Module-1: Introduction of E-Commerce
Module-1: Introduction of E-Commerce
Introduction of E-Commerce
History of e-commerce
In 1968 e-commerce got its start through an electronic
data interface which allowed companies the ability to
complete transaction with each others.
reliability.
Types of E-commerce
Business to Business (B2B)
Business to Consumer (B2C)
Consumer to Business (C2B)
Consumer to Consumer (C2C)
Business to Government (B2G)
CONSUMER-TO-BUSINESS(C2B)
Consumer-to-business (C2B) is a business model where an end
user or consumer makes a product or service that an organization
uses to complete a business process or gain competitive advantage.
The C2B methodology completely transposes the traditional
business-to-consumer (B2C) model, where a business produces
services and products for consumer consumption.
In C2B, the companies typically pay for the product or service.
However, it can assume different forms like an idea generated by
an individual (like an innovative business practice) which may be
used and implemented by an organization.
Security
E-commerce security refers to the principles
which guide safe electronic transactions,
allowing the buying and selling of goods and
services through the Internet, but with
protocols in place to provide safety for those
involved.
A weak link in the chain can provide an
Threat to Client
Threat to Server
Threat to Communications Channel
Threat to Client
Client threats mostly arise from malicious data or code, malicious code
refers to viruses, worms, Trojan horses & deviant.
Trojan House- A program that performs a desired task but also performs
unexpected function.
Integrity threat
◦ Integrity means you will get the same response every time.
◦ An integrity threat presents when an unauthorized party can alter the
message stream of information.
◦ Unprotected payment transactions are come in integrity threat. Example-
Cyber vandalism
Contd…
Availability threats- Every system has defined
availability. It is also known as denial and delay
threat. It bringing down the availability of the system.
Example- ATM/IRCTC
Encryption
Encryption is the process of converting data to an
unrecognizable or encrypted form. In generic term it
refer to act of encoding data, so that those data can be
securely transmitted via the internet.
The purpose of converting data that only authorized
Plaintext
Encryption algorithm
Secret key
Cipher text
Decryption algorithm
Advantage of Secret Key Encryption
It is extremely secure.
Encrypting and decrypting the data from secret key is
relatively easy.
In this system only secret key can decrypt the message.
Disadvantage of Secret Key
Encryption
It cannot provide digital signature that can be
repudiated.
The only secure way of exchanging keys would be
Shamir Adleman).
Elements of Public Key Encryption
Plaintext
Encryption algorithm
Public and private key
Cipher text
Decryption algorithm
Advantage of Public Key Encryption
Only one part must be kept secret.
It can serve as a digital signature.
The pair of keys can be used with any other entity.
There is no need for initial key exchange.
Disadvantage of Public Key
Encryption
It is not efficient for long message.
Keys must be long (at least 1024 bits).
Slow do the enormous amount of computation
involved.
Association between an entity and its public key must
be verified.
Digital Signature
A digital signature is an electronic rather than a written
signature that can be used by someone to authenticate
the identity of the sender of the message or of the
signer of a document.
It is also referred as electronic signature or e- signature.
It is used to validate the authenticity and integrity of
message.
It confirms that the information originated from the
pages.
It enables encryption of sensitive information on e-
commerce sites.
Digital certificate negate the increasing perils and
It uses public key cryptography and digital certificate in such a way that client
and server can authenticate each other and engage in secure communication.
In the initial phase client and server select a key crypto scheme to use. Client then
sends the secret key to server using the server public key from the server
certificate. To see that information exchange between client and server being
encrypted.
In order for SSL connection to be made it is mandatory to have a digital
certificate installed on the web server.
online
E-mail exchanges
Transfer of files
Remote login
Smart Card
A smart card is a device with the dimensions of a credit card
that uses a small microchip to store and process data. In many
cases, smart cards have replaced old magnetic cards because
they can handle more information and provide more
functionality. Smart cards are now in use in many industries,
including retail, transit systems and security services.
It is plastic card with embedded microprocessor chip,
electronic memory and a battery.
It is used for information storage, authentication and payment
mechanism.
Features
Small plastic card embedded with an IC chip.
Chip can be either a memory or microprocessor type.
Useful for storing and transacting data.
Data is associated with either value, information or both.
Types of Smart Card
Contact smart cards are the most common type of smart card. Contact
smart cards are inserted into a smart card reader that has a direct
connection to a conductive contact plate on the surface of the card.
Memory smart cards contain memory chips can only store, read and
write data to the chip; the data on memory smart cards can be over-written
or modified, but the card itself is not programmable so data can't be
processed or modified programmatically. Memory smart cards can be read-
only and used to store data such as a PIN, password or public key; they can
also be read-write and used to write or update user data.
Microprocessor smart cards are cards with a
microprocessor and memory.
This smart card contains a small microchip that can
process and store thousands of bits of electronic data.
This type of chip is similar to those found inside all
personal computers and when implanted in a smart card,
manages data in organized file structures, via a card
operating system (COS).
Examples of Smart Card
Transit cards can be used by local and regional transit systems to
process payments as well as give riders points on their
purchases( Metro card).
Smart cards are used as ID cards issued by schools, corporations
and government entities to control access to physical locations.
Medical institutions use smart cards to securely store patient
medical records.
Loyalty Card
Simcard
Gift voucher
Memory card
Advantages
More secure – these card use encryption and
authentication technology which is more secure than
previous method.
Safe to transport- these card give the freedom to
Common standards
ANSI X12 is the standard that any industry can use
management)
Speed
Electronic transfer Vs mail/ courier
Accuracy
Avoids duplicate data entry and error margin
Security
Information less susceptible to interception/ falsification
EDI Issues
Initial and operative costs
Need to share master data with external partners
Security Concerns
Confidentiality of information
Authenticity of information
Requires continuous maintenance and resources
EDI APPLICATIONS IN
BUSINESS
Four different scenarios in industries that use EDI
extensively:
International or cross-border trade
Electronic funds transfer
Health care EDI for insurance claims processing
Manufacturing & retail procurement
Module -2
Electronic Payment System
Electronic payment system is a system which helps the
customer or user to make online payment for their
shopping.
It is also used to transfer money over the Internet.
84
Examples of EPS
Online reservation
Online bill payment
Online order placing
Ticket booking (Movie)
85
Designing an electronic payment
system
Technological Requirements
Economic Requirements
Social Requirements
Legal Requirements
86
Technological Requirements
When designing an electronic payment system, the system’s ability
of the effectiveness and the security of each transaction and the
degree of compatibility with the online shopping must be taken into
consideration.
A payment system requires the greatest level of security in
electronic commerce transactions.
It must have confidential, authenticity, integrity and non-repudiation
of transactions.
87
Economic Requirements
These deal with the cost of transaction which refers to the amount paid by the
client.
Economic assessments include also atomic exchange which means that the
consumer will pay money or something equivalent in value.
Economic needs also deal with financial risks, because consumers and merchants
are very concerned about the degree of security involved in online transactions.
89
Legal Requirements
Electronic payment system must abide by governmental
regulations and the law and guaranty all necessary proofs
(digital signature, certificate) to protect users performing
domestic/international transactions.
90
Phases in E-Payment
Registration: This phase involves the registration of the payer
and the payee with the issuer and acquirer respectively. Most
electronic payments designed require registration of payers and
payees with their corresponding banks so there is a link
between their identities and their accounts held at the bank.
Invoicing: In this phase, the payer obtains an invoice for
payment from the payee. This is accomplished by either
browsing and selecting products for purchase from the
merchant’s (payee’s) website in case of purchases made
through the internet or obtaining an electronic invoice using
other electronic communication medium like e-mail.
91
Contd…
Payment selection and processing: In this phase the payer
selects type of payment (card based, e-cash, e-wallet, etc)
based on the type of payment the payee accepts. Based on the
selection, the payer then sends the relevant payment details
like account number, unique identifiers of the payer to the
payee along with accepted amount based on the invoice.
Payment authorisation and confirmation: In this phase, the
acquirer on receiving payment details from the payee
authorises the payment and issues a receipt containing the
success or failure of the payment to the payee. The payee
based on the message may also issue a receipt of payment to
the payer.
92
Generic E- Payment System
93
Advantages of Electronic
payment system
Convenience: Individual can pay their bills and make
purchases at any location 24 hours a day, 7 days in a week and
365 days a year.
Time: Once the initial set up of the payment system for each
account is completed, an individual can pay his bills in a flash.
Cost: For the majority of the merchants, vendors and
businesses, there is no fees or charge to pay online.
Security: E- payments are secure because of encryption
technique.
94
Disadvantages of Electronic payment
system
Authentication: There is no way to authenticate or verify that
the individual entering the information online. There is no
request for picture identification or even a signature.
95
Participants and Elements involved in
processing payment
Acquiring bank- Acquiring bank is associative with merchant or
seller. For this merchant must open an account with acquiring bank
to enable online credit card authorization and payment processing.
Authorization- The process by which a customer’s credit card is
verified as active and the credit available to make a transaction.
Credit card association- A financial institution that provides credit
card services that and distributed by customer issuing bank. Ex-
Master Card , Visa and American express
Customer- The holder of the payment instrument such as a credit
card, debit card.
96
Contd…
Merchant- Someone who owns a company that sells product
or services.
Payment gateway- Payment gateway protects credit cards
details encrypting sensitive information, such as credit
card numbers, to ensure that information passes securely
between the customer and the merchant and also between
merchant and payment processor.
97
Types of electronic payment system
Payment card
Credit card
Debit card
Smart card
Charge card
98
Credit Card
A credit card is a plastic card issued by a financial company,
that lets cardholders borrow funds with which to pay for goods
and services.
99
Purchase process by Credit Card
Making the Purchase
The customer finds a product that he or she likes and decides to make the purchase. The customer
can use a credit card to pay for the item in the store, through an online payment gateway, by phone
or by mail.
Authorization
Once the data is transmitted, the credit card issuer can approve or decline the transaction. This is
based on the validity of the card, the transaction, as well as the cardholder’s available funds.
10
0
Contd…
Responding
If the transaction is approved, the processor and the merchant receive an
authorization response.
10
2
Contd…
Flexible credit- Credit cards come with an interest-free period,
which is a period of time during which your outstanding credit is
not charged interest.
Purchase protection- Credit cards offer additional protection in the
form of insurance for card purchases that might be lost, damaged or
stolen. The credit card statement can be used to vouch for the
veracity of a claim, if you wish to file one.
10
3
Disadvantages
Ease of overuse- With revolving credit, since your bank balance stays the
same, it might be tempting to put all your purchases on your card, making
you unaware of how much you owe. This could lead to you overspending
and owing more than you can pay back.
High interest rate- If you do not clear your dues by your billing due date,
the amount is carried forward and interest is charged on it. This interest is
accrued over a period of time on purchases that are made after the interest-
free period. Credit card interest rates are quite high, with the average rate
being 3% per month, which would amount to 36% per annum.
Security- Neither the merchant nor the consumer can be fully
authenticated.
10
4
Debit card
A debit card (also known as a bank card, plastic card or check card) is
a plastic payment card that can be used instead of cash when making
purchases. It is similar to a credit card, but unlike a credit card, the money
is immediately transferred directly from the cardholder's bank
account when performing a transaction.
The major difference between debit card and credit card is that payment
through debit card, amount get deducted from bank account immediately
and there should be sufficient balance in bank account for the transaction
to get completed. Whereas in credit card there is no such compulsory.
10
5
Charge Card
Charge cards are similar to credit cards except they have no revolving
credit line, so the balance must be paid off every month.
A charge card is a type of electronic payment card that charges no interest
but requires the user to pay his/her balance in full upon receipt of
the statement, usually on a monthly basis. Charge cards are offered by a
limited number of issuers. They can include an uncapped spending limit
with generous reward benefits for the cardholder. These cards however,
typically include a high annual fee that can range from $150 to $550.
10
6
Smart Card
A smart card is a device with the dimensions of a credit card that
uses a small microchip to store and process data. In many cases,
smart cards have replaced old magnetic cards because they can
handle more information and provide more functionality. Smart
cards are now in use in many industries, including retail, transit
systems and security services.
It is plastic card with embedded microprocessor chip, electronic
memory and a battery.
It is used for information storage, authentication and payment
mechanism.
10
7
Classification of Payment System
Payment Instruments
Pre-paid, pay now and post pay
Offline and Online
Mobile payment
Payment Instruments- There are three common electronic payment instruments,
e-cash, cheque and card.
Pre-paid, pay now and Post pay- In pre-paid system the payment is debited
from the payer account before a payment is processed and hence the term pre-paid.
Most cash like system such as an electronic cash system fall in this category. In pay
debited and payee account is credited with the payment amount. In Post pay system
the payer account is debited only when the payee make a request for payment
Offline system- In the offline system, the communication does not involve
any third party, an electronic transaction takes place only between payee and
payer. In this case authorization decision is made by the chip based on the
Online system- In this system payee typically connects to the bank to obtain
guarantee on the payment, as the bank is able to authorize and check for
This software offers three methods for authorizing consumer purchases and
actually billing the consumer's credit card: online capturing, post-
authorization capturing, and batch capturing.
Nature of CyberCash
Online Capture: With online capturing, transactions are captured and
charged to the consumer's credit card as soon as they are authorized. This
method is appropriate for merchants selling on-line services, information,
or software that is being delivered immediately to the consumer over the
internet. It also appropriate for merchants who can guarantee shipment of
material goods on the same day that they are ordered.
Public key cryptography and digital certificates for validating both consumers and
merchants
Provides privacy, data integrity, user and merchant authentication, and consumer
non repudiation
Module-3
M-Commerce
M-commerce
It is also called mobile commerce. It is defined as all activities related to
a potential commercial transaction conducted through communications
networks that interface with wireless or mobile devices.
M- commerce is any type of transaction of an economic value having at
least at one end a mobile terminal and thus using the mobile
telecommunication network.
It is the use of wireless hand-held devices such as mobile phone,
personal digital assistance (PDA) and smart phone etc.
It provides a new dimension to this space by extending the reach of
traditional e-commerce to the millions of mobile phone and wireless
device users worldwide.
By 2021, mobile e-commerce sales are expected to account for 54% of
total e-commerce sales.
History of M- commerce
Mobile Commerce Services were first delivered in 1997, when the
first two mobile-phone enabled Coca Cola vending machines were
installed in the Helsinki area in Finland. The machines accepted
payment via SMS text messages. The first mobile phone-based
banking service was launched in 1997 by Merita Bank of Finland,
also using SMS.
The M-Commerce server developed in late 1997 by Kevin Duffey
at Logica.
Since the launch of the iPhone, mobile Commerce has moved away
from SMS systems and into actual applications.
Features of M-commerce
Ubiquity-Mobile users must have the ability to receive information and
perform transaction in real-time, regardless of the location.
Banking and bill payment- It enables customers to use their mobile phones to
receive alters, manage their accounts, pay bills and transfer fund.
Ticketing- It allows devices users to purchase tickets for events, transportation and
parking.
Retail and peer to peer- Customers are increasing comfortable with paying for
goods and services and transferring money via mobile devices. In India,
consumers are using their mobile devices to pay for home-delivery shopping
services, vending machine and in store purchases, taxis and purchases at fuel
stations and retails outlets.
Benefits of M-commerce
Portability/ Mobility
Instant connectivity
Personalization
Localization
Limitation of M-commerce
Bandwidth - The limited bandwidth that can be support by mobile device
currently is very small which causes web developers to reduce the usage of
rich data.
Screen size - The screen size of a mobile device is very limited. This also
limits the viewing capacity of the user.
1. Financial services
2. Travel and tourism
3. Retail
4. Entertainment and gambling
5. Personal information management
6. Location based service
1. Financial services
M-banking services, which are an extension of internet banking (or
home banking) allow customers:
To manage personal account information
To transfer funds in bank account or pre-paid accounts
To receive alerts regarding bank information or payment due
To handle electronic invoice payment
2. Travel and tourism
With enhanced messaging and location based mobile services,
offered by the mobile operator and enterprises travel companies,
travelers get in touch will all traveling tips, news, financial
information, weather and ticketing anytime.
For example; if a crisis arises while traveling( a flight delay or
diversion) you will get immediate message from the company.
3. retail
In the retail trade industry, the possible uses of wireless internet
access devices are almost limitless.
Shopping app will enable regular internet e-commerce via mobile,
that is related with ordering and payment of goods and services.
4. Entertainment and gambling
One of the most appealing group of application for m- commerce is
likely to be entertainment.
The service provider will supply a means for users to pay or sign
contract electronically.
5. Personal information management
It allow users to manage their daily information and events
easily and in a simple way. E.g- email, dictionary checking,
contact list, event reminder and data storage management.
It cooperates with third party software like lotus notes and
mail messenger.
6. Location based services
It is a revolutionary services for the mass.
User can get instant information based on their current geographical
position or location.
These services are based on GPS(Global positioning System),
TOA(Time of arrival) and Angle of arrival(AOA).
1G telecommunication
1G refers to the first generation
of wireless cellular technology (mobile telecommunica
tions).
These are the analog telecommunications standards
that were introduced in the 1980s and continued until
being replaced by 2G digital telecommunications.
The main difference between the two mobile cellular
systems (1G and 2G), is that the radio signals used by
1G networks are analog, while 2G networks are digital.
It's Speed was upto 2.4kbps. It allows the voice calls in
1 country. AMPS was first launched in USA in 1G
mobile systems.
Advantages of 2G
It provides the digital signal which requires very little battery
power.
Digital coding also reduces the noise in the line, thus
improving the clarity of voice.
2G phones are greatly more private than 1G phone, as the call
on the digital cell are almost impossible to eavesdrop or by
use of radio scanner.
3g technology
3G technology refer to third generation which was introduced in
year 2000.
It is the upgrade for 2G and 2.5G GPRS networks, for faster internet
speed.
3G is the next generation of technology which had revolutionized
the telecommunication industry. Apart from increasing the speed of
communication, the objective of this technology is to provide
various value added services like video calling, live streaming,
mobile internet access, etc on the mobile phones.
History of 3g
The evolution of 3G technology was the result of high speed demands of smart
phones. Smart phones, which is a combination of PDA and mobile supports
different applications. Since, these smart phones require high speed data transfer
therefore, high speed network become the demand which led to the evolution of
3G networks.
NTT DoCoMo launched the first 3G network in Japan, in the year 2001. In
December 2007, 190 3G networks were operating in 40 countries and
154 HSDPA networks were operating in 71 countries, according to the Global
Mobile Suppliers Association (GSA). In Asia, Europe, Canada and the USA,
telecommunication companies use W-CDMA technology with the support of
around 100 terminal designs to operate 3G mobile networks.
On 11 December 2008, India entered the 3G arena with the launch of 3G enabled
Mobile and Data services by Government owned MTNL in Delhi and later
in Mumbai MTNL becomes the first 3G Mobile service provider in India. After
MTNL, another state operator (BSNL) launched 3G services on 22 Feb 2009
in Chennai and Kolkata and later launched 3G as Nationwide. The auction of 3G
wireless spectrum was announced in April 2010 and 3G Spectrum allocated to all
private operators on 1 September 2010.
Difference between 2g vs 3g
Basis 2G 3G
Terms 2G is the second generation 3G is the third generation
of mobile networks. of the mobile network.
WTLS
Connection mode- They are additional use of WAP, now the data
WTLS.
Layers of WAP Protocol
WAP has a layered architecture. Following are the various layer
of WAP architecture;
◦ Wireless Application Environment (WAE)
◦ Wireless Session Protocol (WSP)
◦ Wireless Datagram Protocol (WDP)
◦ Wireless Transaction Protocol(WTP)
◦ Wireless Transport Layer Security (WTLS)
◦ Wireless Markup Language (WML)
Wireless Application Environment (WAE)- It defines the
user interface on the phone.
It provides the general purpose environment for application
service offering.
With newer technologies, new players are emerging in
◦ Personalized
◦ Localized
◦ Actionable
Mobile network operator opportunity
Mobile network services operators enjoyed rapid growth throughout
the 1990.
New subscribers were acquired at high double-digit growth rates and
network infrastructure was upgraded from the first generation (1G)
analog phones to (4G) digital phones to meet the increasing demand
for data traffic over the mobile network.
Network operator enjoyed the double benefit of rapid subscriber
growth and increasing voice traffic per subscribers.
In the era of initial mass adoption of mobile phone ended in the
industrialized countries, new subscriber growth rates and average
revenue per user(ARPU) began to moderate.
High subscriber turnover which operators could accept in periods of
rapid subscriber growth began to affect profitability.
Now network provider make an efforts to differentiate and brand
themselves based on the voice quality, voice traffic became
commoditized and pricing highly competitive.
M-commerce in automotive industry
M-commerce in the automotive industry could be characterized in
parallel and in conjunction with another term framed within the
industry telematics.
The telematics industry is an emerging business area that allow car
manufactures and aftermarket producers to provide innovative
solutions for information services.
These services include automatic and manual emergency call,
roadside assistance services, GPS, traffic and dynamic route
guidance.
Impact of M-commerce in automotive
industry
The following trends demonstrate the dynamic of the automobile
industry:
The automotive/transportation platform becoming technologically
current/internet ready.
Wireless computing becoming pervasive in society
Product and services prices dropping.
Rapid increase in growth.
Rapid rate of technological innovation.
Increased demand for call center and convenience services
integration.
Mobile advertising
It includes push and pull message as well as promotional
sponsorship.
Push messaging
◦ It is equivalent to spam e-mail.
◦ Typically push campaigns includes offers sent to existing
customers, mobile alerts and information sent via a mobile
device.
◦ Sending push messages illegally without permission is
commonly called spam.
Pull messaging
◦ It attract the customer to order further information and other
content through the mobile devices.
◦ Customer can receive discount coupons or samples by sending
their contact information via their mobile device.
Mobile advertising in building a
brand
The internet and mobile are often considered personnel that
enable effective one to one marketing.
It is often used as an integral part of internet marketing.
Currently, mobile advertising campaigns primarily include
advertising messages sent via SMS to registered of a web
portal.
Mobile advertiser today should thoroughly consider how
they use the mobile channel for advertising purpose.
Customers should be given the possibility to choose where,
when and by whom they are contacted.
It is getting popular compared to direct marketing because of
its personal nature.
It is always be based on the customers needs it should be
communicated in the right context.
M- commerce business models
Brand Building and Media Mix
◦ Every company has a corporate website which details its
products and services.
◦ Many consumer oriented website not only have product
information but also useful content.
◦ Media mix is a successful derivative of this model.
◦ Blending the content of I-mode with other media helps in
driving business.
◦ I-mode is not intended to replace other media but a useful
access point for other content or media.
Contd…
Customer Relationship Management
◦ CRM is providing support for one’s customer with useful
online services in mobile environment. E.g- Shipment
tracking services, Mobile banking services
◦ Consumer oriented stockbrokers, direct or Nomura
securities, offer real-time trading functionality to their
account holders, while offering other useful services to non-
clients.
Contd….
Online Retail
◦ It is the most discussed business model of the internet
revolution.
◦ Walt Disney has developed a strong business model
which is providing an excellent revenue stream.
◦ They provide downloadable ringtones, screen savers and
these premium services cost 100 to 300
yen/month/subscription.
Aggregation
◦ They are part of database category of content.
◦ They include restaurant guides, job search sites, etc
◦ Classic aggregator would be yellow pages telephone
directory.
Contd….
Advertising
◦ Revenue from advertising is totally dependent on
number of subscribers.
◦ Schemes for advertising:
Simple banner Ads – Small banners with on being
clicked take the user to advertiser’s website.
Message Free Service – It is a special push mail
function where cost is borne by advertiser.