e Commerce
e Commerce
The term also applies to the use of computer networks to search and
retrieve information in support of human and corporate decision
making.
WHAT IS E-COMMERCE
• E-com Applications :
(ii) Marketing
• Business Goals :
• Challenges :
1) Advantages to Organizations
1) Using e-commerce, organizations can expand their market to national and
international markets.
2) An organization can easily locate more customers, best suppliers, and suitable
business partners across the world.
3) E-commerce helps organizations to reduce the cost to create process,distribute,
retrieve and manage the paper based information by digitizing the information.(
manual to computerised)
4) E-commerce improves the brand image of the company.
5) E-commerce helps organization to provide better customer services.
6) E-commerce helps to simplify the business processes and makes them faster
and efficient.
7) E-commerce reduces the paper work.
2) Advantages to Customers
1) It provides 24x7 support. Customers can enquire about a product or service
and place orders anytime, anywhere from any location.
2) E-commerce application provides users with more options and quicker delivery
of products.
3) E-commerce application provides users with more options to compare and
select the cheaper and better options.
4) A customer can put review comments about a product and can see what others
are buying, or see the review comments of other customers before making a final
purchase.
5) E-commerce provides options of virtual auctions.
3) Advantages to Society
1) Customers need not travel to shop a product, thus less traffic on road and low
air pollution.
2) E-commerce helps in reducing the cost of products, so less affluent people can
also afford the products.
3) E-commerce has enabled rural areas to access services and products, which are
otherwise not available to them.
4) E-commerce helps the government to deliver public services such as
healthcare, education, social services at a reduced cost and in an improved
manner.
few. This itself shows the competition in the ecommerce market. One of the best
ways to stand out from the crowd is by providing a unique customer experience.
This includes giving a personalized experience (discount , gifts , cash back ,
voucher) to each customer or visitor of your online store, website, or mobile app.
Ex. paytm
With the increasing use of smart phones for shopping online, it has become more
7. Increasing sales
The objective of increasing sales will always remain continuous and constant for an
ecommerce business. In order to thrive in the ecommerce industry, you need to
boost your sales, constantly. All other objectives are zeroed down to make this
objective happen. Only you can decide what is perfect for your business and what
is not. Every business is unique, and so is yours!
[GENERIC FRAMEWORK OF E-COMMERCE]
infrastructures.
You must travel across this highway, whether you are an organization
purchasing supplies or a consumer ordering a movie on demand.
• The key questions are : Do consumers want new services and will
they payfor them ??
• Plans for video-on-demand and other applications are
predicted on imaginary customers who are
expected to buy multimedia services.
• To accurately gauge consumer intentions with respect to
services they donot yet understand is very difficult.
• Focus groups and limited market tests suggest consumers show no
pressing demand for additional services or for a 500-channel
interactive TV.
• Some businessmen are convinced that public will gobble up
interactiveservices if they are made available.
• Challenges facing marketers in electronic markets :-
– Consumers are generally satisfied with the range of choices
now available on cable TV. The main complaint is quality and
cost ofservice.
Just-in-Time Manufacturing :
JIT purchasing
Functions of SCM
• Supplier Management
– The goal is “to reduce number of suppliers and get them
to becomepartners in business in a win/win relationship.”
– Benefits :
• Reduced purchase order (PO) processing costs
• Increased number of POs processed by fewer employees
• Reduced order processing cycle times.
• Inventory Management
– The goal is “to shorten the order-ship-bill cycle.”
– Majority of partners are electronically linked, information
can besent/received quickly.
– Documents can be tracked to ensure they were received.
– Benefits :
• Improved Audit Capabilities. (Documents can be
tracked toensure they were received).
• Enable the reduction of inventory levels
• Improve inventory turns
• Eliminate out-of-stock occurrences.
• Distribution Management
– The goal is “to move documents related to shipping (bills of
lading, purchase orders, advanced ship notices, and manifest
claims)”
– Benefits :
• Improved Resource planning (Documents can be sent in
momentand contain accurate data).
• Channel Management
– The goal is “to quickly disseminate information about
changing operational conditions to trading partners.”
– Benefits :
• Technical products and pricing information can be
posted to electronic bulletin boards, thus allowing
instant access.
• Electronically linking production with their international
distributor and reseller networks eliminate thousands of
labor hours per week in the process.
• Payment Management
– The goal is “to link the company and the suppliers and
distributors so that payments can be sent and received
electronically.”
– Benefits :
• Increased speed at which companies can compute
invoices.
• Reduced clerical errors
• Lower transaction fees and costs with increasing
productivity (number of invoices processed )
•
• Financial Management
– The goal is “to enable global companies to manage the
money invarious foreign exchange accounts.”
– Companies must work with financial institutions to boost their
ability todeal on a global basis.
– They need to assess their risk and exposure in global financial
markets
– They need to deal with global info as opposed to local
marketinformation.
lines.
• It is beginning to penetrate the desktop PC market (limited
growth due totechnical limitations)
• Faster chips for processing video (compressing and
decompressing) isrequired.
• As the point-to-point or point-to-multipoint video conferencing
drops, it is expected to continue its penetration into the corporate
marketplace.
Applications of M-commerce
Mobile Ticketing and Booking: Making bookings and receiving your tickets on
the mobile. The digital ticket or boarding pass is sent directly to your phone
after you make the payment from it. Even in India now IRTC and other services
provide m-ticketing services.
Auctions: Online auctions having now been developed to be made available via
mobile phones as well.
Stock Market Reports and even stock market trading over mobile applications.
Ex. Angle Broker
Ex. 99acers
For finance- People who use mobile phones can make transactions easily from
anywhere. Even if they have to make a payment of something, they can easily
do so and will also receive a receipt regarding the payment.
For retail and after-sale services- Customers can view a product online to
know its price and details. Also, they can buy products or can even ask for
service online. Ex. Myntra , jabong sanpdeal,
Ex .midecare , Medlife
For gaming- Online games are becoming very popular these days. The
multiplayer games can be easily accessed by smart phones
Ex Freefire , pubgee
For information- People can check the news, cricket scores etc. Also, students
can check their university exam results easily.
Ex . VNSGU.AC.In , Cricbuzz
Advantages of M-commerce
It provides a very convenient and easy to use the system to conduct business
transactions.
Mobile commerce has a very wide reach. A huge part of the world’s population
has a mobile phone in their pocket.
Disadvantages of M-commerce
In developing countries, the networks and service providers are not reliable. It
is not most suitable for data transfer.
Then there is the issue of security. There are many concerns about the safety
of the customer’s private information. And the possibility of a data leak is very
high.
The I-Way is quickly acquiring new on-ramps and even small highway
systems.
(i) Display
(ii) Controls
(iii) Pipeline
(iv) Brains
(v) Accessibility
• Display
– TV is well adapted to showing full-motion video to
viewers sitting several feet away, but it‟s text display is
extremely limited.
– High-definition TV, still getting off the ground, is sharper
but still toopoor for text.
– Computer displays can easily display video, text, and
graphics crisplyto a viewer seated one and half feet away.
– Computers wouldn‟t have to adapt much to match TV‟s
strengths, but TV is a long way from matching a computer
monitor‟s strength.
• Controls
– Set-top will use a hand-held remote control that permits
selectionsfrom menus.
– Computer has a full-function keyboard;most also have a
mouse for pointing, clicking and high-lighting;other
devices such as joysticks, trackballs, light pens, and voice
• Pipeline
– Existing cable TV systems can deliver a huge amount of
info rapidly one way – to the home – but must be modified
to allow a significantreturn flow.
– New modems and networks let computers communicate
over highcapacity cable lines.
– Future systems will need high-capacity lines to deliver the
vast volumeof data needed for digitized video like movies on-
demand.
• Brains
– Set-top box is a special-purpose computer with powerful
graphics and communications features but limited
versatility*
– Box is largely a slave to the central computers of the
interactivesystem.
– PCs are very versatile ; interactive applications are just
part of itsversatility.
– PCs are powerful in their own right and not dependent on
system‟s central computers with which they
communicate.
– Centralized control has usually given way to autonomy for
users.
• Accessibility
– Every household has a TV and is familiar and comfortable with
using it.
– People most likely to use interactive systems may be the
same onesmost attracted to computers.
– Leap to interactive use is greater from passive TV watching
than from active computer use.Thus, universality of TV is less
advantageous thanit appears.
– But a Significant part of public remains uncomfortable with
computers.
2.Computer-Based Telephony
which today are seen only on older networks, do not need power
and they don’t regenerate the data signal. It is just a connector
that connects the wires coming from different branches.
● Intelligent hub
regenerates the signal ,performs network management and
intelligent path selection.
Functions:
● like repeater hubs can also regenerate signal
● The basic function of a hub is to take data from one of the
connected devices and forward it to all the other ports on the
hub.This method of operation is inefficient because, in most cases,
the data is intended for only one of the connected devices
● Due to the inefficiencies of the hub system and the constantly
increasing demand for more bandwidth, hubs are slowly but surely
being replaced with switches.
Switch:
● It can perform in both the second and the third layer of the OSI
Model, the Data-Link and the Network layer respectively.
● Layer 2 switch: While in the Data-Link layer, it can successfully
perform the task of a Switch by forwarding all the frames to the
required devices using the MAC Addresses.
● Layer3 switch: Furthermore, it can also perform the task of a
Router;it can receive data Packets and successfully forward them
to their destination IP Addresses to make sure that they reach
their destination.
● Rather than forwarding data to all the connected ports like hub,
a switch forwards data only to the port on which the destination
system is connected. It looks at the Media Access Control (MAC)
addresses of the devices connected to it to determine the correct
port. A MAC address is a unique number that is stamped into every
NIC. By forwarding data only to the system to which the data is
addressed, the switch decreases the amount of traffic on each
network link dramatically.
● Switches can also further improve performance over the
performance of hubs by using a mechanism called full-duplex . In
full-duplex mode it can send and receive data on the connection at
the same time. In a full-duplex connection, the maximum data
throughput is double that for a half-duplex connection
● Data transmission speed in switches can be double that of other
network devices like hubs used for networking. This is because
switch shares its maximum speed with all the devices connected to
it. This helps in maintaining network speed even during high
traffic. In fact, higher data speeds are achieved on networks
through use of multiple switches.
Satellite Networks
– Strategic advantages :
• Average availability of 99.5 % and ease of rapid
development inremote or hard-to-reach areas.
• With a VSAT network, organizations have control
over andinsight into entire network from a single
point
Business to business is one in which a company deals with another company for business
and exchanging of goods, products, services. Some of the examples of b2b e-commerce
sites are a company's official site, brokering sites etc.
Business to customer is one where the company sells its goods to the customer or trades
with the customers. This is electronic retailing and called as e-tailing in common. One of
the best examples is amazon.com.
Consumer to business is when a customer works for a certain company for business and
the company buys it, here the consumer has to price the trade. Example for such a site is
priceline.com.
Consumer to consumer is more like auctioning, bartending, etc. where a consumer places
bid and other buys it. Here the websites acts an intermediate for the business Example for
such sites is eBay.
Business-to-government (B2G)
Government to business
E-commerce is a business model were all the information and services are provided by the
Government to the Business Organizations. The information is shared through a vast
network of different government websites.
The business Organization use that information to apply for various permission needed for
starting a new business, and other specifications.
Eg: filling business tender
Government-to-consumer
This model describes when a government or public sector entity uses ecommerce to sell
goods or services to consumers.
Eg:-online job portal for customer like OJAS.
Consumer to Government
E-commerce business allows consumers to provide feedback or ask for information about
government authority from the public sector.
Eg:- Paying an electricity bill via the government website business model.
For the consumers they can buy products from home, so no tedious
work in buying and they can trade any time. E-commerce thus is a
greater benefit provided it has ultimate security.
The main vehicles of E-commerce remain the Internet and the World
Wide Web, but use of email, fax, and telephone orders are also
prevalent.
Global Suppliers
Classic EDI
Accounting,
Engineering Manufacturing
Finance
and research and production
and management
Private Internal
commerce publishing
Consumer-oriented
Electronic Commerce
Customers
1) Consumer-to-Business Transactions
3) Intra-organizational Transactions
• Public data :
– Have no security restrictions, can be read by anyone.
– Should be protected from unauthorized tampering or modification.
• Copyright data :
– that is copyrighted but not secret
– Owner of data is willing to provide it but user has to pay for it.
– Objective is to maximize revenue and security.
• Confidential data:
– Material that is secret but whose existence is not secret.
– Such data include bank account statements, personal files etc.
– May be referenced by public or copyright data.
• Secret data :
– existence is secret , might include algorithms
– it is necessary to monitor and log all access to secret data.
• Security and verification are necessary for all types of data because of
sensitivity of information being transferred and to protect the consumer
from various forms of fraud and misconduct.
2 > WWW - based Security Schemes
– revision of HTTP
– Will enable the incorporation of various cryptographic message
formats (such as DSA and RSA standards) into both Web client and
server.
– Most of the security implementation will take place at the protocol.
• SHEN:
– A security scheme for the Web sponsored by W3 consortium.
– It is noncommercial or more research oriented and is similar to
SHTTP.
• It is likely that in near future, three security schemes will collaborate to
develop asingle standard.
• This security protocol, called secure sockets layer (SSL), provides data
encryption, server authentication, message integrity, and optional client
authentication for a TCP/IP connection.
• SSL is layered beneath application protocols such as HTTP, SMTP,
TELNET, FTP,Gopher and NNTP
• It is layered above the Internet connection protocol TCP/IP.
• SSL provides a security “handshake” to initiate the TCP/IP connection.
• This handshake results in the client and server agreeing on the level
of security they will use and fulfills any authentication requirements
for the connection.
After handshake, SSL‟s only role is to encrypt and decrypt the message stream
• For example :
• S-HTTP assumes that the Web and the HTTP protocol are central to
electroniccommerce due to their installed base and ease of use.
• S-HTTP supports a variety of security mechanisms to HTTP clients and
servers.
• It provides the security options appropriate to the wide range of
potential end usespossible on the Web.
• The protocol provides symmetric capabilities to both client and server,
while preserving the transaction model and implementation
characteristics of the currentHTTP.
• To ensure a secure conversation between a Web client and server, S-
HTTP works by negotiating the type of encryption scheme used between
client and server.
• Option negotiation is used to allow clients and servers to agree on
– Transaction modes (should request be signed? Encrypted?
What aboutreply?)
– Cryptographic algorithms
– Certificate selection (e.g. sign with VISA card certificate)
• S-HTTP secured clients can talk to S-HTTP oblivious servers vice-
versa (suchtransactions would not use security features)
• S-HTTP does not require client-side public key certificates (or public keys)
2.4 Introduction:-
• Electronic payment systems are becoming central to on-line
business processinnovation.
• Emerging innovations in the payment for goods and services in E-com
promise tooffer a wide range of new business opportunities.
• Electronic payment systems and E-com are intricately linked given
that on-lineconsumers must pay for product and services.
• Payment is an integral part of the mercantile process and prompt
payment iscrucial.
• Prompt and secure payment, clearing and settlement of credit and debit
claims areimportant aspects of E-com.
• The way of payment for buying goods and services and the medium
of payment(currency) is a problem faced by on-line sellers.
• Electronic replicas of the conventional payment methods (cash, check,
bank draft,bills of exchange) are not well suited for speed required in e-
com purchasing process.
• Conventional instruments are too slow for micro payments and the high
transactioncosts involved in processing
• Neo(new)-payment methods must
(i) be secure (ii) have a low processing cost and (iii) be accepted
globally
2.Retailing payments
– To handle micro-payments
– For more traditional products
– For specific predefined transactions
– Or, for more general transactions
• Characteristics of cash
Properties of E-cash :
– Monetary Value :
• It must be backed by either cash (currency), bank-
authorized credit,or a bank certified cashier‟s check.
• E-cash without proper bank certification carries the risk
of getting returned for insufficient funds, when
deposited.
– Interoperable :
• It must be exchangeable as payment for other e-cash,
paper cash, goods and services, lines of credit, deposits in
banking accounts, bank notes or obligations, electronic
benefits etc.
• Multiple banks are required with an international clearing
house thathandles the exchangeability issues.
– Security :
• E-cash should not be easy to copy or temper with
while beingexchanged.
• This includes preventing or detecting duplication or double
spending.
• Detection is essential in order to audit whether prevention is
working.
• Preventing double spending is extremely difficult if multiple
banks are involved in transaction, so most systems rely on
post-fact detection and punishment.
– Purchasing e-cash from on-line currency server (or bank) involves two
steps
:
• Establishment of an account
• Maintaining enough money in the account to back the
purchase.
– In case, customer does not have bank account or wants
to maintain anonymity, e-cash can be purchased with
paper currency also.
– E-cash must be available in multiple currencies backed by several
banks, so that customers should be able to access and pay for
foreign as well as localservices.
– A possible solution: using an association of digital banks
similar to organizations like VISA to serve as a clearinghouse
for many credit cardissuing banks.
– Consumers use the e-cash software on the computer to generate
a randomnumber (note).
– In exchange for money debited from customer‟s account, bank
uses its private key to sign the note for amount requested and
transmits the noteback to customer.
– Effectively, the network currency server is issuing a “bank note”
with a serialnumber and a dollar amount.
– By digitally signing it, the bank is committing itself to back that
note with itsface value in real dollars.
• It allows bank to sign the “note” without ever actually knowing how
the issuedcurrency will be used.
Types of transactions
Forward
Banker Accounting server check for
Deposit
Payer
check
authenticatio
n
• Two types :
• Working :
clearinghouse.
• Third party processors can be referred to as On-line Third-
Party Processors (OTTPs)
• OTTPs have created seven steps process for a
fast and efficient way to buy information on-
line.
• To use this system, both customers and merchants
must be registered with theOTTP.
Customer Merchant
Request
Client Browser Merchant’s server
Verification Authorization
Payment server
On-line third-party
Processors with links
to multiple systems
2. Price
4. Customer support
5. Reliability
• Privacy issues :
• Credit risk :
• Privacy :
• a user expects to trust in a secure system
• Electronic commerce must merit equal trust as telephone
system.
• Security :
• Secure system verifies identity of two-party
transactions through “userauthentication”
• It reserves flexibility to restrict information/services
through accesscontrol.
• Tomorrow‟s bank robbers will just need a computer
terminal, a phonecall and little ingenuity.
• Intuitive interfaces :
• Users value convenience more than anything.
• Database integration :
• To date, separate accounts have been stored on separate
databases
• The challenge is
• to tie together these separate
databases together and
• To allow customers access to any
one of them While keeping data up-to-
date and error free.
• Brokers :
• A “network banker” must be in place to :
• broker goods and services
• Settle conflicts
• Facilitate financial transactions
electronically.
• Electronic commerce must merit equal
trust as telephone system.
• Pricing :
• How to price payment services??
• Should subsidies be used to encourage users to
shift the payment mode (cash to bank payments,
paper cash to e-cash)
• With subsidies there may be wastage of resources,
if money invested insystems that will not be used.
• On the other hand, it must be recognized that without
subsidies, it is difficult to price all services affordably.
• Standards :
• Without standards, welding of different
payment users into different networks and
different systems is impossible.
• Standards enable interoperability
• Giving users the ability to buy and
receive information, regardless of which bank
is managing their money.