Sbaa 3008
Sbaa 3008
Sbaa 3008
1
UNIT-1
Electronic Commerce:\
Definition of E-commerce
Disadvantages of E-commerce:
➢ Electronic data interchange using EDI is expensive for small businesses
➢ Security of internet is not very good - viruses, hacker attacks can paralise
e-commerce
➢ Privacy of e-transactions is not guaranteed
➢ E-commerce de-personalises shopping
Features of E-Commerce:
➢ Ubiquity
Internet/Web technology is The marketplace is extended beyond traditional available
everywhere: at work, at home, and boundaries and is removed from a temporal and
elsewhere via mobile devices, anytime. geographic location. ―Marketspace‖ is created;
shopping can take place anywhere. Customer convenience is enhanced, and shopping costs
are reduced.
➢ Global reach
The technology reaches Commerce is enabled across cultural and across national
boundaries, around the earth. national boundaries seamlessly and without modification.
―Marketspace‖ includes potentially billions of consumers and millions of businesses
worldwide.
➢ Universal standards
There is one set of There is one set of technical media standards technology standards,
namely Internet across the globe.
➢ Richness
Video, audio, and text messages Video, audio, and text marketing messages are are
possible. integrated into a single marketing message and consuming experience.
➢ Interactivity
The technology works Consumers are engaged in a dialog that through interaction with the
user. dynamically adjusts the experience to the individual, and makes the consumer a co-
participant in the process of delivering goods to the market.
➢ Information density
The technology Information processing, storage, and reduces information costs and raises
quality. communication costs drop dramatically, while currency, accuracy, and timeliness
improve greatly. Information becomes plentiful, cheap, and accurate.
➢ Personalization/Customization
The Personalization of marketing messages and technology allows personalized messages
to customization of products and services are be delivered to individuals as well as groups.
based on individual characteristics.
Threats of E-commerce:
E-Commerce Categories
1. Electronic Markets
Present a range of offerings available in a market segment so that the purchaser can
compare the prices of the offerings and make a purchase decision.
Example: Airline Booking System
What does an electronic marketplace do?
An online marketplace is an e-commerce site that connects sellers with buyers. It’s often
known as an electronic marketplace and all transactions are managed by the website owner.
Companies use online marketplaces to reach customers who want to purchase their products
and services. Examples of online marketplaces include Amazon, eBay, and Craigslist.
• Communicated from one computer to another without the need for printed orders
and invoices & delays & errors in paper handling
• It is used by organizations that a make a large no. of regular transactions
Example: EDI is used in the large market chains for transactions with their suppliers
Electronic Data Interchange (EDI): Electronic Data Interchange (EDI) - interposes
communication of business information in standardized electronic form.
Prior to EDI, business depended on postal and phone systems that restricted communication
to those few hours of the workday that overlap between time zones.
Why EDI?
Applications of EDI:
• Faster customs clearance & reduced opportunities for corruption, a huge problem in trade
• EFTS is credit transfers between banks where funds flow directly from the payer‘s bank to
the payee‘s bank.
• The two biggest funds transfer services in the United States are the Federal Reserve‘s
system, Fed wire, & the Clearing House Interbank Payments System (CHIPS) of the New
York clearing house
• EDI is becoming a permanent fixture in both insurance & health care industries as medical
provider, patients, & payers
• Electronic claim processing is quick & reduces the administrative costs of health care.
• Using EDI software, service providers prepare the forms & submit claims via
communication lines to the value-added network service provider
• The company then edits sorts & distributes forms to the payer. If necessary, the insurance
company can electronically route transactions to a third-party for price evaluation
• Claims submission also receives reports regarding claim status & request for additional
Information
• Procurement example
– Price quotes
– Purchase orders
– Acknowledgments
– Invoices
Standards translation:
• Specifies business form structure so that information can be exchanged
• Two competing standards
– American National Standards Institute(ANSI)X12
– EDIFACT developed by UN/ECE, Working Party for the Facilitation of
International Trade Procedures
EDI transport layer
• How the business form is sent, e.g. post, UPS, fax
• Increasingly, e-mail is the carrier
• Differentiating EDI from e-mail
– Emphasis on automation
– EDI has certain legal status
Internet Commerce
• It is use to advertise & make sales of wide range of goods & services.
• This application is for both business to business & business to consumer transactions.
• Example: The purchase of goods that are then delivered by post or the booking of tickets that
can be picked up by the clients when they arrive at the event.
• The full sales and marketing cycle - for example, by analyzing online feedback to ascertain
customer's needs
• Identifying new markets - through exposure to a global audience through the World Wide
Web
• Developing ongoing customer relationships - achieving loyalty through ongoing email
interaction
• Assisting potential customers with their purchasing decision - for example by guiding them
through product choices in an intelligent way
• Providing round-the-clock points of sale - making it easy for buyers to order online,
irrespective of location
• Supply Chain Management - supporting those in the supply chain, such as dealers and
distributors, through online interaction
• Ongoing Customer Support - providing extensive after-sales support to customers by online
methods; thus increasing satisfaction, deepening the customer relationship and closing the
selling loop through repeat and onging purchases.
•
Overview of developments in Information Technology
• The development of the World Wide Web in the 1990, gave E-commerce a brand new
identity, making it faster and easier for companies to reach their consumers. In today’s
generation, almost every business conducts some sort of e-commerce, whether it means
taking credit cards or accepting online orders. Just like normal commerce, e-commerce can
be B2B (business to business) or B2C (business to customers).
• Popular examples of B2C business is Amazon and EBay. If you have a laptop or a desktop
then you can easily shop online. It has become very popular in these modern days. Not only
can it help you do transactions online, it is also very convenient with all the swipe machines
where you can swipe your credit card for payment. People can do a business-to-business
transaction via e-commerce called B2B. It can also do a company to consumer transaction
called B2C. This is where your orders will be received via shipments and deliveries. You can
use credit cards when doing these transactions. One of the best examples for this is when
amazon.com do business with their clients. Another popular online shopping site is eBay.
Business-to-Consumer (B2C)
Consumer-to-Business (C2B)
E-Governance:
E-governance is the application of information and communication technology (ICT) for
delivering government services, exchange of information communication transactions,
integration of various stand-alone systems and services between government-to-customer (G2C),
government-to-business (G2B), government-to-government (G2G) as well as back office
processes and interactions within the entire government framework.
Government uses G2C model website to approach citizen in general. Such websites support
auctions of vehicles, machinery or any other material. Such website also provides services like
registration for birth, marriage or death certificates. Main objectives of G2C website are to
reduce average time for fulfilling people requests for various government services.
Architecture of e-commerce applications
• It separates the business logic of the application from user interfaces and from data
access. Middle tier can be further be divided
• In this case it’s calledmulti-tier architecture: it is Easier to modify one component
and has lower cost to deploy and maintain.
Application server
• Software that runs on the middle tier of a three-tier environment. In multi-tier environments
it is often a distributed and complex software
• Commercial implementations exist:
• Microsoft Commerce Server 2000
• Sun I Planet
• IBM Web Sphere Application Server
Web-based E-commerce is one of the fastest-growing segments of the technology that defines the
business strategy. Web-based E-commerce provides easy and better communication between
geographically separated buyers and sellers. E-commerce is a way of doing business by enabling
better interaction among customers, business partners and business relationship managers using
electronic tools. The Web provides an array of electronics tools such as e-mail and Web pages for
E-commerce and its related processes. Web-based E-commerce continues to improve convenience
and versatility using increased processing power and expanded cellular capabilities and makes it
more reachable to the customers.
• The basic idea of designing and building of any architecture is not only to describe the
computational steps but also the description of task. To design the architecture of a Web-based
system, the following points must be kept in mind
• Understanding the various roles and the kinds of users to ensure that the maximum users can
get the maximum advantages of the system to accomplish their aim Understanding the
functions of the different modules of the system and their interfaces, i.e. how the different
functions perform a special task by exchanging information and how the functions are related
to each other in a single unit
• Recording the links of the transaction details of the business in a database. The transaction
details contain information such as transition type, purchased item information, i.e. price, item
identification and stock information.
• Specifying the trust model for the system: Every system must have at least an implicit trust
model that helps maintain the security of the system by providing the details of the
relationships between the components.
Roles of a buyer:
In Web-based E-commerce, customers have different roles with respect to the services they
require or the action they perform. A buyer plays the roles of a Specifier, an approver and a
recipient. A specifier selects' the hem to be "purchased, an approver is the person who agrees
for purchase and a recipient is the person who gets the delivered items and services.
Buyers' roles are also distinguished according to the relation with the seller such as anonymous
buyers and member buyer. An anonymous buyer is a walk-in buyer who uses the system to deal
with the seller only once for a simple purchase. A member buyer establishes a membership
with the seller by repeatedly purchasing
Roles of a seller:
On the other side of Web-based E-commerce, the sellers also have many roles on the basis of
the responsibility assigned to the person in the company
• Content designer: They are concerned about the look and feel of the Web-based E-
commerce system such as graphic designs, page layout and user experience.
• Content author: They work within the design of the content designer by creating and
adapting the product information to a form.
• Implementer: An implementer implements the software and the program, which are used to
work with the Web-based E-commerce system.
• Database administrator: They are responsible for maintaining the correctness, consistency
and integrity of data stored in t database.
• Sales and marketing team: They focus on all the efforts to promote Inter-net-based E-
commerce.
• Buyer service representative: Buyer service representatives handle all the buyer dealings.
3. Analyzing the requirements of buyers and sellers: The different requirements of buyers and
sellers affect Web-based E-commerce applications. .Web-based E-commerce systems include a
client system, a merchant system, a transaction system and a payment gateway. A client system is a
computer system that is connected directly or indirectly to the Internet and always used by buyers
for browsing and purchasing items. A merchant system is the computer system that contains the
electronic catalogue of the sellers of online goods or products. A transaction system is the
computer system that processes an order and stores the information about the transactions. A
payment gateway is the computer system that controls the financial networks—for example,
authorization and settlement of credit cards used by the buyers.
In a Web-based E-commerce architecture, the seller is involved in all the stages of E-commerce
sales life cycle. Two things are common for every Web- based E-commerce architecture: one,
creative presentation of products and two, payment service. Some of the seller requirements are
stated as follows:
• Content management system is responsible for the creation and management of dynamic
updated contents of the Website and the whole Web presentation.
• Transaction processing system is used to track the transaction information such as item,
buyer, cost of item, type of the payment and status of the service.
• Payment processors control the money movement. For example, in the credit card payment
system, the seller connects to a credit card processor for the authorization.
• Fulfillment systems are used to handle the packing and the shipping orders of the
deliverable products.
UNIT – 1
PART - A
PART – B
1
UNIT - 1
INTRODUCTION
E-retailing
E-retailing essentially consists of the sale of goods and services. Sometimes we refer to this as the sale of
tangible and intangible goods, as shown in Figure 6.1. We can divide tangible goods into two categories:
physical goods and digital goods. Examples of physical goods would be a book, a television set, a video recorder,
a washing machine, etc. Examples of digital goods are software and music, which may be downloaded from the
internet. The sale of intangible goods is sometimes called e-servicing. -Examples of services that may be sold
are information such as the most recent stock prices, the most recent foreign exchange rate, or education.
Entertainment such as games that would be played on the internet is also examples of e-services. So are the sales
of services such as telecommunication services or banking services. The sale of tangible and intangible goods
are all referred to as customer oriented e-commerce or e- retailing, if they are sold directly to the consumer who
is the end user. Here we discuss the sale of tangible goods.
The first one considered is size. The important point to realize here is that no matter how large the company is
your e-store presentation is still-limited to the size of the computer screen, which may be, say, 15 in. It is not
necessary to look at the number of outlets in cyberspace because you probably need only one web set up.
However, this web site is linked to other similar web sites and portals. therefore, it is not the number of outlets
that is important but the number of links from other important sites to your web site which is far more
important. When one thinks of visibility, it is all the more important in cyberspace. It is notes enough to create a
web site; you have to let the world know the existence of your ‘web site and that people can purchase from
you’re-store. When looking at visibility, important point to realize here is that most people find information on
the Internet: trough the use of search engines. Therefore, it is very important to register the web or estore with the
most common or the most widely used search engines, such LS-Lycos, Alta Vista, and Yahoo. It is also
important to link your web site with other well-known web sites that have similar interests, or major portals
such as Yahoo, which link back to your e-store. This can greatly increase the visibility of the web site.
When considering location, we note that the geographic boundaries no longer exist. A local e-store and a foreign
e-store are both just “one click” away. Store atmosphere is particularly important on the web. The “look and
feel” of web site should match with the company’s image as well as the market position Look it seeks to
address.
Thus, if you are selling very up-market clothes such as Gucci and Armani, your web site for these stores should
2
6
have a sophisticated look and feel rout it. On the other hand, if you are selling other kinds of goods, you could
choose to have a slightly jazzier image on your web site. The front page or the homepage of your e-store is
particularly important. It may be the only chance that you get of. Wring a potential customer into your e-store. In
some ways it plays a similar role fur the e-store that the window display plays for the traditional store. What is
also important is in going through this store. The layout of the store has to be such that it facilitates the
customer’s interests. The advantage of using store layouts in the e-store is that the layout can actually be made
dynamic and be determined by the customer’s interests. The customer’s interests could be obtained from data
mining his previous purchases at the e-store. This is the major difference between a traditional store and an e-
store.
Price is very important in cyberspace because the customer can easily carry out comparison pricing between your
e-store and other e-stores not just in your immediate neighborhood but all around the world. Also some e-
brokers provide agents or services that carry out comparison pricing; therefore, the customer can easily find me
cheapest price. For this reason, it is important that in e- retailing one sets up a competitive pricing structure.
Next, when one looks at the variety of goods, one here needs to consider very carefully whether you are setting
up a specialized e-store or an e-department store. If you are setting up a specialized e-store, then you need to
gain access to the specific target group of customers you are interested in because they can travel so easily in
cyberspace to reach you. When one looks at profit margin and turnover, generally profit margins per item tend
to be lower with e-retailing, and so turnover must be higher.
Lastly, if one examines profitability one finds that this is still important with the e-stores, but in recent times
the share price of the e-store appears. to have assumed more importance in the eyes of investors. However, in the
long run, profitability will assume more importance. An on-line customer salesperson, “who” can help
customers to navigate through the site.
The use of Forums (collaborative purchasing circles) to create a customer community and thus increase
“stickiness.”
Traditional Retailing
Traditional Commerce or Commerce is a part of business, which encompasses all those activities that facilitate
exchange. Two kinds of activities are included in commerce, i.e. trade and auxiliaries to trade. The term trade
refers to the buying and selling of goods and services for cash or kind and auxiliaries to trade, implies all those
activities like banking, insurance, transportation, advertisement, insurance, packaging, and so on, that helps in
the successful completion of exchange between parties.
In finer terms, commerce encompasses all those activities that simplify the exchange of goods and services,
from manufacturer to the final consumer. When the goods are produced, it does not reach to the customer
directly rather it has to pass from various activities, which are included under commerce. Its main function is to
satisfy the wants of consumers by making goods available to them, at the right time and place.
E-Retailing
The internet has allowed a new kind of specialization to emerge. Instead of specializing just in a special product
line, they allow specialization in particular classes of customers and sellers. Thus, we see lastminute.com, which
allows last minute purchases of travel tickets, gift, and entertainment to be matched against last minute sellers
of the same items. Here, we see specialization not in a product line but in a class of purchasers and a class of
sellers. This kind of specialization would not have been possible before we had the internet. In addition to these
specialized stores, we also get generalized e- stores where a store sells several product lines under a single.
There are a number of key success factors which have been identified for traditional retailing. Two of these are the
size and the number of outlets. The larger the retailer, the greater the buying muscle and therefore the lower
the price for procurement. The number of outlets also allows the retailer to spread the purchase costs over a larger
inventory. In addition, the number of outlets provides for better visibility. The retailer is now visible to the
customer at many geographical locations rather than just one. Location is, of course, an extremely important
success factor in traditional retailing. The retailer may choose to be sited in the central business district, in a
regional area, in a shopping complex, or in a street of shops. This may relate to the category of customers and the
costs associated with the site. Other factors that are very important in traditional retailing are store atmosphere
and store layout Store atmosphere evokes a particular look and feel about the retailer and is therefore important
to the positioning in the market. Store layout is important in creating an atmosphere but is also important in
ensuring that one groups different sets of products together, so that the purchase of one product will frequently
lead to the purchase of another, thus allowing for cross selling. Price is important and here it is probably have
lower inventories. Thus, while Amazon.com lists over a few million titles, it keeps an inventory of a few
thousand best selling not necessarily the cheapest price, but the price which is consonant with what the customer
expects to pay for the goods. The variety of goods in the case of a large store, particularly of a department store,
is also important because a customer would come in looking for one set of goods and then choose to purchase
2
8
others. Profit margins are important in traditional retailing, and last but not least is the level of turnover.
number of outlets .
visibility
location
store atmosphere
store layout
price
variety of goods
profit margins
turnover
BENEFITS OF E-RETAILING
To the customer
Customers enjoy a number of benefits from e-retailing. The first of these is convenience. It is convenient for the
customer as he does not have to move from shop to shop physically in order to examine goods. He is able to sit
in front of a terminal and search the net and examine the information on goods. The second aspect of
convenience he gets is in terms of time. Normally, the traditional shop has an opening time and a closing time
and the customer can only visit the shop within these periods. On the net, the customer can choose at any time to
visit a site to examine the goods that are available and actually carry out his purchasing at one’s own
convenient time. The third type of convenience that the customer gets is that he has access to a search engine,
which will actually locate the products that he describes’ and also the site where they may be available, or
perhaps even locate the sites where they may be available at the best price
The second type of benefit to customers is better information. The Internet and the World Wide Web are
essentially communication media that allow retailers to put on quite extensive information related to their
products, which is available to the customers. Furthermore, since the customer can look at several sites, he will
be able to obtain different pieces of information from each site to build a far better picture for himself about the
products that he is interested in. In some sites, there are customer reviews of different products as well as
reviews by the business itself. An example of this can be found on Amazon.com. Examples of these
generalized stores include JC penny and Walmart.
WEBSERVICES
A web service is any piece of software that makes itself available over the internet and uses a
standardized XML messaging system. XML is used to encode all communications to a web service. For
example, a client invokes a web service by sending an XML message, then waits for a corresponding
XML response. As all communication is in XML, web services are not tied to any one operating system
or programming language—Java can talk with Perl; Windows applications can talk with Unix
applications.
Web services are self-contained, modular, distributed, dynamic applications that can be described,
published, located, or invoked over the network to create products, processes, and supply chains. These
applications can be local, distributed, or web-based. Web services are built on top of open standards
such as TCP/IP, HTTP, Java, HTML, and XML.
Web services are XML-based information exchange systems that use the Internet for direct application-
to-application interaction. These systems can include programs, objects, messages, or documents.
A web service is a collection of open protocols and standards used for exchanging data between
applications or systems. Software applications written in various programming languages and running
on various platforms can use web services to exchange data over computer networks like the Internet in
a manner similar to inter-process communication on a single computer. This interoperability (e.g.,
between Java and Python, or Windows and Linux applications) is due to the use of open standards.
E-Services
The delivery of services via the internet to consumers or other businesses can be referred to by the generic term
of e-services. There is a wide range of e-services currently offered through the internet and these include
banking, loans, stock trading, jobs and career sites, travel, education, consultancy advice, insurance, real estate,
3
0
broker services, on-line publishing, and on-line delivery of media content such as videos, computer games, etc.
This list is by no means exhaustive and it is growing all the time. In this lecture, we will give an overview of
eservices. In order to bring some order to discuss of these wide variety of e-services, we organize them into the
following categories, namely. Web-enabling services, which were previously provided by humans in office
agencies and/or their branches. The primary purpose here is that these services help to save time and effort for
the user; bring convenience, and improve the quality of life. In many cases, it can result in a reduced cost for the
consumer.
1. Banking
2. Stock trading
3. Education
In some cases, this may bring a new dimension to the original service, enhancing and altering it. E-education is
an example of this. It may also bring into the catchments new groups of consumers of the service to whom it
might not have been previously accessible.
Matchmaking services. These take a need from an individual or business customer and provide mechanisms
(from providers) for matching that need.
Travel
Insurance
Brokers
The advantage of this kind of matchmaking through the internet is that the ability to search electronically over a
wider area to satisfy the customer need and to more precisely meet the customer need is greatly facilitated by
both computerization and communication over the internet.
Information-selling on the web. This group essentially sells information content of one sort or another and
includes ecommerce sites that provide on-line publishing such as web-based newspapers consultancy advice
specialized financial or other information
Entertainment services. These provide internet-based access to videos, movies, electronic games, or theme
sites. This E-entertainment sector is expected to grow rapidly in the next few years, with a convergence of TV
and internet-based technologies.
Specialized services such as auctions. Many different auction sites have appeared and these are discussed
further in this lecture. It is not possible to discuss all the different eservices in this lecture and so we will briefly
sample only a few examples for each category.
Web-Enabled Services - Web-enabled services include personal banking, stock trading, and education.
E-banking
Security First Network Bank (SFNB;)was the first internet bank. It provides most of the banking services on the
web. Therefore, you can do your banking with your fingers instead of your feet. Looking at e-banking, we can
distinguish between twp distinct models:
Traditional banks that provide e-banking to complement their retail banking SFNB. is a pure cyber bank, while
the homepage of Bank of America illustrates the second model. While not all banks offer the full range of
services on the internet, banks in both the mentioned groups offer a varied range of services including personal
banking commercial banking for both small businesses and large corporations financial services loan application
services international trade including settlement instruments, foreign exchange transactions, etc.
There are significant advantages for both the individual or corporation as well as the bank in using e-banking.
An individual doing personal banking on the internet can, amongst other things, pay bills, do account transfers,
make queries on account balances, obtain statements, in some cases view images of checks, etc., and import
transactions directly into home account management software. Furthermore, one can make such transactions 24
hours a day from any place with internet access around the world. In addition to these, a number of banks offer
personal financial services including making personal loan applications on the internet. All these represent a
large increase in convenience and time saving for the bank customer, saving him trips to the bank branch,
queuing, etc.
The advantages to the banking institutions themselves include reduction in the number of retail banking
branches, saving rentals or ownership of the related properties. Reduction in staffing because of the reduction in
paper processing as well as face-to face bank teller contact. bringing about increase in the time the bank hangs
on to the money before making the required transfers, leading to increase in interest received by the banks.
These advantages are so significant that some banks offer customers a number of incentives to -switch to
internet banking, such as free checks, reduced fees, increased deposit rates, etc.
E-stock trading and e-investing - Several companies such as E-Trade .Datek.on-line, American Express
Financial Services, etc. allow you to trade stocks, bonds, mutual funds, etc. on the internet. These companies
offer you to trade at a very small cost compared to discount brokers or full-service brokers. This has resulted in
these on-line trading companies grabbing an increasing market share. In response to this, discount brokers
3
2
including Charles Schwab and full-service brokers have also moved to introduce internet trading of stocks.
the system responds with current “on the web site” prices
the internet trader has to confirm this trade or cancel it Several companies allow one to create a
simulated portfolio, which one watches over time without actually buying or selling the stocks in reality.
An example of this can be found on the Smart Money site .
the convenience of being able to trade anywhere in the world with internet access, e.g. while travelling;
and
In addition to actually allowing you to trade, these sites provide a considerable amount of information. The
reduction in margins available to stockbrokers as a result of internet trading is beginning to have an effect on
other more traditional forms of brokers. This has led to some traditional brokers also providing internet trading
of stocks.
E-education
A number of e-universities are being spawned around the world. Again, three models can be seen:
Traditional universities setting up new cyber vehicles for providing university education perhaps with other
business partners. An example of this the Hong Kong CyberU .which was set by the Hong Kong Polytechnic
University and Pacific Century Cyber Works. Traditional universities offering courses themselves on the
internet. There are a number of web-based technology tools for this purpose. An example is Web CT. A number
of so called “open universities” that previously provided distance learning have moved into providing an
internet-based version of their courses. These traditional universities have a number of advantages. They can
now reach a client base that is outside their catchment. They also expect to be able to deliver these courses at a
reduced cost; however, the jury is still out on this. Another advantage a traditional university has on the internet
over a new pure cyber university is that it has an established brand name. There are a variety of issues that need
to be explored carefully when preparing to deliver educational material on the internet and these include the
following
Does one use a distance learning model where the student uses a PULL model to acquire the material?
Does one use a traditional lecture model using video streaming? This is a PUSH model whereby a teacher
“pushes” the materials to the students.
The use of the ‘internet for education opens up many possibilities, namely use of quizzes, tests to provide the
student with instant feedback on his/her mastery of the materials, use of graphics and animation to explain
concepts, particularly those that have a dynamic character to them. It is anticipated that the internet will not only
lead to cyber universities of one kind or another but will also have a marked effect on teaching and learning in
traditional universities. One among some of the innovations that are being explored is the joint teaching by two
universities on different continents in order to enhance the learning experience.
Matchmaking Services
This has perhaps been the area in which there has been the greatest growth in eservices. Essentially, in most of
these applications, the customer who could be an individual or business specifies his requirements in relation to
the service. The e-commerce site then does a search over its own databases or over the internet using mobile
agents, or over other databases or web sites to look for one or more matches to these requirements. The
information is then returned to the e-service provider site to give the customer the required service.
Travel Services
Before the internet, one might have gone along to a travel agent in order to book one’s travel requirements such
as air tickets, train tickets, car hire, hotel, tours, etc. The travel agent would try his best to meet these
requirements by providing information regarding schedules, pricing, promotions, as well as suggestions on
changes to de itinerary. These bookings could be for individuals or corporations involving corporate rates, etc. A
large number of e-commerce sites have appeared, which address this precise market segment. These include
trip.com travelweb.com, and priceline.com. These web sites work in exactly the same way. When a customer
provides requirements, these sites do a search of their own databases or send agents our _ explore other web
sites and respond to the consumer. Amongst the requirement that the customer could specify is an acceptable
price. A number of sites, such as priceline.com, require that provided the price specified is met, the customer
cannot refuse the offer found. These ecommerce sites are beginning to grab an increasing part of the travel
market. They are attractive to consumers because of the convenience, the ability to meet requirements such as
specified prices, and in some cases like lastminute.com, a special customer need (i.e” booking at the last
minute). These travel sites often also have a lot of information on promotions, suggestions, etc., which are useful
for customers. These ecommerce sites are having a strong “disintermediation” effect. Disintermediation refers to
the removal of intermediaries such as travel agents from the process involved in the purchase of the service.
3
4
A recent increasing trend has also seen the primary provider of a service such as an airline introducing internet
based booking at reduced prices, further emphasizing the disintermediation effect.
There are several different kinds of services provided here, namely sites where you can get advice on developing
your resumes and can post your resumes on the web recruiters who use the web site to post available jobs, such
as Hot jobs or Job direct employers who list available jobs on the web sites matchmaking facilities that search
the internet for jobs for jobseekers based on a specification, such as matchmaking facilities to search the internet
for resumes that best fit a job description given by a prospective employer use of agents to do the search These
approaches of using the internet for e-employment or e jobs avoid many of the costs and difficulties associated
with traditional approaches to advertising, such as high cost, limited duration, and minimal information.
Others
In some areas, such as real estates e.g., the visualization ‘(3D’ facilities provided on the web allow one to either
show visualizations of buildings at the drawing board stage, or low people distant from the physical site of
building to actually visualize it This area of matchmaking and brokering services is expected to grow greatly in
the near future with e-commerce sites exploiting new market niches. This is also an area with the greatest
likelihood of disinter mediation, and traditional agents or brokers will have to build new dimensions to their
services in order to survive.
E-Entertainment
This is expected to be a growing area of e-commerce in the future. A number of companies are gaining access to
or have purchased large inventories of movies or other entertainment material with the view of allowing people
to download this on the web. Sites here vary from theme sites that use a small amount of interactive
entertainment to promote their products, such as Disney, to others that provide games either for a fee or are free
coupled together with advertising that pays for the site. An important issue here is that the payments involved
are relatively small for each transaction, and hence the use of micro payment techniques is likely to be of
considerable importance here.
Technology is the predominant solution for controlling costs. Banks are Increasingly help to reduce operating
costs and still provide adequate customer service. Innovation and technology are becoming the key
differentiators in the financial services business. Advance in networking, processing, and decision analytics have
allowed institutions to lower service costs. Technology has also accelerated the pace of product innovation. For
example, sophisticated arbitrage instruments like derivatives are changing the nature of investment banking.
The Securities and Exchange Commission’s decision to allow Spring Street Brewery to trade its stock online
may also fundamentally change investment banking by disinter mediating the traditional role of underwriting.
Technology is enabling the development of new products and services. For example, technology is capable of
replacing or expediting tedious financial exercises like check writing, filing taxes, and transferring funds.
Although large businesses have automated these tasks, many small businesses and most households still do them
manually. This is not surprising; large businesses have been undergoing computerization for more than thirty
years, whereas PCs have been entering households in significant numbers only in the last few years. Technology
is changing the interaction between banks and consumers. In particular, technological innovations have enabled
the following capabilities: online delivery of bank brochures and marketing information; electronic access to
bank statements; ability to request the transfer of funds between accounts; electronic bill payment and
presentment; ability to use multiple financial software products with “memory” (thus eliminating the need to re-
enter the same data); online payments—encrypted credit cards for transferring payment instructions between
merchant, bank, customer; and finally, micro payments (or nickel-and-dime transactions using electronic cash
and electronic checks). These online capabilities increase the facility and speed of retail banking. However, new
technology is a double-edged sword. While it enables banks to be more competitive through huge investments, it
also enables new competition from fast-moving, non banking firms. This trend can be seen in the area of online
payments, where recent innovations have provided an opportunity for non banks to break into the banking
business, threatening the banking stronghold on one of the last key services provided by banks. The present
nature of online payments is a clear indication that if the banking industry fails to meet the demand for new
products, there are many industries that are both willing and able to fill the void.
3
6
Technology also creates problems in the product development lifecycle. In the past, banks had the luxury of
long roll-out periods because successful investment in retail banking required a large monetary commitment for
product development. This financial requirement pre-vented new participants from entering the market and was
a key determinant of success. This is no longer the case. Instead of a single institution doing everything,
technology allows the creation of a “virtual financial institution” made up of firms, each contributing the best-
of-breed software or products to the overall product. In this new “virtual model,” banks compete with the
twelve-to-eighteen-month product development times of companies like Intuit or Netscape, which have product
life-cycle times of only six to nine months.
In recent years, there has been a major change in the way banks strive for increased profitability. In the past, the
banking industry was chiefly concerned with asset quality and capitalization; if the bank was performing well
along these two dimensions, then the bank would likely be profitable. Today, performing well on asset quality
and capitalization is not enough. Banks need to find new ways to increase revenues in a “mature market” for
most traditional banking services, particularly consumer credit. A thorough understanding of this competitive
environment is needed before banks can determine their online strategy. Five distinct factors contribute to the
new competitive environment:
Consumer requirements have changed substantially in the last decade. Customers want to access account-related
information, download account data for use with personal finance software products, transfer funds between
accounts, and pay bills electronically. Of course, along with these services, banks must be able to
supply/guarantee the privacy and confidentiality that customer’s demand, which is not a trivial matter to
implement on the part of the banks. Many consumer requirements are based on a simple premise: customers and
financial institutions both seek closer and more multifaceted relation-ships with one another. Customers want to
be able to bank at their convenience, including over the weekend or late at night. Bankers want more stable and
long term relationships with their customers. From the bank’s perspective, developing and maintaining this
relation-ship is difficult. Although financial products are essentially information products and financial
institutions are highly automated, there is a gulf between automated information and the bank’s ability to reach
the consumer in a unified way. This gulf is filled with established methods, such as branches, postage and mail,
advertising, and people on telephones. These methods can be costly and impersonal. Electronic banking
provides a method of communication that will enable the bank customer to be reached, served, and sold
products and services in their homes and offices whenever it is convenient for them-twenty-four hours a day,
seven days a week.
Although personal finance software allows people to manage their money, it only represents half of the
information management equation. No matter which software package is used to manage accounts, information
gets man-aged twice once by the consumer and once by the bank. If the consumer uses personal finance
software, then both the consumer and the bank are responsible for maintaining systems; unfortunately, these
systems do not communicate with one another, thus giving new meaning to double-entry bookkeeping. For
example, a consumer enters data once into his system and transfers this information to paper in the form of a
check, only to have the bank then transfer it from paper back into electronic form. Unfortunately, off-the-shelf
personal finance software cannot bridge the communications gap or reduce the duplication of effort described
above. But a few “home banking” systems that can help are beginning to take hold. In combination with a PC
and modem, these home banking services let the bank become an electronic gateway, reducing the monthly
paper chase of bills and checks
Citibank and Prodigy - To understand the more contemporary online banking services, we look at Citibank and
Prodigy. Prodigy has been pro-viding home banking to consumers since 1988, and has relationships with more
banks than any commercial online service. To expand the attractiveness of its online banking services, in 1996
Citibank began offering Prodigy subscribers a free and direct link to its electronic home banking service. Access
to Citibank is available to Prodigy sub-scribers at no extra fee throughout the New York metropolitan area. The
agreement represents the first time that Citibank has expanded access to its proprietary PC Banking service
through a commercial online service. To en-courage Citi Bank customers to try online banking through Prodigy,
free Prodigy software will be made available at local Citi Bank branches. CitiBanking on Prodigy offers a full
3
8
range of banking services. Customers can check their account balances, transfer money between accounts, pay
bills electronically, review their Citi Bank credit card account, and buy and sell stock trough Citi Corp
Investment Services. Citi Bank and Prodigy al-low customers to explore the wide array of services using an
interactive, hands-on demonstration.
With the explosive growth in Internet use, banking via the World Wide Web will undoubtedly catch on quickly.
The goal of this approach to banking is to provide superior customer service and convenience in a secure
electronic environment. The competitors in this segment are banks that are setting up Web sites, and firms like
Intuit that can easily transport their product to the Internet. Banking on the Internet is not the same as banking
via online services. Internet banking means that: Consumers do not have to purchase any additional software
(the Web browser is sufficient), store any data on their computer, back up any information, or wait months for
new versions and upgrades, since all transactions occur on a secure server over the Internet. Consumers can
conduct banking anywhere as long as they have a com-puter (not necessarily their own computer) and a modem-
whether at home, at the office, or in a place outside the United States. Banking via online services is restrictive
in that the consumer has to install a soft-ware package onto her computer. This limits the customer to banking
only from that computer, making a call to access a separate network, working with a separate software company,
and banking during limited hours of operation. Consumers can download account information into their own
choice of programs rather than following the dictates of the service provider. Internet banking allows banks to
break out of the hegemony of software developers. If bank customers (end users) install personal financial
management software on their PCs, these customers become direct customers of software firms. By controlling
the software interface, software firms such as Intuit can control the kinds of transactions end users make and
with whom these transactions occur. By maintaining a direct relationship with end users via the Web, banks can
offer additional services and provide a personal feel to the interface, without seeking the cooperation of a
software company. If banks choose to offer home banking via personal financial management software, they
lose control over the end user interface and the relationship they have with customers. This loss of control has
tremendous long-term implications. The software industry history offers com-pelling proof of the importance of
organizations having a direct relationship with consumers. In the early 1980s, IBM decided that operating
systems were not central to IBM business strategy. As a result, IBM licensed DOS from a small software
company called Microsoft. IBM called this operating system PC-DOS and allowed Microsoft to market this
same operating system to competing computer manufacturers under the name of MSDOS. IBM’s seal of
approval made DOS an industry standard. However, IBM was unable to move the industry to a new operating
system called OS/2 in the late 1980s because Microsoft controlled the customer relationship and was able to
convert most end -users to Windows. For banks, too, losing control over the interface could have dire
consequences.
The challenge facing the banking industry is whether management has the creativity and vision to harness the
technology and provide customers with new financial products necessary to satisfy their continually changing
financial needs. Banks must deliver high quality products at the customers’ convenience with high-tech, high-
touch personal and affordable service. In order to achieve this, management has to balance the five key values
that increasingly drive customers’ banking decisions: simplicity, customized ser-vice, convenience, quality, and
price. Online banking will realize its full potential when the following key elements fall into place: The
development of an interesting portfolio of products and services that is attractive to customers and sufficiently
differentiated from competitors.
The creation of online financial supply chains to manage the shift from banks as gatekeeper models to
banks as gateways.
The emergence of low-cost interactive access terminals for the home as well as affordable interactive
home information services.
The identification of new market segments with untapped needs such as the willingness to pay for the
convenience of remote banking.
The establishment of good customer service on the part of banks. The fact that technology increases the
ease of switching from one bank to an-other means that banks that do not offer superior customer service
may see low levels of customer loyalty.
The development of effective back-office systems that can support sophisticated retail interfaces.
Marketing Issues: Attracting Customers - The benefits of online banking are often not made clear to the
potential user.
Perhaps the answers to these questions are not clear to the bankers themselves. Regardless of how a bank
chooses to answer these questions, it is clear that make a mistake trying to sell online banking services on the
basis of convenience. While short term convenience is important, consumers want 19-term ability to control and
organize their finances more than they want convenience. Banks must also look beyond home consumers for
4
0
online banking consumers. The rapidly growing use of personal computers by small business- provides a solid
opportunity for banks to build a profitable base of small business until a broader consumer market evolves.
There are mil-lions of small businesses with annual sales ranging from Rs. 250,000 to Rs. 5 million. Many of
these firms have PCs and modems. New services like interactive cash management services could generate
significant revenues for banks. Industry studies indicate that 20 percent of small businesses are immediate
prospects for online banking and are willing to pay more than individual consumers for the service-up to $100 a
“month. Thus, banks have opportunity to tap into this market segment.
Keeping customers (or customer loyalty) requires the following: Banks must switch the costs of moving from
one software platform to other to keep customers from moving. Customers are increasingly familiar with using
technology to access bank accounts and to handle financial affairs, and this familiarity increases interest in
additional vices and increases switching costs. Banks must provide integrated services. The of cited time
squeeze on consumers long commutes, heavy workload, family obligations, household management is pushing
consumers toward integrated services that can speed up financial procedures. These integrated services
contribute to cementing the customer relationship. Banks can realize the positive cost implications for the long-
term value of building customer loyalty. In the online world, there is not a big cost difference between serving
one customer and serving 100,000 customers. Clearly, marketers must also work on building a loyal customer
base not only in order to maintain the existing base, but also in order to be attractive to potential customers.
ve the electronic counterpart of malls or e-malls. E- malls essentially provide a web-hosting service for your
individual store much in the way that mall provide a hosting service in the sense of a physical location for your
store.
In the future we may see the equivalent of franchise stores developing. One new class of business that is
developing very quickly on the internet is the e-broker. The e-broker does not sell directly to a customer but
brings the customer in touch with a particular supplier, so that a given set of criteria specified by the customer is
satisfied. For example, the customer may want to buy goods at the cheapest price and so the e-broker would then
do a search to find the supplier that would provide the cheapest goods. Or, a customer may want to find a
particular kind of goods and the e-broker sets about determining which supplier would provide those goods.
This area of e-broking is likely to grow very greatly in the near future.
Specialized stores ® specialized e-stores Generalized stores ® Generalized e-stores Malls ® E-malls
Franchise stores ® ?
New form of business: e-broker allows-the customer to finesse his requirements before actually making the
purchase. It also gives different sources of information. The third type of benefit that the customer gets is
competitive pricing. This is due to two factors.
The first is lowered costs to the retailer because he does not have to maintain a physical showroom, he does not
have to hire several shop assistants, and these savings can be passed on to customers in the form of reduced
prices. Secondly, competitive pricing pressure that arises from the fact that the customer is now able to look at
prices at several sites. Therefore, the pressure is always there on the retailer to maintain a competitive price for
his products. The third benefit is customization. The customer can actually specify the features of the products
that he would like and thus in some cases it is possible that the retailer may allow a customized product to be
delivered. An example of this is on the Dell site. The computer site allows shoppers to custom specify their own
computer software and hardware configurations. Thus, the customer is able to select exactly what he wants. This
ability to get the business to deliver a product that the customer specifies he wants is the essence of C2B e-
commerce.
convenience
better information
competitive price .
customization
So with e-retailing, the customer can shop “anywhere around the globe without being restricted to his local
vicinity. He could, for example, purchase goods over_ and have them delivered to a domestic address. He can
also shop, as mentioned earlier at any time. These are very considerable benefits of e-retailing to the customer.
These benefits could see larger and larger numbers of customers move more and more of their shopping on to e-
retailing sites in the future.
To the Business
There are a number of benefits of e-retailing to the business itself. The first of these is global reach. The retailer
now is no longer restricted to customers who are able to reach the store physically. They can be from anywhere
around the globe. The retailer must, of course, deliver the goods of a purchase to the customer. We see later that
has an impact on the types of goods that are most easily handled through e-retailing. The second benefit is
better customer service. The use of email and the use of electronic interchange of messages between the
customer and the retailer allows better communication between the customer and the retailer. These allow one
4
2
to easily inquiries and deal with complaints. These also allow a much more rapid response time than was
possible in the days of faxes and postal mail. The third benefit is the lowered capital cost to the retailer. The
retailer does not have to maintain showrooms, he can titles only. Therefore, the retailer has lower warehousing
costs. He does not have to have many shop assistants who are physically answering questions and showing the
customer goods.
The fourth benefit to the retailer is mass customization. Based on requests by the customers, the retailer is now
able to carry out mass customization with reduced time to market for the customized products. The next
advantage is targeted marketing. The retailer is now able to pick on a specific targeted group of customers and
direct marketing towards these customers. The retailer is also able to provide more value-added services in the
way of better information, add-on services to basic services, or add-on options to products that he is selling.
The last advantage to the retailer consists of different new forms of specialized stores that he is now able to
utilize. As we have mentioned previously, now he does not have to specialize his store based just on a product
line but could choose to specialize his store based on a specialized targeted group of customers. It also creates
new opportunities for niche marketing. A summary of the benefits to the e-retailer are
global reach
better customer service
low capital cost
mass customization
targeted marketing
more value-added services
new forms of specialized stores and niche marketing
It is the sale of goods or services between businesses via an online sales portal.
Impulsive buying is the tendency of a customer to buy goods and services without planning in advance.
When a customer takes such buying decisions at the spur of the moment, it is usually triggered by
emotions and feelings.
The rational decision making model assumes decisions are based on an objective, orderly, structured
information gathering and analysis. The model encourages the decision maker to understand the
situation, organize and interpret the information, and then take action. There are eight steps in the
rational decision making process
4
4
FIVE VALUE DELIVERY METHODS FOR ECOMMERCE INNOVATION
According to experts, value delivery method is considered to be the engine of the car called business
model. This is the part where you find your edge over your competitors and establish a unique selling
proposition in the marketplace. Will you be able to compete and create an ecommerce business worth
being proud of, in your current state? We have listed below a few popular approaches taken by industry-
leaders and market disruptors. The five value delivery methods for an ecommerce store are as follows:
3. Wholesaling
In a wholesaling approach, the retailer offers products in bulk at a discounted price. The concept of
wholesaling was traditionally B2B, but nowadays, many retailers offer it to budget-conscious customers
in a B2C mode.
4. Drop Shipping
Drop shipping is one of the fastest growing and most efficient methods of ecommerce. The typical drop
shippers sell items fulfilled by a third-party supplier. Drop shippers usually act as a middle man by
connecting buyers to manufacturers. Easy-to-use tools allow users to integrate inventory from suppliers
around the world for their storefronts.
5. Subscription Service
Even back in the early 1600s, publishing companies in England used a subscription model to deliver
books to their regular customers monthly. With the help of ecommerce, businesses are going beyond just
periodicals and groceries. In this technologically advanced era, each and every industry out there is
offering subscription services to bring convenience and savings to its customers.
E-ENTERTAINMENT
Ecommerce is changing the Entertainment industry and the way we get entertained. Let me take you
towards an era where first our grandparents experienced radio and then television (TV), which was the
newest and craziest medium for entertainment among our parents. The television was a black and white
one where only limited shows were aired. Viewers used to wait for the time when the shows would start
and no wonder, everyone loved all of them. Not because they all were entertaining, but because those
were something they never saw or experienced.
SD cards were added in the phones where people can store songs and get entertained whenever
and wherever they want
YouTube was launched in 2005 from where video entertainment took a hockey-stick growth
An era of On-Demand entertainment (Digital TV, News, Sports, Movies, Web Series, Music)
Our childhood experienced analog television which is now converted to Digital TVs. They offer high-
definition resolutions with a wide-screen aspect ratio. Digital TVs introduced how our television
experience can be better. After digital TVs, there was the era of getting everything mobile. With better
and better internet packages, it brought the world to your palm through smart phones. And now, the
entire entertainment industry expects and even earns their highest revenues from Smartphone users. If
4
6
you look at the news industry, newspapers and news channels ruled the industry for decades. They are
still not outdated, but you can now see companies investing in OTT (Over-the-Top) to stream news
online via apps. Such apps target the users who want to know news around the world, but at their
comfort. When it comes to ecommerce entertainment, music cannot be missed. You must be seeing Anil
Kapoor on all the platforms and thanks to Spotify for over-promoting the app. When it comes to
ecommerce entertainment, music cannot be missed. You must be seeing Anil Kapoor on all the platforms
and thanks to Spotify for over-promoting the app. YouTube remained the only on-demand entertainment
source until 2012. Yes, 2012 was the year when Netflix started creating their own content like films and
series, followed by Amazon Prime Video, Hotstar, and more.
2. Consumption on Apps, Smart TVs and Gadgets (an increase of Screen time)
With more mediums to get entertainment, there is a sharp increase in screen time. According to a survey
in 2019, US consumers have spent more time on mobile devices than watching TVs. These numbers are
going to increase in 2020 and even in 2021. The direct advantage is to the businesses targeting people
with higher screen time. Businesses developing on-demand apps, gaming apps, social media apps, and
more will see the highest revenues in the next five years.
What brilliantly these ecommerce entertainment apps do is that they understand their audience so well
that their segment-based user interface (UI) and user experience (UX) keeps them loyal towards them. I
know that it’s the minds behind building the strategy and the apps. But, here, the point is why people
stick to these apps. All because of its UI and UX. Look at Netflix, where a member can create profiles
within an account. You can create different profiles as per your family members and change the settings
for each of them. So, when I choose my daughter’s profile, the series or movies from kids categories
come up.
Online entertainment apps influence consumers using traditional media and giving free packs with
telecom operators
4
8
UNIT – II
PART - A
PART – B
1. EDI costs too much; how can I justify the cost when the other guy gets all the benefits?
2. Won't EDI destroy my relationship with my buyer/seller? Justify this statement.
3. At its core, electronic commerce or e-commerce is simply the buying and selling of
goods and services using the internet, when shopping online? Validate this statement
4. Assess this statement “B2B e-Commerce is short for business-to- business e-Commerce,
which is defined as the sales of goods or services between businesses via online
channels.”
5. Let me take you towards an era where first our grandparents experienced radio and
then television (TV) which was the newest and craziest medium for entertainment
among our parents and e- commerce is changing the Entertainment industry and the
way we get entertained. Evaluate this statement
6. Analyze the statement “The advantage of this kind of matchmaking through the internet
is that the ability to search electronically over a wider area to satisfy the customer
need.”
REFERENCES
1
E-COMMERCE [ELECTRONIC DATA INTERCHANGE] EDI
Electronic Data Interchange EDI – is the exchange of business documents between any
two trading partners in a standard or structured, machine readable form. EDI is used to
electronically transfer documents such as purchase orders, invoice, shipping bills, and
communicate with one another. A Specified format is set by both the parties to facilitate
transmission of information. Traders use Electronic Data Interchange EDI to exchange
financial information in electronic form. Electronic Fund Transfer facility provided by
banks is an example of Electronic Data Interchange EDI. EDI helps to eliminate paper
based
system, reduces data entry task and improves business cycle.
EDI stands for Electronic Data Interchange. EDI is an electronic way of transferring
business documents in an organization internally, between its various departments or
externally with suppliers, customers, or any subsidiaries. In EDI, paper documents are
replaced with electronic documents such as word documents, spreadsheets, etc.
EDI Documents
Translator and Mapper – A translator is used to convert the raw data into
meaningful information according to specifications provided by a mapper. A
mapper is used to create conversion specification. It compiles the specification and
then gives instructions to the translator on how to convert the data.
Retail Sector – In the retail sector profit margins usually depend upon
efficient inventory management. EDI provides a structured way to maintain
and replenish goods stocked at a retail outlet. Retailers use a common
model stock for each shop location and the point of sale stock position is
updated continuously and data in fed via EDI enabled SCM (supply chain
management) network. The EDI software monitors all the logistics and
makes updates in the original stock.
Business documents – These are any of the documents that are typically
exchanged between businesses. The most common documents exchanged
via EDI are purchase orders, invoices and advance ship notices. But there
are many, many others such as bill of lading, customs documents,
inventory documents, shipping status documents and payment documents.
There are several EDI standards in use today, including ANSI, EDIFACT,
TRADACOMS and ebXML. And, for each standard there are many deferent
versions, e.g., ANSI 5010 or EDIFACT version D12, Release A. When two
businesses decide to exchange EDI documents, they must agree on the specific EDI
standard and version.
Businesses typically use an EDI translator – either as in-house software or via an
EDI service provider – to translate the EDI format so the data can be used by their
internal applications and thus enable straight through processing of documents.
Features of EDI
To maximize the strategic value and ROI of your EDI software investment, you need a
solution that maximizes automation, minimizes manual intervention and can smoothly
and cost-effectively meet your changing business needs. That makes the following
features paramount:
Robust, proven integration with your business system. EDI is among the
highest-value integrations in your accounting systems environment because
this eliminates time-consuming, error-prone manual effort that would
otherwise be necessary to get orders, invoices and other EDI data in and out
of the accounting system. Integrating EDI with a business system streamlines
your order processing workflow for improved productivity and
responsiveness to customers, while saving time and money. The more trading
partners you have, the more operational costs you’ll save through EDI and
ERP integration. Conversely, an EDI system that does not integrate becomes
a cost of doing business that offers little value-add.
A simple, seamless user experience. Business users in departments like
customer service and shipping need to process EDI transactions efficiently
and accurately, without having to become EDI experts. You should be able to
manage EDI ―by exception‖ so that transactions are automated unless
exceptions occur. You should also be able to automatically schedule everyday
tasks like importing and exporting EDI documents to and from your
accounting system. More automation means faster processing and less
errors—which, for suppliers and distributors, means happier customers and
fewer chargeback’s.
Scalability and configurability for your specific needs. Look for an EDI
software provider that allows you to implement only the features you need
now, with the option to add more capabilities (e.g., support for remote
warehouse/3PL documents) on-demand in the future. Configurability to your
specific accounting/ERP environment and business processes without
customizations that could complicate your upgrades is also crucial. You want
a proven, turnkey implementation and upgrade path that minimizes risk as
your accounting and ERP environment changes.
Lowest total cost of ownership. A low initial cost doesn’t mean that TCO
will be low also. Monthly network charges can vary widely, for example.
Likewise, many providers charge for updating trading partner mapping
specifications, which change all the time. What about monthly maintenance
fees? These costs can add up fast as a business grows. Are these included in
the support contract or are they extra?
Easy on boarding of new trading partners. Growing companies need to
onboard new EDI trading partners quickly and smoothly. Make sure an EDI
provider offers prebuilt templates and rules to make on boarding and
compliance with major retailers and other partners quick and painless. Make
sure also that it’s easy to create partner-specific business rules.
E-COMMERCE [ELECTRONIC DATA INTERCHANGE] EDI
Reduction in data entry errors. - Chances of errors are much less while
using a computer for data entry.
Shorter processing life cycle - Orders can be processed as soon as they are
entered into the system. It reduces the processing time of the transfer
documents.
Electronic form of data - It is quite easy to transfer or share the data, as it is
present in electronic format.
Reduction in paperwork - As a lot of paper documents are replaced with
electronic documents, there is a huge reduction in paperwork.
Cost Effective - As time is saved and orders are processed very effectively,
EDI proves to be highly cost effective.
Standard Means of communication - EDI enforces standards on the content
of data and its format which leads to clearer communication.
Expedite transmission -Information is transmitted from one organization to
another organization efficiently and swiftly.
Automated Data entry-Data is entered automatically by EDI software. For
instance, when purchase order (PO) from one company is received by another
company. Sales order (SO) is automatically generated at other company’s
system with the help of EDI software.
Receipt verification-Receipt verification can easily be done with help of EDI
software. No human intervention is involved so there are minimal chances of
error or delay.
Data Validation-Data validation is automatically done.
Availability of free software-Free software’s are available depending upon
the EDI format chosen. For example- In TRADACOMS EDI format, Price
Information file and order files are available for free.
E-COMMERCE [ELECTRONIC DATA INTERCHANGE] EDI
Drawbacks of EDI
IMPLEMENTING EDI
Reduced Lead Time/Quick Response: EDI can provide a direct reduction in the
ordering/shipping time cycle. This benefits both customer and supplier.
Administrative and Clerical Costs: One of the major goals in creating EDI was to reduce
the great volume of business paperwork and many of the clerical tasks involved in
handling the processing of paper documents. Many users have realized substantial
productivity improvements and/or direct cost savings in their office operations by reducing
or eliminating the costs.
E-COMMERCE [ELECTRONIC DATA INTERCHANGE] EDI
EDI Com is simply a contraction of EDI communications and is often used when
discussing the means of exchanging EDI data with your trading partners. When a
business implements EDI the focus is always on the transactions, but eventually the means
of exchanging these transactions must be discussed. This is where EDI com comes into
play. There are a number of means of implementing EDI com ranging from traditional
EDI com strategies based on EDI VANs to more modern, direct EDI com methodologies
like AS2 communications. Regardless of how you implement EDI com your business will
need to ensure that the EDI com methodology you select is compatible with the VAN or
trading partners you do business with. There are a number of EDI com strategies that
your business can implement.
There are two kinds of communication reconciliation in the case of EDI implementation
through a service provider.
One is between the company and the provider and involves the company’s own file
formats.
The other between the service provider and the company’s partner, according to
the Communication Datasheet described above.
During the use of EDI communication protocols with often unknown names pop up
frequently. All of them primarily serve data transmission, but this function can be
complemented by further identification and security functions.
It is also different from Secure FTP, the practice of tunnelling FTP through an
SSH connection
Secure File Transfer Protocol (SFTP): is a network protocol that provides
fileaccess, file transfer and file management functionality over any reliable data
stream.
It was designed as an extension to the Secure Shell protocol (SSH) version
2.0 to provide secure file transfer capability, but it is also intended to be
usable with other protocols as well.
SFTP can be used in a number of different applications such as secure transfer
over Transport Layer Security (TLS) and transfer of management information
within VPN applications.
This protocol assumes that it is run over a secure channel, such as SSH, that
the server has already authenticated the client and that the identity of the
client user is available to the protocol.
Hyper Text Transfer Protocol (HTTP): is used to request and transmit files,
especially web pages and web page components, over the internet or other computer
networks.
In HTTP, web browsers typically act as clients, while an application running
on the computer hosting the web site acts as a server.
HTTP is typically implemented across TCP/IP however it can be
implemented on top of any other protocol on the internet, or on other
networks.
Hyper Text Transfer Protocol Secure (HTTPS): is a combination of the Hypertext
Transfer Protocol with the SSL/TLS protocol to provide encryption and secure
identification of the server.
HTTPS connections are often used for payment type transactions across the
internet and for the exchange of sensitive information between corporate
business systems.
Eb XML Messaging Service (EBMS): offers a secure and reliable SOAP/Web
Services based packaging, routing and transport protocol as defined by the ebXML
specifications.
The ebMS is an open standard and as such is communication protocol neutral
although the most common underlying protocols are HTTP and SMTP.
ebMS essentially offers a way to exchange ebXML based B2B documents
between different business applications using SOAP/Web services.
Electronic Payment System, Types of Electronic Payment Systems, Smart Cards and Electronic Payment
Systems, Infrastructure Issues in EPS, Electronic Fund Transfer.
E-payment system is a way of making transactions or paying for goods and services
through an electronic medium without the use of check or cash. It’s also called an electronic payment system or
online payment system. Read on to learn more.
The electronic payment system has grown increasingly over the last decades due to the widely spread of
internet-based banking and shopping. As the world advance more on technology development, a lot of
electronic payment systems and payment processing devices have been developed to increase, improve and
provide secure e-payment transactions while decreasing the percentage of check and cash transaction.
Direct debit, that is a financial transaction in which the account holder instructs the bank to collect a
specific amount of money from his account electronically for payment of goods or services.
E-Check, a digital version of an old paper check. It’s an electronic transfer of money from a bank
account, usually checking account without the use of the paper check.
Electronic billing: this is another form of electronic funds transfer used by companies or businesses to
collect payments from customers over electronic method.
Today it’s easy to add payments to the website, so even a non-technical person may implement it in
minutes and start processing online payments.
Payment gateways and payment providers offer highly effective security and anti-fraud tools to make
transactions reliable.
ecommerce, as well as m-commerce, is getting bigger and bigger, so having e- payment system at your online
store is a must. It’s simple, fast and convenient for the online shoppers to pay. Still, one of the most popular
payment methods are credit and debit card payments, but people also choose some alternatives or local
payment methods. If you run an online business, find out what your target audience need, and provide the most
convenient and relevant e-payment system.
You may also like:
Electronic cash (e-Cash): it is a form of an electronic payment system of which certain amount of
money is stored on a client device and made accessible for internet transaction. Electronic cash is also
referred to as digital cash and it make use of e-cash software installed on the user PC or electronic
devices.
Stored value card: this is another form of EFT used by stores. Stored value card is a card variety that
has a certain amount of money value stored and can be used to perform the transaction in the issuer
store. A typical example of stored value cards are gift cards.
Credit Card: this is another form of the e-payment system which required the use of the card issued by
a financial institute to the cardholder for making payments online or through an electronic device
without the use of cash.
E-Wallet: it is a form of prepaid account that stored user’s financial data like debit and credit card
information to make an online transaction easier.
Smart card: this use a plastic card embedded with the microprocessor that can be loaded with funds to
make transactions and instant payment of bills. It is also known as a chip card.
More effective and efficient transactions. It’s because these are made just in minutes (even with one-
click), without wasting customer’s time.
Credit Card
Debit Card
Smart Card
E-Money
Electronic Fund Transfer (EFT)
Credit Card
Payment using credit card is one of most common mode of electronic payment. Credit card is small plastic
card with a unique number attached with an account. It has also a magnetic strip embedded in it which is used
to read credit card via card readers. When a customer purchases a product via credit card, credit card issuer
bank pays on behalf of the customer and customer has a certain time period after which he/she can pay the
credit card bill. It is usually credit card monthly payment cycle. Following are the actors in the credit card
system.
Step 1 Bank issues and activates a credit card to the customer on his/her request.
Step 2 The customer presents the credit card information to the merchant site or to the merchant from
whom he/she wants to purchase a product/service.
Step 3 Merchant validates the customer's identity by asking for approval from the card brand company.
Step 4 Card brand company authenticates the credit card and pays the transaction by credit. Merchant
keeps the sales slip.
Step 5 Merchant submits the sales slip to acquirer banks and gets the service charges paid to him/her.
Step 6 Acquirer bank requests the card brand company to clear the credit amount and gets the payment.
Step 6 Now the card brand company asks to clear the amount from the issuer bank and the amount gets
transferred to the card brand company.
Debit Card
Debit card, like credit card, is a small plastic card with a unique number mapped with the bank account
number. It is required to have a bank account before getting a debit card from the bank. The major difference
between a debit card and a credit card is that in case of payment through debit card, the amount gets deducted
from the card's bank account immediately and there should be sufficient balance in the bank account for the
transaction to get completed; whereas in case of a credit card transaction, there is no such compulsion.
Debit cards free the customer to carry cash and cheques. Even merchants accept a debit card readily. Having a
restriction on the amount that can be withdrawn in a day using a debit card helps the customer to keep a
check on his/her spending.
Smart Card
Smart card is again similar to a credit card or a debit card in appearance, but it has a small microprocessor
chip embedded in it. It has the capacity to store a customer’s work-related
and/or personal information. Smart cards are also used to store money and the amount gets deducted after
every transaction.
Smart cards can only be accessed using a PIN that every customer is assigned with. Smart cards are secure, as
they store information in encrypted format and are less expensive/provides faster processing. Mondex and
Visa Cash cards are examples of smart cards.
E-Money
E-Money transactions refer to situation where payment is done over the network and the amount gets
transferred from one financial body to another financial body without any involvement of a middleman. E-
money transactions are faster, convenient, and saves a lot of time.
Online payments done via credit cards, debit cards, or smart cards are examples of emoney transactions.
Another popular example is e-cash. In case of e-cash, both customer and merchant have to sign up with the
bank or company issuing e-cash.
Electronic Fund Transfer
It is a very popular electronic payment method to transfer money from one bank account to another bank
account. Accounts can be in the same bank or different banks. Fund transfer can be done using ATM
(Automated Teller Machine) or using a computer.
Nowadays, internet-based EFT is getting popular. In this case, a customer uses the website provided by the
bank, logs in to the bank's website and registers another bank account. He/she then places a request to transfer
certain amount to that account. Customer's bank transfers the amount to other account if it is in the same bank,
otherwise the transfer request is forwarded to an ACH (Automated Clearing House) to transfer the amount to
other account and the amount is deducted from the customer's account. Once the amount is transferred to
other account, the customer is notified of the fund transfer by the bank.
A smart card, chip card, or integrated circuit card (ICC) is any pocket-sized card with embedded integrated
circuits. Smart cards are made of plastic, generally polyvinyl chloride, but sometimes polyethylene
terephthalate based polyesters, acrylonitrile butadiene styrene or polycarbonate.
Smart cards can provide identification, authentication, data storage and application processing. Smart cards
may provide strong security authentication for single sign-on (SSO) within large organizations
Smart cards are turning out to be a fundamental piece of the transformation of retailing into electronic
commerce. The impressive growth of the Internet is making electronic shopping at least a real possibility, if
not a habit, among computer users. However, the business model used in current electronic commerce
applications still cannot enjoy the full potential of the electronic medium. Moreover, concerns about the
reliability of an invisible counterpart and about the safety of the Internet for credit card information increase
the wariness and thereby limit the use of the electronic shopping on the part of customers.
Of the estimated 360 billion payments that took place in the United States in 1995, approximately 300 billion
could not have taken place using the existing electronic media. Such transactions involved micro-payments p;
i.e. payments for less than $10 p; which are virtually outside of the electronic arena for lack of a payment
method compatible with such low amounts. Credit cards or checks are simply too expensive to use for micro-
payments, and the e-cash currently being experimented on the World Wide Web does not seem to have the
characteristics to appeal to shoppers. For this reason, smart cards could be a fundamental building block of
widespread use of electronic commerce, since they are an instrument to pay at a low cost for transactions
involving small amounts of money. Another big advantage of smart cards for electronic
commerce is their use for the customization of services. It is already possible to purchase tailored services
on the World Wide Web p; MyYahoo and FireFly are well known examples. However, in order for the
service supplier to deliver the customized service, the user has to provide each supplier with her profile p; a
boring and time consuming activity. A smart card can contain a non- encrypted profile of the bearer, so that the
user can get customized services even without previous contacts with the supplier.
Finally, smart cards are a key technology enabler for financial institutions. The processing power, the
portability and the interactive properties of smart cards will constitute the basis for a revolution in the
relationship between consumers and banks. PC- based home banking and phone banking will give way to card
banking: a phone equipped with a smart card reader will be all that is needed for any kind of transaction.
Credit Cards and Smart Cards have become the most common forms of payment for e-commerce transactions.
In North America almost 90% of online B2C transactions were made with this payment type. Now a days, to
decrease the risk of fraud, more security steps are being taken by the government and banks to increase the
use of plastic money, such as the use of the card
verification number (CVN) which detects fraud by comparing the verification number printed on the signature
strip on the back of the card with the information on file with the cardholder’s issuing bank.
A Smart card is similar to a credit card a popular smart card initiative is the VISA Smart card. Using the VISA
Smart card you can transfer electronic cash to your card from your bank account, and you can then use your
card at various retailers and on the internet.
Here are the online payment options you could offer on your site:
To set up credit card processing on your website, (MasterCard, Visa, American Express, Discover), you need
to get anInternet merchant account.
You can get an Internet merchant account through your local banks. Notice I say banks; to get credit card
processing of all the major credit cards on your website you may need to get Internet merchant accounts with
two separate banks as many banks only deal with some of the credit cards involved.
You can also get an Internet merchant account through a third party merchant account provider, such as
Beanstream, Moneris, PSiGate or InternetSecure.
The advantages of getting an Internet merchant account through a third party merchant account provider are
that most don't require any security deposits (unlike banks), are quickly set up, and often can be bundled with
ecommerce service packages that include the Internet gateway you need for online credit card processing (Web
point-of-sale) and a shopping cart. The disadvantage is higher fees. Discount fees in particular tend to be higher
than if you had set up your Internet merchant accounts through the banks.
Wherever you get your Internet merchant account, you will have to also purchase an Internet gateway service.
The gateway verifies information, transfers requests and authorizes credit cards in real time. All four of the
companies I've mentioned above offer these credit card processing services as well, but there are many others
that do too – including PayPal.
2) PayPal
PayPal is now also an all-in-one online payment solution. Their Website Payments Standard program lets you
accept Visa, MasterCard, Discover, and American Express credit card payments as well as bank transfers and
offer PayPal as well – with no monthly fees, setup or cancellation fees. PayPal charges you a fee of 1.9 to 2.9
percent of transaction plus 30 cents per order, depending on your company's sales volume.
PayPal also offers an upgraded version of Website Payments Standard called Website Payments Pro, where
customers check out right on your site rather than on PayPal's (currently available only in the U.S.).
They also offer a PayFlow Gateway and PayPal Express Checkout for businesses that already have Internet
merchant accounts.
3) Debit Cards
The debit card is the preferred method of payment for one out of two Canadians and there are more than 35
million debit cards in circulation in Canada, according to the Interac Association. In 2006, Canadians made
more than three billion Interac Direct Payment transactions worth $148 billion and the number of debit card
payments grows about five per cent every year in Canada.
With numbers like that, this is an online payment option you definitely want to offer your customers if you’re
selling online.
Interac Online is one option that allows your customers to pay for goods and services online directly from their
bank accounts. It's convenient and secure for customers because they don't have to share any of their card
numbers or financial details when making a purchase; payment is completed through their own financial
institutions.
To start offering Interac Online on your website, you have to go through one of their certified acquirers or
online payment service providers, such as Beanstream, Moneris, Internet Secure, iCongo or PsiGate. Here's
their current list of online payment service providers.
UseMyBank is another Canadian company that provides online debit payment services. Like Interac Online,
buyers use their existing Online Banking bill payment service with their own bank to pay for your goods or
services online and the payment is directly debited to the selected bank account.
UseMyBank fees "will be assessed upon activation of account" according to their website. A discount rate of
1.5% to 5% and a minimum $1.50 fee per transaction are posted. There is also an account fee. To get started
using UseMyBank on your website, apply directly through the UseMyBank website.
Page |
511
Infrastructure Issues in EPS
NFRASTRUCTURE ISSUES IN EPS
1. For electronic payments to be successful, there is the need to have reliable and cost effective
infrastructure that can be accessed by majority of the population.
2. Electronic payments communication infrastructure includes computer network. such as the internet and
mobile network used for mobile phone.
3. In addition, banking activities and operations need to be automated. A network that links banks and
other financial institutions for clearing and payment confirmation is a pre-requisite for electronic
payment systems. mobile network and Internet are readily available in the developed world and users
usually do not have problems with communication infrastructure.
4. In developing countries, many of the rural areas are unbanked and lack access to critical infrastructure
that drives electronic payments.
5. Some of the debit cards technologies like Automated Teller Machines (ATMs) are still seen by many as
unreliable for financial transactions as stories told by people suggested that they could lose their money
through fraudulent deductions, debits and other lapses for which the technology had been associated
with by many over the last few years.
6. Telecommunication and electricity are not available throughout the country, which negatively affect the
development of e-payments. The development of information and communication technology is a
major challenge for e-payments development. Since ICT is in its infant stages in Nepal, the country
faces difficulty promoting e- payment development.
Transactions are processed by the bank through the Automated Clearing House (ACH) network, the secure
transfer system that connects all U.S. financial institutions. For payments, funds are transferred
electronically from one bank account to the billing company's bank, usually less than a day after the
scheduled payment date.
The growing popularity of EFT for online bill payment is paving the way for a paperless universe where
checks, stamps, envelopes, and paper bills are obsolete. The benefits of EFT include reduced administrative
costs, increased efficiency, simplified bookkeeping, and greater security. However, the number of
companies who send and receive bills through the Internet is still relatively small.
The U.S. Government monitors EFT compliance through Regulation E of the Federal Reserve Board,
which implements the Electronic Funds Transfer Act (EFTA). Regulation E governs financial transactions
with electronic payment services, specifically with regard to disclosure of information, consumer liability,
error resolution, record retention, and receipts at electronic terminals.
Page | 56
UNIT – III
PART - A
PART – B
1. Analyze the statement “For a lot of businesses who accept just cash and paper checks,
adding an electronic payment system into the mix is a big step, and a decision not
hastily made.”
2. Predict the statement “EDI standards include controls designed to protect against errors
in message and the corruption of message during the interchange.”
3. Infer the statement “EDI agreement is the abbreviation of Electronic Data Interchange
agreement. It is an agreement that regulates through computer the transfer or
exchange of data, such as purchase order between parties.”
4. Support this statement SET is a system which ensures security and integrity of electronic
transactions done using credit cards in a scenario.
5. Interpret the statement “Digital payments are much easier and safer than cash
payments. They are much more convenient than cash payments as well. How are digital
payments better than cash
6. Elucidate the statement “A mobile wallet is a type of virtual wallet service that can
be used by downloading an app. The digital or mobile wallet stores bank account or
debit/credit card information or bank account information in an encoded format to
allow secure payments.”
7.
REFERENCES
1
UNIT – 3 - NEED FOR COMPUTER SECURITY
Types of Risks
As the number of peoples utilizing the internet increases, the risks of security
violations increases, with it. One can compare the internet to a large department to
stored with a lot of entrances, a lot of customers and so security guards to discourage
shoplifting.
➢ Security Threats
➢ Passive Threats
➢ Active Threats
Security Threats
Some of the threats that stimulated the upsurge of interest in security.
Passive Threats
Passive threats involve monitoring the transmission data of an organization. The
goal of a attackers is to obtain information that in being transmitted.
Active Threats
This involve some modification of the data stream or the creation of a false
stream.
3.2 Specific Intruder Approaches
The advantage of such an approach is that it could be made vendor independent
and ported to a variety of system.
Bulletin boards
These internet services provider a clearing for information and correspondence
about a large variety of subject. Many commercial organizations especially technologies
houses, use then to provide customer services. Bulletin boards have been notorious
hangouts for hackers and other antisocial types.
Electronic mail
E-Mail is the one of the most commonly used services and is all some origination
use. Email poses fewer security problems then over forms of Internet Communication
but subject to interception if it is unencrypted.
File Transfer
Using FTP and HTTP users can request and send a variety of bulk data including data
bases, files in all formats, documents, software images and voice.
While useful and convincement, file transfer can be insure both in terms of
confidentially and virus threats.
IP Spoofing
IP spoofing is a techniques that can load to root access on a system. It is the tool
that intruders often use to take over open terminal an login connections after the get
root access.
The Intruders create packets with spoofed or impersonated source IP address.
The attackers involving forging the source address of packets.
Password guessing
Most host administration have improved their password controls, but group
accounts still abound and password dictionary & password cracking programs can easily
crack at least 10% of the pass words users these.
The different is enforcement of good passwords.
Password sniffing
CERT estimates that in 1994, thoursands of system were the victims of password
sniffers. On LANs internal machine on the network can see the traffic for every machine
on that network. Sniffer programs exploit this characteristic, monitoring all IP traffic and
capturing the first 128 bytes or so of every encrypted FTP (or) Telnet session.
Telnet:
Telnet enables users to log on to remote computers. Telnet does little to detect
and protect against unauthorized access.
Fortunately, Telnet is generally supported either by using an application gateway or by
configuration router to permit outgoing connection using something such as the
established screening rules.
Viruses:
A virus is a program that can infect other programs by modifying them to include
a copy of itself.
It is possible that any program that comes in contact with virus will become
infected with the virus.
Similarly to how virus attacks, humans computer virus can grow, replicate, travel
adapts and learn. Attack and defend camouflage themselves and consume resource. The
following lists various computer virus information’s.
➢ Alter data in files
➢ Change disk assignments
➢ Create bad sectors
➢ Decrease free space on disk
➢ Destroy FAT(File Allocation Table)
➢ Erase specific tracks or entire disk
➢ Format Specific Tracks or Entire disk
➢ Hang the System
➢ Overwrite disk directory
➢ Suppress Execution of RAM resident programs
Write a volume label on the disk
SATAN (Security Administrator Tool for Analyzing Networks)
SATAN is a powerful tool that can through scan systems and entire networks of
systems far a number of common critical security holes.
SATAN can be used by administrator to check their own networks: unfortunately,
it is also used by hackers trying to break into a host.
A SATAN is a program available via the Internet.
The primary components are included:
HTTP server that acts at the dedicated SATAN web server.
Policy engine that defines which hosts are allowed to be probed and to what
degree.
Inference engine that is driven by a set of rules bases and input from data acquisition.
Report and analysis, based on its findings.
More general information about SATAN and obtaining SATAN is available for
anonymous FTP.
3.3 Security strategies:
There are basic security strategies that can be utilized to combat the threats
discussed for access control, integrity, confidentiality and authentication.
However, before defenses can be deploy, a security policy must be developed by
an organization.
Policy Issue:
Although the need for a policy is obvious, many organizations attempts to make
their network secure without first defining what security means.
Before the organization can enforce security, the organization must access risks
and develop and unambiguous policy regarding information access and protection.
Policy Guidelines:
A System administrator sets security policies, he or she developing a plan for how
to deal with computer security.
One way to approach this task is to do the following.
Determine how likely the threats are implement measures which will protect your
assets in a cost effective manner.
Review the process continuously and improve process when a weekness is found.
Inadequate management:
Related to the topic of policy is the topic of rational resource management.
Solid procedures and good management of computer system as related to software are
critically important.
Unix Security
Unix provides various built in security features. Such as user password file access
directory access, file encryption and security on password files.
Web support (or) more generally for FTP (or) related support.
Eight character passwords for user. User password are generally encrypted using
the DES algorithm.
Password Security
Password and password information’s files are often the target for many
attackers.
Login attempts should be limited to their as less tires.
Password security is only as good as the password itself.
One time password
This is accomplished via an authentication scheme.
There are several ways to implement one time password.
Smart Cards:
A smart card is a portable device that contains some non-volatile memory & a
micro processor.
Some smart cards allow users to enter personal identification number (PIN) code
45.
Electronic mail
E-mail is one of most widely used forms of communication over to the internet.
It is a simple mail transfer protocol(SMTP).
Provides inter-machine e-mail transfer services
The content of the message itself is usually in plain text format
There is a multi of encryption system available.
It is privacy enhanced electronic mail (PEM).
Anonyms remailers provide a service that forwards a user’s mail message onto
the destination address but without disclosing the return address of the sender.
Example
[email protected]
nc@[email protected]
Privacy Enhanced Mail:
Used to send e-mail and how it automatically encrypted.
PEM supports confidentiality original authentication, message integrity and non
repudiation of origins
MIC-Message Integrity Code
MIC only.
Pretty Good Privacy (PGP).
PGP is an actual program that has become the de facts standard on the internet
for electronic mail.
Multipurpose Internet mail Extensions
Textual massager exchanged on the internet.
Many types of recognizable non ASCII data.
MIME – enclosed messages.
There is a potential for the download object to be distributed to a users PC once
executed.
Server security:
Many of the web browser allow user to save the HTML source code used to
create the web pages that are viewed.
File name of respective graphics, video programs and hyperlinks that would be
executed clicking on the web page items.
Trusting Binaries:
Security does not end with the various files well and browser security products
available.
Account the issue of trusting executable.
Binaries at both ends must be secure as well.
3.5 Encryption
Encryption involves the scrambling of data by use of the mathematical algorithm.
The term cryptography comes from the two creak words. Krupto and graph, that mean
secret and writing.
Conventional Environment:
A original message, referred to as plain text, is converted into apparently random
nonsense referred to as cipher text.
Public key encryption:
Public key encryption, first proposed in 1976, does not require key distribution.
Public key encryption solves the distribution problem because there are no key
distributed.
A public key cryptography is sometimes called in asymmetric cryptography.
Session Key: When two end system want to communicate, they establish a logical
connection for they duration of that logical connection, all user data in encrypted with a
one time session key. At they conclusion of the session (or) connection, the session key
is destroyed.
Permanent Key: A permanent key is used between entities two distributed session keys.
Access Control centre: A Access control centre determines which system can
communicate with each other.
Key distribution centre: The network interface centre unit performs end-to-end
encryption and obtains session key on behalf of its host terminals.
There are three basic attacks; there are known as cipher text only, known plain
text and chosen plain text.
Firewall
Application
Presentation
Session
Transport
Network
Data Link
Physical
Packet filtering
A packet filtering at the network layer can be used a first defense.
Dual Homed Host: In TCP/IP networks, the term multihomed host describes a host that
has multiple network Interface connections.
Dual homed gateways: The dual homed gateways in an alternative to packet filtering
routers.
Screened Host firewall
The screened host firewall is more flexible the dual home gateway however the
flexibility is achieved with same cost to security.
Screened Subnet firewall: It is a variations of the dual – homed gateway and the
screened host firewall.
Bastion Host: A bastion host is any host subject to critical security requirements.
Antivirus Programs:
Virus : A virus is a program that can effect other programs by modifying them the
modified program includes a copy of virus program, which can then go on to infect other
programs.
Worms : A Worm is a program that make use of networking software to replicate itself
and move from system to system.
The nature of viruses: A virus can do anything that other programs do; the only
difference is that it attaches itself to another program & executes secretly every time
the host program is run.
A simple virus that does anything more then infect programs might work some
thing like this.
➢ Find to the first program instructions.
➢ Replace it with a jump to the memory locations following the last instruction in
the program.
➢ Insert a copy of the virus code at the locations.
➢ Have to the virus simulate the instruction replaced by the jump.
➢ Jump back to the 2nd instructions of the host programs.
➢ Finishing the executing the host programs.
Countering the threat of virus: The best solution for the threat of viruses in prevention
do not allow a virus to get into the system in the first place.
Detection: After the infection has occurred, determine that it has occurred and locate
the virus.
Purging: Remove the virus from all infect system so, that the discuss cannot secured
further.
Security teams
The issue of network and internet security have become increasingly more
important as more and more business and people go on line a term of people have been
formed to assist in solving hacker attacks and do disseminate information on security
attacks and how to prevent then two such teams are
➢ Computer emergency response team
➢ Forum of incident response & security team (FIRST)
PART - A
1. The growth of electronic commerce has created the potential for new risks and Abuses.
Justify by explaining why e-commerce security important
2. All e-commerce sites will eventually be disrupted. Accordingly, e- commerce
Entrepreneurs must be prepared. Justify this statement by explaining the common
disruptions to website stability
3. Predict the resources provide more information about e-commerce
4. Point out the steps to prepare for e-commerce security work?
5. Most small e-businesses rely on established Internet transaction providers for their
payment and security systems. Support this statement by pointing out the two common
e-commerce security protocols
6. A firewall is usually a specialized computer running firewall software that prevents
unauthorized communications from flowing between the Internet and an intranet.
Justify this statement
PART – B
1. The theft of customer information can destroy the credibility of an e- business E-theft of
customer information can destroy the credibility of an e-business. Analyze this
statement by explaining types of hacker attacks?
2. Analyze the statement “External security threats originate from outside the
organization, usually in the form of a hacker breaking into a system.”
3. Analyze the statement “Internal security threats come from inside an organization and
External security threats originate from outside the organization, usually in the form of a
hacker breaking into a system.” by distinguishing the internal and external threats
4. Prove that in the modern age of sophisticated cyber-attacks and digital innovation, it is
vital for businesses to understand the threats they face and what their security defenses
protect them from. This is especially the case with firewalls, as web application firewalls
and network firewalls protect organizations from different types of attacks
5. Predict the factors motivating the hackers
6. Analyze the statement “External security threats originate from outside the
organization, usually in the form of a hacker breaking into a system.”
REFERENCES
1
CHAPTER 5
LEGAL AND ETHICAL ISSUES IN E‐COMMERCE
Transaction security has become very important in e‐commerce since more and more number
of merchants doing their business online. At the same time merchants are facing threats against
security of their valuable documents transacted over Internet. Consumers are not prepared to provide
credit card payment due to lack of security. There are many different transactions that make security
difficult. In order to succeed in the highly competitive e‐ commerce environment, business
organizations must become fully aware of Internet security threats, so that they can take advantage of
the technology that overcomes them, and thereby win customer’s trust. The merchants who can win
the confidence of the customers will gain their loyalty and it opens up vast opportunity for expanding
market share.
1. Spoofing
The low cost of web site creation and the ease of copying existing pages makes it all too easy
to create illegitimate sites that appear to be published by established organizations. In fact,
unscrupulous artists have illegally obtained credit card numbers by setting up professional looking
storefronts that resembles legitimate businesses.
4. Guessing passwords.
This style of attack is manual or automated. Manual attacks are difficult and only successful if
the attacker knows something about the shopper. Automated attacks have a higher likelihood of
success because the probability of guessing a user ID/ password becomes more significant as the
number of tries increases. There are tools which can be used to test all the
words in the dictionary to know the user ID/ password combinations, or that attack popular user ID/
password combinations. The attacker can automate to go against multiple sites at one time.
5. Unauthorised Disclosure
When information about transactions is transmitted in a transparent way, hackers can catch the
transmissions to obtain customers sensitive information.
6. Unauthorised action
A competitor or unhappy customer can alter a Web site so that it refuses service to potential
clients or malfunctions.
7. Eavesdropping
The private content of a transaction, if unprotected, can be intercepted when it go through the
route over the Internet.
8. Data alteration
The content of a transaction may not only be intercepted, but also altered, either maliciously or
accidently. User names, credit card numbers, and dollar amounts sent are all vulnerable to such
alteration.
1. Email attachments – opening an attachment could unleash a virus and they can propagate
themselves even without a user double‐ clicking on them.
2. VPN tunnel vulnerabilities – a hacker who works his way into the VPN has free and easy
access to the network
3. Blended attacks – Worms and viruses are becoming more complicated, and now a single one
may be able to execute itself or even attack more than one platform.
4. Diversionary tactics – hackers may strike a set of servers in a target company and then when
security administrators are busy securing that, they slip in and attack another part of the
network.
5. Downloading Tactics ‐ Workers frequently misuse their Internet access in the workplace,
downloading games, movies and music and even porn. It opens the network up to attack and
sucks up valuable bandwidth.
6. Supply chain partners Added to the Network – An administrator may grant access to the
network for a partner company and then forget to close that access point when the job is over.
7. Renaming documents – A employee could save business critical information in a different file,
give it a random , unrelated name and email the information to her home computer, a friend or
even a corporate competitor.
8. Peer to peer applications – Here, there is implied trust between servers. That means if a user
has access to one server, he automatically has access to another server if the servers share trust.
9. Music and Video Browsers – These are browsers that automatically will connect the user with
related web sites – all without the user’s permission.
Security tools
1. Encryption
Implementation of technology solutions to secure information that travel over public channels
can be protected using cryptographic techniques. Cryptography is the process of making information
unintelligible to the unauthorized reader. But decryption is a reverse process of encryption, to make the
information readable once again. Cryptography techniques make use of secret codes or key to encrypt
information. The same secret key is used by the receiver to decrypt the information; A key is a very
large number, a string of zeros and ones.
2. Digital Signatures
They are used to verify the authenticity of the message and claimed identity of the sender but
also to verify message integrity. A message is encrypted with the sender’s private key to generate the
signature. The message is then sent to the destination along with the signature. The recipient decrypts
the signature using the sender’s public key and if result matches with the copy of the message
received, the recipient can ensure that the message was sent by the claimed originator.
A digital signature performs the similar function to a written signature. A recipient of data such
as e‐mail message can also verify the signed data and that the data was not modified after being
signed. In order to digitally sign a document, a use combines his private key and the document and
performs a computation on the composite in order to generate a unique number called the digital
signature.
3. Digital Certificates
A digital certificate is an electronic file that uniquely identifies individuals and web sites on
the Internet and enables secure, confidential communications. The security of transactions can be
further strengthened by the use of digital certificates. Certification Authorities issues digital certificates
to users who wish to engage in secure communication. Once sender has provided proof of his identity,
the certification authority creates a message containing sender’s name and his public key. This
message is known as a certificate, is digitally signed by the certification authority. To get the
maximum benefit, the public key of the certifying authority should be known to as many people as
possible. The public key of certification authority can be accepted as a trusted third party way of
establishing authenticity for conducting e‐commerce.
5. Telecommunication Laws – telecommunication systems also fall within the purview of cyberspace
and therefore would form an integral part of cyber laws. The word cyber and its relative dot.com are
probably the most commo0nly used terminologies of the modern era. In the information age the rapid
development of computers, telecommunications and other technologies has led to the evolution of new
forms of transnational crimes known as cyber crimes. Cyber crimes have virtually no boundaries and
may affect every country in the world.
Cyber crime may be defined as any crime with the help of computer and communication
technology with the purpose of influencing the functioning of computer or computer systems. The
extent of loss involved worldwide of cyber crimes is tremendous as it is estimated that 500 million
people who use the Internet can be affected by the emergence of cyber crimes.
India is a signatory to the Model Law and is under an obligation to revise its laws. Keeping in
view the urgent need to bring suitable amendment in the existing laws to facilitate electronic
commerce and with a view to facilitates Electronic Governance, the Information Technology Bill [IT
Bill] passed by Indian Parliament on May 17 , 2000.The Information Technology Act [IT Act] came
into effect on 17th October 2000.
4. Various types of computer crimes defined and stringent penalties provided under the Act.
7. Power of police officers and other officers to enter into any public place and search and arrest
without warrant
8. Constitution of Cyber Regulations Advisory committee who will advice the Central
Government and Controller.
Information Technology [Amendment] Act, 2008
Rapid increase in the use of computer and Internet has given rise to new forms of crimes like,
sending offensive emails and multimedia messages, child pornography, cyber terrorism, publishing
sexually explicit materials in electronic form, video voyeurism, breach of confidentiality and leakage
of data by intermediary, e‐commerce frauds like cheating by personation – commonly known as
phishing, identity theft, frauds on online auction sites, etc. So, penal provisions were required to the
included in the Information Technology Act, 2000. Also, the Act needed to be technology neutral to
provide alternative technology of electronic signature for bringing harmonization with Model Law on
electronic Signatures adopted by United Nations Commission on International Trade Law
[UNICITRAL]
Keeping in view the above, Government had introduced the Information Technology
[Amendment] Bill, 2006 in the Loka Saba on 15th December 2006.. Both Houses of Parliament passed
the Bill on 23rd December 2008.Subsequently the Information Technology [Amendment] Act, 2008
received the assent of President on 5th February 2009 and was notified in the Gazette of India..
The Amendment provides for eight different types of offences, which range from using
computer resource code or communication device to disseminating and composing information which
is false, offensive or menacing in nature, fraudulent, dishonest use of electronic signatures, password
or other identification features to any computer source or communication device in capturing,
publishing or transmitting any form of obscene images and visuals, as being crimes affecting
individuals or other persons. Cyber cafes have been brought in the net, increasing accountability of
intermediaries, thereby including search engines, service providers, online markets, without clarity on
how to trap the fox. These provisions structured in a diffused manner, with unrelated aspects such as
cyber terrorism clauses juxtaposed in between.
• Privacy
• Intellectual Property
• Free Speech
• Taxation
• Computer Crimes
• Consumer Protection
• Ethics
Notice/Awareness
Notice of collection practices prior to collecting information
Choice/consent
Consumers to be made aware of options and give consent
Access/participation
Must be able to access and challenge information
Integrity/Security
Must be assured data is secure
Enforcement/Redress
Companies must tell consumers how and why personal data is collected and who it's shared with
******************
Latest Model question paper 2014
Part-B
Section A
1. What is E- Commerce?
2. Explain EDI
3. What is B2E?
4. What do you mean by Trojan horse?
5. What is VoIP?
6. Define E-Cash?
7. What is SOA?
8. What do you under stand by HTTP?
9. Define Switching hub
Section B
Section C
******************
Model question paper 2012
Part-B
Section A
1.Define EDI
2.What is telnet?
3.What is SOA?
4.What is a web serive?
5.What is C2C E-Commerce?
6.What is Electronic Purse?
7.What is Electronic Tokens?
8.What are EDI standards?
9.Explain Advertorials & E-zines
Section B
Section C
***************
UNIT – V
PART - A
1. Define digital cash or e-cash. Elucidate with example how an online Banking system
works.
2. The major ethical, social, and political issues that have developed around e commerce
over the past seven to eight years Analyze this statement by explaining dimensions of
ecommerce
3. Predict the main characteristics of cash payment in contrast with cheque payment? Why
are governments not sympathetic to large cash transactions in E-Commerce?
4. Elucidate how cash transactions take place in E-Commerce. What special precautions
should be taken by a bank to ensure that a customer does not Double spend the same
electronic coins issued to him/her?
5. Most small e-businesses rely on established Internet transaction providers for their
payment and security systems. Support this statement by pointing out the two common e-
commerce security protocols
6. Prove that in the Both in-store and online businesses collect customer data for a variety of
reasons and collecting customer data allow a company to enhance a customer’s
s=hopping experience, making the customer more satisfied and increasing the company’s
revenue.
PART – B
1. Justify the statement A computer virus is program code that has been designed to copy
itself into other such codes or computer files.
2. Ethics is at the heart of social and political debates about the Internet. Ethics is the study
of principles that individuals and organizations can use to determine right and wrong
courses of action. Analyze this statement by explaining four Basic Ethical Concepts
3. Analyze the statement “Intellectual Property Rights (IPR) is about creations of the mind,
they are granted to creators of IP, for ideas which are new and original, by the
respective governments.”
4. Analyze the statement “External security threats originate from outside the organization,
usually in the form of a hacker breaking into a system.”
5. Prove that IP is protected in law by, for example, patents, copyright and trademarks,
which enable people to earn recognition or financial benefit from what they invent or
create
6. Most small e-businesses rely on established Internet transaction providers for their
payment and security systems. Support this statement by pointing out the two common
e-commerce security protocols
REFERENCES