Merce 1& 2
Merce 1& 2
An Overview to E-commerce
1.1 Introduction of E-Commerce
Recently most commercial transactions still take place through conventional channels, rising
numbers of consumers and businesses are using the Internet for electronic commerce. Projections
show that by 2006, total e-commerce spending by consumers and businesses could surpass $5
trillion (e-marketer, 2004 and 2003).
Today, networking and the Internet are nearly synonymous with doing business. Firms’
relationships with customers, employees, suppliers, and logistic partners are becoming digital
relationships. As a supplier, you cannot do business with national and international retailers
unless you adopt their well-defined digital technologies. As a consumer, you will increasingly
interact with sellers in a digital environment. As an employer, you’ll be interacting more
electronically with your employees and giving them new digital tools to accomplish their work.
So much business is now enabled by or based upon digital networks that we use the terms
electronic business and electronic commerce frequently throughout this text. Electronic business,
or e-business, designates the use of Internet and digital technology to execute all of the activities
in the enterprise. E-business includes activities for the internal management of the firm and for
coordination with suppliers and other business partners. It also includes electronic commerce, or
e-commerce. E-commerce is the part of e-business that deals with the buying and selling of
goods and services electronically with computerized business transactions using the Internet,
networks, and other digital technologies. It also encompasses activities supporting those market
transactions, such as advertising, marketing, customer support, delivery, and payment.
To sum up E-commerce is the use of the Internet and the Web to transact business. Digitally
enabled transactions include all transactions mediated by digital technology. For the most part,
this means transactions that occur over the Internet and the Web. Commercial transactions
involve the exchange of value (e.g., money) across organizational or individual boundaries in
return for products and services. Exchange of value is important for understanding the limits of
e-commerce. Without an exchange of value, no commerce occurs.
The early years of e-commerce were a period of explosive growth and extraordinary innovation,
beginning in 1995 with the first widespread use of the Web to advertise products. This period of
explosive growth was capped in March 2000 when stock market valuations for dot.com
companies reached their peak and thereafter began to collapse.
The field of e-commerce is broad. There are many applications of EC, such as home banking,
shopping in electronic malls, buying stocks, finding a job, conducting an auction, collaborating
electronically with business partners around the globe, and providing customer service. The
implementation of various EC applications depends on four major support categories, shown as
supporting pillars: people, public policy, and marketing/advertising and supply chain
logistics. The EC management within each organization coordinates the applications,
infrastructure, and pillars.
Behavioral Approaches- In the behavioral area, information systems researchers are primarily
interested in e-commerce because of its implications for firm and industry value chains, industry
structure, and corporate strategy. The information systems discipline spans the technical and
behavioral approaches. For instance, technical groups within the information systems specialty
also focus on data mining, search engine design, and artificial intelligence. Economists have
E-commerce has seven unique characteristics that distinguish from the traditional business
transaction. These are ubiquity, global reach, universal standards, richness, information density
and personalization/customization. Each unique characteristic are discussed below from business
significance and e-commerce technology dimension.
A. Ubiquity
In traditional commerce, a marketplace is a physical place you visit in order to transact. For
example, television and radio typically motivate the consumer to go some-place to make a
purchase. E-commerce, in contrast, is characterized by its ubiquity: it is available just about
everywhere, at all times. It liberates the market from being restricted to a physical space and
B. Global Reach
C. Universal Standards
One strikingly unusual feature of e-commerce technologies is that the technical standards of the
Internet, and therefore the technical standards for conducting e-commerce, are universal
standards—they are shared by all nations around the world. In contrast, most traditional
commerce technologies differ from one nation to the next. For instance, television and radio
standards differ around the world, as does cell telephone technology. The universal technical
standards of the Internetand e-commerce greatly lower market entry costs—the cost merchants
must pay just to bring their goods to market. At the same time, for consumers, universal-
D. Richness
Information richness refers to the complexity and content of a message (Evansand Wurster,
1999). Traditional markets, national sales forces, and small retail-stores have great richness: they
are able to provide personal, face-to-face service using aural and visual cues when making a sale.
The richness of traditional markets makes them a powerful selling or commercial environment.
Prior to the development of the Web, there was a trade-off between richness and reach: the larger
the audience reached, the less rich the message .
E. Interactivity
Unlike any of the commercial technologies of the twentieth century, with the possible exception
of the telephone, e-commerce technologies allow for interactivity,meaning they enable two-way
communication between merchant and consumer.Television, for instance, cannot ask viewers
any questions or enter into conversations with them, and it cannot request that customer
information be entered into a form.
In contrast, all of these activities are possible on an e-commerce Web site.Interactivity allows an
online merchant to engage a consumer in ways similar to aface-to-face experience, but on a
much more massive, global scale.
F. Information Density
G. Personalization/Customization
E-commerce technologies permit personalization: merchants can target their marketing messages
to specific individuals by adjusting the message to a person’s name, interests, and past purchases.
The technology also permits customization—changing the delivered product or service based on
a user’s preferences or prior behavior. Given the interactive nature of e-commerce technology,
much information about the consumer can be gathered in the marketplace at the moment of
purchase.With the increase in information density, a great deal of information about the
consumer’s past purchases and behavior can be stored and used by online merchants.The result is
a level of personalization and customization unthinkable with existing commerce technologies.
For instance, you may be able to shape what you see on television by selecting a channel, but
you cannot change the contents of the channel you have chosen. In contrast, the online version of
In e-commerce there may be no physical store, and in most cases the buyer and seller do not see
each other. The Web and telecommunications technologies play a major role, in e-commerce.
Although the goals and objectives of both e-commerce and traditional commerce are the same—
selling products and services to generate profits—they do it quite differently. Traditional
commerce presents product information by using magazines, flyers. On the other hand, e-
commerce presents by using web sites and online catalogs. Traditional commerce communicates
by regular mail, phone yet e-commerce by e-mail. Traditional commerce checks product
availability by phone, fax and letter. However, e-commerce checks by e-mail, web sites, and
internal networks. Traditional commerce generates orders and invoices by printed forms but e-
commerce by e-mail, and web sites. Traditional commerce gets product acknowledgments by
phone and fax. On the other hand, e-commerce gets by e-mail, web sites, and EDI. It is
important to notice that currently many companies operate with a mix of traditional and e-
commerce. Just about all medium and large organizations have some kind of e-commerce
presence. The followings are some examples, Toys-R-Us, Wal-Mart Stores, GoldPC, and Vatan
Computer.
1. Being able to conduct business 24 x 7 x 365: E-commerce systems can operate all day
every day. Your physical storefront does not need to be open in order for customers and
suppliers to be doing business with you electronically.
2. Access the global market place: The Internet spans the world, and it is possible to do
business with any business or person who is connected to the Internet. Simple local
businesses such as specialist record stores are able to market and sell their offerings
internationally using e-commerce. This global opportunity is assisted by the fact that, unlike
traditional communications methods, users are not charged according to the distance over
which they are communicating.
1. Time for delivery of physical products: It is possible to visit a local music store and walk
out with a compact disc or a bookstore and leave with a book. E-commerce is often used to
buy goods that are not available locally from businesses all over the world, meaning that
physical goods need to be delivered, which takes time and costs money. In some cases there
are ways around this, for example, with electronic files of the music or books being accessed
across the Internet, but then these are not physical goods.
2. Physical product, supplier & delivery uncertainty: When you walk out of a shop with an
item, it's yours. You have it; you know what it is, where it is and how it looks. In some
respects e-commerce purchases are made on trust. This is because, firstly, not having had
physical access to the product, a purchase is made on an expectation of what that product is
and its condition. Secondly, because supplying businesses can be conducted across the world,
it can be uncertain whether or not they are legitimate businesses and are not just going to take
your money. It's pretty hard to knock on their door to complain or seek legal recourse!
Thirdly, even if the item is sent, it is easy to start wondering whether or not it will ever
arrive.
3. Perishable goods: Forget about ordering a single gelato ice cream from a shop in Rome!
Though specialized or refrigerated transport can be used, goods bought and sold via the
Internet tend to be durable and non-perishable: they need to survive the trip from the supplier
to the purchasing business or consumer. This shifts the bias for perishable and/or non-durable
goods back towards traditional supply chain arrangements, or towards relatively more local
e-commerce-based purchases, sales and distribution. In contrast, durable goods can be traded
from almost anyone to almost anyone else, sparking competition for lower prices. In some
cases this leads to disintermediation in which intermediary people and businesses are
bypassed by consumers and by other businesses that are seeking to purchase more directly
from manufacturers.
4. Limited and selected sensory information: The Internet is an effective conduit for visual
and auditory information: seeing pictures, hearing sounds and reading text. However it does
not allow full scope for our senses: we can see pictures of the flowers, but not smell their
fragrance; we can see pictures of a hammer, but not feel its weight or balance. Further, when
The first recorded description of the social interactions that could be enabled through networking
was a series of memos written by J.C.R. Licklider of MIT in August 1962 discussing his
“Galactic Network” concept. He envisioned a globally interconnected set of computers through
which everyone could quickly access data and programs from any site. In spirit, the concept was
very much like the Internet of today.
The Internet has shown extraordinary growth patterns when compared to other electronic
technologies of the past. It took radio 38 years to achieve a 30% share of U.S. households. It took
television 17 years to achieve a 30% share. Since the invention of a graphical user interface for
the World Wide Web in 1993, it took only 10 years for the Internet/Web to achieve a 53% share
of U.S. households.
The Internet today is a widespread information infrastructure, the initial prototype of what is
often called the National (or Global or Galactic) Information Infrastructure. Its history is
complex and involves many aspects - technological, organizational, and community. And its
influence reaches not only to the technical fields of computer communications but throughout
society as we move toward increasing use of online tools to accomplish electronic commerce,
information acquisition, and community operations.
2.2. The Internet, Intranets, Extranets and the World Wide Web
2.2.1. The Internet
Internetis a worldwide network of computer networks built on common standards. We can also
defined internet as "A collection of interconnected networks using the Internet Protocol which
allows them tofunction as a single, large virtual network."Created in the late 1960s to connect a
small number of mainframe computers and their users, the Internet has since grown into the
world’s largest network, connecting over 500 million computers worldwide. The Internet links
businesses, educational institutions, government agencies, and individuals together, and provides
users with services such as e-mail, document transfer, newsgroups, shopping, research, instant
messaging, music, videos, and news.One of the key advantages of an intranet is the broad
availability and use of software applications unique to the needs of a corporation
2.2.3. Extranets
An extranet is a collaborative network that uses internet technology to link businesses with their
suppliers, customers or other businesses that share common goals. Extranets are usually linked to
business intranets where information is either accessible through a password system or through
links that are established collaboratively.
A firm can create an extranet to allow authorized vendors and customers to have limited access
to its internal intranet. For example, authorized buyers could link to a portion of a company’s
intranet from the public Internet to obtain information about the costs and features of the
company’s products. The company can use firewalls to ensure that access to its internal data is
limited and remains secure; firewalls can also authenticate users, making sure that only
authorized users can access the site.
Both intranets and extranets reduce transaction and agency costs by providing additional
connectivity for coordinating disparate business processes within the firm and for linking
electronically to customers and suppliers. Private industrial networks are based on extranets
because they are so useful for linking organizations with suppliers, customers, or business
partners. Extranets often are employed for collaborating with other companies for supply chain
management, product design and development, and training efforts. Extranets uses TCP/IP
protocol network (like the internet) to link intranet in different location or specific protocols.
Extranet Benefits
• timeliness and accuracy of communications, reducing errorsandmisunderstandings
• Allows central management of documents allowing single updates
• Uses standard web protocols
• Easy to use, requires little training
• Used to automate transactions, reducing cost and cycle time
• Increased partner interaction, and improvedprocesses.
Table 2.1.Overview: Internet, Intranet, and Extranet
E-Commerce and Supply Chain Information System Page 15
Typical users Types of access Information
Internet Any individual with dial- Unlimited, public; no General, public and
up access or LAN restrictions advertisement
Intranet Authorized employees only Private and restricted Specific, corporate and
proprietary
Extranet Authorized groups from Network type shared in authorized
collaborating companies collaborating groups
As mentioned the Web was developed in the early 1990s and hence is of much more recent
vintage than the Internet. The Web provides easy access to over 8 billion Web pages created in a
language called HTML (HyperText Markup Language). These HTML pages contain information
—including text, graphics, animations, and other objects—made available for public use. You
can find an exceptionally wide range of information on Web pages, ranging from the entire
catalog of Sears Roebuck, to the entire collection of public records from the Securities and
Exchange Commission, to the card catalog of your local library, to millions of music tracks
(some of them legal), and videos.
The Internet prior to the Web was primarily used for text communications, file transfers, and
remote computing. The Web introduced far more powerful and commercially interesting,
colorful multimedia capabilities of direct relevance to commerce. In essence, the Web added
color, voice, and video to the Internet, creating a communications infrastructure and information
A TCP/IP internet provides three sets of services as shown in the following figure
A web page (or webpage) is a web document that is suitable for the World Wide Web and the
web browser.A web browser displays a web page on a monitor or mobile device. The web page
is what displays, but the term also refers to a computer file, usually written in HTML or
comparable markup language, whose main distinction is to provide hypertext that will navigate
to other web pages via links.
Web page - A Web page is a simple text file that contains not only text, but also a set of HTML
tags that describe how the text should be formatted when a browser displays it on the screen. The
tags are simple instructions that tell the Web browser how the page should look when it is
displayed. The tags tell the browser to do things like change the font size or color, or arrange
things in columns. The Web browser interprets these tags to decide how to format the text onto
the screen.
Web browser - A Web browser, like Netscape Navigator or Microsoft Internet Explorer, is a
computer program (also known as a software application, or simply an application) that does two
The birth of electronic mail (email) occurred in the early 1960s. The mailbox was a file in a
user's home directory that was readable only by that user. Primitive mail applications appended
new text messages to the bottom of the file, making the user had to wade through the constantly
growing file to find any particular message. This system was only capable of sending messages
to users on the same system.
The first network transfer of an electronic mail message file took place in 1971 when a computer
engineer named Ray Tomlinson sent a test message between two machines via ARPANET —
the precursor to the Internet.
Email protocols are the languages and rules that email servers and clients use to communicate
with each other and manage incoming and outgoing mail. Electronicmail isthe transmission of
messages over communications networks. The messages can be notes entered from the keyboard
or electronic files stored on disk. Companies that are fully computerized make extensive use of
e-mail because it is fast, flexible, and reliable. These protocols are strictly defined and are in use
in a variety of different email clients. In addition, each email protocol has a unique way of
managing email that is sent and received from an email account.
The following protocols discussed are the most commonly used in the transfer of email.
Mail delivery from a client application to the server, and from an originating server to the
destination server, is handled by the Simple Mail Transfer Protocol (SMTP).
The primary purpose of SMTP is to transfer email between mail servers. However, it is critical
for email clients as well. To send email, the client sends the message to an outgoing mail server,
which in turn contacts the destination mail server for delivery. For this reason, it is necessary to
specify an SMTP server when configuring an email client.
Under Red Hat Enterprise Linux, a user can configure an SMTP server on the local machine to
handle mail delivery. However, it is also possible to configure remote SMTP servers for
outgoing mail.
One important point to make about the SMTP protocol is that it does not require authentication.
This allows anyone on the Internet to send email to anyone else or even to large groups of
people. It is this characteristic of SMTP that makes junk email or spam possible. Modern SMTP
servers attempt to minimize this behavior by allowing only known hosts access to the SMTP
server. Those servers that do not impose such restrictions are called open relay servers.
Unlike SMTP, both of these protocols require connecting clients to authenticate using a
username and password. By default, passwords for both protocols are passed over the network
unencrypted.
The default POP server under Red Hat Enterprise Linux is /usr/sbin/ipop3d and is provided by the
IMAP package. When using a POP server, email messages are downloaded by email client
applications. By default, most POP email clients are automatically configured to delete the
message on the email server after it has been successfully transferred, however this setting
usually can be changed.
POP is fully compatible with important Internet messaging standards, such as Multipurpose
Internet Mail Extensions (MIME), which allow for email attachments.
POP works best for users who have one system on which to read email. It also works well for
users who do not have a persistent connection to the Internet or the network containing the mail
server. Unfortunately for those with slow network connections, POP requires client programs
upon authentication to download the entire content of each message. This can take a long time if
any messages have large attachments.
The most current version of the standard POP protocol is POP3. There are, however a variety of
lesser-used POP protocol variants:
APOP— POP3 with MDS authentication. An encoded hash of the user's password is sent
from the email client to the server rather than sending an unencrypted password.
KPOP— POP3 with Kerberos authentication.
RPOP— POP3 with RPOP authentication. This uses a per-user ID, similar to a password,
to authenticate POP requests. However, this ID is not encrypted, so RPOP is no more
secure than standard POP.
Advantages POP3
simple protocol
Easier to implement
Copies all messages when connection is made.
When not connected, still access and read downloaded mail.
Disadvantages POP3
If mail in different format, hassle to transfer mail.
synchronize their local inbox/server
The default IMAP server under Red Hat Enterprise Linux is /usr/sbin/imapd and is provided by the
IMAP package. When using an IMAP mail server, email messages remain on the server where
users can read or delete them. IMAP also allows client applications to create, rename, or delete
mail directories on the server to organize and store email.
IMAP is particularly useful for those who access their email using multiple machines. The
protocol is also convenient for users connecting to the mail server via a slow connection, because
only the email header information is downloaded for messages until opened, saving bandwidth.
The user also has the ability to delete messages without viewing or downloading them.
For convenience, IMAP client applications are capable of caching copies of messages locally, so
the user can browse previously read messages when not directly connected to the IMAP server.
IMAP, like POP, is fully compatible with important Internet messaging standards, such as
MIME, which allow for email attachments.
Advantages IMAP
- can store message
- Can access/manage multiple mail boxes.
- New/old mail can be accessed from any pc.
There are many different markup languages. This site focuses on HTML and XML, but there are
lots of other markup languages. And there are three that you should be aware of if you are doing
web design or development: HTML, XML, and XHTML.
XML is a language for documents identifying structured data in a quite simple way. Structured
data includes both content (e.g., words, pictures) and some action indication (markup; tags). For
instance, content in a section heading has a different meaning from content in a footnote, which
means something different than content in a figure caption or content in a database table. XML
documents are text based. Therefore, after creating your document, you can share it with
everybody regardless of the computer or operating system s/he uses.
How does XML differ from SGML?
SGML has been the standard, vendor-independent way to maintain repositories of structured
documentation for more than a decade. It is a complex meta-language (a language designed for
talking about other languages) used to exchange documents.
However, it is not well suited to serving documents over the web (for a number of technical
reasons). Because XML comes from SGML, any fully conformant SGML system reads XML
documents. However, using and understanding XML documents does not require a system that is
capable of understanding the full generality of SGML. XML has 10% of the complexity and 90%
of the power of SGML.
How does XML differ from HTML?
XML documents use the same syntax as HTML pages (e.g., tags, attributes). Although XML and
HTML are similar in lineage and construction, they are two very different markup languages.
Importantly, XML can solve problems that HTML has.
HTML Limitations:
HTML doesn't include the mechanisms for maintaining fine control. A web designer can't
specify the display size of a document or control the size of a browser window. Although
HTML 4.0 includes <font> tags to help a web designer manipulate font style, size, and
color, users can override these settings with their own.
An XML editor is a markup language editor with added functionality to facilitate the editing of
XML. This can be done using a plain text editor, with all the code visible, but XML editors have
added facilities like tag completion and menus and buttons for tasks that are common in XML
editing, based on data supplied with document type definition (DTD) or the XML tree.
There are also graphical XNL editors that hide the code in the background and present the
content to the user in a more user-friendly format, approximating the rendered version or editing
forms. This is helpful for situations where people who are not fluent in XML code need to enter
information in XML based documents such as time sheets and expenditure reports. And even if
the user is familiar with XML, use of such editors, which take care of syntax details, is often
faster and more convenient.
Technologies such the PC, local area networks (LANs), and more widely based corporate networks have
been adopted, and within an organization, this has enabled the application (e.g., a material requirements
planning system) to be brought closer to the end user and has facilitated the sharing of information among
applications across common databases. This implementation of technology has brought with it real
business benefits to the organization.
There is, however, a further dimension to the implementation of IT, and this is the electronic exchange of
information between the applications of different organizations: electronic data interchange. The business
requirement for EDI is clear: Whatever the business, organizations must be able to trade in order to
survive. To achieve this, documents such as orders, delivery instructions, and invoices must be
interchanged and processed. Furthermore, because market conditions can change rapidly, these
communications must be fast and accurate, with administrative processes minimized to ensure that, at all
times, market opportunities are exploited and profits are maximized. In other words, the organization
needs to communicate effectively with all of its trading partners, whatever their function in the supply
chain, whatever their size, and wherever they are. EDI services allow the exchange of trading data, such
as orders and invoices, directly from one computer system to another, regardless of its make, size, or
location and without the need for manual intervention. As such, the consequential benefits to be obtained
from the use of EDI are very significant.
In the ordering process alone, the speed of moving information means that the supply chain can work
together to ensure the right stock is in the right place, to ensure that the order is delivered on time, to
ensure that the market opportunity has been captured, and to minimize working capital in the process. In
short, EDI gives competitive advantage in competitive markets.
The winners of the 21st century will be those organizations that not only implement but also
exploit IT and particularly EDI more creatively, more efficiently, and more successfully than
their competitors. They will be companies that form much closer working relationships with their
trading partners, customers and suppliers, and EDI will be a key enabler in this process.
The Fundamentals of EDI
E-Commerce and Supply Chain Information System Page 29
There are many different ways in which two businesses can communicate with one another: face to face
meetings; paper transactions; telephone conversations; the telex or the fax; and, more recently, electronic
mail. In each of these cases, an “operator” is required within each organization for the communication to
be completed — in essence, they are all forms of person-to-person communications.
In addition to personal communications, IT has allowed organizations to offer trading partners access to
their computer systems (including airline reservation systems and insurance quotation systems) by a
variety of communication methods. Whilst one “operator” becomes the computer system, it is still,in
essence, interrogated by a person at the other end; hence, we have person-tocomputer communications.
EDI takes this one step further: a dialogue between two computer applications without the need for any
personal intervention. EDI transactions are designed to be generated by a computer application, not a
person. Likewise, an EDI transaction coming into a company is not designed to be printed and read but
rather to be entered directly into a computer application.
Benefits of EDI
Most firms with EDI systems fall somewhere between partially integrated EDI systems and fully
integrated EDI systems. Firms engaged in the process of just-in-time (JIT) raw materials inventory
systems typically use fully integrated EDI systems to ensure that the supplies necessary for the production
process arrive too early, the production plants have costs associated with maintaining the inventory; if the
goods arrive too late, the production stops which costs the purchasing organization money.
Reduced lead time from placing the order to receiving the goods for manufacturing and retail
firms and reduced lead time in processing claims for insurance and medical professions and other
service organizations.
Cost and time savings, Speed, Accuracy, Security, System Integration, Just-In-Time Support.
Reduced paper-based systems, i.e. record maintenance, space, paper, postage costs