Ecommerce Notes For Bcom
Ecommerce Notes For Bcom
Lecture-1
Security Issues in E-Commerce Transactions
Authentication:- Authentication ensures that the origin of an electronic
message is correctly identified. This means having the capability to
determine who sent the message and from where or which machine.
Without proper authentication, it will be impossible to know who actually
placed an order and whether the order placed is genuine or not.
Non-Repudiation:- Non-Repudiation is closely related to authentication
and this ensures that the sender cannot deny sending a particular
message and the receiver cannot deny receiving a message.
Access Control:- If access control is properly implemented, many other
security problems like lack of privacy will either be eliminated or
mitigated. Access control ensures only those that legitimately require
accesses to resources are given access and those without valid access
cannot have access.
Confidentiality or Privacy:- Privacy ensures that only authorized parties
can access information in any system. The information should not be
distributed to parties that should not receive it. Issues related to privacy
can be considered as a subset of issues related to access control.
Integrity:- Integrity ensures that only authorized parties can make
changes to the documents transmitted over the network.
1
Functions of SET
Provide confidentiality of payment and ordering information.
Ensure the integrity of all transmitted data.
Provide authentication that a card holder is a legitimate user of a credit
card account.
Provide authentication that a merchant can accept credit card
transactions through its relationship with a financial institution.
Ensure the use of best security practices and system design techniques
to protect all legitimate parties in an electronic commerce transaction.
Create a protocol that neither depends on transport security mechanisms
nor prevents their use.
Facilitate and encourage interoperability among software & network
providers.
Participants in the SET system
2
Scope of SET
1. Motivated by the large amount of unsecured credit-card based
transactions on the Internet.
2. Network payments treated in a similar way to Mail Order/Telephone
Order (MOTO) transactions.
3. SET applies only to the ‘front end’ of payment no need to change the
‘back end’.
4. SET only addresses Payment - other protocols for shopping, payment
method selection etc. will be developed by others.
3
the sender & receiver should share the private key. This is possible only
when the sender & receiver know each other.
In asymmetric encryption, two separate keys are used to encrypt &
decrypt data. The public key is shared with the other person and the
private key is known only to the person who decrypts the data. So, the
private key will remain a secret while the public key will be known to both
the parties.
4
E-Commerce Notes
Unit-2
Lecture-2
Cryptography
Cryptography is the process through which the messages are altered so
that their meaning is hidden from adversaries who might intercept them.
5
Public Key Cryptography
In public-key cryptography, two separate keys are used to encrypt &
decrypt data. The public key is shared with the other person and the
private key is known only to the person who decrypts the data. So, the
private key will remain a secret while the public key will be known to both
the parties.
Public-key cryptography depends upon the notion of one-way functions:
a one way function is a function that is easy to apply, but extremely
difficult to invert.
6
Digital Signature
A digital signature is an electronic signature that can be used to
authenticate the identity of the sender of a message or the signer of a
document, and possibly to ensure that the original content of the
message or document that has been sent is unchanged.
“Digital signature is a computer data compilation of any symbol or
series of symbols, executed, adopted or authorized by an individual
to be legally binded equivalent to the individual’s handwritten
signature”
A digital signature authenticates electronic documents in a similar manner
a handwritten signature authenticates printed documents.
A digital signature is issued by a Certification Authority (CA) and is signed
with the CA’s private key.
The recipient of a digitally signed message can verify that the message
originated from the person whose signature is attached to the document
7
and that the message has not been altered either intentionally or
accidentally since it was signed. Also the signer of a document cannot
later disown it by claiming that the signature was forged.
When a message with a digital signature is transmitted & received, the
following parties are involved:-
The signer who signs the document.
The verifier who receives the signed document & verifies the signature.
The arbitrator who arbitrates any disputes between the signer & the
verifier if there is a disagreement on the validity of the digital signature.
A digital signature typically contains the Owner’s public key, the Owner’s
name, Expiration date of the public key, the name of the issuer (the CA
that issued the Digital ID), Serial no. of the digital signature and the
digital signature of the issuer.
Digital signatures are based on a combination of public key encryption
and one way hash function that converts a message of any length into a
fixed length message digest known as hash function. The value of hash
function is unique for the hashed data. Any change in the data, even
deleting or altering a single character, results in a different value. The
content of the hash data cannot be deduced from hash which is why it is
called ‘one way’. The encrypted hash, along with other information, such
as hashing algorithm is known as digital signature.
8
E-Commerce Notes
Unit-2
Lecture-3
Virtual Private Network
A Virtual private network (VPN) extends a private network across a public
network, such as the internet.
It enables a computer to send and receive data across shared or public
networks as if it were directly connected to the private network.
This is done by establishing a virtual point-to-point connection through
the use of dedicated connections, encryption or a combination of the
two.
VPN allows employees to securely access their company’s intranet while
travelling outside the office.
Similarly, VPNs securely and cost effectively connect geographically
disparate offices of an organization, creating one cohesive virtual
network.
VPN technology is also used by ordinary Internet users to connect to
proxy servers for the purpose of protecting one’s identity.
Types of VPN:
Remote Access VPN
Site-to-Site VPN
Remote Access VPN:- Remote access VPNs allow employees to access
their company’s intranet from home or while travelling outside the office.
9
Site-to-Site VPN:- Site-to-Site VPN allow employees in geographically
disparate offices to share on cohesive virtual network.
VPN systems may be classified by:-
The protocols used to tunnel the traffic.
The tunnel’s termination point location.
Whether they offer site-to-site or remote access connectivity.
The level of security provided.
VPN Architecture
There are two basic VPN architectural choices:-
Service provider independent VPN
Service provider dependent VPN
10
Disadvantage
Data security is critical because VPN encryption does not occur until the
POP, thus leaving the enterprise communication unprotected between
the remote PC and the POP.
VPN Security
To prevent disclosure of private information, VPNs typically allow only
authenticated remote access and make use of encryption techniques.
VPN provides security by the use of tunneling products and through
security procedures such as encryption.
The VPN security provides:
Confidentiality
Authentication
Integrity
VPNs ensure privacy by providing a private tunnel through the internet
for remote access to the network. For full VPN security, your VPN must
be enhanced with a reliable user authentication mechanism, protecting
end points of the VPN.
Username and password authentication is not enough-this method is
weak and highly susceptible to hacking, cracking, key loggers and other
attacks. It only takes one compromised password for your organization
to lose control over gains network access. Strong user authentication
with a VPN provides true secure remote access for today’s mobile
workforce.
E-Commerce Notes
Unit-2
Lecture-4
Types of Security Attacks
Passive Attack
Active Attack
Passive Attack: In Passive attack a network intruder intercepts data
travelling through the network. A passive attack monitors unencrypted
traffic. Passive attacks include traffic analysis, monitoring of unprotected
communications, capturing authentication information such as
passwords.
11
Types of Passive Attacks:
a) Wire Tapping or Telephone Tapping: Telephone tapping is the
monitoring of telephone and internet conversations by a third party.
Passive wire tapping monitors or records the traffic.
b) Port Scanner: A port scan can be defined as an attack that sends client
requests to a range of server port addresses on a host, with a goal of
finding an active port and exploiting a known vulnerability of that service.
c) Idle Scan: The idle scan is a TCP port scan method that consists of
sending spoofed packets to a computer to find out what services are
available. This is accomplished by impersonating another computer
called a “zombie” and observing the behavior of the “zombie” system.
12
d) SQL injection: Sql injection is a code injection technique, used to attack
data driven applications, in which malicious SQL statements are inserted
into an entry field for execution.
Difference between Computer Virus and Computer Worm
Sno. Computer Virus Computer Worm
1. It cannot be controlled It can be controlled remotely.
remotely.
2. It deletes, modifies the files It only monopolies the CPU &
and also change the location memory.
of file.
3. It is slower than worm Worm is faster than virus.
4. The virus is the program code The worm is code that
that attaches itself to replicate itself in order to
application program and when consume resources to bring it
application program run it runs down.
along with it.
E-Commerce Notes
Unit-2
Lecture-5
Intranet
Intranet Software:
13
Applications of Intranet:
The most popular intranet application is obviously:
1. Inter-office e-mail, this capability allows the employees of a company to
communicate with each other swiftly and easily. If the intranet has access to
the Internet, e-mail can be accessed through the Internet connection. If the
intranet is running without the Internet, special e-mail software packages can
be bought and installed so that employees can take advantage of its many
benefits.
2. An intranet has many other different applications that can be utilized by a
company. These include the Web publishing of corporate documents, Web
forms, and Web-to-database links that allow users to access information.
3. Newsletters, information on benefits, job listings and classifieds, libraries,
stock quotes, maps, historical data, catalogs, price lists, information on
competitors' products, and customer service data are just a few examples of
these types of applications.
In addition, there are several other main applications that is very popular in
the intranet format:-
1. Document publication applications
The first application that always comes to mind for intranets in and of
themselves is the publication and distribution of documents. This
application allows for paperless publication of any business information
14
that is needed for internal employees or external customers or suppliers.
Any type of document may be published on an intranet: policy and
procedure manuals, employee benefits, software user guides, online
help, training manuals, vacancy announcements--the list goes on to
include any company documentation.
15
Groupware: E-mail and bulletin board.
Telephony: intranet is the perfect conduit for computer-based
telephony.
Extranet: linking geographically dispersed branches, customers and
suppliers to authorized sections of intranets creates happiest customers,
more efficient suppliers, and reduced staff cost.
Considerations in Intranet Deployment:
1. Collections of web links
2. Company news and department newsletters
3. Organization charts
4. Manuals, documentation, policies
5. Basic collaboration tools (groupware)
6. Directory services (gateway to phone and other staff contact info)
7. Human resources information
8. Threaded discussions on current company topics/issues
9. Web–based email access
10. Web–based discussion list management and participation
11. Access to company databases — sales, inventory, pricing
12. Calendaring (company–wide events calendar)
13. Scheduling (meetings, personal scheduling)
14. Document management
15. Search engine of company documents
16. Employee time logging
17. Employee expense reporting
18. Forms to help automate other business processes –
work orders, jobdescriptions, mileage, maintenance requests, etc.
Intranet Application Case Studies:
Now, let us investigate some typical application case in depth, including
their return on investment (ROI).
Intranet Case studies with ROI Analysis:
The need for accountability and for clear measures of success is
increasingly demanded for all corporate expenditures, including
intranets. If you are responsible for an intranet, you need to know how
build a business case and develop a return on investment (ROI)
strategy.
Intranet ROI
Intranets and corporate portals are expensive endeavors. Despite the expense,
many organizations understand the implicit and/or explicit value. Intranets are
widely valued for:
Streamlining business processes and driving operational
efficiencies
Significantly reducing cost of internal business functions
16
Enhancing communications and collaboration between employees,
managers, suppliers and partners
As with any critical business system, an intranet or portal must be delivering
measurable performance and remain accountable to the investment. If the
site’s value is not being measured, then it risks failing the needs and demands
of employees and management.
When asked how executives determine whether an intranet or portal is
delivering value, they typically point to reducing costs and improving
productivity.
Of course, IT budgets are increasingly tied to company-wide business and
strategic initiatives. The cost justification for any expenditure, including IT must
have a clear bottom line that answers the question, “What’s the payback?”
In recent years, business challenges and subsequent solutions/applications
have been the driving force behind intranet investments. They will continue to
play this role in the future.
Executives will make investments in intranets and portals (see defining in the
adjacent glossary) if such investments spur growth, cut the cost of operations,
and/or help enhance the customer experience (retaining and building the
customer base).
The challenging economic climate of the past few years means that more and
more organizations will allocate dollars to IT systems and applications that can
demonstrate a measured solution and ROI to a business problem or provide
enhanced service and growth.
Short Intranet Application Cases
Prescient Digital Media is a veteran web and intranet consulting firm. It
provides strategic Internet and intranet consulting, planning and design
services to many Fortune 500 and big brand clients, as well as small and
medium-sized leaders. It treat each client as unique; It listen to their needs,
goals and challenges; understand a client's requirements and potential; and
deliver highly effective and innovative website and intranet plans, designs and
solutions.
ROI Study Of the respondents to the Prescient Digital Media ROI survey that
undertake ‘rough estimates’ of their organization’s intranet, answers varied
from $0 to $20M. The average annual ROI of respondent intranets fell just shy
of $1 million ($979,775.58).
While less than 20% of organizations have measured specific benefits, a
majority of organizations have at the very least made a ‘rough estimate’ or
guess of the value of their ROI. While only a handful of technology companies
measured intranet ROI three years ago, there are encouraging signs of change.
A recent study, conducted by Prescient Digital Media Ltd., finds that 6% of
17
organizations undertake ongoing, specific measurement of the ROI of their
intranet. Occasional measurement is undertaken by 26% of the respondent
organizations.
While extensive ROI measurement has not yet become mandatory at a
majority of organizations with intranets, ROI is a priority in 76% of the survey
respondents. Rather than attempt to measure the intranet or portal’s entire
value, those companies that are successfully gauging value are measuring
specific benefits. This paper lists intranet benefits in 10 key categories –
including hard costs, increased revenue, etc. – with two supporting categories:
content management and procurement.
The precision, scope of work and execution required to build and maintain a
successful intranet or portal is massive – from governance to content
management, and from technology to business processes. At the heart of a
successful intranet is the strength of the underlying plan. Failure to develop an
integrated plan that accounts for an organization’s structure, stakeholder, and
user requirements will almost certainly ensure failure and, with it, a loss of
significant time, money and jobs.
Finally, while appraising the ROI of an intranet or portal is critical for most
executives, there exists a great deal of untapped, intangible value that is
perhaps even more critical than the measured dollars and cents. When
properly deployed, intranets improve communication and collaboration and
improve employee satisfaction, which in turn can improve productivity. All
benefits are clearly important to any organization, but not always a
measurable ROI.
Share Knowledge Among Corporate Employee
Intranets offer several facilities that aid knowledge sharing:
Easy-to-access and use: The use of World Wide Web (WWW) browsers give a
low cost and easy-to-use interface to information and applications
Universal access to information: Information can be kept on any 'server' on
the network, and can be accessed from anywhere within the Intranet.
Person-to-person interaction: Intranets simplify interaction between people in
different locations, through electronic mail, and computer conferencing
Informal networks: Publishing information and making contact is quick and
informal on an Intranet.
Scalable networks: As organizations restructure, it is easy to add or remove
servers to the overall network.
Access to external information and knowledge: Intranets usually have
gateways to the external Internet, which give access to a rapidly growing global
information resource
18
E-Commerce Notes
Unit-2
Lecture-6
Firewall
Firewall is software or hardware based network security system that
controls the incoming and outgoing network traffic by analyzing the data
packets and determining whether they should be allowed through or not,
based on a rule set.
A firewall establishes a human barrier between a trusted, secure internal
network & another network that is not assumed to be secure and trusted.
Many personal computer operating systems include software-based
firewalls to protect against threats from the public Internet. Many routers
that pass data between networks contain firewall components and
conversely many firewalls can perform basic routing functions.
Types of Firewall
Network Layer or Packet Filters Firewall
Application Layer Firewall
Proxy Firewall
Unified Threat Management(UTM)
Network Layer or Packet Filters Firewalls
19
Network layer firewalls, also called packet filters, operate at a relatively
low level of the TCP/IP protocol stack, not allowing packets to pass
through the firewall unless they match the established rule set.
A simple router is the traditional network layer firewall, since it is not able
to make particularly complicated decisions about what a packet is
actually taking to or where it actually came from. Modern network layer
firewalls have become increasingly more sophisticated & now maintain
internal information about the state of connections passing through them
at any time.
Application Layer Firewalls
Application layer firewalls work on the application level of the TCP/IP
stack, and may intercept all packets traveling to or from an application.
They block other packets (usually dropping them without
acknowledgement to the sender).
On inspecting all packets for proper content, firewalls can restrict or
prevent outright the spread of networked computer worms and Trojans.
Proxy Firewalls
Proxy firewalls offer more security than other types of firewalls. Unlike
application layer firewalls which allow or block network packets from
passing to and from a protected network, traffic does not flow through
proxy. Instead computers establish a connection to the proxy which
serves as an intermediary and initiate a network connection on behalf of
the request. This prevents direct connections between systems on either
side of the firewall and makes it harder for an attacker to discover where
the network is, because they will never receive packets created directly
by their target system.
Unified Threat Management
A product category called unified threat management (UTM) has
emerged. These device promise integration, convenience & protection
from pretty much every threat out there and are especially valuable to
small & medium-sized businesses.
Unified Threat Management is a firewall appliance that not only guards
against intrusion but performs content filtering, spam filtering, intrusion
detection & anti-virus duties traditionally handled by multiple systems.
These devices are assigned to combat all levels of malicious activity on
the computer network.
E-Commerce Notes
Unit-2
Lecture-7
20
Electronic Payment Systems
Electronic Payment is a financial exchange that takes place online
between buyers and sellers. The content of this exchange is usually
some form of digital financial instrument (such as encrypted credit card
numbers, electronic cheques or digital cash) that is backed by a bank or
an intermediary, or by a legal tender.
The various factors that have lead the financial institutions to make
use of electronic payments are:
1. Decreasing technology cost:
The technology used in the networks is decreasing day by day, which is
evident from the fact that computers are now dirt-cheap and Internet is
becoming free almost everywhere in the world.
2. Reduced operational and processing cost:
Due to reduced technology cost the processing cost of various
commerce activities becomes very less. A very simple reason to prove
this is the fact that in electronic transactions we save both paper and
time.
3. Increasing online commerce:
The above two factors have lead many institutions to go online and
many others are following them.
There are also many problems with the traditional payment
systems that are leading to its fade out. Some of them are
enumerated below:
1. Lack of Convenience:
Traditional payment systems require the consumer to either send paper
cheques by snail-mail or require him/her to physically come over and
sign papers before performing a transaction. This may lead to annoying
circumstances sometimes.
2. Lack of Security:
This is because the consumer has to send all confidential data on a
paper, which is not encrypted, that too by post where it may be read by
anyone.
3. Lack of Coverage:
When we talk in terms of current businesses, they span many countries
or states. These business houses need faster transactions everywhere.
This is not possible without the bank having branch near all of the
company’s offices. This statement is self-explanatory.
4. Lack of Eligibility:
Not all potential buyers may have a bank account.
5. Lack of support for micro-transactions:
Many transactions done on the Internet are of very low cost though they
involve data flow between two entities in two countries. The same if
done on paper may not be feasible at all.
21
Types of Electronic Payment System
1. Electronic Tokens
An electronic token is a digital analog of various forms of payment
backed by a bank or financial institution. There are two types of tokens:
Real Time: (or Pre-paid tokens) - These are exchanged between
buyer and seller, their users pre-pay for tokens that serve as currency.
Transactions are settled with the exchange of these tokens. Examples of
these are DigiCash, Debit Cards, Electronic purse etc.
Post Paid Tokens – are used with fund transfer instructions between
the buyer and seller. Examples – Electronic cheques, Credit cards etc.
2. Credit Cards
A credit card is a small plastic card issued to users as a system of
payment.
It allows its holders to buy goods & services based on the holder’s
promise to pay for these goods and services.
22
with a minimum payment & finance charge. Store credit cards & gas
credit cards are examples of limited purpose credit cards.
5. Secured Credit Card: Secured credit cards are an option for those
without a credit history or those with blemished credit. Secured cards
require a security deposit to be placed on the card. The credit limit on a
secured credit card is equal to the amount of the deposit made.
6. Prepaid Credit Card: Prepaid credit cards require the cardholder to
load money onto the card before the card can be used. The credit limit
does not renew until more money is loaded onto the card. Prepaid cards
are similar to debit cards, but are not tied to a checking account.
7. Business credit card: Business credit cards are designed specifically
for business use. They provide owners with an easy method of keeping
business & personal transactions separate.
The Players
Before exploring the process of using credit card online, let’s identify the
players in the credit card system. They are:
The card holder: a consumer or a corporate purchaser who uses credit
cards to pay merchant.
The merchant: the entity that accept credit cards and offers goods or
services in exchange for payments.
The card issuer: a financial institution (usually a bank) that establishes
accounts for cardholders and issues credit cards.
The acquirer: a financial institution (usually a bank) that establishes
accounts for merchants and acquires the vouchers of authorized sales
slip.
The card brand: bank card associations of issuers acquires ( like Visa
and MasterCard) which are created to protect and advertise the card
brand, establish and enforce rules for use and acceptance of their bank
cards and provide networks to connect the involved financial institutions.
The brand authorizes the credit- based transaction and guarantees the
payment to merchants. Sometimes the issuing bank performs the
business of the brand.
The process of using credit card:
23
1. Issue a credit card to a potential card holder.
2. The cardholder shows the card to a merchant whenever he/she needs
to pay for a product or services.
3. The merchant then asks for approval from the brand company, and the
transaction is paid by the credit. The merchant keeps a sales slip.
4. The merchant sells the slip to the acquiring bank and pays a fee for the
service. This is called the capturing process.
5. The acquiring bank requests the brand to clear for the credit amount
and gets paid. Then the brand asks for clearance to the issuer bank.
6. The amount is transferred from issuer to brand. The same amount is deducted
from the cardholder’s account in the issuing bank.
Advantages of Credit Cards:
They allow you to make purchases on credit without carrying around a lot
of cash.
They allow convenient remote purchasing ordering/shopping online or by
phone.
They allow you to pay for large purchases in small, monthly installments.
Many cards offer additional benefits such as additional insurance cover on
purchases, cash back, air miles & discounts on holidays.
Under certain circumstances, they allow you to withhold payment for
merchandise which proves defective.
Disadvantages of Credit Cards:
You may become an impulsive buyer and tend to overspend because of
the ease of using credit cards. Cards can encourage the purchasing of
goods & services you cannot really afford.
Lost or stolen cards may result in some unwanted expense &
inconvenience.
The use of large no. of credit cards can get you even further into debt.
24
Using a credit card especially remotely introduces an element of risk as
the card details may fall into the wrong hands resulting in fraudulent
purchases on the cards. Fraudulent or unauthorized charges may take
months to dispute, investigate and resolve.
3. Smart Cards
A smart card is a plastic card about the size of a credit card, with an
embedded microchip that can be loaded with data.
Smart cards are made of plastics generally polyvinyl chloride.
Smart cards can provide identification, authentication, data storage &
application processing.
A smart card contains more information than a magnetic strip card and it
can be programmed for different applications.
Smart cards within the next five years will be the industry standard in
debit and credit cards. As the major high street banks and finance
houses are now investing in the changeover to smart card technology.
You may use a smart card to:-
Establish your identity when logging on to an Internet access provider or
to an online bank.
Pay for parking at parking meters or to get on subways, trains or buses.
Give hospitals or doctors personal data without filling out a form.
Make small purchases at electronic stores on the web.
Advantages of Smart Cards:
Greater Reliability
Storage Capacity is increased up to 100 times.
Smart cards are multifunctional.
The anticipated working life of a smart card is ten years compared to that
of a magnetic strip card.
4. Electronic Cheques
The electronic cheques are modeled on paper cheques, except that they
are initialted electronically.
They use digital signatures for signing and endorsing and require the
use of digital certificates to authenticate the payer, the payer’s bank and
bank account.
Electronic checks allow merchants to convert paper check payments
made by customers to electronic payments that are processed through
the Automated Clearing House (ACH).
How Electronic Cheques work:
When you receive a paper cheque payment from your customer , you
will run the cheque through an electronic scanner system supplied by
your merchant service provider. This virtual terminal captures the
customer’s banking information and payment amount written on the
25
cheque. The information is transferred electronically via the Federal
Reserve Bank’s ACH Network, which takes the funds from your
customer’s account & deposits them to yours.
Once the cheque has been processed & approved, the virtual terminal
will instantly print a receipt for the customer to sign & keep.
Benefits of Electronic Cheques:
Secure and quick settlement of financial obligations.
Fast cheque processing
Very low transaction cost.
6. Debit Cards
A debit card is a plastic payment card that provides the cardholder
electronic access to his or her bank account at a financial institution.
Types of Debit Card Systems:
Online Debit or Pin Debit
Offline Debit or Signature Debit
Online Debit System: Online debit system requires electronic
authorization of every transaction and the debits are reflected in the
user’s account immediately. The transaction may be secured with the
personal identification number (PIN) authentication system.
Offline Debit System: Offline debit system may be subject to a daily
limit. Transactions conducted with offline debit cards, require 2-3 days to
be reflected on user’s account balances.
Advantages of Debit Cards:
There is no need to carry cash
It is quick and less complicated than using a cheque.
It can be used for withdrawals of cash.
It can be issued to any individual without assessing credit worthiness.
Its holders can have a record of the transactions in his bank statement
which will enable him to plan and control the expenditure.
7. Electronic Wallet/Purse
A digital/electronic wallet refers to an electronic device that allows an
individual to make electronic commerce transactions. This can include
purchasing items on-line with a computer or using a smartphone to
purchase something at a store.
Increasingly, digital wallets are being made not just for basic financial
transactions but to also authenticate the holder's credentials. For
example, a digital-wallet could potentially verify the age of the buyer to
the store while purchasing alcohol.
It is useful to approach the term "digital wallet" not as a singular
technology but as three major parts: the system (the electronic
infrastructure) and the application (the software that operates on top)
and the device (the individual portion).
An individual’s bank account can also be linked to the digital wallet. They
might also have their driver’s license, health card, loyalty card(s) and
27
other ID documents stored on the phone. The credentials can be passed
to a merchant’s terminal wirelessly via near field communication (NFC).
Certain sources are speculating that these Smartphone “digital wallets”
will eventually replace physical wallets.
A digital wallet has both a software and information component. The
software provides security and encryption for the personal information
and for the actual transaction.
Typically, digital wallets are stored on the client side and are easily self-
maintained and fully compatible with most e-commerce Web sites. A
server-side digital wallet, also known as a thin wallet, is one that an
organization creates for and about you and maintains on its servers.
Server-side digital wallets are gaining popularity among major retailers
due to the security, efficiency, and added utility it provides to the end-
user, which increases their enjoyment of their overall purchase.
28
it has made or received over the tax period, the government may not
know the truth, which could cause tax evasion.
Fraud
Electronic payment systems are prone to fraud. The payment is done
usually after keying in a password and sometimes answering security
questions. There is no way of verifying the true identity of the maker of
the transaction. As long as the password and security questions are
correct, the system assumes you are the right person. If this information
falls into the possession of fraudsters, then they can defraud you of your
money.
Impulse Buying
Electronic payment systems encourage impulse buying, especially
online. You are likely to make a decision to purchase an item you find on
sale online, even though you had not planned to buy it, just because it
will cost you just a click to buy it through your credit card. Impulse buying
leads to disorganized budgets and is one of the disadvantages of
electronic payment systems.
Payment Conflict
Payment conflicts often arise because the payments are not done
manually but by an automated system that can cause errors. This is
especially common when payment is done on a regular basis to many
recipients. If you do not check your pay slip at the end of every pay
period, for instance, then you might end up with a conflict due to these
technical glitches, or anomalies.
E-Commerce Notes
Unit-2
Lecture-8
Extranet
Extranet is an extended intranet that connects multiple intranets through
a secured tunneling internet.
Extranets act as a link to select individuals outside the company by
allowing them access to the information stored inside the intranet.
Internet protocols are typically utilized by extranets so as to provide
browser navigation even though the network is situated on a private
server. A username and password system can be configured to sectors
of the content so as to prevent users from accessing information they
have no authorization for.
29
Extranets combine the privacy and security of intranets with the global reach
of the internet, granting access to outside business partners, suppliers, and
costumers to a controlled portion of the enterprise network. Extranets are
becoming the major platforms for B2B EC replacing or supplementing EDI. They
provide flexibility serving internal and external users.
Extranets generally have the following features:
The use of Internet technologies and standards. These include the
standardized techniques for transmitting and sharing information and the
methods for encrypting and storing information, otherwise known as the
Internet Protocol, or IP.
The use of Web browsers. Users access extranet information using a
web browser like Microsoft Internet Explorer, Netscape Navigator or,
more recently, Mozilla’s Firefox. Browser software uses relatively small
amounts of memory and resources on a computer. The great thing about
browsers is that an application written for a browser can be read on
almost any computer without regard to operating system or
manufacturer. That makes an application developed for a browser a
snap to deploy. A browser on a user’s machine is all the software he or
she needs to take full advantage of the extranet application. No messy
and confounding installation disks; fewer clogged hard drives.
Security. By their very nature, Extranets are embroiled in concerns about
security. To protect the privacy of the information that is being
30
transmitted, most Extranets use either secure communication lines or
proven security and encryption technologies that have been developed
for the Internet.
Central Server/Repository. Extranets usually have a central server
where documents or data reside. Members can access this information
from any computer that has Internet access.
While these are the broad attributes shared by most Extranets, Extranets vary
dramatically in their design and implementation. They can be employed in a
wide variety of environments and for very different purposes, like:
Sharing case information
Sharing of case-related documents—many Extranets contain
document repositories that can be searched and viewed by both lawyer
and client on-line
Calendaring—key dates and scheduling of hearings and trials can
be shared on-line
Providing firm contact information
Acting as a “work flow engine” for various suppliers
Providing access to firm resources remotely
Sharing time and expense information.
Extranet applications Case
An extranet application is a software data application that provides
limited access to your company's internal data by outside users such as
customers and suppliers. The limited access typically includes the ability
to order products and services, check order status, request customer
service and much more.
31
Gartner Group, Extranets are expected to be a platform of choice of
more than 80 % of B2B EC. This increasing acceptance is expected to
surpass B2C EC which is also expected to be conducted across
intranets, by about 40 percent. Most of the B2C EC traffic will be done
on the regular internet. However many companies, such as FedEx, will
allow costumer to enter their intranets.
Planning Extranet
If you are considering introducing an intranet or extranet into your business,
you should ensure that it is flexible enough to meet not only your immediate
requirements, but also your needs as your business grows. Make sure your
objectives are clear. Will you restrict access to your site, or will you allow all of
your customers to use it? Do you want to promote flexible working in your
business by catering for your remote workforce? How will you measure the
success of your investment?
Identify the information that will need to be made available in order to meet
your objectives:
What kind of company information do you need on your intranet?
For example, company policies, news, forms and corporate branding.
Do you need to make all of your production and sales information
available to your partners via your extranet, or will discrete sub-sections
be sufficient?
Web server hardware and software. The size of the server will
depend on the number of potential users and whether or not you will
need a lot of bandwidth to support audiovisual content, eg video feeds.
Computers connected via a local area network - a closed, private
network.
Firewall software and hardware, which will prevent unauthorized
access from outside your organization.
A content management system to add and update intranet content.
This might be a good arrangement if your business is just starting up - you can
develop your own intranet once your business has grown and you have more
funds available. Once you have your intranet up and running, you can create
your extranet by giving partners access to the necessary company data via a
log-in page. Identify the support costs that will be required to run the site on a
day-to-day basis. Will you require technical support - if so, at what level? You
should also consider how the content will be managed. Remember that
security is paramount, since any security incident will directly affect not only
you but also your key business partners. You should establish what levels of
security are provided when choosing a technology solution.
32
Advantages/Benefits of Extranet
Ease of set-up, use and maintenance: Extranets should be simple to
set-up, use and maintain. The time it takes to develop a complete and
functioning extranet with a robust Web-standard software solution
amounts to days or weeks, rather than months or years with proprietary
networks solutions. Modifications can also be implemented with little or
no interruption to the extranet’s activities.
Scalability: Extranets require the flexibility to grow to include additional
users or organizations, or to expand to a new hardware server array
without compromising the system's usability or integrity. Solutions written
using non-industry standard format or proprietary architectures can
significantly restrict an extranet's ability to scale to include new users,
applications, servers or other components. Extranet solutions eliminate
the lock-in strategies used by software vendors and allow for greater
extensibility of the extranet to meet the growing and changing demands
of the on-line user community.
Versatility: An extranet should serve fundamental business activities
such as document exchange, collaborative discussion groups, on-line
submission forms, database queries, etc. yet have the ability to be
customized to satisfy a particular business purpose. For example,
companies transferring text or document files have different
requirements than those that transfer movies, video clips, other
multimedia files to be viewed on-line. Some organizations may wish to
sell directly on-line through the extranet and others may wish to only
automate the back office operations. Regardless of the business
objective, extranets require versatility to accommodate a dynamic
company's changing mission, goals and objectives.
Security: Security is perhaps the single most important characteristic
possessed by an extranet that serves multi-organizational interests.
Ensuring that all participant and contributor content is protected within a
secure and accountable framework provides the basis for system
usability and dependability. Although no system is ever 100% secure,
recent advances in security technology provide extranets with security
that exceeds industry standards and protects on-line information and
intellectual property.
Business Models of Extranet Applications
The extranet represents the bridge between the public Internet and the
private corporate intranet. The extranet connects multiple and diverse
organizations on-line, enabling strategic communities of stakeholders
with common interests (communities of interests) to form a tight
business relationship and a strong communication bond, in order to
achieve commerce-oriented objectives. The extranet defines and
supports this extended business enterprise including partners, suppliers
33
and distributors, contractors, customers and others that operate outside
the physical walls of an organization but are nonetheless critical to the
success of business operations. With the Internet providing for public
outreach or communication, and intranets serving internal business
interests, extranets serve the business-critical domain between these
extremes where the majority of business activity occurs.
Managerial Issues
Management is no longer worries about whether or not to adopt the
intranet/ extranet but is concerned about how to utilize them successfully
for business. Intranets/ Extranets are already two facts of life in many
large corporations. Thus management needs to review it’s own
35
company’s position in dealing with a verity of issues in installing the
internet/ extranet. The following are the guidelines for managerial issues:
1. Find the business opportunities by utilizing the intranet and
extranet: for example, consider connecting the customer, suppliers and
internal branches that are geographically dispersed.
2. Analyze whether the connectivity requirement suits the intranet
and extranet: it is mainly dependent upon whether the network is
composed of one LAN or multiple LANs. The former is suitable for
internet and the latter for extranet. Individual’s remote access should
also be considered.
3. Plan the most secure economical choice for implementation:
consult the technical persons and outside the company for
implementation. Review the current proprietary or leased network and
determine if it can be replaced by intranet and extranet. It may reduce
costs and widen connectivity for the customers and suppliers.
4. Select the best outsourcers for implementation: compare the
outsourcers who can implement the internet/ extranet. The extranet
solution providers can cultivate new opportunities in this big market.
5. Selling the intranet: corporate intranet can serve as a wonderful pool,
where employees can do many things ranging from taking classes to
updating benefit plans. Too often employees are not using the intranet to
its fullest capacity. Businesses are exploring innovative ways to market
their intranet to their employees. For example some companied are
making presentation to employees, other give prizes, yet other created
an “Intranet Day”.
36
E-Commerce Notes
Unit-4
Lecture-1
Legal Issues Related to E-Commerce
Implementation of e-commerce involves many legal issues. These
issues can be classified as:-
Privacy: Privacy means the right to be left alone and the right to be
free of unreasonable personal intrusions.
Information privacy is the “claim of individuals, groups or institutions to
determine for themselves when, and to what extent, information about
them is communicated to others.
Privacy Principles:-
a) Accountability: An organization is responsible for personal information
under its control and shall designate an individual or individuals who are
accountable for organization’s compliance with the following principles.
b) Identifying purpose: The purposes for which personal information is
collected shall be identified by the organization at or before the time the
information is collected.
c) Consent: The knowledge and consent of the individual is required for
the collection, use or disclosure of personal information, except when
inappropriate.
d) Limiting Collection: The collection of personal information shall be
limited to that which is necessary for the purpose identified by the
organization. Information shall be collected by fair and lawful means.
e) Limiting use, disclosure & retention: Personal information shall not
be used or disclosed for purposes other those for which it was collected,
except with the consent of the individual or as required by the law
(Personal information shall be retained only as long as necessary for
fulfillment of those purposes).
f) Accuracy: Personal information shall be as accurate, complete, and up-
to-date as is necessary for the purpose for which it is to be used.
g) Safeguards: Personal information shall be protected by security
safeguards appropriate to the sensitivity of the information.
Protecting Privacy:
Some suggestions to protect your privacy are:-
1. Think before you give out personal information on a site
2. Track the use of your name & information
3. Live without cookies
4. Use encryption
5. Ask your ISP or employer about a privacy policy.
37
Cookies: Cookies are the piece of information that allows a web-site to
record one’s comings and goings.
Through cookies:
Websites can ‘remember’ information about users & respond to their
preferences on a particular site, process is transparent to users.
Websites can maintain information on a particular user across HTTP
connections.
Solutions to Cookies:
As Cookies are stored at client’s side and sends information about client
to server, sometimes it can be dangerous for privacy. Some solutions to
avoid cookies are:-
Users can delete cookie files stored in their computer.
Use of anti-cookie software (e.g. cookie cutter).
38
Ethical Issues Related to E-Commerce
Ethics is a branch of philosophy that deals with what is considered to be
right and wrong. The spread of e-commerce has created many ethical
situations. e.g. the company monitoring email is very controversial. One
group of people may agree to this & one may disagree. Hence there are
major differences among companies and individuals with respect to what
is right & wrong. There are also differences regarding ethics among
different countries. What is unethical in one culture may be perfectly
acceptable in another.
Ethical issues can be categorized as:-
Privacy: Collection, storage & dissemination of information about
individuals.
Property: Ownership & value of information & intellectual property.
Accuracy: Authenticity, fidelity & accuracy of information collected &
processed.
Accessibility: Right to access information & payment of fees to access
it.
39
E-Commerce Notes
Unit-4
Lecture-2
Cyber Laws
LAWS OF THE INTERNET & THE WORLD WIDE WEB
The growth of cyberspace has resulted in the development of a new &
highly specialized branch of law called cyber laws.
“Cyber Law is a term which refers to all the legal and regulatory aspects
of Internet and the World Wide Web. Anything concerned with or related
to legal aspects or issues concerning any activity in Cyberspace comes
within the ambit of cyber law”.
Aims of Cyber Laws:
To facilitate electronic communications by means of reliable electronic
records.
To minimize the incidence of forged electronic records, intentional and
unintentional alterations of records, and fraud in electronic commerce &
other electronic transactions.
To promote public confidence in the integrity & reliability of electronic
records, electronic signatures & electronic commerce.
To establish uniform rules & standards regarding the authentication &
integrity of electronic records.
To create a legal infrastructure for the use of digital signatures.
Cyber Laws in India
In May 2000, both the houses of the Indian parliament passed the
Information Technology Bill. The Bill received the consent of president in
August, 2000 and came to be known as the Information Technology Act;
2000.It was enacted on 7th June 2000 & was notified in the official
gazette on 17th Oct, 2000. It is applicable to whole of India.
The Information Technology (IT) Act 2000 aims to provide a legal &
regulatory framework for promotion of e-commerce & e-governance.
Some highlights of the Act are listed below:-
Chapter-II: of the Act specifically stipulates that any subscriber may
authenticate an electronic record by affixing his digital signature.
Chapter-IV: of the Act gives a scheme for regulation of Certifying
authorities.
Chapter IX: of the Act talks about penalties & adjudication for various
offenses.
Chapter XI: of the Act talks about various offenses & the said offenses
shall be investigated by a police Officer not below the rank of the Deputy
Superintendent of police.
Salient Provisions of Cyber Laws:
40
Companies shall now be able to carry out electronic commerce using the
legal infrastructure provided by the Act.
Digital Signatures have been given legal validity & sanction in the Act.
Under the IT Act, 2000 it shall now be possible for corporate to have a
statutory remedy in case if anyone breaks into their computer systems or
network & causes damage or copies data.
The IT Act also addresses the important issues of security, which are so
critical to the success of electronic transactions.
The Act throws opens the doors for the entry of corporate companies in
the business of being Certifying Authorities for issuing Digital Signatures
& Certificates
41
Providing assistance to any person to facilitate unauthorized access to a
computer.
Criminal Offences Stipulated by IT Act 2000 are:-
Hacking with computer system
Electronic forgery i.e, affixing of false digital signature, making false
electronic record.
Electronic forgery for the purpose of cheating
Electronic forgery for the purpose of harming reputation
Publication of digital signature certificate for fraudulent purpose
Publication of information which is obscene in electronic form
Breach of confidentiality & privacy
42
E-Commerce Notes
Unit-3
Lecture-1
Value Chain
The value chain is a concept from business management that was first
described and popularized by Michael Porter in his 1985 best seller,
Competitive Advantage: Creating and Sustaining Superior Performance.
A Value Chain is a chain of activities for a firm operating in a specific
industry.
Products pass through all activities of the chain in order and at each
activity the product gains some value. The chain of activities gives the
products more added value than the sum of the independent activities
value.
Here we have shown just a basic value chain flow of an Automobile
Industry.
43
A diamond cutter, as a profession, can be used to illustrate the
difference of cost and the value chain. The cutting activity may have a
low cost, but the activity adds much of the value to the end product,
since a rough diamond is significantly less valuable than a cut diamond.
The value chain framework quickly made its way to the forefront of
management thought as a powerful analysis tool for strategic planning.
Value chain analysis has also been successfully used in large
Petrochemical Plant Maintenance Organizations to show how Work
Selection, Work Planning, Work Scheduling and finally Work Execution
can (when considered as elements of chains) help drive Lean
approaches to Maintenance.
Porter’s Value Chain Model
The idea of the value chain is based on the process of organization, the
idea of seeing a manufacturing (or service) organization as a system,
made up of subsystems each with inputs, transformation processes and
outputs. Inputs, transformation processes, and outputs involve the
acquisition & consumption of resources- money, labour, materials,
equipment, buildings, land, administration and management. How value
chain activities are carried out determines costs and affects profits.
Most organizations engage in hundreds, even thousands of activities in
the process of converting inputs to outputs. These activities can be
classified generally as either primary or support activities that all
businesses must undertake in some form.
According to Porter (1985), the primary activities are:-
Inbound Logistics: involve relationships with suppliers and include all
the activities required to receive, store & disseminate inputs.
44
Operations: are all the activities required to transform inputs into outputs
(products & services).
Outbound Logistics: include all activities required to collect, store &
distribute the output.
Marketing & Sales: activities inform buyers about products & services,
induce buyer to purchase them and facilitate their purchase.
Service: includes all the activities required to keep the product or service
working effectively for the buyer after it is sold and delivered.
Support Activities are:-
Procurement: is the acquisition of inputs, or resources, for the firm.
Human Resource Management: consists of all activities involved in
recruiting, hiring, training, developing, compensating and dismissing or
laying off personnel.
Technological Development: pertains to the equipment, hardware,
software, procedures and technical knowledge brought to bear in the
firm’s transformation of inputs into outputs.
Infrastructure: Serves the company’s needs & ties its various parts
together, it consists of functions or departments such as accounting,
legal, finance, planning, public affairs, government relations, quality
assurance & general management.
45
Inbound Logistic- From Suppliers
Outbound Logistic- From Customers
E-Commerce enhances value chain by providing:-
Electronic Value Chain: through electronic value chain, e-commerce
enhances business by supporting:
Reduced time frame
Changed Cost Structures
Re-engineered value: Re-engineered value chain, e-commerce
enhances business by supporting:
Just-in-time Manufacturing
Quick response supply
Efficient document processing
Competitive Advantage: E-Commerce supports a company for gaining
competitive advantage.
E-Commerce Notes
Unit-3
Lecture-2
Competitive Advantage
A firm is said to possess a competitive advantage over its rivals, if it
sustains profit that exceed the average for its industry.
46
The goal of much of business strategy is to achieve a sustainable
competitive advantage.
Michael Porter identified two basic types of Competitive advantage:
Cost Advantage
Differentiation Advantage
Cost Advantage: Cost advantage exists when the firm is able to deliver
the same benefits as competitors but at a lower cost.
Differentiation Advantage: Differentiation advantage exists when the
firm is able to deliver benefits that exceed those of competing products.
Cost and differentiation advantages are known as potential advantages
since they describe the firm’s position in the industry as a leader in either
cost or differentiation.
A resource based view emphasizes that a firm utilizes its resources and
capabilities to create a competitive advantage that ultimately results in
superior value creation.
Resources & Capabilities:
According to the resource based view, in order to develop a competitive
advantage the firm must have resources and capabilities that are
superior to those of its competitors.
Resources: are the firm-specific assets useful for creating a cost or
differentiation advantage and that few competitors can acquire easily.
Capabilities: refer to the firm’s ability to utilize its resources effectively.
An example of a capability is the ability to bring a product to market
faster than competitors. The firm’s resources & capabilities together form
its distinctive competencies.
47
Value Creation: The firm creates value by performing a series of
activities that Porter identified as the value chain. Superior value is
created through lower costs or superior benefits to the customers.
The Principle of Competitive Advantage --
Success is based on inventing an offering that addresses a real scarcity
in the world, charging a price for it, and inventing a way of making it
available that is cheap enough to leave a high margin.
Elements of Competitive Advantage –
Uniqueness - finding unique opportunities and solutions is about
imagination, insight, foresight, and the courage to pursue it. Unique is
new, different, but most important of all, untested and unproven. By the
time a unique solution is validated as profitable, it is no longer unique for
the next company. Also, if it is a unique business model or business
capability, it is likely unapproachable, in the short-term, by competitors.
Strategic Focus - Strategic focus comes from marrying distinctive
competency and purpose to form a superior value proposition. Strategic
focus is about developing a longer view of competitive advantage with a
combination of purpose, competency, and value proposition. This
creates an internal environment that has the confidence and implicit
support to continue to perfect and develop that focus through creating
stronger competencies and further perfecting the value proposition.
Strategic Intent/Vision/BHAGs - Strategic intent challenges and guides
the organization to achieve the unachievable by having a clear focus on
outlandish objectives which require the development of new capabilities
to achieve.
Innovation - Innovation is inventiveness put into profitable practice. In
an evolving economy, the business organization must innovate at a rate
that meets or exceeds its environment in order to sustain a competitive
advantage.
Continual Innovation - Making innovation as an ongoing process on all
fronts.
Democratic Principles - Democratic principles are needed to fully
engage the active participation of diverse thinkers from across the
organization. Broad and diverse participation improves innovation.
Strategic Management as a self-improving learning process - Strategic
management must become, amongst other things, a learning and self-
improvement process for the organization.
Dynamic Capabilities - Sustainable competitive advantage is ultimately
based on dynamic capabilities, the capability to produce and utilize new
capabilities on a continuous basis.
48
E-Commerce Notes
Unit-3
Lecture-3
Porter’s Five Forces Model:
Michael Porter described a concept that has become known as the “five
forces model”. This concept involves a relationship between competitors
within an industry, potential competitors, suppliers, buyers & alternative
solutions to the problem being addressed.
E-Commerce Notes
Unit-3
Lecture-4
Business Process Reengineering (BPR)
50
Business Process Re-engineering is the fundamental rethinking and
radical re-design of business processes to achieve dramatic
improvements in critical contemporary measures of performance such as
cost, quality, service and speed.
BPR means not only change but dramatic change & dramatic
improvements.
BPR involves the overhaul of organizational structures, management
systems, job descriptions, performance measurements, skill
development, training and most importantly the use of information
technology.BPR impacts every aspect of how the organization runs its
business.
Change on this scale can cause results ranging from enviable success to
complete breakdown & failure.
A successful BPR can result in dramatic performance improvements,
increase in profits, better business practices, enormous cost reductions,
dramatic improvements in productivity & so on.
51
Model the current process.
Understand how technology is currently used.
Understand how information is currently used.
5. Reengineer the process:
Question current operating assumptions.
Evaluate the impact of new technologies.
Consider the perspective of stakeholders.
6. Blueprint the new business system:
Define the new flow of work.
Model the new process steps.
Model the new information requirements.
Describe the new technology specifications.
7. Perform the transformation:
Develop a migration strategy.
Reallocate workforce.
Educate staff about the new process.
Implement in an iterative fashion.
Challenges in BPR
Unfortunately, all BPR projects are not as successful as those described.
Most of the BPR projects will fall short of expectations.
Companies that begin BPR projects face many of the following
challenges:-
Resistance from employees.
Changing the traditional ways of doing things.
Time Requirements (BPR is a lengthy process, almost always taking two
or more years to complete).
High cost of BPR.
Manpower reduction (BPR often results in employees being laid off).
52
Staff the project with the best people & provide them with resources they
need.
Make sure the employees are adequately trained on how to use the new
system.
Go for small success at first. Go for more dramatic projects once you
have gained some experience in BPR.
E-Commerce Notes
Unit-3
Lecture-5
Business Process Management (BPM)
Business Process Management has been referred to as a “holistic
management” approach to aligning an organization’s business
processes with the wants and needs of clients.
BPM uses a systematic approach in an attempt to continuously improve
business effectiveness and efficiency while striving for innovation,
flexibility and integration with technology
As a managerial approach BPM sees processes as strategic assets of an
organization that must be understood, managed & improved to deliver
value added products & services to clients.
BPM is the discipline of modeling, automating, managing, monitoring and
optimizing business processes to increase profitability.
Business Process
A business process is a set activities required to accomplish a common
goal. The activities may be performed by people or systems and are
completed either sequentially or simultaneously. It is best to think of a
business process as the way that work should be performed.
BPM Life Cycle
BPM is a discipline consisting of 5 phases:-
Model
Automate
Execute
Monitor
Optimize
1. Model: The first phase of BPM is to create a model. e.g. a globe is a
model of the planet earth. During model phase, we begin by creating a
high level diagram of the process. Initially, the goal to gather just enough
53
detail to understand conceptually how the process works and the main
steps involved without being distracted by the fine detail of how it will be
implemented.
2. Automate: During the Automate phase, the model is expanded to
create the specific set of instructions, form details and rules needed to
run the process. It is at this point where discussion about how to
specifically implement the processes is made. e.g. while a globe is a
model of the earth, a map provides the detailed directions between two
cities & helps you decide which route to travel.
3. Execute: The Execute phase of BPM consists of interpreting the
instructions created during the Automate phase to manage the flow of
work from the beginning of the phase until its completion. Within BPM
software, the workflow engine is responsible for creating tasks and
automatically directing them to the right people or systems based on the
process rules much like the way a GPS system provides you with step-
by-step driving instructions to your destination.
4. Monitor: The monitor phase is where process performance is
measured, tracked & reviewed for potential improvements. e.g.
identifying that travel time has increased by 30% might cause you to test
an alternative route to avoid the new traffic signals.
5. Optimize: During the optimize phase, managers use data and lessons
learned from manage phase as a foundation to change the process.
Optimization may include such things as enhancing the data collection
forms, adding or removing tasks, automating steps that were previously
completed manually or modifying the reports generated. The goal of the
optimize phase is to identify changes that will improve the process.
E-Commerce Notes
Unit-3
Lecture-6
Customer Relationship Management (CRM)
CRM is a widely implemented strategy for managing a company’s
interactions with customers, clients & sales prospects. It involves using
technology to organize, automate & synchronize business processes.
The overall goal is to find, attract and win new clients, nurture & retain
those the company already has & reduce the costs of marketing and
client service.
54
CRM is an iterative process that turns customer information into positive
customer relationship.
Some of the leading vendors of CRM systems are Siebel Systems,
Oracle, and People Soft.
Process of CRM
Goals of CRM
Provide better customer service.
Make call centers more efficient.
Increase sales.
Simplify marketing & Sales processes.
Discovering new customers
Increase the quality of Information.
Improve customer retention.
Three Fundamental Components of CRM
Operational: Automation of basic business processes (marketing,
sales, service).
Analytical: Analysis of customer data & behavior using business
intelligence.
Collaborative: Communicating with clients.
Functions of CRM
Identify factors important to clients.
Promote a customer oriented philosophy.
Adopt customer based measures.
Provide successful customer support.
Handle customer complaints.
Track all aspects of Sales.
55
Uses of CRM
Providing on-line access to product information & technical assistance
around the clock.
Identifying what customer’s value & devising appropriate service
strategies for each customer.
Providing mechanisms for managing & scheduling follow-up sales calls.
Tracking all contacts with a customer.
Identifying potential problems before they occur.
Providing a user-friendly mechanism for registering customer complaints.
Providing a mechanism for handling problems & complaints.
Providing a mechanism for correcting service deficiencies.
Storing customer interests in order to target customers selectively.
Providing mechanics for managing & scheduling maintenance, repair &
ongoing support.
E-Commerce Notes
Unit-3
Lecture-7
Supply Chain
A supply chain is a system of organizations, people, technology,
activities, information and resources involved in moving a product or
service from supplier to customer.
Supply chain activities transform natural resources, raw materials and
components into a finished product that is delivered to the end customer.
In sophisticated supply chain systems, used products may re-enter the
supply chain at any point where residual value is recyclable.
Supply Chain Management(SCM)
Supply Chain Management is the oversight of materials, information &
finances as they move in a process from supplier to manufacturer to
wholesaler to retailer to consumer.
SCM involves coordinating & integrating these flows both within &
among companies.
SCM enables collaboration, planning, execution & coordination of the
entire supply chain, empowering companies to adopt their supply chain
processes to an ever changing competitive environment.
With better synchronization across the entire supply chain, the business
partners achieve the following major benefits:-
Lower Inventories & therefore lower financing costs
Shorter receivable cycles
Optimal use of production resources & costly workforces
Faster response to market changes
Greater satisfaction & loyalty among customers
Greater profitability
The military was one of the first organizations to recognize supply
chains & to manage them during World War II.
The SCM systems have become more efficient & intelligent with the use
of computers, artificial intelligence & other advancements in the field of
information technology.
SCM solution transform traditional supply chains from linear, sequential
steps into an adaptive supply chain network in which communities of
customer-centric, demand driven companies share knowledge,
57
intelligently adapt to changing market conditions & proactively respond
to shorter, less predictable life cycles.
Today almost all organizations-military, manufacturing, service
industries, retailers & so on use SCM systems to improve their efficiency
& effectiveness.
Advantages of Supply Chain Management
Supply Chain Planning & Collaboration: Supply chain planning
functionality enables you to maximize return on assets & ensures a
profitable match of supply & demand.
Supply Chain Execution: SCM enables you to carry out supply chain
planning & generate high efficiency at the lowest possible cost.
Supply Chain Visibility Design & Analytics: SCM gives you network-
wide visibility across your extended supply chain to perform strategic as
well as day-to-day planning.
Business Benefits: SCM can help you transform linear supply chain into
an adaptive network with the following benefits:-
Faster response to changes in supply & demand.
Increased customer satisfaction.
Compliance with regulatory requirements
Improved Cash flow
High margins
Greater synchronization with business priorities
59
need to be aware of the tasks, resources, time scale and costs. For this,
the system will need the full backing of the top management.
The JIT will also fail, if an adequate education programme is not provided.
If careful planning of process & control improvements are not strictly
followed, they will result in JIT not been realized. The planning stage will
require dedication & time and may also require the assistance of an
external consultant(s).
PUSH & PULL System of Production
The term PUSH and PULL are used to describe two different systems
for moving work through a production process.
In traditional environments, a PUSH system is used. When work is
finished at a work station, the output is pushed to the next station or in
the case of final production it is pushed on to the final inventory.
Conversely, in a PULL system-each work station pulls the output from
the preceding station as it is needed; the output of final operation is
pulled by the customer demand or the master schedule. Thus in a PULL
system, work moves on in response to demand from the next stage in
the process, whereas in a PUSH system, work moves on as it is
completed without regard to the next station’s readiness for the work.
Consequently work may pile up at workstations that fall behind schedule
because failure or the detection of a problem of quality.
Built-To-Order (BTO)
Built-to-order and sometimes referred to as make-to-order (MTO), is a
production approach where products are not built until a confirmed order
for products is received.
This approach is considered good for highly configured products e.g.
bicycles, computer servers, or for products where holding inventories is
very expensive e.g. aircraft
E-Commerce Notes
Unit-3
Lecture-8
Call Centre
A call centre or call center is a centralized office used for the purpose
of receiving or transmitting a large volume of requests by telephone.
Inbound call centre is operated by a company to administer incoming
product support or information inquiries from consumers.
60
Outbound call centers are operated for telemarketing, solicitation of
charitable or political donations, debt collection and market research.
In addition to a call centre, collective handling of letter, fax, live support
software, and e-mail at one location is known as a contact centre.
Premise-based Call Centre Technology historically, call centers have
been built onPBX (Private Branch Exchange) equipment that is owned
and hosted by the call centre operator. The PBX might provide functions
such as Automatic Call Distribution, Interactive Voice Response,
and skills-based routing. The call centre operator would be responsible
for the maintenance of the equipment and necessary software upgrades
as released by the vendor.
Virtual Call Centre Technology With the advent of the Software as a
servicetechnology delivery model, the virtual call centre has emerged. In
a virtual call centre model, the call centers operator does not own,
operate or host the equipment that the call centre runs on. Instead, they
subscribe to a service for a monthly or annual fee with a service provider
that hosts the call centre telephony equipment in their own data centre.
Such a vendor may host many call centers on their equipment.
61
Performance reporting and call center analytics
Call center technology tools and workflows
Human resources (recruiting and general support)
Information technology
Contact Center Components
There are four main components that make up a contact center. These
components are:
Telecommunication Network
Hardware
Software
Infrastructure
Telecommunication Network
A telecommunication network is essential to connect a caller with a
contact center employee. Generally, the following elements are needed
to establish a telecommunication network:
Public Switched Telephone Network (PSTN)
Router
Long Distance Carrier (LDC)
Ethernet Switch
Modem
Server
Contact Center Hardware
The hardware needed for a contact center includes a local area network
(LAN), an automatic call distributor (ACD), agent desktops, computer
technology integration (CTI), web integration, and a predictive dialer. A
predictive dialer enables contact centers to handle hundreds of calls
simultaneously.
Contact Center Software
Important software components include customer relationship
management (CRM) solutions, technical support solutions, and
telemarketing solutions. These solutions help contact center employees
manage customers, resolve and manage technical issues, and provide a
means for marketing. Software is essential to interact with the hardware
and telecommunication network.
Contact Center Infrastructure
All contact centers have different infrastructures. Implementing a contact
center that provides a return-on-investment (ROI) is a task that is not
always easy to achieve without the right infrastructure. Businesses that
need help building or creating a contact center may want to consider
seeking professional consulting services.
Criticism and performance
62
Criticisms of call centers generally follow a number of common
themes, from both callers and call centre staff.
From callers, common criticisms include:
Operators working from a script
Non-expert operators (call screening)
Incompetent or untrained operators incapable of processing
customers' requests effectively[18]
Obsequious behavior by operators (e.g., relentless use of "sir,"
"ma'am" and "I'd be more than happy to assist you")
Overseas location, with language and accent problems
Touch tone menu systems and automated queuing systems
Excessive waiting times to be connected to an operator
Complaints that departments of companies do not engage in
communication with one another
Deceit over location of call centre
Requiring the caller to repeat the same information multiple times
Common criticisms from staff include:
Close scrutiny by management (e.g. frequent random call
monitoring)
Low compensation (pay and bonuses)
Restrictive working practices (some operators are required to
follow a pre-written script)
High stress: a common problem associated with front-end jobs
where employees deal directly with customers
Repetitive job task
Poor working conditions (e.g. poor facilities, poor maintenance and
cleaning, cramped working conditions, management interference, lack of
privacy and noisy)
Impaired vision and hearing problems
Rude and abusive customers
63
E-Commerce Notes
Unit-1
Lecture-1
Introduction to Commerce
• Commerce is basically an economic activity involving trading or the
buying and selling of goods.
For e.g. a customer enters a book shop, examines the books, select a
book and pays for it. To fulfill the customer requirement, the book shop
needs to carry out other commercial transactions and business functions
such as managing the supply chain, providing logistic support, handling
payments etc.
As we enter the electronic age, an obvious question is whether these
commercial transactions and business functions can be carried out
electronically.
In general, this means that no paperwork is involved, nor is any physical
contact necessary. This often referred to as electronic commerce (e-
commerce).
The earliest example of e-commerce is electronic funds transfer. This
allows financial institutions to transfer funds between one another in a
secure and efficient manner.
Later, electronic data interchange (EDI) was introduced to facilitate
inter-business transactions.
E-Commerce
• “E-Commerce or Electronic Commerce, a subset of E-Business, is the
purchasing, selling and exchanging of goods and services over
computer networks (such as Internet) through which transactions are
performed”.
• “E-Commerce can be defined as a modern business methodology that
addresses the needs of organizations, merchants and consumers to cut
costs while improving the quality of goods and services and increasing
the speed of service delivery by using Internet”.
• E-Commerce takes place between companies, between companies and
their customers, or between companies and public administration.
FEW EXAMPLES OF E-Commerce are:
• Amazon.com, an online bookstore started in 1995 grew its revenue to
more than 600$ million in 1998.
• Microsoft Expedia, an integrated online travel transaction site helps to
choose a flight, buy an airline ticket, book a hotel, rent a car etc. in only
a few minutes.
E-Commerce vs Traditional Commerce
• E- Commerce is about the sale and purchase of goods or services by
electronic means, particularly over the internet. In a pure e-commerce
64
system, transactions take place via electronic means. In this case, you
will access a cyber bookstore and download a digital book from a server
computer.
• In a physical or traditional commerce system, transactions take place via
contact between humans usually in a physical outlet such as a
bookstore.
For e.g. if you want to buy a book, you will go to a physical bookstore
and buy the physical book from a salesman.
• E-Commerce is more suitable for standard goods, intangible goods;
whereas traditional commerce is more suitable for non standard goods,
perishable goods, and expensive goods.
• Complex products such as cars are better served by integrating e-
commerce and physical commerce.
Difference between Traditional Commerce and E-commerce
65
E-Business
• “E-Business is the conduct of business on the Internet, not only buying
and selling but also servicing customers and collaborating with business
partners”.
66
• E-Business means connecting critical business systems directly to
customers, vendors and suppliers- via the Internet, Extranet and
Intranets.
• Therefore it means using electronic information to boost performance
and create value by forming new relationships between and among
businesses and customers.
• One of the first to use the term was IBM, in October 1997, when it
launched a campaign built around e-business.
E-Business enables organizations to accomplish the following
goals:-
• Reach new markets.
• Create new products or services.
• Build customer loyalty
• Make the best use of existing and emerging technologies.
• Achieve market leadership and competitive advantage.
• Enrich human capital.
68
to web servers, thus exposing the information to cyber criminals.
Because data gathering on the web is so easy, databases routinely
contain information about customer purchasing habits, credit information
and so on. In many cases, companies sell customer database
information to marketing companies. In turn, the marketing companies
engage in massive e-mail campaigns to attract new customers. It
doesn’t take long for the customer’s email box to be filled with unwanted
email (also known as Spam).
• Network Unreliability:- Although the Internet is designed to overcome
the single point of failure problem, there have been several well-
publicized incidents of network failures during the past few years.
Network reliability problems may be generated by such factors as:-
Equipment failure in the network connection provider.
Accidental problems caused by nature-such as lightning, floods,
earthquakes that affect communication lines.
Long response time due to increased network traffic or inadequate
bandwidth.
• Low Service Levels:- Another common complaint about doing business
online is the low level of customer service that online companies tend to
provide. Although technology has automated business transactions to a
large extent, there remains a real need for the human touch. Therefore
e-commerce websites must provide:-
A pleasant and problem free pre-ordering and ordering experience. The
website design is an important interface.
Readily available easily used feedback options.
Quick complaint resolution.
Timely and low-cost shipping delivery to customers.
Scope of E-Commerce
• E-Commerce is a general concept covering any form of business
transaction or information exchange executed using information and
communication technologies ((ICT’s).
• It includes electronic trading of goods, services and electronic material.
It takes place between companies, between companies and their
customers or between companies and public administrations.
69
• Electronic Markets:-
An electronic market is the use of information and communication
technology to present a range of offerings available in a market
segment so that the purchaser can compare the prices of the offerings
and make a purchase decision
e.g. Airline Booking System
• Electronic Data Interchange:-
It provides a standardized system for coding trade transactions so that
they can be communicated from one computer to another without the
need for printed orders and invoices & delays & errors in paper handling.
It is used by organizations that make a large no. of regular transactions.
e.g. EDI is used in the large supermarket chains for transactions with
their suppliers.
• Internet Commerce:-
Information and communications technologies can be used to advertise &
make sales of wide range of goods & services.
This application is both for business to business & business to consumer
transactions.
e.g. The purchase of goods that are then delivered by post or the
booking of tickets that can be picked up by the clients
E-Commerce Notes
Unit-1
Lecture-2
Types of E-Commerce/ E-Commerce Market Models
• There are five types of E-Commerce:-
Business To Business (B2B)
Business To Consumer (B2C)
Consumer To Business (C2B)
Consumer To Consumer (C2C)
Business To Government (B2G)
Business To Business (B2B):- Business to Business or B2B refers to
e-commerce activities between businesses. An E-Commerce company
70
can be dealing with suppliers or distributers or agents. These
transactions are usually carried out through Electronic Data Interchange
(EDI). EDI is an automated format of exchanging information between
businesses over private networks.
For e.g. manufacturers and wholesalers are B2B Companies.
By processing payments electronically, companies are able to lower the
number of clerical errors and increase the speed of processing invoices,
which result in lowered transaction fees.
In general, B2Bs require higher security needs than B2Cs.
With the help of B2B E-commerce, companies are able to improve the
efficiency of several common business functions, including supplier
management, inventory management and payment management.
Business To Customer (B2C):- Business to Customer or B2C refers to
E-Commerce activities that are focused on consumers rather than on
businesses.
For instance, a book retailer would be a B2C company such as
Amazon.com. Other examples could also be purchasing services from
an insurance company, conducting on-line banking and employing travel
services.
Customer To Business (C2B):-
Customer to Business or C2B refers to E-Commerce activities which use
reverse pricing models where the customer determines the prices of the
product or services.
In this case, the focus shifts from selling to buying. There is an increased
emphasis on customer empowerment.
In this type of E-Commerce, consumers get a choice of a wide variety of
commodities and services, along with the opportunity to specify the
range of prices they can afford or are willing to pay for a particular item,
service or commodity.
Customer To Customer (C2C):-
Customer to Customer or C2C refers to E-commerce activities, which
use an auction style model. This model consists of a person-to-person
transaction that completely excludes businesses from the equation.
Customers are also a part of the business and C2C enables customers
to directly deal with each other.
An example of this is peer auction giant ebay.
Business To Government (B2G):- It is a new trend in E-Commerce.
This type of E-Commerce is used by the government departments to
directly reach to the citizens by setting up the websites.
These websites have government policies, rules and regulations related
to the respective departments.
71
Any citizen may interact with these websites to know the various details.
This helps the people to know the facts without going to the respective
departments.
This also saves time of the employees as well as the citizens.
History of E-Commerce
• The history of Ecommerce seems rather short but its journey started over
40 years ago in hushed science labs
• In the 1960s, very early on in the history of Ecommerce, its purpose was
to exchange long distance electronic data. In these early days of
Ecommerce, users consisted of only very large companies, such as
banks and military departments, who used it for command control
communication purposes. This was called EDI, and was used for
electronic data interchange.
• Originally, electronic commerce was identified as the facilitation of
commercial transactions electronically, using technology such as
Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT).
These were both introduced in the late 1970s, allowing businesses to
send commercial documents like purchase orders or invoices
electronically.
• The growth and acceptance of credit cards, automated teller machines
(ATM) and telephone banking in the 1980s were also forms of electronic
commerce
• In 1982 Transmission Control Protocol and Internet Protocol known as
TCP & IP was developed. This was the first system to send information
in small packets along different routes using packet switching
technology, like today's Internet! As opposed to sending the information
streaming down one route
• Beginning in the 1990s, electronic commerce would include enterprise
resource planning systems (ERP), data mining and data warehousing
• In 1995, with the introduction of online payment methods, two companies
that we all know of today took their first steps into the world of
Ecommerce. Today Amazon and ebay are both amongst the most
successful companies on the Internet
72
Functions of E-Commerce
• Marketing:- One of the areas it impacts particularly is direct marketing.
In the past this was mainly door-to-door, home parties (like the
Tupperware parties) and mail orders using catalogues or leaflets. This
moved to telemarketing and TV selling with the advance in television
technology and finally developed into e-marketing.
• Human Resource Management:- Issues of on-line recruiting, home
working and ‘entrepreneurs’ working on a project by project basis
replacing permanent employees.
• Business law and ethics:- The different legal and ethical issues that
have arisen as a result of a global ‘virtual’ market. Issues such as
copyright laws, privacy of customer information etc.
• Management Information System:- Analysis, design and
implementation of e-business systems within an organization ; issues of
integration of front-end and back-end systems.
• Product Operations and Management:- The impact of on-line
processing has led to reduced cycle time. It takes seconds to deliver
digitized products and services electronically; similarly the time for
processing orders can be reduced by more than 90 percent from days to
minutes.
73
• Finance and Accounting:- On-line banking ; issues of transaction costs
; accounting and auditing implications where ‘intangible’ assets and
human capital must be tangibly valued in an increasing knowledge
based economy.
• Economy:- The impact of E-commerce on local and global economies;
understanding the concepts of a digital and knowledge based economy
and how this fits into economic theory.
E-Commerce Applications
• E-Marketing
• E-Advertising
• E-Banking
• E-Learning
• Mobile Commerce
• Online Shopping
• Entertainment
• E-Marketing:-
E-Marketing also known as Internet Marketing, Online Marketing, Web
Marketing.
It is the marketing of products or services over the internet.
It is consider to be broad in scope because not refers to marketing on the
internet but also done in Email and wireless media.
E-Marketing ties together the creative and technical aspects of the
internet, including design development, advertising and sales.
Internet marketing is associated with several business models i.e., B2C,
B2B, C2C.
Internet marketing is inexpensive when examine the ratio of cost to the
reach of the target.
• E-Advertising:-
It is also known as online advertising it is a form of promotion that uses
internet and World Wide Web to deliver marketing messages to attracts
customers.
Example: Banner ads, Social network advertising, online classified
advertising etc.
The growth of these particular media attracts the attention of advertisers
as a more productive source to bring in consumers.
• E-Banking:-
Means any user with a personal computer and browser can get
connected to his banks, website to perform any of the banking functions.
74
In internet banking system the bank has a centralized data base i.e.,
web-enabled.
Best example for E-Banking is ATM.
An ATM is an electronic fund transfer terminal capable of handling cash
deposits, transfer, Balance enquiries, cash withdrawals, and pay bills.
• SERVICES THROUGH E-BANKING:
Bill Payment Service
Fund Transfer
Investing through Internet Banking
Shopping
• E-Learning:-
E-Learning comprises all forms of electronically supported learning and
teaching.
E-Learning applications and processes include web-based learning,
computer-based learning.
Content is delivered via. The internet, intranet/extranet, audio, or video
tape, satellite TV.
E-Learning is naturally suited to distance and flexible learning, but can
also be used conjunction with face-to-face teaching.
E-Learning can also refer to the educational website such as those
offering learning scenarios worst and interactive exercises for children.
A learning management system (LMS) is software used for delivering,
tracking, and managing training /education.
• Mobile Commerce:-
Mobile Commerce also known as M-Commerce, is the ability to conduct,
commerce as a mobile device, such as mobile phone.
Banks and other financial institutions use mobile commerce to allow their
customers to access account information and make transactions, such
as purchasing, withdrawals etc.,
Using a mobile browser customers can shop online without having to be
at their personal computer.
• SERVICES ARE:
1. Mobile ticketing
2. Mobile contract purchase and delivery mainly consumes of the sale of
ring tones, wallpapers and games of mobile phones.
3. Local base services
• Local discount offers
• Local weather
4. Information services
• News
• Sports, Scores
75
• Online Shopping:-
Online shopping is the process whereby consumers directly buy goods or
services from a sell in real time, without intermediary services over the
internet.
An online shop, e-shop, e-store, internet shop web shop, web store,
online store, or virtual shop evokes the physical analogy of buying
products or services in a shopping center.
In order to shop online, one must be able to have access to a computer,
a bank account and debit card.
Online shoppers commonly use credit card to make payments , however
some systems enable users to create accounts and pay by alternative
means ,such as
• Cheque.
• Debit cards.
• Gift cards
Online stores are usually available 24 hours a day
• Entertainment:-
The conventional media that have been used for entertainment are
1. Books/magazines.
2. Radio.
3. Television/films.
4. Video games.
Online books /newspapers, online radio, online television, online firms,
and online games are common place in internet where we can entertain.
Online social networking websites are one of the biggest sources of E-
entertainment for today’s tech-savvy generation.
E-Commerce Notes
Unit-1
Lecture-3
E-Commerce Trade Cycle
• E-Commerce can be applied to all, or different phases of the trade cycle.
• The trade cycle varies depending on:-
The nature of the organization (or individuals) involved.
The nature and type of goods or services being exchanged.
The frequency of trade between the partners to the exchange process.
• The trade cycle has to support:-
76
Finding goods or services appropriate to the requirement and agreeing
the terms of trade often referred to as search and negotiation.
Placing the order, taking delivery and making payment i.e., execution &
settlement of transaction.
After sales activity such as warrantee, service etc.
There are numerous categories of trade cycles depending on the factors
outlined above and, for many transactions, further complicated by the
complexities of international trade.
• Three generic trade cycles can be identified:-
1. Regular, repeat transactions between commercial trading partners
(Repeat Trade Cycle).
2. Irregular Transactions between commercial trading partners where
execution and settlement are separated (Credit Transactions)
3. Irregular transactions in once-off trading relationships where execution
and settlement are typically combined (Cash Transactions)
• Electronic Markets:-
It increases the efficiency of the market.
It reduces the search cost for the buyer and makes it more likely that
buyer will continue the search until the best buy is found.
It exists in financial markets & they are also used in airline booking
system.
It is irregular transaction trade.
77
• Electronic Data Interchange:-
It is used for regular repeat transactions.
It takes quite a lot of work to set up systems.
Mature use of EDI allows for a change in the nature of the product or
service.
e.g. Applications are sending test results from the pathology laboratory
to the hospital or dispatching exam results from exam boards to school.
• Internet Commerce:-
The first stage
• Advertising appropriate goods and services.
• Internet sites offer only information & any further steps down the trade
cycle are conducted on the telephone.
The Second stage
• An increasing no. of sites offer facilities to execute & settle the
transaction.
• Delivery may be electronic or by home delivery depending on the goods
and services.
The final stage
78
• After-sales service.
• On-line support & On-Line services.
79
The Internet is a global network of millions of diverse computers and
computer networks. These networks can all "talk" to each other because
they have agreed to use a common communications protocol called
TCP/IP. The Internet is a tool for communications between people and
businesses. The network is growing very, very fast and as more and
more people are gaining access to the Internet, it is becoming more and
more useful.
• World Wide Web
The World Wide Web is a collection of documents written and encoded
with the Hypertext Markup Language (HTML). With the aid of a relatively
small piece of software (called a "browser"), a user can ask for these
documents and display them on the user’s local computer, although the
document can be on a computer on a totally different network elsewhere
in the world.
HTML documents can contain many different kinds of information such
as text, pictures, video, sound, and pointers, which take users
immediately to other web pages.
It is this ability to jump from site to site that gave rise to the term "World
Wide Web." Browsing the Web (or "surfing the Net") can be a fascinating
activity, especially to people new to the Internet. The World Wide Web is
by far the most heavily used application on the Internet.
• Product Data Exchange
Product data refers to any data that is needed to describe a product.
Sometimes that data is in graphical form, as in the case of pictures,
drawings and CAD files. In other cases the data may be character based
(numbers and letters), as in the case of specifications, bills of material,
manufacturing instructions, engineering change notices and test results.
Product data exchange differs from other types of business
communications in two important ways.
First, because graphics are involved users must contend with large
computer files and with problems of compatibility between software
applications. (The difficulty of exchanging CAD files from one system to
another is legendary).
Second, version control very quickly gets very complicated. Product
designs, even late in the development cycle, are subject to a great deal
of change, and because manufacturing processes are involved, even
small product changes can have major consequences for getting a
product into production.
• Electronic Forms
Electronic form is a technology that combines the familiarity of paper
forms with the power of storing information in digital form. Imagine an
ordinary paper form, a piece of paper with lines, boxes, check-off lists,
and places for signatures. To the user an electronic form is simply a
80
digital analogue of such a paper form, an image, which looks like a form
but which appears on a computer screen and is filled out via mouse, and
keyboard.
Behind the screen, however, lie numerous functions that paper and
pencil cannot provide. Those extra functions come about because the
data from electronic forms are captured in digital form, thus allowing
storage in data bases, automatic information routing, and integration into
other applications.
Framework of E-Commerce
• This framework, first developed by Kalakota and Whinston, Professors of
Information Systems and prolific authors on the subject, takes a holistic
view and identifies the different components of business and technology
that make up e-commerce. Using the analogy of the architecture of a
building illustrated in Fig., they explain how the different components fit
and interact together, emphasizing the relative importance of each
component.
81
Multimedia content is created using tools such as HTML and JAVA. This
content can be very different with varying degrees of complexity similar
to different vehicles travelling on the roads. For example, text only, or
more complex is an application, such as a computer game, containing
audio, video, graphics and a programme.
Messaging and information distribution infrastructure are the engines and
fuel, which transport the data around the network. Once the multimedia
content is created, there has to be a means of sending and retrieving
this information, for example by EDI, e-mail, Hyper Text Transfer
Protocol.
Once content and data can be created, displayed and transmitted,
supporting business services are necessary for facilitating the buying,
selling and other transactions safely and reliably. For example, smart
cards, authentication, electronic payment, directories/catalogues.
• The next components which facilitate and enable e-commerce and which
are built on the foundations of technology are:
Public policy, regulations and laws that govern issues such as universal
access, privacy, electronic contracts and the terms and conditions that
govern e-commerce.
Universal agreement of technical standards dictate the format in which
electronic data is transferred over networks and is received across user
82
E-Commerce Notes
Unit-1
Lecture-4
Electronic Data Interchange (EDI)
• Electronic data interchange (EDI) is the process used by organizations
in order to transmit the data between organizations by electronic means.
It is used to transfer electronic documents or business data from one
computer system to another computer system, i.e. from one trading
partner to another trading partner without human intervention.
84
documents on the destination side. Keying an information into the
computer system is a source of errors & keying paper orders into order
processing system is no exception.EDI eliminates this source of errors.
On the down side, there is no order entry clerk who might have spotted
errors made by the customer- the customer will get what the customer
asked for.
• Faster Response: With paper orders it would be several days before the
customer was informed of any supply difficulty, such as the product is
out of stock. With EDI the customer can be informed straight way giving
time for an alternative product to be ordered or an alternative supplier to
be used.
• Improved funds transmission: Due to this increased efficiency of non-
paper accounts, cash flow will improve as electric fund transmission is
able to begin much earlier than previously.
• Improved Shipping Service: Shipping is also improved as EDI provides
quick and efficient information as it relies on barcode information to
communicate. It is able to track inventory and eliminates the incidence of
lost packages due to their isolation from the larger shipping order. EDI
greatly improves accuracy of data as it is all automated.
• EDI payment: Payment can also be made by EDI. The EDI payment
system can also generate an EDI payment advice that can be
electronically matched against the relevant invoices, again avoiding
query & delay.
EDI System
85
business documents. So rather than having documents pass from
person to person, they go from computer to computer.
EDI: THE NUTS AND BOLTS
EDI Standards:
• At the heart of any EDI application is the EDI standard. The essence of
EDI is the coding & structuring of the data into a common & generally
accepted format.
• Documents sent via EDI can serve as input for a receiving a company's
business application because they are formatted according to standards
that stipulate where certain information should be located, such as
where net total amount should appear on an invoice.
• These standards also define how individual pieces of information should
be represented. For example, in the standards for an electronics industry
purchase order, there are specific codes defined to identify the type of
product or service being requested, e.g. PN (company part number), BY
(buyers part number), VP (vendors part number), PW (part drawing), etc.
E-Commerce Notes
Unit-1
Lecture-5
Components of EDI
1. Application service
2. Translation service
3. Communication service
86
1. Application Services :-
It provides the link between application and EDI. It allows you to send documents
from an EDI system. The set of callable routine is used to transfer document from
the business application into EDI document, destination can be either intra-company
or to the external companies.
2. Translation service:-
Converts the outgoing documents from an internal format file to an agreed external
format. Translates internal document from external format to EDI internal format file.
87
3. Communication service:-
The communication service sends and receives transmission files to and from the
trading partners either directly or by using party service called a valued added
network (VAN).
File Types
EDI creates following files as a document passes through the system:
1. Internal format file (IFF):-
It contains single document for single trading partner.
2. External format file (EFF):-
It contains same data as the internal format file translated into the appropriate
standard document format.
3. Transmission file:-
It contains one or more document for the same trading partner. Documents of same
format are packed into functional groups. The functional groups going to one trading
partner are packaged into an interchanged set.
EDI software
1. Translators:-
Every EDI sender and receiver should have EDI translator. It varies based on the
computer on which it is going to reside. The computer may be a micro computer or a
midrange or a mainframe. Translator reads the fixed length file and generates valid
EDI standard and maintains control information.
2. Application link software:-
Application link software is used to collect information from the business application
and then it formats into fixed length computer file and passes it onto translators.
Types of EDI standards:
• Proprietary standard - EDI standard developed for a specific company or industry.
This is also called a non-public or private standard.
• Public standard - EDI standard developed for use across one or more industries.
88
EDIFACT
• Electronic Data Interchange for Administration, Commerce, and Transport is the
international set of EDI standards
• Became a UN standard in 1987
• Maintenance and further development is the responsibility of the United Nations
Centre for Trade Facilitation and Electronic Business (UN/CEFACT)
• Includes syntax rules and implementation guidelines, message design guidelines,
data elements, code sets, and other definitions
• Used for business-to-business (B2B) communication rather than business-to-
consumer (B2C)
• Allows multi-country and multi-industry exchange
The four pillars of EDIFACT
• Syntax
• Rules for the definition of a message structure
• Data elements
• Smallest data unit
• Include codes & the values for items such as date & address code
• Segments
• Groups of related data elements
• Messages
• Ordered sequence of segments
• Defines a business transaction
89
• For EDIFACT each document type is referred to as a message. For trade
purposes the documents include order, dispatch advice, invoice, payment
order & remittance advice. Other sectors include their own documentation
requirements, sectors using EDIFACT include:
• Transport
• Customs
• Finance
• Construction
• Statistics
• Insurance
• Tourism
• Healthcare
• Social Administration
• Public Administration
EDIFACT subsets
E-Commerce Notes
Unit-1
Lecture-6
EDI Layered Architecture
90
EDI Semantic layer:-
Describes the business application
Procurement example
• Requests for quotes
• Price quotes
• Purchase orders
• Acknowledgments
• Invoices
Specific to company & software used
EDI Standard Layer:-
Specifies business form structure so that information can be exchanged it
also influence the content at application layer.
The most competing standards are:
• American National Standards Institute(ANSI)X12
• EDIFACT developed by UN/ECE, Working Party for the Facilitation of
International Trade Procedures
EDI Transport Layer:-
It corresponds with non electronic activity of sending business from one
company to another company.
It can send via postal service, registered and certified mail & email etc.
Generally, EDI transport layer chooses email as the carrier service.
91
EDI in India
EC/EDI Council of India:
Chairman: Secretary Department of Commerce
Secretariat: EC/EDI Division Department of Commerce
Udyog Bhawan, New Delhi - 110011
EC/EDI council is the apex body consisting of all the key government
departments and representatives of trade and industry. It is responsible
for laying down the policy frame work and direction for:-
• promotion and propagation of EDI and Electronic Commerce.
• creating awareness and education among the potential EC/EDI
functionaries and users
• streamlining procedures and practices attending to legal issues
• human resource development
• any other issue connected with EDI and Electronic Commerce
India EDIFACT Committee:
Chairman: Additional Secretary Department of Commerce
Secretariat: EC/EDI Division Department of Commerce
Udyog Bhawan, New Delhi - 110011
The India EDIFACT Committee (IEC) is responsible for formulatin
standards, streamlining the procedures in line with UN/EDIFACT and
maintain liaison with UN/EDIFACT bodies.
To address all the information needed on different sectors and its
interface with UN/EDIFACT standards following Message Development
Groups are working –
Ports Message Development Group under Indian Ports Association (IPA)
Airports Message Development Group under Airports Authority of India
(AAI)
Financial Message Development Group under Indian Banks Association
(IBA)
Customs Message Development Group under Central Board of Excise &
Custom (CBEC)
Private Sector Message Development Group under Federation of Indian
Export Organisations (FIEO)
Working Group: The working group is responsible for motivating various
functionaries in the government and ensure scheduled implementation
of program.
Technical Assessment Group: The Technical Assessment Group is
responsible for assessing the messages developed by the various
agencies for structure and syntax conformance, to review the
Implementation Guidelines prepared by various agencies for the
respective messages developed by them and to prepare and circulate
the EDIFACT Message Directory.
92
Chairman : Senior Technical Director, NIC Department of Commerce
Secretariat : EC/EDI Division Department of Commerce Udyog Bhawan,
New Delhi - 110011
Education and Awareness: The Department of Commerce has
identified key areas where immediate attention was required such as
user awareness and human resource development. For creating
awareness in respect of EC/EDI, four organizations have been identified
namely Federation of Indian Export Organizations (FIEO), All Indian
Management Association (AIMA), National Informatics Centre (NIC) and
Indian Institute of Foreign Trade(IIFT). The course contents for
awareness and training programmes have been structured and
programmes for various level of management have been devised. This
Ministry also organizes EDICON (An international conference and
exhibition on Trade Facilitation (TF/EC/EDI) every year along with
special session for CEOs of top Indian companies.
VAN Service Providers: Department of Telecom has already licensed
a number of operators for Value Added Network (VAN) services.
National Informatics Centre (NIC) and Videsh Sanchar Nigam
Limited(VSNL) are the two major companies/organizations providing
high speed information highway for EC/EDI services within the country
and connectivity to foreign networks. A number of other companies also
recognized the emerging EC/EDI market and approached the
Department of Telecommunications, which is the licensing authority for
(VAN) Value Added Network operations in India. Companies such as
Global Electronic Commerce Services Ltd., Mahindra Network Services,
Satyam Infosys, CMC Ltd., Manipal Control Data Electronic Commerce
Systems etc.., have started EC/EDI services.
Co-ordinated EC/EDI implementation project
To facilitate international trade a co-ordinated EC/EDI implementation
project is underway in following departments/organisations :
– Customs
– Directorate General of Foreign Trade (DGFT)
– Apparel Export Promotion Council/Cotton & Textile Export Promotion
Council etc.
– Port Trusts
– Airport Authority of India (AAI)
– Container Corporation of India (CONCOR)
– Reserve Bank of India (RBI)
– Scheduled Banks
– Airlines
– Indian Railways
– CHA/Freight Forwarders
– Export Promotion Organization
93
EDI IMPLEMENTATION
• The First Technical element of the EDI system is the EDI software. It is a
complete suite of software for creating, transmitting, receiving, managing
and tracking EDI documents. It contains the tools needed to fine-tune
EDI invoicing, from EDI document editing, to document review, to
document selection.
• The system design is comprehensive and can convert invoices, returns,
change notices, statements, purchase orders, and title catalogues into
the EDI format.
• If pens & things is to send an order from its production control system to
packaging solutions it needs to code that order into the agreed EDI
standard &’squirt’ it into the chosen VADS. To pickup the order at the
other end, packaging solutions has a similar need to extract the data
from the network & to decode the data from EDI message into its order
processing system. The coding/Decoding of EDI messages & interfacing
with VADS in normally achieved using EDI software as shown in Fig.
Sending an order using EDI software
E-Commerce Notes
Unit-1
Lecture-7
EDI Enabled Procurement Process
PROCUREMENT
94
Procurement is the process whereby companies purchase goods and
services from various suppliers. These include everything from indirect
goods like light bulbs, uniforms, toilet paper, and office supplies, to the
direct goods used for manufacturing products.
Procurement also involves the purchase of temporary labor, energy,
vehicle leases, and more. Companies negotiate discount contracts for
some goods and services, and buy others on the spot. Procurement can
be an important part of a company's overall strategy for reducing costs.
Historically, the individuals or departments responsible for purchasing a
company's goods and services relied on various methods for doing so.
The most basic included placing orders via telephone, fax, or mail.
E-PROCUREMENT
Electronic procurement methods, generally referred to as e-procurement,
potentially enable the procurement process to unfold in a faster, more
efficient manner, and with fewer errors. These methods include
electronic data interchange (EDI), online marketplaces or e-
marketplaces, and various blends of the two.
EDI deals more with the way information is communicated during
procurement than it does with the act of linking buyers and suppliers.
By definition, EDI is the electronic exchange of business information—
purchase orders, invoices, bills of lading, inventory data, and various
types of confirmations—between organizations or trading partners in
standardized formats.
EDI also is used within individual organizations to transfer data between
different divisions or departments, such as finance, purchasing, and
shipping. Two characteristics set EDI apart from other ways of
exchanging information.
First, EDI only involves business-to-business transactions; individual
consumers do not directly use EDI to purchase goods or services.
Secondly, EDI involves transactions between computers or databases,
not individuals. Therefore, individuals sending e-mail messages or
sharing files over a network does not constitute EDI.
EDI can occur point-to-point, where organizations communicate directly
with one another over a private network; via the Internet (also known as
open EDI); and most commonly, via value-added networks (VANs),
which function like telephone lines by allowing for the transfer of
information.
In the early 2000s, although many companies still relied on VANs, the
Internet was playing a larger role in EDI. It is possible for companies to
translate the files used during EDI and send them to another company's
computer system over the Internet, via e-mail, or file transfer protocol
(FTP).
95
Because it is an open network and access is not terribly expensive, using
the Internet for EDI can be more cost effective for companies with limited
means.
It has the potential to provide them with access to large companies who
continue to rely on large, traditional EDI systems.
The low cost associated with open EDI also means that more companies
are likely to participate. This is important because the level of value for
participants often increases along with their number.
E-procurement tools and applications:
Some e-procurement tools and applications include:
Electronic systems to support traditional procurement
EDI (electronic data interchange)
ERP systems
Internet as a support or complement to traditional procurement
Electronic mail (e-mail)
Web enabled EDI
Extensible markup language (XML)
World wide web (www)
Internet tools and platforms that replace traditional procurement
EDI (Electronic Data Interchange)
EDI is an application whereby electronic messages can be exchanged
between computer programs of two separate organizations. Some
features of EDI include:
Messages are exchanged in groups, known as batches.
Messages can automatically be sent, transmitted and stored between
computers without retyping or keying data.
EDI has to be implemented by each pair of organizations (sender and
receiver) who wish to use it. This means that the implementation costs of
EDI are relatively high.
EDI is mostly used where the messages exchanged concern such
matters as orders, confirmations, transport information and invoicing.
EDI traditionally runs on so-called, “Value Added Networks”, which are
closed networks (unlike open networks like the Internet).
The figure below illustrates the categories of electronic communication
exchange between people and computers:-
96
Internet tools and platforms that replace traditional
procurement: Some internet tools and platforms that replace traditional
procurement include:
E-sourcing
E-tendering
E- auctioning
E-ordering and web-based ERP
E-informing
E-Sourcing: E-sourcing supports the specification phase; it can be used
to pre-qualify suppliers and also identifies suppliers that can be used in
the selection phase. For suppliers the benefit is: “marketing” and for the
buying organizations the benefit is facilitating the sourcing of suppliers.
The UN Global Market Place (UNGM www.ungm.org) is an example of
an E-sourcing tool.
E-tendering: E-tendering supports the selection stage and acts as a
communication platform between the procuring organization and
suppliers. It covers the complete tendering process from REOI via
ITB/RFP to contracting, usually including support for the analysis and
assessment activities; it does not include closing the deal with a supplier
but facilitates a large part of the tactical procurement process. It results
in equal treatment of suppliers; transparent selection process; reduction
in (legal) errors; clear audit trial; more efficiency in the tactical
procurement process and improved time management of tendering
procedures. Some UN organizations such as UNDP-IAPSO and UNHCR
have used E-tendering in the formulation of long-term agreements for
vehicles, tents, motorcycles and pharmaceuticals through an in-house
developed tendering portal.
E-auctioning: E-auctioning supports the contract stage. It enables the
closing of a deal with a supplier if parties agree on price. They operate
with an upward or downward price mechanism e.g. e-auctioning with
97
upward price mechanism for the selling organization and e-reverse
auctioning with a downward price mechanism for the buying
organization. They can be made in accordance with traditional ITB/RFP.
They are internet based using open or closed systems.
E-ordering and web-based ERP: E-ordering and web-based ERP is the
process of creating and approving procurement requisitions, placing
purchase orders, as well as receiving goods and services ordered, by
using software systems based on the Internet.
E-informing: E-informing is not directly associated with a stage in the
procurement process; it is the process of gathering and distributing
procurement information both from and to internal and external parties
using Internet technology.
E-procurement in the procurement cycle: The figure below shows the
six forms of e-procurement plotted in the procurement process
98
E-informing is not directly associated with a phase in the procurement
process; it is the process of gathering and distributing procurement
information both from and to internal and external parties using Internet
technology.
E-procurement strategy – costs, benefits and risks
The following costs and benefits as identified by de Boer, Harink et al.
(2002), can be influenced by e-procurement:
The cost of expenditure on goods/services related directly to the
production/service delivery.
The cost of non-production of goods and services.
The cost of operational procurement activities – e.g., requisitioning,
ordering, expediting and administrative support.
The cost of tactical procurement activities – e.g., formulating
specifications, selecting suppliers, negotiating with suppliers,
contracting, disposals etc.
The costs of strategic procurement activities – e.g., spend analysis,
transaction analysis, market analysis, planning, developing procurement
policies etc.
Internal benefits arising from investments in particular inter-organizational
relationships.
The contribution of investments in particular inter-organizational
relationships to revenues.
These costs and benefits should be assessed in relation to each e-
procurement tool. While it is usually assumed that e-procurement will
automatically deliver benefits, the actual benefits will depend on many
factors including: cost of required investment, ability to convert
associated savings to cash, nature of the procurement process being
automated, particular supply market and the extent to which the
organization supports its implementation
E-Commerce Notes
Unit-1
Lecture-8
Web Based E-Commerce
• Only a few years ago, businesses encountered major difficulties in
delivering online information and applications even to their own
employees, especially across geographically dispersed areas and to
remote users. Today, businesses can easily deliver information to
99
employees, customers, partners, and the public at large, regardless of
location. Many observers point to the Web as the catalyst for this
change.
• While many of us use the Internet on a daily basis, few of us have a clear
understanding of its basic operation. From a physical standpoint, the
Internet is a network of thousands of interconnected networks.
Included among the interconnected networks are:
(1) The interconnected backbones that have international reach;
(2) A multitude of access/delivery sub networks and
(3) Thousands of private and institutional networks connecting various
organizational servers and containing much of the information of
interest.
• The backbones are run by the network service providers
(NSPs), including companies like MCI, Sprint, UUNET/MIS, PSINet, and
BBN Planet. Each backbone can handle over 300 terabytes per month.
• The delivery sub networks are provided by the local and
regional Internet Service Providers (ISPs). The ISPs exchange data
with the NSPs at thenetwork access points (NAPs). Pacific Bell NAP
(San Francisco) and Ameritech NAP (Chicago) are examples of these
exchange points (Minoli and Minoli 1998).
The following Fig. shows a high-level view of the interconnections
among the ISPs, NAPs, and the backbones
• When a user issues a request on the Internet from his or her computer,
the request will likely traverse an ISP network, move over one or more of
the backbones, and across another ISP network to the computer
containing the information of interest.
• The response to the request will follow a similar sort of path. For any
given request and associated response, there is no preset route. In fact,
100
the request and response are each broken into packets, and the packets
can follow different paths.
• The paths traversed by the packets are determined by special computers
called routers. The routers have updateable maps of the networks on
the Internet that enable them to determine the paths for the packets.
Cisco (www.cisco.com) is the premier provider of high speed routers.
101
genuinely interesting and valuable information on your site, people will
value your site and come back again.
5. Credibility is the key to doing business online. The internet can be a
dangerous place full of scams, viruses, and shady dealings. A visitor will
not do business with you if they do not feel that they can trust your site.
So how do some sites seem more credible than others? For the most
part, along with site design, it is the attention to detail. Scammers are
often looking for a quick buck, so they do they put very little effort into
their sites. There are small signs that visitors look for when they
determine credibility. Some of these signs include a unique domain
name (ex: www.thisbiz.com), an email address that coincides with that
domain name (ex: [email protected]), and maybe even a toll free
number. All of these things show that the business is invested in what it
does, and makes the visitor feel more comfortable about doing business
with it. You can obtain all of these credibility boosters easily through
Webs!
6. Mobility is becoming more and more essential as time goes on.
Some experts say that mobile internet browsing will be bigger than
desktop internet browsing by as soon as 2015. Mobile browsing and
mobile online shopping are some of the biggest online trends, so
needless to say, it is important to be ahead of the curve and have a
website that can be easily accessed on a mobile device. Its okay if you
don’t have the know-how to do this because Webs has a Mobile App
that makes it easy: just activate it on the app page, make a few design
selections and you are good to go. Our mobile app was just updated
with a bunch of new features, making it a must-have on any site.
Web Store and Horizontal /Vertical portals
A Web Portal is a website which works as a single source for different
information on a particular domain. It is a useful access point which
helps the users to go easily from one page to another while navigating
for information which they are in search of.
Web Portal gives a list of information arranged well for the accessing
purpose of the users. Placing the right amount of keywords in the pages
at the right positions also can make a difference to your website traffic.
Ultimately what matters in content development is to understand and
provide what customers search for the most online.
Portals have information stored which links to various topics like
business, new, finances, travel, entertainment, shopping and so on. The
popular portals on the internet are Yahoo!, AOL and Google. These
portals can be termed as personal portals, as it stores the history data,
emails and profile information of the user.
High resolution images and big files of videos may be required to attract
people but it’ll be of no use if the page takes long time to load. An ideal
102
portal depends mainly on search and navigation, notification,
personalization, task management, work flow and collaboration.
Enterprise portal development can be divided into two divisions –
Horizontal Enterprise Portals or Mega Portals or HEPs
Vertical Portals or Vertical Enterprise Portals or VEPs.
Horizontal Enterprise Portals (HEPs)
A Horizontal Portal is a website that is public and helps to give its users
all the necessary services they are in need of. Examples of horizontal
portals or HEPs are NetCenter and MyExcite. Horizontal Enterprise
Portals include chat groups, horoscopes, weather, stock prices, news
and shopping.
These send requests to users for making their page the first page one
sees while using the web. These personalizes the page one sees by
selecting the city one chooses for knowing the weather, selecting the
new sources and stocks one likes to be displayed on the page and alter
the web page appearance.
Thus one is able to build multiple stock portfolios and see the updated
valuations very often. It has to be noted that if one access HEP from
another computer, it loses all the personalization characteristics.
HEPs does not give any kind of information related to any organizations,
as they are not connected to any data sources of any organization other
than their own. It delivers access to all the web information one needs
on one’s own organization.
Vertical Enterprise Portals (VEPs)
Vertical Enterprise Portals or VEPs deliver information related to any
organization. A Vertical Enterprise Portal is an enterprise portal which is
used in a specific department for particular business functions like
accounting, customer service or e-commerce. When a user logs to a
VEP, a customized portal page is produced. This is linked to the user
who is logged on to.
E-Commerce Notes
Unit-1
Lecture-9
Steps in setting up Business on Internet
1. Create a great site: This is No. 1 for a reason. You have to have a
great-looking, intuitive, easy-to-navigate site if you are going to be taken
seriously by potential e-customers. Your site must look professional.
103
Pictures and content must load quickly. There can be no dead links.
Have a robust "About" page.
The good news is that it is easy and affordable to create a great site –
look for online hosts that have pre-made templates you can customize.
Web surfers who come to your site will judge it in about three seconds.
That's all you've got. You better impress them the moment they hit it.
2. Pick your products: You should try to find the right product at the
right price, he will make a profit. Where do you find great, inexpensive
products? It depends on what you plan to sell. It may be a matter of
spending weekends picking up some good, cheap stuff. If you want a
more formal arrangement, there are wholesalers and distributors for
almost any product you need.
3. Have an online catalog or store: When you shop online, there is
usually a catalog of products to choose from: Tiny pictures with product
descriptions. That is what you have to do. Happily, you do not have to
create this from scratch. Your e-commerce site host (see below) will
offer a store creation tool, with point-and-click ways to add products,
pictures, and descriptions.
4. Have the ability to process payments: This issue is two-fold: The
financial ability to process credit card payments comes when you have a
merchant account. Search for that term online. The physical ability to
process such payments is, again, something your host will offer. Search
for "online merchant services" or "E-commerce hosting."
5. Market and promote your site: All these steps are important, but this
one may be a little more important. People have to find your site. No
matter how nice it looks or how cool your products, if no one knows
about the site, it is a waste of time, money, and effort.
Master search engine optimization (SEO) techniques. Engage in viral
marketing. Tweet. Have a Facebook fan page. Try pay-per-click.
Advertise.
6. Fulfillment: You have to deliver what you sell, on budget and on time.
Don't forget to add the cost of shipping to your prices.
7. After-sales support: How will you handle returns? What should you
upsell? Support is the difference between a one-time sale and creating a
customer for life.
What is a Domain Name?
A domain name is a unique name for a web site, like w3schools.com.
Domain names must be registered. When domain names are registered,
they are added to a large domain name register. In addition, information
about the web site, including the IP address, is stored on a DNS server.
DNS stands for Domain Name System. A DNS server is responsible for
informing all other computers on the Internet about the domain name
and the web site address.
104
Registering a Domain
Domains can be registered from domain name registration companies.
These companies provide interfaces to search for available domain
names, and they offer a variety of domain name extensions that can be
registered at the same time.
Choosing a Domain Name
Choosing a domain name is a major step for any individual or
organization.
New domain name extensions and creative thinking still offer thousands
of excellent domain names!
When choosing a name, it is important to consider the purpose of a
domain name, which is to provide an easy way to reach your web site.
The best domains have the following characteristics:
Short - People don't like to type! A short domain name is easier to type,
read, and remember.
Meaningful - A short domain is nothing without meaning, 34i4nh.com is
not easy to enter or to remember. Select a domain that relates to your
site in a way that people will understand.
Clear - Clarity is important when selecting a domain name. Avoid a name
that is difficult to spell or pronounce.
Exposure - Names that are short and easy to remember are an asset. In
addition to visitors, also consider search engines. Search engines index
your site and rank it for relevance against terms people search for. In
order to maximize your sites exposure, consider including a relevant
search term in your domain. Of course, only consider this if it still
maintains a short, clear and meaningful domain name.
Sub Domains
Most people are unaware that they use sub domains daily. The famous
"www" of the World Wide Web is an example of a sub domain. Sub
domains can be created on a DNS server, and they don't need to be
registered with a domain name registrar, of course, the original domain
name needs to be registered before a sub domain could be created.
Examples of sub domains used on the internet are
http://store.apple.com and http://support.microsoft.com.
Sub domains can be requested from your web hosting provider.
False Domain Names - Directory Listings
Some providers will offer you a name under their own name,
like: www.theircompany.com/yourcompany/ This is not a real domain
name, it is a directory - and you should try to avoid it.
Directory domains are not desirable, especially for companies.
105
Typically, directory domains are used for personal web sites and free
web sites provided by an ISP, you may have
seenwww.theircompany.com/~username as an address.
Competition in domain name registration has resulted in a dramatic
decrease in pricing, so domain sharing is not common, since it is
possible to register a domain name for only $15 per year.
Expired Domains
Another source for domain registrations is expired domains.
When you register a domain, think of it as a rental, assuming there are
no legal or trademark issues with the domain name, you are free to use
it as long as you continue to pay the yearly fee (you can now register in
advance as many as 10 years). Some people register domains as
speculators, hoping that they can later sell them, while others may have
planned to use a domain and never had the time. The result is that
domains that were previously registered become available again.
Use Your Domain Name
After you have chosen and registered your own domain name, make
sure you use it on all your web pages, and on all your correspondence,
like e-mail and traditional mail.
It is important to let other people be aware of your domain name, and to
inform your partners and customers about your web site.
106
content combined with advanced web authoring options, such as page
layout and style elements.
Desktop publishing programs create virtual pages of web content that
can be linked together. Users can add multimedia to the pages, such as
video, graphics or audio files. The programs convert the pages to HTML
and CSS sheets that can be uploaded to the Internet.
Website Management Systems and Webpage Builders
Website management systems, or hosting sites, are systems that allow
users to upload and manage their web pages. These systems usually
offer their users many web-authoring tool options to create and maintain
their web pages. Tools can include webpage builders, shopping
systems, audio/visual editors and domain options.
Many web hosting sites offer their customers free webpage builders that
help them to create web pages or entire websites. The builders
incorporate many web authoring tools, including word processing,
graphic editing, templates and layout schemes. Webpage builders have
two main editing options: HTML or a non-HTML interface. Users who
have limited HTML knowledge can use the non-HTML interface to drop
and drag items to create layouts and use the text option to type in
content.
HTML Editors
HTML editing programs are some of the most powerful web authoring
tools, and are mainly used by professionals to create commercial web
pages. Most HTML editors are similar to web-page builders in offering
users HTML or non-HTML interfaces. The non-HTML interface allows
the user to see how the web page will look when it is uploaded to the
Internet. HTML editors can be used to create basic HTML markup like a
word processor, or can create more advanced language, such as CSS,
JavaScript or XML. Most of the work is performed using a built-in text
editor.
The text editors feature an array of functions besides basic content
input, such as linking, spell check, accessibility features and code
formatting. Text editors create the HTML markup as the user is working
with the editor, which allows for faster editing of visual layout.
HTML editors feature HTML validation checkers that will run through a
web page and check for markup errors and accessibility validation
issues. Most of the other web authoring tools don't offer this option; web
authors only become aware of a problem after the web page is on the
Internet.
107
• Technology buyers today have more choices than ever before. Hardware
and software can be purchased, leased or rented. Software can
deployed "on-premise" or accessed "on demand" using cloud computing
offerings, where you pay a monthly fee for software access. Each of
these options have their place.
• In spite of the trend toward cloud computing, many companies are still
buying servers and software to run their business. In fact, most
businesses will deploy one or more servers in-house for needs which
are not effectively met by in-cloud services.
• Before you go out and buy your own servers, consider your options. A
server purchase requires an upfront investment, but over the course of
several years, you may meet your business objectives much more
effectively by buying servers and software vs. using cloud computing or
co-location (data center rented server space) options
• When you use cloud computing, you're also usually limited to standard
options. Extensive software customizations are normally installed on
your own server. For example, if you want store documents among your
team "in the cloud" using Microsoft Share Point Online that's easy. But if
you want to customize SharePoint extensively, or use it as your external
website, a traditional on premise SharePoint implementation is going to
be the right choice for you.
• Is your best option to own servers? After you look at the functionality you
require, be sure to take into consideration these hidden expenses of
owning servers in-house so that you can create an apples-to-apples
comparison with your technology decisions
Server maintenance. No one has yet invented a "set it and forget it"
server. Servers require regular updates and maintenance to keep up
with changes in technology and to respond to malware threats. The
operating system and software applications running on the server also
require updates.
Server administration. Who is going to run your updates and regularly
perform maintenance on your servers? Here you have several options.
You can hire an in-house IT administrator. You can hire an IT consultant.
Or you can hire a managed service provider who will take care of the
routine work for a set monthly price. The option you choose should be
based on your IT workload.
Server rent. Part of your office rent goes toward providing a secure
location for your server. Because servers consume increased energy,
sometimes they require a dedicated room with temperature control. You
don't want your employees to freeze just to keep your servers cool.
Contact your hardware provider about estimated energy consumption
costs.
108
Server backups and redundancy. A server contains your company's
most valuable information. When your server is located in your office,
you have to take extra steps to protect your data from being damaged or
destroyed. This commonly means creating off-site backups and testing
to make sure that the recovery process works. Some companies also
invest in server redundancy, so that if one server crashes, the other one
immediately takes over.
Server utilization. Companies typically buy more server than they
currently need so they have room for growth. A little extra capacity is
necessary, but too much will cost you. Develop a hardware plan so that
you don't overbuy up front. Instead, scale up as needed. If your servers
don't have enough to do, you're wasting capacity and paying for
something that you don't use or need.
Beyond the costs of the hardware itself, be sure to factor in how equipped
you are to respond readily to server needs. When email or other critical
business applications go down, someone needs to be available to
diagnose and fix the problem. It's wonderful to have a wealth of options.
Just be aware of the price tag and capabilities that come with each
option.
109
Content - Content is a strong driver for encouraging repeat visits by
customers, particularly when it is fresh, timely, and gives customers a
reason to visit regularly. For example, perhaps you have a ‘Tip of the
Day’ or a regular visit by an ‘expert’ well-known in your field of business
who provides online advice. Content that is useful for your visitors and
will enable them to leave with new knowledge will attract them to your
site, and encourage them to check back regularly.
Daily Give-Away/Coupons/Contests - Sites that offer regular
promotions such as a ‘give-away’, coupons and contests are in a solid
position to capture a regular audience. While the promotion acts as the
driver that attracts customers to visit initially, it provides an opportunity to
showcase new products and services, and deliver important news about
your company. For instance, you may initiate a ‘give-away’ that is a
printer, but also take the opportunity to tell your customers about a
printer sale next week. Your promotional tool has not only lured
customers to your site, but it has also increased the likelihood of getting
a sale. Offering various promotions also enables you to obtain customer
information that you can use in future marketing campaigns.
Bookmarking - A good way to encourage customers to visit your site is
to ask them to bookmark it. Through bookmarking, they have easy
access to your site and do not have to remember your site’s exact URL
to visit. Bookmarking a site is particularly beneficial for web surfers who
like to follow links. It enables them to go back and take a more in-depth
look at what you have to offer when they need to.
Surveys - Surveys provide an effective avenue through which to gather
important customer data that will help you to improve your business and
plan for the future. To encourage visitors to complete the survey, you
can provide an incentive such as an opportunity to win a prize.
Awards/Testimonials - Including awards and testimonials on your site
will provide credibility to your business. They will also provide a
foundation for you to build rapport and trust with your customers, who
will be more willing to visit a site they can trust.
Online Chat - Online chat mechanisms provide a forum where customers
can come together and share their experiences with each other and you.
This interactive tool allows you direct access to customer opinions where
you can gauge trends and determine their views on the industry.
Tours - Online tours provide you with an opportunity to showcase
particular products and services, and highlight their key benefits. For
instance, you may have a CRM product that you would like to promote.
What better way to show how it works than to provide a tour of the
product - making what could be a potentially complex product look
simple and easy to use.
Online and Offline Promotional Techniques
110
Article Submissions
Newsletters Press Releases
Banner
Advertising
Sponsorships Link Strategies
News Groups
Email
Marketing
Search Engine Optimization
Affiliate Marketing
Web Site Promotion Services
Collateral Material
Trade Shows /Launch Events
Banner Advertising - If you want to increase your company’s brand
awareness, implementing a banner ad campaign is an effective
advertising method. Banner ads are an effective direct marketing tool
that can increase site traffic if they are creative and include a call-to-
action. Advertise on sites that your customers would visit, and ensure
you provide the best possible offer you can.
Link Strategies - Linking strategies provide an effective way for
customers to learn about your company through other sites related to
your subject. The key to developing an effective link program is to
identify sites that are not direct competitors but have a similar target
market as you. It is also necessary to find a balance between the
amount of traffic that exits your site through a link and the number of
people who visit your site through a link on another site. Building links
from other sites to your site also increases your site’s relevancy to
search engines.
E-Commerce Notes
Unit-1
Lecture-10
Web Traffic Analysis
• Web analytics is the measurement, collection, analysis and reporting
of internet data for purposes of understanding and optimizing web
usage.
111
• Web analytics is not just a tool for measuring web traffic but can be used
as a tool for business and market research, and to assess and improve
the effectiveness of a web site.
• Web analytics applications can also help companies measure the results
of traditional print or broadcast advertising campaigns. It helps one to
estimate how traffic to a website changes after the launch of a new
advertising campaign. Web analytics provides information about the
number of visitors to a website and the number of page views. It helps
gauge traffic and popularity trends which is useful for market research.
There are two categories of web analytics; off-site and on-site web
analytics
Off-site web analytics: refers to web measurement and analysis
regardless of whether you own or maintain a website. It includes the
measurement of a website's potential audience (opportunity), share of
voice (visibility), and buzz (comments) that is happening on the Internet
as a whole.
On-site web analytics: measure a visitor's behavior once on your
website. This includes its drivers and conversions; for example, the
degree to which differentlanding pages are associated with online
purchases. On-site web analytics measures the performance of your
website in a commercial context. This data is typically compared
against key performance indicators for performance, and used to
improve a web site or marketing campaign's audience
response.Google Analytics is the most widely-used on-site web analytics
service; although new tools are emerging that provide additional layers
of information, includingheat maps and session replay.
Web server logfile analysis:
Web servers record some of their transactions in a logfile. It was soon
realized that these logfiles could be read by a program to provide data
on the popularity of the website. Thus arose web log analysis software.
Two units of measure were introduced in the mid-1990s to gauge more
accurately the amount of human activity on web servers. These
were page views and visits(or sessions). A page view was defined as a
request made to the web server for a page, as opposed to a graphic,
while a visit was defined as a sequence of requests from a uniquely
identified client that expired after a certain amount of inactivity, usually
30 minutes. The page views and visits are still commonly displayed
metrics, but are now considered rather rudimentary.
The emergence of search engine spiders and robots in the late 1990s,
along with web proxies and dynamically assigned IP addresses for large
companies and ISPs, made it more difficult to identify unique human
visitors to a website. Log analyzers responded by tracking visits by
cookies, and by ignoring requests from known spiders.
112
Security of transactions on Web
Secure online transaction models
• -The simplest method of doing direct business online on Internet is to set
up a secure world wide web server then create content pages and
program forms to take orders.
Secure web server:
A secure web server must by definition support some type of security
protocol. The two most important are secure hypertext transfer protocol
(S-HTTP) and secure sockets layer (SSL), which was initially developed
by Netscape and offered to the Internet community as a proposed
standard in 1995. However, one of their primary advantages is their
relative unobtrusiveness to the consumer using an SSL or S-HTTP
enabled browser.
Secure server purchasing
• The consumer browses through graphical and textual descriptions of the
merchants' products selects a purchase and usually clicks on a button
that says "buy now" to make a purchase. If consumer is using a secure
browser supported by secure server, that button will produce a form on
consumer's screen which the consumer must complete. Delivery and
payment information has been provided the product will be delivered. If
the customer is using a browser that is not secure or that uses a protocol
not supported by the server, then some other method must be employed
to consummate the transaction. Delivery information represents name,
address, delivery address, email address and any other information
necessary to deliver the product.
If product is a physical item, then a physical destination, preferred
shipper and telephone number may be necessary. If product is a digital
item, then it may be transmitted directly to consumer via the browser by
e-mail or through some other application such as file transfer.
Secure server selling
First the merchant needs to publish product offerings on Internet with
secure server. Servers are available that support SSL, S-HTTP and
both. Because the Internet is an open network based strictly on proper
and widespread implementation of standards, it doesn't make sense for
merchants to limit their potential customers by using only one standard.
• The merchant must go beyond merely setting up the server. As with mail
orders there must be a mechanism for processing the information
contained on an order form. Most often the merchant will use interfaces
of some type to automate transactions. Companies selling physical
products over Internet use email confirmations and shipping notices to
keep customers up to date on status of orders and all merchants can
use network applications to notify their internal organization of orders.
Digital Certificates
113
• A digital certificate is a digital form of identification, much like a passport
or driver's license. A digital certificate is a digital credential that provides
information about the identity of an entity as well as other supporting
information. A digital certificate is issued by an authority, referred to as a
certification authority (CA). Because a digital certificate is issued by a
certification authority, that authority guarantees the validity of the
information in the certificate. Also, a digital certificate is valid for only a
specific period of time.
• Digital certificates provide support for public key cryptography because
digital certificates contain the public key of the entity identified in the
certificate. Because the certificate matches a public key to a particular
individual, and that certificate's authenticity is guaranteed by the issuer,
the digital certificate provides a solution to the problem of how to find a
user's public key and know that it is valid.
• These problems are solved by a user obtaining another user's public key
from the digital certificate. The user knows it is valid because a trusted
certification authority has issued the certificate.
• In addition, digital certificates rely on public key cryptography for their
own authentication. When a digital certificate is issued, the issuing
certification authority signs the certificate with its own private key. To
validate the authenticity of a digital certificate, a user can obtain that
certification authority's public key and use it against the certificate to
determine if it was signed by the certification authority.
International standards
• The S/MIME standard specifies that digital certificates used for S/MIME
conform to the International Telecommunications Union (ITU) X.509
standard. S/MIME version 3 specifically requires that digital certificates
conform to version 3 of X.509. Because S/MIME relies on an
established, recognized standard for the structure of digital certificates,
the S/MIME standard builds on that standard's growth and thus
increases its acceptance.
• The X.509 standard specifies that digital certificates contain standardized
information. Specifically, X.509 version 3 certificates contain the
following fields:
Version number The version of the X.509 standard to which the
certificate conforms.
Serial number A number that uniquely identifies the certificate and is
issued by the certification authority.
Certificate algorithm identifier The names of the specific public key
algorithms that the certification authority has used to sign the digital
certificate.
Issuer name The identity of the certification authority who actually
issued the certificate.
114
Validity period The period of time for which a digital certificate is valid.
Subject name The name of the owner of the digital certificate.
Subject public key information The public key that is associated with
the owner of the digital certificate and the specific public key algorithms
associated with the public key s valid and contains both a start date and
an expiration date.
Issuer unique identifier Information that can be used to uniquely
identify the issuer of the digital certificate.
Subject unique identifier Information that can be used to uniquely
identify the owner of the digital certificate.
Extensions Additional information that is related to the use and
handling of the certificate.
Certification authority's digital signature The actual digital signature
made with the certification authority's private key using the algorithm
specified in the certificate algorithm identifier field.
115