Ecommerce Note
Ecommerce Note
Ecommerce Note
Unit: 1 - Introduction 5
Ecommerce 5
History of E-commerce 5
E-Business 5
Global trading environment & adoption of e-commerce 6
Differences between traditional and e-Commerce 6
Advantages and disadvantages of e-Commerce 7
E-commerce framework 8
Ecommerce
E-commerce is the buying and selling of goods or services via the internet, and the
transfer of money and data to complete the sales. It’s also known as electronic commerce
or internet commerce.
Ecommerce is often used to refer to the sale of physical products online, but it can also
describe any kind of commercial transaction that is facilitated through the internet.
History of E-commerce
History of E-commerce was introduced in our country just with the purpose that the Nepali
residing abroad can send gifts to the one in Nepal. People outside the country.
E-commerce has been developing since the 1990 ad and its evolution is directly linked to
the advancement of information technology. History of E-commerce purchasing
experience has a more positive attribute toward online buying and selling. E-commerce or
Electronic commerce also known as e-business refers to the transaction of goods and
services.
The history of e-commerce started over 40 year ago. When the introduction of technology
like electronic data interchanges and teleshopping in the 1970 ad. The history of
e-commerce is closely inter-wined with the history of the internet. Online shopping became
possible when the internet was open to the public in 1991.
E-Business
E-Business refers to business with the help of the internet. Electronic business differs from
electronic commerce as it does not only deal with online transactions of selling and buying
of a product and/or service but also enables the conduct of business processes within the
value chain through internal or external networks.
Global trading environment & adoption of e-commerce
The Global trading environment consists of trade negotiations between nations to form
agreements by giving a way some of their business parts. The trading environment is an
interrelated system whose elements include potential trading objects and usable trading
tools.
The world has become a global village. People of Nepal can communicate and do
business with the people of the USA. All the primary groups of e-business firms are in a
race to capture global business revenues. Telecommunication firms are competing to build
the infrastructure in countries all over the world. It performs ISP services and software
procedures like mercantile corporation ETC.
Adoption of e-commerce has been adopted because it is the overall process of buying and
selling , transferring or exchanging product or service or information VIA computer
networks and the internet. The purpose of this study is e-commerce, business network,
ICT skill, technology qualified human resources . E-commerce is a buying and selling of
goods and services or transmitting of fund data over an electronic network. The term
e-business is often used interchangeability, cost of equipment and services , security
system, distribution logistics.
It is used to save valuable time and money. It is ancient and still in usage where the
digital network is not reachable.
Advantages:
● Easy to set up: electronic business is easy to set up even from home, the only
requirements are software, a device and internet connection.
● Flexible Business Hours: There are no time barriers that a location-based business
can encounter since the internet is available to everyone all the time. Your products
and services can be accessed by everyone with an internet connection.
Disadvantages
● Lack of Personal Touch: The products cannot be examined or felt before the final
purchase. In the traditional model, we have a more personal customer experience,
while in electronic business that is mostly not the case. Another missing factor of
personal touch could also be in online transactions.
● Delivery Time: Traditional business enables instant satisfaction as you obtain the
product the moment you purchase it, while in electronic business that is not
possible. There will always be a waiting period before you receive the product. For
example, Amazon assures one-day delivery. This does not resolve the issue
completely, but it is an improvement.
E-commerce framework
An ecommerce framework refers to the type of software you're using to build your
ecommerce store. For example, ecommerce software Magento uses an open source
framework, while BigCommerce is SaaS. Both also enable a headless framework.
1. SaaS
2. Open source
3. Headless commerce
SaaS
SaaS stands for “software as a service.” Users subscribe as opposed to buying software
that the vendor continues to host, maintain and improve. SaaS platforms, on average,
come with more out-of-the-box functionality.
Pros
● The vendor can push out real-time feature upgrades as they continue to improve the
software over time.
● Total cost of ownership is typically much less than with an open source or headless
commerce framework.
● Security and maintenance are included in your costs, and you won’t have to worry
about hosting.
Cons
Open Source
Open source software is software that allows users to access and change the source code
on their own software instance. Open source ecommerce platforms offer a high level of
customization, but it comes at a cost.
You’ll need developers to not just make the customizations you want, but also to maintain
the code over time. The more customization, the higher the risk of unintended
consequences and ensure continued cybersecurity defenses to protect your business and
your shoppers.
Pros
Cons
2. The ability to customize also means that the software is more complex, and you’ll
be more reliant on developers not just at implementation but over the lifecycle of
your business.
3. The TCO is typically high once you factor in all the related extraneous costs.
Headless
Headless commerce decouples the back and front-ends so retailers can choose their own
front-end presentation layer to deliver a differentiated customer experience by leveraging a
composable architecture approach. This also gives you the opportunity to take a
multi-vendor approach, using one vendor for the back-end solution and something
different on the front.
Pros
1. You’ll have the flexibility to use the front-end of your choice, from digital experience
platforms to PWAs and more.
2. You can use your back-end to power multiple front-ends for a multi-site experience.
3. When your front- and back-ends are decoupled, each can undergo development
work without risking impacts to each other.
Cons
1. The total cost of ownership can be high, because you’ll be paying for your
back-end, front-end and development work.
Business Model
Business model refers to a company's plan for making a profit. It identifies the products or
services the business plans to sell, its identified target market, and any anticipated
expenses. Business models are important for both new and established businesses. They
help new, developing companies attract investment, recruit talent, and motivate
management and staff. Established businesses should regularly update their business
plans or they'll fail to anticipate trends and challenges ahead. Business plans help
investors evaluate companies that interest them.
● B2B transactions tend to happen in the supply chain, where one company will
purchase raw materials from another to be used in the manufacturing process.
● B2B transactions are also commonplace for auto industry companies, as well as
property management, housekeeping, and industrial cleanup companies.
The term business-to-consumer (B2C) refers to the process of selling products and
services directly between a business and consumers who are the end-users of its products
or services. Most companies that sell directly to consumers can be referred to as B2C
companies.
B2C became immensely popular during the dotcom boom of the late 1990s when it was
mainly used to refer to online retailers who sold products and services to consumers
through the Internet.
2. B2C typically refers to online retailers who sell products and services to consumers
through the Internet.
3. Online B2C became a threat to traditional retailers, who profited from adding a
markup to the price.
Consumer to consumer (C2C) markets provide a way to allow customers to interact with
each other. Traditional markets require business to customer relationships, in which a
customer goes to the business in order to purchase a product or service. In customer to
customer markets, the business facilitates an environment where customers can sell
goods or services to each other.
Consumer-to-consumer (or citizen-to-citizen) electronic commerce involves the
electronically facilitated transactions between consumers through some third party. A
common example is an online auction, in which a consumer posts an item for sale and
other consumers bid to purchase it; the third party generally charges a flat fee or
commission. The sites are only intermediaries, just there to match consumers. They do not
have to check the quality of the products being offered.
Consumer to consumer (C2C) marketing is the creation of a product or service with the
specific promotional strategy being for consumers to share that product or service with
others as brand advocates based on the value of the product. The investment into
conceptualizing and developing a top-of-the-line product or service that consumers are
actively looking for is equitable to a retail pre-launch product awareness marketing.
B-to B refers to the activities of buying and selling that occur between business as
opposed to business. Selling to consumers. E-commerce development process project &
clients. E-commerce web site design and development is creating e-commerce solutions
tailored to a specific business model and audience .
E-commerce is the activity of buying or selling products on online services or over the
internet. E-commerce originated as a standard for the exchanges of business documents
such as orders or invoices between suppliers and their business customers. B-to-B
E-commerce is offering products and services that specifically target outside business
organizations. Who purchase from large suppliers then sell these products to their
customers through separate business to consumer , e-commerce web sites.
B2B Vs B2C
Multiple pricing tiers and order volume Single pricing tiers for all customers
discounts
E-Procurement
E-procurement is the process of buying and selling supplies and services over the Internet.
It differs from e-commerce in that it makes use of a supplier’s closed system typically
available only to registered users.
Benefits of E-Procurements
Cost Savings
Built-in monitoring tools help control costs and maximize performance, reducing overhead
and paperwork. Fully automated systems streamline processes and can result in a faster
cycle from creating an order to fulfillment. There also is an opportunity for a larger selection
of products and services.
Transparency
Electronic commerce needs a network infrastructure to transport the content- data, audio,
visual, text, animation and so on. This network infrastructure is provided by what is known
as the I-way or information superhighway.
Requirements of I-way
Start: The alignment should be short so as to make the road project economical.
Easy: The alignment should be such that it is easy to construct and maintain the road with
problems.
Safe: safe enough for construction and maintenance from the viewpoint of satiability
natural will slope cut foundation.
Economical: The road alignment could be considered economical only if the total life
cycle cost considering the initial cost, maintenance cost cost and vehicle operation cost is
lowest.
Utilities: The alignment should be fixed such that it provides comfort to the driver and
passengers.
Natural aspect: As the road project needs large investment , the government should be
clear about the requirement of the road.
The distance between two terminal stations should be short and as far as possible straight.
It consists of three key elements in addition to the communication infrastructure that
permit two way communication, information appliances such as TV, Telephone and
computers and new products and combining elements of the internet, networking
communication and transfer in an ideal highway.
Components of I-way
Network access equipment which is at the consumer end and enables the consumer to
access the network. It consists of the hardware such as computers, modems, routers,
switches for computer networks, set-top boxes for television networks and software
platforms such as browsers and operating systems.
Access media:
Access media provide the communication backbone for the transmission of data and
information. The access providers may be differentiated into four categories: telecom
based, cable TV based, wireless based or computer based on-line systems.
It provides the infrastructure for connecting across the countries and continents.They
include such networks as the long distance telephone lines, the satellite networks and
internet.
Internet
The internet forms a well known component of the global information distribution network.
It targets a wide range of e-commerce applications such as video on demand, home
shopping, e-mail, edi, information publishing, information retrieval, video conferencing and
many more.
All the components of the I-way together provide a network infrastructure for the
e-commerce activities.
Intranet
An intranet is a private network that can only be accessed by authorized users. For
example, a business may create an intranet to allow employees to securely share
messages and files with each other.
Applications of an Intranet
● Company-wide Announcements
● A Company Directory
● Event Management
Extranet
The extranet is the private networks that use the internet that allows people outside
business . Internet protocol network connectivity and public communication system to
security share part of a business information or operation with suppliers, vendors,
partners, customers or other business. An extranet can be viewed as part of a company's
internet that is extended to users outside the company.
A software agent is a piece of software that functions as an agent for a user or another
program, working autonomously and continuously in a particular environment. It is
inhibited by other processes and agents, but is also able to learn from its experience in
functioning in an environment over a long period of time.
Software agents offer various benefits to end users by automating repetitive tasks. The
basic concepts related to software agents are:
Interface
Interface as a "face-to-face," a place where things, or people and things meet. Any
common boundary or area of convergence can be an interface. Used as a verb,
communicating and working together.
Collaborative
Information
Mobile phones are used for a variety of purposes, such as keeping in touch with family
members, for conducting business, and in order to have access to a telephone in the event
of an emergency. Some people carry more than one mobile phone for different purposes,
such as for business and personal use.
ADSL
ADSL stands for Asymmetric Digital Subscriber Line. It is a technology that provides high
transmission speeds for video and voice to homes over an ordinary copper telephone wire
ADSL is a type of internet connection that uses a home landline to provide broadband. It
splits the telephone connection so that frequencies not used in a voice telephone call are
used for broadband. ADSL where the speed of data sent is known as upstream and data
received is known as downstream.
Wi-Fi
Wi-Fi is the wireless technology used to connect computers, tablets, smartphones and
other devices to the internet. Wi-Fi is the radio signal sent from a wireless router to a
nearby device, which translates the signal into data you can see and use.
Currently, WiFi is available in two frequencies 2.4GHz and 5GHz. 2.4GHz has the larger
distance coverage but it has interference issues in the network. While 5GHz has a shorter
distance than 2.4GHz but less interference with great speed improvement.
UMTS (3G)
UMTS uses the static fixed carrier of frequency 5MHz. UMTS supports 3G.
LTE (4G)
Long-Term Evolution (LTE) is a standard for wireless broadband communication for mobile
devices and data terminals, based on the GSM/EDGE and UMTS/HSPA standards. It
improves on those standards capacity and speed by using a different radio interface and
core network improvements. LTE is the upgrade path for carriers with both GSM/UMTS
networks and CDMA2000 networks. Because LTE frequencies and bands differ from
country to country, only multi-band phones can use LTE in all countries where it is
supported.
LTE is also called 3.95G and has been marketed as "4G LTE" and "Advanced 4G" but it
does not meet the technical criteria of a 4G wireless service, as specified in the 3GPP (3rd
Generation Partnership Project) Release 8 and 9 document series for LTE Advanced.
BLUETOOTH
Bluetooth is a short-range wireless technology standard that is used for exchanging data
between fixed and mobile devices over short distances using UHF radio waves in the ISM
bands, from 2.402 GHz to 2.48 GHz, and building personal area networks.
Use of Bluetooth
Advantages of Bluetooth
● Wireless
● Availability
● Usability
● Efficiency
● Security
Unit-4: Electronic Data Interchange (EDI )
Concepts of EDI
EDI Vs e-mail
EDI EMAIL
The data are structured in a software The data are not necessarily structured to
understandable way. be software understandable.
The application layer consists of actual business applications that are going to be
connected through the EDI system for exchange of information. This application uses their
own electronic format. They need to convert the internal company document format into a
format that can be understood by other trading companies. The application layer is also
called semantic layer.
This layer of EDI architecture defines the structure of the business form. There are different
formats to use EDI documents. Some of which are EDIFACT and ANSI X12.
Transport layer
The data transport layer consists of the services that automate the tasks of electronic
transfer of messages. Some of the protocols used in this layer are Email, FTP, Telnet,
HTTP, X.H35(MIME).
Interconnection Layer
This layer refers to the network infrastructure that is used for the exchange of information
between trading partners. It consists of a dial up line, WAN. Internet. I-way etc.
Document Standard
EDIFACT
Electronic Data Interchange for Administration, Commerce and Transport (EDIFACT) is the
international standard for electronic data interchange, which was developed under the
auspices of the United Nations. The standard was approved as the ISO 9735 standard by
the International Organization for Standardization (ISO) in 1987. The EDIFACT standard
provides rules on how to structure data and standardize messages for multi-industry and
multi-country exchange.
ANSI X12
ANSI X12 stands for American National Standards Institute X12 and refers to the American
EDI standard developed back in 1979 by the ANSI subsidiary Accredited Standards
Committee (ASC).
The goal of ANSI X12 is to uniform standards for inter-industry electronic exchange of
business documents, namely EDI. ANSI X12 is a global set of rules for the intercompany
electronic data exchange between two EDI Trading Partners.
By defining uniform segments and elements that describe the information in the electronic
file and which are used for a wide variety of business documents (such as invoices,
purchase orders, delivery notes, etc.), a common standard was invented
XML
XML (Extensible Markup Language) is used to describe data. The XML standard is a
flexible way to create information formats and electronically share structured data via the
public internet, as well as via corporate networks.
XML's primary function is to create formats for data that is used to encode information for
documentation, database records, transactions and many other types of data. XML data
may be used for creating different content types that are generated by building dissimilar
types of content including web, print and mobile content that are based on the XML data.
XML Example:
<personal>
<name>Anil Oli</name>
<birth>
<year>2058</year>
<month>04</month>
<date>08</date>
</birth>
<address>
</address>
<email>aniloli42@gmail.com</email>
</personal>
EFT
An electronic funds transfer (EFT) is the electronic transfer of money over an online
network. Electronic funds transfers can be performed between the same bank or a
different one, and can be accomplished with several different types of payment systems.
An EFT can be initiated by a person or by an institution like a business and often doesn’t
require much more than a bank account in good standing.
- Direct Deposit
- Wired Transfer
- ATM
- Debit Card
- Online Banking
Internet Advertising
Online advertising, also known as online marketing, Internet advertising, digital advertising
or web advertising, is a form of marketing and advertising which uses the Internet to
promote products and services to audiences and platform users. Online advertising
includes email marketing, search engine marketing (SEM), social media marketing, many
types of display advertising (including web banner advertising), and mobile advertising.
Advertisements are increasingly being delivered via automated software systems operating
across multiple websites, media services and platforms, known as programmatic
advertising.
Benefits of EDI
Automating the flow of messages with integrated EDI improves the speed and efficiency of
your operations by eliminating the need to manually rekey data in multiple systems.
Fewer errors
Increased accuracy
Automated message validation ensures that errors are flagged and rectified before they
impact your trading partners and data integrity in your internal systems is maintained.
Automation through integrated EDI enables you to maximize the benefits of EDI and move
beyond simply complying with your customers' EDI requirements.
Enhanced visibility
EDI provides full transparency of the ordering and invoicing process for you and your
trading partners. This end-to-end visibility enables more informed decisions to be made
and ultimately improves the service delivered to consumers.
Reduced inventory cost: Increased visibility within the supply chain eliminates unknowns
and can therefore enable you to reduce the levels of inventory you need to hold.
EDI optimizes workflow by replacing previous order processes such as mail, fax or email
and electronically exchanges documents between two companies with different business
systems. A translator will convert the business application data between the sender and
receiver, such as trading partners.
An EDI Billing is an electronic version of a paper invoice that sellers send to buyers to
request payment for products delivered. An electronic invoice is one of the most
fundamental documents in an automated EDI system.
Most of the present day systems rely on passwords to gain access but, pass-
words are easy to guess and this makes the system vulnerable to password
guessing attacks. Users are very poor at choosing good passwords. An in-
Way.
Cross Vulnerability
exist between systems that rely on common values for user identification and
Multiple Standards
Problems arise when the two trading partners adhere to different standards. The security
features offered in a particular standard may not be comparable to the other standard.
Authentication
The extensive use of open networks and distributed systems poses serious threats to the
security of end-to-end communications and network components themselves. A
necessary foundation for securing a network is the ability to reliably authenticate
communication partners and other network entities.
Authentication is the most important of the security services, because all other security
services depend upon it.
Non-Repudiation
Disclosure of Information
With the introduction and use of EDI, additional security risks arise apart from those which
exist for the conventional electronic information systems.
The computers of a trading partner can initiate transactions inside another partner's
accounting systems which are processed in a totally automatic environment. By its very
nature, EDI requires that the system be continuously open to receive incoming
transactions.
Advantages of EDI
Applications of EDI
Retail Sector
In the retail sector profit margins usually depend upon efficient inventory management. EDI
provides a structured way to maintain and replenish goods stocked at a retail outlet.
Retailers use a common model stock for each shop location and the point of sale stock
position is updated continuously and data is fed via EDI enabled SCM (supply chain
management) network. The EDI software monitors all the logistics and makes updates in
the original stock.
Manufacturing Sector
EDI ensures effective and efficient management of materials required for production of a
commodity. In the manufacturing sector EDI facilitates Material requirement planning and
just in time manufacturing. The Inventory position of OEM is constantly updated through
EDI and the supplier is notified about the shortage of materials. This helps the supplier to
plan and schedule supply according to requirements of the manufacturer.
Automobile Sector
In the automobile sector EDI is used to keep customers updated with the current product
and pricing information during the purchase cycle. An advance shipping notice is
transmitted through EDI to the customers to prepare a loading schedule and to ensure
proper receipt of the product. The customer may also make payment on receipt of goods
via EDI to speed up the payment process.
Financial Sector
In the financial sector EDI replaces the labor intensive activities of collecting, processing
and dispersing payments with an electronic system. It facilitates the flow of payment
between the bank accounts of trading partners without requiring any human intervention. A
payee's bank account is electronically credited and the payer's account is electronically
credited on the scheduled day of payment; such an exchange is known as electronic fund
transfer (EFT).
Definition
Application Of M-Commerce
1. Mobile Banking:
Using a mobile website or application to perform all your banking functions. It is one
step ahead of online banking and has become commonplace these days. For
example, in Nigeria, the majority of banking transactions happen on mobile phones.
2. Mobile Ticketing and Booking:
Making bookings and receiving your tickets on the mobile. The digital ticket or
boarding pass is sent directly to your phone after you make the payment from it.
Even in India now IRTC and other services provide m-ticketing services.
3. E-bills:
This includes mobile vouchers, mobile coupons to be redeemed and even loyalty
points or cards.
4. Auctions:
Online auctions having now been developed to be made available via mobile
phones as well.
5. Stock Market Reports and even stock market trading over mobile applications.
Advantages of M-commerce
● It provides a very convenient and easy to use the system to conduct business
transactions.
● Mobile commerce has a very wide reach. A huge part of the world’s population has
a mobile phone in their pocket. So the sheer size of the market is tremendous.
● M-commerce also helps businesses target customers according to their location,
service provider, the type of device they use and various other criteria. This can be a
good marketing tool.
● The costs of the company were also reduced. This is due to the streamlined
processes, now transaction cost, low carrying cost and low order processing cost
as well.
WAP stands for Wireless Application Protocol. It is a protocol designed for micro-browsers
and it enables the access of the internet in mobile devices. It uses the markup language
WML (Wireless Markup Language), WML is defined as an XML 1.0 application. It enables
creating web applications for mobile devices. In 1998, WAP Forum was founded by
Ericson, Motorola, Nokia and Unwired Planet whose aim was to standardize the various
wireless technologies via protocols.
WAP protocol was a result of the joint efforts of the various members of WAP Forum. In
2002, WAP forum was merged with various other forums of the industry resulting in the
formation of Open Mobile Alliance (OMA).
WAP Browser
A wireless access protocol (WAP) browser allows mobile devices such as older cellular
phones to access compatible web content. The mini-browser can use multiple Internet
protocols to render web pages into plain text or simplified versions of the original web
page. In order for a WAP browser to be effective, web developers usually create separate
WAP web pages for mobile devices. Otherwise without WAP optimization, web content will
usually take longer to load and may not render correctly in older mobile devices.
During the early days of the Internet, mobile devices had limited system resources and
screen size, which made loading Internet-based content such as email, instant messaging
and newsgroups a challenge.
Mobile commerce applications need a reliable wireless network, different protocols for
business services, mobile payment models and security and encryption techniques.
For successful m-commerce there must be strong wireless network infrastructure. Wireless
networks have evolved from voice-only radio-based analog transmission to digital voice
and data transmission.
Security and Encryption
Mobile commerce can be made secure by using different kinds of security protocols.
Encryption and decryption take place algorithm can be adapted for extra security. SSL and
TLS security measures can be adapted.
It is the rise of the high speed internet. There are different opportunities to generate
revenue with the help of different mobile applications. These apps can be uploaded to the
app store or play store by a mobile developer and the user can download the apps from
the apps the developer can earn money through advertisement or mobile payment. For
Example: daraz.
Businesses that run eCommerce operations experience several security risks, such as
Counterfeit sites
Hackers can easily create fake versions of legitimate websites without incurring any costs.
Therefore, the affected company may suffer severe damage to its reputations and
valuations.
Some fraudsters change the content of a website. Their goal is usually to either divert
traffic to a competing website or destroy the affected company’s reputation.
The eCommerce industry is full of cases where criminals have stolen the information about
inventory data, personal information of customers, such as addresses and credit card
details.
Attackers may damage a company’s online store using worm or virus attacks.
Denial of service
Some hackers prevent legit users from using the online store, causing a reduction in its
functioning.
Attackers can get intellectual property and steal, destroy, or change it to suit their
malicious goals.
These issues cause losses in finances, market shares, and reputations. Additionally, the
clients may open criminal charges against the company. Hackers can use worms, viruses,
Trojan horses, and other malicious programs to infect computers and computers in many
different ways. Worms and viruses invade the systems, multiply, and spread. Some
hackers may hide Trojan horses in fake software, and start infections once the users
download the software. These fraudulent programs may:
Businesses have improved their transparency levels, such as clearly stating the point of
contact when a problem occurs. However, such measures often fail to disclose fully the
collection and usage of personal data.
E-commerce businesses are constantly exposed to cyber security threats. Some risks that
online businesses face are phishing attacks, website hacking, malware, credit card fraud,
ransomware attacks and unprotected web services.
PRIVACY ISSUES
E-commerce businesses have to collect information about visitors and existing customers.
This information can help to identify potential customers, provide great customer service,
ensure personalized communication, and process payment transactions. However, to
avoid legal problems, the information must be collected without interfering with rights of
privacy.
Violation of intellectual property is a common threat that can result in huge losses.
Businesses in the e-commerce industry face the risk of copyright, patent and trademark
infringement. Even when you have adequately protected your intellectual property, you
may end up violating someone else’s intellectual property. This could cost your online
business a fortune.
E-commerce businesses are concerned about product liability issues. The products or
services you sell online can be defective, result in some type of injury or cause damage to
property. This could be due to design flaws, manufacturing defects or marketing defects.
When this happens, your online business may face third party claims.
Even with through record keeping and clear communication, mistakes can happen when
shipping items to customers. Because purchases are made online, e-commerce
businesses typically make promises and enter into contracts before the actual transaction
takes place. However, there are times when you will run out of stock, orders will be
misplaced, the wrong items are sent and orders will get lost in transit. This could be due to
errors or warehouse and logistics challenges.
HUMAN ERROR
Apart from exposing you to professional liability, human error can also cause data loss. In
fact, about 95 percent of cyber security breaches are caused by human error. An innocent
mistake such as deleting a file, poor password hygiene, poor access control, or email
misdelivery can present serious cyber risks.
To minimize the risk of losing important customer, employee, and business data, invest in a
reliable backup and recovery solution.
PLATFORM DOWNTIME
Even a few minutes of system downtime can be disastrous for an online business. Outages
may occur due to coding errors, a surge in traffic, problems with online payment systems,
or scheduled downtime to update servers and security. Platform downtime will lead to
business interruption and loss of productivity. When the outages are frequent and lengthy,
they will damage your reputation and impact your bottom line.
NON-COMPLIANCE
E-commerce businesses must adhere to certain regulations relating to data privacy and
protection. Business owners who operate without regard to the applicable laws run the risk
of paying hefty financial penalties, serving time in prison or having their company shut
down altogether. With this strict regulatory environment, non-compliance could jeopardize
your business continuity.
Whether you sell locally or internationally, you should understand your obligations under
these laws. This way, you will take statutory compliance seriously, something that will help
you to protect your business, employees, and customers.
Disasters happen, and they can take many different forms. Whether natural or man-made,
these unforeseen events can have adverse effects on your online business. One of the
potential risks that e-commerce businesses face is loss of premises and inventory damage
due to disaster. Inventory can be damaged while in the warehouse or when in transit.
To ensure your online business survives and carries on after such disasters, you should
have the right protection in place. Having adequate insurance coverage will minimize your
financial loss and help you get your business back up and running.
Concept of network
A network can be defined as a group of computers and other devices connected in some
ways so as to be able to exchange data. Each of the devices on the network can be
thought of as a node. Each node has a unique address.
Addresses are numeric quantities that are easy for computers to work with, but not for
humans to remember. Example: 204.160.241.98
Some networks also provide names that humans can more easily remember than
numbers.
Computer Security
Computer security is also called cybersecurity. The protection of computer systems and
information from harm, theft, and unauthorized use. Computer hardware is typically
protected by the same means used to protect other valuable or sensitive
equipment—namely, serial numbers, doors and locks, and alarms. The protection of
information and system access, on the other hand, is achieved through other tactics, some
of them quite complex.
Electronic data security is important at a time when people are considering banking and
other financial transaction by PCs. One major threat to data security is unauthorized
network monitoring also called packet sniffing.
Types of Message
1. Message Confidentiality
2. Message and System Integrity
3. Message Authentication
Firewall
A Firewall is a network security device that monitors and filters incoming and outgoing
network traffic based on an organization’s previously established security policies. At its
most basic, a firewall is essentially the barrier that sits between a private internal network
and the public Internet. A firewall’s main purpose is to allow non-threatening traffic in and
to keep dangerous traffic out.
Functions Of Firewall
A firewall acts as a barrier or gatekeeper between your computer and another network like
the internet. It works like a traffic controller, monitoring and filtering traffic that wants to
gain access to your operating system.
Types of Firewalls
Packet filtering
A small amount of data is analyzed and distributed according to the filter’s standards.
Proxy service
Network security system that protects while filtering messages at the application layer.
Stateful inspection
Dynamic packet filtering that monitors active connections to determine which network
packets to allow through the Firewall.
Cryptography
Cryptography is the method of protecting information and communication through the use
of codes. So that only those for whom the information is intended can read and process. A
plain text or message is converted in an unreadable text known as ciphertext using a
mathematical algorithm this is known as encryption. At the receiver, the ciphertext is
converted back to the original message which is known as decryption therefore
cryptography is the combination of encryption and decryption.
Features Of Cryptography
Confidentiality:
Information can only be accessed by the person for whom it is intended and no other
person except him can access it.
Integrity:
Non-repudiation:
The creator/sender of information cannot deny his or her intention to send information at a
later stage.
Authentication:
The identities of sender and receiver are confirmed. As well as destination/origin of the
information is confirmed.
Types of cryptography
It is an encryption system where the sender and receiver of a message use a single
common key to encrypt and decrypt messages. Symmetric Key Systems are faster and
simpler but the problem is that sender and receiver have to somehow exchange keys in a
secure manner. The most popular symmetric-key cryptography system is Data Encryption
System(DES).
Hash Functions:
There is no usage of any key in this algorithm. A hash value with a fixed length is
calculated as per the plain text which makes it impossible for the contents of plain text to
be recovered. Many operating systems use hash functions to encrypt passwords.
Under this system, a pair of keys is used to encrypt and decrypt information. A public key
is used for encryption and a private key is used for decryption. The public key and Private
Key are different. Even if the public key is known by everyone the intended receiver can
only decode it because he alone knows the private key.
Public Key in Cryptography
In cryptography, a public key is a large numerical value that is used to encrypt data. The
key can be generated by a software program, but more often, it is provided by a trusted,
designated authority and made available to everyone through a publicly accessible
repository or directory.
A private key, also known as a secret key, is a variable in cryptography that is used with an
algorithm to encrypt and decrypt data. Secret keys should only be shared with the key's
generator or parties authorized to decrypt the data. Private keys play an important role in
symmetric cryptography, asymmetric cryptography, and cryptocurrencies.
Antivirus
Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a
computer. Once installed, most antivirus software runs automatically in the background to
provide real-time protection against virus attacks.
Comprehensive virus protection programs help protect your files and hardware from
malware such as worms, Trojan horses, and spyware, and may also offer additional
protection such as customizable firewalls and website blocking.
Digital Signature
When a digital signed file is present it can use key pair linked with that signature to verify it.
There is also a hash function. The hash function performs while signing that serves as a
checksum. The digital signature is that. Let clients know that the entity is trusted and that
what is signed is authentic.
Digital Certificate
A digital certificate is a cryptographic file that binds key pairs to validate an entity. When
digital is issued, it is signed by a certificate authority (CA) that is issuing it. When the client
is digitally certified by a certificate authority, this means that the client can be trusted. SSL
Certificate is an example of a digital certificate.
Certificate Authority
Third-party authentication is based on the fact that virtually everyone on the Internet has
an account on at least one top social networking site, such as Google, Facebook, Twitter
or Linkedln. All these platforms provide authentication and identification your users by
using their media accounts.
SSL stands for Secure Sockets Layer. It is the standard technology for keeping an internet
connection secure and safeguarding any sensitive data that is being sent between two
systems, preventing criminals from reading and modifying any information transferred,
including potential personal details. The two systems can be a server and a client (for
example, a shopping website and browser) or server to server (for example, an application
with personal identifiable information or with payroll information).
A virtual private network (VPN) extends a private network across a public network and
enables users to send and receive data across shared or public networks as if their
computing devices were directly connected to the private network. The benefits of a VPN
include increases in functionality, security, and management of the private network. It
provides access to resources that are inaccessible on the public network and is typically
used for remote workers. Encryption is common, although not an inherent part of a VPN
connection.
Online banking
Online banking allows a user to conduct financial transactions via the Internet. Online
banking is also known as Internet banking or web banking.
Online banking offers customers almost every service traditionally available through a local
branch including deposits, transfers, and online bill payments. Virtually every banking
institution has some form of online banking, available both on desktop versions and
through mobile apps.
Online banking requires a computer or other device, an Internet connection, and a bank or
debit card. In order to access the service, clients need to register for their bank's online
banking service. In order to register, they need to create a password. Once that's done,
they can use the service to do all their banking.
Advantage:
EPS
Types of EPS
a) Credit Card:
A form of electronic payment system which requires the use of a credit card issued
by a financial institution to the card without the use of cash.
b) E-wallet:
It is the form of a prepaid account that stores users financial information, like debit
and credit card information to make an online transaction easier.
c) Smart Card:
A plastic card with a microprocessor that can be loaded with funds to make
transactions. They are also named as chip card.
a) Direct debit:
A financial transaction in which the account holder instructs the bank to collect a
specific amount of money from his account electronically to pay for goods or
services.
b) E-cheque:
It is a digital version of an old paper check. It is an electronic transfer of money from
a bank account, usually a checking account without the use of a paper cheque.
E-cheque uses digital signatures.
c) E-cash:
E-cash is a form of electronic payment system where a certain amount of money is
stored in a client device and is available for online transactions.
1. Authentication
It is necessary to verify the consumer's identity before the payment is authorized.
2. Encryption
Encryption is a process of making messages unreadable except by those who has
authorized decryption keys. Different mathematical algorithms are used for
encryption and decryption of messages.
3. Integrity
Ensuring that information is not intentionally or unintentionally changed or destroyed
during transmission.
4. Non-repudiation
Protection against customer's denying the order placed and against merchant's
denying the payment made.
5. Availability and reliability
The network and services like cellular network, internet provider should be available
for the consumers and merchants. These services must be reliable in order to make
electronic transactions easy.
6. Privacy
A consumer's information should be confidential when he or she visits ecommerce
websites. The account information of the customer should be made private and only
available to that customer.
Secure electronic transaction or SET is a system which ensures security and integrity of
electronic transactions. It uses different encryption and hashing techniques to secure
payments over the internet done through credit cards. SET protocol was supported by
different payment processors like VISA, Mastercard etc.
SET protocol restricts revealing of credit card details to merchants which keeps hackers
and thieves out. SET protocol include standard digital certificate like X.509
SSL SET
SSL stands for secure socket layer. SET stands for secure electronic
transaction.
SSL is a protocol for general purpose SET is tailored to the credit card payment.
secure message exchange.
SSL protocol can use a digital certificate SET protocol hides the customer credit
but there is no payment gateway. card information from the merchant and
hides the info to the bank to protect
privacy.
Payment System
Payment Gateway
Payment Processing
For the payment system, it is important to handle the transaction between a merchant and
the customer. There can be a series of interconnections to the payment processing
network. The payment network sets the interchanging fees charred during payment
processing. Within the electronic that the transactions are processed correctly including
SET guidelines and qualifications requirements for member institutions.
Digital wallet
A digital wallet (or e-wallet) is a software-based system that securely stores users payment
information and passwords for numerous payment methods and websites. By using a
digital wallet, users can complete purchases easily and quickly with near-field
communications technology. They can also create stronger passwords without worrying
about whether they will be able to remember them later.
Digital wallets can be used in conjunction with mobile payment systems, which allow
customers to pay for purchases with their smartphones. A digital wallet can also be used
to store loyalty card information and digital coupons.
Abandoned carts
The e-commerce marketplace affords even the smallest retailer a global presence, yet the
vast choice and blurring between online and offline experiences makes the buying process
for the customer much more complicated. As it is essentially your sales funnel,
understanding the exact process that a customer goes through when they’re researching,
deciding, and purchasing is key to knowing which buttons you may need to push along the
way.
In the era of instant gratification, timely communication of good and bad news is critical.
Autopilot allows you to easily let your customers know of any changes to their orders via
follow-up emails and SMS reminders.
Legal issues
Intellectual Properties
Intellectual property is the creations of the mind such as inventions, literary, and artistic
works, symbols, images, designs, used in e-commerce. This can be removed by copyright,
trademark and patient.
Copyright
An exclusive grant from the government that allows the owner to reproduce partial or
whole part to distribute performance or display it to the public.
Some of the copyrights are software, music, videos, and other similar types of digital
resources.
Trademark
Registered symbols used by the businessman are called Trademarks. It is approved by the
government and no-one other can use it.
Patent
Legal documents that grant the holder for the use of ideas or technologies.
Censorship
It is an attempt to control the material on the web. Censorship refers to the government's
attempt to control in one way to another.
Ethical issues
Web tracking
Every time someone visits the web, the website system retains some trails of the users that
can be referred to later, these trails are normal call logs. These logs contain all the records
pertaining to what the users perform in the site. Logs as records mean, they can be
retrieved or saved for later use.
Analysis of log files means turning log data into application service or installing software
that can pluck relevant information from files in-house. Companies track individual’s
movements through tracking software and cookie analysis. Programs such as cookies
raise a batch of privacy concerns. The tracking history is stored on your PC’s hard disk,
and any time you revisit a website, the computer knows it.
Online Privacy
It is necessary to protect the identity of a buyer who uses the Electronic Payment System.
A privacy issue related to the employees of the company is tracking. Monitoring systems
are installed in many companies to monitor e-mail and other web activities in order to
identify employees who extensively use business hours for non-business activities. The
e-commerce activities performed by a buyer can be tracked by organizations. These
activities of monitoring customers raise ethical issues on how secure and anonymous
information are being handled by the e-commerce providers.
Web Spoofing
Web spoofing is an electronic deception related to the Internet. It occurs when the attacker
sets up a fake website which is almost totally the same as the original website in order to
lure consumers to give their credit card number or other personal information. For
example, the attacker setup a site called www.jumiaa.com using the addition of later ‘a’ at
the end, which many users sometimes type by mistake. Users might find themselves in a
situation that they do not notice they are using a bogus web-site and give their credit card
details or other information.
Cybersquatting
Cybersquatting is an activity which a person or firm register, purchase and uses the
existing domain name belong to the well-known organization for the purpose of infringing
its trademarks. This type of person or firm, called cybersquatters, usually infringed the
trademarks to extort the payment from the original trademark’s owner. The extortion of
payment occur when they offers the prices far greater than they had purchased the
organization’s domain name upon. Some cyber-squatters put up offensive remarks about
the person or company which the domain is meant to represent in an effort to encourage
the subject to re-buy their domain from them.
Privacy Invasion
The privacy invasion occurs when the personal details belonging to consumers are
exposed to the unauthorized party. These can be seen in the following ways.
Taxation
The rapid growth of e-commerce, especially the sale of goods and services over the
internet, has fuelled a debate about the taxation regimes to be used. The shift from a
physically oriented commercial environment to a knowledge-based electronic environment
poses serious and substantial issues in relation to taxation and taxation regimes. Tax
administrations throughout the world face the formidable task of protecting their revenue
base without hindering either the development of new technologies or the involvement of
the business community in the evolving and growing e-market place. Concerns of
governments center on the impact of e-commerce on the state and local revenue.
Whereas states can impose a tax on residents' purchases from out-of-state vendors, they
cannot impose an obligation on those vendors to collect the tax unless the vendor has a
substantial presence, or nexus, in the state. These problems will be greater for developing
countries. The shrinking of the tax base will have a disproportionate effect and further
jeopardize the already fragile economy of the developing world.
Unit-9: Cyber law
Modem says Internet technologies are vulnerable. The attackers are easily influenced by
the system in order to protect the Internet from these possibilities cyber law is made.
Cyber law is the area of law that deals with the Internet relationship to technological and
electronic elements including computers, software, hardware and information systems. It is
also known as cyber law or Internet law.
Cyber law prevents or reduces large scale damage from cyber criminal activities by
protecting information action, privacy, communication , intellectual properties, freedom of
speech and so on related to the use of the Internet , websites, email, software , hardware
etc. The increase in internet traffic has yet to have a higher proportion of legal issues world
wide . Cyber law also varies by jurisdiction and country. Enforcement is challenging and
restitution ranges from fines to imprisonment.
1. Strict regulatory rules are put in place by many countries to prevent unauthorized
access to the network.
2. The mobile companies we call upon the governments of the world to reinforce cyber
legal systems and administrations to regulate the emerging mobile threats and
crimes.
3. Cloud computing is a major drawing trend with more advancement of technologies
and volumes of data will flow into the cloud which is not free from cyber law.
Cyber law is important because it touches almost all the asPects of transactions involving
the internet, www, cyberspace etc. Every action and reaction in cyberspace have some
legal and cyber legal perspectives. Cyber law encompasses laws relating to compass
cyber crimes, electronic and digital signatures, intellectual properties/ copyright and
trademark, data protection and privacy.
Entrepreneur
An Entrepreneur is one who creates new business in the face of risk and uncertainty for the
purpose of achieving profit and growth by identifying significant opportunities and
assembling the necessary resources to capitalize them. Although many people form great
business ideas must never act on their ideas but entrepreneurs do.
Entrepreneurship
Entrepreneurship Development
MANAGER
By the term "manager", we mean a person who gets things through his surrounding
subordinates with the aim of accomplishing business objectives efficiently and effectively.
The five primary concerns of a manager are planning, organizing, directing, motivating,
coordinating and controlling. The manager is in charge of the particular division unit or
department of the company. He may directly command to offer or he may direct to the
supervisors who will command the workers. Therefore, he is the one under whose
supervisors, his subordinates work and report to him/her. a manager can be top-level,
middle level and low-level.
Entrepreneur vs Entrepreneurship
Entrepreneur Entrepreneurship
Entrepreneur vs Manager
Entrepreneur Manager
Profits: An entrepreneur earns profits from Salary: A manager earns a salary which is
his business which is uncertain and generally certain and limited.
unlimited.
Entrepreneurial Culture
Characteristics of entrepreneurs:
Definition
Online marketing is a set of tools and methodologies used for promoting products and
services through the internet. Online marketing includes a wider range of marketing
elements than traditional business marketing due to the extra channels and marketing
mechanisms available on the internet.
● Growth in potential
● Reduced expenses
● Elegant communications
● Better control
● Improved customer service
● Competitive advantage
1. Low Costs
Large audiences are reachable at a fraction of traditional advertising budgets,
allowing businesses to create appealing consumer ads. Many advertising platforms
also allow for scalable ads with different levels of reach that are proportioned to the
advertising budget. Rather than committing a large amount of money to advertising,
smaller companies can spend a small amount and still increase their reach.
2. Flexibility and convenience
Consumers may research and purchase products and services at their leisure.
Business blogs can be used to let consumers and prospects conduct their own
research on the business's products as well as provide their feedback and reviews.
3. Analytics
Efficient statistical results are facilitated without extra costs. Many advertising tools
include their own analytics platforms where all data can be neatly organized and
observed. This facilitates business intelligence efforts and data-driven decision
making.
4. Multiple options
Advertising tools include pay-per-click advertising, email marketing, interstitial ads
and banners, social media advertising, and local search integration (like Google
Maps). Digital marketing companies usually offer their services across various online
advertising channels by tuning their offer to the individual client’s needs.
5. Demographic targeting
Consumers can be demographically targeted much more effectively in an online
rather than an offline process. Coupled with the increased analytics potential
explained above, organizations can improve their targeting over time, have a clearer
understanding of their customer base, and create specific offers that are shown only
to certain demographics.
Online marketing includes third parties like Offline marketing includes mass media,
media, web content, search email, social phone center, telephone.
media.
It directly reaches out to the professionals It does not directly reach out to the
of the industry and market. professionals due to some barriers.
1. Email marketing
2. Social media marketing
3. Search engine optimization (SEO)
4. Display advertising like LinkedIn ads or Google Display Network
5. Search engine marketing (SEM)
6. Online events & webinars
7. A/B testing & website optimization
8. Content marketing
9. Video marketing
10. Marketing analytics like Google Analytics
11. Marketing automation
12. Customer relationship management (CRM)
13. Content management system (CMS)
14. Pay-per-click (PPC) advertising like Google Ads
15. Affiliate marketing
1. Business Cards
Business cards coincide with personal interaction that company leaders and
employees have with people in the community. Whenever someone at your
business is out in public and the topic of the company comes up, he should take
the opportunity to pass on a business card that prominently features your web
address. This is an easy tool someone can stick in a wallet or card file and refer to
at any point.
2. Traditional Media
You can use traditional media to promote your business and website. Companies
often close television commercials with the "www" address to direct people for
more information or products. Print ads in newspapers and magazines are also
great visual mechanisms to put your web address in front of readers. In radio
commercials, commonly used by smaller companies, you can repeat your web
address strategically throughout a commercial.
3. Promotional Items
Giveaways are a great offline marketing tool that are as useful for a web-based
business as they are for a brick-and-mortar company. You can give out low-cost
items such as pens, pencils, notepads, calendars, stress balls and t-shirts with your
website emboldened on them. This not only gives you exposure, but if the recipient
reuses the item regularly, he gets ongoing recall of your brand and domain.
4. Direct Mail
You can send direct mail pieces to prospects and customers to go along with any
email marketing you use online. Direct mail has a relatively low response rate, but if
you include magnets for the fridge or other little trinkets with your website, you may
get more exposure and business. If someone stalks your magnet on the fridge, she
may catch your site anytime she walks by. This can lead to a curious visit to your
site or a customer opportunity when a need arises related to what you sell.
Chances are you do not have your social media strategy figured out. Social media is
still so young, that businesses are much more likely to have failed on social media
than succeeded. This includes brands of all sizes - from the mom and pop shops to
global brands with billions of dollars and seemingly unlimited manpower.