e Commerce Notes 1-3 Bca
e Commerce Notes 1-3 Bca
UNIT II
Enabling Technologies of the World Wide Web: World Wide Web – Internet Client-Server
Applications – Networks and Internets – Software Agents – Internet Standards and
Specifications – ISP.
E-Marketing: Traditional Marketing – Identifying Web Presence Goals – Online Marketing
– E-advertising – E-branding.
UNIT III
E-Security: Information system Security – Security on the Internet – E-business Risk
Management Issues – Information Security Environment in India.
Legal and Ethical Issues : Cyberstalking – Privacy is at Risk in the Internet Age – Phishing
– Application Fraud – Skimming – Copyright – Internet Gambling – Threats to Children.
UNIT IV
E-Payment Systems: Main Concerns in Internet Banking – Digital Payment Requirements –
Digital Token-based e-payment Systems – Classification of New Payment Systems –
Properties of Electronic Cash – Cheque Payment Systems on the Internet – Risk and e-
Payment Systems – Designing e-payment Systems – Digital Signature – Online Financial
Services in India - Online Stock Trading.
UNIT V
Information systems for Mobile Commerce: What is Mobile Commerce? – Wireless
Applications – Cellular Network – Wireless Spectrum – Technologies for Mobile Commerce
– Wireless Technologies – Different Generations in Wireless Communication – Security
Issues Pertaining to Cellular Technology.
Portals for E-Business: Portals – Human Resource Management – Various HRIS Modules.
UNIT I
Electronic commerce
E-Commerce or Electronics Commerce is a methodology of modern business, which
addresses the need of business organizations, vendors and customers to reduce cost
and improve the quality of goods and services while increasing the speed of delivery.
E-commerce refers to the paperless exchange of business information using the
following ways
Electronic Data Exchange (EDI)
Electronic Mail (e-mail)
Electronic Bulletin Boards
Electronic Fund Transfer (EFT)
Other Network-based technologies
The movement has been divided in to two main sectors:
1. Business-to-Business (B2B).
2. Business-to-Consumer (B2C).
Frameworks
Electronic commerce framework is comprised of three levels that this framework is needed to
for successful electronic commerce.
1. Infrastructure
The first part of the framework for electronic commerce is including hardware, software,
databases and communications. It is used in term of World Wide Web on the Internet or other
message switching methods on the Internet or other telecommunication networks.
2. Services
The second part of the framework include a wide range of services that provide the ability to
find and present of information and are including the search for trading partners, negotiation
and agreements
3. Products and Structures
This section of the electronic commerce frameworks consist forecasts and direct provision of
goods, services and trade-related information to customers and business partners, cooperation
and sharing of information within and outside the organization and organizing of
environment of electronic marketplace and chain of supply and support.
Differences between Electronic Commerce and traditional commerce
The major difference is the way information is exchanged and processed:
Traditional commerce:
• Face-to-face, telephone lines, or mail systems
• Manual processing of traditional business transactions
• Individual involved in all stages of business transactions
E-Commerce:
• using Internet or other network communication technology
• automated processing of business transactions
• Individual involved in all stages of transactions
• pulls together all activities of business transactions, marketing and advertising as
well as service and customer support
Early Business Information Interchange Efforts:
In 1968, a number of freight and shipping companies joined together to form the
Transportation Data coordinating Committee (TDCC), which has charged with
exploring ways to reduce the paperwork burden that shippers and carriers faced.
The TDCC, created a standardized information set that included all the data elements
that shippers commonly included in bills of lading, freight invoices, shipping
manifests, and other paper forms.
In 1979, ANSI charted a new committee to develop uniform EDI standards. This
committee is called the Accredited Standards Committee X12 (ASC X12).
In 1987, the United Nations published its first standards under the title EDI for
Administration, Commerce, and Transport (EDIFACT, or UN/EDIFACT).
In 1969, the Defense Department researchers used this network model to connect four
computers.
After, the Defense Department using network software included two tools for
performing these tasks. File Transfer Protocol (FTP) enabled users to transfer files
between computers, and Telnet.
In 1979, a group of students and programmers at the Duke University and the
University of North Carolina started Usenet (Users News Network).
In 1989, the NSF permitted two commercial e-mail services, MCI Mail and
CompuServe to establish limited connections to the Internet for the sole purpose of
exchanging e-mail transmissions with users of the Internet.
In 1995, the NSF turned over the operation of the main Internet connections to a group
of privately owned companies. The new structure of the Internet was based on four
Network Access Points (NAPs), each operated by a separate company.
To sell Internet access rights directly to larger customers and indirectly to smaller firms
through other companies called Internet Service Providers (ISPs).
In 1995, the Web development was marked by rapid commercialization and technical
change.
Netscape Communication’s browser called Netscape Navigator continued to include
more extensions of the Hypertext Markup Language (HTML).
Advantages of E-commerce:
Some of the keys strngths of using the Internet for business include the following:
1.24 x 7 Operation:
Round-the-clock operation is an expensive proposition in the ‘brick-and-mortar’
world.
2.Global reach:
The net being inherently global, reaching global customers is relatively easy on the
net compared to the world of bricks.
3.Cost of acquiuring, serving and retaining customers:
It is relatively cheaper to acquire new customers over the net.
4.An extended enterprise is easy to build:
The Internet provides an effective way to extend the enterprise beyond the narrow
confines of our own organization.
5.Disintermediation:
Using the Internet , one can directly approach the customers and suppliers, cutting
down on the number of levels and in the process, cutting down the costs.
6.Improved customer service to clients.
7.Power to provide the ‘best of both the worlds’.
8.A technology based customer interface.
9.The customer controls the interaction.
10.Knowledge of customer behaviour.
11.Network economics.
Transition to E-commerce in India:
1997 25 45
1998 150 200
1999 359 1000
2000 650 2000
2001 1130 6668
2002 1763 10684
2003 3661 29000
2004 4403 31723
2005 6000 35000
2006 25000 37000
Dozens of small to large Internet Service Provider have setup shop, triggeringa price
war and an improvement of service.
Indian software and services companies need to tap into some of these vertical
segments to gain the maximums advantage in the e-commerce solution sector.
1.economic Services:
A large number of users use the Internet for some form of economic guidance.
2.stash trading:
Online stash trading is now days one of the most demanding e-commerce utilities.
3.Banking:
Internet banking is now growing. Many banks like ICICI and HDFC are making
inroads in to this area.
4.Legal and practiced services:
Opportunities also exist for Indian companies in legal and other proficient services. In
terms of opportunities for Indian legal service providers, the requirement for
proficient, legal and regulatory advice is expected to increase as the number of e-
commerce user’s increases.
5.Tour and Travel:
The Travel industry has readily adapted to e-commerce. The sectors have adopted
well because of their online reservation system.
6.Healthcare:
Healthcare represents one of the biggest expenditures of government worldwide.
BUSINESS MODELS
E-commerce can be defined as any form of business transaction in which the parties
interact electronically.
Electronic markets have three main functions such as:
i.) Matching buyers and sellers.
ii.) Facilitating commercial transactions, and
iii.) Providing legal infrastructure.
1 2 3 X
. . . Buyers
E-Commerce Services
There are many different ways to categorize e-business models, they can be broadly
classified as follows:
1. E-Business model based on the relationship of transaction parties.
2. E-Business model based on the relationship of transaction types.
3. Classification by revenue model: A revenue model may comprise
(i) Product sales model that charges customers directly for the products or services
they buy.
(ii) Subscription model that charges a fixed monthly or annual rental for the service.
(iii) Transaction fee model that charges a fixed a service fee based on volume and
value of the transaction offered.
4. Classification by distribution channel. A distribution may comprise:
(i) Direct marketing where manufacturers such as Dell.
(ii) Pure play e-tailers who have no physical stores only an online sales presence.
Bot
Listing Broker
Aggregated catalogues directories
or listings of offers to buy and / or
sell
Auction C Community
Aggregator Exchange
Portal Hub
Marketplace Mall
A business model can be defined as architecture for product, service, and information
flow, including a description of business players, their roles, and revenue services.
E-Commerce models can be perceived in the form of relationship between two
entities such as:
Direct marketing versus indirect marketing.
Fully cyber marketing versus partial cyber marketing.
Electronic distributor versus electronic broker.
Electronic store versus shopping mall.
Generalized e-malls versus specialized e-malls.
Global versus regional marketing.
Sales versus customer service.
Electronic markets are emerging in various fields. Different industries have markets
with different characteristics.
E-Commerce can be classified according to the transaction partners such as Business-
to-Consumer (B2C), Business-to-Business (B2B), Business-to-Government (B2G),
and Consumer-to-Consumer (C2C).
Model Description Example
B2C Sells products or services directly to consumers. amazon.com
B2B Sells products or services to other businesses or brings metasite.com
multiple buyers and sellers together in a central
marketplace.
B2G Business selling to local, state, and federal agencies. igov.com
C2C Consumers sell directly to other consumers. ebay.com
C2B Consumers fix price on their own, which business priceline.com
accept or decline.
Business Business
Government
Business Business
Business-to-Consumer (B2C):
B2C e-business includes retail sales, often called e-retail (or e-tail) , and other online
purchases such as airline tickets, entertainment venue tickets, hotel rooms, and shares
of stocks.
B2C e-business models include virtual malls, which are websites that host many
online merchants.
Virtual malls typically charge setup, listing, or transaction fees to online merchants,
and may include transaction handling services and marketing options.
Makes Payment
B2B is that model of e-commerce where a company conducts its trading and other
commercial activity through the Internet and the customer is another business itself.
This is essentially mean and commercial activity between the companies through the
Internet as a medium.
This is supposed to be a huge opportunity area on the web. Companies have by and
larger computerized all the operations worldwide and now they need to go in to the
next stage by linking their customers and vendors.
This is done by supply chain software, which is an integral part of your ERP
applications.
Elements Benefit
Centralized Market space Neutral and none aligned with either seller /
buyer.
Standard documentation Uses are prequalified and regulated.
Price codes, Price history, and after the sale Pricing mechanism is self regulating.
information are provided.
Confidential transaction between businesses. Clearing and settlement service provider.
1. Review catalogs.
2. Identify specifications.
3. Define requirements.
4. Post request for proposals (REP).
5. Review vendor reputation.
6. Select vendor.
7. Fill out purchase order (PO).
8. Send PO to vendor.
9. Prepare invoice.
10. Make payment.
11. Arrange shipment.
12. Organize product inspection and reception.
Aggregators Hubs
Buyers Sellers
Auctions
Community Contents
1. Aggregators.
2. Hubs or process integration.
3. Community or alliance.
4. Content.
5. Auctions or dynamic pricing markets.
Consumer-to-Consumer (C2C):
The C2C e-business model consumer sell directly to another consumer via online
classified as and auctions, or buy selling personal service are expertise online. Some
of the exchanges are askme.com, inforocket.com.
Consumer-to-Business (C2B):
BROKERAGE MODEL:
Subscription
High
Control
Low
Transaction Model
C2c trading:
1. Allows buyers and sellers to trade directly.
2. By passing intermediaries and.
3. Reduce cost for both the parties.
Global reach.
Trading convenience, which,
1. Allow trading at all hours.
2. Provide continually updated information.
Sense of community through direct buyer and seller communications
Efficient access to information
Alleviation of the risks of anonymous trading.
Brokerage price discovery mechanisms:
There are three kinds of price discovery mechanisms .they are
1. Auction
2. Reverse auction
3. Market exchange
Some examples of price discovery mechanism, based models are:
B2B
B2B sell side fasterparts.com
B2B buy side freemarket.com
B2B exchanges covisint.com
B2B priceline.com
C2C ebay.com
Some of Indian brokerage sites are:
www.baazee.com
www.automartindia.com
www.indicar.com
Auction broker:
Many different auction formats have emerged since the first auction occurred in Babylon in
about 500 B.C. Today different auction formats are aggregated on certain common
attributes. There are open and sealed bid auctions.
English auction:
The English auction is one of the most common auction formats.
It is also known as the open-outcry auction or the ascending –price auction.
It is frequently used for selling art, wine, and other physical goods which do not have
a limited life-time.
Dutch auction:
The Dutch auction was developed in the Netherlands to auction flowers and other
products with a limited life.
It is also known as descending price auction.
In a Dutch auction the opening price is set extremely very high.
The price then descends with a predefined amount at the predefined time intervals
until a buyer claims the product to be mine.
The auctioneer brings together the suppliers and the customers within the auction process.
During the process of transaction trade objects and rule base are needed. The entire auction
process can be executed on the World Wide Web.
Online Auction Model
Bidding
Buyer and seller
registration
Bid evaluation
Setting up a
and auction
particular auction
Trade settlement
Scheduling and
advertising
1. Consumer-to-Consumer (C2C).
2. Business-to-Business (B2B).
3. Business-to-Consumer (B2C).
eBay:
eBay is the world largest personal online trading community. eBay created a new
market an efficient one-to-one trading system in an auction format on the web.
Individuals not big business use eBay to buy and sell items of more than 4320
categories including automobiles, coins, stamps etc.
SELLERS
BUYERS
eBay
Based on the electronic marketplace the aggregator model bypasses distributors so that the
buyers and sellers come together.
SELLERS
BUYERS
Aggregators
1. Content aggregator:
They are among the first large scale sites on the web and mostly represent large
publishing companies. Example pathfinder.com.
2. Mainstream Aggregators:
This includes the sites like yahoo providing a web directory and search engine along
with the bunch of attractive tools like e-mail address.
3. Event Aggregators:
There are sites that provide in-depth content and tools tailored to the need of a
particular group. Example mortgages-build tool, rates.
4. Shopping Aggregators:
Shopping Aggregators let consumers roam through hundreds of sites and catalogues
and find the best price in seconds. Example compare.com, and bizrate.com.
Virtual shop:
Not a physical store for walk-in-customers. Example for bookshop the web site in
Internet bookseller is Amazon.com.
Building and maintaining the virtual shop:
With business to customer type E-commerce, the company first establishes a website
on internet. Then the company put up the information about the products and services and
also provide customer support services. After that the company must inform the public about
its existence using traditional means of advertising like commercials, adverts, brochures and/
or online advertising.
Consumer PC 1
2 Merchant Server
Internet
Encrypted secure
33 Seller authentication
63
Digital signature
Bank payment centre
4
5
Merchant Bank Cardholder’s Bank
HINTS
Electronic commerce
Methodology of modern business,
Paperless exchange of business information
Frameworks
o Infrastructure
Hardware, software, databases and communications
o Services
Wide range of services
o Products and Structures
Direct provision of goods, services
Business Model
i.) Matching buyers and sellers.
ii.) Facilitating commercial transactions, and
iii.) Providing legal infrastructure.
UNIT –I
2 MARKS:
5 MARKS:
10 MARKS:
UNIT-II
CLIENT-SERVER APPLICATIONS
Application Protocol Purpose
World Wide Web Hyper Text Transport Offers access to hypertext
documents, Protocol (HTTP) executable programs,
and other
Internet resources.
Use Net Newsgroups Network News Transfer Discussions forums where users can
Protocol (NNTP) asynchronously post messages and read
messages posted by others.
Shareware: software that can use free for a trial period but they pay a fee for it
later.
Freeware: completely free software e.g.: clipart, fonts and games.
Upgrades and patches: upgrades to current software and fixes for software problem.
Documents: It includes research paper, articles and Internet documents.
Files on FTP servers are often compressed. Compression means decreasing the file
size. It is a good idea to have current virus checking software before files are transferred to
computer.
Anonymous FTP is an option that allows users to transfer files from thousands of host
computers on the internet to their personal computer account.
FTP sites contain books, articles, software, games, images, sounds, multimedia,
course work, datasets, and more.
FTP transfers can be performed on the World Wide Web even without a special
software.
CHAT ON THE WEB
Chat programs are now common on the web.
They are sometimes included as a feature of a website, where users can log into the
"chat room"
to exchange comments and information about the topics addressed on the site.
Chat may take other, more wide-ranging forms.
IRC
It is a multi-user chat system that allows many people to communicate across the
Internet.
DEVELOPMENTS IN TRANSMISSION
The internet is measured by the capacity of its cables to carry information bits to
users; this carrying capacity is called bandwidth.
Each of these lines must support hundreds or even thousands of simultaneous users.
In contrast, most home users dial into internet through telephone network, at
narrowband rates.
The modems on their computers are connected to a "twisted pair" of copper phone
wires that can transmit at the rate of 14,000 to 56,000 bps.
The internet can also be accessed at mid band speeds of 128,000 bps or more.
Two of the mid band technologies-asymmetrical digital subscriber line and integrated
services digital network-use wires to connect users to the internet through a telephone
system.
NETWORK ROUTERS
Network designers use routers to transfer or route data between networks that use
different network technologies.
The internet is comprised of various networks that use many different Network
Technologies, routers are an integral part of the internet.
A router has an address on the network. Using the addressing capability of routers, the
nodes on a network can send packets destined for another network to a router.
To manage network traffic, network designers also use routers to segment large
sections of a LAN to smaller segments, called subnets.
Using a routing table, routers can look up the correct path from the packets current
location to any destination on the network.
Connectionless Vs Connection-oriented Protocols
Connectionless protocols differ from connection-oriented protocols in the way
requests and responses to requests are handled.
With a connectionless protocol, clients connect to the server, make a request, get a
response, and then disconnect.
With a connection-oriented protocol, clients connect to the server, make a request, get
a response, and then maintain the connection to service future requests.
An example of a connection-oriented protocol is FTP.
In contrast, HTTP is a connectionless protocol.
Signal Bandwidth
The primary limit on any communications channel is its bandwidth.
Bandwidth merely specifies a range of frequencies, from the lowest to the highest,
that a channel can carry or that are present in the signal.
Channel Bandwidth
This channel bandwidth may be physically limited to the medium used by the channel
or artificially limited by communications standards.
In wire-based communications channels , bandwidth is often limited by the wires.
Most of the telephone channels have an artificial bandwidth limitation imposed by the
telephone company.
To get the greatest financial potential from the capacity of their transmission cables,
microwave systems, and satellites, telephone carriers normally limit the bandwidth of
telephone signals.
THE INTERNET PROTOCOL SUITE
A protocol is defined as a set of rules governing the exchange of data between two
entities.
The key elements of a protocol are:
1. Syntax, which includes such things as data format and signal levels.
2. Semantics, which includes control information for coordination and error
handling.
3. Timing, which includes speed matching and sequencing.
The internet was designed to embody a series of design principles, which are as
follows:
1. INTEROPERABLE: Here, the system supports computers and software from
different
vendors.
2. LAYERED: In this, the collection of internet protocols works in layers, with each
layer
building on the layers at lower levels.
3. SIMPLE: This principle states that each of the layers in the architecture provides
only a few un actions or operations. This means that application programmers are
hidden from
the complexities of the underlying hardware.
4.END-TO-END:here,the internet is based on 'end-to-end’ protocols. This means
that
interpretation of data happens at the application layer and not at the network
layer.
IP Address System
A standard IP header is around 20 bytes. There are options to add more bytes.
Ver stands for versions, which is IP version 4.
IHL stands for internet header length. Typically it is 5 bits. However, it has two
bytes available and therefore the longest header is 60 bits.
TTL is time to live. Maximum is 255 seconds.
32 bits
Source address
Destination address
IPv4 structure
Depending on the size of the network, the IP-based networks are divided into three
classes:
1. Class A. These networks have their network addresses from 1.0.0.0 to 126.0.0.0, with
the
zeros being replaced by node addresses.
Class A networks are mega monster networks, with up to 16 million plus connections.
2. Class B. These are smaller networks in comparison ,i.e , they can have only about
65,000
nodes! Network addresses for these range from 128.0.0.0 to 191.0.0.0.here the last
two zeros
get replaced by the node addresses.
3. Class C. These are the baby networks that can have only 254 nodes at the maximum.
The network IP addresses for these range from 192.0.0.0 to 223.0.0.0.
CLASSES OF NETWORKS
Type Example Explanation
Class A 125. 100.100 The part within the box is the network part of
the IP
address , and the rest identifies a unique node
or
Class B 190.100. 100.100 interface on that network. You can identify the
class of the network from the first of the four
numbers
Class C 220.100. 100. 100 that form the IP address.
Subnet Masks
In an IP network, every machine on the same physical network sees all the data
packets sent out on that network.
The default subnet mask for class A networks is 255.0.0.0,for class B it is 255.255.0.0
and for class C 255.255.255.0,which signify a network without subnets.
The address blocks are:
Class A: 10.0.0.0
Class B: From 172.16.0.0 to 172.31.0.0
ClassC: From 192.168.0.0 to 192.168.255.0.
NUMBER OF MACHINES ON EACH SUBNET
Defining URLs
The URLs consist of characters defined by the ASCII character set.
The URL specification allows the use of uppercase and lowercase letters.
1.Colon (:)
The colon is a separator.
It separates the protocol from the rest of the URL
scheme,e.g.http://xlrifound.html .
It separates the host name from the port number as in http://www.xlri.com:80/.
Also,it separates the user name from the userid,as you can find in
ftp://anonymouse:[email protected]/.
Asterisk *
Dollar Sign $
Exclamation Point !
Hyphen -
Parenthesis (left and right) ()
Period .
Plus sign +
Single quotation mark ‘‘
Underscore -
2. Double Slash (//):
They indicate that the protocol uses the format defined by the CISS.
They separate the protocol from the URL scheme.
3. Single Slash (/):
This is used to separate the path from host name and port.
The slash is also used to denote the directory path to the resource named in the URL,
e,g. http://xlri.com/xlrihp.html.
4. Tilde (~):
This is generally used at the beginning of the path to indicate that the resource is in
the specified user's public html directory, e.g. http://www.aloha.com/tilde Joseph.
5. Percentage (%):
This identifies an escape code.
Escape code book %20table%20of%20 contents are used to specify special characters
in URLs which otherwise have a special meaning, or are not allowed for access.
6. At(@) Symbol:
This is used in mail accounts to identify the site to which the mailer belong, as in
mailto:[email protected].
It separates the user name and/or password information from the host name in the
URL.
7. Question (?) Mark:
This is used in the URL path to specify the beginning of a query string.
Query string are passed to CGI script.
All the information following the question mark is the data that the user has submitted
and so are not interpreted as part of the file path. e.g./usr/cgi/useit.p1?keyword.
8. Plus(+) Sign:
This is used in query strings as a place-holder between words, e.guseit.p1?
word1+word2+word3.
Instead of using spaces to separate words that the user has entered in the query, the
browser uses the plus sign.
Application Layer
(FTP,HTTP,Telnet,NNTP)
Transport Layer
Transmission Control
Protocol User
(TCP) Datagram Protocol
(UDP)
Network Layer
Layering of TCP/IP
3. The transport layer provides a flow of data between two hosts, for the application
layer
above. In the TCP/IP protocol suite, there are two vastly different protocols:
TCP
UDP
Encapsulation:
Encapsulation is the packaging of attributes and functionality to create an object,
essentially the one whose internal structure remains private, through accessible by
other objects through a clearly defined interface.
Protocol Interfaces: Interfaces
Applications
TCP/IP protocol suite
Each layer in the TCP/IP protocol suite interacts with its immediate adjacent layers.
At the source, the process layer makes use of the services of the host-to-host layer and
provides data down to that layer.
Search Engines:
The internet today contains billions of websites, which is analogues to a library
having billions of books.
This list of websites is getting longer every second.
History of the Search Engines:
The first of all search engines was Archie, created in 1990 by Alan Emtage, a student
at McGill University in Montreal.
The author originally wanted to call the program "archives".
In 1990, there was no world wide web. Nonetheless, there was still an internet, and
many files were scattered all over the vast network.
How Do The Search Engines Work:
All search engines have what are called "robots" or "spiders", which spend their
time going from link to link across the internet.
They may have the ability to search by some or all of the following search methods:
key searching
concept-based searching
refining the search
relevancy ranking
meta tags
Keyword Searching
This is the most common form of text search on the web.
Most search engines do their text query and retrieval using keywords.
Concept-based Searching
The concept-based search systems try to determine what you mean, not just what you
say.
Smart agents
Learn
Cooperate
Autonomous
Interface agents
Collaborative agents
Heterogeneous agent
Smart agents Hybrid agents
systems
WG WG … WG WG
Modem
Dial-up
terminal Modem
server
Modem
Billing
server
ISDN Modem
server
Router Modem
ISP
Architecture of public access providers
ISP
ISP
ISP
ISP
NAP ISP
ISP
NAP
NAP
ISP
ISP
ISP
ISPS IN INDIA:
Internet access, in a sense, came into India in the early 1990s.
The ERNet project was designed to provide internet connectivity to the premier
educational and research institutions of India, while NICNet was assigned the
provision of internet services primarily to government department and organizations.
NICNet was designed to provide V-SAT and dial-up internet access primarily to
government departments.
HCL Infinet Primenet Global Tata Internet Services Tata Power Broadband
<HTML>
<HEAD><TITLE>sample Webpage</TITLE></HEAD>
<BODY>
<P>Company phone:0657-225506</P>
<P>Company Web site:http://www.xlri.com</P>
<PCompany fax:0657-227814</P>
<P>Human relations: [email protected]</P>
</BODY>
</HTML>
CREATING AND VIEWING YOUR FIRST HTML DOCUMENT:
To create HTML document, perform the following steps
1. Use a text editor, such as windows notepad, to create a new document.
2. Next, type in the following HTML tags into the new document:
<HTML>
<HEAD>
<TITLE>your document heading</H1>
</HEAD>
<BODY><H1>your document heading</H1>
<P>hello, this is my first text HTML paragraph</P>
</BODY>
</HTML>
3. Save the document as sample.HTML.
To view your first HTML document, perform the following steps:
1. Start your browser.
2. Within the URL field, type in the complete path name of the file, replacing the
letters http
with the file.
JAVASCRIPT:
JavaScript is an object-based scripting language designed primarily for the authors
constructing HTML documents for viewing under Netscape navigator, internet
explorer and other such browsers.
It runs both on the serve and the client side.
On the client side, it can be used to write programs that are executed by a Web
browser within the context of a Web page.
On the server side, it can be used to write Web server programs that can process
information submitted by a Web browser and then used to update the browser’s
display accordingly.
It is a cross-platform scripting language developed by Netscape.
Client-side java script is typically executed in a browser that supports the language.
It is an interpreted object-oriented language that can be included in HTML pages.
You can access a number of elements in your HTML page and manipulate them using
JavaScript.
This helps in the creation of dynamic HTML pages capable of responding to user
events like mouse clicks, key presses, selection of elements in a form, and so on.
Using JavaScript you can, for example:
Create a form that lets the user click on a displayed map of India to obtain the
current average housing cost vis-a-vis per capita income for each state.
Design a web page that automatically displays a different thought-provoking
quotation at the top of the page every time a page is accessed.
Add a random number wheel to your webpage that spins at the push of a
button, and then, based on the number it stops on, teleports the viewer to a
particular Website from an extensive list of your favorite sites.
Construct an online form that lets users determine the closest city where
certain required merchandise is available.
Build the front-end of a multimedia playback device that uses java applets to
playback different types of files, including shockwave animation files, and real
audio sound files.
Create a fortune-telling page that collects some information about the viewer
and then displays a personalized set of predictions about that person's life and
prospects.
Design an online tutorial that shows other people how to write scripts using
tools like JavaScript.
EXAMPLE:
<HTML><HEAD></HEAD>
<BODY>
This is static text<P>
<SCRIPT LANGUAGE="JavaScript">
document.write ("Random number:"+math.random());
</SCRIPT>
</BODY>
</HTML>
This is a very simple example containing some JavaScript code inside the BODY tag
of the HTML file. JavaScript code is enclosed by<"SCRIPT
LANGUAGE=""JavaScript">and</SCRIPT>tags.
Running Scripts:
To run built with JavaScript must either be embedded in an HTML document or be
referenced as an external file which is loaded with the HTML document and then
evaluated navigator interrupts the inline code directly.
A Web browser displays a webpage as a result of the browser acting on the
instructions contained in an HTML file.
The browser reads the HTML file and displays the elements of the file as they are
encountered.
The file may contain the embedded JavaScript code.
The process of reading an HTML field and identifying the elements contained in the
file is referred to as parsing.
When a script is encountered during parsing, the browser executes the script before
continuing with further parsing.
The POST method is used to inform the server that the information appended to the
request is to be sent to the specified URL.
The POST method is typically used to send form data and other information to CGI
programs.
The web server responds to a POST request by sending back header data followed by
any information generated by the CGI program as the result of processing the request.
JavaScript statements can be included in HTML documents by enclosing the
statements between an opening<script >tag and a closing</script tag>.
Within the opening tag, the LANGUAGE attribute is to "JavaScript" to identify the
script as being JavaScript as opposed to some other scripting language, such as visual
basic.
Here is sample:
<HTML>
<HEAD>
<TITLE>hello world!</TITLE>
<SCRIPT LANGUAGE= "Javascript">
document.write ("hello students!")
</SCRIPT>
</HEAD?
<BODY>
</BODY>
</HTML>
The following example shows how the HREF attribute of a link may be specified by
the JavaScript linkTo variable.
<html>
<head>
<title>using the javascript entities</title>
<script language="JavaScript">
linkTo ="http://www.xlri.com/javascript"
</script>
</head>
</body>
<A HREF="& {linkTo};">click here.</A>
</body>
</html>
XML
Although computers are now able to handle electronic documents that contain images,
music and video, many documents are still bound within a text framework.
For text and other media to be combined, exchanged and published, it must be
organized within some kind of infrastructure.
The XML standard provides such a platform.
The name 'XML' is an acronym for 'extensible markup language'.
This language is not owned by any single commercial interest.
It was developed by the W3C (the World Wide Web Consortium), and has been
shaped by experience of previous markup languages.
<transaction>
<timedate="19980509"/>
<amount>123</amount>
<currency type="rupees"/>
<from id="X98765>ravi</from>
<to id="X56565>bimal</to>
</transaction>
XML can be used to markup semi-structured documents, such as reference works,
training guides, technical manuals, catalogues, academic journals and reports.
Among other niche applications, XML can also be used to markup
patents ,examination papers, financial statements and research papers.
New and more specialized uses include support for the presentation of data in the next
generation mobile phones.
All the features of a typical document can be represented by XML tags.
Tasking the example of a reference book, objects such as chapters, titles, notes,
paragraph, lists and tables can all be explicitly identified by name:
<chapter>
<title>an example XML fragment<.title>
<note>
<para>this note contains two paragraph.>/para>
<para>the second paragraph</para>
</note></chapter>
E-MARKETING
TRADITIONAL MARKETING:
If marketing is whatever you do to promote the sale of your products or services, then
it should include:
1.Marker research-from competitive information-gathering to industry awareness to
soliciting customer opinions and preferences.
2.Publicity from press releases to the positioning of your company and its offerings in
the marketing place.
3.Advertising that is text-based and graphic-based.
4.Sales,including distribution and merchandising.
5.Customer service and customer support.
Traditional marketing seems to fall far short of three features.
There are certain problems associated with it, which can be listed as follows:
1. Traditional marketing is often expensive. It can cost a lot of money to produce and
print brochures, product sheets, and catalogues.
2. Traditional marketing can be a very time-consuming process. Mistakes have to be
corrected: you have to go back to the ad agency or printer to revise, add or delete, and
you often have to wait for an ad that you have placed to appear in a publication.
3. Traditional marketing often has a "hit and miss" quality. Marketers often send out
bulk of mails to customers and yet receive a tiny response
It is like a chain-the company acquires customers, fulfills their needs and offers
support, and gains their confidence so that they return to it again.
Thus the customer value is upheld.
SITE ADHESION: CONTENT, FORMAT, AND ACCESS:
Content:
A customer accesses a website for the content of that site.
Initially a customer will want to navigate quickly to gain a clear understanding of the
site's progression to more detailed information.
The key to this to match a user's psychological and technological sophistication profle
with that of the site's initial and subsequent impact.
Format:
The format of an organization's site is important with respect to the customer's
technical sophistication.
Vendors need to create a balance between information provision and information
delivery speed.
Access:
Online data access depends on the bandwidth requirement.
The clear rule in the initial interaction phase is to use as minimal a bandwidth as is
feasible to facilitate as wide an audience as possible.
MAINTAINING A WEBSITE:
Creating a website that meets the needs of visitors with such a wide range of
motivations can be challenging.
Not only do website visitors arrive with different needs, but also they arrive with
different experience and expectation levels.
In addition to the problems posed by the diversity of visitor characteristics,
technology issues can also arise.
These website visitors will be connected to the internet through a variety of
communication channels that provide different bandwidths and data transmission
speeds.
They also will be using several different web browsers.
One of the best ways to accommodate a broad range of visitor needs is to build
flexibility into the website's interface.
Many sites offer separate versions with and without frames and give visitor's the
option of choosing either one.
Some sites offer a text-only version.
As researches at the trace center note, this can be an especially important features for
visually impaired visitors who use special browser software.
Such as the IBM HOME PAGE READER, to access website content.
The W3C WEB ACCESSIBILITY INITIATIVE site includes a number of useful
links to information regarding these issues.
Convey an integrated image of the organization
Offer easily accessible facts about the organization
Allow visitors to experience the site in different ways and at different levels.
Provide visitors with a meaningful, two-way communication link with the
organization
Sustain visitor attention and encouraging return visits.
Offer easily accessible information about products and services and how to
use them.
METRICS DEFINING INTERNET UNITS OF MEASUREMENT:
The e-commerce world has, since inception attempting to measure parameters
associated with the Web and web sites in order to assets two things:
1. Advertising-how many people saw our banner ad?
2. Visitation-how many people came to our site?
For advertising, the metrics measured and their interpretation depend on the position
of the measurer.
The advertising perspective is that metrics can give the advertiser the most accurate
interpretation of the customer-to-site usage ratio, but this has come under increasing
scrutiny as the technology and systems associated with Web interfaces and networks
become well understood by the advertisers.
There is a problem with using hits as a measuring tool.
What advertisers want to measure includes the number of unique visitations to a site,
as well as multiple other parameters, such as the duration of each visit.
1. Click-through captures. How many users click through to the next stage in the
customer acquisition process?
2. Time spent. How long did the viewer stay at the site and which items, pages or
routes did the viewer select to navigate through the site?
3. Time spent searching. Did the viewer use the' site map' or 'search' feature, and if
so for what and for how long?
4. Time spent before click-through. How long did a viewer linger in the opening
stages of the interaction and where?
5. E-mails and telephone calls. How many e-mails or calls did this section generate
and on what issues?
6. Registered users. If the site has a registration facility, what is the rate?
Browse
Pay
Register
Search
Exit
States and transitions of the BBMG for the virtual Video Store
Home:
This is the state a customer is in, after selecting the URL for the site's homepage.
Login:
A customer moves to this state after requesting a login to the site.
Some times, even a home page ask him to login.
Register:
To have an account created by registering with the online Video store, the customer
selects the proper link for the registration page, thus making a transition to the register
state.
Search:
A customer goes to this section after issuing a search request.
Browse:
This is the state reached after a customer selects one of the links available at the site
to view any of the pages of the site.
These links include the list of bestsellers and weekly promotions.
Select:
A search returns a list of zero or more links to videos.
By selecting one of these links, a customer moves to this state.
Add to Chart:
A customer moves to this state upon selecting the button that adds a selected video to
the shopping cart.
Pay(Billing):
When ready to pay for the items in the shopping cart, the customer moves to the
billing section.
Exit:
Customers may leave the site from any state. Thus, there is a transition from all states,
except the entry state, to the exit state.
AGGREGATE METRICS FOR E-BUSINESS SITES:
Since the web became a widely used vehicle to support all sorts of applications,
including e-business, the need arose to devise metrics to measure a site's efficiency in
attaining it's goals.
AGGREGATE METRICS FOR E-BUSINESS SITES
Category Function Description
Hits/Second:
This measures the number of requests for objects served in each second by website.
A page is usually composed of one HTML file and several other embedded image
files that are automatically requested from the web sever when a user requests the
HTML document.
So, hits/second counts not just the HTML pages but all embedded objects in a page as
separate requests ,which does not give a precise idea of the number of times a specific
page.
With its advertisement banners, was viewed.
Page Views/Day:
This reflects the number of individual pages served per day.
A company paying for a banner ad to be posted on a page may be interested in the
number of times its ad is being seen.
Very popular sites can display a few hundred million page views per day.
Click – Throughs :
This measures the percentage of users who not only view an online ad but also click
on it to get to the web page behind it.
This metric is oriented more towards assessing the impact of online ads.
However, this measure can be misleading.
If the message in the banner ad is too general, it may draw a larger number of clicks
then a more specific message.
Unique Visitors:
This indicates how many different people visited a website during a certain period of
time.
Many times it is more important to know how many different people visited your site
then the total number of visits received during a certain period.
Revenue Throughput:
this is business-oriented metric that measures the number of dollars/sec derived from
sales from an e-commerce site.
This measure implicitly represents customer and site behaviour.
a customer who is happy with the quality of service of an e-business site will shop at
the web store, and the revenue throughput will increase.
Potential Loss Throuhput:
This is another business-oriented metric that measures the amount of money in
customers shopping carts that is not converted into sales because leaves the site due to
poor performance or other reasons.
ONLINE MARKETING:
Online marketing means using the power of online networks, computer
communications and digital interactive media to reach your marketing objectives.
Online marketing will not replace traditional forms of marketing anyway.
Instead, it will both add to and subtract from today's marketing mix.
But it will remove marketing’s dependence on paper.
It will add more interactivity.
There are three new market segments which are as follows:
Cyberbuyers:
These are professional who spend a good deal of time online, mainly at their places of
business.
These professionals often have to make complex purchasing decisions that require
reams of data and difficult to locate sources of supply, all within a tight frame.
That is a perfect fit with the capabilities of online technology.
Cyberconsumers:
These are the home computer users wired up to commercial online services and the
internet.
This group represents the pot of gold, and marketers simply need to find ways to
make it more attractive to shop and buy online than to go to the local store.
Cyber surfers:
They use online technology to expand their horizons, challenge their abilities, and for
fun.
This segment is typically younger, and possesses shorter attention spans.
Some of the important aspects of marketing are advertising, sales, security of the
transactions and the mode of payment used for payments.
And all of these have had to adapt and change themselves according to the demands
of the internet.
HOW SHOULD BUYERS PAY ONLINE?:
The marketplace, as usual, is responding quickly to this concern.
A few basic models or approaches to net-based sales transactions are beginning to
come into focus. They are:
1. The consumer responding to net-based marketing presentation ,sends in a cheque,
or calls and verbally transmits a credit card number, over the merchants telephone.
this is a fairly traditional approach, and no financial transaction takes place on the
internet.
2. The consumer(i) sets up an account with a merchant or a third party organizations,
(ii) leaves his or her credit card number by means other than the internet,
(iii) gives the merchant the authorization to bill the account, whenever the consumer
chooses to buy something.
3. The consumer leaves his or her credit card number on an unsecure online order
form.
with this approach, the consumer is put at some risk that the credit card number will
be compromised but the risk is perhaps not much greater than giving it out over the
phone.
4. The consumer uses a secure client software program to transfer his or her encrypted
credit card number to a secure merchant server.
5. The consumer exchanges traditional currency for some form of digital currency and
Databanks:
In the information economy, pure data is emerged as a hot commodity,
With the ease and low cost delivering information over the internet pushing down
prices, data -vendors are building profitable business in the market space.
convenient mechanisms for searching database are making information services user-
friendly as well.
And importantly, business are also springing up to enable data-shoppers to hunt for
the information they need, in the form of search engines which search millions of
documents on the internet to track down information.
Music:
Since it is recorded and stored digitally, music as well as the other audio products are
the perfect products for distribution over the internet.
Instead of buying cassettes or CD's customers can simply download the recordings
from the site.
The world's top music labels are setting up websites from which internet shoppers can
buy their favourite pieces.
They are also creating customer involvement by setting up virtual communities of
music aficionados who can access sample, trivia, and other value-added information,
such as lyrics and scores directly through the internet.
Retailing:
Two genres of online shopping malls are being setup by digital entrepreneurs.
The first consists of multimedia catalogues which shoppers can download through the
internet without taking physical delivery.
then spends units of that currency whenever and where ever he or she likes.
ADVANTAGES OF ONLINE MARKETING:
Some of the advantages of online can be listed in the following manner:
1. Online marketing offers bottom-line benefits that tie in directly to the demands
placed on the organization trying to make a transition into the new economy.
2. Online marketing can save money and help you stretch your marketing budget.
Electronic versions of catalogues, brochures, and specification sheets do not have to
be printed, packaged, stored, or shipped
3. Online marketing can save time and cut steps from the marketing process.
Marketers no longer have to wait for one of their sales representatives, it give them
the desired information. They can get it online on their own
4. Online marketing gives customers another way to buy, while enabling them to take
control of the purchasing process. Today, customers want more. They want more
information about the products they buy, more input to the product itself, and support
after the sale.
5. Online marketing can be information -rich and interactive .It appeals to
information-hungry buyers and analytical buyers. It allows buyers and current
customers to search and locate the information hey need quickly.
6. Online marketing can offer you instant international reach and indeed, online
networks have created an instant global community.
7. Online marketing can lower barriers to entry and offer equal opportunity for access.
When you are doing business online, distinctions related to the ethnic background or
gender or even the size of business do not seem to matter as such. The online world is
a great leveller.
Banner swapping:
Banner swapping is nothing but a direct exchange of links between websites.
To be precise, company A may agree to display a banner of company B in exchange
for company B displaying company A's banner.
Streaming Video and Audio:
Companies and content networks including Real Networks, NetRadio, and Music
Vision, insert ads for marketers into music and video clips, as consumers listen to
them.
It is much more like that TV that marketing advertisers know and trust.
You can get click-through rates of about 3.5 percent, according to real network.
Its widespread use will depend on high-speed internet connections.
Effectiveness Tracking:
This is an upstart dynamic logic designed by a pioneering service to help traditional
advertisers gauge the impact of their marketing by placing tiny files, called cookies.
On viewers computers this helps them track where people go after seeing their adds.
Mini-sites, Pop-ups:
These adds burst upon the screens allowing companies such as Volvo and SmithKline
Beecham's oxy acne medicine to dish up games and product information.
Mini-sites allow advertisers to market without sending people away from the site they
are visiting.
This type of advertising also gets higher click rates.
Sometimes, these can be intrusive and annoying.
Interstitials:
Visit the railway site when the site uploads, a new window will open in your browser
from Citibank, asking you to apply for a loan.
These windows are called interstitials, and they demand your attention because you
must click on them, even if only to close the window.
It is estimated that the click-through rates are as high as 5 percent.
Sponsorships:
Sponsorships can vary from a simple sponsorship of an e-mail list to much more
sophisticated site sponsorship deals.
For example the e-retailer 800.com (www.800.com)sponsored a list of the top 10
videos which appeared alongside the 800.com logo on the Hollywood stock
exchange(www.hsx.com).
Coupons:
Companies such as cool savings(www.coolsavings.com) offer their members discount
coupons which they can print out and then use for both online and offline retailers.
Coupons can be an attractive marketing mechanism because they encourage product
trial, and they are a way of selectively discounting prices to the most price sensitive
customers go to website and print out a coupon.
Pay Per Advertising View:
Companies such as cyber gold "pay" customers to view advertisements.
The approach uses the accountability of the web to reward consumers for processing
the "right" kind of information.
Loyalty Programs:
Companies such as click rewards(www.clickawards.com) offer their members the
chance to earn a currency.
Such as airlines miles, by shopping at their network of partner sites.
The economics of customer retention are well known.
An existing, loyal customer is much more profitable than a new one, so rewarding
existing customers to encourage them to remain loyal can be good tactic.
Partnerships:
While many offline companies arrange partnerships, the use of partnerships is more
pervasive in the new economy.
Similar to the manner in which complementary companies often collaborate to push a
new technology, web companies often partner with complementary sites to quickly
provide a more value-enhanced service to site visitors.
One prevailing strategy is to select a customer niche and provide services that
encompass the customer's entire needs in that area.
Innovative Customer Acquisition:
As the internet market becomes more competitive, competitive advantage will be
derived from innovative marketing.
One form of innovative marketing is to ally with groups and provide a complementary
service that benefits the group membership.
Providing Information:
The web allows sites to instantly offer information that is relevant to their customer
base.
Many sites provide instantly accessible information to their customers as a form of
marketing and product differentiation.
the e-commerce market for travel is very competitive, with want well-funded players.
Leverage the Customers Base:
A primary goal of e-commerce business today is to invest heavily in creating a large
customer base and establishing a relationship of trust with their customers.
Many firms are trying to establish a reputation that conveys to its customer base that
they are a solid company that is good at fulfilling E-commerce orders.
Personalized Online Communication:
Online companies have the opportunity to reduce mass-marketing expenses and
increase response rates by developing marketing strategies that center around each
individual customer.
The manner in which transactions occur on the internet provides e-commerce
companies with detailed information on their customers.
Information derived from customers registering preferences and demographic
information, as well as firms analyzing past purchases and web-surfing habits.
1.Permission Marketing:
Seth Godin coined the term permission marketing to describe how successful e-mail
campaigns can result from creating relationships with customers.
Permission marketing has become the current rage of online marketers and has led to
increase in marketing response rates.
Permission marketing presumes what successful marketing campaign can be created
by establishing a mutually beneficial and trusting relationship between the firm and its
customers.
2.Personalized Recommendations:
Many e-commerce sites have personalized services that makes specific merchandise
recommendations for each user based on past purchases, web pages viewed, and
survey information that the user has provided.
3.Personalized Advertisements:
websites increasingly are using personalized technology software to determine
dynamically, in real time, which web advertisements should be exposed to views.
ZDNET uses personalization technology that is based on an analysis of five user
profile and impression environment variables.
4. Personalized Web pages:
Many portals and e-commerce sites allow users to create their own personalized web
page.
This allows users to create a web page that caters exactly to their interests.
Personalization encourages users to return more often and increase the user familiarity
and trust with the web page.
5.Personalized E-commerce Stores:
One of the goals of online merchants is to use internet technology and their
knowledge about individual consumers to tailor their products and services for each of
their customers.
Jeff Bezos, Amazons chairman, has stated that one of his goals is to have is "store
redecorated for each and every customer".
However the cautions that it could take up to 10 years to achieve such individual
customization.
CONDUCTING ONLINE MARKET RESEARCH:
The internet is a powerful and cost-effective tool for conducting market research
regarding consumer behaviour, identifying new markets, and testing consumer
interest in new products.
Interest in interactive internet research methods is on the rise.
Market research that utilizes the interest is frequently more efficient, faster,and
cheaper, and allows the research to access a more geographically diverse audience
than those found in offline surveys.
Online Market/Research Process and Results:
Demographic Age
Occupation
Sex
Education
Family size
Religion
Family life cycle
Caste
Income
Linguistic groups
Airlines Capturing data on where customers are flying and the ultimate
destination of passengers who change carriers in mid-flight;
thus airlines can identify popular locations that they do not
service and check the feasibility of adding routes to capture
lost business.
Broadcasting Predicting what is best to air during prime time and how to
maximize
returns by interjecting advertisements.
Marketing Classify customer demographics that can be used to predict
which
customers will respond to a mailing or buy a particular
product.
Need Identification
Product Brokering
Merchant Brokering
Negotiation
E-CRM VS CRM
Dimensions Technology-enabled relationship Traditional relationships with
Management (E-CRM) customers (CRM)
Advertising Provide information in response “Push and sell” a uniform
message
Specific customer inquires to all customers
Pricing of products Negotiated with each customer Set by the seller for all
customers.
Or services
New product Created with each customer Determined by the seller based
on
features demands research and development
TARGET MARKETS:
Marketing strategy involves identifying and analyzing a target market and creating
marketing atmosphere that satisfies the individuals in that market.
Increasingly marketers are reaching those individuals through the internet.
Currently about 110 million Americans access the internet either at home or at work.
Although internet access outside the US has lagged behind in usage people around the
world are rapidly discovering the web's potential for communication and e-marketing.
Internet use by consumers in other countries-especially Japan(26.9 million users),
Germany(19.1 million), the united kingdom(17.9 million),china(15.8 million),and
Canada(13.28 million)-is escalating rapidly.
PRODUCT CONSIDERATIONS:
The exponential growth of the internet and the world wide web presents significant
opportunities for marketing products to both organizations and consumers.
Through e-marketing strategies companies can provide products including goods,
sevices, and ideas, that offer unique benefits and improve customer satisfaction.
Computers and computer peripherals ,industrial supplies, and packaged software are
the leading organizational purchases online.
Consumer products account for a small but growing percentage of internet
transactions, with securities trading, travel/tourism, and books among the hottest
consumer purchases.
The online marketing of goods such as computer hardware and software, books,
videos, CD's, toys, automobiles and even groceries is accelerating rapidly.
Ideas such as marriage counseling, medical advice, tax/legal advice, and psychic
services, are being successfully marketed as well.
E-BRANDING:
A known and respected brand name can present to potential customers, a powerful
statement of quality value and other desirable qualities in one recognizable element.
Branded products are easier to advertise and promote, because each product carries
the reputation of the brand name.
Companies have developed and nurtured their branding programmers in the physical
marketplace for many years.
Consumer brands such as ivory soap, Walt Disney entertainment Maytag appliances,
and ford automobiles have been developed over many years with the expenditure of
tremendous amounts of money.
However, the value of these and other trusted major brands far exceeds the cost of
creating them.
ELEMENTS OF BRANDING:
The key elements of a brand are differentiate, relevance, and perceived value.
Product differentiate is the first condition that must be met with to create a product or
a service brand.
The company must clearly distinguish its product from all others in the market.
This makes branding for products such as salt, nails, or plywood difficult, but not
impossible.
Books : Amazon.com(56%)
Music : CDNow(24%)
Computer Software : Microsoft(30%)
Computer Hardware : Dell(20%)
Clothing : TheGap(12%)
Travel : AOL, Yahoo!travelocity(each 8%)
Autos : Yahoo!(6%)
E-BRANDING CRITERIA
Element Meaning to the customer
SPIRAL BRANDING:
The internet does indeed open new possibilities and new dangers for anyone who
ignores the signs.
The advent of internet sites and mailings make possible a new form of marketing
called spiral branding.
There are two reasons, first as consumers it pays to be aware of the tactics marketers
are using to influence us.
Second, many of us will need to understand and use these techniques ourselves, in our
own business.
The keys to spiral branding are:
1. Use each media for its best purpose.
2. Do it fast.
3. Iterate constantly.
The internet is transforming customer buying behaviour, with major consequences for
how the new breed of consumer develops familiarity with, and ultimate loyalty to, the
brand.
Marketers who strive to capitalize on these shifts-as all successful marketers must do-
will have to better align their branding investments with new data about how
customers shop and buy online.
Only by strategically recomposing the marketing mix can marketers drive traffic,
build brand equality and capture customer loyalty in the internet age.
Search Engine Optimization:
With nearly half of all web users citing search engines as their primary portals to new
sites, marketers must re-examine their strategies for optimizing their rankings in
search result.
Appearing among the first few pages of search results on the top search engines is a
black-magic science practiced by outsourcers who specialize in the real-time
adjustments that are the key to maximizing visibility on search engines.
Affiliate Networks:
Online marketers need to carefully plan and manage partner that give them a broad
reach of links on affiliate sites across the internet.
Where 20 percent of web users cite "random surfing" as their top means of finding
new sites, marketers must have extensive links in place, to maximize their reach to
customers throughout the internet.
Advocacy Marketing:
Often the most powerful recommendation for a company is that of a satisfied
customer to a friend.
With 20 percent of surfers citing word of mouth from friends as their top means of
finding new sites, companies need to provide ? Incentives and simple mechanisms to
enlist their customers as marketing advocates to their friends-a strategy often referred
to as "viral marketing" by online marketers.
Permission E-mail:
When customers explicitly opt into permissions marketing relationships, e-mail can
be one of the most cost-effective and brand-positive means of acquiring new
customers and remarketing to existing customers.
Savvy internet marketers have realized that "e-mail marketing" does not need to be
synonymous with "spam".
Instead, a range of strategies such as customer relationship e-mail, corporate e-mail
newsletters, remainder services, permission networks, sponsored independent
newsletters, discussion lists, and partner co-marketing can drive online traffic and
enhance brand equity.
Personalization and Mass Customization:
Marketers can dramatically enhance customers online experience by personalizing
their web presence and allowing customers to configure products and services.
Sites can improve customer loyalty and built exit barriers with services such as
personalized customer interfaces behaviour-based recommendations and individual
product configuration.
E-care:
A key component of any brand experience is the quality of customer service and
support while companies have ling striven for customer service excellence in the
offline environment.
They are finding that customer expectations for online service present many
unfamiliar challenges.
Such as managing a torrent of customer e-mail inquiries and enabling efficient self-
service knowledge bases.
With the proper allocation of resources, however, companies can experience brand-
positive efficiencies, delivering quality customer service more efficiently online than
through traditional channels.
Companies that disappointment the user's expectations however, will damage their
online brand equity.
MARKETING STRATEGIES:
PERMISSION-MARKETING STRATEGIES:
Many business would like to send e-mail messages to their customers and potential
customers to announce new products, new product feature, or sales on existing
products.
However, print and broadcast journalists have severely criticized some companies for
sending e-mail messages to customers or potential customer.
Some companies have even faced legal action after sending out mass e-mails.
Unsolicited e-mail is often considered to be a spam.
Many business are finding that they can maintain an effective dialogue with their
customers by using automated e-mail communications.
Sending one e-mail message to a customer can cost less than one cent if the company
already has the customers e-mail address.
Purchasing the e-mail addresses of persons who have asked to receive specific kinds
of e-mail messages will add between a few cents and a dollar to the cost of each
message sent.
Another factor to consider is the conversion rate.
The conversion rate of an advertising method is the percentage of recipients who
respond to an ad or promotion conversion rates on much higher than the click-through
rates on banner ads.
Which are currently under 1 per cent and decreasing.
BRAND-LEVERAGING STRATEGIES:
Relational branding is not the only way to build brands on the web.
One method that is working for well-established websites is to extend their dominant
positions to other products and services.
Yahoo! is an excellent example of this strategy.
Yahoo! was one of the first directories on the web.
It added a search engine function early in its development and has continued to parlay
its leading position by acquiring other web business and expanding its existing
offerings.
Then, Yahoo! acquired geocities and broadcast.com, and entered into an extensive
cross-promotion partnership with a number of fox entertainment and media
companies.
Yahoo! continuous to lead its two nearest competitors, excite and Infoseek, in ad
revenue by adding features that web users find useful and that increase the site's value
to advertisers.
Amazon.com expansion from its original book business into CD's videos, and
auctions is another example of a website leveraging its dominant position by adding
features useful to existing customers.
AFFILIATE-MARKETING STRATEGIES:
Of course, this leveraging approach only works for firms that already have websites
that dominant a particular market.
As the web matures, it will be increasingly difficult for new entrants to identify
unserved market segments and attain dominance.
A tool that many new, low-budget websites are using to generate revenue is affiliate
marketing.
In affiliate marketing, one firms website includes descriptions, reviews, ratings,or
other information about a product that is linked to another firms site that offers the
item for sale.
For every visitor who follows a link from the affiliate's site to the seller's site, the
affiliate site receives a commission.
The affiliate site also obtains the benefit of the selling site's brand in exchange for the
referral.
VIRAL-MARKETING STRATEGIES:
Traditional marketing strategies have always been developed with an assumption that
the company was going to communicate with potential customers directly or through
an intermediary that was acting on behalf of the company,
Such as a distributor, retailer ,or independent sales organization.
Since the web expands the types of communication channels available ,including
customer-to-customer communication, another marketing approach has become
popular on the web.
Viral marketing relies on existing customers to tell other persons-the company's
prospective customers-about the products or services they have enjoyed using.
Much as affiliate marketing uses websites to spread the word about a company, viral
marketing approaches individual customers to do the same thing.
The number of customers increase much as a virus multiplies, thus the name.
WEBSITE NAMING ISSUES:
Firms that have a major investment in branding a product or a service must protect
that investment.
You learned about the security issues surrounding website naming.
The legal and marketing aspects of website naming can be very much complicated.
Although a variety of state and federal laws protect trademarks, the procedure for
creating and using website names that are not trademarks can present some
challenging issues.
Obtaining identifiable names to use for branded products on the web can be just as
important as ensuring legal trademark protection for an existing brand investment.
Although most domain that have high value are dot-com sites, the name
engineering.org sold an auction to the American society of mechanical engineers, a
not-for-profit organization, for just under $200,000.
ADVERTISING-SUPPORTED MODEL:
The advertising -supported business model is the one used by network television in
the United states.
Broadcasters provide free programming to the audience along with advertising
messages.
The advertising revenue is sufficient to support the operations of the network and the
creation or purchase of the programs.
Many observers of the web in its early growth period, believed that the potential for
internet advertising was tremendous.
However, after a few years of experience trying to develop profitable advertising-
supported business models, many of those observes are less optimistic.
The second problem is that very few websites have sufficient numbers of visitors to
interest large advertisers.
Most successful advertising on the web is targeted to very specific groups.
However it can be difficult to determine whether a given website is attracting a
specific market segment or not, unless that site collects demographic information,
which the visitors are increasingly reluctant to provide of privacy concerns.
MARKETING STRATEGY ON THE WEB:
Finally, it needs to be reiterated that strategy for marketing on the Internet should
follow
the rules such as those given are:
Dynamic sites Create dynamic sites that use new technologies to adapt information
based
on user profiles.
Finances Try new markets with low advertising pricing schemes.
Free giveaways Create free offerings for your loyal customers.
Global village Think global, but localize.
Live events Online events create quick awareness.
Niche markets The internet is a series of niche markets and mass markets.
Promotion Promote your site everywhere.
Syndication Co-brand your services and products.
Technology Use Internet technology to maximize your marketing objectives.
Approximately 63% of the Indian population will make a digital purchase this year, yet only
6.5% of Indian retail sales are expected to come from Internet transactions, increasing to
8.9% by 2018. Source – eMarketer.com
Internet Marketing Trends
Mobile
With widespread growth of tablet and smartphone use, access to the Internet through a
mobile device will be available to about 60% of the population, or 215 million people, in
2015, according to emarketer.com.
Mobile optimization will be an integral part of a website design now and in the
foreseeable future. Websites will need to be mobile friendly, and mobile usability is a factor
for Google search rankings.
As access to the Internet through a mobile device continues to grow, businesses will
need to adapt in all areas of digital marketing: responsive website, mobile ads and mobile
designed content.
Social Media
Social media networks also showed increase in membership and usage. There are
multiple social media platforms and different strategies to use on each. All have their place
in a social media strategy. Nearly three-fourths (72%) of adults who are online use
Facebook, according to Pew Research. Women dominate the usage as the statistics below
show.
Businesses continue to refine their tactics and strategy with a focus on:
Email
Email marketing will continue to be a part of Internet marketing strategy and should
be in sync with content and social media. According to exacttarget.com, most indian
consumers (72%) prefer email marketing, and 40-60% of consumers are reading email on
smartphones.
Email needs to work across all devices. The number one priority for online marketers
is to redesign an email to improve click through rates on a mobile device.
In a recent survey of marketers 91% were using email marketing campaigns. Below are
some of the tactics and results as reported by exacttarget.com:
Email capture via Facebook was found to be used 45% of the time, and 31% rate it as
effective. General email signup on the website used by 74% of respondents. Respondents
rate it as 42% effective.
Sign-up requests specific to different sections of the website were used by 52% of
participants and are 45% as effective. Email lists experience a 25% attrition rate due to
bounces, unsubscribes, and inactive users
Content
Content is the cornerstone of online marketing strategy. Creating good content in a
sea of competition and distraction is a challenge. Budgets for search-engine optimization
(SEO), pay per click (PPC) and media could be impacted by the need for more frequent and
higher quality content.
Content is also a Google ranking factor and will help sites attract high-quality
inbound links, build trust, credibility and authority with your audience.
When creating content, the goals should be focused on the audience with respect to a
mobile view. This can be tricky as longer content is generally better for a desktop experience
while mobile needs to remain highly informative but stated with a lower word count.
Video Marketing
Video marketing is another pillar of content marketing. Generally, videos are
informative, entertaining or promotional. Video is more personal and easier for an audience
to connect with. It can be highly targeted and that is why it is so effective.
Video tends to build credibility and trust. It builds engagement, can double time on
page, creates more opportunity for inbound links, and has been found to have higher click-
through rates, increasing it by as much as 200-300%, according to wirebuzz.com. It also
increases searchable footprint.
Whether you currently run your own business, or are thinking about starting one, you
need to know the top website marketing strategies in order to use the Web to its fullest
potential and become a successful entrepreneur.
UNIT-II COMPLETED
HINTS
UNIT –II
2 MARKS:
1. Explain the role of World Wide Web in the field of E-commerce? (APRIL/MAY
2015)
2. What are the types of internet connections? Explain. (APRIL/MAY 2015)
3. Explain the benefits and drawbacks of EDI (APRIL/MAY 2016)
4. Write down the Technologies of the World Wide Web?
5. Write a short note on Traditional Marketing?
6. Discuss the Networks and Internets?
10 MARKS:
UNIT 3
E-SECURITY
INFORMATION SYSTEM SECURITY:
Any business, whether it is a traditional brick-and-mortar business, a brick-and-click
e-business, or a pure-play e-business, needs to be concerned about network security.
The internet is a public network consisting of thousands of private computer networks
connected together.
This means that a private computer network system is exposed to potential threats
from anywhere on the public network.
1. Integrity of the data sent and received.
2. Confidentiality of the data so that it is not accessible to others.
3. The data ought to be available to the people for whom it is meant.
The data sent from the source ought to reach in destination without any tampering.
But the above criteria may be violated by the following.
1. Interrupt the data and cut it off.
2. Intercept the data with the intent of spying on it.
3. Interrupt the data and modify it and send a different data to the receiver.
4. Obstruct the data and fabricate new data and send it to the receiver.
Encryption.
Software controls (access limitations in a database, in OS protect each user from other
users).
Hardware controls (smart card).
Policies (frequent changes of passwords).
Physical controls.
a. InformationInformation
SourceDestination b.
Interruption
c. d.
e.
Network administrators have increasing concerns about the security of their networks
when they expose their organization’s private data and networking infrastructure to
internet crackers.
To provide the required level of protection, an organization needs a security policy to
prevent unauthorized users from accessing resources on the private network and to
protect against the unauthorized export of private information.
Even if an organization is not connected to the internet, it may still want to establish
an internal security policy to manage user access to certain portions of the network
and protect sensitive or secret information.
1. Vulnerable TCP/IP services:
A number of the TCP/IP services are not secure and can be compromised by
knowledgeable intruders; services used in the local area networking environment for
improving network management are especially vulnerable.
2. Ease of spying and spoofing:
A majority of internet traffic is unencrypted; e-mail, passwords, and file transfers can
be monitored and captured using readily-available software.
Intruders can then reuse passwords to break into system.
3. Lack of policy:
Many sites are configured unintentionally for wide-open internet access, without
regard for the potential for abuse from the internet; man sites permit more TCP/IP
services than they require for their operations, and do not attempt to limit access to
information about their computers that could prove valuable to intruders.
4. Complexity of configuration:
Host security controls are often complex to configure and monitor; controls that are
accidentally misconfigured often result in unauthorized access.
The following sections describe the problems on the internet and the factors that
Denial-of-Service Attacks
A Denial-of-Service or DOS attack is an attack on a network that is designed to
disable the network by flooding it with useless traffic or activity.
A distributed denial-of-service, or DDOS, attack uses multiple computes to launch a
DOS attack.
While a Dos attack does not do any technical damage, it can do substantial financial
damage to an e-business, because every second an e-business’s network or a website
is down, it may result in lost revenues.
Viruses
Viruses are the most common security risk faced by e-businesses today.
A virus is a small program that inserts itself into other program files that then become
“infected”, just as a virus in nature embeds itself in normal human cells.
The virus is spread when an infected program is executed, and this future infects other
programs. Examples of virus effects include inability to boot, deletion of files or
entire hard drives, inability to create or save files, and thousands of others
possibilities.
A logic bomb is a virus whose attack is triggered by some event such as the data on a
computer’s system clock.
A logic bomb may simply release a virus or it may be a virus itself. Viruses are
generally introduced into a computer system via e-mail or by unauthorized network
access.
Virus examples include Stoned, Michelangelo and Auto start 9805.
Trojan horse
This takes its name from a story in Homer’s Iliad, and is a special type of virus that
emulates a benign application.
It appears to do something useful or entertaining but actually does something else as
well, such as destroying files or creating a “back door” entry point to give an intruder
access, to the system.
Worm
This is a special type of virus that does not directly alter program files.
Instead, a worm replaces a document or an application with its own code and then
uses that code to position itself. Worms is often not noticed until their uncontrolled
replication consumer’s system resources and slows down or stops the system.
Worm examples include VBS/Love letter, a VBS/Godzilla, worm, and Happy99.
How are Sites Hacked?
Distributed systems based on the client/server model have become common.
In recent months, we can see an increase in the development and the use of distributed
sniffers, scanners, and denial-of-service tools.
Attacks using these tools can involve a large number of sites simultaneously and
focus to attack one or more victim hosts or networks.
In a typical distributed attack system, the ‘intruder’ controls a small number of
‘masters’ which in turn control a large number of ‘daemons’.
These daemons can be used to launch packet flooding or other attacks against the
‘victims’ targeted by the intruder.
People Policy
Technology
People
This core element is the most important. The people element comprises the people
and various roles and responsibilities within the organization.
These are the people that are put in place to execute and support the process. A few
key roles include senior management, security administrators, system and IT
administrators, end users, and auditors.
Policy
This element comprises the security vision statement, security policy and standards,
and the control documentation.
This is basically the written security environment-the bible that the security process
will refer to for direction and guidance.
Technology
This element includes tools, methods, and mechanisms in place to support the
process. These are core technologies-the operating systems, the databases, the
applications, the security tools-embraced by the organization.
The technology then is the enforcement, monitoring, and operational tools that will
facilitate the process.
The People, Policy, Technology (PPT) Model
The PPT model can be illustrated with a few simple examples. Figure shows the PPT
model with regards to internet usage and misuse.
Users are educated on the proper usage of the Internet. The controls environment
relies solely on the user.
An Internet usage policy is written to document proper use of the Internet and the
consequences of misuse.
The controls environment now is supported by two of the three core elements.
The PPT model is simply the analysis of a risk issue. If the issue is broken down into
the three core elements, action items can be determined for each core element.
In this manner, control coverage can be moved from one element to two, and
ultimately to coverage by all of the elements.
Understanding the Security Framework
Key elements, also referred to as the “Four Pillars” to Information Security, include:
Solid Senior Management Commitment
An overall Security Vision and Strategy
A comprehensive Training and Awareness Program
A solid Information Security Management Structure including key skill sets and
document responsibilities as depicted in figure.
Within the four “pillars” of the program, several phases are included.
The first is the Decision Driver Phase, which contains factors determining the
business drivers of security.
These include Technology Strategy and Usage, Business Initiatives and Processes,
and Threats, Vulnerabilities and Risk. All these combine of form a unique “Security
Profile” of the organization.
The “profile” needs to be reflected in the security Policies and Technical Controls.
The next facet of the Information Security Framework includes the design of the
security environment, also called the Design Phase.
This is the stage where the organization documents its security policy, the control
environment and deals with controls on the technology level.
A key element in this process is not only the clear definition of security policy and
technical control information, but also the “Security Model” of the enterprise.
Information Classifications and Risk Assessment methods fall under this component.
These processes allow the organization to manage risk appropriately and identify the
risks and value of information assets.
The final facet of the Information Security Framework is the Implementation phase.
This begins by documenting the Administrative and End-User guidelines and
procedure.
These guidelines must be succinct and flexible for the changing environment.
Enforcement, Monitoring, and Recovery processes are then layered on for the
operational support of the security program.
Secure Physical Infrastructure
This principle is very evident here. The controls for physical and environmental
security are defined in three areas:
Security of the premises.
Security of the equipment.
Secure behavior.
Security of the Premises:
Physical security perimeter
We begin by defining the boundary of the premises and examining the security
requirement, based on the risk assessment.
The best way to do this will be to walk around the premises and ‘case the joint’.
Evaluate all the entry point through which an intruder could come in.
Take help of a security agency to do this.
Do not depend on your skills as an armchair detective.
The classical approach to securing the premises is to create multiple barriers.
Physical entry controls
Only the authorized persons should be allowed access to the secure areas. This
objective could be achieved a by having a clear access control policy defining the
access rights.
Securing offices, rooms and facilities
Location of the secure office within the physically secure perimeter should be chosen
with care.
All the risks pertaining to fire, flood, explosion, civil unrest and other forms of natural
or man-made disaster should be considered.
There could also be threat from neighboring premises, caused by leakage of water,
spreading of fire, or storage of toxic/inflammable/explosive material.
Working in secure areas
Security equipment like CCTV and swipe-card controlled gates are of no use if the
persons working in these locations are not trustworthy, or are incompetent, or
simply lack awareness of their responsibility.
They should be hand-picked and trained for these operations.
Isolated delivery and loading areas
We have taken care of every aspect of physical security in the above paragraphs, but
do we know how canteen facilities get into secured premises?
How the trash is taken out?
How the courier delivers the parcels? In industrial premises, there could be constant
movement of incoming and outgoing material.
Security of the Equipment:
Equipment setting and protection
Our next concern is the appropriate security of the equipment. Information processing
equipment needs to be handled carefully.
The first level of equipment protection depends on physical location.
The location should minimize the need for unnecessary access, as well as prevent
snooping.
Power supplies
Information processing will come to halt in the absence of a suitable power supply.
This could be the worst type of a denial-of-service attack.
These could be:
1. Taking power from multiple feeds of electric supply.
2. In case all the electric supplies fail simultaneously, you need to have an
uninterruptible power supply (UPS) with adequate battery capacity capable of
sustaining the initial load.
3. The UPS could in-turn be supported by backup generator sets.
4. The backup generator would require adequate supply of fuel, which also needs to
be stored with replenishment, assured by the suppliers.
5. Proper installation of emergency lights should also be planned; lightning
protection should be provided to the power installation and the communication
lines.
Cabling security
We really need to remember every detail, including the proverbial last nail.
Do we know the physical layout of power cables and communication cables in our
premises?
The first step will be to obtain wiring diagrams and update them.
Then, do a physical inspection and assess the protection needs against damage,
interference or interception.
Establish the best practices for laying the network cables as well as power cables, as
well as power cables, and ensure that these are actually implemented.
Equipment maintenance
It is normally expected that due care is taken for equipment maintenance, and proper
records are maintained.
From a security angle, two more measures are required. One is to maintain record of
faults that were noticed, and the second step is to maintain records of all equipment
sent off the premises for maintenance.
Security of equipment off premises
Shrinking size of computers and expanding wide area networks have made the
computer equipment extremely mobile.
Processing as well as storage capacity of mobile devices has been following Moore’s
law of doubling every 18 months.
HINTS
INFORMATION SYSTEM SECURITY
Integrity of the data sent and received.
Confidentiality of the data so that it is not accessible to others.
The data ought to be available to the people for whom it is meant
Interrupt the data and cut it off.
Intercept the data with the intent of spying on it.
Interrupt the data and modify it and send a different data to the
receiver.
Obstruct the data and fabricate new data and send it to the receiver
SECURITY ON THE INTERNET
Vulnerable TCP/IP services-used in the local area networking environment
Ease of spying and spoofing: unencrypted; e-mail, passwords
Lack of policy configured unintentionally for wide-open internet access
Complexity of configuration controls that are accidentally
How secure are communications is the data protected once it is delivered to the e-
business?
How are credit card transactions authenticated and authorized?
Network and Website Security Risks- network and web server security risk
terminology.
Denial-of-Service disable the network by flooding
Viruses -security risk
E-BUSINESS RISK MANAGEMENT ISSUES
Protection of Vulnerable Services
Controlled Access to Site Systems
Concentrated Security
Enhanced Privacy
Need for Usage Statistics on Network
Policy Enforcement
INFORMATION SECURITY ENVIRONMENT IN INDIA
certifying their ability to maintain proper security levels
NASSCOM has taken a holistic view of Information Security through its ‘Trusted
Sourcing’
LEGAL AND ETHICAL ISSUES :
Cyber stalking is a crime in which the attacker harasses a victim
Copyright is a legal right created by the law of a country
Phishing is the attempt to obtain sensitive information
SKIMMING is a method of rapidly moving the eyes over text
UNIT –III
2 MARKS:
5 MARKS:
10 MARKS:
1. What are the two ways conducted by commerce over the internet? Explain.
(APRIL/MAY 2016)
2. Write down the Legal and Ethical Issues in E-security?
3. Explain in detail about Cyberstalking?
4. Discuss Information Security Environment in India.