E-Commerce 4 Unit
E-Commerce 4 Unit
E-cheques
E-cheques are cheques that are written and processed
electronically. This means that the funds are transferred from
the payer's account to the payee's account through an
electronic network instead of a physical cheque. These
cheques are also known as “digital cheques” or “electronic
cheques”.
The only difference between writing a regular cheque and
writing an e-cheque is that with an e-cheque, you don’t need
to write “Pay to the order of” followed by the name of the
person or company to which you’re sending payment. The
name of the payee is automatically included in the e-cheque
information.
Credit Card
A credit card is a type of credit facility, provided by banks
that allow customers to borrow funds within a pre-approved
credit limit. It enables customers to make purchase
transactions on goods and services. The credit card limit is
determined by the credit card issuer based on factors such as
income and credit score, which also decides the credit limit
The credit card information includes credit card number,
cardholder’s name, expiration date, signature, CVC code, etc.
The best part about a credit card is that it is not linked to a
bank account. So, whenever you swipe your credit card, the
amount is deducted from your credit card limit, not your
bank account. You can use it to pay for food, clothes, take
care of medical expenses, travel expenses, and other lifestyle
products and emergency services.
Smart card
A smart card is a plastic card that contains a microprocessor
and a memory chip or just a memory chip. The
microprocessor card has the ability to add, delete and
manipulate information on the card. A memory-chip card,
such as a phone card, can only add information.
Electronic purse
Electronic purse - it is a mechanism that allows end users to
pay electronically for goods and services. The functions of the
electronic purse is to maintain a pool of value that is
incrementally reduced as transaction performed.
Electronic purse is an electronic system e-commerce, based
on smart card. Electronic purse must ensure the security of
each transaction
Examples of Electronic purse - Apple Pay, Samsung Pay,
Google Pay
E-billing
Electronic billing or e-billing is the process by which bills are
sent and paid electronically. This process enables customers
to receive bills via email, web portal, or even in machine-
readable data formats, facilitating more efficient delivery and
payment.
E-billing is a process used by accounts receivable staff to
invoice customers and receive payments electronically.
Customers can access their e-bills on the company's website,
or the e-bill can be delivered via an email attached with an
electronic document, such as a PDF or XML file.
Any information that appears on a traditional printed invoice
will be on an e-bill. That includes the date the bill was issued,
the amount owed, the date payment is due, the goods or
services that were provided and payment terms. An e-bill
often contains a clickable link to a payment portal, where the
customer can pay electronically using their bank account or
credit card information. E-bills make payment easier and
more convenient for customers, which in turn may result in
faster payment and increased customer satisfaction.
E-MARKETING
E-marketing is a process of planning and executing the
conception, distribution, promotion, and pricing of products
and services in a computerized, networked environment,
such as the Internet and the World Wide Web, to facilitate
exchange and satisfy customer demands. It has two distinct
advantages over traditional marketing. E-marketing provides
customers with more convenience and more competitive
prices, and it enables businesses to reduce operational costs.
As businesses offer e-marketing and online shopping,
customers can get market information from their computers
or cell phones and buy goods or find services without leaving
home twenty-four hours a day and seven days a week (24/7).
They can read ads on the Web or from e-mail, get e-coupons,
view pictures of goods, compare prices, and make purchases
with a few clicks of their mouse, saving the time and money
it would take to shop in person at a brick-and-mortar store.
At the same time, e-businesses can reduce costs in
distribution channels and physical store space and thus pass
the savings on to customers.
E- Customer Relationship Management
An E-CRM (electronic customer relationship management)
platform is a virtual program that lets you store all customer
data in one digital database, giving you better insights to
hone your sales and marketing strategies.
Electronic customer relationship management (E-CRM) is the
application of Internet-based technologies such as emails,
websites, chat rooms, forums and other channels to achieve
CRM objectives.
An effective E-CRM increases the efficiency of the processes
as well as improves the interactions with customers and
enables businesses to customize products and services that
meet the customers’ individual needs.
Electronic customer relationship management is motivated
by easy Internet access through various platforms and
devices such as laptops, mobile devices, desktop PCs and TV
sets. It is not software, however, but rather the utilization of
Web-based technologies to interact, understand and ensure
customer satisfaction.
An effective E-CRM system tracks a customer’s history
through multiple channels in real time, creates and maintains
an analytical database, and optimizes a customer’s relation in
the three aspects of attraction, expansion and maintenance.
Transportation Planning
e-SCM facilitates the allocation of resources to ensure that
raw materials and finished goods are delivered to the right
people at the right time and in the right place. It ensures that
processes are in line with the planning schedule. It also helps
in comparing various transportation modes available, such as
railways, trucks, and airlines along with their availability. This
will help the organizations in finding the most appropriate
mode of transport for delivering raw materials and products.
Distribution Planning
An organization needs to distribute finished products in
inventories to retailers, wholesalers, and customers as per
the requested orders. e-SCM helps in distribution planning by
integrating various distribution channels, product inventory,
and logistics with demand forecasting, production
scheduling, and transportation planning. This will enable the
organization to distribute the right products through the
right distribution channels on time.
Order Commitment
e-SCM enables organizations to precisely estimate the
delivery dates of suppliers through a comprehensive demand
fulfillment cycle. The organizations can interconnect order
commitment with the rest of the supply chain departments
to ensure accurate delivery of goods and services.
Security issues to E-
commerce:-
The people who buy goods that are the retailers from e-
commerce sites face security problems and lose their money
and data every year. The retailers are aware of the security
threats and the ways to control them depending on the
threat as given below,
Data steal
The main motive for the hackers is to steal the personal
data of the customers who have logged in or using
particular e-commerce sites. The data is then sold in the
black market for money.
So, e-commerce sites should assure the safety of
customers from any threats.
Scam
The Attackers send an email or message using the logo and
information like a legitimate site, to reroute the users to
provide some personal information. It is also possible the
virus enters the system via this email using any link.
Malware Attack
The most common security threat is the malware, virus,
Trojan horse, and ransom attack. Through any unwanted
message or link, the hacker enters the system and installs the
malware in the main system, and transfers all the data to
their site or corrupts the sensitive data.
Product Return
The Hackers will imitate the customers and pretend to
believe that the product is returned and so the money is
transferred. Some fraudulent request a refund for the good
which not bought. The stolen debit or credit cards will be
used to buy goods and after some time will file a request that
the card is stolen and return the payment.
Man-in-middle Attack
The hacker places themselves between the user and the e-
commerce site which makes the new connection for the theft
of information and also tracks the user’s activity.
Bad bots
The bots are an autonomous program that helps to interact
with other systems. So, the hackers send a malicious bot into
the e-commerce website cart page and make the customer
pay ten times the amount.
Conclusion
The mentioned e-commerce security risks may be
frightening, but there are ways to stop them from affecting
the e-commerce marketplace. While some require
specialized software, others can be implemented with no
additional effort. Beyond safeguarding the online store, the
customers will appreciate that their personal information and
data are kept private.
1. Financial fraud
Financial fraud takes various types. It involves hackers
gaining access to your customer's personal information or
payment information, then selling that information on the
black market. It also involves fraudsters
using stolen credit card information to make illegal purchases
from your e-commerce store
2. Phishing
A fraud SMS, social media message, voice mail, or other
message asks the receiver to update their account details,
change their password, or tell them their account has been
close. The message includes a link used to steal the victim's
personal information.
Customers are the target in a phishing scam, where a
fraudster sends messages or emails to you with the goal of
obtaining their private information. These messages may
contain logos, URLs, and other information that appears to
be legal, but those are illegal. They'll ask customers to verify
their account by logging in and then use the information to
steal personal data.
3. Spamming
Spamming is the activity of sending advertisement messages
by email to people who do not want to receive them.
Spamming is the use of messaging systems to send multiple
spam messages to large numbers of user for the purpose of
commercial advertising, or repeatedly sending the same
message to the same user.
In an attempt to obtain personal information—or to affect
your website's performance—spammers may leave infected
links in their comments or messages on your website, such as
on blog posts or contact forms. If you click on the links, they
can take you to a spam website that exposes you to malware.
4. Malware
Malware attacks are any type of malicious software designed
to cause harm or damage to a computer, server, client or
computer network and/or infrastructure without end-user
knowledge.
Malware refers to malicious programs such as spyware,
viruses, trojan horses, and ransomware. Hackers install it on
your computer system and spread it to your customers and
administrators, where it might swipe sensitive data on their
systems and from your website.
5. Bad bots
People are generally aware that bots are all over the
Internet, obtaining information about our habits and
behaviours. Your competition, however, could use bots to
gather information about your inventory and prices. They
then use that information to change their prices. Or hackers
can send malicious bots to e- commerce checkout pages to
buy large amounts of a product and scalp it for up to 10
times the list price.
8. Man-in-the-middle attacks
With technology evolving, so are hackers' schemes. Man-in-
the-middle attacks allow the hacker to listen in on the
communications of e-commerce website users. These users
are tricked into using a public wireless network, enabling
hackers to access their devices and see their browsing
history. They can also access credit card information,
passwords, and usernames.
1) Antivirus Software
Antivirus software scans your system for malicious software
and blocks any threats. Once it detects a threat, it will alert
you and take the necessary steps to remove it.
It’s essential to have an antivirus installed on all computers
used in the business and on any mobile devices that access
the network. This is because malicious software can spread
quickly, and you don’t want to risk your customers’ data.
When choosing antivirus software, you must ensure that it is
up-to-date and provides the latest protection. Software
developers add more layers of security when they update
their software, so remember to keep up with the latest
versions.
2) Firewalls
Firewalls are another essential security tool for any e-
commerce business. They act as a barrier between your
network and the outside world, blocking malicious traffic
from entering your system. Firewalls can be either hardware
or software, but the ideal configuration is to have both. This
will ensure maximum protection for your network and
customers’ data.
This type of security tool is also helpful for allowing remote
access to a private network through secure authentication
certificates. Many businesses use this type of access to
manage their networks remotely.
3) Encryption Software
Encryption software protects sensitive data, such as credit
card numbers and passwords. It works by scrambling the
data so that it cannot be read or understood by anyone who
does not have the encryption key. This ensures that even if
someone were to gain access to your system, they would not
be able to read the data.
Encryption software is also useful for protecting data in
transit, such as when it is sent over the Internet. This ensures
that the data remains secure even when it is being
transmitted from one computer to another.
When choosing encryption software, make sure that it meets
the latest security standards and provides strong encryption
algorithms. You should also ensure that the software is
regularly updated with new features and security patches.
4) Biometrics
Another tech trend in the world of cyber security is
biometrics. Biometrics uses a person’s physical
characteristics to verify their identity and authenticity. These
include your eyes, voice, or behavioral characteristics.
Biometric data is perhaps one of the most reliable ways to
confirm a person’s legitimacy since it can’t be replicated or
forged easily.
Biometric authentication systems are becoming more
popular in e-commerce. You can use this system to verify the
identity of customers and employees and protect sensitive
data. Common biometric authentication systems include
fingerprint scanners, iris scanners, and facial recognition
software.
5) Access Management
When handling sensitive data, it’s important to have a system
that controls who has access to it. Access management works
by assigning roles and privileges to each user. This allows you
to control who can view, modify, or delete data. It also helps
to ensure that only authorized personnel have access to
sensitive information.
As a result, you may want to consider implementing an
access management system for your e-commerce business.
This will help you protect your data and ensure that only
authorized personnel can access it.
6) Digital Certificates
Digital certificates are another important security tool for any
e-commerce business. They are used to verify the identity of
a website or server and ensure that the data is secure. When
customers visit your website, they can check the digital
certificate to make sure that it is valid and that their data is
secure.
Digital certificates utilize Public Key Infrastructure (PKI),
which enables secure e-commerce and Internet-based
communication. They’re issued by a Certificate Authority (CA)
and contain information about the owner, such as their
name, address, and public key. This information is used to
verify the owner’s identity for secure communication.7
1. Fraud:
Consumers depend on cyber laws to protect them from
online fraud. Laws are made to prevent identity theft, credit
card theft, and other financial crimes that happen online. A
person who commits identity theft may face confederate or
state criminal charges. They might also encounter a civil
action brought by a victim. Cyber lawyers work to both
defend and prosecute against allegations of fraud using the
internet.
2. Copyright:
The internet has made copyright violations easier. In the
early days of online communication, copyright violations
were too easy. Both companies and individuals need lawyers
to bring an action to impose copyright protections. Copyright
violation is an area of cyber law that protects the rights of
individuals and companies to profit from their creative
works.
3. Defamation:
Several personnel uses the internet to speak their mind.
When people use the internet to say things that are not true,
it can cross the line into defamation. Defamation laws are
civil laws that save individuals from fake public statements
that can harm a business or someone’s reputation. When
people use the internet to make statements that violate civil
laws, that is called Defamation law.
5. Freedom of Speech:
Freedom of speech is an important area of cyber law. Even
though cyber laws forbid certain behaviours online, freedom
of speech laws also allows people to speak their minds. Cyber
lawyers must advise their clients on the limits of free speech
including laws that prohibit obscenity
6. Trade Secrets:
Companies doing business online often depend on cyber laws
to protect their trade secrets. For example, Google and other
online search engines spend lots of time developing the
algorithms that produce search results. They also spend a
great deal of time developing other features like maps,
intelligent assistance, and flight search services to name a
few. Cyber laws help these companies to take legal action as
necessary to protect their trade secrets.
Business ethics
There are about 12 ethical principles: honesty, fairness,
leadership, integrity, compassion, respect, responsibility,
loyalty, law-abiding, transparency, and environmental
concerns.