EC Notes
EC Notes
TO
E – COMMERCE
PREPARED BY :- ABHAY
ELECT. ENGG. 6TH SEM.
2
UNIT – 1
INTRODUCTION TO E-COMMERCE
DEFINITION OF E-COMMERCE
E-commerce is an abbreviation used for electronic commerce. It is the process through which
the buying, selling, dealing, ordering and paying for the goods and services are done over the
internet is known as e-commerce. In this type of online commercial transaction, the seller can
communicate with the buyer without having a face-to-face interaction.
Some examples of real world application of e-commerce are online banking, online shopping,
online ticket booking, social networking, etc. The basic requirement of e-commerce is a
website. The marketing, advertising, selling and conducting transaction are done with the
help of internet. Any monetary transaction, which is done with the help of electronic media is
e-commerce.
FEATURES -
Non-Cash Payment – E-Commerce enables the use of credit cards, debit Cards,
smart cards, electronic fund transfer via bank’s website, and other modes of
electronics payment.
24x7 Service availability – E-commerce automates the business of Enterprises
and the way they provide services to their customers. It is Available anytime,
anywhere.
Advertising / Marketing – E-commerce increases the reach of advertising of
Products and services of businesses. It helps in better marketing Management of
products/services.
3
Improved Sales – Using e-commerce, orders for the products can be Generated
anytime, anywhere without any human intervention. It gives a big Boost to
existing sales volumes.
Support – E-commerce provides various ways to provide pre-sales and post-Sales
assistance to provide better services to customers.
Inventory Management – E-commerce automates inventory management.
Reports get generated instantly when required. Product inventory Management
becomes very efficient and easy to maintain.
Communication improvement – E-commerce provides ways for faster, Efficient,
reliable communication with customers and partners.
ADVANTAGES OF E-COMMERCE:
DISADVANTAGES OF E-COMMERCE:
4
THREATS OF E-COMMERCE :-
Cybersecurity Threats – Hacking, phishing, and malware can compromise customer data,
leading to financial losses. Strong cybersecurity measures are essential to prevent breaches.
1. Fraud & Scams – Identity theft, fake reviews, and chargeback fraud can harm both
businesses and consumers. Companies must implement fraud detection systems.
4. Legal & Compliance Issues – Data privacy laws like GDPR and CCPA impose strict
regulations on handling customer data. Non-compliance can result in heavy fines and
reputational damage.
1. Data Protection & Privacy Laws – Regulate the collection, storage, and processing
of customer data.
2. Electronic Transactions & Contracts – Recognize digital contracts and e-signatures
as legally valid.
3. Cybersecurity Laws – Enforce measures to prevent hacking, fraud, and data
breaches.
4. Consumer Protection Laws – Safeguard consumer rights in online transactions and
refunds.
5
5. Intellectual Property Protection – Prevent unauthorized use of digital content,
trademarks, and copyrights.
6. Anti-Spam & Marketing Laws – Regulate email marketing and prevent unsolicited
spam messages.
7. Online Payment & Financial Regulations – Ensure secure transactions and protect
against payment fraud.
1. Internet
The Internet is a global network that connects millions of computers and devices worldwide.
It serves as the backbone of e-commerce by enabling businesses to interact with customers,
process transactions, and manage online operations.
Key Features:
Applications in E-Commerce:
Online Shopping Platforms: Websites like Amazon, eBay, and Shopify run on the
internet.
Digital Payments: Online transactions using credit/debit cards, PayPal, UPI, etc.
Cloud-Based E-Commerce: Platforms use cloud computing for scalability and
storage.
SEO & Digital Marketing: Businesses use search engines, social media, and ads to
drive traffic.
6
2. Intranet
Key Features:
Applications in E-Commerce:
Inventory & Order Management: Businesses use intranets to track stock levels and
manage orders.
Employee Collaboration: Provides internal chat systems, file sharing, and project
management tools.
Customer Support & CRM: Helps manage customer interactions and sales data.
Training & HR Management: Companies use intranets for employee training and HR
records.
3. Extranet
Key Features:
Applications in E-Commerce:
7
Supplier & Vendor Management: Suppliers access stock levels, order details, and
logistics updates.
Customer Portals: Clients track orders, invoices, and support tickets.
Logistics & Shipping Tracking: Third-party logistics providers coordinate deliveries.
Partner Collaboration: Businesses share confidential data with trusted partners
securely.
EDI SYSTEMS
WAP is a technical standard for accessing information over a mobile wireless network. A
WAP browser is a web browser for mobile devices such as mobile phones that uses the
Protocol.
WAP is a specification for a set of communication protocols to standardize the way that
Wireless devices, such as cellular telephones and radio transceivers, can be used for Internet
Access, including e-mail, the World Wide Web, newsgroups, and instant messaging.
8
Wireless Application Environment (WAE)
Wireless Session Layer (WSL)
Wireless Transport Layer Security(WTLS)
Wireless Transport Layer (WTP)
Mobile computing plays a crucial role in e-commerce, enabling businesses and consumers to
conduct transactions anytime and anywhere using smartphones, tablets, and other mobile
devices. It enhances user experience, expands market reach, and drives sales through mobile-
friendly platforms.
The wireless web allows users to access the internet without physical connections, enabling
mobile browsing, cloud services, and IoT (Internet of Things) applications. Technologies
include:
9
1. Wi-Fi – Wireless internet access for high-speed browsing.
2. 5G Networks – High-speed mobile internet for seamless connectivity.
3. Bluetooth & NFC – Short-range wireless technologies used in payments and data
sharing.
Web security:
Web security in e-commerce is essential to protect businesses and customers from cyber
threats like hacking, fraud, and data breaches. Protecting customer data involves encryption,
adherence to data privacy laws like GDPR and CCPA, and using tokenization to secure
sensitive information. Websites must be secured with HTTPS, regularly updated software,
and reliable hosting services. Cyberattack prevention includes firewalls, intrusion detection
systems (IDS), and DDoS protection to block malicious activities. Here are key aspects :-
1. Secure Payment Processing – Use SSL/TLS encryption, PCI DSS compliance, and
two-factor authentication (2FA).
2. Data Protection & Privacy – Encrypt sensitive customer data and follow GDPR,
CCPA, and other regulations.
3. Secure Website & Hosting – Implement HTTPS, update software regularly, and use a
secure hosting provider.
4. Protection Against Cyber Attacks – Use firewalls, IDS, and DDoS protection to
prevent hacking and fraud.
5. Strong Authentication – Implement multi-factor authentication (MFA) and enforce
strong password policies.
6. Regular Security Audits – Conduct vulnerability assessments and penetration testing
to identify weaknesses.
1. Hardware Infrastructure
10
Key Requirements:
2. Software Infrastructure
Software solutions power the e-commerce website, payment processing, and customer
interactions.
Key Requirements:
3. Network Infrastructure
11
Key Requirements:
4. Security Infrastructure
Security is crucial for protecting customer data, transactions, and business assets.
Key Requirements:
12
5. Logistics & Supply Chain Infrastructure
Efficient logistics management ensures timely product delivery and inventory control.
Key Requirements:
Warehouse & Inventory Management System – Tracks stock levels and order
fulfillment.
Shipping & Delivery Partners – Integration with FedEx, DHL, or local courier
services.
Providing excellent customer service helps build trust and increase sales.
Key Requirements:
Chatbots & AI Assistants – Automated customer service for FAQs and issue
resolution.
13
UNIT – 2
BUSINESS MODEL OF E –
COMMERCE
The Direct Selling Model is one of the most common e-commerce models,
where businesses sell their products or services directly to consumers through
an online platform. This eliminates intermediaries, reducing costs and
increasing profits. Direct selling platforms are typically owned by the brand or
company itself, allowing better control over pricing, branding, and customer
experience.
2. Marketplace Model
Key Features: Multiple vendors sell products under one platform, creating
a diverse marketplace.
Advantages: No need for inventory management, wider customer base,
and scalability.
15
Examples: Amazon, Flipkart, Alibaba, eBay – where third-party sellers
list products and compete.
3. Subscription-Based Model
4. Dropshipping Model
16
5. Advertising Revenue Model
7. Freemium Model
17
The Freemium Model offers basic services for free while charging for premium
features, advanced tools, or additional content. This model is widely used in
SaaS (Software as a Service) and digital services.
1. Business-to-Business (B2B)
Characteristics:
Examples:
Common Platforms:
2. Business-to-Consumer (B2C)
Characteristics:
19
Mass-market targeting
Fixed pricing
Emotional and impulse-driven purchases
Shorter sales cycles
Requires strong branding and marketing
Examples:
Common Platforms:
3. Consumer-to-Business (C2B)
Characteristics:
20
Individuals set terms or bid for work
Businesses buy from consumers
Technology enables easy access
Payment can be per project or commission-base
Examples:
Common Platforms:
4. Consumer-to-Consumer (C2C)
21
Characteristics:
Examples:
Common Platforms:
E-GOVERNANCE IN E-COMMERCE :
E-Governance in e-commerce refers to the use of digital technology by
governments to regulate, facilitate, and secure online business activities. It plays
a crucial role in ensuring compliance, taxation, consumer protection, and
cybersecurity in the growing digital economy. Governments worldwide
implement policies to protect online shoppers, regulate cross-border
transactions, and support digital businesses. With advancements in AI, block
chain, and big data, e-governance is evolving to make e-commerce more
transparent, efficient, and secure.
2. Digital Taxation – Online businesses must comply with GST, VAT, and
digital tax filing regulations.
22
3. Cybersecurity & Data Protection – Ensuring secure online transactions
and data privacy (e.g., GDPR, CCPA).
UNIT- 3
ELECTRONIC DATA INTERCHANGE
INTRODUCTION TO EDI
• Electronic Data Interchange (EDI) is a technology that enables businesses to
exchange documents and data in a structured electronic format. It replaces
23
traditional paper-based communication methods like fax, mail, and email,
allowing seamless and automated data transfer between systems. EDI is widely
used in supply chain management, healthcare, finance, and other industries to
improve efficiency, accuracy, and speed in transactions.
BENEFITS OF EDI
A. Speed & Efficiency : Transactions that once took days via mail or
fax now take seconds.
B. Automates data exchange, reducing processing and approval time.
C. Cost Reduction : Eliminates expenses related to paper, printing,
postage, and storage.
D. Reduces administrative workload and manual data entry costs.
E. Accuracy & Error Reduction : Minimizes human errors caused by
manual data entry.
F. Security & Compliance : Uses secure transmission protocols like
AS2, FTP, or VANs.
24
G. Complies with industry standards (ANSI X12, EDIFACT) and
regulatory requirements.
H. Stronger Business Relationships : Faster processing of orders,
invoices, and shipments improves partner relationships.
25
The data is converted into a standard EDI format (e.g., ANSI X12, EDIFACT)
using EDI software. Ensures consistency and standardization across trading
partners.
The received data is integrated into ERP, CRM, or supply chain systems for
automated processing. This enables real-time updates on inventory, order
tracking, and billing.
26
APPLICATIONS OF EDI IN VARIOUS INDUSTRIES
Example: EDI helps large retailers like Tesco and Carrefour manage thousands
of supplier transactions daily.
27
Electronic Invoicing & Tax Compliance – Ensures regulatory adherence.
Fraud Detection & Security – Enhances transactional security using
encrypted EDI protocols
Example: Banks use EDI for automated clearinghouse (ACH) transactions and
cross-border payments.
Example: Car manufacturers like Ford and Toyota use EDI to manage parts
suppliers globally.
28
EDI PROTOCOLS & DATA SECURITY
EDI uses various communication protocols and security mechanisms to ensure
data integrity, confidentiality, and authenticity.
EDI transactions require encryption to protect sensitive business data. The most
commonly used encryption algorithms are:
29
EDI IMPLEMENTATION DIFFICULTIES:
1. High Initial Setup Cost – Requires investment in EDI software, secure
networks, and integration with existing systems like ERP and CRM
2. Complex Standardization & Compliance – Different industries and
regions use various EDI standards (ANSI X12, EDIFACT, HIPAA),
requiring custom configurations and regulatory compliance.
3. Technical Expertise & Maintenance – Skilled IT professionals are needed
for setup, troubleshooting, and regular updates, increasing dependency on
external vendors.
4. Security Risks & Data Protection – Sensitive business data is vulnerable
to cyber threats, requiring encryption (RSA, AES) and secure
transmission protocols (AS2, FTP, VAN).
5. Integration Challenges with Legacy Systems – Many businesses still use
outdated software that may not support modern EDI formats, leading to
compatibility issues.
6. Trading Partner Readiness – EDI requires all business partners to adopt
compatible systems, which can be a barrier if suppliers or customers lack
the necessary technology.
7. High Maintenance & Upgrading Costs – Continuous updates in
standards, security, and compliance require ongoing investment, making
long-term management expensive.
30
UNIT- 4
E-PAYMENT SYSTEM:
Electronic payment systems are central to on-line business process as
companies look for ways to serve customers faster and at lower cost. Emerging
innovations in the payment for goods and services in electronic commerce
promise to offer a wide range of new business opportunities.
Electronic payment systems and e-commerce are highly linked given that on-
line consumers must pay for products and services. Clearly, payment is an
integral part of the mercantile process and prompt payment is crucial. If the
claims and debits of the various participants (consumers, companies and banks)
are not balanced because of payment delay, then the entire business chain is
disrupted. Hence an important aspect of e-commerce is prompt and secure
payment, clearing, and settlement of credit or debit claims.
31
electronic payment systems are becoming more and more common and will
play an Important role in the business world. Electronic payment always
involves a payer and a payee Who exchange money for goods or services. At
least one financial institution like a bank will act as the issuer (used by the
payer) and the acquirer (used by the payee).
Features of E-Cash
Examples of E-Cash
32
Bitcoin and other cryptocurrencies.
PayPal Balance, where users can store money digitally.
Prepaid Digital Wallets like Paytm, Apple Pay, and Google Pay.
1. Contact Smart Cards: Inserted into a card reader (e.g., credit/debit chip
cards).
2. Contactless Smart Cards: Uses NFC (Near Field Communication)
technology for tap-and-pay (e.g., Visa PayWave, Mastercard PayPass).
3. Hybrid Smart Cards: Supports both contact and contactless modes.
33
3. CREDIT CARD-BASED ELECTRONIC PAYMENT SYSTEMS
Credit Card-Based EPS allows users to make payments using their credit cards
over electronic platforms such as online stores, ATMs, and POS (Point-of-Sale)
terminals.
34
Convenience: No need to carry cash.
Security Features: Includes OTP (One-Time Password), CVV (Card
Verification Value), and biometric authentication.
35
10. Weak Security & Encryption – Poor encryption can
expose transactions to interception.
UNIT – 5
SECURITY ISSUES IN E- COMMERCE
RISK IN E-COMMERCE
E-commerce platforms handle sensitive user data, including personal details, credit card
information, and banking credentials, making them a target for cybercriminals. Financial
fraud is a significant risk, where hackers use stolen payment details to make unauthorized
purchases. Identity theft occurs when cybercriminals access users’ personal information to
conduct fraud or impersonate them. Data breaches happen when hackers exploit
vulnerabilities in databases, exposing confidential information, leading to financial and
reputational losses for businesses. Phishing attacks trick users into revealing login
credentials and financial data through fake websites or emails. Malware and ransomware
attacks can infect e-commerce platforms, disrupting operations and stealing data. Denial-of-
service (DoS) attacks can overwhelm a website’s server, making it inaccessible to legitimate
users. Additionally, lack of proper security measures can lead to privacy violations and
legal consequences due to non-compliance with data protection laws.
36
unreadable format, ensuring that only authorized users can access it. Secure Socket Layer
(SSL) and Transport Layer Security (TLS) protocols encrypt data transmission, preventing
hackers from intercepting sensitive information. Multi-Factor Authentication (MFA)
enhances security by requiring multiple forms of verification, such as passwords, OTPs, or
biometrics, before granting access. Fraud detection and prevention systems use artificial
intelligence and machine learning to analyze transaction patterns and detect fraudulent
activities. Tokenization replaces sensitive payment information with unique tokens, reducing
the risk of data theft. Regular security audits and software updates help businesses
identify and fix vulnerabilities, ensuring compliance with security standards.
SECURITY STANDARDS
E-commerce businesses follow security standards to ensure the safety of online transactions
and protect customer data.
PCI DSS (Payment Card Industry Data Security Standard) mandates security
guidelines for handling credit card transactions securely.
ISO 27001 provides a framework for managing information security risks, helping
businesses implement effective security policies.
Secure Electronic Transaction (SET) is a protocol that ensures the security of
online credit card payments by encrypting transaction data.
General Data Protection Regulation (GDPR) enforces strict data protection and
privacy laws, ensuring that businesses handle user data responsibly.
HIPAA (Health Insurance Portability and Accountability Act) applies to e-
commerce platforms dealing with healthcare-related transactions, ensuring the
security of medical data.
FIREWALL
A firewall is a security system that monitors and controls incoming and outgoing network
traffic based on predefined security rules. It acts as a barrier between a trusted internal
network and untrusted external sources, preventing unauthorized access. Packet-filtering
firewalls analyze data packets and block malicious traffic based on security policies. Stateful
inspection firewalls track active connections and filter traffic accordingly. Proxy firewalls
37
act as intermediaries between users and web servers, enhancing security by hiding internal
network details. Next-generation firewalls (NGFWs) combine traditional firewall features
with advanced threat detection, intrusion prevention, and deep packet inspection to protect
agains sophisticated cyber threats.
Types of Firewall:
There are different types of firewalls depending on where the communication is taking place,
Where the communication is intercepted and the state that is being traced.
Proxy server
CRYPTOGRAPHY
38
KEY MANAGEMENT
Key management is crucial for ensuring the security of encrypted data in e-commerce
transactions. Key generation involves creating strong encryption keys using secure
algorithms. Key distribution ensures that only authorized users have access to encryption
keys through secure channels. Key storage protects keys from unauthorized access using
hardware security modules (HSMs) or encrypted databases. Key rotation and expiration
involve updating keys periodically to reduce the risk of compromise. Access control policies
restrict key usage to authorized personnel and applications, preventing unauthorized
decryption.
PASSWORD SYSTEMS
Strong password policies are essential for securing e-commerce accounts and preventing
unauthorized access. Complex passwords with a mix of uppercase and lowercase letters,
numbers, and special characters enhance security. Password hashing converts passwords
into irreversible hash values, preventing exposure in case of data breaches. Salting
techniques add random values to passwords before hashing, making them resistant to brute-
force attacks. Multi-Factor Authentication (MFA) strengthens security by requiring
additional verification steps, such as OTPs or biometric authentication. Password managers
help users store and manage complex passwords securely, reducing the risk of weak or reused
passwords.
DIGITAL CERTIFICATES
Digital certificates are electronic credentials that verify the authenticity of a website,
individual, or organization in e-commerce transactions. Issued by Certificate Authorities
(CAs), they ensure secure communication through SSL/TLS encryption. X.509 certificates
are widely used for website authentication, ensuring that users interact with legitimate
businesses. Extended Validation (EV) certificates provide higher trust levels by verifying
the organization’s identity. Code signing certificates authenticate software and applications,
ensuring they have not been tampered with. Email security certificates encrypt emails and
verify sender identities, preventing phishing attacks. Public Key Infrastructure (PKI)
manages digital certificates and encryption keys to ensure secure online transactions.
39
DIGITAL SIGNATURES
Digital signatures authenticate the identity of the sender and ensure data integrity in e-
commerce transactions. They use public-key cryptography, where the sender signs a
document with a private key, and the recipient verifies it using the corresponding public key.
Hashing algorithms generate unique fingerprints of data, ensuring that any alteration is
detected. Electronic signature standards such as PKCS#7 and XML Signature define
secure methods for signing and verifying digital documents. Legally recognized digital
signatures comply with regulations like the eIDAS (Electronic Identification,
Authentication, and Trust Services) Regulation in the EU, ensuring their validity in online
transactions. Blockchain-based digital signatures provide tamper-proof authentication,
enhancing security in decentralized e-commerce systems.
40
41