E Business Notes For Ggsipu
E Business Notes For Ggsipu
E Business Notes For Ggsipu
renovated to a high extent and hence fascinated many customers. Today, the online shopping has
become a trend in India and the reason behind the adoption of this technique lies in the attractive
online websites, user friendly interface, bulky online stores with new fashion, easy payment
methods (i.e. secure pay online via gateways like paypal or cash-on-delivery), no bound on
quantity & quality, one can choose the items based on size, color, price, etc.
Despite being a developing country, India has shown a commendable increase in the ecommerce
industry in the last couple of years, thereby hitting the market with a boom. Though the Indian
online market is far behind the US and the UK, it has been growing at a fast page.
Further, the addition of discounts, coupons, offers, referral systems, 30days return guarantee, 1-7
days delivery time, etc. to the online shopping and the E-Market have added new flavors to the
industry.
The Key drivers of in Indian ecommerce have been:
Global Reach- E-commerce allows business transactions on the cross country bound can
be more convenient and more effective as compared with the traditional commerce. On
the e-commerce businesses potential market scale is roughly equivalent to the network
the size of the world's population.
Richness- Advertising and branding are an important part of commerce. E-commerce can
deliver video, audio, animation, billboards, signs and etc. However, its about as rich as
television technology.
Information Density- The density of information the Internet has greatly improved, as
long as the total amount and all markets, consumers and businesses quality information.
The electronic commerce technology, reduce the information collection, storage,
communication and processing cost. At the same time, accuracy and timeliness of the
information technology increases greatly, information is more useful, more important
than ever.
Types
B2B e-commerce is simply defined as e-commerce between companies. This is the type of ecommerce that deals with relationships between and among businesses. About 80% of ecommerce is of this type, and most experts predict that B2B e-commerce will continue to grow
faster than the B2C segment. The B2B market has two primary components: e-frastructure and emarkets. E-frastructure is the architecture of B2B, primarily consisting of the following:
auction solutions software for the operation and maintenance of real-time auctions in the
Internet (e.g., Moai Technologies and OpenSite Technologies);
content management software for the facilitation of Web site content management and
delivery (e.g., Interwoven and ProcureNet); and
E-markets are simply defined as Web sites where buyers and sellers interact with each other and
conduct transactions.
The more common B2B examples and best practice models are IBM, Hewlett Packard (HP),
Cisco and Dell. Cisco, for instance, receives over 90% of its product orders over the Internet.
Most B2B applications are in the areas of supplier management (especially purchase order
processing), inventory management (i.e., managing order-ship-bill cycles), distribution
management (especially in the transmission of shipping documents), channel management (i.e.,
information dissemination on changes in operational conditions), and payment management
(e.g., electronic payment systems or EPS).11
eMarketer projects an increase in the share of B2B e-commerce in total global e-commerce from
79.2% in 2000 to 87% in 2004 and a consequent decrease in the share of B2C e-commerce from
20.8% in 2000 to only 13% in 2004
business-to-consumer e-commerce, or commerce between companies and consumers, involves
customers gathering information; purchasing physical goods (i.e., tangibles such as books or
consumer products) or information goods (or goods of electronic material or digitized content,
such as software, or e-books); and, for information goods, receiving products over an electronic
network.
It is the second largest and the earliest form of e-commerce. Its origins can be traced to
online retailing (or e-tailing). Thus, the more common B2C business models are the online
retailing companies such as Amazon.com, Drugstore.com, Beyond.com, Barnes and Noble and
ToysRus. Other B2C examples involving information goods are E-Trade and Travelocity.
The more common applications of this type of e-commerce are in the areas of purchasing
products and information, and personal finance management, which pertains to the management
of personal investments and finances with the use of online banking tools
B2C e-commerce reduces transactions costs (particularly search costs) by increasing consumer
access to information and allowing consumers to find the most competitive price for a product or
service. B2C e-commerce also reduces market entry barriers since the cost of putting up and
maintaining a Web site is much cheaper than installing a brick-and-mortar structure for a firm.
In the case of information goods, B2C e-commerce is even more attractive because it saves firms
from factoring in the additional cost of a physical distribution network. Moreover, for countries
with a growing and robust Internet population, delivering information goods becomes
increasingly feasible.
1. Business-to-government e-commerce or B2G is generally defined as commerce between
companies and the public sector. It refers to the use of the Internet for public
The Advantages
#1. Cost Effective
The entire financial transactions will eventually become electronic, so sooner conversion is
going to be lower on cost. It makes every transaction through e-commerce payment a lot cheaper.
#2. Higher Margin
E-commerce also enables us to move better with higher margin for more business safety. Higher
margin also means business with more control as well as flexibility. You can also save time from
the e-commerce.
#3. Better Productivity
Productivity here means productivity for both companies and customers. People like to find
answers online because it is faster and cheaper, and it costs a lot cheaper expense as well for the
company.
#4. Quick Comparison
E-commerce also enables you to compare price among several providers. In the end, it leads you
to smart shopping. People can save more money while they shop.
#5. Economy Benefit
E-commerce allows us to make transaction without any needs on stores, infrastructure
investment, and other common things we find. Companies only need well built website and
customer service.
The Disadvantages
#1. Security
Customers need to be confident and trust the provider of payment method. Sometimes, we can be
tricked. Examine on integrity and reputation of the web stores before you decide to buy.
#2. Scalability of System
A company definitely needs a well developed website to support numbers of customers at a time.
If your web destination is not well enough, you better forget it.
#3. Integrity on Data and System
Customers need secure access all the time. In addition to it, protection to data is also essential.
Unless the transaction can provide it, we should refuse for e-commerce.
#4. Products People
People who prefer and focus on product will not buy online. They will want to feel, try, and sit
on their new couch and bed.
#5. Customer Service and Relation Problem
They sometimes forget how essential to build loyal relationship with customers. Without loyalty
from customers, they will not survive the business.
Technical Disadvantag es
T here can be lack of system security, reliability or standards owing to poor
implementation of e-Commerce.
Software development industry is still evolving and keeps chang ing rapidly.
In many countries, network bandwidth mig ht cause an issue as there is insufficient
telecommunication bandwidth available.
Special types of web server or other software mig ht be required by the vendor setting the
e commerce environment apart from network servers.
Sometimes, it becomes difficult to integ rate E-Commerce software or website with the
existing application or databases.
T here could be software/hardware compatibility issue as some E-Commerce software
may be incompatible with some operating system or any other component.
Non-Technical Disadvantag es
Initial cost: T he cost of creating / building E-Commerce application in-house may be
very hig h. T here could be delay in launching the E-Commerce application due to
mistakes, lack of experience.
User resistance: User may not trust the site being unknown faceless seller. Such mistrust
makes it difficult to make user switch from physical stores to online/virtual stores.
Security/ Privacy: Difficult to ensure security or privacy on online transactions.
Lack of touch or feel of products during online shopping .
E-Commerce applications are still evolving and chang ing rapidly.
Internet access is still not cheaper and is inconvenient to use for many potential
customers like one living in remote villag es.
ECommerce
EBusiness
Ecommerce
involves Ebusiness is conduct of business processeson
commercialtransactions done over internet.
the internet.
Ecommerce is subset of Ebusiness.
Application of extarnet
Application of internet
Intranet Application
supply
chain
management
Download
and files
customer
communication
Voice
and
Conferencing
E-Commerce
online
training/education
File Sharing
customer service
Information browsing
Sharing of information of
common interest
warrantry
registration
Search
the
web
addresses for access
through search engine
Launching
personal/departmental
home pages
Chatting
more
Submission of reports
distribution
promotion
claims
Internet
It is a Global
interconnected
network.
programs
and
Video
Sharing
of
company
policies/rules & regulations
Access employee database
Distribution
circulars/Office Orders
of
many
Corporate
directories
of
telephone
Intranet
It is a Private networkspecific
to an organisation.
Extranet
It is a Private network that uses public
network to share information with suppliers
and vendors.
It
is
regulated
organization.
It
system of
computer
is
small
by
network
an
with
of connected devices.
It is owned by no one.
It is owned
organization.
It
is
means
of sharing
information throughout
the
world.
Example: What
we
normally using is internet.
are
Internet
Extranet
is
also regulated
by
contractual agreements
between
organizations.
Internet is unregulated
uncensored.
and
by
single
EDI stands for Electronic Data Exchang e. EDI is an electronic way of transferring business
documents in an org anization internally between its various departments or externally with
suppliers, customers or any subsidiaries etc. In EDI, paper documents are replaced with
electronic documents like word documents, spreadsheets etc.
EDI Documents
Following are few important documents used in EDI:
Invoices
Purchase orders
Shipping Requests
Acknowledg ement
Business Correspondence letters
Financial information letters
A buyer prepares an order in his or her purchasing system and has it approved.
Next, the EDI order is translated into an EDI document format called an 850
purchase order.
The 850 purchase order is then securely transmitted to the supplier either via the internet or through a
VAN (Value Added Network).
If the purchase order is sent using a VAN, then the buyers VAN interconnects with the suppliers VAN.
The VANs make sure that EDI transactions are sent securely and reliably. The suppliers VAN ensures
that the supplier receives the order.
The suppliers computer system then processes the order. In the case of CovalentWorks clients, we
provide VAN transportation and our servers provide all of the software and hardware required to process
EDI documents. Only internet access and email are needed.
Data security and control are maintained throughout the transmission process using passwords, user
identification and encryption. Both the buyers and the suppliers EDI applications edit and check the
documents for accuracy.
value chain
the process or activities by which a company adds value to an article, including production,
marketing, and the provision of after-sales service.
A value chain is the whole series of activities that create and build value at every step. The total
value delivered by the company is the sum total of the value built up all throughout the company.
Michael Porter developed this concept in his 1980 book 'Competitive Advantage'.
What is the value chain made of?
Porter defines the value chain as made of primary activities and support activities. Primary
involves inbound logistics (getting the material in for adding value by processing it), operations
(which are all the processes within the manufacturing), outbound (which involves distribution to
the points of sale), marketing and sales (which go sell it, brand it and promote it) and service
(which maintains the functionality of the product, post sales).
The support functions which feed into all the primary functions are the firm infrastructure, like
MIS which allows managers to monitor the environment well; Human Resource, which develops
the skills needed to steer the company well; procurement to buy/ source goods at the right price,
which increasingly takes importance because of difficult economic conditions and technology,
which could give the firm speed, accuracy and quality. Both these allow the firm to charge a
margin, which partly comes from the value addition of the primary and support functions and
partly from the advantage that the company gains due to communication of the value addition to
the consumer (brand image, faith, trust and so on).
The supply chain is the network created amongst different companies producing, handling and/or
distributing a specific product. Specifically, the supply chain encompasses the steps it takes to
get a good or service from the supplier to the customer. Supply chain management is a crucial
process for many companies, and many companies strive to have the most optimized supply
chain because it usually translates to lower costs for the company. Quite often, many people
confuse the term logistics with supply chain. In general, logistics refers to the distribution
process within the company whereas the supply chain includes multiple companies such as
suppliers, manufacturers, and the retailers.
Malicious code: These term used to describe any code in any part of a software system or
script that is intended to cause undesired effects, security breaches or damage to a
system. Malicious code is an application security threat that cannot be efficiently
controlled by conventional antivirus software alone. Malicious code describes a broad
category of system security terms that includes attack scripts, viruses, worms, Trojan
horses, backdoors and malicious active content. A computer virus is a program or piece
of code that is loaded onto your computer without your knowledge and runs against your
wishes. Viruses can also replicate themselves. All computer viruses are man-made. A
simple virus that can make a copy of itself over and over again is relatively easy to
produce. Even such a simple virus is dangerous because it will quickly use all available
memory and bring the system to a halt. An even more dangerous type of virus is one
capable of transmitting itself across networks and bypassing security systems.
In computing, Trojan horse, or Trojan, is any malicious computer program which is used
to hack into a computer by misleading users of its true intent.
Unwanted program: These are that program which are install without the users
knowledge. Such program are increasingly being found on social networking & usergenerated content sizes where the user are fooled to downloaded them. Once they are
installed these are difficult to uninstalled from your computer. A browser parasites are the
example of unwanted program these are that program which can change your browser
setting for instance change your browser home page, sending information for your site
visited to your host system.for example websearch is adware component that modigied
your internet explorer home page. Spyware are the another example of unwanted
programe Spyware is any technology that aids in gathering information about a person or
organization without their knowledge. On the Internet (where it is sometimes called
aspybot or tracking software), spyware is programming that is put in someone's computer
to secretly gather information about the user and relay it to advertisers or other interested
parties. Spyware can get in a computer as a software virus or as the result of installing a
new program.
Phishing is the attempt to acquire sensitive information such as usernames, passwords,
and credit card details (and sometimes, indirectly, money), often for malicious reasons,
by masquerading as a trustworthy entity in an electronic communication. Phishing emails
may contain links to websites that are infected with malware.[3] Phishing is typically
carried out by email spoofing[4] or instant messaging,[5] and it often directs users to enter
details at a fake website whose look and feel are almost identical to the legitimate one.
Phishing is an example of social engineering techniques used to deceive users, and
exploits the poor usability of current web security technologies.
Hacking:
Spoofing:
Sniffing:
Insider attack:
Cryptography is an essential information security tool. It provides the four most basic services
of information security
Authentication The cryptographic techniques such as MAC and digital signatures can
protect information against spoofing and forgeries.
Data Integrity The cryptographic hash functions are playing vital role in assuring the
users about the data integrity.
All these fundamental services offered by cryptography has enabled the conduct of business
over the networks using the computer systems in extremely efficient and effective manner.
Cryptography Drawbacks
Apart from the four fundamental elements of information security, there are other issues that
affect the effective use of information
Cryptography does not guard against the vulnerabilities and threats that emerge from
the poor design of systems, protocols, and procedures. These need to be fixed through
proper design and setting up of a defensive infrastructure.
The use of public key cryptography requires setting up and maintenance of public
key infrastructure requiring the handsome financial budget.
Different keys are used for encryption and decryption. This is a property which set this
scheme different than symmetric encryption scheme.
Each receiver possesses a unique decryption key, generally referred to as his private key.
Some assurance of the authenticity of a public key is needed in this scheme to avoid
spoofing by adversary as the receiver. Generally, this type of cryptosystem involves
trusted third party which certifies that a particular public key belongs to a specific person
or entity only.
Encryption algorithm is complex enough to prohibit attacker from deducing the plaintext
from the ciphertext and the encryption (public) key.
Though private and public keys are related mathematically, it is not be feasible to
calculate the private key from the public key. In fact, intelligent part of any public-key
cryptosystem is in designing a relationship between two keys.
SSL (Secure Sockets Layer) provides a secure connection between internet browsers
and websites, allowing you to transmit private data online. Sites secured with SSL display
a padlock in the browsers URL and possibly a green address bar if secured by an EV
Certificate.
The SSL protocol is used by millions of e-Business providers to protect their customers,
ensuring their online transactions remain confidential. All web pages that expect their
visitors to submit confidential data, including credit card details, passwords or any
personal information should use encryption. Web browsers can safely interact with
secured sites as long as the site's certificate is from a recognized Certificate Authority,
In computing, a firewall is a network security system that monitors and controls the incoming
and outgoing network traffic based on predetermined security rules. [1] A firewall typically
establishes a barrier between a trusted, secure internal network and another outside network,
such as the Internet, that is assumed not to be secure or trusted.
Packet filtering: The system examines each packet entering or leaving the network and
accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and
transparent to users, but it is difficult to configure. In addition, it is susceptible to IP
spoofing.
Acting as a proxy server: A proxy server is a type of gateway that hides the true
network address of the computer(s) connecting through it. A proxy server connects to the
Internet, makes the requests for pages, connections to servers, etc., and receives the data
on behalf of the computer(s) behind it. The firewall capabilities lie in the fact that a proxy
can be configured to allow only certain types of traffic to pass (e.g.,HTTP files, or web
pages). A proxy server has the potential drawback of slowing network performance, since
it has to actively analyze and manipulate traffic passing through it.
A proxy server is a computer that offers a computer network service to allow clients
to make indirect network connections to other network services. A client connects
to the proxy server, then requests a connection, file, or other resource available
on a different server. The proxy provides the resource either by connecting to the
specified server or by serving it from a cache. In some cases, the proxy may alter
the client's request or the server's response for various purposes.
Network based IDS (NIDS):- It is a network security system focusing on the attacks that
come from the inside of the network (authorized users). Some systems may attempt to
stop an intrusion attempt but this is neither required nor expected of a monitoring system.
Network Intrusion Detection Systems (NIDS) are placed at a strategic point or points
within the network to monitor traffic to and from all devices on the network. It performs
an analysis of passing traffic on the entire subnet, and matches the traffic that is passed on
the subnets to the library of known attacks. Once an attack is identified, or abnormal
behavior is sensed, the alert can be sent to the administrator. An example of an NIDS
would be installing it on the subnet where firewalls are located in order to see if someone
is trying to break into the firewall. Ideally one would scan all inbound and outbound
traffic, however doing so might create a bottleneck that would impair the overall speed of
the network
Host based IDS (HIDS) : Host Intrusion Detection Systems (HIDS) run on individual
hosts or devices on the network. A HIDS monitors the inbound and outbound packets
from the device only and will alert the user or administrator if suspicious activity is
detected. It takes a snapshot of existing system files and matches it to the previous
snapshot. If the critical system files were modified or deleted, an alert is sent to the
administrator to investigate. An example of HIDS usage can be seen on mission critical
machines, which are not expected to change their configurations.
Intrusion detection and prevention systems (IDPS) are primarily focused on identifying
possible incidents, logging information about them, and reporting attempts. In addition,
organizations use IDPS for other purposes, such as identifying problems with security
policies, documenting existing threats and deterring individuals from violating security
policies. IDPS have become a necessary addition to the security infrastructure of nearly every
organization. IDPS typically record information related to observed events, notify security
administrators of important observed events and produce reports. Many IDPS can also
respond to a detected threat by attempting to prevent it from succeeding. They use several
response techniques, which involve the IDPS stopping the attack itself, changing the security
environment (e.g. reconfiguring a firewall) or changing the attack's content.
Comparison with Firewall:- Though they both relate to network security, an intrusion detection
system (IDS) differs from a firewall in that a firewall looks outwardly for intrusions in order to
stop them from happening. Firewalls limit access between networks to prevent intrusion and do
not signal an attack from inside the network. An IDS evaluates a suspected intrusion once it has
taken place and signals an alarm. An IDS also watches for attacks that originate from within a
system. This is traditionally achieved by examining network communications, identifying
heuristics and patterns (often known as signatures) of common computer attacks, and taking
action to alert operators. A system that terminates connections is called an intrusion prevention
system, and is another form of an application layer firewall.
A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create,
manage, distribute, use, store, and revoke digital certificates[1] and manage public-key
encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a
range of network activities such as e-commerce, internet banking and confidential email
A public key infrastructure (PKI) supports the distribution and identification of public
encryption keys, enabling users and computers to both securely exchange data
overnetworks such as the Internet and verify the identity of the other party
A typical PKI includes the following key elements:
A trusted party, called a certificate authority (CA), acts as the root of trust and provides
services that authenticate the identity of individuals, computers and other entities
A certificate database, which stores certificate requests and issues and revokes certificates
A certificate store, which resides on a local computer as a place to store issued certificates
and private keys
A CA issues digital certificates to entities and individuals after verifying their identity. It signs
these certificates using its private key; its public key is made available to all interested parties in
a self-signed CA certificate. CAs use this trusted root certificate to create a "chain of trust" -many root certificates are embedded in Web browsers so they have built-in trust of those CAs.
Web servers, email clients, smartphones and many other types of hardware and software also
support PKI and contain trusted root certificates from the major CAs.
Along with an entitys or individuals public key, digital certificates contain information about
the algorithm used to create the signature, the person or entity identified, the digital signature of
the CA that verified the subject data and issued the certificate, the purpose of the public key
encryption, signature and certificate signing, as well as a date range during which the certificate
can be considered valid.
A virtual private network (VPN) extends a private network across a public network,
such as the Internet. It enables users to send and receive data across shared or public
networks as if their computing devices were directly connected to the private network,
and thus benefit from the functionality, security and management policies of the private
network.[1] A VPN is created by establishing a virtual point-to-point connection through
the use of dedicated connections, virtualtunnelling protocols, or traffic encryption.
Key design objectives when selecting VPN features must include the following:
1.
Enhanced security. When you connect to the network through a VPN, the data is kept
secured and encrypted. In this way the information is away from hackers eyes.
2.
Remote control. In case of a company, the great advantage of having a VPN is that the
information can be accessed remotely even from home or from any other place. Thats why a
VPN can increase productivity within a company.
3.
Share files. A VPN service can be used if you have a group that needs to share files for a
long period of time.
4.
Online anonymity. Through a VPN you can browse the web in complete anonymity.
Compared to hide IP software or web proxies, the advantage of a VPN service is that it
allows you to access both web applications and websites in complete anonymity.
5.
Unblock websites & bypass filters. VPNs are great for accessing blocked websites or
for bypassing Internet filters. This is why there is an increased number of VPN services used
in countries where Internet censorship is applied.
6.
Change IP address. If you need an IP address from another country, then a VPN can
provide you this.
7.
8.
Reduce costs. Once a VPN network is created, the maintenance cost is very low. More
than that, if you opt for a service provider, the network setup and surveillance is no more a
concern.
Electronic money, or e-money, is the money balance recorded electronically on a storedvalue card. These cards have microprocessors embedded which can be loaded with a
monetary value. Another form of electronic money is network money, software that allows
the transfer of value on computer networks, particularly the internet. Electronic money is a
floating claim on a private bank or other financial institution that is not linked to any particular
account.[1] Examples of electronic money are bank deposits, electronic funds transfer, direct
deposit, payment processors, and digital currencies.
Electronic Cash
Primary advantage is with purchase of items less than $10
Micropayments
Payments for items costing less than $1
Advantages
Disadvantages
Susceptible to forgery
Electronic Wallets
Makes shopping easier and more efficient
Amazon.com one of the first online merchants to eliminate repeat form-filling for purchases
Smart Cards
Magnetic stripe
Memory cards
Microprocessor cards
Embedded microprocessor
Advantages:
Disadvantages:
Low maximum transaction limit (not suitable for B2B or most B2C)
High Infrastructure costs (not suitable for C2C)
Not (yet) widely used
Credit card
debit card
A debit card is a plastic card which provides an alternative payment method to cash
when making purchases. Physically the card is an ISO 7810 card like a credit card;
Depending on the store or merchant, the customer may swipe or insert their card into the
terminal, or they may hand it to the merchant who will do so. The transaction is
authorized and processed and the customer verifies the transaction either by entering a
PIN or, occasionally, by signing a sales receipt.
electronically. The transferred amount is instantly deducted from the account of one
banks and credited to the other banks account.
Users such as individuals, companies or firms can transfer large sums using the RTGS
system. The minimum value that can be transferred using RTGS is Rs. 2 Lakhs and
above. However there is no upper cap on the amount that can be transacted.
The remitting customer needs to add the beneficiary and his bank account details prior to
transacting funds via RTGS. A beneficiary can be registered through your internet
banking portal. The details required while transferring funds would be the beneficiarys
name; his/her account number, receivers bank address and the IFSC code of the
respective bank.
On successful transfer the Reserve Bank of India acknowledges the receiver bank and
based on this the both the remitting bank as well as the receiving bank may/ may not
notify the customers.
IMPS
Majority of the funds transferred using electronic channels are processed via NEFT or
RTGS. But as the funds could only be cleared in batches using these transfer gateways,
the National Payments Corporation of India introduced a pilot mobile payment project
also known as the Immediate Payment Service (IMPS). Available to Indian public, IMPS
offers instant electronic transfer service using mobile phones. IMPS interbank transfer
service is available 24X7 and allows you to use your mobile phones to access your
account and to authorize transfer of funds between accounts and banks. The IMPS service
also features a secure transfer gateway and an immediate confirmation on fulfilled orders.
IMPS is offered on all the cellular devices via Mobile Banking or through SMS facility.
To be able to transfer money via IMPS route you must first register for the immediate
payment services with your bank. On obtaining the Mobile Money Identifier (MMID)
and MPIN from the bank you can login or make a request via SMS to transfer a certain
amount to a beneficiary. Meanwhile the beneficiary must link his/her mobile number with
his/her respective account and obtain the MMID from the bank to be able to receive
money.
To initiate a transfer you must enter the beneficiarys mobile number, beneficiary MMID,
the transfer amount and your MPIN while requesting the fund transfer. As soon as the
transaction is cleared, you receive a confirmation SMS on deduction from your account
and the money credited into the beneficiarys account. The transaction reference number
can be noted for future reference.
Thus IMPS enables customers to use mobile instruments as an instant money transfer
gateway, facilitating user convenience and saving time and effort involved in other modes
of transfer.
Ethical Issues
In general, many ethical and global issues of Information Technology apply to e-business. So,
what are the issues particularly related to e-commerce? Lets list some of the ethical issues
spawned with the growing field of e-commerce.
Web tracking
E-businesses draw information on how visitors use a site through log files. Analysis of log file
means turning log data into application service or installing software that can pluck relevant
information from files in-house. Companies track individuals movement through tracking
software and cookie analysis. Programs such as cookies raise a batch of privacy concerns. The
tracking history is stored on your PCs hard disk, and any time you revisit a website, the
computer knows it. Many smart end users install programs such as Cookie cutters, Spam
Butcher, etc which can provide users some control over the cookies.
The battle between computer end users and web trackers is always going on with a range of
application programs. For example, software such as Privacy Guardian, My Privacy, etc can
protect users online privacy by erasing browsers cache, surfing history and cookies. To detect
and remove spyware specially designed programs like Ad-Aware are present. A data miner
application, SahAgent collects and combines Internet browsing history of users and sends it to
servers. The battle goes on!
Privacy
Most Electronic Payment Systems knows the identity of the buyer. So it is necessary to protect
the identity of a buyer who uses Electronic Payment System.
A privacy issue related to the employees of company is tracking. Monitoring systems are
installed in many companies to monitor e-mail and other web activities in order to identify
employees who extensively use business hours for non-business activities. The e-commerce
activities performed by a buyer can be tracked by organizations. For example, reserving railway
tickets for their personal journey purpose can be tracked. Many employees dont want to be
under the monitoring system even while at work.
As far as brokers and some of the company employees are concerned, E-Commerce puts them in
danger zone and results in elimination from their jobs. The manner in which employees are
treated may raise ethical issues, such as how to handle displacement and whether to offer
retraining programs.
Disintermediation and Reintermediation
Intermediation is one of the most important and interesting e-commerce issue related to loss of
jobs. The services provided by intermediaries are
(i) Matching and providing information.
(ii) Value added services such as consulting.
The first type of service (matching and providing information) can be fully automated, and this
service is likely to be in e-marketplaces and portals that provide free services. The value added
service requires expertise and this can only be partially automated. The phenomenon by which
Intermediaries, who provide mainly matching and providing information services are eliminated
is called Disintermediation.
The brokers who provide value added services or who manage electronic intermediation (also
known as infomediation), are not only surviving but may actually prosper, this phenomenon is
called Reintermediation.
The traditional sales channel will be negatively affected by disintermediation. The services
required to support or complement e-commerce are provided by the web as new opportunities for
reintermediation. The factors that should be considered here are the enormous number of
participants, extensive information processing, delicate negotiations, etc. They need a computer
mediator to be more predictable.
Legal Issues
Where are the headlines about consumers defrauding merchants? What about fraud e-commerce
websites? Internet fraud and its sophistication have grown even faster than the Internet itself.
There is a chance of a crime over the internet when buyers and sellers do not know each other
and cannot even see each other. During the first few years of e-commerce, the public witnessed
many frauds committed over the internet. Lets discuss the legal issues specific to e-commerce.
Fraud on the Internet
E-commerce fraud popped out with the rapid increase in popularity of websites. It is a hot issue
for both cyber and click-and-mortar merchants. The swindlers are active mainly in the area of
stocks. The small investors are lured by the promise of false profits by the stock promoters.
Auctions are also conductive to fraud, by both sellers and buyers. The availability of e-mails and
pop up ads has paved the way for financial criminals to have access to many people. Other areas
of potential fraud include phantom business opportunities and bogus investments.
Copyright
The copyright laws protect Intellectual property in its various forms, and cannot be used freely.
It is very difficult to protect Intellectual property in E-Commerce. For example, if you buy
software you have the right to use it and not the right to distribute it. The distribution rights are
with the copyright holder. Also, copying contents from the website also violates copy right laws.
Domain Names
The competition over domain names is another legal issue. Internet addresses are known as
domain names and they appear in levels. A top level name is qburst.com or microsoft.com. A
second level name will beqburst.com/blog. Top level domain names are assigned by a central
non-profit organization which also checks for conflicts or possible infringement of trademarks.
Problems arise when several companies having similar names competing over the same domain
name. The problem of domain names was alleviated somewhat in 2001 after several upper level
names were added to com.
Another issue to look out for is Cybersquatting, which refers to the practice of registering
domain names with the desire of selling it at higher prices.
Security features such as authentication, non-repudiation and escrow services can protect the
sellers in e-commerce.
One needs to be careful while doing e-commerce activities. The need to educate the public about
the ethical and legal issues related to e-commerce is highly important from a buyer as well as
seller perspective.
Scope of E-Governance
Governance is all about flow of information between the Government and Citizens, Government
and Businesses and Government and Government. E-Governance also covers all these
relationships as follows:
A. Government to Citizen (G2C)
B. Citizen to Government (C2G)
C. Government to Government (G2G)
D. Government to Business (G2B)
A. Government to Citizen
The G2C relation will include the services provided by the Government to the Citizens. These
services include the public utility services i.e. Telecommunication, Transportation, Post, Medical
facilities, Electricity, Education, Certification, Registration, Licensing, Taxation, Passports,
ID Cards, birth registration, marriage registration, divorce or death registration.
1. E-Citizenship - It involves online transactions relating to issue and renewal of documents like
Ration Cards, Passports, Election Cards, Identity Cards, etc. It will require the Government to
create a virtual identity of every citizen so as to enable them to access the Government services
online. For the same, Government would need to create a Citizen Database which is a huge task.
2. E-Registration - It covers the online registration of various contracts and transactions that
may require registration for giving it legality and enforceability. E-registration will help to
reduce a significant amount of paperwork.
3. E-Transportation - E-Transportation services would include services of Government relating
to Transport by Road, Rail, Water or Air. This may involve online
1
4. E-Health - Under this interconnection of all hospitals may take place. A patient database may
be created. A local pharmacy database may also be created.
5. E-Education - Imparting of education and conducting of Courses online through internet. It
can reduce the communication time required in Distance education.
6. E-Help It refers to Facilitation of disaster and crisis management using ICT. It includes the
use of technologies like internet, SMS, etc. for the purpose of reducing the response time of the
Government agencies to the disasters that may speed up the rescue work.
7. E-Taxation - E-Taxation will facilitate the taxing process by implementing ICT in the taxing
process. Online tax due alerts and online payment of taxes would help transact faster.
B. Citizen to Government
Citizen to Government relationship will include the communication of citizens with the
Government arising in the Democratic process like voting, campaigning, feedback, etc.
1. E-Democracy - Democracy means participation of the citizens in the governing process.
The ICT can help enable the true democratic process including voting, public opinion.
2. E-Feedback - E-Feedback includes the use of ICT for the purpose of giving feedback to the
Government. It may help in pursuing the Government to take a certain decision. Use of ICT can
enable online feedback and online debates to the Government.
C. Government to Government
G2G relationship would include the relationships between Central and State Government and
also the relationship between two or more Government departments.
1. E-administration - It can reduce the communication time between the Government
Departments and Governments. It can substantially reduce paper work, bring morality and
transparency to the administration of Government Departments.
2. E-police It facilitates the work of the Police department in investigation and administration.
It includes databases of Police Officers, their performances, Criminal databases wanted as well
as in custody, the trends in crimes and much more. It can help reduce the response time & reduce
cost by reducing paperwork.
3. E-courts - The concept of E-Court will include the ICT enablement of the judicial process.
Technology may help distant hearing, online summons, warrants and online publication of
Judgments and Rule/Order.
D. Government to Business
1. E-Taxation - Corporate sector pays many taxes, duties and dues to the Government. Payment
of these taxes and duties will be made easier by E-Taxation. It can help reduce cost and time. It
can also help to crosscheck the frauds and deficiencies in payment, further bringing accuracy and
revenue to the Government.
2. E-Licencing - Companies have to acquire various licences from the Government, similarly the
companies have to acquire various registrations. ICT enablement of the licensing and registration
can reduce time and cost.
3. E-Tendering - E-Tendering will include the facilities of online tendering and procurement. It
will send online alerts as to new opportunities of business with the Government and also online
submission of tenders and online allotment of work. It will reduce time and cost involved in the
physical tendering system.
The basic categories of business models over internet include:
Brokerage
Advertising
Infomediary
Merchant
Manufacturer (Direct)
Affiliate
Community
Subscription
Utility
-:Brokerage Model:-
Brokers are market-makers: they bring buyers and sellers together and facilitate transactions.
Brokers play a frequent role in business-to-business (B2B), business-to-consumer (B2C), or
consumer-to-consumer (C2C) markets. Usually a broker charges a fee or commission for each
transaction it enables. The formula for fees can vary. Brokerage models include:
Marketplace Exchange: It offers a full range of services covering the transaction process, from
market assessment to negotiation and fulfillment. Exchanges operate independently or are
backed by an industry consortium.
[Orbitz, ChemConnect]
Buy/Sell Fulfillment -- takes customer orders to buy or sell a product or service, including terms
like price and delivery. [CarsDirect, Respond.com]
Demand Collection System -- the patented "name-your-price" model pioneered by
Priceline.com. Prospective buyer makes a final (binding) bid for a specified good or service, and
the broker arranges fulfillment. [Priceline.com]
Auction Broker -- conducts auctions for sellers (individuals or merchants). Broker charges the
seller a listing fee and commission scaled with the value of the transaction. Auctions vary widely
in terms of the offering and bidding rules. [eBay]
Transaction Broker -- provides a third-party payment mechanism for buyers and sellers to settle
a transaction. [PayPal, Escrow.com]
Distributor -- is a catalog operation that connects a large number of product manufacturers with
volume and retail buyers. Broker facilitates business transactions between franchised distributors
and their trading partners.
Search Agent -- a software agent or "robot" used to search-out the price and availability for a
good or service specified by the buyer, or to locate hard to find information.
Virtual Marketplace -- or virtual mall, a hosting service for online merchants that charges
setup, monthly listing, and/or transaction fees. May also provide automated transaction and
relationship marketing services.
Merchant Services at Amazon.com]
-:Advertising Model:The web advertising model is an extension of the traditional media broadcast model. The
broadcaster, in this case, a web site, provides content (usually, but not necessarily, for free) and
services (like email, IM, blogs) mixed with advertising messages in the form of banner ads. The
banner ads may be the major or sole source of revenue for the broadcaster. The broadcaster may
be a content creator or a distributor of content created elsewhere. The advertising model works
best when the volume of viewer traffic is large or highly specialized.
Portal -- usually a search engine that may include varied content or services. A high volume of
user traffic makes advertising profitable and permits further diversification of site services. A
portal allows customization of the interface and content to the user. A niche portal cultivates a
well-defined user demographic. [Yahoo!]
Classifieds -- list items for sale or wanted for purchase. Listing fees are common, but there also
may be a membership fee. [Monster.com]
Contextual Advertising / Behavioral Marketing -- Advertising links or pop-ups as the user
surfs the web. Contextual advertisers can sell targeted advertising based on an individual user's
surfing activity.
Content-Targeted Advertising -- pioneered by Google, it extends the precision of search
advertising to the rest of the web. Google identifies the meaning of a web page and then
automatically delivers relevant ads when a user visits that page. [Google]
-:Infomediary Model:Data about consumers and their consumption habits are valuable, especially when that
information is carefully analyzed and used to target marketing campaigns. Independently
collected data about producers and their products are useful to consumers when considering a
purchase. Some firms function as infomediaries (information intermediaries) assisting buyers
and/or sellers understand a given market.
Advertising Networks -- feed banner ads to a network of member sites, thereby enabling
advertisers to deploy large marketing campaigns. Ad networks collect data about web users that
can be used to analyze marketing effectiveness. [DoubleClick]
Audience Measurement
[Nielsen//Netratings]
Services
--
online
audience
market
research
agencies.
Incentive Marketing -- customer loyalty program that provides incentives to customers such as
redeemable points or coupons for making purchases from associated retailers. Data collected
about users is sold for targeted advertising. [Coolsavings]
-:Merchant Model:Wholesalers and retailers of goods and services. Sales may be made based on list prices or
through auction.
Virtual Merchant --or e-tailer, is a retail merchant that operates solely over the web.
[Amazon.com]
Catalog Merchant -- mail-order business with a web-based catalog. Combines mail, telephone
and online ordering. [Lands' End]
Click and Mortar -- traditional brick-and-mortar retail establishment with web storefront.
[Barnes & Noble]
Bit Vendor -- a merchant that deals strictly in digital products and services and, in its purest
form, conducts both sales and distribution over the web. [Apple iTunes Music Store]
-:Manufacturer (Direct) Model:The manufacturer or "direct model", it is predicated on the power of the web to allow a
manufacturer (i.e., a company that creates a product or service) to reach buyers directly and
thereby compress the distribution channel. The manufacturer model can be based on efficiency,
improved customer service, and a better understanding of customer preferences. [Dell
Computer]
Purchase -- the sale of a product in which the right of ownership is transferred to the buyer.
Lease -- in exchange for a rental fee, the buyer receives the right to use the product under a
terms of use agreement. The product is returned to the seller upon expiration or default of the
lease agreement. One type of agreement may include a right of purchase upon expiration of the
lease.
License -- the sale of a product that involves only the transfer of usage rights to the buyer, in
accordance with a terms of use agreement. Ownership rights remain with the manufacturer
(e.g., with software licensing).
Brand Integrated Content -- in contrast to the sponsored-content approach (i.e., the advertising
model), brand-integrated content is created by the manufacturer itself for the sole basis of
product placement.
-:Affiliate Model:-
In contrast to the generalized portal, which seeks to drive a high volume of traffic to one site, the
affiliate model, provides purchase opportunities wherever people may be surfing. It does this by
offering financial incentives (in the form of a percentage of revenue) to affiliated partner sites.
The affiliates provide purchase-point click-through to the merchant. It is a pay-for-performance
model -- if an affiliate does not generate sales, it represents no cost to the merchant. The affiliate
model is inherently well-suited to the web, which explains its popularity. Variations include,
banner exchange, pay-per-click, and revenue sharing programs. [Barnes & Noble, Amazon.com]
Banner Exchange -- trades banner placement among a network of affiliated sites.
Pay-per-click -- site that pays affiliates for a user click-through.
Revenue Sharing -- offers a percent-of-sale commission based on a user click-through in which
the user subsequently purchases a product.
-:Community Model:The viability of the community model is based on user loyalty. Users have a high investment in
both time and emotion. Revenue can be based on the sale of ancillary products and services or
voluntary contributions; or revenue may be tied to contextual advertising and subscriptions for
premium services. The Internet is inherently suited to community business models and today this
is one of the more fertile areas of development, as seen in rise of social networking.
Open Source -- software developed collaboratively by a global community of programmers who
share code openly. Instead of licensing code for a fee, open source relies on revenue generated
from related services like systems integration, product support, tutorials and user documentation.
[Red Hat]
Open Content -- openly accessible content developed collaboratively by a global community of
contributors who work voluntarily. [Wikipedia]
Public Broadcasting -- user-supported model used by not-for-profit radio and television
broadcasting extended to the web. A community of users support the site through voluntary
donations. [The Classical Station (WCPE.org)]
Social Networking Services -- sites that provide individuals with the ability to connect to other
individuals along a defined common interest (professional, hobby, romance). Social networking
services can provide opportunities for contextual advertising and subscriptions for premium
services. [Flickr, Friendster, Orkut]
-:Subscription Model:Users are charged a periodic -- daily, monthly or annual -- fee to subscribe to a service. It is not
uncommon for sites to combine free content with "premium" (i.e., subscriber- or member-only)
content. Subscription fees are incurred irrespective of actual usage rates. Subscription and
advertising models are frequently combined.
Content Services -- provide text, audio, or video content to users who subscribe for a fee to gain
access to the service. [Listen.com, Netflix]
Person-to-Person Networking Services -- are conduits for the distribution of user-submitted
information, such as individuals searching for former schoolmates. [Classmates]
Trust Services -- come in the form of membership associations that abide by an explicit code of
conduct, and in which members pay a subscription fee. [Truste]
Internet Services Providers -- offer network connectivity and related services on a monthly
subscription. [America Online]
-:Utility Model:The utility or "on-demand" model is based on metering usage, or a "pay as you go" approach.
Unlike subscriber services, metered services are based on actual usage rates. Traditionally,
metering has been used for essential services (e.g., electricity water, long-distance telephone
services). Internet service providers (ISPs) in some parts of the world operate as utilities,
charging customers for connection minutes, as opposed to the subscriber model common in the
U.S.
Metered Usage -- measures and bills users based on actual usage of a service.
Metered Subscriptions -- allows subscribers to purchase access to content in metered portions
(e.g., numbers of pages viewed). [Slashdot]
The Revenue Models over Internet
There are eight types of revenue model for e-business over internet.
Here payment occurs for single access to a document, video or music clip which can be
downloaded. It may or may not be protected with a password or Digital Rights Management.
Digital rights management (DRM) uses different technologies to protect the distribution of
digital services or content such as software, music, movies, or other digital data.
3. Revenue from CPM display advertising on site
CPM stands for "cost per thousand" where M denotes "Mille". The site owner such as FT.com
charges advertisers a rate card price according to the number of its ads shown to site visitors. Ads
may be served by the site owners own ad server or more commonly through a third-party ad
network service such as Google AdSense..
4. Revenue from CPC advertising on site (pay per click text ads)
CPC stands for "Cost Per Click". Advertisers are charged not simply for the number of times
their ads are displayed, but according to the number of times they are clicked. These are typically
text ads similar to sponsored links within a search engine but delivered over a network of thirdparty sites by on a search engine such as the Google Adsense Network.
Google Network Revenues through Ads generate around one third of Google's revenue. Google
is the innovator and offers options for different formats of ad units including text ads, display
ads, streamed videos and now even cost per action as part of its pay per action scheme.
5. Revenue from Sponsorship of site sections or content types (typically fixed fee for a
period)
A company can pay to advertise a site channel or section. For example, bank HSBC could
sponsors the Money section on a media site. This type of deal is often struck for a fixed amount
per year. It may also be part of a reciprocal arrangement, sometimes known as a "contra-deal"
where neither party pays.
6. Affiliate revenue (CPA, but could be CPC)
Affiliate revenue is commission based, for example I display Amazon books on my personal blog
site DaveChaffey.com and receive around 5% of the cover price as a fee from Amazon. Such an
arrangement is sometimes known as Cost Per Acquisition (CPA ).
Increasingly this approach is replacing CPM or CPC approaches where the advertiser has more
negotiating power. However, it depends on the power of the publisher who will often receive
more revenue overall for CPM deals.
7. Subscriber data access for e-mail marketing
The data a site owner has about its customers is also potentially valuable since it can said
different forms of e-mail to its customers if they have given their permission that they are happy
to receive e-mail either from the publisher or third parties. The site owner can charge for adverts
placed in its newsletter or can deliver a separate message on behalf of the advertiser (sometimes
known as list rental). A related approach is to conduct market research with the site customers.
8. Access to customers for online research
Considering all of these approaches to revenue generation together, the site owner will seek to
use the best combination of these techniques to maximize the revenue. To assess how effective
different pages or sites in their portfolio are at generating revenue, they will use two approaches.
The first is eCPM, or effective Cost Per Thousand.
This looks at the total they can charge (or cost to advertisers) for each page or site. Through
increasing the number of ad units on each page this value will increase. This is why you will see
some sites which are cluttered with ads. The other alternative to assess page or site revenue
generating effectiveness is Revenue per click (RPC).
This is particularly important for affiliate marketers who make money through commission when
their visitors click through to third party retail sites such as Amazon, and then purchase there.
Digital commerce (D-commerce) is a type of e-commerce used by an organization that delivers
and sells products online. D-commerce is used by companies that sell news, subscriptions,
documents or any form of electronic content, and the digital commerce company collects
payments, handles customer refunds and billing and manages other accounting functions for
online publisher clients.
D-commerce is considered a form of e-commerce because it deals with the exchange of
electronic goods.
The pay-as-you-go model is applied to digital commerce. Customers start an account with a
digital commerce company and can purchase text and content from publishers, but they only
have to relay their financial information once. This makes for a more secure online environment.
Publishers of books, news, magazines, white papers and academic research papers are big users
of digital commerce. Some digital commerce companies resell publishers' content. This form of
business can be very profitable for publishers and digital commerce companies alike and,
depending on the business contract, the d-commerce company may get a cut of the publishing
company's profit.
M-commerce (mobile commerce) is the buying and selling of goods and services through
wireless handheld devices such as cellular telephone and personal digital assistants (PDAs).
Known as next-generation e-commerce, m-commerce enables users to access the Internet
without needing to find a place to plug in.
Business & Personal Aims - what is your business's mission? What value are you
seeking to provide?
Marketing Requirements and Goals - how will you reach your target customers?
Platform & Technology - what requirements does your business have to achieve the
goals above?
Mobile Commerce