide to commission new projects, thus ensuring a lasting working relationship.

This business model is very stable and generates a significant amount of profit.

Disadvantages

  • Working with these types of organizations can be complicated: bureaucracy and budgets don't always align with business interests, making it difficult to reach satisfactory agreements.
  • The government often acts slowly and not always as efficiently as businesses expect. Patience is essential to establishing a productive and positive relationship.
  • This business model is considerably more complex than other business models, as it involves complying with various laws and business conditions that must be overseen by government agencies.

2.2.4 Current trends 3 hrs

Current Trends in the Digital Economy The primary function of marketing in a company is to focus the company on customer needs. Therefore, this is a crucial moment to evaluate the past, present, and future trends affecting this area. Marketing experts must reconsider their objectives and create new strategies that allow them to adapt to this new era.

Current trends include:

  • Mobile and Multi-Screen Consumers
  • Experiential Marketing
  • Interactive Marketing
  • Big Data
  • Retargeting
  • Green Marketing
  • Content Marketing
  • Storytelling
  • Gamification
  • Neuromarketing

Mobile and Multi-Screen Consumers

Mobile and multi-screen consumers are those who use multiple electronic devices simultaneously or sequentially.

Characteristics of mobile consumers:

  • They value immediacy and localization.
  • They seek information about products and services to make purchasing decisions.
  • They prefer mobile phones for their convenience and ease of use.
  • They demand that companies implement strategies focused on mobile use.

Characteristics of multi-screen consumers:

  • They use multiple devices at the same time or sequentially.
  • They know the advantages of each device and understand that together they enhance their experience.
  • They perform several activities simultaneously.
  • They use mobile phones, tablets and laptops.

Use of devices

  • The smartphone is the most common starting point for online activities.
  • Television is an important catalyst for search.
  • The most common sequential use begins on the mobile and ends on the PC.
  • Simultaneous screen use includes email, internet browsing, and social media.

Experimental Marketing

Experiential marketing is a marketing strategy that seeks to create memorable experiences for customers. The goal is to generate emotions and sensations that connect with consumers in creative and profound ways.

Characteristics

  • It focuses on the customer.
  • It goes beyond offering a product or service.
  • It involves consumers on an emotional and sensory level.
  • Stimulates the senses of consumers
  • Create emotional bonds between brands and consumers.

Benefits

  • Increased conversion possibilities
  • Fostering long-lasting and sustainable relationships
  • Generating brand ambassadors

Implementation

  • Develop experiences aligned with the established plan
  • Ensure that every aspect of the activity is executed correctly

Comply with all the details to ensure a flawless experience for participants

Interactive Marketing

Interactive marketing is the process by which brands use videos, comments, images, infographics, games, blogs, emails, social media, audio, and other formats to establish a two-way dialogue with consumers.

While traditional marketing used to be a one-way communication between brands and consumers, interactive marketing transforms this dynamic into a two-way exchange that engages both parties. Instead of audiences simply receiving a brand's message, interactive marketing gives them the opportunity to participate in the conversation and actively engage with brands through collaborative experiences.

Types of interactive marketing:

What's exciting for both advertisers and consumers is that interactive marketing can take a variety of forms. Brands have the opportunity to be creative and demonstrate consumer interest through different content formats at different stages of the buying process. Some examples of interactive marketing include email, video, audio, live streaming, and more.

Email

One of the earliest forms of interactive marketing is email, which allows brands to communicate directly with consumers who have opted in. Through messages that encourage conversation or inform about available products, brands can share interactive content such as surveys, live shopping carts, infographics, requests for customer feedback, games, quizzes, and much more.

Video

Brands use video marketing to engage audiences, inviting them to comment, subscribe, or interact with a call to action (CTA).

Video can also be used in creative ways, such as in clickable messages on tablets or through augmented reality experiences that allow audiences to interact with products. With Amazon Ads interactive video ads, advertisers can include calls to action, such as 'Add to Cart' and 'Get an Email,' directly within streaming TV ads.

Live broadcast

Brands have the opportunity to connect with their audiences in real time through live streaming services. Whether through live events or collaborations with influencers, live streaming allows brands to establish real-time, two-way connections with their audiences.

Big Data

Big Data Marketing refers to the application of data analysis techniques to manage large volumes of information. Its purpose is to obtain insights that allow companies to make strategic decisions.

It's quite clear that this new environment, where everything is interconnected, presents a huge opportunity for businesses. There are more ways to communicate with customers without having to directly interfere with their browsing, which in turn provides businesses with a wealth of information through sales, forms, or their own online activity.

Big Data Marketing refers to the processing of large volumes of data in real time, allowing companies to analyze crucial aspects, such as consumer behavior, interests, identities, and more, in order to develop effective attraction strategies.

Big Data has become the most powerful tool marketers can employ in their campaigns and strategies. Below is a list of ways to apply Big Data in Marketing:

  • Design personalized marketing strategies: develop communication plans tailored to our clients, taking into account their preferences, geographic location, and all relevant information.
  • Gain more precise business insights: In the past, companies operated with Excel spreadsheets that collected data and distributed it to all departments. Today, Big Data makes it possible to establish a unified data structure, preventing the loss of information between departments.
  • Assisting with customer segmentation: Previously, we analyzed customers and classified them based on their characteristics. We implemented strategies that were evaluated over months, comparing initial and final results. Today, we can observe customer evolution weekly and monthly, allowing us to adjust strategies in real time.
  • Identify sales opportunities: Segmentation allows us to more closely observe how customers change. This allows us to identify business opportunities based on their behavior, such as identifying which products a customer has viewed or purchased and recommending similar or complementary items.
  • Make better decisions in real time: If I put a product on sale at a specific time and place, with the use of Big Data and real-time analytics, we can observe how that product is selling and make decisions based on the results.
  • Detect and prevent customer churn: We can analyze customer behavior patterns to identify signs that indicate they might abandon their purchase or, conversely, complete it.
  • To identify and prevent customer churn: We can analyze behavioral patterns that help us predict whether a customer will abandon or complete their purchase.
  • To detect fraud: Similarly, it's possible to observe how people make payments and determine where we're vulnerable in terms of security.
  • Market trend tracking: Through data, we can understand how people feel about our brand, whether positively or negatively.
  • In planning and forecasting: we'll be able to predict business performance more accurately. Thanks to the vast amount of data, we'll have more accurate planning.
  • To improve cost analysis: This is directly related to the above. Better forecasting and planning will give us a clearer view of the costs involved.

Retargeting

Retargeting (also known as 'remarketing,' a term Google uses on its advertising platform) is a digital marketing technique that focuses on re-engaging with users who have already interacted with our brand. The most common case is users who have visited our website, but it's not the only option; we can also remarket to those who have opened our emails, for example.

These impacts can occur through different channels, such as:

1. Display advertising. When browsing certain pages, users may see our brand banners, possibly with personalized messages based on the products or services they are interested in.

2. Social media ads. Social media advertising platforms, such as Facebook Ads, allow us to use available user information to target ads only to those who have previously interacted with our brand.

3. Email marketing. For example, through personalized emails for users who have left an incomplete purchase.

For brands, this strategy offers numerous advantages:

  • A high return on investment (ROI), given that the campaigns target a limited but potentially highly engaged audience. According to some estimates, the ROI for these campaigns is around 300%.
  • Opportunity to develop highly targeted branding, as we deepen the brand knowledge of users who have already interacted with us.
  • Extensive targeting possibilities, allowing you to target ads based on specific user behaviors.
  • Reinforcement at each stage of the conversion funnel, since we have the ability to impact the user multiple times throughout their journey.

For retargeting to work effectively, it's essential to keep two elements in mind and properly configured: cookies and lists.

Cookies are small pieces of information that a website sends and that are stored in the user's browser, allowing the site to review the user's previous activity.

However, storing cookies in the browser entails certain limitations that prevent us from accessing all of a user's information: the user may use different browsers (or multiple users may share the same one), switch between desktop and mobile devices, or delete cookies for various reasons.

Currently, significant progress is being made to overcome these limitations and facilitate effective advertising across multiple devices. Retargeting lists, on the other hand, are groups of users classified according to their behavior. For example, we can create lists for those who have visited the website in the last 30 days, who have spent more than a certain amount of time on the site, who have completed a form, or who have accessed a specific page within the website. With these lists, we can further segment and refine our remarketing strategy.

Tips for effective retargeting

  • 1. Segment your campaigns appropriately. As we mentioned, retargeting lists allow us to differentiate between various types of users, rather than simply targeting everyone who has ever visited our site. Therefore, each list we create should have a specific landing page and creatives designed to achieve maximum impact.
  • 2. Choose the right landing page. Landing pages are essential for conversion, yet many brands still don't give them the attention they deserve.
  • 3. You need to create landing pages specific to each objective and make sure they are as clear and direct as possible.
  • 4. Limit the frequency and duration of your campaigns. One of the risks of retargeting is boring users who have already decided not to buy from you, or even pressuring undecided users, which could cause them to abandon your campaign. To avoid this, it's essential to pay attention to frequency limits (the maximum number of times a user can view your campaign per day) and duration limits (the number of days a specific campaign will run).
  • 5. Conduct A/B tests. Just like in marketing, optimizing your remarketing campaigns involves testing, but always do it intelligently. Instead of just trial and error, I recommend designing A/B tests from the start. In these tests, you'll evaluate different elements, such as ad creative or landing pages. The idea is to focus on a single element and compare two versions with similar traffic.
  • 6. Use the right tools to measure. Measuring the results of remarketing campaigns can be quite complicated, especially as more channels are added. With tools like Google Attribution, we can evaluate the impact of each touchpoint across multiple channels and devices, ensuring we're tracking what's really working.

Green Marketing

Green marketing, also known as eco-friendly marketing, refers to commercial strategies focused on selling products that are environmentally friendly or reduce their negative impact on the environment. This type of marketing is gaining popularity among companies as it aligns with contemporary trends and values.

This movement stems from growing public concern and demand for policies that respect the environment around us. According to data from the CIS (National Institute of Statistics and Census), Spanish society's interest in environmental issues has increased over the past twenty years.

More than 75% of citizens have expressed interest in ecology and concern for the environment. Today, many people are more committed to sustainability and ethical policies that seek to protect their health and improve their quality of life.

Green marketing focuses on marketing strategies that promote environmentally friendly products or minimize negative environmental impact, and is increasingly being adopted by companies given its alignment with current trends.

This movement stems from people's concerns and worries, as well as the growing demand for policies that respect our environment. According to data from the CIS (Spanish National Statistics Institute), Spanish society's interest in environmental issues has increased over the last twenty years. More than 75% of citizens have expressed interest in ecology and concern for the environment. Today, many people are more committed to environmental protection and support ethical policies that seek to improve their health and quality of life.

Advantages of green marketing

This type of marketing benefits companies by attracting new customers who prefer healthier and less polluting products—green products. It also contributes to improving brand positioning, as these products and services are perceived as higher quality. Some of the main advantages of implementing green marketing in a marketing or communications strategy are the following:

  • 1. Greater control over the generation of polluting agents: It encourages responsible consumption and allows for more effective control over substances that cause air pollution, including gaseous, liquid, and solid agents.
  • 2. Use of less polluting materials: It reduces the negative impact on the environment, as it encourages the use of eco-friendly materials that do not harm the planet.
  • 3. New environmentally conscious audience segments: It facilitates access to new consumer groups who are aware of current problems and the need to make changes in production processes and communication strategies. This concept offers multiple alternatives for its development.
  • 4. Improve brand image: By adopting an innovative approach and demonstrating a commitment to environmental protection, many customers perceive the company differently. This serves to demonstrate that the products offered do not harm either the environment or human health, which enhances the brand's value. Furthermore, investors, shareholders, and other stakeholders will have a more positive perception of the company, which can improve deals and the overall business. Numerous financial benefits can be achieved. To achieve this, it is essential to maintain transparency and carry out authentic campaigns.
  • 5. Improved positioning: By embracing social responsibility, many consumers begin to perceive the product as superior to that of the competition. This can lead to positioning in higher-quality categories and, moreover, with the eco-label, which represents a competitive advantage. Green marketing is not just a fad; it is a commitment to the environment and a promise of sustainability for future generations.
  • 6. Innovation: Adopting green marketing is a way to transform the business model, making it easier to gain more support. Choosing a green approach allows for innovation in various areas of the company and offers more creative solutions, as well as exploring new paths at the social and technological levels.
  • 7. Customer loyalty: Consumers who identify with green values ​​tend to show greater loyalty to brands that share their vision. By implementing sustainable practices, companies can strengthen their relationships with customers, creating a more loyal and engaged consumer base over the long term.
  • 8. Cost Reduction: Green marketing not only involves promoting eco-friendly products but also optimizing processes to increase efficiency. Implementing sustainable practices such as recycling, using renewable energy, and minimizing waste can lead to a significant reduction in operating costs.
  • 9. Regulatory Compliance: Environmental regulations are becoming increasingly stringent in many countries. Adopting green marketing practices allows companies to comply with current regulations and prepare for future regulations, thus avoiding fines and penalties.
  • 10. Competitive Advantage: In a saturated market, companies that implement green marketing can stand out from the competition. Consumers are increasingly aware and seek environmentally friendly products, which can decisively influence their purchasing choices.
  • 11. Attracting talent: Employees, especially younger generations, prefer to work for companies that demonstrate a commitment to social and environmental responsibility. Adopting a green marketing strategy can attract highly qualified professionals who share these values, which in turn can enrich the company's culture and performance.
  • 12. Promoting community health and well-being: By reducing pollution and promoting healthier products, companies can contribute to the overall well-being of the community. This not only improves the company's image but also creates a healthier and more productive environment for employees and customers.
  • 13. Increasing transparency and trust: Companies that engage in green marketing tend to be more transparent about their processes and practices. This clarity strengthens the trust of consumers and other stakeholders, fostering more open and honest relationships.
  • 14. Accessing new markets: Eco-friendly and sustainable products are in growing demand in the global marketplace. Adopting a green marketing strategy can open up new opportunities in international markets that value and seek environmentally friendly products and services.
  • 15. Risk minimization: Companies that implement sustainable practices reduce their dependence on scarce resources that are susceptible to changes in global policies and markets. This helps reduce risks related to price volatility and raw material availability.
  • 16. Strengthening business resilience: Adopting sustainable practices can make businesses more resilient to environmental and economic challenges, enabling them to better adapt to market changes and adverse climate conditions.

Content Marketing

Content marketing is a strategy that focuses on creating and sharing content to attract and retain a specific audience.

Goals:

  • Generate profitable customer actions
  • Build lasting relationships with consumers
  • Improve brand recognition
  • Build customer trust

Content:

  • Blog posts
  • Videos
  • Ebooks
  • White papers and solutions
  • Posts, tweets, and social media updates
  • Newsletters
  • Corporate magazines
  • Podcasts

Process:

  • Define the target audience
  • Understand the needs and characteristics of the people and groups you are targeting
  • Create relevant and valuable content
  • Distribute the content on platforms such as social media, websites, and advertisements

Advantages:

  • Fosters emotional connections between customers and brands
  • Increases customer lifetime value (LTV)
  • Generates referrals.
  • Promotes repeat sales.
  • Reduces churn rates

Key Elements of Content Marketing

Content marketing is based on three fundamental activities:

1. Content Creation: This is the process of generating engaging content for your audience. It could be a blog post, a video tutorial, a white paper, or even a series of social media posts. The key is to focus on quality and relevance: your content should solve a problem, answer a question, or offer new insights.

2. Content Distribution: Once your content is created, it's critical to ensure it reaches your target audience. This is achieved by sharing it through various channels, such as websites, email newsletters, social media, and posts on external platforms.

3. Content Engagement: Interaction is essential for building relationships and gaining valuable feedback that can guide future content strategies. The key is to encourage engagement. Whether through comments, shares, likes, or direct replies, your content should inspire your audience to take action.

Why is content marketing crucial?

To understand the impact of content marketing, it's essential to recognize its key benefits. Below are the reasons why content marketing is vital for your business:

1. Consumer Preferences: Today's consumers are fatigued with traditional advertising. They're looking for content that informs, solves problems, or entertains. Content marketing provides just that, building stronger relationships by offering value rather than hard selling.

2. Brand Visibility and Trust: Consistently generating high-quality content increases your brand recognition and credibility. When your audience repeatedly finds your content useful, your brand becomes their go-to source, establishing lasting trust.

3. Lead Generation and Conversion: Content marketing not only attracts attention but also transforms it into leads and, over time, customers. By guiding prospects through the buying process with relevant content, you increase the likelihood of converting them into customers.

4. Cost-Effectiveness: Content marketing proves to be a cost-effective investment. It generates more sales opportunities at a lower cost compared to traditional methods. Furthermore, once created, content continues to provide value over time, making it a smart decision in an environment where budgets are increasingly focused on content. Common Types of Content Marketing. Understanding the different types of content marketing is essential to developing a comprehensive strategy. Each type has unique characteristics that can help you reach and connect with your target audience.

5. Blog Posts: Blog posts are fundamental to content marketing. They provide an effective way to generate traffic, capture leads, and establish authority in your industry.

Benefits of Blog Posts:

  • SEO: Regular, keyword-rich blog posts can significantly improve your website's search engine rankings. Sites with active blogs have 434% more indexed pages and 97% more inbound links, making it easier for potential customers to find you.
  • Lead Generation: Businesses that maintain active blogs generate 67% more leads each month, reflecting the direct impact blogging can have on their business results.
  • Thought leadership: Blogging allows you to establish your brand as an authority in your industry, which helps build trust and credibility with your audience.
  • Interaction: Blogs encourage comments, shares, and interaction, which contribute to audience loyalty. Companies with an active blog can engage more effectively with their audiences, strengthening connections.

To achieve the best results, it's essential to maintain a regular publishing schedule, prioritize high-quality content, and enhance your posts with visual elements such as images and infographics to engage your readers. Consider enrolling in the Digital Marketing Copywriting program, running from January 15 to February 26, 2025, to hone your writing skills and create more engaging blog posts. This program offers advanced writing techniques tailored to various digital platforms, which can help you improve your content.

Video Content

Video content stands out as one of the most engaging and versatile formats, becoming a key element of any content marketing strategy. Currently, 91% of content marketers use video as a fundamental tool, and nearly 78% plan to increase their video production by 2024. From dynamic shorts to long-form tutorials, videos are ideal for capturing attention and conveying complex ideas.

Benefits of Video Content:

  • High Engagement: Video content is known for quickly capturing and maintaining viewer attention, making it a powerful tool for encouraging engagement.
  • Versatility: Videos can be easily shared across various platforms, such as YouTube, social media, and your website, expanding your visibility.
  • Enhanced Storytelling: By combining visual and audio elements, videos offer a dynamic way to tell captivating brand stories that resonate with audiences.
  • Increased brand awareness: 90% of video marketers say video has significantly increased their brand awareness, cementing it as a key tool for visibility.
  • Improved understanding: 88% of video marketers say videos have improved user understanding of their product or service, which is essential for guiding potential customers through the buying process.

To maximize the impact of your video content, focus on creating short, engaging videos, especially for social media. Ensure high production quality, paying attention to lighting, audio, and editing. Also, always include clear calls to action to direct viewers to the next steps.

Topic 3: Integration technologies 16 hrs

3.1 Internet 3 hrs

The Internet is a vast network of globally interconnected computers that facilitates the exchange of information. It consists of a set of devices that communicate with each other using a common language.

The term 'Internet' refers to a vast worldwide network of computers linked by various types of connections, such as satellites, radio, or submarine cables. This global network enables the exchange of information and has several characteristics: it is inexpensive, accessible, easy to use, popular, and generates employment for many people. The notion of a computer network is as old as computing itself. Essentially, a network consists of two or more connected devices, allowing people to communicate and share resources such as printers, files, and even databases. By being interconnected, computers increase their efficiency and productivity.

Some refer to the Internet as 'The Network of Networks' and others as 'The Information Superhighway.' Indeed, it is a Network of Networks, as it is formed by linking numerous local computer networks, which are groups of computers located in the same building or business. Almost every country in the world has Internet access. In developing nations, only people with high incomes can connect, while in more advanced countries, connection is generally easier.

An astonishing amount of information constantly circulates on the Internet, which is why it is also known as the Information Superhighway. Currently, there are 200 million 'Internet users'—people who surf the Internet—around the world.

One of the advantages of the Internet is that it allows connection to all types of computers, from personal computers to large systems that occupy entire rooms. In addition, we can find video cameras, robots, and beverage vending machines connected to the Internet.

Although they are often used synonymously, the Internet is not the same as the Web. Contrary to what many people think today, the Internet did not have a commercial beginning, but was conceived as a national security project by the US military, supported by professors and students, and has grown into a global phenomenon.

Being connected to the Internet allows access to various information-sharing services that have been developed on this physical infrastructure. The most widely used tool on the Internet is the World Wide Web, or simply 'the Web,' which enables the viewing of 'pages' of information hosted on remote computers, known generically as 'sites.'

The WWW facilitates Internet access for the general public, which has led to its explosive growth. Browsing the Web and publishing information is relatively simple, and the available tools have evolved over the past three years to become the most widely used. This platform connects information from one end of the world to another in a distant location through what is known as a hyperlink. Clicking on it establishes communication with another part of the same document or with a different document on another server. Text files are stored on a web server that can be accessed by other connected computers, either through the Internet or a local area network (LAN). These files can be viewed using web browsers, which are responsible for transferring files and interpreting HTML tags and links, displaying the result on the monitor.

3.2 Mobile Terminals 3 hrs

Mobile terminals are devices that allow users to connect to mobile telecommunications networks and access services such as telephony. These can include electronic devices such as smartphones or tablets, as well as portable devices such as PDAs.

Mexico ranks twelfth in the e-commerce market, with projected revenues of US$52,580.2 million by 2025, surpassing Spain. Revenues are anticipated to exhibit a compound annual growth rate (CAGR 2025-2029) of 18.5%, resulting in an estimated market volume of US$103,707.4 million by 2029. With an expected increase of 24.5% in 2025, the Mexican e-commerce market will contribute to the global growth rate of 9.8% for that year. As in Mexico, global e-commerce sales are projected to increase in the coming years. ECDB analyzes seven segments within the Mexican e-commerce market.

The electronics sector is the largest, representing 22.6% of e-commerce revenue in Mexico. It is followed by Hobby & Leisure with 21.5%, Fashion with 20.7%, Furniture & Home with 11.3%, DIY with 8.8%, Care Products with 8.7%, and Food with the remaining 6.4%.

Online e-commerce market share in Mexico

Online market share represents the proportion of retail volume that is made online. This includes purchases made on desktop computers, tablets, or smartphones, whether through websites or apps. Only the retail sale of physical goods is considered. In the Mexican retail market, the online market share is 11.5% and is expected to increase by an average of 5.0%, reaching 14.1% by 2029.

The five most popular payment methods in the Mexican e-commerce market are as follows: with 81.2%, VISA is positioned as the most used payment method across all online stores in 2024. Mastercard is next with a 79.8% share and American Express with 71.2%. Card payment is the most commonly used method by online retailers in Mexican e-commerce in 2024. Other frequently used payment methods in this market include PayPal (e-wallets) at 75.5% and cash on delivery, used by 36.1% of stores that offer this option to their customers.

Source:

https://ecommercedb.com/

3.3 ERP 2 hrs

Enterprise resource planning (ERP) is software that organizations use to manage daily activities such as accounting, procurement, project management, compliance, and supply chain operations. A comprehensive ERP solution includes data analysis and financial management tools to facilitate planning, budgeting, and reporting of financial results.

ERP systems optimize the flow of data between business processes by collecting transaction information from various sources, eliminating duplicates, and providing a single source of truth. Today, they are essential for thousands of companies of various sizes and industries.

These systems manage day-to-day business activities, encompassing accounting, finance, inventory management, supply chain management, and manufacturing.

ERP systems manage the daily activities of businesses, including accounting, finance, inventory management, supply chain, and manufacturing. They can be hosted on-premises or in the cloud and support areas such as financial management, human resources, and production. These systems provide transparency into business processes by monitoring aspects such as production, logistics, and finance.

Acting as the central hub of the business, these integrated systems allow various departments to access workflows and data in a cohesive manner. ERP systems are versatile and adapt to different industries, improving efficiency and optimizing the organization's resources.

What is the difference between ERP and finance?

Although 'finance' is frequently mentioned in the context of ERP software, they are not the same. Finance represents a set of modules within the ERP system, including accounting, revenue management, invoicing, asset management, among others.

These modules include accounting, revenue management, invoicing, asset management, and more.

Financial software employs reporting and analysis capabilities to meet the requirements of regulatory bodies, such as the International Financial Reporting Standards Foundation (IFRS) and the Financial Accounting Standards Board (FASB) for generally accepted accounting principles (GAAP) in the United States, as well as for other countries, such as the German General Accounting Standards Board (HGB) and the French General Accounting Standards Board (PCG).

For public organizations, financial software must be able to generate periodic financial statements for government regulators, such as the U.S. Securities and Exchange Commission (SEC) (including quarterly 10-Q and annual 10-K reports), the European Securities and Markets Authority (ESMA), and others. For this type of financial reporting, a narrative reporting tool is used. The person with ultimate responsibility for finances is the CFO.

3.4 Call Center 2 hrs

A call center is a workplace dedicated to making or receiving calls, as well as managing data and contacts. It is also known as a call center, switchboard, or call center.

Functions:

  • Handle large volumes of incoming calls
  • Make outgoing calls
  • Optimize the telephone channel
  • Improve customer relationships
  • Increase company profitability

What is the difference between a call center and a contact center?

On the one hand, a call center, as its name suggests, focuses on handling customer calls. On the other hand, a contact center encompasses all types of touchpoints, including text messages, emails, online chat, phone calls, and more.

A call center is a specialized telephone service center dedicated to interacting with current and potential customers, providing quality service and creating positive customer experiences.

There are three main types of call centers:

  • Inbound
  • Outbound
  • Virtual (contact center)

Each has specific functions and focuses.

The functions of a call center include customer service, inbound and outbound call management, problem resolution, market research, sales generation, and improving the customer experience through real-time interaction and the use of technology.

3.5 Web Center 2 hrs

A Web Center is a tool that allows companies to create websites, portals, and applications to assist their customers, employees, or collaborators in various processes. For example, if we want to develop a self-help portal or an application where customers can discover our product's features, available payment options, and contact us through social media, we must use a Web Center builder.

These builder programs offer functionality for uploading content, working collaboratively and connecting social networks, or chatting live with a customer service agent. This facilitates the creation of a highly interactive user experience.

How does a Web Center work?

A Web Center is an interface that provides access to different construction tools, which a developer or programmer will generally be more comfortable with. However, it becomes something more, as, once configured, it becomes the portal that agents, employees, or customers will use to carry out various business-related operations, without being limited to a specific area.

As a development tool, it offers a set of features and services (such as portlets, customization, and content integration) that facilitate user choice and simplify transactions within an application. Although development tools require some experience, they are not as complex as traditional programming. For example, pre-designed templates are available.

These include drag-and-drop modules, an intuitive user interface, and built-in teamwork features.

Web Center Features

These platforms can include various components, as many as the user needs. For example, if the user is a customer, you can offer a menu that allows them to access manuals, images, and videos, or even send emails.

Portlets

These are pre-coded modular components that are easily integrated into the user interface. Portlets allow users to access a wide variety of functions and services. Any existing portlet can be used in a custom Web Center application.

Developers simply register portlet producers and then drag and drop portlets directly onto their pages.

Content Integration

The architecture of a Web Center allows for the integration of content from enterprise databases and other documents that you want to display in the Web Center portal.

Adding a Search Framework

The search framework is one of the most common and valuable features of any application. It makes it easy to find information and people through a user-friendly interface. It also allows you to include enterprise-wide search capabilities from the Web Center.

Content Boxes

You can incorporate text components, images, page links, web pages, and site links into your Web Center.

Benefits of a Web Center

Once you've designed your Web Center, you'll discover that it can bring together tools and structures to manage various areas. A Web Center can often function as a customer management system, and its uses are limitless.

Some of the features you can include in your Web Center design, especially if you focus on customer service, include:

  • Option to add announcements about activities and events relevant to the user.
  • Integration of chatbots and live chats.
  • Incorporation of a blog application.
  • Provision of a group communication system and discussion forums.
  • Connection to email and social media.
  • Links to databases and documents.
  • Links to other business modules.
  • Search functions.
  • Tags: allow you to assign one or more relevant keywords to a specific page or document.

These features contribute to designing a portal where customers can interact easily, adapting it to their diverse needs to foster a better long-term relationship. Among other benefits, this allows:

  • It makes it easier for companies to manage their operational processes and communicate effectively with their customers.
  • It facilitates communication between all members of the supply chain and customers, as the situation requires.
  • It acts as a central point for storing digital files.
  • It allows all information to be shared through the web center.

It integrates with other company systems, such as the Call Center system.

3.6 CRM 2 hrs

CRM stands for Customer Relationship Management, which refers to the set of practices, business strategies, and technologies dedicated to managing customer relationships.

With a CRM system, companies of any size can stay connected with their customers, optimize processes, increase profitability, and foster business growth.

CRM allows your company to move away from inefficient processes and manual tasks, thus facilitating the progress of your business. The platform organizes accounts and contacts in an accessible, real-time manner, accelerating and simplifying the sales process.

Instead of relying on sticky note reminders or spending hours analyzing spreadsheets, you can send leads to your sales team quickly and effectively. This way, all team members, regardless of their location or activity, will always have up-to-date information about customers and their interactions with the company. With data visible and easily accessible, collaboration becomes easier and productivity increases.

With a CRM system:With a CRM system:

  • Attract more leads, close more deals, retain more customers, and begin growing your business with a 37% increase in sales revenue.
  • Conversations are always personal, relevant, and up-to-date, resulting in a 45% increase in customer satisfaction.
  • Improve your marketing ROI by using CRM.

What are the types of CRM?

Companies can choose between two types of CRM, depending on their needs and budget: Cloud CRM and On-Premise CRM.

On-Premise CRM.

On-Premise CRM, also known as On-Premise CRM, is hosted on a company's physical server and requires maintenance by its own IT team. In this case, the CRM software must be installed on the server or on a computer that functions as such.

Cloud CRM

Cloud CRM is based on cloud computing. It is an online CRM, meaning it is not installed on a computer and does not require your company to have a dedicated IT team to maintain the software. This is also the reason why online CRM is called software as a service (SaaS), as the entire infrastructure is managed remotely by a team of solution experts.

With a cloud CRM, your team can access the login page from anywhere, anytime, using a browser on any device or through the app.

Online CRM

Advantages:

  • Available 24/7.
  • It can be accessed from any location and mobile device.
  • The initial investment is low.
  • It requires no server maintenance and updates are performed automatically.
  • It securely accompanies your business's growth.

Disadvantages:

  • Depends on internet connection, although it can sync with offline data.

On-Premise CRM

Advantages:

  • Greater control over the server by the IT team.

Disadvantages:

  • A power outage can cause delays in system use.
  • Initial setup and installation costs are high.
  • An IT team must be hired to manage the server and perform maintenance.
  • Less flexible and upgrades can be expensive.

3.7 CSM 2 hrs

Customer Success Management (CSM) is an area dedicated to guiding customers from the sale to post-sale support. Instead of relying solely on customer service agents, the CSM establishes a direct connection with customers and offers value propositions at key moments in the relationship.

In many ways, this methodology acts as a form of mentoring for customers, explaining the sales process and ensuring everything runs smoothly once the service or product is purchased.

In short, it is an approach that ensures customers achieve the desired results when using a company's solutions.

How relevant is customer service management to companies?

Not surprisingly, since 2020, 90% of US companies have chosen to incorporate a customer success function into their operations. Of these, 72% say improving these processes is a priority in their routine.

Personalization

Although automation tools are ubiquitous and readily available, consumers still seek personalized services with a human touch. Customer Service Management (CSM) offers precisely that: personalized, personalized customer service. This allows for a better understanding of their needs and the development of strategies that help them achieve their goals more quickly through the brand's products or services.

Cost Reduction

Every company has experienced losing customers to competitors after a bad experience. A Harris International study revealed that 89% of people will switch providers after receiving inefficient customer service. By implementing CSM, companies can proactively help their customers use their products and services correctly, significantly reducing the number of support and assistance inquiries. Furthermore, Customer Success Management (CSM) involves thoroughly understanding customers and segmenting them according to their needs and goals. By focusing on providing specific, customized solutions, unnecessary expenses are avoided on aspects that are not relevant to the customer.

Standardization

Standardization is essential to ensure consistent and efficient delivery of Customer Success services. Through this process, companies can:

  • Establish clear workflows for various client interactions, ranging from initial onboarding to regular follow-up and contract renewal.
  • Develop standard templates and documents for different types of client communications, such as welcome emails, progress reports, and satisfaction surveys.
  • Implement a client management platform that allows you to store and access relevant information about clients, their needs, previous interactions, and contact information in one place.
  • Provide ongoing training and education, ensuring everyone has a common set of skills and knowledge.

These benefits highlight the cost-effectiveness of this approach within organizations. However, you may still be unsure whether this applies specifically to your type of business.

To evaluate the implementation of Customer Success Management and its benefits for your business, it is important to consider several factors:

  • Business model: Analyze how much your business relies on customer satisfaction and retention. If your company offers products or services that require a long-term commitment, CSM may be especially relevant.
  • Customer churn: If you notice a significant number of customers leaving after a short time or not renewing their contracts, it's a sign that you could benefit from a CSM approach to retaining and maintaining your customers.
  • Customer acquisition cost: If this cost is high, it's crucial to focus on retaining existing customers to maximize your return on acquisition investment.
  • Growth opportunities: CSM can help you identify these opportunities and drive revenue growth through customer satisfaction and success.
  • Current customer satisfaction: Conduct satisfaction surveys or collect feedback to assess how your customers perceive your products or services.
  • Competitors: If they've already adopted CSM, they're likely enjoying advantages in terms of customer retention and business growth.
  • Customer lifecycle: From onboarding to renewal or churn, a CSM can help you improve each phase and ensure customers get the most value from your offering throughout their entire journey.
  • Available resources: Assess whether your company has the resources and structure to implement an effective Customer Success approach. A CSM strategy may require hiring additional staff and investing in technology, such as customer relationship management platforms (CRMs).
Topic 4: Legislation and security in electronic commerce 19 hrs

4.1 E-commerce legislation 2 hrs

The regulation of e-commerce in Mexico is framed by the Commercial Code, the Federal Civil Code, the Federal Code of Civil Procedures, the Federal Consumer Protection Law, among others.

1. E-commerce legislation: a phenomenon driven by globalization. Electronic transactions, which are mostly carried out today via the Internet, have become widespread globally. This has led to various initiatives from international organizations that have addressed e-commerce in their negotiations, such as the OECD (Organisation for Economic Co-operation and Development), WIPO (World Intellectual Property Organization), and the WTO (World Trade Organization), as well as regional bodies like the FTAA (Free Trade Area of the Americas) and the guidelines developed by UNCITRAL (United Nations Commission on International Trade Law). These guidelines have served as a model for many countries that have already incorporated or are in the process of integrating the document into their national legislation. This document, approved by UNCITRAL in December 1996, is the Model Law on Electronic Commerce, which has been a source of international law aiming to contribute to a uniform framework for international trade law.

2. E-commerce and Public Policies. The government of Mexico has played a crucial role in promoting and developing the use of information technology, using it as a tool to connect various agencies, companies, and citizens in general. On the international stage, the Mexican government has made several commitments to participate in international forums and coordinate internal public policy bodies.

The concrete actions have been:

1. To foster security and trust by strengthening the legal framework; regulations on security, information privacy, consumer protection, and codes of ethics.

2. To improve infrastructure, focusing on access and availability networks; establishing communication standards; optimizing government information systems; and developing accessible technologies for small and medium-sized enterprises.

3. To promote the use of e-commerce, through the Advisory Council for the Development of Electronic Commerce; offering training to merchants and industrialists; and adjusting regulations to facilitate the use of electronic means in financial and fiscal matters.

On April 30, 2019, NMX-COE-001-SCFI-2018 was published in the Official Gazette of the Federation. This Mexican standard (NMX) is the first to regulate e-commerce in detail and establishes the provisions that both individuals and legal entities must follow when offering, marketing, or selling goods, products, or services through electronic, optical, or any other technological means, either directly through their websites or through intermediaries such as Shopify, Amazon, Mercado Libre, among others.

NMX-COE-001-SCFI-2018 includes a series of recommendations on best practices for entering the digital market and developing an effective strategy in this area. This standard seeks to enrich and strengthen the protection of the various interests involved, which include users, companies, and producers.

One of the most prominent topics in the recommendations is Data Security and Protection, an aspect that constantly concerns consumers, especially as bad online practices become more widespread.

The standard allows consumers to more quickly and clearly identify which online stores they can shop at more securely, by strengthening the mechanisms that protect the confidentiality of the consumer's personal information and transactions.

When did it come into effect?

The NMX came into effect on May 1, 2019.

This standard is intended for all businesses that offer or market products or services through e-commerce (whether by electronic, optical, or any other technological means). It is necessary for them to adjust their systems or pages to align with the aforementioned regulation. A review of the pages hosting the online store should be conducted to evaluate the provisions they currently comply with and to identify those that still need to be implemented.

What are the provisions I must comply with? According to this NMX, every transaction or operation carried out through Information Systems must comply with various provisions related to:

1. The specifications, characteristics, conditions, and terms applicable to the goods, products, or services offered, including: advertising, consumer rights, payment and billing conditions, and mechanisms for refunds or returns, among others.

2. Mechanisms that allow the consumer to verify that the operation reflects their intention to acquire the offered goods, products, and services, as well as the other conditions.

3. Technical security mechanisms for acceptance, proof of the transaction, and identity verification.

4. Mechanisms that guarantee the protection and confidentiality of the user's and consumer's personal data.

5. Payment and delivery mechanisms.

6. Mechanisms for submitting questions, claims, or clarifications.

7. Mechanisms for managing cancellations, returns, or exchanges of products or services.

Mexico, aware of the technological transformation affecting commerce, has included in its legislation rules on the use of electronic, optical, or any other technology. The Commercial Code establishes that in commercial acts and in the formation of contracts, merchants may use these means.

The Federal Consumer Protection Law recognizes e-commerce, granting specific rights to consumers and obligations to suppliers in transactions carried out through electronic means.

In relation to the Federal Civil Code, it is permitted for contracts to be concluded by electronic, optical, or any other technological means, provided that the information generated or communicated is complete, attributable to the parties involved, and accessible for future consultation. These contracts are known as electronic contracts.

Furthermore, the Federal Code of Civil Procedures recognizes the evidentiary value of information generated or communicated through electronic, optical, or any other technology, allowing data messages to be used as evidence in proceedings before legally recognized authorities.

Thus, our legislation currently has a regulatory framework for e-commerce, which mainly includes the Commercial Code, the Federal Civil Code, the Federal Code of Civil Procedures, the Federal Consumer Protection Law, among others.

Data Message

The commercial code uses various technological terms to regulate e-commerce, one of the most relevant being the concept of a data message, which is fundamental for commercial acts carried out through electronic means.

A data message refers to the information that is generated, sent, received, or stored by electronic, optical, or any other similar technology. This message reflects the manifestation of the will to enter into a contract. For example, a data message can be an email, a text message sent by a computer or through mobile devices such as smartphones and USB drives, among others.

In the process of sending a data message, the sender and the recipient participate. The sender is the one who sends the message, while the recipient is the one who receives it, playing the roles of offeror and offeree in the context of obligations. The sender makes the offer and is bound with respect to the offeree, while the recipient accepts the offer and is bound towards the offeror. Both will be legally bound upon expressing their will to conclude the commercial act, that is, the contract. Using electronic means, the sender and the recipient manifest their will through the data message, giving their consent through an electronic signature, which has the same legal effects as a handwritten signature.

The commercial code recognizes legal effects, validity, and binding force to any information contained in a data message. Therefore, these messages can be used as a means of proof in any proceeding before the authorities and will have the same legal effects as printed documentation, provided they comply with the corresponding legal provisions.

Electronic Signature

. A key aspect of e-commerce is the electronic signature, which is included in a data message and has the same legal effects as a handwritten signature, being accepted as evidence in court. This signature indicates that the signer agrees with the information contained in the message. The electronic signature can be advanced and will generate the same effects as a handwritten signature, provided that the person using it has:

  • 1. A valid digital certificate.
  • 2. A private key, generated under their exclusive control.

Principles of E-Commerce. To ensure that e-commerce is conducted in a regulated manner, fundamental principles have been established in the Model Law on Electronic Commerce, which have been adopted by various legislations worldwide. In Mexico, the commercial code establishes that e-commerce activities regulated by this code shall be interpreted and applied in accordance with the principles of technological neutrality, autonomy of will, international compatibility, and functional equivalence of the data message with respect to information documented in non-electronic formats, as well as of the electronic signature in relation to the handwritten signature.

What do these principles determine?

Principle of technological neutrality: This principle establishes that the law covers all forms in which information (data message) is generated, stored, or transmitted, regardless of the technology used.

In other words, the law does not recognize a specific technology as valid, but rather encompasses them all.

Principle of autonomy of will: This principle establishes that the parties are free to define the rules that will govern their relationships, as long as they do not violate legal provisions.

Principle of international compatibility: This principle refers to the compatibility of the technology used to generate electronic signatures.

Principle of functional equivalence: This principle establishes the criteria that allow electronic information to be equated with information on paper. According to this principle, the requirements that electronic documents must meet to have the same effects as traditional paper documents are stated.

Fundamental Principles in Consumer Relations. In traditional commerce, fundamental principles are applied in consumer relations, designed to protect consumers and guarantee equity, security, and legal certainty between suppliers and consumers. In Mexico, the Federal Consumer Protection Law includes these principles, which are also applicable to e-commerce.

The fundamental principles in consumer relations are:

  • Real protection for the consumer in transactions carried out through electronic, optical, or any other technology.
  • Protection of the consumer's life, safety, and health against risks associated with products and services considered harmful.
  • Education and dissemination on responsible product consumption, ensuring fairness in contracting processes.
  • Provision of clear information about the characteristics, quality, and price of products and services.
  • Compensation for property and moral damages.
  • Legal, economic, administrative, and technical advisory for consumers.
  • Defense against misleading and abusive advertising, as well as against unfair practices.

In Mexico, the Federal Consumer Protection Agency (PROFECO) is responsible for promoting a culture of responsible and intelligent consumption, as well as protecting consumer rights. Furthermore, it can take action before the competent judicial authority and file complaints with the Public Prosecutor's Office regarding acts that may constitute crimes of which it is aware. PROFECO is also authorized to report to the relevant authorities those acts that represent administrative violations that harm the integrity and interests of consumers.

4.2 Hiring 2 hrs (8 hrs)

Contracting in e-commerce consists of an agreement between two parties that is formalized through electronic means. It is a form of distance contracting that uses the Internet as a means of communication.

Characteristics of electronic contracts:

  • The simultaneous physical presence of the parties is not required.
  • Consent is given through electronic means, such as a digital signature.
  • The contract is stored in a digital file.
  • The information generated or communicated has evidentiary value.

In Mexico, e-commerce is regulated by the Federal Civil Code, the Commercial Code, the Federal Code of Civil Procedures, and the Federal Consumer Protection Law.

What is understood by electronic contracting? The term "electronic contract" refers to any agreement of will established through electronic tools, where the signing parties commit to comply with what has been agreed. This includes both the processing of information and the storage of that data.

An electronic contract maintains the essential characteristics of a traditional contract, and its terms and conditions have legal validity. Electronic contracting covers several aspects, the most common being the signing of agreements for the purchase or sale of any product, good, or service.

How are electronic contracts used? Thanks to their flexibility and security, this format can be used to formalize agreements of various kinds. Generally, it can be applied in the following circumstances:

  • According to the participants, i.e., in commercial and consumer contracts where one of the parties is an end consumer.
  • According to the execution method, which implies direct contracts (signed completely in digital format) or indirect contracts (where the physical completion of a step in the process is required).
  • According to the form of expressing will, which can be pure (where the parties give their consent entirely electronically) or mixed (in which one party signs digitally and the other physically).

And depending on the objective of the contract, either for delivery (of a product) or for provision (when a service is offered).

What information is necessary before signing an electronic contract? Before proceeding with the signing of an electronic contract, it is essential to have the following information:

1. The necessary procedures to validate the contract.

2. Whether the electronic document that formalizes the contract will be archived or if the client will have access to it. In the latter case, how can they do so?

3. The way in which the recipient can correct errors in data entry to formalize the contract.

4. The language in which the formalization will take place.

Today, there are digital solutions that simplify the process of creating, sending, and signing the contract in an automated way, making this step agile and almost entirely managed by the platform.

The signing of electronic contracts and the use of technology. To ensure that an electronic contract can be finalized, it is essential to use tools that are accessible both online and offline. Currently, there are digital platforms that facilitate the signing of various types of electronic contracts for the acquisition of products and services.

The use of the electronic signature. The electronic signature is a very valuable tool for digital contracting, as it acts as an authentication method that replaces the handwritten signature and has the same legal validity.

What are the advantages of the electronic signature in the electronic contracting process?

Some of the advantages of adopting this technological solution include:

  • It simplifies contract management.
  • It allows for remote signing from anywhere in the world.
  • It offers an omnichannel solution that can be used on any electronic device.
  • The process is carried out in real time.
  • It reduces costs.
  • It promotes better organization.
  • It guarantees total security, as documents cannot be altered or edited.
  • It increases company productivity and streamlines workflows.
  • It improves the customer and user experience.
  • It reduces paper consumption.

4.2.2 Types and classification of contracts 2 hrs

The classification of contracts provides a clear and detailed structure regarding the various types of contracts and their specific characteristics.

This categorization facilitates the identification of the particularities of each contract type, as well as the rights and obligations of the involved parties, including the specific regulations that must be considered in each situation.

Focusing on legality, the way contracts are classified allows organizations to effectively adapt to changes and advancements in the legal framework, ensuring compliance with the obligations corresponding to different types of employment contracts.

Contracts can be classified according to various criteria:

1. According to their risk

This classification helps establish a clear structure for the risks and benefits that both parties assume when signing an agreement. Thus, there are two types of contracts:

Commutative: in these contracts, the obligations are certain and defined. That is, the parties know from the beginning what their responsibilities and benefits are. For example, in the sale of movable and immovable property, as well as in the leasing of commercial premises, among others.

Aleatory: in this case, the parties' obligations depend on an indeterminate condition that materializes in the future. That is, the parties do not know what the final outcome of the contract will be. Examples of this include insurance contracts and gambling and betting contracts, among others.

2. According to their temporality

This classification allows companies to differentiate between agreements that are fulfilled immediately and those that require deferred execution or extend over a prolonged period. Below, we show the classification of contracts according to their temporality:

Instantaneous: in this type of contract, the parties' obligations are fulfilled immediately. Examples of instantaneous contracts include a cash sale agreement and a contract for services by the hour, which take effect instantly.

Deferred execution: these are contracts in which the parties' obligations are fulfilled within a specific term. An example of this is an installment sale contract or a lease agreement for a fixed time (6 months, one year, among others).

Successive tract (continuous performance): in this type of contract, the parties' obligations are fulfilled periodically and continuously. A clear example is an electricity supply contract, which is paid monthly.

3. According to their obligations

In this classification, companies can differentiate between agreements that impose obligations on only one party and those that establish responsibilities for all parties involved. Contracts are thus classified according to their obligations:

Unilateral: only one party assumes an obligation, while the other has none. Examples include donation contracts and surety agreements.

Bilateral: both parties assume obligations, as occurs in purchase and sale or lease agreements.

4. According to their structure

Contracts are classified based on their structure, which varies according to the complexity of the agreements they contain. By understanding a contract's structure, companies can better anticipate the complexities that might arise in fulfilling their obligations. Additionally, they can implement measures to simplify or clarify its conditions.

In this context, there are two types that determine the classification of contracts according to their structure:

Simple: these are made between two parties and do not include special clauses, meaning they do not have a complicated structure. Examples of simple contracts include a contract for the sale of an object and a service provision contract.

Complex: these have an elaborate structure and contain special clauses that regulate specific aspects of the transaction. Some examples include a construction contract for a project and a project financing agreement, which include appendices establishing specific financial conditions and logistical operations.

5. Classification according to their value

There are two types of classification according to their value:

Gratuitous: in this case, one or both parties do not receive financial compensation, as occurs in a commodatum (loan for use) agreement.

Onerous: both parties obtain financial compensation or benefit. For example, a purchase agreement is considered onerous, as the buyer pays in exchange for the acquired good or service.

4.2.3 Formation of the contract 2 hrs

For a contract to be valid, consent must meet the following requirements: a) capacity of the contracting parties; b) absence of defects in consent; and c) a specific form of expressing consent, when required by law.

ELEMENTS OF CONTRACTS. The elements of a contract can be classified into two categories: a) elements of existence, which are those necessary for the contract to actually exist, that is, those requirements whose presence gives legal life to the legal act known as a contract; and b) elements of validity, which are the requirements that perfect the existence of the contract and that, if missing, could lead to its annulment. These requirements are explicitly established in our civil code in articles 1652 and 1653.

ELEMENTS OF EXISTENCE. There are two elements of existence: consent and the object.

1. CONSENT.

Consent is the agreement of wills between the parties regarding the object of the contract. In its formation, two essential moments can be clearly identified: the offer and the acceptance. The offer is a proposal made by one of the contracting parties to another on a matter of legal interest; while acceptance is the conformity of the will of one contracting party to the initial offer, often after a counteroffer presented by the other contracting party.

In this regard, Rojina Villegas believes that: "The psychological process that precedes the formation of a contract includes the discussion of the offer and acceptance. The offer is not always accepted directly; acceptance can be conditional or include modifications. If the offer is not accepted on the proposed terms, from a legal standpoint, the offeror is not obliged to maintain it. In the case of contracts between parties present, the offer must be accepted immediately; if it is modified, the offeror has no obligation to uphold it. For contracts between absent parties, a conditional response or one that implies any modification also releases the offeror from maintaining the offer. In the process of forming consent between parties present, the discussion between them allows the offer to be altered; although the offeror is not obliged to maintain it, out of their own interest they may accept these modifications, which leads to consent."

2. THE OBJECT.

The second essential element of contracts is the object. However, it is important not to confuse the object of the obligation with the object of the contract. The object of the obligation should be defined as the generic conduct that the debtor must perform, and as mentioned in the first chapter of this work, it can consist of giving, doing, or refraining from doing something. On the other hand, the object of the contract refers to the content of that performance, that is, the thing the debtor must deliver or the action they must perform or avoid.

4.2.4 Execution of the contract 2 hrs

Contracts concluded electronically can present various execution modalities in their clauses or be directed at a particular one, depending on the nature of the good or service agreed to be delivered or provided. Thus, there are delivery and execution contracts; the former can be for tangible or intangible goods, and the latter can be for immediate or deferred execution.

In Mexico, the Advanced Electronic Signature Law and Law 34/2002 regulate electronic contracts and electronic signatures.

The background of electronic contracting is found in the international sphere, where various technological operations using electronic means were initiated, highlighting the use of the network known as the Internet. Since the Internet is the fundamental basis of electronic contracting, it is useful to delve a little into its concept and origin. Professor Alfredo Alejandro Reyes Krafft mentions that the Internet is a global channel of computer telecommunications, composed of multiple interconnected connections, making it the fastest means of communication in human history.

He specifies that: "The fundamental characteristics of the Internet's operation lie in it being a distributed network."

(it does not have a central repository of information or control; instead, it is formed by a series of interconnected host computers, and each can be accessed from any point on the network where the Internet user is located). Furthermore, it is interoperable (it uses open protocols to link different types of networks and infrastructures, allowing multiple services to be offered to a variety of users over the same network. In this context, the interoperability of the Internet is based on the TCP/IP protocol, which establishes a common structure for Internet data and its routing). It operates through transfers of information packets (known as packet switching, which consists of dividing the information transmitted on the network into small parts or packets).

Legislative Process of the Reform Introducing Electronic Contracting

The reform that incorporates regulations on electronic contracting in Mexico covers a legislative process that began in 1999 and concluded in 2000, after the analysis of various initiatives presented in this area. Once both Chambers of the H. Congress of the Union approved the corresponding reports, the project was presented, containing reforms and additions to the Federal Civil Code, the Federal Code of Civil Procedures, the Commercial Code, and the Federal Consumer Protection Law. According to Professor Alfredo Alejandro Reyes Krafft, the legislative history and the legal situation prior to this reform include the following:

  • Commercial Code 1884 - Telegraph
  • Civil Code 1928 - Telephone
  • Banking Laws 1990 - Telematic Media
  • PROFECO Law 1992 - Distance sales, Telemarketing
  • Fiscal Laws 1998 - Declarations and payments in electronic format
  • Other governmental efforts

Until 1999, the current legislation required that the validity of acts or contracts be supported by a written document and a handwritten signature to bind the parties.

On this subject, Dr. Edgar Elías Azar mentions the following: "The economic and business trend towards globalization has had a significant impact on the development of e-commerce. Its growth alongside the Internet has expanded access to knowledge and fostered the expansion of new information and communication technologies. Mexico is part of this phenomenon.

Contracting through electronic means in our country is a reality that is advancing at a surprising pace, starting from its commercial origin to encompassing civil traffic, and now integrating into all aspects of our daily lives (work, education, and leisure). The open Internet network has allowed the people and institutions that inhabit the planet to form a global community, united despite time and distance. The reforms made to our legal system are framed in this sociological context, with the aim of adapting legislation to this new reality and ensuring private traffic in the use of electronic means.

Efforts have been made by international organizations to address the issues related to electronic contracting. Among these is the United Nations Commission on International Trade Law (UNCITRAL), which drafted the Model Law on Electronic Commerce and its Guide to Enactment. Subsequently, it also developed the Model Law on Electronic Signatures, along with its Guide to Enactment, and the United Nations Convention on the Use of Electronic Communications in International Contracts. Additionally, the Organisation for Economic Co-operation and Development (OECD), the World Trade Organization (WTO), and the International Chamber of Commerce (ICC), among others, have contributed to this cause. Some organizations have created more specific regulations for the areas they are responsible for, as is the case with the World Intellectual Property Organization (WIPO).

CONCEPT OF THE CONTRACT CONCLUDED THROUGH ELECTRONIC MEANS

Our Federal Civil Code and the Civil Code for the Federal District, in their articles 1792 and 1793, provide a definition of the contract.

Article 1792 establishes that an agreement is the accord between two or more people to create, transfer, modify, or extinguish obligations. For its part, article 1793 states that those agreements that generate or transfer obligations and rights are called contracts. Thus, it is affirmed that the contract is a subcategory of the agreement, while the agreement, in a strict sense, is the accord of two or more wills that modify or extinguish obligations. As Master Borja Soriano mentions, the broader genus is the agreement, and the specific difference lies in the creation or transmission of obligations and rights. However, it is important to remember that article 1859 of both Codes establishes that the legal provisions on contracts apply to all agreements and other legal acts, as long as they do not contradict their nature or the special provisions of the law. Therefore, the rules of the Federal Civil Code on express consent through electronic means are also valid for agreements in the strict sense. Among the national authors who offer a definition of the contract, we can highlight Fausto Rico Álvarez and Patricio Garza Bandala, who state that "the contract is an agreement of wills by which the parties oblige themselves to the fulfillment of a certain performance".

Miguel Angel Zamora y Valencia: "The contract, as a legal act, is the agreement of wills in accordance with a premise, intended to generate legal conditions that create or transmit rights and obligations of a patrimonial nature."

FORMATION OF THE CONTRACT. OFFER. ACCEPTANCE

It is important to remember that consent, as an agreement of wills, is established through two unilateral legal acts: the offer or pollicitation and the acceptance. The contract enters the legal sphere the moment the acceptor expresses their conformity clearly and directly with the offer presented by the offeror or pollicitant. It is at that instant that consent is established and the contract is formed, provided that the other essential element meets the legal requirements.

The offer made through electronic means must meet certain requirements, which include the debtor's will to assume an obligation, a real intention, a serious and precise will, and that this will contains a specific content and is expressed clearly.

The use of the Internet to conclude contracts facilitates this conclusion to occur between present parties, as in the case of contracts concluded via videoconference or through so-called "chat," as these means allow for instantaneous communication between the parties.

However, the conclusion of the contract is also permitted via email and on a webpage in situations where there is no immediacy between the parties. Therefore, the rules applicable to the formation of the contract are those corresponding to contracts between absent parties. In the case of telex and fax, we consider that there is no immediacy between the parties either.

Contracting over the Internet can give rise to a negotiated contract, which is defined as one in which the parties discuss and modify the original offer until reaching an acceptance that may be different from the initial proposal. In such circumstances, the original offeror may become the acceptor, while the person to whom the offer was initially addressed assumes the role of offeror.

Given that the Federal Civil Code, in its article 1807, accepts the reception system for the perfection of the contract, as does the current Commercial Code, this applies even when the parties are in different locations. Despite the immediacy, the one who receives the acceptance is the offeror or pollicitant. Therefore, if the competent jurisdiction was not agreed upon, it will be the corresponding judge as stipulated in article 24 of the Federal Code of Civil Procedures. For this, it must be considered whether or not there was an agreement regarding the place of fulfillment of the obligation, whether in real actions on real estate, disputes arising from lease contracts, real actions on movable property, or personal actions.

The foregoing generates several problems that need to be addressed. The first challenge is to establish for how long the offeror is bound by their offer if no deadline has been set. Article 1806 of the Federal Civil Code establishes that, when the offer is made without a specific deadline to an absent person, the offeror will be bound for three days, in addition to the stipulated time. We must also consider that, regarding the acceptance period, if the offeror dies before acceptance and the acceptor is unaware of this death, the heirs will be obliged to comply with the contract.

Now, in the case of contracts made via email, the question arises as to the moment the contract legally comes into force. Indeed, for contracts that transfer ownership, this moment determines the applicable law to the contract if not otherwise agreed, as well as the instant when the risks of the thing are transferred to the acquirer, in the context of contracts for the transfer of ownership of certain and determined goods, in accordance with what is established in article 2014 of the Federal Civil Code.

In such situations, the transfer of ownership will be affected at the moment the contract is perfected, this being the only effect of said perfection. In the case of contracts of a different nature, the moment of their perfection will determine when the obligations derived from the contract become enforceable.

Article 1807 of the Federal Civil Code indicates that a contract is formed the moment the proposer receives the acceptance, being bound by their offer in accordance with articles 1804, 1805, 1806, and 1810, which refer to both offers without a deadline and those with a deadline. In the context of an electronic contract, the contract is perfected and acquires legal validity the moment the offeror receives the acceptance.

4.3 Private security (cryptography or encryption) 2 hrs

Encryption is a reversible cryptographic operation that transforms meaningful data, known as plaintext, into unreadable and encrypted data, called ciphertext, using a key known as an encryption key. Meaningful data is essential because, due to the confidential nature of information stored in databases, organizations are forced to implement increasingly sophisticated controls to protect it, with encryption being one of these controls.

However, concerns about performance degradation, application support, and the management of encryption implementations in large databases create barriers that hinder the adoption of this crucial security measure. When all applications in an organization share the same local database engine and the database is encrypted, connecting any application or reading from and writing to a database file will require providing the encryption key.

Secure encryption keys. The relevance of robust encryption lies in its ability to maintain control over the level of information privacy within a database.

For example, if an encrypted database is used to safeguard privacy even from other users on the same computer, each user must have their own encryption key.

The process of creating an encrypted database is similar to that of an unencrypted one; the main difference lies in the use of an encryption key. This key must be generated before creating the database, using a process that ensures the highest level of privacy and security for user data.

The keys can be:

  • Symmetric: They use certain algorithms to encrypt and decrypt documents. They are groups of distinct algorithms that are interrelated to maintain the confidentiality of the information.
  • Asymmetric: They use a mathematical formula that employs two keys, one public and one private. The public key is accessible to anyone, while the private key can only be decrypted by the person who receives it.

A message encoded using a cryptographic method must be private; that is, only the sender and the recipient should have access to the message's content.

Furthermore, a message must be verifiable, meaning the person who receives it must be able to confirm the sender's identity and detect if the message has been altered. Current cryptographic methods are secure and effective, and they are based on one or more keys. The key is a sequence of characters that can include letters, numbers, and symbols (similar to a password) and is converted into a number, used by cryptographic methods to encode and decode messages.

Cryptography is a tool to reduce risks in Internet use; it involves the encoding of information sent over a computer network so that only the sender and receiver can read it. This is achieved through encryption and/or encoding techniques, making messages incomprehensible to intruders who intercept them. The main objective of cryptography is to ensure the confidentiality of messages.

  • Symmetric Key Encryption: each computer has a secret key to protect a packet of information before sending it to another computer.
  • Public Key Encryption: it is a key that your computer provides to another that wishes to communicate with you.
  • SSL Public Key. It is based on digital certificates, which act as an electronic identification issued by a trusted entity, allowing the user to verify both the issuer and the recipient of the certificate through public key encryption.
  • Encryption Algorithm. It works through an algorithm that transforms a set of elements into a finite output.

4.4 Ethics of e-commerce 2 hrs

An electronic crime is defined as unethical and unauthorized behavior that involves some type of fraud. It focuses on the study of the principles that individuals and organizations can use to discern between right and wrong actions.

There are three fundamental principles of ethics:

  • Responsibility: Individuals, organizations, and societies are responsible for their actions.
  • Accountability: Everyone must be accountable to others for the consequences of their actions.
  • Civil liability: It is a feature of political systems that allows individuals to claim damages caused by other actors, systems, or organizations.

The first ethical challenge of online commerce is security. Security breaches, commonly known as hacking, cracking, or page jacking, involve the illegal access and manipulation of computer networks, websites, email accounts, among others. Hackers access confidential information on pages, steal services, or damage systems, causing collapses in PCs, servers, or computer networks.

The second ethical challenge relates to privacy and covers the protection of the collection, storage, processing, disclosure, and deletion of personal data. No one remains anonymous when connected to the Internet, and what is a paradise for direct marketers becomes a nightmare for consumers who wish to protect their privacy. Currently, online advertising can be targeted with great precision thanks to cookies, small files that companies install on the hard drives of their website visitors to track their profiles and browsing habits. Ensuring the security of online transactions is a major challenge. Although there are various measures and public sector initiatives to protect the right to privacy, it can never be guaranteed one hundred percent.

The third ethical challenge that Sison and Fontrodona examine is the protection of people's identity. Computer systems have a major limitation, as they can only recognize an individual's "virtual identity," which makes identity theft or impersonation a significant problem. When shopping online, we expose ourselves to the risk of someone stealing our credit card information and our identity.

The last ethical challenge, irreversibility, refers to the verification of transactions or of 'what really happened' online. An example of this is a news story published in 1999 by the financial information website Bloomberg, which announced the acquisition of a major telecommunications manufacturer.

To address the new challenges of e-commerce, Sison and Fontrodona propose a three-pronged action plan: regarding private decisions, agents can act on: the physical information infrastructure (hardware), specialized applications (software), and, most importantly, the proper training of buyers and sellers in the rules of online conduct.

Furthermore, they suggest two general principles that should guide any discussion on ethics and e-commerce. The first is the concordance between online and offline when evaluating human behavior; the fundamental ethical and legal norms that regulate human conduct in the physical world must also apply in cyberspace.

4.5 Crimes and threats 1 hrs (5 hrs)

The buying and selling of products or services through electronic means have advanced remarkably in the last decade, concentrating mainly on Internet transactions. This methodology has come a long way since the first catalog sales of the 19th century, managing to reduce costs and eliminate intermediaries. However, alongside these technological advancements, crime has adapted this tool, using it both as a means and an object of illicit acts. Thus, there are four behaviors that states seek to sanction internationally: 1) computer fraud, 2) falsification of electronic documents, 3) misleading advertising, and 4) theft of personal data.

1. Computer fraud. Contractual breaches and fraud offenses. When a reasonable period passes after the consumer has paid the price and does not receive the purchased product, the criminal sphere begins to be considered. If computer tools are used to deceive internet users, these devices can be interpreted as stratagems used to confuse the user, making the situation perceived as a scam.

2. Phishing or online identity simulation

This involves fraudulently acquiring confidential information by duplicating the appearance of websites to pose as a trusted entity, and thus ask the customer to update their information.

Three forms of phishing have been observed that could be described in this way:

I. Identical copy of a website and request for authentication or data update (changing the names of the original site to be similar, or using javascript routines to be applied when opening the original site, overwriting the real address with that of the simulated website).

II. Spoofing or homograph attack (the domain name is very similar to the original, for example by changing the letter 'I' to the number '1', a difference almost imperceptible to the user).

III. Money laundering through high-profit work-from-home offers (large sums of money are offered on the Internet to anyone who provides their account number for payment).

3. Falsification of Electronic Documents. Comparative doctrine recognizes that there are situations of forgery that translate into identity theft, even without the physical presentation of documents. Simply entering numbers into a form is enough for it to be considered a forgery. For example, in the United States, the use of the social security number as an identification document allows whoever has that number along with the corresponding name to obtain economic benefits at the expense of another person.

4. Misleading Advertising. Misleading advertising is defined as that which provides false or deceptive information about a product or service, with the aim of confusing the consumer. This advertising can manifest itself through goods, products, and services via texts, dialogues, sounds, images, brands, designations of origin, and other descriptions that induce or may induce error or confusion. On the other hand, misleading advertising by omission refers to the lack of information about essential characteristics of the good, product, or service, which prevents the consumer from having the necessary data to make an informed decision. Without this information, the consumer's decision can be affected by the inaccuracy of the advertising message.

This type of advertising does not offer information that would lead the consumer to decide not to acquire the good, product, or service being promoted. The third paragraph of Article 32 of the Law addresses what is known as 'comparative advertising.' Although it seems obvious, this type of advertising involves the comparison of goods or services. However, such comparison has a limit: it must be truthful and not misleading. In this context, it is valid, as it provides the consumer with clearer and more precise information. Although the Law does not explicitly define 'comparative advertising,' as mentioned earlier, it does not require a great interpretative effort to understand its meaning.

Denigratory advertising is that which discredits someone else's good, product, or service (whether it be professional or product denigratory advertising). In this sense, advertising is considered illicit or misleading when the information presented lacks veracity, which makes it abusive, as it can induce the consumer to improperly change their consumption habits. On the other hand, parasitic (or adhesive) advertising is that which can cause confusion with the goods, products, or services of other suppliers. This type of advertising is considered misleading, as it takes advantage of the prestige acquired by another supplier, making the consumer believe that the advertised good or service possesses the characteristics of what its competition offers, benefiting from the reputation of others.

4.5.1 Data damage and theft 2 hrs

Identity theft or usurpation refers to when a person obtains, transfers, uses, or improperly appropriates the personal data of another without their authorization, generally with the objective of committing fraud or crimes. Identity is composed of personal data such as: name, phone number, address, photographs, fingerprints, license and social security numbers, as well as financial or medical information and any other data that allows a person to be identified.

Frequently, the identity thief uses the illegally obtained information to acquire financial products and services in the victim's name.

In recent years, identity theft on the Internet has become one of the main threats to e-commerce. According to data from CONDUSEF, during 2022, complaints of identity theft increased by 378%.

1.5.1 Data damage and theft. Currently, more than 20 million Mexicans could be at risk of suffering identity theft.

Due to the increase in data breaches and the rise of synthetic identities, identity theft has become a significant problem. Fraudsters use authentic IDs, credit cards, or accounts to perpetrate fraud in e-commerce. According to the study 'ID Theft SOS: How to win customer preference and loyalty with ID protection,' published by Tenerity, 75% of online shoppers are concerned about digital identity theft. Currently, scammers have various ways to obtain users' personal information, such as social engineering or the takeover of real shoppers' accounts.

How to prevent identity theft fraud in your e-commerce? To minimize the financial losses generated by identity theft fraud in online commerce, it is essential not only to prevent and detect fraud but also to take care of the customer experience to avoid cart abandonment. Some recommendations to prevent identity theft fraud in your e-commerce are:

  • Implement identity verification for users.
  • Request that your customers use strong passwords.
  • Implement an anti-fraud tool in the checkout process to help you identify fraudulent transactions before they occur.
  • Have a fraud prevention system that monitors suspicious activities in your customers' accounts in your online store, such as alerts about possible account takeovers.

Why is identity theft a challenge for e-commerce? Identity theft provides opportunities for scammers to present themselves as legitimate on the internet. They can use stolen IDs, credit cards, and even entire e-commerce accounts to exploit your online store and make a profit.

This is what identity theft implies for merchants:

  • Increase in chargeback rates: Scammers use stolen identity documents and credit cards to purchase products or services. When the legitimate cardholder realizes what has happened, they request a chargeback, which results in a financial loss for you.
  • Loss of products and goods: A direct consequence of chargebacks is that your inventories decrease without receiving the corresponding payment.
  • Administrative expenses for chargebacks: To add to the inconvenience, a chargeback fee must be paid. Even if you successfully dispute a chargeback, this involves hours of wasted management.
  • Impact on reputation: Customers whose credit card data have been used fraudulently on your site develop negative associations with your brand and sometimes share their experience on social media, which harms your image.
  • Increase in card payment fees: If your chargebacks increase significantly, card companies will charge you more for each transaction. Some may even ban you from using their network.

How is identity theft identified in e-commerce? To validate user identities without an overly burdensome KYC process:

  • Perform light KYC checks: Although KYC (Know Your Customer) is a legal requirement in sectors like banking, applying similar principles in retail has its benefits. By performing quick checks to validate identities, you can have a better understanding of who you are dealing with (and who you are sending products to).
  • Enrich existing data: At the very least, your customers will have an IP address when connecting to your site. You can obtain valuable information from that data by enriching it (associating it with additional information).

The same goes for the device, as well as an email address and a phone number.

  • Learn about card types: Card numbers contain valuable information about the payment method you are processing, some of which may be riskier than others. It could be, for example, a prepaid card or an exclusive card. The key is to obtain that information through a credit card BIN lookup.

The 3 best custom rules to prevent identity theft fraud in e-commerce.

Regarding protection against identity theft in e-commerce, all the risk rules you implement will answer the same question: is that person really who they claim to be? Below, we will analyze three concrete examples.

#1: The card and the IP address do not match. We have already mentioned the importance of understanding and enriching card data, but here is a practical example that can help you understand how this can differentiate good customers from bad ones.

#2: The email or phone number is not registered on social media.

This is an example of data enrichment that is based solely on an email address or a phone number. Tools like SEON can check if this data has been used to register on various social media platforms, including LinkedIn, Twitter, Patreon, Quora, Netflix, and Airbnb, among others.

#3: The device fingerprint shows suspicious data.

Understanding how users access your store is an excellent way to identify who they are. In the field of fraud detection, this is achieved through device fingerprinting. This approach allows you to extract metadata about your customers' software and hardware configurations.

4.5.2 Potential Threats: Viruses and Hackers 2 hrs

As companies rely more and more on their infrastructure, their vulnerability to cyber threats increases. The advent of cloud computing, mobile devices, the Internet of Things, and other gadgets has created numerous entry points through which a cyber attacker can compromise an organization.

VIRUS. A virus is malicious code or harmful software that aims to alter the normal functioning of a computer without the user's consent or knowledge. Viruses can destroy the information stored on the computer; some are harmless but annoying. Below are some types of malicious codes described:

  • Virus: It is a computer program that can replicate and spread to other files.
  • Worm: Specifically designed to infect from computer to computer.
  • Trojan Horse: Although it does not replicate itself, it often acts as a means to introduce viruses and other types of malicious code, such as bots.
  • Bots: They are a type of malicious software that can be installed covertly on a user's computer when they connect to the Internet.
  • Unwanted programs: These include adware, browser parasites, and other applications that are automatically installed on a computer, usually without the user's informed consent. These programs are increasingly common on social networks, where users are tricked into downloading them.
  • Phishing and identity theft: Refers to any deceptive online attempt to obtain confidential information for financial gain. Phishers use tactics similar to traditional 'scammers' but use email to trick recipients into voluntarily providing their financial access codes, bank account numbers, credit card numbers, and other personal information.
  • Hacker: A hacker is an expert in some area of technology, often related to computing, who is dedicated to intervening and/or making technical alterations with good or bad intentions on a product or device. Although the term is best known for its relationship with computing and the web, a hacker can operate in various technological contexts, such as mobile phones or audiovisual playback devices.

In any case, a hacker is a passionate expert in a specific technical area, and their goal may be to use that knowledge for both positive and negative purposes.

They can be classified into three categories:

  • White hats: These are hackers whose role is to help organizations identify and correct security vulnerabilities.
  • Black hats: These are hackers who engage in similar activities, but without receiving compensation or agreements with the target organization. Their intention is to cause harm, infiltrating websites and exposing confidential information they find.
  • Gray hats: They identify security weaknesses in a system and publish their findings without causing harm or seeking personal gain. Their only reward is the recognition for discovering the vulnerability.
  • There are also other types of hacking that include:
  • Credit card fraud or theft: This is one of the most feared problems on the internet. In the past, the most common cause of credit card fraud was the misuse of a lost or stolen card, followed by the theft of customer numbers by employees and identity theft.

Today, the theft of card information and its misuse are more common due to systematic hacking and the looting of corporate servers that store data on millions of credit card purchases.

Pharming and spam websites:

  • Pharming: This method redirects a web link to a different address from the original, making the site appear as if it were the authentic destination.
  • Spam: Although it appears in search results, it is not limited to email. These sites hide their identity behind domain names that resemble those of legitimate companies, post their names in open forums, and divert traffic to known spammer redirection domains, such as vip-online-search.info, searchdv.com, and webresource.info.

Denial-of-Service Attacks: In a denial-of-service (DoS) attack, hackers flood a website with irrelevant page requests, overwhelming the site's servers. Increasingly, these DoS attacks employ botnets and are becoming 'distributed,' using thousands of compromised computers as clients.

  • A distributed denial-of-service (DDoS) attack is carried out by multiple computers that attack a target network from various origin points.
  • Sniffing. A sniffer is a type of software used to covertly listen, monitoring information circulating through a network.
  • Insider Attack. The most significant incidents of service interruptions, site destruction, and diversion of customer credit data and personal information have been perpetrated by internal personnel. Previously trusted employees with access to sensitive information can navigate an organization's systems without leaving a trace due to failures in internal security procedures.

The main cybersecurity threats that companies face today include malware, social engineering, web application exploits, supply chain attacks, denial-of-service attacks, and man-in-the-middle attacks.

Malware. Malware is malicious software that can be used to achieve various objectives on an infected system. Some of the most common types of malware include:

  • Ransomware: This type of malware encrypts the files on an infected device using an encryption key known only to the attacker. The ransomware operator then demands a ransom from the victim in exchange for the key needed to recover their data. In recent years, ransomware has become one of the most notorious and costly cyber threats for businesses.
  • Trojan Horse: Trojan malware presents itself as something else, like a free version of valuable software. Once the victim downloads and runs this trojan on their computer, it begins to execute its malicious functions.
  • Remote Access Trojan (RAT): RATs are a type of trojan designed to act as an access point for subsequent attacks. Once this malware runs on the infected computer, it grants the attacker remote access and control, allowing them to download other types of malware, steal confidential information, or perform other actions.
  • Spyware: Spyware is a type of malware created to spy on and collect information about the user of an infected computer. This spyware can be designed to steal user credentials, financial data, and other sensitive and potentially valuable information that the attacker could sell or use in future attacks.
  • Cryptojacking: Cryptocurrencies that use the Proof of Work (PoW) model rely on a resource-intensive process known as mining to generate new blocks on the blockchain. Cryptojacking malware carries out mining activity on an infected machine, leveraging the victim's computational power to create blocks and obtain cryptocurrencies for the attacker's benefit.
  • Social Engineering Attacks: These attacks use tricks, coercion, and various forms of psychological manipulation to get the victim to act according to the attacker's wishes. Some common social engineering tactics include:
  • Phishing: Phishing attacks use social engineering techniques to try to deceive the recipient into taking an action that benefits the attacker. Phishing messages (sent via email, social media, corporate communication apps, or other messaging platforms) are often designed to induce the victim to click on a malicious link, open a dangerous attachment, or provide sensitive information, such as login credentials.
  • Spear phishing: Spear phishing attacks are phishing attempts targeted at a specific person or group, using information about the target to make the message seem more credible. For example, a phishing email targeting a finance department employee might pretend to be an outstanding invoice from one of the company's legitimate suppliers.
  • Smishing: Smishing attacks are phishing attacks carried out via SMS text messages. These attacks take advantage of the features of mobile devices, such as the widespread use of link shortening services (like bit.ly) and the inability to hover over a link to check its destination in SMS messages.
  • Vishing: Vishing attacks employ many of the same tactics as phishing but are conducted over the phone. The attacker attempts to get the victim to perform some action or provide confidential data, such as payment card information or login credentials.
Topic 5: Business Intelligence Software 14 hrs

5.1 Introduction to Business Intelligence (BI) 3 hrs

Business intelligence (BI) integrates business analytics, data mining, data visualization, data tools and infrastructure, along with best practices to help organizations make more data-driven decisions. In practical terms, you can recognize that you have modern business intelligence when you have a holistic view of your organization's data and use it to drive change, eliminate inefficiencies, and quickly adapt to market or supply chain fluctuations.

It is crucial to note that this definition represents a contemporary perspective of business intelligence, which has also been considered a buzzword. Traditional business intelligence emerged in the 1960s as a system for sharing information between organizations. Its evolution continued in the 1980s, along with computational models for decision-making, transforming data into information before becoming a specialized offering by BI teams with IT-dependent solutions. Modern BI solutions focus on flexible self-service analysis, governed data on trusted platforms, empowerment of corporate users, and speed to insight. This article will serve as an introduction to BI and is only the tip of the iceberg.

In recent years, business intelligence has evolved to encompass more processes and activities that help improve performance. These processes include the following:

  • Data mining: Using databases, statistics, and machine learning to identify trends in large volumes of data.
  • Reporting: Sharing data analysis with stakeholders so they can draw conclusions and make informed decisions.
  • Benchmarks and performance metrics: Comparing current performance data with historical data to track performance against goals, typically using custom dashboards.
  • Descriptive analytics: Applying preliminary data analysis to understand what happened.
  • Querying: To extract answers from datasets, business intelligence poses specific questions about the data.
  • Statistical analysis: Taking the results from descriptive analytics and further exploring the data using statistics to determine how and why this trend occurred.
  • Data visualization: Transforming data analysis into visual representations like charts, graphs, and histograms to make it easier to consume.
  • Visual analysis: Exploring data through visual storytelling to communicate insights on the fly and stay in the flow of analysis.
  • Data preparation: Compiling multiple data sources, identifying dimensions and measures, and preparing them for data analysis.

Why is business intelligence crucial?

Business intelligence presents current and historical data in the context of the business, facilitating more informed decisions. Analysts can use BI to provide performance and industry benchmarks, helping the organization run smoother and more efficiently. It also allows for easier identification of market trends, which can translate into increased sales or revenue. When the right data is used correctly, it can contribute to everything from compliance to hiring efforts. Some ways business intelligence can help companies make more informed, data-driven decisions include:

  • Identifying opportunities to increase profits.
  • Analyzing customer behavior.
  • Comparing data with competitors.
  • Tracking performance.
  • Optimizing operations.
  • Predicting success.
  • Identifying market trends.
  • Discovering issues or problems.

How business intelligence works. Companies and organizations have questions and goals. To answer these questions and track performance against their goals, they collect the necessary data, analyze it, and determine which actions to take to achieve their goals.

The collaboration between BI, data analysis, and business analysis. Business intelligence encompasses data analysis and business analysis, using them as an integral part of the process. BI allows users to draw conclusions from data analysis. Data scientists delve into the specifics, using advanced statistics and predictive analytics to identify patterns and forecast future trends.

Data analysis asks 'why did this happen and what might happen next?'; whereas business intelligence translates those models and algorithms into understandable results. According to Gartner's IT glossary, 'business analytics includes data mining, predictive analytics, applied analytics, and statistics.'

The Distinction between Traditional BI and Modern BI. Historically, business intelligence tools were based on a traditional model. This top-down approach was driven by the IT department, where most, if not all, analysis queries were resolved through static reports. This meant that if someone had a follow-up question about a report they received, their request went to the back of the queue, forcing them to restart the process. This resulted in slow, frustrating reporting cycles and prevented people from using current data for decision-making. While traditional business intelligence is still a common method for reporting and answering static queries, modern business intelligence is interactive and more accessible. Although the IT department is still crucial in managing data access, various levels of users can customize dashboards and create reports on the fly. With the right software, users can visualize data and answer their own questions.

Business Intelligence Tools and Platforms. Numerous self-service business intelligence tools and platforms simplify the analysis process.

This allows people to see and understand their data without needing technical skills to dig in themselves. There are many Business Intelligence (BI) platforms that facilitate ad-hoc reporting, data visualization, and the creation of custom dashboards for different user types. We have gathered our recommendations for evaluating modern BI platforms to help you choose the right one for your organization. One of the most common ways to present business intelligence is through data visualization.

Benefits of visual analysis and data representation. Data visualization is one of the most effective ways to showcase business intelligence. Humans are visual beings and are deeply attuned to patterns and color variations. Data visualizations make information more accessible and easier to understand. Dashboards that bring together visualizations can quickly tell a story and highlight trends or patterns that would be difficult to spot by manually analyzing raw data. This accessibility also encourages more conversations about the data, thereby increasing its impact on the business.

5.2 BI technology tools 3 hrs

Business Intelligence (BI) tools are applications designed to collect, analyze, and present data to facilitate decision-making. Some of the most recognized BI tools are:

  • Tableau: Allows creating interactive dashboards on sales, most popular dishes, and customer opinions.
  • Microsoft Power BI: Facilitates the analysis of production, waste, and efficiency in real-time.
  • Qlik Sense: Helps analyze the most booked destinations, travel patterns, and promotions.
  • D3.js: Offers visualization of web traffic trends and audience segmentation.
  • TensorFlow: An open-source platform dedicated to machine learning.
  • Dundas BI: A browser-based tool that enables data analysis by its accounts.

Other BI tools include: SAP BusinessObjects Business Intelligence, Oracle Business Intelligence, Yellowfin BI, and Zoho Analytics.

Power BI. Power BI is more than just a Business Intelligence tool; it is a business analytics service from Microsoft that aims to offer interactive visualizations and business intelligence capabilities. Its interface is simple enough for end-users to create their own reports and dashboards.

Tableau. Tableau is our second Business Intelligence tool, a software dedicated to business analysis and intelligence. Its main function is to develop interactive data visualization products that focus on business intelligence.

QlikView. QlikView is another essential tool in the field of Business Intelligence that integrates all data, facilitating the creation of reports and the agile acquisition of business insights. Additionally, it allows exporting information to Excel format. It includes data integration, user-driven business intelligence, and conversational analytics.

SAP BI. SAP BI is a business intelligence software that allows sharing strategic information and making more informed decisions through the SAP Business Objects Business Intelligence (BI) suite. Its analytical platform supports users, facilitating the use of a single tool or multiple interfaces. This solution includes on-premise implementation, offers real-time Business Intelligence, and provides greater user autonomy.

Pentaho. Pentaho is a set of open-source tools designed to generate business intelligence. It integrates functionalities for report creation, data mining, ETL, among others. This tool simplifies data operations and democratizes access to information for all stakeholders in the company, with policy-based automation and metadata-driven data management.

MicroStrategy. MicroStrategy Workstation provides the necessary tools to access, visualize, and analyze data for free, without requiring license keys or trial versions. It also offers fast and flexible analysis that helps maximize the impact of data, laying the foundation for an information-driven future.

SAS Business Intelligence. SAS Business Intelligence allows users to access the right information for those who need it, as well as integrate and discover data on their own. With this tool, you can also share interactive reports and review analyses that are easy to use.

Sisense. Sisense is an analytical tool that facilitates the preparation, analysis, and exploration of growing data from multiple sources. Its main features simplify data analysis and allow unlocking information in the cloud, so that everyone can analyze it and achieve better results. It is also ideal for creating personalized experiences and automating multi-step actions to optimize workflows.

Oracle BI. Oracle BI is a platform of Business Intelligence tools that simplifies analytical strategies through a modern and integrated solution. This tool allows members throughout the organization to make faster, more informed, and mobile-accessible business decisions. Furthermore, the platform has driven the launch of Oracle Analytics, an industry-leading cloud analytics.

Zoho Analytics. Zoho Analytics is a software designed for business intelligence, reporting, and data analysis, which allows for visual analysis and the discovery of insights in minutes. With this tool, it is possible to convert large volumes of raw data into understandable reports. Additionally, you can monitor key business metrics, review past trends, identify anomalies, and uncover hidden information.

5.3 Decision Support Systems 1 hrs (5 hrs)

A Decision Support System (DSS) is a Business Intelligence tool focused on the analysis of an organization's data.

At first glance, data analysis might seem like a simple process that can be achieved with a custom application or an advanced ERP. However, the reality is different: these applications usually offer predefined reports that present information statically, without allowing for a deep exploration of the data, nor the ability to navigate through it or analyze it from different perspectives.

The DSS is one of the most representative tools of Business Intelligence, as, among other functions, it helps overcome many of the limitations of management programs. Below are some of its main features:

  • Generation of dynamic, flexible, and interactive reports, which allows the user not to be restricted to the predefined lists established at the time of implementation, which often do not address their real concerns.
  • Technical knowledge is not required. A user without technical training can create new charts and reports, as well as navigate the data.
  • Users can interact with the information using drag & drop or drill-through. Therefore, to explore the available information or create new metrics, it is not necessary to resort to the IT department.
  • A quick response is obtained, as the underlying database is usually a corporate data warehouse or a datamart, with star or snowflake data models. These types of databases are optimized for the analysis of large volumes of data.
  • There is effective integration among all the company's systems and departments. The ETL process prior to the implementation of a Decision Support System ensures the quality and integration of data between the different units of the organization. This translates into absolute referential integrity. Each user has access to information appropriate to their profile; it is not about everyone having access to all the information, but that each has what they need to do their job as efficiently as possible.
  • Availability of historical data. In these systems, it is common to compare current data with information from previous historical periods of the company, with the aim of analyzing trends and tracking the evolution of business parameters, among other aspects.

Differences with Other Business Intelligence Tools.

The main objective of Decision Support Systems (DSS) lies, unlike other tools such as Balanced Scorecards (BSC) or Executive Information Systems (EIS), in making the most of the information contained in a corporate database (data warehouse or datamart). These systems offer very dynamic reports with great navigation capabilities, all presented in a friendly, attractive, and simple graphical interface.

Decision Support Systems (DSS). A Decision Support System (DSS) is a Business Intelligence tool focused on the analysis of data within an organization. Although it may initially seem that data analysis is a simple process, which can be done through a custom application or an advanced ERP, the reality is different: these applications usually have predefined reports that present information statically, which prevents deep-diving into the data, navigating through it, or analyzing it from different perspectives.

The DSS is one of the most representative tools of Business Intelligence, as, among other features, it helps to overcome many of the limitations of management programs. Below are some of its main characteristics:

Types of Decision Support Systems

  • **Management Information Systems (MIS)**: Management information systems, known as MIS or Administrative Information Systems (AIS), support a wider range of organizational tasks. They are positioned between a traditional DSS and a CRM/ERP application implemented in the company.
  • **Executive Information Systems (EIS)**: Executive information systems (EIS) are the most commonly used type of DSS in Business Intelligence. These systems provide managers with easy access to internal and external information relevant to their company's key success factors.
  • **Expert Systems Based on Artificial Intelligence (ES)**: Expert systems, also called knowledge-based systems, use neural networks to simulate the knowledge of an expert and apply it effectively to solve specific problems. This concept is closely related to datamining.
  • **Group Decision Support Systems (GDSS)**: A group decision support system (GDSS) is defined as 'a computer-based system that helps groups of people with a common task or goal, acting as an interface in a shared environment.' The fundamental premise of GDSS is that by improving communication, higher quality decisions can be obtained.

5.3.1 Data Warehouses 2 hrs

A Data Warehouse is an enterprise database designed to integrate and cleanse information from one or more different sources. Subsequently, it allows this information to be processed for analysis from multiple perspectives and with rapid response speeds. The creation of a data warehouse is often the first step, from a technical approach, to implementing a complete and reliable Business Intelligence solution.

The main advantage of this type of database lies in the structures where the information is stored, such as star schema, snowflake schema, or relational cube models, among others. This form of data persistence is homogeneous and reliable, facilitating the query and hierarchical treatment of information, always in an environment separate from operational systems.

A data warehouse is distinguished by being:

Integrated: the stored data must be unified into a coherent structure, eliminating inconsistencies that may arise between different operational systems. The information is organized at various levels of detail to adapt to the different needs of the users.

Subject-oriented: In the process of generating business knowledge, only essential data from the operational environment is incorporated. This data is grouped by subjects, thus facilitating its access and understanding for end-users. For example, all information related to customers can be concentrated in a single table within the data warehouse. In this way, queries about customers are simplified, as all the information is in one place.

Historical: Time is an inherent component of the information contained in a data warehouse. In operational systems, the data always reflects the current state of business activities. In contrast, the information stored in the data warehouse allows for trend analysis, as it is loaded with the different values a variable has had over time, facilitating comparisons.

Non-volatile: The data warehouse is designed to be queried, not altered. Therefore, the information is permanent. Updating the data warehouse involves incorporating the latest values of the different variables, without modifying what was already present.

Provide support to the end-user, helping them access the data warehouse using their own business language, indicating what information is available and its meaning. Assist in the creation of queries, reports, and analyses using Business Intelligence tools such as DSS, EIS, or BSC.

Support the technical managers of the data warehouse in aspects such as auditing, managing historical information, administering the data warehouse, developing programs to extract information, and specifying interfaces to feedback the operational systems with the results obtained, among others.

Key Contributions of a Data Warehouse

  • Provides an essential tool for decision-making in various functional areas, based on global and integrated business information.
  • Facilitates the use of statistical analysis and modeling techniques to uncover hidden relationships among the data, creating added value for the company.
  • Allows for learning from historical data and forecasting future situations in various scenarios.
  • Simplifies the implementation of comprehensive customer relationship management systems within the organization.
  • Contributes to both technological and economic optimization in Information Center, statistics, or reporting environments, achieving outstanding returns on investment.

Main contributions of a data warehouse:

  • Provides a tool for decision-making in any functional area, using integrated and global business information.
  • Facilitates the application of statistical analysis and modeling techniques to discover hidden relationships in the warehouse data, adding value to the business information.
  • Offers the ability to learn from historical data and anticipate future situations in different contexts.
  • Facilitates the implementation of comprehensive customer relationship management systems within the company.
  • Represents a technological and economic optimization in Information Center, statistical analysis, or reporting environments, with impressive returns on investment.

5.3.2 Dashboards 2 hrs

Dashboards are fundamental in today's data analysis and business intelligence tools, and for a good reason. Business users, regardless of their experience level, can leverage these tools to gain a clearer understanding of what is happening in their organization.

What are they and what is their purpose?

Dashboards allow companies to analyze and visualize their data by presenting metrics, graphs, indicators, maps, percentages, and comparisons of all the information flowing in and out of the company. By viewing data in this way, the learning curve and the time to understand the information are significantly reduced, allowing executives to act more quickly on the findings.

Furthermore, dashboards make it easier for IT departments to convert and communicate complex corporate data into meaningful visualizations, revealing key performance indicators (KPIs). This way, executives get all the tools they need to delve deeper into the analysis and discover what is really happening.

Thus, dashboards have eliminated the need to review multiple reports, and in some cases, the data is updated in near real-time. Additionally, users have the option to customize each dashboard with predefined metrics, allowing for even more agile data tracking and corporate measurement.

What is the use of dashboards?

Now that you understand what dashboards are and how they can be useful, here is how organizations use them in practice:

– Strategy. Organizations are constantly developing strategies, plans, and tactics. Dashboards can assist users in planning these projects, allowing executives to monitor progress towards their goals or persuading them to consider an alternative path. KPIs will be highlighted for all those working with the company's dashboards, which can even turn them into guidance tools that help stakeholders find new ways to achieve business objectives. Moreover, dashboards can help companies keep employees focused on goals by showing which indicators drive the most significant changes.

– Planning. Dashboards allow organizations to visualize, analyze, and compare historical data with updated budgets, forecasts, and goals. They are also useful for monitoring and sharing strategies across different departments, which is ideal for keeping management aligned with what is happening in IT and vice versa. When fully integrated with other business systems, the possibilities are virtually limitless.

– Analytics. Most of the dashboards you will find are the best current business intelligence solutions and offer analytical capabilities. They are primarily used in situations where generating real-time information is crucial. This helps users avoid the unnecessary step of connecting data to a secondary interface. Modern data analysis tools can connect to dashboards that offer various functionalities, such as heat maps, drill-downs, advanced analytics, data mining, prediction, and more. Along with these tools, BI dashboards empower stakeholders, enabling them to make more informed decisions.

Types of dashboards in companies

According to their use, dashboards can be classified into three main categories:

– Tactical dashboards: are used by managers who require a deeper understanding of the actions within the company.

– Strategic dashboards: these are used by senior executives to monitor the company's progress towards its strategic goals.

– Operational dashboards: are used in different departments, such as sales, manufacturing, finance, services, and human resources. Each of these departments needs operational dashboards to carry out their daily tasks efficiently.

Benefits of a dashboard

Implementing dashboards in your operations offers numerous significant benefits, such as:

– Enhanced visibility. Dashboards provide superior visibility by offering accessible information when needed, helping companies better adapt to changing market conditions.

– Time-saving efficiency. With dashboards, valuable time is no longer wasted generating reports from multiple systems. Instead, data is extracted from a centralized source and presented as a visual overview that is easy to interpret.

– Better forecasting. By better understanding each customer's purchasing cycle, it is possible to predict future demand more accurately using historical information. This allows companies to more effectively plan for demand fluctuations in the next business cycle, setting measurable and deliverable goals to achieve greater success.

– Key performance indicators. Dashboards collect data from various areas and present the information in easy-to-understand visual elements in real-time. This provides managers with an overview of current KPIs, allowing them to evaluate different performance areas and generate actionable insights.

– Inventory control. Thanks to analytics and a real-time view of stock details, sales staff know which items are available and where they are located. Dashboards improve inventory control by using detailed historical data to optimize supply quantities and inventory allocation in stores, thus minimizing the risk of stockouts.

– Real-time customer analysis. Having accurate and up-to-date information about customer purchasing behaviors increases the chances of achieving higher retention rates and greater revenue. Real-time information allows sales teams to focus on the right customers at the right time, ensuring that marketing efforts and activities are directed at the right people.

– Improved decision-making. Whether it offers predictive reports and analysis for the entire organization or for specific areas, a dashboard allows companies to analyze key data quickly and accurately. Interactive visualization helps present large volumes of data in an understandable way. By making it easier to identify the real meaning of the data, better decisions can be made that benefit the business.

The dashboard provides companies with a single tool to connect, interact, evaluate, and visualize data from multiple sources on any device. Furthermore, its installation and management require little effort and, most importantly, it is mobile, allowing your business intelligence to go with you wherever you go.

5.4 Key performance indicators (KPIs) 3 hrs

A KPI, an acronym for the English phrase key performance indicator, is a quantitative measure that reflects how your team or company is progressing towards the most relevant objectives.

Organizations use KPIs at different levels. You can set corporate, team-specific, or individual KPIs, depending on the metrics you want to monitor. A good KPI will give you a clear idea of whether you are on the right track to achieve your strategic goals.

The purpose of defining KPIs is to provide a precise picture of what teams want to achieve, as well as to establish deadlines and methods for measuring those achievements.

A good KPI:

  • Helps you achieve your strategic objectives.
  • Informs resource planning.
  • Is measurable.
  • Monitors aspects you can control and influence.
  • Connects metrics with strategic goals.

Offers team members a clear understanding of how their projects contribute to the company's objectives.

KPI vs. OKR (Objectives and Key Results)

Key Performance Indicator (KPI): A KPI is an excellent tool for measuring performance over a specific period. A good KPI should track a measurable value that you or your team can impact at the right time.

Objectives and Key Results (OKR): OKRs follow the structure 'I will [objective] as measured by [key result].' In this context, the objective represents the goal you want to achieve, and the key result evaluates your progress towards that goal.

OKRs are an effective way to approach objectives comprehensively. KPIs, on the other hand, are more like KRs (the key results part of OKRs). In fact, a KPI can be considered a KR. The difference is that KRs can be both quantitative and qualitative, depending on what your objective is measuring, whereas KPIs must always be quantifiable. Below is an example of a KPI and OKR in a company.

Example of KPI: Increase the customer loyalty score (NPS) by two points in FY 2021.

KPI vs. Business Metrics. Business metrics are quantifiable tools that allow you to evaluate your progress towards specific business goals. Once you establish a KPI, use business metrics to track and measure whether you are advancing towards your ultimate goal.

Example of KPI: Increase website traffic to 25,000 in the second quarter. Example of business metrics: Unique website page views (number of visits).

How to Define an Excellent KPI. KPI objectives are fundamental for establishing and achieving quantifiable goals in a company. Before you start, make sure you have a clear objective or strategic plan that you want to achieve with this KPI or the set of KPIs you determine. Once you have defined your KPI, share it with key project stakeholders. It is also important to provide real-time updates to keep everyone informed about the progress.

1. Define your business objective before setting the KPI. Before you can create a KPI, it is essential that you define exactly what you want to achieve. Setting objectives effectively is crucial for the success of your strategic plan (for example, in a marketing campaign). According to recent research, only 16% of knowledge workers believe their company effectively sets and communicates goals.

2. Identify key business metrics and KPI types. Once you have established your business objectives, it is essential to decide which metrics are relevant for each one. Business metrics are indicators that directly affect the achievement of your goals.

Remember that KPI stands for key performance indicators. There can be various metrics or indicators that impact your final objective. Selecting the right KPI involves capturing the most relevant details and ensuring you track those metrics. Not all tasks or projects need an associated KPI.

If you are unsure where to start, review some relevant metrics and the main KPIs for each department or type of business.

Example of financial metrics:

  • Annual Recurring Revenue (ARR).
  • Net Revenue Retention (NRR).
  • Net Profit Margin (NPM).
  • Earnings Before Interest, Taxes, Depreciation, and Amortization (EBITDA).
  • Operating Capital.
  • Cash Flow.
  • Return on Investment (ROI).

Example of customer-related metrics:

  • Net Promoter Score (NPS).
  • Customer Acquisition Cost (CAC).
  • Customer Satisfaction (CSAT).
  • Customer Retention.
  • Customer Churn.
  • Total Paying Customers.
  • Number of New Customers.
  • Customer Loyalty.

Example of process and operations metrics:

  • Lead Time or Total Delivery Time.
  • Number of complaints or error tickets received.
  • Supply chain metrics, such as Days Sales Outstanding (DSO).

Personnel or human resources metrics:

  • Employee Retention Rate.
  • Employee Satisfaction.
  • Salary Competitiveness Ratio (SCR).

Sales metrics:

  • Win Rate.
  • Number of deals lost to competitors.
  • Market Penetration.

Marketing metrics (within a marketing strategy):

  • Qualified Leads.
  • Lead Conversion Rate.
  • Social Media Followers.
  • Content Downloads.
  • Email Click-Through Rate (CTR).
  • Share of Voice.

Once you are clear about the objective you want to achieve and have identified the metrics (or units of measurement) you will use to ensure you achieve it, you can define your KPI. We suggest using the SMART acronym to ensure your KPI is quantifiable, specific, and actionable. SMART is an acronym that stands for:

  • Specific.
  • Measurable.
  • Achievable.
  • Relevant.
  • Time-bound.

Monitor and share progress in real time. Just as with large goals, you should not set KPIs and then ignore them. Make sure you have a method to monitor and share progress in real time with key project stakeholders.

📄 Download Subject Topics (Available in Spanish)