Chapter I Introduction

Total Page:16

File Type:pdf, Size:1020Kb

Chapter I Introduction CHAPTER I INTRODUCTION Tencent Holdings Limited (Tencent), an investment holding company, provides Internet value-add service (IVAS), mobile and telecommunication value-add services (MVAS), online advertising and e-Commerce transactions. It is China’s largest and most used Internet service portal, the third largest Internet company in the world, which is behind Google and Amazon with USD 38 billion market capitalization. The company offers diverse service include social network, web portals, ecommerce, and multiplayer online games through various segments which are communications platforms, Social platforms, media platforms, Internet value-add service (IVAS), mobile and telecommunication value- add services (MVAS), online advertising and e-Commerce Transaction. Tencent Holdings Limited was founded in 1998 and its headquartered is in Shenzhen, the People’s Republic of China. On June 16, 2004, Tencent Holdings Limited (SEHK 700) went public on the main board of the HongKong Stock Exchange. 1.1 Background Tencent was formed by Huateng Ma and Zhidong Zhang in November 1998 as Tencent Inc. It was incorporated in the Cayman Islands using funds from venture capitalists. In these earlier three years, the company did not turn a profit for three years. In 2001, a South African company named Naspers purchased a 46% share of the company. At same time, Tencent’s messenger product has changed its name from OICQ to QQ. Tencent joined the Hong Kong stock exchange in 2004 and it was add as a Hang Seng Index Constituent Stock in 2008. Tencent has grown into one of China’s Largest and most used Internet service portal. The mission of Tencent is to enhance the quality of human life through Internet service. Through the multiple Internet platforms in China – QQ Instant Messager (QQ), WeChat, 1 QQ.com, QQ Games, Qzone, 3g.QQ.com, SoSo, PaiPai and Tenpay, Tencent services as the China’s largest Internet community in China, to meet the various needs of Internet users including communication, information, entertainment, ecommerce and others. In the November 2010, Tencent became the third largest Internet Company in the world behind Google and Amazon with a market capitalization of USD 38 billion. Until December 31, 2012, the active QQ users account for QQ IM amounted to 789.2 million while in peak concurrent users reached 176.4 million. Tencent is profoundly influenced the ways of communication and lifestyle of hundreds of millions of Internet users. Total revenues were USD 6,983.3 million in 2012, an increase of 54.0% over the year ended December 31, 2011. The Gross profit of the year 2012 was USD 4, 086.6 million, an increase of 38.3% over the year ended December 31, 2011. 1.2 Purpose Marketing isn’t as simple as it used to be. A decade or so ago all you had to do was put together as advertising plan, do a few direct mail pieces, and have your publicist put out a regular series of press releases. Today, it’s a lot more complex. Especially in Internet industry, because of the unique structure of the Internet industry, the strategy might not be same as the traditional industries, and the characters of being high technology dependent, short product life cycle, having many market segment, different way of communication and so on, might also lead to other strategies that are different from those traditional industries. This study would like to take Tencent which is one of the China’s largest and most widely used Internet service portals, is already in a leader position in China’s Internet market, to be an example to analysis the internal and external factors with the aid of interviews and empirical data, and analysis the marketing strategy that are used by Tencent. Wish it could provider a basic idea of marketing strategy for the companies as Tencent in the Internet industry. 2 1.3 Objectives To identify current market situation To analysis the Marketing strategies of Tencent Holdings Limited To recommend Tencent Holdings limited how to develop the market. 3 .
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Download Audio Content for Re-Listening
    European Proceedings of Social and Behavioural Sciences EpSBS www.europeanproceedings.com e-ISSN: 2357-1330 DOI: 10.15405/epsbs.2020.11.03.23 DCCD 2020 Dialogue of Cultures - Culture of Dialogue: from Conflicting to Understanding INFORMATION TECHNOLOGY IN TEACHING CHINESE: ANALYSIS AND CLASSIFICATION OF DIGITAL EDUCATIONAL RESOURCES Tatiana L. Guruleva (a)* *Corresponding author (a) Moscow City University, 5B Malyj Kazennyj pereulok, Moscow, Russia; Institute of Far Eastern Studies of Russian Academy of Sciences, 32 Nakhimovskii prospect, 117997, Moscow, Russia, [email protected] Abstract The intercultural approach to teaching Chinese as a foreign language in Russia was first implemented by us in a model for co-learning languages and cultures. This model was developed in 2009-2011, it took into account the specifics of teaching the Chinese language, which is studied simultaneously with the English language. The model was tested in the international multicultural educational region of Siberia and the Far East of Russia and northeastern part of China. However, the intercultural approach has wide potential for implementation not only in conditions of direct contact with representatives of another culture. In the modern world, information technologies for teaching foreign languages are increasingly in demand. For a number of objective reasons, large technology companies until the beginning of the 21st century could not begin to develop information technologies that support the Chinese language. Therefore, the history of the creation and use of information technologies for teaching the Chinese language is happening right now before our eyes. In this regard, the analysis and classification of information resources for teaching the Chinese language is relevant and in demand.
    [Show full text]
  • Tencent and China Mobile's Dilemma
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) Association for Information Systems AIS Electronic Library (AISeL) Pacific Asia Conference on Information Systems PACIS 2014 Proceedings (PACIS) 2014 FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Qingqing Wan School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Follow this and additional works at: http://aisel.aisnet.org/pacis2014 Recommended Citation Wu, Jun and Wan, Qingqing, "FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA" (2014). PACIS 2014 Proceedings. 265. http://aisel.aisnet.org/pacis2014/265 This material is brought to you by the Pacific Asia Conference on Information Systems (PACIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in PACIS 2014 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Qingqing Wan, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Abstract With the coming of mobile internet era, Giants in the different industry begin to compete face by face. This teaching case presents the event of charging for WeChat in China context to delineate the new challenges that Online Service Provider and Mobile Network Operator will face.
    [Show full text]
  • NIBC First Round Case NIBC Ele Ctro N Ic Arts Contents
    NIBC First Round Case NIBC Ele ctro n ic Arts Contents 1. The Scenario 2. Background Information 3. Tasks & Deliverables A. Discounted Cash Flow Analysis B. Trading Comparables Analysis C. Precedent Transactions Analysis D. LBO Analysis E. Presentation 4. Valuation & Technical Guidance A. Discounted Cash Flow Analysis B. Trading Comparables Analysis C. Precedent Transactions Analysis D. LBO Analysis 5. Rules & Regulations 6. Appendix A: Industry Overview 7. Appendix B: Precedent Transactions Legal Disclaimer: The Case and all relevant materials such as spreadsheets and presentations are a copyright of the members of the NIBC Case Committee of the National Investment Banking Competition & Conference (NIBC), and intended only to be used by competitors or signed up members of the NIBC Competitor Portal. No one may copy, republish, reproduce or redistribute in any form, including electronic reproduction by “uploading” or “downloading”, without the prior written consent of the NIBC Case Committee. Any such use or violation of copyright will be prosecuted to the full extent of the law. Need for Speed Madden NFL Electronic Arts Electronic Arts Welcome Letter Dear Competitors, Thank you for choosing to compete in the National Investment Banking Competition. This year NIBC has continued to expand globally, attracting top talent from 100 leading universities across North America, Asia, and Europe. The scale of the Competition creates a unique opportunity for students to receive recognition and measure their skills against peers on an international level. To offer a realistic investment banking experience, NIBC has gained support from a growing number of former organizing team members now on the NIBC Board, who have pursued investment banking careers in New York, Hong Kong, Toronto, and Vancouver.
    [Show full text]
  • Chapter Iv Strategy Analysis
    CHAPTER IV STRATEGY ANALYSIS 4.1 Marketing Mix 4.1.1 Products Through the multiple Internet platforms in China, Tencent offers diversified services which include QQ, Weixin or Wechat for communications; Qzone for social networking; QQ Game platform for online games; QQ.com for information; Soso for search engine; Paipai and Tenpay for ecommerce transaction. The company’s business scope mainly covers four ereas: Internet value-add service (IVAS), mobile and telecommunication value-add services (MVAS), online advertising and e-Commerce transactions, to meet the various needs of Internet users including communication, information, entertainment, ecommerce and others. 4.1.2 Price Table 4. 1 Tencent major products and services’ usage fees Usage fee Communications QQ Free Weixin/Wechat Free Value-Added Services (VAS) a) Social Networks QQ Membership RMB 10 per month Super QQ Membership RMB 20 per month 26 Qzone Free; monthly subscription fee for VIP privileges (RMB10); and items sales from apps on open platform Tencent Microblog Free; monthly subscription fee for VIP privileges (RMB10); QQ Show (Avatars) Free; Monthly subscription fee for VIP privileges (RMB10); or item sales QQ Music Free; Monthly subscription fee for VIP privileges (RMB10); or item sale QQ mail Free Mobile VAS Monthly subscription fee for VIP privileges (RMB5-15); or item sales (RMB1- 2 per item) b) Online Games QQ Game Platform Monthly subscription fee for VIP privileges (RMB10-15) or item sales ACGs Monthly subscription fee for VIP privileges (RMB10-30) or item sales MMOGs Monthly subscription fee for VIP privileges (RMB20) or item sales; Time-based Mobile Games Monthly subscription fee for VIP privileges (RMB10) or item sales c) eCommerce Paipai.com Free Tenpay Free Online Advertising Brand display Inventories on QQ.com and verticals; online video platform; QQ IM, Mobile Browser etc; Pricing mainly by cost per time (CPT) or cost per day(CPD).
    [Show full text]
  • The Digital Diaspora in Sunset Park: Information and Communication Technologies in Brooklyn’S Chinatown
    City University of New York (CUNY) CUNY Academic Works All Dissertations, Theses, and Capstone Projects Dissertations, Theses, and Capstone Projects 2013 The Digital Diaspora in Sunset Park: Information and Communication Technologies in Brooklyn’s Chinatown Sarah Wendolyn Williams Graduate Center, City University of New York How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_etds/1759 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] THE DIGITAL DIASPORA IN SUNSET PARK: INFORMATION AND COMMUNICATION TECHNOLOGIES IN BROOKLYN’S CHINATOWN by SARAH WENDOLYN WILLIAMS A dissertation submitted to the Graduate Faculty in Anthropology in partial fulfillment of the requirements for the degree of Doctor of Philosophy, The City University of New York 2013 © 2013 SARAH WENDOLYN WILLIAMS All Rights Reserved ii This manuscript has been read and accepted for the Graduate Faculty in Anthropology in satisfaction of the dissertation requirement for the degree of Doctor of Philosophy. ___Michael Blim___________________________ _________________________ _________________________________________ Date Chair of Examining Committee ___Gerald Creed___________________________ _________________________ _________________________________________ Date Executive Officer Professor Michael Blim Distinguished Professor David Harvey Professor Emeritus Jane Schneider Supervisory
    [Show full text]
  • VBI Vulnerabilities Portfolio
    VBI Vulnerabilities Portfolio October 28, 2013 <[email protected]> http://www.vulnbroker.com/ CONFIDENTIAL VBI Vulnerabilities Portfolio Contents 1 Foreword 6 1.1 Document Formatting.................................... 6 1.2 Properties and Definitions.................................. 6 1.2.1 Vulnerability Properties............................ 6 1.2.2 Vulnerability Test Matrix........................... 8 1.2.3 Exploit Properties............................... 8 2 Adobe Systems Incorporated 12 2.1 Flash Player......................................... 12 VBI-12-033 Adobe Flash Player Client-side Remote Code Execution........... 12 2.2 Photoshop CS6....................................... 15 VBI-13-011 Adobe Photoshop CS6 Client-side Remote Code Execution......... 15 3 Apple, Inc. 17 3.1 iOS.............................................. 17 VBI-12-036 Apple iOS Remote Forced Access-Point Association............. 17 VBI-12-037 Apple iOS Remote Forced Firmware Update Avoidance........... 18 4 ASUS 21 4.1 BIOS Device Driver..................................... 21 VBI-13-015 ASUS BIOS Device Driver Local Privilege Escalation............ 22 5 AVAST Software a.s. 24 5.1 avast! Anti-Virus...................................... 24 October 28, 2013 CONFIDENTIAL Page 1 of 120 VBI Vulnerabilities Portfolio VBI-13-005 avast! Local Information Disclosure..................... 24 VBI-13-010 avast! Anti-Virus Local Privilege Escalation................. 26 6 Barracuda Networks, Inc. 28 6.1 Web Filter.......................................... 28 VBI-13-000
    [Show full text]
  • 3D Printing Banking/E- 19% Commerce and Mobile Payments 21%
    Mapping the Future The Future is Made in China UNDP and Innovation The Future is Made in China Methodology: Wisdom of Crowds 你觉得,当前在中国的创新方面,有着怎样的最热门的趋势? 这个创新可以为社会带来什么积极的影响? 请输入一个你认为将给社会带来最大积极贡献的创新领域 在您看来,在中国关于 这一创新领域的发展氛围如今面临着怎样的帮助或阻碍? 当说起 关于其前沿的创新趋 势,你见过或听说过的哪些例 子是让你最为印象深刻的? The Future is Made in China The Future is Made in China 1st round: Bilingual website survey engaging respondents on innovation in China Collect data and idenitfy major trends 2nd round: Bilingual website survey engaging respondents on 6 major trends Analyze outputs and linkages from second round The Future is Made in China Major Innovation Trends in China RESPONSES (BY PERCENTAGE) Drones 7% Mobile Applications Internet of 15% Things 38% Internet 3D Printing Banking/E- 19% Commerce and Mobile Payments 21% The Future is Made in China The Future is Made in China 3D Printing Who’s at the Forefront? In China, Su Bo, Vice Minister of Industry and Information Technology said that China should establish plans to speed up research and development and application of 3D printing technologies. When participants were asked to name who was at the forefront of this innovation, a participant mentioned the possibility of universities such as Xi’an Jiaotong University. Mr. Lu Bingheng, the Dean of the School of Mechanical Engineering at Xi’an Jiaotong University and also known to develop the first UV rapid prototyping machine in the world, called 3D printing equipment as an “indicator of the dynamic and innovation capability of an economy.” Other universities working towards this
    [Show full text]
  • Chapter Iii Internal & External Analysis
    CHAPTER III INTERNAL & EXTERNAL ANALYSIS 3.1 Vision & Mission Vision To be the most respected Internet Company. Earn the respect of consumers by listening, satisfying and exceeding their needs and expectations. Earn the respect of employees by continuously improving our corporate reputation so that Tencent is a company employees are proud to work for. Earn the respect within the industry by promotion the healthy development of the Inernet industry and win-win collaboration with partners. Earn the respect of society by actively assuming corporate responsibility and contributing to community development. Mission To enhance people’s quality of life through Internet services. Treat the Internet like electricity: a reliable service that makes life easier and more enjoyable. Address the diverse need of different regions and consumers by offering differentiated products and services Build a healthy and win-win Internet ecology based on open collaboration with partners. 12 3.2 PEST Analysis PEST, as an analysis framework of macro-environmental factors, which can be considered as macro-environmental factors and its usefulness line in the assumption that the success of a particular organization or management solution cannot be understood without having the information relevant to the specific business environment (Buchanan and Gibb, 1998). 3.2.1 Political factors As a majority of Tencent’s operations are located in China, therefore its results of operations, financial condition and prospects are subject to regulatory developments in China. The China’s Internet and telecommunications industries are highly regulated. Regulations issued or implemented by the State Council, MIIT, MOC, GAPP and other relevant government authorities cover many aspects of its telecommunications and Internet information services, including entry into the telecommunications industry, the scope of permissible business activities, licenses and permits for various business activities and foreign investment.
    [Show full text]
  • Zhang Guoyou, Jiang Wenlong, Wang Ying and Liu Shang
    Zhang, G., Jiang, W., Wang, Y. & Liu, S. (2017). Research on Zhang, Jiang, Wang & Liu multifunctional integrated internet platforms. In Proceedings of The 17th International Conference on Electronic Business (pp. 215-221). ICEB, Dubai, UAE, December 4-8. Research on Multifunctional Integrated Internet Platforms Guoyou Zhang*, School of Economics and Finance, Xi'an JiaoTong University & School of Business Administration, Tongling University, China, [email protected] Wenlong Jiang, School of Business Administration, Tongling University, China Ying Wang , School of Foreign Languages, Tongling University, China Shang Liu, School of Business Administration, Tongling University, China ABSTRACT Throughout the development of China’s Internet industry for more than 20 years, we can tease out three stages that can represent the trend of the times: the first stage can be called "the Portal Era" with the entire Internet industry dominated by portal websites. However, with several major portals ’transitions after being unable to maintain effective operation of their profit model, the Portal Era came to an end. The second stage we call "Social Network Era", represented by Sina Mircroblog and WeChat. The former had successful transitions after several ups and downs and the latter is trending and promising. Also vigorously developing are various social websites and mobile apps. In the midst of the laughter of those entrepreneurs, the industry came to a third stage of development: The Era of E-business. These three stages did not appear one after another in chronological order. Social networks and e-business platforms in fact exist simultaneously with two groups of people hitting on different roads that lead to the same destination.
    [Show full text]
  • Assets Portfolio
    Assets Portfolio October 6, 2014 CONFIDENTIAL Assets Portfolio Contents 1 Foreword 7 1.1 Document Formatting.................................... 7 1.2 Properties and Definitions.................................. 7 1.2.1 Vulnerability Properties............................ 7 1.2.2 Vulnerability Test Matrix........................... 9 1.2.3 Asset Deliverables............................... 9 1.2.4 Exploit Properties............................... 10 2 Adobe Systems Incorporated 13 2.1 Adobe Reader........................................ 13 14-004 Adobe Reader Client-side Remote Code Execution............. 13 2.2 Flash Player......................................... 15 12-033 Adobe Flash Player Client-side Remote Code Execution........... 15 2.3 Photoshop CS6....................................... 17 13-011 Adobe Photoshop CS6 Client-side Remote Code Execution......... 18 3 Apple, Inc. 20 3.1 Mac OS X.......................................... 20 14-010 Apple Mac OS X Local Privileged Command Execution........... 20 4 ASUS 22 4.1 BIOS Device Driver..................................... 22 13-015 ASUS BIOS Device Driver Local Privilege Escalation............ 23 October 6, 2014 CONFIDENTIAL Page 1 of 134 Assets Portfolio 5 AVAST Software a.s. 25 5.1 avast! Anti-Virus...................................... 25 13-005 avast! Local Information Disclosure..................... 25 13-010 avast! Anti-Virus Local Privilege Escalation................. 27 6 Barracuda Networks, Inc. 29 6.1 Web Filter.......................................... 29 13-000 Barracuda
    [Show full text]
  • The Chinese Music Industries: Top Down in the Bottom up Age
    The Chinese Music Industries: Top Down in the Bottom Up Age Guy Morrow and Fangjun Li Final, accepted version of a chapter to be published in Patrik Wikstrom and Robert Defillippi (eds), Business Innovation and Disruption in the Music Industry, Cheltenham, UK: Edward Elgar Publishing, 2015. Introduction This chapter examines the Chinese government’s investment in the cultural industries in China that relate to music. It argues that this investment has fostered horizontal integration across music content and technology industry boundaries in this country. By examining the role of the Chinese government in developing creative industries via financial subsidies and other forms of infrastructure support, an important difference in cultural industry policy between China and many countries in the West is outlined. Specifically, China’s top down policy approach (Zhu, 2009; Cai et al, 2006) and censorship of digital content (Street, 2012; De Kloet, 2010) contrasts starkly with the emergent ‘bottom up’ paradigm (Hracs, 2012: 455-56; Young and Collins, 2010: 344-45; Hesmondhalgh, 2015) that has arisen is a number of countries in the West. The question of how these music industries have been affected by digital distribution, and how this has led to business innovation and disruption in the music industries, has necessarily been accompanied by discourse relating to the freedom of speech and expression, as well as human rights in China (Keane, 2013). This is perhaps best exemplified by the example of Google’s failed attempt to use free music to 1 gain market share from the popular search engine Baidu in China (Schroeder, 2009). This chapter in part examines this case and the way in which Google attempted this initiative due to the high level of piracy in China and the way in which Baidu was facilitating piracy in order to gain market share.
    [Show full text]