ACTION_img1.gif 2. ACTION
SET UP ON THE WEB TECHNIQUES STRUCTURED APPROACH VALUATION TOOLS
2.1 SET UP ON THE WEB
2.1.1 EQUIPMENT
2.1.1.1 HARDWARE
2.1.1.1.1 COMPUTER
2.1.1.1.1.1 RAM
2.1.1.1.1.2 PROCESSOR
2.1.1.1.1.3 HARD DISK
2.1.1.1.1.4 CD-WRITER
2.1.1.1.2 MONITOR
2.1.1.1.3 PRINTER
2.1.1.1.4 NETWORK
2.1.1.1.5 FAX
2.1.1.1.6 PHONE
2.1.1.1.7 SCANNER
2.1.1.2 SOFTWARE
2.1.1.2.1 ANTI-VIRUS
2.1.1.2.2 FIREWALL
2.1.1.2.3 ENTIRE RESOURCE PLANNING
2.1.1.2.4 BACKUP
2.1.1.2.5 WEB PAGE EDITOR
2.1.2 CONNECTION
2.1.2.1 ADSL
2.1.2.2 ISDN
2.1.2.3 CABLE
2.1.2.4 BROADBAND
2.1.2.5 MODEM
2.1.3 FACILITATORS
2.1.3.1 WEB HOSTING
2.1.3.2 INTERNET SERVICE PROVIDER
2.1.3.3 SECURE SERVER
2.2 TECHNIQUES
2.2.1 SEARCHABLE DATABASE
2.2.2 INTERNATIONAL LANGUAGE
2.2.3 SHARING EXPERTISE
2.2.4 TRADE ISSUES
2.2.5 PUBLICITY
2.2.5.1 TECHNICAL
2.2.5.2 ADVERTISING
2.2.5.3 NEWSLETTER
2.2.6 ENCRYPTION
2.2.7 COMPETITIVE EDGE
2.2.8 NEGOTIATION
2.2.9 COMMUNICATION
2.3 STRUCTURED APPROACH
2.3.1 REGULATIONS
2.3.2 TAXATION
2.3.3 INFORMATION TECHNOLOGY
2.3.4 SELLING AND MARKETING
2.3.5 PEOPLE AND TRAINING
2.3.6 PLAN
2.3.6.1 COMPLETE
2.3.6.2 IMPLEMENT
2.3.6.3 VIABILITY CHECK
2.3.6.4 REVISION
2.4 VALUATION
2.4.1 MULTI-CURRENCY
2.4.2 INTERNAL
2.4.3 EXTERNAL
2.4.4 CAPITAL
2.4.5 REVENUE
2.4.6 QUALITATIVE
2.4.7 QUANTITATIVE
2.4.8 EFFICIENCY
2.5 TOOLS
2.5.1 CONTENT
2.5.2 INTERACTIVITY
2.5.3 RESEARCH
2.5.4 MERCHANT ACCOUNT
2.5.5 PROCESSING
2.5.5.1 AUTOMATIC
2.5.5.2 DO-IT-YOURSELF
2.5.6 SYSTEMS
2.5.6.1 IN
2.5.6.2 OUT
2.5.6.3 MOVEMENTS
2.5.7 SECURITY
2.5.7.1 PHYSICAL
2.5.7.2 INTELLECTUAL
2.5.7.3 WEB CONTENT
2.5.7.4 DATA TRANSFER
2.5.8 CONTINUOUS IMPROVEMENT
2.5.9 LEARNING FORM MISTAKES
2.5.10 COPING WITH ADVERSITY
2.5.11 ACHIEVING GOALS