Key Technologies Electronic Data Interchange (EDI) Internet Intranet Extranet
Key Technologies Electronic Data Interchange (EDI) Internet Intranet Extranet
B2B Model
A website following the B2B business model sells its products to an intermediate buyer who
then sells the products to the final customer. As an example, a wholesaler places an order
from a company's website and after receiving the consignment, it sells the endproduct to the
final customer who comes to buy the product at the wholesaler's retail outlet.
B2B identifies both the seller as well as the buyer as business entities. B2B covers a large
number of applications, which enables business to form relationships with their distributors,
re-sellers, suppliers, etc. Following are the leading items in B2B eCommerce.
Electronics
Shipping and Warehousing
Motor Vehicles
Petrochemicals
Paper
Office products
Food
Agriculture
Key Technologies
Following are the key technologies used in B2B e-commerce −
Electronic Data Interchange (EDI) − EDI is an inter-organizational exchange of
business documents in a structured and machine processable format.
Internet − Internet represents the World Wide Web or the network of networks
connecting computers across the world.
Intranet − Intranet represents a dedicated network of computers within a single
organization.
Extranet − Extranet represents a network where the outside business partners,
suppliers, or customers can have a limited access to a portion of enterprise
intranet/network.
Back-End Information System Integration − Back-end information systems are
database management systems used to manage the business data.
/*-/-*/-*/*/
credit card is a payment card issued to users (cardholders) to enable the cardholder to pay
a merchant for goods and servicesbased on the cardholder's promise to the card issuer to
pay them for the amounts plus the other agreed charges.[1] The card issuer (usually a bank)
creates a revolving account and grants a line of credit to the cardholder, from which the
cardholder can borrow money for payment to a merchant or as a cash advance.
/*/-
`2
EDI refers to a family of standards and does not specify transmission methods, which are
freely agreed upon by the trading partners.
The wide adoption of EDI in the business world facilitates efficiency and cost reduction. EDI
is used in such diverse business-to-business relationships as:
Interchanges between health care providers and insurers
Travel and hotel bookings
Education
Supply chain management
Administration
Tax reporting
EDI is a sequence of messages between two trading partners, either of which may serve as
the originator or recipient. The messages are transmitted and received without human
intervention. Each message is composed according to a standardized syntax from a
sequence of standardized data elements. It is this standardization that makes message
assembling, disassembling and processing by the computer possible.
EDI is considered to be a technical representation of a business conversation between two
entities, either internal or external. The EDI standards were designed to be independent of
communication and software technologies. EDI can be transmitted using any methodology
agreed to by the sender and recipient.
There are four major sets of EDI standards:
The UN/EDIFACT Standard: The only international and UN-recommended standard
The US Standard ANSI ASC X12 (X12):The predominant standard in North America
The TRADACOM Standard: The predominant standard in the U.K. retail industry
The ODETTE Standard: The standard used in the European automobile industry
XML and EDI are complementary technologies. ASC X12 is working diligently to enhance
communications around the world by collaborating on the electronic business XML (ebXML)
initiative, a worldwide effort to develop a common framework for XML business messages.
Value-added networks are the intermediate agencies providing secure and reliable
transmission and storage of EDI messages. Web-based EDI (webEDI) allows a company to
interact with its suppliers without implementing a complex EDI infrastructure. WebEDI
services only require an Internet connection; thus, EDI has become accessible and
affordable to even small- and medium-sized businesses.
EDI has been criticized for its high set-up and VAN costs as well as complex standards.
However, its benefits include:
Time: Reduced cycle time and enhanced customer service
Cost: Enhanced inventory management and minimized paper use and storage
Quality: Improved business relationships and accuracy
Profit: Reduced costs, increased turnover and increased cash flow
Efficiency: Increased productivity
/*-/-*/-*/-*/
E-commerce sites use electronic payment, where electronic payment refers to paperless
monetary transactions. Electronic payment has revolutionized the business processing by
reducing the paperwork, transaction costs, and labor cost. Being user friendly and less time-
consuming than manual processing, it helps business organization to expand its market
reach/expansion. Listed below are some of the modes of electronic payments −
Credit Card
Debit Card
Smart Card
E-Money
Electronic Fund Transfer (EFT)
A digital library, digital repository, or digital collection, is an online database of digital
objects that can include text, still images, audio, video, or other digital media formats.
Objects can consist of digitized content like printor photographs, as well as originally
produced digital content like word processor files or social media posts. In addition to storing
`6
content, digital libraries provide means for organizing, searching, and retrieving the content
contained in the collection.
Digital libraries can vary immensely in size and scope, and can be maintained by individuals
or organizations.[1] The digital content may be stored locally, or accessed remotely via
computer networks. These information retrieval systems are able to exchange information
with each other through interoperability and sustainability.[2]
/*-/-*/-*/-*/-*/-*/-*/-*/-*U3
M-Commerce is a part of E-commerce which allows people to do the transaction through
mobile devices. There are already several existing M-Commerce applications and services
nowadays that bring many M-commerce advantages to us.
In the current commerce industry, M-Commerce has been entered in finance, services,
retails, tele-communication and information technology services.
Think of it like this: content marketing (or inbound marketing) is in direct opposition to
traditional advertising (outbound marketing), and in direct integration with the patterns and
habits of today’s generation.
/*/-*/-/*-*-
Privacy and security concerns of consumers have been touted as one of the hindrances
to the growth of e-commerce. These concerns increase the risk perception of
consumers. Understanding the consequences of privacy and security concerns and
their relationship to risk perceptions may provide a solution. The relationship between
privacy and security is investigated using the theory of planned behavior. The study
aims to examine the relationship of trust, privacy and security concerns to the risk
perception adoption of e-commerce. The results from a survey validate the model.
E-Commerce has led to a new generation of associated security threats,
Threats for e commerce
There are several threats that badly effect on e-commerce. Due to these reasons business
through the internet becomes difficult. But
Access and Connectivity
With the tremendous growth of Internet and e-commerce activities, there is urgent need for
access, connectivity and local hosting. In many countries, operational speed and pace of
downloads are regarded as slow.
Authentication and Standardization
E-commerce growth in the B2B and B2C segments will be strongly dependent on wide
availability of the appropriate security authentication infrastructure, as well as on standards
for goods sold over the Net. These would help remove security concerns and boost
confidence in e-commerce transactions.
Cyber Laws
The streamlining of cyber laws related to taxation, protection of intellectual property rights
and cyber crimes would help cross-border e-commerce. Fraud and morality issues still
dominate most people’s fears about the Internet and ecommerce.
Technology
E-commerce growth will be centered on new technologies. The use of mobile phones in e-
commerce, for example, would extensively depend on WAP authentication protocols. The
introduction of WAP mobile phones will widen access to the Internet.
Limitations and Asymmetries of Infrastructure
Although we should be wary of a technology-centered, "field-of-dreams" view of success
factors, an appropriate technological infrastructure is necessary for the development of E-
commerce. The infrastructure of the Internet, which acts as the current global information
infrastructure, has acknowledged problems. The issues turn on the provision of sufficient
band width for the surging use that is also moving to multimedia transmissions, and on the
problems fostered by the decentralized nature of the Internet.
Technical Attacks
Technical attacks are one of the most challenging types of security compromise an e-
commerce provider must face. Perpetrators of technical attacks, and in particular Denial-of-
Service attacks, typically target sites or services hosted on high-profile web servers such as
banks, credit card payment gateways, large online retailers and popular social networking
sites.
Denial of Service Attacks
Denial of Service (DoS) attacks consist of overwhelming a server, a network or a website in
order to paralyze its normal activity. Defending against DoS attacks is one of the most
challenging security problems on the Internet today. A major difficulty in preventing these
attacks is to trace the source of the attack, as they often use incorrect or spoofed IP source
addresses to disguise the true origin of the attack.
Symptoms of denial-of-service attacks to include:
Unusually slow network performance
Unavailability of a particular web site
Inability to access any web site
`8
transactional history, and an activity analysis consisting of exploratory activities showing the
customer's navigation, shopping cart, shopping pattern and more.
The benefits of E-CRM include the following:
Improved customer relations, service and support
Matching the customers' behavior with suitable offers
Increased customer satisfaction and loyalty
Greater efficiency and cost reduction
Increased business revenue
/*-/-*/-*/
COPYRIGHT legally protects an author's works and as a result, it is vitally important in book
publishing. According to the U.S. government, "Copyright is a form of protection grounded in
the U.S. Constitution and granted by law for original works of authorship fixed in a tangible
medium of expression." In other words, you can't copyright things like skywriting.
Copyright provides protection against literary piracy, which is especially critical in today's
world of easy digital reproduction and distribution. Here are some frequently asked
questions specific to authors and book publishing that reflect the laws of the Indian
government.
Copyright is a form of intellectual property law and as such protects original works of
authorship including literary, dramatic, musical, and artistic works. These works include
poetry, novels, movies, songs, computer software, and architecture. Copyright does not
protect facts, ideas, systems, or methods of operation, although it may protect the way
these things are expressed.
In other words, your story (or piece of music or building plans) must be fully developed,
fleshed out, and exist in some visible manner in order for it to be considered copyrighted.
This is a compelling reason for authors to always write down their plots, instead of just
talking about them.
/-*/-*/-*/-/-/-*/-*
Types of e-commerce system :
There are 6 types of e-commerce systems. They are B2B, B2C, C2C, C2B, B2A, C2A. All
these 6 types of e-commerce that are used today are classified based on the nature of the
transaction.
B2B (Business-to-Business)
B2B e-commerce can be simply defined as the commerce between
companies. In Business-to-Business type of electronic commerce system, companies
do business with each other. For say, a manufacturer selling a product to a wholesaler, a
wholesaler selling a product to the retailer. Here manufacturer, wholesaler and retailer all
are doing their separate businesses.
Above diagram illustrates the B2B model. There are 3 businesses- wholesaler,
manufacturer and the retailer. Here manufacturer has a website using which wholesalers
can purchase products from the manufacturer. When a wholesaler places an order on the
website, the information regarding the order will be received by the manufacturer through
the website. Then after processing the order, the manufacturer will send the product to the
wholesaler. After receiving the products wholesaler can sell it to the retailers. This type of
business is called B2B model.
`10
B2C (Business-to-Consumer)
B2C model works as its name suggest. In this model, the company sells their products,
goods or services directly to the consumer online. Here the customer can view products on
the website that they want to buy and can order it. After receiving the order details, the
company will process the order and then send the products directly to the customer. For
example, Amazon, Flipkart etc are this type of e-commerce business model which we are
using in our daily life.
We can view products on the websites like Amazon, Flipkart and can order it. After receiving
the order, the selling company of the products processes it and send it to us. Here a
business company is selling their products to the customer with the help of an e-commerce
website.
C2C (Consumer-to-Consumer)
Here a consumer sells products, goods or services to other consumers using the
internet or the web technologies. The C2C business model helps us to sell our assets or
properties like a car, house, bike, electronics etc via online to other consumers. OLX, Quickr
etc are this type of business model.
Here, if consumer-1 wants to sell a product then he/she can publish the details of the
product on the website like OLX or Quickr. The consumer-2 can view the details of the
product on that website that consumer-1 wants to sell. If consumer-2 is willing to buy the
product that consumer-1 is selling, then the buyer can directly contact the seller and the
product will be sold. Here products are selling directly from a consumer to another
consumer via the website.
C2B (Consumer-to-Business)
A consumer to the business model is a type of commerce where aconsumer or end user
provides a product or service to an organization. It is the reverse model of the B2C or
business to consumer model, where businesses produce products and services for
consumer consumption.
In this business model, individual customers offer to sell products or services to the
companies who are prepared to purchase them. For example, if you are a software
developer, then you can show a demo of your software or skills that you have on the sites
`11
like freelancer, fiverr etc. If a company likes your software or skills then the company will
directly buy the software from you or can hire you for their services.
B2A (Business-to-Administration)
B2A or business to administration also referred as the business to government (B2G)
commerce, it is a derivative of B2B e-commerce model. in this model, the businesses and
government agencies (administration) use central websites to exchange information
and do business with each other more efficiently than they usually can off the web.
B2G business is also referred to public sector marketing that means marketing products and
services to various government levels. The B2G business network provides a platform to
businesses to bid on government opportunities such as auctions, tenders and application
submission etc.
C2A (Consumer-to-Administration)
Consumer to administration or consumer to government e-commerce model
helps consumers to request information or post various feedbacks regarding public
sectors directly to the government authorities or administration. For say, making
electricity bill payments through the website government, making payment of taxes,
payment of health insurance etc are C2A type of business model.