Ecommerce Syllabus BBA 6th Sem
Ecommerce Syllabus BBA 6th Sem
Ecommerce Syllabus BBA 6th Sem
External Marks: 50
Practical Marks: 50
Time: 3 hrs.
E-COMMERCE
PAPER CODE: bba-6005
UNIT-I
Introduction – meaning, nature, concepts, advantages and reasons for transacting online, categories
of e-commerce; planning online business: nature and dynamics of the internet, pure online vs. brick
and click business, assessing requirement for an online business, designing, developing and
deploying the system, one to one enterprise
UNIT-II
Technology for online business – internet, IT infrastructure; middleware contents: text and
integrating e-business applications; mechanism of making payment through internet: online payment
mechanism, electronic payment systems, payment gateways, visitors to website, tools for promoting
website; plastic money: debit card, credit card; laws relating to online transactions
UNIT-III
UNIT-IV
Virtual existence – concepts, working, advantages and pitfalls of virtual organizations, workface,
work zone and workspace and staff less organization; designing on E-commerce model for a middle
level organization: the conceptual design, giving description of its transaction handling,
infrastructure and resources required and system flow chart; security in e-commerce: digital
signatures, network security, data encryption secret keys, data encryption
Instruction for External Examiner: The examiner will set 8 questions (2 questions from each
unit). The students will be required to attempt any five questions (selecting at least one question.
From each unit). All questions will carry equal marks.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 2
Ecommerce is not just on the Web. In fact, ecommerce was alive and well in business to
business transactions before the Internet in the 1970s via EDI (Electronic Data
Interchange) and EFT (electronic fund transfer) through VANs (Value-Added Networks).
Ecommerce can be broken into four main categories: B2B (Business to Business) , B2C
(Business to Consumer) , C2B (Consumer to Business) , and C2C (consumer to
consumer).
Electronic commerce or e-commerce refers to a wide range of online business activities like
sale, purchase of products and services. It also pertains to “any form of business
transaction in which the parties interact electronically rather than by physical exchanges.
Driver of E-Commerce At any time, any where and for any one
E-commerce is one of the most important aspects of Internet emerge, it allow people to
exchange goods and services electronically without any barriers of time and distance.
Feature of E-commerce
4. 365 x 24 x 7 availability
10. It’s really easy to understand how this feature can benefit to a business
as well as consumers.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 3
Advantages of E-Commerce
2. Demands of both the national and the international market, as your business
activities are no longer restricted by geographical boundaries.
3. Even small enterprises can access the global market for selling and purchasing
products and services.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 4
5. Electronic commerce gives the customers the opportunity to look for cheaper and
quality products.
6. With the help of e-commerce, consumers can easily research on a specific product
and sometimes even find out the original manufacturer to purchase a product at a
much cheaper price than that charged by the wholesaler.
7. Shopping online is usually more convenient and time saving than conventional
shopping.
8. Besides these, people also come across reviews posted by other customers, about
the products purchased from a particular e-commerce site, which can help make
good products purchasing decisions.
9. As well as the business is concern, E-commerce significantly cuts down the cost
associated with marketing, customer care, processing, information storage and
inventory management.
Technological and fundamental limitations which has restricted the number of people using
this revolutionary system.
1. Internet has still not yet touched the lives of a great number of people, either due
to the lack of knowledge or trust.
2. A large number of people do not want to use the Internet for any kind of financial
transaction for security reasons.
4. Many people have fear to disclose personal and private information for security
concerns.
5. The legitimacy and authenticity of different e-commerce sites have also been
questioned.
7. A lot of phone calls and e-mails may be required till you get your desired
products.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 5
Partner Partner
A EDI VAN EDI B
Internal Software VAN Software Internal
System System
V.A.N (Value Added Network)
Use of EDI
E-Commerce Category
Benefits of Consumers
Consumer can get competitive prize of products
Need not to goto market and face the crowd
Consumer can make shopping anytime
Get delivery of goods at home
More product option available
Global market available
Competition Increase
C2B (Consumer-to-Business)
A consumer posts his requirements with a set budget online and within hours companies
review the consumer's requirements and bid on the project. The consumer reviews the bids
and selects the company that will complete the requirements. E-commerce empowers
consumers around the world by providing the meeting ground and platform for such
transactions.
C2C (Consumer-to-Consumer)
There are many sites offering free classifieds, auctions, and forums where individuals can
buy and sell things by online payment systems like credit card, debit card, mobile transfer
etc. Where people can send and receive money online easily. E-Bay's auction service is a
great example of where person-to-person transactions take place everyday since 2000.
Companies using internal networks to offer their employees products and services online--
not necessarily online on the Web--are engaging in B2E (Business-to-Employee)
ecommerce. G2G (Government-to-Government), G2E (Government-to-Employee), G2B
(Government-to-Business), B2G (Business-to-Government), G2C (Government-to-Citizen),
C2G (Citizen-to-Government) are other forms of ecommerce that involve transactions with
the government--from obtain to filing taxes to business, registrations to renewing licenses.
There are other categories of ecommerce likely to essential and unessential.
Internet is networks of computer network connected via some guided or unguided media by
sharing resources as well as provide reliable information over the globe. It works in Server
/ client architecture. It is a loosely configured global wide-area network includes more than
31,000 different networks in over 100 different countries. Millions of people visit and
contribute to the Internet, through e-mail and the World Wide Web. Began as a Department
of Defense project in USA.
In the 1950s the U.S. Department of Defense became concerned that a nuclear attack
could disable its computing (and thus planning and coordinating) capabilities. By 1969 the
Advanced Research Projects Agency Network (ARPANet) had been constructed.
The first computers to be connected were ones at the University of California at Los
Angeles, SRI International, the University of California at Santa Barbara, and the University
of Utah.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 8
There are three main organization which are suppose to guide and coordinate the working
of Internet
Internet Society
1. IAB (Internet Architecture Board : responsible for major changes in Internet
2. IRTF ( Internet Research Task Force : search innovatives for Internet
3. IETF (Internet Engineers Task Force : develop & maintain protocols.
The following are the technical detail which is used to establish Internet Connection
1. Sender Computer
2. Receiver Computer
3. Modem
4. Communication Media
5. ISP (Internet Service Provider)
6. Protocol
7. Operating System
Dynamic of Internet
The Internet not only to exchange the information but there are some major impact on
society. World comes very close to each other & Message communication is very fast make
revolution in the earth
Save Time
Save money
Fast decision
Every one has freedom to express their ideas / views.
Criminal record available to every criminal investigation department.
Disappointment is Increase of Crimes
For example, an electronics store may allow the user to order online, but pick up their order
immediately at a local store, which the user finds using locator software. Conversely, a
furniture store may have displays at a local store from which a customer can order an item
electronically for delivery.
The bricks and clicks model has typically been used by traditional retailers who have
extensive logistics and supply chains. Part of the reason for its success is that it is far
easier for a traditional retailer to establish an online presence than it is for a start-up
company to employ a successful pure "dot com" strategy, or for an online retailer to
establish a traditional presence (including a strong brand).
1. Basic Ability of business: - Successful firms tend to have one or two core
competencies that they can do better than their competitors. It may be anything from
new product development to customer service. When a bricks and mortar firm goes
online it is able to use this core competency more intensively and extensively.
4. Brand justice:- Often existing firms have invested large sums of money in brand
advertising over the years. This equity can be leveraged on-line by using recognized
brand names. An example is Disney.
5. Stability: - Existing firms that have been in business for many years appear more
stable. People trust them more than pure on-line firms. This is particularly true in
financial services.
6. Existing customer base: - Because existing firms already have a base of sales,
they can more easily obtain economies of scale in promotion, purchasing and
production; economies of scope in distribution and promotion; reduced overhead
allocation per unit; and shorter break even times.
7. Low cost of capital: - Established firms will have a lower cost of capital. Bond
issues may be available to existing firms that are not available to dot coms. The
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 10
underwriting cost of a dot com IPO is higher than an equivalent brick and click equity
offering.
Pure dot com. (online company), on the other hand, have the advantage in areas of new
e-business models that stress cost efficiency. They are not burdened with brick and mortar
costs and can offer products at very low marginal cost. However, they tend to spend
substantially more on customer acquisition.
As we know in the today’s business environment electronic media play a vital role for the
success of any business. Any business can not be succeeding without the latest
e-communication technology like transmission media and Internet and its technical tools
like computer, mobile phone etc.
Internet play a important role for online business beyond defining vision, mission and goals
hence a well defined business planning design the most powerful business model on line
promotion and marketing of a product.
1. More Customers
2. Good Quality
3. Competitive price
4. Less competition
The main objectives of an E-business plan are:
1. How web-site can be identified to community
2. Customer can move easily to merchant web-site
3. Payment is process able from all bankers
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 11
Customer
Consumer Merchant
Access web-site
Internet
Online business
model
1. Business Planning
2. Business Environment Study
3. Specified the e-business Risk
4. online setup Requirement analysis
5. Design phase
6. Security Analysis phase
7. Marketing Phase
8. Maintenance and Improvement phase
Business Planning
Under consideration of the high competition, good quality product and reliable price with
good profit and goodwill are the main objective of a successful business.
1. Latest Hardware
2. E-Business Software for Internet users
3. E-Business Software for mobile users
4. Security Software for all users
5. High speed e-communication line
There are vide verities of risk and threats during online trading, because online system are
easily accessible to every one who use the internet hence risk and threats increases
accordingly.
Consequences of risk
1. Direct Financial loss
2. Chance of fraud increase
3. Chance of litigation
4. Loss of market confidence
5. Lost of brand
6. Lost of goodwill
Any thing trade for the purpose of gain profit is called business. Any business activity needs
exchange of goods, service by taking or giving payment. The payments in terms of by
exchanging goods, services, money or e-money.
The business is the trend to exchange of goods and services. In history Barter System was
means of exchange, In this system trading occur as per need of both party. The complexity
increase when a farmer who produce apple in their farm need to purchase shoes. He
definitely searches such type of cobbler who is interested to purchase apple. Due to this
conditional purchase system, the money system introduced. 1st coin of gold stamp than
silver, copper, aluminum, steel and paper money then now e-money used to debit and
credit of payment
● Bank payments. After ordering goods online, payment is made by depositing cash into
the bank account of the company from which the goods were ordered. Delivery is likewise
done the conventional way.
● Innovations enabling online commerce are e-cash, e-checks, smart cards, and encrypted
credit cards. These payment methods are not too popular in developing countries. They are
employed by a few large companies in specific secured channels on a transaction basis.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 14
● Innovations affecting companies pertain to payment mechanisms that banks provide their
clients, including inter-bank transfers through automated clearing houses allowing payment
by direct deposit.
Mechanism of E-Payment
DEBIT CARD
Debit card is a plastic card that provides the cardholder electronic access to his or her bank
accounts at a financial institution. Some cards have a stored value with which a payment is
made, while most relay a message to the cardholder's bank to withdraw funds from a
designated account in favor of the payee's designated bank account. The card can be used
as an alternative payment method to cash when making purchases. In some cases, the
cards are designed exclusively for use on the Internet, and so there is no physical card.
Debit cards usually also allow for instant withdrawal of cash, acting as the ATM card for
withdrawing cash and as a check guarantee card. Merchants may also offer cash back
facilities to customers, where a customer can withdraw cash along with their purchase.
CREDIT CARD
Credit card is a small plastic card issued to users as a system of payment. It allows its
holder to buy goods and services based on the holder's promise to pay for these goods and
services. The issuer of the card creates a revolving account and grants a line of credit to
the consumer (or the user) from which the user can borrow money for payment to a
merchant or as a cash advance to the user.
Credit cards allow the consumers a continuing balance of debt, subject to interest being
charged. A credit card also differs from a cash card, which can be used like currency by the
owner of the card. Most credit cards are issued by banks .
WIRE TRANSFER
Wire transfer or credit transfer is a method of electronic funds transfer from one person or
institution (entity) to another. A wire transfer can be made from one bank account to
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 15
another bank account or through a transfer of cash at a cash office. Wire transfer systems
are intended to provide more individualized transactions than bulk payment systems such
as ACH (Automated Clearing House)
Different wire transfer systems and operators provide a variety of options relative to the
immediacy and finality of settlement and the cost, value, and volume of transactions. More
immediate settlement systems tend to process higher monetary value time-critical
transactions; have higher transaction costs, and a smaller volume of payments. Currency
transaction risk (because of market fluctuations) may be reduced (in part) by immediacy of
settlement.
Smart Card
A smart card is a plastic card about the size of a credit card, with an embedded with
microchip or micro processor that can be loaded with data, used for telephone calling,
electronic cash payments and then periodically refreshed for additional use. Currently or
soon, you may be able to use a smart card to:
Medical Health care, Vehicle Registration Certificate, Driving License, I-Card etc.etc.
Dial a connection on a mobile telephone and be charged on a per-call basis
Establish your identity when logging on to an Internet access provider or to an online
bank
Pay for parking at parking meters or to get on subways, trains, or buses
Give hospitals or doctors personal data without filling out a form
Make small purchases at electronic
• Transaction speed: Traditional paper transactions are frequently quite slow, especially if
payments must be mailed over any great distance. Because only the transfer of information
between computers is involved, EFT eliminates those distances. Your payments are more
likely to be timely, and you’ll receive money owed as quickly as possible.
• Reduce manpower: Depending upon the size and nature of your business, EFT may also
free some of your employees from payroll duties. The creation, printing and distribution of
employee earnings, utility payments and creditor bills take time, but EFT automates much
of that work.
• Increased Security: Transfer of electronic funds is a more secure form of payment than
traditional methods. Business owners that mail checks must consider the possibility that
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 16
those checks may be lost or tampered with in transit. Immediate electronic confirmation of
payment receipt through EFT serves to eliminate some of those concerns.
A mobile payment or m-payment may be defined, for our purposes, as any payment where
a mobile device is used to initiate, authorize and confirm an exchange of financial value in
return for goods and services. Mobile devices may include mobile phones, PDAs, wireless
tablets and any other device that connect to mobile telecommunication network and make it
possible for payments to be made.
The realization of mobile payments will make possible new and unforeseen ways of
convenience and commerce. Music, video on demand, location based services identifiable
through mobile handheld devices – procurement of travel, hospitality, entertainment and
other uses are possible when mobile payments become feasible.
Mobile payments can become a complement to cash, cheques, credit cards and debit
cards. It can also be used for payment of bills with access to account-based payment
instruments such as electronic funds transfer, Internet banking payments, direct debit and
electronic bill presentment.
a) Simplicity and Usability: The m-payment application must be user friendly with little
or no learning curve to the customer. The customer must also be able to personalize
the application to suit his or her convenience.
d) Security, Privacy and Trust: A customer must be able to trust a mobile payment
application provider that his or her credit or debit card information may not be
misused. Secondly, when these transactions become recorded customer privacy
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 17
should not be lost in the sense that the credit histories and spending patterns of the
customer should not be openly available for public scrutiny. Mobile payments have
to be as anonymous as cash transactions. Third, the system should be foolproof,
resistant to attacks from hackers and terrorists. This may be provided using public
key infrastructure security, biometrics and passwords integrated into the mobile
payment solution architectures.
e) Cost: The m-payments should not be costlier than existing payment mechanisms to
the extent possible. A m-payment solution should compete with other modes of
payment in terms of cost and convenience.
g) Cross border payments: To become widely accepted the m-payment application must
be available globally, word-wide.
Mobile payment solutions may be classified according to the type of payment effected, and
based on the technology adopted to implement the solution.
Bank account based
Credit card based
Telecommunication company billing based
Banks have several million customers and telecommunication operators also have several
million customers. If they both collaborate to provide an m-payment solution it is a win-win
situation for both industries. In this model, the bank account is linked to the mobile phone
number of the customer. When the customer makes an m-payment transaction with a
merchant, the bank account of the customer is debited and the value is credited to the
merchant account.
In the credit card based m-payment model, the credit card number is linked to the mobile
phone number of the customer. When the customer makes an m-payment transaction with
a merchant, the credit card is charged and the value is credited to the merchant account.
Credit card based solutions have the limitation that it is heavily dependent on the level of
penetration of credit cards in the country. Only this small segment of the population will
benefit in the credit card based model. Though limited in scope, there may be high demand
within this segment for a payment solution with credit cards and also, may provide high
volumes of transactions.
Customers may make payment to merchants using his or her mobile phone and this may
be charged to the mobile phone bills of the customer. The customer then settles the bill
with the telecommunication company. This may be further classified into prepaid airtime
(debit) and postpaid subscription (credit).
WAP/GPRS
General Packet Radio Service (GPRS) is a mobile data service available to GSM users.
GPRS provides packet-switched data for GSM networks. GPRS enables services such as
Wireless Application Protocol (WAP) access, Multimedia Messaging Service (MMS), and
for Internet communication services such as email and World Wide Web access in mobile
phones.
SIM-based Application
The subscriber identity module (SIM) used in GSM mobile phones is a smart card i.e., it is
a small chip with processing power (intelligence) and memory. The information in the SIM
can be protected using cryptographic algorithms and keys. This makes SIM applications
relatively more secure than client applications that reside on the mobile phone. Also,
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 19
whenever the customer acquires a new handset only the SIM card needs to be moved
(Card Technology, 2007). If the application is placed on the phone, a new handset has to
be personalized again.
Mobile Wallet
M-payment application software that resides on the mobile phone with details of the
customer (and his or her bank account details or credit card information) which allows the
customer to make payments using the mobile phone is called as a mobile wallet.
Customers can multi-home with several debit or credit payment instruments in a single
wallet. Several implementations of wallets that are company-specific are in use globally.
E-Banking (EB) EB refer to any banking activities by a customer through using Networked
Computer / Internet to perform all such banking activities. The Synonym of E-Banking are
IB(Internet Banking), VB ( Virtual Banking) , OB (Online Banking), HB (Home Banking) ,
REB (Remote Electronic Banking), WB (Web Banking) and PB (Phone Banking) etc.
Benefits of E-Banking
Type of E-Banking
1. Informational E-Banking
2. Communicative E-Banking
3. Transactional E-Banking
access such information risk is vary less because there is no direct connectivity of such
information with the internal banking system.
3. Transactional E-Banking ;- This is vary important part of e-banking to secure all the
transactional activities between customer and bank. In this type of ebanking risk are
higher because all the fund transfer, payment involve in it hence security from intruders,
hackers and crackers are necessary in transactional ebanking system.
Information technology is the main aspect in the current e-banking system because if any
bank does not provide the web services will go out of business. Global banking in the
business hence needs transparency in the system. Follow demand and supply rule,
customer want e-service at vary low or no cost.
Risk of E-Banking
1. Transactional / Operational Risk
2. Credit Risk
3. Compliance / Legal risk
4. Strategic risk
5. Risk of reputation
Credit Risk
As far as the online system is concern all the application filling processes are through
online hence we should take more precaution like verification of customer ID, verification of
resources for repayment of credit, we should regular monitoring of credit limits of bank to
pay loan , advances etc.
As we know simple e-mail which have no authentic source, can not be used as proof for
legal proceeding in law of Hon’ble court.
Strategic risk
Strategies are plans and if plan is not correct, no company can get rise up
Risk of reputation
Any unauthentic information on E-banking portal will create risk of reputation and bank lost
the following:-
1. Lost of trust due to unauthentic information
2. Customer will face difficulties resulting break in relations
Secure Electronic Transaction (SET) is a system for ensuring the security of financial
transactions on the Internet. It was supported initially by Mastercard, Visa, Microsoft,
Netscape, and others. With SET, a user is given an electronic wallet (digital certificate) and
a transaction is conducted and verified using a combination of digital certificates and digital
signatures among the purchaser, a merchant, and the purchaser's bank in a way that
ensures privacy and confidentiality. SET makes use of Netscape's Secure Sockets Layer
(SSL), Microsoft's Secure Transaction Technology (STT), and Terisa System's Secure
Hypertext Transfer Protocol (S-HTTP). SET uses some but not all aspects of a public key
infrastructure (PKI)
1. The customer opens a MasterCard or Visa bank account. Any issuer of a credit card
is some kind of bank.
2. The customer receives a digital certificate. This electronic file functions as a credit
card for online purchases or other transactions. It includes a public key with an
expiration date. It has been through a digital switch to the bank to ensure its validity.
3. Third-party merchants also receive certificates from the bank. These certificates
include the merchant's public key and the bank's public key.
4. The customer places an order over a Web page, by phone, or some other means.
5. The customer's browser receives and confirms from the merchant's certificate that
the merchant is valid.
6. The browser sends the order information. This message is encrypted with the
merchant's public key, the payment information, which is encrypted with the bank's
public key (which can't be read by the merchant), and information that ensures the
payment can only be used with this particular order.
7. The merchant verifies the customer by checking the digital signature on the
customer's certificate. This may be done by referring the certificate to the bank or to
a third-party verifier.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 23
8. The merchant sends the order message along to the bank. This includes the bank's
public key, the customer's payment information (which the merchant can't decode),
and the merchant's certificate.
9. The bank verifies the merchant and the message. The bank uses the digital
signature on the certificate with the message and verifies the payment part of the
message.
2. Deleting, destroying or altering any data on any computer resource with objective
to cause wrongful loss or to reduce its value
The saving grace of the IT Act were the amendments carried out to the IPC (Indian Pannel
Court) and Evidence Act, which to some extent provided for hearing of out of control
offences like the Nigerian Scams, Phishing and other Banking frauds may be guilt. Further,
crimes like data theft; illegally accessing / removal of data; virus attacks etc., could not be
charges due to the lack of relevant penal provisions. S.66 of the Act misleadingly titled
“hacking” is one of the most misused and abused provisions in India.
The replacement of the word “Digital” with the word “Electronic”, which makes the IT Act
more technology neutral and expands its applicability beyond just the digital medium.
1. Addition of cell phones, personal digital assistants and other such devices
in the definition of “Communication Devices” expand the scope of the law.
The extensive definition of “cyber security” as including protection of both data and the
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 24
equipment from unauthorized access, use, disclosure etc., is another vital inclusion that
impacts the new Data Protection provisions included under the IT Act, 2008.
Data Protection Provision under IT Act of S.43 : In this act It is mentioned that without
the permission of the owner or person in charge of the computer or computer systems
such as:
1. Securing access (without permission)
2. Downloading or copying of data stored in a computer or computer system
3. Introducing computer viruses
4. Damaging computers and or data stored therein
5. Disrupting computers
6. Denial of access
7. Illegal charging for services on another’s account.
Data Protection under ITA Act 2008 of S.43A : - S.43A specify that any “Body
Corporate” possessing, dealing with or handling any “sensitive personal data or
information” in a computer resource it owns, controls or operates, is liable for
carelessness, if it fails to maintain “reasonable security practices and procedures” and
thereby causes wrongful loss or wrongful gain to any person. S.43 of the IT Act has now
been qualified as criminal offences under the ITA 2008 under S. 66.
One of the important outcomes of the ITA, 2008 amendments is the clarity on whether
Data theft is considered a criminal offence. Commission of acts provided in S.43 to 66
dishonestly or fraudulently, clearly implies “Data Theft” as an offence in such instances.
However these acts would amount to a punishable offence only if such data is
“downloaded, copied or extracted” from a computer resource.
The widespread circulation of a MMS clip shot by a Delhi schoolboy. This case took an
unexpected twist when this clip was circulated on Bazee.com and its Chief Executive
Officer of American origin was arrested. S.66E has now been introduced under the ITA,
2008 for the protection of physical or personal privacy of an individual. This section makes
intentional capturing of the images of a person’s private parts without his or her consent in
any medium and publishing or transmitting such images through electronic medium, a
violation of such person’s privacy punishable with imprisonment of up to three years or
with fine up to Rupees Two Lakhs, or both.
A case of posting of the personal information and obscene material on a Yahoo! Site
was advertised as the fastest trial and conviction of a cyber crime case in Chennai. It
appears that this conviction has recently been reversed. S.72 A of the ITA, 2008 now
explicitly provides recourse against dissemination of personal information obtained
without the individual’s consent through an intermediary or under a services contract, with
intent to cause wrongful loss or wrongful gain. The maximum punishment prescribed
for this offence is three years imprisonment, or fine up to Rupees Five Lakhs or both.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 25
Provisions to fight cyber frauds have now been introduced under the ITA 2008. However
certain issues relating to protection against banking frauds such as Phishing, money
transfers through online hacking, email frauds and cyber squatting (including through
willfully misleading domain names) to name a few have not been addressed separately in
the ITA, 2008, even though these are significantly increasing problems.
Cyber Act S.66C inserted by the ITA, 2008 makes dishonest or fraudulent use of a
person’s electronic signature or identity, password or any other unique identification
feature punishable as theft with imprisonment of up to three years and fine up to Rupees
One Lakh.
In addition to S.67 of the IT Act, S.67A and S.67B have been included by the ITA, 2008
inter alia to combat child pornography. S.67A makes transmission of a sexually explicit
act or conduct punishable and S.67B makes publishing and transmission of child
pornography an offence, punishments for which range from five to seven years and fine.
Several exceptions have also been set out to S.67 and S.67A, including for depictions in
any book, pamphlet, paper, writing, drawing, painting representation or figure in electronic
form.
How It Works
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 26
Assume you were going to send the draft of a contract to your lawyer in another town. You
want to give your lawyer the assurance that it was unchanged from what you sent and that
it is really from you.
1. You copy-and-paste the contract (it's a short one!) into an e-mail note.
2. Using special software, you obtain a message hash (mathematical summary) of the
contract
3. You then use a private key that you have previously obtained from a public-private
key authority to encrypt the hash.
4. The encrypted hash becomes your digital signature of the message. (Note that it will
be different each time you send a message.)
Network Security: Intruders are always discovering the vulnerability (holes, weaknesses)
to exploit the Software as well as Hardware. In a Computer network The Security and
Crimes affect every one. That we know if any person use internet can be attacked, hacked
or infected by malicious functionalities or downloading etc. It is important to know that how
computers hacked or how we can protect him self from the unlawfulness (unwanted)
happenings. Before Secure our system we need to know about the Attackers, Hackers and
Crackers who create harms to networks.
Attackers: The attackers are the person, software that deliberately (consciously,
intentionally) attempt to acquire the unauthorised access of the network resources
information. The attackers are attacks on corporate instead of individuals.
Passive attacks: These types of attacks are access the information without knowledge of
the Source and Destination User. These attacks only watch on the transmission of data but
it does not try to modify the data or packets.
Active attacks: These types of attacks are used to change the data and deliberately send
the wrong data on the destination or change the path and disturb the network performance
too.
The most damaging attacks are DoS (Denial of Service) attacks. These are the data
flooding with high speed or slow speed that a victim can not process or process can not
reach the destination.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 27
A vary good example of attacks are unsolicited (spontaneous, unwanted) e-mail most
commonly known as e-mail spam’s, these mails are used to send for the purpose of
advertisement etc.
Clone Attacks: These attacks slow down the server performance where IRC fail to
respond.
Flood attacks: It means two or more attacks combine and slow down the process.
TLS (Transport Layer Security) and SSL are an integral part of most Web browsers
(clients) and Web servers. If a Web site is on a server that supports SSL, SSL can be
enabled and specific Web pages can be identified as requiring SSL access. Any Web
server can be enabled by using Netscape's SSLRef program library which can be
downloaded for noncommercial use or licensed for commercial use.
TLS and SSL are not interoperable. However, a message sent with TLS can be handled by
a client that handles SSL but not TLS.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 28
S-HTTP does not use any single encryption system, but it does support the RSA (Rivest-
Shamir-Adleman) algorithm public key infrastructure encryption system. SSL works at a
program layer slightly higher than the Transmission Control Protocol (TCP) level. S-HTTP
works at the even higher level of the HTTP application. Both security protocols can be used
by a browser user, but only one can be used with a given document.
Data Encryption: It is the process to change the actual data in to another format. This
format is read by only authorized user. The encryption done on the presentation layer of
OSI model.
In conventional encryption the original message convert into random message or non-
sense message. It is known as cipher text. The encryption process consists of an algorithm
and an encryption key. The algorithm produce different out depend upon the key
encryption.
Source Destination
Encryptor Decrypter
Original Original
Message
Message
Encrypted
Key
The success of encryption depends upon the powerful algorithm and secrete key.
In private encryption the key is known by the sender and receiver computer only. It is know
as dedicated or private encryption
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 29
In public encryption data encryption approach is given be Hell man & Diffie in 1976. It is
based on mathematical function. Each system entered in the network generates two or pair
of key which one for encryption and other for decryption.
In public key encryption a public key store in public register of each system in a network. If
a system ‘B’ want to send data to System ‘A’. B use the public key of ‘A’ and send data to
its destination.
In public encryption, encryption is based on authentication of user mean a right user can
access the right message.
Encryption Process
It is process to hide the original data and convert it in to nonsense form for the
unauthorised user. It protects the data or file from unauthorised gain access.
Encryptions perform at sender end and decrypt at receiver end. For encryption and
decryption a special key is used. The encryption done on physical, transport and
presentation layer.
Method of Encryption
The Encryption used the following key to encrypt or decrypt the data
Public Key In public key encryption the sender take the receiver user encrypt key from
the public key register and the user can decrypt by it private key available in its computer.
Encryption: The conventional method of encryption is to change the text in the random form
through the key.
1. Plain Text
2. Encryption key
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 30
3. Cipher Text
Method of Encryption
In substitution encryption technique the plain text convert with prescribed key text.
Plain text B AD
Suppose an intruder / enemy listen or see the transcripted code, without key there is no
means of Tran-scripted message for the Intruder. SO Writer Kerch Hoff says that All the
algorithm can be public but transcript key should be secrete.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 31
Today marketing is not just developing, delivering and selling, it is moving towards
developing and maintaining long term relationships with customers. CRM (Customer
Relationship marketing) is becoming important in any services. Enterprise really need to
look at areas where opportunities lies and the ability to move money around with a click of
a mouse are making it easier for customers to leave one enterprise for another. In this
situation CRM (Customer Relationship Management) is an opportunity that an enterprise
can avail to rise above minor advantages by developing actual relationships with their
customers.
A most valuable proverb by a philosopher is that “One satisfied customer in 10 years brings
100 more”. So One to one Enterprises mean treat different vendor or customer differently. It
means every individual should be looked or take care separately. It also means customize
of product and services to each customer as per their needs.
To implement one to one Enterprise, we implies three distinct computer capabilities like
1. Database
2. Interactivity
3. Mass customization
Through these capabilities, the enterprise can keep track of customers individually.
One to one marketing is CRM (Customer Relation Management) mean better interaction
with customer.
CRM Management:
1. Ensuring all efforts should be used for marketing, sales and services.
2. Combine marketing, sales and services activities to achieve common goal.
3. Update knowledge of customer needs continuously
4. Apply customer knowledge, to learning from their success and failure
5. Develop ability to retain loyal and profitable customer.
6. Acquire right customer based on characteristics
CRM TECHNOLOGY:
The bank is using following technology software to interact with its customers. The bank
views CRM technology as customer-centric process and it can help us to automate the
whole processes otherwise it is impossible to handle all the information manually
Collect more and more details of customer to review his present and past. Collect the
name, address, age, income, habits and reason for dealing with you.
With the degree of need the organization can decide the need
Customization in business
2. In B2B firms they mass customize in production and in services and develop and
execute strategy for individual enterprises.
3. The most valuable Enterprises also require they must be treated as with individual
need, wants and desires.
The Technology means how we can send information one source to another destination
where Infrastructure is the hardware, software tools that we have used to transmit data
successfully in the network. A Network may be of any kind like computer network, mobile
network, Internet-work, Internet, Intranet, Extranet, Business network, Customer Network,
community network etc.
The technology has extended the scope and area of business. In this competitive
environment all technologies are imparted in the center on computers, cell phones and the
Internet. We have rotated our daily lives, need as well as business surrounding with these
technologies. Internet is gaining rapid popularity with every passing day. As the Internet
supported communities grow and assuming that they do certainly extend to include
individuals around the globe. Innovative improvement is always required to ride the
expected or predictable move of change. Indeed, the success of online Business depends
on driving the right force in the right direction of demands, productivity and services to
achieve continuous and constant growth.
Without a doubt, technology is truly a revolutionary phase for almost all business
organizations. Because of the technology's ease of adoption, significantly lower
maintenance costs, and greater work efficiency, there is no doubt that online business is
gaining widespread popularity in the world
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 34
In present global and competitive e-market, companies must get the most from its
resources to succeed hence technology for e-business requires enabling its employees,
business partners, and users with the platforms that promote business over the globe.
that provide a means to accelerate the adoption of new heights for online business.
Hardware
Computer System Latest Technology upgraded
Network Devices : Repeater, Switch, HUB
Bridge,Router etc.
Network Interface Card (NIC)
Modem : DSL, ADSL
Modem is an electronic device used to convert Digital to Analog and Analog
to Digital signal. So It is called as modulator and demodulator device. It can
be install on the expansion slot inside the computer or also available as
External Modem. It can be install on serial as well as USB port of the
computer. Modem works as a bridge between the telephone line and the
computer. There are two type of modem
Software
Network Operating System
Web Browser
EDI (Electronic Data Interchange)
WWW (World Wide Web)
Search Engine
E-Commerce, E-Business Web-Portal
Firewall, Antivirus, Security Software
Telecommunication
Communication Media
Guided : UTP, STP, Coaxial , Fiber optic
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 35
In India, Internet came in the existence in 1995. The company named VSNL (Videsh
Sanchar Nagam Limited) started a service (GIAS) Gateway Internet Access Services for
the Local users in India.
Today there are major ISP in India are BSNL, Satyam, Sify, Reliance,Airtel etc
Protocol
Protocols are predefined set of rules which is design to successfully interconnect and
transmit data between two or more communicational entity.
Network Topology
A network topology is a computer network standard developed by IEEE
(Institute of Electronic and Electrical Engineer) Group with different speed and technique
and technology.
BUS
STAR
RING
TREE
MESH
With the help of technology and IT infrastructure we can successfully perform all of our e-
commerce, e-business, e-transaction activity over the globe
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 36
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 37
Ans : In the fast growing and moving telecommunication market, it is essential to adopt
market changes and also add new feature or services quickly.
Network Resources (IT Infrastructure): The network resources are those resources or
devices or media that connect the two or more e-business computer.
1. Integration type
Integration type includes those middleware that have a specific way of being integrated
into its heterogeneous system environment. Each of these middleware has different
communication protocols or ways of operating between the other software.
2. Application type
Application type classification includes middleware that fit into specific types of
application functions. These middleware (Data Access, Web-based, Real- Time, Desktop,
and Specialty) works specifically with an application.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 38
Integration type includes those middleware that have a specific way of being integrated
into its heterogeneous system environment. Each of these middleware has different
communication protocols or ways of operating between the other software.
Agents: Agents are considered a middleware that consists of several components like:
1. Entities (objects, threads)
2. Media (communication between one agent and another),
3. Laws (rules on agent’s communication coordination)
An agent is capable of autonomous actions to meet its design objectives. This adaptability
of the agent should be general so that it covers a broad base of strategies, algorithms, load
balancing strategies, resource adaptability etc.
2. Application type
The application classification includes middleware that fit into specific types of
application functions. This middleware (Data Access, Web-based, Real- Time, Desktop,
and Specialty) work specifically with an application.
1. Data Access Middleware (DAM)
2. Desktop Middleware
3. Web-based Middleware
4. Multimedia Middleware
5. Real Time Middleware
6. Specialty Middleware
Desktop Middleware: In The Desktop Middleware can make variations in the presentation
of the data as requested by a user, graphic management, event notification services,
software installation management, encryption services, and access control.
Web-based Middleware: In Web-based middleware assists the user with browsing, uses
interfaces. It provides authentication service for a large number of applications, network
protocols and hardware platforms. The middleware tightly bound to the net are called
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 40
One of the web’s main uses is e-Commerce, which pertains to the communication between
two or more businesses (or patrons and businesses) performed over the web. This
middleware controls access to customer profile information, allows the operation of
business functions such as purchasing and selling items, and assists in the trade of
financial information between applications. This business middleware can provide a
modular platform to build the next generation of web applications. The need for security,
QoS, cost-effective and speedy transactions etc.
The strengths of e-Commerce middleware include enabling the fast integration of various
computing systems into a web-based business solution, communication
between businesses easier, cost- effective, and more secure, and allowing
customer service representatives to access data from multiple customer information
systems .
Mobile or Wireless middleware is the other main sub-division of this web middleware. It
integrates distributed applications and servers without permanently
connecting (through wires) to the web. It provides mobile users secure, wireless access to
e-mail, calendars, contact information, task lists, etc.
Real Time Middleware : Real-time is characterized by the right data being provided on
time otherwise it is no longer the correct data . The real-time middleware supports time-
sensitive request and scheduling policies. It does this with services that improve the
effectiveness of the user applications. Real-time middleware can be divided into the
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 41
A Web portal is a linked web pages used to transforming and sharing of Information and
services. A Portal presents the information from diverse source in a unified (combined)
way. Hence portals are like doorways on the Internet. They open to us information from a
wide variety of sources and even from other internet users. They also offer a host of
services at a single place
Apart from the search engine feature, web portal offer services like email, news, stock
price, information and entertainment etc. The General Web portals are Yahoo, Rediff,
Indiatimes, google etc.
A standard corporate e-business Web portal used for much of a company's online business
presence can cover internal business systems like
ERP (Enterprise resource planning software) : Building a single software program that
serves the needs of people in finance as well as it does the people in human resources and
in the warehouse. Each of those departments typically has its own computer system
optimized for the particular ways that the department does its work. But ERP combines
them all together into a single, integrated software program that runs off a single database
so that the various departments can more easily share information and communicate with
each other.
www.cyberwebglobal.com :The biggest offerings of this site are its instructions regarding
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 42
the development of an ideal e-commerce website. It is also into the business of developing
e-commerce portals for other business houses.
khoj.com : Khoj.com is a very popular Indian web directory. khoj.com is sure to serve your
purpose.
Sifycorp.com Sify is one of the most renowned end to end e-solutions providing company in
India.
shopping.rediff.com : It is the e-commerce portal of rediff.com which is known for its unique
offerings and cheapest of prices. The products which are on offer here are of several
categories like apparels, books , cars & bikes, electronic products, gift products, home
appliances and many more. This e-commerce portal also has a separate section called
“best discounts” where only those items are displayed upon which more than normal
discount have been allotted. Here you can also find a list of the popular brands, whose
products are on offer in this e-commerce portal.
UNIT -2
What is E-Business?
The Internet is the global network of interconnected computer networks. From work-at-
home shops to big corporations, the Internet provides new business opportunities to those
who embrace (hold) it.
E-business is a small fish in the pond that are especially embedded with vast amount of
affordable ecommerce software and ecommerce hosting solutions to help them reach far
beyond their local market.
One way to categorize the different types of computer network designs is by their scope or
scale. For historical reasons, the networking industry refers to nearly every type of design
as some kind of area network. Common examples of area network types are:
A LAN connects network devices over a relatively short distance. A networked office
building, school, or home usually contains a single LAN, though sometimes one building
will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a
group of nearby buildings. In TCP/IP networking, a LAN is often but not always
implemented as a single IP subnet.
In addition to operating in a limited space, LANs are also typically owned, controlled, and
managed by a single person or organization. They also tend to use certain connectivity
technologies, primarily Ethernet and Token Ring.
As the term implies, a WAN spans a large physical distance. The Internet is the largest
WAN, spanning the Earth. A WAN is a geographically-dispersed collection of LANs. A
network device called a router connects LANs to a WAN. In IP networking, the router
maintains both a LAN address and a WAN address.
A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not
owned by any one organization but rather exist under collective or distributed ownership
and management. WANs tend to use technology like ATM, Frame Relay and X.25 for
connectivity over the longer distances.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 45
Q: Who are the Internet Service Providers also define the Intranet?
A: ISP is who provide the Internet services to its local user. It works in Server / Client
architecture. It mean on who provide the service is called server and one who access the
services are called Client.
In India, Internet came in the existence in 1995. The company named VSNL (Videsh
Sanchar Nagam Limited) started a service (GIAS) Gateway Internet Access Services for
the Local users in India.
Today there are major ISP in India are BSNL, Satyam, Sify, Reliance,Airtel etc.
Internet: It is a network of networks which is available to common user to work and share
the information over the world. Internet is a vast global system which consists of men,
money and material information. Internet is a cyber space where every kind of information
can be accessed by its user. It provides the Entertainments, E-mail, E-commerce, online
shopping, research advertisement and news of political, economical and technical over the
globe to public as well as corporate.
Intranet is a private network which is used by a Private / Public organization by taking the
rights from Internet. It works just like a firewall in the network. The main aim is to filter and
secure the valuable / secrete information from the common Internet user. It is the cheapest
solution for the Private Company to connection its Branch office or the company’s sales
man in the Global area over the world. The branch can access its company server by using
Internet services and Protocol like PPTP (Point to Point Tunneling Protocol) .
INTRANET
Internet
Company –A
Company –A
Branch Office
EXTRANET : Extranet is just like an Intranet, but the major difference between Intranet
and Extranet is Intranet establish between Company and its Branch or employees but
Extranet establish the Network connection between two or more corporate (companies)
and intercommunication by using internet & ISP (Internet Service Provider). It is also a
private network established with the help of Internet.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 46
Q Define Internet?
In the 1950s the U.S. Department of Defense became concerned that a nuclear attack
could disable its computing (and thus planning and coordinating) capabilities. By 1969 the
Advanced Research Projects Agency Network (ARPANet) had been constructed.
The first computers to be connected were ones at the University of California at Los
Angeles, SRI International, the University of California at Santa Barbara, and the University
of Utah.
There are three main organization which are suppose to guide and coordinate the working
of Internet
Early on researchers began to find new uses for the Internet, beyond its original purpose of
controlling weapons systems. The new applications included the following:
• Electronic mail
• File transfer protocol
• Telnet
• User’s News Network (Usenet)
• In 1972 a researcher wrote a program that could send and receive messages
over the Internet. E-mail was quickly adopted by Internet users.
• File transfer protocol (FTP) allowed researchers using the Internet to transfer
files easily across great distances.
• Telnet allows users of the Internet to log into their computer accounts from
remote sites.
• All three of these applications are still widely used. We will discuss them
again later.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 47
URL Universal resources locator like http://microsoft.com This URL mean this web site is
made in HTML and HTTP protocol used to display web page in the web browser.
W3C is working to make the Web accessible to all users (despite differences in culture,
education, ability, resources, and physical limitations) W3C also coordinates its work with
many other standards organizations such as the Internet Engineering Task Force, the
Wireless Application Protocols (WAP) Forum and the Unicode Consortium.
Because the Web is so important (both in scope and in investment) that no single
organization should have control over its future, W3C functions as a member organization.
Today marketing is not just developing, delivering and selling, it is moving towards
developing and maintaining long term relationships with customers. CRM (Customer
Relationship marketing) is becoming important in financial services. Managers really need
to look at areas where opportunities lies and the ability to move money around with a click
of a mouse are making it easier for customers to leave one bank for another. In this
situation CRM (Customer Relationship Management) is an opportunity that banks can avail
to rise above minor advantages by developing actual relationships with their customers.
CRM Management:
1. Ensuring all efforts should be used for marketing, sales and services.
2. Combine marketing, sales and services activities to achieve common goal.
3. Update knowledge of customer needs continuously
4. Apply customer knowledge, to learning from their success and failure
5. Develop ability to retain loyal and profitable customer.
6. Acquire right customer based on characteristics
CRM TECHNOLOGY:
The bank is using following technology software to interact with its customers. The bank
views CRM technology as customer-centric process and it can help us to automate the
whole processes otherwise it is impossible to handle all the information manually
E-Buying or E-Purchasing defines as Needs that is pre defined and we buy it as per
our needs.
1) Convenience: The convenience of this method of shopping is what I like best about it. Where else
can you do shopping even a midnight wearing your night suit? You do not have to wait in a line or wait
till the shop assistant is ready to help you with your purchases. You can do your shopping in minutes
even if you are busy apart from saving time and avoiding crowds. Online shops give us the opportunity
to shop 24 x 7 and also reward us with a ‘no pollution’ shopping. There is no better place to buy
information products like e-books. Immediately after the payment is made one can download the
information. And downloadable items purchased online eliminate the need for any kind of material goods
at all.
2) Compare Prices and Get Better Prices: Another thing which fascinates me is the cheap deals and
better prices I get from online stores because products come to you direct from the manufacturer or
seller without middlemen involved. Many online shops offer discount coupons and rebates. Apart from
this, the Online Store is only required to collect sales tax if they have a physical location in our state
even if we buy from a store across the world.
3) Choose Variety of products: The choices you can get for products are amazing. One can get
several brands and products from different sellers at one place. You can get in on the latest international
trends without spending money on airfare. When you shop online, you can shop from retailers in other
parts of the country or even the world without being limited by geographic area. These stores offer a far
greater selection of colors and sizes than you will find locally.
5) Less overhead Expenses during shopping: Many times when we opt for conventional shopping we
tend to spend a lot more than the required shopping expenses on things like eating out, traveling,
impulsive shopping etc.
7) Avoid Crowds: If you are like me, you would like to avoid the crowds when you do the shopping.
Especially during Festivals and Special events the crowds can really give a head ache. Crowds force us
to do a hurried shopping most of the time. For me grumpy or irritating people and those who smell bad
are a huge turn off. Crowds also create a problem when it comes to finding a parking place nearby
where you want to shop and going back to your vehicle later loaded with shopping bags.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 50
9) Buying Old or unused Stuff at low prices: Online Shops make it possible for us to buy old or
unused stuff at rock bottom prices. If we want to buy antiques there is no better options than online
stores.
10) Tactful (Careful) Purchases: Some things are better done in privacy. Online shops are also best
for careful purchases like thing that society does not allow to purchase. Online Shops enable us to
purchase under garments without the embarrassment that there are several people watching me and my
choices.
Consider a hypothetical example. ABC company sells automobile parts and XYZ
company assembles these part and then sells the automobile to customers. XYZ
company comes across the Web site of ABC and finds it suitable. XYZ therefore,
requests for more information about ABC and finally, decides to purchase automobile
parts automobile from ABC. To do this, XYZ places an order on the Web site of ABC.
After ABC receives the order details, it validates the information. As soon as the order
is confirmed, the payment procedures are settled. Finally, ABC sends an
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 51
acknowledgement of payment to XYZ and delivers the goods as per the shipment details
decided between the two organizations.
The B2B model is predicted to become the largest value sector of the industry within a
few years. This is said to be the fastest growing sector of e-commerce.
The B2C model involves transactions between business organizations and consumers.
It applies to any business organization that sells its products or services to consumers
over the Internet. These sites display product information in an online catalog and
store it in a database. The B2C model also includes services online banking, travel
services, and health information.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 52
The example of the www.amazon.com site also involves the B2C model in which the
consumer searches for a book on their site and places an order, if required. This implies
that a complete business solution might be an integration solution of more than one
business model. For example, www.amazon.com includes the B2B model in which the
publishers transact with Amazon and the B2C model in which an individual consumer
transact with the business organization.
The B2C model of e-commerce is more prone to the security threats because
individual consumers provide their credit card and personal information n the
site of a business organization. In addition, the consumer might doubt that his
information is secured and used effectively by the business organization. This is the
main reason why the B2C model is not very widely accepted. Therefore, it becomes very
essential for the business organizations to provide robust security mechanisms that can
guarantee a consumer for securing his information.
The C2C model involves transaction between consumers. Here, a consumer sells
directly to another consumer. eBay and www.bazee.com are common examples of
online auction Web sites that provide a consumer to advertise and sell their
products online to another consumer. However, it is essential that both the seller and
the buyer must register with the auction site. While the seller needs to pay a fixed fee to
the online auction house to sell their products, the buyer can bid without paying any fee.
The site brings the buyer and seller together to conduct deals.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 53
Let us now look at the previous figure with respect to eBay. When a customer plans to
sell his products to other customers on the Web site of eBay, he first needs to interact
with an eBay site, which in this case acts as a facilitator of the overall transaction.
Then, the seller can host his product on www.ebay.com, which in turn charges him for
this. Any buyer can now browse the site of eBay to search for the product he
interested in. If the buyer comes across such a product, he places an order for the
same on the Web site of eBay. eBay now purchase the product from the seller and
then, sells it to the buyer. In this way, though the transaction is between two customers,
an organization acts as an interface between the two organizations.
The C2B model involves a transaction that is conducted between a consumer and a
business organization. It is similar to the B2C model, however, the difference is
that in this case the consumer is the seller and the business organization is the buyer.
In this kind of a transaction, the consumers decide the price of a particular product rather
than the supplier. This category includes individuals who sell products and services to
organizations. For example, www.monster.com is a Web site on which a consumer can
post his bio-data for the services he can offer. Any business organization that is
interested in deploying the services of the consumer can contact him and then employ
him, if suitable.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 54
William Ward needs to buy an airline ticket for his journey form New York to New Jersey.
William needs to travel immediately. Therefore, he searches a Web site for a ticket. The
Web site offers bidding facility to people who want to buy tickets immediately. On the Web
site, William quotes the highest price and gets the ticket.
In addition to the models discussed so far, five new models are being worked on that
involves transactions between the government and other entities, such as
consumer, business organizations, and other governments. All these transactions that
involve government as one entity are called e-governance. The various models in the e-
governance scenario are:
The ecommerce website is the leading sales medium for many wholesale distributors. Your
wholesale customers will enjoy a rewarding online experience that drives loyalty and repeat
business. And your business will benefit with faultless ecommerce integration with front- and back-
office functions—accounting, inventory, CRM and execution of process etc.
E-Commerce Notes (BBA 6th sem) FEB_2012 Mukesh Gupta 55
Benefits
Key Features
o Submit SEO tags for all pages with content management system
o Generate web-store traffic with search engine friendly catalogs.
Ecommerce Analysis
o Gain real-time visibility into website and customer shopping activity
o Create customer segments and execute targeted marketing
ERP applications are the example of organization business application of manufacturing, accounting,
CRM (Customer Relation Management), HRM,(Human Resources Management) SCM (Supply
Chain Management), Health care, construction, retail services, Inventory, etc.
Cyberwebglobal.com
Shopping.rediff.com
Futurebazer.com
Sifycorp.com
Homeshop18.com