Open courseE-Commerce
Open courseE-Commerce
Open courseE-Commerce
V SEMESTER
(UG-CCSS – SDE)
OPEN COURSE
UNIVERSITY OF CALICUT
SCHOOL OF DISTANCE EDUCATION
Calicut university P.O, Malappuram Kerala, India 673 635.
School of Distance Education
UNIVERSITY OF CALICUT
STUDY MATERIAL
Open Course
(For candidates with Programmes other than BBA and B Com)
V Semester
E-COMMERCE
©
Reserved
E-Commerce Page 2
School of Distance Education
CONTENTS Page
No.
E-Commerce Page 3
School of Distance Education
MODULE 1
INTRODUCTION TO E-COMMERCE
E-Commerce Page 4
School of Distance Education
On the other side e-business refers to companies for which internet is one of
several channels to customers and perhaps not even the primary one. Banks are
a classic example, as are companies, which have internet storefronts. But all
such entities have other primary channels to distribute their products. The main
distinctions between E-commerce and E-Business are
E-Commerce E-Business
Used for small and bulky transaction Used for bulky transaction
History of E-commerce
Most people don’t realize that e-commerce and its underlying technology
have been around for about forty years. The term e-commerce was originally
conceived top describe the process of conducting business transactions
electronically using technology from the Electronic Data Interchange [EDI] and
Electronic Funds Transfer [EFT].EDI is widely viewed as the beginning of E-
commerce. Large organizations have been investing in development of EDI since
sixties. It has not gained reasonable acceptance until eighties. EDI is a set of
standards developed in the 1960’s to exchange business information and do
electronic transactions. At first there were several different EDI formats that
business could use, so companies still might not be able to interact with each
other. Electronic Data interchange [EDI] allowed different companies to perform
electronic dealings with one another.
E-Commerce Page 6
School of Distance Education
The internet was conceived in 1969, when the Advanced Research Projects
Agency [a Department of Defense Organization] funded research of computer
networking. The Internet could end up like EDI without the emergence of World
Wide Web in 1990s.The web became a popular mainstream medium (perceived as
the fourth mainstream medium in addition to print, radio and TC) in a speed,
which had never seen before. The web users and contents were increasing
at an accelerated rate. Besides the availability of technical infrastructures, the
popularity of the web is largely attributed to the low cost access and simplicity of
HTML authoring, which are the obstacles of EDI Development. The Internet and
the Web have overcome the technical difficulty of EDI, but it has not solved the
problem of slow development of E-commerce standards/.
The first step in the sequence of EDI is the collection of information and
data. The way to collect the required information should be same as the way to
do it in the traditional system. However, instead of printing out the data on paper
in tradition, the system has to build an electronic file or database to store those
data. In the case of companies who already use computer to issue their
documents like purchase orders, they may already have some sort of databases
which store those information, then they fan start with the next step described
below.
2. Outbound translation
Then the computer should connect and transmit those data files to the pre
arranged Value Added Network [VAN} automatically. The VAN should then
process each file and route the appropriate electronic mailboxes according to the
destination set in the file.
E-Commerce Page 8
School of Distance Education
4. Inbound translation
The designated company should be able to retrieve the file from their
electronic mailboxes in a constant period, and then reverse the process by
translating the file from the standard format into the specific format required by
the company’s application software.
Importance of E-commerce
From the business perspective with less time spent during each
transaction, more transaction can be achieved on the same day. As for the
consumer, they will save up more time during their transaction. Because of this,
E-commerce steps in and replaced the traditional commerce method where a
single transaction can cost both parties a lot of valuable time.
E-Commerce Page 9
School of Distance Education
E-Commerce Page 10
School of Distance Education
that a negative impact will be targeted at direct substitutes, such as retail travel
agencies, retailers of software and “bricks and mortar: music stores. However,
these impacts will be small compared to the developments imaginable.
Challenges of E-commerce
As far as e-commerce is concerned it is still in an infancy stage in India.
The environment exist today is not much suitable for the fast growth of e-
commerce. There are various problems and challenges, which should be resolved
immediately to achieve a fast growth in this area.
One of the important challenges faced by this sector is the lack of adequate
infrastructure for IT technology and Internet. The penetration of personal
computers in India is as low as 3.5 per thousand of population compared to over
6 per thousand in China and 500 per thousand in USA.
Another important reason for not developing e-commerce is the high tariff
rate charged by Internet Service Providers [ISPs] Speed and connectivity is also
poor.
Another problem faced is that e-commerce sites are one of the favorite
targets of hackers. If you think that your site is not relevant enough to catch
their attention, you are wrong, and this way of thinking will help you to prepare
to face related risks. And the most serious drawback is the absence of effective
cyber law at the moment. E-commerce is governed by the UNCITRAI model code,
but this is not binding on any country. It is expected that all WTO member
countries will soon enact laws to govern e-commerce. Towards this end, India has
passed her Information Technology Act in May 2000.However, this Act simply
considers the commercial and criminal side of law and fails to consider other
multidimensional aspects of e-commerce,
Another cause for the slow growth of e-commerce is the privacy and
security issues. Measures like digital signatures, Digital certificates, and fire
walls can be adopted to secure safety and protection over the message passed on
internet. Payment related problems also continue to block the e-commerce
activities. Electronic cash, credit cards etc. are some of the popular payment
method used for e-commerce transactions. But unfortunately penetration of e-
cash and credit cards not only low, but Indian consumers are suspicious about
the threat of fraud played by unscrupulous hackers. In order to minimize this
problem experts suggest the use of digital certificate along with credit card to
secure their payment activities.
Limitations of E-commerce
E-Commerce Page 11
School of Distance Education
lack of knowledge or trust. A large number of people do not use the Internet for
any kind of financial transaction.
Another limitation of e-commerce is that it is not suitable for perishable
commodities like food items. People prefer to ship in the conventional way than to
use e-commerce for purchasing food products. So e-commerce is not suitable for
such business sectors. The time period required for delivering physical products
can also be quite significant in case of e-commerce. A lot of phone calls and e-
mails may be required till you get your desired products. However returning a
product and getting a refund can be more troublesome and time consuming than
purchasing, in case if you are not satisfied with a particular product. Some of the
other limitations are:-
Credit card security is a serious issue if vulnerable
Costs involved with bandwidth and other computer and server costs
Extensive database and technical knowledge and experience required
Customer apprehension about online Credit Card orders
Constantly changing technology may leave slow business behind
Some customers need instant gratification, and shipment times interrupt
that
Search utilities far surpasses the speed used to find products through
catalogs
Encourages competition between small and large online retailers
Supply Chain Management and E-Commerce
E-Commerce Page 12
School of Distance Education
The term supply chain management was first used in the early 1980s to
refer to the notion that manufacturing firms should think of their own internal
operations as an integrated whole, rather than as separate departments such as
purchasing, stores, production, finished good warehouse, distribution and so on.
It was quickly extended to cover relationships with suppliers and with immediate
customers the idea being that working more closely and co-operatively with these
e counterparts would enable a kind of integration and co-ordination that would
lead to reduced inventory, better quality and delivery performance and reduced
cost for everyone involved. The following parties are generally involved in a supply
chain:
The following are five basic components for supply chain management:
1. Plan – This is the strategic portion of supply chain management. You need a
strategy for managing all the resources that go toward meeting customer demand
for your product or service. A big piece of planning is developing a set of metrics
to monitor the supply chain so that it is efficient, costs less and delivers high
quality and value to customers.
2. Source- Choose the suppliers that will deliver the goods and services you need
to create your product or service. Develop a set of pricing, delivery and payment
3. Make- This is the manufacturing step. Schedule the activities necessary for
production, testing, packaging and preparation for delivery. As the most metric
intensive portion of the supply chain, measure quality levels, production output
and worker productivity.
E-Commerce Page 13
School of Distance Education
4. Deliver- This is the part that many insiders refer to as logistics. Co-ordinate
the receipt of orders from customers, develop a network of warehouses, pick
carriers to get products to customers and set up an invoicing system to receive
payments
5. Return- The problem part of the supply chain. Create a network for receiving
defective and excess products back from customers and supporting customers
who have problems with delivered products.
E-Commerce Page 14
School of Distance Education
MODULE II
BUSINESS MODELS OF E-COMMERCE
3. Distribution Management
Electronic based applications make the transmission of shipping
documents much easier and faster. Shipping documents include bill of lading,
E-Commerce Page 15
School of Distance Education
purchase orders, advance ship notices, and manifest claims. E-commerce also
enables more efficient resource management by certifying that documents
contain more accurate data.
4. Channel Management
E-commerce allows for speedier distribution of information regarding
changes in operational conditions to trading partners. Technical, product and
pricing information can be posted with much ease on electronic bulletin boards.
5. Payment Management
E-Commerce Page 16
School of Distance Education
over the internet. It is a natural progression for many retailers or marketer who
sells directly to the consumer. The general idea is, if you could reach more
customers, service them better, make more sales while spending less to do it that
would the formula of success for implementing a B2C e-commerce infrastructure.
A business firm can also establish relations with customers through
electronic medias. For this, the company has to design a web site and place it on
the internet. On the web site, the company can publish all details about the
product and services and that benefits customers to place orders for these goods
from the web site.
To maintain customers always with company’s web site, the company must
update the information on the web regularly. Consumers always demand greater
convenience and lower prices. Electronic commerce provides consumers with
convenient shopping methods.
Business – to Consumer [B2C] e-commerce provides many benefits to the
business. Some of them are:-
A single place to locate applications and tax forms for one or more levels of
government (city, state or local)
To provide the ability to send in filled out forms and payments
To update corporate information
To request answers to specific questions
E-Commerce Page 17
School of Distance Education
Business- to- employee [B2E] is different from other type since it is not a
revenue form of business. Otherwise, it increases profits by reducing expenses
within a company. Instead of having to look everything up manually they can
collaborate with each other and exchange data and other information.
E-Commerce Page 18
School of Distance Education
1. Website
Website must be easy to navigate since the surfer should not have to
search for the product or details he or she is looking for. The website should
project its products in as provocative way so the surfer wants to see more.
Place testimonials or photos of the product can also help to create a positive
image.
2. Merchant Account
All major credit cards have to be accepted for an e-commerce transaction.
So there arises a need for a merchant account
The online shopping cart allows the customers to choose and place their
chosen products in the cart just as one would do in shopping mall. This cart
will, at the end of the shopping, total the products and give the total cost of
the products chosen.
4. Payment gateway
This is the link from the credit card to the credit card processor. This
gateway helps information to pass from the website to the authorization centre
where the credit card is verified and then charged, after that the reply will
come back into the website that the processing has been successful. A
payment gateway will always check for details in credit card information and
reject any discrepancy in the information.
E-Commerce Page 19
School of Distance Education
The Internet
Intranets
E-Commerce Page 20
School of Distance Education
programs based on the Internet TCP/IP Protocol and common Internet user
interfaces such as the web browser. Intranet is the application of Internet
technologies within an organization private LAN or WAN Network.
Ease of use
Publishing ease
Low cost
Low maintenance
Easy software distribution
Extranet
E-Commerce Page 21
School of Distance Education
WWW or World Wide Web is used for people around the world and it would
easily link to other pieces of information, so that only the most important data
would quickly found by a user.
WWW is a global web in which millions of users are communicating with
each other with the help of computers. It is a wide-area hypermedia information
retrieval initiative aiming to give universal access to a large universe of
documents. It is an Internet based computer network that allows users on one
computer to access information stored on another through the world wide
network.
1. A user enters the URL of the webpage in the address bar of the web
browser.
2. The web browser requests the Domain Name Server for the IP address
corresponding to www.yahoo.com
3. After receiving the IP address, the browser sends the request for the
webpage to the Internet using HTTP protocol which specific the way the
browser and Web Server communicates. The Internet Routers send the
request to the intended web server
4. Then the web server receives the request using HTTP protocol. It then
examines the hard disk or memory and if the requested file is found it
returns it back to the web browser and closes the Http connection.
5. The Web browser then interprets the file and displays the contents of the
webpage in the browser window.
E-Commerce Page 22
School of Distance Education
Voice over Internet Protocol [VoIP] is simply the transmission of voice traffic
over IP based networks. The internet Protocol (IP) was originally designed for data
networking. The success of IP in becoming a world standard for data networking
has led to its adaption to voice networking. Thus, Voice over Internet Protocol
(VoIP) is a technology that allows to make voice calls using a broadband Internet
connection instead of a regular phone line.
VoIP is one of the new technologies that have the capability to dramatically
change the telecommunications scene of tomorrow. VoIP is a technology that
helps people to use the Internet as a transmission medium for telephone calls. By
using VoIP, callers can avoid long distance phone charges and save expensive
telephone infrastructure costs.
VoIP services convert our voice into a digital signal that travels over the Internet.
If we are calling a regular phone number, the signal is converted to a regular
telephone signal before it reaches the destination. VoIP can allow us to make a
call directly from a computer, a special VoIP phone, or a traditional phone
connected to a special adapter. In addition, wireless “hot spots” in locations such
as airports, parks, and cafes allows connecting to the Internet and may enable to
use VoIP service wirelessly
VoIP Telephones
These specialized phones look like normal phones with a handset, cradle
and buttons. But instead of having standard RJ-11 phone connectors, IP phones
have an RJ-45 Ethernet connector. IP phones connect directly to our router and
have all the hardware and software necessary right onboard to handle IP call. Wi-
Fi phones helps to subscribe callers to make VoIP calls from any wi-fi hot spot.
3. Using a computer with speakers and a microphone
This is certainly the easiest way to use VoIP. We need not even have toi pay
for long distance calls. All that is required is software, microphone, speakers, a
soundcard and an Internet connection. A broadband [high speed internet]
connection is required for VoIP technology. This can be through a cable modem,
or high speed services such as DSL or a local area network. A computer, a
E-Commerce Page 23
School of Distance Education
adaptor, or a specialized phone is required./ Some VoIP services only work over
your computer or a special VoIP phone, while other services allows to use a
traditional phone connected to a VoIP adaptor.
Benefits of VoIP
Low cost
Eliminating phone lines
Increased functionality and Reliability
Eliminating Long Distance Charges
Number portability
Computer Telephony Integration [CTI]
on any other network connected to the internet using this common set of
protocols. On the internet, the protocol that permits two internet
connected computers to establish a reliable connection is called TCP/IP.
E-Commerce Page 25
School of Distance Education
that helps the user to find files, programs, definitions and other topics that
the user specifies. Gopher protocol allows the user to free from the troubles of
specifying the details of host, directory and file names. Instead, the user can
browse through menus and press Enter when he finds some interesting topic.
Gopher is interacting with a large number of independently owned computers
around the world.
6. Wais
Wais stands for Wide Area Information Service. WAIS is a internet search
tool and describes as a protocol for computer to computer information
retrieval. It is a program that permits the user to search information
worldwide based on a service of key words. WAIS has the capability of
simultaneously searching in more than one database.
E-Commerce Page 26
School of Distance Education
products from all the major software vendors, making it possible for clients
and services to communicate in a consistent way across a wide spectrum of
platforms and operating environments. This universality has made web
services the most prevalent approach to implementing an SOA. Web service is
a software system designed to support interoperable machine to machine
interaction over a network. It has an interface described in a machine
processable format.
Service oriented Architecture [SOA]
Rules of SOA
SOA must have a mechanism that enables the consumer to discover a service
provider under the context of a service sought by the consumer. The
mechanism can be really flexible, and it doesn’t have to be a centralized
registry.
New access Devices
1. Globalism:-
The future of the Internet global distribution of information and
knowledge at lower and lower cost will continue to lift the world
community for generations to come. People will have access to any
information they wish, get smarter sooner, and be more aware of the world
E-Commerce Page 28
School of Distance Education
2. Communities:-
This internet communication revolution results into a new uniting
community. The Internet will increasingly be used for communications
within communities as much as across countries. Local communities will
organize in virtual space and take increasing advantage of group
communication tools such as mailing lists, new groups, and web sites, and
towns and cities will become more organized and empowered at the
neighborhood level.
3. Virtual Reality
E-Commerce Page 30
School of Distance Education
MODULE III
MARKETING STRATEGIES AND E-COMMERCE
A website is very essential to conduct e-commerce. The success or failure of
e-commerce to a greater extend is determined by the setting up of a suitable
website and its promotion to attract customers from all over the world. A website
is similar to storefront. In e-commerce context, it can be called as virtual
storefront where cyber customers visit. A website is basically a series of pages
with links to other pages or other sites. The pages contain text, banners, graphics
and sometimes audio and video.
Web pages are accessed and transported with the hypertext Transfer
Protocol [HTTP], which may optionally employ encryption [HTTP Secure, HTTPS]
to provide security and privacy for the user of the web page content. The user’s
application, often a web browser, renders the page content according to its HTML
markup instructions onto a display terminal.
All publicly accessible websites collectively constitute the World Wide Web.
The pages of a website can usually be accessed from a simple Uniform Resource
Locater called the homepage. The URLs of the pages organize them into a
hierarchy, although hyper linking between them conveys the reader’s perceived
site structure and guides the readers’ navigation of the site.
1. Home page
This is the first page of a web site. The use reaches this page when they
specify the address of a web site. It contains links and these links help the user
to navigate the different parts of a site. It shows the name of the company and
other important details.
2. Web page
E-Commerce Page 31
School of Distance Education
3. Domain name
4. Professional Logo
A professional looking logo is an integral part of a web site. It not only gives
a professional appearance to web site, but it will also enable our visitors to
recognize brand. The logo should be displayed in the top left corner of each page
of web site.
5. Theme based content
We can create our own page on the web site called “Privacy” and let our
visitors know exactly how we will be using the information collected from them.
Such a page should contain warning to visitors regarding security and privacy of
information they provide.
8. Testimonials
Potential customers will have many questions about our products and
services. It is better to use a feedback form for this purpose.
11. Copy rights
E-Commerce Page 32
School of Distance Education
The challenge for the website designer is to come up with a design model
and a system image that are consistent with the user’s model of the website. The
purpose of a website is to support and enhance the goals of a business or
organization. It is not an end in itself. A website should be much more than just
an online brochure, and a well designed web site integrates the following key
concepts:-
1. Information Presentation
E-Commerce Page 33
School of Distance Education
display. Furthermore, the over use of images, audio video can increase the time
in which a page downloads, which has an negative impact on usability.
Color choices should be pleasing to the eye and should stimulate the user’s
interest. Negative contrast should be used for flashing patterns- ie, flash a darker
foreground on a brighter pattern.
The interactive cycle between a user and a website is not complete until the
website responds to a command entered by the use. Website feedback often
consts of a change in the visual or verbal information presented to the user.
Completed orders should be acknowledged quickly. This may be done with a
acknowledgement or fulfillment page. The amount of time it takes to generate
and download this page, is a source of irritation for many e-commerce users.
Design criteria
ereby distributes or sells products to them. Therefore, the important criteria that
is to be followed while designing a website includes the following:-
products must be given in the site so that the customers who visit the site
can actually see ht products offered.
Good Meta tags – are read by Search Engines and should include at a
minimum, the page title, and the name of the business, description of the
business, the location, and key words.
Quick to load – the home page of the site should load quickly and be easy
to understand. Large pictures, moving graphics etc. will ion crease the load
time.
Easy to navigate- it should be possible to navigate easily from one part of
the site to other or from one piece of information to other areas of
information.
Current content – the information should always be current and updated.
Old information will make our website outdated. Information in the website
should be updated in a timely manner.
Leads- It is also essential to generate leads, sales or customer list. This can
include simple forms for the customer to fill out giving their information or
shopping carts so that product can be sold without our intervention.
Ability to bring people back – it is better to create a mailing list of
customers so that we can contact current customers and contacts from our
site with updated information inviting them back to visit.
Post site Built Scenario-It is advisable to read the site by many in order to
avoid great mistakes and make sure that it is submitted to major search
engines. Then add our site address to our email signature. It is also
essential to add the URL of our advertising materials.
Corporate Web Site
1. A home page
2. A navigation bar or other means for accessing various site sections
3. A unified look and feel incorporating the company logos, style sheets, and
graphic images
E-Commerce Page 35
School of Distance Education
Portal
A Web portal, also known as links page, presents information from diverse
sources in a unified way. Portals provide a way for enterprises to provide a
consistent look and feel with access control and procedures for multiple
applications and databases, which otherwise would have been different entities
altogether. A web portal is a web site that provides a gateway, or portal, to other
resources on the Internet. Portals are often the first page when we start up our
web browser like Netscape Navigator or Internet Explorer. The scope and
coverage of the portals are very wide and hence the term search engine is not
sufficient to describe the multi offerings provided by portals. Eg.Yahoo, MSN,
ALO , iGoogle etc.
Types of Portals
1. Vertical Portal
These are web portals which focus only on one specific industry, domain or
vertical. Vertical portal simply provides tools, information, articles, research and
statistics on the specific industry or vertical. A Vertical information Portal [VIP]
is a specializes entry point to a specific market place and or industry niche.Eg.i-
village- meant for women and guru.com for independent professionals
2. Horizontal portal
They are general interest portals covering a wide range of topics and
features such as yahoo or Google. These are mega portals dealing in a wide
range of topics.
3. Enterprise Resource portals or corporate portals
E-Commerce Page 37
School of Distance Education
7. Knowledge Portals
Search Engines for the general web do not really search the World Wide
Web directly. Each one searches a database of the full text of web pages selected
from the billions of web pages out there residing on servers. When you click on
the links provided in a search Engine’s search results, you retrieve from the
server the current version of the page. Search Engines databases are selected
and built by computer robot programs called spiders .They crawl the web in
their hunt for pages to include. They find the pages for potential inclusion by
following the links in the pages they already have in their database. They cannot
think or type a URL or use judgment to decide to go look something up and see
what’s on the web about it.
If a web page is never linked to in any other page, search engine spiders
cannot find it. The only way a brand new page – one that no other page – one
that no other page has ever linked to – can get into a search engine is for its URL
to be sent by some human to search engine companies as a request that the new
page be included. All search Engine companies offer way to do this. After spiders
find pages, they pass them on to another computer program for “indexing”. This
program identifies the text, links and other content in the page and stores it in
the search engine’s databases files so that the database can be searched by
keyword and whatever more advanced approaches are offered, and the page will
be found if your search engine matches its content. Some types of pages and
links are excluded from most search engines by policy. Others are excluded
because search engine spiders cannot access them. Pages that are excluded are
E-Commerce Page 38
School of Distance Education
referred to as the “Invisible Web” – what you don’t see in search engine results.
The invisible web is estimated to be two to three or more times bigger than the
visible web.
When you enter the key word search engine examines its database and
gives a listing of sites that match the search criteria. The hundreds or thousands
of search engine results are referred to as Hits.
Some popular search Engines include:-
Google
Alta vista
Yahoo
MSN
Ask.com
Dogpile
Metacrawler
Lycos
Hotbot
Internet Advertising
It appears as rectangular graphics near the top of the page. Banner Ads
have been used for many years and are the most popular form of advertising on
the web.
2. Floating Ads
These ads appear when we first go to a web page, and they “float” over the
page for five to 30 seconds. While they are on the screen, they create difficulty to
our view of the page and often block the mouse input as well.
E-Commerce Page 39
School of Distance Education
3. Interstitials
These are form of advertisement on the web that appears between web
pages that the user requests. These appear as pop-up windows displaying a
message.
4. Unicast Ads.
5. Takeover Ads
Viewers visiting the website will see a large ad when they first come, and
then the continuity is maintained by reiterating the same message throughout
the site in the form of banners, side bars or buttons.
6. Contextual Ads
This is a type of online advertising commonly used for content based
websites. With contextual advertising, targeted Ads appear based on the page’s
actual content
7. Rich Media Ads
10. Newsletters
These are similar to E-zines , these give more industry related news and
company updates.
11. Press releases
E-Commerce Page 40
School of Distance Education
2. Unsolicited in nature
Pushing a message at a potential customer when it has not been
requested and when the customer is the midst of something else on the net will
fail as a major revenue source for most internet sites.
3. Misdirection
It means sending customers to web locations other than the once for which
they are searching. Monetization of misdirection frequently takes the form of
charging companies for key words and threatening to divert their customers to a
competitor if they fail to pay adequately for key words that the customer is likely
to use in searches for the company’s products.
5. Cluttered Appearance
Advertising that is disorganized and difficult to read, as well as presenting
too much information at one time, often turns viewers off.
E-Commerce Page 41
School of Distance Education
Because of large number of SPAM and unsolicited emails that are sent out,
users can have difficulty to distinguish between genuine advertising and false
adverts and therefore the trustworthiness of advertisements is brought into
question.
Emergence of Internet as a competitive Advertising Media
Interviews with marketers reveal that few believe the Internet will change
their approach to advertising. Most see it as little more than a complement to
traditional marketing practices, and don’t expect it to reduce expenditure on
broadcast and print media or change the form, pricing, or delivery of
advertisements. It is probably a reaction to the early type of Internet and the
World Wide Web
Internet Advertising will account for a growing proportion of overall
advertising expenditure. Moreover, advertising – and marketing in general – will
adopt practices first developed or deployed on the Internet. As the technology
improves, the impact of internet advertising will increase and become easier to
measure, and the gap between the new precise, interactive marketing capability
and conventional “fizzy” passive media will widen. Over the next few years,
advertising agencies and consumer marketers will be under pressure to change
their whole approach to marketing communications.
Marketers will become more accountable for their results, and they will pay
more attention to building a total customer relationship. Offering consumers
value in return for information will become vital in eliciting their preferences.
Companies’ entire marketing organizations will be progressively redesigned to
reflect interactions with consumers on the Internet. For ad agencies, fees based
on results will become standard. The economics of Internet advertising are likely
to make current business models obsolete.
E-Commerce Page 42
School of Distance Education
whatever product they market. They should place references to their product
wherever they can. Most of all, advertising on the Internet should incorporate a
wide range of different fields meant to appeal to different possible customers.
MOBILE COMMERCE
Mobile commerce or M- commerce refers to transactions that are carried
out with the help of an electronic device like cell phone. M-commerce is the
buying and selling of goods and services through wireless handheld devices such
as cellular phone and Personal Digital Assistants [PDAs]
Mobile commerce is any transaction, involving the transfer of ownership or
rights to use goods and services, which is initiated and/or completed by using
mobile access to computer – mediated networks with the help of an electronic
device.
Mobile commerce was born in 1997 when the first two mobile phone
enabled Coco Cola vending machines were installed in the Helsinki area in
Finland. They use SMS text messages to send the payment to vending machines.
Mobile ticketing
Mobile vouchers, coupons and loyalty cards
Content purchase and delivery
Location based services
Information services
Mobile banking
Mobile brokerage
Auctions
Mobile purchase
Mobile marketing and advertising
E-Commerce Page 43
School of Distance Education
MODULE IV
ELECTRONIC PAYMENT SYSTEM
Electronic Payment system is a financial exchange that takes place online
between buyers and sellers. The content of this exchange is usually some form of
digital financial instrument {such as encrypted credit card numbers, electronic
cheques or digital cash) that is backed by a bank or an intermediary, or by a legal
tender. The various factors that have leaded the financial institutions to make
use of electronic payments are:-
5. The Processor – The Processor is a large data centre that processes credit card
transactions and settles funds to merchants, connected to the merchant on
behalf of an acquirer via a payment gateway.
Basic steps of an online payment
E-Commerce Page 44
School of Distance Education
1] Real Time (or Pre-paid tokens) – These are exchanged between buyer and
seller, their users pre-pay for tokens that serve as currency. Transactions are
settled with the exchange of these tokens. Eg. Digicash , Debit Cards, Electronic
Purse etc.
2] Post Paid Tokens – are used with fund transfer instructions between the buyer
and seller. Eg. Electronic Cheques, Credit card data etc.
2] Electronic or Digital Cash
E-Commerce Page 45
School of Distance Education
The electronic cheques are modeled on paper checks, except that they are
initiated electronically. They use digital signatures for signing and endorsing and
require the use of digital certificates to authenticate the payer, the payer’s bank
and bank account. They are delivered either by direct transmission using
telephone lines or by public networks such as the Internet. Integration of the
banking and the information technology industry has benefitted the consumers
in many aspects with respect to time, cost and operational efficiency
E-Commerce Page 46
School of Distance Education
6. Customer has the facility to get online and track spending , check balance,
change pin
Post paid Payment System
Normally all credit cards are post paid cards. The customer gets the
eligibility of spending through the income statement and credit history produced
before the credit card company. The customer gets a credit limit and a credit
period by which the customer is supposed to pay back the money to the credit
card company.
Features of Post paid payment system
E-Commerce Page 47
School of Distance Education
use of computer networks, the internet and digital stored value systems.
Electronic Fund Transfer and direct Deposit are all examples of electronic money.
E-cash is a system of purchasing cash credits in relatively small amounts,
storing the credits in our computer, and then spending them when making
electronic purchases over the Internet. The e-cash is the creation of electronic
money or tokens, usually by a bank, which buyers and sellers trade for goods
and services. It consists of a token, which may be authenticated independently of
the issuer. This is commonly achieved through the use of self-authenticating
tokens or tamper proof hardware. It includes credit cards, smart cards, debit
cards, electronic fund transfer etc.
2. Electronic Cheque
E-cheques are a mode of electronic payments. Integration of the banking
and the information technology industry has benefitted the customers in many
aspects with respect to time, cost and operational efficiency. Cheque is the most
widely accepted negotiable instrument to settle transactions in the world. Paper
cheques provide consumers an important payments mechanism.
This technology was developed by a consortium of Silicon Valley IT
Researchers and merchant bankers and since then has been promoted by many
of the financial bodies. E-cheques work the same way as paper cheques and are a
legally binding promise to pay. Electronic cheques are gathered by banks and
cleared through existing banking channels, such as automated clearing houses.
The advantages of Electronic cheques are :-
The online merchants could receive payments instantly
Similar to traditional cheques and eliminates need for customer education
Much faster
Less chance for cheque bouncing
Cost – effective manner
E-Commerce Page 48
School of Distance Education
3. Credit Cards
They are the convenient method of making online payment. Credit cards
work around the globe regardless of the location of country of the issuing bank.
They also handle multiple currencies through a series of clearing houses. The
credit card holders can purchase goods and services either offline or online
without making immediate payment. Payment to the merchant’s will be made by
the customer’s Bank. The credit card is a financial instrument which can be used
more than once to borrow money or buy products and services on credit. It also
contains a validity period and other important particulars.
To accept a credit card for payment, we have to open a merchant account
with our bank. A merchant account allows sellers to accept and process credit
card transactions. In these transactions, the card number and transaction
details are processed with no identification of the buyer. To implement the
payments over the internet, the web merchant needs some form of secure and
encrypted line using the Secure sockets Layer [SSL] that is standard on Netscape
and Microsoft browsers. The merchant server needs an encryption key for the
purpose.
4. Smart Card
A smart card is a plastic card about the size of a credit card, with an
embedded microchip that can be loaded with data, used for telephone calling,
electronic cash payments, and other applications and then periodically refreshed
for additional use. A smart card, chip card, or integrated circuit card [ICC] is any
pocket sized card with embedded integrated circuits which can process data. The
card connects to a reader with direct physical contact or with a remote
contactless radio frequency interface. Smart card technology conforms to
international standards and is available in a variety of form factors, including
plastic cards, fobs, subscriber identification modules [SIMs] used in GSM Mobile
phones and USB based tokens.
These cards can be used to purchase goods and services. Smart cards are
very useful to merchants and consumers to settle the transaction between them.
Smart card provides a lot of benefits to consumers. It helps to manage
expenditures more effectively, reduce the paper work and ability to access
multiple services and the Internet. A multiple application card can support
services like health care, travel and financial data access.
The benefits of smart cards for the consumer are the following:-
2. Convenience
3. Flexibility
4. Control
E-Commerce Page 49
School of Distance Education
5. International use
5. Debit Cards
It is a popular method of making payment. Banks issue debit cards to their
customers who have maintained an account in the balance with sufficient credit
balance. Each time the customer makes a purchase, an equal amount of the
purchase is debited in his account.
The transaction works much like a credit card transaction. For Eg. A
customer gives an ATM card to the seller for the purchase. The merchant read
the card through a transaction terminal and the customer enters his personal
identification number. Then the terminal route the transaction through the ATM
networks back to the customer’s bank for authorization against customer’s
deposit account. The funds, are approved, are transferred from the customer’s
bank to the sellers bank.
6. Electronic Purse
E-Commerce Page 50
School of Distance Education
1. Anti-Virus Programs
It is reported that 300 new viruses appear each month and if we are not
constantly protecting our system against this threat our computer will become
infected with at least one virus. Antivirus software scans computers for
signatures of a virus. A virus signature is the unique part of that virus. It can be
a file name, how the virus behaves or the size of the virus itself. Good antivirus
software will find viruses that have not yet infected your PC and eliminate the
ones that have. Antivirus program can be used on the server level itself. Such
programs can scan the files that the server receives and looks for patterns that
match known malicious software. The antivirus scanners are set to update them
automatically.
2. Standards for Security of the Products and systems
3. Firewalls
Merchants place firewalls between their installations and their clients.
They should also place firewalls between themselves and their payment
providers, the financial institutions they use, and in fact, any other installation to
which they are connected unless the installation is under their direct control .A
network firewall is basically a secure gate between our organizations data and
the Internet. The firewall is a combination of hardware and software. The firewall
then filters traffic based on our requirements. Firewall security is designed to
detect and resists unwanted attempts to penetrate our server security.
Physiological are related to the shape of the Body. E.g. Fingerprint, face
recognition, DNA, hand and palm geometry, iris recognition
Behavioral are related to the behavior of a person. E.g. typing rhythm, gait,
and voice.
E-Commerce Page 52
School of Distance Education
Types of Biometrics
The rhythms with which one types at a keyboard are sufficiently distinctive
to form the basis of the biometric technology known as keystroke dynamics. Key
stroke dynamics unlike other biometric technologies is 100% software based, and
it just requires a home computer to operate it.
E-Commerce Page 53
School of Distance Education
3. Hand geometry
This system requires the subject to place his right hand on a plate where it
is photographically captured and measured. Made of 27 bones and a complex
web of interconnected joints, muscles, and tendons, the human hand presents a
sufficiently peculiar conformation of anatomical features to enable
authentication. Airports, prisons, and factories have successfully employed hand
geometry system
4. Finger Print
It is a forensic criminological technique, used to identify perpetrators by
the fingerprints they leave behind them at crime scenes. In modern biometrics,
the features of fingerprint called fingerprint minutiae, can be captured, analyzed,
and compared electronically, with correlations drawn between a live sample and
a reference sample, as with other biometric technologies.
5. Facial Recognition
With good cameras and good lighting, a facial recognition system can
sample faces from tremendous distances without the subject’s knowledge or
consent. It works by two methods ; facial geometry or eigenface comparison.
Facial geometry analysis works by taking a known reference point, say, and
distance from eye to eye, and measuring the various features of the face in their
distance and angles from this reference point. Eigen face comparison uses a
palette of about 150 facial abstractions, and compares the captured face with
these abstract faces.
The identity of a person can also be verified with his voice. It is a difficult
problem for computers to identify the voice of a person. The prospect of accurate
voice verification offers one great advantage. It would allow a remote
identification using the phone system without any additional cost.
E-Commerce Page 54
School of Distance Education
MODULE V
LEGAL AND ETHICAL ISSUES IN E-COMMERCE
Transaction security has become very important in e-commerce since more
and more number of merchants doing their business online. At the same time
merchants are facing threats against security of their valuable documents
transacted over Internet. Consumers are not prepared to provide credit card
payment due to lack of security. There are many different transactions that make
security difficult. In order to succeed in the highly competitive e-commerce
environment, business organizations must become fully aware of Internet
security threats, so that they can take advantage of the technology that
overcomes them, and thereby win customer’s trust. The merchants who can win
the confidence of the customers will gain their loyalty and it opens up vast
opportunity for expanding market share.
The low cost of web site creation and the ease of copying existing pages
makes it all too easy to create illegitimate sites that appear to be published by
established organizations. In fact, unscrupulous artists have illegally obtained
credit card numbers by setting up professional looking storefronts that resembles
legitimate businesses.
2. Snooping the shopper’s computer
The software and hardware vendors sell their products with security
features disabled. Most users may not have adequate knowledge of enabling
these security features. This provides a best opportunity for attackers. A popular
technique for gaining entry into the shopper’s system is to use a tool such as
SATAN, to perform port scans on a computer that detect entry points into the
machine. Based on the opened ports found, the attacker can use various
techniques to gain entry into the user’s system. Upon entry, they scan the file
system for personal information, such as passwords.
3. Sniffing the network
Attacker monitors the data between the shopper’s computer and the server.
He collects data about the shopper or steals personal information, such as credit
card numbers A request from the client to the server computer is broken up into
small pieces known as packets as it leaves the client’s computer and is
reconstructed at the server. The packets of a request are sent through different
routes. The attacker cannot access all the packets of a request and cannot
decode the message sent. A more practical location for this attack is near the
shopper’s computer or the server. Wireless hubs make attacks on the shopper’s
E-Commerce Page 55
School of Distance Education
computer network the better choice because most wireless hubs are shipped with
security features disabled. This allows an attacker to easily scan unencrypted
traffic from the user’s computer.
4. Guessing passwords.
This style of attack is manual or automated. Manual attacks are difficult
and only successful if the attacker knows something about the shopper.
Automated attacks have a higher likelihood of success because the probability of
guessing a user ID/ password becomes more significant as the number of tries
increases. There are tools which can be used to test all the words in the
dictionary to know the user ID/ password combinations, or that attack popular
user ID/ password combinations. The attacker can automate to go against
multiple sites at one time.
5. Unauthorised Disclosure
6. Unauthorised action
A competitor or unhappy customer can alter a Web site so that it refuses
service to potential clients or malfunctions.
7. Eavesdropping
The content of a transaction may not only be intercepted, but also altered,
either maliciously or accidently. User names, credit card numbers, and dollar
amounts sent are all vulnerable to such alteration.
Types of Threats and sources of threats
E-Commerce Page 56
School of Distance Education
1. Encryption
Implementation of technology solutions to secure information that travel
over public channels can be protected using cryptographic techniques.
Cryptography is the process of making information unintelligible to the
unauthorized reader. But decryption is a reverse process of encryption, to make
the information readable once again. Cryptography techniques make use of
secret codes or key to encrypt information. The same secret key is used by the
receiver to decrypt the information; A key is a very large number, a string of zeros
and ones.
2. Digital Signatures
They are used to verify the authenticity of the message and claimed identity
of the sender but also to verify message integrity. A message is encrypted with
the sender’s private key to generate the signature. The message is then sent to
the destination along with the signature. The recipient decrypts the signature
using the sender’s public key and if result matches with the copy of the message
received, the recipient can ensure that the message was sent by the claimed
originator.
E-Commerce Page 57
School of Distance Education
E-Commerce Page 58
School of Distance Education
The word cyber and its relative dot.com are probably the most commo0nly used
terminologies of the modern era. In the information age the rapid development of
computers, telecommunications and other technologies has led to the evolution
of new forms of transnational crimes known as cyber crimes. Cyber crimes have
virtually no boundaries and may affect every country in the world.
Cyber crime may be defined as any crime with the help of computer and
communication technology with the purpose of influencing the functioning of
computer or computer systems. The extent of loss involved worldwide of cyber
crimes is tremendous as it is estimated that 500 million people who use the
Internet can be affected by the emergence of cyber crimes.
The main objective of the Act is to provide legal recognition for transactions
carried out by means of electronic data interchange and other means of
electronic communication and storage of information to facilitate electronic filing
of documents with the government agencies. It also involves legal provisions
relating to piracy, defamation, advertising, taxation, digital signatures, copyrights
and trade secrets in the cyber world. Some of the major provisions contained in
the IT Act are as follows:-
Electronic contracts will be legally valid
Legal recognition of digital signatures
Security procedure for electronic records and digital signature
Appointment of certifying authorities and controller of certifying authorities
including recognition of foreign certifying authorities.
Various types of computer crimes defined and stringent penalties provided
under the Act.
Establishment of Cyber Appellate Tribunal under the Act.
Act to apply for offences or contraventions committed outside India.
Power of police officers and other officers to enter into any public place and
search and arrest without warrant
Constitution of Cyber Regulations Advisory committee who will advice the
Central Government and Controller.
E-Commerce Page 59
School of Distance Education
Rapid increase in the use of computer and Internet has given rise to new
forms of crimes like, sending offensive emails and multimedia messages, child
pornography, cyber terrorism, publishing sexually explicit materials in electronic
form, video voyeurism, breach of confidentiality and leakage of data by
intermediary, e-commerce frauds like cheating by personation – commonly
known as phishing, identity theft, frauds on online auction sites, etc. So, penal
provisions were required to the included in the Information Technology Act,
2000. Also, the Act needed to be technology neutral to provide alternative
technology of electronic signature for bringing harmonization with Model Law on
electronic Signatures adopted by United Nations Commission on International
Trade Law [UNICITRAL]
Keeping in view the above, Government had introduced the Information
Technology [Amendment] Bill, 2006 in the Loka Saba on 15th December 2006..
Both Houses of Parliament passed the Bill on 23rd December 2008.Subsequently
the Information Technology [Amendment] Act, 2008 received the assent of
President on 5th February 2009 and was notified in the Gazette of India..
The Amendment provides for eight different types of offences, which range
from using computer resource code or communication device to disseminating
and composing information which is false, offensive or menacing in nature,
fraudulent, dishonest use of electronic signatures, password or other
identification features to any computer source or communication device in
capturing, publishing or transmitting any form of obscene images and visuals, as
being crimes affecting individuals or other persons. Cyber cafes have been
brought in the net, increasing accountability of intermediaries, thereby including
search engines, service providers, online markets, without clarity on how to trap
the fox. These provisions structured in a diffused manner, with unrelated aspects
such as cyber terrorism clauses juxtaposed in between.
%%%%%
E-Commerce Page 60