Ecommerce Final
Ecommerce Final
Ecommerce Final
Electronic commerce (e-commerce) remains a relatively new, emerging and constantly changing
area of business management and information technology. E-commerce is digitally enabled
commercial transactions between and among organizations and individuals. Digitally enabled
transactions include all transactions mediated by digital technology e.g. Internet. For the most
part, this means transactions that occur over the Internet and the Web. Commercial transactions
involve the exchange of value (e.g., money) across organizational or individual boundaries in
return for products and services. Exchange of value is important for understanding the limits of
e-commerce. Without an exchange of value, no commerce occurs.
Some of the definitions of e-commerce often heard and found in publications and the media are:
E-business refers primarily to the digital enablement of transactions and processes within a firm,
involving information systems under the control of the firm as shown in figure below.
1
For the most part, in our view, e-business does not include commercial transactions involving an
exchange of value across organizational boundaries. For example, a company’s online inventory
control mechanisms are a component of e-business, but such internal processes do not directly
generate revenue for the firm from outside businesses or consumers, as e-commerce, by
definition, does. It is true, however, that a firm’s e-business infrastructure provides support for
online e-commerce exchanges; the same infrastructure and skill sets are involved in both e-
business and e-commerce. E-commerce and e-business systems blur together at the business firm
boundary, at the point where internal business systems link up with suppliers or customers, for
instance. E-business applications turn into e-commerce precisely when an exchange of value
occurs (see Mesenbourg, U.S. Department of Commerce, August 2001 for a similar view).
BENEFITS OF E-COMMERCE
The benefits of e-commerce can be seen to affect three major stakeholders: organisations,
consumers and society.
Operational cost savings. The cost of creating, processing, distributing, storing and retrieving
paper-based information has decreased.
Mass customisation. E-commerce has revolutionised the way consumers buy good and services.
In the past when Ford first started making motor cars, customers could have any colour so long
as it was black. Now customers can configure a car according to their specifications within
minutes on-line via the www.ford.com website.
Enables reduced inventories and overheads by facilitating ‘pull’-type supply chain management
– this is based on collecting the customer order and then delivering through JIT (just-in-time)
manufacturing. This is particularly beneficial for companies in the high technology sector, where
stocks of components held could quickly become obsolete within months. For example,
companies like Motorola (mobile phones), and Dell (computers) gather customer orders for a
product, transmit them electronically to the manufacturing plant where they are manufactured
according to the customer’s specifications (like colour and features) and then sent to the
customer within a few days.
Lower telecommunications cost. The Internet is much cheaper than value added networks
(VANs) which were based on leasing telephone lines for the sole use of the organisation and its
authorised partners. It is also cheaper to send a fax or e-mail via the Internet than direct dialling.
2
Digitisation of products and processes. Particularly in the case of software and music/video
products, which can be downloaded or e-mailed directly to customers via the Internet in digital
or electronic format.
24/7 access. Enables customers to shop or conduct other transactions 24 hours a day, all year
round from almost any location. For example, checking balances, making payments, obtaining
travel and other information.
More choices. Customers not only have a whole range of products that they can choose from and
customise, but also an international selection of suppliers.
Price comparisons. Customers can ‘shop’ around the world and conduct comparisons either
directly by visiting different sites. (for example www.moneyextra.co.uk for financial products
and services).
Improved delivery processes. This can range from the immediate delivery of digitised or
electronic goods such as software or audio-visual files by downloading via the Internet, to the
on-line tracking of the progress of packages being delivered by mail or courier.
Enables more flexible working practices, which enhances the quality of life for a whole host of
people in society, enabling them to work from home. It also potentially reduces environmental
pollution as fewer people have to travel to work regularly.
Connects people. Enables people in developing countries and rural areas to enjoy and access
products, services, information and other people which otherwise would not be so easily
available to them.
Facilitates delivery of public services. For example, health services available over the Internet
(on-line consultation with doctors or nurses), filing taxes over the Internet through the Inland
Revenue website.
LIMITATIONS OF E-COMMERCE
There was much hype surrounding the Internet and e-commerce over the last few years of the
twentieth century. Much of it promoted the Internet and e-commerce as the panacea for all ills,
which raises the question, are there any limitations of e-commerce and the Internet?
3
Isaac Newton’s 3rd Law of Motion, ‘For every action there is an equal and opposite reaction’
suggests that for all the benefits there are limitations to e-commerce. These again will be dealt
with according to the three major stakeholders – organisations, consumers and society.
Rapidly evolving and changing technology, so there is always a feeling of trying to ‘catch up’
and not be left behind.
Under pressure to innovate and develop business models to exploit the new opportunities which
sometimes leads to strategies detrimental to the organisation. The ease with which business
models can be copied and emulated over the Internet increase that pressure and curtail longer-
term competitive advantage.
Facing increased competition from both national and international competitors often leads to
price wars and subsequent unsustainable losses for the organisation.
Problems with compatibility of older and ‘newer’ technology. There are problems where older
business systems cannot communicate with webbased and Internet infrastructures, leading to
some organisations running almost two independent systems where data cannot be shared. This
often leads to having to invest in new systems or an infrastructure, which bridges the different
systems. In both cases this is both financially costly as well as disruptive to the efficient running
of organisations.
Computing equipment is needed for individuals to participate in the new ‘digital’ economy,
which means an initial capital cost to customers.
A basic technical knowledge is required of both computing equipment and navigation of the
Internet and the World Wide Web.
Cost of computing equipment. Not just the initial cost of buying equipment but making sure that
the technology is updated regularly to be compatible with the changing requirement of the
Internet, websites and applications.
4
Lack of security and privacy of personal data. There is no real control of data that is collected
over the Web or Internet. Data protection laws are not universal and so websites hosted in
different countries may or may not have laws which protect privacy of personal data.
Physical contact and relationships are replaced by electronic processes. Customers are unable to
touch and feel goods being sold on-line or gauge voices and reactions of human beings.
Breakdown in human interaction. As people become more used to interacting electronically there
could be an erosion(divide) of personal and social skills which might eventually be detrimental
to the world we live in where people are more comfortable interacting with a screen than face to
face.
Social division. There is a potential danger that there will be an increase in the social divide
between technical haves and have-nots – so people who do not have technical skills become
unable to secure better-paid jobs and could form an underclass with potentially dangerous
implications for social stability.
Wasted resources. As new technology dates quickly how do you dispose of all the old computers,
keyboards, monitors, speakers and other hardware or software?
Difficulty in policing the Internet, which means that numerous crimes can be perpetrated and
often go undetected. There is also an unpleasant rise in the availability and access of obscene
material and ease with which paedophiles and others can entrap children by masquerading in
chat rooms.
5
2 Global Reach: Unlike traditional commerce, e-commerce technology permits commercial
transaction to cross cultural and national boundaries far more conveniently and cost effectively.
As a result, the potential market size for e-commerce merchants is roughly equal to the size of
the world’s online population.
3 Universal Standards: One strikingly unusual feature of e-commerce technologies is that the
technical standards of the Internet, and therefore the technical standards for conducting e-
commerce, are universal standards – they are shared by all nation around the world. In contrast,
most traditional commerce technologies differ from one nation to the next. For instance, television
and radio standards differ around the world, as doe’s cell telephone technology. The universal
technical standards of e-commerce greatly lower market entry cost –t he cost merchants must
pay just to bring their goods to market.
4 Richness: With the use of e-commerce technology merchant can present their message in
effective way. Information richness refers to the complexity and content of the message.
5 Interactivity: E-Commerce technologies are interactive, meaning they allow two-way
communication between merchant and consumer. Television, for instant, cannot ask the viewer
any questions, enter into a conversation with a viewer, or request customer information be
entered into a form. In contrast, all of these activities are possible on an e-commerce Web site.
Interactivity allows an online merchant to engage a consumer in a ways similar to a face-to-face
experience, but on a much more massive, global scale.
6 Information density: The Internet and the Web vastly increase information density – the total
amount and quality of the information available to all market participants, consumers and
merchants alike. E-commerce technologies reduce information collection, storage, processing
and communication costs. At the same time, these technologies increase greatly the accuracy
and timeliness of information – making information more useful and important than ever. As a
result, information becomes more plentiful, cheaper and of higher quality.
7 Personalization/Customization: E-commerce technologies permit personalization: Merchants
can target their marketing message to specific individuals by adjusting the message. The
technology also permits customization – changing the delivered product or service based on a
user’s preference or prior behavior.
E-COMMERCE FRAMEWORK
E-Commerce applications will be built on the existing technology infrastructure - a myriad of computers,
communication networks, and communication software forming the nascent Information Superhighway.
The technology infrastructure of the Internet is both an enabler and a driver of change. An
infrastructure is defined as “the foundation of a system.” In this case, the technological foundation of the
Internet, simply put, enables the running of the e-commerce enterprises. The hardware backbone of
computers, routers, servers, fiber optics, cables, modems, and other network technologies provides half
of the technology equation. The other half includes the soft-ware and communications standards that run
on top of the hardware, including the core protocols for the Web. Understanding technology infrastructure
—and there-fore understanding what is and is not achievable—is essential to formulating a company’s
vision and strategy.
The framework for e-Commerce consists of three parts as shown in below figure.
1 The first part consists of a variety of electronic commerce applications including both inter- and
intra-organizational and electronic market examples such as Supply Chain Management, Video-
on-Demand, Procurement and purchasing, On-line marketing and advertising, Home shopping
etc.
2 The second part of the building blocks of the infrastructure consists of:
Common business services, for facilitating the buying and selling process.
6
Messaging and information distribution, as a means of sending and retrieving information
( ex-EDI, e-mail, P2P file transfer)
Multi-media content and network publishing, for creating a product and a means to
communicate about it.
Information Superhighway infrastructure consisting of telecommunication, cable operator,
ISPs , Wireless technologies and Internet.
3 The third part consists of the public policy and technical standards necessary to support the
applications and the infrastructure.
Public policies govern issues like universal access, privacy, and information pricing. The
public policy infrastructure affects not only the specific business but also direct and indirect
competitors. It should take into consideration of:
Cost of accessing information
Regulation to protect consumers from fraud and protect their right to privacy.
Policies of global information traffic to detect information pirating and obscene sites.
Technical Standards governs issues like technology for communication and as well as for
Internet
7
Unit 2: Business Models for E-Business
1
ITC 206: E-Commerce
2
Unit 2: Business Models for E-Business
Understanding the nature of the market's requirements is critical for creating the
underlying e-business infrastructure. The relation between B2B and B2C models is
clearly shown in Figure 2.3.
B2B covers business transactions along the various interactions existing in the
value chain from producers of raw materials to retailers and consumers including
manufacturers and distributors. On the contrary. B2C reflects only the interactions
between a customer and a retailer. Basically, B2C transactions include the following
steps: (i) account acquisition. (ii) product discovery through search and browse,
(iii) price negotiation, (iv) payment, and (v) product delivery. In some cases,
customer services may also exist.
E-commerce can be classified according to the transaction partners such as
1) business toconsumer (B2C),
2) business-to-business (B2B),
3) business-to-government (B2G),
4) consumer to-consumer (C2C), and
5) consumer-to-business (C2B).
Within these broad categories, there are a number of variations in the way the
models are implemented. Table 2.1 summarizes souse of the current e-business
models.
3
ITC 206: E-Commerce
1) Business-to-Consumer (B2C)
The B2C model involves transactions between business organizations and
consumers. It applies to any business organization that sells its products or services
to consumers over the Internet. These sites display product information in an
online catalog and store it in a database. The B2C model also includes services
online banking, travel services, and health information and many more as shown in
figure below.
Consumers are increasingly going online to shop for and purchase products,
arrange financing, arrange shipment or take delivery of digital products such as
software, and get service after the sale. B2C e-business includes retail sales, often
called e-retail (or e-tail), and other online purchases such as airline tickets,
entertainment venue tickets, hotel rooms, and shares of stock.
Some B2C e-businesses provide high-value content to consumers for a subscription
fee. Examples of e-business following this subscription model include the Wall
Street Journal (financial news and articles), Consumer Reports (product reviews
and evaluations), and ediels.com (nutritional counseling).
B2C e-business models include virtual malls, which are websites that host many
online merchants. Virtual malls typically charge setup, listing, or transaction fees to
online merchants, and may include transaction handling services and marketing
options. Examples of virtual malls include excite.com, choicemall, women.com,
networkweb.com, amazon.com, Zshops.com, and yahoo.com.
E-tailers that offer traditional or Web-specific products or services only over the
Internet are sometimes called virtual merchants, and provide another variation on
the B2C model. Examples of virtual merchants include amazon.com (books.
electronics, toys, and music), eToys.com (children's books and toys), and
ashford.com (personal accessories).
Some businesses supplement a successful traditional mail-order business with an
online shopping site, or move completely to Web-based ordering. These businesses
are sometimes called catalogue merchants. Examples include avan.com (cosmetics
and fragrances), chefs (cookware and kitchen accessories), Omaha Steaks (premium
steaks, meats, and other gourmet food), and Harry and David (gourmet food gifts).
4
Unit 2: Business Models for E-Business
Many people were very excited about the use of B2C on the Internet, because this
new communication medium allowed businesses and consumers to get connected
in entirely new ways. The opportunities and the challenges posed by the B2C e-
commerce are enormous. A large amount of investment has gone into this and many
sites have either come up or are coming up daily to tap this growing market.
Some of the reasons why one should opt for B2C are:
1. Inexpensive costs, big opportunities. Once on the Internet, opportunities
are immense as companies can market their products to the whole world
without much additional cost.
2. Globalization. Even being in a small company, the Web can make you
appear to be a big player which simply means that the playing field has been
levelled by e- business. The Internet is accessed by: millions of people
around the world, and definitely, they are all potential customers.
3. Reduced operational costs. Selling through the Web means cutting down
on paper costs, customer support costs, advertising costs, and order
processing costs.
4. Customer convenience. Searchable content, shopping carts. promotions,
and interactive and user-friendly interfaces facilitate customer convenience.
Thus, generating more business. Customers can also see order status,
delivery status, and get their receipts online.
5. Knowledge management. Through database systems and information
management, you can find out who visited your site, and how to create,
better value for customers.
Processes in B2C (How Does B2C Work?)
B2C e-commerce is more than just an online store. It really is about managing the
entire process, but just using technology as a tool for order processing and
customer support. Figure 2.5 depicts the processes in B2C.
The B2C process is now explained in greater details:
1. Visiting the virtual mall. The customer visits the mall by browsing the
online catalogue —a very organized manner of displaying products and their
related information such as price, description, and availability. Finding the
right product becomes easy by using a keyword search engine. Virtual malls
may include a basic to an advanced search engine, product rating system,
content management, customer support systems, bulletin boards,
newsletters and other components which make shopping convenient for
shoppers.
2. Customer registers. The customer has to register to become part of the
site's shopper registry. This allows the customer to avail of the shop's
5
ITC 206: E-Commerce
The example of the www.amazon.com site also involves the B2C model in which the
consumer searches for a book on their site and places an order, if required. This
6
Unit 2: Business Models for E-Business
Thus, B2B is that model of e-commerce whereby a company conducts its trading
and other commercial activity through the Internet and the customer is another
business itself. This essentially means commercial activity between companies
through the Internet as a medium.
7
ITC 206: E-Commerce
This is supposed to be a huge opportunity area on the Web. Companies have by and
large computerized all the operations worldwide and now they need to go into the
next stage by linking their customers and vendors. This is done by supply chain
software, which is an integral part of your ERP application. Companies need to set
up a backbone of B2B applications, which will support the customer requirements
on the Web. Many B2B sites are company and industry specific, catering to a
community of users, or are a combination of forward and backward integration.
Companies have achieved huge savings in distribution-related costs due to their
B2B applications.
Major Advantages of B2B
1. Direct interaction with customers. This is the greatest advantage of e-
business.
2. Focused sales promotion. This information gives authentic data about the
likes, dislikes and preferences of clients and thus helps the company bring
out focused sales promotion drives which arc aimed at the right audience.
3. Building customer loyalty. It has been observed that online customers can
be more loyal than other customers if they are made to feel special and their
distinct identity is recognized and their concerns about privacy are
respected. It has also been found that once the customers develop a binding
relationship with a site and its product, they do not like to shift loyalties to
another site or product.
4. Scalability. This means that the Web is open and offers round-the-clock
access. This provides an access never known before, to the customer. This
access is across locations and time zones. Thus a company is able to handle
many more customers on a much wider geographical spread if it uses an e-
business model. The company can set up a generic parent site for all
locations and make regional domains to suit such requirements. Microsoft is
using this model very successfully.
5. Savings in distribution costs. A company can make huge savings in
distribution, logistical and after-sales support costs by using e-business
models. Typical examples are of computer companies, airlines, and telecom
companies.
Processes for Business-to-Business Transactions and Models
B2B interactions involve much more complexity than B2C. For instance, typical B2B
transactions include, among others, the following steps:
review catalogues,
identify specifications.
define requirements,
post request for proposals (REP).
8
Unit 2: Business Models for E-Business
Let us now look at the previous figure with respect to eBay. When a customer plans
to sell his products to other customers on the Web site of eBay, he first needs to
interact with an eBay site, which in this case acts as a facilitator of the overall
transaction. Then, the seller can host his product on www.ebay.com, which in turn
charges him for this. Any buyer can now browse the site of eBay to search for the
product he interested in. If the buyer comes across such a product, he places an
order for the same on the Web site of eBay. eBay now purchase the product from
9
ITC 206: E-Commerce
the seller and then, sells it to the buyer. In this way, though the transaction is
between two customers, an organization acts as an interface between the two
organizations.
There are also a number of new consumer-to-consumer expert information
exchanges that are expected to generate $6 billion in revenue by 2005. Some of
these exchanges, such as AskMe.com and abuzz, are free, and some allow their
experts to negotiate fees with clients.
InfoRocket.com, one of the first question-and-answer marketplaces, is driven by a
person-to-person auction format. The InfoRocket.com bidding system allows a
person who submits a question to review the profiles of the "experts" who offer to
answer the question. When the person asking the question accepts an "expert"
offer, infoRocket.com bills the person's credit card, delivers the answer, and takes a
20 percent commission.
10
Unit 2: Business Models for E-Business
11
ITC 206: E-Commerce
1) Brokerage Model
Brokers are market-makers: they bring buyers and sellers together and facilitate
transactions. Brokers play a frequent role in business-to-business (B2B), business-
to-consumer (B2C), or consumer-to-consumer (C2C) markets. Usually a broker
charges a fee or commission for each transaction it enables. The formula for fees
can vary depending on context. Brokerage models include:
• Marketplace Exchange -- offers a full range of services covering the
transaction process, from market assessment to negotiation and fulfillment.
Some examples are [Orbitz, ChemConnect]
• Buy/Sell Fulfillment -- takes customer orders to buy or sell a product or
service, including terms like price and delivery. Some examples are
[CarsDirect, Respond.com]
• Auction Broker -- conducts auctions for sellers (individuals or merchants).
Broker charges the seller a listing fee and commission scaled with the value
of the transaction. Auctions vary widely in terms of the offering and bidding
rules. Some examples are [eBay]
• Transaction Broker -- provides a third-party payment mechanism for
buyers and sellers to settle a transaction. Some examples are [PayPal,
Escrow.com]
• Search Agent -- a software agent or "robot" used to search-out the price and
availability for a good or service specified by the buyer, or to locate hard to
find information.
• Virtual Marketplace -- or virtual mall, a hosting service for online
merchants that charges setup, monthly listing, and/or transaction fees. It
may also provide automated transaction and relationship marketing
services. Some examples are [zShops and Merchant Services at Amazon.com]
2) Aggregator Model
Electronic commerce business model where a firm (that does not produce or
warehouses any item) collects (aggregates) information on goods and/or services
from several competing sources at its website. The firm's strength lies in its ability
to create an 'environment' which draws visitors to its website, and in designing a
system which allows easy matching of prices and specifications. Aggregator model
includes:
• Virtual Merchant -- this is a business that operate only from the web and
offers either traditional or web specific goods and services. The method of
selling may be listing price or auction. Some example includes [Amazon,
eToys]
• Catalog Merchant – Catalog business is a migration of mail order to web-
based order business.
12
Unit 2: Business Models for E-Business
• Bit Vendor – This is the merchant that deals strictly in digital products and
services in its purest form.
• Subscription model – the users have to pay for the access of the site. High
value added content should be essential for subscription model. Some
examples are [Wall street journal, Consumer Reports]
3) Info-mediary Model
Data about consumers and their consumption habits are valuable, especially when
that information is carefully analyzed and used to target marketing campaigns.
Independently collected data about producers and their products are useful to
consumers when considering a purchase. Some firms function as infomediaries
(information intermediaries) assisting buyers and/or sellers understand a given
market. Info-mediary model includes:
• Advertising Networks -- feed banner ads to a network of member sites,
thereby enabling advertisers to deploy large marketing campaigns. Ad
networks collect data about web users that can be used to analyze marketing
effectiveness. [DoubleClick]
• Audience Measurement Services -- online audience market research
agencies. [Nielsen//Netratings]
• Incentive Marketing -- customer loyalty program that provides incentives
to customers such as redeemable points or coupons for making purchases
from associated retailers. Data collected about users is sold for targeted
advertising. [Coolsavings]
• Metamediary -- facilitates transactions between buyer and sellers by
providing comprehensive nformation and ancillary services, without being
involved in the actual exchange of goods or services between the parties.
[Edmunds]
4) Community Model
The viability of the community model is based on user loyalty. Users have a high
investment in both time and emotion. Revenue can be based on the sale of ancillary
products and services or voluntary contributions; or revenue may be tied to
contextual advertising and subscriptions for premium services. The Internet is
inherently suited to community business models and today this is one of the more
fertile areas of development, as seen in rise of social networking.
• Open Source -- software developed collaboratively by a global community
of programmers who share code openly. Some examples are [Red Hat, Linux]
• Open Content -- openly accessible content developed collaboratively by a
global community of contributors who work voluntarily. [Wikipedia]
13
ITC 206: E-Commerce
14
Unit 2: Business Models for E-Business
• User Registration -- content-based sites that are free to access but require
users to register and provide demographic data. Registration allows inter-
session tracking of user surfing habits and thereby generates data of
potential value in targeted advertising campaigns. [NYTimes]
• Contextual Advertising / Behavioral Marketing -- For example, a
browser extension that automates authentication and form fill-ins, also
delivers advertising links or pop-ups as the user surfs the web. Contextual
advertisers can sell targeted advertising based on an individual user's
surfing activity.
15
Electronic
Data
Interchange
(EDI)
UNIT 3
Introduction to EDI…
– What is EDI?
– Electronic Data Interchange is the computer-to-computer exchange of
business data and documents between companies using standard
formats recognized both nationally and internationally.
– The information used in EDI is organized according to a specified
format set by both companies participating in the data exchange.
http://www.x12.org/x12org/about/faqs.cfm#a1
Electronic Data Interchange
3 By Mr. Lohala
History of EDI
www.edi-guide.com/edi-history.htm
History of EDI
www.gotedi.com/term_history.htm
The Transcript Trail
Print
Transcript
Re-key
Data
Receive
U.S. Mail Transcript
Student
Information
System
Recipient’s
Student
Request Information
Transcript System
The Transcript Trail with EDI
Print
Transcript
Re-key
Data
Receive
U.S. Mail Transcript
Student
Information
System
EDI
Recipient’s
Student
Request Information
Transcript System
7 By Mr. Lohala
EDI Layered Architecture
EDI semantic layer
12 By Mr. Lohala
What it takes to use EDI
– EDI server
– Internet access
– Translation & mapping software
– Staffing
– Registration
– Encryption software
13 By Mr. Lohala
Electronic Data Interchange
versus E-mails
– EDI document transport is far more complex than simply sending
e-mail messages or sharing files through a network.
– These EDI documents are more structured than e-mail.
– EDI from messaging is its emphasis on the automation of business
transactions conducted between organizations.
– In addition, EDI messages have certain legal status.
– For instance, if a buyer sends a supplier EDI purchase orders that
specify the requirements, time of delivery, and quantity and the
supplier does not uphold its end of the contract, it can be taken to
court with the EDI trading agreements serving as evidence.
How EDI works?
NETWORK SECURITY
1
ITC 206: E-Commerce
2
Unit 5: Network Security
Trust-Based Security
Quite simply, trust-based security means to trust everyone and do nothing extra for
protection. It is possible not to provide access restrictions of any kind and to
assume that all users are trustworthy and competent in their use of the shared
network. This approach assumes that no one ever makes an expensive breach such
as getting root access and deleting all files (a common hacker trick). This approach
worked in the past, when the system administrator had to worry about a limited
threat. Today, this is no longer the case.
Password Schemes:
One straightforward security solution, a password scheme, erects a first level
barrier to accidental intrusion. In actuality, however, password schemes do little
about deliberate attack, especially when common words or proper names are
3
ITC 206: E-Commerce
Biometric Systems:
Biometric systems, the most secure level of authorization, involve some unique
aspect of a person's body. Past biometric authentication was based on comparisons
of fingerprints, palm prints, retinal patterns, or on signature verification or voice
recognition. Biometric systems are very expensive to implement: At a cost of
several thousand dollars per reader station, they may be better suited for
controlling physical access—where one biometric unit can serve for many
workers—than for network or workstation access. Many biometric devices also
carry a high price in terms of inconvenience; for example, some systems take 10 to
30 seconds to verify an access request.
4
Unit 5: Network Security
5
ITC 206: E-Commerce
6
Unit 5: Network Security
vendor. Lastly, if the screening router is circumvented by a hacker, the rest of the
network is open to attack.
Proxy Application Gateways:
A proxy application gateway is a special server that typically runs on a firewall
machine. Their primary use is access to applications such as the World Wide Web
from within a secure perimeter as shown in figure below. Instead of talking directly
to external WWW servers, each request from the client would be routed to a proxy
on the firewall that is defined by the user. The proxy knows how to get through the
firewall. An application- Level proxy makes a firewall safely permeable for users in
an organization, without creating a potential security hole through which hackers
can get into corporate networks. The proxy waits for a request from inside the
firewall, forwards the request to the remote server outside the firewall, reads the
response, and then returns it to the client. In the usual case, all clients within a
given subnet use the same proxy. This makes it possible for the proxy to execute
efficient caching of documents that are requested by a number of clients. The proxy
must be in a position to filter dangerous URLs and malformed commands.
7
ITC 206: E-Commerce
The hardened firewall host method can provide a greater level of audit and security,
in return for increased configuration cost and decreased 'level of service (because a
proxy needs to be developed for each desired service).
Data Security:
Electronic data security is of paramount importance at a time when people are
considering banking and other financial transactions by PCs. Also, computer
industry trends toward distributed computing, and mobile computers, users face
security challenges. One major threat to data security is unauthorized network
monitoring, also called packet sniffing.
Sniffer attacks begin when a computer is compromised and the cracker installs a
packet sniffing program that monitors the network to which the machine is
attached. The sniffer program watches for certain kinds of network traffic, typically
for the first part of any Telnet, FTP, or login sessions— sessions that legitimate
8
Unit 5: Network Security
users initiate to gain access to another system. The first part of the session contains
the log-in ID, password, and user name of the person logging into another machine,
all the necessary information a sniffer needs to log into other machines. In the
course of several days, the sniffer could gather information on local users logging
into remote machines. So, one insecure system on a network can expose to
intrusion not only other local machines but also any remote systems to which the
users connect.
The fact that someone can extract meaningful Information from network traffic is
nothing new. Network monitoring can rapidly expand the number of systems
intruders are able to access, all with only minimal impact on the systems on which
the sniffers are installed and with no visible impact on the systems being
monitored. Users whose accounts and passwords are collected will not be aware
that their sessions are being monitored, and subsequent intrusions will happen via
legitimate accounts on the machines involved.
Message Security:
Threats to message security fall into three categories:
1. confidentiality,
2. integrity, and
3. authentication.
1. Message Confidentiality-
Confidentiality is important for uses involving sensitive data such as credit card
numbers. This requirement will be amplified when other kinds of data, such as
employee records, government files, and social security numbers, begin traversing
the network. Confidentiality precludes access to, or release of, such information to
unauthorized users.
The environment must protect all message traffic. After successful delivery to their
destination gateways, messages must be removed (expunged) from the public
environment. All that remains is the accounting record of entry and delivery,
including message length, authentication data, but no more. All message archiving
must be performed in well-protected systems.
The vulnerability of data communications and message data to interception is
exacerbated with the use of distributed networks and wireless links. The need for
securing the communications link between computers via encryption is expected to
rise.
2 . Message and System Integrity-
Business transactions require that their contents remain unmodified during
transport. In other words, information received must have the same content and
9
ITC 206: E-Commerce
organization as information sent. It must be clear that no one has added, deleted, or
modified any part of the message.
While confidentiality protects against the passive monitoring of data, mechanisms
for integrity must prevent active attacks involving the modification of data. Error
detection codes or checksums, sequence numbers, and encryption techniques are
methods to enhance information integrity. Encryption techniques such as digital
signatures can detect modifications of a message. .
3. Message Sender Authentication/Identification-
For e-commerce, it is important that clients authenticate themselves to servers, that
servers authenticate to clients, that both authenticate to each other. Authentication
is a mechanism whereby the receiver of a transaction or message can be confident
of the identity of the sender and/or the integrity of the message. In other words,
authentication verifies the identity of an entity (a user or a service) using certain
encrypted information transferred from the sender to the receiver.
Authentication in e-commerce basically requires the user to prove his or her
identity for each requested service. The race among various vendors in the e-
commerce today is to provide an authentication method that is easy to use, secure,
reliable, and scalable. Third party authentication services must exist within a
distributed network environment where a sender cannot be trusted to identify
itself correctly to a receiver. In short, authentication plays an important role in the
implementation of business transaction security.
10
Unit 5: Network Security
deceive any user identification scheme, the data that they see appears to be
gibberish without a way to decode it. Encryption technologies can help in other
ways as well, by establishing the identity of users (or abusers); control the
unauthorized transmission or forwarding of data; verify the integrity of the data
(i.e., that it has not been altered in any way); and ensure that users take
responsibility for data that they have transmitted.
Encryption can therefore be used either to keep communications secret
(defensively) or to identify people involved in communications (offensively).
Encryption Provide Following Security:
• Message Integrity: provides assurance that the message has not been
altered.
• No repudiation: prevents the users from denying he/she sent the message
• Authentication: provides verification of the identity of the person (or
machine) sending the message.
• Confidentiality: give assurance that the message was not read by others.
There are two types of encryption: symmetric key encryption and asymmetric
key encryption. Symmetric key and asymmetric key encryption are used, often in
conjunction, to provide a variety of security functions for data and message security
in e-commerce.
11
ITC 206: E-Commerce
Symmetric key encryption is much faster than public key encryption, often by 100
to 1,000times. Symmetric key technology is generally used to provide secrecy for
the bulk encryption and decryption of information.
Cryptography-based security technologies use a variety of symmetric key
encryption algorithms to provide confidentiality. Symmetric algorithms have the
advantage of not consuming too much computing power. People can use this
encryption method as either a "stream" cipher or a "block" cipher, depending on
the amount of data being encrypted or decrypted at a time.
A stream cipher encrypts data one character at a time as it is sent or received, while
a block cipher processes fixed block (chunks) of data. Common symmetric
encryption algorithms include Data Encryption Standard (DES), Advanced
Encryption Standard (AES), and International Data Encryption Algorithm (IDEA).
12
Unit 5: Network Security
Common Cryptosystems
• RSA Algorithm: RSA is the most commonly used public key algorithm,
although it is vulnerable to attack. Named after its inventors, Ron Rivest, Adi
Shamir and Len Adleman, of the MIT, RSA was first published in 1978. It is
used for encryption as well as for electronic signatures (discussed later).
RSA lets you choose the size of your public key. The 512-bit keys are
considered insecure or weak. The 768-bit keys are secure from everything
but 1024-bit keys are secure from virtually anything.
• Data Encryption Standards (DES): DES was developed by IBM in1974 in
response to a public solicitation from the US Department of Commerce. It
was adopted as a US federal standard in1977 and as a financial industry
standard in1981. DES uses a 56-bit key to encrypt.
• 3DES: A stronger version of DES, called 3DES or Triple DES, uses three 56-
bit keys to encrypt each block. The first key encrypts the data block, the
second key decrypts the data block, and the third key encrypts the same data
block again. The 3DES version requires a 168-bit key that makes the process
quite secure and much safer than plain DES.
• RC4: RC4 was designed by Ron Rivest RSA Data Security Inc. this variable-
length cipher is widely used on the Internet as the bulk encryption cipher in
the SSL protocol, with key length ranging from 40 to 128 bits. RC4 has a
repudiation of being very fast. e IDEA: IDEA (International Data Encryption
Algorithm) was created in Switzerland in1991. it offers very strong
encryption using 1 128-bit key to encrypt 64-bit blocks. This system is
widely used as the bulk encryption cipher in older version of Pretty Good
Privacy(PGP)
Digital Signature
Just as handwritten signatures or physical thumbprints are commonly used to
uniquely identify people for legal proceedings or transactions, so digital signatures
are commonly used to identify electronic entities for online transactions. A digital
13
ITC 206: E-Commerce
signature uniquely identifies the originator of digitally signed data and also ensures
the integrity of the signed data against tampering or corruption.
One possible method for creating a digital signature is for the originator of data to
create the signature by encrypting all of the data with the originator's private key
and enclosing the signature with the original data. Anyone with the originator's
public key can decrypt the signature and compare the decrypted message to the
original message. Because only someone with the private key can create the
signature, the integrity of the message is verified when the decrypted message
matches the original. If an intruder alters the original message during transit, the
intruder cannot also create a new valid signature. If an intruder alters the signature
during transit, the signature does not verify properly and is invalid.
However, encrypting all data to provide a digital signature is impractical for
following two reasons:
• The ciphertext signature is the same size as the corresponding plaintext,
so message sizes are doubled, consuming large amounts of bandwidth
and storage space.
• Public key encryption is slow and places heavy computational loads on
computer processors.
Digital signature algorithms use more efficient methods to create digital signatures.
The most common types of digital signatures today are created by signing
message digests with the originator's private key to create a digital thumbprint
of the data. Because only the message digest is signed, the signature is usually much
shorter than the data that was signed. Therefore, digital signatures place a
relatively low load on computer processors during the signing process, consume
insignificant amounts of bandwidth. Two of the most widely used digital signature
algorithms today are the RSA digital signature process and the Digital
Signature Algorithm (DSA).
14
Unit 5: Network Security
15
ITC 206: E-Commerce
A Certificate Authority (CA) issues digital certificates that contain a public key
and the identity of the owner. The matching private key is not made available
publicly, but kept secret by the end user who generated the key pair. The certificate
is also a confirmation or validation by the CA that the public key contained in the
certificate belongs to the person, organization, server or other entity noted in the
certificate. A CA's obligation in such schemes is to verify an applicant's credentials,
so that users and relying parties can trust the information in the CA's certificates.
CAs use a variety of standards and tests to do so. In essence, the Certificate
Authority is responsible for saying "yes, this person is who they say they are, and
we, the CA, verify that". If the user trusts the CA and can verify the CA's signature,
then he can also verify that a certain public key does indeed belong to whoever is
identified in the certificate. Browsers maintain list of well known CAs root
certificates. Aside from commercial CAs, some providers issue digital certificates to
the public at no cost. Large institutions or government entities may have their own
CAs.
16
Unit 5: Network Security
Kerberos:
Kerberos is a popular third-party authentication protocol. Kerberos is an
encryption-based system that uses secret key encryption designed to authenticate
users and network connections. It was developed at MIT's Project Athena in the
1980s and is named after the three-headed dog of Greek mythology that guards the
entrance to Hades. Like its namesake, Kerberos is charged with preventing
unauthorized access and does it so well that it is now a de facto standard for
effecting secure, authenticated communications across a network.
The assumption of Kerberos is that the distributed environment is made up of
unsecured workstations, moderately secure servers, and highly secure key-
management machines. Kerberos provides a means of verifying the identities of
requestor (a workstation user or a network server) on an unprotected network.
The goal is to accomplish security without relying on authentication by the host
computer, without basing trust on the IP addresses, without requiring physical
security of all the hosts on the network, and under the assumption that IP packets
on the network can be read, modified, and inserted at will. Kerberos performs
authentication under these conditions as a trusted third-party authentication
service by using conventional cryptography (secret key).
The authentication process proceeds as follows: Client A sends a request to the
Kerberos authentication server (KAS) requesting "credentials" for a given server, B.
The KAS responds with the following information, which is encrypted in A's key:
• A "ticket" for the server. This ticket contains B's key.
• A temporary encryption key (often called a "session key").
A then transmits—the client's identity and a copy of the session key, both encrypted
in B's key—to B.
17
ITC 206: E-Commerce
The session key (now shared 'by the client and server) is used to authenticate the
client and used to authenticate the server in future transaction. The session key is
then used to encrypt further communication between the two parties or to
exchange a separate sub-session key to be used to encrypt further communication.
18
Unit 5: Network Security
19
Unit 6: Electronic Payment System
1
ITC 206: E-Commerce
2. Retailing payments
Credit cards (e.g., VISA or MasterCard)
Private label credit/debit cards (e.g., J.C. Penney Card)
Charge cards (e.g., American Express)
2
Unit 6: Electronic Payment System
Tax Evasion
Businesses are required by law to provide records of their financial transactions to
the government so that their tax compliance can be verified. Electronic payment
however can frustrate the efforts of tax collection. Unless a business discloses the
various electronic payments it has made or received over the tax period, the
government may not know the truth, which could cause tax evasion.
Fraud
Electronic payment systems are prone to fraud. The payment is done usually after
keying in a password and sometimes answering security questions. There is no way
of verifying the true identity of the maker of the transaction. As long as the
password and security questions are correct, the system assumes you are the right
person. If this information falls into the possession of fraudsters, then they can
defraud you of your money.
Impulse Buying
Electronic payment systems encourage impulse buying, especially online. You are
likely to make a decision to purchase an item you find on sale online, even though
you had not planned to buy it, just because it will cost you just a click to buy it
through your credit card. Impulse buying leads to disorganized budgets and is one
of the disadvantages of electronic payment systems.
Payment Conflict
Payment conflicts often arise because the payments are not done manually but by
an automated system that can cause errors. This is especially common when
payment is done on a regular basis to many recipients. If you do not check your pay
3
ITC 206: E-Commerce
slip at the end of every pay period, for instance, then you might end up with a
conflict due to these technical glitches, or anomalies.
4
Unit 6: Electronic Payment System
system, (2) inefficient clearing and settlement of noncash transactions, and (3)
negative real interest rates paid on bank deposits.
Now compare cash to credit and debit cards. First, they can't be given away
because, technically, they are identification cards owned by the issuer and
restricted to one user. Credit and debit cards are not legal tender, given that
merchants have the right to refuse to accept them. Nor are credit and debit cards
bearer instruments; their usage requires an account relationship and authorization
system. Similarly, checks require either personal knowledge of the payer or a check
guarantee system. Hence, to really create a novel electronic payment method, we
need to do more than recreate the convenience that is offered by credit and debit
cards. We need to develop e-cash that has some of the properties of cash.
What is electronic cash? : Electronic cash is one of the instruments that can be
used to conduct paperless transactions. Paperless transaction is a term used to
describe financial exchanges that do not involve the physical exchange of currency.
Instead, monetary value is electronically credited and debited. Often called e-cash
or digital money , this financial instrument is commonly used to conduct distant
transactions, such as those between parties on the Internet and those between
parties in different countries.
In most cases, e-cash is equivalent to paper currency and can therefore be
exchanged among individuals or spent for any types of goods or services that a
person wishes to acquire. This financial instrument has played a large role in the
increasing popularity of telecommuting, which is an arrangement that allows
people to work together in distant places.
Digital currency can allow a freelancer in Nepal to be paid for work that the he did
for a contractor in Canada. This is possible due to a monetary exchange system. The
value of that money is then credited to someone else in another place. The paper
currency the sender presents or which is taken from his account is not physically
sent and given to the receiver. Electronic cash is exchanged in a similar way. One
major difference, however, is that transactions can often be conducted without a
live middle man.
People involved in electronic cash transfers may never acquire any paper currency.
They may receive their funds electronically and they may use them electronically.
This does not mean, however, that it is impossible to get paper currency from
electronic cash.
In many instances, electronic money can be converted into paper currency quite
easily. This is possible because e-cash is commonly held in an account that can be
accessed in several ways. For example, many have debit cards that can be used at an
automated teller machine (ATM). Sometimes, a person can request that all or a
portion of the money held electronically be made available by check.
5
ITC 206: E-Commerce
6
Unit 6: Electronic Payment System
Pros
Provides fully anonymous and untraceable digital cash:
No double spending problems (coins are checked in real time during the
transaction).
No additional secure hardware required
Cons
Communications overhead between merchant and the bank.
Huge database of coin records -- the bank server needs to maintain an ever-
growing database for all the used coins’ serial numbers.
Difficult to scale, need synchronization between bank servers.
Coins are not reusable
Electronic Checks:
When you write a check, you may assume that the piece of paper you write on will
be deposited at a bank and processed manually. Electronic check conversion makes
that process less and less likely. Instead of processing the piece of paper, some
businesses prefer to turn your paper check into an electronic check.
How Electronic Checks Work? How does a piece of paper become an electronic
check? The business you write the check to slips the check into a machine that
reads information from your check. That information is all the business needs
to collect money from your bank account.
With E-Checks, a check imager is connected to a small printer through a credit card
terminal directly at the point of sale. When a customer presents a check, the check
7
ITC 206: E-Commerce
is scanned by the imager, the magnetic data (MICR) indicating the bank routing
number and account number are read, and the dollar amount of the check is
entered. The E-Check process verifies the check by comparing the check's bank
account and the customer’s driver’s license with a national negative database to
determine if the account has a fraud history, is closed, or has had insufficient funds
(NSF) problems. If the check is approved, a receipt is printed for customer
signature. The check and a copy of the signed receipt are returned to the customer.
The captured data is used in the electronic transfer of money through the
Automated Clearing House (ACH) system.
8
Unit 6: Electronic Payment System
money in your account when you write a check, and you can’t rely on ‘float’ time as
much as you might have in the past. Keep a balanced checkbook and consider some
type of overdraft protection plan.
Since you’re paying electronically anyway, you now have even less reason to write
checks the old fashioned way.
Where Electronic Check Conversion Happens? Your paper checks may be
converted to electronic checks right in front of you, or it may happen when you mail
a check to somebody to pay a bill. Either way, they’re making an electronic check so
that they can process your payment electronically.
Electronic Check Disclosure and Identification: Businesses are supposed to notify
you that they’re making an electronic check. If you’re in a store, there should be a
sign near the register that says they’ll turn your paper check into an electronic
check. If you’re mailing in a check to pay a bill, the company probably disclosed
their electronic check policy somewhere in the fine print of an agreement or on the
back of your statement. If the cashier drops your check into a machine and hands it
back to you when you make a purchase, they’ve used an electronic check.
Smart Cards
A smart card is a device that includes an embedded integrated circuit chip (ICC)
that can be either a secure microcontroller or equivalent intelligence with internal
memory or a memory chip alone. The card connects to a reader with direct physical
contact or with a remote contactless radio frequency interface. With an embedded
microcontroller, smart cards have the unique ability to store large amounts of data,
carry out their own on-card functions (e.g., encryption and mutual authentication)
and interact intelligently with a smart card reader.
Smart card technology is available in a variety of form factors, including plastic
cards, fobs, subscriber identity modules (SIMs) used in GSM mobile phones and etc.
Smart Card Technology: There are two general categories of smart cards:
contact and contactless as shown in figure below.
A contact smart card must be inserted into a smart card reader with a direct
connection to a conductive contact plate on the surface of the card (typically gold
9
ITC 206: E-Commerce
plated). Transmission of commands, data, and card status takes place over these
physical contact points.
A contactless card requires only close proximity to a reader. Both the reader and
the card have antennae, and the two communicate using radio frequencies (RF)
over this contactless link. Most contactless cards also derive power for the internal
chip from this electromagnetic signal. The range is typically one-half to three inches
for non-battery powered cards, ideal for applications such as building entry and
payment that require a very fast card interface.
Two additional categories of cards are dual-interface cards and hybrid cards. A
hybrid card has two chips, one with a contact interface and one with a contactless
interface. The two chips are not interconnected. A dual-interface card has a single
chip with both contact and contactless interfaces. With dual-interface cards, it is
possible to access the same chip using either a contact or contactless interface with
a very high level of security.
The chips used in all of these cards fall into two categories as well: microcontroller
chips and memory chips. A memory chip is like a small floppy disk with optional
security. Memory chips are less expensive than microcontrollers but with a
corresponding decrease in data management security. Cards that use memory chips
depend on the security of the card reader for processing and are ideal for situations
that require low or medium security.
A microcontroller chip can add, delete, and otherwise manipulate information in its
memory. A microcontroller is like a miniature computer, with an input/output port,
operating system, and hard disk. Smart cards with an embedded microcontroller
have the unique ability to store large amounts of data, carry out their own on-card
functions (e.g., encryption and digital signatures) and interact intelligently with a
smart card reader.
The selection of a particular card technology is driven by a variety of issues,
including:
Application dynamics
Prevailing market infrastructure
Economics of the business model
Strategy for shared application cards
Smart cards are used in many applications worldwide, including:
Secure identity applications - employee ID badges, citizen ID documents,
electronic passports, driver’s licenses, online authentication devices
Healthcare applications - citizen health ID cards, physician ID cards,
portable medical records cards
10
Unit 6: Electronic Payment System
Debit Cards:
Debit cards are linked to your bank account so the money you spend is
automatically deducted from your account. They provide a convenient alternative
to cash, especially if you do a lot of shopping online. Debit cards can also help you
budget. Use your card to pay your bills and day-to-day expenses and your monthly
statement will provide a good snapshot of how much you spend per month and
where it’s going. There’s another benefit as well: Unlike credit cards, your bank
balance goes down with each debit card transaction, so you’re less likely to
overspend. (Many banks offer “overdraft protection” that allows you to exceed your
balance. But you’ll end up paying interest, and maybe extra fees, on the money you
borrow from your overdraft account.)
With so many benefits to the debit card, why use a credit card at all? There are
three main reasons: You can spend more than you have — or postpone paying, at
least — and you typically get better rewards and better protection than you do with
debit cards.
Credit Cards:
Credit cards basically allow you to use someone else’s money (the card issuer’s) to
make a purchase while you pay the money back later. If you do so within the billing
period — generally, 15 to 45 days — you can avoid paying any interest on it. The
problem arises, of course, when you don’t pay the balance in full and are charged
interest as well. That can quickly add up . If it takes you two years to pay off a $500
balance, for example, and you’re being charged 18 percent interest, you’ll end up
paying nearly $100 more in interest.
11
ITC 206: E-Commerce
If you use them responsibly though, credit cards can offer other advantages. They
help build your credit, as long as you pay your bills on time. Some also offer
rewards that you can use to get gifts, cash back or discounts for products, services
and special events. They also provide more protection if someone steals your card
or bank information. If you notice a fraudulent charge on your credit card account,
you can call the card issuer, make a dispute claim, and the charge should be
removed from your balance. But if thieves steal your debit card information and use
it, it may take weeks for the bank to investigate your claim and replace the lost
funds. In the meantime, you may have to deal with a dwindling bank balance or
bounced checks.
Federal law also protects you if you need to dispute charges on a credit card, but
not if you use a debit card or other forms of payment. If you paid cash or used a
debit card, the retailer already has your money. So you have a lot less leverage, and
there’s no guarantee you’ll get that money back. But if you pay for something with
your credit card and aren’t happy with the purchase, your card issuer can legally
withhold payment from the retailer until they resolve the dispute, and you won’t be
charged.
For most people, using both a debit card and credit card makes sense. The key is not
to spend more than you have with either. If you can do that, you’ll be able to enjoy
the benefits that each provide.
Working Techniques of Credit Cards: Credit card payment processing for the e-
commerce electronic payment system takes place in two phases: authorization
(getting approval for the transaction that is stored with the order) and settlement
(processing the sale which transfers the funds from the issuing bank to the
merchant's account). The flow charts below represent the key steps in the process
starting from what a customer sees when placing an order through completing the
sale and finishing with the merchant processing the sale to collect funds.
12
Unit 6: Electronic Payment System
Advantages Disadvantages
13
ITC 206: E-Commerce
14
Unit 7: E-Market and Strategy
A Process
Like a traditional-marketing program, an Internet-marketing program involves a
process. The seven stages of the Internet-marketing program process are setting
corporate and business-unit strategy, framing the market opportunity, formulating
the marketing strategy, designing the customer experience, designing the
marketing program, crafting the customer interface, and evaluating the results of
the marketing program. These seven stages must be coordinated and internally
1
ITC 206: E-Commerce
consistent. While the process can be described in a simple linear fashion, the
marketing strategist often has to loop back and forth during the seven stages.
Building and Maintaining Customer Relationship
The goal of marketing is to build and create lasting customer relationships. Hence,
the focal point shifts from finding customers to nurturing a sufficient number of
committed, loyal customers.? Successful marketing programs move target
customers through three stages of relationship building: awareness, exploration,
and commitment. It is important to stress that the goal of Internet marketing is not
simply building relationships with online customers. Rather, the goal is to build
offline (as relevant) as well as online relationships. The Internet marketing program
may well be part of a broader campaign to satisfy customers who use both online
and offline services.
Online
By definition, Internet marketing deals with levers that are available in the world of
the Internet. However, as noted above, the success of an Internet marketing
program ‘may rest with traditional, offline marketing vehicles. Consider, for
example, the recruiting and job-seeking service Monster.com. Monster’s success can
be tied directly to the effectiveness of its television advertising and, in particular, its
widely successful of the past two years.
Exchange
At the core of both online and offline marketing programs is the concept of
exchange. In both the online and offline worlds, exchange is still the heart of
marketing. In the new economy, firms must be very sensitive to cross-channel
exchanges. That is, an online marketing program must be evaluated according to its
overall exchange impact-not just the online exchange impact. Hence, online
marketing may produce exchanges in retail stores. Firms must be increasingly
sensitive to these cross channel effects if they are to measure the independent
effects of online and offline marketing programs.
Satisfaction of Goals of both Parties
One of the authors of this book is a loyal user of the website weather.com. Each day
he arises and checks the weather in his city as well as the weather in cities he will
be traveling to during the week. He is clearly satisfied with and loyal to the site. To
the extent that weather.com can monetize this loyalty-most likely, in the form of
advertising revenue-both parties will be satisfied. However, if the firm is unable to
meet its financial obligations to employees, suppliers, or shareholders, then the
exchange is unbalanced. Customers are still happy, but the firm is unable to sustain
its revenue model. Both parties must be satisfied for exchange to continue.
2
Unit 7: E-Market and Strategy
Search engine optimization (SEO) has become a crucial part of web commerce.
Without the right use of SEO techniques and strategies, a business or a website may
not be able to acquire good ranking on popular search engines, particularly Google.
Due to continuous manipulation of SEO techniques in the last few years, many
online directories and search engines have made several modifications in their
search algorithms to provide best results to users, looking for relevant information
for their query.
The main focus of search engine marketing strategies is to place certain highly
searched keywords in particular places of several web pages of a website. It aims at
providing relevant and useful content to your target market, while improving the
overall rank of the website on search engines.
3
ITC 206: E-Commerce
The best thing about social media marketing is that it does not require you to make
heavy investment, because making online company profiles on social networking
sites is absolutely free. Having your business on social networking sites is an easy
and simplest way to communicate and share your products with your target
audience. .
Google AdSense has grown rapidly in the past few years. It allows sites of all sizes
to earn money via relevant advertising. To be specific, Google AdSense is a simple
marketing strategy that allows advertisers to earn through their ads whenever a
user clicks on them on visiting a website. Every website has ads related to its
content. So, this gives the advertiser a wide customer base. It is a fast and simple
way to advertise products on the internet and attract target audience.
E-mail Marketing
E-Mail marketing is one of the primary ways to strengthen the relationship with
customer. In order to start the process, your customers should sign up for
newsletters so they can be repeatedly reminded about new products, launches, and
other deals being offered by the company on a regular basis. E-mail marketing
encourages customer loyalty, and can offer amazing benefits to customers if they
choose to become a subscriber.
Apart from these, there are many other different types of internet marketing tools
you may consider as well. All of them effectively designed to attract users, increase
search engine ranking, and brand building. There are some amazing options that
you can find to market your business on the internet.
Depending on the nature of your business, you would need to choose particular
types of internet marketing tools and techniques to produce best possible results.
Irrespective of the method you choose, you can always hire professional services
by neueseocanada.com to promote your business and implement efficient
marketing strategies. A professional would know all the right paths to lead to you
your business goals in a smooth and effective manner. A professional company will
win more customers and bring your website at the top of the result page.
Every time a customer transacts with the company online, that transaction is
captured. The firm can use this data in a number of ways. Firstly information can be
analyzed to find out most popular products/services sold. Secondly the data can be
used to assist in segmenting their customers, profiling them and sending customers
promotional material based on past buying habits.
4
Unit 7: E-Market and Strategy
There has been much controversy over the amount of information that is being
collected online by various companies in particular social networking sites and
whether customers should be able to opt out of that information being shared to
third party users.
When customers log into their accounts businesses can make their web experience
almost unique. From offering special offers to that particular customer, offering add
on to their recent purchase, much like Amazon.com does, or by allowing the
customer to personalize their own products, like Nike does with their trainers .
Personalization allows the firm to form stronger bonds online with customers and
form long term online relationships ensuring customers come back regularly.
Competitor Analysis
The internet allows businesses to analyse their competitor’s online strategy. A firm
can keep abreast of new products that are released, react to price changes, or use
the internet to discover secondary data on their competitors. The internet allows a
firm to react quickly to a change in their competitors strategy, and try to provide a
service that allows them to match or beat their competitors.
Cost Reduction
One of the major benefits of setting up or moving a business online is the cost
advantages of doing so. A firm can save a number of costs. These include:
Staffing costs: Fewer staff are needed online then in the high street thus
reducing costs.
Premises: The company will not need retail outlet just a centralised office
and possibly warehouse space, saving on potential retail costs.
Disintermediation: The channel of distribution is shorter online as the
consumer has the opportunity to buy directly like with Dell. As one of the
intermediaries is cut out this process is known as disintermediation.
Financial management: As consumers pay for the product before it is
dispatched, this improves the cash flow for the company, making sure for the
firm that they can pay their suppliers and other costs on time.
What is more important to business owners and marketers than to get their
products and services across to wide prospects base! With internet, online
businesses, both medium and large-scale, are accessible to millions of online users.
Your advertisement reaches global prospects through various online marketing
strategies like email marketing, social media marketing, pay-per-click (PPC)
5
ITC 206: E-Commerce
advertisement. Prospects translate to money and as such, the more reach your
marketing claims, the more the prospects. When numbers of prospects skyrocket,
you have opportunity for more customers and sales and you make more money
which is the ultimate goal of every business.
Internet marketing is 24/7 based. Your marketing campaigns run 24 hours a day, 7
days a week. You aren’t constrained with opening hours, neither are you to consider
overtime payment for staff. Regional or international time variation/difference
doesn’t affect the availability or reachability of your online ad copy campaign and
offer. Anytime an individual opens a computer connected to the internet, S/he’s
tendency to see your marketing campaign as opposed to usual traditional offline
marketing. Customers search the products offered at their convenient time as long
as they like – no hasten, no fear of closing. The users own the opening and closing
hours for shopping.
Internet marketing is fast and easy to start. You can set up a campaign at any time
convenient for you. For instance, email marketing which is one of the best internet
marketing strategies can be set up in a matter of hours. Within few minutes, you set
up the auto-responder and start marketing even with a list of one subscriber.
6
Unit 7: E-Market and Strategy
7
ITC 206: E-Commerce