Introduction To e Commerce PDF
Introduction To e Commerce PDF
Introduction To e Commerce PDF
MARTIN KÜTZ
INTRODUCTION TO
E-COMMERCE
COMBINING BUSINESS AND
INFORMATION TECHNOLOGY
2
Introduction to E-Commerce: Combining Business and Information Technology
1st edition
© 2016 Martin Kütz & bookboon.com
ISBN 978-87-403-1520-2
Peer review by Prof. Dr. Michael Brusch, Fachbereich 6, Hochschule Anhalt and
Prof. Dr. Corinna V. Lang, Fachbereich 2, Hochschule Anhalt
3
INTRODUCTION TO E-COMMERCE Contents
CONTENTS
Table of abbreviations 7
Free eBook on
Learning & Development
By the Chief Learning Officer of McKinsey
Download Now
4
INTRODUCTION TO E-COMMERCE Contents
3 B2C business 62
3.1 The process model and its variants 62
3.2 The pricing challenge 77
3.3 The fulfilment challenge 79
3.4 The payment challenge 80
3.5 B2C-business and CRM 80
3.6 B2C software systems 81
3.7 Exercises 85
4 B2B business 86
4.1 The process model and its variants 86
4.2 B2B software systems 98
4.3 Exercises 106
5
INTRODUCTION TO E-COMMERCE Contents
References 207
6
INTRODUCTION TO E-COMMERCE Table of abbreviations
TABLE OF ABBREVIATIONS
3GPP 3rd Generation Partnership Project
AI Application Identifier
CA Certification Authority
7
INTRODUCTION TO E-COMMERCE Table of abbreviations
EE Enterprise Edition
8
INTRODUCTION TO E-COMMERCE Table of abbreviations
etc. et cetera
9
INTRODUCTION TO E-COMMERCE Table of abbreviations
i.e. id est
IP Internet Protocol
IT Information Technology
MD Message Digest
10
INTRODUCTION TO E-COMMERCE Table of abbreviations
RA Registration Authority
11
INTRODUCTION TO E-COMMERCE Table of abbreviations
www.sylvania.com
We do not reinvent
the wheel we reinvent
light.
Fascinating lighting offers an infinite spectrum of
possibilities: Innovative technologies and new
markets provide both opportunities and challenges.
An environment in which your expertise is in high
demand. Enjoy the supportive working atmosphere
within our global group and benefit from international
career paths. Implement sustainable ideas in close
cooperation with other specialists and contribute to
influencing our future. Come and join us in reinventing
light every day.
Light is OSRAM
12
INTRODUCTION TO E-COMMERCE Table of abbreviations
SE Software Engineering
SE Standard Edition
13
INTRODUCTION TO E-COMMERCE Table of abbreviations
14
INTRODUCTION TO E-COMMERCE Basics and definitions
Recommended pre-reading
• Mohapatra 2013, chapter 1.
360°
.
• Turban et al 2015, chapter 1.
thinking
360°
thinking . 360°
thinking .
Discover the truth at www.deloitte.ca/careers Dis
Discover the truth at www.deloitte.ca/careers © Deloitte & Touche LLP and affiliated entities.
Of course, we looked up the term “E-Commerce” and other related terms in the popular
encyclopaedia Wikipedia. The outcome of our research as of October 25, 2015, is documented
in the subsequent lines.
E-Commerce
“Electronic commerce, commonly written as E-Commerce, is the trading in products or
services using computer networks, such as the Internet. Electronic commerce draws on
technologies such as mobile commerce, electronic funds transfer, supply chain management,
Internet marketing, online transaction processing, electronic data interchange (EDI),
inventory management systems, and automated data collection systems. Modern electronic
commerce typically uses the World Wide Web for at least one part of the transaction’s life
cycle, although it may also use other technologies such as E-Mail.
16
INTRODUCTION TO E-COMMERCE Basics and definitions
E-Business
“Electronic business, or E-Business, is the application of information and communication
technologies (ICT) in support of all the activities of business. Commerce constitutes the
exchange of products and services between businesses, groups and individuals and can be
seen as one of the essential activities of any business. Electronic commerce focuses on the
use of ICT to enable the external activities and relationships of the business with individuals,
groups and other businesses or E-Business refers to business with help of Internet i.e. doing
business with the help of Internet network. The term <E-Business> was coined by IBM’s
marketing and Internet team in 1996.” (Wikipedia 2015)
E-Business is a more general term than E-Commerce. However, in this book we will only use
the term “E-Commerce“, because every business transaction finally is involved in selling or
buying of products or services. And the term “E-Commerce” obviously is more widespread
than the term “E-Business”.
Digital economy
“Digital economy refers to an economy that is (substantially) based on computing technologies.
The digital economy is also sometimes called the Internet Economy, the New Economy,
or Web Economy. Increasingly, the “digital economy” is intertwined with the traditional
economy making a clear delineation harder.” (Wikipedia 2015)
We will not use the term “digital economy” further on in this book, because business is
business be it traditional or digital. And boundaries are moving every day due to technical
development. However, we will repeatedly use the term “digital” or “digitalized” to indicate
that subjects or activities are based on ICT.
Some authors write extremely enthusiastically like this: E-Commerce enables the comprehensive
digital execution of business processes between suppliers and their customers via global
public and private networks.
17
INTRODUCTION TO E-COMMERCE Basics and definitions
• What does “comprehensive” mean? Does it mean the total process? Is everything
digitalized?
• What about transportation and delivery of real goods? Obviously here are some
limits for digitalization, though sooner or later 3-D-printing may change a lot…
• Why should businesses be run electronically? Is enablement a value in itself? Or
do we digitalize businesses because we can reduce costs, accelerate processes and
increase profit?
This definition, though given in many E-Commerce books, is too much marketing-
minded and not helpful to understand the advantages (and disadvantages) of “digitalized”
business reasonably.
Do you like cars? Would you like to be a part of a successful brand? Send us your CV on
We will appreciate and reward both your enthusiasm and talent. www.employerforlife.com
Send us your CV. You will be surprised where it can take you.
18
INTRODUCTION TO E-COMMERCE Basics and definitions
To come to a final definition of E-Commerce let us start with some constituent attributes
of E-Commerce:
• Digitalization of business:
оо This means a comprehensive usage of ICT (Information & Communication
Technology) not only within a business organization (as it has been done
during the last decades by traditional (internal) information systems), but now
through a more and more seamless linking and cooperation of information and
communication systems of all involved business partners.
оо The comprehensive usage of ICT has been enabled by some technologies and
technical standards, which have been accepted globally (see chapter 2 of this book).
19
INTRODUCTION TO E-COMMERCE Basics and definitions
For this purpose the business partners have to couple their business processes and their
ICT systems. These systems have to work together temporarily and seamlessly and have
to share, exchange and process data during the whole business process and across the
boundaries of the cooperating organizations.
Data security and data privacy as well as the compliance with laws and other policies and
procedures have, of course, to be guaranteed.
Another approach to define and explain, what E-Commerce is, comes from the so-called
5-C-model (Zwass 2014). It defines E-Commerce by five activity domains whose denominations
start with the letter “C”:
Commerce
• In the electronic marketplaces there is a matching of customers and suppliers, an
establishing of the transaction terms, and the facilitation of exchange transactions.
• With the broad move to the Web-enabled enterprise systems with relatively uniform
capabilities as compared to the legacy systems, a universal supply-chain linkage has
been created.
Collaboration
• The Web is a vast nexus, or network, of relationships among firms and individuals.
• More or less formal collaborations are created or emerge on the Web to bring together
individuals engaged in knowledge work in a manner that limits the constraints of
space, time, national boundaries, and organizational affiliation.
20
INTRODUCTION TO E-COMMERCE Basics and definitions
Communication
• As an interactive medium, the Web has given rise to a multiplicity of media products.
• This universal medium has become a forum for self-expression (as in blogs) and
self-presentation (as, for an example, in Polyvore: www.polyvore.com).
• The rapidly growing M-Commerce (see below) enables connectivity in context,
with location-sensitive products and advertising.
• In the communications domain, the Web also serves as a distribution channel for
digital products.
Connection
• Common software development platforms, many of them in the open-source domain,
enable a wide spectrum of firms to avail themselves of the benefits of the already
developed software, which is, moreover, compatible with that of their trading and
collaborating partners.
• The Internet, as a network of networks that is easy to join and out of which it is
relatively easy to carve out virtual private networks, is the universal telecommunications
network, now widely expanding in the mobile domain.
�e Graduate Programme
I joined MITAS because for Engineers and Geoscientists
I wanted real responsibili� www.discovermitas.com
Maersk.com/Mitas �e G
I joined MITAS because for Engine
I wanted real responsibili� Ma
Month 16
I was a construction Mo
supervisor ina const
I was
the North Sea super
advising and the No
Real work he
helping foremen advis
International
al opportunities
Internationa
�ree wo
work
or placements ssolve problems
Real work he
helping fo
International
Internationaal opportunities
�ree wo
work
or placements ssolve pr
21
INTRODUCTION TO E-COMMERCE Basics and definitions
Computation
• Internet infrastructure enables large-scale sharing of computational and storage resources,
thus leading to the implementation of the decades-old idea of utility computing.
22
INTRODUCTION TO E-COMMERCE Basics and definitions
Every sales process at the same time is a procurement process or a buying process – from
the point of view of the (potential) customer. Sales processes are driven by the supplier.
Procurement processes are driven by the customer. However the exchange of goods or
services has to be managed. Thus we will consider E-Procurement as a specific view onto
E-Commerce.
“E-Government (short for electronic government, also known as e-gov, Internet government,
digital government, online government, or connected government) consists of the digital
interactions between citizens and their government (C2G), between governments and
government agencies (G2G), between government and citizens (G2C), between government
and employees (G2E), and between government and businesses/commerce (G2B).
This digital interaction includes all levels of government (city, state/province, national, and
international), governance, information and communication technology (ICT), and business
process re-engineering (BPR).”
In the early years, E-Commerce was considered to be an aid to the business. In the meantime
it has become more or less a business enabler (Mohapatra 2013, pp. 10–12).
23
INTRODUCTION TO E-COMMERCE Basics and definitions
Between 1998 and 2000, a substantial number of businesses in the United States and
Western Europe developed rudimentary websites. In the dot-com era, E-Commerce came
to include activities more precisely termed ‘‘Web commerce’’ – the purchase of goods and
services over the World Wide Web, usually with secure connections with E-Shopping carts
and with electronic payment services such as credit card payment authorizations.
The emergence of E-Commerce also significantly lowered barriers to entry in the selling
of many types of goods; many small home-based proprietors are able to use the Internet
to sell goods. Established suppliers had to close their shops and to change their business
model to an E-Commerce model to stay profitable and in the business (e.g. travel agencies).
Often, small suppliers use online auction sites such as eBay or sell via large corporate
websites, to ensure that they are seen and visited by potential customers.
In this chapter we list some typical business activities, which are based on the Internet.
E-Commerce actors cooperate with those firms and use them as specific service providers.
24
INTRODUCTION TO E-COMMERCE Basics and definitions
Access provider
The access provider ensures (technical) access to the Internet. We should have in mind, that
somebody has to pay the access provider so that we can get access to the Internet. Who
pays? We or somebody else? In many (most?) areas of the world it is a totally privatized
business, though sometimes in the political arena the access to the Internet is declared as
a modern human right. Obviously there is a similarity to telephone network(s). However,
it (normally) works in this privatized form.
Traditional business models, which are somehow similar to the business of an access provider,
are operators of a technical infrastructure, e.g. telephone networks, car highways, or railways.
Search engine
Search engines are the most used software in the Internet. They are the starting step for
many Internet-based activities, not only but, of course, also if somebody is looking for a
business opportunity. Again we must ask: Who pays? The one, who wants to find something
or someone? Or the one, who wants to be found?
A traditional and similar business model is given by the so-called “yellow pages”, where
firms are listed and grouped according to branches and locations.
Online shop
An online shop is a website, where you can buy products or services, e.g. books or
office supplies.
Traditional and similar business models are direct mail selling (no shop facility, offering
of goods via a printed catalogue, ordering by letters or telephone calls) and factory outlets
(producer has own shop facility, does not sell his products via merchants).
Content provider
Content providers offer content, a completely digital good, e.g. information, news, documents,
music. A specific variant of a content provider is the information broker, who is a trader
of information.
Again the following question has to be put: Who pays? The one, who wants to have access
to an information? The one, who wants to provide an information?
Traditional business models in this area are newspaper publishers, magazine publishers, radio
and television broadcasting services or publishing companies.
25
INTRODUCTION TO E-COMMERCE Basics and definitions
Portal
A portal is a website, which provides a set of services to the user so that he/she sometimes
thinks that he/she is using a single but very complex software system. Portals are often used
in big organizations to control the access of employees to the different ICT systems; each
employee gets a specific menu of “his”/“her” applications. Also content providers use portals,
though in the narrow sense that they only deliver content and no application systems.
Examples of traditional and similar business models are shopping centers, omnibus orders
(One person is customer of the shop and buys for a group of people), marketplaces and
buying associations.
Virtual community
A virtual community is a platform for communication and exchange of experience. It is
similar to a virtual club or association. We always should ask: Who is the owner? Who is
the person or organization behind the platform? Who pays? The members or the visitors?
The community operator?
Information broker
An information broker collects, aggregates and provides information, e.g. information with
respect to products, prices, availabilities or market data, economical data, technical information.
Here we have to ask: Can we trust the information? Is it neutral or just a product placement?
Who pays? The visitor? Some providers? Financed through advertisements?
Traditional and similar business models are magazines running tests of computers, cars,
consumer goods, restaurants.
Transaction broker
A transaction broker is a person or an organization to execute sales transactions. Sometimes
those brokers are used to hide the real customer to the supplier. A transaction broker is an
agent who is an expert in a specific area and can take over parts of a business.
26
INTRODUCTION TO E-COMMERCE Basics and definitions
The questions, which we have to put, are: Who pays? The service user? If not, who is
the customer?
This list describes a great variety of Internet-based business models. However, it will not be
a complete compilation because with new and innovative technologies new business ideas
will come up and lead to new and additional offerings.
E-Commerce has a lot of advantages. But as we know it from every area of our life, there
is “no free lunch”. Of course, E-Commerce has some disadvantages (see tables 1 and 2).
27
INTRODUCTION TO E-COMMERCE Basics and definitions
Advantages
Disadvantages
• Crime:
оо Bogus firm (firm does not really exist)
оо Fraud (e.g. order is confirmed, invoice
has to be paid, but goods are never
delivered)
A more abstract categorization of digital businesses has been given 2001 by Tapscott (Meier
& Stormer 2008, pp. 34–46). He discussed the following business net types:
28
INTRODUCTION TO E-COMMERCE Basics and definitions
29
INTRODUCTION TO E-COMMERCE Basics and definitions
Web 2.0 (Chen & Vargo 2014) describes World Wide Web sites that emphasize user-
generated content, usability, and interoperability. Although Web 2.0 suggests a new version
of the World Wide Web, it does not refer to an update of any technical specification, but
rather to cumulative changes in the way Web pages are made and used.
CLICK HERE
to discover why both socially
and academically the University
of Groningen is one of the best
places for a student to be
www.rug.nl/feb/education
30
INTRODUCTION TO E-COMMERCE Basics and definitions
If business wants to benefit from Web 2.0 then it has to proceed in a specific way which in
many aspects differs from the traditional Web based business. The differences and conformities
between the Web 1.0 (“old”) and the Web 2.0 world (“new”) are listed in table 3.
31
INTRODUCTION TO E-COMMERCE Basics and definitions
Design/analysis scope Internal focus: one (part of an) Value chain through total
organization organization or group of
organizations
32
INTRODUCTION TO E-COMMERCE Basics and definitions
American online
LIGS University
is currently enrolling in the
Interactive Online BBA, MBA, MSc,
DBA and PhD programs:
33
INTRODUCTION TO E-COMMERCE Basics and definitions
• Do not produce goods but assist customers in their own value-creation processes.
• Value is not created and sold but value is co-created with customers and other
value-creation partners.
• Do not consider customers as isolated entities, but in the context of their own networks.
• Resources are not primarily tangible such as natural resources but usually intangible
such as knowledge and skills.
• Shift from thinking of customers as targets to thinking of customers as resources.
• Shift from making efficiency primary to increasing efficiency through effectiveness.
Obviously there is a strong focus on the customer and customer satisfaction as it should be
in every business. But what is really new? Is there finally a significant difference between
traditional business, Web 1.0 business and Web 2.0 business? We are not sure.
ICT systems have to work properly not only within the boundaries of the own organization
but also in combination with ICT systems of other organizations. Interfaces between the
involved systems have to be defined and documented properly. But: How heterogeneous
are the involved ICT systems allowed to be? Is our IT infrastructure fit for E-Commerce?
How do we have to change or extend our application systems for E-Commerce?
In the digital business ICT systems are mission critical assets. How do we have to protect
an ICT system so that it is not possible to destroy it, damage it or manipulate it? Are
our ICT systems secure? Are unauthorized persons able to get access to our systems? Are
payment procedures secure enough? Can we protect the personal data of involved people,
especially customer data?
Finally we have to realize, that E-Commerce depends on people. Are the people of our
IT organization qualified enough? Can we provide the necessary and significantly high
technical support?
34
INTRODUCTION TO E-COMMERCE Basics and definitions
1.4 EXERCISES
1.4.1 QUESTIONS FOR YOUR SELF-STUDY
Q1.01: Where do you use the opportunities of E-Commerce actually in your daily life?
Q1.03: C
onsider the Internet-based businesses, which we have listed above. Are they really
new business categories?
Q1.05: C
onsider the above-mentioned technical and economic challenges of E-Commerce.
Try to find answers to the various questions, which we have listed.
Q1.06: What is E-Commerce? How does it differentiate from traditional business models?
35
INTRODUCTION TO E-COMMERCE Basics and definitions
T1.01: We have discussed about E-Commerce, E-Business and E-Procurement. Is there any
relationship between these three terms? What is the difference between E-Commerce and
E-Business? What is the difference between E-Commerce and E-Procurement?
T1.02: E-Commerce is so successful, because we have the Internet. Do you agree to that
statement? Why? What would happen, if tomorrow morning the Internet had been shut
down? What would happen, if tomorrow we would only have traditional telephone lines?
T1.04 E-Commerce has advantages as well as disadvantages. Give one example for the
customer’s perspective. Give one example for the supplier’s perspective.
1.4.3 HOMEWORK
Apply the E-Commerce elements to the administration of your university. Who are
the customers? What is delivered? What are the potentials? What are the advantages or
disadvantages? Which parts have already been digitalized? What would you recommend to
the top management of the university to do next?
36
INTRODUCTION TO E-COMMERCE Frameworks and architectures
2 FRAMEWORKS AND
ARCHITECTURES
Learning objectives
In this chapter you will learn,
• what are the main actors and stakeholders in the area of E-Commerce,
• how the fundamental sales process and his 7+1 process steps work,
• what are the technological elements, which are characteristic for E-Commerce and
have enabled the big success of E-Commerce.
Recommended pre-reading
• Mohapatra 2013, chapter 2.
First we have persons, abbreviated by “C”, where “C” stands for (potential) consumers or
citizens, according to the specific context, which is to be considered.
Secondly we have business organizations, abbreviated by “B”, where “B” stands for producers
and suppliers, trade organisations or merchants, banks, insurance companies or other financial
service providers, logistics & transportation firms or forwarding agencies and last but not
least several intermediaries (making business with and on the Internet; see chapter 1 of
this book).
Thirdly we have governmental authorities, abbreviated by “G” or “A”, where “A” stands for
administration and “G” stands for Government. This category includes local authorities, e.g.
on town level or on county level, national authorities, e.g. on state level or on federation level
(United states of…), and international authorities like European Union, United Nations, etc.
We also see political parties, lobby organizations, press and media, non-governmental
organizations (NGO’s) like Greenpeace, Red Cross or Olympic committee, churches and
other religious organizations, sports and other associations. There is no specific abbreviation
for this group of stakeholders.
37
INTRODUCTION TO E-COMMERCE Frameworks and architectures
According to the specific nature of the interacting partners we talk about “X2Y business”
where X and Y belong to the above-mentioned categories. We only talk about X2Y business
if there is an interchange of goods or services and money. The supplier provides goods or
services, the customer, be it a consumer or another business, has to forward an appropriate
amount of money to the supplier. This is done on the base of a contract (be it a written
or an oral contract).
If you are interested in E-Government, see Rodríguez-Bolívar 2014 and Boughzala et al 2015.
38
INTRODUCTION TO E-COMMERCE Frameworks and architectures
However this is a somehow artificial pattern. Doing business can be mainly considered via
two questions:
39
INTRODUCTION TO E-COMMERCE Frameworks and architectures
In general we will denominate the provider of goods or services as the supplier and the
receiver of goods or services as the customer. Sometimes third parties are involved, e.g.
shipping agents, which are denominated specifically.
The steps and sub-steps of the primary process, including the responsible party (see
figure 2), are:
• Information step:
оо Search for products and services: by the customer,
оо Search for potential suppliers: by the customer,
оо Search for potential customers: by the supplier,
оо Communicate an offering: by the supplier,
оо Communicate a need: by the customer,
• Initiation step:
оо Get into contact: either by the customer or by the supplier,
оо Request for delivery or service: by the customer,
оо Offer for delivery or service: by the supplier,
оо Assess supplier: by the customer,
оо Assess customer: by the supplier,
40
INTRODUCTION TO E-COMMERCE Frameworks and architectures
• Delivery/fulfilment step:
оо Proceeding for physical goods:
-- Pack goods: by the supplier,
-- Load goods: by the supplier,
-- Ship goods: by the shipping agent,
-- Unload goods: by the shipping agent,
-- Unpack goods: by the customer or the shipping agent or a specific
service provider,
-- Assemble complex equipment at the customer’s site: by the shipping agent
or a specific service provider,
-- Accept delivery: by the customer,
-- Approve contract fulfilment to authorize billing: by the customer,
41
INTRODUCTION TO E-COMMERCE Frameworks and architectures
• Billing/invoicing step:
оо Generate invoice: by the supplier,
оо Generate attachments to invoice (e.g. protocol of service fulfilment, protocol of
final customer’s approval, certificates, etc.): by the supplier,
оо Forward invoice to customer (via the Web or via postal services): by the supplier,
Maastricht
University is
the best specialist
university in the
Visit us and find out why we are the best! Netherlands
(Elsevier)
Master’s Open Day: 22 February 2014
www.mastersopenday.nl
42
INTRODUCTION TO E-COMMERCE Frameworks and architectures
• Payment step:
оо Get money from the customer (see chapter 7 of this book): by the supplier or
a financial services provider,
• Service/support step:
оо Provide additional information for the customer (e.g. user manual, technical
documentation, etc.): by the supplier,
оо Conduct customer support (e.g. recommendation for usage, FAQ, etc.): by the
supplier,
оо Manage complaints: by the supplier,
оо Repair: by the supplier or a specific service provider,
оо Manage returns (if repair is necessary, a wrong product has been delivered or
customer wants to “roll back” the business): by the supplier in cooperation with
the customer,
оо Conduct maintenance (may be part of the product or may be a separate service
offered by the supplier): by the supplier or a specific service provider.
43
INTRODUCTION TO E-COMMERCE Frameworks and architectures
TCP/IP
TCP/IP (Mohapatra 2013, pp. 28–35) is an abbreviation and stands for Transmission
Control Protocol/Internet Protocol. This twin protocol describes the transportation of data
in the Internet and was introduced in 1978 by the USA-DoD (Department of Defence) as
a standard for heterogeneous networks.
44
INTRODUCTION TO E-COMMERCE Frameworks and architectures
• FDDI (Fiber Distributed Data Interface), which has a ring structure, provides a
transmission rate up to 100 MBit/sec and is defined in the ANSI standards X3T9.5,
X3.139 and X39.5 (ANSI = American National Standards Institute),
• Token Ring, which also has a ring structure, in which the token-possession grants
the possessor permission to transmit on the medium, is an advancement of FDDI
and is defined by the standard IEEE 802.5 (IEEE = Institute of Electrical and
Electronics Engineers),
• Ethernet, which has the widest propagation now, actually is the primary technology
and provides transmission rates up to 10 Gigabit/sec (Access is carried out via
CSMA/CD = Carrier Sense Multiple Access/Collision Detection; technology is
based on standard IEEE 802.3).
AXA Global
Graduate Program
Find out more and apply
45
INTRODUCTION TO E-COMMERCE Frameworks and architectures
• IPv4 (Internet Protocol version 4) is the fourth version of the Internet Protocol
(IP). It is one of the core protocols of standards-based internetworking methods
in the Internet, and the first version was deployed in 1981. IPv4 is described in
the IETF publication RFC 791 (September 1981; RFC = Request for Comment;
IETF = Internet Engineering Task Force), replacing an earlier definition (RFC 760,
January 1980).
IPv4 has a length of 4 Bytes respectively 32 bits. Usually each byte is presented as a
decimal figure between 0 and 255: nnn.mmm.ppp.sss. The address 192.168.178.25 in
binary form is
11000000.10101000.10110010.00011001
• IPv6 (Internet Protocol version 6) is the most recent version of the Internet
Protocol (IP), the communications protocol that provides an identification and
location system for computers on networks and routes traffic across the Internet.
IPv6 was developed by IETF to deal with the long-anticipated problem of IPv4
address exhaustion.
IPv6 uses a 128-bit address, allowing 2128 addresses, or more than 7.9×1028 times as
many as IPv4. The main advantage of IPv6 over IPv4 is its larger address space. The
two protocols are not designed to be interoperable, complicating the transition from
IPv4 to IPv6. However, several IPv6 transition mechanisms have been devised to permit
communication between IPv4 and IPv6 hosts.
46
INTRODUCTION TO E-COMMERCE Frameworks and architectures
IPv6 addresses are represented as eight groups of four hexadecimal digits (16 digits: 0, 1,
2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F) with the groups being separated by colons: XX
XX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX, for example 2001:0DB8:0000:0
042:0000:8A2E:0370:7334.
The number 8A2E means 8 · 163 + A(=10) · 162 + 2 · 161 + E(=14) · 160.
The IETF adopted the IPng (IP next generation) model on 25 July 1994, with the formation
of several IPng working groups. By 1996, a series of RFCs was released defining Internet
Protocol version 6 (IPv6), starting with RFC 1883 and ending with RFC 2460.
It is widely expected that the Internet will use IPv4 alongside IPv6 for the foreseeable future.
Direct communication between the IPv4 and IPv6 network protocols is not possible; therefore,
intermediary trans-protocol systems are needed as a communication conduit between IPv4
and IPv6 whether on a single device or among network nodes.
Layer 4: Process/Application
This layer corresponds to some layers of the ISO/OSI seven layer model: session layer (5),
presentation layer (6) and application layer (7).
47
INTRODUCTION TO E-COMMERCE Frameworks and architectures
HTTP is a stateless protocol. A stateless protocol does not require the HTTP server to
retain information or status about each user for the duration of multiple requests. However,
some Web applications implement states or server side sessions using for instance HTTP
cookies or hidden variables within Web forms.
48
INTRODUCTION TO E-COMMERCE Frameworks and architectures
Although electronic mail servers and other mail transfer agents use SMTP to send and
receive mail messages, user-level client mail applications typically use SMTP only for sending
messages to a mail server for relaying. For receiving messages, client applications usually use
either POP3 or IMAP (POP3 = Post Office Protocol Version 3, IMAP = Internet Message
Access Protocol).
Although proprietary systems (such as Microsoft Exchange and IBM Notes) and webmail
systems (such as Outlook.com, Gmail and Yahoo! Mail) use their own non-standard protocols
to access mail box accounts on their own mail servers, all use SMTP when sending or
receiving email from outside their own systems.
The World Wide Web was invented by the English scientist Tim Berners-Lee in 1989. He
wrote the first Web browser in 1990 while he was employed at CERN (CERN = Conseil
Européen pour la Recherche Nucléaire) in Switzerland.
Berners-Lee’s breakthrough was to marry hypertext to the Internet. In his book “Weaving
The Web”, he explains that he had repeatedly suggested that a marriage between the two
technologies was possible to members of both technical communities, but when no one
took up his invitation, he finally assumed the project himself. In the process, he developed
three essential technologies:
• a system of globally unique identifiers for resources on the Web and elsewhere,
the universal document identifier (UDI), later known as uniform resource locator
(URL) and uniform resource identifier (URI),
• the publishing language HyperText Markup Language (HTML),
• the Hypertext Transfer Protocol (HTTP).
49
INTRODUCTION TO E-COMMERCE Frameworks and architectures
Web pages are primarily text documents formatted and annotated with Hypertext Markup
Language (HTML). In addition to formatted text, Web pages may contain images, video,
and software components that are rendered in the user’s Web browser as coherent pages of
multimedia content. Embedded hyperlinks permit users to navigate between Web pages.
Multiple Web pages with a common theme, a common domain name, or both, may be
called a website. Website content can largely be provided by the publisher, or interactively
where users contribute content or the content depends upon the user or their actions.
Websites may be mostly informative, primarily for entertainment, or largely for commercial
purposes. WWW is documented in RFC 1738 (1994) and WWW is administered by W3C
(W3C = World Wide Web Consortium).
Mobile Communication
GSM/EDGE
GSM (Global System for Mobile Communications, originally Groupe Spécial Mobile),
is a standard developed by the European Telecommunications Standards Institute (ETSI)
to describe protocols for second-generation (2G) digital cellular networks used by mobile
phones. It is the de facto global standard for mobile communications with over 90% market
share, and is available in over 219 countries and territories.
In 1998 the 3rd Generation Partnership Project (3GPP) was founded. It led to the extensions:
EDGE is a digital mobile phone technology that allows improved data transmission rates
as a backward-compatible extension of GSM. Through the introduction of sophisticated
methods of coding and transmitting data, EDGE delivers higher bit-rates per radio channel,
resulting in a threefold increase in capacity and performance compared with an ordinary
GSM/GPRS connection. EDGE can be used for any packet switched application, such as
an Internet connection, and thus creates the basis for M-Commerce.
UMTS
UMTS (Universal Mobile Telephone System) was developed in the 3rd Generation Partnership
Project (3GPP). It is a mobile cellular system for networks based on the GSM standard and
provides transmission rates up to 384 kbit/sec, with HSDPA up to 14,4 Mbit/sec.
50
INTRODUCTION TO E-COMMERCE Frameworks and architectures
UMTS (unlike EDGE) requires new base stations and new frequency allocations. This leads
to high investment efforts with pay back periods up to 10 years.
51
INTRODUCTION TO E-COMMERCE Frameworks and architectures
A Web browser can read HTML files and compose them into visible or audible Web pages.
The browser does not display the HTML tags, but uses them to interpret the content of
the page. HTML describes the structure of a website semantically along with cues for
presentation. It is not a programming language.
HTML elements form the building blocks of all websites. HTML allows images and
objects to be embedded and can be used to create interactive forms. It provides a means
to create structured documents by denoting structural semantics for text such as headings,
paragraphs, lists, links, quotes and other items. It can embed scripts written in languages
such as JavaScript, which affect the behaviour of HTML Web pages.
HTML documents can be delivered by the same means as any other computer file. However,
they are most often delivered either by HTTP from a Web server or by E-Mail.
There are a lot of specific HTML-editors available (Open Source, Freeware, Commercial software).
The design goals of XML emphasize simplicity, generality, and usability over the Internet.
It is a textual data format with strong support via Unicode for different human languages
(Unicode is a computing industry standard for the consistent encoding, representation, and
handling of text expressed in most of the world’s writing systems. Developed in conjunction
with the Universal Coded Character Set (UCS) standard and published as The Unicode
Standard, the latest version of Unicode contains a repertoire of more than 128,000 characters
covering 135 modern and historic scripts, as well as multiple symbol sets.) Although the
design of XML focuses on documents, it is widely used for the representation of arbitrary
data structures, e.g. in Web services. The advantage of XML is that the data structure of a
document is documented within the document. However, there is a “price” for this generality:
The size of XML documents, compared to EDIFACT documents, is much greater.
52
INTRODUCTION TO E-COMMERCE Frameworks and architectures
As of 2009, hundreds of document formats using XML syntax have been developed, including
RSS (Rich Site Summary; a family of standard Web feed formats to publish frequently
updated information: blog entries, news headlines, audio, video), Atom (Atom Syndication
Format; used for Web feeds; or: Atom Publishing Protocol for creating and updating Web
resources.), SOAP (Simple Object Access Protocol; protocol specification for exchanging
structured information in the implementation of Web services in computer networks), and
XHTML (Extensible HyperText Markup Language; mirrors or extends versions of HTML).
XML-based formats have become the default for many office-productivity tools, including
Microsoft Office (Office Open XML), OpenOffice.org and LibreOffice (OpenDocument),
and Apple’s iWork. XML has also been employed as the base language for communication
protocols, such as XMPP (Extensible Messaging and Presence Protocol). Applications for
the Microsoft .NET framework use XML files for configuration. Apple has developed an
implementation of a registry based on XML.
XML database
An XML database is a data persistence (a data structure that always preserves the previous
version of itself when it is modified) software system that allows data to be stored in XML
format. These data can then be queried, exported and serialized into the desired format.
XML databases are usually associated with document-oriented databases.
• XML enabled data bases: These may either map XML to traditional database
structures (such as a relational database), accepting XML as input and rendering
XML as output, or more recently support native XML types within the traditional
database. This term implies that the database processes the XML itself (as opposed
to relying on middleware).
• Native XML data bases: The internal model of such databases depends on XML
and uses XML documents as the fundamental unit of storage, which are, however,
not necessarily stored in the form of text files.
2.3.2 MIDDLEWARE
Middleware consists of technologies building the link between hardware and application
software. The boundaries between middleware and hardware as well as between middleware
and application software are changing over time due to the technological development.
Middleware normally is a category of general and not application specific software. In general
there is a trend to replace hardware functionality by middleware thus allowing the usage of
highly standardized hardware components which can be provided at low cost.
53
INTRODUCTION TO E-COMMERCE Frameworks and architectures
Database systems
In a business environment we often use a relational database system, which is optimally
suited to store and process structured data as we find it in typical business transactions.
54
INTRODUCTION TO E-COMMERCE Frameworks and architectures
• Address data,
• Orders,
• Shipping documents,
• Invoices,
• Tax declarations.
Together with the growing usage of unstructured data (text documents, graphical information,
multi media data) new types of databases become relevant for business purposes: NoSQL
databases (Not only SQL) and XML databases.
Directory services
We need directory services for the following purposes:
• Address lists,
• User management: A common usage of a directory service is to provide a “single
sign on” where one password for a user is shared between many services, such as
applying a company login code to Web pages (so that staff log in only once to
company computers, and then are automatically logged into the company intranet),
• Authentication.
55
INTRODUCTION TO E-COMMERCE Frameworks and architectures
Webserver
A Webserver is a virtual computer (a piece of software), which helps to deliver Web content
that can be accessed through the Internet.
WSDL is an XML-based interface definition language that is used for describing the
functionality offered by a Web service. WSDL describes services as collections of network
endpoints, or ports. The abstract definitions of ports and messages are separated from their
concrete use or instance, allowing the reuse of these definitions. WSDL is often used in
combination with SOAP and an XML Schema to provide Web services over the Internet.
2.3.3 PLATFORMS/FRAMEWORKS
Portal
A portal is a central entry and navigation point to provide access to a virtual area (of
applications or services) and to deliver additional information to the user. It works as
an interface between user and system(s). Often portals are seen as the platform for an
E-Commerce-strategy.
56
INTRODUCTION TO E-COMMERCE Frameworks and architectures
• Web portal
оо A horizontal portal is used as a platform to several companies in the same
economic sector or to the same type of manufacturers or distributors.
оо A vertical portal (also known as a “vortal”) is a specialized entry point to a
specific market or industry niche, subject area, or interest. Some vertical portals
are known as “vertical information portals” (VIPs).
• Enterprise portal
оо provides a secure unified access point, often in the form of a Web-based
user interface,
оо is a framework for integrating information, people and processes across
organizational boundaries,
оо is designed to aggregate and personalize information through application-
specific portlets (Portlets are pluggable user interface software components
that are managed and displayed in a Web or enterprise portal.).
RUN FASTER.
RUN LONGER.. READ MORE & PRE-ORDER TODAY
RUN EASIER… WWW.GAITEYE.COM
57
INTRODUCTION TO E-COMMERCE Frameworks and architectures
• Content management application (CMA) is the front-end user interface that allows
a user, even with limited expertise, to add, modify and remove content from a
Website without the intervention of a Webmaster.
• Content delivery application (CDA) compiles that information and updates
the Website.
58
INTRODUCTION TO E-COMMERCE Frameworks and architectures
Java EE Open Source Servers are Apache Geronimo, JBoss Application Server or GlassFish.
Commercial Servers are IBM WebSphere, Oracle Application Server or SAP Netweaver
Application Server.
.NET (Dot-net)
.Net is a proprietary platform, provided by Microsoft. It is a competitor to Java EE.
As a basis for subsequent considerations we will draft a general software architecture for
the E-Commerce area (see figure 5).
59
INTRODUCTION TO E-COMMERCE Frameworks and architectures
This e-book
is made with SETASIGN
SetaPDF
www.setasign.com
60
INTRODUCTION TO E-COMMERCE Frameworks and architectures
These application systems will be discussed in more detail in chapters 3 and 4 of this book:
In this architecture three elements have interfaces between supplier and customer:
2.4 EXERCISES
2.4.1 QUESTIONS FOR YOUR SELF-STUDY
Q2.01: Compare the fundamental sales process as it has been shown here to your daily
life and the “traditional” sales process. What is different? What is new? What is missing?
Q2.02: How much should a business manager know about technical subjects? What is “need
to know”? What is “nice to know”?
T2.01: Please list the seven plus one steps of the fundamental selling/purchasing process.
T2.02: There are three basic types of software systems in the E-Business: Online Shop/
Marketplace/Procurement Platform. Characterize them by the number of suppliers and customers.
T2.03: A basic technology of E-Business is abbreviated by TCP/IP. Was does this mean?
What are the two functions, which are covered by this technology?
T2. 04: Explain the two abbreviations B2C and B2B. Do you think it could make sense
to define a business type C2C? Why?
2.4.3 HOMEWORK
It is often stated, that E-Commerce will lead to fully digital economics. Find a realistic view
onto this topic. Which parts of the business can be digitalized? Which cannot?
61
INTRODUCTION TO E-COMMERCE B2C business
3 B2C BUSINESS
Learning objectives
In this chapter you will learn,
• that the fundamental sales process has a lot of variants due to a great variety of
needs of the involved parties,
• that there are three challenges in realising B2C business, namely the pricing challenge,
the fulfilment challenge and the payment challenge,
• that digital business creates new opportunities to learn more about your customers.
Recommended pre-reading
• Mohapatra 2013, chapter 4.
First let us naively consider what is going on if we buy something via the Internet. The process
starts, when the customer generates an order via an online shop. The order is processed in
the backend ERP system(s) as a sales order and all ordered products and components are
verified. If products are available in the quantity, which the customer has ordered, products
can be delivered to the customer’s location, and at that point of time, which is convenient
for the customer.
After that verification the processing of the order continues in preparing that order for packing
and shipping and also preparing it for billing. The customer gets an acknowledgement of
his order. Customer and order data are available via a portal solution to all stakeholders.
62
INTRODUCTION TO E-COMMERCE B2C business
Obviously is the Internet based selling process more complex than it looks like at the first
impression. Thus we will discuss the process steps in more detail.
Free eBook on
Learning & Development
By the Chief Learning Officer of McKinsey
Download Now
63
INTRODUCTION TO E-COMMERCE B2C business
Information step
How does the process start? The first variant is, that the customer becomes active. Even
here we have to differentiate because the starting point may be different:
The customer may enter the process via search engines, marketplaces/multi-shops, communities,
rating platforms or known providers respectively their websites or online shops. Within
those entry paths some questions arise:
• Who pays the information provider, if the process is started via online communities,
rating platforms or search engines? Normally the customer does not pay for
those services.
• Who is owner of the information sources? Rating platforms for product and price
comparison are often operated and owned by publishing companies. Online communities
are many a time established and administered by providers or lobby organizations.
• Who benefits?
• And finally: How does the payer, if it is not the customer, restrict or filter the
information, which is forwarded to the customer?
The second variant of the information step is, that the supplier initiates it. Here we can
differentiate, whether the customer is already known to the supplier or not. If the customer
is already known then the process may be initiated via a specific contact or a general
information (relationship management) or a specific offering (1:1-marketing/personalization).
If the customer is not yet known to the supplier then he will try to call the customer’s
attention via supplier communities/marketplaces/multi-shops, via online communities, via
banner advertising or via “adwords” (intelligent small ads). Advertisements are placed in
search engines or websites of public interest. Sometimes sports and other associations take
advertisements to fund their website or organization.
64
INTRODUCTION TO E-COMMERCE B2C business
If the supplier wants to appeal to the customer specifically then he should have appropriate
customer profiles. Those profiles are a valuable asset and contain information about properties/
preferences/behaviours. This information may either be provided by the customer voluntarily
or extracted from former behaviour of the customer (automatically) through analysing his
visits, communication and transactions.
This generation of customer profiles can be done by each single supplier or by an aggregation
of data collected by several suppliers. The latter can be an independent business. However,
legal restrictions with respect to data privacy have to be followed.
Cookies are tokens or short packets of data passed between communicating programs, where
the data is typically not meaningful to the recipient program. The contents are opaque
and not usually interpreted until the recipient passes the cookie data back to the sender or
perhaps another program at a later time. Cookies allow detailed access statistics. However,
the user must be able to switch cookies off (due to definition of IETF).
Profiles are explicitly provided by the customer. Profiles can also be deduced from the
customer’s behaviour (see chapter 8 of this book):
Profile information is aggregated in data warehouses and analysed with methods from OLAP
(Online Analytical Processing) and data mining.
65
INTRODUCTION TO E-COMMERCE B2C business
• Given profile data whether they are provided directly by the customer or deduced
from data, which have been provided by the customer in different environments,
• Credit-worthiness information (from banks or financial service provides),
• Address data (from online communities or electronic telephone directories),
• Demographic data (age, sex, marital status, profession; from online communities
or existing profiles),
• Geographic data (size and location of place of residence, type of flat or house),
• Positive/negative attributes (e.g. from former transactions or from profile data).
Recommendation Engines are software systems, which analyse what the customer has
purchased or checked. From this behaviour they make conclusions what the customer could
be interested in when he visits the online shop for the next time. Good recommendation
engines are learning systems. The longer they monitor the customer the better do they
predict the customer’s wishes and interests.
www.sylvania.com
We do not reinvent
the wheel we reinvent
light.
Fascinating lighting offers an infinite spectrum of
possibilities: Innovative technologies and new
markets provide both opportunities and challenges.
An environment in which your expertise is in high
demand. Enjoy the supportive working atmosphere
within our global group and benefit from international
career paths. Implement sustainable ideas in close
cooperation with other specialists and contribute to
influencing our future. Come and join us in reinventing
light every day.
Light is OSRAM
66
INTRODUCTION TO E-COMMERCE B2C business
The active identification and evaluation of customers has a downside: There is not only a
positive but also a negative selection. Organizations establish specific rules like: You charge
them higher fees because you don’t want them – make them know they’re not welcome.
Or: Unprofitable customers will pay an additional price in terms of service. You answer
the cash cows first. Examples of these strategies can be easily found in banks, insurances
or mail order firms.
In both variants of the information step product information is needed and has to be
presented to the (potential) customer. If standardized products and services are offered then
product information will be given via an online catalogue. This catalogue contains:
Because online shops offer products of different suppliers, there should be a common
product data model in the industry. Indeed there are some general data models available.
67
INTRODUCTION TO E-COMMERCE B2C business
In German speaking economies dominates the so-called BMEcat (the BME catalogue;
BME = Bundesverband Materialwirtschaft, Einkauf und Logistik e.V. (Germany); in English:
Association Materials Management, Purchasing and Logistics). The actual version (2015) is
BMEcat 2005. BMEcat provides a basis for a simple adoption of catalogue data from many
different formats and particularly provides the requirements to promote the Internet goods
traffic among companies in Germany. BMEcat can be used in a multi-language environment
as well as in a multi-supplier environment. The XML-based standard BMEcat has successfully
been realized in a multiplicity of projects. Many companies are using BMEcat today and
exchange their product catalogues in the established standard BMEcat.
In BMEcat product data are documented with the following data element groups:
There are also a lot of commercial activities in the product data management. OCI (Open
Catalogue Interface) is a product of SAP AG (a successful German software enterprise).
OCI allows access from SAP systems to provider catalogues.
68
INTRODUCTION TO E-COMMERCE B2C business
Another commercial offering is cXML (commerce XML), which was initiated by Ariba,
a provider of procurement systems, which is well established in the USA. cXML is based
on XML and provides formal XML schemas for standard business transactions, allowing
programs to modify and validate documents without prior knowledge of their form. cXML
is a protocol that is published for free on the Internet along with its DTD. It is open to
all for their use without restrictions apart from publications of modifications and naming
that new protocol. Essentially, everyone is free to use cXML with any and all modifications
as long as they don’t publish their own standard and call it “cXML”. cXML supports the
punch-out method, which is a specific method of the interaction between a supplier’s Web
storefront and a customer’s procurement application. With this method the customer leaves
(“punches out”) his company’s system and goes to the supplier’s Web-based catalogue to
locate and add items to his shopping cart, while his application transparently maintains
connection with the website and gathers pertinent information.
360°
thinking .
360°
thinking . 360°
thinking .
Discover the truth at www.deloitte.ca/careers Dis
Discover the truth at www.deloitte.ca/careers © Deloitte & Touche LLP and affiliated entities.
GTIN is contained in GS 1–128, an application standard within the Code 128 barcode.
It identifies data with Application Identifiers (AI) and is a universal identification system
in logistics. GTIN has 13 digits:
ISBN (International Standard Book Number) and ISSN (International Standard Serial
Number), which every student should know well, are included in GTIN.
The potential of actual technologies allows a powerful monitoring and analysis of user
data in the Internet. Data privacy thus has become an issue. With P3P (Platform for
Privacy Preferences) a protocol is available allowing websites to declare their intended
use of information they collect about Web browser users. P3P was developed by the W3C
and officially recommended on April 16, 2002. P3P-Profiles are stored on Web servers in
XML files.
If the surfer has a P3P agent, he can define, how the Web is allowed to handle his data. Usage
is free for all providers and users. The protocol works in three steps: Proposal – Acceptance –
Agreement, where the agreement is recommended by the provider. The negotiation of data
privacy rules is done automatically by a “user agent”. A P3P agent is integrated in common
browsers. However, the end user cannot check the action of the Web server and has to
trust in them.
70
INTRODUCTION TO E-COMMERCE B2C business
Initiation step
When customer and supplier at the end of the information step know that they want to
conduct a business transaction together, then they initiate it according to the specific nature
of the goods to be sold respectively bought.
If standardized products without individual offers are sold then an electronic shopping
cart is provided. The customer picks up interesting products or services and puts them into
his shopping cart. He removes products or services, which are not interesting for him. The
financial volume is always transparent so that he knows at any time how much he would
have to pay if he would decide to buy the actual content of his shopping cart. The customer
is able to order or abort every time.
If goods or services have to be personalized then this is done via requests and offers. The
online shop has to provide an appropriate functionality to run this dialogue between supplier
and customer.
The request of the customer to buy something from the supplier must be answered by the
supplier. He will run a solvency check either based on his own customer profile data or
(sometimes) by sending a request to a specific financial information service provider. At the
end he accepts or refuses the order and sends a confirmation note to the customer. Normally
the customer expects that this is conducted within seconds or even parts of seconds but
effort and duration of such checks may depend on the ordered goods and the financial
volume of the order.
71
INTRODUCTION TO E-COMMERCE B2C business
A severe problem for many online shops are the so-called junk orders, where people order
things just for fun and never plan to accept delivery and pay for the delivered goods.
Suppliers will try to find out whether there is a risk of junk ordering by checking the
previous behaviour of the customer. In the case of digital goods the process may be designed
such that the digital good can be downloaded to the customer’s client, but not used until a
specific key is provided to the customer. This key will be sent to the user when the supplier
is sure that the customer has paid or will pay.
Delivery/fulfilment step
If real goods have been sold, then the contract between supplier and customer is followed
by the compilation of the ordered goods. If goods are not in stock of the online shop
they have to be ordered at the producer and either they can be taken from the producer’s
warehouse or they have to be produced. When the ordered goods are available they must be
consigned, packed and forwarded to transportation. Now the delivery can be made directly
to the customer’s address or to a station, e.g. an authorized retail shop in the customer’s
neighbourhood or to another home address if we are in an omnibus buying where an “agent”
orders for his friends, colleagues or neighbours.
Do you like cars? Would you like to be a part of a successful brand? Send us your CV on
We will appreciate and reward both your enthusiasm and talent. www.employerforlife.com
Send us your CV. You will be surprised where it can take you.
72
INTRODUCTION TO E-COMMERCE B2C business
At the end of the shipment the package with the ordered goods has to be physically given
to the customer. Because the customer is not always at home or in his office, the delivery
time must be coordinated. When this time has come the shipping company will be on site
and transfer the goods to the customer. The customer then will confirm the delivery and
that he has taken over the goods into his responsibility.
Sometimes the delivery will not be possible. It may be that the customer is not on site
whether he has forgotten the delivery time or had to change his schedule short term and
was not able to inform the shipping agent. It may be that the acceptance is refused, e.g.
because of transport damages or the delivery had been initiated by a junk order.
Depending to the nature of the ordered goods an installation or assembly will be necessary
at the customer’s site. If complex (technical) equipment is delivered an instruction of the
customer’s representative has to be conducted. Finally old equipment has to be removed
and packaging material has to be disposed.
The process step is finished with a confirmation of the delivery by the customer.
If services have been ordered the process has to be modified. The reason is that the customer
is an active part of service production. The service production equipment must be provided
and be shipped to the location of service delivery/service production. Also the time of
service delivery must be determined. The process step finishes again with a confirmation
of the service delivery.
If digital goods have been ordered they may be either documents or rights to use something.
Documents will often be delivered due to the push principle; the ordered documents is
sent to the customer. If a right has been sold then the delivery mostly is conducted due to
the pull principle; the customer has to download software or a key or whatever he needs
to realize the benefits of his purchase. The transfer of the digital good to the customer is
closed with a proof of delivery. In the case of digital products the delivery process can be
completely digitalized and processed with the Internet.
Finally also in this variant the process step is finished with a confirmation of delivery by
the customer. This may be integrated into the proof of delivery.
Billing/invoicing step
After the confirmation of delivery the billing and invoicing step can be started.
73
INTRODUCTION TO E-COMMERCE B2C business
If the customer had to pay before delivery then it may happen that the invoice has to be
corrected and a credit note (if the value of the delivered goods was lower than the value of
the originally ordered goods) or debit note (if the value of the delivered goods was higher
than the value of the originally ordered goods) must be created. Customers do not like
additional charges. So the customer relationship management has to think of appropriate
charging strategies.
If the customer has not paid before delivery, then the ideal situation is the identity of delivery
and order. If there is a deviation from order an adjusted invoice has to be created. Here
we also have the problem of the customer’s acceptance in case of higher invoice amounts.
The supplier should carefully consider the process and optimize it so that the expected
invoice total is exceeded only in very few cases.
Billing seems to be simple but of course it is not. Tax regulations have to be followed. It
also turns out that costs of paper invoices are alarmingly high (paper, envelopes, stamps,
processing cost). Also the run time of invoice letters at postal services may be an issue. If
the customer gets the invoice one day later he will also pay one day later. If the supplier
wants to create electronic invoices he has to be sure that the lawfulness of electronic invoice
is given and he has to follow corresponding law requirements for (electronic) invoices.
The receipt of payment depends on the agreed payment method (see chapter 7 of this book).
If the payment is done after delivery and not in combination with delivery then there may
be a delay of payment and the supplier has to initiate a corresponding dunning process
to get his money. First he will send friendly reminders to the customer, later-on dunning
letters. If the customer does not just yet pay then it comes to a lawsuit. After the lawsuit a
compulsory execution will be initiated to get the money from the customer with the help
of governmental authorities.
If the supplier wants to have no trouble with the payments he could change to factoring.
Here he will sell the debt claims to a third party and this third party will take over the
cashing. The supplier will get a (major) part of the claimed amount immediately and does
not have to wait for weeks or months. This improves his solvency.
Finally there is a very good advice for getting your money from your customers: Tell
your customer that you have an effective cashing process – and be consequent in running
that process.
74
INTRODUCTION TO E-COMMERCE B2C business
Sometimes the customer will get money back from you (credit voucher). According to the
selected payment method this can result in a money transfer to the customer’s bank account,
a cash payment to the customer or a back posting on the customer’s credit card account.
Service/support step
To be successful in E-Commerce does not only depend on interesting products, low prices
and fast delivery. To generate a high customer satisfaction presumes a professional service
and support. There must be an effective complaints management. Supplementary and
replacement deliveries, including return consignments, must be in place and run smoothly
if needed.
The customer expects appropriate assembly support and installation help, of course a good
documentation, e.g. user manuals, FAQ options. If a repair of a delivered component is
necessary picking up and sending back of the component to the supplier should be as easy
as possible for the customer. It may be that an on-site repair is the best alternative.
Return orders should be avoided, because it always leads to an expenditure of time for the
customer and also a financial effort of the customer. The customer is strongly involved in
the execution.
�e Graduate Programme
I joined MITAS because for Engineers and Geoscientists
I wanted real responsibili� www.discovermitas.com
Maersk.com/Mitas �e G
I joined MITAS because for Engine
I wanted real responsibili� Ma
Month 16
I was a construction Mo
supervisor ina const
I was
the North Sea super
advising and the No
Real work he
helping foremen advis
International
al opportunities
Internationa
�ree wo
work
or placements ssolve problems
Real work he
helping fo
International
Internationaal opportunities
�ree wo
work
or placements ssolve pr
75
INTRODUCTION TO E-COMMERCE B2C business
E-Commerce allows checking the customer’s satisfaction with each specific transaction.
This can be done but there is the risk that the customer feels stalked by the supplier. Some
enterprises exercise an approach where specific transactions initiate an assessment of the
supplier in general.
Of course each supplier should keep in contact with his customers and each transaction
should create information for the customer relationship management. Clubs, forums or so-
called customer advisory boards can help to improve customer relationships. However this
will only work successfully if customer’s are considered as real partners. If the customers
have the impression that those clubs, forums or boards are not a platform for a serious
dialogue between supplier and customers then the effect of such platforms may be worse
than having no such platforms.
Customer relationship means communication with the customer. In the E-Commerce world
a great variety of communication channels is available:
• Letters,
• E-Mails,
• Telephone calls,
• Electronic chat rooms.
The challenges for the supplier are availability of those channels and acceptable response times.
Prerequisites for this seamless tracking and tracing are the interconnectedness of all actors,
e.g. sub-contractors, the harmonization of data structures and communication protocols
and the identification of goods to be conveyed.
76
INTRODUCTION TO E-COMMERCE B2C business
3.1.3 E-PROCUREMENT
E-Procurement is a synonym for the selling process considered from the point of view of
the customer. It is similar to B2C, but now the buying organization is the driver. This
organization is the only customer and is looking for many suppliers. Thus a procurement
platform if we talk about IT systems is somehow an inverse of an online shop.
The first pricing strategy (see Chen 2014) is that the supplier sets the prices for his products.
The customer makes a “take-it-or-leave-it” decision. In the E-Commerce world this leads to
lower prices and price dispersion. The problem for the supplier is, that it is easy to reduce
prices but it is extremely hard to increase prices.
The second pricing strategy is the auction. Here we have a horizontal competition among
customers. The customer who offers the highest amount of money gets the product. However,
there is a difference to real-life auction if we are in the digital world. There are different
end of auction rules, hard ending times and late minute bidding. The disadvantage for
the customer is that Internet auctions run without physical inspection of goods. Thus the
reputation of the supplier is a fundamental prerequisite for the trust of the customer in
such transactions.
The third pricing strategy is the individual negotiation between customer and supplier.
In the economic theory there is the law of one price. That means that in an ideal market with
identical and total information for every participant demand and supply lead to a unique
price for a specific product. But does this work in real markets? Obviously not, which can
easily found out by everybody of us. And it is also true for markets in the Internet. What
are the reasons for such price dispersions?
First of all suppliers are not interested in ideal markets with total transparency and full
information for everybody. And they try to create the impression as if they would offer a
unique product or service as well as keeping competitors on distance. The objective of the
first approach is that the (potential) customer stops his search process because he thinks
that he has already found the best offer. The objective of the second approach is to exclude
competitors from the competition, so that they are not able to offer something adequately
to the customer.
77
INTRODUCTION TO E-COMMERCE B2C business
• Frustrate customers in searching so that they stop their search process earlier.
• Pull customers to products with low prices so that they think that the favourable
prices are representative for the whole program of offered products.
• Give discounts only for selected products, which shall have the same result as
pulling customers to the low price corner.
• Run short-term promotions, which are unpredictable for competitors.
• Prohibit comparability of prices by including or excluding delivery costs.
• Prohibit comparability of prices by giving different guarantees to the customer.
• Give discounts only for specific delivery options of a product, which shall have the
same result as pulling customers to the low price corner.
• Focus on brand loyalty and supplier reputation in advertising.
• Avoid competition between different channels by offering different product variants
in different sales channels.
• Let the customers think that they already have the complete information.
78
INTRODUCTION TO E-COMMERCE B2C business
Real goods cannot be forwarded electronically to the customer. Forwarding agencies and
trucking companies are needed. Is this an own function or should it be transferred to a
third party (outsourcing)? Does it make sense to think about delivery with drones? For
example in areas with very low density of population? How much is short-term delivery a
competitive advantage?
The next question where the supplier has to find an answer is whether the customer is at
home to take over delivered products? Was an alternative delivery point defined in the order?
Can the supplier deliver to a neighbour? Does the customer want this? Can the supplier
trust in the neighbour? How can the delivery be proved if the neighbour signs? What can
the supplier do if the customer declares that he never got the shipment?
And finally should the supplier do everything to avoid transportation damages. What are the
packaging requirements? Who takes the risk of transportation damages? And does customer
pay for transportation?
Digital goods can be copied without any damage of the original copy. Thus the “master
copy” must be protected against unauthorized usage.
As an example let us consider the electronic distribution of software according to the model
of SIIA (Software & Information Industry Association; see Meier & Stormer 2008).
79
INTRODUCTION TO E-COMMERCE B2C business
• The online customer selects the requested software, downloads it from the BOB
via the online shop of a merchant, pays for the software and gets a digital key and
a license from the clearing organization.
• The clearing organization registers the software products, administers keys and its
distribution and is a gateway for the money transfer from customer to bank, too.
• The online merchant has a contract with the software supplier, can order products
from the BOB and offers consulting and services to his customers.
Process owner of the CRM processes is the supplier. In CRM there is no focus on single
transactions but on customer activities in general.
80
INTRODUCTION TO E-COMMERCE B2C business
An online shop is characterized by one supplier and n customers. Process and software are
under the control of the supplier.
81
INTRODUCTION TO E-COMMERCE B2C business
• Tax system,
• Development system,
• Data management (product catalogue, customers, transactions, documents, banner pool)
• Interfaces:
оо Payment gateway,
оо Data exchange with business partners (e.g. suppliers, forwarding agencies, payment
service providers),
оо ERP-System (accounting, materials management),
оо Data warehouse.
There are organizations, which certify online shops and award quality seals. Examples of
such organizations are:
A typical procurement platform includes purchase requisitions, purchase orders, goods receipts,
and invoice processing. In addition to these core requirements, most systems include an
array of reporting tools. Built-in approval processes, controls, and funds management tools
are usually standard in the larger products.
82
INTRODUCTION TO E-COMMERCE B2C business
• Indent management,
• E-Tendering,
• E-Auctioning,
• Vendor management,
• Catalogue management,
• Purchase order integration,
• Order status,
• Ship notice,
• E-Invoicing,
• E-Payment,
• Contract management.
• External interfaces:
оо Web channel,
оо Interaction channel,
оо Partner channel management,
• Marketing:
оо Marketing resource management,
оо Segmentation & list management,
оо Campaign management,
оо Real time offer management,
оо Lead management,
83
INTRODUCTION TO E-COMMERCE B2C business
• Sales:
оо Sales planning & forecasting,
оо Sales performance management,
оо Territory management,
оо Accounts & contacts,
оо Opportunity management,
оо Quotation & order management,
оо Pricing & contracts,
оо Incentive & commission management,
оо Time & travel,
• Service:
оо Service order management,
оо Service contract management,
оо Complaints & returns,
оо In-house repair,
оо Case management,
оо Installed base management,
оо Warranty management,
оо Resource planning,
CLICK HERE
to discover why both socially
and academically the University
of Groningen is one of the best
places for a student to be
www.rug.nl/feb/education
84
INTRODUCTION TO E-COMMERCE B2C business
• Internal interfaces:
оо Trade promotion management,
оо Business communication management.
3.7 EXERCISES
3.7.1 QUESTIONS FOR YOUR SELF-STUDY
Q3.01: How can we get to the point where the consumer wants to buy something from us?
Q3.02: How should we make the business, so that the customer is satisfied, and we as a
supplier are satisfied as well?
Q3.03: You are a producer of a specific product, which you deliver in various packaging sizes
and different trade units. What are the consequences for the identification of the product,
e.g. to determine your sales quantities?
Q3.04: Think that you run an online shop. How can you make sure that the customer,
just placing an order, is a real customer, will accept the delivery and then pay the invoice?
Q3.05: Think that you sell digital goods. How can you ensure that the customer does not
disclaim the delivery of a digital good?
T3.01: If you are the owner of an online shop, you can decide whether your customers have
to pay before delivery or after delivery. Both variants have advantages and disadvantages
for you. Assume that you can select only one of both methods. Which one would you
select? Why?
3.7.3 HOMEWORK
Consider the key success factors of B2C. Is it only IT? What is most important?
85
INTRODUCTION TO E-COMMERCE B2B business
4 B2B BUSINESS
Learning objectives
In this chapter you will learn,
Recommended pre-reading
• Chakravarty 2014, chapter 4.
B2B stands for “Business to Business”. In general: Business interaction between different
organizations is considered. B2B E-Commerce is simply defined as E-Commerce between
companies (Xu 2014, pp. 119–130). Business processes cross the boundaries of the participating
organizations. B2B also includes business interactions between sub-organizations of (big)
organizations. Big enterprises are often organized as a group of different autonomous legal
entities. There is no clear limit between “inner world” and “outer world”.
Somehow B2B is a synonym for integration and coupling of business processes. What does
this mean for the responsible management?
Business processes cross boundaries of organizations. Thus the process ownership must be
clearly defined and assigned. It also should be clear, who are the owners of different sub-
processes and how they have to coordinate their work. The overall process owner may be
a process committee consisting of all sub-process owners. If there is a process committee
then decision rules must be defined and agreed on by all involved organizations.
There must also be integration and consistency of the underlying business rules. These
business rules must be consistent between the participating organizations and they must be
agreed on in all participating organizations. Often there is one participating organization,
which dominates all other participants, e.g. if B2B commerce is established within a group
of firms.
86
INTRODUCTION TO E-COMMERCE B2B business
Key success factors to the seamless business integration are organizations and human beings.
The following questions must be answered clearly:
American online
LIGS University
is currently enrolling in the
Interactive Online BBA, MBA, MSc,
DBA and PhD programs:
87
INTRODUCTION TO E-COMMERCE B2B business
How can ICT support B2B business? This is done by the subsequently described technologies:
Of course, cloud technologies can be used in-house, which would be somehow similar to the
internal usage of Internet technologies, the so-called intranet. In many cases cloud services
will be provided by a third party, the CSP (Cloud Service Provider).
88
INTRODUCTION TO E-COMMERCE B2B business
• The fundamental pattern is the one-time cooperation with a focus on the single
transaction.
• Each transaction has to be executed as if business partners have never cooperated
in the past and will never come together again in the future.
• Both business partners have to find out whether they want to conduct this transaction
(negotiation). Both business partners have to see that they will benefit from this
transaction (win-win situation).
• Prices have to be allocated for each transaction specifically (See chapter 3 of this
book: pricing challenge).
• The appropriate payment method has to be selected (See chapter 7 of this book:
Electronic payment)
• The fundamental pattern is the on-going cooperation. Business partners have agreed
to cooperate for some time. Business partners have concluded a (written) contract.
• Large data quantities are exchanged along the value creation chain; there is an
information process coming along with the business process.
• Different partners with specific objectives have to be coordinated.
• All members work together to reach common objectives.
• Negotiation is in most cases completely done in the initiation phase of the B2B
cooperation; there is one decision to cooperate for many transactions or a long
period of time.
• Price allocation is in most cases completely done in the initiation phase of the B2B
cooperation; it is normally not done in each single transaction.
• Payment is in most cases done beside the B2B cooperation via traditional payment
channels; often payments are not done for each single transaction but for a set of
transactions, e.g. on a monthly basis.
B2B stands for a specific type of cooperation. In most cases cooperation is agreed between
different autonomous firms or other organizations. However, “B” may even be a single
human being if the type of relationship is “B2B”.
89
INTRODUCTION TO E-COMMERCE B2B business
Now we consider a specific example of B2B integration where both partners are strongly
interconnected. The example is the cooperation of a supplier and a merchant. They have to
work like a single and homogeneous organization. What are their fields of cooperation?
• Common strategic planning: Matching of the merchant’s sales plan and the
supplier’s production plan.
• Supplier gets sales data from merchant: Monitoring of sales data at POS (point of
sale; at rack in shop).
• Optionally daily sales data: tomorrow real-time (see the big data issue); objective
is just-in-time delivery and just-in-time production to avoid warehousing and
capital lockup.
• Common forecasts: update of cooperative planning; planning departments of
business partners have to collaborate closely.
90
INTRODUCTION TO E-COMMERCE B2B business
On the other side there are also a lot of advantages for the merchant:
In most cases the merchant is the dominating partner in that B2B relationship. The balance
of power has changed. In former times the merchant had to ask whether he was allowed to
sell the supplier’s products. Now the supplier has to ask whether he is allowed to sell his
products in the merchant’s facilities.
91
INTRODUCTION TO E-COMMERCE B2B business
• Intensified exchange of data: planning data, product and price data, monitoring of
logistics activities, monitoring of sales activities, monitoring of rack productivity,
• Shared access to product master data: synchronization of data models, common
article identification, supplier has to think in selling units not only in production
or delivery units,
• Integrated logistics management: production, delivery to merchant’s facility, in-shop
logistics, rack management.
Also functions are shifted between the business partners. We see a strong integration of
planning functions. The logistics chain of the supplier is extended. However, this may be
transferred to a third party, e.g. a forwarding agency. The supplier now is responsible for
rack management and rack productivity and has to manage the storage racks as micro-
warehouses. And finally he gets his invoices from the merchant.
Supply Chain Management (SCM) is considered as the strong interlinking and coordination
of all activities, which are related to procurement, manufacturing and transportation of
products. The supply chain connects suppliers, manufacturing shops, distribution centres,
shipping companies, merchants and customers through processes like procurement, warehouse
management, distribution and delivery, to provide goods and services to the customer. It is
characteristic for supply chains that they coordinate several value chain stages.
SCM is considered a dynamic and ever-changing process that requires the coordination of
all activities among all partners of the supply chain in order to satisfy the final customer
and maximize total supply chain profitability. Process drivers are often manufacturers who
want to improve and optimize the cooperation with their pre-suppliers.
Due to the increasing relevance of supply chains a framework SCOR (Supply Chain
Operations Management) has been established by the Supply Chain Council (SCC), now
part of APICS (American Production and Inventory Control Society), as the cross-industry
de facto standard strategy, performance management, and process improvement diagnostic
tool for supply chain management.
The SCOR framework covers several processes (Minguela-Rata 2014), which are presented
in tables 4 to 11.
92
INTRODUCTION TO E-COMMERCE B2B business
93
INTRODUCTION TO E-COMMERCE B2B business
Demand Management
Order Fulfilment
94
INTRODUCTION TO E-COMMERCE B2B business
95
INTRODUCTION TO E-COMMERCE B2B business
Maastricht
University is
the best specialist
university in the
Visit us and find out why we are the best! Netherlands
(Elsevier)
Master’s Open Day: 22 February 2014
www.mastersopenday.nl
96
INTRODUCTION TO E-COMMERCE B2B business
Returns Management
The SCOR has developed a specific business process model (element of the supply chain),
which consists of 5 stages and focuses on the supply chain issues:
• Inventory levels,
• Sales data,
• Order status for tracking/tracing,
• Sales forecasts upstream to suppliers,
• Production/Delivery schedule,
• Order information sharing.
97
INTRODUCTION TO E-COMMERCE B2B business
• Product planning,
• Manufacturing or service delivery,
• Marketing and sales,
• Inventory management,
• Shipping and payment.
ERP provides an integrated view of core business processes, often in real-time, using
common databases maintained by a database management system. ERP systems track
business resources – cash, raw materials, production capacity – and the status of business
commitments: orders, purchase orders, and payroll. The applications that make up the system
share data across various departments (manufacturing, purchasing, sales, accounting, etc.)
that provide the data. ERP facilitates information flow between all business functions, and
manages connections to outside stakeholders.
98
INTRODUCTION TO E-COMMERCE B2B business
SCM (Chakravarty 2014 and Kurbel 2013) is the management of the flow of goods and
services. It includes the movement and storage of raw materials, work-in-process inventory,
and finished goods from the point of origin to the point of consumption. Interconnected or
interlinked networks, channels and node businesses are involved in the provision of products
and services required by end customers in a supply chain. Supply chain management has been
defined as the “design, planning, execution, control, and monitoring of supply chain activities
with the objective of creating net value, building a competitive infrastructure, leveraging
worldwide logistics, synchronizing supply with demand and measuring performance globally.”
AXA Global
Graduate Program
Find out more and apply
99
INTRODUCTION TO E-COMMERCE B2B business
Supply chain management is a cross-functional approach that includes managing the movement
of raw materials into an organization, certain aspects of the internal processing of materials
into finished goods, and the movement of finished goods out of the organization and toward
the end consumer. As organizations strive to focus on core competencies and become more
flexible, they reduce their ownership of raw materials sources and distribution channels.
These functions are increasingly being outsourced to other firms that can perform the
activities better or more cost effectively. The effect is to increase the number of organizations
involved in satisfying customer demand, while reducing managerial control of daily logistics
operations. Less control and more supply chain partners lead to the creation of the concept
of supply chain management. The purpose of supply chain management is to improve trust
and collaboration among supply chain partners, thus improving inventory visibility and the
velocity of inventory movement.
• Demand & supply planning: demands planning & forecasting, safety stock
planning, supply network planning, distribution planning, service parts planning,
• Procurement: strategic sourcing, purchase order processing, invoicing,
• Manufacturing: production planning & detailed scheduling, manufacturing visibility
& execution & collaboration, MRP based detailed scheduling,
• Warehousing: inbound processing & receipt confirmation, outbound processing,
cross Docking, warehouse & storage, physical inventory,
• Order fulfilment: sales order processing, billing, service parts order fulfilment,
• Transportation: freight management, planning & dispatching, rating & billing &
settlement, driver & asset management, network collaboration,
• Real world awareness: supply chain event management, auto ID/RFID and sensor
integration,
• Supply chain visibility: strategic supply chain design, supply chain analytics, supply
chain risk management, sales & operations planning,
• Supply network collaboration: supplier collaboration, customer collaboration,
outsourced manufacturing.
SRM is defined as the management of the relations between an organization and its suppliers.
The objective is to link all suppliers to the organization, to support the procurement
management for the total procurement process. SRM uses methods and approaches of CRM
but now from the customer’s point of view. SRM is a sub-area of SCM.
100
INTRODUCTION TO E-COMMERCE B2B business
An SRM system contains information about all sources of supply and all procurement
information like deliverable products, possible risks, terms and conditions or quality. SRM
can be considered as an advancement of E-Procurement. Added value is generated through
bundling of all information about procurement and resources and providing it to the
total organization.
4.2.4 MARKETPLACE
101
INTRODUCTION TO E-COMMERCE B2B business
102
INTRODUCTION TO E-COMMERCE B2B business
• Transaction costs: incidental costs (…up to 50% of total costs): searching, signing
of a Contract, currency hedging, insurances; external transaction costs: by involved
third parties, e.g. credit card company; internal transaction costs (…savings potential
supposed to be up to 80%): customer, supplier,
• Profit margin: if profit margins are high, Provider will get around marketplaces;
if profit margins are low, Market already has high transparency; do we need a
marketplace?
• Market model: number of participants – automation does only make sense, if the
number of participants is high,
• Degree of concentration: on the customer side, on the supplier side,
• Degree of globalization: distribution and allocation of power, structure of market
volume: value of transaction (high/low), number of transactions (high/low),
• Transparency of market: complementary markets: support functions (Transportation,
Insurances), adjacent markets: Extension of value creation chain, similar market
structures.
eCo Framework
There is a framework for electronic marketplaces. It has been developed between 1994 and
1999 by CommerceNet, an American industry association. Updates have been released with
respect to CORBA, Java and XML. This framework has 7 layers:
103
INTRODUCTION TO E-COMMERCE B2B business
• Business: definition of a firm, can have different roles, can ask for different products
or services, can offer different products or services,
• Service: specific services which can be offered (e.g. download a catalogue, send an
order, delivery status), interaction of different companies,
• Interaction: communication between business partners, e.g. ordering, order
confirmation, exception reporting,
• Document: complete document for specific transactions, consists of different
data elements,
• Data element: basic elements, are defined according to specific patterns.
Challenges to successfully run marketplaces are high complexity of processes (e.g. negotiation
processes, abortion of processes, iterations/loops) as well as economic efficiency. The efficiency
challenge is demonstrated by the subsequent example:
• Third party operators, which must be able to cover the capital needs and must
have specific industry knowhow and experience,
• Consortium of suppliers, which may induce legal issues through implementing
a syndicate,
• Consortium of customers, which may induce legal problems through implementing
a syndicate,
• Mixed consortium,
• Single supplier, which is just an online shop,
• Single customer, which is just a procurement platform.
104
INTRODUCTION TO E-COMMERCE B2B business
We see several (digital) marketplaces. However, most of them obviously are not successful.
Many of them collapse or shift to some kind of software company. Others shift to online
shops or procurement platforms. Why are we not able to find a great variety of genuine
(digital) marketplaces? Why do marketplaces fail? Here are several reasons for failure:
105
INTRODUCTION TO E-COMMERCE B2B business
• The level of market liquidity is too low (that means: the number of transactions
per time unit).
• There is a ruinous competition between different marketplaces.
• Sales and marketing efforts are too high.
• The management does not have enough experience in the specific industry.
The B2B environment has led to many different and creative solutions.
Due to the increasing needs for logistics transportation, warehousing and distribution are
offered, sometimes by organizations, which originally were not logistics experts, e.g. Procter
& Gamble. Application service providers offer deployment, hosting and management of
packaged software from a central facility, e.g. Oracle and Linkshare. Outsourcing of functions
in the process of E-Commerce such as Web-hosting, security, and customer care solutions
are offered by outsourcing providers such as eShare, NetSales, iXL Enterprises and Universal
Access.
Auction solutions software for the operation and maintenance of real-time auctions in
the Internet is provided, e.g. by Moai Technologies and OpenSite Technologies. Content
management software for the facilitation of website content management and delivery is
delivered, e.g. by Interwoven or ProcureNet. Web-based commerce enablers like CommerceOne
offer a browser-based, XML enabled purchasing automation software.
4.3 EXERCISES
4.3.1 QUESTIONS FOR YOUR SELF-STUDY
Q4.02: Consider that you were a book-on-demand company. How could a B2B relationship
to a big (electronic) bookshop look like? What is the process? What are the business rules?
Q4.03: We have described the advantages of the involved parties for a strong B2B relationship.
What are the disadvantages for the involved parties?
Q4.04: Find information about marketplaces. What are they offering? How long have they
been in the market? Why are they successful?
106
INTRODUCTION TO E-COMMERCE B2B business
T4.02: Consider a B2B relation between a producer of goods and a merchant. What are
the specific advantages for both parties? Give two examples for both parties.
T4.03: Which consequences does a B2B relation have for the involved IT systems?
4.3.3 HOMEWORK
Supply chains cross boundaries of organizations. What are the consequences for the
management of supply chains?
107
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
5 IMPACT OF E-COMMERCE
Learning Objectives
In this chapter you will learn,
• that ICT can have a lot of consequences in the area of ethics and morale,
• that E-Commerce has positive as well as negative impacts on human beings and
society,
• that E-Commerce changes the economic world significantly.
Recommended pre-reading
• Martínez-López 2014, chapters 2 and 3.
108
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
Morality (from the Latin moralitas “manner, character, proper behaviour”) is the differentiation
of intentions, decisions, and actions between those that are “good” (or right) and those
that are “bad” (or wrong). Morality can be a body of standards or principles derived from
a code of conduct from a particular philosophy, religion, culture, etc., or it can be derived
from a standard that a person believes should be universal. (Wikipedia 2015)
Costs for data storage are still decreasing. Databases with detailed profiles of human beings
are built and used at acceptable costs. How much can the customer be manipulated?
We see an on-going progress in the area of data analysis. Human beings can be considered
from different perspectives and they also will be assessed and valued (only economically?).
The behaviour of human beings can be forecasted. What about the freewill of customers?
Significant progress is also made in the area of networks and data communication. Data
can be transferred and analysed all over the world. Do we see the end of privacy?
Questions:
• Are we allowed to do everything we are able to do (See Immanuel Kant: Act beyond
that dictum which you would like to be actual law.)?
• All, which is thought, will be done – sooner or later (See the Swiss author Friedrich
Dürrenmatt: The physicists). How can we protect ourselves?
• In which society do we want to live – ethics-driven, technology-driven, economics-
driven?
• What is the right balance between ethics, technology and economics?
109
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
Privacy protection must have a high priority in E-Commerce. The bases are the human
rights and constitutions of states. For example we will find Article 10 clause 1 in the German
constitution: “Privacy of correspondence, posts and telecommunication is invulnerable.”
However, clause 2 of the same constitution says: “Restrictions are only allowed on the basis
of a law.” Further on the German constitution says in article 13 clause 1: “The sanctities
of a home is invulnerable.”
There are a lot of privacy concerns around E-Marketing, because technology has become
so powerful, see for example data mining and data usage, platforms like Facebook or the
advantages in the area of biometrics.
We find some interesting approaches to the definition and protection of the private sphere
and the exposure to information. So has Steven Levy (Levy 1984) defined six basic rules:
• The access to computers and all systems, which can help you to learn more about
this world, should be unlimited and complete. Practical experience should always
be preferred.
• All information should be free.
• Mistrust authority – stimulate decentralization.
• Hackers should be judged according to their hacking activities only and not according
to apparent criteria like certificates, age, race or social position.
• With computers you can make art and create beauty.
• Computers can turn your life for the better.
110
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
Mr. Wau Holland (Co-founder of the German chaos computer club) has added two rules
to this:
In the USA EFF, the Electronic Frontier Foundation was founded in 1990. Their main
slogan is: Defending your rights in the digital world. EFF fights for freedom primarily in the
courts, bringing and defending lawsuits even when that means taking on the US government
or large corporations. By mobilizing more than 61,000 concerned citizens through their
Action Centre, EFF beats back bad legislation. In addition to advising policymakers, EFF
educates the press and the public.
The German constitution says in article 14 clause 2: “Ownership obligates. Its application
has to serve the public welfare.” What does this mean for intellectual properties? Which
obligations does the owner have? And how can he protect his information assets? This is a
very important issue for everybody of us, because the major security concerns in the Internet
are global bank theft, data theft and social network data breaches.
RUN FASTER.
RUN LONGER.. READ MORE & PRE-ORDER TODAY
RUN EASIER… WWW.GAITEYE.COM
111
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
Questions:
• How can we ensure that the salesman sells only that which he owns or which he
is authorized to sell?
• Where are the boundaries between theft and copy?
• How can we distinguish between legal and illegal trade? When is a transaction a
deal and when is it not?
Questions:
• Who is responsible for damages caused by a machine, which is controlled by software?
• Who is liable if data of human beings are stolen?
• How can you guard your organization against damages caused by breakdowns of
ITC systems?
• Who is responsible if wrong or reputation-damaging information is distributed
via Internet?
• How can you make a person responsible if he/she does not live in your country?
Objectives:
• Protect data and systems.
• Protect the rights of individuals.
• Guarantee the security of the society.
• Protect institutions.
• Protect values.
112
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
Let us first consider the size of E-Commerce. E-Commerce has increased considerably in
the developed world in the last 20 years. B2B transactions continue to be the dominant
form of E-Commerce across the world. In 2009, B2B E-Commerce sales were 3.1 trillion
USD or 32% of all B2B transactions in the USA (US Census 2011).
B2C E-Commerce in the US accounted for 298 billion USD or only 2.8% of all B2C
purchases in 2009. Retail sales account for about half of the B2C figure, with the rest coming
from services. Global B2C E-Commerce spending was estimated to be 708 billion USD in
2010 (IDC 2011). Since 2001 the growth in E-Commerce among developed nations has
been dramatic. The USA witnessed a four-fold increase in E-Commerce sales. E-Commerce
markets in Australia and South Korea both increased more than seven-fold (OECD 2011).
Developing nations have yet to witness considerable gains from E-Commerce. E-Commerce
is increasing in importance and cannot be ignored by strategists. First-mover advantages
may be available in developing countries.
113
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
The costs associated with inflation, namely menu costs (the cost of physically changing
prices) could be dramatically reduced with E-Commerce. Nevertheless, price rigidities will
likely remain a fact of business even with greater adoption of E-Commerce. Firms can more
readily change prices in the wake of inflation and other price shocks. However, E-Commerce
does not eliminate all costs associated with price changes
This e-book
is made with SETASIGN
SetaPDF
www.setasign.com
114
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
E-Payments and E-Money present future challenges for policymakers who may find normal
monetary policy tools less effective with the proliferation of E-Payments and E-Money.
Practically speaking, E-Commerce has had little effect on monetary policy to date. Suppliers
must consider whether to adopt E-Payment systems for online and offline sales to avoid
falling behind rivals.
Threat of entry
E-Commerce may increase economies of scale in industries where fixed costs are unchanged,
but variable costs are reduced. Thus minimum efficient scale increases and the threat of
entry falls. E-Commerce may, at the same time, decrease economies of scale in industries
where E-Commerce reduces fixed costs. Thus minimum efficient scale decreases and the
threat of entry rises. E-Commerce may increase economies of scope and aggregation,
particularly in information goods. The threat of entry decreases because rivals must enter
with a bundle of goods.
E-Commerce enables ICT outsourcing, converting fixed, sunk cost into variable cost. The
threat from entrants increases as the importance of sunk costs declines.
E-Commerce decreases the importance of physical location in prime real estate. Entry barriers
fall. E-Commerce B2B vertical hubs may be owned and controlled by large incumbents.
B2B vertical hubs may be able to dominate supply and distribution channels, effectively
limiting opportunities for new rivals.
115
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
E-Commerce decreases the importance of face-to-face trained sales force. Entry barriers
fall. E-Commerce and outsourcing decrease the importance of physical nearness to skilled
labour. Entry barriers fall. Early entry into E-Commerce confers initial but not necessarily
lasting advantages to incumbents. Entry barriers decrease over time.
Power of suppliers
E-Commerce may increase the number of suppliers and facilitate greater transparency of
product prices and cost structures. Thus suppliers could see reduced power over industry.
Suppliers (incumbents) may maintain control over B2B vertical hubs. Thus suppliers could
see increased power over industry.
E-Commerce reduces transaction costs between supplier and industry. Thus suppliers lose
ability to extract rents from industry, as firms can more easily contract with competing
suppliers. E-Commerce and vertical supply chain integration tightens bonds between supplier
and customer. Supplier loses bargaining power due to the hold-up problem.
E-Commerce reduces switching costs through the brokerage effect. Lower switching costs
of customers reduce supplier power. Suppliers may make significant investments in vertical
supply chain integration. Higher switching costs of customers increase supplier power
Power of customers
E-Commerce spurs disintermediation in industries such as travel agency service and
brokerages. Intermediaries’ power (and even existence) is threatened. E-Commerce spurs
re-intermediation through B2B vertical hubs. Intermediaries’ power is strengthened.
Information and search costs are reduced with E-Commerce, and branding may become
less important. Product differentiation through branding decreases, and customer power
increases. E-Commerce allows new forms of product differentiation, such as online ratings
supplied by past customers. Product differentiation increases, and customer power decreases.
E-Commerce allows firms to offer greater customization of products and services, such as
computers sold to order. Product differentiation increases, and customer power decreases.
Informational problems such as adverse selection E-Commerce allows firms to offer greater
customization of products and services, such as computers sold to order. Product differentiation
increases, and customer power decreases.
116
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
Threat of substitutes
E-Commerce enables consumers to more quickly identify and purchase substitutes for a
firm’s products. The power of any one supplier decreases. Increasingly informed customers
can easily find firms offering unique products filling gaps in the marketplace. Firms selling
unique products can extend market share.
E-Commerce reduces search costs and therefore decreases switching costs for consumers
in markets where they are willing to search for alternatives. Supplier power declines, and
price levels and dispersion fall. E-Commerce allows firms to reduce the efficacy of search
engines (through sponsored search) and to obfuscate prices and products. The customer’s
ability to compare prices and products falls, allowing firms to raise profits.
Free eBook on
Learning & Development
By the Chief Learning Officer of McKinsey
Download Now
117
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
Firms may join a coalition of competing firms selling less close substitutes in a B2C exchange.
The coalition can attract more customers to its site than any one company could, and
supplier power increases. E-Commerce lowers variable cost relative to fixed cost, making
overcapacity problems relatively greater. Overcapacity in industry leads to cutthroat pricing;
competition among suppliers increases and prices fall.
5.4.1 ATOMIZATION
The units, which make sense economically, become smaller – due to the increasing data
processing capabilities.
Examples are:
• Letting of shelf space in the retail business with sales dependent prices,
• Demand driven pricing in retail business, transportation business or gas stations,
• Tracking & Tracing in the transportation business,
• Road charges.
118
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
5.4.2 COMMODITIZATION
Complex, explanation needing and expensive goods and services become widespread available
and easily applicable. Standardization and simplification will be profitable if sales management
can enter mass markets via the Web.
Commoditization is well known but is accelerated through the Web. Coverage and
transparency in the market increase. However, atomization and strong competition may
lead to individualized and personalized products, which are aggregated from commodity
goods and services.
By the way: There is a significant externalization effect if you book your tickets via the Web.
The travel agency can reduce staff because now you are doing their job!
5.4.3 CONFIDENCE
Business partners are anonymous and do not know each other. They have to carry on efforts
to build trust. This must be done on the background of the high speed of E-Commerce.
Fundamentals
Business transactions are only then conducted if all involved partners trust each other that
the customer gets the contracted goods or services and the supplier gets the contracted
revenues. Confidence is necessary because the accomplishment and the financial equivalent
cannot be conducted completely simultaneously. As long as the transaction is running always
one partner has a temporary advantage or disadvantage.
Traditionally transactions with high values are protected with the help of custodians or notaries.
• The business partners know each other independently from the actual transaction.
Possibly they have already conducted common business transactions successfully.
• The business partners catch up on each other’s seriousness at a third party.
• The business partners involve one or more trustable agents who shall ensure that
the contract is successfully signed and the business conducted.
• The business partners make all activities transparent to the other business partner(s).
• However, there will always be a residual risk.
119
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
• The business partners know each other independently from the actual transaction.
The Internet is just the platform to run a transaction.
• The business partners catch up on each other’s seriousness at a third party, may
be via the Web.
• The business partners involve one or more trustable agents who shall ensure that
the contract is successfully signed and the business conducted, may be a specific
Web platform (see ebay or Alibaba).
• The business partners make all activities transparent to the other business partner(s),
of course with the help of the Web.
• However, there will always be a residual risk.
• Are the involved agents trustworthy? E.g. the Web broker, logistics partner, bank?
• Can we be sure that non-involved third parties cannot find out anything on our
transaction?
• Can we be sure that non-involved third parties are not able to interfere our transaction?
• Can we be sure that the addressee receives all exchanged data as they have been
submitted by the sender?
www.sylvania.com
We do not reinvent
the wheel we reinvent
light.
Fascinating lighting offers an infinite spectrum of
possibilities: Innovative technologies and new
markets provide both opportunities and challenges.
An environment in which your expertise is in high
demand. Enjoy the supportive working atmosphere
within our global group and benefit from international
career paths. Implement sustainable ideas in close
cooperation with other specialists and contribute to
influencing our future. Come and join us in reinventing
light every day.
Light is OSRAM
120
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
If a “digital” infrastructure is up and running marginal costs become very low. The production
of a software package is a very good example of this effect. Access costs, transaction costs
and switching costs are reduced dramatically (see electronic catalogues).
In the traditional economy we (normally) have low allocation costs and high transaction
costs. The following example demonstrates it: Let the infrastructure costs be 1.000 currency
units, and marginal costs of a single transaction be 10 currency units. If the result of a
transaction is sold at a price of 15 currency units and a quantity of 1.000 is delivered, then
total costs are 11.000 currency units and sales revenues are 15.000 currency units.
In the digital economy we (normally and vice versa) have high allocation costs and low
transaction costs. Now let the infrastructure costs be 10.000 currency units, the costs of a
single transaction be 1 currency unit. Then with a price of 15 currency units and a delivered
quantity of 1.000 total costs and sales revenues are again 11.000 resp. 15.000 currency units.
What happens if the quantity is doubled? In the traditional economy sales go up to 30.000
currency units and costs increase to 21.000 currency units. In the digital economy sales go
up to 30.000 currency units, too. But costs increase to 12.000 currency units only. What
happens if selling goes down by 50%? In the traditional economy sales go down to 7.500
currency units and costs decrease to 6.000 currency units. In the digital economy sales go
down to 7.500 currency units, too. But costs only go down to 10.500 currency units.
Where is the break-even-point? In the traditional economy we have 15⋅x = 1.000 + 10⋅x
and this equation leads to x = 200. In the digital economy we have 15⋅x = 10.000 + 1⋅x
and this equation leads to x = 715.
How do we have to interpret these results? What does this mean for the entrepreneur/
shareholder? The effect is not a new one: A reduction of variable/direct costs often leads
to an increase of fixed/indirect costs. But in the electronic business this is exponentiated…
If prices and profit margins are low the supplier has to sell high volumes in short times to
generate profit. Profit expectations are high, but the risks are high, too.
121
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
5.4.5 DISINTERMEDIATION/RE-INTERMEDIATION
In the digital economy value chains become shorter. This is already known in traditional
businesses, but radicalness and speed of change have increased. See the disappearance of
intermediary trade/wholesale trade and retail sale. Suppliers sell directly to the consumer.
For digital goods the physical manufacturing is transferred to the consumer: I print my
books at home. Traditional intermediates are eliminated. See the music business as another
good example for this effect.
However, at the same time the high volume of offerings and the high number of customers
in the Web leads to the establishment of new intermediaries, e.g. electronic marketplaces
(B2B und C2C) where demand and offerings are bundled. Value chains become longer
(again) to benefit from synergies with respect to specialization. The reason for this paradox
changes is that minimizing of transaction costs with ICT is realized and this may sometimes
lead to a disintermediation, but sometimes vice versa to a re-intermediation.
This leads to the finding, that the really narrow good is the attention of the potential
customer, nothing else. Subsequently it must be the objective of the supplier to get the
attention of his potential customers. With this background we see a changed role perception:
The customer offers his attention and is “paid” by the supplier with content (see commercial
television). The supplier can sell his product or service if he first buys the attention of his
potential customer.
• Subscription,
• Performance,
• Consulting and other intelligent services,
• Membership,
• Conferences and trainings,
• Customer service,
• By-product,
• Advertisement,
• Sponsors.
122
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
• Free offerings shall cause the customer to buy another product or service, which
must be paid and also finances the costs of the provided teaser.
• The free services leads to connected services, which must be paid.
• The “free” service is paid by a third party.
The free service in the Web is often combined with a good or service, which cannot be
delivered via the Web.
Within the information flood of the Internet the single supplier has to increase his marketing
efforts and thus finally his marketing costs to get attention. So-called “teasers” are given
away free of charge. This shall generate the willingness to purchase other goods or services.
Also freemium models are installed by many providers of digital goods. A basic product
360°
is given away free of charge. But the customer has to pay for premium functionality. So
.
some software tools are given away. But if the user wants to export or import files or just
thinking
to print some content he has to buy an additional and specific software module, which is
not included in the basic package…
360°
thinking . 360°
thinking .
Discover the truth at www.deloitte.ca/careers Dis
Discover the truth at www.deloitte.ca/careers © Deloitte & Touche LLP and affiliated entities.
5.4.7 EMPLOYMENT
Does E-Commerce really create jobs as it is stated quite often? Let us consider what really
goes on.
If the customer uses his free money to buy additional goods or services then he generates an
additional demand. As long as this additional demand leads to a need of human workload
the freed manpower can be allocated in new jobs. But… E-Commerce speeds up the price
decrease. How long does it take until the free workload is allocated in new jobs?
However, there is a second question: Can the free manpower be allocated 1:1 in other jobs?
Or do the new jobs need other skills and a higher qualification? Are the job-seeking people
qualified enough? Can they be qualified?
Conclusion: There is a big social and political issue. But this cannot be solved by company
owners. Because nobody can ask them not to make profit. It is a macroeconomic and
political challenge. However, also business people as well as computer scientists have a
social responsibility.
5.4.8 EXTERNALITIES
Let us start with a definition: Externalities are side effects of business transactions from which
the parties involved in the transaction do not suffer but also do not have an advantage.
However, third parties may suffer or benefit from those side effects.
124
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
5.4.9 GLOBALIZATION
Technical standardization (see TCP/IP, HTTP, SMTP, HTML, XML) creates a global platform,
which allows the cooperation of an infinite number of partners all over the world. Global
coverage leads to global markets. Suppliers can and must produce in lowest cost locations.
Jobs are transferred to low cost areas.
Data can be exchanged electronically. Media breaches can be eliminated. This leads to an
information flood. Thus efforts to find the relevant information may increase or must be
compensated by intelligent search agents. Information and knowledge management becomes
more and more important.
Intellectual properties are traditionally protected by patents, copyright and trade marks; this
includes the economic application. There are ambivalent effects of the Web: Coverage and
distribution speed increase, but digitalized results can be copied and manipulated arbitrarily.
However, there is a problem. Who funds the efforts to create intellectual properties? And
who is the customer of the intellectual property? The one, who pays for an intellectual
property, will claim that only he is allowed to use it. This is an old and not at all an Internet
specific problem.
And last but not least: How can we ensure that an intellectual achievement is assigned to the
creator for a sufficient long time (copyright)? We have to state the basic problem of intellectual
properties in the Web is that anonymity of users leads to intellectual theft (plagiarism).
We have similar and cost efficient, sometimes even free, access to the electronic market(s)
for all participants. Also small organizations have access to services (e.g. software), which
outside the Web only big organizations were able to afford.
125
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
The significance of company size changes. We see advantages for very big and very small
firms, probably disadvantages for medium-sized businesses. Consequently the company sizes
are changing. There is a clear trend to very big and very small companies. Will this be the
death of the medium-sized business?
5.4.14 PRICING
Digital markets increase transparency: Who offers what at which price? Suppliers and
customers have ideally the same degree of information (symmetric). Arbitrage profits go
down, perfect competition balance seem possible.
Questions:
• When does the super market effect start: Transparency decreases through over-offering?
• What is the benefit of the lowest price if it is ex manufacturing plant and if the
plant is 20.000 km away?
• Which methods do suppliers invent to reduce transparency (see configurable products)?
• What is the “price” of decreasing prices?
Do you like cars? Would you like to be a part of a successful brand? Send us your CV on
We will appreciate and reward both your enthusiasm and talent. www.employerforlife.com
Send us your CV. You will be surprised where it can take you.
126
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
Let us try to answer the last question. As a consumer you have a specific need for products
and services. Through E-Commerce you can buy this “package” cheaper. Therefore the
supplier has to reduce his prices. Thus he has to reduce costs. As a consequence he forces
his suppliers to reduce their prices and costs. All producers need people to do the work.
Finally also the suppliers of human work have to reduce their prices. Sooner or later we
have to talk about salary reductions and unemployment…
Coverage and speed of the Internet lead to better comparability of offers, harder competition
and price pressure among suppliers and thus to lower costs on the customer side (which
would be an advantage for the customers, if the personal income would not be reduced…).
Transparency leads to price and profit reductions on the supplier side. Inflation is slowed down.
Business models:
• Prime contractor: manages initiation and execution,
• Broker: manages only the initiation.
Criteria:
• Cooperation of autonomous companies,
• Partners holding their economic and legal autonomy,
• Optimal combination and use of resources,
• Open for everybody if he/she can contribute to the objectives,
• Closure after achievement of objectives (project management),
• Horizontal and vertical cooperation,
• No hierarchical structures, no one authorized to give instructions,
• High level of confidence among all members.
Examples can be found in the publishing sector, construction industry, software industry,
and consulting.
127
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
The Internet allows building groups, which can work on their objectives independently from
the geographical distribution of members. We see a trend towards open-source-initiatives:
elimination of commercial relationships and replacement by personal communication and
free of charge experience exchange. Does a new countertrade economy come up? But where
do those actors get their money from to finance their daily life?
5.4.16 VOLATILITY
Hollywood economics
Digital goods must be completely ready when they enter the markets (see movies) and
convince the customers. A supplier must be able to fund 3 to 4 flops with a blockbuster.
Temporary monopolies
Profit in E-Commerce will actually be possible in a monopoly situation (The winner takes
it all) because of extreme competition and price pressure. Firms are forced to become
monopolists: markets have to be occupied fast. Competition has to be avoided because it
is ruinous for all participants. Monopolies will (normally) not stay forever because there
are no essential entry barriers to the markets. Thus temporary monopolies will come up
and will be replaced by subsequent temporary monopolies. Suppliers are forced to deliver
unique products or services, thus they are forced to innovate.
5.5 EXERCISES
5.5.1 QUESTIONS FOR YOUR SELF-STUDY
Q5.01: Are the statements on specific impacts of E-Commerce true? If yes, what are the
prerequisites? If no, what are the reasons?
Q5.03: Do you agree with the macroeconomic impacts described here? Is the list of the
described impacts complete or can you identify other impacts?
Q5.04: Do you agree with the microeconomic impacts described here? Is the list of the
described impacts complete or can you identify other impacts?
128
INTRODUCTION TO E-COMMERCE Impact of E-Commerce
T5.01: Does E-Commerce increase or decrease price levels? What are the reasons for
your answer?
T5.04: Explain the term “externality” and give two examples of this impact.
5.5.3 HOMEWORK
How could E-University look like? Which effects would it have for all stakeholders? Who
are the stakeholders? Do we still need traditional lectures?
In many cases the user of an electronic system does not have to pay a fee for the usage.
Is he/she really the customer? Is the service really “free”? What is his/her role in the
business “game”?
�e Graduate Programme
I joined MITAS because for Engineers and Geoscientists
I wanted real responsibili� www.discovermitas.com
Maersk.com/Mitas �e G
I joined MITAS because for Engine
I wanted real responsibili� Ma
Month 16
I was a construction Mo
supervisor ina const
I was
the North Sea super
advising and the No
Real work he
helping foremen advis
International
al opportunities
Internationa
�ree wo
work
or placements ssolve problems
Real work he
helping fo
International
Internationaal opportunities
�ree wo
work
or placements ssolve pr
129
INTRODUCTION TO E-COMMERCE Security & compliance management
Recommended pre-reading
• Kimwele 2014.
ICT systems and the information, stored in these systems, can be attacked by software
viruses, hackers or espionage. People (own employees, external people) can damage our ICT
systems and destroy or damage information stored in these systems.
Also faults can lead to a damage or destruction of ICT systems or information stored in
these systems. Typical faults are software bugs built in during first time development or
maintenance of software, may it be our own software or may it be software packages from
outside software suppliers, remote maintenance, where external organizations have access to
our systems or information stored in these systems, spurious actions in operations, system
administration or usage of systems.
BSI (Bundesamt für Sicherheit in der Informationsverarbeitung; Federal Office for Information
Security), a national German Authority, which has a high reputation, also internationally,
has developed the “IT Grundschutz” catalogues. The complete documentation is available
in the Internet at www.bsi.bund.de/grundschutz (as well in German as in English).
BSI has published a comprehensive list of threats for ICT (see table 12).
130
INTRODUCTION TO E-COMMERCE Security & compliance management
Each organization should build and maintain a list of specific threats. This list should be
updated periodically. The discussion of threats is a major management issue.
131
INTRODUCTION TO E-COMMERCE Security & compliance management
Due to the British Information Security Breaches Survey 2015 the average cost of the worst
single breach suffered by organizations surveyed has gone up sharply for all sizes of business.
For companies employing over 500 people, the ‘starting point’ for breach costs – which
includes elements such as business disruption, lost sales, recovery of assets, and fines &
compensation – now commences at £1.46 million, up from £600,000 the previous year.
The higher-end of the average range also more than doubles and is recorded as now costing
£3.14 million (from £1.15 in 2014).
Single risk
The standard approach (Ackermann 2013, p. 14) is, that the risk value is expressed by the
product of the probability of occurrence and the expected amount of loss. The amount of
loss is considered as a random variable. Thus it would be “more” correct to define the risk
value as the expectation value of the random variable “amount of loss” with its underlying
probability distribution.
The challenge of this definition is, that we have to find out the probability distribution of
the amount of loss. Thus it is a good practice not to work with specific figures but just to
list the identified risks and categorize them e.g. by low/medium/high.
132
INTRODUCTION TO E-COMMERCE Security & compliance management
Risk portfolio
A very naïve approach to value the total volume of risks of a management object (e.g. a
total organization or a portfolio of specific objects or a specific E-Commerce system) is the
number of identified risks. Many people think, that such an approach is too simple but it
is much better to work with such a very simple list and to discuss about the risk situation
than to ignore the risks.
A more “sophisticated” approach to value the total volume of risks is to build the sum of
expectation values of the identified single risks. This assumes that the risks in the sense of
probability theory are totally independent from each other, which obviously is not correct.
However, otherwise we would have to have a model of the interdependencies between the
different risks.
There are further methods to calculate the total value of a risk portfolio but they all need
a lot of mathematics and probability theory (Ackermann 2013).
133
INTRODUCTION TO E-COMMERCE Security & compliance management
We see a lot of threats, which could lead to a damage or destruction of ICT systems.
Management has to deal with it. Though the variety of threats and corresponding risks is
extremely large there are only four basic risk management strategies:
• Avoidance of threats, which means that you are able to completely eliminate the
threat of your management object. Normally you will not be able to completely
avoid a threat.
• Reduction of threats, which means that you lower the risk resulting from that
threat. In most cases you will be able to reduce the potential amount of loss.
Whether you can change the probabilities of occurrence can only answered if the
specific situation is known.
• Transfer of risks to a third party, e.g. insurance. This means that the third party
will take over and pay the amount of loss if the risk occurs. You will have to pay
a fee for that.
• Acceptance of threats, which is selected when you do not have any chance to
change the situation.
Obviously it is not sufficient to know the risks. Management has to actively work on it. This
does not only include the application of the risk management strategies listed above. They
also have to be prepared for the situation when a risk occurs. This leads to the following
elementary management tasks:
• Avoid, reduce or accept threats. Transfer risks, if this is the best strategy.
• Know what must be done when a risk occurs.
The latter leads to business continuity management, which has to supplement risk
management.
The main question is: How good is business prepared to get back to work if some parts of
the organization break down?
134
INTRODUCTION TO E-COMMERCE Security & compliance management
• Prepare for emergency situation (provide documentation, train people, run emergency
exercises),
• Initiate and build up emergency organization (alert management, disaster
management team),
• Run emergency organization/processes (if a disaster occurs),
• Re-install regular organization/processes,
• Get back to regular organization/processes,
• Stop and break down emergency organization/processes.
135
INTRODUCTION TO E-COMMERCE Security & compliance management
Due to the increasing number of regulations and need for operational transparency, organizations
are increasingly adopting the use of consolidated and harmonized sets of compliance controls.
This approach is used to ensure that all necessary governance requirements can be met
without the unnecessary duplication of effort and activity from resources.
The reason for the high attention of management towards compliance (management) is,
that if any part of an organization is not compliant then there is a significant risk for that
organization. Missing compliance can lead to punishment through governmental authorities
and a loss of reputation in the business world.
Governance, Risk and Compliance (GRC) are three pillars that work together for the purpose
of assuring that an organization meets its objectives….
Risk management is predicting and managing risks that could hinder the organization to
achieve its objectives.
Compliance with the company’s policies and procedures, laws and regulations, strong and
efficient governance is considered to be a key factor to an organization’s success.
136
INTRODUCTION TO E-COMMERCE Security & compliance management
Information security management is not only an issue for the ICT department. It must be
considered by all management areas and management levels.
• Fulfil organizational duties: give precise, binding and complete orders to your
people; select people carefully with respect to duties and responsibilities; check
what your people do in the daily operation; inform your people about laws, rules
and instructions they have to follow.
• Build an efficient and transparent organization.
• Build a professional security, continuity and risk management.
• Increase efficiency with general and unified rules and methods.
• Reduce time consumption and costs with security and security audits integrated
into business processes.
• Run a continual improvement process to minimize risks and maximize economic
efficiency.
137
INTRODUCTION TO E-COMMERCE Security & compliance management
The information security management process has four major steps, which are subsequently
described:
• Initialize:
оо Understand information security requirements,
оо Build information security policy to define overall security objectives,
оо Establish information security representative and organization,
CLICK HERE
to discover why both socially
and academically the University
of Groningen is one of the best
places for a student to be
www.rug.nl/feb/education
138
INTRODUCTION TO E-COMMERCE Security & compliance management
Organization:
• Establish access profiles.
• Provide and file task descriptions for IT administrators and information security
representatives.
• Conduct administration of keys.
• Run evacuation and emergency exercises.
Technique:
• IT security: Implement and operate firewalls, virus scanner, spam filter, encryption
software.
• Facility management: Install access control system, door locks, fire detection
system, burglar alarm system, emergency power generator, uninterruptable power
supply (UPS).
• Safety of buildings: Install fences, observation cameras.
People:
• Conduct a professional recruiting and include security aspects.
• Do a proper placement of employees (duties of employees).
• Ensure a careful adjustment to the job.
• Establish a continuous supervision: rising of awareness, training.
• Conduct a professional separation of employees.
139
INTRODUCTION TO E-COMMERCE Security & compliance management
140
INTRODUCTION TO E-COMMERCE Security & compliance management
6.4 TECHNOLOGY
Important technologies for ISM are data encryption and smart cards.
Steganography
Objective is to hide the existence of a message. Specific applications of this technology are
the transfer of messages or digital watermarking.
Examples of steganographic methods are special terms and phrases in text documents,
sympathetic ink or hiding of information in image files through setting of single pixels.
A major problem with steganography is the vulnerability to changes of data, e.g. compression.
Information saving data compression formats are GIF and BMP.
Symmetric encryption
The communication protocol runs as follows: A and B define a common secret key. Then
A encrypts the message and sends the message to B. B receives and decrypts the message
through applying the key.
American online
LIGS University
is currently enrolling in the
Interactive Online BBA, MBA, MSc,
DBA and PhD programs:
141
INTRODUCTION TO E-COMMERCE Security & compliance management
The central problem with symmetric encryption is the secure exchange of the key between
A and B.
Asymmetric encryption
The communication protocol runs as follows: A and B generate a pair of keys (each of them)
consisting of a public key and a private key. Both public keys are published and accessible
by any third party. If now A wants to send a message to B, A encrypts his message with the
public key of B and sends the message to B. B receives the message from A and decrypts
it with his private key.
The actually used method is the RSA method (RSA = Ronald Rivest, Adi Shamir, Leonhard
Adleman) named after the three gentlemen who published this method in 1978. Obviously
10 years earlier this method had already been developed by the British secret service.
There are two weaknesses. The first: The public key must be authentic. This can or must
be ensured by appropriate organizational elements. The second: Asymmetric encryption
could be knocked out if the attacker placed his key as the public key of another person or
organization. So the sender would think that he uses the public key of his addressee. He
encrypts the message and the attacker could decrypt it with his own private key.
Hash function
Hash functions are considered to be one step towards an electronic signature. By using
specific algorithms a hash function generates a document specific hash value. That is a
high-value number assigned to the actual document. If the document is modified later on
it gets another hash value. However, because the hash function concentrates the document
in one single number though it is a very big number, there is a residual probability, that the
hash value of the changed document is identical to the hash value of the document before
the modification or manipulation. There is also a residual probability that two different
documents get an identical hash value.
142
INTRODUCTION TO E-COMMERCE Security & compliance management
But these residual probabilities are very low, if the length of the hash value is great enough
(The hash function must be collision resistant). The SHA-1 (Secure Hash Algorithm)
generates 160 bit hash values. Since 2007 the NIST recommends the use of one of the
SHA-2 methods, which generate hash values of 256, 384, or 512 bits. An alternative hash
function is MD5 (Message Digest) with a hash value of 128 bits. However, this method
is not longer recommended, because it is relatively easy to find different messages having
the same hash value.
Electronic signature
There are some requirements for an electronic signature, which have their origin in traditional
signatures, of course. First it has to proof the identity of the signer doubtlessly. The signature
shall be applied once only and valid only in connection with the original document. The
signed document must not be changed afterwards; a change must be visible. The signature
must not be rejected. The signer must not deny that he has signed the document.
However, there are some advantages of the electronic signature against the traditional
signature. The content of the document can be kept secret. The document can be better
protected against later manipulation through the use of hash functions. The validity of the
signature can be limited in time with time stamps. And finally signatures can be stored at
a trustworthy organization so that the signer can be identified reliably.
The communication protocol runs as follows: The signer of a document creates a pair of
keys and stores the public key in a public database. He encrypts the document with his
private key and sends the document to the receiver. The receiver gets the public key from
the public database and decrypts the documents (he “verifies” the signature).
The reader should be aware of the fact that the mathematical algorithms for electronic
signatures are the same as for asymmetric encryption. But they are used in a different way.
The German law on electronic signatures differentiates between three levels of electronic
signatures:
• Basic electronic signature: The signature is added to the document and is used
to authenticate it. The provider of the signature is not liable for correctness and
completeness of certificate data. An injured party has to prove that there is damage.
143
INTRODUCTION TO E-COMMERCE Security & compliance management
• Advanced electronic signature: This signature is only assigned to the owner of the
signature key. It facilitates the identification of the owner of the signature key. The
advanced electronic signature is generated by means, which are under full control
of the owner of the signature key. It must be tied to the document in a way so
that a later change of the document is recognized.
• Qualified electronic signature: This signature is based on a qualified certificate,
which is valid at the time of generation of the signature. It has been generated
with a so-called secure signature generation unit. The certificate assigns a signature
check key to a specific person and confirms his/her identity. The certificate only is
a qualified certificate if it has been provided by an accredited trust centre, has been
electronically and qualified signed and contains some specific information, which
is defined in the law. To store signature keys and to generate qualified electronic
signatures secure signature generation units have to be used. The used technical
components have to be accredited by specific German authorities.
144
INTRODUCTION TO E-COMMERCE Security & compliance management
How do those technologies work together, if you want to send a message to your partner?
First you have to sign the message. Secondly you apply a hash function to the signed
document so that the receiver can check, whether the document he has got is the one you
have sent. And thirdly you encrypt the signed and hashed document so that no third party
can read the document.
The most important term is the certificate. This is a digital confirmation that a public
signature key is assigned to a specific person or organization. There is a world wide standard
for certificates: X.509v3. Thus a PKI is an infrastructure to generate and manage certificates.
There is a business standard for PKI. It is PKCS (Public Key Cryptography Standard), which
is provided of the company RSA who are the owners of the RSA encryption method.
However, there are some problems and challenges in building and operating a PKI. First
significant costs occur and several organizational issues have to be solved. Secondly a
cooperation of different PKI’s is a real challenge. But how can two communication partners
verify their certificates if they do not operate within the same CA?
A smart card, chip card, or integrated circuit card (ICC) is any pocket-sized card with
embedded integrated circuits. Usually smart cards are made of plastic. The application focus
is the proof of identity.
Smart cards can provide identification, authentication, data storage and application
processing. They may provide strong security authentication for single sign-on (SSO) within
large organizations.
145
INTRODUCTION TO E-COMMERCE Security & compliance management
Smart cards contain a tamper-resistant security system (for example a secure cryptoprocessor
and a secure file system) and provide security services (e.g., protects in-memory information).
They communicate with external services via card-reading devices, such as ticket readers,
ATMs, DIP readers (to “dip” the card into a chip-enabled reader), etc.
A second card type is the contactless smart card, in which the card communicates with
and is powered by the reader through RFID (at data rates of 106–848 kbit/s). These cards
require only proximity to an antenna to communicate. Like smart cards with contacts,
contactless cards do not have an internal power source. Instead, they use an inductor to
capture some of the incident radio-frequency interrogation signal, rectify it, and use it to
power the card’s electronics.
Dimensions of smart cards are similar to those of credit cards. ID-1 of the ISO/IEC 7810
standard defines cards as nominally 85.60 by 53.98 millimeters (3.370 in × 2.125 in).
Another popular size is ID-000, which is nominally 25 by 15 millimeters (0.984 in × 0.591
in) (commonly used in SIM cards). Both are 0.76 millimeters (0.030 in) thick.
146
INTRODUCTION TO E-COMMERCE Security & compliance management
147
INTRODUCTION TO E-COMMERCE Security & compliance management
Requirements:
• Ensure confidentiality of order and payment information,
• Ensure integrity of transferred data,
• Authentication whether card holder is true owner of credit card account,
• Authentication whether customer communicates with an authentic merchant,
• Use of a secure protocol, which is independent from the security services of the
communication protocols.
Process:
• Ordering/purchase request:
оо Customer sends an initial message (initiate request),
оо Request is answered by the supplier through sending an signed answer and
also the certificate of the supplier and the certification of the supplier’s bank
(initiate response),
оо Customer checks both certificates and the supplier’s signature at the certification office,
оо Customer creates the order and the order to pay and creates from both messages
a dual signature,
оо The order to pay is additionally encrypted with the public key of the supplier’s
bank so that the supplier is not able to read it,
оо Finally all messages are sent to the supplier together with the certificate of
the customer,
148
INTRODUCTION TO E-COMMERCE Security & compliance management
In Germany there are several other laws being relevant for E-Commerce:
In general there is the question which national law has to be applied when making
E-Commerce. Basically there is a free selection of the law system, which is chosen as the
basis for contracts. However, there is one exception (in Germany): Contracts with consumers.
The protection of the consumer’s state of residence cannot be revoked.
In the European Union the freedom to offer professional services in other countries (of the
union) is protected by law.
149
INTRODUCTION TO E-COMMERCE Security & compliance management
Domains are assigned via ICANN (Internet Corporation for Assigned Names and Numbers)
and subsidiaries.
The domain .eu was started in 2005. In the beginning it was only available for owners of
registered trademarks. The assignment follows the first-come-first-serve-principle. Strong
formal procedures have been established.
The highest reconciliation instance is the Czech court of arbitration. An applicant is not
only obliged to present his own judicial position but also has to expose that the opposite
party does not have a reasonable interest in the considered domain or has registered it in bad
faith (Bad faith is assumed if the domain has not been used for at least 2 years). No dispute
action is accepted (if a third party claims a stronger interest in the considered domain).
The domain .de has been assigned since 1996 through DENIC e.G., the German chapter
of ICANN.
Maastricht
University is
the best specialist
university in the
Visit us and find out why we are the best! Netherlands
(Elsevier)
Master’s Open Day: 22 February 2014
www.mastersopenday.nl
150
INTRODUCTION TO E-COMMERCE Security & compliance management
Only civil law settlements are accepted. There is no trademark verification at registration.
Dispute actions are not possible. The domain assignment is fixed for at least one year (to
avoid domain grabbing).
In Germany there is a clear legal obligation for all (!) providers of websites (organizations
as well as individuals) to identify themselves in a specific way. The obliged elements of
provider identification are:
For organizations the top representatives must be reported. There are specific obligations
for specific businesses.
A disrupter is a person or organization being involved in causing damage (see BGB § 1004;
BGB = German Civil Code). His specific contribution is not relevant. Accountability is
assumed even if you let a third party cause damage though you would have been able to
prohibit it. This accountability is always given even if you are not aware of an illegal activity.
However, auditing duties have to be reasonable. Preventive auditing is requested but not clear.
In 2016 pure conveyance of information has been allowed by the German Telemedia Act, if
just the technical capability is provided, e.g. WLAN services in a public area are provided.
Due to German criminal law (StGB § 9) an action has been conducted where the actor did
it or where he wanted to do it or where the result of his action occurred or was expected
by him to occur.
151
INTRODUCTION TO E-COMMERCE Security & compliance management
What does this mean? If somebody provides racist content in German via a server running
in a foreign country then the German prosecutor and German police have to become active
because of the German language they assume that the actor wanted to address his ideologies
to a German audience and wanted to have an effect in Germany.
In Germany the employer is the owner of his Web and mail system. An employee is not
allowed to use it for private reasons if there is not an explicit permission of the organization.
6.6 EXERCISES
6.6.1 QUESTIONS FOR YOUR SELF-STUDY
Q6.01: Why is the access provider not able to guarantee successful access to any computer
attached to the Internet?
Q6.02: Why could we see the criminal liability of search engine operators differently from
access providers?
Q6.03: Review the threat catalogue of German BSI. Which threats are especially relevant
for E-Commerce? Do you see further threats, which are not listed here?
Q6.04: List internal rules of a firm, which have to be followed in running the firm’s
online shop.
152
INTRODUCTION TO E-COMMERCE Security & compliance management
T6.03: Some people tell, that employees are one of the greatest threats of every organization.
Why do they come to that opinion?
T6.04: Let two organizations have an encrypted data exchange. Describe the communication
protocol if they decide to use asymmetric encryption.
6.6.3 HOMEWORK
Find out specific risks within E-Commerce. Do all participants have similar risks? Which
risk management strategies do they need?
AXA Global
Graduate Program
Find out more and apply
153
INTRODUCTION TO E-COMMERCE Electronic payment
7 ELECTRONIC PAYMENT
Learning objectives
In this chapter you will learn,
Recommended pre-reading
• Mohapatra 2013, chapter 4.
Money plays a basic role in the economic cycle with the subsequently listed steps:
Notes and coins are a universal medium of exchange. The specific physical entities (notes,
coins) are independent from the actual owner. They are long living and divisible into very
small units. However, the owner has the problem of fraud and the problem of loss.
The physical value of the medium (notes, coins) is much lower today than its business value.
Thus it needs authorization by a central bank. The business value is commonly accepted
and in some way guaranteed by the authorizing institution. However, the economic areas
where specific notes and coins can be used are limited because of different currencies.
154
INTRODUCTION TO E-COMMERCE Electronic payment
The handling of notes and coins is very simple. Transaction costs (on farmer’s market) are
extremely low. Business transactions with notes and coins allow complete anonymity of the
participants. However, there are some restrictions due to laws.
Real economic areas use money in cash and book money. Business with money in cash
runs as follows:
• Customer and supplier come together physically (at the same location).
• The supplier has a product or service offering; the customer has notes and coins.
• Both partners exchange product or service and money synchronously.
Prerequisites are:
• The customer assumes that the supplier is the legal owner of the goods.
• The supplier assumes that the customer is the legal owner of the money.
• The customer checks goods; the supplier checks notes and coins.
• Customer and supplier do not have to know each other.
Problems are:
Today most business transactions are conducted without the use of notes and coins. We
usually do business with book money. Business with book money runs as follows:
• Customer and supplier need a banking account; this makes some kind of bank
necessary (the bookkeeper).
• The bookkeeper guarantees that the account balance is given and he transfers the
money if requested by the account owner. He guarantees that the account owner
can exchange the amount of his account balance into notes and coins every time.
• Book money is linked to the banking account and the account owner. Thus
transactions cannot longer be conducted completely anonymously.
• The account owner has to pay the bookkeeper for his services (transaction costs).
• There is a higher protection against fraud and loss – but of course no perfect security.
Finally the following question must be answered: How can we transfer “real” money into
the economic area “Web”?
155
INTRODUCTION TO E-COMMERCE Electronic payment
• Money in cash,
• Book money,
• E-money.
• Cash payment,
• Bank transfer,
• Debit note,
• Wallet payment.
156
INTRODUCTION TO E-COMMERCE Electronic payment
The assessment of payment methods from a supplier’s point of view is conducted due to a
magic triangle given by:
• Acceptance by customer,
• Protection of supplier against shortfall in payment,
• Costs.
Also payment amounts and cost structure determine the selection of payment methods:
• Invoiced amount,
• Payment dependent costs: customer, supplier (fix per transaction or variable per
transaction, e.g. sales volume dependent),
• Payment independent costs (for customer, for supplier):
оо one time costs: procurement costs, setup and adjustment costs (dealer, third
parties, public fees),
оо periodic costs: basic charges for services and software, rental fees for hardware.
Finally the integration into the sales process has to fulfil requirements from the workflow
as well as requirements from the technical implementation.
157
INTRODUCTION TO E-COMMERCE Electronic payment
• Order,
• Delivery,
• Sending an invoice (integrated into delivery, separated from delivery),
• Payment (after receipt of delivery, after receipt of invoice, per bank transfer),
• Confirmation of incoming payments.
• Order,
• Invoicing and sending an invoice,
• Payment,
• Delivery after receipt of payment.
158
INTRODUCTION TO E-COMMERCE Electronic payment
Let us consider in more detail the payment method GiroPay, which since 2000 is provided
by GiroPay GmbH. The firm was founded by a group of German banks. The course of
action is:
The first surrounding condition is that the customer account must have allowance for online
banking and customer’s bank must attend the GiroPay – method. The second is that the
supplier must have a bank account, must have a contract with a GiroPay supplier bank,
and must be linked technically to the GiroPay service provider.
159
INTRODUCTION TO E-COMMERCE Electronic payment
• Delivery is not possible because the customer is not present at the delivery address,
• Deviation between delivery and invoice,
• Availability of cash at the customer,
• Problem of change money.
160
INTRODUCTION TO E-COMMERCE Electronic payment
• Order: together with the allowance for bank collection to take money from the
customer’s bank account,
• Clearance: submission of the debit note by the supplier at his bank/collection of
the requested amount from the customer’s account by the supplier’s bank,
• Delivery to the customer,
• Forwarding the invoice (if not handled via the Web).
• Simple application,
• Trustee function of the bank,
• Risk more on the customer’s side,
• Security issues (Account data in the Web).
161
INTRODUCTION TO E-COMMERCE Electronic payment
• Order,
• Invoicing,
• Payment acceptance by credit card,
• Delivery,
• Forwarding of invoice (if not done via the Web).
• No delivery,
• Deviation between delivery and invoice,
• Payment dysfunctions.
162
INTRODUCTION TO E-COMMERCE Electronic payment
7.3.6 E-PAYMENT
E-Payment methods have been developed especially for E-Commerce and supplement the
traditional payment methods. Payment functions are adopted by specific E-Payment providers
to unburden the supplier. E-Payment uses for the most part well known traditional payment
methods and combines or bundles them to new services.
Course of action:
Transferred data are protected with SSL encryption. Finance data of the sender (e.g. credit
card number or banking account number) are not communicated to the receiver of the
money. This shall avoid misuse of the data by the receiver of money.
163
INTRODUCTION TO E-COMMERCE Electronic payment
Features:
Problems:
• For every transaction you need specific equipment to read the money card.
• Is the amount shown identical to the amount, which is stored on the card?
• Does the supplier only take the money, which he is allowed to take?
• Are third parties able to steal money from the card?
You need a German mobile phone number and a German bank account. There may be
similar variant in other countries. This depends on the market position of the mobile
phone company.
After an initial (and free) registration the customer can use the method as he wants and
needs it.
164
INTRODUCTION TO E-COMMERCE Electronic payment
Some well-known online shops, which accept payments by ClickandBuy are: Apple iTunes
Store, T-Online Musicload, Steam, bwin, Test.de, FAZ.NET, iStockphoto.
RUN FASTER.
RUN LONGER.. READ MORE & PRE-ORDER TODAY
RUN EASIER… WWW.GAITEYE.COM
165
INTRODUCTION TO E-COMMERCE Electronic payment
• Dunning letters,
• Dunning by phone,
• Visits,
• Identification of debtors.
If your own cashing activities have not been successful (customer did not pay or did not
pay the correct amount of money), then you can forward this case to a lawyer. He will
conduct the following activities:
If the activities of the lawyer are not successful, then he will forward the case to the court.
Court procedure will be:
• Dunning procedure,
• Lawsuit,
• Pressing a criminal charge, if suspicion of cheating.
Cyber money (or digital currency) is a category of money represented in electronic form for
the purpose of financial transactions over the Internet. It is a form of currency or medium
of exchange that is electronically created and stored (i.e., distinct from physical media, such
as banknotes and coins).
A virtual currency has been defined in 2012 by the European Central Bank as “a type of
unregulated, digital money, which is issued and usually controlled by its developers, and used
and accepted among the members of a specific virtual community”. The US Department
of Treasury in 2013 defined it more tersely as “a medium of exchange that operates like a
currency in some environments, but does not have all the attributes of real currency”.
The key attribute, which a virtual currency does not have according to these definitions, is
the status as a legal tender.
166
INTRODUCTION TO E-COMMERCE Electronic payment
Strong definition: Virtual money consists of value units, which are stored on electronic
media and can be generally used to conduct payments. Neither the supplier nor the customer
has to be the issuer of these value units.
Comprehensive definition: Virtual money are all means of payment and clearing methods
which are based on technical innovations and potentially can lead to a substitution of notes
and coins and bank reserves as well as to the creation of new types of currencies.
Implementation of virtual money: If you draw money in a bank you get a mix of notes
and coins (the famous household mixture). As an analogy the bank could send you money
documents which you could store on your computer or a smartcard. These money documents
would be interchangeable like real cash.
Handling: The money documents can be transmitted via E-Mail (encrypted, electronic
envelope). They can be processed at a virtual counter or virtual cash register, where the
customer forwards a money document (upload) and gets change money (download).
Protection against theft can be ensured via a virtual safe on the disc (encrypted disc area)
or money storage on a separate medium.
Problems are:
Examples are: debit cards, stored-value cards, E-Cash, and electronic checks.
167
INTRODUCTION TO E-COMMERCE Electronic payment
7.5.3 CRYPTOCURRENCY
A cryptocurrency is a type of digital token that relies on cryptography for chaining together
digital signatures of token transfers, peer-to-peer networking and decentralization. In some
cases a proof-of-work scheme is used to create and manage the currency.
Bitcoin is the most widely used and well-known cryptocurrency. Many of the current
cryptocurrencies are based on Bitcoin. Bitcoin is the first decentralized peer-to-peer payment
network that is powered by its users with no central authority or middlemen. It was the
first practical implementation and is currently the most prominent triple entry bookkeeping
system in existence.
Behind the scenes, the Bitcoin network is sharing a massive public ledger called the “block
chain”. This ledger contains every transaction ever processed, which enables a user’s computer
to verify the validity of each transaction. The authenticity of each transaction is protected
by digital signatures corresponding to the sending addresses therefore allowing all users to
have full control over sending bitcoins. Thus, there is no fraud, no chargebacks and no
identifying information that could be compromised resulting in identity theft.
This e-book
is made with SETASIGN
SetaPDF
www.setasign.com
168
INTRODUCTION TO E-COMMERCE Electronic payment
The principal of Bitcoin is that we define an electronic coin as a chain of digital signatures.
Each owner transfers the coin to the next by digitally signing a hash of the previous
transaction and the public key of the next owner and adding these to the end of the coin.
A payee can verify the signatures to verify the chain of ownership.
For further information see: weusecoins.com or bitcoin.org. In the meantime another digital
money has come up, which is denominated Bitmint and has already got a good assessment
from experts.
7.5.4 CRITICISM
Many of these currencies have not yet seen widespread usage, and may not be easily used
or exchanged. Banks generally do not accept or offer services for them.
There are concerns that cryptocurrencies are extremely risky due to their very high volatility
and potential for pump and dump schemes.
Regulators in several countries have warned against their use and some have taken concrete
regulatory measures to dissuade users. The non-cryptocurrencies are all centralized. As such,
they may be shut down or seized by a government at any time.
169
INTRODUCTION TO E-COMMERCE Electronic payment
The more anonymous a currency is, the more attractive it is to criminals, regardless of the
intentions of its creators. Anyone with the right skills can issue Digital Currency. It can be
compared to issuing bonds with zero interest rate, no real security behind them and thus
no real obligation for the issuer to pay back the amount. This means that the issuer, who
succeeds in selling his currency to other users, can earn a great deal of actual money at the
expense of his users.
Forbes writer Tim Worstall has written that the value of Bitcoin is largely derived from
speculative trading.
7.6 EXERCISES
7.6.1 QUESTIONS FOR YOUR SELF-STUDY
Q7.01: What is the general approach of E-Payment providers? Can we see some general
principles of their business models?
Q7.02: E-payment normally is considered from the supplier’s point of view. On the other
hand there is a risk for the customer that the (supposed) supplier takes his money and does
not fulfil the order. Make an assessment of the payment methods with respect to a risk
minimisation for the customer.
Q7.03: Find out the most popular E-Payment systems. What are their advantages/disadvantages?
Which payment services should a new start-up company offer to its customers?
T7.03: If you are the owner of an online shop, you can decide whether your customers have
to pay after delivery by a money transfer from their bank account to your bank account or
with a credit card. Both variants have advantages and disadvantages for you. Assume that
you can select only one of both methods. Which one would you select? Why?
7.6.3 HOMEWORK
Finally all payment methods assume, that the customer has some kind of account and pays
with book money. Consider a society, where many people (not only a small minority) are
willing to pay with cash only. What can you do to make them customers of your online
shop? Be creative!
170
INTRODUCTION TO E-COMMERCE Performance management
8 PERFORMANCE MANAGEMENT
Learning objectives
In this chapter you will learn,
Recommended pre-reading
• Wiggers et al 2004.
Free eBook on
Learning & Development
By the Chief Learning Officer of McKinsey
Download Now
171
INTRODUCTION TO E-COMMERCE Performance management
Subsequently we will use the terms “principal” and “agent”, thus referring to the so-called
principal-agent theory. The one who delegates responsibility for something is the principal.
The one, who takes over responsibility from a principal, is an agent. In complex organizations
managers take over responsibility from higher management positions or from the owner
of the organization. They are agents. The question for the principal is whether the agent
really does what he wants him to do. He also has to establish procedures to monitor and
measure the activities of his agents.
The agent resp. manager takes over responsibility for a specific task or control object (e.g.
a project or a process). Because he/she is an expert in that field he/she will be able to do
the job better as the principal himself/herself. Or he/she will get the job just because the
principle does not have enough capacity or time to do the job himself/herself. However,
the principal is the client or customer and the agent is the contractor or supplier. Both
parties will negotiate a contract in which it is clearly described what the agent has to do
and how the principal has to reimburse the work of the agent. Finally there is one question:
How can the principal ensure that the agent works in his sense and for his (the principal’s)
objectives and the moral hazard is avoided.
172
INTRODUCTION TO E-COMMERCE Performance management
• Target agreement: Agree with principle on the targets, which have to be reached
by the control object. Take over responsibility to reach these targets.
• Planning: Plan how to reach the agreed targets and set sub-ordinate targets.
• Realization & Monitoring: Operate to reach the agreed targets and monitor the
degree of target fulfilment.
• Reporting: Prepare monitoring data for management & forward scorecard(s)
to management.
• Deviation analysis & Forecast: Analyse reported data and conduct forecast of
future development of data.
оо Result 1 = No deviations.
оо Result 2 = Deviations can be eliminated or reduced possibly due to changes of
targets. Define and initiate correcting actions.
оо Result 3 = Deviations cannot be eliminated or reduced/Targets will not be
reached, possibly due to changes of targets.
оо Result 4 = Targets have been reached successfully/Time is over/Task has been aborted.
173
INTRODUCTION TO E-COMMERCE Performance management
• Actions & Monitoring: Run corrective actions and monitor the degree of target
fulfilment.
Definition of an indicator
An indicator is a number, which measures the planned resp. expected or real occurrence of
an attribute of a control object.
www.sylvania.com
We do not reinvent
the wheel we reinvent
light.
Fascinating lighting offers an infinite spectrum of
possibilities: Innovative technologies and new
markets provide both opportunities and challenges.
An environment in which your expertise is in high
demand. Enjoy the supportive working atmosphere
within our global group and benefit from international
career paths. Implement sustainable ideas in close
cooperation with other specialists and contribute to
influencing our future. Come and join us in reinventing
light every day.
Light is OSRAM
174
INTRODUCTION TO E-COMMERCE Performance management
Indicators are measuring instruments in complex systems; they support the responsible
persons in managing resp. controlling of these systems.
Definition of a scorecard
This you will find in well known books on microeconomics: A scorecard is a well structured
set of indicators which are related to each other and as a whole deliver a complete information
about the control object.
So it is more precise:
A scorecard is a list K(t) = (k1(t), k2(t), k3(t), …, kn(t)) of indicators and describes the
planned/expected or real position of a control object at the point of time t in an n-dimensional
state space. The indicators of the scorecard represent the relevant attributes (relevance due
to the targets) of the control object and they are the coordinates of this control object in
the defined state space.
175
INTRODUCTION TO E-COMMERCE Performance management
• Ticket Management Process (You will find such processes in call centres or service
organizations. Customers will send requests and expect that the call centre or service
provider gives an answer, initiates a service delivery or eliminates an incident, etc.
Those requests are documented in a ticket and this ticket runs through the process
until successful completion.)
оо Number of registered tickets,
оо Average duration from initiation to completion of tickets,
оо Number of successfully closed tickets per call agent and hour,
оо Reopen rate of closed tickets (If the customer is not satisfied with the result of
his request he can re-open the ticket and enforce a new processing of his request),
оо First resolution rate of closed tickets (Tickets can be successfully completed by
the agent who first deals with the ticket),
оо Escalation rate of tickets (Ticket cannot be completed by the agent initially
dealing with it and has to be forwarded to another agent, e.g. an expert),
оо Portion of tickets in category X,
оо Portion of tickets coming from customer group Y,
• Project
оо Degree of target achievement (e.g. measured by the portion of work packages,
which have already been finished),
оо Quality of delivered results (e.g. measured by the portion of conducted quality
assurance activities where no error has been found),
оо Percentage of budget already consumed,
оо Degree of meeting deadlines (e.g. measured by the portion of deadlines, which
have been met in time),
оо Volume/number of changes (moving targets!),
оо Volume/number of unresolved problems,
оо Portion of external experts in the project team.
176
INTRODUCTION TO E-COMMERCE Performance management
• Benchmarks serve to compare different but similar control objects. They are often
used to compare control objects from different organizations. Objects must be
comparable and all objects to be compared must be measured with the same indicators.
Example: The (average) duration of a specific project could be appropriate to be used as a
benchmark because it can be generated similarly for different organizations. Benchmarks
can be management indicators as well as information indicators.
360°
Sometimes a fourth category of indicators is considered, the analytic indicators. These
.
indicators are important for management but they can be generated only from time to time,
thinking
e.g. once per year, because actual values change slowly. A typical example of an analytic
indicator is the skill level of a group of employees. This shall be improved over time but
will take a significant amount of time until improvements can be measured.
360°
thinking . 360°
thinking .
Discover the truth at www.deloitte.ca/careers Dis
Discover the truth at www.deloitte.ca/careers © Deloitte & Touche LLP and affiliated entities.
First let us consider the different levels of control objects in the ICT area. All types of control
objects can also be found similarly outside the ICT area in every business environment.
Elementary objects
• ICT Service: An ICT service is delivered by your internal IT department or an
external ICT service provider. Each service will be controlled by a (small) scorecard,
which is contained in the so-called service level agreement (SLA). The scorecards of
different services will be similar or even identical but this does not always make sense.
• ICT Process: This means an internal process of your internal or external ICT service
provider. Do not confuse with business processes. Each process will be controlled
with a (small) scorecard. The scorecards of different processes will be similar or
even identical if the type of process is the same. However, you will find different
types of processes and due to this specific scorecards make sense.
178
INTRODUCTION TO E-COMMERCE Performance management
• ICT System: This means hardware and software, e.g. application systems. Each
system will be controlled with a specific scorecard. From a customer’s point of view
system are not so interesting because they are integrated into services. But internally
(in the ICT organization) systems are specific control objects. The scorecards of
different systems will be similar or even identical.
• ICT Project: Projects are conducted to build new ICT services, processes or systems
or to improve ICT services, processes or systems. Each project will be controlled
with a specific scorecard. For specific projects it may be helpful to add specific
indicators to the scorecard.
Portfolio objects
We also have to consider groups of the above mentioned elementary control objects.
Management does not only have to control each single service, process, system or project,
but also the total group of all services, all processes, all systems, and all projects.
Possibly an ICT organization has defined several service, process, system or project portfolios.
There may be a hierarchy of portfolios.
179
INTRODUCTION TO E-COMMERCE Performance management
• IT Demand
оо This is the responsibility of the ICT customer or consumer.
оо The ICT customer has to plan and communicate his needs.
оо The ICT customer is responsible to use ICT services in his business
processes efficiently.
• IT Supply
оо This is the responsibility of the internal or external ICT service provider.
оо The service provider has to make service offerings.
оо The service provider has to provide ICT services effectively and efficiently.
Do you like cars? Would you like to be a part of a successful brand? Send us your CV on
We will appreciate and reward both your enthusiasm and talent. www.employerforlife.com
Send us your CV. You will be surprised where it can take you.
180
INTRODUCTION TO E-COMMERCE Performance management
• IT Governance
оо This is the responsibility of top management.
оо Top management has to establish the rules of the ICT “game” for the organization
(Who is allowed or who has to provide which ICT services? Who is allowed or
who has to consume which ICT services?).
оо Top management has to ensure the long-term survival of the organization, of
course including the chances and risks of ICT for the organization.
Let us consider online shops or websites a little deeper. Because a website is an ICT system
all methods and approaches of ICT performance management can be used. So we could
measure the availability, response times and so on as we can do it for arbitrary application
systems. You will find a lot of specific metrics and KPI proposals if you read books about
IT service management (Forbes 2016).
However, some things are different from traditional ICT systems and services.
First of all, most users are not known to your organization (unless you only consider
registered users) because they are not members of your organization (See B2C business,
online shop). What are the consequences?
• The user is not a member of your organization. He is free in what he does, how
he does it and when he does it. You cannot dictate the rules as you can do it for
the members of your organization. Perhaps he wants to visit your website after
midnight and not during the normal opening hours.
181
INTRODUCTION TO E-COMMERCE Performance management
• The user brings his own device. Due to well established standards it should not
be a problem for him to connect to your website. But sometimes the browser,
the version of the browser or the quality of the network do play a role. And your
website should be able to automatically adapt to the specific parameters of the
user’s device whether it is a traditional office desktop or the newest version of a
super smartphone.
• You do not know how many users you really have or will have. You just can make
statistics and forecasts. In your organization you will exactly know how many users
you will have at maximum. So planning and capacity management are much more
vague as within your organization.
Secondly, ICT systems in the E-Commerce area cross boundaries of organizations (See
B2B business). This leads to the challenge of interfaces. Though standards make it quite
easy to couple your ICT systems with the ICT systems of your business partners a lot of
work remains to do:
• Standards always allow some interpretation. To let ICT systems cooperate all systems
have to work with the same interpretation of the standards…
• When different systems are linked things can go wrong. What about error handling,
security and consistency of data in case of breakdowns?
• We also have some ownership and even legal issues. In a value chain we have a
chain of ICT systems. Who is responsible for the chain of systems as a total system?
Who is the owner of which part of the total system and how is the distribution of
responsibility? How are the costs of the ICT system chain assigned to the partner
of the value chain?
Another issue will arise later on, when we consider Website Controlling/Web Analytics. We
will see that this is not only an issue of ICT performance management but also rather a
subarea of sales and marketing performance management.
182
INTRODUCTION TO E-COMMERCE Performance management
This is, of course, the same for E-Commerce projects. However, there are some specific
challenges for projects in the area of E-Commerce:
• Those projects will often have several project sponsors/awarding authorities, possibly
from different organizations, even legal entities. This lets project steering become a
serious challenge. We have to care for the setup and management of the steering
committee.
• Often project results are not well defined or at least strongly moving, because
E-Commerce is a completely new area for the whole organization. This will lead
to a significant change management challenge.
• Sometimes a project programme (network of interlinked single projects) is
initiated and the development of an online shop or a website is just a part of a
complex endeavour.
• We have a mixture of development and customizing due to the fact that parts
of the new system are off the shelf software and other parts have to be developed
individually for the specific environment.
• We have a high portion of infrastructure issues (e.g. hardware, network, devices,
databases).
�e Graduate Programme
I joined MITAS because for Engineers and Geoscientists
I wanted real responsibili� www.discovermitas.com
Maersk.com/Mitas �e G
I joined MITAS because for Engine
I wanted real responsibili� Ma
Month 16
I was a construction Mo
supervisor ina const
I was
the North Sea super
advising and the No
Real work he
helping foremen advis
International
al opportunities
Internationa
�ree wo
work
or placements ssolve problems
Real work he
helping fo
International
Internationaal opportunities
�ree wo
work
or placements ssolve pr
183
INTRODUCTION TO E-COMMERCE Performance management
After projects have been successfully finished the new or modified system, which was the
result of the project, has to be transferred to the daily operation, which is either taken over
by an internal ICT department or by an external ICT service provider.
Questions:
• Which systems/sub-systems/components are used for E-Commerce?
• Are all systems/sub-systems/components clearly defined?
• Can we measure the resource consumption of the systems/sub-systems/components?
184
INTRODUCTION TO E-COMMERCE Performance management
• Can we determine the true costs of our E-Commerce systems, which do not only
include the ICT costs but also the costs of the user organization working with
the system?
• Which overhead and infrastructure costs (indirect costs) must be assigned to the
E-Commerce systems?
• What is the output of the systems/sub-systems/components which are to be
considered? Can we measure the output? How can we measure it?
Challenges:
• Boundaries of E-Commerce systems are not so precisely defined as in traditional
application systems.
• E-Commerce systems use to a high degree general infrastructure systems and
middleware components.
• In the case of service oriented architectures (SOA) the services will (hopefully) be
used by various systems.
• Master the clearance regulations for used external services.
185
INTRODUCTION TO E-COMMERCE Performance management
Definition of services
• The value proposition: A service is a means of delivering value to customers by
facilitating outcomes customers want to achieve without the ownership of specific
costs and risks.
• The value composition: We always ask for the business value of a service:
оо Service Utility: functionality from the customer’s perspective – what the services
does, what the customer gets, fitness for purpose,
оо Service Warranty: Assurance that an IT service will meet agreed requirements –
how well the service is done, how it is delivered, fitness for use.
Challenges
• Who is the service customer? Who is responsible for the business done with
E-Commerce?
• Who is the user of the service (people inside and outside of the organization)?
• Who decides the service levels?
• Who are the partners, which agree on the service levels?
• How can we measure the realized service levels?
186
INTRODUCTION TO E-COMMERCE Performance management
The basis of performance management for a service is a service level agreement (SLA). Each
service has a specific SLA. If the ICT service provider is an external organization then SLAs
are part of the contract. If the service provider is the internal ICT department then SLAs
are internal documents. SLAs are always established by the ICT governance function.
• Generally:
оо In an online shop you are able (technically) to monitor and to document the
behaviour of the visitors completely and detailed.
оо You have much better possibilities to analyse than in a real shop.
оо But care for privacy protection of your (potential) customers.
• Benefits in detail:
оо Support management and decision making,
оо Analyse website usage and optimize website,
оо Improve user focus of website (usability, see Lin et al 2013, pp. 53–66),
оо Conduct search engine optimization (SEO),
оо Optimize online marketing,
оо Optimize sales process and related processes, e.g. billing or complaints management,
оо Optimize customer relationships,
оо Optimize profit,
оо Gain competitive advantage.
187
INTRODUCTION TO E-COMMERCE Performance management
If you run a website then there should be targets for it. Targets are corresponding to
management questions. Subsequently we list some typical questions related to websites/
online shops. In brackets you will find KPIs or metrics, which show the degree of target
achievement or the value of a relevant attribute.
A lot of questions do not ask for a number but for a name, a key word or another attribute.
The answer, of course, is not a KPI, but an information, which is strongly related to KPIs.
A typical representative of that category of management questions is: What are our 10
customers with the highest sales volume? The process to find this out is as follows:
• Find out the sales volume of all your customers (within a specific period of time).
• Build a list or table with the name or identifier of the customers and the corresponding
sales volume.
• Sort the list in decreasing order of the sales volumes.
• Take the first 10 entries of this list.
Management questions
• How many visitors did we have in general/due to a specific campaign (number of
visitors/visits, number of visitors/visits due to a specific campaign)?
• Where are the visitors located geographically (List of x-most found geographic
origin of visitors; referrer = pointing URL)?
• What is the technical infrastructure the users have (List of x-most used browsers/devices)?
188
INTRODUCTION TO E-COMMERCE Performance management
• What are the most used sites/most used entry sites (List of x-most used sites/entry
sites)?
• What are the most used exit sites (List of x-most used sites to leave)?
• How do users navigate through our website (List of x-most used paths of navigation)?
• What were users looking for (List of x-most used key words/search phrases)?
• How much sites are called per visit (Number of site calls per visit so that x% of
all visits have a higher number of site calls)?
• How much time do users spend for their visits (Time interval T so that x% of
visits have a longer duration as T)?
• Which portion of the visitors left the shop already after invocation of the first site
(Bounce Rate)?
• Which portion of users was seriously interested in buying something (Portion of
users who filled their shopping cart)?
• Which portion of the visitors ordered something (Conversion rate: Portion of users
who finalized a shopping transaction)?
• How much did visitors really buy (Value of shopping cart content so that x% of
the visitor bought more?)
• What are our top-/flop products (List of x products with highest/lowest sales volume)?
• Which portion of the visitors had already visited the shop earlier?
189
INTRODUCTION TO E-COMMERCE Performance management
Classification of data
• Raw data, which are needed as input to website-related KPIs: page views, visits,
visitors/multiple visitors, registered users, 1-Klick visits/n-click visits, usage quantities
of sites, entry sites, exit sites, link usages, coverage of banner advertising, click-
throughs of banners, key words for searching, top-Level-Domains/Sub-domains,
transferred data volume (downloads, Flash-Animations, streaming Media, RSS =
Really Simple Syndication), transmission errors, used browsers/operating systems,
• Combination of raw data: portion of 1-click visits (related to total number of
visits), portion of n-click visits (related to total number of visits), depth of visit:
Number of page views per visits, portion of multiple users (related to total number
of users), portion of registered users (related to total number of users), click paths
(Sequence of page views), portion of re-used user information, click-Through-Rate,
related to coverage, response rate for request forms, portion of dynamic sites,
• Indicators related to time: (average) duration of visits, (average) duration of
absence, frequency of visits, average response time of server, average duration for
downloads, course of usage, degree of capacity utilization for data transfer, incident
rate, intensity of incidents: Downtime through incidents,
• Indicators, which include website external data: number of Web customers,
portion of Web customers, loyal customers, customer potential (which can be
reactivated), portion of abandoned shopping carts, customer segmentation, costs of
user acquisition (Basis: Costs of a promotion action), costs of customer acquisition
(Basis: Costs of a promotion action), cross-selling potential (non-related products),
up-selling-potential (related products), average number of clicks per transaction.
190
INTRODUCTION TO E-COMMERCE Performance management
Selected indicators
• Conversion rate:
оо Total: portion of visitors who purchased something,
оо Partial: information vs. visit, shopping cart vs. information, order vs. shopping
cart, delivery vs. order, payment vs. delivery,
оо Effects on sales (example):
-- Basic data: annual visits of new customers = 50.000, average value of shopping
cart = 80 EUR, portion of new customers who become regular customers =
25%, annual follow-up purchases per customer = 2,
-- Effect of one-time increase of conversion rate by 1%: additional new customers =
500, additional sales 1. year = 40.000 EUR, additional sales 2. year = 60.000
EUR, additional sales 3. year = 80.000 EUR,
Methods
• Basically:
оо Data collection on the server (log-file analysis),
оо Data collection on the client (count pixel analysis (alternative to log-file analysis):
Course of action: website is called by user, website is delivered with integrated
count pixel, count pixel is invoked by analysis server, count pixel is delivered;
customer access is documented; Also: page tagging),
191
INTRODUCTION TO E-COMMERCE Performance management
CLICK HERE
to discover why both socially
and academically the University
of Groningen is one of the best
places for a student to be
www.rug.nl/feb/education
192
INTRODUCTION TO E-COMMERCE Performance management
• Clickmap: A clickmap is like a transparent slide, which is laid over the website
and shows how often specific links on this site have been clicked,
• Heatmap: The heatmap also shows, where users have clicked. But in contrast to
a clickmap also clicks onto unlinked text or graphics are measured. So you can
determine where the user has expected a link and you can insert it afterwards,
• User identification with cookies:
оо Definition of a cookie: A magic cookie, or just cookie for short, is a token or
short packet of data passed between communicating programs, where the data
is typically not meaningful to the recipient program; the contents are opaque
and not usually interpreted until the recipient passes the cookie data back to
the sender or perhaps another program at a later time; the cookie is often used
like a ticket – to identify a particular event or transaction,
оо First visit: website is called, website is delivered, cookie is placed,
оо Subsequent visit: website is called, website is delivered, cookie data are transferred
to the server, cookie is updated.
Tool selection
• Which methods the tool should support?
• Do you want to do the analysis on your own computers or do you want to let it
be done by an external service provider?
• Are there data privacy requirements, which the tool has to fulfil?
• How many users shall have access to the tool?
• Which time is accepted for the generation of the analyses and the reports?
• Which interfaces should the tool have (e.g. to ERP system, data warehouse, etc.)?
• How expensive is the tool allowed to be (dependent from marketing budget and
expected savings potential through Web controlling)?
• Which support services do you need, e.g. installation support, consulting during analysis?
193
INTRODUCTION TO E-COMMERCE Performance management
Conclusion
In the E-Commerce area we have a comprehensive potential for data collection and data
analysis. We have to observe the economic principle also in website controlling. Not everything,
which seems to be of interest, improves the management capability of our organization.
Basis for measurement and generation of indicators always must be clearly defined targets –
however we must be flexible enough to cope with the dynamic of the E-Commerce. Measured
data must be stored and administered. This must be documented in the requirement
documentation.
The website-analyst is the most important user of the system and must be a member of
the project team.
8.4 EXERCISES
8.4.1 QUESTIONS FOR YOUR SELF-STUDY
Q8.02: Explain the different categories of indicators and give some examples for each category.
Q8.05: Which organization in your firm should be made responsible for Web analytics
activities?
8.4.3 HOMEWORK
194
INTRODUCTION TO E-COMMERCE Advices for Exercises
Q1.01: Where do you use the opportunities of E-Commerce actually in your daily life?
AQ1.01: Examples are buying books or shoes, electronic banking. You will find further examples.
Q1.03: Consider the Internet-based businesses, which we have listed above. Are they really
new business categories?
AQ1.03: See 1.2.1.
American online
LIGS University
is currently enrolling in the
Interactive Online BBA, MBA, MSc,
DBA and PhD programs:
195
INTRODUCTION TO E-COMMERCE Advices for Exercises
T1.01: We have discussed about E-Commerce, E-Business and E-Procurement. Is there any
relationship between these three terms? What is the difference between E-Commerce and
E-Business? What is the difference between E-Commerce and E-Procurement?
AT1.01: E-Commerce = selling side, E-Procurement = purchasing side, E-Business =
including both sides.
T1.02: E-Commerce is so successful, because we have the Internet. Do you agree to that
statement? Why? What would happen, if tomorrow morning the Internet had shut down?
What would happen, if tomorrow we would only have traditional telephone lines?
196
INTRODUCTION TO E-COMMERCE Advices for Exercises
AT1.02: Internet provides a general infrastructure, globally available (7*24), robust, reliable
and flexible. Without the Internet business processes will slow down significantly, with dial-
up and point-to-point connections there will be strong technical constraints for conducting
business, availability of systems and providers will decrease due to lower reliability.
T1.04: E-Commerce has advantages as well as disadvantages. Give one example for the
customer’s perspective. Give one example for the supplier’s perspective.
AT1.04: See 1.2.2.
Q2.01: Compare the fundamental sales process as it has been shown here to your daily
life and the “traditional” sales process. What is different? What is new? What is missing?
AQ2.01: The sequence of steps may be different. Human actors do not see each other.
Mechanisms for trust building are needed.
Q2.02: How much should a business manager know about technical subjects? What is “need
to know”? What is “nice to know”?
AQ2.02: The manager must understand the functionality and the complexity. It is helpful
if he has a sound understanding of the technologies. This will help him to more effectively
communicate with the technical experts.
T2.01: Please list the seven plus one steps of the fundamental selling/purchasing process.
AT2.01: See 2.2.
T2.02: There are three basic types of software systems in the E-Commerce: online shop/
marketplace/procurement platform. Characterize them by the number of suppliers and
customers.
AT2.02: Shop = 1 supplier & n customers, marketplace = m suppliers & n customers,
procurement platform = n suppliers & 1 customer.
197
INTRODUCTION TO E-COMMERCE Advices for Exercises
T2.03: One basic technology of E-Commerce is abbreviated by TCP/IP. Was does this
mean? What are the two functions, which are covered by this technology?
AT2.03: TCP/IP = Transmission Control Protocol/Internet Protocol. TCP = physical layer
and data link. IP = address layer. See 2.3.1.
T2.04: Explain the two abbreviations B2C and B2B. Do you think it could make sense to
define a business type C2C? Why?
AT2.04: B2C = business to consumer, B2B = business to business, C2C = consumer to
consumer (can be considered as a specific variant of B2C or B2B.
Q3.01: How can we get to the point where the consumer wants to buy something from us?
AQ3.01: Customer must find us and must be interested in our offerings.
Q3.02: How should we make the business, so that the customer is satisfied and that we as
the supplier are satisfied as well?
AQ3.02: This similar to traditional business – good presentation of products and services,
simple contracting, quick delivery, comfortable and trustworthy payment, fair prices.
198
INTRODUCTION TO E-COMMERCE Advices for Exercises
Q3.03: You are a producer of a specific product, which you deliver in various packaging sizes
and different trade units. What are the consequences for the identification of the product,
e.g. to determine your sales quantities?
AQ3.03: We need an identifier for each product, must be able to identify each size and trade
unit of the product, and must have a minimal unit so that each trade unit is a multiple
of this unit.
Q3.04: Think that you run an online shop. How can you make sure that the customer,
just placing an order, is a real customer, will accept the delivery and then pay the invoice?
AQ3.04: Let him pay before delivery, ask for his street address and check it carefully.
Q3.05: Think that you sell digital goods. How can you ensure that the customer does not
disclaim the delivery of a digital good?
AQ3.05: For example – provide the good in an encrypted form and provide a key to decrypt
it only after the customer has paid.
T3.01: If you are the owner of an online shop, you can decide whether your customers have
to pay before delivery or after delivery. Both variants have advantages and disadvantages for
you. Assume that you can select only one of both methods. Which one would you select?
Why?
AT3.01: Let them pay after delivery, trust in your customers though it will not always be
successful.
Q4.02: Consider that you were a book-on-demand company. How could a B2B relationship
to a big (electronic) bookshop look like? What is the process? What are the business rules?
AQ4.02: Requests for eBooks are forwarded automatically. Incoming request starts provision
of an encrypted copy of the book. Decryption key is sent to the bookshop so that he can
forward it to his customer. With the provision of the book copy an invoice to the bookshop
is generated automatically and sent electronically to the bookshop.
199
INTRODUCTION TO E-COMMERCE Advices for Exercises
Q4.03: We have described the advantages of the involved parties for a strong B2B relationship.
What are the disadvantages for the involved parties?
AQ4.03: Disadvantages for the customer side – supplier gets access to customer’s data and
systems. Customer is “locked in” to the supplier, external partner influences design and
change of internal processes. Disadvantages for the supplier side – supplier must be open
for different customer needs, supplier is “locked in” to customer organization, and agreed
business rules allow some insight into internal structure of supplier organization.
Q4.04: Find information about marketplaces. What are they offering? How long have they
been in the market? Why are they successful?
AQ4.04: See remarks in chapter 4 and run an own research in the Internet.
T4.02: Consider a B2B relation between a producer of goods and a merchant. What are
the specific advantages for both parties? Give two examples for both parties.
AT4.02: Producer and merchant can synchronize planning activities, reduce stocks, optimize
delivery of goods and supply with goods, optimize transportation – all with respect to the
needs of both parties. Examples – cooperation of consumer product producers and retail
outlet firms, production and distribution of cars.
T4.03: Which consequences does a B2B relation have for the involved IT systems?
AT4.03: Data must be transferred seamlessly without media breaches. System operations
must be synchronized. Development and change management must be coordinated. Legal
issues must be considered, e.g. with respect to the usage of software licences.
Q5.01: Are the statements on specific impacts of E-Commerce true? If yes, under which
prerequisites? If no, what are the reasons?
AQ5.01: See 5.4. The answer depends somehow on your personal point of view. Find out,
what are your assumptions (may be that they are given or determined by your political,
religious or ethical orientation).
200
INTRODUCTION TO E-COMMERCE Advices for Exercises
Q5.03: Do you agree with the macroeconomic impacts described here? Is the list of the
described impacts complete or can you identify other impacts?
AQ5.03: See 5.3.1. Your agreement depends on your assumptions and expectations as well
as your political, religious or ethical background. Only those people can realize the benefits
of E-Commerce who have access to the digital world.
Q5.04: Do you agree with the microeconomic impacts described here? Is the list of the
described impacts complete or can you identify other impacts?
AQ5.04: See 5.3.2. Again it depends on your assumptions and expectations as well as your
political, religious or ethical background. Medium sized business may suffer from digitalization
(due to 5.4.4). Is there an optimal degree of information supply? Does a flooding with data
always help the customer?
201
INTRODUCTION TO E-COMMERCE Advices for Exercises
T5.01: Does E-Commerce increase or decrease price levels? What are the reasons for
your answer?
AT5.01: E-Commerce will lead to decreasing selling prices due to intensified competition.
However, there is the danger of eliminating competition, which finally can lead to monopoly
situations. The monopoly will be able to increase prices.
T5.04: Explain the term “externality” and give two examples of this impact.
AT5.04: See 5.4.8.
Q6.01: Why is the access provider not able to guarantee successful access to any computer
attached to the Internet?
AQ6.01: Access provider can guarantee access to the computer (address) but not whether
the computer is up and running or whether the owner allows access to a specific computer.
Q6.02: Why could we see the criminal liability of search engine operators differently from
access providers?
AQ6.02: Search engines do not provide illegal content; they are only looking for phrases.
Many phrases can have a legal and an illegal meaning at the same time (meaning depends
on context).
Q6.03: Review the threat catalogue of German BSI. Which threats are especially relevant
for E-Commerce? Do you see further threats, which are not listed here?
AQ6.03: See www.bsi.bund.de/grundschutz.
202
INTRODUCTION TO E-COMMERCE Advices for Exercises
Q6.04: List internal rules of a firm, which have to be followed in running the firm’s
online shop.
AQ6.04: Deliver only to verified addresses. Deliver to new customers only if they have
paid before delivery or by credit card. Identify customers by credit card or feedback from
commercial agencies.
T6.03: Some people tell, that employees are one of the greatest threats of every organization.
Why do they come to that opinion?
AT6.03: People know a lot about internal structures, about technical environment and
about weaknesses.
T6.04: Let two organizations have an encrypted data exchange. Describe the communication
protocol if they decide to use asymmetric encryption.
AT6.04: Each partner creates a key having a public part and a private part. If A wants to
send a message to B he encrypts his message with the public part of B’s key and sends the
encrypted message to B. B decrypts the message with the private part of his key, which
has never been published outside. If B wants to send a message to A he encrypts with the
public part of A’s key and A decrypts the message from B with the private part of his key.
203
INTRODUCTION TO E-COMMERCE Advices for Exercises
Q7.01: What is the general approach of E-Payment providers? Can we see some general
principles of their business models?
AT7.01: See 7.3.
Q7.02: E-payment normally is considered from the supplier’s point of view. On the other
hand there is a risk for the customer that the (supposed) supplier takes his money and does
not fulfil the order. Make an assessment of the payment methods with respect to a risk
minimisation for the customer.
AQ7.02: All methods where payment is done after delivery. May be that supplier and
customer can share risk by partial payments, one part before delivery and the second part
after delivery.
Q7.03: Find out the most popular E-Payment systems. What are their advantages/disadvantages?
Which payment services should a new start-up company offer to its customers?
AQ7.03: See 7.3. The relevance of a payment method depends on the specific cultural,
technical and sometimes even legal environment.
Maastricht
University is
the best specialist
university in the
Visit us and find out why we are the best! Netherlands
(Elsevier)
Master’s Open Day: 22 February 2014
www.mastersopenday.nl
204
INTRODUCTION TO E-COMMERCE Advices for Exercises
T7.03: If you are the owner of an online shop, you can decide whether your customers have
to pay after delivery by a money transfer from their bank account to your bank account or
with a credit card. Both variants have advantages and disadvantages for you. Assume that
you can select only one of both methods. Which one would you select? Why?
AT7.03: You could choose payment by credit card because then you are sure to get your
money. However, then you have to pay painful fees to the payment provider. Alternatively
you could choose the traditional money transfer. This would avoid paying high fees but
you would have to “pay” with a higher risk of payment shortfalls.
Q8.02: Explain the different categories of indicators and give some examples for each category.
AQ8.02: See 8.1.3.
205
INTRODUCTION TO E-COMMERCE Advices for Exercises
Q8.05: Which organization in your firm should be made responsible for Web analytics
activities?
AQ8.05: Marketing & sales department because behaviour of shop visitors and customers
is analysed.
206
INTRODUCTION TO E-COMMERCE References
REFERENCES
Ackermann, T 2013, IT Security Risk Management, Springer Fachmedien, Wiesbaden,
ISBN 978-3-658-01115-3 (eBook).
Baan, P (ed.) 2013, Enterprise Information Management, Incentro, New York Heidelberg
Dordrecht London, ISBN 978-1-4614-5236-2 (eBook).
Boughzala, I & Janssen, M & Assar, S 2015, Case Studies in e-Government 2.0, Springer
International Publishing, Cham Heidelberg New York Dordrecht London, ISBN 978-3-
319-08081-9 (eBook).
Chen, HM & Vargo, LS 2014, Rethinking Social CRM Design: A Service-Dominant Logic
Perspective, in: Martínez-López 2014, pp. 767–784.
AXA Global
Graduate Program
Find out more and apply
207
INTRODUCTION TO E-COMMERCE References
Chen, J 2014, Pricing Strategies in the Electronic Marketplace, in: Martínez-López 2014,
pp. 489–522.
Chuan, P & Khachidze, V & Lai, IKW & Liu, Y & Siddiqui, S & Wang, T (ed.) 2013,
Innovation in the High-Tec Economy, Springer-Verlag, Heidelberg New York Dordrecht
London, ISBN 978-3-642-41585-2 (eBook).
Devos, J & van Landeghem, H & Deschoolmeester, D (ed.) 2014, Information Systems
for Small and Medium-Sized Enterprises, Springer-Verlag, Heidelberg New York Dordrecht
London, ISBN 978-3-642-38244-4 (eBook).
Forbes, A 2016, ITIL for Beginners, CreateSpace Independent Publishing Platform, ISBN
978-1-53460-885-6.
ten Hompel, M & Rehof, J & Wolf, O (ed.) 2015, Cloud Computing for Logistics,
Springer International Publishing, Cham Heidelberg New York Dordrecht London, ISBN
978-3-319-13404-8 (eBook).
Kimwele, MW 2014, Information Technology (IT) Security in Small and Medium Enterprises
(SMEs), in: Devos et al 2014, pp. 47–64.
Kuster, J & Huber, E & Lippmann, R & Schmid, A & Schneider, E & Witschi, U &
Wüst, R 2015, Project Management Handbook, Springer-Verlag, Berlin Heidelberg, ISBN
978-3-662-45373-5 (eBook).
Kurbel, KE 2013, Enterprise Resource Planning and Supply Chain Management, Springer-
Verlag, Heidelberg New York Dordrecht London, ISBN 978-3-642-31573-2 (eBook).
Marks, EA & Lozano, B 2010, Executive’s Guide to Cloud Computing, Wiley & Sons,
Hoboken New Jersey, ISBN 978-0-470-52172-4.
208
INTRODUCTION TO E-COMMERCE References
Meier, A & Stormer, H 2008, eBusiness & eCommerce, Springer-Verlag, Berlin Heidelberg,
2nd edn., ISBN 978-3-540-85017-5.
Proeger, JE & Heil, D 2015, Economic Implications of E-Business for Organisations, in:
Martínez-López 2014, pp. 15–23.
Turban, E & King, D & Lee, JK & Liang, TP & Turban, CT 2015: Electronic Commerce,
Springer International Publishing, Cham Heidelberg New York Dordrecht London, ISBN
978-3-319-10091-3 (eBook).
Wiggers, P & Kok, H & de Boer – de Wit, M 2004, IT Performance Management, Elsevier
Butterworth-Heinenmann, Oxford Burlington, ISBN 978-0-7506-5926-0.
Xu, J 2014, Managing Digital Enterprise, Atlantis Press, ISBN 978-94-6239-094-2 (eBook).
Zwass, V 2014, The Framework and the Big Ideas of E-Business, in: Martínez-López 2014,
pp. 3–14.
209